640 likes | 777 Views
Open Knowledge Initiative. Scott Thorne (thorne@mit.edu) Jeff Kahn (jeffkahn@mit.edu). Topics. Architectural Overview Assumptions Goals Design Benefits Applying O.K.I.™. Assumptions. Things Change New Services & Functions Method of Accessing Services More Central Software Services
E N D
Open Knowledge Initiative Scott Thorne (thorne@mit.edu) Jeff Kahn (jeffkahn@mit.edu)
Topics • Architectural Overview • Assumptions • Goals • Design • Benefits • Applying O.K.I.™
Assumptions • Things Change • New Services & Functions • Method of Accessing Services • More Central Software Services • Authorization, Calendaring, etc. • Evolving Systems • Definition
More Assumptions • All Enterprises won’t have the same Technologies • All Enterprise Systems won’t use the same Technology • The need for sharing will grow • Differing “connectedness” • Not Web only
Goals • Better Integration • Allow data to be exchanged • Allow software to be integrated • Predictable Evolution • Allow for changing functionality • Minimize the negative impacts • Expanding Market Possibilities
Possible Integration Goals • Allow enterprise systems to exchange & synchronize information • Allow different organizations to exchange & synchronize information • Allow systems to use enterprise services • Allow for modular software which plugs into a known framework • Single system responsible for information
Data and Functional Specification • Data standards serve two goals • Data exchange inter/intra enterprise • Both Data & Function needed for all Goals • Data duplication and propagation • data specifications can’t address all issues • Both Needed for Interoperability • And more!
Systems Exchanging Data System A System B 1 2
Systems Integrated Functionally System A System B 2
Example OSIDs • Definitions OSID
Example OSIDs • Definitions • Implementations OSID public class Factory implements org.okip.service.APIName.api.Factory { private static final blah blah bhal private static final yada yada yada } … Service Implementation Infrastructure
Example Service-Based Architecture …org.okip.service.shared.api.Thing things = myFactory.getSomething(); if (null != thingss) { for (int i = 0; things.length != i; i++) { out.println(things[i]); System.err.println(types[i]); } } … Application OSID public class Factory implements org.okip.service.Example.api.Factory { private static final blah blah bhal private static final yada yada yada } … Service Implementation Infrastructure
The OSID Approach • OSID are Interfaces only, not Implementations • Code Reuse • Could Achieve Real-time Integration • Clean Separation or Boundaries • Minimizes Impacts of Changes
An application using an OSID internally, but with no real benefit Group
The module is outside the application, but still local Group
A client-side OSID and a remote service Remote Machine Group Data Store
Integration of two applications with a single service App 1 App 2 Group
Introduction of a common tool for Group management App 1 Group Mgmt Tool App 2 Group
Group maintenance can be removed from applications App 1 Group Mgmt Tool App 2 Group
Common Service Level OSIDs • Allows Integration with Enterprise Services • Adapts to Multiple Standards • Allows Several Sites to Share Services • Independence from Changing Technology
“Common Services” Agent Authentication Authorization Id Scheduling User Messaging Workflow Dictionary Filing Hierarchy Logging SQL “Educational Services” Course Management Digital Repository Assessment Grading The OSIDs
AuthN One Application Using Multiple Implementations of One API App X509 Kerb5
CourseMgmt Two Back End Systems –Single Access Method EnrollmentApp. HR System SIS System
Group Function Group Function Group Integration System A System B Group Service
OSID X OSID X Implementation Supporting Multiple Protocols SRMI SOAP Infrastructure Service Supporting both SRMI And SOAP
Service 1 Service 2 Service 1 Service 2 Same Application Using Different Implementations Application A Application A
AuthN AuthZ AuthN AuthZ Independent or Tightly Coupled Implementations Application A Application A
Application Z Assess AuthN AuthZ C.M. Etc. AuthZ Assess C.M. Etc. Varying Granularity of Service Exposure Application Y “LMS”
Overall Benefits • Stable and Well-Known Integration Points • Common Factoring of Domain • Code Reuse • Reduced Risk • Matched Expectations • Shorter Development Cycle / Lower Cost
Benefits of OSIDs for Enterprise IT • Provides enterprise integration strategy • Define responsibilities between application developers and enterprise infrastructure • Centralize a function or service • Enforce uniform business logic • Predictable technology migration • Costs, resources, process • Structures vendor delivrables (RFP) • Integrate two applications with overlapping functions
Benefits of OSIDs for the Developer and Development Manager • Allows tracking of progress • Does the application call the xyz OSID? • Who is working on the xyz implementation? • Is the xyz OSID implementation done? • Provides a context for project metrics • How’s the performance of the xyz implementation? • How many OSIDs / implementations are done?
Benefits of OSIDs for the Vendor • Create a product that can adapt to many customers’ environments • Separate application issues from enterprise infrastructure • Create an integration point • Create means for integration with other vendor’s products
Organizing for Applications and Implementations Legacy Migration Testing Debugging Performance and Scalability Configuration Software Development Training Release Management - When OSIDs Change Build vs Reuse Technical Issues Support Resources Topics Covered
User-Facing Application Single Team Back-End Systems Integration
User-Facing Application Applications Team OSID Back-End Systems Integration Implementations Team
Course Management System(Single Purpose Communication) Authenticate Course Management End User Application Authorize SQL Course Catalog Authorization Authentication
Communication Through OSIDs CourseMgmt Course Management End User Application Authenticate Authorize SQL Course Catalog Authorization Authentication
Stand-Alone OSID Implementations CourseMgmt Course Management Course Management End User Application Authenticate Authorize SQL Course Catalog Authorization Authentication
System Migration Course Management CourseMgmt End User Application Authenticate Authorize New Course Management SQL Course Catalog Authorization Authentication
Series (A) Infrastructure CourseMgmt (A) Course Management End User Application Authentication (A) Authorization (A) SQL (A) Course Catalog Authorization Authentication
Series (A) and (B) CourseMgmt (A) Course Management End User Application Authentication (B) Authorization (A) SQL (B) Course Catalog Authorization Authentication
Testing • Reuse tests since OSIDs are stable • Complete test plan before development is complete • no interface feature creep • Tests with sample values can help developers • Reuse tests within and across institutions • Good tests lower risks in reusing implementation
Debugging • Problem determination can be a significant challenge in complex systems • New code is a source of bugs • Reuse of validate components reduces supply of bugs • OSIDs compartmentalized functionality and limit scope in search for bugs
Performance and Scalability • Architecture envisions relatively few implementations and relatively many applications • Reuse spreads investment in well performing, scalable implementations across more deployments • All dependant applications benefit from enhancements
Configuration • Selection of implementation to use • Implementation configuration • Sharable context • Adapters
Configuration Mechanisms User-Facing Application Xxx OSID Implementation Yyy OSID Implementation XxxManager.properties YyyManager.properties Owner Context
Configuration Using Adapters User-Facing Application OSID “A” Implementation Adapter OSID “A” Implementation OSID “B” Implementation Back-End Services