Integrated EA conference London March

Slides:



Advertisements
Similar presentations
Status on the Mapping of Metadata Standards
Advertisements

Interoperability Standards for Information Sharing and Safeguarding PM-ISE Slide 1 | Unclassified | Notional | DRAFT.
EA Demonstration Study : Dissemination Forum – 8 June EAEA Framework Proposal Paolo Monaco EA Unit.
NATO NNEC Core Enterprise Services
Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
User Working Group Yannis Ioannidis University of Athens, Greece DL.org All Working Groups Meeting, Rome, May 2010.
ICT 2010: "Global Information Structures for Science & Cultural heritage: The Interoperability Challenge" Networking Session Coordination Action on Digital.
FOR COALITION INTEROPERABILTIY
0 DOD/DT/CEDCV – 20 th & 21 st January Paris meeting SAGEM RTD Activities C2-Sense project Paris – 20 & 21 January 2015.
<<Date>><<SDLC Phase>>
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
Systems Engineering in a System of Systems Context
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
OASIS Reference Model for Service Oriented Architecture 1.0
Connecting People With Information Conclusions DoD Net-Centric Data Strategy (DS) and Community of Interest (COI) Training For further information .
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
1. Context: Ambient Intelligence Ambient Intelligence (AmI) represents a vision of ubiquitous computing, sensing and actuating to unobtrusively enhance.
Preparing the Way for NATO Network Enabled Capability J. Troy Turner C4 Interoperability Standardization ACT C4I Division.
Enterprise Architecture
Cross Domain Patient Identity Management Eric Heflin Dir of Standards and Interoperability/Medicity.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
Chapter 4 Interpreting the CMM. Group (3) Fahmi Alkhalifi Pam Page Pardha Mugunda.
TDT4252/DT8802 Exam 2013 Guidelines to answers
1 NATO HQ C 3 Staff The NATO HQ need for the Web: How policy requirements are affected by the need to take web development into account Georges D’hollander.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
EXPECTATIONS OF TURKISH ENVIRONMENTAL SECTOR FROM INSPIRE Ministry of Environment and Forestry June, 2010 Özlem ESENGİN Ahmet ÇİVİ Tuncay DEMİR.
The value added of a national statistical institute Max Booleman Marleen Verbruggen.
Information Assurance The Coordinated Approach To Improving Enterprise Data Quality.
Army Net-Centric Data Strategy Center Of Excellence (ANCDS) Army Data Harmonization and Integration Working Group (ADHIWG) Sever Ciorlian ANCDS Team Lead.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
NIEM Domain Awareness June 2011 Establishing a Domain within NIEM.
C2-SENSE T.3.5 & WP4 Organizational Interoperability Ankara.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
This material was developed by Duke University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information.
SAML 2.1 Building on Success. Outline n Summary of SAML 2.0 n Work done since 2.0 n Objectives of SAML 2.1 n Proposed Task List n Undecided Issues n Invitation.
© M S GIS & Mapping Implementing GIS © M S GIS & Mapping Training and Information A Successful Project A Case Study - The Geo Pres Project To Finish a.
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
1 Advanced Software Architecture Muhammad Bilal Bashir PhD Scholar (Computer Science) Mohammad Ali Jinnah University.
CLARIN work packages. Conference Place yyyy-mm-dd
FEA DRM Management Strategy Presented by : Mary McCaffery, US EPA.
S&I Integration with NIEM (DRAFT) Standards Development Support June 8, 2011.
EPA Enterprise Data Architecture Metadata Framework Assessment Kevin J. Kirby, Enterprise Data Architect EPA Enterprise Architecture Team
© The ATHENA Consortium. EM1 - Enterprise Modelling as a way to achieve Interoperability Module 3 - What interoperability problems does Enterprise.
David Smiley SOA Technology Evangelist Software AG Lead, follow or get out of the way Here Comes SOA.
Connecting People With Information Transforming the Way the DoD Manages Data M. David Allen OASD(NII)/DoD CIO May 23, 2006 “The.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
FIPA Abstract Architecture London FIPA meeting January 24-29, 2000 from: TC-A members.
Joint Concept Development and Experimentation (JCD&E)
Basics of SOA Testing Assurance Services Unit 24 February 2016.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e As of: 3/1/2016 Air Force Weather Agency CEISC Committee Focus Shift - Proposed Modification to.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
IPDA Architecture Project International Planetary Data Alliance IPDA Architecture Project Report.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
Process 4 Hours.
Design Rules for NBD – Network Based Defence
Enterprise Architecture
Core Services block.
Update from the Faster Payments Task Force
Unified Architecture Framework NATO Architecture CaT Introduction
Introduction to MODEM Building a Semantic Foundation for EA: Reengineering the MODAF™ Meta-Model Based on the IDEAS Foundation Model Lt Col Mikael Hagenbo,
US Kickoff brief to Frameworks Convergence Meeting
Architecture Design Rules in LedsystT
ESS Vision 2020: ESS.VIP Validation
1/18/2019 Transforming the Way the DoD Manages Data Implementing the Net Centric Data Strategy using Communities of Interest Introduction
2/15/2019 Transforming the Way the DoD Manages Data Implementing the Net Centric Data Strategy using Communities of Interest Introduction
US Kickoff brief to Frameworks Convergence Meeting
Subject Name: SOFTWARE ENGINEERING Subject Code:10IS51
Presentation transcript:

Integrated EA conference London March 09-10 2010 Introduction to Design Rules in NATO NISP Mr Peder Blomqvist CIO Strategist, Swedish Armed Forces (SWAF) CIO Department at the Supreme Commanders Staff CIO strategic and directive program C4I architect Member of NATO Open Systems Working Group since 2005 Mr Niklas Häggström Senior IT-Architect , Centric Labs

Presentation content What Design Rules are and why they are useful NATO Open System Working Group and NISP development How Design Rules are to be incorporated into NATO NISP A walkthrough of the Design Rule for International Military Interoperability

What Design Rules are and why they are useful

Transformation Previous vision New vision Platform-centric, service embedded, large conflict, well established C2 Network-centric, interoperable, joint, integrated, flexible Revolution Existing structure Future structure Evolution

DR reference of importance

Design Rules 1200, The holy Franciscus The holy Franciscus, Il Poverollo, 1182-1226 “A rule excludes permanent wiggling between different alternatives. It makes it possible to follow a defined line. It is not the amount of details, but abeyance to a few directives that is of importance. The directives shall be so short and clear that you immediately can recall them in your memory “The rule should be practical, addressed directly to the sense and shall be personal. Not until you thoroughly have considered the rule, elaborated it carefully, have allowed it to mature and hardened it you should train yourself in being fateful to it”

What is a Formal Design Rule? Design Rule Model 0..n DRP Product VDD Domain DR and DRP references Status Identifier 1 +Owner 0..1 Problem domain Requirements 0..n 1 Verification Method Result Each association between DR:s configured in different DRP:s must also have a corresponding dependency between the involved DRP:s. DR product Version Date Status Identifier Development Status: [Identified, Draft, Proposal, Verified, Rejected, Obsolete] DR Association Validity = Descriptive Validity for each referenced DR: [Normative, Descriptive, Emerging] 0..n 1 +Refers Meta data 1 Analysis THE design rule DR 1 Consequence Problem 1..n Context 1 Solution 1..n 1 0..n Referred DR is mandatory or recommended

Definition of a Design Rule A design rule is a solution to a problem in a specific context with the following characteristics: Belongs to a problem domain Packages knowledge in a reusable form Gives value to the re-user Standardize solutions to design problems within NNEC

What is a Design Rule? A proposed, recommended or mandatory solution on a frequent problem, providing the wanted properties A means to define how architecture concepts or architecture principles shall be implemented May be a generic design pattern, a list of valid standards or a prescribed design or function. (A Design Rule may also describe impropriate or forbidden solutions (antipatterns))

Are not standards enough? Standards – often WHAT but not always HOW How to apply the standard on a specific problem Relations between different standards Applicability in different domains A vast number of standards are applicable for NEC does not mean that complex system work!

Design Rules & Design Design Rules Design Generic generally applicable Mostly non functional Long-lived When following design rules the design work will be ”NNEC compliant” Capability independent What will be realizable in order to meet the functional requirements How will it be practicable Will be used to support the purchasing Some parts will be long-lived and reusable in design work to come when adding new functional requirements Capability dependent

Service Oriented Architecture OASIS SOA Reference model v1.0 adopted by NATO Design Rules Framework

Interoperability Design Rule Focus Areas Flexibility Mobility Scalability Interoperability Security Interoperability Civil Interoperability Legacy Integration International Mil Interop. Produced and used in the Swedish NEC program NISP v4 development phase

NATO Interoperability Standards & Profiles development NOSWG - NATO Open System Working Group NATO Interoperability Standards & Profiles development

Rationale NISP Standards and Profiles NISP v4 --- ADatP34 (D) Vol. 1 Vol. 2 Vol. 3 Vol. 4 Vol. 5 Vol.6 SOA & Design- Rationale NISP Rules Rationale NISP Standards and Profiles MANAGEMENT NEAR TERM MID TERM LONG TERM 0-2 y 3-6 y 6+ y The ISSC, on behalf of the NC3B, was the approval authority for the 5 volume NC3TA The NATO C3 System Interoperability Policy mandate that NATO Common Funded Systems use the mandatory standards in the NATO Common Standards Profile (NISP) and products in the NATO Common Operating Environment (NCOE). Nations indicate their use of the mandatory standards by ratifying STANAG 5524 Standards & Profiles SOA & Design Rules

Categories of Standards Emerging long term - A standard is considered emerging long term if it deals with technology that is expected to be useful in the long term to NATO 6+ years. Emerging mid term - A standard is considered Emerging mid term if it is sufficiently mature to be used within the current or next planned systems 3-6 years. Emerging near term – A standard is considered Emerging near term if it is mature enough to be used within 0- 2 years. Mandatory - A standard is considered mandatory if it is mature to be used immediately. This means that it may both be applied within existing systems and in within future mid term planned systems. Fading - A standard is considered fading if the standard is still applicable for existing systems. The standard however is becoming obsolete or will be replaced by a newer version or another standard. Except for legacy systems or interoperability with legacy systems, the standard may not be used any more. Retired - A standard is considered retired if the standard, that has been used in the past, but is not applicable any more for existing systems. Rejected - A standard is considered rejected if, while it was still emerging, it is considered unsuitable for use within NATO.

How Design Rules are to be incorporated into the NISP Outline - 3 How Design Rules are to be incorporated into the NISP

Design Rule Guidance & DR -International Mil

NISP-NAF Relations Profile description support Actor Profile description support Profile configuration support Profile NISP v4 Architecture NAF v3 what how Standards Design Rules Mission Objectives Capabilities

NISP Profile - NAF relation Strategic views Operational views Services views Systems views

Architecting Phase

Design phase

Architectures & NISP NAF v3.1 NISP Architecture Repository requirements NISP Standards & Profiles Overarching Architecture: Services Framework guidance Reference Architectures: Solution Patterns guidance/mandate Target Architectures: Implementation Architecture Repository

Walkthrough of the Design Rule for International Military Interoperability

Introduction The design rule describes how military organizations can develop and implement the ability to exchange information  with each other to support interoperability issues Much of this design rule can also be applied when exchanging information with other actors than military organizations Definition of interoperability in this context: The ability of technical systems and/or organizations using technical systems to operate together by making (necessary) data & information and/or services produced by one system or organization available to the others, in an agreed format

The Design Rule elements Context Problem Solution Challenges / Issues Principles Solution description Requirements NISP Standards

Context

The International Military Federation To become interoperable and exchange information, actors need to meet somewhere to collaborate, in this design rule, this is referred to as the “federation” In the federation, actors provide services which other actors can use to enable information exchange To create a federation, the actors need to agree upon the rules of the arena, such as which data & information formats and classifications should be used This design rule mainly addresses the technical aspects of the establishment of the federation Organizational, process and legislation aspects must be covered to some extent since all of these needs to harmonize in order to make the collaboration happen

The international military federation Federation domain Federation agreement Actor domain

Scope of the design rule Community of Interest Information Assurance Information Integration Service Management Communication

Problem

Requirements and challenges are identified Basic requirements for information exchange People from the different organisational actors SHALL be able to communicate with each other using voice or text communication. It SHALL be possible to discover and retrieve information (i.e. search) provided to the federation by different actors. Challenges Challenges based on international agreements and regulations Challenges based on national law, national integrity and regulations Challenges based on interpretation of information content Challenges based on technical issues Challenges based on culture, lack of trust and organizational issues Each challenge has a set of related issues

Example - Challenges based on technical issues Architecture and technical implementations of information systems differ The complete technical system will probably not be homogenous, rather a federation of heterogeneous systems Maturity of using architecture and design as governing tools is likely to vary greatly among collaborating parties Agreeing on standards for information exchange is a critical success factor Sovereignty of the parties will increase the complexity of this task There is no governing organ that can make the decisions Without security mechanisms, no information can be exchanged There is a need to have the means to organize and prioritize what to share

Solution

Outline for the solution chapter Architecture for interoperability Key principles The information aspect The security aspect The Information Exchange Gateway Concept Information zones Technology and profiles Discovery services Repository Services Collaboration Services Messaging Services Mediation Services Information Assurance Services Service Management Services Summary

The international military federation architecture Actor internal network Federation network Information Exchange Gateway

Key principles – some examples Sovereignty of collaborating parties Each collaborating party decides which information to publish into the federation View on information Information published into the arena is available to all parties, if no restrictions have been agreed Agreements for Information Exchange Requirements, models, translations and format for information exchange in the arena are regulated by agreements Architecture The technical architecture for information exchange follows the tenets of the Service Oriented Architecture concept Technology Technical services for information exchange uses open standards whenever possible Security Service consumers and service providers use a common methods for authentication and authorization of users and services

The Information aspect - overview A number of areas are addressed for the information aspect: Information Exchange Requirement specifications Information Exchange Models within collaboration areas and their relation to international standards, domain Community Of Interest (COI) models, semantic structures etc Translation specifications and translation mechanisms Specification of information exchange mechanisms in the federation e.g. common data management services, mediation services and bridges to external systems

The security aspect – IEGs and Information zones Information exchange Gateways (IEGs) are used to protect information assets of the participants in the federation. NATO has described an IEG concept which the Design rule reuses Information Zones is a concept identified and defined to achieve confidentiality with high assurance The concept gives the advantage to separate assurance on security mechanisms to meet external and internal threats. Actor info zone IEG Federation info zone

Information discovery Information Assurance Technologies summary Collaboration Information discovery Authorize Authenticate Information Assurance Service Management Route Distribute Protocol Switch Correlate Enrich Transform Messaging Translation Registry Consumer Provider Directory Service discovery

Thank you!