GIS A RCHITECTURE FOR THE E NTERPRISE M ODELING A T ECHNOLOGY S OLUTION IN UML Robert W. McKitrick Jr. NC Department of Transportation GIS Unit February.

Slides:



Advertisements
Similar presentations
Ch. 2 Protocol Architecture. 2.1 The Need for a Protocol Architecture Same set of layered functions need to exist in the two communicating systems. Key.
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Planning Server Deployments
Deployment Diagrams Depicts a static view of the run-time configuration of Nodes.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
® IBM Software Group © 2006 IBM Corporation Rational Software France Object-Oriented Analysis and Design with UML2 and Rational Software Modeler 04. Other.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
Three-Layer Model Distributed data communications involves three primary components: Networks Computers Applications Three corresponding layers Network.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 5: Planning, Configuring, And Troubleshooting DHCP.
TCP/IP summary Skills: none IT concepts: review This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License.
Networks: HTTP and DNS 1 The Internet and HTTP and DNS Examples.
Component and Deployment Diagrams
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
Networks: HTTP and DNS1 Internet, HTTP and DNS Examples.
Circuit & Application Level Gateways CS-431 Dick Steflik.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lower costs and improve predictability Automation Enable service owners to focus on work that adds business value Reduce error-prone manual activities.
Hands-On Microsoft Windows Server 2003 Networking Chapter 5 Dynamic Host Configuration Protocol.
Storage Networking Technologies and Virtualization Section 2 DAS and Introduction to SCSI1.
Chapter 26 Client Server Interaction Communication across a computer network requires a pair of application programs to cooperate. One application on one.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Unicenter Desktop & Server Management Network Challenges -Latest Revision 11/28/2005.
Chapter 14 Managerial issues in networking. Overview Network design Network management – Hardware – Software Technology standards Role of government and.
DHCP Dynamic Host Configuration Protocol.
Internet Setup in Microsoft Windows Windows Layering Bindings Adding Adapters, Protocols, and Clients TCP/IP Configuration.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
BMC Software confidential. BMC Performance Manager Will Brown.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Virtual Local Area Networks. Should I V-LAN? 1. Security V-LANs can restrict access to network resources.
Protocols and the TCP/IP Suite
Chapter 5 Section 2 : Storage Networking Technologies and Virtualization.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Network Connectivity Use Case Modeling and YAML Syntax
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Access Control List (ACL)
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
ACCESS CONTROL LIST.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
1 Technical & Business Writing (ENG-715) Muhammad Bilal Bashir UIIT, Rawalpindi.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
CheckPoint Reporting System for Seismic Surveys Setting Up for Multiple Users December 2012 Mid Point Geo Limited PO Box 7437 Reading Berkshire RG27 7HQ,
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
Computer Communication: An example What happens when I click on
TCP and UDP Ports. 1.The TCP part of TCP/IP stands for Transmission Control Protocol, and it is a reliable transport-oriented way for information to be.
1 Objectives Discuss the basics of Dynamic Host Configuration Protocol (DHCP) Describe the components and processes of DHCP Install DHCP in a Windows Server.
Identifying classes, Packages and drawing class Diagrams, Object Diagrams and composite structure diagrams Week 07 1.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
Ch. 2 Protocol Architecture. 2.1 The Need for a Protocol Architecture Same set of layered functions need to exist in the two communicating systems. Key.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Contents Software components All users in one location:
Direct Attached Storage and Introduction to SCSI
Securing the Network Perimeter with ISA 2004
HPE6-A44 Dumps PDF Scalable WLAN Design and Implementation (SWDI) 8 Exam 100% money back guarantee if you will not clear your exam. Are You Worried About.
Wireless OSS Documentation Improvements Roadmap
Direct Attached Storage and Introduction to SCSI
Wireless OSS Documentation Improvements Roadmap
Presentation transcript:

GIS A RCHITECTURE FOR THE E NTERPRISE M ODELING A T ECHNOLOGY S OLUTION IN UML Robert W. McKitrick Jr. NC Department of Transportation GIS Unit February 27, 2015

Communicate Design – GIS Functions (Conceptual Model) – GIS Infrastructure – GIS Clients Simplify Change – Performance Improvements – Version Upgrades – Adding Applications / Services Why Model a GIS Technology Solution?

Communicate Design – GIS Functions (Conceptual Model) Authoring Spatial Data Publishing Spatial Data Using Spatial Data – GIS Infrastructure – GIS Clients

Communicate Design – GIS Functions (Conceptual Model) – GIS Infrastructure Provisioning / Deploying Servers Application Deployment Network Communications – GIS Clients Why Model a GIS Technology Solution?

Communicate Design – GIS Functions (Conceptual Model) – GIS Infrastructure Provisioning / Deploying Servers Application Deployment Network Communications – GIS Clients Why Model a GIS Technology Solution?

Communicate Design – GIS Functions (Conceptual Model) – GIS Infrastructure Provisioning / Deploying Servers Application Deployment Network Communications – GIS Clients

- The System Communication Model shows inter-system communication only (no clients). - Infrastructure accessible by all servers is not shown. e.g. File servers, DNS, administrative consoles, and monitoring systems.

Several layers of firewall.

Note non-standard port for ArcGIS Server. Network protocol is TCP if not specified. Note UDP protocol for SQL Server.

Note Stereotype of >. “Eye glasses” indicate drill down.

For calculating firewall rules, the > aggregates all IP address/port combinations coming into the source to create rules to the target. e.g. The rules from this diagram only woud be: “GisPsProd” is the same element as the one we clicked on to get to this diagram. Any change to either element automatically shows up in both diagrams.

Communicate Design – GIS Functions (Conceptual Model) – GIS Infrastructure – GIS Clients Why Model a GIS Technology Solution?

Similar to the > we use an > stereotype to aggregate firewall rules in these client communication models.

Part of one of the many client communication models. Firewall rules and who has access to what gets complicated very quickly.

NCDOT GIS System - TOC - Top level view having only the initial navigation diagram. - All the diagrams so far are from the “ > NCDOT EGIS” model view.

NCDOT GIS System - TOC - Capturing dependents and dependencies helps to support maintenance and troubleshooting regardless of the issue.

NCDOT GIS System - TOC - Very complex applications require model views of their own.

NCDOT GIS System - TOC - Building blocks

The “Building Blocks” Make the Model

Summary Using UML Stereotypes adds semantics and supports automation Using classifiers simplifies managing changing server types Hundreds of (organized) elements are easily managed with the UML This model evolved over time ROI cannot be quantified but the number of times it is used for documentation and discussion makes it feel like it is worth the work.

Q UESTIONS ?