Integrated Information Infrastructure Reference Model


Basic Concepts | High-Level View | Detailed Taxonomy

This chapter describes the Integrated Information Infrastructure Reference Model (III-RM), in terms of its concepts, an overview, and taxonomy.

Basic Concepts

This section looks at the basic concepts of the III-RM, including background, components, and drivers.

Background

With the emergence of Internet-based technologies in recent years, for many organizations the main focus of attention, and the main return on investment in architecture effort, has shifted from the Application Platform space to the Application Software space. (Indeed, this has been one of the drivers behind the migration of TOGAF itself from a framework and method for Technology Architecture to one for overall enterprise architecture.)

The TOGAF Technical Reference Model (TRM) described in Foundation Architecture: Technical Reference Model focuses on the Application Platform space, and it is what the Enterprise Continuum terms a "Foundation Architecture".

This section describes another reference model, one that focuses on the Application Software space, and one that is a "Common Systems Architecture" in Enterprise Continuum terms. This is the Integrated Information Infrastructure Reference Model (III-RM).

The III-RM is a subset of the TOGAF TRM in terms of its overall scope, but it also expands certain parts of the TRM - in particular, the business applications and infrastructure applications parts - in order to provide help in addressing one of the key challenges facing the enterprise architect today: the need to design an integrated information infrastructure to enable Boundaryless Information Flow. These concepts are explained in detail below.

This introductory section examines the concept of Boundaryless Information Flow; why an integrated information infrastructure is necessary to enable it; and how the III-RM can help the architect in designing an integrated information infrastructure for their enterprise.

Components of the Model

Like the TOGAF TRM, the III-RM has two main components:

  1. A taxonomy, which defines terminology, and provides a coherent description of the components and conceptual structure of an integrated information infrastructure
  2. An associated III-RM graphic, which provides a visual representation of the taxonomy, and the inter-relationship of the components, as an aid to understanding

The model assumes the underlying existence of a computing and network platform, as described in the TRM; these are not depicted in the model.

Relationship to Other parts of TOGAF

The relationship of the III-RM to the TRM is explained above.

Although the III-RM is intended as a useful tool in the execution of the TOGAF Architecture Development Method (ADM), it is important to emphasize that the ADM is in no way dependent on use of the III-RM (any more than it is dependent on use of the TRM). Other taxonomies and reference models exist in this space that can be used in conjunction with the ADM, and indeed may be preferable for some organizations.

Key Business and Technical Drivers

Problem Space: The Need for Boundaryless Information Flow

The Boundaryless Information Flow problem space is one that is shared by many customer members of The Open Group, and by many similar organizations worldwide. It is essentially the problem of getting information to the right people at the right time in a secure, reliable manner, in order to support the operations that are core to the extended enterprise.

In General Electric, Jack Welch invented the term "the Boundaryless Organization", not to imply that there are no boundaries, but that they should be made permeable.

Creating organizational structures that enabled each individual department to operate at maximum efficiency was for a long time accepted as the best approach to managing a large enterprise. Among other benefits, this approach fostered the development of specialist skills in staff, who could apply those skills to specific aspects of an overall activity (such as a manufacturing process), in order to accomplish the tasks involved better, faster, and cheaper.

As each overall activity progressed through the organization, passing from department to department (for example, from Design to Production to Sales), each department would take inputs from the previous department in the process, apply its own business processes to the activity, and send its output to the next department in line.

In today's world where speed, flexibility, and responsiveness to changing markets make all the difference between success and failure, this method of working is no longer appropriate. Organizations have been trying for some time to overcome the limitations imposed by traditional organization structures. Many business process re-engineering efforts have been undertaken and abandoned because they were too ambitious, while others cost far more in both time and money than originally intended.

However, organizations today recognize that they need not abandon functional or departmental organization altogether. They can enable the right people to come together in cross-functional teams so that all the skills, knowledge, and expertise can be brought to bear on any specific problem or business opportunity.

But this in turn poses it own challenges. CIOs are under enormous pressure to provide access to information to each cross-functional team on an as-required basis, and yet the sources of this data can be numerous and the volumes huge.

Even worse, the IT systems, which have been built over a period of 20 or 30 years at a cost of many billions of dollars, and are not about to be thrown out or replaced wholesale, were built for each functional department. So although it may be possible to get people to work together effectively (no minor achievement in itself), the IT systems they use are designed to support the old-style thinking. The IT systems in place today do not allow for information to flow in support of the boundaryless organization. When they do, then we will have Boundaryless Information Flow.

Solution Space: The Need for Integrated Information Infrastructure

The Open Group's Interoperable Enterprise Business Scenario1 originally published in 2001, crystallizes this need for Boundaryless Information Flow and describes the way in which this need drives IT customers' deployment of their information infrastructure.

In this scenario, the customer's problem statement says that I (as the customer enterprise) could gain significant operational efficiencies and improve the many different business processes of the enterprise - both internal processes, and those spanning the key interactions with suppliers, customers, and partners - if only I could provide my staff with:

The infrastructure that enables this vision is termed the "integrated information infrastructure".

As an example, one current approach to integrated information infrastructure is to provide "enterprise portals" that allow integrated access to information from different applications systems enterprise-wide, via a convenient, web-enabled interface (one of the colored segments in the ends of the cylinder in An approach to Boundaryless Information Flow (Enterprise Portals)).



Figure: An approach to Boundaryless Information Flow (Enterprise Portals)

One of the key challenges for the architect in today's enterprise is to work out, and then communicate to senior management, how far technologies such as web services, application integration services, etc., can go toward achieving an integrated information infrastructure, and realizing the vision of Boundaryless Information Flow, in the enterprise concerned.

The Open Group's follow-up analysis of the Interoperable Enterprise Business Scenario has resulted in the development of an integrated information infrastructure model (the III-RM), which depicts the major components required to address the Boundaryless Information Flow problem space, and can help the architect in this task.

The III-RM thus provides insights related to customer needs for Boundaryless Information Flow in enterprise environments. The model also points to rules and standards to assist in leveraging solutions and products within the value chain.

The following subsections discuss the model in detail.

Health Warning

The III-RM is documented as it stands today, and is by no means considered a finished article. However, it is a model that has been developed and approved by the members of The Open Group as a whole, in response to the Interoperable Enterprise Business Scenario, which itself was developed in response to an urgent need articulated by the customer members of The Open Group for assistance in this field.

The Business Scenario and the Reference Model thus represent a problem and a solution approach that The Open Group membership as a whole fully endorses.

It is hoped that publication of the model as part of TOGAF will encourage its widespread adoption and use, and provide a channel of communication whereby experience with use of the model can be fed back, improvement points assimilated, and the model refined and republished as necessary.

High-Level View

This section provides a high-level view of the III-RM, including derivation of the model, high-level graphic, and components.

Derivation of the III-RM from the TRM

The III-RM is a model of the major component categories for developing, managing, and operating an integrated information infrastructure. It is a model of a set of applications that sits on top of an Application Platform. This model is a subset of the TOGAF TRM, and it uses a slightly different orientation.

Consider TOGAF TRM Orientation Views where two views of the TOGAF TRM are presented. The left side is the familiar view of the TOGAF TRM; it is a side view, where we look at the model as if looking at a house from the side, revealing the contents of the "floors". The top-down view on the right-hand side depicts what one might see if looking at a house from the "roof" down.



Figure: TOGAF TRM Orientation Views

The subset of the TRM that comprises the III-RM is depicted in Focus of the III-RM , in which those parts of the TRM not relevant to the III-RM are "greyed out".

Focus of the III-RM illustrates that the focus is on the Application Software, Application Platform, and qualities subset of the TOGAF TRM.



Figure: Focus of the III-RM

The High-Level III-RM Graphic

The resulting III-RM itself is depicted in III-RM - High-Level . It is fundamentally an Applications Architecture reference model - a model of the application components and application services software essential for an integrated information infrastructure. (There are more business applications and infrastructure applications than these in the environment, of course, but these are the subsets relevant to the Boundaryless Information Flow problem space.)



Figure: III-RM - High-Level

As explained above, the model assumes the underlying existence of a computing and network platform, and does not depict them explicitly.

Although the computing and network platform are not depicted, there may be requirements on them that must be met, in addition to requirements on the components of the III-RM, in order to fully address the Boundaryless Information Flow problem space.

Components of the High-Level III-RM

The III-RM has the following core components:

Detailed Taxonomy

This section provides a detailed taxonomy of the III-RM, including detailed graphic, platform service categories, and external environment sub-entities.

Detailed III-RM Graphic

The detailed III-RM is depicted in III-RM - Detailed .



Figure: III-RM - Detailed

The remaining subsections expand on the taxonomy/component detail shown in III-RM - Detailed .

Business Applications

There are three types of business application in the model:

The overall set of Information Provider, Information Consumer, and Brokerage Applications collectively creates an environment that provides a rich set of end-user services for transparently accessing heterogeneous systems, databases, and file systems.

Information Provider Applications

To the extent that information today can be regarded as being "held hostage", as depicted in Liberate Data Silos to Meet Information Needs of Cross-Functional Enterprise Teams , Information Provider Applications are those applications that "liberate" data from their silos.



Figure: Liberate Data Silos to Meet Information Needs of Cross-Functional Enterprise Teams

Information Provider Applications achieve this by providing an open interface to a potentially proprietary silo interface, as illustrated in Information Provider Applications Liberate Data by Providing Open Interfaces to Data Silos , where the interfaces on the left of the Information Provider Applications are open interfaces and the interfaces between the Information Provider Applications and silo data are proprietary interfaces.



Figure: Information Provider Applications Liberate Data by Providing Open Interfaces to Data Silos
Brokerage Applications

Brokerage Applications serve up single requests that require access to multiple information sources. A Brokerage Application breaks down such a request, distributes the request to multiple information sources, collects the responses, and sends a single response back to the requesting client.

Brokerage Applications access Information Provider Applications using the open interfaces provided by the Information Provider Applications (as described above); they integrate information from multiple Information Provider Applications and pass the integrated information to Information Consumer Applications using open interfaces.

Brokerage Applications also enable access to information within the enterprise by strategic partners.



Figure: Brokerage Applications Integrate Information from Information Provider Applications
Information Consumer Applications

Information Consumer Applications provide information to end users in the form in which they need it, when they need it, and in a secured manner. This includes providing the information in text, video, audio, English, German, etc.

Information Consumer Applications communicate with Brokerage Applications or Information Provider Applications using the open interfaces that the Brokerage and Information Provider Applications provide. Security is provided through the firewalls and/or security services.

Information Consumer Applications Communicate using Open Interfaces depicts the Information Consumer Applications with the security services depicted as the brick pattern.



Figure: Information Consumer Applications Communicate using Open Interfaces

Infrastructure Applications

There are two types of Infrastructure Application in the model:

Development Tools

The Development Tools component of the model comprises applications that take the form of tools for modeling, designing, and constructing the integrated information infrastructure. Specifically, it includes tools for business, process, and data modeling, as well as the traditional application construction tools that transform the business model into software that automates the business processes revolving around information.

Note that each set of tools will be logically connected through a directory, allowing one tool to be driven by data from another. The following sections describe the requirements for components of Development Tools. The tool set also includes a repository.

Business Modeling Tools

This category covers tools for the modeling of business rules and business process rules.

Business modeling describes and documents the business in a comprehensive knowledge base. It establishes a consensus among general management of the business direction, organization, processes, information requirements, and the current environment of the business. Perhaps most importantly, this understanding is documented in a common, business-oriented format to be utilized for subsequent enhancement.

Design Modeling Tools

This category covers tools for designing, defining, and documenting the most pertinent IT elements of the business based upon the business and business process rules. Examples of elements to be designed include: connections between people, organizations, workflows and computers; data and object models; physical data translation and translation rules; and constraints.

Implementation and Construction Tools

Implementation tools enable timely development of re-usable processes, applications, and application services. Such tools include intelligent browsers, data manipulation language compilers and optimizers, distributed application compilers and debuggers, heterogeneous client and server development tools, policy definition tools, and workflow script generation tools.

Data Modeling Tools
Deployment Tools

Deployment tools are necessary to move implemented software from the development environment into the operational environment.

Libraries

This component includes re-usable libraries of software that use the standards of the operational environment.

Management Utilities

This category covers applications that take the form of utilities for operations, administration, and systems management, and for the management of data based on availability and cost requirements. Such utilities may execute in an attended or an unattended environment.

Operations, Administration, and Management (OA&M) Utilities

The OA&M component covers traditional systems management and administration utilities that manage business rules and information objects. Examples include: utilities for installation, copyright and license management; and miscellaneous administration, configuration, and registration functions. Additionally there are utilities for the control of service billing, service triggering, and account management.

Quality of Service Manager Utilities

These include health monitoring and management utilities.

Copy Management Utilities

Copy Management utilities are those that manage data movement from any given operational system to necessary distribution points in the enterprise, in order to ensure the maximum leverage of operational systems data. They also include tools that detect and flag poor quality data.

Storage Management Utilities

These are utilities that provide least-cost data storage management. Storage management utilities support the wide variety of storage mechanisms and are connected to file, object, and database systems.

Application Platform

All the different types of application described above are built on top of the services provided by the Application Platform.

The Application Platform component of the III-RM comprises a subset of all the services defined in the TOGAF TRM, the subset that pertains to integrated information infrastructure. Specifically, it comprises all those services in the TRM Application Platform that allow applications to focus on understanding and processing the information required, rather than understanding the form, format, and/or location of the information.

The services of the Application Platform component can be used to support conventional applications as well as Brokerage, Information Consumer, and Information Provider applications. When used as part of an overall Applications Architecture in this way, such an approach enables maximum leverage of a single operational environment that is designed to ensure effective and consistent transfer of data between processes, and to support fast and efficient development, deployment, and management of applications.

The Application Platform component comprises the following categories of service.

Software Engineering Services
Security Services
Location and Directory Services

Location and directory services provide access facilities for name, location, description, and relationship data that describes the integrated information infrastructure.

Directory services support the deployment and enterprise-wide availability of an integrated information infrastructure directory. The data in the directory is made available to all other components in the architecture model.

Juxtaposition of Location and Directory Services to Other Components depicts the juxtaposition of location and directory services to the other components.



Figure: Juxtaposition of Location and Directory Services to Other Components

Specific services include:

Human Interaction Services

Human Interaction services provide the means to consistently present data to the end user in the appropriate format. They comprise services that assist in the formulation of customer data requests and enable visualization and presentation of the data accessed.

Specific services include:

Data Interchange Services

Specific services include:

Data Management Services

Specific services include:

Information access services provide the ability for an application to access an integrated view of data, regardless of whether the data exists in a mainframe system or in a distributed system. The information access services ensure that data integrity is maintained among multiple databases, and also provide online data cleansing (whereby data is checked against data rules for each access).

Data access services provide open interfaces to legacy data, provide new applications standard database access services to vast amounts of existing data, and provide standard access services to new data types.

Additional Operating System Services

Specific services include:

These additional services enable the flow of information, as depicted in Workflow Services Enable Information Flow .



Figure: Workflow Services Enable Information Flow

Workflow denotes the concept of automating processes by facilitating user interactions and executing applications according to a process map. Workflow services enable integration of enterprise applications, resulting in applications of extended value.

Workflow services also address the needs of managing an environment where legacy systems are prevalent.

Workflow services also provide a means to encapsulate existing applications, thereby supporting customer needs for leverage of existing assets.

Qualities

The qualities component of the model is supported by quality of service services, including the various services required to maintain the quality of the system as specified in Service Level Agreements (SLAs).

Included in this are the services to post conditions to, and react to requests from, the Quality of Service Manager.


Footnotes

1.
Available at www.opengroup.org/bookstore/catalog/k022.htm.


return to top of page



Navigation

The TOGAF document set is designed for use with frames. To navigate around the document:



return to top of page


Downloads

Downloads of the TOGAF documentation, are available under license from the TOGAF information web site. The license is free to any organization wishing to use TOGAF entirely for internal purposes (for example, to develop an information system architecture for use within that organization). A hardcopy book is also available from The Open Group Bookstore as document G063.


Copyright © 1999-2006 The Open Group, All Rights Reserved
TOGAF is a trademark of The Open Group