Preview

Legacy System

Good Essays
Open Document
Open Document
6123 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Legacy System
Annals of Software Engineering 9 (2000) 293–313

293

Encapsulation of legacy software: A technique for reusing legacy software components
Harry M. Sneed
Prellerweg 5, D-82054 Arget, Bavaria, Germany E-mail: Harry.Sneed@T-Online.de

The following paper reviews the possibilities of encapsulating existing legacy software for reuse in new distributed architectures. It suggests wrapping as an alternative strategy to reengineering and redevelopment. It then defines the levels of granularity at which software can be encapsulated before going on to describe how to construct a wrapper and how to adapt host programs for wrapping. Some wrapping products are discussed and the state of the art summarized. The advantage of wrapping over conventional reengineering is the low cost and even lower risks involved. This is the driving force in the search for improved wrapping technology.

1.

Motivation for encapsulation

Legacy software components can be jobs, transactions, programs, modules or procedures within existing application systems which are more than five years old. Usually these systems are running on a mainframe and are based on an outdated technology such as hierarchical or networked database systems and transaction-oriented teleprocessing monitors with fixed panels. Although the technology with which they have been implemented is out of fashion, the application systems themselves are performing critical business functions in an acceptable and reliable manner. It took a lot of time and effort to develop these systems and specially to test them. Therefore, it is irrational to discard them completely, just because they do not meet current technical requirements. Typical candidates for encapsulation as business objects are batch jobs, online transactions and user subroutines as depicted below. On the other hand, there is a definite need to reengineer existing systems in order to satisfy the needs of modern business practices. It is not possible to restructure



References: Aberdeen Group (1995), “Hewlett-Packard’s C++ SoftBench 5.0,” Aberdeen Group Report, Boston, MA. Antares Inc. (1996), “ObjectStar – A Product for Wrapping Legacy Databases,” Antares Alliance Group, Dallas. Brodie, M. and M. Stonebraker (1995), Migrating Legacy Systems, Morgan Kaufman, San Francisco, CA. DeLucia, A., G.A. DiLucca, and A.R. Fasolini (1997), “Migrating Legacy Systems Towards ObjectOriented Platforms,” In Proceedings of IEEE-ICSM-97, Bari, Italy, October, p. 122. Dietrich, W.C. (1989), “Saving a Legacy with Objects,” In Proceedings of OOPSLA-90, Addison-Wesley, Reading, MA. Gamma, E. et al. (1995), Design Patterns, Addison-Wesley, Reading, MA. Gossain, S. (1997), “Accessing Legacy Systems,” In Object Expert, London, March. Graham, I. (1995), Migrating to Object Technology, Addison-Wesley, Workingham, GB. IBM (1997), “A Survey of Object-Oriented Technology on MVS/ESA,” IBM International Technical Support Center Report GG24-2505-00, Poughkeepsie Center, New York. Jacobson, I. and F. Lindstrom (1991), “Reengineering of Old Systems to an Object-oriented Architecture,” In Proceedings of OOPSLA-91, ACM Press, New York. Jacobson, I. (1992), Object-Oriented Software Engineering, Addison-Wesley, Reading, MA. Leeb, G. and S. Molterer (1999), “Developing Reengineering and Reusing Enterprise Software Using a Business Object Approach,” to be presented at TOOLS-99, CBESD Transition Workshop, Santa Clara, July. Mattison, R. (1994), The Object-Oriented Enterprise, McGraw-Hill, New York. Molterer, K. (1999), “Erfahrung mit der Reengineering bestehender Systeme in BMW,” In Proceedings of GI-Workshop on Software Wartung & Reengineering, F. Lehnert and F. Ebert, Eds., GI Arbeitskreis 5, Bad Honnef. Mowbray, T. and R. Zahavi (1994), The Essential CORBA, Wiley, New York. OMG (1998), “Business Object Component Architecture (BOCA),” Proposal – Revision 1.1, OMG Document bom/98-01-07, London. Orfali, R., D. Harkey, and J. Edwards (1996), The Essential Distributed Objects Survival Guide, Wiley, New York. H.M. Sneed / Encapsulation of legacy software 313 Parodi, J. (1996), “Building Wrappers for Legacy Software Applications,” Digital Equipment Corp., Boston. Rugaber, S. and J. White (1998), “Restoring a Legacy – Lessons Learned,” IEEE Software 15, 4, 28. Sneed, H. (1996), “Encapsulating Legacy Software for Reuse in Client/Server Systems,” In Proceedings of WCRE-96, IEEE Press, Monterey, November. Sneed, H. (1997a), “Software Interface Reengineering,” In Proceedings of WCRE-97, IEEE Press, Amsterdam, October. Sneed, H. (1997b), “SoftWrap – ein Tool f¨ r die Kapselung vorhandener Assembler, PLI und COBOL u Programme,” HMD Heft Nr. 194, Stuttgart, Germany. Sneed, H. (1998), Objektorientierte Softwaremigration, Addison-Wesley, Bonn. Souder, T. and S. Mancordis (1999), “Legacy – A Tool for Securely Integrating Legacy Systems into a Distributed Environment,” In Proceedings of IEEE-WCRE-99, Atlanta, October, to appear. Taylor, D. (1995), Business Engineering with Object Technology, Wiley, New York. Verhoef, C., A. Sellink, and H. Sneed (1999), “Restructuring of COBOL/CICS Legacy Systems,” In Proceedings of 3rd European Conference on Software Maintenance and Reengineering, Amsterdam, March, p. 72. Wallner, K. and E. Wallace (1996), “Simulated Evaluation of the Object Management Group’s (OMG) Object Management Architecture (OMA),” ACM SIGPLAN Notices 31, 10, 168. Winsberg, P. (1995), “Legacy Code – Don’t Bag it, Wrap it” Datamation, May. Yourdon, E. (1997), “Distributed Computing,” American Programmer 10, 12.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    BIS 220

    • 808 Words
    • 4 Pages

    With the advancements in technology we all are introduced to new or improved forms. There are times when advancing and learning of new technologies is a wonderful thing as long as one can also retain new information along with previously learned knowledge. In last week’s teachings we have learned new functions and capabilities as well as had a refresher course on the Microsoft PowerPoint program. Along with this informative we have also learned of the importance of the system development life cycle (SDLC) in regards to the planning, organizing, and implementing of information systems to include the project management of IT acquisitions, hardware and software selections.…

    • 808 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A long time ago software developers or programmers did not use reusable code because there were not too many reliable, and efficient software or application software available. Therefore, whenever a big project comes forth the software developers or programmers tend to start building from the ground up. After many years of building software from the ground up for each project or request, the software developers had come to an agreement that building software from ground up is very costly and time consuming, especially for an inexperience software developer. Therefore, the software developers or engineers had come to conclusion that they need to develop and implement a platform where different software developers can benefit from each others codes or components.…

    • 671 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Software Associates

    • 1558 Words
    • 7 Pages

    Richard Norton had founded Software Associates ten years ago to perform system integration projects for clients. While initially set up to operate in client-server environments, Norton had been nimble enough to make the transition to web applications, and his company had continued to grow and prosper during the rapid technological evolution of the 1990s.…

    • 1558 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Carr, D. and Johansson (1995), Best Practices in Reengineering: What Works and What Doesn 't in…

    • 8956 Words
    • 47 Pages
    Better Essays
  • Best Essays

    Computer world, 25 May. uk-leo king computer world, uk published 11:53, retrieved 29th September 2012 from http://www.computerworlduk.com/news/applications/20416/marks--spencer-completes-first-phase-of-three-year-sap-rollout/?intcmp=rel_articles;outsrcng;link_1…

    • 2361 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Project Management Sample

    • 5900 Words
    • 24 Pages

    References: * Islington College, 2012. Lecture slides. [eBook] Available at: < ftp://fserver.islingtoncollege.edu.np/BSC%28HONS%29_COMPUTING/CC2005NI%20Project%20Planning%20and%20Management/Lectures/ > [Accessed 15 April, 2012]…

    • 5900 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Cloud Testing

    • 1274 Words
    • 6 Pages

    James A. Whittaker, Florida Institute of Technology IEEE Software 17(1), pp. 70-79, Jan-Feb 2000 Avital Braner Basic Seminar of Software Engineering Hebrew University 2009…

    • 1274 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The process for procuring a large and complex software-intensive system is long and complex. It involves numerous internal and external participants, including internal organizational units located in the UK as well as contractors and co-operating organizations located in elsewhere across Europe.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Effective reuse of software products is reportedly increasing productivity, saving time, and reducing cost of software development. Historically, software reuse focused on repackaging and reapplying of code modules, data structures or entire applications in the new software projects (Prieto-Diaz 1994). Recently, however, it has been acknowledgedas beneficial to redeploy software components across the entire development life-cycle, starting with domain modelling and requirements specification, through software design, coding and testing, to maintenance and operation. There were also attempts to reuse aspects of project organisation and methodology, development processes, and communication structures. However, as the concept of reusing software components is very clear at the code level (whether in source or binary form), the very same concept becomes more fuzzy and difficult to grasp when discussed in the context of reusing specifications and designs (whether in textual or diagrammatical form), or quite incomprehensible when applied to software informal requirements, domain knowledge or human skills and expertise (expressed in natural language, knowledge representation formalism, or existing only in humans). This problem of dealing with reusable software artefacts resulting from the earliest stages of software development, in particular requirements specifications, attracted our particular interest in the reusability technology.…

    • 5633 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Chapter 2 solutions

    • 10133 Words
    • 36 Pages

    Response: Autonomous systems development initiatives distributed throughout the firm can result in each user area reinventing the wheel rather than benefiting from the work of others. For example, application programs created by one user, which could be used with little or no change by others, will be redesigned from scratch rather than shared. Likewise, data common to many users may be recreated for each, resulting in a high level of data redundancy. This situation…

    • 10133 Words
    • 36 Pages
    Powerful Essays
  • Good Essays

    Service – Oriented Architecture is very popular, this architecture can be used over a network and…

    • 1023 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Enterprise Application Environment is an existing Unisys product that represents aheritage of over twenty years of development. It has undergone…

    • 9342 Words
    • 38 Pages
    Powerful Essays
  • Good Essays

    Systems Maintenance

    • 704 Words
    • 2 Pages

    As advances in technology occur, maintenance of systems and software become more prevalent. The design or upgrade of a system will tell what type of maintenance will be needed in the future, because the upgrade will have failure as equipment is replaced, and new designs will have configurations or tweaks that need to be done after implement.…

    • 704 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Thesis

    • 1880 Words
    • 8 Pages

    Objects (RDO). In this chapter, I’m going to start examining ADO database programming by giving an overview of Visual Basic database programming in general, then taking a brief look at both DAO and RDO before turning to ADO. I’ll put all three of these protocols into historical…

    • 1880 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    A. Pua, and Juan Paulo I. Torre" in partial fulfillment of the requirements for the Software…

    • 11243 Words
    • 81 Pages
    Satisfactory Essays