The Network and Architectural Issues of Enterprise System Evolution Report

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

The objective of this report is to discuss the issues and solutions thereof that arise in the evolution of enterprise system architecture as a result of organization and business growth. The decentralization of legacy monolithic centralized enterprise network architecture has evolved into distributed client-server architecture with a TCP/IP network backbone. Processing tasks and databases reside on different computing platforms; these servers are connected to the enterprise WAN/LAN. The clients on user personal computers connected to the enterprise WAN/LAN can retrieve data from the servers. The distributed architecture requires cooperated computing between processes and databases located on different servers in order to accomplish the task.

We will write a custom essay on your topic a custom Report on The Network and Architectural Issues of Enterprise System Evolution
808 writers online

The distributed architecture with cooperated computing has resulted in the replacement of mainframe computers with small hardware platform domains. These domains have a network backbone and are the repository of mission-critical corporate data (Nezlek, 1999). The appropriate and coordinated enterprise architecture has the following benefits (Nezlek, 1999):

  1. Reduction of undesirable redundancy of system components,
  2. Appropriate allocation of information processing functions to platforms,
  3. Meaningful allocation of computing resources to organization locations and
  4. Ability to share information resources across organizational entities at a manageable cost.

Enterprise System Evolution Issues

The following issues have been identified and discussed in this report:

  1. The organization of network resources must provide management control automation to prevent conflicts, to avoid redundancy of data for system integrity and for automation of management control.
  2. The legacy systems must be utilized to reduce the equipment cost. The new system architecture must, however, ensure that the use of legacy systems must not increase system operational costs.
  3. The above two points must also consider the security of network resources and information processed and stored on these resources.
  4. The system architecture must provide fast, secure and optimized service to the organization employees and external customers.

Network Resource Organization

The structuring principles for systems architecture to enable management control are (Boutaba, 1995):

  • Identify domains for grouping of resources in order to enable the control of resources and delegation of authority for control. The authority has to be assigned for peer-to-peer conflict resolution and sharing of resources.
  • Identify the control policies for resource and activity management; the policies must be independent of the heterogeneity of resources.

The organization network resources are grouped into domains. Domains are identified based on the function and physical location of the systems. The management responsibilities are then assigned for the independent control of network resources within the domain.

Enterprise Network Domains
Figure 1. Enterprise Network Domains

Enterprise Network Domains

Three domains have been identified; each domain may have sub-domains that are managed in a similar fashion as the parent domain. Each domain has the following interfaces:

  • An external management interface to receive external service requests such as configuration requests, peer-to-peer conflict resolution and remote management.
  • An external user interface to authenticate and authorize users for access to network resources within the domain.

Enterprise Network Client-Server Architecture

By configuring a mission-critical domain, the optimum utilization of resources is achieved, and information sharing and resource maintenance costs are controlled with access control. The design of architecture evolves based on the requirements that determine the technology that shall be used for selecting and configuring the network resources such as file servers (CMS, DMS), processors (CORBA and database servers), database design and bandwidth of physical network link. The development of technology-independent architecture model that shall integrate the newer system with legacy systems requires that no assumption is made about existing technology. The methodology used is (Nezlek, 1999):

1 hour!
The minimum time our certified writers need to deliver a 100% original paper
Enterprise Network Architecture
Figure 2. Enterprise Network Architecture

Enterprise Network Architecture

  • Identify the business processes,
  • Identify the application and data needs for each business process,
  • Convert imprecise and inconsistent user requirements into atomic requirements in order to standardize requirements,
  • Identify resource requirements for user requirements; the resources may be a flat-file system, RDBMS, OODBMS, etc.
  • Allocate resources for higher priority requirements, such as: 

    Minimization to reduce resource redundancy and improve data integrity

    Localization to improve application performance with resource proximity to the user.

In the latter case, there is an inherent data transmission cost in order to ensure the concurrency of multiple instances of data components. The selected resource allocation strategy shall impact the QoS (Quality of Service) provided to the users.

  • The network capacity planning simulation tool is used to determine resource processing power, memory requirement and network bandwidth based on weighted user requirements. In order to reuse the legacy systems effectively, the technical capacities of these systems may be considered in simulation models.

Legacy system reuse

The organization network resources are traditionally connected with Ethernet cables, WLAN is a new technology, and transition shall require installation of wireless NIC or new laptops, Wireless Access Points (WAP) and securing office buildings from wireless hackers.

An organization that transitions from IPv4 to IPv6 network supports dual-stack on routers in order to provide addressing independent mode interface to personal computers during the transition from IPv4 to IPv6.

 Enterprise 3-tier Architecture
Figure 3. Enterprise 3-tier Architecture

Enterprise 3-tier Architecture

The existing servers may be used in the new architecture model where the performance of legacy technology is not a major issue. The legacy systems are integrated into distributed 3-tier architecture by introducing wrappers on the legacy server (2nd-tier) to integrate into distributed architecture middleware (Juric, 2000). Wrappers shall encode/decode data in compliance with middleware transport protocol (e.g. IIOP, SOAP-XML-HTTP).

  • One of the simulated architecture models is adopted for implementation based on the resource acquisition cost, migration effort, capacity etc. The selected architecture may be implemented with alternative technology in order to reuse legacy systems.
  • The choice of middleware (OMG DORBA, Microsoft COM, and Java RMI) and modelling tools for application development influences the network resource requirement for application deployment.

Network Security

The organization information security policy document must identify the network resources as information assets and assign them the necessary security level. The vulnerabilities of assets are listed by Myerson (2002), also mentioned in the report are data sheets to record the threats and their impact. The overview of security steps implemented is:

  1. Mention the security policy for all network resources in the information security policy. Conduct security audits to comply with federal requirements to ensure that policies are implemented and are up-to-date (Walton, 2002).
  2. Secure personal computers with username & password, firewall and anti-virus software.
  3. The online access to different segments of the network is controlled by the configuration of the access list on the segment gateway router. SSL connections with data encryption are established between client and 1st-tier server to ensure data security.
  4. The access list for username & password authorization and authentication is configured on the 1st-tier server. The access list shall include necessary per-user permissions for the respective services. Thus single username and password may be allocated to users for access to all services.
  5. The organization web server is located in the De-Militarized Zone (DMZ); this zone is located behind the organization gateway router that does not require any authorization. For the privileged data that requires a username and password authentication, the SSL connection is established with the internal database server in D2 that is located behind the firewall router.
  6. For a wireless office, it is necessary that rogue WAP are eliminated, and office building is secured from external wireless network hackers.

APPENDIX

3-tier client-server architecture

The 3-tier client-server architecture consists of the following components:

Remember! This is just a sample
You can get your custom paper by one of our expert writers

User interface: This is a thin client where data processing is not required on a user computer. Data processing is a decision-making process; encoding data into XML-SOAP-HTTP messages is not data processing. This is a fat client where decision making based on data is required on the user computer.

  1. 1st-tier: (Presentation) This is the server that receives a request message from the client and performs decision making such as decode messages and determine what action is to be taken. Based on the requested action, file server or database server access may be required. This server also performs user authorization and authentication to determine the credentials of the user.
  2. 2nd-tier: (Application) This is the server that shall process the data stored on the 3rd-tier server in order to perform the task ordered by the 1st-tier server. This activity involves a read-write operation on the 3rd-tier server.
  3. 3rd-tier: (Data) This is the server that stores data that is processed to perform the user task.

In figure 2, the web user accesses the website and all data input to an online form is received by the 1st-tier web server in DMZ. The request is forwarded to a 2nd-tier DB server in DMZ or in domain D2 based on the action required. The associated 3rd-tier DB storage is located in DMZ and domain D2, respectively.

For organization employees, the 1st-tier decision making and authentication authorization is performed by the Ent. (Enterprise) server in domain D2. This server then forwards the request to respective servers in D2. The architecture illustrated in figure 2, uses CORBA middleware in two steps:

  • Between 1st tier & 2nd-tier, the CORBA middleware creates an object list for all other servers connected to the backbone in this domain. This server access list contains access privileges for 2nd tier servers and brokers requests for access to 2nd-tier servers.
  • Between 2nd tier & 3rd tier, the CORBA middleware creates an object list for entities stored on 3rd tier storage devices. The Object Request Broker (ORB) operates on these entities.

References

Boutaba, Raouf. & Znaty, Simon. (1995) An Architectural Approach for Integrated Network and Systems Management. ACM SIGCOMM [Internet], 25(5).

CORBA. OMG.

Gokhale, Aniruddha., Schmidt, C. Douglas., Natarajan, Balachandran. & Wang, Nanbor. (2002) Applying Model-Integrated Computing to Component Middleware and Enterprise Applications. Communications of the ACM [Internet], 54(10).

Juric, B. Matjaz., Rozman, Ivan., Hericko, Marjan. & Domajnko, Tomaz. (2000) Integrating Legacy Systems in Distributed Object Architecture. ACM SIGSOFT [Internet], 25(2).

Myerson, M. Judith. (2002) Identifying enterprise network vulnerabilities. International Journal of Network Management [Internet], 12(3) pp. 135-144.

We will write
a custom essay
specifically for you
Get your first paper with
15% OFF

Nezlek, S. George., Jain, K. Hemant. & Nazareth, L. Derkek. (1999) An Integrated Approach to Enterprise Computing Architectures. Communications of the ACM [Internet], 42(11).

Walton, P. Jinx. (2002) Developing an Enterprise Information Security Policy. ACM [Internet]

A Guide to Harvard Referencing. Leeds Metropolitan University.

Print
Need an custom research paper on The Network and Architectural Issues of Enterprise System Evolu... written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2021, September 4). The Network and Architectural Issues of Enterprise System Evolution. https://ivypanda.com/essays/the-network-and-architectural-issues-of-enterprise-system-evolution/

Work Cited

"The Network and Architectural Issues of Enterprise System Evolution." IvyPanda, 4 Sept. 2021, ivypanda.com/essays/the-network-and-architectural-issues-of-enterprise-system-evolution/.

References

IvyPanda. (2021) 'The Network and Architectural Issues of Enterprise System Evolution'. 4 September.

References

IvyPanda. 2021. "The Network and Architectural Issues of Enterprise System Evolution." September 4, 2021. https://ivypanda.com/essays/the-network-and-architectural-issues-of-enterprise-system-evolution/.

1. IvyPanda. "The Network and Architectural Issues of Enterprise System Evolution." September 4, 2021. https://ivypanda.com/essays/the-network-and-architectural-issues-of-enterprise-system-evolution/.


Bibliography


IvyPanda. "The Network and Architectural Issues of Enterprise System Evolution." September 4, 2021. https://ivypanda.com/essays/the-network-and-architectural-issues-of-enterprise-system-evolution/.

Powered by CiteTotal, the best referencing generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1