Welcome!

Java IoT Authors: Elizabeth White, Jnan Dash, William Schmarzo, Pat Romanski, SmartBear Blog

Related Topics: Microservices Expo

Microservices Expo: Article

Considering the SOA Reference Model

Part I - Business Grounds

SOA RM: "...in SOA, services are the mechanism by which needs and capabilities are brought together"

Recently OASIS voted the SOA Reference Model (SOA RM) into a standard. In spite of its high level of abstraction, this model emphasizes the business orientation of SOA. This two-part article will elaborate on the business aspects of the standard. Part 1 discusses one of the possible business grounds for SOA and design-for-changes uses cases. Part 2 will describe several technical design pillars of SOA in light of the standard.

Business Agility
The SOA Reference Model (SOA RM) is the first standard that shifts SOA from a pure technical realm into the business world; you can see it right away from the SOA service description. You can wonder what "needs" and "capabilities" means; why an application in IT, which is considered to be an SOA service, becomes a mechanism; and, finally, where all the technical definitions of interfaces, clients, providers, QoS controls, etc., are. Don't worry, they're all in their places but now they have been repurposed toward business agility.

In particular, the SOA RM says: "the central focus of service-oriented architecture is the task or business function - getting something done." That is, in SOA, we're talking about a business function of the organization rather than about isolated business operations that implement the function today. The function is something the organization cannot exist without; the organization business model is the combination of such functions while the actual implementation of the function is the secondary category. Unfortunately, up 'til now, the majority of IT applications fit exactly into that category. Now SOA creates an opportunity for IT to become the business partner and perform as a function for its enterprise rather than just a support provider.

The SOA RM states that an SOA service operates in an "execution context," which is defined as a "set of technical and business elements that form a path between those with needs and those with capabilities." The standard expands the interpretation of "those with needs" and "those with capabilities"; "those" are not only IT applications and operations, they are the business elements as well, and, moreover, the business elements are first. If IT looks at its organization from the business perspective (versus operational/procedural ones), it can find that very few applications correspond directly to the core business tasks; other applications support a lot of just-this-moment operational requirements that were real years ago. If you add runtime and procedural application integration to this view, it becomes easier to see why IT has difficulties implementing and supporting frequent business changes required by the modern market.

Finally, when explaining how SOA differs from other models, the SOA RM outlines that it reflects business-motivating considerations that are expressed "within service descriptions and service interfaces." This is what SOA brings to the table the first time because a service description in the form of the service contract includes policies that "may also express business-oriented policies - such as hours of business, return policies, and so on." That is, some services in SOA elevate to the level of business entities. Now that it's more clear what "capabilities" are, we are saying that an SOA service can implement much more than the interface "API"; it's responsible for the functional and non-functional aspects, many of which might be invisible to the consumer though the service interfaces. Nonetheless, the invisible capabilities are just as important to the service consumer as the visible ones, because consumers now depend on the honest behavior of the service outside of the consumer's control. For example, your enterprise service engages a third-party service to publish your results on the Internet. Would you like to use that service if you find that it doesn't filter porn ads and they get or can get published with your data?

You are right, not every SOA service is that complex and there are a lot of simple and very useful services that IT can offer. However, the power of SOA is in the services that implement business services and, accordingly, get involved in the risks of real business life. In this article, I will go a step further and elaborate on how a business may be decomposed into elements useful for building SOA service applications, and what the IT managers and architects have to understand and deal with if they really want to modernize IT to be agile in business. That is, the article tries to position SOA as a business-centric application architecture driven by business (not by technology) and organized in a way that is oriented to support business changes, both today and tomorrow.

Business Model Decomposition
Since the SOA RM standard attempts to facilitate an enterprise technical architecture to mind real business functions, it would be worth finding out what they are. This way, one of the working assumptions we make is that every organization operates on the basis of its business model. A business model definition is still evolving; in this article, we'll use the one below:

A business model is "a conceptual tool that contains a set of elements and their relationships and allows expressing the business logic of a specific firm. It is a description of the value a company offers to one or several segments of customers and of the architecture of the firm and its network of partners for creating, marketing, and delivering this value and relationship capital, to generate profitable and sustainable revenue streams."

A business model also has instrumental and structural elements. For example, distribution channels and revenue models are instrumental elements while value configurations (the configuration of activities and resources) and core capabilities (the capabilities and competencies necessary to execute the company's business model) are structural elements. Talking about structural elements of the business model, we can recognize Business Services and Business Processes, the compositions of which constitute core capabilities. Both Business Service and Business Process have internal structures as illustrated in Figure 1 and described below.

The functional organizational decomposition of an enterprise model helps in recognizing its Business Services and Processes. Each Business Service is unique in the organization but may formally be described in the same way as other services. In particular:

  • The foundation of a Business Service is data: The data becomes business data when its business meaning is defined via business metadata. A Business Service specifies methods, activities and/or rules that might be applied to manipulate the business data. Business methods, activities, and rules may be grouped for cooperative execution in different scenarios. The latter have their own methods and rules for composing data processing activities; those compositions are usually called business operations and workflows. The execution of data manipulation methods, activities, and/or rules in business scenarios produces results. The results become business results when corresponding business metadata is defined. The Business Service frequently includes a delivery mechanism of the results to the business consumers although it is optional. (Other important elements of a Business Service such as documentation and audit rules and procedures are skipped here for the sake of simplicity.)

    A Business Service consists of at least one business unit of work, which encapsulates some business data and data processing activities. The entities of the data processing activities are different heterogeneous "things" representing additional data, applications, communication processes, human activities, information containers (e.g., a spreadsheet), and more. The business unit of work defines how a particular business task of the Business Service is implemented. The implementation is not crucial for the enterprise and is the subject of change based on solution availability (including technical ones) and market trends.

    Business Service changes, in its core, are infrequent and usually reflect industry and corporate policies or corporate restructuring. Instead, the Business Service may be extended or split into several new Business Services. What can and may happen to the Business Service is defined in the enterprise business model.

    A Business Process is defined in Wikipedia as:

    "a collection of related structural activities that produce something of value to the organization, its stakeholders or its customers. A business process can be part of a larger, encompassing process and can include other business processes that have to be included in its method. In that context, a business process can be viewed at various levels of granularity."

    In the Business Process, Business Services interact with each other according to special methods, activities, and/or rules. The interactions may be viewed as an exchange of the results (actual or logical) produced by the Business Services. That is, a Business Process consists of methods, activities, and rules for exchanging results between Business Services. Methods, activities and exchange result rules constitute the "things" the enterprise business usually changes to adapt to market needs. The richer the spectrum of changes available and the easier the changes are to do, define the market adaptability and business stability of the enterprise. SOA targets this exact area; however, without implementing Business Services (in addition to the technical services), SOA can't help in the Business Processes.

    At the entrance point into a Business Service, the foreign results become new data and the Business Service's stack starts again. Sometimes, metadata transformation is needed to convert foreign result interpretation into the local one. The transformation may be done either by adding additional metadata (i.e., accepting metadata provided with the foreign results) or by replacing some or all of the foreign metadata with internal metadata - business data interpretation.

    Thus, we can rephrase the goal of SOA:

  • The creation and maintenance of such application architecture that can effectively support corporate Business Services and Business Processes with the highest effectiveness and can quickly adapt to the changes in them.

    Thus, SOA may be viewed as a technical architecture built around an enterprise business model, not around isolated business procedures or just-this-moment operational needs. SOA is supposed to address current and upcoming business requirements, diversity, which is limited by a particular business model. If the business model is unclear in the organization, Services and Processes, SOA won't help but rather will confuse the company a lot.

    Design for Business Changes
    Forrester Research states, "The reality of the digital age is that your business is embodied in your technology - you don't have a business until you have it implemented in your technology base, and your business can change only as fast as your technology can." SOA promises to make the changes faster and easier. Let's observe these changes.
    Looking from the enterprise perspective, we can find three types of possible change in the business that the technology has to support:

    • Changes in the business methodology of doing things (e.g., changes required by the Basel II regulations in financial credit management)
    • Changes in the set of tasks performed by a business service and/or in a business process (e.g., adaptation to the market trends)
    • Changes in the core of the business service, i.e., in the business model, dictated by the market dynamics (e.g., enterprise strategy change)
    SOA can help IT in two ways by:
    1. Offering services that can be easily combined in different compositions
    2. Hiding change implementations behind the service interfaces
    The first way is popular but it has significant pitfalls: to gain certain flexibility in the compositions, the services either have to be quite generic, which hits performance and risks losing control over details, or there should be a lot of fine-grained services available, which makes management and maintenance difficult and you can end up with a significant ballast of in-definite non-reusable services.

    The second way is the IT hope of SOA. However, those who hope are usually forgetting that the changes are not free due to the cost of retesting and revalidating all the dependencies (in the Service Contracts) and the actual support for multiple service versions - not all service consumers "are in need" of the changes at once.

    The following examples illustrate the third way of designing SOA services - the design for changes. This approach is based on an a priori knowledge of the business model and its potential modernization. Certainly, this way does not help in converting the service to a completely new one, but it covers the majority of other, smaller change-cases.

    Access Control System
    Assume we build an access control service based on roles. A user or subject in a role is permitted to operate on a resource - client's data - and perform the activities associated with or defined for the role. The role is equivalent to only one activity, e.g., "read," "write," or "edit."

    Due to business responsibilities, many users may or have to perform several activities but individual role assignment demands costly operational support. The business requires reducing the cost of the access control management and maintenance.

    Traditional Application-Centric Design
    IT decides to simplify management and maintenance by gathering users into groups and each group is assigned multiple roles. That is, all users in the group inherit all the roles from the group. The business objective of reducing costs is reached.

    In a while the market has changed and the client's data has received new internal dependencies. For some users, their duties have become conflicted with the new data dependencies and those users had to be restricted from acting in one of the roles, but they still have to perform in others.

    Since a group has been designed to provide inheritance of all the roles to all group members, the only possible way to restrict a user in the role is to create another group with a reduced set of roles and put those users into a new group. It's easy to imagine that if a group has a relatively small number of associated roles (three, for example), eventually we have to create seven groups to represent all possible combinations of the roles. Considering the realistic number of different clients and original groups in the firm, this becomes a maintenance nightmare. Plus, adding a new role to the initial group increases the number of group variations almost exponentially, and the operational cost rises correspondingly.

    SOA Design Style
    We have started by studding the business model and found that users may be grouped (to make management cheaper) based on their business responsibilities that follow certain corporate policies. This means the grouping should be changed if user activities are in conflict with the policies. Another potential reason for the access change is a reassignment of the business responsibilities to a user. With this business knowledge, the access control service has to be designed in such a way as to accommodate access changes even if current business requirements don't say anything about it (which, actually doesn't mean there isn't any problem).

    Instead of explicit role inheritance from the group to the users, each user becomes associated with a mask specified for the given group. The mask addresses all roles in the group and defines which concrete roles a particular user inherits from the group. As a default, all roles are inherited. If a user's access should be changed, the user's mask is modified and no new masks or groups are created. Plus, the modification may be based on corporate business policies. What we get is this: almost the same savings for the business but it works now and in the future.

    This described case fits into SOA very well because the change may be done behind the service interface transparently for the service consumers. However, if the service has not been designed for change from the beginning, it would be too risky adding the masks later (even behind the interface) because, in case of a mistake, it could create problems with resource access for many users and negatively affect corporate business service.


  • More Stories By Michael Poulin

    Michael Poulin works as an enterprise-level solution architect in the financial industry in the UK. He is a Sun Certified Architect for Java Technology, certified TOGAF Practitioner, and Licensed ZapThink SOA Architect. Michael specializes in distributed computing, SOA, and application security.

    Comments (0)

    Share your thoughts on this story.

    Add your comment
    You must be signed in to add a comment. Sign-in | Register

    In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


    @ThingsExpo Stories
    With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, will discuss the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filte...
    SYS-CON Events announced today that Avere Systems, a leading provider of enterprise storage for the hybrid cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Avere delivers a more modern architectural approach to storage that doesn’t require the overprovisioning of storage capacity to achieve performance, overspending on expensive storage media for inactive data or the overbuilding of data centers ...
    SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies adopt disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advanced analytics, and DevO...
    SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
    Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
    SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
    There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
    As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
    The Quantified Economy represents the total global addressable market (TAM) for IoT that, according to a recent IDC report, will grow to an unprecedented $1.3 trillion by 2019. With this the third wave of the Internet-global proliferation of connected devices, appliances and sensors is poised to take off in 2016. In his session at @ThingsExpo, David McLauchlan, CEO and co-founder of Buddy Platform, will discuss how the ability to access and analyze the massive volume of streaming data from mil...
    WebSocket is effectively a persistent and fat pipe that is compatible with a standard web infrastructure; a "TCP for the Web." If you think of WebSocket in this light, there are other more hugely interesting applications of WebSocket than just simply sending data to a browser. In his session at 18th Cloud Expo, Frank Greco, Director of Technology for Kaazing Corporation, will compare other modern web connectivity methods such as HTTP/2, HTTP Streaming, Server-Sent Events and new W3C event APIs ...
    SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
    Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha...
    Silver Spring Networks, Inc. (NYSE: SSNI) extended its Internet of Things technology platform with performance enhancements to Gen5 – its fifth generation critical infrastructure networking platform. Already delivering nearly 23 million devices on five continents as one of the leading networking providers in the market, Silver Spring announced it is doubling the maximum speed of its Gen5 network to up to 2.4 Mbps, increasing computational performance by 10x, supporting simultaneous mesh communic...
    The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes...
    With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
    Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
    One of the bewildering things about DevOps is integrating the massive toolchain including the dozens of new tools that seem to crop up every year. Part of DevOps is Continuous Delivery and having a complex toolchain can add additional integration and setup to your developer environment. In his session at @DevOpsSummit at 18th Cloud Expo, Miko Matsumura, Chief Marketing Officer of Gradle Inc., will discuss which tools to use in a developer stack, how to provision the toolchain to minimize onboa...
    SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 ad...
    Join us at Cloud Expo | @ThingsExpo 2016 – June 7-9 at the Javits Center in New York City and November 1-3 at the Santa Clara Convention Center in Santa Clara, CA – and deliver your unique message in a way that is striking and unforgettable by taking advantage of SYS-CON's unmatched high-impact, result-driven event / media packages.
    SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...