ICT705 - E-Government System: Data and System Integration Analysis
VerifiedAdded on 2023/04/20
|16
|3840
|451
Report
AI Summary
This report presents a preliminary discussion for the Australian Federal Government, highlighting the benefits of information-centric design and the Enterprise Information Architecture Reference Architecture (EIA RA) for developing a national E-Government system. It explores the concept of information-centric networking (ICN), emphasizing Named Data Objects (NDOs) and their advantages, such as cost-efficient content distribution, unique naming, enhanced security, mobility, and tolerance to disruption. The report also discusses evolving from historical reporting to predictive analytics, focusing on fraud detection and marketing campaign optimization. Furthermore, it details the EIA RA approach, its characteristics, and benefits, emphasizing transparency, enterprise business requirements, consistency, service level agreements, and decision-making. The report concludes by underscoring the importance of these architectures in creating a resilient and efficient E-Government system.

Running head: DATA AND SYSTEM INTEGRATION
DATA AND SYSTEM INTEGRATION
Name of student
Name of university
Author’s note:
DATA AND SYSTEM INTEGRATION
Name of student
Name of university
Author’s note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
DATA AND SYSTEM INTEGRATION
Executive summary
The aim of the report provides the discussion for the developing the E-Government system
for Australia government. The concept of information centric design is the significant similar
approach of various future research activities on internet. This approach leverages the
caching done in the in-network, the communication among the multi-party via replication and
the models of interaction that are decoupling the receivers and senders. The main intention is
to offer the infrastructure service of the network that could be most appropriate for the use in
the E-Government system and increasingly resilient to the failures and disruptions. This ICN
approach is presently being explored by several research projects.
DATA AND SYSTEM INTEGRATION
Executive summary
The aim of the report provides the discussion for the developing the E-Government system
for Australia government. The concept of information centric design is the significant similar
approach of various future research activities on internet. This approach leverages the
caching done in the in-network, the communication among the multi-party via replication and
the models of interaction that are decoupling the receivers and senders. The main intention is
to offer the infrastructure service of the network that could be most appropriate for the use in
the E-Government system and increasingly resilient to the failures and disruptions. This ICN
approach is presently being explored by several research projects.

2
DATA AND SYSTEM INTEGRATION
Table of Contents
Introduction....................................................................................................................3
Discussion......................................................................................................................3
Information centric network design...........................................................................3
Advantages of information centric design.................................................................3
Benefits of evolving from historical reporting to anticipate and shape.....................6
EIA RA approach.......................................................................................................6
Characteristics of the EIA RA approach....................................................................8
Benefits of an EIA RA approach...............................................................................9
Diagram of the proposed systems............................................................................11
Conclusion....................................................................................................................11
References....................................................................................................................13
DATA AND SYSTEM INTEGRATION
Table of Contents
Introduction....................................................................................................................3
Discussion......................................................................................................................3
Information centric network design...........................................................................3
Advantages of information centric design.................................................................3
Benefits of evolving from historical reporting to anticipate and shape.....................6
EIA RA approach.......................................................................................................6
Characteristics of the EIA RA approach....................................................................8
Benefits of an EIA RA approach...............................................................................9
Diagram of the proposed systems............................................................................11
Conclusion....................................................................................................................11
References....................................................................................................................13
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
DATA AND SYSTEM INTEGRATION
Introduction
This report aims to provide a preliminary discussion for the Australian Federal
Government that describes the benefits of the information centric design and the Enterprise
Information Architecture Reference Architecture for the development of the national E-
Government system. Lastly, this report concludes with an appropriate conclusion for the
report.
The choices of design is compared and discussed and the features of the proposed
architectures of ICN that focusses on the following major components like the data objects,
API, transport and routing, security and naming, and finally caching along with transport.
Discussion
Information centric network design
The major abstraction of the ICN is NDO or Named Data Objects. Some of the
examples are the web pages, movies, documents, songs, photos and interactive media and in
all other words the kinds of objects that is stored and accessed using the computers
(Carofiglio, Gallo and Muscariello 2016). NDO is considered to be independent of the
location, method of storage, transportation method and the application program. It denotes
that the NDO maintains the name and therefore identify irrespective of the location and
irrespective of the methods by which it is copied, communicated and stored. This also
denotes that any of the two copies of any NDO is equivalent for all purposes.
Advantages of information centric design
The distribution of the content that is efficient is one of the major advantage of ICN
approach but in the recent times, it has been observed that it is not sufficient for motivating
DATA AND SYSTEM INTEGRATION
Introduction
This report aims to provide a preliminary discussion for the Australian Federal
Government that describes the benefits of the information centric design and the Enterprise
Information Architecture Reference Architecture for the development of the national E-
Government system. Lastly, this report concludes with an appropriate conclusion for the
report.
The choices of design is compared and discussed and the features of the proposed
architectures of ICN that focusses on the following major components like the data objects,
API, transport and routing, security and naming, and finally caching along with transport.
Discussion
Information centric network design
The major abstraction of the ICN is NDO or Named Data Objects. Some of the
examples are the web pages, movies, documents, songs, photos and interactive media and in
all other words the kinds of objects that is stored and accessed using the computers
(Carofiglio, Gallo and Muscariello 2016). NDO is considered to be independent of the
location, method of storage, transportation method and the application program. It denotes
that the NDO maintains the name and therefore identify irrespective of the location and
irrespective of the methods by which it is copied, communicated and stored. This also
denotes that any of the two copies of any NDO is equivalent for all purposes.
Advantages of information centric design
The distribution of the content that is efficient is one of the major advantage of ICN
approach but in the recent times, it has been observed that it is not sufficient for motivating
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
DATA AND SYSTEM INTEGRATION
the migration from any old infrastructure to a new one (Pang et al. 2015). Some of the
benefits of having ICN design approach are:
Cost-efficient and scalable content distribution: As per the recent predictions, the
worldwide IP traffic would increase by the factor of almost four in the coming years.
Particularly, the global traffic of the mobile data is considered to increase by almost 26 times
in the present times (Vasilakos et al. 2015). This is majorly associated to several forms of
video that would continue to increase and consume significant traffic in present times. The
increase in the demand for the mass replication and distribution of the large amounts of
resources has led to the major developments that are the content distribution networks and the
P2P networks. Both of these approaches presents the move towards the increased content
based model of communication that are the Uniform Resource Identifiers and the DNS names
are interpreted in the way that permits the accessing of the cached copies of the content in
network (Xylomenos et al. 2014). Moreover, some of the issues still prevails that results to
the expensive inter-provider traffic and inability of effectively leveraging the in-network
storage for reducing the overhead for both of the P2P and the CDN scenarios.
Unique naming and persistency: The most of content URIs in present network are
actually the objects locators that afterwards the resolution of the DNS exhibits the IP address
of the web server, which is serving the requests by the resolving of the local part of the URI.
This leads to the easy breaking of the binding among the name-object as when any object is
being moved, the site changes its domain or that site for any of the reason is presently
unreachable (Amadeo et al. 2016). However, if the replicas of the similar objects are
positioned at various web servers, they would be accessible using the various URIs and they
would essentially appear as the distinct objects to that system. The approach of ICN
overcomes this particular problem with the persistent and the distinct naming of the NDOs
and with the service model that performs the decoupling of the producers from the customers.
DATA AND SYSTEM INTEGRATION
the migration from any old infrastructure to a new one (Pang et al. 2015). Some of the
benefits of having ICN design approach are:
Cost-efficient and scalable content distribution: As per the recent predictions, the
worldwide IP traffic would increase by the factor of almost four in the coming years.
Particularly, the global traffic of the mobile data is considered to increase by almost 26 times
in the present times (Vasilakos et al. 2015). This is majorly associated to several forms of
video that would continue to increase and consume significant traffic in present times. The
increase in the demand for the mass replication and distribution of the large amounts of
resources has led to the major developments that are the content distribution networks and the
P2P networks. Both of these approaches presents the move towards the increased content
based model of communication that are the Uniform Resource Identifiers and the DNS names
are interpreted in the way that permits the accessing of the cached copies of the content in
network (Xylomenos et al. 2014). Moreover, some of the issues still prevails that results to
the expensive inter-provider traffic and inability of effectively leveraging the in-network
storage for reducing the overhead for both of the P2P and the CDN scenarios.
Unique naming and persistency: The most of content URIs in present network are
actually the objects locators that afterwards the resolution of the DNS exhibits the IP address
of the web server, which is serving the requests by the resolving of the local part of the URI.
This leads to the easy breaking of the binding among the name-object as when any object is
being moved, the site changes its domain or that site for any of the reason is presently
unreachable (Amadeo et al. 2016). However, if the replicas of the similar objects are
positioned at various web servers, they would be accessible using the various URIs and they
would essentially appear as the distinct objects to that system. The approach of ICN
overcomes this particular problem with the persistent and the distinct naming of the NDOs
and with the service model that performs the decoupling of the producers from the customers.

5
DATA AND SYSTEM INTEGRATION
Security model: Present network security provides the required protection to the
communication to the channel among the server and the client that uses the Transport Layer
Security or any similar technique. The security model needs the trust of the clients to the
server for delivering the correct information over any channel (Lee et al. 2014). ICN security
model offers the integrity among the name-data and the verification of the origin of the
NDOs, independent of immediate source. The model provides the ubiquitous caching with
the retained authenticity and the name-data integrity, an aspect that the present model could
not offer.
Multihoming and mobility: The nature of host based of the present networks denotes
that the multihoming and mobility of the networks and nodes could evolve as the problem of
managing the connections among the end-to-end points and selecting the appropriate path or
the interface for using the connections (Baccelli et al. 2014). The approach of ICN does not
include the end-to-end connections that needs to type of the connection management. This
problem therefore evolves as being increasingly simpler. Any moving client just prevails to
issue the requests for the NDOs on any new access. The requests on new access are
commonly served form any distinct source rather than the requirement of maintaining any
connection to previous source. Any multihomed client could similarly select the things that is
required to be sent on any request on any one, many or all the accesses (Grieco et al. 2014).
Tolerance and disruption: The end-to-end communication with the sessions of
transport to the origin servers is frequently difficult for achieving the challenged works with
the sparse connectivity, disruptions and the high-speed mobility (Wu et al. 2014). When any
of the application protocol sessions are bound to the transport sessions, they would fail when
there is a failure of the transport session. Several applications does not require the seamless
communication with the end-to-end paths (Saino, Psaras and Pavlou 2014). If any of the
primary objective is the access to the data objects, the ICN with the in-network caching could
DATA AND SYSTEM INTEGRATION
Security model: Present network security provides the required protection to the
communication to the channel among the server and the client that uses the Transport Layer
Security or any similar technique. The security model needs the trust of the clients to the
server for delivering the correct information over any channel (Lee et al. 2014). ICN security
model offers the integrity among the name-data and the verification of the origin of the
NDOs, independent of immediate source. The model provides the ubiquitous caching with
the retained authenticity and the name-data integrity, an aspect that the present model could
not offer.
Multihoming and mobility: The nature of host based of the present networks denotes
that the multihoming and mobility of the networks and nodes could evolve as the problem of
managing the connections among the end-to-end points and selecting the appropriate path or
the interface for using the connections (Baccelli et al. 2014). The approach of ICN does not
include the end-to-end connections that needs to type of the connection management. This
problem therefore evolves as being increasingly simpler. Any moving client just prevails to
issue the requests for the NDOs on any new access. The requests on new access are
commonly served form any distinct source rather than the requirement of maintaining any
connection to previous source. Any multihomed client could similarly select the things that is
required to be sent on any request on any one, many or all the accesses (Grieco et al. 2014).
Tolerance and disruption: The end-to-end communication with the sessions of
transport to the origin servers is frequently difficult for achieving the challenged works with
the sparse connectivity, disruptions and the high-speed mobility (Wu et al. 2014). When any
of the application protocol sessions are bound to the transport sessions, they would fail when
there is a failure of the transport session. Several applications does not require the seamless
communication with the end-to-end paths (Saino, Psaras and Pavlou 2014). If any of the
primary objective is the access to the data objects, the ICN with the in-network caching could
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
DATA AND SYSTEM INTEGRATION
provide the forward after store approaches that is similar to the architecture of the data
transport networking with the concept of the convergence layer for the hop-by-hop transport.
This could provide the increased reliability and the improved performance by leveraging the
optimised transport of hop-by-hop and the in-network caching.
Benefits of evolving from historical reporting to anticipate and shape
The organisations are aiming to evolve from the historical reporting to the anticipation and
shaping for being prepared for the unexpected situations. Some of the benefits of this
technique are:
Detecting any kind of fraud: The combining of the methods of multiple analytics could
improve the detection of the pattern and then prevent any kind of criminal behaviour (Psaras,
Chai and Pavlou 2014). The cybersecurity grows to be the major concern, high performance
behavioural prediction examines all the actions on any network in the real time for spotting
the abnormalities that might indicate any kind of fraud, zero day vulnerabilities and the
advanced persistent threats.
Optimisation of the marketing campaigns: The prediction are utilised in determining the
responses and purchases of the customers and then promote the opportunities of cross sell
(Kurose 2014). The predictive models assist in helping the businesses retain, attract, and then
grow the most profitable customers.
EIA RA approach
EIA has been presently considered as the component of the any enterprise architecture.
Enterprise information architecture is aimed to offer the common framework for data sharing
in the cost-effective method all across the various units of the organisation that are taking
extensive care of privacy and security of particular information (Chen et al. 2017). It is
commonly recommended to utilise enterprise information architecture in the situations like
DATA AND SYSTEM INTEGRATION
provide the forward after store approaches that is similar to the architecture of the data
transport networking with the concept of the convergence layer for the hop-by-hop transport.
This could provide the increased reliability and the improved performance by leveraging the
optimised transport of hop-by-hop and the in-network caching.
Benefits of evolving from historical reporting to anticipate and shape
The organisations are aiming to evolve from the historical reporting to the anticipation and
shaping for being prepared for the unexpected situations. Some of the benefits of this
technique are:
Detecting any kind of fraud: The combining of the methods of multiple analytics could
improve the detection of the pattern and then prevent any kind of criminal behaviour (Psaras,
Chai and Pavlou 2014). The cybersecurity grows to be the major concern, high performance
behavioural prediction examines all the actions on any network in the real time for spotting
the abnormalities that might indicate any kind of fraud, zero day vulnerabilities and the
advanced persistent threats.
Optimisation of the marketing campaigns: The prediction are utilised in determining the
responses and purchases of the customers and then promote the opportunities of cross sell
(Kurose 2014). The predictive models assist in helping the businesses retain, attract, and then
grow the most profitable customers.
EIA RA approach
EIA has been presently considered as the component of the any enterprise architecture.
Enterprise information architecture is aimed to offer the common framework for data sharing
in the cost-effective method all across the various units of the organisation that are taking
extensive care of privacy and security of particular information (Chen et al. 2017). It is
commonly recommended to utilise enterprise information architecture in the situations like
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
DATA AND SYSTEM INTEGRATION
the redundancy assessment of the organisation, redundancy assessment of the processes and
for the design along with the development of common language of the business or the
redundancy assessment of the technology. Enterprise information architecture consists of the
three sub-components that are:
Organisation architecture
Business architecture
Technical architecture
The business architecture offers the consolidated view of data from any perspective that is
business oriented (Liu et al. 2014). The technical architecture offers outlook of the current
technical environment and the plan of migration for bringing the required technical
environment. The organisation architecture majorly deals with the increased level of the
organisational structure and the processes that is done by every individual unit in units of the
organisation in that company.
The enterprise information architecture reference architecture is a section of enterprise
architecture process, which describes using the present state, guidance and the future state on
the basis of set of the requirements, models and principles that are required for the flexible
sharing and the exchanging of the information assets for achieving the changes in the
enterprise (Amadeo, Campolo and Molinaro 2016). The connection of the strategic plan of
any enterprise with the data architecture of the enterprise, the application architecture of the
enterprise and the technical architecture of the enterprise leads to the information architecture
of the enterprise. Any well documented architecture is the logical organisation of the
information that is pertaining to following enterprise range, corporate standard elements:
Relationship among the data elements and the applications
Technology infrastructure
DATA AND SYSTEM INTEGRATION
the redundancy assessment of the organisation, redundancy assessment of the processes and
for the design along with the development of common language of the business or the
redundancy assessment of the technology. Enterprise information architecture consists of the
three sub-components that are:
Organisation architecture
Business architecture
Technical architecture
The business architecture offers the consolidated view of data from any perspective that is
business oriented (Liu et al. 2014). The technical architecture offers outlook of the current
technical environment and the plan of migration for bringing the required technical
environment. The organisation architecture majorly deals with the increased level of the
organisational structure and the processes that is done by every individual unit in units of the
organisation in that company.
The enterprise information architecture reference architecture is a section of enterprise
architecture process, which describes using the present state, guidance and the future state on
the basis of set of the requirements, models and principles that are required for the flexible
sharing and the exchanging of the information assets for achieving the changes in the
enterprise (Amadeo, Campolo and Molinaro 2016). The connection of the strategic plan of
any enterprise with the data architecture of the enterprise, the application architecture of the
enterprise and the technical architecture of the enterprise leads to the information architecture
of the enterprise. Any well documented architecture is the logical organisation of the
information that is pertaining to following enterprise range, corporate standard elements:
Relationship among the data elements and the applications
Technology infrastructure

8
DATA AND SYSTEM INTEGRATION
Strategic goals, strategies and the objectives
Requirements of information
Business measures and rules
Application systems
Characteristics of the EIA RA approach
The primary characteristics that could be utilised for distinguishing the well-defined
implementation of the EIA includes the following:
Gaining of transparency: Information prevails independent from the specifications of
the application, implementations of application and the interfaces of the user. It offers the
layer of transparency among the application and information domains (Pentikousis et al.
2015).
Consideration of the requirements of the enterprise business: Architecture considers
the complete requirements of the information of the complete enterprise and the particular
LOBs or the individual organisations.
Avoiding the inconsistencies: It assists in identification of the conflicts,
inconsistencies, aps and the overlaps in the information and the data and it offers the concept,
methods and the framework for resolving this and it could be immensely useful for selecting
the satisfactory solutions (Dabirmoghaddam, Barijough and Garcia-Luna-Aceves 2014).
Managing the Service Level Agreements: this offers the mechanisms for management
and the definition of the information centric SLAs that could be enforced and monitored.
Allowing the decision making: This architecture allows the increasingly consistent
and the efficient decision making of IT that is associated with the business requirements. This
task is executed as it is increasingly extensible and flexible.
DATA AND SYSTEM INTEGRATION
Strategic goals, strategies and the objectives
Requirements of information
Business measures and rules
Application systems
Characteristics of the EIA RA approach
The primary characteristics that could be utilised for distinguishing the well-defined
implementation of the EIA includes the following:
Gaining of transparency: Information prevails independent from the specifications of
the application, implementations of application and the interfaces of the user. It offers the
layer of transparency among the application and information domains (Pentikousis et al.
2015).
Consideration of the requirements of the enterprise business: Architecture considers
the complete requirements of the information of the complete enterprise and the particular
LOBs or the individual organisations.
Avoiding the inconsistencies: It assists in identification of the conflicts,
inconsistencies, aps and the overlaps in the information and the data and it offers the concept,
methods and the framework for resolving this and it could be immensely useful for selecting
the satisfactory solutions (Dabirmoghaddam, Barijough and Garcia-Luna-Aceves 2014).
Managing the Service Level Agreements: this offers the mechanisms for management
and the definition of the information centric SLAs that could be enforced and monitored.
Allowing the decision making: This architecture allows the increasingly consistent
and the efficient decision making of IT that is associated with the business requirements. This
task is executed as it is increasingly extensible and flexible.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
DATA AND SYSTEM INTEGRATION
Addressing the data scope: Information Reference Model utilised by enterprise
provides the description of the scope of used data and the information that is supported by
EIA.
Defining the strategy of technology: This establishes the framework using which the
strategies of the technology has been adopted by enterprise depends (Wang et al 2014.
Additionally, the set of the principles is defined that could guide the manner by which the
information systems and the technology infrastructure of the organisation have been
engineered.
Benefits of an EIA RA approach
There are several benefits that are attached with the enterprise information architecture.
Initially, the enterprise information architecture provides the mutual understanding that is
required between the lines of business with the help of models that are created from the
perspective of the complete organisation (Wang et al .2014). Using corporate data model, it
facilitates evaluation of the prevailing structure of the data and the planning for re-
engineering of the information for maintaining the combined set of the structure. One more
huge benefit that is connected with the enterprise information architecture is easy integration
of the innovative corporate data to the prevailing environment of the system with the data that
is mapped to particular data models of the company instead of the databases. It permits the
validation of the packaged applications required in the company. The quick orientation could
be offered to the new resources as it have the ability of accessing the selected section of the
important models of enterprise information architecture. The enterprise information
architecture establishes the standards, guidelines and the operational services, which defines
the development environment of the enterprise systems (Amadeo et al. 2016). The time when
the architecture of the enterprise has been documented, it could be utilised for accomplishing
the following:
DATA AND SYSTEM INTEGRATION
Addressing the data scope: Information Reference Model utilised by enterprise
provides the description of the scope of used data and the information that is supported by
EIA.
Defining the strategy of technology: This establishes the framework using which the
strategies of the technology has been adopted by enterprise depends (Wang et al 2014.
Additionally, the set of the principles is defined that could guide the manner by which the
information systems and the technology infrastructure of the organisation have been
engineered.
Benefits of an EIA RA approach
There are several benefits that are attached with the enterprise information architecture.
Initially, the enterprise information architecture provides the mutual understanding that is
required between the lines of business with the help of models that are created from the
perspective of the complete organisation (Wang et al .2014). Using corporate data model, it
facilitates evaluation of the prevailing structure of the data and the planning for re-
engineering of the information for maintaining the combined set of the structure. One more
huge benefit that is connected with the enterprise information architecture is easy integration
of the innovative corporate data to the prevailing environment of the system with the data that
is mapped to particular data models of the company instead of the databases. It permits the
validation of the packaged applications required in the company. The quick orientation could
be offered to the new resources as it have the ability of accessing the selected section of the
important models of enterprise information architecture. The enterprise information
architecture establishes the standards, guidelines and the operational services, which defines
the development environment of the enterprise systems (Amadeo et al. 2016). The time when
the architecture of the enterprise has been documented, it could be utilised for accomplishing
the following:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
DATA AND SYSTEM INTEGRATION
Facilitation of the change management by the association of the strategic
requirements to systems who provides the required support and by the linking of
the business model to the designs of the application
Enables the strategic information for being accurately and consistently derived
from the operational data
Promote the effective data sharing and therefore reduce the redundancy of the data
and the reduce the costs of maintenance
Improves the productivity from the development of the component, reuse and the
management.
Simplifies the assessment of the packaged application for accurate within the
organisation by assuming that the development of the function model and the
corporate data model has been done
Simplifies the integration of the acquired data of the companies in the
environment of the system as the mapping of the data in the logical corporate
model of the data instead of the direct placing in the physical tables
Provides the development of any mutual language among the lines of the
businesss as the development of the models is done from the perspective of the
enterprise vast range
Increases the speed of the process of orientation of the new employees as it could
quickly become acquainted with business using the analysis of the chosen sections
of the model
Offers the roadmap using the Corporate Data Model for the assessment of the
prevailing data structures that are into operation and then planning accurately for
the re-engineering within the combined set of the structures
DATA AND SYSTEM INTEGRATION
Facilitation of the change management by the association of the strategic
requirements to systems who provides the required support and by the linking of
the business model to the designs of the application
Enables the strategic information for being accurately and consistently derived
from the operational data
Promote the effective data sharing and therefore reduce the redundancy of the data
and the reduce the costs of maintenance
Improves the productivity from the development of the component, reuse and the
management.
Simplifies the assessment of the packaged application for accurate within the
organisation by assuming that the development of the function model and the
corporate data model has been done
Simplifies the integration of the acquired data of the companies in the
environment of the system as the mapping of the data in the logical corporate
model of the data instead of the direct placing in the physical tables
Provides the development of any mutual language among the lines of the
businesss as the development of the models is done from the perspective of the
enterprise vast range
Increases the speed of the process of orientation of the new employees as it could
quickly become acquainted with business using the analysis of the chosen sections
of the model
Offers the roadmap using the Corporate Data Model for the assessment of the
prevailing data structures that are into operation and then planning accurately for
the re-engineering within the combined set of the structures

11
DATA AND SYSTEM INTEGRATION
Diagram of the proposed systems
Conclusion
Therefore, it could be concluded from the above discussion that the national e-
Government system could be developed for allowing the information flow and the connection
among the various departments. The major abstraction of the ICN is NDO or Named Data
Objects. Some of the examples are the web pages, movies, documents, songs, photos and
interactive media and in all other words the kinds of objects that is stored and accessed using
the computers. NDO is considered to be independent of the location, method of storage,
transportation method and the application program. The distribution of the content that is
efficient is one of the major advantage of ICN approach but in the recent times, it has been
observed that it is not sufficient for motivating the migration from any old infrastructure to a
new one. Some of the benefits of having ICN design are Cost-efficient and scalable content
distribution, Unique naming and persistency, Security model, Multihoming and mobility,
Tolerance and disruption. EIA has been presently considered as the component of the any
DATA AND SYSTEM INTEGRATION
Diagram of the proposed systems
Conclusion
Therefore, it could be concluded from the above discussion that the national e-
Government system could be developed for allowing the information flow and the connection
among the various departments. The major abstraction of the ICN is NDO or Named Data
Objects. Some of the examples are the web pages, movies, documents, songs, photos and
interactive media and in all other words the kinds of objects that is stored and accessed using
the computers. NDO is considered to be independent of the location, method of storage,
transportation method and the application program. The distribution of the content that is
efficient is one of the major advantage of ICN approach but in the recent times, it has been
observed that it is not sufficient for motivating the migration from any old infrastructure to a
new one. Some of the benefits of having ICN design are Cost-efficient and scalable content
distribution, Unique naming and persistency, Security model, Multihoming and mobility,
Tolerance and disruption. EIA has been presently considered as the component of the any
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 16
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.