SlideShare a Scribd company logo
BY
SUNITA D. RATHOD
J2EE

 Objective:


  - simplify development and
 maintenance of enterprise applications
 ( B2B, B2C ).
Enterprise applications goals

•   To support or advance the goals of the
    organization.
•   To be able to compete effectively.
•   To streamline operations.
•   To save or make money.
Need for J2EE
• Integration with legacy EIS.

• Reliability and confidence.

• Complexity (mission-critical) in building and
 maintaining.

 odules exist on heterogeneous environment.


 ifferent modules written in different languages.
J2EE goals
• To provide an architecture to:
  • Reduce server down-time.
  • Increase application scalability (raise to demands).
  • Application stability (should execute as expected
    without crashing without exhibiting buggy nature
    or incompleteness).
  • Secure (be tolerant to unauthorized access of vital
    data).
  • Simplicity (to enable faster development and
    maintenance).
Advantages of J2EE
• Being developed and enhanced under the
 ordinance of JCP, meets the real-time
 requirements of enterprise application developers.
• Portable deployment – “develop once, deploy
 anywhere” mantra.
• Forces to abide by three-tiered architecture and
 supports n-tier.
Advantages of J2EE
• Provides infrastructure/design to enable
 developers to create, distributed and
 interoperable enterprise apps.
• It is a distributed, multi-tiered and component
 based architecture that facilitates scalable
 applications.
• Scalability of not only applications performance
 but also of application development process.
What is J2EE?
• It’s a separate edition of Java optimized to meet the usage
  and performance requirements of enterprise solutions.

• J2EE is J2SE + additional API’s (that provide enterprise
  computing capabilities) and an execution environment for
  them.

• It is designed for construction of distributed apps and is
  based on MVC paradigm, a proven approach for designing
  multi-tier, enterprise apps that are scalable and
  maintainable.
What is J2EE?
• It is an architecture specification to provide/support
 distributed, multi-tiered, component based
 platform/infrastructure to enable developers to create
 (develop) and deploy enterprise applications that are
 secure, distributed, interoperable and scalable.

• It simplifies enterprise application development and
 maintenance by basing them on standardized,
 modular components, by providing a complete set of
 services to those components, and by handling
 details of application behavior automatically.
When do I use J2EE?
 To provide fast, reliable access to corporate databases
 from the Web.
 To build dynamic, data-driven web applications for
 large user populations that expect 24*7 availability.
 To automate E-Mail or wireless communications with
 partners, vendors, employees or customers.
 To implement complex business logic.
When do I use J2EE?
 To provide robust user
 authentication/authorization for web resources
 and other services.
 To write applications that seamlessly integrate
 data from disparate sources on multiple
 platforms.
 To execute distributed transactions across
 multiple data stores.
Evolution of Enterprise
Application Framework

 Single tier
 Two tier
 Three tier
 N- tier
About Enterprise
Applications
 Things that make up an enterprise application
    – Presentation logic
    – Business logic
    – Data access logic (and data model)
    – System services
 The evolution of enterprise application framework
 reflects
   – How flexibly you want to make changes
   – Where the system services are coming from
Single Tier (Mainframe-based)

 Dumb terminals are directly
  connected to mainframe

 Centralized model (as opposed
  distributed model)

 Presentation, business logic, and data
  access are intertwined in one
  monolithic mainframe application

 Eg. FOXPRO
Single-Tier : Pros & Cons
 Pros:
    – No client side management is required
    – Data consistency is easy to achieve


 Cons:
    – Functionality (presentation, data model, business
     logic) intertwined, difficult for updates and
     maintenance and code reuse
Two-Tier

 Fat clients talking to back end
 database
   – SQL queries sent, raw data
    returned
 Presentation, Business logic
 and Data Model processing
 logic in client application
  • Client – Server systems

  • Ex:- Unix, mainframes
Two-Tier : Pros & Cons
 Pro:
    – DB product independence (compared to single-tier model)
 Cons:
    – Presentation, data model, business logic are intertwined
       (at client side), difficult for updates and maintenance
      – Data Model is “tightly coupled” to every client: If DB
       Schema changes, all clients break
      – Updates have to be deployed to all clients making System
       maintenance nightmare
      – DB connection for every client, thus difficult to scale
      – Raw data transferred to client for processing causes high
       network traffic
Three-Tier (RPC based)

 Thinner client: business & data
  model separated from
  presentation
   – Business logic and data access
    logic reside in middle tier server
    while client handles
    presentation
 Middle tier server is now
  required to handle system
  services
   – Concurrency control,
    threading, transaction, security,
    persistence, multiplexing,
    performance, etc.
Three-Tier (RPC based) : Pros
& Cons
 Pro:
    – Business logic can change more flexibly than 2-tier
     model
        Most business logic reside in the middle-tier server
 Cons:
    – Complexity is introduced in the middle-tier server
    – Client and middle-tier server is more tightlycoupled
     (than the three-tier object based model)
    – Code is not really reusable (compared to object model
     based)
N-Tier
• N-Tiered architecture: Various components that make up
 the application are logically separated or distributed
 across network.
  • Client  Server  Server  Database
  • Eg. ATM Application
Tier Architecture in J2EE
Tier Architecture in J2EE

• Front end (Client):
  • Viewed and manipulated by the users.
  • It can live in a Web browser or a standalone application.
  • Presents customized information to clients
    requirements.
  • Servlets and JSP is used as Front end development.
Tier Architecture in J2EE
• Middle:
  • Contains business logic Ex: Discounts.
  • It may contain two sub-tiers:
    •   Web Tier – It handles communication to client.
    •   EJB Tier – It manages business logic and access to
        corporate data.

• Backend (EIS):
  • Provides access to various corporate data stores
    (Databases, E-Mail system, Legacy systems…)
Tier Architecture in J2EE
Need for MVC

J2EE designers were faced with a question of where
to place the code in a distributed environment.
Reasonable solution: To divide the code and put
them closer to their respective tier.
This approach reminds a popular, proven 20 year
old application design pattern called MVC.
MVC is a design pattern for building maintainable
applications, introduced by Xerox researchers.
What is MVC?
• Technique aimed to make large applications
  flexible/simple during development and maintenance.
• It is a design pattern for partitioning of labor into
  three layers.
• The "model" is the internal workings of the program
  (the algorithms), the "view" is how the user sees the
  state of the model and the "controller" is how the user
  changes the state or provides input.
What is MVC?

 In this pattern, application flow is mediated by a
 central controller that delegates requests to an
 appropriate handler.
 Controller is the means by which users interacts with
 web application. Controller is responsible for input to
 the model.
What is MVC?

 Ex: A pure GUI controller accepts input from the user
 and instructs the model to create a view based on that
 input. If an invalid input is sent to the controller from
 the view, model informs controller to direct the view
 that error occurred and to tell it to try again.
MVC Example

VIEW   CONTROLLER            MODEL

         getBalance()


            Transfer()


         Withdraw()

 ATM                        Account DB
           Deposit()
              ATM Network
 THAT’S ALL FOR TODAY


 GOOD DAY

More Related Content

What's hot

Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11Tech_MX
 
Pattern oriented architecture for web based architecture
Pattern oriented architecture for web based architecturePattern oriented architecture for web based architecture
Pattern oriented architecture for web based architecture
shuchi tripathi
 
WebSphere Message Broker In Shared Runtime Environments
WebSphere Message Broker In Shared Runtime EnvironmentsWebSphere Message Broker In Shared Runtime Environments
WebSphere Message Broker In Shared Runtime Environments
Mårten Gustafson
 
J2 ee architecture
J2 ee architectureJ2 ee architecture
J2 ee architecture
Krishna Mer
 
N-Tier, Layered Design, SOA
N-Tier, Layered Design, SOAN-Tier, Layered Design, SOA
N-Tier, Layered Design, SOA
Sperasoft
 
Client Server Architecture1
Client Server Architecture1Client Server Architecture1
Client Server Architecture1
Bosch Software Innovations
 
Spring
SpringSpring
Spring
Suman Behara
 
Client sever architecture
Client sever architectureClient sever architecture
Client sever architecture
Tahira Sadaf
 
Client Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja DharClient Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja Dhar
puja_dhar
 
Web Component Development with Servlet and JSP Technologies Unit 01
Web Component Development with Servlet and JSP Technologies Unit 01Web Component Development with Servlet and JSP Technologies Unit 01
Web Component Development with Servlet and JSP Technologies Unit 01
Prashanth Shivakumar
 
J2ee web services(overview)
J2ee web services(overview)J2ee web services(overview)
J2ee web services(overview)
Prafull Jain
 
2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning
S M Qamar Abbas
 
An Inference Sharing Architecture for a More Efficient Context Reasoning
An Inference Sharing Architecture for a More Efficient Context ReasoningAn Inference Sharing Architecture for a More Efficient Context Reasoning
An Inference Sharing Architecture for a More Efficient Context Reasoning
Aitor Almeida
 
An Enterprise Ontology based approach to Model-Driven Engineering
An Enterprise Ontology based approach to Model-Driven EngineeringAn Enterprise Ontology based approach to Model-Driven Engineering
An Enterprise Ontology based approach to Model-Driven Engineering
Johan den Haan
 
uday_plsql_3years_cv
uday_plsql_3years_cvuday_plsql_3years_cv
uday_plsql_3years_cvuday sampati
 
Ch 8 Client Server
Ch 8  Client  ServerCh 8  Client  Server
Ch 8 Client Serverguest8fdbdd
 
Client server-computing
Client server-computingClient server-computing
Client server-computingjayasreep3
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier ArchitectureWebx
 

What's hot (20)

Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
 
Pattern oriented architecture for web based architecture
Pattern oriented architecture for web based architecturePattern oriented architecture for web based architecture
Pattern oriented architecture for web based architecture
 
WebSphere Message Broker In Shared Runtime Environments
WebSphere Message Broker In Shared Runtime EnvironmentsWebSphere Message Broker In Shared Runtime Environments
WebSphere Message Broker In Shared Runtime Environments
 
J2 ee architecture
J2 ee architectureJ2 ee architecture
J2 ee architecture
 
N-Tier, Layered Design, SOA
N-Tier, Layered Design, SOAN-Tier, Layered Design, SOA
N-Tier, Layered Design, SOA
 
Client Server Architecture1
Client Server Architecture1Client Server Architecture1
Client Server Architecture1
 
Spring
SpringSpring
Spring
 
Client sever architecture
Client sever architectureClient sever architecture
Client sever architecture
 
Client Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja DharClient Server Computing Slides by Puja Dhar
Client Server Computing Slides by Puja Dhar
 
Client server
Client serverClient server
Client server
 
Web Component Development with Servlet and JSP Technologies Unit 01
Web Component Development with Servlet and JSP Technologies Unit 01Web Component Development with Servlet and JSP Technologies Unit 01
Web Component Development with Servlet and JSP Technologies Unit 01
 
J2ee web services(overview)
J2ee web services(overview)J2ee web services(overview)
J2ee web services(overview)
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning2-Tier and 3-Tier Architecture of Enterprise Resource Planning
2-Tier and 3-Tier Architecture of Enterprise Resource Planning
 
An Inference Sharing Architecture for a More Efficient Context Reasoning
An Inference Sharing Architecture for a More Efficient Context ReasoningAn Inference Sharing Architecture for a More Efficient Context Reasoning
An Inference Sharing Architecture for a More Efficient Context Reasoning
 
An Enterprise Ontology based approach to Model-Driven Engineering
An Enterprise Ontology based approach to Model-Driven EngineeringAn Enterprise Ontology based approach to Model-Driven Engineering
An Enterprise Ontology based approach to Model-Driven Engineering
 
uday_plsql_3years_cv
uday_plsql_3years_cvuday_plsql_3years_cv
uday_plsql_3years_cv
 
Ch 8 Client Server
Ch 8  Client  ServerCh 8  Client  Server
Ch 8 Client Server
 
Client server-computing
Client server-computingClient server-computing
Client server-computing
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
 

Similar to J2 ee archi

Over view of software artitecture
Over view of software artitectureOver view of software artitecture
Over view of software artitecture
ABDEL RAHMAN KARIM
 
Enterprise java unit-1_chapter-2
Enterprise java unit-1_chapter-2Enterprise java unit-1_chapter-2
Enterprise java unit-1_chapter-2
sandeep54552
 
enterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdfenterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdf
EidTahir
 
Struts & hibernate ppt
Struts & hibernate pptStruts & hibernate ppt
Struts & hibernate ppt
Pankaj Patel
 
Web tier-framework-mvc
Web tier-framework-mvcWeb tier-framework-mvc
Web tier-framework-mvc
KashfUlHuda1
 
WebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development TrainingWebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development Training
Vijaya Raghava Vuligundam
 
Interaction-Oriented Architecture.pptx
Interaction-Oriented Architecture.pptxInteraction-Oriented Architecture.pptx
Interaction-Oriented Architecture.pptx
Godwin Monserate
 
Web apps architecture
Web apps architectureWeb apps architecture
Web apps architecture
Tanmoy Barman
 
Building Enterprise Application with J2EE
Building Enterprise Application with J2EEBuilding Enterprise Application with J2EE
Building Enterprise Application with J2EE
Calance
 
Software Design Patterns
Software Design PatternsSoftware Design Patterns
Software Design Patterns
alkuzaee
 
Mcv design patterns
Mcv design patternsMcv design patterns
Mcv design patterns
Rob Paok
 
MVC(Model View Controller),Web,Enterprise,Mobile
MVC(Model View Controller),Web,Enterprise,MobileMVC(Model View Controller),Web,Enterprise,Mobile
MVC(Model View Controller),Web,Enterprise,Mobile
naral
 
Mvc pattern and implementation in java fair
Mvc   pattern   and implementation   in   java fairMvc   pattern   and implementation   in   java fair
Mvc pattern and implementation in java fairTech_MX
 
Introduction to ejb and struts framework
Introduction to ejb and struts frameworkIntroduction to ejb and struts framework
Introduction to ejb and struts framework
s4al_com
 
J2 EEE SIDES
J2 EEE  SIDESJ2 EEE  SIDES
J2 EEE SIDESbputhal
 
A Software Factory Integrating Rational & WebSphere Tools
A Software Factory Integrating Rational & WebSphere ToolsA Software Factory Integrating Rational & WebSphere Tools
A Software Factory Integrating Rational & WebSphere Tools
ghodgkinson
 
IRJET- MVC Framework: A Modern Web Application Development Approach and Working
IRJET- MVC Framework: A Modern Web Application Development Approach and WorkingIRJET- MVC Framework: A Modern Web Application Development Approach and Working
IRJET- MVC Framework: A Modern Web Application Development Approach and Working
IRJET Journal
 
MicroserviceArchitecture in detail over Monolith.
MicroserviceArchitecture in detail over Monolith.MicroserviceArchitecture in detail over Monolith.
MicroserviceArchitecture in detail over Monolith.
PLovababu
 
Actively looking for an opportunity to work as a challenging Dot Net Developer
Actively looking for an opportunity to work as a challenging Dot Net DeveloperActively looking for an opportunity to work as a challenging Dot Net Developer
Actively looking for an opportunity to work as a challenging Dot Net Developer
Karthik Reddy
 
Actively looking for an opportunity to work as a challenging Dot Net Developer
Actively looking for an opportunity to work as a challenging Dot Net DeveloperActively looking for an opportunity to work as a challenging Dot Net Developer
Actively looking for an opportunity to work as a challenging Dot Net Developer
Karthik Reddy
 

Similar to J2 ee archi (20)

Over view of software artitecture
Over view of software artitectureOver view of software artitecture
Over view of software artitecture
 
Enterprise java unit-1_chapter-2
Enterprise java unit-1_chapter-2Enterprise java unit-1_chapter-2
Enterprise java unit-1_chapter-2
 
enterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdfenterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdf
 
Struts & hibernate ppt
Struts & hibernate pptStruts & hibernate ppt
Struts & hibernate ppt
 
Web tier-framework-mvc
Web tier-framework-mvcWeb tier-framework-mvc
Web tier-framework-mvc
 
WebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development TrainingWebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development Training
 
Interaction-Oriented Architecture.pptx
Interaction-Oriented Architecture.pptxInteraction-Oriented Architecture.pptx
Interaction-Oriented Architecture.pptx
 
Web apps architecture
Web apps architectureWeb apps architecture
Web apps architecture
 
Building Enterprise Application with J2EE
Building Enterprise Application with J2EEBuilding Enterprise Application with J2EE
Building Enterprise Application with J2EE
 
Software Design Patterns
Software Design PatternsSoftware Design Patterns
Software Design Patterns
 
Mcv design patterns
Mcv design patternsMcv design patterns
Mcv design patterns
 
MVC(Model View Controller),Web,Enterprise,Mobile
MVC(Model View Controller),Web,Enterprise,MobileMVC(Model View Controller),Web,Enterprise,Mobile
MVC(Model View Controller),Web,Enterprise,Mobile
 
Mvc pattern and implementation in java fair
Mvc   pattern   and implementation   in   java fairMvc   pattern   and implementation   in   java fair
Mvc pattern and implementation in java fair
 
Introduction to ejb and struts framework
Introduction to ejb and struts frameworkIntroduction to ejb and struts framework
Introduction to ejb and struts framework
 
J2 EEE SIDES
J2 EEE  SIDESJ2 EEE  SIDES
J2 EEE SIDES
 
A Software Factory Integrating Rational & WebSphere Tools
A Software Factory Integrating Rational & WebSphere ToolsA Software Factory Integrating Rational & WebSphere Tools
A Software Factory Integrating Rational & WebSphere Tools
 
IRJET- MVC Framework: A Modern Web Application Development Approach and Working
IRJET- MVC Framework: A Modern Web Application Development Approach and WorkingIRJET- MVC Framework: A Modern Web Application Development Approach and Working
IRJET- MVC Framework: A Modern Web Application Development Approach and Working
 
MicroserviceArchitecture in detail over Monolith.
MicroserviceArchitecture in detail over Monolith.MicroserviceArchitecture in detail over Monolith.
MicroserviceArchitecture in detail over Monolith.
 
Actively looking for an opportunity to work as a challenging Dot Net Developer
Actively looking for an opportunity to work as a challenging Dot Net DeveloperActively looking for an opportunity to work as a challenging Dot Net Developer
Actively looking for an opportunity to work as a challenging Dot Net Developer
 
Actively looking for an opportunity to work as a challenging Dot Net Developer
Actively looking for an opportunity to work as a challenging Dot Net DeveloperActively looking for an opportunity to work as a challenging Dot Net Developer
Actively looking for an opportunity to work as a challenging Dot Net Developer
 

More from saurabhshertukde (19)

Revision sql te it new syllabus
Revision sql te it new syllabusRevision sql te it new syllabus
Revision sql te it new syllabus
 
Oodbms ch 20
Oodbms ch 20Oodbms ch 20
Oodbms ch 20
 
Introduction er & eer
Introduction er & eerIntroduction er & eer
Introduction er & eer
 
Introduction er & eer
Introduction er &  eerIntroduction er &  eer
Introduction er & eer
 
Integrity & security
Integrity & securityIntegrity & security
Integrity & security
 
Er model
Er modelEr model
Er model
 
Er & eer to relational mapping
Er & eer to relational mappingEr & eer to relational mapping
Er & eer to relational mapping
 
Eer case study
Eer case studyEer case study
Eer case study
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
J2 ee architecture
J2 ee architectureJ2 ee architecture
J2 ee architecture
 
Software project-scheduling
Software project-schedulingSoftware project-scheduling
Software project-scheduling
 
Softwareproject planning
Softwareproject planningSoftwareproject planning
Softwareproject planning
 
Pressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelsPressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-models
 
Design concepts and principles
Design concepts and principlesDesign concepts and principles
Design concepts and principles
 
Analysis modelling
Analysis modellingAnalysis modelling
Analysis modelling
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principles
 
Risk analysis
Risk analysisRisk analysis
Risk analysis
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

J2 ee archi

  • 2. J2EE  Objective: - simplify development and maintenance of enterprise applications ( B2B, B2C ).
  • 3. Enterprise applications goals • To support or advance the goals of the organization. • To be able to compete effectively. • To streamline operations. • To save or make money.
  • 4. Need for J2EE • Integration with legacy EIS. • Reliability and confidence. • Complexity (mission-critical) in building and maintaining. odules exist on heterogeneous environment. ifferent modules written in different languages.
  • 5. J2EE goals • To provide an architecture to: • Reduce server down-time. • Increase application scalability (raise to demands). • Application stability (should execute as expected without crashing without exhibiting buggy nature or incompleteness). • Secure (be tolerant to unauthorized access of vital data). • Simplicity (to enable faster development and maintenance).
  • 6. Advantages of J2EE • Being developed and enhanced under the ordinance of JCP, meets the real-time requirements of enterprise application developers. • Portable deployment – “develop once, deploy anywhere” mantra. • Forces to abide by three-tiered architecture and supports n-tier.
  • 7. Advantages of J2EE • Provides infrastructure/design to enable developers to create, distributed and interoperable enterprise apps. • It is a distributed, multi-tiered and component based architecture that facilitates scalable applications. • Scalability of not only applications performance but also of application development process.
  • 8. What is J2EE? • It’s a separate edition of Java optimized to meet the usage and performance requirements of enterprise solutions. • J2EE is J2SE + additional API’s (that provide enterprise computing capabilities) and an execution environment for them. • It is designed for construction of distributed apps and is based on MVC paradigm, a proven approach for designing multi-tier, enterprise apps that are scalable and maintainable.
  • 9. What is J2EE? • It is an architecture specification to provide/support distributed, multi-tiered, component based platform/infrastructure to enable developers to create (develop) and deploy enterprise applications that are secure, distributed, interoperable and scalable. • It simplifies enterprise application development and maintenance by basing them on standardized, modular components, by providing a complete set of services to those components, and by handling details of application behavior automatically.
  • 10. When do I use J2EE?  To provide fast, reliable access to corporate databases from the Web.  To build dynamic, data-driven web applications for large user populations that expect 24*7 availability.  To automate E-Mail or wireless communications with partners, vendors, employees or customers.  To implement complex business logic.
  • 11. When do I use J2EE?  To provide robust user authentication/authorization for web resources and other services.  To write applications that seamlessly integrate data from disparate sources on multiple platforms.  To execute distributed transactions across multiple data stores.
  • 12. Evolution of Enterprise Application Framework  Single tier  Two tier  Three tier  N- tier
  • 13. About Enterprise Applications  Things that make up an enterprise application  – Presentation logic  – Business logic  – Data access logic (and data model)  – System services  The evolution of enterprise application framework reflects  – How flexibly you want to make changes  – Where the system services are coming from
  • 14. Single Tier (Mainframe-based)  Dumb terminals are directly connected to mainframe  Centralized model (as opposed distributed model)  Presentation, business logic, and data access are intertwined in one monolithic mainframe application  Eg. FOXPRO
  • 15. Single-Tier : Pros & Cons  Pros:  – No client side management is required  – Data consistency is easy to achieve  Cons:  – Functionality (presentation, data model, business logic) intertwined, difficult for updates and maintenance and code reuse
  • 16. Two-Tier  Fat clients talking to back end database  – SQL queries sent, raw data returned  Presentation, Business logic and Data Model processing logic in client application • Client – Server systems • Ex:- Unix, mainframes
  • 17. Two-Tier : Pros & Cons  Pro:  – DB product independence (compared to single-tier model)  Cons:  – Presentation, data model, business logic are intertwined (at client side), difficult for updates and maintenance  – Data Model is “tightly coupled” to every client: If DB Schema changes, all clients break  – Updates have to be deployed to all clients making System maintenance nightmare  – DB connection for every client, thus difficult to scale  – Raw data transferred to client for processing causes high network traffic
  • 18. Three-Tier (RPC based)  Thinner client: business & data model separated from presentation  – Business logic and data access logic reside in middle tier server while client handles presentation  Middle tier server is now required to handle system services  – Concurrency control, threading, transaction, security, persistence, multiplexing, performance, etc.
  • 19. Three-Tier (RPC based) : Pros & Cons  Pro:  – Business logic can change more flexibly than 2-tier model  Most business logic reside in the middle-tier server  Cons:  – Complexity is introduced in the middle-tier server  – Client and middle-tier server is more tightlycoupled (than the three-tier object based model)  – Code is not really reusable (compared to object model based)
  • 20. N-Tier • N-Tiered architecture: Various components that make up the application are logically separated or distributed across network. • Client  Server  Server  Database • Eg. ATM Application
  • 22. Tier Architecture in J2EE • Front end (Client): • Viewed and manipulated by the users. • It can live in a Web browser or a standalone application. • Presents customized information to clients requirements. • Servlets and JSP is used as Front end development.
  • 23. Tier Architecture in J2EE • Middle: • Contains business logic Ex: Discounts. • It may contain two sub-tiers: • Web Tier – It handles communication to client. • EJB Tier – It manages business logic and access to corporate data. • Backend (EIS): • Provides access to various corporate data stores (Databases, E-Mail system, Legacy systems…)
  • 25. Need for MVC J2EE designers were faced with a question of where to place the code in a distributed environment. Reasonable solution: To divide the code and put them closer to their respective tier. This approach reminds a popular, proven 20 year old application design pattern called MVC. MVC is a design pattern for building maintainable applications, introduced by Xerox researchers.
  • 26. What is MVC? • Technique aimed to make large applications flexible/simple during development and maintenance. • It is a design pattern for partitioning of labor into three layers. • The "model" is the internal workings of the program (the algorithms), the "view" is how the user sees the state of the model and the "controller" is how the user changes the state or provides input.
  • 27. What is MVC?  In this pattern, application flow is mediated by a central controller that delegates requests to an appropriate handler.  Controller is the means by which users interacts with web application. Controller is responsible for input to the model.
  • 28. What is MVC?  Ex: A pure GUI controller accepts input from the user and instructs the model to create a view based on that input. If an invalid input is sent to the controller from the view, model informs controller to direct the view that error occurred and to tell it to try again.
  • 29. MVC Example VIEW CONTROLLER MODEL getBalance() Transfer() Withdraw() ATM Account DB Deposit() ATM Network
  • 30.  THAT’S ALL FOR TODAY  GOOD DAY