1. BSIT: Integration Styles (Intra) Team 2 (By Appearance) Wang Miao Charmaine Kyros Aini *All Images Used In This PPT Is Subjected To Its Respective Copyright & For Illustration Purposes | Compiled By: Kyros
3. File Transfer Benefit Fastest way to transfer large files Transfer any type of file Problems File size transferred may be limited by the sending or receiving site. Problems with ftp and Firewalls
4. FTP Model Control User Interface User Data Server PI User PI Control functions (commands) and reply codes are transferred over the control connection. All data transfer takes place over the data connection. The control connection must be “up” while data transfer takes place. FileSystem User DTP File System Server DPT
5. Order Fulfillment process FTP can transfer spreadsheet by attaching it to an email message. Does not require any direct account access to the remote site. It can shield myPC.com operators from variation in the file storage system. Transferring of customer orders and pay can be done reliably and efficiently.
6. Filezilla product It is a lightweight, efficient FTP written with security in mind. Filezilla supports both authenticated and anonymous FTP, PAM authentication, bandwidth limiting, and SSL encryption support. If sftp and ssh/scpare not enough for your system, then consider using Filezilla. Filezilla can be used together with SFTP and SSH/SCP for more security
8. Shared Database SCM System POS System Website SQL Server database DB2 database MySQL database Microsoft (Shared Database) Integration is achieved by storing all data in a “shared database”, and define the schema of the database to handle all the needs of the different applications.
9. How To Solve? Install a standard software interface for accessing database management systems (DBMS) as shared database, which can store different types of database (e.g. DB2 database, SQL Server database, MySQL database). Example: When order information is made online via the website stored in the MySQL database has to be entered into the SCM system that stores its data in IBM DB2 database, according to the integration by storing all database in a shared database, the order information will be stored in the shared database, and then the SCM system can get order information from shared database. It also can transfer customers’ orders information between the POS system and the SCM system.
24. How to integrate? DB2 SCM (IBM OS400) Language: COBOL MSSQL MYSQL POS (Windows Server) Language: C, C++, C# Web Server (Linux: RedHat) Technology: Apache Mr Wang had faced the problem which these 3 systems cannot communicate to each other. All is done by manual. So the solution is to use…
26. Messaging Why? Using Asynchronous Messaging… It is more reliable than Remote Procedure Invocation (RPI). It is more immediate than File Transfer (FTP). It is better encapsulated than Shared Database.
27. Asynchronous Messaging loose coupling program-to-program communication with reliable delivery send & forget, store & forward
28. Integration DB2 SCM (IBM OS400) Language: COBOL Message Server MSSQL MYSQL POS (Windows Server) Language: C, C++, C# Web Server (Linux: RedHat) Technology: Apache These 3 systems can now communicate to each other by deploying a message server (Message Oriented Middleware, MOM) act as the “middleman” and it must be in the same network to work.
29. More In-depth… DB2 SCM (IBM OS400) Language: COBOL Message Oriented Middleware (MOM) Eg. TIBCO Rendezvous Messaging Channel Messaging Channel MSSQL MYSQL Messaging Channel POS (Windows Server) Language: C, C++, C# Web Server (Linux: RedHat) Technology: Apache
30. MOM Provides… remote communication platform / language Integration asynchrony throttling variable timing reliability disconnected operation reduction in # of threads
31. MOM Defines… interface to applications channels with producers, consumers when to send in what format routing (even without full knowledge of receiver) error, connection management & monitoring
33. About Suppliers Mr Wang has 3 suppliers in China. Mr Wang do not know what is the technology that his suppliers use for the SCM. SCM SCM SCM ? ? ? Supplier 1 (ShangHai) Supplier 2 (Tianjin) Supplier 3 (Suzhou) Assumption: Maybe its using new or old technology?
34. How? By using: TIBCO BusinessConnect RosettaNet Partner Interface Procotols Cisco eHub Recommended for integrating with MOM and we use MOM for Mr Wang’s Intra Integration.
36. Why RosettaNet Partner Interface Process (RosettaNet PIP)? RosettaNet is one of the largest programmers and supporters of a PIP system. PIP is a kind of supply chain ordering system. The function of a PIP is to automate and streamline the supply chain of a process. Eg. If a manufacturer requires a certain type of material, he can place the request on RosettaNet’s PIP and receive several responses without worry of translation or standardisation problems.
37. Why Cisco eHub? a private, global, internet based, collaborative supply chain network. links Cisco with its contract manufacturers, distributors, and suppliers. through one central repository Example: • 3B2 advanced shipment notification • 3A6 sales order • 4C1 check inventory • 2A12 product master inventory
The Advantages of File Transfer Protocol· One of the biggest advantages of file transfer protocol is that it is one of the fastest ways to get large files from one computer to another. · It's also efficient because you don't need to complete many operations to get the entire file or files transferred. · Most FTP servers require you to log in with a username and password.· FTP allows you to transfer files back and forth. This means that if you are an owner of a company, you can send information to your employees and they can send information back all on the same server. · Can transfer any type of file of any size, up to the limit of available disk space, and monitor the procedure as it happens to know that it has succeed. But there has to be a valid account on both local and remote computer systems.Read more: http://www.brighthub.com/internet/web-development/articles/16321.aspx#ixzz0tL7vj7XzThe Disadvantages of File Transfer Protocol·the size of the file that may be transferred may be limited by the sending or receiving site, or one of the relay sites along the way. Their might also be difficulties attaching and detaching files correctly. And binary files must be first encoded into a text-compatible format before they can pass through the e-mail system.· FTP frequently fails when the data has to pass through a firewall as FTP uses a wide range of unpredictable TCP ports and firewalls are designed to limit data flows to predictable TCP ports. There are ways to overcome this as explained in the following sections.
PI : Protocol InterpreterDTP : Data Transfer ProtocolIn the model described above, the user-protocol interpreter initiates the control connection. The control connection follows the Telnet protocol. At the initiation of the user, standard FTP commands are generated by the user-PI and transmitted to the server process via the control connection. (The user may establish a direct control connection to the server-FTP, from a TAC terminal for example, and generate standard FTP commands independently, bypassing the user-FTP process.) Standard replies are sent from the server-PI to the user-PI over the control connection in response to the commands. The FTP commands specify the parameters for the data connection (data port, transfer mode, representation type, and structure) and the nature of file system operation (store, retrieve, append, delete, etc.). The user-DTP or its designate should "listen" on the specified data port, and the server initiate the data connection and data transfer in accordance with the specified parameters. It should be noted that the data port need not be in the same host that initiates the FTP commands via the control connection, but the user or the user-FTP process must ensure a "listen" on the specified data port. It ought to also be noted that the data connection may be used for simultaneous sending and receiving.
File Transfer helps sharing photos, videos, documents irrespective of their size and file type by transmitting files over a computer network. File Transfer is invariably linked with FTP or file transfer protocol. FTP controls the transfer of files between two computing endpoints. To encourage indirect or implicit use of remote computers. • To shield a user from variations in file storage systems among hosts. • To transfer data reliably and efficiently. A file can also be transferred by attaching it to an e-mail message. The advantage is that it occurs asynchronously and does not require any direct account access to the remote site.
Two different types, RPC (Remote Procedure Call) and RMI (Remote Method Invocation)
Procedural Language - programmer specifies an explicit sequences of steps to follow to produce a resultMain Communication Mechanism – For distributed systems, they can use this as the main communication toolDoes not integrate different systems well – It is mainly used for single system, does not work as well for integrating different systems. Different address space needed.
Uses Java codingInteract well in distributed networkSaves times as it catches mistakes early, changes can be made in a single computer as it using as main communication mechanism.Can add Java functions but only call methods in JavaOther methods written in other languages will need to have a bridge like “JDBC-ODBC”
Benefits of this Integration StyleSimplified writing of application, all network codes hidden. No need to worry about details like the sockets, port numbers or byte orderingIt is compatible to all local systemsPitfalls of this Integration StyleIt easily gets problems like Server Generating Errors, Network Problems or Server/Client Crash while running the codes. It is important to make back ups and configure the system.Failures have to be dealt with using some other applications. Define: Referentially transparent if it can be replaced with its value without changing the program (in other words, yielding a program that has the same effects and output on the same input
Client application invoked stub and makes procedure call, before packing information and pass to network interface. (Note: Client does not know stub exist) Stub is generated by library and executes. Network interface will execute protocol and pass to server. Server network get stub and unpack and execute. Data is returned to server stub and sent to client network interface. Then it will pass packet to client stub, which will unpack and return data to client.