WMS systems manage and coordinate several independent subtasks. The coordination problems get even more serious when the subtasks are performed on separate.

Slides:



Advertisements
Similar presentations
Computer Systems & Architecture Lesson 2 4. Achieving Qualities.
Advertisements

PantherSoft Financials 9.2 Fundamentals Office of the Controller
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Chapter 22 Object-Oriented Systems Analysis and Design and UML Systems Analysis and Design Kendall and Kendall Fifth Edition.
Information System Engineering
Workflow & Event Derivation Workshop
© Copyright 2011 John Wiley & Sons, Inc.
Systems Analysis and Design in a Changing World, Fourth Edition
Practical Object-Oriented Design with UML 2e Slide 1/1 ©The McGraw-Hill Companies, 2004 PRACTICAL OBJECT-ORIENTED DESIGN WITH UML 2e Chapter 5: Restaurant.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
Workflow & Event Derivation Workshop
Dr. Kalpakis CMSC 461, Database Management Systems Introduction.
Examine Quality Assurance/Quality Control Documentation
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Configuration Management
Using Task Manager to Work EDI/ERA Posting Lori Phillips CHUG at Centricity Live April 29 – May 2,2015.
State and Sequence Diagrams Modelling dynamic information So far we have seen: Use Case Diagrams – requirements capture, interface.
Introduction to Databases
BPMN By Hosein Bitaraf Software Engineering. Business Process Model and Notation (BPMN) is a graphical representation for specifying business processes.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 8: Modelling Interactions and Behaviour.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Implementing GL, AP and PO Workflow
HSA 171 CAR. 1436/4/26  the process of establishing the orderly use of resources by assigning and coordinating tasks. The organizing process transforms.
In the next step you will enter some data records into the table. This can be done easily using the ‘Data Browser’. The data browser can be accessed via.
Chapter 1 : Introduction §Purpose of Database Systems §View of Data §Data Models §Data Definition Language §Data Manipulation Language §Transaction Management.
1 Creation versus Evolution. 2 Creation versus Evolution The Theory of Intelligent Design holds that certain aspects of the Universe are best explained.
1 Dept of Information and Communication Technology Creating Objects in Flexible Authorization Framework ¹ Dep. of Information and Communication Technology,
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
Storing Organizational Information - Databases
مهندسی مجدد فرآیندهای تجاری
Distributed Information Retrieval Using a Multi-Agent System and The Role of Logic Programming.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
- Ahmad Al-Ghoul Data design. 2 learning Objectives Explain data design concepts and data structures Explain data design concepts and data structures.
Requirements as Usecases Capturing the REQUIREMENT ANALYSIS DESIGN IMPLEMENTATION TEST.
Activity diagrams. Introduction ● Activity diagrams are a behavioural model that represent the dynamics of the system. ● An activity diagram is essentially.
7 Systems Analysis and Design in a Changing World, Fifth Edition.
Example: object diagram for Scheduler, v What is wrong with this diagram? Seems like a lot of similarity between Task and UnplannedTask Can use.
1 Chapter 5 Modeling System Requirements Finding the Use Cases Page
Module Coordinator Tan Szu Tak School of Information and Communication Technology, Politeknik Brunei Semester
CS212: Object Oriented Analysis and Design Lecture 34: UML Activity and Collaboration diagram.
Scenario A scenario is a sequence of steps describing an interaction between a user and a system. Use case is a set of scenarios tied together by a common.
Systems Analysis and Design in a Changing World, Fourth Edition
The relational model A data model (in general) : Integrated collection of concepts for describing data (data requirements). Relational model was introduced.
Chapter 5 : Integrity And Security  Domain Constraints  Referential Integrity  Security  Triggers  Authorization  Authorization in SQL  Views 
Mr.Prasad Sawant, MIT Pune India Introduction to DBMS.
Session 1 Module 1: Introduction to Data Integrity
1 Modeling workflows : The organizational dimension and alternative notations. Wil van der Aalst Eindhoven University of Technology Faculty of Technology.
/faculteit technologie management PN-1 مهندسی مجدد فرآیندهای تجاری بخش سوم: مدیریت منابع فرآیند Workflow Resource Management.
Description and exemplification use of a Data Dictionary. A data dictionary is a catalogue of all data items in a system. The data dictionary stores details.
Diagrams. Typically, we view the static parts of a system using one of the four following diagrams. 1. Class diagram 2. Object diagram 3. Component diagram.
Kyung Hee University System Functional Model OOSD 담당조교 석사과정 이정환.
7 Systems Analysis – ITEC 3155 The Object Oriented Approach – Use Cases.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
CSCI-235 Micro-Computers in Science Databases. Database Concepts Data is any unorganized text, graphics, sounds, or videos A database is a collection.
SQL Basics Review Reviewing what we’ve learned so far…….
Data Integrity & Indexes / Session 1/ 1 of 37 Session 1 Module 1: Introduction to Data Integrity Module 2: Introduction to Indexes.
Systems Analysis and Design in a Changing World, Fourth Edition
Chapter 4: Business Process and Functional Modeling, continued
Chapter 1 The Systems Development Environment
Chapter 1 The Systems Development Environment
Activity and State Transition Diagram
Activity Flow Design - or - Organizing the users’ Work
Chapter 1 The Systems Development Environment
Chapter 10 Object States and The Statechart Diagram
Seminar 2 Design of Informatics Systems
Chapter 1 The Systems Development Environment
Contract Management Software 100% Cloud-Based ContraxAware provides you with a deep set of easy to use contract management features.
Simplify Your Sales Process
Presentation transcript:

WMS systems manage and coordinate several independent subtasks. The coordination problems get even more serious when the subtasks are performed on separate systems. SYSTEM ARCHITECTURE FOR WMS :.

1) The flow of information in an organization occurs by means of documents (e.g., purchase order request, travel authorization request, etc.), which are passed through various individuals. Each individual performs operations on the document such as: fill in some fields, modify fields, etc. 2) This form then goes to a secretary who reviews it, and enters information on previous business travel by the employee. 3) Next, the form is sent to the manager who approves or disapproves the requested amount. Alternatively, the manager may approve a smaller amount than requested. 4) Finally, the form is returned to the individual concerned and the secretary to notify them of the decision. PROBLEMS :  CONTROL  AUTHORIZATION

Three techniques for handling workflow control & authorization: 1) workflow control matrices : defines the relationship between two operations that can be performed in a temporal sense. 2) sequence constraints : consists of techniques for imposing and enforcing constraints on the routing sequence of the workflow, i.e., the sequence in which a document is sent to various employees 3) event-based constraints : event-based constraints which can be used to specify unusual routing needs and other special actions. These techniques can :  can exploit parallelism,  lead to more efficient processes  Do better workflow systems  can handle various kinds of exception situations that arise in workflow applications.

The objective of our framework is to complete a list of tasks with respect to each document subject to a set of sequence constraints while providing support for dynamic routing and operational integrity control. Dynamic routing : routing a document in a dynamic manner subject to certain constraints. There is no predefined order as in static routing. Operational integrity control : refers to imposing restrictions on the permissibility of various operations that may be performed on various fields of a document by different individuals as the document travels through the organization. The WMS routes the documents to work baskets while workers interact with the documents through the work baskets assigned them.

Three types of work baskets:  document-based : each basket contains a particular type of document, and every worker accesses the same document in the same basket & are hard to use for routing documents.  worker-based : contain all documents assigned to the same worker. Routing of documents can be done after a document is processed by moving documents from the basket of one worker to the basket of another. inflexible as modification to the routing mechanism is needed when a worker is absent or leaves the company.  rolebased : contains similar documents that must be worked upon by workers performing a specific role. Any worker belonging to that role can process the documents in the basket. When a worker starts processing a document, the document is locked so that no one else can access it. Role-based baskets are most suitable for supporting dynamic routing because no change to the routing mechanism is needed when a worker leaves the system or is reassigned.

The following terms to describe the workflow process and to develop the control and authorization mechanisms. 1) document (d): A statement or form that is needed for a business transaction, e.g., a billing statement or a travel authorization form. 2) field (f): Any data element contained in a document that has a numerical or symbolic value. 3) worker (w): Any person who performs operations on documents using the workflow management system. 4) roLe (r): A generic identifier for a group of workers, any one of whom may perform a task assigned to the “role”. 5) work basket (b): A unique, logical box associated with a role. Each work basket contains a stack (or queue) of documents waiting to be processed by a worker in the corresponding role. 6) operation (0): The smallest unit of work, e.g.,enter a data value into the amount field on a form.

7) Tusk (t): A collection of operations that corresponds to a step in a common business process, e.g., fill in the customer request form. 8) sequence dependency (s): Two tasks that must be performed by different roles in a given sequence create a sequence dependency.  Proper routing of documents to various workers is by far the most important function of the workflow management system & is achieved by means of sequence constraints that impose dependencies between tasks on a document. The proper routing of a document is achieved by controlling the sequence in which a document is accessed by various roles.

The operational integrity is maintained by placing restrictions on the kinds of operations (e.g., read, enter, modify, etc.) that a worker in a given role is allowed to perform on fields of a document. This is done by keeping a workflow control matrix that specifies the permissible operations that can be performed by a given role. Once a document is accessed by a worker, he or she will be notified of the permissible operations by the system. Eventbased constraints can be used to trigger special actions to take place especially when an unusual event Occurs. The workflow manager moves the documents among the baskets after each task is completed by consulting the control matrices, the sequence constraints, and the event-based constraints. This is how the system does automatic authorization and control of access and operations.

The workflow control matrix restricts the operations that a worker in a certain role may perform on a document. This matrix is sequence independent but it is possible to enforce a sequence of operations between a pair of employees.

An alternative, and possibly more concise, way of specifying the permissions is by means of explicit statements such as: Permission([ROLE].DOC[.FIELD].[OP] )=y /n. The default value of all permissions would be “n”, unless explicitly overridden by a permission statement.  If the role entry (in the above syntax) is missing, then the statement would apply to all roles.  Similarly, if the field or operation entry is missing, the statement would apply to all fields or operations.

When a document moves within the organization, the sequence in which changes (or updates) are made to it is recorded, and is called the document history. If the exact sequence that a document must take each time is known before hand, it can be specified as a complete ordering; however, in general, the sequence can change because alternative paths might be acceptable, certain steps might not be essential, or an employee might be absent, etc. Therefore, the goal of sequence maintenance is to provide a mechanism whereby a set of constraints can be used to define a partial ordering on the document history and the workflow management system would enforce those constraints. A document history is considered legitimute or admisszble if none of the constraints is violated.

Classified as : (1) time-based condition based on elapsed time eg : IF AGE(doc1D) > 10 THEN SEND(doclD,*,blO) (2) access pattern of a document eg : IF REWORK(w5,docID) = 5 THEN NOTIFY(docID, “rework 5 times”,w5, bll) (3) combination of access pattern and elapsed time eg : IF AGE(doc1D) > 10 AND SEND( docID,*,b10). REWORK(w5,docID) >2 THEN

(4) special conditions that depend upon field values eg : IF VALUE(docID.fl) > THEN ROUTE( docID,b 10) (5) special conditions that depend upon changes made to field values eg IF INC(docID.fl) > 5000 THEN ROUT E (do CID, b 10).

THANK YOU !!