Professional Documents
Culture Documents
and formalizing
the framework
for information systems
architecture
by J. F. Sowa
J. A. Zachman
John Zachman introduced a framework for Most programming tools and techniques focus on
information systems architecture (SA) that has one aspect or a few related aspectsof a system.
been widely adopted by systemsanalysts and The details of the aspect they select are shown
in
database designers. It provides a taxonomy for
relating the concepts that describe the real world utmost clarity, but other details may be obscured
to the concepts that describean information or forgotten. As examples, consider each of the
system and its implementation. The ISA following techniques:
framework has a simple elegance that makes it
easy to remember, yet it draws attention to Flowcharts, which were introduced by John
fundamental distinctions that are often
overlooked in systems design. This paper von Neumann in 1945, are the oldest and still
presents the framework and its recent extensions most widely used programming aid. They focus
and shows how it can be formalized in the on the operations performed by a computer and
notation of conceptual graphs. their temporalsequence.Theyare fine for
showing algorithms, but the data structures pro-
cessed by the algorithms are only mentioned
incidentally as they are being operated upon.
Entity-relationship diagrams area popular
graphic notation for showing entity types, their
attributes, and the relations that connect them.
T he world contains entities, processes, loca-
tions,people,times,
puter systems are
and purposes. Com-
filled with bits, bytes, numbers,
They are fine for showing certain kinds of con-
straints, but they cannot show all constraints,
and they ignore the operations performed by
and the programs that manipulate them. If the and on the entities.
computer is to do anything useful, the concrete Relational databases emphasize tables and the
things in the world must be related to the abstract operations for manipulating them to derive an-
bits in the computer. Zachman’s framework for
information systems architecture(ISA) makes that Wopyright 1992 by International BusinessMachines Corpo-
ration. Copying in printed form for private use is permitted
link. It provides a systematic taxonomy of con- without payment of royalty provided that (1) each reproduc-
cepts for relating things in the world to the rep- tion is done without alteration and (2) the Journal reference
resentations in the computer. It is not a replace- and IBM copyright notice are included on the first page. The
ment for other programming tools, techniques, or title and abstract, but no other portions, of this paper may be
copied or distributed royalty free without furtherpermission
methodologies. Instead, it providesa way of by computer-based and other information-service systems.
viewing a system from many different perspec- Permission to republish any other portion of this paper must
tives and showing how they are all related.’ be obtained from the Editor.
590 SOWA AND ZACHMAN IBM SYSTEMS JOURNAL, VOL 31, NO 3, 1992
swers to complex queries. They are excellent logic, and they can coexist with the more spe-
for representing highly repetitive business data cialized notations, including flowcharts, E-R di-
that originate in forms and tables, but they are agrams, and object-oriented hierarchies.
less well-suited to the irregular data structures
that occur in graphics and engineering designs. Because of the generality and readabilityof con-
Object-oriented systems emphasize objectsand ceptual graphs, theAmerican National Standards
the operations that may performed
be by and on Institute (ANSI) X3H4.6 Task Group is using them ’
them. They are excellent for representing con- as a basis for the normativelanguage of the con-
straints and operations that apply to each object ceptual schema for Information Resource Dictio-
and its parts, but current object-oriented data- nary Systems (IRDS).’ They invited John Sowa,
bases are not as good as relational systems for the designer of the conceptual graph system, to
handling complex queries. participate in the development of the IRDS stan-
dards. They also invited John Zachman, the au-
Each of these techniques is specialized for a dif- thor of the ISA framework, to present his frame-
ferent purpose. By concentrating on one aspect, work and its recent extensions. In writing this
each technique losessight of the overallinforma- paper,the
authors
have applied conceptual
tion system and how it relates to the enterprise graphs to the description of the ISA framework
and its surrounding environment. The purpose of and its extensions.
the ISA framework is to show how everything fits
together. It is a taxonomy with 30 boxes or cells Within IBM, the ANSI IRDS standards and Zach-
organized into six columns (labeled A through E) man’s ISA framework areespecially important for
and five rows (numbered 1 through 5). Instead of AD/Cycle*.6” The AD/Cycle perspectives of the
replacing other techniques, it shows how they fit enterprise model, the information model, and the
in the overall scheme. Flowcharts, for example, technology model were influenced by the three
may be suitable fordescribing the cell in Column middle rows of the ISA framework. The current
B, Row 5 (the process column, component row in information model is consistent with the 1988
the framework); and entity-relationship (E-R)di- ANSI IRDS standards, which are based on E-R di-
agrams may be acceptable forColumn A, Row 3 agrams. The ANSI IRDS committee must make fu-
(the data column, system model row). ButISA the ture standards upward compatible with the cur-
framework shows how the cells in different col- rent ones, but extensions beyond E-R diagrams
umns and rows relate to one another. are needed to accommodate new developments,
especially in object-orientedsystems.Concep-
For any oneof the 30 cells in the ISA framework, tual graphs can provide those extensions in a form
it is possible to develop a special notation that is that is compatible with the ISA framework.
ideally suited to the subject matter described in
that cell. But to relate all of the cells to one an- Overview of the framework
other, there should be a common language that
can describe all of them and their interrelation- When applied to an information system, the word
ships. A natural language such as English is ca- architecture is a metaphor that compares the con-
pable of describing everything in every cell. Yet struction of a computer system to theconstruction
English, which may be good for discussing design of a house. The ISA framework is an elaboration of
decisions in the early stages of system develop- that metaphor. It compares the perspectives in de-
ment, is not as precise and implementable as the scribing an information system to the perspectives
more specialized notations. Symboliclogic is pre- produced by an architect in designingand con-
cise and generalenough to describe anything that structing a building:
can be implemented on a digital computer and
even the computer itself. But the usual predicate Scope-The first architectural sketch is a “bub-
calculus notation for logic tends to become un- ble chart,’’ which depicts in gross terms the
readable, even for simple examples. Conceptual size, shape, spatial relationships, and basic pur-
graphs are a readable graphic notation for logic pose of the final structure. In the ISA frame-
that is designed for translations to and from nat- work, it corresponds to an executive summary
ural language^.^,^ They can describe anything in for a planneror investor who wantsan estimate
any cell of the ISA framework, they have a for- of the scope of the system, what it would cost,
mally defined mapping to and from other formsof and how it would perform.
IBM SYSTEMS JOURNAL, VOL 31. NO 3, 1992 SOWA AND ZACHMAN 591
Table 1 Characteristics of framework rows
Enterprise orbusiness model-Next are the ar- tions performed, and Column C shows the loca-
chitect’s drawings that depict the final building tionsandinterconnections. For physicalpro-
from the perspective of the owner, who will cesses in architecture andengineering, Column A
have to live with it in the daily routines of bus- represents the material, Column B the function,
iness. They correspond to the enterprise (bus- and Column C the geometry. Each row represents
iness) model, which constitutes the design of a different role or perspective, a different set of
the business and shows the business entities constraints, and therefore different model struc-
and processes and how they interact. tures.Table 1 showstheperspectives,con-
System model-The architect’s plans are the straints, and models for the first three columns
translation of the drawings into detailed speci- that were describedin Zachman’s original frame-
fications from the designer’s perspective. They work. ’
correspond to the systemmodel designed by a
systems analyst who must determine the data Theconstraintsare additive; that is, thecon-
elements and functions that represent business straints of a lower row are addedto the model of
entities and processes.* a higher row to produce a new model at a new
Technology model-The contractor must re- perspective. Ideally, the newmodel should not be
drawthearchitect’splans torepresentthe so dissimilar that thehigher-row model cannot be
builder’s perspective, which must considerthe inferred (or reverseengineered) from thenew
constraints of tools, technology, and materials. lower-row model. This is thechallenge of quality
The builder’s plans correspond to the technol- management: to ensure that as the model trans-
ogy model, which must adapt the information formations take place (that is, as each model is
system model to thedetails of the programming structurally changed through the successive ap-
languages, I/O devices, or other technology. plication of additional constraints) the original
Components-Subcontractors work from shop purpose of the business is not so obscured that the
plans that specify the details of parts or sub- business requirementsare not recognizable in the
sections.Thesecorrespond tothe detailed end product.
specifications thatare given to programmers In practice, a constraint in a lower row might be
whocode individual moduleswithout being inconsistent with the model in the next higher
concerned with the overall context or structure row. Then the designers who are responsible for
of the system. the two rows must initiate a dialog to determine
what must be changed and to ensure that no gap
These five descriptionscorrespond to the five in expectations exists between the different per-
rows of the ISA framework. Figure 1 shows the spectives. No matter how desirable or aestheti-
original version of the framework in which three cally attractive a particular featuremight be, if it
columns describe the data, function, and network violates the laws of physics, it cannot be imple-
at each of the five levels. Inside the 15 cells are mented. Therefore, the designers must notify the
examples of notations used to describe the corre- owner and explicitly negotiate an alternative.
sponding perspectives on an information system.
The columnsof the framework represent different
The three columnsin Figure 1represent the data, abstractions from or different ways to describe
function, and network of an information system. the real world. The reason forisolating one vari-
For eachof the five rows, Column A shows what able (abstraction) while suppressing all others is
entities are involved, Column B shows the func- to contain the complexityof the design problem.
r-
TO THE BUSINESS BUSINESS PERFORMS
PLANNER WHICH THE BUSINESS OPERATES
""ll""lll..ll"
.ll..llxl",.
"llx.xll.","",
lll..lll..x.,,"
lll""l...ll..
e
ENTERPRISE E.G., "ENT/REL DIAGRAM E.G., "PROCESS FLOW DIAGRAM E.G., LOGISTICS NEWORK
MODEL
OWNER
a
-1-
=I ENTITY = BUSINESS ENTITY
0
0 FUNCTION = BUSINESS PROCESS
0 NODE = BUSINESS LOCATION
"
0NODE = 115. FUNCTION
7 ENT = DATA ENTITY 0 FUNCTION = APPLICATION FUNCTION (PROCESSOR, STORAGE, ET(
7 RELN = DATA RELATIONSHIP 0 ARG = USER VIEW 0 LINK = LINE CHARACTERISTICS
TECHNOLOGY i.G., DATA DESIGN E.G., "STRUCTURE CHART" E.G., SYSTEM ARCHITECTURE
MODEL
n n rn
BUILDER
u u
7 ENT = SEGMENT/ROW
3 RELN = POINTEWKEY 0
m
0FUNCTION = COMPUTER FUNCTION
A R G = S CR;EEN/DEVICE FORMA1
-
0NODE = HARDWARE/SYSTEM
SOFTWARE
0 LINK = LINE SPECIFICATIONS
L(zJJ
IDENTIFIER t_
9 DATA ARCHITECTURE
-
"
SUBJECT AREA
I I l l
I DATA ENTITY
'n
RELATIONSHIP :E$Y
r(CONSISTS OF
3 DATA DESIGN
SYSTEM
I 7
RULE
MECHANISM
rl11
KEY ELEMENT
594 SOWAANDZACHMAN
For example, it is complicated enough to design
the process-to-process relationships of an enter-
prise without attempting to addressthe entity-to-
entityandlocation-to-locationdesignissuesat
the same time. However, since the processes, en-
tities,andlocations are all abstractions of the
same enterprise, each is related to all of the oth-
ers. Therefore, during the design of any one, the
structural integrity of the others could undoubt-
edly be impacted. The challenge here is to design
each while understanding the impact on the in-
tegrity of all others to avoid being surprised by
undesirable side effects appearing long after it is
possible to contain them. The evidence of this
wisdom (or lack thereof) is seen in the majority of
applications portfolios of today. For 50 years,
we unknowingly optimized thefunctionatthe
expense of the data, and only now are we begin-
ning to discover the considerable, negative side
effects.
schedule, and the cost that connects the subor- Table 2 shows thekind of information that would
dinate organizations. This method is much like an be found in each of the rows of the people (who)
oil company that arbitrarily defines the refining column. Themeaning of the entities in the column
product slate, schedules, and transfer pricing of changes with the changeof perspective from row
the product from the refinery as it is transferred to row, and their meaning is consistent with the
to the wholesale or retail distribution organiza- other column cells in the same row. That is, the
tion. new cells are consistent with the overall frame-
work, vertically and horizontally.
There is no requirement that either the entity that
allocates the work or the one to whom work is The time (when) column. Time is abstracted out of
allocated be an organization or a person. It may the real world to design the event-to-event rela-
well be a machine or even some software agent, tionships that establish the performance criteria
as in artificial intelligence systems. Therefore, in- and quantitative levels for enterprise resources.
stead of specifying the columnar abstraction en- For example, from Event 1, product announce-
tity as an organization, person, or user, it seems ment at time t o ,until Event 2, first customer ship
more appropriate to select a generic name like at timet,, there is a duration( t l - t o ) .The length
agent that might apply to humans or nonhumans. of the duration establishes the external commit-
ments of the enterprise as well as the resource
The connector entity, work, should probably be levels required to meet the commitments.In gen-
interpreted to mean work product to avoid con- eral, the shorter the duration, the more resources
fusing it with the concept of process or function required to meet the commitments. The longer
that falls within the purview of the process col- the duration, the less resources required to meet
umn. Further, work product would be a kind of the commitments.
user view of materials or process inputs/outputs.
To avoid any confusion between the concepts of Figure 4 is an example of a graphic representation
work products and inputs/outputs, it would be that might be appropriate for describing the time
useful to change theoriginal name of the connec- characteristics of an enterprise where the vertical
tor entityin the processcolumn from input/output axis is the control axis and the horizontal axis is
to argument, the mathematical term for input to a the durationaxis. The pointsin time are displayed
function that is the object of a transformation as as circles, and the durations are shown as cycles.
inf(x) = K, wherefis the transformation,xis the Table 3 lists thekind of information that would be
input argument, and K is the output. found in each of the cells of the when column.
598
Table 4 Contents of cells in the motivation (why) COlUmn
IBM SYSTEMS JOURNAL, VOL 31, NO 3, 1992 SOWA AND ZACHMAN 599
DATA PUNCllON NETWORK PliOPLE
0 ENTIN 0FUNCTION 0NODE 0 AGENT
0RELN 0ARG 0LINK 0WORK
0ENTITY = CUSS OF 0 FUNCTION I CLASS OF 0NODE =MAJOR BUSINESS 0 AGENT MAJOR ORGANIZATION
I
ENTER- E.G., "PROCESS FLOW DIMRAM" E& LoolsTlCSMTWORK E.G., DRGhNUAWN CHART
MODEL
OWNER
SIslEwyQoE
--
0 ENTtN BUSINESS ENTIN
0 RELN BUSINESSCONSTRAINT
-
ARG WSINESS RESWRCES
n WORK -
- ORGANIZATION
WORK PRODUCT
E.G., HUMANINTERFACEARCHITECTURE
UNIT
fl A
ARCHITECTURE
DESIGNER
+e 0NO -
M VS FUNCTION
0AGENT = ROLE
-
0 ENT I DATA ENTIN
0 RELN DATA RELATIONSHIP
0FUNCTION =APPLICATIONFUNCTION
0 ARG IUSER
VIEW -
IPROCESSOR. STMIAOE. ETC)
0 LINK LINECHARACTERISTICS -
0 WORK DELIVERABLE
TECHNOLOGY KG., DATA M%W Ea., '3STRUCTURECHAW' E.G., SYSTEM ARCHll'ECTWE E.G.,HUWHrfECHNOLOGV
MODEL INTERFACE
m €!PA
BUILDER
n
- -
0 NODE HARDWARWSYSTEM
0 ENT SEGMENTlROW
0RELN POINTEWKEY
I 0 -
0 FUNCTION -COMPUTER FUNCTION
ARG SCREEWDEVICE FORMAT
SOFTWARE
0 LINK = LINESPEClFICATlONS
0AGENT USER
OWORK-JOB
I
........
su&
CONTRACTOR .............
..............
.............
.............
............
............. I ............. I
0 Em-FIELD
-
0 RELN ADDRESS
0 FUNCTION T LANGUAGE STMT
0 ARG CONTROL
I BLOCK
0NODE
0 LINK
-- ADDRESS
PROTOCOL -
CI AGENT = IDENTIN
0WORK 'TRANSACTION'
E.G., DATA E.G. NNCT
K N
I E.G., NETWORK Eli.. D R G A N I U ~
600
example, the enterprise model in Cell A2 might be
comprised of the sequence: employee related to
organization related to customerrelated to prod-
TIME
3TIME
MOWAllON
3ENDS
uct. The metamodel of this model is the abstrac-
3 CYCLE 3MEANS tion entity-relationship-entity. In a similar fash-
LIST OF BUSINESS OOALBIFTRATEGY S
Em ion, each column has a simple, basic model that
PUINNER constitutes the generic metamodel for that col-
umn. Table 5 shows examples for Columns A, B,
O C Y C L E BUSINESS CYCLE
I -
0 ENDS I BUSINESSWECTIVE
OMEANS BUSINESS STRATEGY tionship is not equivalentto argument. They may
all be related to one another because they areall
E.G., PROCESSINGSTRUCTURE E.G.. KNOWLEDGEARCHITECNRE SYSTEM
n
UODEL abstractions of the same real-world enterprise,
Y DESIGNER but they are all separate and unique concepts.
The same logic applies to all of the basic, colum-
nar models. That is, each basic model is unique.
0
-
TIME .ISYSTEMEVENT
O C Y C L E PROCESSING CYCLE
--
0 ENDS CRITERION
U M E A N S OPTKlN
Rule 4. Each row represents a distinct, unique
E.G.. CONTROL STRUCTURE rrrnNOLWV perspective. This rule is mosteasilydemon-
BUILDER
strated in Rows 2, 3, and 4 which represent the
owner’s, designer’s and builder’s perspectives.
Each perspective is different in that it is dealing
with a different set of constraints relevant to that
0 TIME -EXECUTE 0 ENDS I CONDITION
perspective. For example:
0CYCLE = COMPONENT CYCLE 0MEANS ACTION
I
COMPONENTS
Owner: Deals with usability constraints, both
SUB.
aesthetic and utilitarian in the conceptual view
of the end product.
I I
CONTRACTOR
..............
.............
::::::::::::.
............. Designer: Deals with the design constraints-
the lawsof physics or naturein the logical view
-
0 TIME INTERRUPT
0CYCLE MACHINE CYCLE
I
0 ENDS I SUBCONDITION
0 MEANS = STEP
of the end product.
Builder: Deals with theconstructioncon-
LA., SCHEDULE E.G.. STRATEQV WHCTKw(ING
BYSTEW straints-the state of the art in methods and
technologies in the physical view of the end
product.
Because each perspective reflects a different set
data column, Column A, for example, has the of constraints, the meaning (or definition) of the
simple basic model entity-relationship-entity. basic entity in a given column will change from
The columnar variable is entity, and the connec- row to row. For example, entity has onemeaning
tor is relationship. for the owner, another one for the designer, and
yet a different one for the builder. Table 6 shows
The basic model for each column is actually a examples of those differences for Column A.
generic metamodel. Itis generic because it is the
same for each cell in the column. It is “meta” Since each basic entity means something different
because it is a model of the enterprise model. For from the perspectives of the different cells in the
IBM SYSTEMS JOURNAL, VOL 31,NO 3, 1992 SOWA AND ZACHMAN 601
Figure 7 The OCRA example in the six-column framework
602 SOWA AND ZACHMAN IBM SYSTEMS JOURNAL, VOL 31, NO 3, 1992
these entities may be combined
in endless waysto complete depictionof reality from the perspective
produce compounds or information systems of of that row. The significance of this rule is that as
interest to an enterprise. additional columns are defined, each newcell de-
scription must be consistentwith the perspective
A corollary to the rule that each cell is unique of the row. That is, each cell in a given row can
(that is, each cell represents a different abstrac- be defined and has relevance independentof any
tion and different perspective-therefore differ- other cells in the row, yet each cell is but one
ent motivation,different purpose, different design abstraction of the same reality. Therefore, at a
issue, different constraints, etc.) is that different minimum, each cell is related to every other cell
techniques and different graphic representations in the same row. In some cases, there may even
are appropriate for different cells. This corollary be a dependence upon other cells in the row. In
explains the plethoraof information systems (11s) these cases, a changein the structure of one cell
design formalisms that have emerged over the would likely have somekind of effect in any other
years. They are all likely to be relevant for some cell where a dependency exists. This not only
purposes, but they each address different
a set of holds trueacrossarow,but it mostcertainly
issues, and none is completely adequate in itself. would be true within a column where, by defini-
Also, when the formalism for any one cell is ex- tion, there is a dependency between any one cell
panded to incorporate the notation from another and the cell above and the cell below. Thus, a
cell in an attempt to enrich theformalism, it com- change in any given cell would likely affect the
plicates the design problem and may lead to in- cell above, the cell below, and potentially, other
advertent suboptimization of the other indepen- cells in the samerow where a dependency exists.
dent variable. For example, in some application
designs, it may seem appropriate to show a data It is worthwhile noting that if the nature of the
store on a data flow diagram for Cell B3. Yet it dependency between cells could be understood
may not be clearly understood that the data store and stored in the repository along with the cell
is actually an aggregation of attributes of entities models, it would constitute a very powerful ca-
from the logical data model of Cell A3. There is pability for understanding the total impact of a
a risk that the designer may design a customized change to any one of the models, if not a capa-
file to satisfy the local requirements of the pro- bility for managing the actual assimilation of the
cess. In this event, the integrity of the data as changes.
specified by the logical data model may be com-
promised, and the data are unlikely to be reused Rule 7. Thelogic is recursive. Theframework
or shared by any other process. logic can be used for describing virtually any-
thing, certainly anything that has an owner, de-
The uniqueness of each of the cells also explains signer, and builder who make use of material,
the plethora of methodologies that have evolved. function, and geometry. The logic was initially
It would appear that specific
a methodology elects perceived by observing the design and construc-
to produce some set (or subset) of cells in some tion of buildings. Later it was validated by ob-
sequence.Thesequencedeterminesthevalue serving the engineering and manufacture of air-
system being applied in making the design trade- planes. Subsequentlyit was applied to enterprises
off decisions within the cell. That is, the structure during which the initial material on the framework
of a cell can be derived from the cell above, the was published. In the current paper, it is being
cell below, or a cell in the samerow. The cell that applied to an information systems “enterprise”
a methodology causestobeproduced first is wherever the “meta” conceptis being used. Sim-
likely to have a strong influence on the design ilarly, it could be applied to a CASE tool manu-
tradeoffs made in the structure of a subsequently facturer.
designed cell.
These four applications of the framework were
Rule 6. The composite or integration of all cell selected for illustration, not by accident, but be-
models in one row constitutes a complete model cause the examples are related. Examination of
f.om theperspective of that row. This rule derives the framework graphically depicts the relation-
from the fact that any one cell of one column is ship between the product, the enterprise, infor-
merely a single abstraction of reality. Therefore, mation systems, and the CASE tool manufacturer.
the sum of all cells in a given row is the most It shows that:
IBM SYSTEMS JOURNAL, VOL 31, NO 3, 1992 SOWA AND ZACHMAN 603
Figure 8 The enterprise framework as a metaframework design artifacts requiredto build the product,plus
extensions to themodel to describe the enterprise
resources being used in the manufacturing pro-
cess. Thus,Cell A2 is a metamodelof the product
framework with extensions that include the en-
terprise resources. See Figure 8.
606 SOWA AND ZACHMAN IBM SYSTEMS JOURNAL, VOL 31, NO 3, 1992
(Vx:cat)(3!!y:mat)on(x,y).
Figure 12 A conceptual graph
IBM SYSTEMS JOURNAL, VOL 31, NO 3, 1992 SOWA AND ZACHMAN 607
could use conceptual graphs with no more lin-
Figure 13 A conceptual graph with instances
guistic detail than E-R diagrams.
608 SOWA AND ZACHMAN IBM SYSTEMS JOURNAL, VOL 31, NO 3, 1992
times, places, people, and things. The relation
Figure 15 Showing the durationof a cat chasing a
DUR for duration shows that the situation lasted mouse
for a time period of 13 seconds. The relations
FROM and TO show that thetime period started at
the time 19:29:32 Greenwich Mean Time (GMT)
and ended at 19:29:45 GMT.
1
Flowcharts and Petri nets are often used to de-
scribe processes in Column B of the ISA frame-
work. Such diagrams can also be represented in
+
conceptual graphs by using nested graphs linked
bythe succ orsuccessor relation. Figure 16
shows a concept of type PROCESS, which contains
a nested statesl, followed by an event e,
followed
by another state s2. The statesl has a durationof
15 seconds, the event e occurs at apoint in time
(PTIM) of 20:23:19 GMT, and the state s2 has a
duration of 5 seconds.
Conceptual graphs are a system of logic that re- 1 TIME:19:29:32 GMT II TIME: 19:29:45GMT I
mains readable at many different levels of detail.
Predicate calculus, by contrast, is not very read-
able at any level of detail. The formula operator
43,4would translate Figure 16 to the following:
Figure 16 A process described by a conceptual graph
(3p)(process(p) A descr(p,
(3~1)(3e)(3~2)(3tl)(3t2)
(state(s1) A event(e) A state(s2) A
PROCESS:
succ(s1 ,e) A succ(e,s2) A
time-period(t1) A time-period(t2) A
time(20:23:19 GMT) A
dur(s1 ,tl) A ptim(e,10:23:19 GMT) A
dur(s2,tZ) A
rneasure(tl,15sec) A measure(t2,5sec)))).
WHAT? HOW?
ENTERPRISE:
Rule 1. The columns have no order. Figure 1 2. The answer to the question how is some type
shows theoriginal ordering of the ISA framework. ofprocess. For Rows 1 and 2, they are real-
Figures 6 and 7 show the additional three col- world processes. For the lower rows, they are
umns. But the particular orderingis merely ahis- computational functions that model the pro-
torical accident. Figure 18 shows the six columns cesses.
in a hexagon, where each one is related to every 3. The answerto thequestion where is some type
other. The traditional tabular order is merely a of location. For the top two rows, they are
concession to paper or flat computer displays. locations in the world. For the lower rows,
Graphs eliminate the restrictions andpermit any- they are logical or physical nodes in a com-
thing in any column to be linked directly to any- puter network.
thing in any other column. 4. The answer to the question who is some type
of role played by a person or a computational
Rule 2. Each column has a simple, basic model. agent. For Rows 1and 2, they are persons who
In terms of conceptual graphs, this rule implies play somerole in the enterprise. For the lower
that there is one basic concept typefor each col- rows, they may be programs that act for the
umn, which answers the question word at the user at the higher level.
head of the column. All of the graphs that de- 5. The answer to the question when is time, a
scribe any cell in that column assert some infor- subtype such as date, or a time that is coinci-
mation about some subtype of that basic type. dent with some event.
Following are the basic concept types as depicted 6. The answer to the question why is some goal
in Figure 18 for each column: or subgoal that provides the reason that mo-
tivates the model for that row.
1. The answer to the question what is some type
of entity. For Rows 1 and 2, the entities are Each of these basic concept types is related to
real-world objects. For Row 3, they arelogical other concept types by various relations. Those
information types in the 11smodel. For Row 4, other types may be included in the graphs spec-
they are physical data types in the technology ified in that column, but they provide auxiliary
model. For Row 5 , they are more specialized information that is subordinate to the basic con-
data types for each component. cept type for the column.
IBM SYSTEMS JOURNAL, VOL 31. NO 3, 1992 SOWA AND ZACHMAN 611
Figure 19 Representing three rows in Column A
J
1
INFORMATiON
SYSTEM:
+ 4
t t
ECHNQLOGY: VARIABLE: SERNO VARIABLE: MODELID
Rule 3. The basic model of each column must be tion types in Row 3 to the implementation types
unique. Since each column provides the answer in Row 4.
to a different question, no two columns focus on
exactly the same information. Since all columns Rule 5. Each cellis unique. This rule follows from
are related, the graphs in each column may con- Rules 3 and 4.
tain concepts and cross references to other col-
umns. But the central concept typesin each col- Rule 6. The composite or integration of all cell
umn are unique. models in one row constitutes a complete model
from theperspective of that row. When a system
is completely specified, all the conceptual graphs
Rule 4. Each row represents a distinct, unique in each cell of a given row represent a complete
perspective. Since each row presents a perspec- specification of the system at that level. To see
tive on a different model from thepoint of view of the kind of information at each level, read across
a different role (planner, owner, designer, builder, the rows of the OCRA example in Figure 7.
subcontractor), each row contains different con-
cepts that provide a different level of description. Rule 7. The logic is recursive. The ISA framework
Figure 19 shows three different rows in Column A. is recursive in several different ways. In one
sense, it can serve as a metamodel to describe
All the concept typesin Figure 19 are subtypesof itself since it is general enough to describe the
entity: CAR, MODEL, SERIAL-NO, MODEL-NAME, construction of any system,it can also describe its
and VARIABLE. The typesin Row 2, the enterprise own construction. As another kind of recursive-
model, describe real-world entities, such as cars ness, it can describe entities and states that have
and models. The types in Row 3, the I/S model, parts and subparts nested inside one another to any
describe logical information types, such as serial depth. Figure 16, for example, might represent the
numbers and model names. The types in Row 4, process of blowing out the candles on a birthday
the technology model, describe implementation cake. Thestate sl would represent the candles
details, such as variables in some programming burning for 15 seconds while the guests sing “Hap-
language. The NAME relation links the entities in py Birthday.” Then event e is the act of blowing out
Row 2 to the information types in Row 3. The the candles, and state s2 represents the candles
REPR (representation) relation links the informa- smoking for 5 seconds. Figure 20 is an expansion of
STATE:
* s1
SONG: HAPPY BIRTHDAY
state sl to show the nested graphs that describe An architecture for the information age
the candles burning and the guests singing.
Dramatic improvementsin the price-performance
In Figure 20, the details of the singing are not of information technology and the escalation of
described. Even though singing is a processwith the rateof change show nosigns of abatement. In
sound and movement, those details areunimpor- thewords of Alvin Toffler, “Knowledge is
tant at this level of description, and the entire change . . . , and accelerating knowledge, fueling
process may be considered a single, unchanging the great engine of technology, means accelerat-
state. If the detailsof the singingwere significant, ing change.”” Gone are the days of computers
the boxof type SING could be expanded to a pro- for simple calculations. We are only now begin-
cess with each note represented as a separate ning to see the enormous complexityof integrat-
event. On a sheet of paper, it is not possible to ing information technology into thevery fabric of
show all of the nested levels with equal clarity, our enterprises. Soon, the enterpriseof the infor-
but an interactive display would allow the viewer mation age will find itself immobilized if it does
to zoom in or out on any box. not have the ability to tap the information re-
sources within and without its boundaries.
At alarger level, Figure 21 shows the entire birth-
day party with the process box of Figure 16 nested In this scenario, it is little wonder that a frame-
inside. In the box for the birthday party, the top
work for information systems architecture finds
graph says that 40 guests x are giving presents to a such widespread applicability. It would be im-
person named Marvin. There arealso 50 candles y
possible for man or machine to successfully ac-
on a cake. Inside the nested process box, the first commodatethecomplexities of today’senter-
state is described by graphs for the candles y burn-
prise without some kind of logic structure. Every
ing and the guests singing “Happy Birthday. ” The
discipline apparently finds a classification scheme
next event is described by a graph for Marvin blow-
or periodic table for organizing knowledge and
ing out thecandles y. And the last state is described
forming a basis for constructing more complex
by a graph for the candles generating smoke.
theses. The ISA framework is a contribution in
The example of a birthday party illustrates the this regard. It is not so much an invention as it is
conceptual graph notation with a familiar situa- an observation-an observation of some (appar-
tion. But exactly the same techniques could be ently) natural rules for segmenting an enterprise
used to describea manufacturing process,a into understandable parts withoutlosing the def-
courtroom trial, or the stepsin the execution of a inition of its total integration.
computer program. For any of these purposes,
the subtypesof SITUATION could be described by The logic structure or rulesof the framework are
nests of contexts containing conceptual graphs. generic. They can be usedfor structuring the de-
Othernotations for describing processesand scription of any complex object. The framework
events-flowcharts, state-transition diagrams, was first discovered by observing how the man-
data flow diagrams, or Petri nets-could be trans- ufacturing discipline segments the descriptionsof
lated to similar nests of conceptual graphs. complex engineering products for the purposes of
BIRTHDAY PARTY:
CANDLE: (*)@50 * y
PROCESS:
STATE:
EVENT:
design and manufacture. It would appear that the Establishing a baseline of descriptive represen-
use of the design artifactsareseveral including: tationsfor managing changes in theproduct
during and after its production
Partitioning the design tradeoff decisions into
manageable, independent variables These are precisely the same reasons why ISAthe
Ascribing appropriate design formalisms for framework is interesting for segmenting the de-
each variable scriptions of the enterprise: for separating inde-
614 SOWA AND ZACHMAN IBM SYSTEMS JOURNAL, VOL 31, NO 3, 1992
pendentvariablesintounderstandable, design- Group for many stimulating discussions in ana-
ablecomponents;for developing appropriate lyzing and representing a variety of IIS issues.
design formalisms; and for establishing an enter- Those discussions have helped to clarify the re-
prise infrastructure in which change can be as- lationships between the levels of the ISA frame-
similated in a manageable fashion. work and represent them in conceptual graphs.
*Trademark orregistered trademark of International Business
Until recently, these architecture and modeling Machines Corporation.
concepts were somewhat theoretical and merely
intellectually entertaining to the practicing data
processingprofessional. Modeling formalisms
had evolved and werematuring, but the resultant Cited references and note
models were of minimal value since they tended
to be of such a high level of generality that they 1. J. A. Zachman, “A Framework for Information Systems
Architecture,” IBM Systems Journal 26, No. 3, 276-292
were useless fordesign purposes, orat such alow (1987).
level of detail that theycould communicate to no 2. C. Loosley, “Separation and Integration in the Zachman
one but the person whobuilt them. Furthermore, Framework,” Database Newsletter, Database Research
there was nowhere to put them except on paper, Group, Boston 20, No. 1, 3-9 (1992).
3. J. F. Sowa, Conceptual Structures: Informution Process-
or on large walls. That made it virtually impos- ing in Mind and Machine, Addison-Wesley Publishing
sible to locate a given design component, search Co., Reading, MA (1984).
for patterns, change the structure, or keep it cur- 4. J. F. Sowa, “Towards the Expressive Power of Natural
rent, much less perform configuration manage- Language” in Principles of Semantic Networks, J. F.
ment and version control or zoom in and out for Sowa, Editor, Morgan Kaufmann Publishers, San Mateo,
CA (1991), pp. 157-189.
communicating to different audiences. 5. ANSI X3H4.6 TaskGroup, Model Unification for
Data Repositories, Technical Report X3H4I92-003,
American National Standards Institute,
NewYork
It is only the adventof an automated model stor- (July 1992).
age facility or repository that brings any of this 6. V. J. Mercurio, B. F. Meyers, A. M. Nisbet, and G. Ra-
into the realm of feasibility and makes architec- din, “ADICycle Strategy and Architecture,” IBM Sys-
ture a reality. It does not mean to suggest that all tems Journal 29, No. 2, 170-188 (1990).
7. S. L. Montgomery, ADICycle: ZBM’s Framework forAp-
of these ideaswill be immediately available in any plication Development and CASE, Van Nostrand Rein-
particular repository product. It only means that hold, New York (1991).
they come into the realm of feasibility as repos- 8. The original article’ called this the “model of the infor-
itory technology becomes areality. Even though mation system.” But the words “information system” im-
early repository-type products are nowhere near ply the technology used for implementation. If the tech-
nology consisted of paper and filing cabinets handled by
ready to perform the kinds of services mentioned, clerks, thedesign would likely be called a “system” rather
the veryexistence of an automated storage mech- than an “information system.” Therefore, the label has
anism for models makes it clear that architecture been generalized to “system model” to avoid excluding
is no longer mere intellectual entertainment. It any kind of system.
9. T. W. Malone, J. Yates, and R. I. Benjamin, “Electronic
will become an imperativefor any enterprise that Markets and Electronic Hierarchies,” Communications
intends to be a serious player in the information of the ACM 30, No. 6, 484497 (June 1987).
age. 10. T. A.Bruce, DesigningQualityData Bases, Dorset
House (1991).
11. Concepts and Terminology for the Conceptual Schema
Acknowledgments and the Information Base, J. J. van Griethuysen, Editor,
ISOITC97ISCS-N695, InternationalOrganizationfor
John Zachman is indebted to Steve Pryemybida Standardization, Geneva (1987).
of Northrop for work relativeto theIDEF activity 12. P. P. Chen, “The Entity-Relationship Model-Toward a
and to Keri Anderson Healy of Model Systems, Unified View of Data,”ACM Transactions on Database
Systems 1, No. 1, 9-36 (1976).
Michael Eulenberg of the City of Seattle, andBill 13. A. N. Whitehead and B. Russell, Principia Mathemntica,
Babichuk of Ontario Hydro for work relative to 2nd edition,Cambridge - UniversityPress, Cambridge
the GUIDE Project on Information Architecture. (1925).
Their contributionswere invaluable in the efforts 14. A. Schmidt, “Uberdeduktive Theorien mit rnehreren
Sorten von Grunddingen,” Mathematische Annalen 115,
to define the last threecolumns. John Sowawould 485-506 (1938).
like to thank the members of the AD/Cycle Ar- 15. D. D. Roberts, The Existential Graphs of Charles S.
chitectureGroup and the ANSI X3H4.6 Task Peirce, Mouton, The Hague (1973).
IBM SYSTEMS JOURNAL, VOL 31, NO 3, 1992 SOWA AND ZACHMAN 615
16. L. Tesnibre, Elgments de Syntaxe Structurale, 2nd edi-
tion, Librairie C. Klincksieck, Paris (1965).
17. J. F. Sowa, “Semantic Networks,” Encyclopedia ofAr-
tificial Intelligence, Second Edition, S. C. Shapiro, Edi-
tor, Wiley, New York (1992), pp. 1493-1511.
18. J. F. Sowa, “Definitional Mechanisms for Restructuring
Knowledge Bases,” in Methodologies for Intelligent Sys-
tems, 5 , Z. W. Ras, M. Zemankova, and M. L. Emrich,
Editors, North-Holland Publishing Co., New York
(1990), pp. 194-211.
19. A. Toffler, Future Shock, Random House,NewYork
(1970).