Enterprise Architecture Framework

advertisement
Enterprise Architecture Framework
Title:
Version:
Status:
Date:
Author:
Enterprise Architecture Framework
2.0
ISSUED
22/06/12
David Deighton, IT Services
OPEN
Enterprise Architecture Framework
Contents
1
2
Executive Summary .............................................................................................................................. 3
Introduction ........................................................................................................................................... 4
2.1
Revision History ............................................................................................................................. 4
2.2
Background .................................................................................................................................... 4
2.3
Scope ............................................................................................................................................. 4
2.4
Purpose .......................................................................................................................................... 5
2.5
Glossary ......................................................................................................................................... 5
2.6
References ..................................................................................................................................... 5
2.7
Time Line ....................................................................................................................................... 6
3
Enterprise Architecture Framework ....................................................................................................... 7
3.1
Architecture Process ...................................................................................................................... 7
3.2
Governance.................................................................................................................................... 9
3.3
Architecture Principles .................................................................................................................... 9
3.4
Process Comparison .................................................................................................................... 13
3.5
Design Objectives ........................................................................................................................ 14
3.6
Architecture Compliance Review .................................................................................................. 14
3.7
Operational Testing ...................................................................................................................... 15
3.8
Architecture Team ........................................................................................................................ 15
4
Reference Models ............................................................................................................................... 16
4.1
Technical Reference Model (TRM) ............................................................................................... 16
4.2
Standards Information Base (SIB) ................................................................................................ 16
4.3
Target Architecture Model (TAM).................................................................................................. 18
4.4
Patterns ........................................................................................................................................ 18
Appendix A – Basic Concepts for Architectural Description ........................................................................ 19
Appendix B – Archimate Diagram Notation ................................................................................................. 20
Appendix C – Standard Agenda for Architecture Compliance Review ........................................................ 21
Figures
Figure 1 Enterprise Architecture ....................................................................................................................................... 4
Figure 2 Architecture Process ........................................................................................................................................... 7
Figure 3 Enterprise Architecture Principles ...................................................................................................................... 9
Figure 4 Process Comparison ......................................................................................................................................... 13
Figure 5 Verification Diagram ........................................................................................................................................ 15
Figure 6 Relationships between Models ......................................................................................................................... 16
Figure 7 TOGAF Technical Reference Model................................................................................................................ 16
Figure 8 Basic Ontology for Systems Architecture ........................................................................................................ 19
Figure 9 Archimate Diagram Key ................................................................................................................................... 20
IT Services / Document1 / ISSUED / v 2.0
Page 2 of 21
OPEN
Enterprise Architecture Framework
1 Executive Summary
This document proposes an Enterprise Architecture Framework consisting of a methodology, a conceptual framework
and a process that will build on the foundations laid down in the University’s IT Strategy. The advantages of this
approach are:
 Close alignment of technology utilisation with the needs of the business.
 The establishment of a rational basis for technical decision making.
The conceptual framework and methodology are based on The Open Group Architecture Framework (TOGAF)
version 9 and use the semantic model for systems architecture defined in IEEE 1471-2000 standard ‘Recommended
Practice for Software-Intensive Systems’ and the INCOSE Systems Engineering Handbook.
The Architecture Process provides for the creation of a vision and for the development of an architecture vision that
realises the IT Strategy. The vision will include business, application, data and technology architecture layers
followed by migration planning, implementation governance and change management that works in conjunction with
the Prince II project management process defined in the University’s Project Management handbook. The
Architecture Process emphasises requirements management at every stage and includes governance via existing
oversight bodies overseen by the IT Strategic Planning Group.
A repository will be created that will contain architecture models, standards, policies, procedures, guidelines and road
maps. Though initially made available as a web site or shared folder, the repository will be hosted on the University’s
chosen collaboration and content management system and will make extensive use of collaboration tools such as wiki,
bulletin boards etc.
All projects will be required to complete an Architecture Compliance Form (ACF), or Architecture Description (AD
for major projects and programmes), early in the project lifecycle whose purpose is to ensure alignment with the IT
Strategy. The ACF documents how the project will conform to the Architecture Principles and Requirements.
New emphasis will be placed on non-functional requirements and on the obligation to demonstrate compliance
through operational testing.
Toward the end of the Implementation Phase of a project, an Architecture Compliance Review will be held to verify
that the project has delivered according to the agreed architecture. Significant deviation, or failure to complete
operational testing, will result in the raising of new project risks and issues in the appropriate logs for the attention of
the Project Board. Unresolved concerns, such as major security vulnerabilities, may delay the launch of a system.
The Enterprise Architecture Framework will deliver the following benefits:
 Alignment of projects and technology selection with the IT Strategy
 Increased agility through greater flexibility, standardisation and rationalisation
 Economies of scale through standardisation and focus on total cost of ownership.
IT Services / Document1 / ISSUED / v 2.0
Page 3 of 21
OPEN
Enterprise Architecture Framework
2 Introduction
2.1 Revision History
Issue
1.0
2.0
Author
David Deighton
David Deighton
Issue Status
Issue 1
Revised and updated
Date
17/09/11
22/06/12
2.2 Background
Enterprise Architecture (EA) is a discipline that defines and maintains the architecture models, governance and
transition initiatives needed to effectively co-ordinate disparate groups towards common business and IT goals. It
translates business vision and strategy into effective enterprise change by creating, communicating and improving the
key requirements, principles and models that describe the enterprise's future state and enable its evolution. The scope
of the enterprise architecture includes: the people, processes, information and technology of the enterprise, and their
relationships to one another and to the external environment.
Figure 1 Enterprise Architecture
There is no shortage of EA frameworks in the IT industry, Zachman was the first to formalize the concept and publish
a framework. Since then, many other EA frameworks have been published and are used by many organisations like:
 FEAF – US Federal Enterprise Architecture Framework
 DoDAF/MoDAF – US Department of Defence / Ministry of Defence Architecture Framework
 TOGAF – The Open Group Architecture Framework
 IAF – Capgemini Integrated Architecture Framework
The adoption of an architecture driven approach and architecture group was identified as one of the enablers needed to
realise the University’s IT Strategy.
2.3 Scope
This document presents an enterprise architecture framework for the University – the ‘Birmingham Enterprise
Architecture Framework’ – based on TOGAF version 9. However the focus is not on frameworks but on delivering
business value and on standards and artefacts that contribute directly to it.
IT Services / Document1 / ISSUED / v 2.0
Page 4 of 21
OPEN
Enterprise Architecture Framework
The orientation of the University’s EA programme is toward the future state, or ‘vision’, and ways of realising it
through coordinated IT and business projects while allowing for future growth and change in response to the needs of
the University.
2.4 Purpose
This document represents a starting point for the introduction of an Enterprise Architecture based approach. It is
intended to show how the IT Strategy flows down into the enterprise architecture and how enterprise architecture will
contribute to the realisation of the IT Strategy.
2.5 Glossary
Term
ACF
ADM
EA
EAF
IEC
IEEE
INCOSE
ISO
ITS
MTBF
NFR
PID
SIB
SOA
TAM
TOGAF
TRM
XML
Description
Architecture Compliance Form.
Architecture Development Method – TOGAF.
Enterprise Architecture.
Enterprise Architecture Framework
International Electrotechnical Commission.
Institute of Electrical and Electronics Engineers, IEEE Standards Association
International Council on Systems Engineering.
International Standards Organisation.
IT Services department.
Mean Time Between Failures.
Non-functional requirement(s).
Project Initiation Document.
Standards Information Base – TOGAF.
Service Oriented Architecture
Target Architecture Model.
The Open Group Architecture Framework.
Technical Reference Model – TOGAF.
Extensible Markup Language.
2.6 References
Reference
IT Strategy
INCOSE Systems Engineering
Handbook
Architecture Principles
Archimate
Document
IT Strategy 2010-2015 v1.13 2011
INCOSE Systems Engineering Handbook v3.2.1 2011
Enterprise Architecture Principles v0.1 2011
Archimate 1.0 Specification – The Open Group 2009
IT Services / Document1 / ISSUED / v 2.0
Page 5 of 21
OPEN
Enterprise Architecture Framework
2.7 Time Line
The EAF management structures, process and artefacts will be introduced gradually as part of the ongoing IT Strategy
communication and realisation process:
1. August/September 2011 – communication of the framework within IT Services and the issue of Architecture
Principles and Standards for internal review. At the end of the review process, these artefacts will be formally
adopted and published via the repository.
2. October 2011 – creation of Architecture Compliance Forms for new projects from a date to be determined and
the start of the Implementation Governance.
3. October 2011 – go live with the EA framework and processes.
4. October 2012 – review and revise as necessary.
IT Services / Document1 / ISSUED / v 2.0
Page 6 of 21
OPEN
Enterprise Architecture Framework
3 Enterprise Architecture Framework
3.1 Architecture Process
The following diagram illustrates the architecture process, based on the TOGAF Architecture Development Method
(ADM), the activities within it and the major inputs and outputs:
Figure 2 Architecture Process1
Business
Process
Define application architecture including services, major functions, components
and interfaces and show how these map to the Business Architecture. Develop
logical data models and map to the information models in the Business
Architecture.
Business
Architecture
Compliance Review Process
A critical stage in Implementation Governance consists of a formal Architecture
Compliance Review to be held toward the end of the Implementation Phase of a
project. The principal input to the review will be the Architecture Compliance
Form or Architecture Description.
Application
Architecture
Architecture
Principles
Representation Enterprise Architecture Principles based on the IT Strategy and industry best
practice. The principles apply to all IT projects and architecture-related work.
Architecture
Process
Business
Process
Architecture Vision Business
Process
1
Generic architecture process based on TOGAF 9
Set the scope, constraints and expectations for a project or initiative. Create the
architecture vision, based on the Architecture Principles, which realises the IT
Strategy, aspirations and needs of the University. Initiated by a Request for
architecture work or via completion of a previous iteration, this activity begins
an iteration of the architecture development cycle. For projects, this usually
See Appendix B – Archimate Diagram Notation for key to diagram symbols.
IT Services / Document1 / ISSUED / v 2.0
Page 7 of 21
OPEN
Enterprise Architecture Framework
begins in the project Start Up phase and continues into the project Initiation
phase with the delivery of the Architecture Compliance Form (ACF) that
summarises the proposed solution. Development of the vision usually involves a
rapid iteration through high-level business, application and technology
architecture activities and results in one or more architecture models to be added
to the repository.
Business
Architecture
Business
Process
Elaborate business architecture based on the identified business processes,
stakeholders, services and capabilities. The principal technique will be Business
capability Modelling (BCM) used in combination with business process models
(using Triaster Process Navigator). Develop high-level information models that
reflect the underlying enterprise-level informational structures and entities.
Change
Management
Business
Process
Changes to the architecture should be managed in the same way as any other
system or infrastructure change – using the established IT Services change
control mechanisms and subject to approval by the Change Board. Architecture
Change Management is part of the ITIL Change Management process.
Enterprise
Architecture
Framework
Representation The overarching Enterprise Architecture document that describes the structure
and scope of the Enterprise Architecture programme at the University.
Implementation
Assurance
Business
Process
The Architects will provide ongoing guidance and governance throughout the
implementation phase of a project or programme. The basis for governance
activities will be the Architectural Principles, Standards and Reference Models
that constitute the architecture framework and the compliance of projects as
documented in the project Architecture Compliance Form (ACF).
IT Strategy
Business
Object
University IT Strategy
ITIL Change
Management
Business
Process
Migration Planning Business
Process
Analyse cost, benefits and risk. Develop detailed implementation and migration
plan. The architects will support the project team as necessary.
Opportunities and Business
Process
Solutions
Perform implementation planning and identify delivery vehicles for the building
blocks derived from the preceding phases.
Preliminary
Business
Process
Prepare the organisation to undertake successful architecture projects through
the introduction of an architecture framework and process based on the
University’s approved IT Strategy. This activity includes the creation of a set of
Architecture Principles and the setting-up of a shared architecture repository.
Requirements
Management
Business
Process
The process is based on requirements management. Requirements are identified,
stored and input to all activities in the architecture process. This activity is of
fundamental importance and needs a rigorous approach, preferably tool-based.
Specific and testable non-functional requirements must be defined for every
system. These constitute design objectives and effectively determine the type of
system that will be delivered.
Technical
Standards
Business
Object
Standards Information Base (SIB) containing technical and related standards.
Technology
Architecture
Business
Process
Define the infrastructure including computing platforms, storage, networks,
operating system, middleware, database systems, other system software and
deployable artefacts. Map them to the Application architecture to show how the
components, data stores and so-on will be realised. This layer of architecture
also encompasses the physical data models and XML schemas that are directly
implemented though these will normally be created by the project team
IT Services / Document1 / ISSUED / v 2.0
Page 8 of 21
OPEN
Enterprise Architecture Framework
3.2 Governance
Enterprise Architecture governance is performed via the three IT Services governance bodies – Information Security
Steering Group (ISSG), Business Systems Steering Group (BSSG) and IT Infrastructure Group (ITIG) under the
overall purview of the IT Strategy Planning Group.
3.3 Architecture Principles
The principles constitute a basic reference point for every IT project and initiative and are drivers for architecture
governance. Each new project will be expected to explain how they will conform to the principles and where not, why
not. Conformity with the principles will be evaluated before a new application or product is launched and may result
in new risks or issues being raised.
Figure 3 Enterprise Architecture Principles
The principles have been allocated to IT Strategy themes and coloured according to where their main benefits lie.
Principle
Rationale
Business
BUS1
Promote Innovation
Innovate for competitive advantage and
productivity.
BUS2
Business Priority
Support and promote the University’s enterprise
vision, business strategies and plans.
BUS3
Optimise Benefit
Maximize the overall benefit to the University by
balancing business and technology factors.
BUS4
Partnership
Every IT investment will have a business owner
and an IT steward
Helps realise competitive advantage and drives
improvements in efficiency and productivity.
Architecture gives most benefit when closely aligned with
business strategy and goals.
The optimal solution for a given project may not yield the
highest overall benefit for the University as a whole.
Business and IT must work cooperatively to realise the
benefits of IT investments.
IT Services / Document1 / ISSUED / v 2.0
Page 9 of 21
OPEN
Enterprise Architecture Framework
BUS5
Principle
Deliver Information via Multiple Channels
Make information available over multiple
channels such as personal or laptop computers,
smart phones, tablet computers and other devices.
Rationale
Allows the University to work smarter and improves
general productivity.
Information
INF1
Business Authority
Ensure there is a designated business owner for
all business information with authority over its
creation, change, access and deletion.
INF2
Ensure Data Integrity
Capture business data once at the point of creation
and manage it actively throughout its life cycle up
to and including eventual disposal.
INF3
Treat Data as an Asset
Organize and manage data to maximise its value
to the University.
INF4
Classify Data
Apply a coherent classification scheme and
manage data accordingly.
INF5
Promote Data Independence
Decouple data from applications and, where
feasible, make it available over standardised
interfaces.
Those with the most knowledge of the data have the best
chance of and most interest in getting it right. Integrity is
improved and maintenance is simplified.
Promotes the accuracy and consistency of data and the
efficiency of data management processes.
Organizing and managing the key data assets of the
University drive the business processes needed to run the
enterprise.
Different classes of data need to be managed, stored,
protected and disposed of appropriately. The classification
scheme should be fine-grained enough to deliver tangible
benefits.
Insulating consumers of enterprise data from its structure
and origin reduces complexity and lowers the maintenance
overhead of changes.
Application
APP1
Focus on Services
Prefer loosely-coupled, modular components that
implement services.
APP2
Maximise Reuse
Design and implement reusable components.
APP3
Rationalise and Simplify
Eliminate duplication and reduce complexity.
APP4
Use Proven and Manageable Components
Select market-leading products and reuse proven
bespoke components where appropriate
Resilience, flexibility, performance and scalability are
improved by minimising interdependencies.
Reduces development costs and time; leverages investments
in existing systems and improves the ability to adapt to
changing requirements.
Lowers costs through economies of scale and reduces
overhead of managing complexity.
Reduces risk and frees-up development resources to focus
on areas where competitive advantage is available.
Service Oriented Architecture (SOA)
Applies to SOA with appropriate middleware and infrastructure; embodies good practice for application component design.
SOA1
Design for Reuse
Define services that are internally consistent, selfcontained and independent from other services.
SOA2
Assemble with Other Services
Design ‘plug and play’ services that are useful to
the largest number of potential consumers.
SOA3
Design for Interoperability
Provides the largest unit of functionality that may be useful
in different contexts.
Services may be assembled to create new services and
applications – sometimes in unforeseen ways.
Permits reuse across different environments.
Use common standards for the exposure and use
of services.
SOA4
Design for Understandability
Ensure the service is comprehensible in its own
right without reference to other services.
SOA5
Hide Internal Details
Potential consumers are more like to use a service if it
performs a clearly defined and understandable function.
Avoids implicit dependencies in service consumers and
Design interfaces separately from the service
IT Services / Document1 / ISSUED / v 2.0
Page 10 of 21
OPEN
Enterprise Architecture Framework
Principle
implementation – both functionality and data.
SOA6
Keep Error Conditions Private
Discreetly inform consumers of business error
conditions. Ensure services always maintain data
integrity. Keep error conditions within the
service.
SOA7
Address a Distinct Problem
Rationale
cooperating services.
Limits the direct impact of errors and decouples the service
consumers; thus avoiding the ‘cascading errors’ syndrome.
Ensures that the service is self-contained and independent.
Restrict the scope of the service to a distinct and
well-defined problem domain.
Security
SEC1
Accountability
All user and system interactions and access to
information must be attributable to authenticated
(reliably identified) people, organisations or
systems.
SEC2
Least Privilege
When allowing access to a resource, assign the
minimum necessary privileges to complete the job
in hand.
SEC3
Defend in Depth
Do not rely on a single control but erect a
succession of barriers that an intruder must
overcome before gaining access.
SEC4
Assume Insecure Communications
Data is vulnerable while in transit and must be
adequately protected to preserve its
confidentiality, integrity and availability..
SEC5
No Security by Obscurity
Security must be designed-in and not rely on
hiding information.
SEC6
Transparency
Controls should not impair the ability of the
University to function or unnecessarily restrict the
availability of information.
The University must maintain traceability and nonrepudiation of responsibility for access and changes for
legal and moral reasons.
Reduce the possibility that users or systems will abuse the
privileges granted them to make unforeseen changes or gain
unauthorised access.
No single security mechanism can be guaranteed
unbreakable, therefore good practice is to implement
multiple overlapping controls where feasible.
Internal networks should be considered hostile
environments for data and mitigated by authentication,
encryption and other controls.
Security should not be compromised by the release of
network diagrams, system specifications or CMDB
information.
Security controls should promote the availability of
information subject to protection of its confidentiality and
integrity.
Environment / Green IT
ENV1
Virtualise Infrastructure
Remove the dependencies that link systems to
specific hardware devices – includes server
virtualisation, network addressing etc.
ENV2
Promote Thin Client
Prefer web-browser based applications that do not
rely on specific components or applications that
must be deployed to the user work station.
ENV3
Apply Capacity Planning
Ensure infrastructure is sized appropriately to
meet the non-functional requirements and allow
for predictable growth. Do not over-specify.
Virtualisation promotes flexibility, allows more efficient
use of hardware resources and reduces energy consumption.
Browser-based applications are easier to deploy and
manage. Thin client reduces the need for client-side
hardware resources.
Oversized infrastructure wastes money and increases
energy consumption.
Technology
TEC1
Adopt and Enforce Standards
Formally adopt technical standards and select
preferred products. Non-compliance needs to be
justified and explained.
Standardisation helps achieve economies of scale, reduces
complexity and improves flexibility.
IT Services / Document1 / ISSUED / v 2.0
Page 11 of 21
OPEN
Enterprise Architecture Framework
TEC2
Principle
Monitor Services and Infrastructure
Deploy automatic monitoring tools that cover
application and data services as well as the
underlying infrastructure.
TEC3
Tiered Architecture
Separate concerns through tiered architecture.
TEC4
Plan for System Life Cycle
Consider complete life cycle through Retirement.
Rationale
Reduce down time and the unavailability of services due to
failures or exceptions – hardware and software.
Improves security, scalability, resilience and promotes more
efficient platform utilisation.
Total cost of ownership should include the impact of
Retirement or Closedown and allow for any intervening
upgrades and changes.
IT Services / Document1 / ISSUED / v 2.0
Page 12 of 21
OPEN
Enterprise Architecture Framework
3.4 Process Comparison
The Architecture Process covers architecture work at the enterprise level as well as at the project or solution level. The following diagram maps it to the Prince II Project
Management Process, the ISO/IEC 15288 standard for Systems Lifecycle Processes and ITIL Version 3.
Figure 4 Process Comparison1
While the project life cycle, of course, ends with system go-live, the other processes shown in the diagram must continue for the entire life cycle of the system. ISO/TEC
15288 is a generic system life cycle model used in many industries and is not limited to IT. It provides explicitly for system Retirement which is covered by Architecture
Change Management (TOGAF) and Service Operation (ITIL).
TOGAF and ITIL also cover the initial strategy phase while ISO 15288 is repeated for every system.
IT Services / Document1 / ISSUED / v 2.0
Page 13 of 21
OPEN
Enterprise Architecture Framework
3.5 Design Objectives
Architecturally significant requirements mainly fall into the non-functional category but may also include functional
requirements in some cases. Non-functional requirements for systems should be based on the following design
objectives:
Objective
Definition
Measurement
L = latency – response time
The speed at which the system performs a function
J = jitter - % variation in L
that meets business requirements and user
Performance
H = headroom - % available spare
expectations.
capacity.
SF = scalability factor in the range 0..1
– ratio of total load capacity and
available hardware resources.
The ability of the system to handle increasing or
decreasing volumes of transactions, services and
Scalability
SL = scalability limit – the maximum
data.
loading capacity of the system that is
inherent in, or a consequence of, its
design.
The readiness of the system to perform its functions % of target availability e.g. 99.98% of
Availability
when needed in spite of errors and exceptions.
24 x 7 and / or MTBF.
The ability of the system to fit smoothly into its
High – Medium – Low
Operability
environment and behave predictably.
Users’ perceptions of an application’s usefulness,
usability, and desirability based on the sum of all
High – Medium – Low
Usability
direct and indirect interactions.
The ability to control, or prevent, unauthorised
High – Medium – Low
Security
access to information.
Degree of conformity with laws and regulations.
High – Medium – Low
Regulation
Ease of change to meet changing business
High – Medium – Low
Flexibility
requirements.
The ability of the organisation to deliver the system
subject to constraints of available expertise,
High – Medium – Low
Feasibility
technology, time and resources.
3.6 Architecture Compliance Review
The Architects will be responsible for architectural governance throughout the project life cycle and will organise a
formal Architecture Compliance Review (ACR) meeting toward the end of the Implementation phase of a project –
preferably when the results of the operational testing are known.
The purpose of the ACR is to verify that the project has not deviated from the agreed architecture described in the
SAD and that the system is fit for purpose, conforms to standards and adheres to the Architectural Principles.
Compliance Reviews will be based on a standard agenda and standard terms of reference, which will be published in
the Architecture Repository. The attendees should include:
1. Chief Architect / Security Manager – organises and chairs the meeting and is responsible for the minutes.
2. Quality Manager – or nominated representative.
3. Technical Lead – for the project (can be more than one person) and/or
4. Project Manager – if appropriate.
5. Experts – from within IT services (e.g. infrastructure or development specialist) as appropriate to the project.
Preferably from outside the project team.
The Architect will prepare a slide pack and circulate it to the attendees in advance of the meeting, together with any
supporting documentation including the ACF. If the meeting runs out of time to cover the full agenda, a follow-up
meeting will be scheduled.
IT Services / Document1 / ISSUED / v 2.0
Page 14 of 21
OPEN
Enterprise Architecture Framework
After the meeting, minutes will be circulated to the attendees to give them the opportunity to correct any errors or
misunderstandings. The minutes will include the results of the meeting:
1. Recommendation – to proceed or stop.
2. Risks and Issues – to be recorded in the project Risk Log and Issues Log. These will need to be raised to the
ITPCG and may cause delay to the system go-live date or result in an agreed work-off list of actions to be
completed before the project can be officially closed. Important issues such as major security vulnerabilities
may prevent the system from going live at all.
3.7 Operational Testing
Successful completion of operational testing is a requirement for conducting an Architecture Compliance Review. If
lacking then the Architects should update the project risk or issues log to the effect that the system may not meet its
operating criteria, and this should also be reflected in the ACR minutes.
If possible, operational testing should take place directly in the live environment, or in a controlled environment that
closely resembles it. If the testing environment is not full-sized, then it should be appropriately sized so that the
results can be extrapolated by applying a simple multiplier (however threshold effects may invalidate this approach in
some cases). Server virtualisation will make the process of testing in the live environment easier by providing the
ability to dynamically relocate and duplicate (clone) virtual machines.
Figure 5 Verification Diagram1
3.8 Architecture Team
The Architects within IT Services are primarily responsible for the enterprise architecture of the University and for
managing the Architecture Process (Figure 2 Architecture Process). There will eventually be a team of architects,
including the following roles:
1. Chief Enterprise Architect - enterprise architecture vision, business, application and technology; architecture
management; information security.
2. Information Architect – enterprise information modelling, ontology, classification, perception.
3. Data Architect – enterprise and application data modelling, data management and utilisation.
4. Solution Architects – solution design over multiple architecture domains.
IT Services / Document1 / ISSUED / v 2.0
Page 15 of 21
OPEN
Enterprise Architecture Framework
4 Reference Models
Figure 6 Relationships between Models1
4.1 Technical Reference Model (TRM)
The purpose of the TRM is to be a classification scheme for standards, selected products and components The
following diagram shows the default TRM from TOGAF but it is likely that this will expand and change to fit the
needs of the University.
Figure 7 TOGAF Technical Reference Model
4.2 Standards Information Base (SIB)
A Standards Information Base (SIB) will be established that lists the industry standards, products and components that
have been selected and approved for use by IT Services. The SIB will be a part of the Architecture Repository that is
published to the University as a whole.
A formal standards approval process will be implemented in IT Services.
The SIB will be organised into categories based on the Technical Reference Model (TRM), described in section 4.1.
The following example shows entries from a typical SIB implementation.
IT Services / Document1 / ISSUED / v 2.0
Page 16 of 21
OPEN
Enterprise Architecture Framework
Standard
Description
REST
Proposed: 2011
Representional State Transfer
REST-style architectures consist of clients and servers. Clients
initiate requests to servers; servers process requests and return
appropriate responses. Requests and responses are built around the
transfer of representations of resources. A resource can be
essentially any coherent and meaningful concept that may be
addressed. A representation of a resource is typically a document
that captures the current or intended state of a resource.
The client begins sending requests when it is ready to make the
transition to a new state. While one or more requests are
outstanding, the client is considered to be in transition. The
representation of each application state contains links that may be
used next time the client chooses to initiate a new state transition
SOAP
Proposed: 2011
Simple Object Access Protocol
SOAP, originally defined as Simple Object Access Protocol, is a
protocol specification for exchanging structured information in the
implementation of Web Services in computer networks. It relies
on Extensible Markup Language (XML) for its message format,
and usually relies on other Application Layer protocols, most
notably Hypertext Transfer Protocol (HTTP) and Simple Mail
Transfer Protocol (SMTP), for message negotiation and
transmission. SOAP can form the foundation layer of a web
services protocol stack, providing a basic messaging framework
upon which web services can be built. Usually considered an
alternative to REST, but may be used for different parts of the
same architecture.
Version
Usage
References
N/A
Web Services
https://www.ibm.com/developerworks/we
bservices/library/ws-restful/
N/A
Web Services
IT Services / Document1 / ISSUED / v 2.0
Page 17 of 21
OPEN
Enterprise Architecture Framework
4.3 Target Architecture Model (TAM)
The TAM will show the preferred ‘to be’ architecture for the University. It will show not only technology choices but
also the full panoply of application functionality, components and data stores mapped to the University’s business
processes and enterprise information model. The TAM will show traceability from the business needs through the
architectural layers.
4.4 Patterns
An ongoing activity of the Architects will be to document architectural patterns of various kinds and publish them in
the Architecture Repository so that they can be reused in the future. Many patterns already exist and only need
collecting together.
Patterns represent high-level reuse as opposed to low-level reuse in the form of directly reusable components.
Types of patterns:
1) Business Services and Collaborations – combining business processes, business services, collaborations and
products.
2) Information and Data – common patterns in data models and in the management and organisation of data.
3) Application – common application design structures and relationships such as layering, web presentation,
concurrency, distributed components.
4) Technology – common software stacks, hardware, standard builds, architectural tiering etc.
5) Process – reusable processes and activity definitions.
IT Services / Document1 / ISSUED / v 2.0
Page 18 of 21
OPEN
Enterprise Architecture Framework
Appendix A – Basic Concepts for Architectural Description
Figure 8 Basic Ontology for Systems Architecture1
Architectural Description
Architecture
Concern
Environment
Library Viewpoint
Mission
Model
Rationale
Stakeholder
System
View
Viewpoint
A collection of artefacts that document the architecture of a system.
The organisation of a System in terms of components, their relationships to each other
and the environment.
Stakeholders’ interest in the development, operation or key characteristic such as
performance, reliability, security etc.
The environment, or context, of the system including the business and technical
aspects.
A reusable template for a Viewpoint that is stored in a library or repository.
The purpose of the system, such as the realisation of a defined service.
A diagram or other type of model that constitutes or is part of a View.
The justification, or reasoning behind, the Architecture, from the Architectural
Description.
A person who has a key role in, or Concerns about, a System.
A collection of components organised to accomplish the defined Mission. The term is
recursive and may also refer to a component or a ‘system of systems’.
A representation of a System from the perspective of a related set of Concerns.
The perspective from which a View is taken, the template for a View.
IT Services / Document1 / ISSUED / v 2.0
Page 19 of 21
OPEN
Enterprise Architecture Framework
Appendix B – Archimate Diagram Notation
Figure 9 Archimate Diagram Key
IT Services / Document1 / ISSUED / v 2.0
Page 20 of 21
OPEN
Enterprise Architecture Framework
Appendix C – Standard Agenda for Architecture Compliance Review
Introduction
General welcome and terms of reference for the meeting.
Project Summary
A description of the changes implemented by this project.
Architecture
Walk through the Architecture Compliance Form (ACF) or Architecture Description, including:
 Mission or purpose of the system.
 Architecture Principles – relevance and how realised.
 System Quality Attributes / Design Objectives.
 Data Utilisation – CRUD matrix.
 Interfaces.
 Security Architecture.
 Technology Stack.
 Environments
 Road Map.
Road Map
The time line for implementation and launch with any dependencies on other projects, infrastructure or business
events.
Concerns
Architectural, security or other concerns that may spawn risks, issues and remedial work.
Exceptions
Documented exceptions to the Principles, Standards etc.
Questions
Discussion and Q & A.
Decisions
Recommendation to proceed or not with any agreements on remedial work or other actions to be taken before or
after the launch. Risks and issues to be added to the project registers.
 Architecture sign-off.
 Security sign-off.
IT Services / Document1 / ISSUED / v 2.0
Page 21 of 21
Download