modaf final paper.pdf

66
Ministry of Defence Architecture Framework MODAF By: Jason Caruso Tefe Jakova Kristin (Kramer) Mills Aaron Varrone CIS 695 Enterprise Architecture Dr. Richard McCarthy Spring 2010 Quinnipiac University

Upload: paul-jimenez

Post on 25-Sep-2015

57 views

Category:

Documents


12 download

TRANSCRIPT

  • Ministry of Defence

    Architecture Framework

    MODAF

    By:

    Jason Caruso

    Tefe Jakova

    Kristin (Kramer) Mills

    Aaron Varrone

    CIS 695 Enterprise Architecture

    Dr. Richard McCarthy

    Spring 2010

    Quinnipiac University

  • Page 2 of 66

    TABLE OF CONTENTS

    Overview and Scope of MODAF .................... 3

    History of MOD and MODAF ....................... 28

    Strengths of MODAF ................................. 31

    Weaknesses of MODAF ............................. 32

    Comparison of MODAF to Other Frameworks 32

    Compliance Issues ................................... 37

    MODAF Users .......................................... 38

    Upcoming MODAF Versions ....................... 44

    Analysis of Enterprise Architecture ............. 44

    References.............................................. 64

  • Page 3 of 66

    OVERVIEW AND SCOPE OF MODAF

    The Ministry of Defence Architecture Framework is built upon the MODAF

    Meta Model (M3) (Ministry of Defence, 10 March 2009). The M3 provides the

    overall structure for each of the seven MODAF viewpoints and describes

    elements of an architecture and how they relate to one another (Ministry of

    Defence, 10 March 2009. Information can be represented in more than one

    viewpoint, where each shows a different perspective of the architecture

    information. The MODAF Ontology defines a common set of definitions that

    are used across the framework (Ministry of Defence, 3 February 2009).

    MODAF provides a way of documenting an architecture. Unlike a framework

    such as TOGAF, MODAF does not prescribe a process for building an

    architecture.

    MODAF FRAMEWORK

    MODAF, which stands for the British Ministry of Defence Architectural

    Framework, is an architectural framework which defines a standardized way

    of conducting Enterprise Architecture. MODAF was originally developed by

    the UK Ministry of Defence. MODAF is an internationally recognized

    enterprise architecture framework developed by the MOD to support Defence

    planning and change management activities. MODAF does this by enabling

    the capture and presentation of information in a rigorous, coherent and

    comprehensive way that aids the understanding of complex issues.

    MODAF is used to provide a conclusive set of rules and templates, known as

    Views that, when completed, provide a view of the business area being

    investigated by providing various charts, graphs, and text. Each of the different Views offers a separate viewpoint on the business to support

    different stakeholder needs or areas of interest. The Views are divided into

    seven categories (Ministry of Defence):

    Strategic Views (StVs) are used to define the desired outcomes or

    goals of the business and the capabilities needed to achieve these.

    Operational Views (OVs) are used to describe the tasks and activities,

    operational elements, and information exchanges required to conduct

    business and operational activities

    Service Oriented Views (SOVs) are used to describe the services, (i.e.

    what is provided to the customer), required to support the tasks and activities described in the Operational Views

  • Page 4 of 66

    Systems Views (SVs) are used to describe what happens when the

    Operational and Service Orientated Views are implemented and,

    thereby, define the solution.

    Acquisition Views (AcVs) are used to describe what is needed and how

    long it will take for the projects that will deliver the solution.

    Technical Views (TVs) contain standards, rules, and policy and

    guidance that are applicable to aspects of the architecture.

    All Views (AVs) are used to provide a summary of the contents of the

    architecture and any related terms/characters/abbreviations used.

    Strategic Viewpoint (StV)

    The strategic viewpoint defines the overall vision of the organization in order

    to support military operations and is broken down into six views. The

    strategic views are focused primarily on capability management. A

    capability is described by MODAF as a specification or classification of the

    ability of the enterprise (Ministry of Defence, 24 November 2008).

    Capabilities are stable over time, but the requirements of capabilities can

    change. A requirement capability says that a certain capability must be

    achieved within a time period (Ministry of Defence, 24 November 2008).

    While there are six views in the strategic viewpoint, they are not all required. An organization may only need to use a few of them. Since

    military capabilities change over time, views typically refer to a particular

    period in time. If a capability undergoes a significant change, it is necessary

    to reassess the views.

    The first is StV-1 (Enterprise Vision), which provides the overall strategy for

    the framework. A capability vision shows what is required to meet the

    organizations strategy. MODAF version 1.2 calls for a diagram to show an

    organizations goals and capabilities. An example is shown below.

  • Page 5 of 66

    (MODAF, 2008)

    While the StV-1 view only describes high level goals, the StV-2 view is

    referred to as the capability taxonomy and breaks down each capability into a hierarchy. Each capability describes what is to be done, but does not

    specify how something is to be completed. Capabilities are often broken

    down into structured lists and an approach such as unified modeling

    language (UML) may be used (MODAF, 2008).

    StV-3 is the capability phasing view, which deals with the realization of

    capability during different time periods. This view strives to look for

    differences or overlapping areas of capability, by plotting projects and

    support over time. The following diagram shows where capabilities are

    missing over a period of two years.

  • Page 6 of 66

    (Ministry of Defence, 24 November 2008)

    StV-4 is the capability dependence view, and as its name suggests, it looks

    for areas in which capabilities rely on one another. This can be represented

    in UML diagrams or in box diagrams as shown below.

  • Page 7 of 66

    (Ministry of Defence, 24 November 2008)

    StV-5 is called the Capability to Organization Deployment Mapping. It shows

    how capability requirements should be filled. As in StV-3, it shows

    dependencies, but is more detailed than that view. The information from

    StV-5 comes from other views, specifically, AcV-2, StV-2, OV-4, and SV-1.

    This view is typically shown in a table, with parts of the organization on one

    side, and capabilities on the other side. There is typically a view for each

    enterprise phase. StV-5 can also be shown on a timeline (Ministry of

    Defence, 24 November 2008).

    StV-6 is Operational Activity to Capability Function Mapping. This view

    shows which capabilities support which particular operational activities. It is generally represented in tabular form, with the capabilities on one axis and

    the operational activities on the other axis. The operational activities shown

    in the matrix are typically high level, and do not changed drastically over

    time, therefore typically only one StV-6 table is necessary (Ministry of

    Defence, 24 November 2008).

    Operational Viewpoint (OV)

    The second viewpoint in the MODAF architecture is the Operational

    Viewpoint. Operational Views describe the tasks and activities, operational

    elements, and information exchanges required to conduct business and

    operational activities (Ministry of Defence, 12 February 2009). The

    Operational Views do not describe operations in respect to military actions,

    but instead are logical representations of required or existing capabilities in context to each other (IBailey, 2007). Basically, they represent what the

    enterprise is, does, or is required to do, and who the players are in the

    process. The players can be individual organizations, people, or systems.

    There are 11 views that comprise the Operational Views Viewpoint.

    OV-1a is the High-level Operational Concept Graphic which provides a

    graphical view of what the architecture is about and an idea of the players

    and operations involved. It can be a general map of the enterprise that is

    used as an overview to present to upper-management. It generally depicts

    the business processes or missions, high-level operations, organizations, and

    the geographical distribution of assets. Again, it is very basic and not very

    detailed. The following diagram is an example of what an OV-1a view may

    look like.

  • Page 8 of 66

    (Ministry of Defence, 12 February 2009)

    OV-1b is the Operational Concept Description which basically verbally

    summarizes and describes the graphics shown in OV-1a. It is a textual description of the graphic. OV-1c is the Operational Performance Attributes

    which provides detail of the operational performance attributes associated

    with the scenario / use case represented in the High Level Operating

    Concept Graphic (OV-1) and how these might evolve over time (Ministry of

    Defence, 12 February 2009). The values expressed define the performance

    of specific or multiple capability elements, and can be represented as either

    single values or a range of values across a defined timescale (Ministry of

    Defence, 12 February 2009).

    OV-2 is the Operational Node Relationship Description which defines the

    operational nodes and how they relate to each other or are connected. An

    operational node is a logical element of the operational architecture that

    may produce, consume, or process information, energy, material, or people (Ministry of Defence, 12 February 2009). Nodes can be groups, bases of

    operation, facilities, or even organization types. The main goal of OV-2 is to

    give descriptions of the individual nodes relevant to the architecture and

    show their collaboration needs. OV-2 can track communication between

    nodes within and outside the architecture and even give specific locations of

    the operational nodes. OV-2 views may also be used to depict nodes in a

  • Page 9 of 66

    SOA models, using service elements instead of traditional needlines.

    Needlines document the required or actual exchange of information between

    nodes. OV-2 views can also combine service elements with traditional

    needlines, helping to represent most common architectures that consist of

    point-to-point connections as well as service interactions (Ministry of

    Defence, 12 February 2009). Below is an example of an OV-2 with

    traditional needlines and Service elements.

    (Ministry of Defence, 12 February 2009)

    OV-3 is the Operational Information Exchange Matrix which provides more

    detail on the information that is exchanged between various nodes in the

    architecture. The Operational Information Exchange Matrix details

    information exchanges by identifying which nodes exchange what

    information, with whom, why the information is necessary, and the key

    attributes of the associated information products (Ministry of Defence, 12

    February 2009). OV-3 tracks critical information exchanges, as represented

    in OV-2 by the needlines. They do not always match up one-to-one though as many exchanges in OV-3 may occur across the same needline

    represented in OV-2 (Ministry of Defence, 12 February 2009). In OV-3

    information is typically captured in tabular form. Below is an example of an

    OV-3 in table form:

  • Page 10 of 66

    (Ministry of Defence, 12 February 2009)

    OV-4 is the Organizational Relationships Chart and it shows organizational

    structures and interactions. A typical OV-4 chart illustrates the command

    structure or relationships (as opposed to relationships with respect to a

    business process flow) among human roles, organizations, or organization

    types that are key players in the business represented by the architecture

    (Ministry of Defence, 12 February 2009). OV-4 helps to clarify relationships

    between organizations inside and outside of the architecture. MODAF does

    not model individual people though, rather specific posts within the enterprise. So OV-4 may show types of organizations and the typical

    structure of those organizations, actual specific organizations, or it may

    show a hybrid of both. Below is an example of the hybrid diagram.

    (Ministry of Defence, 12 February 2009)

  • Page 11 of 66

    The OV-5 Operational Activity Model describes the operations that are

    normally conducted in the course of achieving a mission or a business goal

    (Ministry of Defence, 12 February 2009). OV-5 describes the different

    business processes and workflows, and gives a clear definition of roles and

    responsibilities. OV-5 is usually coupled with OV-2. OV-5 focuses on the

    operational activities while OV-2 focuses on the operational nodes. OV-5

    was created to describe military activites, but it is well suited to work with

    non-military activities as well. It is used to describe the operations or

    actions that are normally conducted in achieving a mission or a business

    goal (Ministry of Defence, 12 February 2009).

    OV-6 is really made up of 3 different views. OV-6a which is the Operational

    Rules Model, specifies operational or business rules that are constraints on the way that business is done in the Enterprise. OV-6b is the Operational

    State Transition Description which is a graphical method of describing how

    an operational node or activity responds to various events by changing its

    state. Finally, OV-6c is the Operational Event-Trace Description, and it

    provides a time ordered examination of the information exchanges between

    participating operational nodes as a result of a particular scenario. The

    three views describe the dynamic behavior and timing performance

    characteristics of an architecture. Views OV 1-5 gives us knowledge of the

    operational nodes, activities, and information exchanges (Ministry of

    Defence, 12 February 2009). But OV-6a,b,c shows what happens when an

    activity occurs in the architecture and how that architecture behaves. When

    we send a message from node A to node B, it is important to know what kind of response we will receive.

    The OV-7 Information Model addresses the information perspective on an

    operational architecture (Ministry of Defence, 12 February 2009). It

    documents the business information requirements and structural business

    process rules of the architecture (Ministry of Defence, 12 February 2009).

    An OV-7 is very useful when different organizations use the same terms to

    refer to completely different things.

    Service Oriented Viewpoint (SOV)

    The third viewpoint that differentiates MODAF from other frameworks is the

    service oriented viewpoint. It identifies views that can be used in a service

    oriented architecture and was derived from the NATO Architecture

    Framework (Ministry of Defence, 27 November 2008). The service oriented

    viewpoint consists of seven views.

    The first view is SOV-1, which is Service Taxonomy. The NATO Architecture

    Framework (NAF) equivalent is NSOV-1. The Service Taxonomy view

  • Page 12 of 66

    provides governance for service oriented architecture by showing services in

    a hierarchy (Ministry of Defence, 27 November 2008). Each level of service

    in the hierarchy is a specific type of a service from another level. In addition

    to governance, SOV-1 can be used for planning services, looking at gap

    analysis relating to services, recognizing services, and auditing services

    (Ministry of Defence, 27 November 2008). SOV-1 can be depicted using

    charts, UML, or through shape drawings. The following diagram shows SOV-

    1 relationships between services, service generalization, attributes of

    services and service policy, which is optional.

    (Ministry of Defence, 27 November 2008)

    The following UML diagram shows how a service hierarchy might be set up.

  • Page 13 of 66

    (Ministry of Defence, 27 November 2008)

    SOV-2 is the Service Interface Specification view. As the name suggests,

    this view shows what interfaces that a services uses. It also shows which

    service can be used in conjunction with other services. The items used in

    SOV-2 usually include services, service interfaces, interface operations

    which show how a service is accessed, and interface parameters which show what is either inputted or outputted from the service. This view is

    typically represented using UML or in a table.

    The third service oriented view is SOV-3, Capability to Service Mapping. It is

    the equivalent to NAFs NCV-7 (Ministry of Defence, 27 November 2008).

    This view details the services that support a capability. It is used for

    governance as well as planning services. It can be represented in table form

    or by UML and usually includes the specific service, the capability that

    supports it, and the relationship between the two (Ministry of Defence, 27

    November 2008). SOV-3 can be as simple as a matrix with capabilities on

    one axis and services on the other, with a designation of where the two

    intersect. Services can support multiple capabilities and a capability can be

    supported by multiple services.

    The fourth level of the service oriented viewpoint is broken down into SOV-

    4a, SOV-4b, and SOV-4c. None of the three views have exact NAF

    equivalents (Ministry of Defence, 27 November 2008). SOV-4a is the

    Service Constraints view. Again, as its name suggests, this view shows any

    constraints that apply to carrying out a service. This view can also be shown

    as a table or in UML and can consist of a service and the service policy. It

    can be used to specify services or in the governance of services (Ministry of

    Defence, 27 November 2008).

  • Page 14 of 66

    SOV-4b is the Service State model. It shows the different possible states

    that a service may have and is used in service specification (Ministry of

    Defence, 27 November 2008). SOV-4b can be illustrated with UML or by

    another modeling language. The objects represented by this view are only

    the service and the service state machine. The last view on the fourth level

    is SOV-4c, the Service Interaction Specification. This view shows the

    interactions of services with outside elements, the sequence of these

    elements and any dependencies between the interactions. It is usually

    signified through a UML sequence diagram, with objects such as the

    services, interfaces between services, lifelines, and the consumers (Ministry

    of Defence, 27 November 2008). The following example shows a sequence

    diagram.

    (Ministry of Defence, 27 November 2008)

    The last view of the service oriented viewpoint is SOV-5, which is Service

    Functionality. Unlike the last three views, it does have any equivalent in

    NAF, NSOV-5 (Ministry of Defence, 27 November 2008). This view is used

    to specify services and to define requirements. It can be documented using

    UML or another type of diagram and typically includes a service and the

    function of that service. Where SOV-1 and SOV-4 define the implementation

    of a service, SOV-5 shows the functionality (Ministry of Defence, 27

    November 2008).

  • Page 15 of 66

    System Viewpoint (SV)

    The System Views (SVs) are a set of views that describe the resources that

    realize capability (Ministry of Defence, 12 February 2009). The SVs describe

    resource functions and interactions between resources and can also provide

    detailed system interface models (Ministry of Defence, 12 February 2009).

    There are 16 views that comprise the System Viewpoint:

    The first view is SV-1 Resource Interaction Specification and it addresses the

    composition and interaction of resources (Ministry of Defence, 12 February

    2009). SV-1 is the link to OV-2 by showing how resources are structured

    and interact in order to realize the logical architecture specified in OV-2. SV-

    1 depicts all interactions between resources that are of interest to the

    architect. An interaction means that information is passed between two or more resources. A single needline in OV-2 may translate into multiple

    interactions (Ministry of Defence, 12 February 2009). In most cases it is

    best to model SV-1 and SV-4 together, since they are shown to provide

    complementary representations. Below is an example of SV-1 view.

    (Ministry of Defence, 12 February 2009)

    The second view, SV-2 Systems Communications Description, is made up of

    3 views intended for the representation of communications networks and

    pathways that link communications systems, and provides details regarding

    their configuration (Ministry of Defence, 12 February 2009). SV-2 is a

    physical representation of the implementation of the information needlines

    identified in OV-2. SV-2 can give geographic locations and layouts of

  • Page 16 of 66

    network components like switches and routers. SV-2 focuses on the physical

    characteristics of a link by specifying attributes. The goal of SV-2 is to show

    how systems are connected, what interfaces each system exposes (ports),

    the type of hardware interface used and the information transmitted across

    the interface. SV-2 expands on SV-1 by giving more detail of the physical

    characteristics of those interactions specified in SV-1 that are between

    systems. The first SV-2 view, SV-2a System Port Specification, which

    specifies the ports on a system and the protocols used by those ports when

    communicating with other systems. SV-2a is used to fully describe the

    interface protocols and hardware specifications of each port on a system.

    SV-2a lists the names of the ports, the interface protocol used, and the

    physical port specification. The second SV-2 view is SV-2b System to System Port Connectivity Description, which specifies the communications

    links between systems and may also list the protocol stacks used in

    connections. SV-2 gives a precise specification of a connection between

    systems. Lastly, the third SV-2 view is SV-2c System Connectivity Clusters,

    which define how individual connections between systems are grouped into

    logical connections between parent resources (Ministry of Defence, 12

    February 2009). An example of the SV-2c is shown below.

    (Ministry of Defence, 12 February 2009)

    The third view is the SV-3 Resources Interaction Matrix. SV-3 provides a summary of the resource interactions that were specified in SV-1 in tabular

    form. It helps speed up assessments of potential commonalities and

    redundancies. MODAF does not have any guidelines on symbols that can be

    used in the table, but if SV-3 is used, it is critical to include a key.

    The fourth view is SV-4 Functionality Description which addresses human

    and system functionality (Ministry of Defence, 12 February 2009). SV-4

  • Page 17 of 66

    gives a description of the necessary data flows that are input (consumed) by

    and output (produced) by each resource. It makes sure that inputs receive

    the information that they are requesting and at the proper level of detail.

    SV-4 is the behavioral counterpart to the SV-1 (in the same way that OV-5

    is the behavioral counterpart to OV-2) (Ministry of Defence, 12 February

    2009). A simple example of an SV-4 is shown below.

    (Ministry of Defence, 12 February 2009)

    The fifth view is the SV-5 Function to Operational Activity / Service Function

    Traceability Matrix. The SV-5 view depicts the mapping of functions (and

    optionally, the resources that provide them) to operational activities or

    service functions (Ministry of Defence, 12 February 2009). SV-5 shows the

    linkage between functions described in SV-4 and Operational Activities

    specified in OV-5. SV-5 also shows the linkage between functions described

    in SV-4 and the Service Functions in SOV-5. SV-5 is typically shown in a tabular form. SV-5 tablets can be very generic in scope or they can be very

    detailed. Below is a simple example of an SV-5 view.

    (Ministry of Defence, 12 February 2009)

  • Page 18 of 66

    The sixth view is the SV-6 Systems Data Exchange Matrix view. It specifies

    the characteristics of the system data exchanged between systems with the

    focus on data crossing the system boundary (Ministry of Defence, 12

    February 2009). SV-6 is the physical equivalent of the logical OV-3 table

    and provides detailed information on the system connections that implement

    the information exchanges specified in an OV-3. If the information is non-

    automated, it is captured in the SV-1 and SV-3 only. SV-6, like SV-5, uses a

    tabular format to present the data. The focal point of SV-6 is on how the

    system data exchange is affected, in system-specific details covering

    periodicity, timeliness, throughput, size, information assurance, and security

    characteristics of the exchange. Also represented in the table are the

    system data elements, their format and media type, accuracy, units of measurement, and system data standards. The seventh view is the SV-7

    Resource Performance Parameters Matrix. SV-7 depicts the performance

    characteristics of a Resource (ie. system, role or capability configuration). It

    builds upon SV-6, and therefore should be developed in conjunction. SV-7

    takes the information presented in SV-1 and expands upon it by depicting

    the characteristics of the resources shown in SV-1 (Ministry of Defence, 12

    February 2009). To help facilitate a mission or goal, SV-7 is used to

    communicate which characteristics are considered most crucial. The format

    used in SV-7 is also that of a table.

    The eighth view is the SV-8 Capability Configuration Management view. SV-

    8 presents a whole lifecycle view of a resource, describing how its

    configuration changes over time (Ministry of Defence, 12 February 2009). SV-8 s main function is to show change over time. Sv-8, when linked

    together with other evolution views such as AcV-2, StV-3 and TV-2, provides

    a rich definition of how the enterprise and its capabilities are expected to

    evolve over time (Ministry of Defence, 12 February 2009). These types of

    views are good for presenting a potential future snapshot to management.

    The ninth view is the SV-9 Technology and Skills Forecast. This view defines

    the underlying current and expected supporting technologies and skills

    (Ministry of Defence, 12 February 2009). SV-9 will show future trends in

    technology and skills that may directly impact the architecture. This view is

    used to forecast future investments in technology that will be needed. Given

    the future-oriented nature of this product, forecasts are typically made in

    short, mid, and long-range timeframes (Ministry of Defence, 12 February

    2009). An example of Sv-9 may show the forecast for an operating system like Microsoft; where the newest version may be in the short-term and

    future upgrades mid and long term forecasts.

    The tenth view is SV-10 which is actually made up of three models. Each of

    the three views may be used to describe the dynamic behavior and

  • Page 19 of 66

    performance characteristics of the SV (Ministry of Defence, 12 February

    2009). It is important to study the behavior of the architecture. We can use

    the example that it is important to know whether a response is expected

    when message x is sent to resource Y. The first of the SV-10 models is called

    SV-10a Resource Constraints Specification. SV10a specifies functional and

    non-functional constraints on the implementation aspects of the

    architecture. SV-10a describes the rules that are set to control, constrain or

    guide the implementation aspects of the architecture. MODAF categorizes

    constraints as: structural assertions, action assertions, and derivations. The

    second SV-10 model is SV-10b Resource State Transition Description. SV10b

    represents the sets of events in which the resources in the architecture will

    respond as a function of its current state. SV-10b shows the changes that occur with the transition from one state to another. It can provide a quick

    snap-shot and analysis of a rule set and be able to detect dead-ends or

    missing conditions. This can help eliminate problems early on that if not

    caught, can cause serious behavioral errors in fielded capabilities or

    expensive correction efforts. The third model is the SV-10c Resource Event-

    Trace Description. SV-10c provides a time-ordered examination of the

    interactions between resources. SV-10c products are very helpful in making

    sure all information is available when moving to the next level of detail from

    the initial solution design, and to help define a sequence of functions and

    system data interfaces. Typically SV-10c is used in conjunction with SV-10b

    to describe the dynamic behavior of resources (Ministry of Defence, 12

    February 2009).

    The eleventh view is known as the SV-11 Physical Schema. SV-11 defines

    the structure of the various kinds of system data that are utilized by the

    systems in the architecture (Ministry of Defence, 12 February 2009). SV11

    is an implementation-oriented data model that is used in the system

    viewpoint to describe how the information requirements represented in OV-7

    Information Model are actually implemented (Ministry of Defence, 12

    February 2009). Below is an example of an SV-11.

  • Page 20 of 66

    (Ministry of Defence, 12 February 2009)

    The final view in the SV grouping is the SV-12 Service Provision. SV-12

    specifies configurations of resources that can deliver a service and the levels

    of service those resources can deliver in different environments (Ministry of

    Defence, 12 February 2009). SV-12 is related to the Service Oriented Views

    (SOVs) in MODAF because the SV-12 shows how those SOVs affect the

    architecture. SV-12 provides the mapping from services to the resources

    that provide those services. The service attributes defined in SOV-1 can be

    given values in SV-12 and can therefore relate to the environment under

    which those values are true (Ministry of Defence, 12 February 2009). The

    diagram below shows a UML representation of SV-12:

  • Page 21 of 66

    (Ministry of Defence, 12 February 2009)

    Acquisition Viewpoint (AcV)

    The acquisition viewpoint details how projects and capabilities are dependent from one another across Defence Lines of Development (DLOD) (Ministry of

    Defence, 21 November 2008). The goal of the acquisition views are to

    show the fielding and acquisition processes. The viewpoint only consists of

    two views, and since MODAF does not require that all views are used, it is

    possible either only one or neither will be used (Ministry of Defence, 21

    November 2008).

    AcV-1 is the Acquisition Clusters version 2 view. This was originally called

    the SoS Acquisition Clusters view in the original MODAF framework. AcV-1

    shows dependencies between the organizations and their projects. This view

    generally includes the project, the owner of the project, and the enterprise

    phase. AcV-1 can be documented through diagrams or in a language such

    as UML (Ministry of Defence, 21 November 2008).

    Generally, AcV-1 is shown as a hierarchy of systems and acquisition

    projects. The following diagram shows an example of AcV-1.

  • Page 22 of 66

    (Ministry of Defence, 21 November, 2008)

    AcV-2 is Programme (sic) Timelines v.1.2. This view was originally called

    Acquisition Programmes in the first version of MODAF. AcV-2 is used for

    project management, dependency management, portfolio management,

    dependency management within a System of systems (SoS), and to identify

    risks in project dependencies. This view can be shown in a Gantt chart, which shows the timelines of various projects, dependencies between

    projects, project milestones, and how different capabilities are put together

    (Ministry of Defence, 21 November, 2008).

    The bars in the Gantt chart in AcV-2 are usually shaded in with a color to

    indicate its cycle in the CADMID (Concept Assessment Development

    Manufacturing In-Service Disposal) cycle. CADMID is a procurement policy

    specified by the Ministry of Defence. There are also icons which are color

    coded, so that some will be colored in to indicate that there are no issues in

    a project, where another color will signify that there are issues that need to

    be attended to. An icon will indicate the maturity level in the DLOD (Ministry

    of Defence, 21 November, 2008).

  • Page 23 of 66

    Example of Icon in AcV-2:

    Green indicates no outstanding issues and appropriate DLOD maturity

    Yellow indicates some outstanding issues but resolution of these issues is

    scheduled and appropriate DLOD maturity

    White indicates that DLOD maturity is not known

    Black indicates that the DLOD maturity is not required for this phase

    Red indicates outstanding issues with no planned resolution; DLOD maturity

    level is not at the appropriate level

    (Ministry of Defence, 21 November 2008)

    Technical Standards Viewpoint (TV)

    The Technical Standards Views (TVs) are tabular views containing standards,

    rules, policy and guidance that are applicable to aspects of the architecture

    (Ministry of Defence, 20 November 2008). The MODAF Technical Standards

    Views are derived from the core DoDAF views so they can be more easily

    used when presenting technical and non-technical standards. Therefore, the

    information contained in the views, do not need to be technical, as the name

    implies. The information can be applied to operational activities ( i.e.

    doctrine, Standard Operating Procedures and Tactics, Techniques and

    procedures) as well as systems (i.e. standards and protocols) (Ministry of

    Defence, 20 November 2008).

    In the technical Standards Views there are two views. The first view is the

    TV-1 Standards Profile which defines the technical and non-technical standards, guidance and policy applicable to the architecture (Ministry of

    Defence, 20 November 2008). Not only does TV-1 identify the applicable

    technical standards, but it also may document the policies and standards

  • Page 24 of 66

    that apply to the operational or business context (Ministry of Defence, 20

    November 2008). TV-1 is basically a guide to the standards being used in

    the architecture. It lists the standards and policies, and helps road-map

    them based on time to account for emerging technologies and upgrades.

    TV-1 should identify any existing guideline or standard, as well as point out

    areas where the guidelines are lacking. The technical standards (which is

    one type of TV-1) govern what hardware and software may be implemented

    and on what systems. See the examples below.

    (Ministry of Defence, 20 November 2008)

    If you include more than one emerging standard time-period in your

    architecture, then you should complete a Standards forecast (TV-2) as well

    as a TV-1. The standards cited are referenced as relationships to the

    systems, system functions, system data, hardware/software items or

    communication protocols in SV-1, SV-2, SV-4, SV-6, OV-7 and SV-11

    products, where applicable. The protocols referred to interface and communications descriptions (SV-2) are examples of standards and these

    should also be included in TV-1 (Ministry of Defence, 20 November 2008).

  • Page 25 of 66

    The second view in TV is TV-2 Standards Forecast which describes any

    expected changes in technology-related standards and conventions, which

    are documented in TV-1 (Ministry of Defence, 20 November 2008). Similar

    to TV-1, TV-2 is used to represent and show future technology changes and

    upgrades to standards over set amounts of time. The main purpose of TV-2

    is to identify critical technology standards, how they change, and what

    impact they will have in the future of the architecture. TV-2 is a compliment

    to TV-1 and expands upon it when more than one emerging standard time-

    period is applicable to the architecture (Ministry of Defence, 20 November

    2008). TV-2 delineates the standards that will potentially impact upon the

    relevant system elements (from SV-1, SV-2, SV-4, SV-6 and OV-7) and

    relates them to the time periods that are listed in SV-8 and SV-9 (Ministry of Defence, 20 November 2008). See below for an example of TV-2.

    (Ministry of Defence, 20 November 2008)

    All Views (AV)

    The final viewpoint in the MODAF framework is the All Views (AV) viewpoint.

    AVs provide an encompassing description of the architecture, its scope,

    ownership, timeframe, and all of the other data that is required in order to

    search and query architectural models effectively (Ministry of Defence, 19

  • Page 26 of 66

    November 2008). One can also use it as a place to record any findings and

    notes while constructing the architecture. AVs also contain a glossary of

    terms used, to help others easily understand and translate in the future.

    MODAF states that AV is critical whenever an architecture is created or

    modified because it is where the records and notes are stored, so the

    information is available for future access and modifications (Ministry of

    Defence, 19 November 2008). The AV viewpoint is made up of two views.

    The first view is AV-1 Overview and Summary Information view. AV-1, as

    the name implies, is a summary of all the information related to the

    architecture in an executive-level designed for quick reference and

    comparison. AV-1 includes assumptions, constraints, and limitations that

    may affect high-level decisions relating to an architecture-based work program (Ministry of Defence, 19 November 2008). AV-1 also serves as the

    planning guide for when the architecture is being built, and answers the

    who, what, where, when, why and how of the plan. AV-1 is critical when

    building a MODAF architecture because it keeps everything on plan and in

    order, similar to blueprints for a house. AV-1 provides a summary of these

    descriptions: Architecture Project Identification, Scope, Purpose and

    Perspective, Context, Status, Tools and File Formats Used, Assumptions and

    Constraints, and Data Completed (Ministry of Defence, 19 November 2008).

    AV-1 may also include Findings and Costs. AV-1 can be a dynamic

    document as the architecture is being built, however a final draft should be

    completed once the architecture is finished to document the final product.

    An example of AV-1 is shown below.

  • Page 27 of 66

    (Ministry of Defence, 19 November 2008)

    The second AV view is AV-2 Integrated Dictionary. This is used as a place to

    explain terms and abbreviations used in the building of the architecture. It

    is closely tied to the MODAF Ontology which tries to ensure that the same

    terms are used to refer to the same objects across the MOD. The MODAF

    project requires a standard classification scheme in order to ensure a

    common use of terminology for the appropriate architectural elements. An

    architect should be in no doubt about what types of systems, organizations,

    etc. are at his/her disposal to use (Bailey, 2006). The goal is to make sure

    everyone is on the same page and that the same term does not refer to

    many different objects. Any entry into the Integrated Dictionary should

    contain the following:

    The name used for this element in the architecture

    Alternative names for this element- e.g., if the element is listed in the

    MODAF Ontology, it may have multiple names

    A brief description of the element.

    A list of the views in which the element is used.

    (Ministry of Defence, 19 November 2008):

  • Page 28 of 66

    An example of an AV-2 entry is shown below:

    (Ministry of Defence, 19 November 2008)

    HISTORY OF MINISTRY OF DEFENCE AND MODAF

    The United Kingdoms Ministry of Defence is composed of five different

    departments, four of which existed before they were included in the overall

    structure of the Department of Defence (Ministry of Defence, N.D.). The

    first is The Admirality which is a naval board that dates back to 1546

    (Ministry of Defence, N.D.). Henry VIII created a Navy Board which handled

    operational activities and policy. The Board existed along with the Board of

    Admirality, which handled political affairs. The Navy Board was eventually

    eliminated in 1832 and its operations were moved to the Board of Admirality (Ministry of Defence, N.D.).

    The second Department of State was the War Office, which was responsible

    for the British Army (Ministry of Defence, N.D.). When the office began, it

    did not have much spending power or political control. It was not until 1854

    that the War Office took over entire financial and political control of the

    Army, but the office was still not very efficient. The office was eventually

    overhauled in 1904 (Ministry of Defence, N.D.). The Air Ministry was created

    in 1918 and its first job was to direct the Royal Air Force, which had been

    created by the unification of the Royal Flying Corps and the Royal Naval Air

    Service (Ministry of Defence, N.D.). The final department was the

    Procurement Executive, which started in 1971 and was the descendent of

    the Ministry Supply, Ministry of Aviation, and Ministry of Technology (Ministry of Defence, N.D.).

    The Ministry of Defence first consisted of the Board of Admirality, the War

    Office, and the Air Ministry which were all consolidated in 1964 (Ministry of

  • Page 29 of 66

    Defence, N.D). In 1971, the Procurement Executive became part of the

    MOD as well. Todays Ministry of Defence sets policy and provides political

    control over the United Kingdoms military. The head of the MOD is the

    Secretary of State for Defence, who is supported by three defence ministers:

    the Minister of State for Armed Forces, Minister of State for Defence

    Equipment and Support, Under-Secretary of State for Defence/Minister for

    Veterans (Ministry of Defence, N.D.). The Defence Ministers report to

    Parliament and they each have both a military and a civilian advisor.

    MODAF

    The Department of Defence introduced the first version of MODAF on August

    31, 2005. MODAF 1.0 was based largely on the United States Department

    of Defense Architecture Framework (DoDAF). It contained the operational viewpoint, systems viewpoint, technical standards viewpoint, and the all

    views, which exist in DoDAF (Ministry of Defence, 31 August 2005). MODAF

    differed, however by introducing the strategic and acquisition viewpoints.

    The framework was developed to meet the specific needs of the Ministry of

    Defence. The original document details that each view is grouped into a

    specific viewpoint, which covers a specific topic. A view can portray overall

    information about an enterprise, detailed information about a specific

    purpose, or information about how different areas of the enterprise are

    connected (Ministry of Defence, 31 August 2005).

    MODAF 1.0 goes on to state that while there is a single organization that is

    portrayed, there are different views based on the role of the viewer (Ministry

    of Defence, 31 August 2005). The goal of MODAF was to realize the following benefits: to gain clearer analysis of business concerns, improved

    quality assurance, lower overall investment costs, detail of more specific

    requirements, improved efficiency, and greater integration of military

    systems and processes (Ministry of Defence, 31 August 2005). The MODAF

    1.0 viewpoints show detail from different perspectives. The views are

    consistent and compatible with DoDAF, but go on to meet some of the

    specialized requirements of the MOD. MODAF does not require that all views

    be used, an organization may only need a few selected views from each

    viewpoint to sufficient show the operations and processes within their

    enterprise (Ministry of Defence, 31 August 2005). The following image

    shows the six original viewpoints and their objects in MODAF 1.0.

  • Page 30 of 66

    MODAF 1.0

    (MODAF, 2005)

    MODAF VERSION HISTORY

    There have been several small revisions and one major revision to MODAF

    since its introduction in 2005. Minor revisions usually involve changes to

    architectural elements of a view, changes to the name of a view, or additions

    or changes to the overall meta-model that do not dramatically change the

    purpose of a particular view (Ministry of Defence, 18 May 2009). Major

    revisions can involve the addition or removal of views or viewpoints, major

    changes to the overall meta-model or the renaming of a viewpoint (Ministry

    of Defence, 18 May 2009).

    In April of 2007, Version 1.1.001 made some minor revisions to section OV-

    2 and changed the title of the section from Operational Node Connectivity

    Description to Operational Node Relationship Description. Version 1.1.002 changed the layout of the first page, changed the order of the menu on the

    side, made a note about the delay in revising M3 (the MODAF Meta Model),

  • Page 31 of 66

    and added a section for Configuration Control Policy. Revisions 1.1.003 and

    1.1.004 revised the Navigation and allowed the user to print the document

    without the navigation links (Ministry of Defence, 18 May 2009).

    Version 1.2.000 was a major revision of MODAF and was released in June of

    2008. It suggested some alternate names for some of the views, introduced

    a new viewpoint: the Service Oriented Views, and allowed software and

    artifacts as a resource type. This version also permitted the use of services

    in some of the operational views, and added an interactive Frequently Asked

    Questions section (Ministry of Defence, 18 May 2009). The new service

    oriented viewpoint was largely based upon the NATO Architecture

    Framework as discussed earlier in this report (Ministry of Defence, 27

    November, 2008).

    Revision 1.2.001 made some minor updates to M3, and some corresponding

    view changes to SV-5 and SV-12. Revisions 1.2.002 and 1.2.003 made

    some additional changes to M3. Revision 1.2.002 added software to SV-11

    and added some requirements to SV-12, OV-1, and StV-1. Revision 1.2.003

    added data and information elements to several views.

    STRENGTHS OF MODAF

    As mentioned earlier, MODAF is partially derived from the United States

    Department of Defense Architecture Framework (DoDAF). MODAF includes

    several components of DoDAF, including the operational viewpoint, systems

    viewpoint, technical standards viewpoint, and the all views. The use of the

    same views offers some compatibility between the two frameworks. MODAF

    usually offers several options for representation in each view. For example, an architect may elect to use a tabular representation or a specific modeling

    tool such as UML.

    MODAF is also advantageous to other defense frameworks because it offers

    three additional viewpoints: the strategic, service oriented and acquisition

    viewpoints. The strategic and acquisition views offer more in terms of

    strategy and program management. They also show how capabilities are

    shared and used in various operational activities. The service oriented view

    supports the use of service oriented architecture (SOA). SOA is an approach

    to integrating information technology services. The strategic, acquisition,

    and service oriented viewpoints were discussed earlier in this document in

    further detail.

    Another strength of MODAF is that it is compliant and useful with the Unified

    Modeling Language (UML). This allows MODAF to be more flexible and useful with other architectures, like DoDAF. In March 2008, the UPDM

    Group was re-formed by members of INCOSE and the OMG (Object

  • Page 32 of 66

    Management Group) to create the Unified Profile for DoDAF and MODAF

    (Hause, 2008).The group is working on ways to create a common

    architecture language so that different architecture can be viewed together.

    MODAF was one of the first architecture frameworks to work with UML.

    WEAKNESSES OF MODAF

    One of the main disadvantages of MODAF is its length. MODAF focuses on 7

    different viewpoints, each of which has a number of different views. It

    includes a great deal of material and requires a user to invest a considerable

    amount of time to understand it. The framework itself specifies a number of

    deliverables, some of which are required and others are optional. An

    organization using MODAF would have to have a clear understanding of their

    architecture before creating these deliverables. MODAF itself does not detail a process for producing the required pieces of the framework, unlike a

    framework such as TOGAF.

    Before an enterprise can start to create viewpoints using MODAF, there are

    several things they must sort out. First of all, the organization has to

    understand the overall problem that they are attempting to solve. The

    architects need to understand the overall strategy of the organization and

    what they wish to ultimately achieve from the architecting process. It is also

    critical that the process has stakeholders. Without stakeholders, the project

    for creating an architecture is likely to fail, as there needs to be cooperation

    throughout the enterprise, which can be facilitated by the stakeholders.

    MODAF is not particularly flexible in that it is not easy to change the

    structural representation of a view or viewpoint or an approach for a specific view. Major changes need to go through an approval process. The MODAF

    Steering Group must review and approve such changes (Ministry of Defence,

    18 May 2009). Minor changes can either be reviewed and approved by the

    Steering Group or by the MODAF Technical Group (Ministry of Defence, 18

    May 2009). This can be challenging for organizations to do as they might

    not necessarily fit the overall model of the Ministry of Defence. MODAF was

    designed specifically to meet their needs and may not apply as well to

    others.

    COMPARISON OF MODAF TO OTHER FRAMEWORKS

    DoDAF

    As mentioned earlier, although MODAF is based upon the DoDAF framework, MODAF is more based on MoD lifecycle processes, where views of the

  • Page 33 of 66

    framework are incorporated and tailored more to MoD terminology as

    oppose to DoD terminology (MODAF, 2009).

    Both MODAF and DoDAF organize enterprise architecture into multiple

    viewpoints, where both frameworks share an All Viewpoint (AV), Operational

    Viewpoint (OV), Systems View (SV), and a Technical Standards View (TV).

    However, MODAF also incorporates a Strategic Viewpoint (StV), defining the

    overall vision of the organization; an Acquisition Viewpoint (AcV), which

    describes how projects and capabilities are dependent from one another;

    and an Services Oriented Viewpoint (SOV), which describes the services

    required to support the processed described in the Operational Views. Below

    is a representation showing the key differences between the two frameworks.

    Viewpoint Description MODAF DODAF

    All Viewpoint

    (AV)

    Extends all views by

    providing context,

    summary, or overview-

    level information

    Operational

    Viewpoint (OV)

    Shows what is going on

    in the real world that is

    to be supported or enabled by systems

    represented in

    architecture

    Systems View

    (SV)

    Describes existing and

    future systems

    Technical

    Standards View

    (TV)

    Lists standard

    (commercial off-the-

    shelf, government off-

    the-shelf system parts

    or components

    Strategic

    Viewpoint (StV)

    Overall vision of the

    organization to support

    military operations

    Acquisition

    Viewpoint (AcV)

    Shows how projects and

    capabilities are

    dependent on one

    another across DLOD

    Service Oriented

    Viewpoint (SOV)

    Describes the services

    required to support the

    processed in OV

  • Page 34 of 66

    Another difference between MODAF and DoDAF is that the MODAF

    metamodel is specified in an Unified Modeling Language (UML) 2.1, which is

    used to diagram and model the objects of the system in an architecture (IRC

    Software Glossary, 2009). MODAF also utilizes XMI 2.1 open standards for

    data interoperability (MODAF, 2009).

    DoDAF uses the Core Architecture Data Model (CADM), which is a formal

    model of architecture products, structures, and their interrelationships. This

    model provides a common database for repositories of architectural

    information, which allows the ability to store data in a commonly shared

    manner between other framework-based architectures (Minoli, 2008). Below

    is an example of CADM.

    (OS Join Task Force, 2006)

    TOGAF

    The Open Group Architecture Framework (TOGAF), which is developed and

    published by the Open Group made freely available to anyone, was created

    to provide access to integrated information, within and among enterprises,

    based on open standards and global interoperability (Minoli, 2008). Similar

    to the goals of MODAF, TOGAF helps organizations produce: well-integrated

    solutions, clearly defines interfaces, reduces complexity, and better manages

  • Page 35 of 66

    technology (Jones, Fatma, Blevins, & Siegers, 2007). Below is an example

    of a TOGAF Model.

    (Jones, Fatma, Blevins, & Siegers, 2007)

    This relationship between the two frameworks can be seen as follows:

    The All Views in MODAF largely aligns with the Preliminary Phase

    and Phase A: Architecture Vision in TOGAF

    The Operational View in MODAF largely aligns with Phase B:

    Business Architecture and Phase C: Information System

    Architecture activities in TOGAF

    The System View in MODAF largely aligns with Phase C: Information Systems Architecture, Phase D: Technology Architecture, Phase F:

    Migration Planning, and Phase E: Opportunities and Solutions in

    TOGAF.

  • Page 36 of 66

    The Technical Standards View in MODAF largely aligns with Phase D:

    Technology Architecture, and phase E: Opportunities and Solutions

    in TOGAF.

    The figure below shows an overview of the primary relationships between

    the two frameworks.

    TOGAF Phase Focus Applicable MODAF

    Models

    Preliminary Framework & Principles AV-1, OV-1

    A Vision AV-1, OV-1

    B Business Architecture AV-2, OV-1, OV-2, OV-

    3, OV-4, OV-5, OV-6

    C Information Systems Architecture: Data

    Architecture

    OV-7, SV-11

    Information Systems

    Architecture:

    Applications

    Architecture

    SV-4, SV-5, SV-6, SV-

    10

    D Technology Architecture SV-1, SV-2, SV-3, SV-4

    SV-5, SV-7, SV-10, TV-

    1

    E Opportunities &

    Solutions

    SV-8, SV-9, TV-2

    F Migration Planning SV-8

    G Implementation

    Goverance

    AV-1, OV-1

    H Change Management SV-9, TV-2

    (Jones, Fatma, Blevins, & Siegers, 2007)

    This relevance between the two relationships show that the frameworks are

    complimentary to each other and enable architects to use TOGAF to build

    MODAF architectures which align to business requirements and services.

    Additionally, both frameworks have a services-based history and reference

  • Page 37 of 66

    models, and have the fundamental capability as mentioned before to create

    Service Oriented Architecture.

    In order for frameworks to be successful, they must conform to several key

    required elements through the application of TOGAFs Development Method,

    such as: repeatable methodology, standardized output models, governance,

    collaboration, formal validation, collaboration guidelines, configuration

    management, tools and patterns; which in the end can create a disciplined

    process in developing MODAF set of views to model the architecture (Jones,

    Fatma, Blevins, & Siegers, 2007).

    COMPLIANCE ISSUES

    There are no significant compliance issues in regards to MODAF. The MOD

    has created 3 main phases to ensure that groups within MOD are compliant when creating an architecture. The first phase is the development stage.

    This is where all information is gathered, architects are consulted, the seven

    views are completed, and pilot projects are rolled out. The second stage is

    the roll-out phase where MODAF is delivered across the MOD. Typically this

    can take up to 12 months and includes a lot of formal training. The third

    phase is the maintain phase. This consists of a series of audits to determine

    if groups are in compliance set forth by the MODAF. More training may

    occur at this stage (Ministry of Defence, 2004). The approach to developing

    a MODAF-compliant architecture is shown in the diagram below which shows

    how a MODAF user within any community in the MOD goes about

    establishing the intended use, as well as the scope and data requirements in

    developing the architecture, and lastly use this to conduct the required analyses by document the results.

  • Page 38 of 66

    (Ministry of Defence, 2005)

    MODAF USERS

    One of the significant means of establishing a cost-effective integrated and

    interoperable Defence capability is to build a comprehensive architectural

    framework which can deliver information in a form that can be visualized by

    addressing analytical and decision making processes (Lockheed Martin UK,

    2010).

    Lockheed Martin UK

    Lockheed Martin is an aerospace, defense, security, and advanced world-wide technology company that uses MODAF guidelines and technical

    standards for the Air Warfare Centre, which defines the Command and

    Battlespace Management for in the Air environments. The company has

    been integrating and continues to integrate key components across the

    structured set of the architecture framework views including:

  • Page 39 of 66

    Defence organizations and high level interoperability requirements

    Defence activities and information exchange

    People and appointments

    Equipment platforms, sensors and weapon systems

    Information systems, communication systems and data exchange

    Operational roles conducted by people, organizations and equipment

    Capability, user, and system requirements

    Defences Capability Themes (Defence tasks, effects based tasks)

    Lines of development

    Concepts, doctrine, and procedures

    Performance, time, and cost parameters

    (Lockheed Martin UK, 2010)

    The MODAF framework has helped Lockheed Martin deliver an integrated

    capability to defence systems including: Requirements Capture and

    Management (RC&M), and Interoperable Systems Management and

    Requirements Transformation (iSMART). The figure below represents this

    integration.

    (Lockheed Martin UK, 2010)

    Some of the benefits gained from using MODAF at Lockheed Martin include:

    Capability integration compared across organizational and capability

    boundaries

  • Page 40 of 66

    Conducting capability gap and overlap analysis

    A structured approach allowing the Enterprise to be viewed from

    capability interoperability perspectives

    Identifies Defence capability needs

    Clarifies roles, boundaries, and interfaces

    A mechanism for military and industry to share the capability through-

    life from vision through design to termination or disposal.

    Defines performance across all views and architecture components

    including organizations, operational activities, roles, and equipment

    Analyzes interoperability issues

    Develops and manages user and system requirements with owner and

    stakeholder involvement. (Lockheed Martin UK, 2010)

    DSTL

    The Defence Science and Technology Laboratory (DSTL), which is an agency

    of the UKs Ministry of Defence and its center of scientific excellence, houses

    one of the largest groups of scientists and engineers in the UK. The mission

    of DSTL is simple, which is to ensure that the UK Government and Armed

    Forces have access to world-class scientific advice and from there can

    deliver defensive research, specialist technical services, and the ability to

    track global technological developments by establishing defensive policies

    making and operations. In order to provide the best possible solutions to

    the government, as well as bring exciting and innovative technologies to the

    table; DSTL is required to build their architecture around MODAF (M2 Presswire, 2010).

    BMT Hi-Q Sigma

    BMT Hi-Q Sigma, a company which helps to deliver complex programmes

    through the integration of programme management, and systems

    engineering, uses a modern driven requirements approach by utilizing

    MODAF (BMT Hi-Q Sigma, 2010). A recent example of this includes the

    company being contracted in 2007 to produce a User Requirements

    Document (URD) for the Apache Army Helicopter Mark 1 (AH). The intention

    of this document was to produce a baseline capability and articulate what

    was needed in order to meet the capability throughout its intend lifespan.

    In order for the company to gather the future capability requirements, a

    number of Operational Views from MODAF were produced, which allowed Hi-

    Q Sigma to scope the various aspects of the equipment required.

    The following is a list of key benefits that MODAF provided to the company

    for this particular project:

  • Page 41 of 66

    A more complete URD

    Consideration across all Lines of Development (LoDs)

    Clear separation of effects required VS The level of effect to be

    achieved

    Identification of the current capability gaps

    (BMT Hi-Q Sigma, 2007)

    Suppliers of UKs Land Forces

    Because demands in recent times have increased substantially for suppliers

    of UKs Land Forces, the requirements have evolved significantly since

    moving from historic theaters of operations in Europe and the UK. Todays

    environment includes evolving fragmented solutions to specific needs, with

    diverse logistic requirements. With this being said, a new approach for these suppliers is required in order to provide a capability for wider

    operational use that: supports theatres world-wide, minimizes user

    overheads, is modular, scalable, and readily upgraded, accommodates

    technology insertion and integration of Commercial-Off-The-Shelf (COTS)

    elements, is interoperable with other UK and Allioes equipment, and lastly

    fulfills the need of each Defence Line of Development (DLOD) (Davis &

    Washington, 2009) .

    MODAF has helped manage the complexity in implementing workable

    solutions that fulfills the users requirements which can be delivered on time

    and to budget. The framework has captured the many aspects, views, and

    perspectives of the organization, its people, its processes, and the system

    and data that support the organization as a whole. In addition, MODAF has facilitated the planning of future procurements so that capability levels can

    be enhanced or maintained in a way where the information required to make

    planning decisions become simple and much easily understood (Davis &

    Washington, 2009).

    Results:

    The Strategic Views for the new capability allowed terms from existing

    policies to be presented and familiar with to both the military and

    industry.

    The Operational Views showed that taking an abstract at a high-level

    view, successfully stripped away the unnecessary complexity that can

    create confusion among the presentation of the core requirement.

    Additionally, the support and maintenance requirements were also

    modeled in the Operational Views, which is an aspect that is often overlooked by most (Davis & Washington, 2009).

  • Page 42 of 66

    The System and Technical Views were used to represent the user

    requirements and sample configurations that satisfied the operational

    requirements represented in the Operational Views. This showed the

    potential deployments and which existing systems could be used as a

    system-of-systems in order to provide the required information

    management and communications (Davis & Washington, 2009).

    The Acquisition Views were easily understood in Gantt-style diagrams that

    gave an immediate indication of programmed interactions and potential

    scheduling conflicts. For the new system, the platforms that were going

    out of service were immediately identified so that their replacement could

    be identified and informed of the new requirements. Additionally, some platforms were able to be scheduled for the fitting of the legacy

    equipment and eventually be considered as replacements and as the

    correct fit for the system (Davis & Washington, 2009).

    In the end, the complete set of the six MODAF views were selected:

    All Views (AV-1 & AV-2)

    Strategic Views (StV-1, 4 & 6)

    Operational Views OV-1a, 1b, 2, 3, 4, 5, 6a, 6b)

    System Views (SV-1, 3, 4[7], 5, 6, 7, 9, 10a, 10b

    Technical View (TV-1)

    Acquisition View (AcV-2)

    (Davis & Washington, 2009)

    Below is an example of the organizations MODAF Operational View

    (OV-1a)

  • Page 43 of 66

    (Davis & Washington, 2009)

    This project has demonstrated that the Model-Based Systems Engineering

    (MBSE) approach using MODAF has:

    Enhanced communications across multiple teams

    Provide a basis to manage critical risks and resolve issues

    (including those associated with emergent behavior, budget and

    resources) as they arise. As each user need is traceable to a

    stakeholder, any future issues can be resolved by consultation with

    the owners of the relevant requirements

    Enabled effective management of the interfaces (including strategic

    reallocation of capability)

    Ensured consistency from the initial phases of system definition

    whilst supporting change impact analysis and technology insertion

    (Davis & Washington, 2009)

  • Page 44 of 66

    UPCOMING MODAF VERSIONS

    Going on forward, the MoD expects to keep changes to a minimum;

    however, there is some alignment work going on which may affect MODAF:

    1. The Object Management Group (OMG) Unified Profile for DoDAF and

    MODAF (UPDM) version 2 enthusiastically supported by MOD, as it

    provides the MoD with assurance that UML/SysML architecture software tools

    that use UPDM have implemented a correct representation of the MODAF

    Meta Model.

    2. The International Defence Enterprise Architecture Specification (IDEAS)

    a five nation (United States, United Kingdom, Canada, Australia and Sweden) group that is driving forward coherence and convergence of

    national frameworks, to improve our capability to share architecture

    information.

    3. The NATO Architecture Framework version 3 fundamentally based on

    MODAF version 1.1, but has recently been updated so that the NAF Meta

    Model is fully aligned with the MODAF Meta Model version 1.2.

    (Gorman, 2010)

    ANALYSIS OF ENTERPRISE ARCHITECTURE

    As we known Enterprise Architecture (EA) models are able to support

    hundreds of applications used from the organization. It is very important to

    analyze the EA based on the following techniques:

    Dependency analysis in this type of analysis, the enterprise architectures

    artifacts are analyzed to find the direct or indirect relationships between

    them. The reports could be presented using cross reference reports or visual

    dependency graphs. Some of the questions answered from this analysis are

    such as which business processes could be affected from a server change or

    finding the list of applications that could make the life-cycle of products

    easier (Bucher, Fischer, Kurpjuweit, & Winter).

    Coverage analysis this type of analysis covers more than two EA layers. A

    two dimensional matrices is used to present the analysis. The checked cells

    in the matrix could indicate the applications used in each of the platforms

    and how the products and applications are connected through business

    processes. Using this coverage analysis, we could discover gaps and redundancies (Bucher, Fischer, Kurpjuweit, & Winter).

    Interface analysis - studies the interfaces within enterprise architecture

    artifact classes. As an example to represent interface analysis, we could use

    the analysis of technical interfaces of components in software architecture.

  • Page 45 of 66

    The main purpose of this analysis is to study the artifacts, minimize their

    coupling, and maximize the cohesion between them. Interface analysis is

    also used for the organizational and strategy layer, and also the study of

    homogeneity of the structure and artifacts (Bucher, Fischer, Kurpjuweit, &

    Winter).

    Heterogeneity analysiss- purpose is to locate the elements which could

    increase efficiency of architecture homogeneity. Homogeneous structures

    have low costs for maintenance, software, hardware and that all issues are

    treated the same (Bucher, Fischer, Kurpjuweit, & Winter).

    Complexity analysis and interface analysis go together- Its goal is to lower

    the enterprise architecture complexity by studying the complexity measure

    and dependency between the components. Compliance frameworks, regulations by law, and market standards have gained tremendous

    importance during the last couple of years (e.g., Solvency II, Basel II and

    the Sarbanes Oxley Act) (Bucher, Fischer, Kurpjuweit, & Winter).

    Compliance analysis- is analyzed if some policies such as process and data

    ownership are correctly identified in the organizational level of abstraction

    and if authorization and recovery mechanisms are successfully implemented

    (Bucher, Fischer, Kurpjuweit, & Winter).

    Cost analysis- calculates costs of enterprise architecture artifacts such as

    new implementations or sales. It is very important to know IT costs and how

    to distribute them to products, services, processes and other layers (Bucher,

    Fischer, Kurpjuweit, & Winter).

    Benefit analysis- calculates the contribution of different parts of the companys units, systems or products to the whole organization. Every

    organization has set goals and balanced scorecards, which are good

    indications of how they perform (Bucher, Fischer, Kurpjuweit, & Winter).

    The whole purpose of a system architecture is the link and collaboration

    between its components; and that it works by using interaction protocols

    among the components (Bucher, Fischer, Kurpjuweit, & Winter). The

    interaction between the protocols should be error free, so there wont be any

    deadlocks, logical inconsistencies or not controlled interactions. Another way

    to control that all interactions go according the plan is by using Architecture

    Description Language (ADL)

    Model checking techniques are very important since the enterprise

    architectures are widely distributed in organizations, and often too many

    processes are running at the same time, interacting with each other but with no standardized techniques to be analyzed. As a result of no coordination;

  • Page 46 of 66

    they often could spend value time and resources (Bucher, Fischer,

    Kurpjuweit, & Winter).

    The Architecture Description Language provides well defined and distinct

    syntax for processes, components, ports, interfaces, channels, and protocols

    of interaction (Sircar & Kott, 2000). ADL is similar to other programming

    languages that run code to check the system characteristics. This system

    analysis tool can give important feedback on enterprise control. The strong

    capabilities of the tool are to be able to eliminate errors in designs during

    different situations such as when multiple components are interacting with

    each other.

    The figure below represents the ADL method:

    (Sircar & Kott, 2000)

    If inefficiencies are found, it is important to find a fix, and when doing

    analysis to compare different architectural models, it would be wise to

    choose the best one by weighting advantages and disadvantages.

    In order for an organization to have all departments work in symphony with

    each other, it is not possible just to make local changes, however changes

    need to be made to the organization as a whole instead. Then integrate all

    the components together by utilizing description techniques and the analysis

    techniques of the architectural models. Often changes are needed to be done

  • Page 47 of 66

    to the architecture framework model, and in this case to do a model-based

    analysis. As a result, different methods of analysis need to be utilized to let

    users such as architects and stakeholders choose the best option by

    weighting advantages and disadvantages (Sircar & Kott, 2000).

    Analysis Techniques

    As mentioned above, stakeholders and architects need to weigh the

    advantages and disadvantages of the outcomes in order to put best results

    into work. They need to analyze quality, expenditures, timeframe, short

    term and long term outcomes, performance, and more importantly the effect

    that the different available alternatives could have on the existing

    architecture setup. Since enterprise architecture is very complex, a very

    detailed examination is needed by using very complex algorithms.

    Below represents the analysis dimensions:

    (Lankhorst, 2005)

    The analysis of architecture has to be done looking from different perspectives. The first step is by comparing inputs and outputs; i.e.

    functional versus quantitative (Lankhorst, 2005).

    By performing the Functional Analysis, the architecture is looked upon from

    the inside. This way data is generated on how a system conforms to the

    particular architecture functions and what would be the causes of an

    architecture change, and finally to check if the architecture is working or

    being followed step by step. When a functional analysis is performed,

    answers are not received to the questions on how fast will it be done or

    Analysis dimensions

    Quantitative

    Simlulation

    Functional

    Analytical

  • Page 48 of 66

    how much it will cost. These questions get a response when a quantitative

    analysis is done, although it is very difficult to answer those kinds of

    questions from an architectural model since the quantitative analysis of the

    framework doesnt offer an option to regulate and correlate quantitative

    results taken from the present detailed analysis methods.

    The Functional and the Quantitative Analysis utilizes two different techniques

    as well: the analytical and simulation technique. The simulation would show

    the results of a models execution. The simulation is divided into Functional

    and Animated simulation which looks at the performance and actions of the

    system and as a result, helps the architects look and find ways to adapt the

    changes, and also helps the stakeholders to have better knowledge on the

    architecture. When running the functional simulation, architects and stakeholders could be faced with interpretation problems; which could be

    caused from the situations created from architecture abstraction.

    Formal and Analytical analysis methods defer from the Simulation by

    providing distinctive and reproducible results. By running the Analytical

    techniques, architects and stakeholders can achieve better results than the

    quantitative simulation during the quantitative analysis, which helps the

    architects detect the bottlenecks of the framework, its performance, and also

    helps to make better decisions if many options are available during the what

    if analysis. When utilizing the analysis techniques, it will also answer the

    question if the existing techniques should be used or if it will be necessary

    create new ones. If architects choose to create new techniques, there will be

    two available options: buy it or build it? From the Buy it question, offspring two other questions: Which available technique should be chosen?, and

    How to apply it?, and from the other perspective from the Build it

    question, two more questions will be asked: How will the development be

    implemented? and For which of the issues will the technique be built for?

    (Lankhorst, 2005).

    Quantitative Analysis

    The enterprise architectures concern is to have a detailed description of how

    all the important fundamentals of the enterprise operate together, such as

    business products, processes, and software applications. From the

    quantitative point of view, these fundamentals are related to each other in

    multiple ways. Often, there is a misunderstanding that quantitative analysis

    would get too complicated and give high level details when ran on the

    architectural level. In the other side, performance engineers think that quantitative (non-functional) aspects are equally important as functional

    aspects to all stages of the system design and enterprise architectures, and

    not just as a back-up idea. In enterprise architecture modeling, the

  • Page 49 of 66

    quantitative sides are put on a global level, where the weight falls on the

    structure which in enterprise architectures is used as a mechanism to

    regulate the quantitative properties of organizations and their systems

    (Lankhorst, 2005). When doing a quantitative analysis, there are several

    issues to look at:

    1. Quantitative analysis is used as an optimization tool for systems or

    different processes by having a definite answer in case different design

    alternatives are available.

    2. Quantitative analysis could be used as a tool that could help architects

    take the right measures in order to be able to prevent negative effects

    of changes.

    3. The last type of issue that quantitative analysis studies is capacity

    planning. Capacity planning would analyze the available resources and

    tell how many people would be needed to fulfill a process on time, or

    would the present infrastructure be able to handle the actual processes

    or if changes to storage, network capacity should be made?

    The models that organizations could utilize could be represented in different

    ways:

    Performance measure This represents the timeframe that measures,

    such as throughputs or resource exploitation,

    Reliability This measure the ease of use and reliability. Cost measures Which measures the cost of implementing.

    (Lankhorst, 2005).

    Quantitative Analysis - Performance Views

    In order to structure a framework, there are different options available.

    Architects could be dealing with different concerns, and as a result there are

    different views available with each having different performance

    characteristics:

    User/customer view In this case the stakeholders are: customers, or

    just a simple user of the application or system. The response time is

    the time it takes for a request to be completed.

    Process view In this case the stakeholders are: process owners and operational managers. The process view represents the time it is

    required for a step of the process to be completed. For example: if a

  • Page 50 of 66

    customer has multiple requests this represents the time that it takes

    for a request to be completed; or in the case of an information system,

    the time it takes to finish a batch of a process.

    Product view - In this case the stakeholders are: product managers

    and operational managers. Processing time represents the time it

    takes to complete a product, excluding the wait, or delay time. In a

    computer system it is represented by the time when the CPU is busy.

    System view - In this case the stakeholders are: owner and managers.

    Throughput is represented by the number of requests that are

    completed by the system in a time unit. For example: the number of

    scanned pages in an hour. In system view, the term processing capacity represents the maximum attainable throughput depending on

    the number of available resources and their capacity.

    Resource view - In this case the stakeholders are: resource managers

    or capacity planners. The representation of time in percentage

    calculated by using the time the resource is busy compared to total

    operation time is known as Utilization. Utilization is a great tool that

    shows the effectiveness in time of resources. By analyzing the time of

    the resource it takes to be completed, bottlenecks could be found as

    well. In an information system architecture, the network load time is

    represented as utilization (Lankhorst, 2005).

    Sometimes performance measures of different views could be interrelated,

    and sometimes can be in conflict with each other when trying to increase the performance of the belonging system. For instance, an example of high

    throughput which as a result could lead to higher resource utilization. This

    situation could be helpful to a manager because it increases the response

    time, but it is not good for a users time. As a result, system performance

    optimization is a very important and key issue (Lankhorst, 2005).

    Quantitative Analysis - Performance Analysis Techniques for

    Architectures

    Although many applications are used to create models of enterprise

    architectures, many of them, if not most of them do not analyze

    architectures from the quantitate point of view. Multiple performance

    analysis techniques have been planned for computing, manufacturing, and

    telecommunication systems; and are therefore very efficient with a relatively

    highly accurate estimate. Quantitative analysis can be used on all aspects of enterprise architecture, beginning from the technical infrastructure layer, to

    software applications, ending with the business processes supported by

    these applications (Lankhorst, 2005). Additionally, enterprise architecture

  • Page 51 of 66

    layers should be related to each other, and this happens also from the

    quantitative side. For example, lower layers influence the higher layers and

    higher layers influence the lower layers.

    Infrastructure layer infrastructure domain is strongly affected from

    the performance evaluation of computer and communication systems. The

    hardware specifications in a system are described from the queuing models;

    in the meanwhile the applications workload are controlled from the abstract

    stochastic arrival process (Lankhorst, 2005).

    Application layer the discipline of performance engineering of

    software applications are considered at a global level, from which the

    analysis of performance characteristics of some architectural styles and also

    the performance issues are based from the SAAM method, which is a five-step method analyzing software for architectures. Architecture description

    language (ADL) suggests the queuing of models from software architecture.

    Compositionality, which is another important architecture issue, describes

    that the performance of a system could be expressed as the sum of the

    performance of each of its components. Stochastic extension of process

    algebras could be used for the compositional performance analysis, but they

    are very computationally intensive. Process-algebra-based approaches allow

    compositional specifications of performance models, but the analysis results

    are not always compositional (Lankhorst, 2005).

    Business layer there are many business and general process

    modeling tools, such as Arena and ExSpect, that are used for quantitative

    analysis using discrete-event simulation. The simulation is very helpful to interpret the data, but if it is inserted at a very detailed level, it might b