Whad’ya Node ? Mentoring Conference New Orleans, LA March 1, 2005 Node Building 101.

Slides:



Advertisements
Similar presentations
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Advertisements

Service Manager for MSPs
ICIS-NPDES Plugin Design Preview Webinar ICIS-NPDES Full Batch OpenNode2 Plugin Project Presented by Bill Rensmith Windsor Solutions, Inc. 3/15/2012.
Node Lessons Learned James Hudson Wisconsin Department of Natural Resources.
Demystifying the Protocol and Specification v1.1 Prepared for the Node Mentoring Meeting by: Rob Willis, Ross & Associates February.
Netcentives Inc. 475 Brannan St. San Francisco, CA NASDAQ: NCNT Netcentives Inc. 475 Brannan St. San Francisco,
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Scale Up Access to your 4GL Application using Web Services
1 June 1, 2015 Secure access to project budget information for OAR Principal Investigators Eugene F Burger Sylvia Scott Tracey Nakamura John L Forbes PMEL.
Network Shared Services. Shared Services –Network Authentication and Authorization Services –Exchange Network Discovery Service –Universal Description.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
National STORET Users Conference Environmental Information Exchange Network Andrew T. Battin, Director Information Exchange & Services Division Office.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
IBIS System: Requirements and Components Lois M. Haggard Office of Public Health Assessment.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Exchange Network Node Help Desk NOLA Conference Feb 9-10, 2004.
BOB Tech Demo 2003 G2E – Las Vegas. Agenda  Best of Breed – a layering of standards  Standards, messaging, protocols and why you care  From the bottom.
Module 14: Configuring Print Resources and Printing Pools.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Chapter 9: Novell NetWare
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Beaches Data Flow Getting Notification Data Into PRAWNS Dennis Murphy Delaware DNREC (302)
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
TRI Pilot Data Flow via the Exchange Network Michigan’s Experience Michael Beaulac – Michigan DEQ Bill Rensmith – Windsor Solutions, Inc. Whad’ya Node?
Facility Registry System and the Exchange Network Pat Garvey OEI/OIC May 2000.
Introduction to the Exchange Network January 9 th, 2012.
Node Mentoring Workshop “Sharing What We Node” Middleware Breakout Session.NET New Orleans, Louisiana February 9-10, 2004.
Integration Broker PeopleTools Integration Broker Steps –Introduction & terminologies –Application Server PUB/SUB services (Application Server)
Disaster Management - Open Platform for Emergency Networks (DM OPEN)‏ Introduction to the Interoperability Environment.
第十四章 J2EE 入门 Introduction What is J2EE ?
1 Environmental Information Exchange Network - Principles and Components Molly O’Neill, State Director, Network Steering Board Pat Garvey, EPA Director,
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
State of Wyoming Department of Environmental Quality Network 101 Nodes – Not as Nasty as Polyps.
OEI’s Services Portfolio December 13, 2007 Draft / Working Concepts.
1 Exchange Network Node 2.0 Flow Migration Open Conference Call August 27, 2008.
Computer Emergency Notification System (CENS)
The State of Washington Node Lessons Learned from a Production Node and Beyond Guy Outred Windsor Solutions.
Node and Flow Configuration (NFC) Node Mentoring Workshop 2/9/2004.
Going from Node to Flow Presented by Guy Outred. Introducing… Sponsored by Mentoring States and ECOS Based on input from States of varying geography,
The Exchange Network Node Mentoring Workshop Universal Description, Discovery, and Integration Registry David Dundua February 28, 2005.
Introduction to the Exchange Network May 30th, 2012.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
© 2010 VMware Inc. All rights reserved vSphere 4.1: Install, Configure, Manage.
Challenge Grant Update: Linking the Network of Natural Heritage Biodiversity Data to the Environmental Information Exchange Network.
Exchange Network Conference San Francisco, CA April 18, 2006 Network and Node 101.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
A Brave NEtWork World Rob Willis, Ross & Associates Node Mentoring Workshop New Orleans, LA February 28, 2005.
Remote Access Portal Project Ben Dawson Larry Finn Peter Stickney Ken Vedaa May 7, GC.
Data Exchange through XML Environmental Information Exchange Network May 21, 2003 Louis Sweeny.
RCRAInfo May 6, RCRAInfo: What is it? The national (mission critical) information system that supports the RCRA Subtitle C program. A national.
Node Mentoring Workshop “Sharing What We Node” CDX Test to Production Flow Steps New Orleans, Louisiana February 9-10, 2004.
NGA Center for Best Practices January 10, 2001 Charleston, South Carolina National Environmental Information Exchange Network Kim Nelson Pennsylvania Department.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
Introduction to the Exchange Network May 30th, 2012.
SNOW Spoke Server Implementation on SHRINE
GWE Core Grid Wizard Enterprise (
Securing the Network Perimeter with ISA 2004
IS 4506 Server Configuration (HTTP Server)
Challenge Grant Update
Presentation transcript:

Whad’ya Node ? Mentoring Conference New Orleans, LA March 1, 2005 Node Building 101

Presenters Dennis Burling Nebraska Dept. of Environmental Quality Glen Carr Oregon Dept. of Environmental Quality Kevin Jeffery Windsor Solutions, Inc

30 Minute Guide Audience Partners who are yet to implement a Node Partners who have implemented a Node, but are interested in alternative approaches Partners looking to advance their Node implementation

Contributors Alesia Whitney-KnightIowa Department of Natural Resources Cheryl FranklinIndiana Department of Environmental Management David BlocherMaine Department of Environmental Protection David H. EllisMaine Department of Environmental Protection Dennis BurlingNebraska Department of Environmental Quality Glen CarrOregon Department of Environmental Quality Leslie BrennanNew York Department of Conservation Mary BlakesleeEnvironmental Council of States Mitch WestOregon Department of Environmental Quality Robert E. WilliamsMaine Department of Environmental Protection Tom AtenWisconsin Department of Natural Resources

What is a Network Node ? “ A simple environmental information Web service that initiates requests for information, processes authorized queries, and sends/receives the requested information in a standard format. ”

Getting Started Research the Network –Exchange Network Web Site ( –CDX Web Site ( –EDSC Web Site ( –ECOS Web Site ( Consult Mentoring States Planning what data to exchange –Current systems –Maturity of flow –Data sharing priorities Securing agency commitment –Making the business case –Securing sponsorship

Don’t Reinvent the Wheel Early implementers invested significant effort in creating and troubleshooting the technology required to implement a Node and exchange data. Exchange Network goal to reuse research and development work wherever possible. Demonstrated Node Configurations ( Reuse of existing solutions can accelerate Node deployment and reduce the up front investment. Where possible use existing applications to streamline development but be prepared to adapt to your environment.

Implementing Your Node

Review existing agency architecture standards. Define the physical environment including hardware, hosting platform and network components. Establish appropriate network security architecture. Identify the logical components including middleware, applications and frameworks. Select development, management and support tools.

Implementing Your Node Minimum functionality per Network Node specifications. Consider more advanced Node capabilities. Ability to troubleshoot an exchange. Monitoring use of the Node by other partners. Administering security (NAAS and local). Scheduling data exchanges. notifications for Node functions. Request costing.

Implementing Your Node Develop basic Node Web service interface to process incoming requests. Develop Node administration functions (user accounts, transactions, logs, etc). Install security identification certificates on host server to support SSL (EPA can provide). Establish “master” and “operator” NAAS accounts (Exchange Network Security Policy).

Implementing Your Node If possible use a dedicated test environment. Test using the EPA CDX test client and/or other testing applications ( ox). ox Ask CDX Help Desk to assist with testing connectivity and functionality. Test with parallel data flow development. Perhaps use another partner’s Node for added validation of interoperability.

Implementing Your Node If possible, maintain separate production and test Node implementations. Dedicate support staff time to monitor Node operation (between ¼ and 1½ FTE). Training on use and operation of the Node.

Common Testing Issues Compatibility with the Network Node specifications Lack of physical connectivity to the Internet Incorrect implementation of the WSDL Incorrect configuration or lack of support for NAAS security. Capability to respond to and process predefined data queries Inappropriate configuration of the Node to support a particular query. Data request exceeds server capacity. Incompatibilities between heterogeneous Node platforms.

Deciding on Your Technical Architecture Physical Components of Node Architecture Logical Components of the Node Architecture Management, Support and Extensibility Tools Node Functional Capabilities

Physical and Logical Components Network Topology Dedicated vs. Shared Server Separate Testing Environment Staged RDBMS Application architecture (e.g.,.Net, Java, XAware)

Node Functional Capabilities Administration interface. Separation of the Node and the individual data exchange or flow implementations. Support for the Exchange Network XML Document Header File on an exchange-by-exchange basis. Support of authentication and authorization through both NAAS and Local Security. Persistent attachment management. Support for both incoming and outgoing data flows. Support Secured Sockets Layer (SSL) through the use of recognized certificate authorities.

Discussion