Bridging the Digital Divide with Net-Centric Tactical Services
|
|
- Asher Stokes
- 8 years ago
- Views:
Transcription
1 Bridging the Digital Divide with Net-Centric Tactical Services Authors: Scott D. Crane, Charles Campbell, Laura Scannell Affiliation: Booz Allen Hamilton 1. Abstract The DoD Net-Centric Data Strategy (May 2003) goals are to make data assets visible, accessible, and understandable [1]. This strategy establishes a Service Oriented Architecture (SOA) approach as the preferred means by which data producers and capability providers can make their data assets and capabilities discoverable on the Global Information Grid (GIG). Likewise, the strategy establishes an SOA approach as the preferred means by which consumers can access these data assets and capabilities. Programs such as the Defense Information Systems Agency s (DISA s) Net-Centric Enterprise Services (NCES) are providing SOA-based infrastructure services to enable information sharing across the Department of Defense (DoD) [2]. The technologies employed in an SOA environment for exchanging data including Extensible Markup Language (XML) and Web Services are conducive for use in fixed environments that have reliable, high bandwidth TCP/IP networks. However, in a tactical environment where communications may be intermittent and bandwidth is limited, this presents problems. In order for data producers and consumers on a tactical network to leverage the capabilities available on the GIG, a framework is needed that will extend the power of enterprise services to users on low bandwidth networks at the tactical edge. This will allow the vision of the Net-Centric Data Strategy to provide value to users at all levels. Net-Centric Tactical Services (NCTS) provides a gateway and software framework for tactical users to realize the benefits of information sharing across an SOA environment. The framework resides in the tactical environment and supports a set of services and functions to enable communications and messaging translation, data publishing, data subscription, and tactical device management. It is an attempt to bridge the present day technology gap between low bandwidth and high bandwidth data producers and consumers. 2. Context Information and functional capabilities provided as services by NCES and similar programs will change the way the DoD fights wars and conducts its business. NCES will help change the ways in which people operating on the GIG execute their missions as well as execute their tasks. NCES offers a collection of capabilities that support Net-Centric development. The Core Enterprise Services that compose NCES will enable synchronous communication and asynchronous file sharing among people throughout the network, provide an infrastructure for optimizing the delivery of web-based information and applications over the GIG, provide web services and websites for performing searches across NCES registered data sources, provide the ability to monitor and manage current NCES web services, provide web services for reliably sending small messages between applications, provide web services that facilitate creating and executing XML transformations, allow searching and registering of metadata information, perform certificate validation and access control decisions, and also provide services that find people and devices in an enterprise-wide white pages directory [2]. Moreover, the GIG is a network of networks which links hundreds of information system elements to enable the rapid exchange of information among the U.S. military services, the Intelligence Community (IC), and multinational allies. The GIG is a globally connected, end-to-end set of information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand. These capabilities will rely on standards and technologies that will significantly increase the amount of data transmitted over tactical networks that current legacy systems will be unable to support [3]. One critical issue will be the amount of non-compatible radio systems, waveforms, and networking protocols currently in use. Another major challenge in this environment is the lack of readily available bandwidth. In an office, workstations are 1
2 supported with various Local Area Networks (LANs) (e.g., Ethernet) that connect to the Internet through high speed connections and thus data rates are not a major concern. However, in the mobile tactical environment, communications require mobile wireless connections. Current military combat radios, such as Single Channel Ground and Airborne Radio System (SINCGARS), provide only limited data rates on the order of dial-up connections which provide much less bandwidth than in today's office environment [5]. This results in a very limiting environment when developing for a tactical environment and thus a framework is needed to leverage the benefits of NCES at the tactical edge. The tactical network consists of communication nodes that provide direct connectivity for users executing tactical missions. If the tactical user is to take advantage of GIG NCES Core Services (i.e. discovery of data assets, security), they must do so within the constraints of their disadvantaged networks and cannot afford the network overhead assumed by the enabling technologies of these services. Net- Centric Tactical Services (NCTS) will provide the ability to reach back from the tactical edge into services that are provided to the GIG by NCES. 3. Integration Challenge What is important in this discussion is not whether one approach to delivering services is right or wrong but what approach is supportable given the constraints Figure 1. Integration challenge of the supporting command and control application and communications network infrastructure. Today, and into the foreseeable future the digital divide is real and developing an integrated capability to share information across the divide requires different technologies to meet the common goal of providing relevant, timely data to the end user. Army Transformation to a brigade-centric Modular Force coupled with the fielding of the Joint Network Node (JNN) and Command Post Node (CPN) has set the conditions to support a strategy to bridge the digital divide which is not available to the current force. The JNN/CPN has brought wide band access to the GIG down to the Brigade and Battalion levels [4]. It is at the brigade and battalion levels where the junction of tactical networks and operational networks now takes place (see Figure 1) - exactly the right place for the implementation of a technical bridging strategy. At the strategic and operational level, where access to reliable wideband global networks is assured, the following network planning factors are common: Unconstrained bandwidth (capacities greater than 10Mbps) A stable communications infrastructure The ability to pass large amounts of data in a timely manner The ability to discover and share data across disparate systems without developing new interfaces 2
3 The ability to employ extensible, scalable and flexible standards to allow new systems to come on-line and integrate easily In light of these factors, Service Oriented Architectures (web services) and NCES core services provide an excellent opportunity to share data between unlimited numbers of decoupled systems and therefore provide an architecture conducive to operating within this environment based on the five factors given above. They also provide a mechanism for bringing new systems on-line easily, exposing new functionality and data assets for use by existing systems without requiring any direct knowledge or interface change to interact with the new system. These enabling technologies are known as NCES which are based on standard Extensible Markup Language (XML) technologies. Using XML as the basis for the message exchange format for this environment is advantageous because its extensible nature allows new data assets to be easily defined and implemented. At the tactical level, where mobility and ad hoc, line of sight networks are the norm, the following network realities are in play: Networks constrained by low bandwidth (less than 10 kbps) Networks are ad hoc, unstable, and dynamic Only need the relevant data for their purpose, mission and Area of Responsibility (AOR) Have well defined information needs Have an absolute need to receive actionable information in a timely manner that has immediate relevancy and accuracy. Tactical operators typically function over lowbandwidth, line of sight, vehicular mounted network connections. Communications are often intermittent and the devices are smaller mobile systems with limited power, which operate in restricted terrain with limited range. This all adds up to the inability to process excessive amounts of data or handle multiple requests for information from a large number of consumers because of bandwidth constraints and the overhead associated with typical Net-Centric IP technologies. Thus, on the tactical side of the digital divide, it is necessary to continue to employ more traditional network and messaging protocols which work reasonably well in the poor network conditions of the tactical force. For instance, a binary message format like Joint Variable Message Format (JVMF) is ideal given that this format is approximately times smaller than a full XML message. Further, network protocols such as MILSTD , unlike TCP/IP, are better suited to account for the unique constraints of combat radio nets. For the purposes of this white paper, the enabling technologies that support the execution side of the communication barrier are defined as Tactical Services. Net-Centricity is founded on the universal requirement for rapid access to critical essential information in a timely manner to support both battle planning and execution [1]. Traditional echelon boundaries have been blurred by DoD and Army Transformation. Unfortunately, network boundaries continue because of the inability of current force technology to adapt to ever changing and ever increasing demands for information. If the tactical user is to take advantage of GIG NCES Core Services (i.e. discovery of data assets, security), they must do so within the constraints of their disadvantaged networks and cannot afford the network overhead assumed by the enabling technologies of these services. There are technologies, however, that can bridge this gap between enterprise NCES and the tactical Core Service requirements. Net-Centric Tactical Services (NCTS) can provide this capability. 4. Tactical Services NCTS encapsulates several functions required in the tactical environment, exposed as tactical services to either the low bandwidth tactical interface of NCTS, or to the high bandwidth web-service interface of NCTS. These services allow data sharing between tactical devices and enterprise systems, particularly sensor, situational, and intelligence data. The tactical devices communicate with an NCTS server using their native messaging and communications protocols, such as JVMF over SINCGARS tactical radios. The NCTS server in turn communicates with the GIG using Web Service Definition Language (WSDL) and Extensible Markup Language (XML)/ Simple Object Access Protocol (SOAP). A sampling of tactical services are: Device Registration Service This service allows tactical devices to dynamically register with NCTS so that tactical data is accessible to enterprise systems. 3
4 Device Discovery Service This service allows discovery of tactical devices registered with NCTS. Report Publishing Service This service provides the ability for tactical devices to publish reports to the enterprise. Subscription Service This service provides a mechanism for tactical devices to subscribe to data, such as situational awareness data, on the enterprise. Disconnected Messaging Service This service maintains data subscription results for the tactical devices to support disconnected communication situation. Data Discovery Service This service allows enterprise systems to identify types of data available on the tactical networks through NCTS. 5. A Tactical Framework The architecture for NCTS is broken up into three major components which consist of the user interface components, business logic and data access components. 5.1 Business Logic Components Mediation Engine, the Device Manager, and the Subscription Manager. The Tactical Network Interface component of NCTS provides the communications gateway to send messages to or receive messages from tactical systems and sensors operating on low-bandwidth tactical radio networks. The Mediation Engine handles the translation of tactical messages into Extensible Markup Language (XML) which then can be consumed by or published to the GIG. The Device Manager handles registration of tactical devices that NCTS interfaces with and the Subscription Manager handles subscription requests Tactical Network Interface The Tactical Network Interface (TNI) component of NCTS provides a communications interface that reads messages originating from tactical devices operating on low-bandwidth tactical radio networks. This component interacts with the Device Manager in order to validate the data source based on registered tactical devices and interacts with the Mediation Engine in order to parse tactical messages and translate them into a standard exchange language such as XML. Conversely, the TNI is used to transmit data over the low-bandwidth network that has been retrieved from the GIG and translated into tactical messages. The Business Logic Components consist of four subcomponents. The Tactical Network Interface, the 4
5 Mobile Tactical Device Mobile Tactical Device Low Bandwidth Tactical Network NCTS Administrative User Interface Components Business Logic Components Tactical Network Mediation Device Subscription Interface Engine Manager Manager Data Access & Service Components Web Service Interface Device Tactical Registry Data Store Discovery Services Disconnected Message Queue Subscription Registry Publishing Services Subscription Services Enterprise Services Network Figure 2. NCTS framework Transmitting messages in a low bandwidth environment between tactical devices and NCTS calls for the use of a flexible, standardized, light weight messaging format. JVMF is one of the existing DoD message standards that may be leveraged initially to meet this criteria. JVMF is currently being utilized on existing tactical networks and is optimized for the low bandwidth environment. The benefits of a standard such as JVMF in a tactical environment include: Light-weight, binary military message format that supports restricted bandwidth networks Provides a scaleable, flexible standard Only passes the information required at the time it is sent, thereby preserving bandwidth Information can be selectively adapted to suit the operational situation of the moment Data fields can be selected or omitted from a message as required Ability to repeat certain fields in a message without sending another message Accommodates multiple data types Directed by the Army as the solution to the battlefield digitization interoperability problem Part of the Tactical Data Link (TDL) MIL standards The process for sending JVMF messages between tactical devices and NCTS involves embedding message objects, such as reports or Areas of Interest (AOIs), into text based message objects. These objects are then encoded as binary messages based on the JVMF specifications for transmission over lowbandwidth tactical radio networks. Once the NCTS TNI receives a JVMF message, it is passed to the NCTS Mediation Engine. This component parses the JVMF message, and the embedded data is placed into an object that can be acted upon by NCTS. While the focus of this discussion has been on leveraging JVMF, not all tactical devices currently utilize the JVMF standard. As a result, the TNI of NCTS has been designed to be scalable in order to accommodate other existing or emerging messaging formats. This component provides a great deal of 5
6 flexibility and scalability with the potential to support multiple tactical message standards and versions Device Manager Component The Device Manager (DM) component provides the ability to register tactical devices that NCTS interfaces with for authentication and data management purposes. This component provides two methods for registering tactical devices. The first is a manual registration process that may be accessed through the NCTS Administrative User Interface component in which devices are entered into NCTS manually, essentially creating a tactical device address book. This is required to support devices that cannot provide dynamic device registration and tactical networks that require a static, manually configured address or unit list. The DM also provides a registration capability that allows devices to register dynamically using a tactical message. In order to implement this dynamic registration capability Sensor Data Link (SDL) protocol is leveraged. Sensor Data Link (SDL) is an Army sensor communications standard, developed by Project Manager, Night Vision/Reconnaissance, Surveillance, and Target Acquisition (PM NV/RSTA) and their parent organization Program Executive Office, Intelligence, Electronic Warfare, and Sensors (POE IEW&S). It was developed to accommodate tactical sensors which typically function over low-bandwidth network connections where communications are often intermittent and the devices are often smaller mobile systems that may not have the power or ability to process excessive amounts of data or handle multiple requests for information from a large number of consumers. The SDL standard is designed for use in a joint, net-centric environment and is an extension of the low-bandwidth binary message specification JVMF. As such, it is a perfect candidate for the integration of device management with NCTS. The Device Manager also interacts with the TNI component to maintain the communications status of registered devices. It stores tactical messages in the Disconnected Message Queue when transmission to a tactical device fails Mediation Engine Message translation is a key tactical SOA foundation piece. The Mediation Engine is a subcomponent within the NCTS business logic layer. The Mediation Engine converts tactical messages received from the tactical network into XML messages and vice versa. Once this conversion has taken place, the Mediation Engine then determines the subscriber to publish the message to or whether a different action needs to be taken on the message such as registering or un-registering a tactical device. It interacts with the Device Manager to handle tactical device registration messages and interacts with the Subscription Manager to handle data request/subscription messages. The Mediation Engine leverages a workflow engine that determines how to process the metadata from parsed messages. In addition, the Mediation Engine utilizes the Web Service Interface to facilitate the exchange of information with other systems Subscription Manager The Subscription Manager component manages subscriptions to tactical data by enterprise systems and subscriptions to enterprise data by tactical devices. In the case where subscription services are not yet available on certain enterprise systems, this component performs a persistent query for information. The Subscription Manager interacts with the Web Service Interface to consume or subscribe to enterprise data. 5.2 Data Access Logic Components Data access components provide access to data sources such as databases or remote data sources accessed through Simple Object Access Protocol (SOAP) web services Web Service Interface Access to GIG capabilities necessitates the use of web services. A web service is a web-based application incorporating a collection of protocols and standards used for exchanging data between systems over an Internet Protocol backbone. Web services are platform independent meaning that any client application running on any operating system can be used to exploit their capabilities. NCTS leverages web services to publish and retrieve information from other systems operating on the GIG. The NCTS Mediation Engine interacts with the Web Service Interface. The Mediation Engine uses the Web Service Interface to discover services and sources of information, handle security, and interface with enterprise systems to publish or subscribe to enterprise services. In order to facilitate the exchange of information with these systems, the Mediation Engine 6
7 leverages web-service methods that provide data discovery functionality. The Web Service Interface leverages SOAP (Simple Object Access Protocol) to invoke these methods and transfers the XML data between a web-service provider and the web-service consumer (NCTS). XSL (extensible Stylesheet Language) is the language specification used to translate messages originating from one system to another format. XSD (XML Schema Definition), is the standard used to define the format of the XML data that is transmitted. The Web Services Interface leverages standard service oriented technologies to communicate with other systems. WSDL interfaces are used to describe the NCTS services. XSD s are used to describe the data, XML is used to tag data, and SOAP is used to transfer data. Each of the technologies is used in conjunction with one another to facilitate the mechanics of the service oriented architecture Disconnected Message Queue Communications reliability if one of the major hindrances to successfully implementing an SOA approach in the tactical environment. NCTS provides the ability to support message queuing for tactical devices that have lost connections or have disconnected with the network before the requested information was received. As tactical devices submit data requests to NCTS, NCTS takes these data requests and leverages NCES by retrieving the requested information and then provides this information back to NCTS. Once NCTS receives these responses, the data is aligned with the specific requesting device and data request. Next, if the tactical device is still connected to the network then the information is passed back to the device. However, if the device is not connected to NCTS, the Disconnected Message Queue stores the message and makes it available once the device is connected. The Disconnected Message Queue functions similarly to an service. User/Devices create or register accounts and can receive certain information. If logged off or disconnected from the network information continues to collect in a repository and the device can retrieve the information once it reconnects Device and Subscription Registry, Tactical Data Store Device management and data guarantee delivery can only be accomplished with appropriate device and data stores. The Device Registry stores information about devices that have been registered with NCTS. Particularly this registry holds information about what types of data is being made available for consumption by these devices and their last known communications statuses. As devices are registered and unregistered this information is stored and can be retrieved in order to discover which devices have been registered with NCTS. The Tactical Data Store holds the tactical data originating from the tactical environment. The tactical data is then made available to enterprise systems who have subscribed to the tactical data. The Subscription Registry is used by the Subscription Manager to track the subscriptions. 5.3 Administrative User Interface Components The Administrative User Interface Components have been architected in a layered approach which separates the User Interface (UI) logic from the business logic in order to accommodate changing UI needs. To help synchronize and orchestrate user interactions, separate user process components have been created. This way, the process flow and state management logic is not hard coded in the user interface elements themselves and the same user interaction engine can be scaled in order to accommodate multiple user interfaces. 5.4 Integrating Tactical Services The components listed above provide the basic foundation for the NCTS framework, and an overview of how NCTS handles the bridge/mediation capability between the low-bandwidth and high-bandwidth networks. This framework is intended to be scaleable to add additional service capabilities and functionality (tactical services) to enhance the capabilities of the warfighter and provide the enterprise with information from the tactical edge that has traditionally been unavailable in a SOA environment. Therefore, the specific tactical services that are deployed on an implementation of NCTS may vary, depending on the needs of the tactical environment. 6. Conclusion DISA s NCES initiative and the GIG Bandwidth Expansion (GIG-BE) have been developed by the DoD 7
8 to deliver unprecedented information superiority for operational forces over high bandwidth networks. However, these initiatives are derived from commercial industry standards which are based on Internet Protocol architectures that assume ubiquitous access to commercial quality wideband networks. There is a need within the DoD to adopt a set of standards and mediation services that will provide access to NCES from bandwidth constrained tactical networks that operate at the Army s Modular Force. This paper has introduced the concept of Net-Centric Tactical Services (NCTS) as a solution to this problem. NCTS is a framework for extending the concepts of NCES beyond the enterprise. NCTS solves the digital divide by extending the value of NCES to Army platforms and dismounted soldiers. NCTS recommends the continued use of VMF as a standard for data sharing for tactical applications. NCTS provides a bridge between the two disparate networks and NCTS technology is available now for immediate application to the Army s Modular Force Battle Command networks allowing low-bandwidth tactical users the ability to participate in the Net-Centric information sharing paradigm. focused on tactical system and sensor integration for the U.S. Army. Mr. Crane provides the U.S. Army with full lifecycle development of mobile systems and is working to provide solutions that bridge-the-gap between low-bandwidth tactical radio networks and enterprise SOA architectures. Laura Scannell has over 13 years experience developing tactical system solutions for the U.S. Army and other DoD clients. Currently, she is focused on providing the U.S. Army with full lifecycle development of mobile systems and is working to provide solutions that bridge-the-gap between lowbandwidth tactical radio networks and enterprise SOA architectures. Reference: 1. DoD CIO Memo: DoD Net-Centric Data Strategy, May NCES Developer Guide: ne=true. 3. DoD CIO, Department of Defense Global Information Grid Architectural Vision version 1.0, DoD, June Army CIO/G6 Campaign Plan, pdf. 5. Global Information Grid (GIG) Tactical Edge Networks (TEN) Navy SBIR Topic N Biographies: Scott Crane has over 11 years experience in system integration and software solution development for DoD and other government clients. Currently, he is 8
Service Oriented Architecture (SOA) for DoD
Service Oriented Architecture (SOA) for DoD Prof. Paul A. Strassmann January 9, 2008 1 Part 1 SOA Requirements 2 The DoD Challenge 3 Most DoD Projects Have Own Data Projects 07 Budget $ Millions Number
More informationDepartment of Defense Net-Centric Data Strategy
Department of Defense Net-Centric Data Strategy May 9, 2003 Prepared by: Department of Defense Chief Information Officer (CIO) TABLE OF CONTENTS 1. PURPOSE... 1 2. INTRODUCTION... 1 2.1 DOD DATA VISION...
More informationCommon Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003
Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise (GES) Mr. Rob Walker 24 September 2003 Common Operating Environment COE is mission-application independent - A basis for
More informationService-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
More informationDepartment of Defense Net-Centric Services Strategy
Department of Defense Net-Centric Services Strategy Strategy for a Net-Centric, Service Oriented DoD Enterprise March 2007 Prepared by the DoD CIO FOREWORD The Internet has facilitated an e-commerce explosion
More informationService Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
More informationGovernment's Adoption of SOA and SOA Examples
Government's Adoption of SOA and SOA Examples Presented by : Ajay Budhraja, Chief of Enterprise Services ME (Engg), MS (Management), PMP, CICM, CSM, ECM (Master) AIIM, ITIL-F Copyright 2008 Ajay Budhraja
More informationAir Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I s Integration Dr. Timothy D. Kehoe, Irene Chang, Dave Czulada, Howard Kong, Dr. Dino Konstantopoulos
More informationEmerging Technologies Shaping the Future of Data Warehouses & Business Intelligence
Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Service Oriented Architecture SOA and Web Services John O Brien President and Executive Architect Zukeran Technologies
More informationExposing Data as a Service in the Army Enterprise
Exposing as a Service in the Army Enterprise ABSTRACT DoD directives have been urging adoption of a Net-Centric approach toward information sharing, which makes it necessary to streamline the way data
More informationIntroduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
More informationHow service-oriented architecture (SOA) impacts your IT infrastructure
IBM Global Technology Services January 2008 How service-oriented architecture (SOA) impacts your IT infrastructure Satisfying the demands of dynamic business processes Page No.2 Contents 2 Introduction
More informationFederal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
More informationA Quick Introduction to SOA
Software Engineering Competence Center TUTORIAL A Quick Introduction to SOA Mahmoud Mohamed AbdAllah Senior R&D Engineer-SECC mmabdallah@itida.gov.eg Waseim Hashem Mahjoub Senior R&D Engineer-SECC Copyright
More informationTactical Service Bus: The flexibility of service oriented architectures in constrained theater environments
Tactical Bus: The flexibility of service oriented architectures in constrained theater environments Tactical Edge in NATO Context Tactical still very much under control of national forces: Zone of Operations
More informationBeyond Web Services: Towards On-Demand Complex Adaptive Environments
Beyond Web Services: Towards On-Demand Complex Adaptive Environments Dr. R. Cherinka, Dr. R. Miller, and C. Smith The MITRE Corporation 903 Gateway Blvd., Hampton, VA 23666 Phone: 757-896-8555, Fax: 757-826-8316
More informationAutomating Rich Internet Application Development for Enterprise Web 2.0 and SOA
Automating Rich Internet Application Development for Enterprise Web 2.0 and SOA Enterprise Web 2.0 >>> FAST White Paper November 2006 Abstract Modern Rich Internet Applications for SOA have to cope with
More informationResearch on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
More informationReal Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist
Real Time Remote Monitoring over Cellular Networks Wayne Chen Marketing Specialist Introduction For distribution infrastructures located in remote, isolated areas, unmanned monitoring systems have long
More informationMotivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures
Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable
More informationPrinciples and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
More informationSERVICE ORIENTED ARCHITECTURE
SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the
More informationService-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
More informationONR/PEO IWS/PEO C4I Combat System (CS)/Command and Control (C2) Limited Test Experiment (LTE) and Results: A SOA Success Story
ONR/PEO IWS/PEO C4I Combat System (CS)/Command and Control (C2) Limited Test Experiment (LTE) and Results: A SOA Success Story Matthew Fisher Progeny Systems March 31st, 2011 Part Number: P005578, Rev:
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,
More informationDevelopers Integration Lab (DIL) System Architecture, Version 1.0
Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2
More informationMs. Sandy Veautour Chief Systems Engineer PSG
Ms. Sandy Veautour Chief Systems Engineer PSG SBIR Initiatives Phase I FY 07 3 Awards High Speed Wireless 3-D Video Transmission to Support Virtual Dismounted Training 2 Phase I contract awards Battlefield
More informationE-Business Suite Oracle SOA Suite Integration Options
Specialized. Recognized. Preferred. The right partner makes all the difference. E-Business Suite Oracle SOA Suite Integration Options By: Abhay Kumar AST Corporation March 17, 2014 Applications Software
More informationClassic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
More informationEnterprise Service Bus Defined. Wikipedia says (07/19/06)
Enterprise Service Bus Defined CIS Department Professor Duane Truex III Wikipedia says (07/19/06) In computing, an enterprise service bus refers to a software architecture construct, implemented by technologies
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
More informationService-Orientation and Next Generation SOA
Service-Orientation and Next Generation SOA Thomas Erl, SOA Systems Inc. / SOASchool.com Service-Oriented Linguistics Service-Orientation Service Service Composition Service-Oriented Solution Logic Service
More informationIndustrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity
Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial
More informationSOA Success is Not a Matter of Luck
by Prasad Jayakumar, Technology Lead at Enterprise Solutions, Infosys Technologies Ltd SERVICE TECHNOLOGY MAGAZINE Issue L May 2011 Introduction There is nothing either good or bad, but thinking makes
More informationRun-time Service Oriented Architecture (SOA) V 0.1
Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...
More informationDepartment of Defense. Enterprise Information Warehouse/Web (EIW) Using standards to Federate and Integrate Domains at DOD
Department of Defense Human Resources - Enterprise Information Warehouse/Web (EIW) Using standards to Federate and Integrate Domains at DOD Federation Defined Members of a federation agree to certain standards
More informationUnlocking the Power of SOA with Business Process Modeling
White Paper Unlocking the Power of SOA with Business Process Modeling Business solutions through information technology TM Entire contents 2006 by CGI Group Inc. All rights reserved. Reproduction of this
More informationImproving Agility at PHMSA through Service-Oriented Architecture (SOA)
Leveraging People, Processes, and Technology Improving Agility at PHMSA through Service-Oriented Architecture (SOA) A White Paper Author: Rajesh Ramasubramanian, Program Manager 11 Canal Center Plaza,
More informationOverview Document Framework Version 1.0 December 12, 2005
Document Framework Version 1.0 December 12, 2005 Document History Date Author Version Description October 5, 2005 Carl Yestrau 1.0 First complete version December 12, 2005 Page A Table of Contents 1.0
More informationMarkLogic Enterprise Data Layer
MarkLogic Enterprise Data Layer MarkLogic Enterprise Data Layer MarkLogic Enterprise Data Layer September 2011 September 2011 September 2011 Table of Contents Executive Summary... 3 An Enterprise Data
More informationService-Oriented Architecture Foundation
Service-Oriented Architecture Foundation James T. Hennig, Chief Architect SOAF A james.hennig@us.army.mil "If you are not interoperable, you are not on the net, you are not contributing, you are not benefiting,
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More informationService Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
More informationSOACertifiedProfessional.Braindumps.S90-03A.v2014-06-03.by.JANET.100q. Exam Code: S90-03A. Exam Name: SOA Design & Architecture
SOACertifiedProfessional.Braindumps.S90-03A.v2014-06-03.by.JANET.100q Number: S90-03A Passing Score: 800 Time Limit: 120 min File Version: 14.5 http://www.gratisexam.com/ Exam Code: S90-03A Exam Name:
More informationGovernment Service Bus
Government Service Bus The GSB (Government Service Bus) is intended to become the central platform of integration and services for the provision of government electronic services and transactions, and
More informationArchitecting Composite Component Systems for Heterogeneous Environments with Open Standards. Derek Dominish
Architecting Composite Component Systems for Heterogeneous s with Open Standards Derek Dominish Aerospace Division Future Information Architectures MilCIS - Canberra 14 th November 2013 wealth of Australia
More informationAPI Management Introduction and Principles
API Management Introduction and Principles by Vijay Alagarasan, Principal Architect, Enterprise Architecture and Strategy of Asurion Abstract: This article is focused on providing solutions for common
More informationRepository-Centric Enterprise Architecture
Repository-Centric Enterprise Architecture Copyright 2005, Enterprise Elements, Inc. Abstract - Enterprise Architecture modeling tools are used to capture complex knowledge about organizations and technology.
More informationSOA Fundamentals For Java Developers. Alexander Ulanov, System Architect Odessa, 30 September 2008
SOA Fundamentals For Java Developers Alexander Ulanov, System Architect Odessa, 30 September 2008 What is SOA? Software Architecture style aimed on Reuse Growth Interoperability Maturing technology framework
More informationGuiding Principles for Technical Architecture
This document is a statement of the principles that will guide the technical development of the Kuali Student system. It will serve as a reference throughout the full lifecycle of the project. While these
More informationService Oriented Architectures Using DoDAF1
1 Service Oriented Architectures Using DoDAF1 Huei-Wan Ang, Fatma Dandashi, Michael McFarren The Mitre Corporation The MITRE Corp. 7515 Colshire Dr. McLean, VA 22102 hwang(at)mitre.org, dandashi(at)mitre.org,
More informationProviding On-Demand Situational Awareness
ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or
More informationTable of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8
Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes
More informationIntegration using IBM Solutions
With special reference to integration with SAP XI Email: keithprabhu@hotmail.com Table of contents Integration using IBM Solutions Executive Summary...3 1. Introduction...4 2. IBM Business Integration
More informationAquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
More informationVortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
More informationConcept Proposal. A standards based SOA Framework for Interoperable Enterprise Content Management
Concept Proposal A standards based SOA Framework for Interoperable Enterprise Content Management Mike Connor miconnor@adobe.com Paul Fontaine Paul.Fontaine@ost.dot.gov What is it? IECM Framework Vision:
More informationIntegrating Siebel CRM 8 with Oracle Applications
Integrating Siebel CRM 8 with Oracle Applications Agenda Corporate Overview Siebel 8.0 New Features Siebel Integration Approaches Integration with Oracle Applications Option 1 Option 2 Pros and Cons Evaluation
More informationForecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
More informationUnlock the Value of Your Microsoft and SAP Software Investments
SAP Technical Brief SAP Gateway Objectives Unlock the Value of Your Microsoft and SAP Software Investments Bridging the integration gap between SAP and Microsoft environments Bridging the integration gap
More informationWhat You Need to Know About Transitioning to SOA
What You Need to Know About Transitioning to SOA written by: David A. Kelly, ebizq Analyst What You Need to Know About Transitioning to SOA Organizations are increasingly turning to service-oriented architectures
More informationExtending SOA Infrastructure for Semantic Interoperability
Extending SOA Infrastructure for Semantic Interoperability Wen Zhu wzhu@alionscience.com Sumeet Vij svij@alionscience.com 3rd Annual DoD SOA & Semantic Technology Symposium July 14, 2011 www.alionscience.com
More informationAn empirical study of messaging systems and migration to service-oriented architecture
An empirical study of messaging systems and migration to service-oriented architecture Raouf Alomainy and Wei Li Computer Science Department, University of Alabama in Huntsville, Huntsville, AL 35899 {ralomain,
More informationArchitecture Modeling Approach for Net-Centric Enterprise Services (C4ISR/C2 Architecture Track)
A Paper submitted to the 10th International Command and Control Research and Technology Symposium "The Future of C2" Architecture Modeling Approach for Net-Centric Enterprise s (C4ISR/C2 Architecture Track)
More informationRS MDM. Integration Guide. Riversand
RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.
More informationSOA and Cloud in practice - An Example Case Study
SOA and Cloud in practice - An Example Case Study 2 nd RECOCAPE Event "Emerging Software Technologies: Trends & Challenges Nov. 14 th 2012 ITIDA, Smart Village, Giza, Egypt Agenda What is SOA? What is
More informationService-Oriented Architecture: Analysis, the Keys to Success!
Service-Oriented Architecture: Analysis, the Keys to Success! Presented by: William F. Nazzaro CTO, Inc. bill@iconatg.com www.iconatg.com Introduction Service-Oriented Architecture is hot, but we seem
More informationService Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because
More informationEnterprise-Wide Audit-Data Management
Enterprise-Wide Audit-Data Management Enterprise Security Management Special Program Office (NSA/I5E) Lloyd E Lutz Jr Booz Allen Hamilton 27 October 2009 1 Enterprise Security Management Overview Enterprise
More informationMulti-agent System based Service Oriented Architecture for Supply Chain Management System (MAS-SOA-SCM)
Volume 27 No.5, August 2011 Multi-agent System based Service Oriented Architecture for Supply Chain Management System (MAS-SOA-SCM) Dr. S. Srinivasan Professor PDM Engineering College Bhadurgarh 1245 Haryana,
More informationSOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
More informationSOA Planning Guide. 2015 The Value Enablement Group, LLC. All rights reserved.
SOA Planning Guide 1 Agenda q SOA Introduction q SOA Benefits q SOA Principles q SOA Framework q Governance q Measurement q Tools q Strategic (long term) View 2 Introduction to SOA q Service-oriented architecture
More informationWeb Service Contracts in the VA/DoD Federated Enterprise
Web Contracts in the VA/DoD Federated Enterprise September 6, 2013 John Wolf Architecture, Engineering & Integration 1 SESSION OBJECTIVES Define Integration Activities and Roles Define Web Contract Introduction
More informationFederated Service Oriented Architecture for Effects-Based Operations
Federated Service Oriented Architecture for Effects-Based Operations Intelligence and Information Systems Matt Brown (720) 88-4014 mebrown@raytheon.com Customer Success Is Our Mission is a trademark of
More informationUsing Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications
Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Steve Frank Business Development Manager Moxa Inc. Introduction Cellular technology minimizes site visits
More informationGuiding Principles for Modeling and Designing Reusable Services
Guiding Principles for Modeling and Designing Reusable Services Max Dolgicer Managing Director International Systems Group, Inc. mdolgicer@isg-inc.com http://www.isg-inc.com Agenda The changing notion
More informationORACLE REAL-TIME DECISIONS
ORACLE REAL-TIME DECISIONS KEY BUSINESS BENEFITS Improve business responsiveness. Optimize customer experiences with cross-channel real-time decisions at the point of interaction. Maximize the value of
More informationMultilink Processors (Link 11/16/22) and Integration Architectures
Multilink Processors (Link 11/16/22) and Integration Architectures Authors: Serdar ÖZTÜRK, Emine ESEN TAŞDEMİR, Murat ŞAHİN MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06531 ODTU Ankara / TURKEY Mailto:sozturk@milsoft.com.tr,
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7 No. 7, September-October 2008 Applications At Your Service Mahesh H. Dodani, IBM,
More informationSentinet for BizTalk Server SENTINET 3.1
for BizTalk Server SENTINET 3.1 for BizTalk Server 1 Contents Introduction... 2 SOA and APIs Repository... 3 Security... 3 Mediation and Virtualization... 3 Authentication and Authorization... 4 Monitoring,
More informationSystems Engineering and Integration Efforts. 11 Dec 2013
Systems Engineering and Integration Efforts 11 Dec 2013 Mr. Leo Smith Director, PoR Engineering Support ASA(ALT) System of Systems Engineering & Integration Directorate (SOSE&I) Approved for Public Release;
More informationBuilding Semantic Content Management Framework
Building Semantic Content Management Framework Eric Yen Computing Centre, Academia Sinica Outline What is CMS Related Work CMS Evaluation, Selection, and Metrics CMS Applications in Academia Sinica Concluding
More informationEnterprise Application Designs In Relation to ERP and SOA
Enterprise Application Designs In Relation to ERP and SOA DESIGNING ENTERPRICE APPLICATIONS HASITH D. YAGGAHAVITA 20 th MAY 2009 Table of Content 1 Introduction... 3 2 Patterns for Service Integration...
More informationPRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING
BACKGROUNDER Point of Contact: Mr. James L. Lindsey (703) 704-0194 James.L.Lindsey8.civ@mail.mil PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING Product Director, Enterprise Content,
More informationVirtual Operational Data Store (VODS) A Syncordant White Paper
Virtual Operational Data Store (VODS) A Syncordant White Paper Table of Contents Executive Summary... 3 What is an Operational Data Store?... 5 Differences between Operational Data Stores and Data Warehouses...
More informationSOA : To Do or Not to Do
Abstract SOA : To Do or Not to Do Gopala Krishna Behara and K.T.R.B Sarma As business moves from Web services to SOA, adoption and successful implementations of SOA become more evident. The goal of SOA
More informationInteracting the Edutella/JXTA Peer-to-Peer Network with Web Services
Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Changtao Qu Learning Lab Lower Saxony University of Hannover Expo Plaza 1, D-30539, Hannover, Germany qu @learninglab.de Wolfgang Nejdl
More informationSOA REFERENCE ARCHITECTURE
SOA REFERENCE ARCHITECTURE August 15, 2007 Prepared by Robert Woolley, Chief Technologist and Strategic Planner INTRODUCTION This document is a derivative work of current documentation and presentations
More informationEnterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing
Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing Presented by : Ajay Budhraja, Chief, Enterprise Services ME (Engg), MS (Mgmt), PMP, CICM, CSM,
More informationDepartment of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
More informationAn Esri White Paper June 2007 Developing and Deploying an Integrated Geoenabled SOA Business Solution: A Case Study
An Esri White Paper June 2007 Developing and Deploying an Integrated Geoenabled SOA Business Solution: A Case Study Esri, 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953
More informationDelivering Heterogeneous Hydrologic Data services with an Enterprise Service Bus Application
18 th World IMACS / MODSIM Congress, Cairns, Australia 13-17 July 2009 http://mssanz.org.au/modsim09 Delivering Heterogeneous Hydrologic Data services with an Enterprise Service Bus Abstract: Bai, Q.F
More informationOPCNet Broker TM for Industrial Network Security and Connectivity
OPCNet Broker TM for Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity from Integration Objects Compatible for DA, HDA
More informationFrequently Asked Questions
Efficient XML Frequently Asked Questions Q: What is Efficient XML? Efficient XML is a line of commercial software products that simultaneously optimize the performance, bandwidth utilization and power
More informationAn Integrated Service Management Approach Using OSGi Technology and ACAP
An Integrated Management Approach Using OSGi Technology and ACAP M. Cochinwala, S. Moyer, H. Shim, Telcordia Technologies One Telcordia Way Piscataway, NJ 08854 {munir, stanm, hyongsop}@research.telcordia.com
More informationAn Oracle White Paper October 2013. Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus
An Oracle White Paper October 2013 Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Table of Contents Introduction...
More informationService Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because
More informationNETWORK PROGRAMMING OF JOINT TACTICAL RADIO SYSTEM RADIOS
NETWORK PROGRAMMING OF JOINT TACTICAL RADIO SYSTEM RADIOS Donald R. Stephens, Cinly Magsombol, Norman Browne Joint Program Executive Office (JPEO), Joint Tactical Radio Systems San Diego, CA ABSTRACT The
More informationContent Management System (CMS)
Content Management System (CMS) ASP.NET Web Site User interface to the CMS SQL Server metadata storage, configuration, user management, order history, etc. Windows Service (C#.NET with TCP/IP remote monitoring)
More informationBase One's Rich Client Architecture
Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.
More information