US 20060020586 A1
A hierarchical/relational translation system is provided for enabling information from unrelated heterogeneous relational computing systems to be accessed, navigated, searched, browsed, and shared over a hierarchical computing system. In one embodiment, the hierarchical/relational translation system includes a virtual directory server for capturing information in the nature of relational database schema and metadata. The captured schema and metadata are then translated into virtual directories that are universally compatible with standard communication protocols used with hierarchical computing systems. A virtual directory of information organizes an index of data records and a standard addressing schema is provided to enable customizable access to relevant views of relational computing systems. Several embodiments for presenting the virtual directory information tree are included. In one embodiment, the virtual directory is displayed using browser format. In another embodiment, the virtual directory is presented in electronic mail format. Still, in another embodiment the virtual directory is presented over a wireless medium and through portable devices.
1. A computer-implemented method for querying relational data through standard-based hierarchical views, comprising steps of:
accessing a first server from a client;
retrieving by the first server first schema stored on at least one relational data source;
translating the first schema into second schema, wherein the second schema includes the relational data having a hierarchy;
maintaining a virtual representation of the hierarchy; and
providing the virtual representation at the client.
This application is a continuation of U.S. patent application Ser. No. 09/798,003, filed on Mar. 2, 2001, entitled “System and Method for Providing Access to Databases Via Directories and Other Hierarchical Structures and Interfaces,” now issued as U.S. Pat. No. ______, which claims priority under 35 U.S.C. § 119(e) from U.S. Provisional Application No. 60/186,814, filed on Mar. 3, 2000, entitled “System and Method for Providing Access to Databases Via Directories and Other Hierarchical Structures and Interfaces,” and claims priority under 35 U.S.C. § 119(e) from U.S. Provisional Application No. 60/203,858, filed on May 12, 2000, entitled “System and Method for Providing Access to Databases Via Directories and Other Hierarchical Structures and Interfaces (CIP),” the subject matters of which are herein incorporated by reference in their entirety.
1. Technical Field
The invention relates generally to communication network systems, and more specifically, to a method, system and computer medium for locating, extracting and transforming data from unrelated relational network data sources into an integrated format that may be universally addressed and viewed over network systems according to a hierarchical representation.
2. Description of the Related Art
There are conventionally-known ways of indexing and addressing information on the Internet (also referred to interchangeably as the “Net”) using an Internet directory. An Internet directory is an application service that generally performs information retrieval based on properties associated with the data of interest. Internet directories can store various types of objects, wherein each object is associated with a type of property or characteristic. For example, one type of Internet directory that provides a standard way of indexing and addressing the computer servers that host Net sites is the Domain Name System (DNS). Typically, a DNS server includes a method of creating a symbolic name for an Internet Protocol numeric address associated with the hardware of the Net server, and provides the .com, .net, .org, etc., domain addresses.
Along with DNS, users are additionally able to determine an address for documents through the HyperText Transfer Protocol (HTTP) that provides a Uniform Resource Locator (URL) for a page formatted with HyperText Markup Language (HTML). This addressing technique provides users a way to access any web page in the world. Although this addressing scheme has worked well to provide a hierarchical addressing scheme during the initial growth of the worldwide web (Web), the amount and importance of the data continues to expand. In particular, the increasing amounts and wide-spread diversity of information that relates to a significant portion of the world's economy is based on critical data records inside databases. Yet, there is no simple and effective manner in which to address and reference such data records originating from diverse heterogeneous databases according to context. For example, there is no conventional standard URL for a sales total, inventory, or a customer record in a database. Accordingly, there is growing need to reach a finer level of granularity of data addressing and management.
A new level of “granularity” is needed in order to locate and distribute information that is increasingly fragmented in its locale, but that potentially gives rise to value-added benefits when integrated with information from other sources. The evolution of the Internet has created an entirely new set of challenges that include dealing with the millions of web sites, billion of documents and trillions of objects that are now available in an increasingly decentralized computer environment. A completely decentralized Net creates a critical need to categorize (i.e., index) information and provide an address (i.e., location) for each piece of data on the Net. If this does not occur, the Net becomes something like a large telephone system without a telephone directory to look-up and to locate the numbers of individuals and groups. While developers have standardized techniques to organize and communicate much of this information through the conventional indexing techniques described above, they have not adequately addressed the following problems.
In the past, conventional client-server computing was inward-focused and directed to a tightly controlled environment. More specifically, conventional client-server computing was developed for distributed networks, and in particular, for use inside an enterprise or organization. Frequently, many enterprises store their data in a collection of disparate databases and deploy applications based on their short-term departmental needs. This conventional approach becomes increasingly problematic as an enterprise grows and the information contained in these disparate databases become increasingly difficult to integrate. The narrow scope of each application can eventually become a hindrance to the overall needs of the organization as information databases grow and change along with the evolving state of the enterprise.
The difficulties of the inward-focused model are more clearly understood when considered in the context of the future growth pertaining to the Net-based economy, which explodes the conventional inward-focused model into an environment that is highly decentralized and far more open to outward-focused computing. One key problem confronting enterprises that attempt to migrate their businesses onto the Net is how to take advantage of existing lines of business applications that are still bound to the inward-focused client-server model. As such, it would be beneficial to provide enterprises and organizations experiencing this problem with a way to unlock their data for use by other applications and other users. By doing so, these “back office” applications do not risk becoming isolated “islands of automation” in an endless ocean of information. Accordingly, it would be beneficial to be able to access and selectively assemble such data from disparately-located data sources and to automatically manage the data with an integrated view of the network and the application infrastructure. What is needed is an efficient integrated solution to a fragmented and distributed enterprise information system.
Directory services are an established component of the network infrastructure, stemming from the Internet's DNS to electronic mail (email) systems, and to the Operating System (OS) domains of corporate intranets. Applications that can leverage the strength of this infrastructure are on the rise and are placing new demands on the directory architecture. Led by the dramatic growth of e-commerce, it would be desirable to move directory-enabled applications toward a model of centralizing administration. This aspect of centralized administration is beneficial because it would allow tasks to be administered from anywhere in a network. To this end, directory-enabled applications moving towards a model having centralized administration would be better-suited to enable access to a richer set of data than provided by conventional directories.
However, for corporate information technology (IT) staff deploying directories in the past, the process has often proven to be slow and expensive. Conventional Internet directory deployment is slow because the process is complicated, at least for several reasons. First, conventional Internet directories suffer from the “yet another database” syndrome. Because the source of the directory information frequently exists in other parts of the infrastructure, the issues of resolving authoritative ownership of the data can be problematic. Second, the inconsistency amongst the various data sources conventionally require reconciling the different data formats and data models associated with each disparate data source. Third, synchronizing data from disparate sources into the directory requires extensive and careful planning.
These complexities in turn result in higher costs, which is another problem typically experienced with conventional Internet directory deployment. Interestingly, a leading directory market research firm (e.g., the Burton Group) has estimated that a typical enterprise directory might take a year to deploy and cost up to $2 Million.
The LightWeight Directory Access Protocol (LDAP) is a standard directory protocol that can be used to establish a universal addressing scheme. However, the complexity of deploying LDAP alone is a drawback holding back the development of such an addressing scheme as discussed below. LDAP is an open Internet standard addressing scheme for accessing directories that has been adopted by the Internet Engineering Task Force (IETF) standards regulation organization as well as by leading developers in the computing industry. Generally, LDAP is a type of Internet directory service based on the International Telecommunications Union (ITU) X.500 series of recommendations, and which facilitates property-based information retrieval by using one or more Internet transports as a native means for establishing communication between client and server computers. In particular, LDAP is an object-oriented protocol enabling a client to send a message to a server and to receive a response. The server typically maintains a directory of object entries, and the message sent from the client can request that the server add an object entry to the directory. Those skilled in the art will recognize that adding an object to a directory is accomplished by instantiating the object. The data model associated with LDAP includes entries, each of which has information (e.g., attributes) pertaining to an object. The entries can be represented by a hierarchical tree structure. A third version of LDAP known by those skilled in the art to be defined in RFC 2251.
Although LDAP can be used to enable queries and updates to be made to a directory structure, the LDAP implementation alone does not and has not conventionally provided a reliable and scaleable enterprise directory primarily because recursive inquiries are required to accommodate the disparate syntax and semantics used by various database providers. The recursive inquiries involve re-synchronizing information existing in unrelated data sources on an ongoing basis due to the incompatibilities introduced by the disparate data models of each data source. Furthermore, as the number of records in the relational table increases, the need for additional recursive inquiries impedes the reliability, efficiency and scalability of the directory.
In order to take advantage of the features of an LDAP directory, this directory must be first created and populated. Since most of the data that would become the source for this directory resides essentially in RDBMS, the complexity of converting the relational data model to the hierarchical data model is problematic. Conventional directory technology can be built on top of an RDBMS engine, but the internal logic and data model of an LDAP directory is so different from an RDBMS, that this conversion is always required. The internal logic of the RDBMS is typically irrelevant from the perspective of the directory, since the entire schema and organization of the directory is based on LDAP, which is modeled as an object-oriented database with inheritance, object class, attributes, and entries. This difference in data representation and data model is problematic because it forces the directory-implementer through a complex and lengthy data modeling and conversion effort. For example, in conventional directory implementations, the data that resides in the RDBMS must be extracted, and converted into a different information model and format (e.g., LDIF as is known in the art) as an intermediate form, and then imported into an LDAP-based directory. To maintain current information in the directory, this process must be repeated on a regular basis, which brings about re-synchronization.
There are other problems associated with this conventional process. First, translating RDBMS logic into an LDAP-based directory is not a lossless process. For example, data types commonly used by RDBMS applications do not exist in the LDAP model. Such data types include, but are not limited to, date and floating-number fields. Some requirements from LDAP do not correspond an exact translation in RDBMS, like for instance, multivalue attributes. Additionally, the lack of transaction support afforded by LDAP directories means that the success of between “batched import” are not always guaranteed.
The LDAP directories are based on a domain- and attribute-oriented data model, while RDBMS are based on an entity- and relationship-oriented data model. From a theoretical perspective, it can be shown that the two models are equivalent in expressiveness as is understood by those skilled in the art of data modeling. For example, one piece of information represented in one model may be translated without loss into the other model. However, conventional directory implementations have not successfully realized a full implementation of the features of the domain and attribute data model, hence, destroying the possibility for lossless automatic translation from one data model to another.
The consequence of having mismatched data models also results in lengthy and costly deployment for an essential infrastructure function. Nevertheless, LDAP is beneficial for several reasons. For example, LDAP is well-suited for use with directories, as compared to databases, particularly for enabling ubiquitous look-up over a network. Also, the LDAP API is also supported by many conventional client computers having, for example, email or web browser functionality, that virtually any user connected to a network may gain access to directories given the appropriate security clearance. Although the database access API structured query language (SQL) provides rich access capabilities when the data is needed locally, it alone inadequately provides secure data access over a network. In order to provide network access to database data, application programmers must use vendor-specific software drivers to enable secure data access over a network.
Accordingly, there is a need for the deployment of Internet directory services that follows a simpler and more flexible approach with consideration that a significant hurdle to overcome entails the mismatch between the hierarchical data structure of a directory and the more complex relational data models supported by the databases that house the data needed for the directory. What is needed is a way to unite “back office” applications (i.e., those applications distinctive to an enterprise and its corresponding proprietary syntax, semantics, logical information modeling, physical data modeling and other mechanisms) so as to seamlessly gain access to data from these divergent sources, and to integrate the data for value-added applications over computer networks outside each of the specific enterprises. Additionally, it is desirable to provide directory-enabled applications that rely upon a model of centralized administration. By doing so, the directory-enabled applications would allow the inclusion of richer, more complex data and data relationships in the directory than has been conventionally known. It would be beneficial if there were a standard addressing scheme for indexing each data record on the Net. With such a universal addressing scheme, a finer level of granularity of data addressing and management can be achieved, thereby enabling end-users improved access to data content.
A computer system having a hierarchical/relational translation system is provided for enabling information from unrelated heterogeneous relational computing systems to be accessed, navigated, searched, browsed, and shared over hierarchical computing systems. In one embodiment of the present invention, the relational computing system comprises unrelated heterogeneous relational databases, and the hierarchical computing system comprises a client computer coupled to a communications network. In the same embodiment, the hierarchical/relational translation system includes a virtual directory server for capturing information in the nature of relational database schema and metadata, and for communicating with the client application over the network.
The hierarchical/relational translation system of present invention includes a method for bridging the mismatched and disparate data models used by the database and hierarchical-directory worlds. The method includes accessing and capturing the database schema and metadata from various relational databases. The captured schema and metadata are then translated into virtual directories that are universally compatible with standard communication protocols used with hierarchical computing systems. To do so, the method includes mapping relational database objects and logical relationships to virtual directory entries that are configured to communicate all aspects of the virtual directory structure over the network to the client application.
In the described embodiments, users can search and/or browse the virtual directory to find the data needed or they can query the directory with simple commands to search for the information needed. The present invention also enables the ability to select either default or customized views of the virtual directory.
In accordance with one aspect of the present invention, a standard addressing schema is provided to enable customizable access to relevant views of relational computing systems. In one embodiment of the present invention, the virtual directory server provides the standard accessing schema in the nature of an Information Resource Locator (IRL). The IRL is defined to mean an LDAP URL and is used as an address locator for any type of data record. In particular, the IRL enables data to be indexed and addressed through an industry standard representation by the hierarchical computing system. Thus, the system of the present invention provides access to all data through the Internet in a logical and powerful manner.
Another aspect of the present invention comprises distributing the information on the virtual directory server to the hierarchical computing systems with an industry standard communication scheme. With this standard communication scheme used to address data, mission critical databases can be unlocked for a variety of uses. The data can be used to drive e-commerce and e-business applications, thereby being opened for use to far more people than with conventional client-server techniques, while at the same time maintaining proper access control levels. Accordingly, a method is provided for translating the address of any structured data into the structured format of the industry standard representation. In one embodiment of the present invention, an Internet standard known as the Lightweight Directory Access Protocol (LDAP) is used.
With the same embodiment, the present invention is designed to map structured data into an LDAP URL in order to provide an Internet address for data records. In particular, structured data indexes are stored in a virtual directory of information (VDI) and are expressed using an LDAP address, which can be presented as a directory for use by end-users (users). By associating an address for each data record using an industry standard method, the present invention enables individual data records to be accessed over the Internet using a directory environment that users will already be familiar with. The VDI organizes an index of the data records into a directory, and the directory provides a logical organization of the repository of data records. In particular, the data records comprise the address location of the particular records. With the address of a specific data record, a user can locate a very specific piece of information, for example, a sales total, an inventory level, or a price point. In accordance with the present invention, this is beneficial because a virtual directory distribution system creates a new level of data access and granularity for locating and accessing data over networks.
According to another aspect of the present invention, the structured data indexes stored in a VDI and expressed using an LDAP address can be presented as a directory for use by other computers. When the data is referenced using a standardized address, other computer applications may use the data retrieved to drive a process or trigger an event. In accordance with the present invention, the data addresses can be routed for use by such computer applications. To this end, the present invention also introduces a system having a VDI “hub and router” which is used to combine data records located amongst disparate data sources for access in a virtually seamless and transparent manner to a user or computer application. The hub creates a consistent organization of the data records, and the router ensures the query is directed to the source data and back to the user or application invoking the query. Additionally, because the data address are expressed using the industry standard LDAP, multiple VDI hub and router combinations can be deployed within single or multiple enterprises and linked together.
The virtual directory of information organizes an index of data records. According to one aspect of the present invention, a virtual directory server enables the dynamic reconfiguration of a virtual directory information tree and associated content. The dynamic reconfiguration is advantageous because it removes the necessity to replicate database data into the virtual directory. With dynamic reconfiguration, the routing of queries to extract database schema in the source database is returned back to the user or application making the query. In one embodiment of the present invention, the routing of the data records can be implemented automatically through a computer program. In an alternative embodiment, the routing of the data records can be implemented on demand from an end-user.
Another advantage of the present invention is that directory deployment is neither costly nor complicated as with conventional techniques.
In accordance with the present invention, several embodiments for presenting the data records of the virtual directory server are disclosed. In one embodiment, the virtual directory is displayed using a browser format. For example, the virtual directory may be presented to a client application as part of a Windows Explorer page. In another embodiment, the virtual directory is displayed using an electronic mail format at a client application. Still, in another embodiment, the virtual directory is presented over a wireless medium and through portable devices.
Advantages of the invention will be set forth in part in the description which follows and in part will be apparent from the description or may be learned by practice of the invention. The objects and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims and equivalents.
The teachings of the present invention can be readily understood by considering the following detailed description in conjunction with the accompanying drawings.
FIGS. 33A-D are exemplary diagrams of the link mechanism utilized for various purposes in accordance with the present invention.
The figures depict a preferred embodiment of the present invention for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the invention described herein.
A system, method, computer medium and other embodiments for locating, extracting and transforming data from unrelated sources of information into an integrated format that may be universally addressed over network systems are described. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one skilled in the art that the invention can be practiced without these specific details. In other instances, structures and devices are shown in block diagram form in order to avoid obscuring the invention.
Reference in the specification to “one embodiment” or to “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiments is included in at least one embodiment of the invention. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
Some portions of the detailed description that follows are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps (instructions) leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical, magnetic or optical signals capable of being stored, transferred, combined, compared and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. Furthermore, it has also proven convenient at times, to refer to certain arrangements of steps requiring physical manipulations of physical quantities as (modules) code devices, without loss of generality.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system memories or registers or other such information storage, transmission or display devices.
One aspect of the present invention includes an embodiment of the process steps and instructions described herein in the form of a computer program. Alternatively, the process steps and instructions of the present invention could be embodied in firmware or hardware, and when embodied in software, could be downloaded to reside on and be operated from different platforms used by real time network operating systems.
The present invention also relates to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, application specific integrated circuits (ASICs), or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus. Furthermore, the computers referred to in the specification may include a single processor or may be architectures employing multiple processor designs for increased computing capability.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general-purpose systems may also be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any references below to specific languages are provided for disclosure of enablement and best mode of the present invention.
Moreover, the present invention is claimed below as operating on or working in conjunction with an information system. Such an information system as claimed may be the entire information system for providing a virtual directory of information as detailed below in the described embodiments or only portions of such a system. For example, the present invention can operate with an information system that need only be a communications network in the simplest sense to catalog information. At the other extreme, the present invention can operate with an information system that locates, extracts and transforms data from a variety of unrelated relational network data sources into a hierarchical network data model through the dynamic reconfiguration of the Directory Information Tree (DIT) and contents without the necessity of replicating information from the relational data sources into the virtual directory as detailed below in the described embodiments or only portions of such a system. Thus, the present invention is capable of operating with any information system from those with minimal functionality, to those providing all of the functionality disclosed herein.
Reference will now be made in detail to several embodiments of the present invention, examples of which are illustrated in the accompanying drawings. Wherever practicable, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
Bridging the Gap Between Databases Versus Directories with Virtual Directories
There is an ongoing debate regarding the differences between databases and directories. Accordingly, the differences between directories and databases are now discussed so as to clarify how the virtual directories of the present invention bridges the gap between them.
A. Comparison of Databases and Directories
There exists an ongoing debate that directories are best-suited for applications whose data is stable and that require information to be read quickly and frequently but written slowly and infrequently. This particular view contends that conventional Relational DataBase Management Systems (RDBMS) technology does not yield adequate speed and performance results for such applications. Instead, it is believed by some that in cases where information is rewritten frequently, and where relational data hierarchies and an object model are necessary, databases are best-suited to the task. Consideration of the above-mentioned opinion regarding the correct use of directories must be viewed in its appropriate context, namely where databases are intended only for the storage of very specific types of information that must be propelled by a different kind of engine, which is typically proprietary. This reasoning is based on the assumption that because the directory data is not “relational,” RDBMS technology is inappropriate as an engine. Although the usage of directories has been conventionally restricted to a limited type of processing, the present inventors have realized that directories can be considered to be a special case database.
Additionally, such conventional assumptions may not be entirely accurate. Although speed and performance benefits associated with directories are highly attractive features of directories, there are a few situations that contradict the conventional view of choosing RDBMS technology versus directory technology for specific purposes. To say that directories excel in areas where it is obvious that databases do a fine job is misleading. A couple of arguments have been made regarding: (1) the ability of directories to out-perform relational databases; and (2) the specific abilities of directories to be beneficial over databases when data is predominantly read-oriented. However, neither of these arguments appears to be credible upon close scrutiny for the following reasons.
First, regarding relational databases, performance is virtually the highest priority. For example, those in doubt of performance being of highest priority need only review the amount of time database vendors spend on TPC benchmarks in attempting to woo customers by proving split-second differences in performance over the competition.
Second, the argument for better treatment of read-only data does a disservice to database vendors. Business-critical applications deployed in separate enterprises around the world rely upon responses at sub-second precision to read-only database queries; therefore, to suggest that a directory could better serve the need for very quick access of data is misleading. Additionally, if it were the case that directories could better serve the need for quick access of data, then application architects would have turned to directories many years ago in their quest to constantly provide better performing applications for end-users. A high read-to-write ratio is certainly a valid justification for the use of directory technology. However, if there actually is a tradeoff between the read-to-write ratio and performance, then enterprises that use RDBMS technology to create a database with information that changes hundreds of times per day and that is read millions of times per minute, would have supplanted RDBMS technology with the directory technology. Instead, the fastest and most heavily-used information-distribution systems presently are based on RDBMS technology.
The hierarchical nature of the directory provides another aspect in which to differentiate directories (i.e., application programs or software packages) from databases. For example, the directory hierarchy allows users and applications (i.e., application programs or software packages) to discover the relationships between directory objects as they progress further into the directory structure. Generally, the architecture of the directory is self-disclosing. This means that each object clearly shows the relationship between its parents above in the hierarchy, and its children below in the hierarchy. By comparison, the objects in a relational database can have a much more complex web of interactions, although they are hidden from view. All logical relationships in a relational database are implicit and cannot be viewed by those who do not have any previous knowledge of the database schema.
The high read-to-write ratio and the hierarchical self-disclosing criteria make directories an ideal mechanism for sharing data across a network, including those embodiments where the network comprises the Internet. When business partners share data, they do not necessarily know the intricacies of each other's database environments and may hot have access to the appropriate third party software driver to access a database. Problems arise when the data being shared falls outside of the bounds of what is traditionally considered appropriate for storage in a directory. Conventionally, directories have been thought of as a source for relatively static data. This thought comes from problems associated with synchronization and replication between the unrelated sources of the relational data and the directory. Furthermore, source data is often stored in the core operational databases used by the enterprise. This data is extracted and copied into the directory using a utility application called LDAP Data Interchange Format (LDIF). When directories are populated in this way on a nightly, or even weekly basis, the value of the data diminishes the older it becomes.
The need for hierarchies, an object model, and some form of inheritance in LDAP justify the use of an object-oriented relational database system for the purposes of data storage and access. However, this justification for relational databases is contradicted by products that rely on both hierarchical and relational aspects, such as, for example: Oracle Internet Directory (OID), IBM SecureWay, and Microsoft Active Directory, which are implemented on top of Oracle 8i, IBM DB/2, and the Microsoft Jet database engine, respectively. Accordingly, there is support that the notion of a flat data hierarchy being a guarantee of maximum directory performance is not entirely valid since the fact that these proprietary directory technologies use a relational engine implies that relationships are just as important in a directory, as they are in a database.
B. The Role of Directories Abstracting Information From Databases
Based upon the above discussion, a conclusion might be drawn that because RDBMS technology offers power and speed and because a directory can be implemented on top of an RDBMS, there is no difference between the two technologies. However, directories and relational databases are not interchangeable.
The relational model is defined to mean a set of logical concepts, and, as such, is true or false in the limit of its definitions. A relational view is a virtual relation derived from base relations by applying relational algebraic operations. This requires selecting one or more tables that are stored in a database, and combining the tables using any valid sequence of relational operations to obtain a view. Examples of relational operations include selection, projection, join, etc. . . . The result of applying the relational operations typically embody a table having properties of relational algebra. A view is defined to mean a result of a series of relational operations performed on one or more tables. Accordingly, a view can be the result of very complex operations. For example, a view can be established from a series of join operations followed by a projection operation. Additionally, a view can be characterized as a “virtual” table, meaning that the view is a “derived” table as opposed to being a “base” table.
There is a need for data abstraction because even though a directory can be implemented on top of an RDBMS, an RDBMS cannot take the place of a directory. Even in the situation when the RDBMS is used as the engine for a directory, the RDBMS must be programmed to provide a set of services that are characteristic of a directory. Directories have their own value, that is, they are ubiquitous in all sorts of applications such as email and groupware, network operating systems, and centralized Internet directories. Besides the significant difference between databases and directories being that directories support a ubiquitous Internet access standard, directories also have the ability to provide a self-disclosing schema. Although this look-up and discovery specialty distinctive to directories may sound minor to database adherents, it provides critical features that cannot be matched by relational databases.
Furthermore, many types of RDBMS technology conventionally use a data dictionary and a data catalog of some sort. The data dictionary comprises a directory of tables and their component fields, while the data catalog is a summarized abstract of a database's content. It is often the case in distributed computing that each enterprise has many disparate databases, each with its own directory. It thus remains a challenge as to how all of this information can be managed so as to facilitate analytical business processes without the need to abstract the information across all of these databases.
Directories provide a type of data-abstraction mechanism by acting as a central point for data management. Each database's data dictionary and data catalog are useful tools for managing and abstracting its data. Although each database can have its own internal directories, this does not change the fact that an enterprise-wide directory requires the implementation of a specific set of services that are directory-specific. Accordingly, a summary layer would be advantageous in providing the level of abstraction needed to maximize the productivity of data-storage and information-analysis activities across disparate databases at least at the enterprise level.
C. Using the Directory as a Tool to Manage Information Aggregation amongst Databases Having the Same Implicit Scope
A directory can help to manage the scope of diverse information and to facilitate the search for information via the abstraction of aggregated data. There are at least two significant ways to use a directory, namely for searching and browsing, each of which will now be discussed as having a strong and distinct relationship with the way that users access for information and with the access paths that are used to obtain the data that is needed.
With the model of searching, the user either knows precisely or can ascertain via the use of attributes and keywords the item of interest. With either technique, the user generally provides a filter to find a specific object that meets the particular criteria by searching according to attributes. This approach provides a pattern of direct access to data and favors a flat hierarchy, an example of which is the White Pages.
With the model of browsing, the user has an approximate idea of the item of interest based on a broader criterion of the relationships between different types of information. This in turn facilitates category- and taxonomy-based navigation, which can be conveniently described as searching according to relationships. This approach provides a pattern of indirect access to data and favors a complex hierarchy with well-defined relationships between objects. A corresponding data structure allows the creation of a set of views that facilitates navigation, such as a categorized list driven by relationships between objects, an example of which is the Yellow Pages.
In general, directories can support information retrieval in an easy manner because the scope of an RDBMS is limited to objects therewithin. Metadata is not included, which is why data dictionaries and data catalogs are so heavily used for this purpose. Considering the many distributed systems and different information models used in databases, the maintenance of these varying scopes of information becomes unwieldy without a repository of “supertools” to aggregate data. In particular, a directory can be used to manage a group of databases, each pertaining to a different scope of information and containing different objects with unique definitions. When the objects in each database have commonality despite their differing granularity and information focus, directories can help facilitate information retrieval across an enterprise.
A directory is a system that can reconcile the divergent scope of information amongst unrelated databases. Directory technology provides an easy way to solve the problem of how to integrate fragmented information, that is, information spread amongst individual databases each having a narrow scope of content. As will be described in greater detail herein, the present invention provides a method to enumerate objects and their attributes, to build relationships and taxonomies based on this enumeration, and to aggregate data according to principles of generalization and specialization. While database technology uses container aggregation, in which an object is defined according to what it contains or includes rather than by categories and supercategories into which its component attributes can be classified, the data can be organized into a hierarchical model with change made to the semantics. The directory is a hierarchical model that is well-suited for aggregating relational-hierarchy. As will become evident in the description to follow, when information is retrieved either by searching or browsing a directory according to relationships, the relationships between objects in a directory become meaningful.
D. Defining and Modeling Virtual Directories
Although a search by attribute in a flat directory structure by convention works well, a search by relationship typically is problematic for the reasons already described. To overcome this hurdle, one aspect of the present invention involves mapping relationships that have already been defined within existing databases into a centralized set of hierarchical access paths that permit search and navigation. As such, the virtual directories described herein provide an alternative to large-scale data extraction and aggregation that supports both the search and browse usage models.
An aspect in accordance with the present invention directed towards the search model enables one-to-one relationships supported by a set of pointers to individual objects in the schema. This particular implementation is well-suited for a flat data hierarchy. Another aspect of the present invention which is directed towards the browse model translates the one-to-one object relationships into two hierarchies. Doing so results in mapping rules being straightforward, so that existing relationships can be used to construct an access path to the individual database objects. Additionally, the translation of objects accounts for the fact that relationships between objects cannot be duplicated in a flat data structure, which in turn can result in valuable context, that provide the ability to access different views, being lost.
It thus follows that the virtual directories of the present invention use schema-based data extraction to create a hierarchical object model. One benefit of this approach is that information does not need to be extracted, aggregated and synchronized with existing data sources on an ongoing basis, as compared with conventional approaches.
E. Illustrating the Benefits of Virtual Directories
To further clarify the benefits of the virtual directories in accordance with the present invention, an example will now be discussed. An enterprise software company uses: (1) an accounting software package to track customer and vendor receivables and payables; and (2) a sales support software package to track purchases by existing customers, prospective customers and their needs, and sales volume. The accounting package contains tables representing customers and vendors. The sales support package contains tables representing existing customers, potential customers, and sales representatives. Customers whose information is stored in the accounting package are tracked by their payment; however, the customers whose information is stored in the sales support package are tracked by their purchase history. The company's sales representatives have a need to access data on existing customers' overall expenditures in order to determine what level of pricing is compatible with their financial needs, and additionally to determine their credit-worthiness.
To perform this analysis, the representatives require the ability to quickly check the customer views in both the accounting package and their own sales support package. Because the customer records in each database contain different data types and are therefore not totally reconcilable, the representatives are best-served by a method of data access that allows them to navigate across schemas through directory layers in order to quickly check both views.
In accordance with the virtual directory server of the present invention, there is provided a method to access customer data stored in both databases. The virtual directory establishes a link between the two types of customer records and aggregates their data without changing the view. The aggregated records in the virtual directory constitute a “supercategory” of customers, which automates the process of searching for information in both source databases, and provides a unique way to index and address the data. In particular, the link between the two types of customer records is an ad hoc join. Using a standard Application Programming Interface (API) facilitates the mapping that allows navigation between the two unrelated databases. More importantly, the same mechanism is able to operate on different schema to aggregate data and to provide a simple way to deliver a choice of views. As subsequently described, one embodiment of the API that is well-suited for these purposes is LDAP.
The use of virtual directories in accordance with the present invention also offers advantages to directory administrators. These advantages are best appreciated by discussing how the VDS 408 solves many common problems being experienced by administrators deploying LDAP directories. For example, data replication and synchronization issues are eliminated with the VDS. Furthermore, the VDS enables dynamic reconfiguration of the LDAP namespace and schema. With the VDS, rapid deployment of LDAP namespaces can be established. Also, the VDS provides unlimited extensibility to existing LDAP structures.
In accordance with the present invention, the VDS eliminates data replication and synchronization issues by not requiring that any data be held within the directory itself. Requests from LDAP clients return live data from the authoritative source, so that the VDS handles schema transformation automatically. This is contrasted with conventional LDAP directories which require data to be extracted from the authoritative source of the information and transformed into a format matching the LDAP schema of the directory. With past methods, the data had to be loaded into the directory using LDIF on a periodic basis, and in order to maintain current information in the directory, this process must be repeated on a regular basis.
In one aspect of the present invention, the VDS enables dynamic LDAP namespace configuration by separating the data structure mapping and LDAP namespace creation into two distinct processes. More details about this process are described subsequently. Furthermore, relationships in back-end databases are initially mapped into the VDS server 408 using an automated database schema discovery mechanism. LDAP namespace hierarchies are then built on top of this mapping. As new LDAP attributes and objects are required in the namespace, they can be added using an interface that will be described subsequently as the DirectoryView Designer™ interface and corresponding module. The interface includes a familiar point-and-click control input enabling changes to the directory structure to take effect immediately.
Having mapped one or more relational database structures into the VDS, multiple directory hierarchies can be created based on the same data mapping to provide rapid LDAP namespace deployment. This enables the instantaneous deployment of new directory namespace structures, as the need arises. Unlike traditional LDAP implementations, where a new mapping requires either a redesign of the existing directory or a new directory structure, the present invention enables directory administrators to respond immediately to new application requests for directory data.
The VDS provides unlimited LDAP extensibility to any existing LDAP directory implementation using the object referral mechanism. Object referral allows one LDAP directory to make reference to another LDAP directory when clients request objects or attributes that are not stored in the primary directory. Using object referral, the VDS enables the extension of an existing LDAP structure without the necessity for directory redesign. With the present invention, objects and attributes can be added to an existing directory structure quickly to accommodate the changing needs of the client applications.
There are several advantages that the virtual directory server of the present invention provides to an application architect. As will be discussed in further detail below, the VDS provides an innovative way of addressing legacy application databases. For example, the VDS provides a single, industry standard API to all database data. Additionally, the VDS enables the aggregation of data from diverse heterogeneous databases. Also, the VDS allows the rapid deployment of collaborative business-to-business (B2B) applications. Finally, the VDS enables business processes to move into the network.
The VDS provides a single industry standard API by using an LDAP proxy layer to access one or more heterogeneous relational databases. Doing so allows application developers to use a single, open standard API to access any relational data source. The VDS provides a self-describing schema eliminating the need for application developers and users to understand the internal organization of each relational database being accessed. As users navigate through successive levels in the virtual directory structure, context is retained from one level to the next. This combination of a single API, self-describing schema, and the preservation of context dramatically simplifies database navigation for both application programmers and end users.
The VDS provides aggregate data from unrelated heterogeneous databases. As will be discussed herein, the term “unrelated” is defined to mean proprietary ownership stemming from various vendors, and the term “heterogeneous” is defined to mean diverse scope of content and/or context. The DirectoryView Designer™ interface is used to construct the objects in the virtual directory tree structure. Each object can represent a call to a relational database system table or view. By using container objects, that is, objects that do nothing themselves but contain references to other objects, a group of calls to related and/or unrelated heterogeneous databases that contain related data can be aggregated.
The VDS allows rapid deployment of collaborative B2B applications. The DirectoryView Designer™ interface is used to construct customized views of data in the field of corporate relational databases. The deployment of customized views is fast and simple, and does not require a great deal of technical sophistication. This means that business users can utilize the present invention to deploy customized views of real-time operational data as the needs of business partners arise. Additionally, role-based security provides for very granular authorization to view objects, assuring complete confidentiality to business partners accessing data over the network, like for example, the Internet. Business partners also have the flexibility to use customized LDAP applications and/or a plug-in (e.g., SmartBrowser™ application) to a web browser, like the Internet Explorer or Netscape Navigator.
The VDS enables business processes to move into the network. The relationship between tables in a relational database system enumerate the business processes acting upon the corporate data and together build an interrelated sequence of hierarchical connections. These hierarchical connections represent how the work of the business is done. In accordance with the present invention, the VDS enables the enumeration of these business processes to be moved out of the proprietary bounds of each unique database management system and into the network where they can be operated upon by the individuals and applications that can make best use of them.
Virtual Directory System Overview
Referring now to the high-level block diagram of
By contrast, relational computing system 106 provides the unrelated heterogeneous sources of information, which can be based upon simple to more complex network data relational models that house the data but not necessarily the corresponding relationships amongst the data. Instead of relationships becoming inherently a part of the structure of system 106, logical relationships are represented by primary key matches that are connected as needed according to various relational operations. To this extent, the structure of relational computing system 106 alone typically lacks a pre-established path of navigation, unlike hierarchical computing system 102. In the hierarchical system 102, the paths are explicit, thereby allowing navigation and data discovery to be generally simple because up-front knowledge about particulars paths are not required. By contrast, relational computing system 106 includes implicit paths, which are dynamic in nature. This means that there is higher flexibility in terms of path navigation and information discovery, but requires knowledge about the objects and relationships (i.e., schema) in advance. Moreover, for clarity, further references made to “relationships” in the context of relational computing system 106 and corresponding embodiments disclosed shall refer to the “logical relationships.”
In between systems 102 and 106, hierarchical/relational translation system 104 bridges the mismatch in data models between the hierarchical data structures in system 102 and the relational data structures in system 106. In general, system 104 provides the mapping from relational to hierarchical systems so that data may be shared across systems, and between unrelated sources of relational information. In doing so, translation system 104 allows the explicit definition of implicit relationships inherent to the relational computing system 106. The information within the relational computing system 106 can then be navigated and discovered in a manner that is substantially similar to navigating and discovering information in the hierarchical computing system 102.
Reference is now made to
Alternatively, virtual directory 408 can be implemented as a separate server computer from server 406. Accordingly, reference is made to an alternative embodiment for VDS 408 when implemented as a separate physical server from server 406.
One embodiment of network 404 in accordance with the present invention includes the Internet. However, it will be appreciated by those skilled in the art that the present invention works suitably-well with a wide variety of computer networks over numerous topologies, so long as network 404 connects the distributed user stations 402 to server 406. It is noted that the present invention is not limited by the type of physical connections that client and server devices make to attach to the network. Thus, to the extent the discussion herein identifies a particular type of network, such description is purely illustrative and is not intended to limit the applicability of the present invention to a specific type of network. For example, other public or private communication networks that can be used for network 404 include Local Area Networks (LANs), Wide Area Networks (WANs), intranets, extranets, Virtual Private Networks (VPNs), and wireless networks (i.e., with the appropriate wireless interfaces as known in the industry substituted for the hard-wired communication links). Generally, these types of communication networks can in turn be communicatively coupled to other networks comprising storage devices, server computers, databases, and client computers that are communicatively coupled to other computers and storage devices.
Client 402 and server 406 may beneficially utilize the present invention, and may contain an embodiment of the process steps and modules of the present invention in the form of a computer program. Alternatively, the process steps and modules of the present invention could be embodied in firmware, or hardware, and when embodied in software, could be downloaded to reside on and be operated from different platforms used by real time network operating systems.
A. Exemplary Embodiment for Client Computer
Each user at client 402 works with system 100 b to seamlessly access server 406 through network 404. Referring now to the block diagram of
Control unit 1702 may comprise an arithmetic logic unit, a microprocessor, a general purpose computer, a personal digital assistant or some other information appliance equipped to provide electronic display signals to display device 1704. In one embodiment, control unit 1702 comprises a general purpose computer having a graphical user interface, which may be generated by, for example, a program written in the Java language running on top of an operating system like the WINDOWS® or UNIX® based operating systems. In the embodiment of
It should be apparent to those skilled in the art that control unit 1702 may include more or less components than those shown in
Also shown in
CPU 1716 processes data signals and may comprise various computing architectures including a complex instruction set computer (CISC) architecture, a reduced instruction set computer (RISC) architecture, or an architecture implementing a combination of instruction sets. Although only a single CPU is shown in
Main memory unit 1718 can generally store instructions and data that may be executed by CPU 1716.
Data storage device 1720 stores data and instructions for CPU 1716 and may comprise one or more devices including a hard disk drive, a floppy disk drive, a CD-ROM device, a DVD-ROM device, a DVD-RAM device, a DVD-RW device, a flash memory device, or some other mass storage device known in the art.
System bus 1714 represents a shared bus for communicating information and data through control unit 1702. System bus 1714 may represent one or more buses including an industry standard architecture (ISA) bus, a peripheral component interconnect (PCI) bus, a universal serial bus (USB), or some other bus known in the art to provide similar functionality.
Additional components coupled to control unit 1702 through system bus 1714 will now be described, and which include display device 1704, a keyboard 1706, a control input device 1708, a network controller 1710, and an I/O device 1712. Display device 1704 represents any device equipped to display electronic images and data as described herein. Display device 1704 may be a cathode ray tube (CRT), a liquid crystal display (LCD), or any other similarly equipped display device, screen or monitor. As will be described subsequently with respect to other embodiments of the client computer, display device can be the touch panel LCD screen of a Personal Digital Assistant (PDA) or the LCD screen of a portable hand held device like a cellular phone.
Keyboard 1706 represents an alpha-numeric input device coupled to control unit 1702 to communicate information and command selections to CPU 1716. Control input device 1708 represents a user input device equipped to communicate positional data as well as command selections to CPU 1716. Control input device 1716 may include a mouse, a trackball, a stylus, a pen, a touch screen, cursor direction keys, joystick, touchpad, or other mechanisms to cause movement of a cursor. Network controller 1710 links control unit 1702 to network 404 and may include network I/O adapters for enabling connection to multiple processing systems. The network of processing systems may comprise a LAN, WAN, and any other interconnected data path across which multiple devices may communicate.
One or more input/output devices 1712 are coupled to system bus 1714. For example, I/O device 1712 could be an audio device equipped to receive audio input and transmit audio output. Audio input may be received through various devices including a microphone within I/O device 1712 and network controller 1710. Similarly, audio output may originate from various devices including CPU 1716 and network controller 1710. In one embodiment, I/O device 1712 is a general purpose audio add-in expansion card designed for use within a general purpose computer. Optionally, I/O device 1712 may contain one or more analog-to-digital or digital-to-analog converters, and/or one or more digital signal processors to facilitate audio processing.
B. Exemplary Embodiments for Database
Database 106 b represents any relational database system table or view. Preferably, any OLE DB, ODBC, or JDBC compliant database is well-suited to work with the present invention. Although a single database 106 is shown in
C. Exemplary Embodiment for Server Computer
Referring now to the block diagrams of
For convenience and ease of understanding the present invention, similar components used in both the client computer 402 (of
Input device 1014 represents, primarily for convenience, the functional combination of devices for receiving control input, keyboard input of data, and I/O input. As such, the block diagram for input device 1014 in
System bus 1016 represents a shared bus for communicating information and data through hierarchical/relational translation system 104 c. System bus 1714 may represent one or more buses including an industry standard architecture (ISA) bus, a peripheral component interconnect (PCI) bus, a universal serial bus (USB), or some other bus known in the art to provide similar functionality.
Referring now to
The memory unit 1012 may also include one or more other application programs 1070 including, without limitation, word processing applications, electronic mail applications, and spreadsheet applications.
In accordance with the present invention, network 404 enables the communication between multiple components of server 406 and client 402, as well as other devices, which may or may not be co-located, but may be distributed for convenience, security or other reasons. To facilitate the communication between client 402 and server 404, a client-server computer network operating system (NOS) may be used for operating system 1050 to manage network resources. An NOS can manage multiple inputs or requests concurrently and may provide the security necessary in a multi-user environment. Operating system 1050 can include, for example, a NOS of conventional type such as a WINDOWS® NT/2000, and UNIX® used with the Microsystem SOLARIS® computing environment. Another conventional type of operating system that may be used with the present invention includes LINUX( ) based operating systems.
The virtual directory server (VDS) application 1054 is a procedure or routines that control the processing unit 1010 preferably at run-time on server 406. VDS application 1054 represents server 408 in that embodiment where server 406 hosts VDS 408. Alternatively, VDS application 1054 runs on a separate server similar to server 406 where VDS 408 is embodied as a physical server. Although only a single VDS application 1054 is shown in memory unit 1012 of
In one embodiment, system 100 b includes the VDS application 1054 along with six modules of software according to the present invention. These six modules are described below as the first module 1058, second module 1060, third module 1056, fourth module 1062, fifth module 1064, and sixth module 1068. The first module 1058 is embodied as a program for extracting and defining schema from any relational data sources that can be reached using Object Linking and Embedding DataBase (OLE DB), Open DataBase Connectivity (ODBC), and/or Java DataBase Connectivity (JDBC) software drivers. The second module 1060 is a program that includes processes for building virtual directory definitions using an oriented path derived from a schema for relational data sources, and represented by a hierarchical sub-directory of objects in a Directory Information Tree (DIT) structure. The third module 1056 includes a program for enabling browsing of the contents at the client application corresponding to the directory view definitions. The fourth module 1062 includes a program for mapping relational objects, such as tables, columns, attributes, and logical relationships into an external (e.g., XML) format. The fifth module 1064 maps the entities described by the module 1062 into the hierarchical object classes and attributes, which in one embodiment can be for LDAP. The sixth module 1068 includes processes for managing system security using Group access rights, and access control lists for directory entries, which may be implemented by conventionally known techniques. Exemplary functions and implementation for the VDS application 1054, and the first, second, third, fourth, and fifth modules 1056-1064 are described below in more detail.
A particular embodiment for implementing system 100 b, provided only by way of example, will now be discussed with focus directed to a VDS application 1054 used on server 406 along with a six module, or six-tier Internet application implemented with the Microsoft Development Environment. In this section, more details about the function of application 1054 and the first through fifth modules 1058, 1060, 1056, 1062, and 1064 are discussed, follow by an explanation of a process for using these modules. To add further clarification to particular aspects of the present invention, reference will be made to the flow-charts of
A. Virtual Directory Server
Reference will now be made to the VDS 408 which is implemented with the virtual directory server (VDS) application 1054 of the present invention as shown in
In one embodiment of the present invention, the data source is a relational database 106 b which forms the authoritative source of directory information to be viewed with the VDS 408 in accordance with the present invention. For example, the database 106 b could be a PeopleSoft® application database having information in the nature of human resources. Alternatively, the database 106 b could be an Oracle® database having financial information. In accordance with one aspect of the present invention, the virtual directory server 408 should preferably support, as a source for the directory data, the use of any relational database that can be accessed using OLE DB, ODBC, or JDBC.
According to one aspect of the present invention, the VDS 408 does not eliminate the need for an enterprise directory. Rather, enterprise directories are an integral part of any network infrastructure, and the VDS 408 inter-operates with the enterprise directory to provide even more functionality to directory-enabled applications. Enterprise directories store information from a wide array of sources, including the network operating system (NOS), and are well-suited for hosting the NOS level of data. Instead of supplementing enterprise directories, the VDS 408 in accordance with the present invention enables access to enterprise data that reside in related and unrelated relational databases. As will be described further herein, the VDS 408 is beneficial because of its ability to provide information housed in relational databases to LDAP-enabled applications.
In accordance with another aspect of the present invention, the VDS does not eliminate the need for a metadirectory. Metadirectories consolidate the management of multiple applications and NOS directories, and are a valuable component of any network infrastructure. With one embodiment of the present invention, the VDS 408 provides an LDAP interface to data that already exists in the infrastructure of relational database 106 b of an enterprise. Utilizing the VDS 408 of the present invention with an enterprise metadirectory results in a faster directory infrastructure implementation and a more flexible directory design.
To further clarify aspects of the present invention, reference will contemporaneously be made to
As shown in the diagram of
Reference is now made to the flowchart of
Frequently, there will be situations where the user will want to modify the structure of the schema in the virtual directory. User input module 1400 in
Using the schema captured in the schema file, a second module 1060 is used to create 1104 a description 1812 of the directory views saved in another file, described herein as the directory view file having a .dvx file extension. For example, the creation 1104 of directory views from captured schemas indicated
Referring back to step 1306, instead of a label being created, the user can request that a container or content be created 1320. Accordingly, the first module 1058 accepts 1322 user selection of an Object from the corresponding schema previously selected. Furthermore, the user may select 1324 attributes to retain for each Object, and may define other restrictions. This will be subsequently discussed in further detail for one implementation utilizing the “where” clause. Thereafter, the second module 1060 generates 1326 all the information needed to build the SQL query. For example, such information can include the primary key, relationships with ancestors in the hierarchy, attributes to display, and restrictions, among others, as will be described in more detail later. Control then passes to step 1314, which has already been described.
Referring back to step 1104 of
Throughout the process described in
At this stage, the directory view is added to the VDS 408 and is accessible under the control of either the third module 1056, or the LDAP server application 1053 (as seen in
B. Schema Manager Application
The concepts and procedures for capturing database schema, and for analyzing and declaring missing attributes will now be discussed with focus being directed to a first module 1058, which is referred to interchangeably herein as the schema manager (application) 1058. The first module 1058 is referred to interchangeably herein as the schema manager 1058 for convenience. The schema manager 1058 is preferably a database schema software tool designed for extracting and capturing relational database metadata from a variety of relational databases 106 b that can be accessed with OLE DB, ODBC, and/or JDBC software drivers. One type of configuration that works suitably well with the present invention comprises encoding the captured schema with an Internet markup language like, for example, Extensible Mark-up Language (XML). Once the schema is formatted with XML, the encoded metadata is then stored in a schema file. For example, the schema file may be stored with an .orx file extension representing the Objects and Relationships expressed (e.g., encoded) in XML, primarily for convenience and ease of system administration.
Referring to the block diagram of
1. The Schema Manager Process
The schema manager application 1058 provides the following functionality: (1) capturing database schema; (2) declaring implicit relationships; and (3) creating default and derived views.
The schema manager 1058 captures 1802, 1102 database schema from multiple relational data sources, such as the Microsoft Access 1804, Microsoft SQL Server 1802, and Oracle 1808 servers, by way of example. Each of these servers is associated with it's own language, and its metadata can be exported 1802 to the schema manager 1058. Upon capturing this metadata, the schema manager 1058 encodes 1810 the database schema in a standard format, for example, XML, which is stored in a schema file with a .orx extension, as described herein. The schema manager also records the different database connections required, and as will be discussed subsequently in detail, manages the mapping of the captured schema to an LDAP schema.
The schema manager 1058 can also declare implicit relationships. After the schema is captured 1802, undocumented primary keys and relationships, that are implicit in the code but not appearing in the data dictionary, can be declared. Since logical relationships between the different tables are the primary support for constructing directory views 1104, it is important to declare any logical relationship not captured by the schema manager 1058.
Additionally, the schema manager 1058 provides the option of using a default view in place of constructing a view by using the second module 1060 (as will be described in the next sub-section). Derived views, which are views based on one attribute in a table (e.g., a postal code) can also be constructed using the schema manager 1058.
2. Using the Schema Manager Interface
When the schema file is opened, a graphical user interface (GUI) 1900 as shown in
The schema manager 1058 provides the information and resources to identify and to declare any relationships and primary keys that are not explicit in the database definition. The declaration process is a significant step because the declaration affects the quality of the directory views that will be created using the second module 1060. Any undeclared relationships or primary keys can result in a meaningless path or IRL, the consequence of which directly affects the quality or availability of information displayed using the third module 1056.
Commands available within the schema manager 1058 can be accessed in a variety of ways. For example, pull-down menus are available from the menu bar 1910 at the top of the interface 1900. After using a control input device to direct a cursor to click on a drop-down menu name, e.g., View 1912, a list of commands is displayed from which a selection can be made. Alternatively, schema manager 1058 can also provide command selection through the use of short-cut menus which are provided by the interface 1900. Referring to the particular embodiment of a user interface shown
3. The Schema Manager Basic Terms
Several definitions are introduced as follows to provide clarity and a foundation for the terms used and features described herein.
In a relational database, every table has a column or a combination of columns, known as the primary key of the table. These values uniquely identify each row in a table. At times, tables that were created in the database are found, but whose uniquely identifying column(s) were not documented in the system catalog as the primary key. Declaring implicit primary keys is one of the database refining processes that can be performed with the second module 1058. As seen in the interface of
By using the schema manager 1058, a display name, or alias, can be created for a the primary key. The display name allows the user browsing the directory to be shown more useful information. For example, if the primary key of the Customer table is CustID with an integer attribute type, then a list of numbers will be displayed in the directory tree at run time. Frequently, the user who created the directory will be the only person for whom those “numbers” have meaning. To avoid this situation, a display name could be created with the user's first name and last name in accordance with the present invention. Instead of the user seeing a “meaningless” number, the user will be able to discern a customer name that may suggest context and be significant to a larger audience. The display name is typically a combination of the primary key and one or more attributes. For example, the added attributes may be a user's first and last names. An example of a user interface 2000 is shown in
In order to evaluate missing relationships in the schema manager 1058, having a working knowledge of the underlying database application on which the schema is based is essential. Occasionally, the relationships between objects are not captured in the schema, for example, when some links are created implicitly. This means that the logical relationships may be present in the application, but are not recorded within the database dictionary (i.e., system catalog). Once relationships have been determined to be missing, these relationships can be declared from the schema manager 1058. One manner for doing so, for example, is with the Define Relationships command (i.e., button) 1932 of
A derived view results from queries made to the base table and/or VDS as discussed in the flowchart of
A default view represents a default namespace, and can be created to either be a flat or indexed namespace. An example of a user interface referred to herein as the Default Views (DVX) Generator 2200 shown in
By contrast, indexed views permit each record of the table to be an entry in the DIT. Referring to the user interface for the DVX Generator 2200 shown in
4. Using the Schema Manager
In accordance with the particular embodiment described, the discussion will now focus on the process for capturing the database schema, determining the validity of the schema captured, and creating default and derived views.
(a) Capture the Database Schema
A key function of the schema manager 1058 comprises capturing database schema. To describe one manner for performing this function, reference is now made to a block diagram of
To further illustrate the process of connecting the virtual directory server 408 to a database 1066 and selecting the database from which to capture schema from, reference will now be made to a user interface 2500 shown in
(b) Determining the Validity of the Schema Captured
Once the schema is captured preferably using the described process, the captured schema should be validated. Referring now to
To further illustrate the process of validating the schema that has been captured by the schema manager 1058, reference will now be made to an example of a user interface 1900 of
Still referring to
(i) Setting Relationships
Referring now to
To further illustrate the process of setting relationships by the schema manager 1058, reference will now be made to the particular embodiment of the user interface 2700 of
(ii) Declaring Primary Keys
Primary keys that are implicit, that is having not been captured in the schema, and undeclared in the data dictionary, will not be included in the directory view file (i.e., dvx file) unless specifically declared. It should be noted that primary keys should be declared before display names can be created.
To further illustrate the process of declaring and modifying primary keys using the schema manager 1058, reference will now be made to the particular embodiment of the user interface 2800 of
One exemplary process for declaring primary keys 1408 begins with selecting the Primary Keys command (i.e., button) 1940 from the toolbar 1930 shown in
(iii) Declaring Display Names
To further illustrate the process of declaring display names using the schema manager 1058, reference will now be made to the particular embodiment of the user interface 2900 of
One exemplary process for declaring display names begins with selecting the Display Name command (i.e., button) 1942 from the toolbar 1930 shown in
In this example, the Display Title will automatically become the default name for a container or content object when the corresponding table is accessed by the second module 1060. The Display Title will also appear as the name of the attribute to the left of the equal (=) symbol in the RDN. Referring to the example of
Alternatively, display names can be declared in the second module 1060. For example, when the display name “Employee Name” 2930 is selected using a control input cursor device as in
One exemplary process for deleting a display name will now be discussed. Referring back to
(iv) Editing Connection Strings
In order to further illustrate one exemplary process of editing connection strings using the schema manager 1058, reference will now be made to the particular embodiment of the user interface 3100 of
One exemplary process of editing connection strings begins with selecting the Edit the Connection String 1936 command (e.g., button) 1936 from the toolbar 1930 shown in
(c) Creating Derived and Default Views
(i) Creating Derived Views
To further illustrate the process of creating derived views using the schema manager 1058, reference will now be made to the particular embodiment of the user interface 3000 of
One exemplary process of creating derived views begins with selecting the Define Derived Views command (e.g., button) 1934 from the toolbar 1930 shown in
(ii) Creating Default Views
Referring to the block diagram of
In order to further illustrate an exemplary process for creating a default view using the schema manager 1058, reference will now be made to the particular embodiment of the user interface 2200 (DVX Generator dialog box) of
An exemplary process of creating default views begins with selecting the Tools drop-down menu 1918 and a command to Create Default View (not explicitly shown) nested therein. In response, the DVX Generator 2200 is invoked. To obtain the DVX generator dialog box 2200, several steps may need to be taken, including selecting the particular schema file (i.e., with the .orx extension) to be opened. But, once dialog box 2200 appears as shown in
C. DirectoryView Designer Application
Using the metadata from the schema manager application 1058, the second module 1060 (also referred to interchangeably herein as the DirectoryView Designer application 1060) builds the virtual directory definitions, which are useful for enterprises. The second module 1060 uses an oriented path derived from a database schema and represented by a hierarchical view of definition objects in a tree structure. The view definitions are stored in a directory view database, which is accessed and managed by the VDS. In accordance with the present invention, under the control of the second module 1060, a flat namespace can be deployed based on the existing tables, entities, objects and views. Additionally, more complex hierarchy definitions (“hierarchical namespaces”) can also be built based on the relationships that can exist between the different entities in a given database. These hierarchies can also be tied together through “ad hoc” links, as will be described later.
In addition to describing how to plan and map meaningful views with LDAP rules, the feature of defining access rights for different “virtual” entities will also be discussed with respect to the second module 1060. Also, a Membership Management tool and security parameters (e.g., access rights) for configuring the second module 1060 are provided to enable easy management of users, groups, and access rights for the virtual directories. Not only does the security parameters enable the addition and modification of user and group information, but also the importing of information from an existing LDAP server.
1. The DirectoryView Designer Process and Interface
Under the control of the second module 1060, virtual LDAP directories may be created. Referring to a particular embodiment shown
Command selection available within the DirectoryView Designer interface 3400 can be accessed in a variety of ways. For example, pull-down menus are available from the menu bar 3412 at the top of the interface 3400. Alternatively, interface 3400 can also provide command selection through the use of a short-cut menu 3420 as shown in
Referring back to
The Output tab 3408 becomes available when the Content 3444 or Container 3446 commands are selected for those corresponding objects. The Output tab 3408 enables the selection and modification of the visual output of the DIT 3402. Additionally and as will be discussed in
The Presentation tab 3410 is preferably available for the Content 3444 command and corresponding object. The general purpose of the Presentation tab 3410 is to show how the information will be displayed on the user's web browser. For example,
2. The DirectoryView Designer Basic Concepts
The process of building a tree will now be discussed, focusing upon the different types of nodes used to build the DIT. Exemplary nodes include the following: container, label, content, link, and global catalog. Each of these nodes will be further described below.
A Container object is a node that can have descendants. A Container can include other Containers or Content objects. A Content object is a node that has no descendants. As such, a Content object is referred to as a “leaf” or “terminal” node in the DIT. The concept of a Container can be compared with a “directory inside a file system,” wherein a directory can contain other directories or files. The comparison should stop there because a Container functions as a “proxy” for an object represented in a virtual directory tree. To this end, Containers and Contents are proxy objects. They represent views of the objects. When a Container is created, an object class that has been declared by the first module 1058 is mapped to a Directory Node. The Container automatically inherits the primary key attribute of the underlying objects. Additional attributes that belong to the underlying object may also be mapped to the Container node. In general, Containers bring and hold one or more collections of information at run-time.
A Label node is a Container node whose only attribute is a text label. A Label node names categories of information in the directory and views (.dvx) file in a hierarchical view. For example, by default, the name of the attribute is Category, however, this attribute may be over-written with another attribute. When it is desirable to display separate different types of information, Labels are a useful mechanism. Accordingly, a Label functions as an “ad hoc” way to aggregate objects from the same database schema. Combined with links, Label objects associated with different schemas may be aggregated for the entire subtrees made of virtual directory views from the directory views file. When a Label is used as an intermediate link between two objects, the Label acts as a “pass-through” for the underlying relationship. The Label does not affect the value of the keys that are propagated from the parent to the descendant. The objects are still linked by the same relationships.
For example, if the configuration of the directory tree at run-time is
A Content object is a node that does not have a descendant, rather, the Content object is a “leaf” or “terminal” node in the directory tree. A Content is a “proxy” for an object represented into a virtual directory tree. When a Content object is created, an Object class that has been declared in the first module 1058 is mapped to the Directory Node. The Content will automatically inherit the primary key attribute of the underlying object. Other attributes that belong to the underlying object may be mapped into the Content node. A Content is the only object that has availability to the Presentation tab 3410. The Presentation tab 3410 includes the template for the information that will be published by the directory view. This information is used by the first module 1058 for managing the display of Content objects at run-time.
Links are a special type of node that points to a specific subtree defined by a directory view (definition .dvx) file. Using the link mechanism 3426 in
A Global Catalog is the root, which aggregates all directory views created. After designing and saving a view in the DirectoryView Designer interface 3400, a command to add a Global Catalog may be selected. By doing so, the directory view file that was created as a branch in the DIT will be added. Preferably, if a default view is created for the directory using the DVX Generator 2200 controlled by the first module 1058, then the directory views should automatically be saved in the Global Catalog.
3. Defining the View Structure
There are two basic types of hierarchies that may be constructed, namely, a relationship-driven hierarchy, and an “ad hoc” hierarchy. Relationship-driven hierarchies use the underlying schema to build the hierarchy. The relationship between the existing objects drives the structure. Relationship-driven hierarchies can comprise Container objects, and optionally Content objects.
By contrast, “ad hoc” directories do not use relationships between objects to build the hierarchy. Rather, they use Labels and Content objects to build the hierarchy. To some degree, the Label is serving as the relationship. Examples of “ad hoc” hierarchies are the flat and indexed default views as described with the DVX Generator 2200 of
The Indexed views include Containers that create at least one additional level in the view definition hierarchy. Containers are useful for defining the information intended to be displayed into a single record. Containers may also be used to display categories of information, if defined. A Category works like an empty folder that is filled with the Content information about a specific order. Alternatively, the Content information may include multiple records of a category of orders.
The Add Where Clause allows a search for and display of rows that contain specific information. Filtering criteria for the Add Where Clause can be set at both the Container and the Content levels. As shown in
Reference is made to the block diagram of
By comparison, reference is made to the block diagram of
4. Using the DirectorvView Designer
The process steps for creating Labels, Content, and Container objects will now be described, as well as the process for joining tables and performing queries using the Add Where Clauses.
When working with Labels, the Output 3408 and Presentation 3406 tabs shown in
When working with Content objects, it is desirable to create flat views having Labels and Contents, so that information may be published on a web browser. Referring back to
D. Smart Browser Application
The third module 1056 is an application that includes process steps and routines to enable browsing of the virtual directory contents. Third module 1056 is referred to interchangeably herein as the SmartBrowser (application) 1056. The SmartBrowser 1056 can comprise a number of embodiments as will now be described in detail as follows. As will be discussed, the present invention provides the ability to return sets of results from a directory query in multiple formats. The application is flexible as it can specify whether to return the data as a formatted result set. Several exemplary formatted result sets, include but are not limited to: (1) an SQL result set; (2) LDAP entries; (3) ADO or JDBC results set, and (4) a result set in a mark-up language, like XML, HTML, and DHTML. The SmartBrowser 1056 is preferably a web client for the Internet Explorer and Netscape Communicator that does not require any special installation or download of information, since the SmartBrowser 1056 interoperates within a current conventionally-available web browser and because all of the needed components reside on the server 406.
Reference is now made to
It is noted that the present invention is well-suited to work with other formats for creating forms and processing input, including Dynamic HTML (DHTML) technology. It will become evident to those skilled in the art that the client 402 a is adapted to run various types of commercially available browsers (e.g., Netscape, Internet Explorer) suited to enable HTML or DHTML functionality. Furthermore, here and throughout this application, the description of the present invention in the context of the Internet, browsers, ASP, etc., is by way of example. Those skilled in the art will realize that the present invention could be implemented on a variety of other hardware environments, such as peer-to-peer networks and mainframe systems, just by way of example.
For example, the first module 702 may be an LDAP-enabled directory server 702, as shown in
With the alternate embodiment, the VDS 408 can seamlessly integrate with existing LDAP directories that have deployed the Stand-Alone LDAP (SLAPD) pre- or post-processing plug-in extension. Using a database plug-in mechanism, the VDS 408 is able to transparently intercept LDAP requests bound for objects in the VDS structure and pass these to the VDS 408 for processing. Other LDAP requests will be passed to the original LDAP directory.
In yet another alternative embodiment of the present invention shown in
As a user makes the request in the form of an HTTP URL command that embeds an Information Resource Locator (IRL), which is forwarded from the client 402 c to transceiver 404 c. Transceiver 404 c receives the wireless signal and routes the IRL, most likely via a non-wireless medium to the server 406 c. Responsive to receiving the IRL, the server 406 a executes the scripts that have been embedded within the page so that the IRL can be forwarded to the VDS 408. The VDS communicates with the back-end relational databases hosting the directory data using OLE DB, or JDBC. SQL commands are generated by server 408 to request the attributes specified for a particular directory object. The result is returned by the VDS 408 to server 406 c, preferably in the format of an SQL result.
Server 406 c then uses a script 804 to format the result into a Wireless Application Protocol (WAP) standard for providing cellular phones, pagers and other handheld devices with secure access to e-mail and text-based Web pages.
E. Schema Mapping Application
The fourth module 1062 (i.e., the schema mapping module) includes software to implement the process of how the VDS maps database objects, such as tables, columns, attributes, and other entities into LDAP object classes and attributes. The second module 1062 is preferably implemented or encapsulated within one or more Component Object Models (COM) objects. The COM objects are a way for software components to communicate with each other as is known in the art.
Several definitions are now discussed to provide clarity when subsequently describing the process steps of the schema mapping module. Although each of the following terms and notations may refer to different levels of abstraction, for simplicity and without obscuring the present invention, reference may be made interchangeably (i.e., equivalently) when in respective contexts, the terms are associated with the same role. For example, in an Object Model, an Object plays the same role as an entity in the Entities/Relationships model, or a row of a table in the physical data model. The notation ObjectObject Model is defined to mean an object relative to the Object Model context. The text insubscript describes the underlying context. Further, it should be recognized that the following definitions are not intended to limit the applicability of the present invention to relational databases, but matches the definition of the Object Model underlying an Object Oriented (OO) application. Therefore, the abstract mapping as described herein is well-suited for use with any OO component-based application.
The term “schema” has many conventional definitions, but as described herein, it refers to the “physical data model” for an application, that is, the formal set of objects/entities and the relationships between these objects/entities. The manner of how these relationships are physically implemented (e.g., by join operations in the case of RDBMS; and by methods for object and relationship navigation) is a consideration that is handled at a lower level of abstraction by the VDS. Accordingly, the implementation of these relationships does not necessarily impact or change the higher-level design of a virtual directory.
Regarding schemas in general: (1) a physical schema is equivalent to a physical data model; (2) a logical schema is equivalent to a logical data model; and (3) a logical data model is equivalent to an object model. Regarding entities in general: (1) an ObjectObject Model is equivalent to an EntityE/R; (2) an EntityE/R is equivalent to a Table-RowPDM; and (3) a Table-ROWPDM is equivalent to an EntryLDAP. Regarding attributes in general: (1) an AttributeE/R LDM is equivalent to a Property/Member/AttributeObject Model; and (2) a Property/Member/AttributeObject Model is equivalent to a ColumnPDM.
Each entity described in a schema is reference by some unique “qualified” name. As such, any schema defines a namespace. The semantics of a schema may be characterized as a type of “closed” world because each application defines a set of entities/objects that is specific to its domain. For example, a “customer entity” that is found in a sales management software application may be the same “customer entity” defined in an unrelated accounting software package, and likely with some different attributes associated therewith. Even though an end-user may have knowledge that this “customer” is the same person, this “extra” information (i.e., the knowledge about the customer) often times referred to as “metadata” is out of the scope of each of the two specific software applications. In accordance with the present invention, the first module 1058 can be used to manage this related “scope” by assigning a different name to each schema being handled.
One exemplary process for capturing a new schema will now be discussed using the functions associated with the first module 1058. Upon invoking the Schema Extraction Wizard 2402, a data source is selected and the schema is analyzed using the first module 1058. Metadata in the nature of objects, attributes and relationships associated with the new schema are saved in a schema file. One manner of naming the schema file is to include an extension of .orx, which is defined to mean Objects and Relationships expressed in XML.
For example, if a schema based on the northwind.mdb data source is captured using the present invention, the name of the schema should preferably be “northwind” unless another name is selected during the schema extraction process. Alternatively, another schema name may be selected to over-write an existing schema name by selecting the Save As command (not explicitly shown in
(ii) Mapping the Captured Schema to an LDAP Schema
Still referring to the fourth module 1062 of
Those skilled in the art will recognize that various specific implementations exists; and will appreciate that the particular notation and syntax used herein are for purposes of discussion. Accordingly, the process for mapping the database schema to an LDAP schema disclosed herein are well-suited for any of the variants introduced by specific implementations, which for example, could arise as between the University of Michigan's Netscape configuration file format, a subset of ASN.1, LDAP.version 3, and Netscape LDAP schema format, among others. ASN.1 represents the Abstract Syntax Notation One, and is defined to mean that mechanism of defining language that peer entities use to communicate across a data communications network, in accordance with the International Telecommunications Union (ITU) as is known in the art.
Each object described in the schema file is translated into an Object class in the LDAP schema. For example, each class name may be defined by the construction: vd_<shema filename>_<object name in schema>, as illustrated in the following Table 1.
Preferably, every object class that is defined should be a descendant of an object class designated as the “top” object class. The top object class is the only LDAP object class that does not have a superclass Additionally, two auxiliary classes may also be defined as: vdapcontainer and vdapobject. While each object declared for the LDAP schema should have its primary key(s) set as a mandatory attribute, all other attributes may be set as optional attributes. Additionally, every object should preferably be defined with the auxiliary class vdaobject. If an object include a descendent, then the descendant should also be declared as a vdacontainer. For example, the Object class attribute for “employees” from the Northwind database would be defined by: ObjectClass=top # vd_Northwind_Employees. If a node in the directory view comprises a join operation that involves two or more objects, then the Object class should preferably include both class names. For example, if a node includes a join operation between the two tables Order_Products and Order_Details, then its Object class would be: ObjectClass=top #vd_Northwind_Order_Products # vd_Northwind_Order_Details.
All attributes of all objects contained in a schema file should be declared as LDAP attributes according to a preferred embodiment of the present invention. The name for the declared LDAP attribute is derived from the attribute name inside the object. For example, if a customer object (e.g., table) in a schema includes an attribute (e.g., column) named companyname, an LDAP attribute name companyname would be declared under the control of the first module 1058. Since LDAP attributes are domain oriented, their names are tied to a specific object class. This means that the attribute names can be defined once, based on their domain-related attributes. By contrast, although attributes in the RDBMS are domain-oriented, their names are tied relative-to the object where they are defined.
One aspect of the present invention resolves incompatibilities in attribute names and data types amongst LDAP and RDBMS. All object attributes are preferably declared as LDAP string types, and an attribute OID is generated. OIDs are defined to mean Object Identifiers, which are numeric identifiers that are defined in ASN.1, and that can be used in LDAP to uniquely identify elements in the protocol, like for example, attribute types and object classes. Each LDAP attribute is preferably declared with a Case Insensitive Syntax (CIS). For example, an attribute declaration may take the form of: attribute CompanyName Vd_Adv_Works.
(iii) Virtual Directory Access Protocol
In accordance with one embodiment of the present invention, a Virtual Directory Access Protocol (VDAP) is used with the LDAP on server 406 as shown in
As seen in the embodiments of
Each filter in the VDAP is preferably associated with a specific Object class, like for example,
Several rules of constitution for DN/RDN in VDAP will now be discussed. Within an LDAP API, an Relative Distinguished Name (RDN, which is a component of a Distinguished Name, as is known in the art) may be specified based on a primary key combined with a “display name.” For example, an RDN is defined with
At run-time, and under the control of the third module 1056 for LDAP, the following information will be displayed:
When using the LDAP API, the RDN for this example would be Customer=231. The Distinguished Name (DN) is comprised of a specific set of RDNs. The format of an RDN generally comprises an Attribute Name=Primary Key value, and an optional “display name” value. Still referring to the same example for the RDN, the corresponding DN would be as follows.
The Attribute Name portion of the RDN can be an object (e.g., content or container), a category (e.g., label), or a dv (e.g., link). The Primary Key value portion can be either the actual primary key value or the display name.
Schema mapping module 1062 and DirectoryView Designer module 1060 may be alternatively implemented on a server separate from server 406, and can be use with Windows NT/98/2000 operating system and a web browser such as the Internet Explorer.
F. Namespace Management Application
In accordance with one aspect of the present invention, the VDS 408 separates the data structure mapping and the LDAP namespace creation into two distinct processes. With the first process as described in more detail in the section entitled Schema Mapping Application, relationships in the back-end databases are initially mapped into the VDS server using an automated database schema discovery mechanism. With the second process as described in more detail in the present section, LDAP namespace hierarchies are then built on top of this mapping. As new LDAP attributes and objects are required in the namespace, they can be added using the point and click interface in the DirectoryView Designer application. Changes to the directory structure take effect immediately.
In accordance with one aspect of the present invention, hierarchical namespaces can be defined as either flat 90, complex 92, and/or indexed 94, and may be based on existing relationships between objects as shown in
When using the second module 1060 as an alternative to creating namespaces, several approaches will now be described. With the first approach, existing relationships between objects, tables and entities for each of the schemas and databases can be published in the hierarchical namespaces. The second module 1060 is designed to maintain knowledge of the existing relationships, so that laying out a complex hierarchical namespace can simply be a matter of selecting the source and destination objects for each level of the hierarchy. An example will provide further clarification as follows, using the symbol <-->, which is defined to mean “has a relationship with.”
Under the control of the second module 1060, the following hierarchical relationships can be defined in the DIT (where the symbol → merely represents a level of nesting in the hierarchy of the directory information tree), and designated as Tree 1.
With the second approach, the directory information tree may be further segmented into context in order to provide a more meaningful, or easier to browse and/or search namespace using “label” containers. The use of containers is a mechanism to segment an existing relationship into categories. For example, Tree 1 can be categorized using labels to develop a more structured DIT, like the one indicated by Tree 2 below.
A label acts as a “pass-through” container for the underlying relationship. The key value of the parent node determines the key value of its descendant nodes through the relationship, independent of the label. In the example pertaining to Tree 2, the relationship between a customer and their orders are preserved, no matter what label is introduced. One technical advantage with the introduction of a label container enables the virtual directory structure to be enhanced based on the criteria that was not explicitly defined in the database schema. That is, the introduction of labels facilitates the browsing and/or searching of the relationship-driven hierarchy, and at the expense of a more lengthier namespace. For example, the DN for Tree 1 without the use of a label is Order=10000, Customer=651; while the DN for Tree 2 with the use of a label is Order=1000, Label=Past Orders, Customer=651.
With the third approach, the “ad hoc” relationships between objects not linked within an existing schema or between objects existing amongst different schemas may be created. While a link functions similarly to a label container, a link should preferably not propagate the key value (identity) from a parent node to its descendants. Reference is now made to several examples in
An Exemplary Process for Building Virtual Directory Views
The process of one embodiment for creating “directory views” in accordance with the present invention will now be discussed with focus on an example of building a directory view. Generally, an aspect of the present invention enables the creation of a Directory Information Tree (DIT, used interchangeably herein with “directory tree,” “tree,” and “directory”) of the virtual directory. The DIT can comprise tables, entries and objects representing content and relationships captured and extracted from particular databases. The directory tree can be flat in one embodiment, meaning that the tree has no levels and points directly to specific tables, entries and/or objects. In another embodiment, multilevel hierarchical namespaces can be constructed to “reflect” the relationships that exist between the tables, entities, and objects of the unrelated database. By doing so, different paths of the virtual directory represent simplified “views” to the data, thereby allow end-users a more natural way to browse and/or search for information.
In order to further describe the aspect of representing the multilevel hierarchical namespaces corresponding to relationships of the relational database, the particular example for building a directory view will refer to a “pre-mapped” schema derived from the Microsoft Access database AdvWorks.mdb for discussion purpose only. Also, several assumptions are made to clarify aspects of the present invention in a relatively simple manner so as not to obscure the invention. It is noted that upon initiating the present invention for the first time, the intended database should be mapped with the first module 1058, i.e., the schema manager application 1058.
The virtual directory for the directory tree shown in
The hierarchy of the directory tree shown in
One aspect of the present invention provides a mechanism to directly relate information that is currently linked indirectly by relationships. More specifically, the present invention enables the creation of an intermediate view for linking related information. In this particular example, the namespace can be organized so that customers are directly linked to products, that is, by using the Orders and Order_Details as an intermediate link.
The particular operation that is performed to create the intermediate view is an SQL join operation, as is known by those skilled in the art of RDBMS technology. In accordance with the present invention, the provision of an intermediate view simplifies the design process by suppressing the need to utilize an external query tool. The initial Order_Detail table extracted from the database will typically include a reference key to the product table; however, additional information about the product table can be shown in the order details. As such, the present invention enables more information about the product to be displayed at the directory level as the product is referenced in the order details.
An Exemplary Distributed System for Building Virtual Directory Views
As shown in more detail in
Although the invention has been described in considerable detail with reference to certain embodiments, other embodiments are possible. As will be understood by those of skill in the art, the invention may be embodied in other specific forms without departing from the essential characteristics thereof. Accordingly, the present invention is intended to embrace all such alternatives, modifications and variations as fall within the spirit and scope of the appended claims and equivalents.