Network Architecture is “the complete framework of an organization’s computer network” (Technopedia) . The architecture of a network details the interrelationships between the entities such “hardware, software, connectivity, communication protocols and mode of transmission” (Kioskea) that comprise the network. According to the National Security Agency, the network must be amenable to users and be quality driven. Within the system the functions should have a recurring functionality to support operations.
Kioskea states that the ultimate network need is to have the organization using the network is to perform more efficiently and to better serve customers. Binary Spectrum states that using Service Oriented Architecture or SOA this need will be acheived. According to the National Security agency, SOA states the requirements of an organization’s service applications. Also, Kioskea states that SOA takes into account what services the company provides and the needs of customers. In SOA a group of components exist that demonstrate functionality. However SOA contains serious advantages and disadvantages.
Within SOA, five application layers exist as defined in Binary Spectrum. These layers demonstrate its ability to connect through the business process to an exact service level. The Presentation layer permits the interchangeability of the network. The Process layer functions to facilitate the interoperability of network components. Persistency layer provides network guidance for functionality in the system. A network Business layer exists for the storage of data and procedures. The Presentation layer functions as a single source for metadata needed to use web services.
In the framework of SOA, as stated by Binary Spectrum and the National Security Agency, organizational services are securely maintained within an application by a series of layers. Each layer performs its stated responsibilities and can be accessed only through portions of the application and authorized users. All system layers in SOA can be individually designed and developed. Designing the layers of SOA increases the potential for code recycling and designing specific user roles.(NSA) As SOA applications require maintenance, each layer can be targeted for remedies or scaled to meet system performance requirements. SOA is generally stateless and can be moved from structure to structure. All requests are sent to the same endpoint.
However, according to NSA and Kioskea, no operations for life cycle management are possible in SOA (NSA). Kioskea states that SOA should not be utilized for applications that will require high data transfers. Also, NSA goes on to note that SOA should not comprise applications that do not require response implementation or applications with a short lifespan. SOA should only be used on systems with clearly stated parameters, according to Kioskea. NSA states that the development of SOA depends on the implementation of standards and without standards communication between applications becomes inefficient.
Author Education: MSM: Information Technology & Project Management
Binary Spectrum: http://www.binaryspectrum.com/service-oriented_architecture/soa_and_Java_2.html
National Security Agency, Service Oriented Architecture Security Vulnerabilities Web Services