home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Power Tools 1993 October - Disc 2
/
Power Tools (Disc 2)(October 1993)(HP).iso
/
hotlines
/
network
/
msgbb
/
whtpap.txt
< prev
Wrap
Text File
|
1993-04-13
|
14KB
|
251 lines
Enterprise Communications through Messaging Backbones
Information management is currently undergoing a series of rapid
changes. As organizations streamline to compete in the global
economy, new challenges are facing their IS departments.
Information resources, mission critical to most dynamic
enterprises, must become global resources. No function, whether
professional or clerical, can accomplish its objectives without
access to reliable, consistent and readily available data.
The objective of computer networks is to provide a mechanism for
access and manipulation of information. In most organizations,
this information is dispersed across multiple locations. Data is
stored in various formats, in different databases. Applications
reside on a multitude of computer systems made by a variety of
computer vendors. While one computer system may provide a certain
organizational unit with its desired information, the same
information may not be accessible by another, equally concerned,
unit. As a result of mergers, acquisitions and re-structuring, the
sharing of information on an enterprise-wide scale have in many
organizations become almost impossible. Due to the proliferation
of incompatible legacy systems and networks, business suffers.
What is needed is a new strategic direction for information
processing. A strategy that will support the needs of the global
enterprise. This strategy must be based on four key pillars;
Flexibility; the capability to optimize the use of available
resources. Shared resources that are transparently accessible
reduce an overall system cost by limiting the use of duplicated,
and often idle, resources.
Interoperability; as in enabling transparent access to and from
various computing platforms. This will protect investments in
existing systems and applications.
Ease of Use; in terms of operation as well as in development of
applications. User interfaces, as well as application programming
interfaces need to be consistently deployed throughout the system.
Management; providing IS departments with the ways and means to
handle moves, adds and changes, as well as guaranteeing the
integrity and performance of the networked system.
A Roadmap to Success
Complex computer integration projects have a greater likelihood of
success when based on an overall strategic plan. Such a plan must
clearly define the role of information, information processors and
communications equipment as related to the enterprise. Executive
commitment must be clear and unambiguous, and communicated
throughout the organization. It is also necessary to correlate the
plan with the overall enterprise mission objectives. These must be
clearly defined strategic directions, worth pursuing, and still
relevant when reached. A messaging backbone is a means, not an
end. As such, it must support the enterprise mission over the
foreseeable future.
The plan should allow for steady development and progression of
capability, based on backward compatibility and interoperability.
Resources and functionality may be added gradually or rapidly,
depending on preference and need. As technology evolves, the plan
should address issues such as procurement upgrades, manpower,
resource allocations and system capabilities.
Prior to soliciting supplier input some basic groundwork is
necessary. The organization must determine functional workloads,
and define application processes. Characterization of information
flow is necessary in terms of transaction volumes, communication
patterns and response time requirements.
A recommended study for future procurement purposes thus needs to
answer questions some basic questions, such as the following;
#1 How many messages will be sent in a given time period?
#2 What is the average size of a message? Minimum? Maximum?
#3 What is the distribution over time? Peak data rates?
#4 What are the distribution patterns? Hubs? Spokes?
#5 What are the response time requirements? Turnaround time?
#6 What are the topology concerns? Geographic constraints?
#7 Which are the applications concerned? Real-time?
#8 What are the application availability requirements? Uptime?
#9 What are the interoperability constraints? Legacy systems?
The answers will form the basis of a functional network
specification. Combined with the overall strategic direction,
specifying the degree of openess of the desired system, a solid
request for information, RFI, can be created. It is recommended to
distribute the RFI to a large number of potential suppliers, in
order to obtain a broad perspective of possible deployment
options. The supplier input must then be studied in detail, as it
will give the initial parameters for the central portion of the
future networked system, the messaging backbone.
The Messaging Backbone
Residing at the core of an enterprise information system is the
messaging backbone. This term defines the central infrastructure
of any global information system. The messaging backbone supports
a variety of business applications, ranging from electronic mail
to fully automated order systems. To satisfy the demands of these
applications, it must be able to integrate applications software
from a multitude of developers, computer hardware from multiple
vendors, and network services from several providers.
Only a messaging backbone relying on a high degree of
standardization can accomplish this task. The International
Standards Organization, ISO, together with the International
Telegraph and Telephone Consultative Committee, better known under
its french acronym, CCITT, has developed and published such a
standard. It is called the X.400 message handling system. Products
based on the original specification of 1984, as well as the
revised 1988 version, is rapidly being deployed across the world
by governments and businesses alike.
X.400 MHS provides a basic store and forward messaging
environment, architecturally designed in a modular fashion. The
basic components comprise user agents, message transfer agents and
message stores. These interact through a set of common rules, or
protocols, named P1 through 7. Underneath these services lie the
mechanisms for reliable transport of data and routing of
information packets. These mechanisms are based on other CCITT and
ISO standards such as X.25.
Supporting the store and forward capabilities is another
specification, called CCITT X.500 directory services. X.500 DS
provides a distributed data base function, similar to the phone
directory's yellow pages.
Application access to the X.400 and X.500 services is provided by
equally standardized programming interfaces. The X/Open Company
Ltd., a UK based non-profit organization publishes a set of so
called portability guides. An application using an X/Open
sanctioned programming interface can be moved from one computer
system to another with minimum effort, providing the basic
environment stays the same.
These three components, X.400, X.500 and APIs suffice to provide
application support for basic messaging services, such as
electronic mail. For enhanced services, additional standardization
protocols are needed. The transmission of compound documents
incorporating text, graphics and images, or the exchange of
business documents such as orders, waybills, invoices and
payments, require standardized formats. These formats exists in
two forms. Compound documents use the office document
architecture, ODA. Business applications use the electronic data
interchange format, EDI.
Choosing a Backbone Supplier
Given that products adhering to common specifications are
inherently alike, what are the criteria for selecting a supplier?
Price? Availability? Potential?
The answer lies in the suppliers capacity for solving the business
needs. This capacity can be determined through the use of a
procurement model called the Greatest Value Approach, commonly
used by federal agencies in the US. The greatest value is
determined by the cost of ownership, rather than by the price tag
attached. Suppliers are selected after being subjected to
multi-step process;
First, a solicitation is issued, requesting the functionality
determined by the RFI evaluation. The solicitation, or request for
proposal RFP, includes technical as well as cost aspects. Based on
the replies, a competitive range is established, and suppliers
outside of the range eliminated. Bidders within the competitive
range are notified and allowed oral and written discussions of
their proposal. At the end of these discussions they are asked to
submit their final offers. These are evaluated in accordance with
the solicitations evaluation factors. An award is then made to the
chosen supplier estimated to offer the greatest value to the
agency. Unsuccessful bidders are notified and debriefed.
The key to this process is the source selection plan, a
three-pronged approach to evaluation of information technology
bids. It consists of a technical evaluation plan, a cost
evaluation plan and a management plan.
The technical evaluation plan determines the criteria and the
relative importance of these criteria to the solution of the
business need. It is imperative that the criteria are relevant,
measurable and essential. In general, less is better, to ensure
stringency and to avoid a leveling of the field. Suggested
criteria include the following;
Application integration capabilities
Interoperability capabilities
Ease of implementation
Performance numbers
Ease of use
Data security and integrity
Network Management
Supplier stability
For each, a minimum value should be determined, in qualitative
terms or quantitative terms as applicable. Note, however, that
quantitative standards are definitive in nature and easier to
value. It is recommended to use score sheets, with limits on
minimum acceptable threshold values, as well as desired range
values. The relative weight of each criteria should be defined
well in advance, based on the functional requirement
specification.
The cost evaluation plan needs to address its subject in a similar
manner. What is the cost per unit required, of installation time,
usage, management and support? What are the buying parameters,
volume discounts, current availability and cost of delayed
availability? What is the amount of training required, and its
associated cost? The result of these answers must then be
subjected to the alternatives; other technical approaches, limited
deployment or no implementation at all.
Finally, a management plan is necessary. This plan addresses the
issues involved in actually deploying what is being considered for
purchase. Transition from the existing environment to a new
paradigm must be evaluated. Implications for organizational change
must be addressed. What are the potential suppliers consulting and
support capabilities?
Conclusion
Few suppliers of communications equipment has the broad range of
products and services necessary for providing an enterprise
messaging backbone. Even fewer have a solid commitment to
internationally agreed upon standards. When choosing a backbone
supplier, make sure that four key requirements are satisfied;
Flexibility in the provision of scalable solutions that will meet
today's as well as tomorrow's requirements.
Interoperability achieved through the adherence to international
standards for communications protocols as well as applications
integration.
Ease of use, in terms of operation, development and management
alike.
Integrity and security of data throughout the open system.
If the vendor can provide satisfactory answers to the basic
requirements above, a lower cost of ownership will be hard to
find.