IAF Book
IAF Book
Framework Explained
Jack van ’t Wout Maarten Waage
l l
Aaldert Hofman
13
Jack van ’t Wout Maarten Waage
Capgemini Nederland BV Capgemini Nederland BV
Papendorpseweg 100 Papendorpseweg 100
3528 BJ Utrecht 3528 BJ Utrecht
Netherlands Netherlands
jack.vant.wout@capgemini.com maarten.waage@capgemini.com
Herman Hartman Max Stahlecker
Capgemini Nederland BV Capgemini Nederland BV
Papendorpseweg 100 Papendorpseweg 100
3528 BJ Utrecht 3528 BJ Utrecht
Netherlands Netherlands
herman.hartman@capgemini.com max.stahlecker@capgemini.com
Aaldert Hofman
Capgemini Nederland BV
Papendorpseweg 100
3528 BJ Utrecht
Netherlands
aaldert.hofman@capgemini.com
# Capgemini SA, 2010 Published by Springer-Verlag Berlin Heidelberg 2010 All Rights Reserved.
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is
concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication
of this publication or parts thereof is permitted only under the provisions of the German Copyright Law
of September 9, 1965, in its current version, and permission for use must always be obtained from
Springer. Violations are liable to prosecution under the German Copyright Law.
The use of general descriptive names, registered names, trademarks, etc. in this publication does not
imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
When I joined Capgemini back in 1996 I was amazed by investment that had
been made in developing Enterprise Architecture, and at the root of this, the
IAF methodology. Back in the mid 1990s the importance of architecture was
dimly recognised but certainly it was not widely understood as a crucial
element of successful enterprise wide IT implementation. A decade later
with the huge growth in the role, the sophistication, and importance of
Information Technology it has become recognized, and established for the
value it brings.
With this recognition has come various forms of ‘standardization’ ranging
from the work of the Open Group and its moves to establish TOGAF as a
common framework, together with ITAC to certify architects, through to a
wide variety of product vendor architects, even to some industry sectors
establishing their own architectures. Has this diminished, or even may be
removed the need for IAF?
Well it might have done if the world had stood still, but it hasn’t. Simulta-
neously the range and complexity of technology has increased, the functionality
has been extended to embrace new front office capabilities and most of all the
externalization and globalization of business has added a whole new extra
dimension. Standardization might have improved connections and interfaces,
and in so doing produced ‘systems’ of apparently limitless extendibility, but it
has done little to improve the necessary ‘understanding’.
So here we are 13 years later, 13 years of consistent development of IAF, and yet
looking ahead the requirement for even more development is clear. But looking
back it’s equally clear to see the value delivered and the foundation it has built in
Enterprises in so many countries. The future will rest of the past, the legacy of
IAF is one of enabling for the future and there are not many areas of technology
where that remark can truthfully be made.
This book records an impressive journey, and points to an important future,
and is written by those for whom Enterprise Architecture and IAF is a
passion. Reading the book will help develop that same passion, as well as
v
vi Foreword
IAF is here to stay! Even though I am very much in favor of open standards
such as TOGAF and ArchiMate, I still say IAF is here to stay! No; the authors
didn’t pay me off to say this, although I wouldn’t say no to a nice bottle of wine.
However, I make this statement out of my own conviction. I’ll explain why in a
moment, but let’s first start with some history.
When I got involved in the field of architecture in 1997, Capgemini was already
working toward the creation of the Integrated Architecture Framework (IAF).
Since then, the IAF has been evolving continuously. Fueled by daily experi-
ences, discussions among architects, ample feedback from client engagements,
the original framework has evolved into its current version.
In the past, Capgemini has been rather shy in communicating about the IAF.
Rather than showing this diamond in the making to the outside world, they kept
it quiet and continued polishing it. In my own past as a full-time Professor at the
University of Nijmegen, I was involved in several architecture related research
activities, such as the ArchiMate project. When I became aware of IAF’s
existence, I immediately challenged Capgemini to more widely publish their
IAF. Meanwhile my curiosity was mounting. To me, IAF provided a welcome,
practice based, complementary view to the results of the ArchiMate research
project. So, when I joined Capgemini at the start of 2008, I was more than
happy to attend a course on IAF. This strengthened my conviction that it was
time for Capgemini to finally produce a book on IAF. There was more than
enough reason to be proud about IAF as a tried and tested architecture frame-
work, and make it available to a wider audience. Therefore, early 2008 I started
a lobby to produce an IAF book, and late 2008 we were finally able to give the
go ahead to the team of authors to do the really hard work and produce the
book. I am really grateful to the author team for their commitment in finishing
this book. It shall be no secret that 2009 has been a difficult year for our
industry. Despite commercial pressures, the authors spent numerous hours in
their spare-time to continue working on this great book on architecture.
vii
viii Preface
So how about open standards? Large parts of TOGAF 9’s content framework
have already been based on IAF. Currently, The Open Group has two comple-
mentary standards for architecture: TOGAF, the method for doing architecture,
and ArchiMate, the language for representing architectures. So is there a future
for IAF amidst all of these standards? Well, in my opinion there certainly is.
Standards evolve based on consensus. As a result, standards can only (and must)
evolve slowly. At the same time, consultancy firms such as Capgemini will
continue to gather their own experiences. This is where company specific frame-
works such as the IAF can play a crucial role. They will allow for faster innova-
tions, leading the direction in which future versions of the standards can evolve.
Therefore, I expect IAF in its next evolution step to become fully compliant to
the TOGAF/ArchiMate tandem, while at the same time going beyond these
standards based on the fast amount of – ever growing – experience embodied in
the IAF. In the first decennium of this century the ‘I’ in IAF stood for integrated
to signify the need to integrate different views and aspects when developing an
architecture. In the next decennium I expect this first ‘I’ to stand for innovating,
to signify the fact that the Innovating Architecture Framework will lead the way
for future versions of the open standards. Therefore, I can say with conviction:
IAF is here to stay!
I sincerely hope you enjoy reading this book, as much as I have enjoyed seeing
the authors write it!
Preface
This book captures and communicates the wealth of architecture experience
Capgemini has gathered in developing, deploying, and using IAF since its
documentation in 1993. It intends to guide the reader through the corners and
crevasses of IAF. We aim to help the reader understand why we have done the
things we did to develop IAF specifically, and the IT architecture profession in
the IT industry more in general. We hope we have achieved our objectives and
readers are welcome to provide us with feedback. This is because we are sure we
are not there yet. The architecture profession in the IT industry still needs a
significant amount of time to mature. Just imagine how long it took architects
in the building industry to come to the point where they are now.
This book has two main objectives. The first is to explain the background and
mindset behind IAF. As IAF usage becomes more widespread over the globe,
more and more people need to understand its background and mindset to fully
benefit from it. The second objective is to capture the body of knowledge we
have been assembling since 1993. It is not uncommon to see the same question
pop up on newsgroups and forums several times throughout the years. This
book not only intends to provide answers to the most common ones, but should
also provide answers to all those questions regarding IAF you have had through
time, but never dared to ask.
Intended Readers
We have written this book with the following readers in mind:
(Potential) Architects who want to thoroughly understand IAF so they can use
it in their environment. This does not mean that one can read this book and
benefit fully from IAF without additional training. Architecture is a trade one
has to learn together with colleagues, in real life.
Others who want to understand architects that use IAF. IAF architects have one
thing in common. They apply IAF in their work. This means they use specific
terminology, especially amongst themselves. People who want to know more
about IAF’s terminology and mindset are also invited to read at least a few
parts of this book (e.g. Chap. 2 or Chap. 4).
Engineers who work with IAF deliverables. Engineers are working together with
architects to create effective solutions that meet certain business objectives.
Thus they might be interested in getting a better understanding of the thinking
behind these IAF deliverables. We recommend taking a look at the physical
artifacts & views (covered in Chap. 3) and IAF’s interplay with solution devel-
opment (covered in Chap. 4).
Participants of the Capgemini’s Architecture Learning Program. Together with
the training experience and this book, architects should not only be able to get
up to speed even quicker but also better prepared than in the past. They will
have a document that they can fall back on when they enter an area of IAF they
have not been in a while. Especially Chap. 3 helps to get a better understanding
of IAF’s artifacts and views.
Experienced IAF architects. Of course experience IAF architects interested in
learning more about the history of IAF or in specific IAF artifacts and their
usage are invited to use the book as an extended glossary.
x Preface
Throughout this book ‘we’ stands for ‘we, as IAF architects’ and thus might not
be limited to just the authors – we hope we captured the thoughts and opinions
of many people who use IAF in their daily work. That’s why the book was
extensively reviewed with a focus on those ideas that make IAF what it is now.
Chapter 1: IAF background, value and strategy explains why IAF was initially
developed, what it has delivered, its added value, and how Capgemini intends to
go on with the framework.
Chapter 2: IAF’s architecture provides insight into the mindset and mechanisms
that are part of IAF.
Chapter 3: IAF’s aspect areas explained gives an overview of the most common
architecture artifacts and views of IAF and shows what the content of the main
elements of the framework are.
Chapter 4: IAF in perspective with other frameworks and methods elaborates on
the different ways IAF can be used in projects, in combination with other tools,
methods and frameworks.
Chapter 5: Applying IAF and using its outcomes shows the best ways IAF can be
used to professionalize the architecture function in an organization.
Chapter 6: Real life case studies exemplifies the use of IAF through the descrip-
tion of a number of real life case studies.
Chapter 7: The making of IAF explains the history of IAF.
Acknowledgements
The Authors are pleased to pass on the following acknowledgements:
IAF would not have existed without the ongoing support of the Capgemini
University. Through the years they have been sponsor for the development of
IAF and the deployment material related to IAF. They have enabled internal
business models that provided the architecture community with the means to
develop their trade through the IAF. Key players from the university have been
Stephen Smith and Régis Chassé.
Another group of people in Capgemini that have sponsored IAF through time is
Global delivery. Especially Mark Standeaven and Bart Groenewoud have helped
us come to where we are today, by sponsoring IAF and the architecture
community.
Of course we also need to acknowledge all of our colleagues that have helped
develop IAF since 1993. We apologize up-front for the names we have
Preface xi
2 IAF’s Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 The Context: The ‘‘Why’’ of IAF . . . . . . . . . . . . . . . . . . . . . . . 7
2.2.1 Vision. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2.3 Objectives. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.2.4 Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.3 Requirements: The ‘What’ of IAF . . . . . . . . . . . . . . . . . . . . . . 10
2.3.1 Requirement: Understand, Structure and Document
Architecture Input . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3.2 Requirement: As Simple as Possible . . . . . . . . . . . . . . 12
2.3.3 Requirement: Split Complex Problems into Smaller,
Resolvable Ones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3.4 Requirement: Cover the Breadth and Depth
of the Architecture Topics Needed to Support
Capgemini’s Mission and Vision . . . . . . . . . . . . . . . . . 12
2.3.5 Requirement: Support All Relevant Types
of Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.3.6 Requirement: Flexibility in Content . . . . . . . . . . . . . . 13
2.3.7 Requirement: Flexibility in Process . . . . . . . . . . . . . . . 13
2.3.8 Requirement: Traceability and Rationalization
of Architecture Decisions . . . . . . . . . . . . . . . . . . . . . . 14
2.3.9 Requirement: Terminology Standardization. . . . . . . . 14
2.3.10 Requirement: Standardized Organization
of Architecture Elements . . . . . . . . . . . . . . . . . . . . . . . 14
xiii
xiv Contents
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Chapter 1
IAF Background, Value and Strategy
To answer the question ‘Why was IAF developed?’ we need to understand why
architecture has become such an important topic in the IT industry. In the 1980s
life in the IT industry was relatively straightforward. There were centrally man-
aged computer systems with ‘dumb terminals’ to do the work. Then departmental
or mini computers started to show up. Short after that, personal computers and
various integration aspects entered into the arena. The IT landscape became
more and more complex. Part of the complexity was that we had to design
solutions in terms of both software and hardware, whereas until then the main-
frame always was implied, and only additional terminals, additional disk space,
and additional processing power were to be considered. Thus we needed tools to
manage this complexity. Architecture was the term that was coined to describe
our activities to successfully manage the complexity. Architecture and Infrastruc-
ture seemed interchangeable notions – we still see some residues of that here and
there – but the link with other aspects was obvious and needed a broader view.
Within Capgemini work began to formalize what we meant with architecture as
part of a transformation program called Snowball that was intended to intro-
duce client-server technology and iterative development into the organization.
Architecture was our approach used to explain how we defined which infrastruc-
ture was needed to support the business. The architecture development method
(ADM)1 became part of the training material in the transformation program. The
ADM was originally developed in the UK and deployed worldwide. It demon-
strated that architecture was a justifiable set of activities in the overall business
transformation process. It provided us with standardized mechanisms and tem-
plates to communicate our architecture development work. The ADM as an
infrastructure architecture method taught us how very beneficial it was to have a
common language, approach and set of tools to do our work.
Another reason for having IAF was that projects were getting bigger and more
complex. The requirement for transnational staffing of the projects also
increased. It was hard to get the right architect in the right place, as they all
did their architecture work their own way, except for the infrastructure archi-
tecture part, which was better aligned across the architects in this area. Within
Capgemini we realized we needed to standardize more of the architecture
activities that we performed.
An additional reason for having IAF was that it would provide us with a means
to communicate what we did, and align ourselves with other professions that
were working on the projects. IAF should not only help us structure our own
work but also allow us to innovate the way we do architecture.
We knew we could not do it all at once, so we needed a ‘framework’ in which we
could position the various architectural subjects to cover. We studied the
available industry frameworks and architecture approaches and could not
find anything that suited our requirements. Thus we decided to develop our
own, and the Integrated Architecture Framework (IAF) was born.
For more than 16 years, since 1993, IAF has proven its value. The framework
has been used in over 3000 projects worldwide, ranging from chip design to the
creation of complete new lines of business for global players. It has been
formally adopted by many organizations outside of Capgemini. Implicitly it
has been adopted by even more organizations, as they requested us to create an
IAF based architecture for them. In doing that we trained their staff to use IAF.
IAF has an elemental line of thought that has proven to be valuable and robust
in many different types of projects. The core mechanisms that form IAF’s basis
are sacrosanct. Traceability of decisions, basing decisions on principles, and
reducing complexity by separating concerns are three of these mechanisms that
can be applied in any situation.
IAF has also proven to be flexible. It can be adopted by all the different types of
projects in which architecture is required. It has been used standalone and in
1
Despite having the same acronym this ADM is not related to the TOGAF ADM.
1.4 IAF Strategy 3
combination with other methods and approaches. This works so well because
IAF was designed as a flexible toolkit, and not as a rigid cookbook. Of course
this flexibility also has its drawbacks. Since IAF is not prescriptive, it is more
difficult to initially understand and use because users have to select their own
tools. They are not told what to do in a step by step fashion.
One of the core principles of the framework, a traceable link between the
business and IT, has proven its value to our customers many times. They
could understand and explain why specific investments were being made. It
was relatively simple to understand the impact of change in a specific area
because of that traceability. One was able to trace back which parts of the
business would be impacted by a specific change in IT, for example in case of an
upgrade of a server, package or database management system.
Another factor that demonstrates IAF’s value is productivity. It is not uncom-
mon to expect an IAF architect becoming productive within hours after on-
boarding a new project. They understand the ‘language’ used, and can almost
immediately start to contribute to the result. For example, a colleague from the
UK once joined a Dutch project and indeed spotted a flaw in the network
architecture within half an hour. Second opinions on architectures created in
one country are sometimes executed by colleagues in another country to ensure
quality. This could not be done effectively without our common IAF language.
IAF is also based on practical experience and knowledge. All Capgemini
architects are encouraged to share their best practices. All version upgrades
have been based on input from real life practitioners. IAF has always focused
on describing what was needed to be done, as well as providing guidance on how
it could be done. This makes it one of the most sophisticated, practically proven,
and documented architecture frameworks in the IT industry.
Because of its focus on architecture content, IAF has proven to be a valuable
tool in combination with TOGAF2. TOGAF 8 focuses on process, and advises
to incorporate other frameworks for the content. This results in a good fit
between TOGAF and IAF which led to the incorporation of IAF elements
into the recently released TOGAF 9. How TOGAF (versions 8 and 9) and IAF
fit together is explained in more detail in Chap. 4.
2
An industry standard architecture framework of The Open Group.
4 1 IAF Background, Value and Strategy
answer this with a clear ‘no’. There are a number of reasons why we intend to
continue with IAF. The three most important ones are elaborated below.
The most important reason for continuing with IAF is the fact that many of our
customers have adopted the framework. They want to protect that investment.
They expect support from Capgemini, and we intend to deliver that support.
A second reason for continuing with IAF as a non open standard is the fact that
Capgemini wants to continue to play a leading role in increasing the maturity of
the architecture profession. To do that Capgemini needs a vehicle that can be
used to improve and test architecture tools under their own control. As IAF is in
our own control we intend to use it as an innovation platform that continuously
provides input to open standards bodies like The Open Group.
Thirdly we want to protect our investment in what matters for us: our
architects.
2.1 Introduction
Explaining IAF must start with the basics, the core elements of the framework.
Actually, our aim is that you understand IAF’s own architecture. Once you
understand IAF’s structure and underlying ideas it will be easier to apply it to
the specific situation you are in. This chapter is all about helping you under-
stand the architecture behind IAF.
IAF applies the basics of general construction methods. All construction meth-
ods have a common approach. They address questions in a specific order. The
order is expressed as interrogative pronouns: Why, what, how, with what.
There are reasons for the sequence of the questions.
If you don’t understand why you need to do something, you can’t work out what
needs to be done. You have to understand the context before you can start
working effectively. Studying the context helps define the scope and objectives,
and thus helps with staying focused. So understanding ‘why’ is the first thing to do.
If you don’t understand what needs to be done (the requirements), you will
never be able to craft the solution. You have to define the requirements before
creating the solution. Once you understand the requirements you are often able
to produce a concept of what is needed. So after understanding why you are
doing something you need to address the ‘what’ question by defining the
requirements (both functional and non-functional) and getting a concept of
the solution.
With a good understanding of the requirements you should be able to design a
logical solution to the problem, answering the question ‘How will the solution
look like’. In other words you structure the solution. You create the solution on
a logical level to enable flexibility. All architectures will take time to implement.
Circumstances as well as real life physical solutions change over time. By
describing the architecture on a logical level you will be able to deal better
with new insights and adapt it at the moment you physically implement a
specific part of the architecture.
Finally you can decide with what physical things the solution can be realized.
This implies allocation of physical things to the logical solution.
A practical example will demonstrate how this all works.
Imagine you are living in a city that has
been built on both banks of a large river.
There are a number of bridges crossing the
river, but traffic has grown through time
and there are constant traffic jams. In two
years time the city is planning to host a big
cultural event, and it wants to show a
modern, young city that is well prepared
to handle all the tourists that are visiting
the event. So, the scope and context of the
problem become clear. A new bridge
needs to be built in the city within 2
years and it should reflect the ‘young,
modern’ look that the city wants. The
‘why’ question should be clear by now.
Now we need to address the ‘what’ question. We need
to find out what the bridge has to do. Does it have to
carry pedestrians? Does it have to carry cyclists? Does it
have to carry cars and trucks? Does it have to carry
trains? How many of each type does it have to be able to
carry during average and peak hours of usage? Which
types and numbers of boats have to be able to pass
under the bridge? What is the river’s required water
flow capacity and what would happen if that were reduced if the bridge were
to have many pillars? What does the patron want it to look like to reflect the
young, modern look? Once these types of questions are answered we have a
clear understanding of the ‘what’ question. We know the requirements and are
able to craft the solution.
The third main step is creating a logical model of the solution, thus answering the
‘how’ question. Now there is a slight snag here. Real life has shown us that there
never is one solution. There always choices, and all solutions are trade-off of
different aspects like cost and performance. So, in
effect, if you think there is only one solution, you
might have to think a little longer. There are solution
alternatives that have to be considered. In this case we
can identify different types of bridges that could pro-
vide sufficient river-crossing capabilities. Some of
them will fit the principles we have defined regarding
‘young and modern’ better than others. Others might
not be able to be built within 2 years. We could even
2.2 The Context: The ‘‘Why’’ of IAF 7
2.2.1 Vision
The vision we had when we started to develop IAF consisted of a number of
elements. The most important goal was that we wanted to be able to provide
world-class services to our clients, and were convinced that architecture was key
in this. The ever increasing complexity and risk in the engagements we were
working on made this obvious. We also needed a robust and mature toolset to
deliver a constant quality of architecture services and a consistent experience
where a client is engaged many times over a period of time. The toolset had to
successfully address the alignment of business and IT. It had to be independent
of a specific architect: the way we work and approach architecture should be
common across all architects. In this perspective we now speak of IAF as a
8 2 IAF’s Architecture
‘design school’, with very specific style, approach and characteristics that we
feel make a difference: for us as Capgemini being a global company delivering
services, and for our clients ranging in size from the Fortune-500 to the local
medium enterprise. In addition to this it had to provide a platform on which we
could expand and improve the architecture profession. We decided up-front
that it had to be based on real-life experience, and not on pure theory. We knew
that we were embarking on a journey with an uncertain destination, and wanted
to base that journey on things that had been proven in the field.
2.2.2 Scope
The original slogan we used in regard to IAF was: ‘For a system to work as a
whole, it must be architected as a whole’. This slogan nicely depicts many
elements that are part of the IAF scope.
The first striking word is ‘system’. What do we mean by ‘system’? We have small
projects that upgrade existing applications to very large programs in which we
support complete post merger integrations of global companies or companies
constantly reinventing themselves. All these types of projects potentially require
some form of architecture. They all create or change a ‘system’. Thus IAF’s scope
needs to cover all types of architecture engagements at all levels in an organization.
Enterprise level – spanning business units –, Business unit (business domain) level
and Solution level. Enterprise and Business unit level are commonly meant for
supporting planning activities. Solution level is aimed at guiding the engineering of
the solution.
The second important word in the
slogan that is related to IAF’s
scope is ‘whole’. Capgemini
always approaches IT from the
viewpoint that it has to support
the business. This implies that
architecture should always be jus-
tified in business terms and trace-
ability to business requirements.
Even when we are architecting a
purely IT system, the business
should provide the objectives
and drivers for the architecture.
The third word in the slogan that
is related with scope is ‘archi-
tected’. IAF is aimed at the architects profession, and should only describe
things for which the architect has the main responsibility. Therefore IAF does
not provide support for the creation of an organization’s vision, mission and
strategy. These are defined as input for IAF. Some basic input that the
2.2 The Context: The ‘‘Why’’ of IAF 9
architect usually derives from the vision, mission and strategy is contained in
IAF to assist architects in collecting input if it is not there. On the other end,
migration planning has also been put out of scope of IAF, because that
activity is not the architect’s main responsibility. In general, migration plan-
ning is a joint exercise with the engagement manager as the responsible person.
IAF also tries to avoid overlap with other professions like business analysis
and engineering. There are many touch points between the architects and
these professions, just like there are many touch points between architects
and engineers in real life construction architecture. This creates a gray area.
Where does the architect stop and the engineer start? The most pragmatic
answer to this question is that there is a difference in focus. The architect
focuses more on how the ‘system’ fits into its environment. The engineer
focuses more on the internal structure of the ‘system’, within the boundaries
that have been set by the architect. In other words: the architects focuses on
the behavior and non functional requirements (‘black box’) while the engineer
on the internal construction (‘white box’).
2.2.3 Objectives
Through time IAF’s objectives have not changed much. The framework has
evolved due to increased understanding of architecture in the IT industry as a
result of the pursuit of the objectives.
IAF’s core objective is to provide a common way of architecting. Originally it
was intended to do this within Capgemini. Nowadays more and more organiza-
tions also adopt this common way of working.
IAF also must provide a communication framework to achieve the common
way of architecting. This ‘common language’ needs to be adopted through-
out our organization and across the regions where we operate, particularly
when serving global clients such as General Motors. This objective has
proven to be difficult to realize – but we feel we succeeded. One word can
have the same definition in multiple countries and still be perceived to be
different. An example that is popular in Capgemini is the confusion we
had around the term ‘Business event’. In the Netherlands this was perceived
as ‘something that can happen in an organization’. In the UK it was
perceived as ‘something that has happened in an organization’. Therefore
it was very understandable for the Dutch to propose basing a to-be archi-
tecture on business events. The UK architects tended to disagree. Their coun-
terargument was: ‘How can you base a to-be architecture on something that has
happened in the past?’
Sometimes we have even invented new words to resolve terminology discus-
sions. A nice example is the term ‘archifact’ that was used in IAF version 3
because we could not come to an agreement at that time on the usage of the term
10 2 IAF’s Architecture
‘artifact’. Another example is the term ‘scenario’ which we later replaced by the
term ‘solution alternative’. Many US architects were confused with the term
‘scenario’, as they associated this term with the movie industry.
The common way of working and common language were enablers for the third
objective that was defined by Capgemini. We have always had the need to staff
large projects from around the world. One of the challenges in doing this was
getting the right person with the right skills in the right place. IAF has proven to
be a great help in achieving this objective specifically due to the common
language.
The fourth main objective also comes from the large projects we work on.
Managing their complexity and thereby reducing project risk is important for
Capgemini because it raises the quality level of the results we deliver to our
clients. Clients have the same objectives.
2.2.4 Constraints
One of the major constraints for IAF is related to its scope. IAF focuses on
things that are the architect’s main responsibility. Topics, that (a) we assist in
and (b) are the main responsibility of other roles in the project, are not to be
positioned within IAF. They will be covered in frameworks that the other roles
use to standardize and professionalize their work.
Another constraint we have implicitly used in the development of IAF is the
focus on business and IT. Real life has proven that any change in an organiza-
tion should be realized by addressing a large number of topics. An acronym that
is sometimes used to describe these topics is COPAFITHJ. In the preparation of
any organizational change we should consider the Commercial, Organizational,
Personnel, Administrative, Financial, Information processing, Technological,
Housing and Judicial impact of that change. In line with the mission of
Capgemini, IAF focuses on process, information and technology. However
the basic structure within IAF can be used to extend the topics that are
addressed. For example one client wanted to add a ‘product architecture’ to
the framework to address commercial aspects while another client wanted a
‘financial architecture’ to address financial aspects.
The vision, scope, objectives and constraints mentioned in the prior sections
are the basis for the requirements that have been defined for IAF. This
section describes the requirements behind IAF. We have chosen an informal
descriptive approach of defining them, in contradiction to IAF based archi-
tectures itself, in which requirements are documented in a formal and
2.3 Requirements: The ‘What’ of IAF 11
Fact: When you define and agree the scope with your principal, you
demonstrate to the client that you really understand the problem. This
frequently leads to a modified scope (larger, smaller, shifted) because
you show what the actual, real problem is.
Fact: When you clearly recap the context, more information about the
scope will emerge.
The objective of the architecture;
Fact: When you don’t have a clear understanding of the objectives of the
architecture (the question which the architecture will answer), you will
not know when your architecture is good enough. A clear objective will
prevent you from going into details that are not relevant from the
perspective of the architecture.
12 2 IAF’s Architecture
Fact: You will almost never architect a green field solution, in which you
will have no constraints from the current state on the architecture you are
designing.
Many architectures can become relatively large and complex. A tried and tested
way to solve large and complex ‘configuration problems’ – which an architec-
ture is – is to split the overall problem into smaller ones that can be resolved, as
long as the identification of the smaller problems is in line with ideas that you
have about the overall solution. IAF is required to support this approach as we
typically design architectures in response to complex situations.
Not every type of architecture requires the same amount of detail when addres-
sing a given topic. For example interfaces might only need to be identified at
enterprise or domain level, while it is very relevant to specify them in detail when
working on a solution or software architecture. Also the granularity of the
architecture’s elements has to be variable. The topics we talk about at enterprise
level (sales, marketing, HR production and finances) are often larger than the
topics we talk about at solution level (order entry, stock level checking, order
picking and order packing).
The content of IAF must be able to cope with these differences and should not
depend on the industry sector where it is applied.
As Capgemini works for many different clients they encounter many differ-
ent situations. Ask any Capgemini architect if they have used the exact same
process to deliver an architecture twice. We promise you that they will say
‘no’ most of the time. For this reason we need to have process flexibility. In
fact we actually need to split process and content. Often we need to be able
to create similar content using different processes. We might be working
together with Capgemini transformation consultants in one engagement
and with consultants from another consulting firm in the other. Both
14 2 IAF’s Architecture
Where possible we need to solve similar problems in similar ways, thus working
toward the common way of architecting. By standardizing the organization of
architecture elements, we will discover similar problems and enable ourselves to
solve them in similar ways.
provide support for both functional and non-functional aspects. IAF must
cover this, in order to develop balanced functional solutions that perform as
desired; for instance, it makes a big difference if you need to support Straight
Through Processing of 100 million orders a day as opposed to manually
supporting 100 orders a day.
If a building architect would deliver results that were insufficient for the
engineers to build the building correctly, the architect would be sued. The
same should go for IT architects. They have to deliver standards, rules, guide-
lines, and specifications in such a way that engineers can build the desired
solution. An additional dimension for this requirement is that engineers are
evolving their way of working, just as we are. When we started forming IAF,
linear development was commonplace, and RUP was just starting to be used.
Nowadays RUP is commonplace, and methods like XP and Agile are becoming
more and more common. The different development methods have different
input requirements. IAF has to cope with that.
A city planning architect would also be fired if he could not deliver what the
city planners needed. Enterprise and domain level architectures are mainly
aimed at supporting planners and portfolio managers. Our output needs to
address their input requirements. Here too we need to be flexible, as planning
and portfolio management in the IT industry are not part of the business
fabric yet.
16 2 IAF’s Architecture
Capgemini has always adopted open standards where they added value to
the products that were being delivered. We have also contributed to an
early architecture standard, IEEE 1003.23. This standard is now obsolete.
It provided input for the famous IEEE 1471/2000 standard, which is
commonly known and used in IT architecture. IEEE 1471 is now also
ISO/IEC 42010. Currently Capgemini is member of The Open Group. We
participate in the development of TOGAF, The Open Group Architecture
Framework.
2.3 Requirements: The ‘What’ of IAF 17
Common questions IT architects have to answer are: ‘How do you know we have
everything?’ and ‘How do you know everything is consistent?’. Many times our
only answer was: ‘You have provided me with the input. You know your
business. Aren’t you confident that we are complete and consistent?’. Of course
this is the wrong answer. IT architects need to be able to demonstrate complete-
ness and consistency. IAF needs to provide mechanisms that demonstrate it.
Thinking in terms of service orientation has been adopted in very early stages
within Capgemini. It clearly added value because it helped address a number of
requirements.
Services have to be defined in such a way that they provide value to the service
consumer. So the consumer has to be able to understand what the service will
provide. This makes communication to the different stakeholders easier, and
helps us to get decisions made.
Services encapsulate their internal structure and expose themselves through well
defined, standardized interfaces. This helps manage complexity and thus sup-
ports one of the main reasons architecture has become a necessity in the IT
industry – managing that complexity.
The quality of service that a service can deliver has to be well defined in order to
the consumer to judge its value. Quality of service covers many non-functional
aspects of the architecture.
Cost reduction is one of the ubiquitous requirements in our industry. Re-use of
services is one of the things we use to reduce costs. Service orientation promotes
re-use.
All the reasons above clarify why IAF needs to apply service oriented principles.
Please note that we use the concept of a service not only in a technological way.
We use this concept as well at business level, e.g. drilling a whole to find oil.
environment through time, simply because they might solve a problem we could
not solve at the moment we created the architecture. One major example in this
area is network bandwidth. Who could have imagined the speed we currently
have 5 years ago? This is the reason to support ‘implementation independent
models’. These models show the structure of the architecture, but do not
contain real life constraints. They can be used as a reference model at the time
a certain part is being implemented.
As our industry is still rapidly evolving, different architecture styles are also
evolving. Two tier client-server has been succeeded by 3-tier and cloud comput-
ing. Product oriented business organization is being replaced by customer
oriented business organization. IAF has to be independent of these evolving
architecture styles to be stable. On the other hand, IAF also has to be able to use
the styles to create a specific architecture.
Different customers will have different tools to create and maintain architec-
tures. We will have to be able to use the different tools in combination with IAF.
We will not link ourselves to one tool environment. Capgemini has developed
a meta model and certification scheme for tool vendors so they can embed IAF
support in their tools.
2.4.1 Introduction
The previous section has described the requirements we have defined for IAF.
Here we will describe the logical structure that has been created to fulfill the
requirements.
2.4 Logical Structure: The ‘How’ of IAF 19
‘With what’
2.4.2.4 Artifacts
Artifacts are the core ele-
ments of IAF and fundamentally describe the architecture.
There are a number of core types of artifact within IAF that are essentially the
same across any of the aspect areas in which they reside. This section describes
these core artifacts. Other artifacts that are specific to an aspect area and
abstraction level will be elaborated in Chap. 3.
Architecture Principles set out the general characteristics of the desired archi-
tecture and why it should be as it is. Principles are initially represented at the
start of an architecture engagement; however they are often expanded and
enumerated throughout the architecture process as architecture details are
expanded, or as a result of better understanding of the business objectives.
Services are the architecture’s fundamental building blocks. A service describes
an ‘element of behavior’ or function needed in the architecture. The description
of a service describes what it does, rather than how it is done. This implies that
services are defined in the ‘what’ abstraction level.
Components are sets of services that are organized in accordance with the
Architecture Principles and business objectives. The way IAF works with
services and components is much different from many other architecture frame-
works. See Sect. 2.4.2.10 for a detailed explanation. Components are defined in
the ‘how’ and ‘with what’ abstraction level.
Collaboration contracts describe the interaction behavior between services and
components. In effect they capture the non-functional aspects of the architec-
ture. They document for example how often, how fast, how secure, and how
controlled the interaction needs to take place.
Standards are documented statements that describe what has to be adhered to
during the realization of the architecture. We often distinguish two types of
standards, based on the moment they have to be adhered to. If a standard can be
adhered to in the next change of the system, then it is a normal standard, and
can be treated as described. If adherence to the statement has to be realized
before a certain date, like with law changes, then we use the term ‘rule’.
Commonly standards and rules are non-negotiable. Senior business manage-
ment needs to decide if they can be breached.
2.4 Logical Structure: The ‘How’ of IAF 21
1
IEEE Computer Society (1999) IEEE P1471 Recommended Practice for Architectural
Description. IEEE, US.
22 2 IAF’s Architecture
‘operational view’ and ‘performance view’ where others have used terms like ‘opera-
tional architecture’ and ‘performance architecture.’
A viewpoint captures the rules for constructing and analyzing a particular kind of
view. It is a template for a view which can be reused across many architectural
descriptions. The term ‘view type’ was considered as an alternative for viewpoint
because of the strong analogy of view and viewpoint to instance and type; but we
chose ‘viewpoint’ because of its use in existing standards and the requirements
engineering literature.
TOGAF version 82 and 93 use the following definitions:
View: A ‘view’ is a representation of a whole system from the perspective of a related
set of concerns. A view is what is seen from a viewpoint. An architecture view may be
represented by a model to demonstrate to stakeholders their areas of interest in the
architecture. A view does not have to be visual or graphical in nature.
In capturing or representing the design of a system architecture, the architect will
typically create one or more architecture models, possibly using different tools. A
view will comprise selected parts of one or more models, chosen so as to demonstrate
to a particular stakeholder or group of stakeholders that their concerns are being
adequately addressed in the design of the system architecture.
Viewpoint: A definition of the perspective from which a view is taken. It is a
specification of the conventions for constructing and using a view (often by means
of an appropriate schema or template). A view is what you see; a viewpoint is where
you are looking from – the vantage point or perspective that determines what you see.
IAF uses views and viewpoints in the same way that IEEE 1471 and TOGAF
do. Often we define the stakeholder and the concern the stakeholder has along
with the description of the view. We do not prescribe modeling or diagramming
techniques in the viewpoints as that would be in contradiction with our require-
ment regarding diagramming model independence.
2
The Open Group (2007) TOGAF Version 8.1.1 Enterpise Edition. The Open Group, US.
3
The Open Group (2009) TOGAF Version 9. The Open Group, US.
2.4 Logical Structure: The ‘How’ of IAF 23
aspect area can be merged into one overall analysis of the solution alternatives
for the whole architecture. There are two basic approaches to solution alter-
natives, the ‘fast track’ and the ‘full analysis’ approach.
Within each approach you need to define the criteria that are used to compare
the different alternatives. After that the different alternatives need to be identi-
fied. It is best practice to base alternatives on architecture principles that have
been defined. That enables you to rationalize the identification of the solution
alternative, and the scoring against the defined criteria and principles.
The fast track approach scores each solution alternative against each criterion.
The amount in which the alternative fulfills the criterion determines the score.
The solution alternative that fits all criteria the best, wins.
The full analysis approach enables the usage of relative weights for the different
criteria, thus making some criteria more important than others. The table below
shows how it works.
This approach takes more time because you do not only have to agree the
criteria and scores, but also the weight of each criterion.
Solution alternatives obviously should also take the different interests different
stakeholders have into account. For example, centralization might be in the
interest of the corporate staff departments, whilst being strongly opposed by
business unit management because centralization implies loss of control for them.
2.4.2.7 Domains
Architectures can become relatively large, simply because they have to describe
many services and components. An enterprise level architecture can easily
contain hundreds of services and components. It is especially difficult to com-
municate and visualize services, as they are the fundamental building blocks of
the architecture, and therefore the most abundant. Architects using IAF have
implicitly solved the communication and visualization challenges they had with
services by grouping them together in ways the stakeholders can relate with.
They often used the term ‘domain’ or ‘segment’ to describe the groups. As of
IAF 4.5 we have formalized the usage of domains, especially in the ‘what’
abstraction level, as that is where services are defined. There has been much
debate regarding this subject, as many people argue that grouping services into
domains implies creating a structure, and thus is part of the ‘how’ abstraction
level. There is a fundamental difference between the way we use domains and
the way we construct components.
24 2 IAF’s Architecture
2.4.2.8 Synonyms
For a long time we did not have a formal mechanism to document the terms we
use to communicate artifacts to non-architect stakeholders. This has lead to
situations in which architecture teams caused confusion due to incorrect usage
of terminology. As of IAF version 4.5 we have formally introduced the usage of
synonyms. The IAF glossary has been extended to allow the definition and
usage of synonyms. This can be done on a per project or per client basis.
Another advantage of synonyms is that it makes it easier to link to terminology
that is already being used in the organization.
2.4.2.9 Mechanisms
Wikipedia4 describes the term ‘mechanism’ like this:
A mechanism is some technical aspect of a larger process or mechanical device, or
combination of parts designed to perform a particular function. Sometimes an
entire machine may be referred to as a mechanism. Examples are the steering
mechanism in a car, or the winding mechanism of a wristwatch.
The term ‘mechanism’ was used in IAF version 1 and 2 to describe parts of the
overall architecture that provided a distinct function. Often they consisted of
combinations of artifacts from multiple aspect areas. The mechanisms were
even described in mechanism catalogues. The usage of the concept mechanism
has been less prominent in the current versions of IAF. This does not mean that
they cannot be used.
Common and current usage of mechanisms is often within quality related areas.
Mechanisms that ensure specific quality aspects can be described and even re-
used in different parts of the architecture. Examples of mechanisms that could be
described are a high availability mechanism that prescribes the different services
and components that need to be used to achieve a certain level of availability, like
synchronous replication and hot standby. Another example could be the use of
biometrics mechanism for implementing strong authentication as opposed to
weak authentication based on the combination user-id + password.
4
Information available via Wikipedia. Http://en.wikipedia.org. Accessed December 2008.
2.4 Logical Structure: The ‘How’ of IAF 25
IAF takes a different approach. First we define the services at the level of
detail required without explicitly putting them into a hierarchical structure.
Then we define grouping criteria that are based on the architecture
principles. After that we create components by grouping the services into
components based on the grouping criteria. The figure below visualizes the
IAF approach.
26 2 IAF’s Architecture
Advantages of the IAF approach are that it is easy to define and create solution
alternatives as we are not influenced by structures already created. We also
explicitly split the ‘what’ from the ‘how’ question by first defining services and
then grouping them. Of course there is a drawback to this approach: visualiza-
tion and communication of the services is more complex. This has been solved
by the introduction of domains.
A group of services is a component for which a solution as a whole exists, and
that can function as a whole. In general each architecture will only contain one
group for each required set of services.
5
This term was chosen to align with the open standard WS-Policy, which describes how the
capabilities of a web service can be documented and published.
2.4 Logical Structure: The ‘How’ of IAF 27
2.5.1 Introduction
In Sect. 2.2 we addressed the ‘why’ question in regard to IAF. Sect. 2.3 describes
IAF’s requirements and thereby addresses the ‘what’ question. The ‘how’
question has been addressed in Sect. 2.4 by describing IAF’s logical elements.
This section uses the logical elements to describe which real life physical
elements are part of IAF. An example: We described that we use abstraction
levels in Sect. 2.4.2. In Sect. 2.5 we will describe which physical abstraction
levels are really there.
architect, and as the planning depends on many other aspects, it has not been
incorporated as a formal part of the IAF model.
topics etc. People with information systems skills do not naturally have the
capabilities to define and structure the computing systems and network tech-
nology needed to let the information systems run.
This all leads to the conclusion that the four aspect areas defined in IAF are
needed to create an architecture that supports business and technology trans-
formation, and that each area requires distinct skills which helps in getting the
right architect in the right place, enabling effective communication across the
borders of each architect’s discipline.
security and governance were often neglected as topics, were only addressed at
the end of the process and then required the collection of additional information
from the business, and at this point were often looked at only from an IT
perspective. People were only focusing on the main aspect areas. The merge
was done by the addition of attributes to artifacts in the main aspect areas and
defining mandatory security and governance views in the relevant cells of IAF.
This has the effect of both ensuring that the information can be collected from
the business as early as possible, relates directly to the business needs and is
treated in a holistic manner across the whole architecture.
2.5.2.4 Artifacts
As Chap. 3 will describe all artifacts per aspect area and abstraction level, we
will use this section to explain where artifact types are positioned in the IAF.
The contextual level is the area where all our ‘input’ is positioned. The
input help us understand (1) the context of the business (mission, strategy,
drivers, . . .), (2) the architecture engagement (scope, objective, . . .) and (3) the
architecture principles.
Services and collaboration contracts are used in the conceptual level to docu-
ment architecture requirements. What services are needed and how do they
collaborate? Services are defined within all aspect areas, so they can be business
services or technology services.
Actually this way of documentation can be used to describe functional and non-
functional aspects of anything. The service describes what can be delivered
(functional aspects) and how it should behave (non-functional aspects). The
collaboration contract describes the way in which it is to be delivered in terms of
the communication mechanism to be used and the syntax and semantics of how
it can be requested. The communication
mechanism effectively defines how fast,
how secure, how often etc things can hap-
pen. An example will clarify this. If you
were in a conversation and you were
asked what your age is, then nine out of
ten times you would answer the question
within a few seconds. This is an example of
two services executing a collaboration con-
tract with each other. The requested and
delivered service are: ‘Collect age’ and
‘Provide age’. The communication
mechanism is sound waves generated by
vocal chords. Syntax and semantics are the English language. The communica-
tion mechanism implicitly defines behavior: you know the other expects an
answer within a few seconds. You also know you can lie about your age, and the
32 2 IAF’s Architecture
Is grouped into
Is grouped into
sc
De
Is basis for
Is basis for
‘How’– n
Logical – ee n
Logical e tw Logical ee
Structure ... nb ... etw
cti
o nb
component er
a component tio
int ac
s Collaboration
nter Collaboration
ribe contract si contract
c be
Is allocated to
es cri
Is allocated to
D s
De
Is basis for
Is basis for
n
ee n
‘With what’– etw ee
Physical – Physical b Physical etw
tion b
Allocate ... r ac ...
ction
component nte component ra
si i nte
be Collaboration
es
Collaboration
cri b
De
s contract
s cri contract
De
The collaboration contracts between services are the basis for collaboration
contracts between components. Collaboration contracts between components
can be the result of merged collaboration contracts between services, if their
characteristics allow them to be merged. If they cannot be merged, then we
can conclude that there will be two ‘interface types’ between the components.
A simple example is one interface for single, high priority service requests,
e.g. airline ticket bookings. The second interface type could then be grouped
requests for lists of bookings done during the last 24 hours. Collaboration
contracts in one area also form the basis for the collaboration contracts in
other areas. A business area collaboration contract could define the max-
imum business response time for a service request to be 3 seconds. We can use
that as the basis for the response time for the IS services that support the
business service. We could assume that IS processing would take 2 seconds.
That implies that the maximum infrastructure response time would have to
be 1 second.
Logical components are ‘allocated’ to physical components. What does this
‘allocation’ actually mean? Well, in its essence the mechanism is simple. Logical
processes are mapped to the real life physical parts of the organization that will
be executing the processes. Logical IS components are allocated to products
that have been selected to implement them, or we have decided to build them in
a specific physical environment like .NET or Java. Logical TI components like a
34 2 IAF’s Architecture
server, mobile workstation, SAN or backbone switch have been allocated to the
real life physical products with which they will be implemented.
This basic approach and meta-meta model has proven to work in all architec-
ture aspect areas. It keeps the overall architecture as simple as possible and
ensures traceability across aspect areas.
Chapter 3
IAF’s Aspect Areas Explained
3.1 Introduction
While Chap. 2 presented IAF and its aspect areas, this chapter focuses on IAF’s
artifacts and architectural views. It is based on the Integrated Architecture
Content Framework (IACF) which is a formal collection of all artifacts and
views. All artifacts within IACF will be discussed and defined in this chapter.
The collection of views explained consists of views we encountered frequently
throughout the years. An exhaustive listing of views makes no sense, due to the
large number of potential stakeholders and concerns who might need their own
specific presentation of the architecture.
We will describe artifacts and views, provide examples, and give guidance in
regard to their usage. However we will not explain all attributes of each artifact,
as they can be found in our IAF reference manual.
Next to the four core aspect areas, IAF also explicitly recognizes two additional
aspect areas, covering the two disciplines ‘‘Governance’’ and ‘‘Security’’. These
aspects (a) are common across all the other aspect areas, (b) represent a set of
requirements that are driven across all core aspect areas, and (c) may significantly
change the architecture structure across one or more core aspect areas.
For the sake of covering all parts of IACF, the Contextual Layer will be also
addressed in this chapter, although this abstraction level is not an aspect area
itself but provides generic input for all aspect areas.
3.2.1 Overview
The Contextual Layer is about understanding the WHY question. It sets the
stake in the ground for the rest of the architecture by providing context. One of
the challenges we often encounter is that the contextual information we need to
know is scattered throughout many documents. In addition, the status or validity
There are different definitions for business drivers. Three of the most common
ones are:
The tasks, information, and people promoting and supporting the goals of
the enterprise.
The requirements describing what the business wants (e.g.,
more quality data, faster response to queries).
The burning platform: A problem in the business or its
environment that is important enough to spell the difference
between success and failure for an organization.
We usually search for statements that meet the third defini-
tion, the important problems, as we should try to solve
them as part of the architecture outcome.
1
‘The sins of the architect are permanent sins’ – Frank Lloyd Wright.
38 3 IAF’s Aspect Areas Explained
Like business objectives, drivers and strategy, the business case is used to set up
and clarify the architecture engagement.
Business case information can be confidential. As with business strategy this
type of information is more relevant if you are working on a transformation
program, creating an enterprise level architecture. Solution architectures might
40 3 IAF’s Aspect Areas Explained
Business Business
vision mission
Business Business
strategy drivers
Business
objectives
Architecture
Business scope
case
Architecture
objectives
Architecture
principles
This model is also used as a current state organization model if the architecture
is aimed at re-designing the organization. This is an indication that we use it
mainly in enterprise level architecture engagements.
3.2 Contextual Artifacts and Views 43
3.2.11 Capabilities
3.2.12 Risks
Risks are potential events of whatever nature that could impact the architecture
engagement. Risks can be regarded as additional constraints on the architecture
engagement e.g. upcoming organizational changes, other programs and initiatives
running in parallel, or the use of unproven technology. We seldom see an archi-
tecture engagement that does not have to take risks into account. So spend time on
identifying, validating, and defining measures to manage and mitigate risks.
MARKET STRATEGY & POLICY PRODUCT & OFFER CAPABILITY DELIVERY PRODUCT & OFFER DEVELOPMENT & RETIREMENT CRM SUPPORT & READINESS CUSTOMER INTERFACE MANAGEMENT
• Gather & Analyze Market Information • Define Product Capability Requirements • Gather & Analyze New Product Ideas • Support Customer Interface Management • Manage Contact • Analyze & Report on Customers
• Establish Market Strategy • Capture Product Capability Shortfalls • Assess Performance of Existing Products • Support Order Handling • Manage Request (Including Self Service) • Mediate & Orchestrate Customer Interactions
• Establish Market Segments • Approve Product Business Case • Develop New Product Business Proposal • Support Problem Handling
MARKETING FULFILLMENT RESPONSE PROBLEM HANDLING BILL INVOICE MANAGEMENT
• Link Market Segments & Products • Deliver Product Capability • Develop Product Commercialization Strategy • Support Bill Invoice Management
• Issue & Distribute Marketing Collaterals • Isolate Customer Problem • Apply Pricing, Discounting,
• Gain Commitment to Marketing Strategy • Manage Handover to Product Operations • Develop Detailed Product Specifications • Support Bill Payments & Receivables Management
• Track Leads • Report Customer Problem Adjustments & Rebates
• Manage Product Capability Delivery Methodology • Manage Product Development • Support Retention & Loyalty
• Track & Manage Customer Problem • Create Customer Bill Invoice
• Launch New Products • Support Marketing Fulfillment
SELLING • Close Customer Problem Report • Produce & Distribute Bill
PRODUCT & OFFER PORTFOLIO PLANNING • Manage Product Exit • Support Selling
MARKETING CAPABILITY DELIVERY • Manage Prospect • Create Customer Problem Report
• Gather & Analyze Product Information • Support Bill Inquiry Handling
• Define Marketing Capability Requirements • Qualify & Educate Customer • Correct & Recover Customer Problem
• Establish Product Portfolio Strategy SALES DEVELOPMENT • Manage Campaign BILL PAYMENTS & RECEIVABLES MANAGEMENT
• Gain Marketing Capability Approval • Negotiate Sales
• Produce Product Portfolio Business Plans • Monitor Sales & Channel Best Practice • Manage Customer Inventory • Manage Customer Billing
• Deliver Marketing Infrastructure • Acquire Customer Data CUSTOMER QoS/SLA MANAGEMENT
• Gain Commitment to Product Business Plans • Develop Sales & Channels Proposals • Manage Product Offering Inventory • Assess Customer QoS Performance • Manage Customer Payments
• Manage Handover to Marketing Operations • Cross/Up Selling
• Develop New Sales Channels & Processes • Manage Sales Inventory • Manage QoS/SLA Violation • Manage Customer Debt Collection
• Manage Marketing Capability
Delivery Methodology ORDER HANDLING • Report Customer QoS Perf
PRODUCT MARKETING COMMUNICATIONS & PROMOTION • Determine Customer Order Feasibility • Create Customer QoS Perf Degradation Report BILL INQUIRY HANDLING
• Define Product Marketing Promotion Strategy • Authorize Credit • Track & Manage Customer QoS Perf Resolution • Create Customer Bill Inquiry Report
• Develop Product & Campaign Message • Track & Manage Customer Order Handling • Close Customer QoS Perf Degradation Report • Assess Customer Bill Inquiry Report
• Select Message and Campaign Channels • Complete Order • Authorize Customer Bill Invoice Adjustment
• Develop Promotional Collateral • Rprt Customer Order Handling • Track & Manage Customer Bill Inquiry
RETENTION & LOYALTY • Build Customer Insight Resolution
• Manage Message and Campaign Delivery • Issue Customer Orders
• Personalize Customer Profile for Retention & Loyalty • Analyze and Manage Customer Risk • Report Customer Bill Inquiry
• Monitor Message & Campaign Effectiveness • Close Customer Order • Close Customer Bill Inquiry Report
• Establish & Terminate Customer Relationship • Validate Customer Satisfaction
SERVICE MANAGEMENT
& OPERATIONS
SERVICE DEVELOPMENT
& MANAGEMENT
SERVICE STRATEGY & PLANNING SERVICE CAPABILITY DELIVERY SERVICE DEVELOPMENT & RETIREMENT SM&O SUPPORT & READINESS SERVICE CONFIGURATION & ACTIVATION SERVICE PROBLEM MANAGEMENT SERVICE & SPECIFIC INSTANCE RATING
• Gather & Analyze Service Information • Map & Analyze Service Requirements • Gather & Analyze New Service Ideas • Manage Service Inventory • Design Solution • Create Service Trouble Report • Mediate Usage Records
• Manage Service Research • Capture Service Capability Shortfalls • Assess Performance of Existing Services • Enable Service Configuration & Activation • Allocate Specific Service Parameters to Services • Diagnose Service Problem • Rate Usage Records
• Establish Service Strategy & Goals • Gain Service Capability Investment Approval • Develop New Service Business Proposal • Support Service Problem Management • Track & Manage Service Provisioning • Correct & Resolve Service Problem • Analyze Usage Records
• Define Service Support Strategies • Design Service Capabilities • Develop Detailed Service Specifications • Enable Service Quality Management • Implement & Configure & Activate Service • Track & Manage Service Problem
• Produce Service Business Plans • Enable Service Support & Operations • Manage Service Development • Support Service & Specific Instance Rating • Test Service End-to-End • Close Service Trouble Report
• Develop Service Partnership Requirements • Manage Service Capability Delivery • Manage Service Deployment • Issue Service Orders • Survey & Analyze Service Problem
• Gain Enterprise Commitment to Service Strategies • Manage Handover to Service Operations • Manage Service Exit • Report Service Provisioning
SERVICE QUALITY MANAGEMENT
• Close Service Order
• Recover Service • Monitor Srvc Quality • Track & Manage
• Analyze Srvc Quality Srvc Quality
• Improve Srvc Quality Perf Resolution
• Report Srvc Quality Perf • Close Service Perf
• Create Service Perf Degradation Report
Degradation Report
DEVELOPMENT
& MANAGEMENT
RESOURCE
SUPPLY CHAIN STRATEGY & PLANNING SUPPLY CHAIN CAPABILITY DELIVERY SUPPLY CHAIN DEVELOPMENT & CHANGE MANAGEMENT S/P REQUISITION MANAGEMENT S/P PROBLEM REPORTING & MANAGEMENT S/P SETTLEMENTS & BILLING MANAGEMENT
• Gather & Analyze Supply Chain Information • Determine the Sourcing Requirements • Manage Supplier/Partner Engagement • Support S/P Requisition Management • Select Supplier/Partner • Initiate S/P Problem Report • Manage Account
• Establish Supply Chain Strategy & Goals • Determine Potential Suppliers/Partners • Manage Supply Chain Contract Variation • Support S/P Problem Reporting & Management • Determine S/P Pre-Requisition Feasibility • Receive S/P Problem Report • Receive & Assess Invoice
• Define Supply Chain Support Strategies • Manage the Tender Process • Manage Supplier/Partner Termination • Support S/P Performance Management • Track & Manage S/P Requisition • Track & Manage S/P Problem Resolution • Negotiate & Approve Invoice
• Produce Supply Chain Business Plans • Gain Tender Decision Approval • Support S/P Settlements & Payment • Receive & Accept S/P Requisition • Report S/P Problem Resolution • Issue Settlements Notice & Payment
• Gain Enterprise Commitment to Supply • Negotiate Commercial Arrangements Management • Initiate S/P Requisition Order • Close S/P Requisition Order
Chain Plans • Gain Approval for Commercial Arrangements • Support S/P Interface Management • Report S/P Requisition
• Manage Supplier/Partner Inventory • Close S/P Requisition Order S/P PERFORMANCE MANAGEMENT
• Monitor & Control S/P Service Performance
• Track & Manage S/P Performance Resolution
• Report S/P Performance
• Close S/P Performance Degradation Report
• Initiate S/P Performance Degradation Report
ENTERPRISE MANAGEMENT
STRATEGIC & ENTERPRISE PLANNING PROCESSES ENTERPRISE RISK MANAGEMENT PROCESSES ENTERPRISE EFFECTIVENESS MANAGEMENT PROCESSES KNOWLEDGE & RESEARCH MANAGEMENT PROCESSES
STRATEGIC BUSINESS ENTERPRISE BUSINESS CONTINUITY SECURITY FRAUD MANAGEMENT PROCESS MANAGEMENT ENTERPRISE QUALITY PROGRAM & PROJECT KNOWLEDGE RESEARCH TECHNOLOGY
BUSINESS PLANNING DEVELOPMENT ARCHITECTURE MANAGEMENT MANAGEMENT & SUPPORT MANAGEMENT MANAGEMENT MANAGEMENT MANAGEMENT SCANNING
MANAGEMENT
FINANCIAL & ASSET MANAGEMENT PROCESSES STAKEHOLDER & EXTERNAL RELATIONS MANAGEMENT PROCESSES HUMAN RESOURCES MANAGEMENT PROCESSES
BOARD &
COMMUNITY RELATIONS SHAREHOLDER RELATIONS SHARES/SECURITIES WORKFORCE EMPLOYEE & LABOR
MANAGEMENT MANAGEMENT MANAGEMENT DEVELOPMENT RELATIONS MANAGEMENT
For the Enhanced Telecom Operations Map ® processes definitions please refer to TMF document GB921D v6.0. The complete eTOM documentation is available at www.tmforum.or g. An electronic copy is available at http://www.amdocs.com/public/etom7.pdf | eTOM 7.0 Poster design © Amdocs. eTOM content © TeleManagement Forum 2007
eTOM
Operating models that you encounter in the contextual phase are commonly
models that the organization wants to adopt, as in the examples above. Use
them as a reference model that provides guidance and input for the architecture.
More information on the interplay of the operating model and Enterprise
Architecture can also be found in Dr. Jeanne W. Ross’ book ‘Enterprise
Architecture as Strategy’.
3.2.14 Stakeholders
Stakeholders are decision makers and/or sources of information for the team on
drivers, objectives, and constraints. Understanding and addressing stake-
holders, their concerns, interests in, and position to the engagement is crucial
to ensure success.
There are many types of stakeholder analysis techniques available. One techni-
que differentiates between three types of stakeholders:
Primary stakeholders are those ultimately affected, either positively or nega-
tively by a corporation’s actions.
46 3 IAF’s Aspect Areas Explained
Support
Low Medium High
Jake Joe
High
Power
Medium John
Low Jed
= High influence
= Low influence
Treasury
Risk
Delivery Channels
Global Management
GAN
LC Limits
SWIFT
2 4 Customer
Acquisition
(RM, GTS
Professional)
‘Global’ Correspondent
Customer Bank
Local transaction
Retention
current processing (Customer
accounts support)
5
Advisory
Central Bank
6 Clearing House
Local
processing centre 1
Country level
3.2.16 Policies
stakeholders, (b) a starting point and guidelines for any architecture develop-
ment, (c) used to manage the inevitably conflicting requirements and (d) do
have a priority.
Solution alternatives and their selection will rely on prioritized principles to be
able to advise on the best solution. You will also frequently encounter conflict-
ing requirements, and even conflicting principles. Again priorities will help you
out because you have determined up front what is the most important among all
those very important principles.
Architecture principles are typically derived from business vision/mission/
strategy/objectives/drivers and any corresponding architecture assumptions,
scope, constraints, and objectives.
Example:
Every piece of equipment must fit in the cargo elevator, otherwise it cannot
be deployed on the 7th floor.
You need to be careful to identify those constraints which might need to be
circumvented (for example, ‘you can only use TBQ software’, as it might not do
what is required) – these are either not well enough defined or are high priority
principles and as such negotiable.
If you don’t know where you are now, how can you determine what you need to
do to get where you want to go? Of course we do not need to capture the baseline
architecture in the same level of detail as we will for the future state (target)
architecture. ‘Just enough’ is the credo here. And of course, we will give the
architect’s standard answer to the question ‘what is just enough?’: it depends.
Most of the time however we encounter the following topics in a baseline
architecture:
Business process information – which ones are there;
Information models, hopefully including ownership;
Applications landscapes, including interfaces, and hopefully non-functional
information regarding availability, transaction volume, peak usage charac-
teristics and performance;
Infrastructure landscapes, including interfaces.
It can also be very useful to have an understanding of licensing and maintenance
agreements, especially in solution architecture engagements. These licensing
3.3 Business Architecture 53
3.3.1 Overview
The business aspect area describes the business architecture in terms of business
subjects like business goals, activities, roles, and resources. The outcome of the
54 3 IAF’s Aspect Areas Explained
description of WHAT the business does in order to meet its goals. They
are implementation independent (i.e. independent of any organizational
structure or process) and have clearly defined objectives in transforming
an initial state to another state. A typical business service in the oil
industry would be ‘interpreting geographic data to find possible oil
reserves’.
Business goals describe what the business needs to achieve in order to fulfill its
business objectives. A business goal is an implementation independent, funda-
mental, and unique contribution to the business mission. The business goal is
the ‘WHY’ objective for any business activity.
Business goals provide a reference baseline for comparing current state and
future desired state.
They support the definition of results related targets for the organization. The
goal of ‘interpreting geographic data to find possible oil reserves’ is probably
‘finding new oil reserves’.
A business role performs a business activity. Roles may also have accountabil-
ities for goals (although there will be corresponding governance activities for
those goals). Roles should not be associated with people or systems as people
have multiple roles. Roles are independent of implementation but are still
needed to support the activities. Roles relate to specific activities and support
the same business goal as the activity.
There are a number of orders in which the different artifacts can be used to
identify business services. Five of the most common ones are described below.
Business Object Based Approach This approach starts with identifying business
objects and determining which activities can be derived from these objects. So
business object ‘paper order’ could result in business activities ‘accept order’,
‘verify ordering customers credit’, ‘register order’, etc. The business object
‘stock item’ could result in the activities ‘validate stock item quantity’, ‘collect
stock item’, ‘register new stock item’, etc.
This initial list of business activities
is the basis for further double check
and amendment. Very often we
define business roles as a second
step. We determine which activities
can be related to a business role,
check if they are in the list, and
add them if needed. In case of our
example, we could define the role
‘order picker’ which executes activ-
ities ‘collect stock item’ and ‘trans-
port stock item to packing area’. This last activity is not present yet, and will
therefore be added to the list. Finally we would define the business goals. We
use the business activities and business goals to create the set of business
services. Of course it will happen that missing activities, roles, and goals will
be discovered during business service definition. We just add them and always
check if they lead to the discovery of even more omissions.
This approach is obviously used when business objects are very important and
relevant. We see this in organizations with many physical goods, like manufac-
turing and transportation companies.
3.3 Business Architecture 57
An example of a goal hierarchy from the IAF course material provides good
insight in what a goal hierarchy is. It describes the business goals an Eskimo
fisherman has in making a living by providing food for an arctic restaurant.
Process steps can be seen as candidate business services. If you can link a ‘one
activity, one role, and one goal’ – combination to a process step, the process step
complies to the criteria of a business service, and you can document the service.
However if the criteria cannot be met, you might need to split the process step –
or merge it with another one – to find a ‘true’ business service.
The added value of the business role concept – enabling many to many relation-
ships between roles and actors – provides you with the option to create ‘solution
alternatives’ for actors; you can combine different sets of roles into actors,
resulting in people doing different things. Of course you do not have to do
this. You can define roles that end up in having a one to one relationship with
actors if you do not need to mix and match what people will be doing.
Inspect
Review Create Transport raw Monitor
Accept claim accepted
proposal contract material drilling safety
claim
Commonly business activities are the easiest to collect. People can easily tell you
what they are doing. They do not always understand why they do it. They are
also not always aware of the things they actually are responsible for either.
3.3 Business Architecture 61
However you have to be aware of one pitfall when collecting business activities.
People tend to focus on what they are doing now, not what they will be doing in
the future. So if your architecture involves a large change of business activities,
it might be better to derive activities from the business goals to enhance ‘blue
sky’ thinking.
The artifact ‘business event’ has been introduced into IAF as part of version 4.5.
In the past we used another construction to document business events. We
defined business services that were external to the system and defined collabora-
tion contracts between the external and internal services. Although in theory
this was an acceptable approach, we still got a lot of discussion about it. So we
decided to get more in line with what was happening in the industry regarding
event modeling.
Business objects tend to be the most important in industry sectors that have a lot
to do with physical goods. Transport, manufacturing and retail are good
examples. Listen what the business people are talking about. If their focus is
on objects instead of activities, then you should consider taking the business
object based approach when identifying business services.
62 3 IAF’s Aspect Areas Explained
Order Paper
Process order Archive Archiving
processing
Quality Contract
assessor specialist Acceptor
The trick behind business services is using the right level of granularity that is in
line with the architecture objectives. Defining business services at the level used
in the example for a whole enterprise can easily lead to the definition of
thousands of services. In situations like that it might be sufficient to define
services at a higher level, like ‘order management’ and ‘claims processing’.
There is no straightforward answer to granularity. One rule of thumb is to
stay as high as possible, simply because that will make the architecture less
complex. You can also consider to ‘zoom in’ on specific areas that need more
attention because they are more complex or make the difference between
successful and failing companies. ‘Zooming in’ is done by defining services at
a more detailed level in that area. However by doing this you have to manage
the risk that people will get confused about the granularity and start discus-
sions. Therefore communicate clearly and frequently why you are combining
different granularity levels in your architecture.
3.3 Business Architecture 63
Channels
Customer
Product processing
Support services
This is the domain model for a large bank. In the next figure it is used as a
background to show how a process will flow through the various parts of the
system.
Quality of information Describe the required quality of the information. Should the response be real time, info
required must not be older than 1 day or 1 week, etc.
Contract control Describe the control requirement of the contract. <control required every time the
requirements contract is activated/ logging of contract activation & results insufficient/ no
contract control requirements>
Result control Describe the result requirement of the contract. <no result control required/ result
requirements control based on periodic checks/ result control required every time the contract
is supporting>
Importance Describe the importance of the contract. <failure allowed if only quality degrades/
must complete within response times>
Accept claim
Claim rejected Inspect claim
Claim rejected Process claim
Communicate outcome
Pay claim
Process payment
Our scope
There has been much debate about this model. Is it a view or an artifact? Of
course in its essence it is a view because it communicates existing artifacts.
However this model is of such importance to the understanding of how the
business wants to work that it fundamentally is an artifact. Thus we decided to
position the business interaction model as an artifact.
Interaction models often copycat UML drawing techniques. The example dia-
gram above is based on a UML sequence diagram, but communications
66 3 IAF’s Aspect Areas Explained
diagrams or IDEF0 function models work just as well. It all comes down to
personal and client preference which model you use.
These formal modeling techniques do not always work at enterprise level. Using
a domain model and superimposing business services and their interaction on
top of it is a well known way of creating high level business interaction models,
as depicted in the figure below.
Customers
Process payment
Channels
Internet
payments
Authorise payments
Customer Reconciliate
balances Transaction
authorisation
Process payments
Product processing
Payments
processing
Update ledger
Support services
General
Ledger
Ensure timely
Channels request
acceptance
Ensure Ensure
proposal sufficient raw
quality Product processing
material
Ensure
compliance Support services
Customers
Process payment
In scope Internet
payments
Authorise payments
Reconciliate
balances Transaction
authorisation
Process payments
Payments
processing
Update ledger
Out of scope
General
Ledger
68 3 IAF’s Aspect Areas Explained
Target
architecture Eliminated
Claim Claim Claim Payments services
acceptance inspection processing preparation
Baseline
architecture
Claim Upgrade
acceptance functionality
Claim
Keep as is
inspection
Claim
Re-design
processing
Outsourced to
Claim payment shared service
center
New service:
New
push payments
to SSC
Low security
Receive
Medium security Receive
claim High security claim
Low security
Inspect Inspect
accepted Pay claim accepted Pay claim
claim claim
Medium security High security
Often processes are constructed to deliver specific overall results, like in the
example. There are two processes, ‘consumer fulfillment’ and ‘business fulfill-
ment’. They both create an end to end result, a delivered product together with a
bill.
As the example shows, processes are not always the best way to organize things,
it often will be better to create a logical organization by grouping services
together that do similar things. The logical components front office, mid office,
and back office do that.
The way business services are organized is often also different from the
way business services will be governed. In the example order processing
services and product delivery services are grouped together to create one
unit of governance, ‘sales and production’. The logical governance compo-
nent contains the same services as the logical organization component
‘back office’.
The example shows that logical business architecture creates three types
of logical business components: process, organization, and governance.
Of course the grouping criteria for all three types of components should
be derived from the principles. If the defined set of principles is insuffi-
cient to derive grouping criteria, define and validate additional
principles.
Process components are the easiest to construct using the approach described in
Sect. 3.3.4.
Organization components are often constructed by using existing or defining
logical organization elements and cross referencing business services to them,
based on criteria derived from principles.
Business services
Process consumer orders
Process business orders
Deliver consumer product
Deliver business product
Consumer billing
Business billing
Of course this model is derived from the business interaction model. Very
often component interaction models can be made simpler than service
interaction models, as some of the collaboration contracts between services
will become ‘internal’ to one component, and therefore become less impor-
tant to show in this model. You just hide the internal complexity. A
cleaned logical business component interaction model is shown in the
figure below.
Accept claim
Claim rejected Inspect claim
Claim rejected
Pay claim
Process payment
Send Accept
Send order inquiry Accept order
inquiry
Accept inquiry
Accept order
Merge
contracts
Component B
Send Accept
Send order inquiry Accept order
inquiry
3.3.4.4 Actor
An Actor is someone/something that is performing a collection of roles.
Drill manager
Quality
Drill supervisor
assessor
As this is another form of grouping, you should also go back to the principles,
define grouping criteria and group roles into actors in such a way that your
choices are derived from principles.
Receive
claim
Inspect
accepted Pay claim
claim
The result of solution alternatives is the agreement on one alternative that will
be used as basis for the architecture.
Low security
Inspect
accepted Pay claim
claim
Low security
Receive
Medium security
claim
High security
Inspect
accepted Pay claim
claim
Service time
3.3.5.6 Logical Business Component Receive Office hours
2
The terms ‘mapping’ and ‘allocating’ are both used in this context. They are synonyms.
78 3 IAF’s Aspect Areas Explained
Accept claim
Claim rejected Inspect claim
Claim rejected
Pay claim
Process payment
Topic Description
Task name Drill manager
Location Valdez, Alaska
Services to be delivered Drill supervision and quality assessment
Skills required Certified drill manager level C
ISO 9000-4 qualified
Task complexity level High
Salary level E90–120 K
Topic Description
Specification Implement claims payment before implementing claims acceptance and inspection
Rationale It does not make sense to handle claims if you cannot pay them.
3
http://www.aris.com
80 3 IAF’s Aspect Areas Explained
Many of the views described within the subchapter on logical business archi-
tecture can also be used to communicate the physical business architecture.
They are:
Physical solution alternatives;
Physical business component view;
Physical business component gap view;
Physical business component security view;
Physical business component governance view.
Price
Cost group Cost element per unit # units Period 1 Period 2 Period 3 Period 4 Period 5 Period 6 Period 7 Period 8 Total costs
Commercial
Newsletter 1.500 1 1.500 1.500 1.500 1.500 1.500 1.500 1.500 1.500 12.000
TV
advertisements 25.000 4 100.000 100.000 100.000 100.000 100.000 100.000 100.000 100.000 800.000
Organisation
New building 50.000 1 50.000 50.000 50.000 50.000 50.000 50.000 300.000
Personnel
Culture training 3.000 25 75.000 75.000 75.000 75.000 75.000 375.000
Totals 101.500 176.500 226.500 226.500 226.500 226.500 151.500 151.500 1.487.000
3.4 Information Architecture 81
Setting up a cost view like the one in the example anticipates different types of
financial analysis that will be required. Return on investment (ROI) and Net
Present Value (NPV) calculations are very common.
We have come to the end of the topic business architecture as part of IAF. We
have defined and documented business requirements in terms of business
services and their collaboration contracts. Business services were derived from
one or more of the following artifacts in a conceptual business architecture:
business goal, business role, business activity, business object, and business
event.
We have created a logical business architecture by grouping these business
services into three types of logical business components: process, organization,
and governance.
We have allocated these logical business components to real life parts of the
business, and created SRGs to ensure a business architecture gets implemented
the way it is needed to.
On top of that we have created a substantial set of business views to commu-
nicate the architecture, to get it validated, and to get buy-in. It seems a good
time to extend our work into the second architecture area in IAF, the informa-
tion architecture.
3.4.1 Overview
Business architecture focuses solely on business aspects, like processes, organi-
zation, and governance. It deliberately does not look at information aspects.
82 3 IAF’s Aspect Areas Explained
One of the main reasons for this is that we intend to reduce the complexity of the
overall problem by splitting it up into smaller, less complex ones. Information
architecture is all about information and communication aspects of business.
Information architecture adds the information aspects to the business architec-
ture. Information architecture starts by defining which information the busi-
ness services need, create, and change to be able to deliver the defined service. Of
course this information is essential to be able to understand the type of IT
support required. After we understand the information processing require-
ments of business services, we will create a logical information architecture.
We will apply principles of some specific forms of affinity analysis which might
lead to refining our business architecture. This is due to information processing
requirements we did not take into account yet. After that we will create a
physical information architecture by allocating the logical components to phy-
sical ones and creating information architecture specific standards, rules, guide-
lines (SRGs) and migration guidelines.
Some examples:
A CLAIM is a request of a CUSTOMER to receive a PAYMENT based on
an INSURANCE POLICY.
A CUSTOMER is a natural or legal entity that has an existing INSUR-
ANCE POLICY with our organization.
A PAYMENT is the transfer of funds to a CUSTOMER based on a valid
CLAIM.
An INSURANCE POLICY is a legal agreement between our organization
and a CUSTOMER that states when a CLAIM can be made and how much
the CUSTOMER will pay for it.
Information objects can be derived from business objects. The basic rule is that if
the organization wants to know something about a business object, it becomes an
information object. If business objects have not been defined you can use the
business services as a start for defining information objects. An analysis of the
business services will result in a set of candidate information objects. They are
candidates because we need to distinguish between those that are essential, those
that are related to specific roles, and those that have specific characteristics
(object, non-object, information etc.) which differentiate them. These candidate
information objects are then grouped into object type classes. The classes are:
elementary, generalizations/specializations, aggregations, and classifications.
Generalizations. A is a generalization to B if
the characteristics of A form a partial col- A: Vehicle
lection of B’s characteristics. So a vehicle is
B: Motor vehicle
the generalization of a motorized vehicle.
Specializations. B is A’s specialization if A’s
characteristics form a subset of the charac-
teristics specifying B. Thus a motor vehicle
forms a specialization of vehicle.
Aggregations are combina-
tions of 1 or more distinct
object types into another Maintenance check
object type. So A forms an
aggregation of B, C. . . if any
A element is constructed out Mechanic Motor vehicle
of a B, C, . . . element . An
example is that a maintenance
check forms an aggregation of
mechanic and motor vehicle.
Vehicle type
Classifications are the com-
position of object type
classes according to a speci- Vehicle
fied composition criteria. So
84 3 IAF’s Aspect Areas Explained
The information interaction model for our claims example looks like this:
The information interaction model is especially important when you are plan-
ning to create a logical information architecture as it is the major source of input
for that. This interaction model provides understanding of the information
exchange between business services and the shared usage of information. The
information interaction model will help you in checking the completeness and
scope of your architecture. If you find an empty column, you have an informa-
tion object in scope, but no business services that use it. Either the information
object should be out of scope or you missed some business service. A row can
contain only ‘Gs’ and/or ‘Ts’. This will mean that the information object is
created by a business service that is out of scope of your architecture. In the
example above this holds true for Insurance Policy. If you identify a row will no
‘Gs’, the information object will be used by a business service outside the scope
of your architecture.
Maintenance check
Claim
A: Vehicle
There has been much debate about the usage of data modeling techniques in
information architecture. Those who oppose take the position that data model-
ing tends to go into too much detail for architecture – it makes communication
with less technical stakeholders very difficult. They state it should happen
during design. The proponents state that solution architecture does require
data modeling techniques since it allows to grasp the essence of a problem. In
IAF if you need to, you can use entity relationship modeling or UML data
modeling techniques to create this view.
The business information service security view can be used to check if the
security classifications of business information services are in line with the
classifications of information objects.
Low security
Medium security
High security
As you can see in the example we have had to ‘upgrade’ the security level of the
business information service ‘reject claim’ from low to medium because of the
information objects it uses. We did not have to change ‘pay claim’ because a
business information service with high security will also be able to handle lower
levels of security. Security of information objects is often expressed in terms of
confidentiality, availability and integrity.
Just like logical business architecture needs to define multiple types of logical
components to address all required topics, logical information architecture
contains two types of logical components. These component types are repre-
sented in ‘structure models’. A structure model shows the components of a
specific type, and the relationships between the components. There is a logical
3.4 Information Architecture 89
First, we create a new table (cross reference), with the information objects in the
row and column headers. We populate the cells with the Business information
service names, based on the following rules:
If a Business information service transforms an information object, it is
placed in the cell where the information object is both in row and column.
In our example: ‘customer’ is transformed by ‘accept claim’, so ‘accept claim’
is put in row ‘customer’, column ‘customer’.
If an information object is used (get or transform) to write or transform
another object, then the name of the business information service is put in the
cell where the used object is in the row header and the written/transformed
object is in the column header. In our example: as ‘customer’ is transformed
to be able to write ‘claim’ by ‘accept claim’, ‘accept claim’ is put into row
‘customer’, column ‘claim’.
After analyzing the information object usage of the business information
services and populating the table we end up with the table below.
90 3 IAF’s Aspect Areas Explained
This is the initial LIC structure model. Now we have to re-arrange or cluster the
model. We do this based on the following rules:
When both column and row of an information object are empty, some-
thing’s wrong. This would mean that the information object is not used
by any business services in any way. Thus you might want to check
your IIM;
Row and column order must be kept in symmetric order, so If you move a
row (or column) you need to move the corresponding twin column (or row)
respectively;
Empty rows at the end;
Empty columns at the beginning;
Where appropriate, derive additional grouping criteria from the archi-
tecture principles. An example is: architecture principle is ‘buy before
build’. Grouping criterion would then be: ‘group information objects
in such a way that they are in line with what packages normally
provide’;
Look for columns with the same content or ones that fulfill the derived
additional grouping criteria. Then see if coherent rows also have the same
content or if they fulfill the derived additional grouping criteria. If this is the
case, the information objects concerned are related and should be placed
close to one another;
Repeat this until the BISs are optimally clustered on the diagonal
because it shows a cluster of IOs that are highly correlated via the
same (group of) BISs;
Logical Information components only can be created around the diagonal.
Information objects influencing one another always belong to the same
information component;
Create Logical Information components by selecting the cells that have
maximal correlation with each other and minimal relationships between
them.
Analyze the model by interpreting the meaning of Logical Information compo-
nents and their relationships. If you can’t give the LIC a meaningful name
something is wrong. Re-visit your criteria derived from the principles and refine
the structure so they adhere to the criteria.
3.4 Information Architecture 91
Reject claim
Payment
Claim
Insurance policy Customer Payment
You might be thinking by now ‘this can become a large exercise’. Well, that can
indeed be the fact. Doing this at enterprise level can lead to tables with 200
columns and rows. There are people on this planet that can do the clustering
manually, but even they prefer to use tool support (like sorting macros in a
spreadsheet) to do the initial clustering.
You need to create a table with the business information services in the row and
column headers. The first row and column head is fixed. It’s name is ‘(external)
input’. The last row and column head is also fixed. It’s name is ‘(external)
output’.
The cells are populated using the following rules:
If a business information service (BIS) transforms an information object
(IO), the name of the information object is placed in the cell with the
row and column header that contains the name of the business informa-
tion service. In our example: ‘Accept claim’ transforms ‘customer’, so
‘customer’ is entered into the cell with row and column header ‘Accept
claim’;
When a business information service writes or transforms an information
object, which is used by subsequent business information services, the
name of the information object is placed in the cells with the row header
which has the name of the business information service that writes the
information and the column headers with the names of the business
information services that use the information object. In our example:
‘Accept claim’ writes ‘claim’, which is used by ‘Inspect accepted claim’,
‘Reject claim’ and ‘Pay claim’. ‘Claim’ is placed in the cells with row
header ‘Accept claim’ and column headers ‘Inspect accepted claim’,
‘Reject claim’ and ‘Pay claim’;
If an information object is used but not created within the scope of
our business information services we put the name of the information
object in the cell with row with header ‘(External) input’ and column
header that has the name of the business information service that
uses it. In our example: ‘Insurance policy’ is placed in the cell with
row header ‘(External) input’ and column header ‘Inspect accepted
claim’;
If an information object is created but not used within the scope of our
business information services we put the name of the information object in
the cell with row with header that has the name of the business information
service and column header ‘(External) output’. In our example: ‘Payment’ is
put in the cell with row header ‘Pay claim’ and column header ‘(External)
output’.
After working through the information interaction model you would end up
with a table looking like this:
3.4 Information Architecture 93
This is the initial LBIC structure model. Now we have to re-arrange or cluster
the model. We do this based on the following rules:
When both column and row of an BIS are empty, something’s wrong. This
would mean that the BIS does not use any information objects. Thus you
might want to check your IIM;
Row and column order must remain the same, so If you move a row (or column)
you need to move the corresponding twin column (or row) respectively;
Empty rows at the end;
Empty columns at the beginning;
Where appropriate, derive additional grouping criteria from the architecture
principles. An example is: all claim handling BISs should be placed close
together;
Look for columns with the same content or ones that fulfill the derived
additional grouping criteria. Then see if coherent rows also have the same
content or if they fulfill the derived additional grouping criteria. If this is the
case, the BISs concerned are related and should be placed close to one another;
Repeat this until the information objects are optimally clustered on the
diagonal;
Business Information components only can be created around the diagonal.
Information objects influencing one another always belong to the same
business information component;
Create Logical Business Information components by selecting the cells
that have maximal correlation with each other and minimal relationships
between them;
After doing the work in our example, you would end up with the table above.
Three LBICs are distinguished, Claim inspection, Claim acceptance, and Claim
payment. These are exactly in line with the logical business components we
defined in the business architecture. That means that they do not violate
information processing rules and do not have to be changed.
Claims
Claims acceptance @ NY Finance@Mumbai
inspection@Bangalore
Accept claims Inspect claims Pay claims
Accept Claim Reject Claim Inspect accepted Pay Claim
claim
Claim (T)
Claim(T)
Claim (W) Claim (T) Customer (G)
Customer (G)
Customer (T) Customer (T) Insurance policy (G) Payment (W)
Bank Send claim
Accept claim
Claim rejected Inspect claim
Claim rejected
Pay claim
Process payment
Owners
Policy
management
management
Claims
inspection
Finance
Prepare this view carefully and double check if you have got it right. Much
power in organizations is based on ownership, so you can expect ‘political
moves’ when communicating these topics. Sometimes the words ‘information
stewardship’ are used as well to denote the accountability for the information
that is used by others.
Claim
Customer Insurance policy Payment
Because this is getting very close to real life, the stakeholders start to become
interested. Ownership is power. Be aware of this and manage expectations
carefully.
Claims
Claims acceptance @ NY Finance@Mumbai
inspection@Bangalore
Accept claims Inspect claims Pay claims
Accept Claim Reject Claim Inspect accepted Pay Claim
claim
Claim (T)
Claim(T)
Claim (W) Claim (T) Customer (G)
Customer (G)
Customer (T) Customer (T) Insurance policy (G) Payment (W)
Bank Send claim
Accept claim
Claim rejected Inspect claim
Claim rejected
Pay claim
Process payment
Cost group Cost element Price per unit # units Period 1 Period 2 Period 3 Period 4 Period 5 Period 6 Period 7 Period 8 Total costs
Information
Data cleansing@ NY
(FTE) 5000 1 5000 5000 5000 5000 20.000
Data
Cleansing@Mumbai
(FTE) 4000 4 16000 16000 16000 48.000
Data
Cleansing@Bangalore
(FTE) 4000 4 16000 16000 16000 16000 64.000
3.5.1 Overview
By now we have an understanding of the business, its processes, organization
and governance structure. In addition to that we also understand the informa-
tion processing requirements the business has. We have a clear definition of the
information objects so we avoid discussions in that area. What we now need to
do is to define the extent and type of automated support that the business needs.
Not all business information services have to be fully automated. Very often it
will not be possible to fully automate them due to required human interaction,
knowledge or judgement. Different technologies provide us with the option to
utilize different types of automated support for the same business information
service. Imagine a customer submitting a claim from a desktop computer using
the internet or by sending an email. Information systems (IS) architecture is all
3.5 Information System Architecture 99
about determining the automated support for the business, understanding the
interaction between the IS Services and Components, and delivering an archi-
tecture in which it has been determined which IS systems will be bought, which
ones will be built and which parts will be customized.
Inspect claim
Accept E-mail Create claim
Reject claim from office or
claim payment
home
Accept phone
claim
Accept
Internet claim
100 3 IAF’s Aspect Areas Explained
During the analysis of the Business information services, we define the IS services
as depicted in the figure. We define four ‘channels’ through which we want to
accept claims, E-mail, paper mail, phone and internet. Contextual input such as
business and IS/IT strategy is helpful here, since it sets the stage for options to
consider. The paper mail channel will only accept forms so we can scan and OCR
them to get them in electronic format. Another thing we decide is that we want to
be able to inspect claims from either the office or from home. The last thing we do
is to define that we want to split the generation of payments from their submis-
sion to the bank. If we buffer the payments and deliver them in bulk the bank will
give us a 15% discount on the payments processing charges.
Now we need to determine if we need to iterate back to the business architec-
ture to change or add business services and components. Claims acceptance
through e-mail and internet require high levels of security to prevent fraud.
Phone acceptance requires a call center with its own services and processes.
Inspecting claims from the home or from the office will not make much of a
difference, as strong authentication measures (a combination of knowledge
and possession) will be required in both situations to prevent fraud from
inside the organization. Payment creation can be done during the day. Sub-
mitting the payments is a bulk process at the end of the day. We conclude that
an iteration back to the business architecture is justified. The result is shown
below.
Inspect claim
Accept E-mail Accept post Accept phone Accept from office or
Reject claim
claim claim claim Internet claim home
Pay claims
We have decided to split the ‘Accept claim’ business information service as well
as ‘Pay claim’. The ‘Inspect accepted claim’ business information service has
not been changed. Of course we have also updated the appropriate artifacts and
views to keep them consistent.
3.5 Information System Architecture 101
This artifact might not seem that important to you. Its real value is later on, as
the architecture is being used for impact analysis of changes. It makes that
activity a lot easier to execute. So take the time to create this cross reference
during the creation of the architecture.
Submit
Reject claim payments
Inspect claim
from office or
home
102 3 IAF’s Aspect Areas Explained
Accept Claim
Accept claim
Send claim
Throughput: 100/day Claim (W)
Response: 3 seconds Customer (T)
This example shows that the business expects a total of 100 claims a day. They
want an initial response back to the customer within 3 seconds. Part of the
claims will be submitted through the internet. The internet channel implies
network latency. Therefore we derive a response time of 2.5 seconds for this
specific contract.
Note: this example may give the impression that contracts are only modeled on
the edges of the scope of the architecture (the interface between inside and
outside); however, contracts can likewise be used to model the requirements to
internally underpinning services as well.
Send Accept post Accept phone Accept Inspect claim Create claim Submit
Bank Accept E-mail Reject claim from office /
claim claim claim claim Internet claim
home
payment payments
E-mail claim
reject claim
Inspect claim
Post claim
reject claim
Inspect claim
Phone claim
reject claim
Inspect claim
Internet claim
reject claim
Inspect claim
Inform of rejection
Inform of acceptance
Submit payments
Process payments
Of course the IS service interaction model is derived from the Business service
interaction model. The model in the example above is a straight forward
deduction from the interaction models in the business and information
columns. Think of what could happen with the interaction model if we decided
to use workflow or business process management tools. Then we would have
to introduce an orchestrator IS service that expresses the requirement to
orchestrate the interaction between the other IS services; this orchestration
service then typically is delivered in TI. This service could also be the central
data storage service, passing the necessary data along with the orchestration
messages.
E-mail claim
Process E-mail claim
Post claim
Process Post claim
Phone claim
Process Phone claim
Internet claim
Process Internet claim
reject claim
Inform of rejection
Inspect claim
Inform of acceptance
reject claim
Inform of rejection
Pay claim
Submit payments
Process payments
104 3 IAF’s Aspect Areas Explained
Orchestration
services
Orchestrator
& storage
Inspect claim
Reject claim from office / Create claim Submit
home payment payments
As you can see in the example we have kept most services separate. The only
ones that have been grouped are the ones in claim management and financial
management. The main reason behind this is that we want to buy as many
components as possible. The components are grouped in such a way that they
are in line with possible technology solutions we can buy. The insurance policy
states the different ways a claim can be submitted. The customer can send an
email to our company, ACME Insurances Ltd., requesting an email claims
form. When an insurance policy is sent to the customer, a paper claims form is
added, so they can mail their claim. The existing call center will be equipped to
handle phone claims. ACME’s internet portal will be amended to handle claims
via a separate portlet.
Nowadays this is the most common way of constructing the logical information
system components. Combine the architecture principles with package knowl-
edge to construct LISCs that reflect what the business wants from a package
that is to be selected later on in the physical level.
Another way of working can be done in a situation in which a package is being
selected and the organization wants to change the processes to fit the package to
avoid package customization. Then you have the option to re-engineer the
LISCs and their IS services from the package documentation. Then you can
also re-engineer the business services that the package needs to deliver. After a
106 3 IAF’s Aspect Areas Explained
gap analysis between the existing business services and the ones the package can
fulfill you know what to change in the business.
Send
claim Bank
Internet claim
E-mail claim Post claim Phone claim
Orchestration
services
Orchestrator
& storage
The example shows an alternate way to create the LISC interaction model. IAF
does not prescribe how you create the models so you can fine tune this to your
specific requirements. The drawback of this way of creating the model is that it
invites to tightly link LISCs together. The other examples in this chapter invite
you to think more in terms of loose coupling, enhancing the SOA mindset that
IAF supports.
Orchestration Orchestration
services services
Orchestrator Orchestrator
& storage & storage
As you can imagine, this can become a complex view if it is done for all
collaboration contracts between LISCs, so focus on the ‘hot spots’ or on
the specific things you need to communicate to answer the concern the stake-
holder has.
Our example shows the main data flows in two situations. In the first we only
have one orchestration and data storage service in our Mumbai environment.
This leads to data being accessed in Mumbai from New York, Mumbai and
Bangalore. In the second situation we have duplicated the orchestration and
storage service. We will replicate the data between Mumbai and New York. In
that way we will be able to provide the people in the USA faster access. An
additional benefit is that we also have an automatic backup of the data in New
York.
You should consider this view if you are working in a geographically dispersed
environment. In spite of all claims from technology vendors, performance is still
an issue and you need to pay attention to it.
110 3 IAF’s Aspect Areas Explained
Of course, in this case this view is clearly reflecting the TI aspect area (network
bandwidth) and, in many cases, views such as the distribution view will span
both IS and TI aspects.
Post services
Claim
Internet services Customer
Claim
management Payments
Financial Payment
management
3.5 Information System Architecture 111
This view can be of particular use when you need to set up a master data
management structure. It helps you understand which components need
which data.
Front office
Call Click Face
In scope
Insurance selling
Out of scope
services
Call center Policy query Email services Internet services Insurance advice Post services
services services services
Mid Office
Customer services
Back office
The pitfall in creating this view is that you want to be as complete as possible.
This leads to drowning yourself and your audience in detail. Focus on what is
important. Show you have left out less relevant parts to manage expectations.
BpmPro
Orchestration
services
Erp-Claims Erp-finance
Claim Financial
management management
The techniques required to create the Physical IS components are not complex.
The complex part here is managing the process. Many of the stakeholders have
personal preferences and use whatever they can to influence the process. Most
of the time the architect has to stay impartial because he/she is an advisor to the
organization, not a decision maker. So stay objective and unbiased during the
process.
Send
claim Bank
Orchestration
services
Orchestrator
& storage
Inspect claim
Reject claim Create claim Submit
from office /
payment payments
home
Send
Bank EmailIt OcrPro CallPro PortalPro BpmPro Erp-Claims Erp-finance
claim
E-mail claim
Process E-mail claim
Post claim
Process Post claim
Phone claim
Process Phone claim
Internet claim Process Internet claim
reject claim
Inform of rejection
Inspect claim
Inform of acceptance
reject claim
Inform of rejection
Pay claim
Submit payments
Process payments
3.5 Information System Architecture 115
able to calculate costs with relative accuracy, as shown in the example. In other
cases, often when working on business unit or enterprise level it is not possible
to estimate costs accurately. Best practice in estimating in such circumstances is
to classify the different changes (small, medium, large) and assume –together
with your stakeholders – how much a type of change will cost.
Price per # Period Period Period Period Period Period Period Period Total
Cost group Cost element unit units 1 2 3 4 5 6 7 8 costs
Information
systems
Package licence costs 5000 1 5000 5.000
Package maintenance costs: 15-20% of
listprice per annum 1000 7 1000 1000 1000 1000 1000 1000 1000 7.000
Package customisation costs 4000 4
Package implementation costs
Testing
Interface creation
Shadow production
ETC
Totals 5000 1000 1000 1000 1000 1000 1000 1000 12.000
Interface specification
Interface Meaningful name Reference number
of interface (Version number)
Source Author Person who wrote this specification
PISC
Destination Approved Person who approved this specification
PISC
Date created
Date approved
Change request Reference no. of change request that has been
raised against this form
Source Destination
General information
Description Description of system that is the source of a Description of system that is the
message destination for a message
Information The source of information about the source The source of information about the
source system destination system
Owner The representative who is responsible for the Ditto; for the destination
system
Platform Description of the platform hosting the source Ditto; for the destination
system (OS)
Notes Any additional information that is relevant Ditto; for the destination
3.5 Information System Architecture 117
Functionality
Application Description of the system application Ditto; for the destination
Presentation Description of the user presentation interface, Ditto; for the destination
Data storage Description of how data is stored in the system Ditto; for the destination
Data format Description of format in which data is stored Ditto; for the destination
Dependencies Description of any other interfaces or processes that this Ditto; for the destination
system interface is dependent on
Invocation Description of how interface is to be invoked Ditto; for the destination
Error handling Description of how events that cannot be transmitted over Ditto; for the destination
the interface are to be handled
Interface failure Description of emergency procedures, manual or Ditto; for the destination
automatic, to be invoked when the interface fails
Notes Any additional information that is relevant Ditto; for the destination
Transformation
Current Current applications or functions that transform Current applications or functions that
technology data for sending to the destination system transform data sent from the source
system
Data type Legal and illegal data-types Ditto; for the destination
Translation Data translation requirements Ditto; for the destination
Explosion Rules for exploding a unit of data into multiple Ditto; for the destination
units
Implosion Rules for imploding multiple units down to a Ditto; for the destination
single unit of data
Validation Rules for valid data e.g. ensuring what you get the Ditto; for the destination
other end is correct at the bit level and
information level
Cleaning Rules for cleaning dirty data, e.g. data that is not Ditto; for the destination
Y2K compliant
Transformation Description of how Transformation Errors are to
errors be handled
Notes Any additional information that is relevant Ditto; for the destination
Security
Current technology Products, systems or processes used to assure security Ditto; for the destination
Authentication Required level of authentication Ditto; for the destination
Authorization Required level of authorization Ditto; for the destination
Audit Required level of audit Ditto; for the destination
Encryption Encryption requirement Ditto; for the destination
Notes Any additional information that is relevant Ditto; for the destination
118 3 IAF’s Aspect Areas Explained
Transport access
Networking Network interface supported at source Network interface supported at
interface destination
Protocol constraints Protocol constraints at source Protocol constraints at destination
Notes Any additional information that is Ditto; for the destination
relevant
Communication
Medium The form in which the data is packaged for communication over the
interface
Routing Routing protocols, requirements and rules
Availability The level of availability of the communication layer of the interface
Resilience Resilience requirements of the communication layer of the interface
Data loss Methods of mitigating data loss over the communication layer of the
interface
Recovery Procedures for recovering the communication layer of the interface
Load Methods of balancing the load on the communication layer of the
balancing interface
Volumes Expected volumes of data on the communication layer of the interface,
including average loads and peak loads
Frequency Frequency patterns of data on the communication layer of the interface
Performance Required performance targets of the communication layer of the
targets interface
Dependencies Current dependencies of the communication layer of the interface
Notes Any additional information that is relevant
Front office
Call Click Face
Insurance selling In scope
Erp-Ins Out of scope
Call center services Policy query services Email services Internet services Insurance advice Post services
PolInq Erp-Ins OcrPro
CallPro EmailIt PortalPro
Mid Office
Customer services
Customer access Customer info Customer self service ...
services
CRM-It ...
Back office
Product administration services
Claim Policy admin services ...
Erp-Ins ...
Erp-Claims
Front office
Call Click Face
In scope
Erp-Ins Out of scope
Mid Office
Customer services
CRM-It ...
Back office
Product administration services
Views that have been explained in earlier parts of this chapter, and which can
also be used here are:
Physical Information System Component view to show a relevant subset of
Physical Information System Component’s attributes;
Physical Information System Gap view to show gaps between baseline and
target architecture;
Physical Information System Component Security view to check if the security
attributes of the IS services in the PISCs are in line with each other. This view
should always be considered;
Physical Information System Component Governance (NFR) view to check if
the nonfunctional requirement attributes of the IS services in the PISCs are
in line with each other. This view should always be considered.
Additional views that can be considered are:
Physical Information System Reuse/Buy/Build view which shows which phy-
sical components will be re-used, bought and built;
The Development view can be used to show which components will be built
with which development tools;
The Product view can be used to show which physical components will be
delivered through a specific product. Additionally you can add the amount
of customization required for the different products so people can under-
stand where additional effort is needed to meet the requirements;
An Integration view can be created to focus on specific aspects of the inter-
faces between the components, such as communication mechanisms or
messaging formats.
At this point we have reached the end of the IAF information systems architec-
ture. We have determined the level of automated support required by the business
information services and documented that in terms of information system ser-
vices and their collaboration contracts. We have derived the service and colla-
boration contract attributes from the business information service attributes.
We have created our logical IS architecture by defining grouping criteria that
have been derived from the architecture principles. We have analyzed the
logical IS architecture from different viewpoints and we have refined it to create
the best possible solution.
Finally we have worked our way through package selections and cost estima-
tions to end up with a set of deliverables that will ensure the architecture is
implemented in the way intended. The next step for the information systems
architect is to use the architecture as a tool to guide implementation. The
3.6 Technology Infrastructure Architecture 121
3.6.1 Overview
The Technology Infrastructure Aspect Area focuses on defining which infra-
structure is needed to support the information systems architecture. Questions
that always pops up when we talk about this subject is: ‘What is infrastructure
actually?’ and ‘What is the difference between IS architecture and TI architec-
ture?’ Well, there are two things that help in understanding the difference. The
first is governance. The second is the presence or absence of business logic in the
service. Let’s elaborate on these two topics.
There are services that are used generically throughout the organization. It is
hard to define one owner who can govern the service. Often services like that are
managed centrally, typically by some form of IT department. Examples of
generic services are: e-mail, instant messaging, video conferencing, and office
automation. We position services like this in the technology infrastructure archi-
tecture area, as they can be seen as a form of infrastructure that is there for
everyone. Services with a specific owner are positioned in the IS architecture area.
Another characteristic of infrastructure is that it is usable by everybody that
needs it. It does not even know which different types of users are using it. To be a
bit more specific: it does not contain any business logic. If it did, it would become
specific to the business and belong to a specific area. In this line of thinking word
processing software itself would be generic and belong in the TI architecture. The
templates containing the company brand and look and feel would be specific and
belong in the IS architecture. The same goes for data base management systems.
The DBMS itself is generic and therefore infrastructure. The stored procedures
contain business logic and belong in the IS architecture.
We normally distinguish the following types of infrastructure:
(User) interface services which can vary greatly in size and shape. They can
vary from a normal desktop system through a barcode scanner to and RFID
scanner or a sensor in a machine.
Communications services provide the connection between the interface ser-
vices and the shared services described below. They can vary from proprie-
tary interfaces in a machine to the internet.
Shared computing services are the computing services that can be used by
multiple users or departments within the organization, for different purposes
and applications.
Shared storage services provide means for storing data that needs to be
shared between users.
122 3 IAF’s Aspect Areas Explained
Interfacing Data input Scanning Voice recognition Character Printed output ...
services services services services Recognition services services
choose to use as a
Office network Internet
basis. So for example Communications
services services
services
we would have a look
at our accept e-mail Shared Computing Administrative
claims service and computing services
services
determine which TI
Administrative
services are needed to Shared storage
Storage services
services
support it. We will
need some form of Systems software
Operating systems Security
desktop computer to & mgt services services
be able to read and
Generic application Office automation
analyze the claim, so services
services
we do need an inter-
face service. Let’s call
it ‘Data processing
service’.
We would also need to connect the data processing service to the generic e-mail
environment, so we’ll need an ‘Office network service’. To be able to receive e-
mails from the outside world we will also need some form of internet service to
3.6 Technology Infrastructure Architecture 123
communicate with our customers. This would go on until we have defined all
services required to support the IS service.
Creating TI architectures this way ensures you have a very good link between
the IS and TI services. It also is the most exact and time consuming way.
Nowadays many companies create ‘infrastructure catalogs’ in which they define
available sets of infrastructure that deliver a predefined Quality of service. They
enable you to select what you can use and only architect the parts that are not
available. The figure provides an example of an infrastructure catalog.
Shared storage High availability Standard data High availability Standard data
services storage storage storage storage
Generic application Office automation, e-mail and IM services Callcenter Office automation,
services application services e-mail and IM services
be defined without looking at the business, because you know you need a user
interface, a GPS receiver, a map storage device etc. to make that piece of
infrastructure work.
Data processing Data processing Data processing Data processing Data processing
Interfacing services services services services
services
services Post scanning
services
Call center
Interfacing services
Voice recognition
services
Web application
services
Office network Office network Office network Office network Office network Office network Office network
Communications
services services services services services services services
services
Internet connection Internet connection Internet connection Internet connection Internet connection
services services services services services
Systems software
Security Security Security Security Security Security Security
& mgt services services services services services services services services
Internet Security Internet Security Internet Security Internet Security Internet Security
services services services services services
Generic application Office automation Office automation Office automation Office automation Office automation
services services services services services
services
Target
architecture Internet Eliminated
Data processing Office network Post scanning services
connection
services services services
Baseline services
architecture
Upgrade:
Data processing
current services
services
are end of life.
Office network
Keep as is
services
New service:
New
needs physical
selection
Service Description Gap Gap Impact Effort to close the Other remarks
gap
Data processing Computers used by Services is end of Creation of a new Out of pocket: -
services end users to access life-cyce. Needs to data processing € 250K
the applications be replaced service, and its Implementation
implementation effort: 5 FTE for 3
throughout the months
organisation
Internet connection Service that Insufficient Needs complete re- Out of pocket:
service enables end users availability design due to € 100K
to access the defined availability Implementation
systems through requirements. effort: 5 FTE for 4
the internet months
Although the technical infrastructure services gap view is one to consider, most
of the time gaps are defined and communicated at the logical and physical level.
nique as all other component types. Ser- Office automation Internet Security
services services
vices are grouped into components
based on criteria that have been derived
Low security
from the architecture principles. Most of Medium security
the time the defined technology infra- High security
structure components are communi-
cated as shown in the example. All com-
ponents, and the most important connections between components are
visualized using logical forms. This keeps people away from thinking physical,
and getting confused as a result.
A second example from real life is shown in the figures below. Its advantage is
that it uses standardized symbols for routers, switches, firewalls etc., which
makes communication with technologists simpler. The drawback is that it tends
to confuse less technical adept readers.
3.6 Technology Infrastructure Architecture 129
The Routed Front-End service provides several functions. These routers are
responsible for propagating the IP subnets used in the front-end to the
Internet client community.
If redundant connections to Internet Service Providers (ISPs) exist, the Border
Gateway Protocol also allows for load-distribution and fail-over across such
connections. In addition, the routed front-end also provide preliminary
security through the use of extended Access Control Lists (ACLs) applied to
allow only TCP/80 traffic (HTTP), TCP/443 (SSL), and UDP/53 (DNS) through
this network layer.
Using Server Load Balancing (SLB), a series of front-end web servers, each
offering identical and synchronized content, are represented as one common
server to the client community. Each real web server is mapped to a virtual IP
address (VIP) to which clients create HTTP and SSL connections. The SLB
service distributes connections amongst the real web servers as determined by
the chosen predictor algorithm. Should a server become unavailable, it is
removed from service and no additional connections are redirected to it.
In this architecture, there is also a firewall functionality in this devices
included. This represents the 1stlevel firewall measures.
The web servers host the actual site content that the client sees on their web
browser. Whether it be static content such as graphics, or dynamic content
(.cgi, .asp, etc..) the web servers are the only systems in direct contact with
the end client. In addition, the web servers are the only authorized hosts able
to access the back-end database and application services as necessary.
The application servers are operating in their own network segment. The
switches are managing these individual network segments
The application servers reside in the secure section of the network and house
the actual e-business applications. Although Internet-based clients do not
directly attach to these servers, the front-end web servers will initiate
Si Si connections to these servers when a client conducts a series of actions such as
logging in, checking inventory, or placing an order.
Automatic routing is prohibited. The communication between application and
database servers is arranged directly by the applications. This is a additional
security requirement, to avoid direct access to the database servers by
intruders.
The database servers are also operating in their individual network segment.
The switches are managing the theindividual segments of application and
data servers.
The database servers reside in the highest secure section of thenetwork and
house the actual databases. Although Internet-based clients do not directly
attach to these servers, the preceding application servers will initiate
connections to these database servers when a web access conductsany kind
of transaction.
130 3 IAF’s Aspect Areas Explained
Office Office
network Internet Internet
network
Front office Back office Orchestra- Storage Security Email Post server Call center Claim mgt Finance Orchestra- Storage Security
server server tion server server server server mgt server tion server
132 3 IAF’s Aspect Areas Explained
Call center
services
Post services
Logical TI components are in line with each other. This view should always be
considered.
Technology Infrastructure Design Decisions can be documented in terms of
architecture principles to help the architecture implementers understand
WHY things are the way they are.
Logical Technology Infrastructure Migration View to pass on instructions regard-
ing the logical Technology Infrastructure architecture to the implementers.
Other views that can be considered are:
Logical Technology Infrastructure Disaster Recovery View. This view zooms
into disaster recovery and highlights how it has been addressed in the TI
architecture. Very often the logical TI component model is used as the basis
for this view. Annotations and comments are added to show how disaster
recovery has been addressed. The rest of the views in this list can be constructed
in the same way as described here. They highlight the topic in the view’s name.
Logical Technology Infrastructure Logging and Monitoring View. This view
shows which mechanisms have been selected for the control of activities
performed (logging) and the control of availability of the system (monitoring).
Logical Technology Infrastructure Backup and Archive View. Here we zoom
in on the components we have defined for backup and archive of data. Besides
showing the components, we often highlight specific aspects like frequency of
backup/archive, capacity of the components and duration of the activities.
Logical Acceptance Environment, showing the specific components that are
to be used for acceptance of new/changed IS components.
Logical Test Environment, showing the components used for testing.
Logical Development Environment, showing the components used for devel-
opment of IS components.
Office network
Internet
Internet Internet server Internet
security security
Front office Back office Orchestration Storage Security 1 Desktop accesses orchestration server
server server server
2 Orchestration server accesses front office server
Purchasing, implementation and testing costs are just part of the costs that have
to be taken into account in the TI architecture. Maintenance costs commonly
are 20% of the purchase price per year, and thus a significant part of the total
cost. HVAC (Heating, ventilation and air conditioning) can also be a significant
cost element. Ensure that this topic is addressed. We have encountered situa-
tions in which the utilities company could not deliver sufficient power to the
datacenter to run all the machines and the HVAC needed. TI costing can be a
detailed exercise, especially if the total cost of ownership (TCO) has to be
compared for multiple scenarios. There are models available on the internet
to assist in defining TCO.
the logical IS-TI mapping, and is created just as the logical view is created.
The physical IS components are superimposed on top of the physical TI
components.
This view needs knowledge from the IS as well as the TI area. It is commonly
created as a joint view for both areas.
3.6 Technology Infrastructure Architecture 137
architecture can now run on the required infrastructure. We also have defined
which generic applications are needed to support the business. We have defined
and analyzed the required interfaces between the infrastructure components.
We have also analyzed different solution alternatives, at logical and physical
level.
We are not finished with the architecture work. Security and governance, which
are quality aspects, have had a lot of attention in the architecture work so far.
However, we still need to address them from another angle. The next chapter
shows what that angle is.
3.7.1 Introduction
The degree as to which an architecture fulfils the objectives is a constant field of
tension that an architect must deal with. There usually is a prime motive that a
client and his associated stakeholders have with the outcome of the architecture,
being an operational system in some form. Associating quality factors with
elements of the architecture helps to determine which combination of elements
is core in achieving the objectives. These factors are expressed in terms of
quality needs, also referred to ‘non-functional requirements’ (NFR’s), ‘quality
attributes’, ‘service quality’ or ‘quality of service requirements’. Quality factors
are applicable throughout the entire architecture design, for which several
approaches have been developed as a common practice.
3.7.2 Quality
For the scope of architecture we will simply regard ‘quality’ as the set of
characteristics of a system that give that system the ability to satisfy expressed
and implicit needs. In that sense, quality expressions are always in the context of
something. Qualities can relate to execution, such as security and usability,
which are observable while the system is operating. Another group of qualities
relate to the ability of the system to evolve, such as agility, testability, main-
tainability, extensibility and scalability. These are embodied in the structure of
the system.
The quality parameters are quite diverse, which is the reason that the
industry has developed classification schemes and taxonomies that present
them in a useful structure. One of these schemes is ISO 91264, which deals
4
ISO/IEC 9126, information available via Wikipedia. Http://en.wikipedia.org. Accessed April
2009
3.7 The Quality Aspect of Architecture 139
Another such classification scheme is ISO 7498-2 for security services and
related mechanisms.
5
It should be noted that several of these quality models may not have been altogether new and
might have emerged long before; we only try to indicate the point in time where these areas
actually entered the ‘holistic’ Business/IT architecture arena, and required the architect to
develop skills in them.
3.7 The Quality Aspect of Architecture 141
The architect must be equipped with a framework that deals with these diverse
areas where quality is in the core of the subject at hand. In IAF we see these
notions of quality affect all aspect areas, and as such we say they form a separate
layer ‘behind’ the framework, touching all – or many – cells and artifacts in the
IAF matrix; hence we speak of the ‘third dimension’ of the framework. It
enables both general and specialized business/IT architects to work along the
same line of thinking (one of the principles behind IAF being ‘architects hunt in
packs’). In the current IAF v4 a provision was made to address quality aspects
in line with the core aspects’ artifacts through additional quality attributes.
In the following sections we will address topics that are of additional relevance
for the architecture when dealing with these dedicated quality areas.
information technology
business information
systems infrastructure
principles:
- use open standards
contextual - support green IT
- retain core tasks, outsource routine
...
3.7.3 Contextual
3.7.3.1 Principles
While expressing the general purpose and ideas behind the architecture, the
architecture principles typically also address the need to fulfill certain quality
needs, e.g. in IT service provisioning, security or compliance. These principles
can originate from the organization’s vision and corporate values (e.g. ‘infor-
mation must be available on a need-to-know basis’), or from sources that
impose their compliance regulations (‘solutions must adhere to the data protec-
tion act’, ‘all financial transactions of over E25.000,- must be reported to the
financial supervisory authority’, or ‘company websites must adhere to the W3C
Web Accessibility Initiative guidelines’). It is up to the business vision and
strategy to determine the style with which the business will adhere to these
regulations; the chosen style will then be reflected in some architecture
principles.
Especially for security, compliance and governance a good place to find related
principles is in the company policies. Many organizations will have a compli-
ance policy or security policy.
Since principles drive the assessment of alternatives within the architecture, we
can expect these quality-related principles to have a notable influence on the
overall architecture, as we will see below; it is therefore important that the set of
quality-related principles is balanced, consistent and complete given the scope
of the architecture.
Depending on the type of architecture (enterprise or solution level) the quality
related principles might be quite high level or detailed. At enterprise level the
architecture principles might be expressed as ‘business agility through a short
time-to-market for implementing legislative changes’, or ‘operational excellence
through maximizing straight through processing of customer orders’. For
solution level architecture the quality requirements need to be more precise
and detailed than at enterprise level. Typical examples would be ‘the system
must be capable of processing 10,000 orders per day, each within 2 seconds’,
‘every user must be authenticated through a combination of knowledge and
biometrics’ or ‘multi-language support for at least English, French and
Spanish’.
3.7.4 Conceptual
3.7.4.3 Services
While architecting, you will discover new services which have a strong rela-
tionship with quality: you will need services to ensure the desired quality.
Basically the process to discover those quality related services is exactly the
same of the process for all other services. You could start by defining a goal
like ‘ensure quality’ or ‘ensure compliance’ or by identifying a role such as
‘security officer’.
In many quality areas, best practice frameworks have been developed; these
enable the architect to anticipate the need for additional quality-related con-
ceptual services and actors in an early stage. Beware that a large number of best
practice quality frameworks tend to be activity oriented. Example for systems
management: from the ITIL best practices we can anticipate a configuration
data service, as shown the diagram below, arrow 1.
best practices
quality frameworks
conceptual:requirements,
services, actors 1
logical:
2 alternatives
physical:
options
3
In other cases, where best practices are not available or the requirements are to
a level conflicting, the assessment of alternatives and options may lead to the
deferred identification of additional conceptual services in the logical or
physical stage (diagram above, arrows 2 and 3). An example of the latter
case is, an initially identified service called ‘investigate case’ where expected
transaction volume and confidentiality level may induce the architect to split
the service into a ‘high-volume/low confidentiality’ service and a ‘low-volume/
high confidentiality’ service, in order to make the overall solution cost-effec-
tive; otherwise the confidentiality requirement of a low volume would dictate
the overall ‘high-water mark’ confidentiality level for the generic service to be
needlessly high.
146 3 IAF’s Aspect Areas Explained
high confidential
low volume
generic
service
service for
high confidential / low volume
3.7.4.4 Contracts
Services interact with each other. These interactions and their nature are
described in service collaboration contracts. Within the contracts the Quality
of Service requirements are formalized. The contracts form the basis for nego-
tiating service level agreements.
3.7.4.5 Roles
You might want to introduce new roles from a quality perspective. Examples of
new roles that can be introduced are: compliance officer, security officer,
quality manager and IT operations manager. Whether these roles are intro-
duced in the architecture will depend on a number of factors:
Scope and objective of the architecture.
Importance of one or more quality aspects for the organization. The more
important, the more likely it is that you will need to define specific roles.
Level of maturity of the organization with respect to quality. In more mature
organizations specific roles will already be identified or can be more easily
introduced.
Remember that each of the roles that are introduced should be associated with
at least one business goal and business activity, and should lead to the intro-
duction of new business services – otherwise the objective of having such a
newly identified role would remain unclear of implicit.
3.7.5 Logical
As an architect you will have to find an integrated solution with the right
attention for the quality requirements. This means designing a logical architec-
ture across all aspect areas in scope balancing the principles and quality
3.7 The Quality Aspect of Architecture 147
requirements. As the focus switches toward quality, the architect will need to
find solutions that meet the expressed quality requirements for the services
(QoS).
The quality related principles and QoS will have a strong impact on the design
of the logical architecture. Some logical alternatives will not be feasible because
of constraints imposed from a quality perspective. Or you will find that you are
not able to design an architecture that meets the high quality requirements and
the ‘low cost’ principle.
Typically you would group the services with the same QoS characteristics and
find a solution for meeting those quality requirements. In finding those solu-
tions you might benefit from best practices and patterns. A solution for meeting
the quality requirements often calls for a new service, in case the original service
cannot provide for the desired level of quality.
It could also result in splitting of one service into multiple services. As an
example a business service which has high availability/low security and medium
availability/high security requirements. In this case you might decide it is better
to split this service into two services than to find one solution that will support
both requirements.
The quality principles might lead to a different or more detailed clustering of
components as opposed to the clustering without paying attention to quality,
based on other principles. This is natural. You could end up with different
components based on the segregation of governed and governing or IT opera-
tions being separate from those using IT. Or: a component in which secret
information is processed is separated from a component in which information
up to company confidential information is handled.
3.7.5.2 Controls
Especially in the field of security and compliance the word ‘control’ is often
used. A control is a means of managing the risk of a required level of quality
being compromised. Within IAF v1 and v2 we have used the word ‘mechanism’,
but that was abandoned in later versions. The term ‘control’ is also used as a
synonym for a safeguard, security measure, countermeasure or mitigation.
148 3 IAF’s Aspect Areas Explained
6
BS 7799, information available via Wikipedia. Http://en.wikipedia.org. Accessed April
2009
7
ISO/IEC 27001, information available via Wikipedia. Http://en.wikipedia.org. Accessed
April 2009
3.7 The Quality Aspect of Architecture 149
Many of the views described in the previous paragraphs can be used to express
the quality aspects of the logical architecture. In real life projects we have found
that especially views focusing on the security, compliance and/or governance
aspect are most commonly produced. Some typical example are:
A view in which risks and all measures to ensure quality (security, com-
pliancy) are depicted, showing the type of measure (preventive, detective,
corrective) and the component to which they have been allocated;
A view in which the owners and stewards of the business/information/
information system/ technology infrastructure components can be seen;
The areas or components in which sensitive information is held and
processed;
The information flows that hold information with respect to monitoring the
quality.
As for the ‘green’ aspect we could expect a view on for example the carbon
footprint of the datacenters.
3.7.7 Physical
4.1 Introduction
Domain architecture, which also supports planning purposes, but now within
a business unit;
Solution architecture, which supports design and shaping of solutions. Solu-
tion architecture engagements realize changed business (processes) and their
supporting applications running on changed infrastructure. The term project
architecture is also often used in this context;
Software architecture, which is aimed at guiding the development of soft-
ware, ensuring that the right software patterns, style guides etc. are used.
1
http://it.toolbox.com/blogs/lea-blog/frameworks-and-models-the-myth-10999.
4.2 IAF and Other Architecture Frameworks 153
2
Source: TOGAF ADM Card.
154 4 IAF in Perspective with Other Frameworks and Methods
IAF Business,
conceptual, logical
and physical are
positioned here
IAF Information, IS
and TI physical are
positioned here
4.2 IAF and Other Architecture Frameworks 155
Furthermore, the IAF structure can be used to position assets within the
enterprise continuum. Finally, the Resource base can be used as reference
material during the creation of the architecture.
Continuum Continuum
asset asset
Contextual
Continuum Continuum
Logical asset asset
Physical Continuum
asset
A set of features that show the differences between IAF and TOGAF 8 are
shown in the table below.
156 4 IAF in Perspective with Other Frameworks and Methods
DYA recognizes the creation of enterprise and domain (business unit level)
architectures. They are the basis for the creation of project start architectures,
4.2 IAF and Other Architecture Frameworks 159
During 2006 The Open Group accepted the SAP company as a member of The
Open Group. SAP wanted a certified methodology with their product and
Franck Lopez, SAP Global lead for Enterprise Architecture, began looking
for a partner with qualified architectural skills to help them. SAP chose to work
with Capgemini.
Early 2007, a program was set-up to realize a new methodology based upon
SAAF, TOGAF and IAF from Capgemini. A team of 15 consultants and
architects from SAP and Capgemini worked on this methodology, to be
launched as SAP EAF (Enterprise Architecture Framework).
160 4 IAF in Perspective with Other Frameworks and Methods
Business Strategy
Business Operating Models
Business Change Initiatives
Business Domain Best Practice & Expertise
IT Supply Footprint
Project/
Enterprise Solution Business Final Go-live and
IT Strategy Realisation Operations & Support
Architecture Architecture Blueprint Preparation Support
Technology Innovation
162 4 IAF in Perspective with Other Frameworks and Methods
3
The Zachman Institute for Framework Advancement (ZIFA) is at: www.zifa.org
4.2 IAF and Other Architecture Frameworks 163
Both Zachman and IAF are artifact frameworks. In effect many of the items
identified within the cells of the Zachman framework can be seen as potential
viewpoints for IAF.
TM
ENTERPRISE ARCHITECTURE - A FRAMEWORK
DATA What FUNCTION How NETWORK Where PEOPLE Who TIME When MOTIVATION Why
SCOPE List of Things Important List of Processes the List of Locations in which List of Organizations List of Events Significant List of Business Goals/Strat SCOPE
to the Business Business Performs the Business Operates Important to the Business to the Business
(CONTEXTUAL) (CONTEXTUAL)
Planner ENTITY = Class of Function = Class of Node = Major Business Ends/Means=Major Bus. Goal/ Planner
Business Thing Business Process Location People = Major Organizations Time = Major Business Event Critical Success Factor
e.g. Semantic Model e.g. Business Process Model e.g. Business Logistics e.g. Work Flow Model e.g. Master Schedule e.g. Business Plan ENTERPRISE
ENTERPRISE System
MODEL MODEL
(CONCEPTUAL) (CONCEPTUAL)
Owner Ent = Business Entity Proc. = Business Process Node = Business Location People = Organization Unit Time = Business Event End = Business Objective Owner
Reln = Business Relationship I/O = Business Resources Link = Business Linkage Work = Work Product Cycle = Business Cycle Means = Business Strategy
e.g. Logical Data Model e.g. Application Architecture e.g. Distributed System e.g. Human Interface e.g. Processing Structure e.g., Business Rule Model
SYSTEM
SYSTEM Architecture Architecture
MODEL
MODEL (LOGICAL)
(LOGICAL)
DETAILED e.g. Data Definition e.g. Program e.g. Network Architecture e.g. Security Architecture e.g. Timing Definition e.g. Rule Specification DETAILED
REPRESEN- REPRESEN-
TATIONS TATIONS
(OUT-OF- (OUT-OF
CONTEXT) CONTEXT)
Sub-
Contractor Ent = Field Proc.= Language Stmt Node = Addresses People = Identity Time = Interrupt End = Sub-condition Sub-
Reln = Address I/O = Control Block Link = Protocols Work = Job Cycle = Machine Cycley Means = Step Contractor
FUNCTIONING FUNCTIONING
e.g. DATA e.g. FUNCTION e.g. NETWORK e.g. ORGANIZATION e.g. SCHEDULE e.g. STRATEGY
ENTERPRISE ENTERPRISE
organization, where the processes are the most essential processes within the
organization. The processes and process steps can be positioned as a refer-
ence model for the real life IAF architecture that is influenced by the context
(business strategy, compliancy, etc.).
Meaning Value
association
Business Business
Event
service assignment interface
Business
Business
object Business Business
process role
Business
triggering actor
Application Application
aggregation
service interface
Application
Data
object Application Application
function component
flow use
Technology
System
Device Network
access software
revised and completed and the transformation design is finished as well. Impor-
tant aspects as the Business Case behind the transformation at hand and impact
on people and technology are addressed.
Finally, during Phase 2, Delivery, the transformation is actually delivered in
timeboxes. Most important deliverables are obviously solutions and results in
conformance with design, well managed entry and exit points of the transfor-
mation phases. Quality of service is established.
4
www.wikipedia.com: IBM Rational Unified Process.
170 4 IAF in Perspective with Other Frameworks and Methods
Contextual
Business Information IS TI
Conceptual
Logical
Physical
4.4 IAF and Analysis/Design/Development 173
Information
planning
Definition
study
Basic design
Detailed
design
Build
Implemen-
tation
Usage and
maintenance
There is a focus difference between business architect and business analyst. The
architect puts more focus on fitting ‘the system’ into its environment, while the
analyst/engineer focuses on the internal structure of ‘the system’. If both roles
are executed by one person (which happens frequently), there is no real distinc-
tion between the architecture and the business analysis work.
When combining IAF and IDF the project has to choose which approach is the
best. Rule of thumb: When the engagement is about planning the change, then
IAF is the best. If it is a major change to the infrastructure that has to be
implemented, then IDF will provide more support.
IDF is used in Infrastructure Engineering (IE) projects and describes in details
steps and deliverables. IDF contains seven phases and addresses different
technology areas:
1. Integration
2. Network
176 4 IAF in Perspective with Other Frameworks and Methods
3. Servers
4. Storage
5. Middleware
6. Security
7. Governance
A phase is made up of a number of stages. Each stage covers multiple activities
each of which create a work product. A deliverable is the combination of Work
Products that are the output of a phase.
When having a closer look at both, we note that IDF and IAF serve different
purposes and are complementary to one another, as illustrated below.
IDF IAF
Process driven Framework model
Technology best practices Content driven
Supports implementation Supports decisions
Based on Technology Domains Overall view, with B&I supporting Business
and IS&TI supporting Technology Services.
It’s not only that IDF and IAF serve different purposes, it is also that infra-
structure engineers and architect have a different approach. An Infrastructure
Engineer works bottom up, is solution driven with a strong technology focus
and on detail. An architect on the other hand works top down, is advice driven
with a strong focus on Business and IT, overview and relationships. Another
reason why Infrastructure engineers and architects need each other.
B I IS TI
Context
Concept
Analysis
Implementation
/ Migration/ Build
Run
As illustrated above, IDF partially overlaps IAF, certainly for logical and phy-
sical TI. In IDF the Analysis is a drill down of the requirements for the project
and the current situation within the domain of the project. Objectives of this
phase are to have a clean set of requirements and to achieve a detailed under-
standing of the existing situation to be able to develop realistic transition scenar-
ios from the existing to the new infrastructure. These activities overlap with the
IAF activities to define IS&TI services and the accompanying contracts. The
transition scenarios overlap with the activity to develop solution alternatives.
178 4 IAF in Perspective with Other Frameworks and Methods
IDF High Level Design provides a high level indication of which solutions are
needed and at what cost. Attention is given to both logical and physical design
aspects, covering the standards, mechanisms and protocols used. These activities
overlap with IAF activities to further develop and select solution alternatives,
specify interaction models and specify the accompanying contracts.
During IDF Detailed Design the infrastructure engineer defines the level of
detail for the various components for each segment, including the character-
istics of the components. The level of detail is determined by the complexity,
scope and intended audience. Impact for migration and implementation is
checked, a test plan is developed. These activities overlap with IAF activities
at physical level where physical components and contracts are specified, along-
side with migration view, distribution view, security view, product view, etc.
IDF activities Implementation/Migration/Build and the activity Run have no
counterpart in IAF.
Ideally, there is a gradual transfer from architect to infrastructure engineer
during these activities.
Essential
Business Tools &
Needs Infra
B I IS TI
Contextual
Why
Conceptual
What
Logical
How
Physical
With What
IDF
The interaction between IDF and IAF varies with customer, scope and people
involved. For instance, it is possible that IAF will not go into physical TI,
because this responsibility may be devolved to the IDF implementation. How-
ever, it is also possible that architecture decisions within Physical TI will also
exist, and these will also become inputs to the IDF.
The IAF Physical TI cell provides the logical service mappings for the High
Level Design Phase in IDF (physical TI components and the Physical IS – TI
cross-references). The IAF physical phase is usually shared by IS and TI areas,
because the borderline between IS-components and TI-components is some-
what arbitrary. Somewhat depending on sector, many common package appli-
cations, like browsers, text processing tools, e-mail clients, system management
tools, etc. are defined in the TI aspect area.
Governance Methods St
ills an
Sk da
& rds
ge A lig
led nm
ow Continual Service en
Kn Improvement
t
cs
Ca
Service
opi
se
Design
ity T
Stu
cial
die
S pe
Service
Strategies
tion
ITIL
Introduc
Service
Template
Operation
ive
Co mpr
en e
vem rvic
s
Execut
nti ove
I
t
nu
pro Se
Service
al men
Im nual
Transition
Se t
rvi
nti
ce
Co
St
ity
ud
l
bi
y
ala
Ai
ds
Sc
Quali
ficati Wins
o ns ick
Qu
180 4 IAF in Perspective with Other Frameworks and Methods
The following picture (which is Figure 23 in COBIT 4.1) shows the overall
COBIT framework, with these four domains and their defined processes.
184 4 IAF in Perspective with Other Frameworks and Methods
Besides this COBIT contains a maturity model which defines when a specific
process is at a certain maturity level.
COBIT can be used in an IAF engagement as a business reference model
for the design of IT Governance in an organization (logical business
architecture).
Blueprint Design and Delivery, which complements the Vision. The Blue-
print is an accurate description of the future state in terms of business
models, organizational structures, processes, information flows and technol-
ogy. The Blueprint is designed at the start of the program and maintained
during the program.
Planning and Control.
Business Case.
Solution
Project brief architecture 0.1
Business, IS,
Initiating a project technology and IAF to physical level
Solutions phases
Implementation
Controlling a stage governance
And lastly, a tool support the architect to work more efficiently: Faster archi-
tecture creation and maintenance – the tool supports the architect, for example
by generating views.
There are dozens of tool sets that support the work of an architect; to keep this
section agnostic of the specific tools – which all have their undeniable merits and
occasional drawbacks – we approach this issue from a conceptual standpoint.
The figure below is a function reference model that Capgemini has used in the
selection of architecture tool sets.
Modeling services provide the base metamodel structure for the repository
and – preferably graphically – enable the architect to register new artifacts
and relate them to others, as well as executing tasks like what-if analysis
studies;
End-user services are there to serve the entire potential user community,
either skilled and trained (architects) or informed users (business
representatives);
Collaborations enable architects and other involved staff to collaborate on
building the body of knowledge of the enterprise architecture;
Security service provide for authorized access to viewing or updating func-
tions of the repository;
Integration services focus on the program-to-program interactions between
the repository and adjacent applications (e.g. MS Excel for uploading, MS
Access for extraction or interoperability with an operational configuration
management database (CMDB));
Channels allow for access to the repository;
Life-cycle services enable the architect to work with current and anticipated
version of artifacts, and as such assist in the time-phased aspects of archi-
tecture (As-is, To-be, intermediate landscapes).
import and export facilities to most common file extensions like Microsoft
Word, Excel and Visio or Adobe Acrobat or just plain text.
Anno 2009, multiple tool vendors are in the process of getting their products
IAF compliant certified – or have actually achieved that status.
Start
Activity 1
Fork
Activity 2 Activity 3
Branch
Activity 4 Activity 5
Merge
Join
Activity 6
End
194 4 IAF in Perspective with Other Frameworks and Methods
td State Lifeline
{Duration Constraint}
TimeLine1
State 1
State 2
{Time Constraint}
State 3
Event
State 4
0 10 20 30 40 50 60 70 80 90 100
In 1981 the ICAM program, the U.S. Air Force program for Integrated Com-
puter Aided Manufacturing, developed a series of techniques known as the
4.10 IAF and TechnoVision 195
Since its first edition in 2001, Capgemini’s TechnoVision has successfully been used
as an approach to help clients to select new technologies that support their goals
effectively. In its core, the recent edition of TechnoVision provides a mechanism to
our clients to cope with the diversity of technologies that have emerged in the
recent past – and will continue to do so in the future. The question which
technologies will hold their relevance for their business in particular, and which
196 4 IAF in Perspective with Other Frameworks and Methods
technologies are more like gadgets or ‘one day flies’ in that context, has increas-
ingly become an issue for organizations. This is all the more relevant in times where
the state of the economy requires a stronger focus on cost efficiency, and expen-
ditures in IT are under constantly high scrutiny from management.
TechnoVision is a framework to group the hundreds of current and new
technologies into ‘technology areas’, which for manageability purposes have
been captured into seven theme groups. With TechnoVision, technology is
presented in a form that appeals to business and IT representatives alike, and
as such helps to bridge the gap that has existed between them.
Mash–up
Real-time applications
Real-time business
integrated process
business control
intelligence Composite
applications
Sensing
Packaged Networks
Sector/Segment
Smart business Solutions Free agents
networks Role Based nation
Social User
Collaboration Portals
Tools /
iPodification Wikinomics
Software
Google–fication
as-a-service Utility
Business Infra-
Mastered structure
data
Jericho style management
security
Rich Internet
Applications
The ‘vision’ component part of TechnoVision lies in the fact that in Capgemini’s
expert vision the technology clusters will remain stable, while new technologies
will continue to emerge, and that these will fit in the clusters and will be better
manageable.
In a technologically volatile environment we must find a way to create a stable
business and IT landscape that is flexible enough for changes – we all know that
additionally, business will change in its own pace. In Capgemini’s opinion, this
stability can be achieved through architecture.
The TechnoVision is something every innovation-oriented technology service
provider should have: a comprehensive perspective on the evolution of tech-
nologies. Capgemini’s TechnoVision goes further than most in that it also
addresses the impact of technology on our clients’ business and our own
capabilities.
4.10 IAF and TechnoVision 197
and through stabilizing and then ‘service enabling’ the existing legacy
systems. (Technology areas: Rationalizing Packaged Sector/Segment Solu-
tions, Software-as-a-Service)
Invisible Infostructure is the end-state of infrastructure as we currently know
it, using virtualization, grid and automated management technologies to
deliver infrastructural services – including all facilities to securely capture,
store, exchange and process (inter)company information – as a commodi-
tized, preferably invisible utility. (Technology areas: Utility Business Infra-
structure, De-perimeterized ‘Jericho style’ Security and Identity, Sensing
Networks)
Open Standards, Service Orientation and Cloud represent architecture
style elements that underpin the other technology clusters, making this a
‘virtual’ or ‘meta’ cluster. As more organizations rely on intelligence from
outside the corporate perimeter, open standards for boundaryless informa-
tion flows are a necessity, both horizontal (infrastructural) and vertical
(industry specific).
TechnoVision addresses one of the major driving areas for architecture: new
technology. The business needs to decide which technologies to choose from in
order to better achieve its goals. TechnoVision supports this process through a
tightly facilitated ‘pressure-cooker’ approach. During these sessions, technol-
ogy options are assessed against selected business drivers, leading to ideas on
which changes to initiate.
In order to produce a suc-
cessful outcome, most
change initiatives will as a
starting point need a clear
picture of the current situa-
tion, even maybe in a green
field situation. Together
with the desired situation,
this current state must be
presented in a way that is
comprehensible for all par-
ties involved that have
some interest in solving the
issue. In other words, it is
advisable that the building blocks of the current architecture and those from
the target architecture are consistent. When applying to TechnoVision, this
implies that the selected building blocks must fit in the overall architecture
description.
4.10 IAF and TechnoVision 199
Remember the reasons for IAF stated in chapter 1? The IT landscape became
more and more complex, and we needed tools to manage that complexity.
Architecture was the term that was coined to describe the activities that we
were executing to manage the complexity. The ones who actually perform these
activities are the architects.
Through time architects gained more visibility and got their own place within
the IT organization. It became clear that two architects do not necessarily work
the same way or deliver the same products. The call for professionalization of
the architecture process and architecture function emerged.
Within Capgemini we experienced that IAF can help to do so. This chapter
provides insight in the best ways IAF can be used (implemented) to professio-
nalize the architecture function in an organization.
Instead of improving the overall benefit for the organization, you might end up
with an improved architecture function not aligned with the rest of the organi-
zation. The use of architecture maturity models will help in choosing the best
way forward to improve the architecture function in line with the maturity of
the overall IT organization.
A final aspect to consider is the way IAF and architecture is applied within the
organization. Typical applications of IAF implementations in organizations are:
Support decision making, with focus on shared conceptualization and
understanding by stakeholders. Focus is on the aspired future (when doing
logical level architecture) and much less on detailed models and guidelines.
This is enterprise architecture type of work.
Guiding realization, with focus on guidelines and standards, entering physi-
cal solutions. This is solution architecture type of work.
Design authority, with focus on getting and being in control regarding the
information systems architected and realized.
At the enterprise level, the architecture focus is broad and decisions are much
more strategic in nature, concerned with setting direction and policy often as
part of the enterprise transformation. Architecture is used to investigate differ-
ent strategic options or to design a blueprint of the desired future state. In this
context, answering ‘What’ is the priority along with a broad indication of
‘How’. We might assess options for implementations (reuse some of the existing
parts, whether in business or IT) or assess options for outsourcing, shared
service centers or portfolio management or a plateau planning for the enterprise
transformation. ‘With what’ will then produce policies and principles to be
followed. In some cases this may extend to products and standards often in the
form of architecture constraints, for example, ‘We will use our current invest-
ment to support all subsequent ERP solutions.’
This is where the architecture scope and objectives are crucial to selecting the
correct areas of the framework to use, and even more importantly, the level of
detail required to achieve the architecture objectives. For example, is the architec-
ture being used to answer a business transformation objective or an IT Enablement
question? In the former case, the focus may be to view the business and information
aspects in more detail, whereas the latter will focus more on the IS aspects.
The deliverables from the two examples would often be the same but with
different focus and detail:
Business and technology context aspect focusing on business context and
principles for business transformation and on the IT context, and business
and IT principles for IT enablement.
5.3 IAF for Solutions Architecture 203
The essential message is that the main objective of IAF for solution architecture is
to guide development. Our focus is on providing scope, IS and TI standards, rules
and guidelines for the developers. Besides that, architecture describes how the
solution has to fit into its environment. This paragraph describes some specific
aspects to keep in mind. Remember that Sect. 4.7 elaborates on the IAF for
solutions architecture approach by combining IAF with TOGAF and Prince2.
The overall principle when working with IAF for solution architecture: less is
more. The developers don’t want thick documents with an overload of detail.
They want just enough, just in time documents and details. IAF can help in that.
When using IAF to develop an IT solution architecture, the overall approach
will depend on the availability of appropriate input. Ideally, an existing enter-
prise architecture will exist, although care should be taken to ensure that the
scope and objectives of that are aligned to the scope and objectives of the
solution architecture. Using the example from the previous section, it is unlikely
that the IT enablement enterprise architecture would be sufficiently complete to
support the elaboration of a business solution architecture, although it would
provide a lot of valuable information.
This is a very common trap (irrespective of approach, tools and methods used)
where the presence of an ‘enterprise architecture’ leads to assumptions about
completeness of information to support solution architectures.
204 5 Applying IAF and Using Its Outcomes
It is also worth remembering that the IAF is a content framework, not a process
framework. This means that relationships between artifacts indicate starting
points for each aspect area. Completeness of information required from other
aspect areas to support a specific aspect comes from all levels. For example, the
organizational disposition of business components in reality is not the outcome
of logical business levels but part of the physical business specification, i.e.
similar specifications exist in the physical information specification for the
disposition of master data sources. Whilst the desired logical state of business
and information would support a desired IS solution, the absence of this
information could significantly affect the physical outcomes of an IS/IT solu-
tion architecture.
Deliverables from such an engagement would therefore typically include clear
documentation of the:
Business, technology and architecture context together with the overarching,
business and IT principles;
Conceptual architecture covering the detailed requirements (often with the
relevant business architecture);
Resulting logical architecture including the rationale for any decisions made
and relevant solution alternatives;
The physical architecture, covering specifications, products, standards and
guidelines needed to govern the design.
In assessing available architecture documentation, IAF can help in finding out
what documents are available and which are not. If you’re developing a system,
use IAF IS logical and physical architecture artifacts to find out which material
is available, what has to be completed or what has still to be done:
Components and their specification (logical and/or physical);
Interaction models to learn how components interact with each other (logi-
cal and/or physical);
Contracts to learn the specifications of specific interactions (logical and/or
physical)
Cross references IS/TI to find which IS components rely on which TI
components (logical and/or physical);
Views that provide you insight in specific topics, like integration or distribu-
tion aspects (both logical and physical) or storage or product views
(physical).
Through time we are able to map multiple project and solutions to the same
principles and artifacts, which helps us give guidance to the overall direction of
applications available to a company.
Overall, using IAF enables the solution architects to provide developers with
consistent deliverables clearly positioned in a common framework. It enables us
to discuss solutions in a common vocabulary, despite different level of detail
between different projects.
5.4 Architecture Function and Design Authority 205
‘Why’
1
‘How’ 3 5 7 9
Description This roadmap focuses on creating just enough input from the aspect
areas business and information to understand the impact on IS
and TI, so the IS and TI architectures can be created
Context If the context is mainly IT driven, i.e. we are focussing on changing
the applications and technology landscape, the this roadmap can
be considered
Architecture areas Business and information architecture, logical and physical
covered abstraction layers are only touched to the extend needed, mostly
only to identify processes in the business architecture
Design decisions & Only cover those topics that are required to deliver the IS and TI
rationales architecture so the architecture is fit for purpose
This might be the only feasible roadmap if there is a strict
separation between business and technology architecture
Pre and post Pre: Key stakeholders need to understand that this approach is less
conditions accurate, but faster
Post: Further logical and physical changes to the business and its
information processing structure need to be addressed separately
Open issues Unknown
Potential pitfalls Making too many business assumptions – especially regarding non
functional requirements
Newly created Unknown
problems
‘Why’
1
2a
‘How’ 5 7
8a 8b
‘With what’
‘Why’
1
2a
‘How’ 4
‘With what’ 5
‘Why’
1
2a 3a
‘How’ 5
6
‘With what’
Packages imply data redundancy, because they all need their own sets of
customer data etc.. It is often needed to re-engineer the information objects
from the package documentation to understand if the package actually meets
the information object definitions as described in the conceptual information
architecture. Logical information components might be required to resolve
information ownership and master data management issues between the
products.
The IS architecture focuses on describing the level of support that the packages
can provide by either mapping package functions to business services, or
5.5 IAF Roadmaps 215
contracts will have to be assumed. Document and validate the assumptions with
the key stakeholders. Within this roadmap you are often in a situation that the
client and you just don’t know. This because the architecture is breaking new
ground. In real world architecture people also have to assume things like the
number of lanes of a road. They often do not know how many vehicles will be
using the road in 15 years time.
‘Why’
1
‘How’ 5
‘With what’ 6
IS service definition1 is done to the level that you understand what is specific
and needs to be part of further IS development and what is generic. The generic
parts will form elements of the infrastructure. Finally the TI architecture is
developed.
1
This step can be optional.
5.5 IAF Roadmaps 217
‘Why’
1
10
‘With what’
The second thing to take into account is the TOGAF mindset. TOGAF starts
off with the creation of a so-called 0.1 version of the architecture, often called an
outline of the architecture. After agreement on the 0.1 version, TOGAF pro-
ceeds with creating the full 1.0 version.
218 5 Applying IAF and Using Its Outcomes
Example:
Remember the example of enterprise transformation in an insurance company
(Section 5.5). Based on the strategy of that company to reduce the number of
brands and improve cross-selling, the architects team provided a top-level view.
That view showed their customers as group-wide customers instead of product
specific customer administrations. As a result business management under-
stood the impact of the transformation and management discussions started,
thanks to the top-level view.
At project level, these stakeholders are responsible for running projects and
implementing high impact changes into the operational environment. A project
manager is responsible for delivering, within time and budget, a solution that
fits the business requirements. Project managers working in IS and TI aspect
areas manage the projects that develop the software applications and infra-
structure components.
Architecture outcomes can provide valuable information when making a busi-
ness case, if the outcomes are already available at that moment. Solution
alternatives and, if available, views on costs and migration provide information
regarding planning stages, results, resources, etc.. Scope of a project can be
defined in terms of a list of IS services to be covered by the project.
When making a project plan architecture outcomes are very useful as well. Both
Business Interaction Model and IS Service Interaction Model provide insight in
dependencies and therefore provide input for planning and scoping the project.
These models give guidance on what a sensible work breakdown might be.
5.6 Using IAF Outcomes by Non-architects 221
In general, all of the above on how program or project managers can use IAF
outcomes is valid for portfolio managers as well. The major difference is that
where project managers usually operate at the solution architecture level,
portfolio managers usually operate at domain or enterprise level. They coordi-
nate or manage change programs within that domain or organization.
Portfolio managers, just like project managers, use architecture outcomes for
scope definition, to find dependencies and define impact analysis. Only, they
work at enterprise level so they won’t use detailed views if available.
Specified standards, rules and guidelines are IAF outcomes that have to be
adhered to, both in Business, Information, Communication, IS and TI.
Business users can use IAF outcomes as well, mainly to understand what is
going to change. Especially interaction models at conceptual or logical archi-
tecture level will illustrate changes and will clarify impact on day-to-day work
of these business users.
Chapter 6
Real Life Case Studies
6.1.1 Context
The context of this engagement was an insurer that had grown through a
series of mergers and acquisitions. In the past their strategy was to keep the
separate brands apart, but that changed. At the time of the engagement the
company wanted to reduce the number of brands and to reduce the cost that
was caused by duplication of business activities in brands. Alongside with
that, cross selling across the remaining brands was to be improved. Costs
were to be reduced by using a shared service center approach, combined with
outsourcing.
In order to support IT outsourcing the IT department had to reshape itself into
a demand organization to coordinate and control services being outsourced.
Demand management became a necessity. Besides that, the managers of the
organization required support in the way of solution alternatives when con-
sidering outsourcing, to justify their decision.
6.1.2 Approach
The company adopted IAF for the improvement of their architecture function
and their architects. The common vocabulary and the common framework
provided the basis for all architects from all branches and helped them to
position and compare current business activities in the framework, thus facil-
itating to find and eliminate duplications.
To facilitate management discussion the architects team created a top-level
view. The top-level view consisted of IAF contextual architecture, enriched
with extra material to clarify the impact of strategy and policy on reducing
the number of brands and improving cross-selling.
Based on their wish to outsource, in the architecture the team anticipated a split
between demand and supply side of the organization as well, by structuring the
architecture deliverables so that demand and supply were in separate docu-
ments. In fulfilling the manager’s wish to have solution alternatives to justify
decisions, this split was not strictly on the borderline between conceptual and
logical, but the architects team included solution alternatives from the logical
architecture into the demand side documents as well. This split enabled discus-
sion on positioning shared service centers and finding candidates for
outsourcing.
Contextual
Logical
Physical
6.1.3 Challenge
Major challenge for the organization was to deal with the issue of Customer
ownership, a topic brought to the table thanks to the top level view made by the
architects team. As a consequence of the companies’ wish to reduce the number
of brands and improve cross-selling, the top-level view positioned Customer as
6.2 Bank – Design Authority 227
a horizontal layer on top of the vertical brands with their own customer
processes and administration.
By doing so, they put the cat amongst the pigeons. Business management of the
many business units saw the principle ‘a customer is a group level customer’ as a
threat. The discussion about Customer ownership was brought to table. Of
course, the architects’ team just initiated this discussion, they didn’t play a role
in settling this discussion. It took the company years to settle the discussion,
thereby hampering implementation speed of the strategy.
Another challenge of the organization was how to deal with business intelli-
gence and risk management, since these topics existed in each and every brand
of the organization. Supervisory bodies however require consolidated reports
with unambiguous information. This challenge was met by positioning both
business intelligence and risk management as a separate column in the top level
view, where all brands had to provide information in specified terminology.
6.1.4 Result
The top-level view that was made years ago is still being used as a basis for
decision making. Although the customer ownership brought a lot of discussion,
this was a major benefit of the top-level view. Without the top-level view the
fight would have gone underground and might have caused serious damage to
the strategy.
Through the split and use of demand and supply documents, with solution
alternatives, the company was able to justify and decide upon which parts to
outsource.
6.2.1 Context
This case study is about a large bank operating worldwide with headquarters in
Western Europe. With over 100,000 employees they provide services in retail
banking, wholesale banking as well as insurance products.
The bank struggles with a highly complex IT landscape, characterized by a great
diversity in information systems (both package based and bespoke software)
and supporting infrastructure (mainframe, midrange as well as web-based
platforms). As a result IT costs are high.
Within this context it is increasingly complex to manage and implement change,
while on the other hand business requires more and quicker changes to support
new financial products to go to market.
228 6 Real Life Case Studies
6.2.2 Approach
The approach chosen to professionalize the architecture community is to create
a design authority. Specific tasks of the design authority are creating reference
architectures and governing solution architectures.
A project with a joined team of architects of the bank and Capgemini was given
the assignment to achieve four main tasks:
Establish decentralized Design Authorities in business divisions;
Establish standards, rules and guidelines, as well as reference architectures
on a number of business domains;
Mobilize the large internal architect community by providing communica-
tion and training;
Establish Design Authority processes to ensure and validate that solution
architectures adhered to standards, rules and guidelines and worked com-
pliant with DA processes;
This approach was based on own ideas of the bank regarding the areas of work:
standards, rules and guidelines, and validation and support. From Capgemini
experience the area of communication was added to these.
The bank selected a combination of IAF and TOGAF to work with. TOGAF
was in the lead for the architecture process to follow, IAF was in the lead for the
architecture content framework. Their choice for TOGAF was driven by their
wish to use open standards. At a closer look at TOGAF they found that
TOGAF doesn’t bring enough content, so that had to be extended. Since IAF
knowledge and experience was already available at several places in the orga-
nization (thanks to individual trainings and projects) and because IAF aligned
very well with their own internal architecture content framework, the choice for
IAF was easily made.
6.2.3 Challenges
A major cultural challenge was to cope with the directed approach. The employ-
ees of the IT department of the Bank were used to a consensus-based approach.
With the introduction of a Design Authority the architects were confronted
with a top-down approach directed by management.
6.3 Public Transporter – Solution Architecture 229
6.2.4 Result
6.3.1 Context
The context of this case is a public transporter that needed a unified approach
for solution architecture, providing effective and efficient communication.
Reason being that architects within the company used their own terminology,
causing a lot of confusion with people they were working together with. The
architects of this company were already working with the business, where they
used terminology and topics that were not a part of IAF: product architecture,
process architecture. The company wanted to adopt IAF as unified approach.
6.3.2 Approach
In our approach we had to make some changes to IAF. More or less a cosmetic
change was the renaming of business to process architecture, to stay in line with
terminology not only used by the architects, but used by business as well.
More than just cosmetic was that we added an architecture area to IAF:
Product architecture, left of Business Architecture. At conceptual level this
area consisted of products and channels. At logical level we defined how the
products would be delivered: which logical products through which channels.
230 6 Real Life Case Studies
Finally, at physical level we defined the physical products, the real life products
available.
To illustrate this:
Conceptual Products:
Travel information
Travel tickets
Delay information
...
Channels:
PA systems at the stations
Ticket vending machines
Counter
Internet
Phone
...
Logical Travel tickets through ticket vending machines and over the counter
Delay info through counter, internet, phone and PA systems
...
6.3.3 Challenges
As you might guess from the above, a major challenge was to integrate the
existing approach of the architects with IAF. Renaming business architecture to
process architecture was relatively easy, adding a new aspect area was a major
change that took quite some discussion. Still, it proved very worthwhile e.g. in
discussions and alignment with business.
The other challenge was proving the added value to the architects and
management. At the start of the project the team encountered a project
saboteur, refusing to cooperate because he was of the opinion that the need
for a unified approach and an external architect framework was nonsense.
The challenge was met by having a close look at the saboteur’s way of
working, finding the good parts of his work and positioning and embedding
these good parts into IAF. The combined result was used in communica-
tions to the architects within the company and to the project saboteur as
well. As a result the saboteur recognized his own material and found how
his own material could be improved as well. He transformed into a suppor-
ter of the project.
6.3 Public Transporter – Solution Architecture 231
Yet another example of a common lesson learned: have a close look at the
current way of working of the architects, spot the good parts and embed these
within the framework. This will help in avoiding the ‘not invented here’
syndrome.
6.3.4 Result
The approach developed has been used for the last 8 years in the organization,
despite many changes in personnel and managers and despite 4 major changes
in organization.
Chapter 7
The Making of IAF
7.1.1 1993
The early nineties of the previous century saw several new technologies
maturing and waiting to be applied all in one go: Local networks, relational
databases, graphical user interfaces, the object-oriented programming para-
digm. The market Capgemini was in demanded that this increased complexity
had to be dealt with, in short delivery cycles. Capgemini initiated the ‘Snowball’
program and staffed it with an international team who put their experiences
together, with the initial focus on an iterative development method thought to
replace the traditional waterfall delivery models. This lead to Capgemini’s rapid
ADM was the only method in the IAF between 1993 and 1995. In 1995 we
decided to develop a method to support application architecture in client/server
environments. The method was called Architecture Design for Distributed
Information Systems (AD-DIS), and was aimed at supporting client/server
1
A-teams were groups of about six people that delivered IAD projects.
7.2 IAF’s Evolution 235
IAF in 1995
7.2.2 1995–1997
Contextual
AD-GOV
AD-DIS
Physical
1997 was also the year that the standard IEEE 1003.23 was published. That
standard was based on ADM, the predecessor of AD-TI.
7.2.3 1998–2000
In 1998 we decided to expand AD-DIS into a method that covered all the topics
we needed for Information Systems architecture. AD-IS (Architecture Design
236 7 The Making of IAF
for Information Systems) was the result. As this method introduced major new
topics, we decided to make this a major release. IAF version 2 was born. As part
of the Version 2 work we introduced the contextual layer and again upgraded
AD-TI. ‘Service’ and ‘component’ were formalized as terms.
IAF version 2
This was also the period in which we started working on business and
information architecture. AD-BEA (Architecture Design for Business and
Environment Architecture) was based upon a Dutch method called ‘Bed-
rijfsgerichte Methode voor Informatieplanning’ (BMI). The English term
for the method would be ‘Business oriented method for Information
planning’.
A third initiative that was conducted in this period was a study to develop an
information architecture method. The working name was AD-KI2 – Architec-
ture Design for Knowledge, Information and Intelligence. This route was
abandoned because its results did not receive sufficient buy-in from the archi-
tecture community.
7.2.4 2000–2003
In 2000 the IT consultancy part of Ernst & Young was acquired by Capge-
mini. As part of the integration of the two companies we developed IAF
version 3. The main change was that we decided to split process from content.
Roadmaps and the IACF (Integrated Architecture Content Framework) were
the two deliverables of the version 3 activities. Besides this the approach for
business and information architecture got formalized. A first version of busi-
ness and information architecture was developed, which was an expansion of
AD-BEA.
7.2 IAF’s Evolution 237
In this period there were some experiments with the transformational aspects of
the architecture, the ‘WHEN’ level. In the end we decided to leave this topic out
of the IAF scope and leave transformation to program management, guided by
architecture.
Another initiative that happened as part of IAF v3 was the re-design of the
courses. Instead of having a course per architecture area, we merged the courses
for Business and Information architecture. We also merged the courses for IS
and TI architecture.
7.2.5 2003–2006
This was a relatively stable period for IAF. Version 3 was getting pretty mature,
and we did not receive many enhancement requests from the architecture
community.
7.2.6 2006–2009
7.2.7 2009
Early 2009 we decided to deliver a minor upgrade for IAF. IAF v4.5 was
developed. A number of artifacts were formalized, like domains and business
events. We also documented the views that had been developed through the
years. The usage of synonyms was described, and business goal hierarchies were
made more prominent. We also delivered a new version of the IAF reference
manual.
Jack van ’t Wout started in IT in 1978 and joined Capgemini in 1990. He got
involved with architecture in 1993, and is generally acknowledged as one of the
founding fathers of IAF. Jack has executed over 20 enterprise architecture and
governance engagements and has trained more than 500 people in IAF. Jack’s
focus is on the financial services sector.
Aaldert Hofman started to work with Capgemini in 1990 and worked in the IT
industry since 1988. He has developed architectures since 1996 and got involved
in IAF development and lecturing in 1998. Aaldert is specialized in security
architecture and the broader risk management theme.
Max Stahlecker is the youngest member of the team of authors. He is in the IT
industry since 2001. Max did his thesis on enterprise architecture, architectural
conformance and the business transformation process. He has been practicing
architecture with IAF since he joined Capgemini in 2006 and has been involved
with its development since then.
Herman Hartman has worked with Capgemini and its predecessor Volmac since
1976. He became involved in the development of IAF in 1994 when he laid the
basis to encapsulate existing architecture best practices in new ways of working.
He has conducted architecture work in dozens of projects. Herman focuses on
enterprise architecture engagements in the industry sector.
Maarten Waage has worked in the IT industry since 1984 and joined Capgemini’s
precursor Volmac one year later in the Systems and Networks division. He has
been practicing architecture since 1995 and got involved in IAF development
and deployment in 1997. Maarten has extensive experience in enterprise archi-
tecture and large scale transformations. He focuses on the public sector.
241
242 Index
D
C Design decision, 77
Capability Maturity Model1 Integration Design and EngineeringMethodology
(CMMI), 52, 151, 184–185 for Organizations (DEMO),
Capgemini, 2–5, 8–10, 12–14, 16–18, 28–30, 164–166
36, 38, 101, 151, 157, 159–161, Diagramming model, 18, 22
174–175, 190, 195–197, 201, 228, Domain, 8, 13, 15, 23–24, 26, 44, 47, 63–64,
233–234, 236–239 66–67, 86–87, 101–102, 125–126,
Capgemini University, x 142, 148, 152, 158, 161, 171,
Certification, 18, 39, 205, 238 177, 182–183, 186, 195, 218, 221,
Change management, 30, 45, 154, 170, 228, 238
180–181 DYnamic Architecture (DYA), 157–159
Index 243
E I
Elementary, 83–84, 165 IAF process, 26–27
Encapsulate, 17, 77, 239 IAF reference manual, 4, 35, 238
Engagement, 1, 7–9, 13, 20, 21, 26–27, 36–39, IAF version 1, 24, 234
42–45, 48–53, 60, 62, 65, 77, 80, IAF version 2, 24, 236
101, 151–152, 154, 168, 172, 175, IAF version 3, 9–10, 236–237
182, 184, 186, 204, 214, 221, 225, IAF version 4, 30–31, 237–238
234, 239 IAF version 4.5, 24
roadmap, 26–27 IEEE, 16, 21–22, 235
Enterprise Architecture Framework (EAF), IEEE 1003.23, 235
159–161 IEEE 1471, 16, 21–22
Enterprise level architecture, 23, 39, 42 Implementation, 17–18, 54–55, 78–79,
Event, 6, 9, 11, 39, 44, 54–55, 58, 61, 65, 75, 97, 112, 115, 120, 127, 134–135,
79, 81, 98, 100, 104, 117, 140, 154, 164, 169–170, 173, 177–179,
148–149, 163, 167–168, 176, 181, 182, 189, 192, 213–214, 216,
194, 212, 238 219, 227
Incident management, 30, 181
Information
F architecture, 62, 81–98, 101, 115, 158,
Financial, 10, 14, 38, 44–45, 54, 79, 81, 171, 211–214, 218, 236–237
105–106, 108, 110–111, 113–114, aspect, 81–82, 84, 148, 165, 202–203,
119, 132, 140, 143, 171, 180–181, 205, 207
227, 239 domain, 86–87
interaction model, 62, 84, 86, 89, 91–92,
98, 101, 171
G object, 61, 82–94, 96–98, 101, 142,
Generalization, 83 171–172, 213–214
General Motors, 9 service, 48, 82, 84–89, 92, 94, 98–102,
Glossary, 24 104, 110–111, 144, 165, 213,
Goal hierarchy, 53, 57–58, 60 119–120
Governance, 4, 20, 30–32, 35, 37, 52, Information Technology Infrastructure
54–55, 69, 71, 77, 80–81, 84, 88, Library (ITIL), 45, 52, 142, 145,
95, 97–98, 104, 112, 120–121, 149, 151, 179–182
132, 137–138, 140, 142–143, Infrastructure Design Framework (IDF),
147, 149–150, 153–154, 175–179
159–160, 168, 176, 179, 182, In scope, 47, 50, 67, 86, 111, 119, 146–147,
184, 187, 189, 203, 205–208, 168, 208
235, 237, 239 Integration DEFinition (IDEF), 66, 151,
component, 54, 71 194–195
Granularity, 13, 50, 60, 62, 70 Interaction, 20, 32, 45, 65–66, 71–72, 94,
Grouping, 23, 25–26, 32, 54, 69–71, 73–74, 98–99, 103, 107, 115, 124, 130,
81, 86, 90, 93, 104, 107, 120 134, 165, 172, 179, 193–194,
criteria, 25, 69–71, 73, 90, 93, 197, 200
105, 120 model, 62, 65–66, 71–72, 78, 84, 86, 89,
Guideline, 15, 21, 42, 47, 49, 51, 54, 91–92, 94, 96, 98, 101–103, 106,
78–79, 82, 97, 115, 134, 143, 150, 113, 124, 130, 134, 165–166,
152, 156, 159, 171–172, 186, 188, 171–172, 219–220
202–204, 207–208, 213, 219, Interface, 33, 45, 47, 102, 116–118, 121–122,
221–223, 228 124, 135, 163, 167, 197, 215
IS architecture, 25, 84, 98–99, 104, 109, 112,
115, 120–121, 123, 134–135, 154,
H 210–212, 214–215
High availability, 24, 123–126, 128, 147 ISO 27001: 2005, 148
244 Index
ISO/IEC 42010, 16 The Open Group, 3–4, 16, 157, 159–160, 174,
IS service, 101–104, 106, 123–124, 128, 171, 237–238
216, 219–221 Open Standard, 3–4, 26, 238
Organization component, 71, 75, 77
Out of scope, 9, 50, 67, 86, 111, 119, 173
J
JAVA, 33–34
P
Pattern, 27, 182
L Physical business
Linear development, 15, 151, 173–174 architecture, 78, 80
Logical business component, 77–78, 80
architecture, 69–71, 75, 80–81, 88, gap view, 80
184–185, 210, 213 governance view, 80
component, 69–71, 75, 80–81, 88, interaction model, 78
184–185, 210, 213 security view, 80
collaboration contract, 72–73 view, 80
gap view, 75 Physical organization view, 81
governance view, 77 Physical solution alternative, 85
interaction model, 71–72, 165 Policy, 26, 45, 47, 62, 83, 85–96, 99–100, 105,
security view, 75–76 110–111, 119, 143, 150, 202, 225
view, 75 Portfolio, 15, 45, 48, 180–181, 191, 202–203,
Logical structure, 18–28, 148, 182 207, 218, 221
management, 15, 48, 180–181, 191,
202, 218
M Principle, 24, 48–49, 77, 90, 108, 147, 203, 227
Mainframe, 1, 227 Process
Managing Successful Programs (MSP), 151, of architecting, 75
186–188 component, 74–77, 165
Mechanism, 2, 17, 21, 24, 29, 31–33, 38, gap view, 75
71–72, 107–108, 120, 131, 133, Public sector, 239
139–140, 147, 166, 172, 178,
195–196
Meta model, 18, 32–34, 160–161, 191 Q
Migration, 9, 28–29, 49, 53–54, 79–80, 82, Quality of service (QoS), 17, 30, 45, 143–144,
96–97, 110, 115, 133, 135, 137, 154, 146–147, 168, 208–209
177–178, 219–222
Mobile, 34
R
Rationalization, 14, 152
N Reference model, 18, 45, 153, 164, 166, 182,
.NET, 33–34 184–185, 190
Net present value(NPV), 81 Replication, 24, 212–213
Non-functional, 14–15, 17, 20, 26, 31, 52, 69, Requirement, 2, 5–6, 8–19, 21–22, 25, 28,
99, 104, 109, 112, 127, 132, 30–31, 35, 37–38, 44–45, 49,
137–139, 142, 144, 221–222 54–55, 64–65, 69, 72, 75–76, 81–82,
98–99, 102–104, 106–107, 109, 118,
120, 126–127, 129, 131–132,
O 137–140, 142–147, 149, 153,
Object contract, 54–55, 62 169–172, 177, 180, 182, 189, 191,
Objective, 9–11, 21, 31, 36, 38–39, 43, 48, 55, 199–200, 203–205, 208, 211–212,
59, 113, 115, 118, 127, 144, 146, 220–222
163, 170–171, 203, 205 Return on investment (ROI), 81
Index 245
W Z
Wikipedia, 24, 36, 42, 138 Zachman, 151, 162–164
WS-Policy, 26