SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012



       Data oriented and Process oriented Strategies for
         Legacy Information Systems Reengineering
                                            Malleswara Talla, and Raul Valverde
                           John Molson School of Business, Concordia University, Montreal, Canada.
                                  mrtalla@jmsb.concordia.ca, rvalverde@jmsb.concordia.ca


Abstract–The legacy information systems often implement                 are often remodelled during system architecture phase based
manual data updates for information obtained from external              on the software development methodology chosen. This
systems. The manual updates are cumbersome, error prone,                paper focuses on traditional data and process models and
and expensive. The legacy systems miss interfaces to external
                                                                        attempts to propose few reengineering strategies.
systems that could be used for automatic updates of system
data. Moreover, the legacy systems also lack extensions to
                                                                            The traditional data oriented reengineering focuses on
supplier or customer systems that are essential for creating            migrating databases of legacy systems to current relational
supply chain relationships. This paper explores the data                databases, enterprise data standardization, integration of
oriented and process oriented models of legacy systems, and             disparate information systems, etc. [3]. The data oriented
discusses the details of systems development and evolution              reengineering can also be conducted by focusing on
models mainly aiming at an ongoing reengineering of legacy              improving data objects one by one in a pragmatic manner as
systems. This paper proposes simple strategies for creating             presented in this paper. This approach eliminates the
interfaces to external systems for automatic updates of data,           possibility of system failures, and minimizes the impact on
and for adapting to the process evolution that requires a legacy
                                                                        overall system while reengineering the system. The process
information system to extend its communications with
                                                                        oriented reengineering considers each work activity and
external systems that could help in creating successful supply
chain relationships. These strategies can reshape a legacy              remodels a relevant part of the legacy system. The effort
system to be reengineered into a new enterprise information             could be as simple as extending the legacy information system
system whether the legacy system is of a data oriented model,           to an external process.
or of a process oriented model.
                                                                                 II. TRADITIONAL DATA MODEL    REENGINEERING
Key words–Legacy system, Data oriented model, Process
oriented model, System reengineering, Data structure.                       The traditional software development methodologies
                                                                        include data models for organizing data and its documentation
                          I. INTRODUCTION                               [4]. Data modeling is also called as database modeling
                                                                        because a data model is often implemented as a database [2],
    A legacy system is an application that uses an obsolete             as depicted in Entity Relationship Diagram (ERD) that
hardware platform or software which is hard and expensive               presents the data in terms of the entities and their
to maintain. Due to the fact that a legacy system is old, it is         relationships. An entity is an instance of a class of persons,
hard to find the skill set for maintaining the software or              places, events, objects, or concepts about which data is
replacing hardware parts if a hardware failure occurs. Recent           captured and stored. An entity is a single occurrence. An
trend is the shortening life period of software systems and to          attribute is a descriptive characteristic of an entity. A
quickly adapt to the new developments in software                       compound attribute could include multiple attributes, in other
engineering; otherwise the systems become outdated very                 words, a group of attributes or a data structure. A relationship
soon and become legacy systems. The huge investment in a                is a natural association that exists between two or more
legacy systems often compel reengineering and reuse of                  entities. The relationship may represent an event for linking
system components for evolution, maintenance and newer                  the entities. Cardinality defines a minimum and a maximum
hardware platforms. Therefore, legacy systems range from                number of occurrences of an entity that may be related to a
traditional software systems to recent component-based                  single occurrence of the other entity. Since all relationships
systems. The modeling techniques that were used during                  among entities are bi-directional, cardinality must be defined
legacy systems development also serve as building blocks                in both directions for a relationship. Every entity must have
during reengineering phase. This paper presents both                    a key which is an attribute, or a group of attributes, which
traditional data and process oriented modeling techniques               assumes a unique value for each entity instance. It is
and proposes reengineering approaches that would prolong                sometimes called an identifier. A primary key is the candidate
the life span of a legacy system.                                       key that uniquely identifies an entity instance. A foreign
    The systems documentation often includes models that                key is the primary key of another entity that is duplicated in
describe the requirements collected during initial system               the entity for the purpose of identifying the relationship.
analysis phase of software development process [1]. These
requirements models simplify the system complexity and help
software maintenance process [2]. The requirement models
© 2012 ACEEE                                                       47
DOI: 01.IJIT.02.01. 532
ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012




                                                                      Figure 2. Legacy systems reengineering to use external data sources
                                                                      In figure 2, two interfaces to different systems are proposed:
                                                                      (a) a customer interface that enables a customer to update an
                                                                      order processing part of a legacy system; (b) an external
                                                                      system interface where the currency rate fluctuations are
                                                                      automatically incorporated into the legacy system for
          Figure 1. Sample ERD of an ordering system                  eliminating manual data entry of currency exchange rates.
                                                                      Similarly, system improvements can be carried out one by
Reengineering techniques for Data models                              one till the entire legacy system is reengineered.
    The business logic and data are interwoven that makes
reengineering harder to accomplish. It is important to focus                 III. TRADITIONAL   PROCESS MODEL REENGINEERING
on the importance of data in the context of application as
follows:                                                                  The traditional approach for information system
 Volume of data: number of entity instances,                         requirements is to describe the business activities as
 Security: business critical data,                                   processes carried out within and across organizations.
 Mining: data for searching using a keyword,                         Typically, a business process represents a set of workflows
 Complexity: interwoven data that makes it harder to                 in a department of an organization, and a software application
isolate,                                                              is designed to reflect upon the workflows as a set of
 Availability: of data within local database,                        interactions among entities and data stores, to eventually
 Redundancy: duplicate data for simplifying systems                  deliver a service. The data flows through the processes
development, or data which is also available on a different           reflecting upon the procedures, policies and logic for
system.                                                               implementing the software, as modeled in data flow diagrams
 Heterogeneity: different in nature of data, etc.                    (DFD) that serve as tools. In a process, work is performed in
    We may like to conduct the reengineering of entire                response to requests or data flows or conditions [4]. Unlike
application at once, but it is cumbersome and it may fail,            traditional data models, the process models depict
given the huge task of system reengineering. Conversely, if           concurrency of interacting processes as a set of data flows
the reengineering is carried out in a pragmatic manner                among entities and data-stores. The figure 3 reflects upon an
focussing one feature of the system at a time, reengineering          order processing process that interacts with entities such as
will be successful. Here, we propose an approach for                  customers, warehouse, shipping, billing, etc. The repository
reengineering that focuses on reducing data duplication or            of data are presented in figure 3, as data stores such as
redundancy of data. Traditional legacy systems focus on               customers, inventory, and sales orders each of which
centralized data processing whereas the contemporary                  maintains the necessary information.
systems use distributed data processing architectures for
parallel, specialized, and secure processing that increases
the speed of response time. Traditional legacy information
systems duplicate a lot of data into its local data base; such
data requires periodic updates that introduce a margin of
error as the data does not reflect upon real time data. The
source of such data into the database may be often in the
form of spread sheets or flat files. The legacy information
system can be reengineered by changing the sourcing of
such data to use the original data source over the network,
instead of a lengthy spread sheets or data entry. The proposed
reengineering technique in figure 2 uses the existing network
applications that provide data in real time. This approach                           Figure 3. Sample Data Flow Diagram
improves system performance and reduces the quantization              The system exchanges data as inputs and outputs within its
error, introduced due to periodic manual updates of data.             process environment. An external agent or an external entity
© 2012 ACEEE                                                     48
DOI: 01.IJIT.02.01. 532
ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012


defines a person, an organization unit, or a system internal or          the same legacy software systems are in-use although an
external to organization that lies outside the software system           organization radically changed or reorganized its processes.
scope, but interacts with the system being studied [4].                  An organization employs different ways of adapting to
External agents provide inputs into the system, and receive              process changes, often conducting appropriate data entry
outputs from the system [2]. A data store is an inventory of             in to and out of a legacy system to continue using it. This
data which is frequently implemented as a file or database               additional data entry is cumbersome and expensive; instead,
[4]. It is data at rest compared to a data flow which is data in         it is profitable to gradually reengineer the legacy system.
motion. Data stores depicted on a DFD store all instances of                   A methodology for reengineering is presented in [5]
data entities depicted on an ERD. A data flow represents an              focusing on business process, as follows:
input of data to a process, or the output of data from a process.         Prepare for reengineering,
It may also be used to represent the creation, reading, deletion,         Map and analyze As-Is process,
or updating of data in a file or database. A control flow                 Design To-Be process
represents a condition or non-data event that triggers a                  Implement reengineered process, and
process. The following strategy for process modeling is                   Improve continuously.
proposed in [4]:                                                         While planning a legacy system reengineering, one should
1. Draw a context DFD to establish initial system scope.                 target process improvements such as (a) work balancing, (b)
A context diagram defines the scope and boundary for the                 work-flow redesign, (c) eliminating non-value-added
system. Because the scope of a software system frequently                activities, and (d) revising administrative controls [6]. A
changes during the requirements and design phases of                     process can be viewed as a set of sub-processes with
software development, the context diagram may also change                performance criteria as follows:
to reflect upon the same.                                                 Distributed processing for faster response,
2. Draw a functional decomposition diagram to partition the               Data redundancy across processes,
system into subsystems. A decomposition diagram shows                     Increased automation to integrate and minimize manual
the top-down functional decomposition or structure of a                  processes,
system. It provides an outline for arriving at data flow                  Simplifying cross functional processes,
diagrams.                                                                 Eliminating redundant sub-processes,
3. Create an event-response or use-case list for the system in            New process creation and integration,
order to determine what business events the system must                   Integrating current enterprise applications, e.g. Supply
respond to, and what responses are appropriate. Some of the              Chain Management (SCM), Customer Relationship
inputs on the context diagram are associated with events.                Management (CRM), Enterprise Resources Planning (ERP),
4. Draw an event DFD or event handler for each event. For                etc.
each event, illustrate any data stores from which records                     As discussed earlier, if the reengineering is carried out in
must be ‘read’ should be added to the event diagram. Data                a pragmatic manner focussing one feature at a time,
flows should be added to reflect upon the data read. Any                 reengineering will be successful. Here, we propose an
data stores in which records must be created, deleted, or                approach for reengineering that focuses on integrating a new
updated should be included in the event diagram. Data flows              process, e.g. supplier process via web interface as presented
to the data stores should be named to reflect upon the nature            in figure 4. It is possible to reengineer few parts of a legacy
of the update.                                                           system by providing user interfaces to integrate new
6.Merge event DFDs into a system diagram. The system                     processes; for example, automatic inventory replenishment
diagram is said to be exploded from the single process on                can be achieved by extending the system to integrate a
context diagram. The system diagram shows either: all of the             supplier process as follows in Figure 4.
events for the system on a single diagram, or all of the events               This approach in figure 4 integrates the external supplier
for a single subsystem on a single diagram.                              processes and eliminates the order transaction processing
7. Draw detailed and primitive DFDs for the more complex                 delays. The legacy system can use the current business rule
event handlers. Each event process on the system diagram(s)              set and automatically generate new orders while respecting
must be exploded into either a procedural description or a               the lead time to suppliers.
primitive data flow diagram. For event processes that are not
very complex – in other words, they are both an event and an
elementary process, they should be described. The data flow
diagrams show all the elementary process, data stores and
data flows for single events
8. Document the logic of each elementary process using
structured English.
9. Document data flows and processes in the data dictionary.
Reengineering techniques for Process models
   Usually systems are not reengineered often, as a result,                 Figure 4. Legacy systems reengineering to integrate external
                                                                                                  supplier process
© 2012 ACEEE                                                        49
DOI: 01.IJIT.02.01.532
ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012


It also eliminates or simplifies the purchasing process.                   #ifdef ORIGINAL_DATA
Although legacy systems use older software development                       ….. Software with original data …….
methodologies and older hardware platforms, they still                     #endif
employ modular design, and it is possible to reengineer a
business process, part by part, selectively.                               #ifndef ORIGINAL_DATA
                                                                             ….. Software with reengineered data …….
     IV. TRADITIONAL DATA MODELS       AND PROCESS MODELS                  #endif
    Both data models and process models are in fact                            The process reengineering improves the system to match
interwoven sine every process has a set of data inputs and                 the latest ways of working. The business rules and external
outputs following a set of actions. The process reengineering              processes often change and system needs to adapt to such
involves changing the business rules whereas data                          changes quickly, in order to avoid manual update processes
reengineering involves organizing, controlling and managing                and related overhead. The data model reengineering focuses
data. The legacy systems often interface external systems                  on improving the data structures and the associated imple-
using manual processes, whereas contemporary systems use                   mentation. Both data and process models adapting the busi-
Intranets/Extranets. The data model is often described using               ness model to the most recent requirements effectively. Once
ERD while the process model is described using DFD. The                    the systems reengineering is completed, the systems staff
process model reengineering sometimes may require different                needs to be trained so that they understand the features and
inputs and may produce different outputs focusing mainly                   the impact on business process. The data model reengineering
new business rules. The figure 5 presents the process and                  is relatively easier to accomplish compared to process
data models distinctly, identifying the internal and external              reengineering. However, well planned reengineering is often
processes and entities as well. While developing data-                     cost effective than developing new products that accom-
oriented reengineered model, both original and reengineered                plish the same goals. It is also possible to model a system
versions of data are kept and used interchangeably for                     such that some parts of the system can be data oriented
smoother and gradual reengineering. It is sometimes required               whereas the other parts can be of process model, which means
to switch from reengineered data to original data models                   the reengineering can be of both data and process models.
during reengineered system development.                                    Moreover, the system reengineering can be a gradual and an
                                                                           ongoing activity that keeps the systems maintenance staff
                                                                           well involved that proves the systems investment worth-
                                                                           while.

                                                                                                  CONCLUSIONS
                                                                               In this paper, the traditional data and process modelling
                                                                           of legacy information systems and reengineering approaches
                                                                           were presented. The reengineering approach focused on
                                                                           systems evolution to benefit from in-house experience of
                                                                           systems team, able to maintain and evolve the software
                                                                           system. A fully reengineered system reflects upon the current
 Figure 5. Data oriented vision versus Process oriented vision of a        business model and the feature set required sustaining the
                          Legacy system                                    business in a medium term. It is argued that the traditional
                                                                           methodologies are not comprehensive enough to accurately
                                                                           model systems, then the only way to meet business
                                                                           requirements in an enterprise setting is to create several
                                                                           models in detail across the width and depth of the business.
                                                                           The paper recommends a gradual reengineering of system
                                                                           rather than a radical one shot, big budget, and expensive
                                                                           reengineering that can fail. The paper recommends a
                                                                           reengineering of both data model and process model in order
                                                                           to reorganizing the data and process models in a pragmatic
                                                                           way. The paper presented the approaches for reengineering
                                                                           with examples. The reengineering approaches proposed in
 Figure 6. Co-existing original and reengineered data models of a          this paper prolong the legacy information system lifespan in
                          Legacy system                                    a cost effective manner.
Both original data model and reengineered data model to
coexist, the “ifdef … endif, and ifndef ….. endif” pre-processor
statements can be used during reengineered software
development stage.

© 2012 ACEEE                                                          50
DOI: 01.IJIT.02.01.532
ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012


                          REFERENCES                                        Dr. Talla managed several projects involving data communications,
                                                                           computer networks, and business performance excellence. Dr. Talla
[1] Jacobson, I., Christerson, M., Jonsson, P. & Overgaard, G.,            is a member of Canadian Operations Research Society (CORS),
(1993). Object-oriented Software Engineering: A Use Case Driven            Professional Engineers of Ontario (PEO), Institute of Electrical
Approach, Addison-Wesley, Wokingham, England                               and Electronics Engineers (IEEE), Project Management Institute
 [2] Satzinger, J.W., Jackson R.B., and Burd S.D., (2002). Systems         (PMI), The Association for Operations Management (APICS), and
Analysis ad Design in a Changing World, Course Technology, Bos-            The Institute for Internal Controls (THEIIC). His teaching and
ton, Mass                                                                  research interests are mainly in Operations Management,
[3] Alice H. Muntz, and Christian T. Ramiller (1994). “A                   Management Information Systems, Systems Re-engineering,
Requirement-Based Approach to Data modeling and Reengineering”,            Business Intelligence, Data Communications and Computer
Proc. of the 20th VLDB Conf. Santiago, Chile, 1994. pp. 643-646.           Network, Software Engineering and Evolution, Software
[4] Whitten, J. L., Bentley D. L. and Dittman K.V. (2000). Systems         Architecture, Design, and Development. Dr. Talla is a registered
Analysis and Design Methods, McGraw-Hill, New York.                        professional engineer in Canada.
[5] Subramanian Muthu, Larry Whitman, et al. (1999). “Business
Process Reengineering: A Consolidated Methodology”, Proc. of               Raul Valverde is working as a Professor in the department of
The 4th Annual International Conference on Industrial Engineering          Decision Sciences & MIS at John Molson School of Business
Theory, Applications, and Practice, Nov 1999.                              (JMSB), Concordia University in Montreal. He holds a Bachelor
[6] Victor Raj (2008). “Process to Product Orientation – A Re-             of Science degree in Mathematics and Management from Excelsior
engineering Experience from a Developing Country”, Proceedings             College (US), a M. Eng. degree in Electrical & Computer Engineering
of The 2008 IAJC-IJME International Conference, ISBN 978-1-                from Concordia University, and a Ph.D. degree in Information
60643-379-9.                                                               Systems from University of Southern Queensland, Australia. He
                                                                           has more than 17 years of professional experience in IT/IS,
Malleswara Talla is a Professor (sessional) in the department of           mathematical modeling, and financial analysis. Dr. Valverde is a
Decision Sciences & MIS at John Molson School of Business                  member of the Society of Management Accountants, Canadian
(JMSB), Concordia University, Montreal. He received B.Tech.                Operational Research Society, Institute of Internal Controls,
degree from J.T.U. College of Engineering, Kakinada, India in 1979,        Forensic CPA society, Professional Engineers of Ontario and the
a M.Tech. degree in 1981 from I.I.T., Kharagpur, India, and a Ph.D.        Association for Operations Management. His main research
degree from Concordia University, Montreal, in 1995 specializing           interests include Supply Chain Systems, Risk Management, E-
in Computer Communications and Networks. He worked for Tata                business, Information Security and Auditing, Accounting and
Consultancy Service (TCS), Bombay, and Societe Internationale de           Financial Information Systems, Fraud Detection and Reengineering.
Telecommunications Aeronautique (S.I.T.A), Montreal for several            Dr. Valverde is a registered professional engineer and accountant in
years.                                                                     Canada.




© 2012 ACEEE                                                          51
DOI: 01.IJIT.02.01. 532

Weitere ähnliche Inhalte

Was ist angesagt?

IOUG93 - Technical Architecture for the Data Warehouse - Paper
IOUG93 - Technical Architecture for the Data Warehouse - PaperIOUG93 - Technical Architecture for the Data Warehouse - Paper
IOUG93 - Technical Architecture for the Data Warehouse - Paper
David Walker
 
Elements of systems design
Elements of systems designElements of systems design
Elements of systems design
Chandan Arora
 

Was ist angesagt? (20)

Fulltext01
Fulltext01Fulltext01
Fulltext01
 
Database and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health InformaticsDatabase and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health Informatics
 
Re-Engineering Databases using Meta-Programming Technology
Re-Engineering Databases using Meta-Programming TechnologyRe-Engineering Databases using Meta-Programming Technology
Re-Engineering Databases using Meta-Programming Technology
 
Modern database management jeffrey a. hoffer, mary b. prescott,
Modern database management   jeffrey a. hoffer, mary b. prescott,  Modern database management   jeffrey a. hoffer, mary b. prescott,
Modern database management jeffrey a. hoffer, mary b. prescott,
 
Database overview
Database overviewDatabase overview
Database overview
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
Data flow diagram part7
Data flow diagram part7Data flow diagram part7
Data flow diagram part7
 
Data models
Data modelsData models
Data models
 
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
 
IOUG93 - Technical Architecture for the Data Warehouse - Paper
IOUG93 - Technical Architecture for the Data Warehouse - PaperIOUG93 - Technical Architecture for the Data Warehouse - Paper
IOUG93 - Technical Architecture for the Data Warehouse - Paper
 
IT class IV - ICAB PS-KL
IT class IV - ICAB PS-KLIT class IV - ICAB PS-KL
IT class IV - ICAB PS-KL
 
Data models
Data modelsData models
Data models
 
Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02
 
Elements of systems design
Elements of systems designElements of systems design
Elements of systems design
 
SA Chapter 2
SA Chapter 2SA Chapter 2
SA Chapter 2
 
Unit iii dbms
Unit iii dbmsUnit iii dbms
Unit iii dbms
 
System requirements analysis
System requirements analysisSystem requirements analysis
System requirements analysis
 
SAD Chapter1
SAD  Chapter1SAD  Chapter1
SAD Chapter1
 
Sad chapter-1
Sad chapter-1Sad chapter-1
Sad chapter-1
 

Andere mochten auch

High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
IDES Editor
 

Andere mochten auch (8)

High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
High Capacity Robust Medical Image Data Hiding using CDCS with Integrity Chec...
 
Extending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent MobilityExtending UML State Diagrams to Model Agent Mobility
Extending UML State Diagrams to Model Agent Mobility
 
On-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksOn-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected Networks
 
The Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC ConverterThe Study of MOSFET Parallelism in High Frequency DC/DC Converter
The Study of MOSFET Parallelism in High Frequency DC/DC Converter
 
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
A Framework and Methods for Dynamic Scheduling of a Directed Acyclic Graph on...
 
Customized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration ProtocolCustomized Dynamic Host Configuration Protocol
Customized Dynamic Host Configuration Protocol
 
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
An Area Efficient, High Performance, Low Dead Zone, Phase Frequency Detector ...
 
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety ApplicationPrototyping a Wireless Sensor Node using FPGA for Mines Safety Application
Prototyping a Wireless Sensor Node using FPGA for Mines Safety Application
 

Ähnlich wie Data oriented and Process oriented Strategies for Legacy Information Systems Reengineering

Analyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow DiagramsAnalyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow Diagrams
Christina Valadez
 
Data architecture in enterprise architecture is the design of data for use in...
Data architecture in enterprise architecture is the design of data for use in...Data architecture in enterprise architecture is the design of data for use in...
Data architecture in enterprise architecture is the design of data for use in...
Rasmita Panda
 
Software engg. pressman_ch-10
Software engg. pressman_ch-10Software engg. pressman_ch-10
Software engg. pressman_ch-10
Dhairya Joshi
 

Ähnlich wie Data oriented and Process oriented Strategies for Legacy Information Systems Reengineering (20)

Analyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow DiagramsAnalyzing Systems Using Data Flow Diagrams
Analyzing Systems Using Data Flow Diagrams
 
RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.
 
Query Evaluation Techniques for Large Databases.pdf
Query Evaluation Techniques for Large Databases.pdfQuery Evaluation Techniques for Large Databases.pdf
Query Evaluation Techniques for Large Databases.pdf
 
MC0088 Internal Assignment (SMU)
MC0088 Internal Assignment (SMU)MC0088 Internal Assignment (SMU)
MC0088 Internal Assignment (SMU)
 
System Analysis and design Class 1
System Analysis and design Class 1System Analysis and design Class 1
System Analysis and design Class 1
 
CHAPTER FOUR buugii 2023.docx
CHAPTER FOUR buugii 2023.docxCHAPTER FOUR buugii 2023.docx
CHAPTER FOUR buugii 2023.docx
 
A relational model of data for large shared data banks
A relational model of data for large shared data banksA relational model of data for large shared data banks
A relational model of data for large shared data banks
 
data design and component design.pptx
data design and component design.pptxdata design and component design.pptx
data design and component design.pptx
 
Using Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems DevelopmentUsing Computer-Aided Tools in Information Systems Development
Using Computer-Aided Tools in Information Systems Development
 
Information Technology for Managers Module 3 PPT.pdf
Information Technology for Managers  Module 3 PPT.pdfInformation Technology for Managers  Module 3 PPT.pdf
Information Technology for Managers Module 3 PPT.pdf
 
Data architecture in enterprise architecture is the design of data for use in...
Data architecture in enterprise architecture is the design of data for use in...Data architecture in enterprise architecture is the design of data for use in...
Data architecture in enterprise architecture is the design of data for use in...
 
AtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White PapaerAtomicDBCoreTech_White Papaer
AtomicDBCoreTech_White Papaer
 
Managing Data Strategically
Managing Data StrategicallyManaging Data Strategically
Managing Data Strategically
 
Software engg. pressman_ch-10
Software engg. pressman_ch-10Software engg. pressman_ch-10
Software engg. pressman_ch-10
 
Ems
EmsEms
Ems
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage System
 
A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...
A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...
A Software Infrastructure for Multidimensional Data Analysis: A Data Modellin...
 
Database Systems.ppt
Database Systems.pptDatabase Systems.ppt
Database Systems.ppt
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Asif nosql
Asif nosqlAsif nosql
Asif nosql
 

Mehr von IDES Editor

Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Data oriented and Process oriented Strategies for Legacy Information Systems Reengineering

  • 1. ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012 Data oriented and Process oriented Strategies for Legacy Information Systems Reengineering Malleswara Talla, and Raul Valverde John Molson School of Business, Concordia University, Montreal, Canada. mrtalla@jmsb.concordia.ca, rvalverde@jmsb.concordia.ca Abstract–The legacy information systems often implement are often remodelled during system architecture phase based manual data updates for information obtained from external on the software development methodology chosen. This systems. The manual updates are cumbersome, error prone, paper focuses on traditional data and process models and and expensive. The legacy systems miss interfaces to external attempts to propose few reengineering strategies. systems that could be used for automatic updates of system data. Moreover, the legacy systems also lack extensions to The traditional data oriented reengineering focuses on supplier or customer systems that are essential for creating migrating databases of legacy systems to current relational supply chain relationships. This paper explores the data databases, enterprise data standardization, integration of oriented and process oriented models of legacy systems, and disparate information systems, etc. [3]. The data oriented discusses the details of systems development and evolution reengineering can also be conducted by focusing on models mainly aiming at an ongoing reengineering of legacy improving data objects one by one in a pragmatic manner as systems. This paper proposes simple strategies for creating presented in this paper. This approach eliminates the interfaces to external systems for automatic updates of data, possibility of system failures, and minimizes the impact on and for adapting to the process evolution that requires a legacy overall system while reengineering the system. The process information system to extend its communications with oriented reengineering considers each work activity and external systems that could help in creating successful supply chain relationships. These strategies can reshape a legacy remodels a relevant part of the legacy system. The effort system to be reengineered into a new enterprise information could be as simple as extending the legacy information system system whether the legacy system is of a data oriented model, to an external process. or of a process oriented model. II. TRADITIONAL DATA MODEL REENGINEERING Key words–Legacy system, Data oriented model, Process oriented model, System reengineering, Data structure. The traditional software development methodologies include data models for organizing data and its documentation I. INTRODUCTION [4]. Data modeling is also called as database modeling because a data model is often implemented as a database [2], A legacy system is an application that uses an obsolete as depicted in Entity Relationship Diagram (ERD) that hardware platform or software which is hard and expensive presents the data in terms of the entities and their to maintain. Due to the fact that a legacy system is old, it is relationships. An entity is an instance of a class of persons, hard to find the skill set for maintaining the software or places, events, objects, or concepts about which data is replacing hardware parts if a hardware failure occurs. Recent captured and stored. An entity is a single occurrence. An trend is the shortening life period of software systems and to attribute is a descriptive characteristic of an entity. A quickly adapt to the new developments in software compound attribute could include multiple attributes, in other engineering; otherwise the systems become outdated very words, a group of attributes or a data structure. A relationship soon and become legacy systems. The huge investment in a is a natural association that exists between two or more legacy systems often compel reengineering and reuse of entities. The relationship may represent an event for linking system components for evolution, maintenance and newer the entities. Cardinality defines a minimum and a maximum hardware platforms. Therefore, legacy systems range from number of occurrences of an entity that may be related to a traditional software systems to recent component-based single occurrence of the other entity. Since all relationships systems. The modeling techniques that were used during among entities are bi-directional, cardinality must be defined legacy systems development also serve as building blocks in both directions for a relationship. Every entity must have during reengineering phase. This paper presents both a key which is an attribute, or a group of attributes, which traditional data and process oriented modeling techniques assumes a unique value for each entity instance. It is and proposes reengineering approaches that would prolong sometimes called an identifier. A primary key is the candidate the life span of a legacy system. key that uniquely identifies an entity instance. A foreign The systems documentation often includes models that key is the primary key of another entity that is duplicated in describe the requirements collected during initial system the entity for the purpose of identifying the relationship. analysis phase of software development process [1]. These requirements models simplify the system complexity and help software maintenance process [2]. The requirement models © 2012 ACEEE 47 DOI: 01.IJIT.02.01. 532
  • 2. ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012 Figure 2. Legacy systems reengineering to use external data sources In figure 2, two interfaces to different systems are proposed: (a) a customer interface that enables a customer to update an order processing part of a legacy system; (b) an external system interface where the currency rate fluctuations are automatically incorporated into the legacy system for Figure 1. Sample ERD of an ordering system eliminating manual data entry of currency exchange rates. Similarly, system improvements can be carried out one by Reengineering techniques for Data models one till the entire legacy system is reengineered. The business logic and data are interwoven that makes reengineering harder to accomplish. It is important to focus III. TRADITIONAL PROCESS MODEL REENGINEERING on the importance of data in the context of application as follows: The traditional approach for information system  Volume of data: number of entity instances, requirements is to describe the business activities as  Security: business critical data, processes carried out within and across organizations.  Mining: data for searching using a keyword, Typically, a business process represents a set of workflows  Complexity: interwoven data that makes it harder to in a department of an organization, and a software application isolate, is designed to reflect upon the workflows as a set of  Availability: of data within local database, interactions among entities and data stores, to eventually  Redundancy: duplicate data for simplifying systems deliver a service. The data flows through the processes development, or data which is also available on a different reflecting upon the procedures, policies and logic for system. implementing the software, as modeled in data flow diagrams  Heterogeneity: different in nature of data, etc. (DFD) that serve as tools. In a process, work is performed in We may like to conduct the reengineering of entire response to requests or data flows or conditions [4]. Unlike application at once, but it is cumbersome and it may fail, traditional data models, the process models depict given the huge task of system reengineering. Conversely, if concurrency of interacting processes as a set of data flows the reengineering is carried out in a pragmatic manner among entities and data-stores. The figure 3 reflects upon an focussing one feature of the system at a time, reengineering order processing process that interacts with entities such as will be successful. Here, we propose an approach for customers, warehouse, shipping, billing, etc. The repository reengineering that focuses on reducing data duplication or of data are presented in figure 3, as data stores such as redundancy of data. Traditional legacy systems focus on customers, inventory, and sales orders each of which centralized data processing whereas the contemporary maintains the necessary information. systems use distributed data processing architectures for parallel, specialized, and secure processing that increases the speed of response time. Traditional legacy information systems duplicate a lot of data into its local data base; such data requires periodic updates that introduce a margin of error as the data does not reflect upon real time data. The source of such data into the database may be often in the form of spread sheets or flat files. The legacy information system can be reengineered by changing the sourcing of such data to use the original data source over the network, instead of a lengthy spread sheets or data entry. The proposed reengineering technique in figure 2 uses the existing network applications that provide data in real time. This approach Figure 3. Sample Data Flow Diagram improves system performance and reduces the quantization The system exchanges data as inputs and outputs within its error, introduced due to periodic manual updates of data. process environment. An external agent or an external entity © 2012 ACEEE 48 DOI: 01.IJIT.02.01. 532
  • 3. ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012 defines a person, an organization unit, or a system internal or the same legacy software systems are in-use although an external to organization that lies outside the software system organization radically changed or reorganized its processes. scope, but interacts with the system being studied [4]. An organization employs different ways of adapting to External agents provide inputs into the system, and receive process changes, often conducting appropriate data entry outputs from the system [2]. A data store is an inventory of in to and out of a legacy system to continue using it. This data which is frequently implemented as a file or database additional data entry is cumbersome and expensive; instead, [4]. It is data at rest compared to a data flow which is data in it is profitable to gradually reengineer the legacy system. motion. Data stores depicted on a DFD store all instances of A methodology for reengineering is presented in [5] data entities depicted on an ERD. A data flow represents an focusing on business process, as follows: input of data to a process, or the output of data from a process.  Prepare for reengineering, It may also be used to represent the creation, reading, deletion,  Map and analyze As-Is process, or updating of data in a file or database. A control flow  Design To-Be process represents a condition or non-data event that triggers a  Implement reengineered process, and process. The following strategy for process modeling is  Improve continuously. proposed in [4]: While planning a legacy system reengineering, one should 1. Draw a context DFD to establish initial system scope. target process improvements such as (a) work balancing, (b) A context diagram defines the scope and boundary for the work-flow redesign, (c) eliminating non-value-added system. Because the scope of a software system frequently activities, and (d) revising administrative controls [6]. A changes during the requirements and design phases of process can be viewed as a set of sub-processes with software development, the context diagram may also change performance criteria as follows: to reflect upon the same.  Distributed processing for faster response, 2. Draw a functional decomposition diagram to partition the  Data redundancy across processes, system into subsystems. A decomposition diagram shows  Increased automation to integrate and minimize manual the top-down functional decomposition or structure of a processes, system. It provides an outline for arriving at data flow  Simplifying cross functional processes, diagrams.  Eliminating redundant sub-processes, 3. Create an event-response or use-case list for the system in  New process creation and integration, order to determine what business events the system must  Integrating current enterprise applications, e.g. Supply respond to, and what responses are appropriate. Some of the Chain Management (SCM), Customer Relationship inputs on the context diagram are associated with events. Management (CRM), Enterprise Resources Planning (ERP), 4. Draw an event DFD or event handler for each event. For etc. each event, illustrate any data stores from which records As discussed earlier, if the reengineering is carried out in must be ‘read’ should be added to the event diagram. Data a pragmatic manner focussing one feature at a time, flows should be added to reflect upon the data read. Any reengineering will be successful. Here, we propose an data stores in which records must be created, deleted, or approach for reengineering that focuses on integrating a new updated should be included in the event diagram. Data flows process, e.g. supplier process via web interface as presented to the data stores should be named to reflect upon the nature in figure 4. It is possible to reengineer few parts of a legacy of the update. system by providing user interfaces to integrate new 6.Merge event DFDs into a system diagram. The system processes; for example, automatic inventory replenishment diagram is said to be exploded from the single process on can be achieved by extending the system to integrate a context diagram. The system diagram shows either: all of the supplier process as follows in Figure 4. events for the system on a single diagram, or all of the events This approach in figure 4 integrates the external supplier for a single subsystem on a single diagram. processes and eliminates the order transaction processing 7. Draw detailed and primitive DFDs for the more complex delays. The legacy system can use the current business rule event handlers. Each event process on the system diagram(s) set and automatically generate new orders while respecting must be exploded into either a procedural description or a the lead time to suppliers. primitive data flow diagram. For event processes that are not very complex – in other words, they are both an event and an elementary process, they should be described. The data flow diagrams show all the elementary process, data stores and data flows for single events 8. Document the logic of each elementary process using structured English. 9. Document data flows and processes in the data dictionary. Reengineering techniques for Process models Usually systems are not reengineered often, as a result, Figure 4. Legacy systems reengineering to integrate external supplier process © 2012 ACEEE 49 DOI: 01.IJIT.02.01.532
  • 4. ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012 It also eliminates or simplifies the purchasing process. #ifdef ORIGINAL_DATA Although legacy systems use older software development ….. Software with original data ……. methodologies and older hardware platforms, they still #endif employ modular design, and it is possible to reengineer a business process, part by part, selectively. #ifndef ORIGINAL_DATA ….. Software with reengineered data ……. IV. TRADITIONAL DATA MODELS AND PROCESS MODELS #endif Both data models and process models are in fact The process reengineering improves the system to match interwoven sine every process has a set of data inputs and the latest ways of working. The business rules and external outputs following a set of actions. The process reengineering processes often change and system needs to adapt to such involves changing the business rules whereas data changes quickly, in order to avoid manual update processes reengineering involves organizing, controlling and managing and related overhead. The data model reengineering focuses data. The legacy systems often interface external systems on improving the data structures and the associated imple- using manual processes, whereas contemporary systems use mentation. Both data and process models adapting the busi- Intranets/Extranets. The data model is often described using ness model to the most recent requirements effectively. Once ERD while the process model is described using DFD. The the systems reengineering is completed, the systems staff process model reengineering sometimes may require different needs to be trained so that they understand the features and inputs and may produce different outputs focusing mainly the impact on business process. The data model reengineering new business rules. The figure 5 presents the process and is relatively easier to accomplish compared to process data models distinctly, identifying the internal and external reengineering. However, well planned reengineering is often processes and entities as well. While developing data- cost effective than developing new products that accom- oriented reengineered model, both original and reengineered plish the same goals. It is also possible to model a system versions of data are kept and used interchangeably for such that some parts of the system can be data oriented smoother and gradual reengineering. It is sometimes required whereas the other parts can be of process model, which means to switch from reengineered data to original data models the reengineering can be of both data and process models. during reengineered system development. Moreover, the system reengineering can be a gradual and an ongoing activity that keeps the systems maintenance staff well involved that proves the systems investment worth- while. CONCLUSIONS In this paper, the traditional data and process modelling of legacy information systems and reengineering approaches were presented. The reengineering approach focused on systems evolution to benefit from in-house experience of systems team, able to maintain and evolve the software system. A fully reengineered system reflects upon the current Figure 5. Data oriented vision versus Process oriented vision of a business model and the feature set required sustaining the Legacy system business in a medium term. It is argued that the traditional methodologies are not comprehensive enough to accurately model systems, then the only way to meet business requirements in an enterprise setting is to create several models in detail across the width and depth of the business. The paper recommends a gradual reengineering of system rather than a radical one shot, big budget, and expensive reengineering that can fail. The paper recommends a reengineering of both data model and process model in order to reorganizing the data and process models in a pragmatic way. The paper presented the approaches for reengineering with examples. The reengineering approaches proposed in Figure 6. Co-existing original and reengineered data models of a this paper prolong the legacy information system lifespan in Legacy system a cost effective manner. Both original data model and reengineered data model to coexist, the “ifdef … endif, and ifndef ….. endif” pre-processor statements can be used during reengineered software development stage. © 2012 ACEEE 50 DOI: 01.IJIT.02.01.532
  • 5. ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012 REFERENCES Dr. Talla managed several projects involving data communications, computer networks, and business performance excellence. Dr. Talla [1] Jacobson, I., Christerson, M., Jonsson, P. & Overgaard, G., is a member of Canadian Operations Research Society (CORS), (1993). Object-oriented Software Engineering: A Use Case Driven Professional Engineers of Ontario (PEO), Institute of Electrical Approach, Addison-Wesley, Wokingham, England and Electronics Engineers (IEEE), Project Management Institute [2] Satzinger, J.W., Jackson R.B., and Burd S.D., (2002). Systems (PMI), The Association for Operations Management (APICS), and Analysis ad Design in a Changing World, Course Technology, Bos- The Institute for Internal Controls (THEIIC). His teaching and ton, Mass research interests are mainly in Operations Management, [3] Alice H. Muntz, and Christian T. Ramiller (1994). “A Management Information Systems, Systems Re-engineering, Requirement-Based Approach to Data modeling and Reengineering”, Business Intelligence, Data Communications and Computer Proc. of the 20th VLDB Conf. Santiago, Chile, 1994. pp. 643-646. Network, Software Engineering and Evolution, Software [4] Whitten, J. L., Bentley D. L. and Dittman K.V. (2000). Systems Architecture, Design, and Development. Dr. Talla is a registered Analysis and Design Methods, McGraw-Hill, New York. professional engineer in Canada. [5] Subramanian Muthu, Larry Whitman, et al. (1999). “Business Process Reengineering: A Consolidated Methodology”, Proc. of Raul Valverde is working as a Professor in the department of The 4th Annual International Conference on Industrial Engineering Decision Sciences & MIS at John Molson School of Business Theory, Applications, and Practice, Nov 1999. (JMSB), Concordia University in Montreal. He holds a Bachelor [6] Victor Raj (2008). “Process to Product Orientation – A Re- of Science degree in Mathematics and Management from Excelsior engineering Experience from a Developing Country”, Proceedings College (US), a M. Eng. degree in Electrical & Computer Engineering of The 2008 IAJC-IJME International Conference, ISBN 978-1- from Concordia University, and a Ph.D. degree in Information 60643-379-9. Systems from University of Southern Queensland, Australia. He has more than 17 years of professional experience in IT/IS, Malleswara Talla is a Professor (sessional) in the department of mathematical modeling, and financial analysis. Dr. Valverde is a Decision Sciences & MIS at John Molson School of Business member of the Society of Management Accountants, Canadian (JMSB), Concordia University, Montreal. He received B.Tech. Operational Research Society, Institute of Internal Controls, degree from J.T.U. College of Engineering, Kakinada, India in 1979, Forensic CPA society, Professional Engineers of Ontario and the a M.Tech. degree in 1981 from I.I.T., Kharagpur, India, and a Ph.D. Association for Operations Management. His main research degree from Concordia University, Montreal, in 1995 specializing interests include Supply Chain Systems, Risk Management, E- in Computer Communications and Networks. He worked for Tata business, Information Security and Auditing, Accounting and Consultancy Service (TCS), Bombay, and Societe Internationale de Financial Information Systems, Fraud Detection and Reengineering. Telecommunications Aeronautique (S.I.T.A), Montreal for several Dr. Valverde is a registered professional engineer and accountant in years. Canada. © 2012 ACEEE 51 DOI: 01.IJIT.02.01. 532