Paper Menu >>
Journal Menu >>
2012. Vol.3, Supplement, 59-62
Published Online December 2012 in SciRes (http://www.SciRP.org/journal/ce) DOI:10.4236/ce.2012.37B014
Copyright © 2012 SciRes.
A Legacy System Encapsulation Strategy Based on Web Service
D. J. Chen1, X. Y. Li2
1Dali Comprehensive Inspection Centre of Quality and Technical Supervision, Dali, P.R. China
2School of Mathematics and Computer Science, JiangHan University, Wuhan, P.R. China
Email: 652187048@QQ.com, Lixy_76@163.com
In order to migrate the enterprise legacy system to the web, a multi-agent based legacy system encapsula-
tion model is proposed. Firstly, the characteristics of legacy system are analyzed, and then the data and
functions that need to be published are confirmed. Secondly the legacy system is wrapped into web com-
ponents with common interface, and these components are managed by the application server. Thirdly,
the clients can send requests to the application server, and receive the return result from the application
server. Due to adoption of wrapping technology for legacy system, original security and stability of
legacy system are guaranteed in the web components. Finally, the validity and practicability of the migra-
tion technology are verified through the application in the encapsulation of Matlab as web components.
Keywords: Legacy System; Multi-agent; System Migration; System Encapsulation
At present, there isn't a uniform definition on le gacy syste m,
in 1995, there was a definition proposed in : if a system is
important to the enterprise, and at the same time, the enterprise
doesn’t know how to update it to meet the new need, the system
can been called as a legacy system. To legacy system, nowadays,
there are three basic models to rebuild it to meet the new need.
Giving up legacy system: the model will give up a legacy
system and a new system is developed to replace it at the same
time . The model will produce waste to the enterprise's re-
source, so it isn't used by most enterprise.
Wrapping legacy system: the model will hide the real im-
plementation of legacy system, and its functions are published
as public interfaces, then we can access the legacy system
through these public interfaces . In the model, the security
and stability of legacy system aren’t affected, and the rebuild-
ing cost is low.
Rebuilding legacy system: in the model, before rebuilding
the legacy system, we must analyze its functions and demands,
and then we can implement its functions in the new system .
In fact, for the half-baked documents of legacy system, it is
very difficult to analyze its functions.
In the three models, the second model is adaptive to enter-
prise. In the model, the inherent security and stability of legacy
system are not affected in the new system, and this is very im-
portant to an enterprise.
The reminder of this paper is structured as in the following:
section 2 gives some background information in legacy system
integration technology, section 3 gives an introduction on the
multi-agent based system encapsulation model. In section 4
gives a case study to describe how to encapsulate the Matlab as
web components based on multi-agent technology, and finally,
section 5 contains the conclusion.
Legacy System Integration Tech nology
The Extensible Markup La nguage (XML ) is a bro adly adopted
format for structured documents and data on the Web. XML is
a simple and flexible text format derived from standard genera-
lized markup language and developed by the World Wide Web
Consortium. XML is expanding from its origin in document
processing and becoming a solution for data integration. XML
excels in inter-application data exchange because of its flexible
and extensible method for describing data and its capability to
communicate over the Internet using the standard HTTP proto-
This flexibility makes XML a powerful mechanism for busi-
ness-to-business (B2B) application integration. B2B integration
is the automated exchange of information between systems
from different organizations. B2B, for example, improves ex-
ternal processes such as supply chain integration or ship-
ping/logistics tracking. XML-based B2B is gaining momentum
as XML vocabularies emerge in specific business domains such
as finance. In addition, a growing number of commercial enter-
prise application solutions are embracing XML .
Database replication is the process of copying and maintain-
ing database objects in multiple databases that make up a dis-
tributed database system. Changes applied at one site are cap-
tured and stored locally before being forwarded and applied to
the centralized repository. Replication provides users with fast,
local access to shared data and greater availability to applica-
tions because alternati ve data access opt ions exi sts. Even if one
site becomes unavailable, users can continue to query, or even
update, data at other locations. Database replication is often
used to enable decentralized access to legacy data stored in
mainframes. In this approach, local instances of modern data-
bases are replicated parts of a centralized database. We can get
a similar effect using a remote database gateway, but it is
sometimes undesirable to use a software layer to wrap legacy
data. Instead, we want a local copy of the data that wraps and
buffers the original data source. New applications using the
data receive the benefits of local access to a modern database
D. J. CHEN, X. Y. LI
Copyright © 2012 SciRes.
instead of the problems of remote access to an obsolete data
Objects have been used to implement complex software sys-
tems successfully. Object oriented systems can be designed and
implemented in a way that closely resembles the business
processes they model. Additionally, the use of abstraction, en-
capsulation, inheritance, and other object orientation (OO)
techniques make object-oriented systems easier to understand.
To support object distribution, we need a more powerful
means of communication than that provided by normal inter-
object communication mechanisms. Distributed object tech-
nology (DOT) is the combination of distributed technology
with OO. In effect, DOT extends object technology to the
net-centric information systems of modern enterprises by using
object middleware. The most prevalent object middleware is
the Common Object Request Broker Architecture (CORBA)
from OMG, with its platform-neutral object specification lan-
guage, robust remote method calls, interoperable protocols, and
rich set of services. The conceptual model of object-oriented
wrapping is deceptively simple: individual applications are
represented as objects; common services are represented as
objects; and business data is represented as objects. In reality,
object-oriented wrapping is far from simple and involves sever-
al tasks including code analysis, decomposition, and abstraction
of the OO model .
Legacy System Encapsulation Model Based on
Based on multi-agent techniques, every function of legacy
system can be encapsulated as a web component, which may
have various interfaces for different functions. The multi-agent
based encapsulation architecture is shown Figure 1.
External wrapper provides various interfaces to accept SOAP
request, which can be managed by the client’s power, and inner
wrapper are developed for the legacy system in the institutions.
The SOAP requests from online user are transmitted to external
wrapper, and then retransmitted to inner wrapper. Then the
inner wrapper decomposes the requests into a sequence of sta-
tus values, according to which web component will change the
state, and related web components are called to respond to the
request. Finally the result should be sent back to external
wrapper which in the same way sends it to the online user.
System encapsulation based on multi-agent technology.
External wrapper accepts requests and cooperates with inner
wrapper. Its main tasks are to analyze and decompose the re-
quests, including creating service detailed lists, decomposing
request to status switch, defining communications protocols
and the format of input and output, registering and issuing web
components in the UDDI.
External wrapper is closed to the actual operation platform,
and access request through inner wrapper, external wrapper is
used to establish and maintain the safe communication among
different web components. When communication happens
among different legacy system systems, the conversion between
bytes and certain data type must be run to ensure platform-
independent. The communication information is described and
defined uniformly in XML.
Inner wrapper needs to coordinate with external wrapper, and
interact with legacy system systems directly. Therefore, they
should be standardized and adaptable to the operation environ-
ments of legacy systems. The architecture of inner wrapper is
shown in Figure 2.
The net communication agent receives service request from
external wrapper, and sends it to service decomposing agent,
which decomposes the service request to the status switch set
based on transaction logic library. The net communication
agent is composed of external communication agent and inner
communication agent. Then according to the status data, the
monitoring operation agent manipulates related subsystems and
sends the needed output to external communication agent.
Based on multi-agent technology, the legacy system is en-
capsulated with common interfaces, and other systems can
communicate information with the legacy system based on the
common interfaces, but to the clients who don’t be familiar
with the common interfaces, we can’t send the request with
right format to the legacy system and get the right result.
For providing the access interface to clients, as shown in
Figure 3, an encapsulation architecture of legacy system is
proposed, as following describes how to clients to send the
request to the legacy system and get the return results.
Clients send the request message to the application mes-
sage with SOAP forma t .
The architecture of inner wrapper.
D. J. CHEN, X. Y. LI
Copyright © 2012 SciRes.
The encapsulation architecture of
Application server receives the request and sends it to the
legacy system access middleware based on the JDBC,
ODBC or OPC interface.
The legacy system access middleware sends the request
the request to the legacy system wrapper adapter, which
includes external wrapper and inner wrapper.
The legacy system wrapper adapter sends the request to
the legacy system based on their common access interfac-
The legacy system receives the request, and returns the
result to the legacy system adapter, and finally, the result
is returned to the clients.
Based on the proposed encapsulation architecture, the legacy
system is encapsulated as common web components, and then
we can integrate the legacy system with other legacy systems,
and these legacy systems can share message with SOAP format.
Due to adoption of wrapping technology for legacy system,
original security and stability of legacy system are guaranteed
in the web components.
Matlab is professional software developed by MathWorks
Corporation. It has powerful function on data analysis, data
emendation, and image process etc. Based on the proposed
system encapsulation model, we can encapsulate it as Web
component to provide the computation functions, linear regres-
sion analysis, nonlinear regression analysis, matrix normaliza-
tion, covariance matrix computation [7,8]. Regression analysis
is mainly use to analyze real-time data for the product devel-
As shown in Figure 4, the Matlab is encapsulated as com-
mon web components, as shown in Figure 5, the SOAP mes-
sage can be sent to the Matlab common component to request
linear regression function, and then the result will return with
SOAP message as shown in Figure 6.
The encapsulation model of Matlab.
SOAP request message of linear regression service.
D. J. CHEN, X. Y. LI
Copyright © 2012 SciRes.
SOAP response message of linear regression service.
For encapsulating the enterprise legacy system as common
web components, a multi-agent based legacy system encapsula-
tion model is proposed. Due to adoption of wrapping tech-
nology for legacy system, original security and stability of leg-
acy system are guaranteed in the web components. Finally, the
validity and practicability of the migration technology are veri-
fied through the application in the encapsulation of Matlab as
W. Proie, “Legacy computer systems migration,” AISTech - Iron and
Steel Technology Conference P roceedings, 2, pp. 873-881, 2009.
Y. Qu, “Research and application of reusing enterprise legacy systems
based on Web Service,” 2009 WRI World Congress on Software En-
gineering, 3, pp.325-329, 200 9.
X. Li, “A service-oriented partitioning and encapsulation method for
java legacy systems,” Jisuan ji Xuebao/Chin ese Journal of Co mputers,
32(9), pp.1804-1815, 2009.
W. Gee, “Systems engineering requirements for legacy hardware up-
grade and sustainment requirements definition, analysis, and valida-
tion,” 2009 IEEE Intern ational Systems Conference Pro ceedings, pp.
B. Medjahed and A. Bouguettaya, “Composing web components on the
semantic web,” Journal on Very Large Databases, 4 , p.
J. Y. Sheng and J. Hang, “CORBA based tele-collaboration workflow
mode,” Com puter Applications, 9, p. 19-25(2002).
Y. Zhan, J . A. Clark, "A search-based framework f or automatic testing
of MATLAB/Simulink models," The Journal of Systems and Soft-
ware, 81(2), pp.262-285, 2008.
C. Y. Chen, Y. C. Shun, "MATLAB-based rapid controller develop-
ment platform for control applications," Journal of Mechanical En-
gineering Science, pp.1461-1473, 2007.