Arild JansenAFIN & IfI, UiO /: INF5210 – lecture 17.10.03 Agenda : l Summary of analysis i 1. deliverable.

Slides:



Advertisements
Similar presentations
2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Advertisements

A Workflow Engine with Multi-Level Parallelism Supports Qifeng Huang and Yan Huang School of Computer Science Cardiff University
Distributed Data Processing
IUFRO International Union of Forest Research Organizations Eero Mikkola The Increasing Importance of Metadata in Forest Information Gathering NEFIS Symposium.
ALTTC BSNL. 1. Introduction 2. Methodology 3. Transition cost and penetration curve 4. Theoretical consideration 5. Migration for Large organization 6.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Cisco S3 C5 Routing Protocols. Network Design Characteristics Reliable – provides mechanisms for error detection and correction Connectivity – incorporate.
Guide to Network Defense and Countermeasures Second Edition
Dig3800 Gruppe 4. Agenda Informasjon minutters presentasjon av artikler –(gruppe 7) Paul A. David: The Beginnings and Prospective Ending of “End-to-End”
TCP/ IP PROTOCOL STACK. The TCP/IP Model, or Internet Protocol Suite, describes a set of general design guidelines and implementations of specific networking.
Midterm Presentation. iSecurity Project Team Presentation Contents Background Goal Project work breakdown The work so far Future targets User Perspective.
INTEGRATING NETWORK CRYPTOGRAPHY INTO THE OPERATING SYSTEM BY ANTHONY GABRIELSON HAIM LEVKOWITZ Mohammed Alali | CS – Dr. RothsteinSummer 2013.
HIPAA Security Standards What’s happening in your office?
Component Patterns – Architecture and Applications with EJB copyright © 2001, MATHEMA AG Component Patterns Architecture and Applications with EJB JavaForum.
Evaluation of an internet protocol security based virtual private network solution Thesis written by Arto Laukka at TeliaSonera Finland Oyj SupervisorProfessor.
Classifications, Standards, Information Infrastructure.
Creating an Educational Infrastructure - Experiences, Challenges and Lessons Learned Tom Nyvang Department of Communication, Aalborg University
Actor Network Theory (ANT). Frequently associated with three writers: Michel Callon, Bruno Latour and John Law. (Akrich & Latour 1992; Callon 1999; Callon.
Chapter 8: Development of Business Intelligence
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Chapter 2 TCP/ IP PROTOCOL STACK. TCP/IP Protocol Suite Describes a set of general design guidelines and implementations of specific networking protocols.
Enterprise Architecture
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Consult21 Systems Work Package BT Architecture and eBusiness Derrick Evans 21CN Systems.
Arild JansenAFIN & IfI, UiO /: INF Information Infrastructures 2. lecture Issues : l Main.
Arild JansenAFIN & IfI, UiO /: INF5210 Informasjon Infrastructures l About the course »Lectures »2 Mandatory.
Data Communications and Networks
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
UML - Development Process 1 Software Development Process Using UML (2)
GEO Work Plan Symposium 2012 ID-05 Resource Mobilization for Capacity Building (individual, institutional & infrastructure)
Managing Software Quality
Strategy #5. IT Architecture and IT Infrastructure are Metaphors Architecture - the relationship between planning and building Infrastructure - examples.
Mantychore Oct 2010 WP 7 Andrew Mackarel. Agenda 1. Scope of the WP 2. Mm distribution 3. The WP plan 4. Objectives 5. Deliverables 6. Deadlines 7. Partners.
Belete Honest Irwan Narendra Lars INF 5210 – Group 2.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
THE OSI REFERENCE MODEL Open Systems Interconnection (OSI) International Organization for Standardization( ISO)
1 IN 364.v2003.ppt, ANT, complexity and systems development Eric Monteiro NTNU and Univ. of Oslo IN364 March 2003.
Basic Concepts Software Architecture. What is Software Architecture? Definition: – A software architecture is the set of principal design decisions about.
Process Strategy: Bootstrapping Ole Hanseth. Infrastructure evolution Evolution – Adoption – Scaling – Innovation: of, in, on – Harmonization/restructuring/consolidation.
Introducing Pegasus: An ethnographic study of the ‘use’ of Grid technologies by the UK particle physics community Will Venters Department of Information.
CHECKPOINTS OF THE PROCESS Three sequences of project checkpoints are used to synchronize stakeholder expectations throughout the lifecycle: 1)Major milestones,
ISO 9001:2008 to ISO 9001:2015 Summary of Changes
Component Technology. Challenges Facing the Software Industry Today’s applications are large & complex – time consuming to develop, difficult and costly.
“ BIRD Project“ 1 Broadband Access, Innovation & Regional Development” Broadband Access, Innovation & Regional Development” Project Description Ulrich.
1 The World Bank Internet Services Program Rajan Bhardvaj
IPv6 transition strategies IPv6 forum OSAKA 12/19/2000 1/29.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Integrating Government Service Channels February 11 th, 2003 Ottawa, Ontario, Canada.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Managing Network Technologies Ole Hanseth, IFI, UiO SUMIT Trondheim, 4th Sept
Digital Ecosystems Re-tuning the user requirements after 3 years Digital Ecosystems Re-tuning the user requirements after 3 years Towards Business Cases.
Fourth IABIN Council Meeting Support to Building the Inter-American Biodiversity Information Network.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
Component Patterns – Architecture and Applications with EJB copyright © 2001, MATHEMA AG Component Patterns Architecture and Applications with EJB Markus.
Internet Protocol Storage Area Networks (IP SAN)
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
From systems to networks - tools to infrastructures - design to installed base cultivation Ole Hanseth.
INF5210 Overview & summary. Shaping the Evolution of Information Infrastructures: Architecture, Governance Regime, Process Strategy.
ANT - Actor Network Theory A presentation by virtual team 6 April
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
Winner quote The things we call "technologies" are ways of building order in our world… contain possibilities for many different ways of ordering human.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
GENUS Virtualisation Service for GÉANT and European NRENs
CIM Modeling for E&U - (Short Version)
INF5210 Informasjon Infrastructures
Control system network security issues and recommendations
Thursday’s Lecture Chemistry Building Musspratt Lecture Theatre,
National Record Locator Service
Network Architecture By Dr. Shadi Masadeh 1.
Presentation transcript:

Arild JansenAFIN & IfI, UiO /: INF5210 – lecture Agenda : l Summary of analysis i 1. deliverable l Installed base and Bootstrapping l More on ANT analysis l Discussion of 2. deliverable l Other issues

Arild JansenAFIN & IfI, UiO /: The cases l Skolenettet.no (Schoo)l nett l Library net l Public Key Infrastructure (PKI) l Forsvarets II (FIS) l Helsenettet (National Health Network l Døgnåpen forvaltning (”Self Service Management”)

Arild JansenAFIN & IfI, UiO /: Some questions in 1. deliverable l Are they ( or will they become ) an II, or are they just an IS or something else, e.g. portal? »Open, shared/sharable, enabling,standardized, evolving, socio-technical, heterogeneous »Star and Ruhleder: Embeddedness,Transparency, Reach of scope, links with conventions of practice, embodiments of standards, becomes visible upon breakdown

Arild JansenAFIN & IfI, UiO /: What type of infrastructure are they? l The structure of infrastructures

Arild JansenAFIN & IfI, UiO /: Are they built on the existing installed base? Infrastructures never starts from nothing »Something always exist »We cannot bypass the history  Can only be modified and extended.(Is that always true?) l The installed base includes: »Nodes in the network; equipment and software, vendors,.. »Protocols, standard, documentations, routines, …. »Operations and support, documentations, »Knowledge and experience, textbooks

Arild JansenAFIN & IfI, UiO /: Installed base as an actor l Re-enforcing mechanisms »In order to work, it must be aligned with the existing l Larger installed base l More complements produced Further adoption l Greater credibility of standards l Reinforces values to users

Arild JansenAFIN & IfI, UiO /: Installed base - design strategi : Different view of the installed base As a material to be shaped, improved and extended through an iterative process and As a heterogeneous actor-network which lives its own life outside the full control of designers and users : It must be cultivated as an organisms To what extend do you find such patterns in your case II ?

Arild JansenAFIN & IfI, UiO /: Strategies – lessions from Internet l Flexibility »Flexible standards and technical solutions l Modularisation and encapsulation »E.g. The Internet IMPS and layered structure l Minimal solutions »E. g. Internet versus OSI-protocols l Gateways »From N*(n-1) to M (= different protocols or subnets) l Transitions strategies

Arild JansenAFIN & IfI, UiO /: Bootstrapping an self-reinforcing installed base 1. Target the II for a group of users it is usefull for 2. Design the solution so that it is useful for some users without an existing installed base 3. Design the II as simple as possible 4. Build on existing II as far as poosible 5. The usefullnes of a new II can be increased by establishing gateways to already existing ones 6. Jump on ’bandwagons’ in the right direction 7. Start building the II where only few provides information

Arild JansenAFIN & IfI, UiO /: Decomposing heterogeneous infrastructures l Ecologies of infrastructures

Arild JansenAFIN & IfI, UiO /: Managing (avoid?) lock-ins 1. Make the infrastructure small and simple 2. Implement new versions using gateways 3. See if it is poosible to split infrastructure into independent sub-infrastructures

Arild JansenAFIN & IfI, UiO /: Supporting infrastructures l Use existing II as transport infrastructure l Design the application II independent of the transport II l Build the first version without the need for a specific service infrastructure l Build the required service infrastructure when a application infrastructure is getting momentuum

Arild JansenAFIN & IfI, UiO /: Installed base in an ANT perspective l An installed base (IB) in a heterogeneous network of technologies/technical artifacts and humans that is aligned »This network (IB) Is not static, but is continuously shaped and reshaped through various processes of translations – through the current use of the artifacts – also called drifting »An IB may also be changed through integration of new technology (e.g. IP/TCP and WWW) »A transition from one standard to another Is not only a question of interoperability, but also of human interpretation »A technology is not inherently constraining or enabling, it makes only sense in a context of heterogeneous networks.

Arild JansenAFIN & IfI, UiO /: E. Monteiro From systems to actor-networks Focus on goals instead of means 1.?? 2.The context of use is the surrounding actor-network 1.?? 3.Artifacts do not exist in a vacuum, but are connected; they belongs to an encompassing actor-network ?? 4.Unpack complexity by zooming in – or collapse by zooming out ?? 5.Any analysis needs to delimit the foreground phenomena from the background- but ANT cannot help doing that

Arild JansenAFIN & IfI, UiO /: From systems to actor-networks The basic for interpreting a process is the tracing over time of different translations that go into different inscriptions. 7.Focus on 4 aspects of inscriptions: i) what is the aim ii) who inscribes iii) into what material is the inscription made iv) how strong is the inscription 8.Stability is a measure of the degree of alignment 9.For technology, every day is a working day 10.Irreversibility is a measure of i) how difficult it is to undo decisions ii) the extent to which these determine subsequent ones

Arild JansenAFIN & IfI, UiO /: The ANT analysis – how can it help building an II l What are the most important actors? l How to identify and translate important user interest l How to achieve strong inscriptions l Obligatory passage points ?