SlideShare a Scribd company logo
1 of 35
BSIT: Integration Styles (Intra) Team 2 (By Appearance) Wang Miao Charmaine Kyros Aini *All Images Used In This PPT Is Subjected To Its Respective Copyright & For Illustration Purposes | Compiled By: Kyros
File Transfer
File Transfer Benefit Fastest way to transfer large files Transfer any type of file Problems File size transferred may be limited by the sending or receiving site. Problems with ftp and Firewalls
FTP Model Control User Interface User Data Server PI User PI Control functions (commands) and reply codes are transferred over the control connection. All data transfer takes place over the data connection. The control connection must be “up” while data transfer takes place. FileSystem User DTP File System Server DPT
Order Fulfillment process FTP can transfer spreadsheet by attaching it to an email message. Does not require any direct account access to the remote site. It can shield myPC.com operators from variation in the file storage system. Transferring of customer orders and pay can be done reliably and efficiently.
Filezilla product It is a lightweight, efficient FTP written with security in mind. Filezilla supports both authenticated and anonymous FTP, PAM authentication, bandwidth limiting, and SSL encryption support. If sftp and ssh/scpare not enough for your system, then consider using Filezilla. Filezilla can be used together with SFTP and SSH/SCP for more security
Shared Database
Shared Database SCM System POS System Website SQL Server database DB2 database MySQL database Microsoft (Shared Database) Integration is achieved by storing all data in a “shared database”, and define the schema of the database to handle all the needs of the different applications.
How To Solve? Install a standard software interface for accessing database management systems (DBMS) as shared database, which can store different types of database (e.g. DB2 database, SQL Server database, MySQL database). Example: When order information is made online via the website stored in the MySQL database has to be entered into the SCM system that stores its data in IBM DB2 database, according to the integration by storing all database in a shared database, the order information will be stored in the shared database, and then the SCM system can get order information from shared database.  It also can transfer customers’ orders information between the POS system and the SCM system.
IT Product ,[object Object],Why?   -  Microsoft’s IT product is used in global.   -  Microsoft is a secure IT product. How to implement?   -  Mr. Wang only needs to download the Microsoft’s software which can support shared database, and install it into the three systems.
Benefits of Shared Database ,[object Object]
By the widespread use of SQL-based relational databases.
Database services like locking and transactions
Save Time
The information between the systems will be transferred automatically. ,[object Object]
As the number of application users increases, the size of the database is larger, so the  performance has slowed.
   The database is no longer stable or secure.  -  Beware of single-point-failure ,[object Object]
If the shared database is broken, all information cannot be transferred.,[object Object]
Remote Procedure Call (RPC) Procedural Language Main Communication Mechanism Does not integrate different systems well
Remote Method Invocation (RMI) Uses Java Interact well in distributed network Saves time (catch mistakes early) Add Java functionality
Benefits Simplified writing of application Compatibility Pitfalls ,[object Object]
Transparency breaks,[object Object]
BSIT – Integration Style (Messaging)
How to integrate? DB2 SCM (IBM OS400) Language: COBOL MSSQL MYSQL POS (Windows Server) Language: C, C++, C# Web Server (Linux: RedHat) Technology: Apache Mr Wang had faced the problem which these 3 systems cannot communicate to each other. All is done by manual. So the solution is to use…
Using…. Messaging
Messaging Why? Using Asynchronous Messaging… It is more reliable than Remote Procedure Invocation (RPI). It is more immediate than File Transfer (FTP). It is better encapsulated than Shared Database.
Asynchronous Messaging loose coupling program-to-program communication with reliable delivery send & forget, store & forward
Integration DB2 SCM (IBM OS400) Language: COBOL Message Server MSSQL MYSQL POS (Windows Server) Language: C, C++, C# Web Server (Linux: RedHat) Technology: Apache These 3 systems can now communicate to each other by deploying a message server (Message Oriented Middleware, MOM) act as the “middleman” and it must be in the same network to work.
More In-depth… DB2 SCM (IBM OS400) Language: COBOL Message Oriented Middleware (MOM) Eg. TIBCO  Rendezvous Messaging Channel Messaging Channel MSSQL MYSQL Messaging Channel POS (Windows Server) Language: C, C++, C# Web Server (Linux: RedHat) Technology: Apache
MOM Provides… remote communication platform / language Integration asynchrony throttling variable timing reliability disconnected operation reduction in # of threads
MOM Defines… interface to applications channels with producers, consumers when to send in what format routing (even without full knowledge of receiver) error, connection management & monitoring
BSIT: Integration To/FRO suppliers (Inter)
About Suppliers Mr Wang has 3 suppliers in China. Mr Wang do not know what is the technology that his suppliers use for the SCM. SCM SCM SCM ? ? ? Supplier 1 (ShangHai) Supplier 2 (Tianjin) Supplier 3 (Suzhou) Assumption: Maybe its using new or old technology?
How? By using: TIBCO BusinessConnect RosettaNet Partner Interface Procotols Cisco eHub Recommended for integrating with MOM and we use MOM for Mr Wang’s Intra Integration.
Why TIBCO BusinessConnect? It can able to connect and communicate to any technologies.

More Related Content

What's hot

Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
Rence Montanes
 
2 08 client-server architecture
2 08 client-server architecture2 08 client-server architecture
2 08 client-server architecture
jit_123
 
Introduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratIntroduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah Hazrat
Attaullah Hazrat
 
Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVA
Tech_MX
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
Tech_MX
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middleware
sanjoysanyal
 

What's hot (20)

Client Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja DharClient Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja Dhar
 
Anil Nembang: Hures Company Case Study
 Anil Nembang: Hures Company Case Study Anil Nembang: Hures Company Case Study
Anil Nembang: Hures Company Case Study
 
Middleware
MiddlewareMiddleware
Middleware
 
client server protocol
client server protocolclient server protocol
client server protocol
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
2 08 client-server architecture
2 08 client-server architecture2 08 client-server architecture
2 08 client-server architecture
 
Survey of client tools
Survey of client toolsSurvey of client tools
Survey of client tools
 
Components of client server application
Components of client server applicationComponents of client server application
Components of client server application
 
Client Server System Development
Client Server System DevelopmentClient Server System Development
Client Server System Development
 
Introduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah HazratIntroduction to the client server computing By Attaullah Hazrat
Introduction to the client server computing By Attaullah Hazrat
 
Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVA
 
2 tier and 3 tier architecture
2 tier and 3 tier architecture2 tier and 3 tier architecture
2 tier and 3 tier architecture
 
Client Server Architecture ppt
Client Server Architecture pptClient Server Architecture ppt
Client Server Architecture ppt
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middleware
 
client server architecture
client server architecture client server architecture
client server architecture
 
Message oriented middleware
Message oriented middlewareMessage oriented middleware
Message oriented middleware
 
The Middleware technology that connects the enterprise
The Middleware technology that connects the enterpriseThe Middleware technology that connects the enterprise
The Middleware technology that connects the enterprise
 
Ead pertemuan-7
Ead pertemuan-7Ead pertemuan-7
Ead pertemuan-7
 

Similar to Bsit – integration styles (intra + inter)

Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overview
abhi1112
 
The Art of Message Queues - TEKX
The Art of Message Queues - TEKXThe Art of Message Queues - TEKX
The Art of Message Queues - TEKX
Mike Willbanks
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
webhostingguy
 

Similar to Bsit – integration styles (intra + inter) (20)

Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overview
 
MUSIC.pptx
MUSIC.pptxMUSIC.pptx
MUSIC.pptx
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
Distributed Systems in Data Engineering
Distributed Systems in Data EngineeringDistributed Systems in Data Engineering
Distributed Systems in Data Engineering
 
Isset Presentation @ EECI2009
Isset Presentation @ EECI2009Isset Presentation @ EECI2009
Isset Presentation @ EECI2009
 
TOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEMTOLL MANAGEMENT SYSTEM
TOLL MANAGEMENT SYSTEM
 
Toll management system (1) (1)
Toll management system (1) (1)Toll management system (1) (1)
Toll management system (1) (1)
 
The Art of Message Queues - TEKX
The Art of Message Queues - TEKXThe Art of Message Queues - TEKX
The Art of Message Queues - TEKX
 
Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02
 
Time and attendance software
Time and attendance softwareTime and attendance software
Time and attendance software
 
SoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration TechnologySoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration Technology
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
 
lec-01-WP.pdf
lec-01-WP.pdflec-01-WP.pdf
lec-01-WP.pdf
 
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
 
Middleware1
Middleware1Middleware1
Middleware1
 
Evolving from Messaging to Event Streaming
Evolving from Messaging to Event StreamingEvolving from Messaging to Event Streaming
Evolving from Messaging to Event Streaming
 
Jvvnl 071108
Jvvnl 071108Jvvnl 071108
Jvvnl 071108
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
Designing a Scalable Twitter - Patterns for Designing Scalable Real-Time Web ...
Designing a Scalable Twitter - Patterns for Designing Scalable Real-Time Web ...Designing a Scalable Twitter - Patterns for Designing Scalable Real-Time Web ...
Designing a Scalable Twitter - Patterns for Designing Scalable Real-Time Web ...
 
Chapter 1-Introduction.ppt
Chapter 1-Introduction.pptChapter 1-Introduction.ppt
Chapter 1-Introduction.ppt
 

Recently uploaded

Recently uploaded (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Bsit – integration styles (intra + inter)

  • 1. BSIT: Integration Styles (Intra) Team 2 (By Appearance) Wang Miao Charmaine Kyros Aini *All Images Used In This PPT Is Subjected To Its Respective Copyright & For Illustration Purposes | Compiled By: Kyros
  • 3. File Transfer Benefit Fastest way to transfer large files Transfer any type of file Problems File size transferred may be limited by the sending or receiving site. Problems with ftp and Firewalls
  • 4. FTP Model Control User Interface User Data Server PI User PI Control functions (commands) and reply codes are transferred over the control connection. All data transfer takes place over the data connection. The control connection must be “up” while data transfer takes place. FileSystem User DTP File System Server DPT
  • 5. Order Fulfillment process FTP can transfer spreadsheet by attaching it to an email message. Does not require any direct account access to the remote site. It can shield myPC.com operators from variation in the file storage system. Transferring of customer orders and pay can be done reliably and efficiently.
  • 6. Filezilla product It is a lightweight, efficient FTP written with security in mind. Filezilla supports both authenticated and anonymous FTP, PAM authentication, bandwidth limiting, and SSL encryption support. If sftp and ssh/scpare not enough for your system, then consider using Filezilla. Filezilla can be used together with SFTP and SSH/SCP for more security
  • 8. Shared Database SCM System POS System Website SQL Server database DB2 database MySQL database Microsoft (Shared Database) Integration is achieved by storing all data in a “shared database”, and define the schema of the database to handle all the needs of the different applications.
  • 9. How To Solve? Install a standard software interface for accessing database management systems (DBMS) as shared database, which can store different types of database (e.g. DB2 database, SQL Server database, MySQL database). Example: When order information is made online via the website stored in the MySQL database has to be entered into the SCM system that stores its data in IBM DB2 database, according to the integration by storing all database in a shared database, the order information will be stored in the shared database, and then the SCM system can get order information from shared database. It also can transfer customers’ orders information between the POS system and the SCM system.
  • 10.
  • 11.
  • 12. By the widespread use of SQL-based relational databases.
  • 13. Database services like locking and transactions
  • 15.
  • 16. As the number of application users increases, the size of the database is larger, so the performance has slowed.
  • 17.
  • 18.
  • 19. Remote Procedure Call (RPC) Procedural Language Main Communication Mechanism Does not integrate different systems well
  • 20. Remote Method Invocation (RMI) Uses Java Interact well in distributed network Saves time (catch mistakes early) Add Java functionality
  • 21.
  • 22.
  • 23. BSIT – Integration Style (Messaging)
  • 24. How to integrate? DB2 SCM (IBM OS400) Language: COBOL MSSQL MYSQL POS (Windows Server) Language: C, C++, C# Web Server (Linux: RedHat) Technology: Apache Mr Wang had faced the problem which these 3 systems cannot communicate to each other. All is done by manual. So the solution is to use…
  • 26. Messaging Why? Using Asynchronous Messaging… It is more reliable than Remote Procedure Invocation (RPI). It is more immediate than File Transfer (FTP). It is better encapsulated than Shared Database.
  • 27. Asynchronous Messaging loose coupling program-to-program communication with reliable delivery send & forget, store & forward
  • 28. Integration DB2 SCM (IBM OS400) Language: COBOL Message Server MSSQL MYSQL POS (Windows Server) Language: C, C++, C# Web Server (Linux: RedHat) Technology: Apache These 3 systems can now communicate to each other by deploying a message server (Message Oriented Middleware, MOM) act as the “middleman” and it must be in the same network to work.
  • 29. More In-depth… DB2 SCM (IBM OS400) Language: COBOL Message Oriented Middleware (MOM) Eg. TIBCO Rendezvous Messaging Channel Messaging Channel MSSQL MYSQL Messaging Channel POS (Windows Server) Language: C, C++, C# Web Server (Linux: RedHat) Technology: Apache
  • 30. MOM Provides… remote communication platform / language Integration asynchrony throttling variable timing reliability disconnected operation reduction in # of threads
  • 31. MOM Defines… interface to applications channels with producers, consumers when to send in what format routing (even without full knowledge of receiver) error, connection management & monitoring
  • 32. BSIT: Integration To/FRO suppliers (Inter)
  • 33. About Suppliers Mr Wang has 3 suppliers in China. Mr Wang do not know what is the technology that his suppliers use for the SCM. SCM SCM SCM ? ? ? Supplier 1 (ShangHai) Supplier 2 (Tianjin) Supplier 3 (Suzhou) Assumption: Maybe its using new or old technology?
  • 34. How? By using: TIBCO BusinessConnect RosettaNet Partner Interface Procotols Cisco eHub Recommended for integrating with MOM and we use MOM for Mr Wang’s Intra Integration.
  • 35. Why TIBCO BusinessConnect? It can able to connect and communicate to any technologies.
  • 36. Why RosettaNet Partner Interface Process (RosettaNet PIP)? RosettaNet is one of the largest programmers and supporters of a PIP system. PIP is a kind of supply chain ordering system. The function of a PIP is to automate and streamline the supply chain of a process. Eg. If a manufacturer requires a certain type of material, he can place the request on RosettaNet’s PIP and receive several responses without worry of translation or standardisation problems.
  • 37. Why Cisco eHub? a private, global, internet based, collaborative supply chain network. links Cisco with its contract manufacturers, distributors, and suppliers. through one central repository Example: • 3B2 advanced shipment notification • 3A6 sales order • 4C1 check inventory • 2A12 product master inventory
  • 39. References FTP: http://wiki.filezilla-project.org/Main_Page http://webee.technion.ac.il/labs/comnet/netcourse/CIE/RFC/959/5.htm http://www.mapsofworld.com/referrals/internet/internet-services/file-transfer.html Shared Databases: http://ptgmedia.pearsoncmg.com/images/0321200683/samplechapter/hohpech02.pdf http://msdn.microsoft.com/en-us/library/ff647273.aspx http://www.tibco.com/multimedia/ds-adapter_tcm8-753.pdf RPI: http://web.mit.edu/6.033/1997/reports/dp1-danlief.html http://www.krzyzanowski.org/rutgers/notes/pdf/rpc-slides.pdf http://itgs.tistory.com/attachment/1406296529.pdf http://en.wikipedia.org/wiki/Referential_transparency_(computer_science) http://netlib.org/utk/people/JackDongarra/PAPERS/grpc.pdf http://etutorials.org/Linux+systems/how+linux+works/Chapter+6+Network+Services/6.6+Remote+Procedure+Call+RPC/ Messaging: http://en.wikipedia.org/wiki/Message-oriented_middleware http://www.tml.tkk.fi/Opinnot/Tik-110.551/1997/mqs.htm http://www.middleware.org/mom/basicmom.html http://www.middleware.org/general/mqm.html http://www.iks.inf.ethz.ch/education/ws03/eai/Lecture-5.pdf http://www.tibco.com/products/soa/messaging/enterprise-mesage-service/default.jsp http://www.tibco.com/products/soa/messaging/rendezvous/default.jsp http://www.iwaysoftware.com/products/b2b_srt.html http://www.eaipatterns.com/docs/jaoo_hohpeg_enterpriseintegrationpatterns.pdf http://www.looselycoupled.com/glossary/MOM http://www.research.ibm.com/AEM/pubs/wes2003final.pdf http://eecs.wsu.edu/~bakken/middleware.pdf http://www.manning.com/snyder/snyder_meapch1.pdf http://middleware2003.inf.puc-rio.br/posters/quema.pdf http://www.di.ufpe.br/~redis/middleware/tran-mom02.pdf http://cs.gmu.edu/~setia/cs707/slides/mom.pdf
  • 40. Q & A The End. Thank You!

Editor's Notes

  1. The Advantages of File Transfer Protocol· One of the biggest advantages of file transfer protocol is that it is one of the fastest ways to get large files from one computer to another. · It's also efficient because you don't need to complete many operations to get the entire file or files transferred. · Most FTP servers require you to log in with a username and password.· FTP allows you to transfer files back and forth. This means that if you are an owner of a company, you can send information to your employees and they can send information back all on the same server. · Can transfer any type of file of any size, up to the limit of available disk space, and monitor the procedure as it happens to know that it has succeed. But there has to be a valid account on both local and remote computer systems.Read more: http://www.brighthub.com/internet/web-development/articles/16321.aspx#ixzz0tL7vj7XzThe Disadvantages of File Transfer Protocol·the size of the file that may be transferred may be limited by the sending or receiving site, or one of the relay sites along the way. Their might also be difficulties attaching and detaching files correctly. And binary files must be first encoded into a text-compatible format before they can pass through the e-mail system.· FTP frequently fails when the data has to pass through a firewall as FTP uses a wide range of unpredictable TCP ports and firewalls are designed to limit data flows to predictable TCP ports. There are ways to overcome this as explained in the following sections.
  2. PI : Protocol InterpreterDTP : Data Transfer ProtocolIn the model described above, the user-protocol interpreter initiates the control connection. The control connection follows the Telnet protocol. At the initiation of the user, standard FTP commands are generated by the user-PI and transmitted to the server process via the control connection. (The user may establish a direct control connection to the server-FTP, from a TAC terminal for example, and generate standard FTP commands independently, bypassing the user-FTP process.) Standard replies are sent from the server-PI to the user-PI over the control connection in response to the commands. The FTP commands specify the parameters for the data connection (data port, transfer mode, representation type, and structure) and the nature of file system operation (store, retrieve, append, delete, etc.). The user-DTP or its designate should "listen" on the specified data port, and the server initiate the data connection and data transfer in accordance with the specified parameters. It should be noted that the data port need not be in the same host that initiates the FTP commands via the control connection, but the user or the user-FTP process must ensure a "listen" on the specified data port. It ought to also be noted that the data connection may be used for simultaneous sending and receiving.
  3. File Transfer helps sharing photos, videos, documents irrespective of their size and file type by transmitting files over a computer network. File Transfer is invariably linked with FTP or file transfer protocol. FTP controls the transfer of files between two computing endpoints. To encourage indirect or implicit use of remote computers. •  To shield a user from variations in file storage systems among hosts. •  To transfer data reliably and efficiently. A file can also be transferred by attaching it to an e-mail message. The advantage is that it occurs asynchronously and does not require any direct account access to the remote site.
  4. Two different types, RPC (Remote Procedure Call) and RMI (Remote Method Invocation)
  5. Procedural Language - programmer specifies an explicit sequences of steps to follow to produce a resultMain Communication Mechanism – For distributed systems, they can use this as the main communication toolDoes not integrate different systems well – It is mainly used for single system, does not work as well for integrating different systems. Different address space needed.
  6. Uses Java codingInteract well in distributed networkSaves times as it catches mistakes early, changes can be made in a single computer as it using as main communication mechanism.Can add Java functions but only call methods in JavaOther methods written in other languages will need to have a bridge like “JDBC-ODBC”
  7. Benefits of this Integration StyleSimplified writing of application, all network codes hidden. No need to worry about details like the sockets, port numbers or byte orderingIt is compatible to all local systemsPitfalls of this Integration StyleIt easily gets problems like Server Generating Errors, Network Problems or Server/Client Crash while running the codes. It is important to make back ups and configure the system.Failures have to be dealt with using some other applications. Define: Referentially transparent if it can be replaced with its value without changing the program (in other words, yielding a program that has the same effects and output on the same input
  8. Client application invoked stub and makes procedure call, before packing information and pass to network interface. (Note: Client does not know stub exist) Stub is generated by library and executes. Network interface will execute protocol and pass to server. Server network get stub and unpack and execute. Data is returned to server stub and sent to client network interface. Then it will pass packet to client stub, which will unpack and return data to client.