SlideShare a Scribd company logo
1 of 36
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
Middleware Technologies
Overview
 Introduction
 Brief History of EAI/Middleware
 Middleware Categories
 CORBA
 Middleware and Computer Telephony
 Middleware Usage Considerations
 Middleware costs
 Advantages and Disadvantages of Middleware
 Conclusion
 Reference
Introduction
 Middleware is the "glue" that connects diverse computer systems.
Typically, legacy systems store information in proprietary formats,
use propriety protocols to communicate, and may even be running
on hardware that's no longer manufactured or supported.
Brief History of EAI/Middleware
 Enterprise applications, from as early as the 1960s through the late
1970s, were simple in design and functionality, developed largely in
part to end repetitive tasks.
 By the 1980s, several corporations were beginning to understand
the value and necessity for application integration.
 Enterprise Resource Planning (ERP)
As ERP applications became much more prevalent in the 1990s,
there was a need for corporations to be able to leverage already
existing applications and data within the ERP system; this could only
be done by introducing EAI.
Legacy Enterprise Situation
Mainframe
Stock Inventory
C/C++
Sales Order Processing
ERP
Customer Billing
Mainframe
Legacy Application
WWW
E-Commerce
WWW
Supply Chain Mgmt
RDBMS
Customer Database
Middleware/ EAI Enterprise Solution
Mainframe
Stock Inventory
C/C++
Sales Order Processing
ERP
Customer Billing
Mainframe
Legacy Application
WWW
E-Commerce
WWW
Supply Chain Mgmt
RDBMS
Customer Database
EAI Infrastructure Services
Middleware can be divided in to 7 categories of services:
 Data Management Services (i.e. Database and file system middleware).
 Communication Services (i.e. RPC (Remote Procedure Call) and
messaging middleware).
 Distribution Services (i.e. location, time and security services).
 Object Management Services (i.e. by using Object Request Brokers
(ORBs)).
 Application Co-operation Services (i.e. Transaction-Processing (TP) monitors, e-
mail, etc.).
 Presentation Services (i.e. User Interfaces, printing and multi-media middleware).
 System Management Services (i.e. Configuration-, change-, operations-, problem-,
and performance-management services)
Data Management Services
 One example of a middleware supporting these features are CI-Link
from Cornut Informatique in France. CI-Link is a middleware that
connects MS-Windows and Macintosh applications to SQL
databases under UNIX. It comes with a high-level built-in
development language which lets you centralise tasks on the server.
CI-Link is compatible with the several relational DBMSs like Oracle,
Informix, Ingres and Progress.
 Another database middleware candidate is Accessworks from
Oracle Corporation, in co-operation with Digital. Accessworks
provides a desktop API via ODBC, SQL services, and read/write
access to a wide area of databases, etc. Accessworks is
available for the most common client desktops such as MS-DOS,
MS-Windows, OS/2, Macintosh, Open VMS, and UNIX systems.
Communication Services
 Middleware supporting the communication services can be divided
into two different groups: RPC and messaging systems. RPCs
provide facilities for synchronous procedure calls on remote systems
as if they were local.
 The most famous RPC toolset is DCE (Distributed Computing
Environment) from OSF, but also available from most UNIX
hardware vendors.
 Messaging middleware enables distributed applications to send and
receive messages asynchronously using a set of APIs. One
example of a such a middleware API is Communications
Integrator from Covia Technologies.
Remote Procedure call
Object Management Services
 Tools supporting object management services use Object Request
Brokers (ORBs) to provide transparent communications between
objects sited on different locations in a network.
 OMG’s CORBA is an example of this technology. IONA’s ORBIX is
the most famous implementation of CORBA.
 In addition to provide communication between objects, CORBA
middleware also provide communication with the WWW, RDBMs
and ODBMs.
CORBA
 A middleware platform that supports a standardized OO architecture
for software applications
- Common Object Request Broker Architecture
- Open standard - developed by the Object Management Group
- CORBA is a component of OMG’s Object Management
Architecture
 CORBA supports distributed object computing
 CORBA uses a broker
- an intermediary handling requests in a system
- facilitates communication between clients and server objects
- separates a component’s interface from its implementation
Distribution Services:
 The distribution services can be divided into three categories:
location services, security services, and time services. Tools
supporting location services provide a directory and naming
service.
 The directory service allows a client to access a remote file, a
remote table, or a remote process without having to know where that
object is physically located in the network
Application Co-operation Services:
 Tools supporting application co-operation services are
providing support for a large number of concurrent users that
access transactions programs and services (i.e. databases,
security, workflows), local and distributed load balancing to
optimise performance, and efficiently synchronising data updates
to multiple databases during a single transaction using standard
protocols.
 Tuxedo from Novell is an example of a TP monitor providing
these features plus several others. The advantage by using TP
monitors are their ability to manage several thousands of users,
concurrent database accesses, and large volumes of data.
Presentation Middleware
 Tools supporting presentation services provide features for
mapping GUIs and transparent printing.
 These services are often included in other tools. But there exists
dedicated tools for mapping character based UIs intoGUIs.
 X Windows is an example of a toolset providing presentation
services.
Mobile Middleware
 MM is the software component that can be integrated with any
application to add mobility. It constitutes services that can be
transmitted over the mobile network to the clients on move. Also
enables to add new features to an existing system quite easily.
 Mobile Agent (MA) is a software component that operates
autonomously. MA allows codes to move freely around the network,
thus enabling us to have much more flexible architecture with better
network performance. These code snippets executed on top of a
runtime platform, interact with the local system in a controlled way,
through a set of well-defined interfaces provided by the agent
platform.
Middleware service components
The services in our proposed architecture are classified into two
broad categories: Application services, and Network services.
COM/DCOM
 Microsoft’s middleware infrastructure in many ways
similar to CORBA
 Defines a binary standard for component
interoperability
programming language independence
 Platform independent
Windows (95, 98, NT)
Mac
Unix
 Distribution transparency
does exploit operational characteristics
 Dynamic component loading and unloading
DCOM
 DCOM = COM binary standard
+
runtime infrastructure for communicating across distributed
address spaces initially only on Windows
 recently adding Mac and Unix
 Uses OSF’s DCE RPC as a basis for remote interaction
proxy/stub mechanism
 Attempts to address challenges of distributed computing
interacting components should be “close” to one another
some components’ locations are fixed
inverse relationship between component size and flexibility
Distribution in COM/DCOM — In-Process
Middleware and Computer Telephony
 Middleware in computer telephony tends to be software that sits
right above that part of the operating system that deals with
telephony. This is the Telephone Server Application Programming
Interface (TSAPI) in NetWare and the Telephone Application
Programming Interface (TAPI) in Windows.
 TAPI is an evolutionary API providing convergence of both
traditional PSTN telephony and IP Telephony. IP Telephony is an
emerging set of technologies which enables voice, data, and video
collaboration over existing LANs, WANs, and the Internet.
TAPI Objective
LAN
Legacy Phone Switch
*LAN IP-PSTN Bridge
Move from this….
To this….
Middleware Usage Considerations
 There is a gap between principles and practice. Many popular
middleware services use proprietary implementations.
 The sheer number of middleware services is a barrier to using them.
To keep their computing environment manageably simple,
developers have to select a small number of services that meet their
needs for functionality and platform coverage.
 While middleware services raise the level of abstraction of
programming distributed applications, they still leave the application
developer with hard design choices.
Middleware costs
 A technology may impose an otherwise unnecessary interface
standard, it might require investment in other technologies (see
bullets below), it might require investment of time or money, or it
may directly conflict with security or real – time requirements.
 As an example, at a start-up telecommunications carrier-of-carriers
service provider, AFN Communications, there were approximately
$20 million dollars expended just to implement operational and
business support systems that were fully integrated across a
client/server middleware information “bus”, which indicates that all
applications are integrated via a common path
Advantages of Middleware:
 Real time information access among systems
 Streamlines business processes and helps raise
organizational efficiency.
 Maintains information integrity across multiple systems
Disadvantages of Middleware
 Prohibitively high development costs.
 EAI implementations are very time consuming, and need a lot of
resources.
 There are few people with experience in the market place.
 There exists relatively few satisfying standards.
 The tools are not good enough.
 Too many platforms to be covered.
 Middleware often threatens the real-time performance of a system.
 Middleware products are not very mature.
EAI / Middleware Leaders
 BEA Systems (worldwide locations).
 CrossWorlds Software (Australia).
 IONA Technologies (Ireland, Scotland, California).
 Level 8 Systems (North Carolina, California, New Jersey, Virgina,
London, Milan, and Paris).
 Mercator Software (England, Massachusetts).
 NEON (purchased in 2001 by Sybase) (California).
 SeeBeyond (California, multiple U.S. States, Australia, Korea,
Japan, Singapore, Cyprus, multiple European locations).
 Software AG (Germany).
Conclusion:
 Middleware technologies are very important to succeed with an
incremental migration of legacy systems into client/server systems,
but that it is hard to find the correct tools and people to accomplish
the work.
References:
 www.google.com
 www.wikipedia.org
 www.oeclib.in
 www.projectsreports.org
Questions:
 What is Middleware technology?
 Mention different types of Middleware.
 What are Advantages and Disadvantages of
Middleware?
THANK YOU!

More Related Content

What's hot

Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed applicationRishikese MR
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
MOM - Message Oriented Middleware
MOM - Message Oriented MiddlewareMOM - Message Oriented Middleware
MOM - Message Oriented MiddlewarePeter R. Egli
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTINGKey Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTINGAtul Chounde
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computinggaurav jain
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingSayed Chhattan Shah
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introductionVintesh Patel
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service modelsPrateek Soni
 
Load balancing in cloud computing.pptx
Load balancing in cloud computing.pptxLoad balancing in cloud computing.pptx
Load balancing in cloud computing.pptxHitesh Mohapatra
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency ModelRajat Kumar
 

What's hot (20)

Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
MOM - Message Oriented Middleware
MOM - Message Oriented MiddlewareMOM - Message Oriented Middleware
MOM - Message Oriented Middleware
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
message passing
 message passing message passing
message passing
 
Key Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTINGKey Challenges In CLOUD COMPUTING
Key Challenges In CLOUD COMPUTING
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Historical development of cloud computing
Historical development of cloud computingHistorical development of cloud computing
Historical development of cloud computing
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
Load balancing in cloud computing.pptx
Load balancing in cloud computing.pptxLoad balancing in cloud computing.pptx
Load balancing in cloud computing.pptx
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency Model
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Similar to Middleware Technologies ppt

middleware-technologies-8871-AmKEtL9-_1_.ppt
middleware-technologies-8871-AmKEtL9-_1_.pptmiddleware-technologies-8871-AmKEtL9-_1_.ppt
middleware-technologies-8871-AmKEtL9-_1_.pptBinduBindu57
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
e-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdfe-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdfpetermulei3
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...csandit
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...cscpconf
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performancecsandit
 
TYBSC CS 2018 WEB SERVICES NOTES
TYBSC CS 2018 WEB SERVICES NOTESTYBSC CS 2018 WEB SERVICES NOTES
TYBSC CS 2018 WEB SERVICES NOTESWE-IT TUTORIALS
 
Introduction to WebSphere Message Broker
Introduction to WebSphere Message BrokerIntroduction to WebSphere Message Broker
Introduction to WebSphere Message BrokerAnt Phillips
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_AppajiAppaji K
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxojaswiniwagh
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computingAlexander Decker
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computingAlexander Decker
 
Impacts of Cloud Computing in the Society
Impacts of Cloud Computing in the SocietyImpacts of Cloud Computing in the Society
Impacts of Cloud Computing in the Societytheijes
 
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter GantenZarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter GantenZarafa
 
SaaSPlex - Powered By Cloud
SaaSPlex - Powered By CloudSaaSPlex - Powered By Cloud
SaaSPlex - Powered By CloudLa Lakis
 
cloud computing based its solutions term paper
cloud computing based its solutions term papercloud computing based its solutions term paper
cloud computing based its solutions term paperShashi Bhushan
 

Similar to Middleware Technologies ppt (20)

middleware-technologies-8871-AmKEtL9-_1_.ppt
middleware-technologies-8871-AmKEtL9-_1_.pptmiddleware-technologies-8871-AmKEtL9-_1_.ppt
middleware-technologies-8871-AmKEtL9-_1_.ppt
 
Middleware
MiddlewareMiddleware
Middleware
 
Middleware1
Middleware1Middleware1
Middleware1
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
e-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdfe-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdf
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performance
 
TYBSC CS 2018 WEB SERVICES NOTES
TYBSC CS 2018 WEB SERVICES NOTESTYBSC CS 2018 WEB SERVICES NOTES
TYBSC CS 2018 WEB SERVICES NOTES
 
Introduction to WebSphere Message Broker
Introduction to WebSphere Message BrokerIntroduction to WebSphere Message Broker
Introduction to WebSphere Message Broker
 
Unit 1
Unit 1Unit 1
Unit 1
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computing
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
 
Impacts of Cloud Computing in the Society
Impacts of Cloud Computing in the SocietyImpacts of Cloud Computing in the Society
Impacts of Cloud Computing in the Society
 
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter GantenZarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter Ganten
 
SaaSPlex - Powered By Cloud
SaaSPlex - Powered By CloudSaaSPlex - Powered By Cloud
SaaSPlex - Powered By Cloud
 
cloud computing based its solutions term paper
cloud computing based its solutions term papercloud computing based its solutions term paper
cloud computing based its solutions term paper
 

More from OECLIB Odisha Electronics Control Library

More from OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
UNIX Operating System ppt
UNIX Operating System pptUNIX Operating System ppt
UNIX Operating System ppt
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Middleware Technologies ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On Middleware Technologies
  • 2. Overview  Introduction  Brief History of EAI/Middleware  Middleware Categories  CORBA  Middleware and Computer Telephony  Middleware Usage Considerations  Middleware costs  Advantages and Disadvantages of Middleware  Conclusion  Reference
  • 3. Introduction  Middleware is the "glue" that connects diverse computer systems. Typically, legacy systems store information in proprietary formats, use propriety protocols to communicate, and may even be running on hardware that's no longer manufactured or supported.
  • 4. Brief History of EAI/Middleware  Enterprise applications, from as early as the 1960s through the late 1970s, were simple in design and functionality, developed largely in part to end repetitive tasks.  By the 1980s, several corporations were beginning to understand the value and necessity for application integration.  Enterprise Resource Planning (ERP) As ERP applications became much more prevalent in the 1990s, there was a need for corporations to be able to leverage already existing applications and data within the ERP system; this could only be done by introducing EAI.
  • 5.
  • 6. Legacy Enterprise Situation Mainframe Stock Inventory C/C++ Sales Order Processing ERP Customer Billing Mainframe Legacy Application WWW E-Commerce WWW Supply Chain Mgmt RDBMS Customer Database
  • 7. Middleware/ EAI Enterprise Solution Mainframe Stock Inventory C/C++ Sales Order Processing ERP Customer Billing Mainframe Legacy Application WWW E-Commerce WWW Supply Chain Mgmt RDBMS Customer Database EAI Infrastructure Services
  • 8. Middleware can be divided in to 7 categories of services:  Data Management Services (i.e. Database and file system middleware).  Communication Services (i.e. RPC (Remote Procedure Call) and messaging middleware).  Distribution Services (i.e. location, time and security services).  Object Management Services (i.e. by using Object Request Brokers (ORBs)).  Application Co-operation Services (i.e. Transaction-Processing (TP) monitors, e- mail, etc.).  Presentation Services (i.e. User Interfaces, printing and multi-media middleware).  System Management Services (i.e. Configuration-, change-, operations-, problem-, and performance-management services)
  • 9. Data Management Services  One example of a middleware supporting these features are CI-Link from Cornut Informatique in France. CI-Link is a middleware that connects MS-Windows and Macintosh applications to SQL databases under UNIX. It comes with a high-level built-in development language which lets you centralise tasks on the server. CI-Link is compatible with the several relational DBMSs like Oracle, Informix, Ingres and Progress.  Another database middleware candidate is Accessworks from Oracle Corporation, in co-operation with Digital. Accessworks provides a desktop API via ODBC, SQL services, and read/write access to a wide area of databases, etc. Accessworks is available for the most common client desktops such as MS-DOS, MS-Windows, OS/2, Macintosh, Open VMS, and UNIX systems.
  • 10. Communication Services  Middleware supporting the communication services can be divided into two different groups: RPC and messaging systems. RPCs provide facilities for synchronous procedure calls on remote systems as if they were local.  The most famous RPC toolset is DCE (Distributed Computing Environment) from OSF, but also available from most UNIX hardware vendors.  Messaging middleware enables distributed applications to send and receive messages asynchronously using a set of APIs. One example of a such a middleware API is Communications Integrator from Covia Technologies.
  • 12. Object Management Services  Tools supporting object management services use Object Request Brokers (ORBs) to provide transparent communications between objects sited on different locations in a network.  OMG’s CORBA is an example of this technology. IONA’s ORBIX is the most famous implementation of CORBA.  In addition to provide communication between objects, CORBA middleware also provide communication with the WWW, RDBMs and ODBMs.
  • 13. CORBA  A middleware platform that supports a standardized OO architecture for software applications - Common Object Request Broker Architecture - Open standard - developed by the Object Management Group - CORBA is a component of OMG’s Object Management Architecture  CORBA supports distributed object computing  CORBA uses a broker - an intermediary handling requests in a system - facilitates communication between clients and server objects - separates a component’s interface from its implementation
  • 14.
  • 15.
  • 16. Distribution Services:  The distribution services can be divided into three categories: location services, security services, and time services. Tools supporting location services provide a directory and naming service.  The directory service allows a client to access a remote file, a remote table, or a remote process without having to know where that object is physically located in the network
  • 17. Application Co-operation Services:  Tools supporting application co-operation services are providing support for a large number of concurrent users that access transactions programs and services (i.e. databases, security, workflows), local and distributed load balancing to optimise performance, and efficiently synchronising data updates to multiple databases during a single transaction using standard protocols.  Tuxedo from Novell is an example of a TP monitor providing these features plus several others. The advantage by using TP monitors are their ability to manage several thousands of users, concurrent database accesses, and large volumes of data.
  • 18.
  • 19. Presentation Middleware  Tools supporting presentation services provide features for mapping GUIs and transparent printing.  These services are often included in other tools. But there exists dedicated tools for mapping character based UIs intoGUIs.  X Windows is an example of a toolset providing presentation services.
  • 20. Mobile Middleware  MM is the software component that can be integrated with any application to add mobility. It constitutes services that can be transmitted over the mobile network to the clients on move. Also enables to add new features to an existing system quite easily.  Mobile Agent (MA) is a software component that operates autonomously. MA allows codes to move freely around the network, thus enabling us to have much more flexible architecture with better network performance. These code snippets executed on top of a runtime platform, interact with the local system in a controlled way, through a set of well-defined interfaces provided by the agent platform.
  • 21.
  • 22. Middleware service components The services in our proposed architecture are classified into two broad categories: Application services, and Network services.
  • 23. COM/DCOM  Microsoft’s middleware infrastructure in many ways similar to CORBA  Defines a binary standard for component interoperability programming language independence  Platform independent Windows (95, 98, NT) Mac Unix  Distribution transparency does exploit operational characteristics  Dynamic component loading and unloading
  • 24. DCOM  DCOM = COM binary standard + runtime infrastructure for communicating across distributed address spaces initially only on Windows  recently adding Mac and Unix  Uses OSF’s DCE RPC as a basis for remote interaction proxy/stub mechanism  Attempts to address challenges of distributed computing interacting components should be “close” to one another some components’ locations are fixed inverse relationship between component size and flexibility
  • 25. Distribution in COM/DCOM — In-Process
  • 26. Middleware and Computer Telephony  Middleware in computer telephony tends to be software that sits right above that part of the operating system that deals with telephony. This is the Telephone Server Application Programming Interface (TSAPI) in NetWare and the Telephone Application Programming Interface (TAPI) in Windows.  TAPI is an evolutionary API providing convergence of both traditional PSTN telephony and IP Telephony. IP Telephony is an emerging set of technologies which enables voice, data, and video collaboration over existing LANs, WANs, and the Internet.
  • 27. TAPI Objective LAN Legacy Phone Switch *LAN IP-PSTN Bridge Move from this…. To this….
  • 28. Middleware Usage Considerations  There is a gap between principles and practice. Many popular middleware services use proprietary implementations.  The sheer number of middleware services is a barrier to using them. To keep their computing environment manageably simple, developers have to select a small number of services that meet their needs for functionality and platform coverage.  While middleware services raise the level of abstraction of programming distributed applications, they still leave the application developer with hard design choices.
  • 29. Middleware costs  A technology may impose an otherwise unnecessary interface standard, it might require investment in other technologies (see bullets below), it might require investment of time or money, or it may directly conflict with security or real – time requirements.  As an example, at a start-up telecommunications carrier-of-carriers service provider, AFN Communications, there were approximately $20 million dollars expended just to implement operational and business support systems that were fully integrated across a client/server middleware information “bus”, which indicates that all applications are integrated via a common path
  • 30. Advantages of Middleware:  Real time information access among systems  Streamlines business processes and helps raise organizational efficiency.  Maintains information integrity across multiple systems
  • 31. Disadvantages of Middleware  Prohibitively high development costs.  EAI implementations are very time consuming, and need a lot of resources.  There are few people with experience in the market place.  There exists relatively few satisfying standards.  The tools are not good enough.  Too many platforms to be covered.  Middleware often threatens the real-time performance of a system.  Middleware products are not very mature.
  • 32. EAI / Middleware Leaders  BEA Systems (worldwide locations).  CrossWorlds Software (Australia).  IONA Technologies (Ireland, Scotland, California).  Level 8 Systems (North Carolina, California, New Jersey, Virgina, London, Milan, and Paris).  Mercator Software (England, Massachusetts).  NEON (purchased in 2001 by Sybase) (California).  SeeBeyond (California, multiple U.S. States, Australia, Korea, Japan, Singapore, Cyprus, multiple European locations).  Software AG (Germany).
  • 33. Conclusion:  Middleware technologies are very important to succeed with an incremental migration of legacy systems into client/server systems, but that it is hard to find the correct tools and people to accomplish the work.
  • 34. References:  www.google.com  www.wikipedia.org  www.oeclib.in  www.projectsreports.org
  • 35. Questions:  What is Middleware technology?  Mention different types of Middleware.  What are Advantages and Disadvantages of Middleware?