The Network and Architectural Issues of Enterprise System Evolution Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The objective of this report is to discuss the issues and solutions thereof that arise in the evolution of enterprise system architecture as a result of organization and business growth. The decentralization of legacy monolithic centralized enterprise network architecture has evolved into distributed client-server architecture with a TCP/IP network backbone. Processing tasks and databases reside on different computing platforms; these servers are connected to the enterprise WAN/LAN. The clients on user personal computers connected to the enterprise WAN/LAN can retrieve data from the servers. The distributed architecture requires cooperated computing between processes and databases located on different servers in order to accomplish the task.

The distributed architecture with cooperated computing has resulted in the replacement of mainframe computers with small hardware platform domains. These domains have a network backbone and are the repository of mission-critical corporate data (Nezlek, 1999). The appropriate and coordinated enterprise architecture has the following benefits (Nezlek, 1999):

  1. Reduction of undesirable redundancy of system components,
  2. Appropriate allocation of information processing functions to platforms,
  3. Meaningful allocation of computing resources to organization locations and
  4. Ability to share information resources across organizational entities at a manageable cost.

Enterprise System Evolution Issues

The following issues have been identified and discussed in this report:

  1. The organization of network resources must provide management control automation to prevent conflicts, to avoid redundancy of data for system integrity and for automation of management control.
  2. The legacy systems must be utilized to reduce the equipment cost. The new system architecture must, however, ensure that the use of legacy systems must not increase system operational costs.
  3. The above two points must also consider the security of network resources and information processed and stored on these resources.
  4. The system architecture must provide fast, secure and optimized service to the organization employees and external customers.

Network Resource Organization

The structuring principles for systems architecture to enable management control are (Boutaba, 1995):

  • Identify domains for grouping of resources in order to enable the control of resources and delegation of authority for control. The authority has to be assigned for peer-to-peer conflict resolution and sharing of resources.
  • Identify the control policies for resource and activity management; the policies must be independent of the heterogeneity of resources.

The organization network resources are grouped into domains. Domains are identified based on the function and physical location of the systems. The management responsibilities are then assigned for the independent control of network resources within the domain.

Enterprise Network Domains
Figure 1. Enterprise Network Domains

Enterprise Network Domains

Three domains have been identified; each domain may have sub-domains that are managed in a similar fashion as the parent domain. Each domain has the following interfaces:

  • An external management interface to receive external service requests such as configuration requests, peer-to-peer conflict resolution and remote management.
  • An external user interface to authenticate and authorize users for access to network resources within the domain.

Enterprise Network Client-Server Architecture

By configuring a mission-critical domain, the optimum utilization of resources is achieved, and information sharing and resource maintenance costs are controlled with access control. The design of architecture evolves based on the requirements that determine the technology that shall be used for selecting and configuring the network resources such as file servers (CMS, DMS), processors (CORBA and database servers), database design and bandwidth of physical network link. The development of technology-independent architecture model that shall integrate the newer system with legacy systems requires that no assumption is made about existing technology. The methodology used is (Nezlek, 1999):

Enterprise Network Architecture
Figure 2. Enterprise Network Architecture

Enterprise Network Architecture

  • Identify the business processes,
  • Identify the application and data needs for each business process,
  • Convert imprecise and inconsistent user requirements into atomic requirements in order to standardize requirements,
  • Identify resource requirements for user requirements; the resources may be a flat-file system, RDBMS, OODBMS, etc.
  • Allocate resources for higher priority requirements, such as: 

    Minimization to reduce resource redundancy and improve data integrity

    Localization to improve application performance with resource proximity to the user.

In the latter case, there is an inherent data transmission cost in order to ensure the concurrency of multiple instances of data components. The selected resource allocation strategy shall impact the QoS (Quality of Service) provided to the users.

  • The network capacity planning simulation tool is used to determine resource processing power, memory requirement and network bandwidth based on weighted user requirements. In order to reuse the legacy systems effectively, the technical capacities of these systems may be considered in simulation models.

Legacy system reuse

The organization network resources are traditionally connected with Ethernet cables, WLAN is a new technology, and transition shall require installation of wireless NIC or new laptops, Wireless Access Points (WAP) and securing office buildings from wireless hackers.

An organization that transitions from IPv4 to IPv6 network supports dual-stack on routers in order to provide addressing independent mode interface to personal computers during the transition from IPv4 to IPv6.

 Enterprise 3-tier Architecture
Figure 3. Enterprise 3-tier Architecture

Enterprise 3-tier Architecture

The existing servers may be used in the new architecture model where the performance of legacy technology is not a major issue. The legacy systems are integrated into distributed 3-tier architecture by introducing wrappers on the legacy server (2nd-tier) to integrate into distributed architecture middleware (Juric, 2000). Wrappers shall encode/decode data in compliance with middleware transport protocol (e.g. IIOP, SOAP-XML-HTTP).

  • One of the simulated architecture models is adopted for implementation based on the resource acquisition cost, migration effort, capacity etc. The selected architecture may be implemented with alternative technology in order to reuse legacy systems.
  • The choice of middleware (OMG DORBA, Microsoft COM, and Java RMI) and modelling tools for application development influences the network resource requirement for application deployment.

Network Security

The organization information security policy document must identify the network resources as information assets and assign them the necessary security level. The vulnerabilities of assets are listed by Myerson (2002), also mentioned in the report are data sheets to record the threats and their impact. The overview of security steps implemented is:

  1. Mention the security policy for all network resources in the information security policy. Conduct security audits to comply with federal requirements to ensure that policies are implemented and are up-to-date (Walton, 2002).
  2. Secure personal computers with username & password, firewall and anti-virus software.
  3. The online access to different segments of the network is controlled by the configuration of the access list on the segment gateway router. SSL connections with data encryption are established between client and 1st-tier server to ensure data security.
  4. The access list for username & password authorization and authentication is configured on the 1st-tier server. The access list shall include necessary per-user permissions for the respective services. Thus single username and password may be allocated to users for access to all services.
  5. The organization web server is located in the De-Militarized Zone (DMZ); this zone is located behind the organization gateway router that does not require any authorization. For the privileged data that requires a username and password authentication, the SSL connection is established with the internal database server in D2 that is located behind the firewall router.
  6. For a wireless office, it is necessary that rogue WAP are eliminated, and office building is secured from external wireless network hackers.

APPENDIX

3-tier client-server architecture

The 3-tier client-server architecture consists of the following components:

User interface: This is a thin client where data processing is not required on a user computer. Data processing is a decision-making process; encoding data into XML-SOAP-HTTP messages is not data processing. This is a fat client where decision making based on data is required on the user computer.

  1. 1st-tier: (Presentation) This is the server that receives a request message from the client and performs decision making such as decode messages and determine what action is to be taken. Based on the requested action, file server or database server access may be required. This server also performs user authorization and authentication to determine the credentials of the user.
  2. 2nd-tier: (Application) This is the server that shall process the data stored on the 3rd-tier server in order to perform the task ordered by the 1st-tier server. This activity involves a read-write operation on the 3rd-tier server.
  3. 3rd-tier: (Data) This is the server that stores data that is processed to perform the user task.

In figure 2, the web user accesses the website and all data input to an online form is received by the 1st-tier web server in DMZ. The request is forwarded to a 2nd-tier DB server in DMZ or in domain D2 based on the action required. The associated 3rd-tier DB storage is located in DMZ and domain D2, respectively.

For organization employees, the 1st-tier decision making and authentication authorization is performed by the Ent. (Enterprise) server in domain D2. This server then forwards the request to respective servers in D2. The architecture illustrated in figure 2, uses CORBA middleware in two steps:

  • Between 1st tier & 2nd-tier, the CORBA middleware creates an object list for all other servers connected to the backbone in this domain. This server access list contains access privileges for 2nd tier servers and brokers requests for access to 2nd-tier servers.
  • Between 2nd tier & 3rd tier, the CORBA middleware creates an object list for entities stored on 3rd tier storage devices. The Object Request Broker (ORB) operates on these entities.

References

Boutaba, Raouf. & Znaty, Simon. (1995) An Architectural Approach for Integrated Network and Systems Management. ACM SIGCOMM [Internet], 25(5).

CORBA. OMG.

Gokhale, Aniruddha., Schmidt, C. Douglas., Natarajan, Balachandran. & Wang, Nanbor. (2002) Applying Model-Integrated Computing to Component Middleware and Enterprise Applications. Communications of the ACM [Internet], 54(10).

Juric, B. Matjaz., Rozman, Ivan., Hericko, Marjan. & Domajnko, Tomaz. (2000) Integrating Legacy Systems in Distributed Object Architecture. ACM SIGSOFT [Internet], 25(2).

Myerson, M. Judith. (2002) Identifying enterprise network vulnerabilities. International Journal of Network Management [Internet], 12(3) pp. 135-144.

Nezlek, S. George., Jain, K. Hemant. & Nazareth, L. Derkek. (1999) An Integrated Approach to Enterprise Computing Architectures. Communications of the ACM [Internet], 42(11).

Walton, P. Jinx. (2002) Developing an Enterprise Information Security Policy. ACM [Internet]

A Guide to Harvard Referencing. Leeds Metropolitan University.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, September 4). The Network and Architectural Issues of Enterprise System Evolution. https://ivypanda.com/essays/the-network-and-architectural-issues-of-enterprise-system-evolution/

Work Cited

"The Network and Architectural Issues of Enterprise System Evolution." IvyPanda, 4 Sept. 2021, ivypanda.com/essays/the-network-and-architectural-issues-of-enterprise-system-evolution/.

References

IvyPanda. (2021) 'The Network and Architectural Issues of Enterprise System Evolution'. 4 September.

References

IvyPanda. 2021. "The Network and Architectural Issues of Enterprise System Evolution." September 4, 2021. https://ivypanda.com/essays/the-network-and-architectural-issues-of-enterprise-system-evolution/.

1. IvyPanda. "The Network and Architectural Issues of Enterprise System Evolution." September 4, 2021. https://ivypanda.com/essays/the-network-and-architectural-issues-of-enterprise-system-evolution/.


Bibliography


IvyPanda. "The Network and Architectural Issues of Enterprise System Evolution." September 4, 2021. https://ivypanda.com/essays/the-network-and-architectural-issues-of-enterprise-system-evolution/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1