SlideShare una empresa de Scribd logo
1 de 43
Legacy Connectivity and Protocols


Pre-assessment Questions
         1.   Which statement depicts the role of an architect in the post-construction
              phase?
              a)  Focuses on the requirements of the developer
              b) Reviews the construction-level designs to analyze the problems
                  and requests changes
              c)  Enables a client to migrate the project rollout to the new system
                  EJB home object
              d) Expands the details of the design and refines the design to
                  converge on the final design




 ©NIIT                  Architecting J2EE Solutions          Lesson 1B / Slide 1 of 43
Legacy Connectivity and Protocols


Pre-assessment Questions
         1.   Consider the statements:
              Statement A: Layering is an architectural pattern that breaks up a
              complicated system into some modules.
              Statement B: Layers are divided based on the functional responsibilities
              of the modules.
              Identify the correct option.
              b) Statement A is true and statement B is false
              c)   Statement A is false and statement B is true
              d) Both, statements A and B, are true
              e)   Both, statements A and B, are false




 ©NIIT                  Architecting J2EE Solutions          Lesson 1B / Slide 2 of 43
Legacy Connectivity and Protocols


Pre-assessment Questions
         1.   Consider the statements:
              Statement A: Vertical scalability is achieved by adding new servers to
              the existing system.
              Statement B: Horizontal scalability is achieved by adding memory to the
              existing server or by adding more CPUs to the server.
              Identify the correct option.
              a)    Statement A is true and statement B is false
              b) Statement A is false and statement B is true
              c)    Both, statements A and B, are true
              d) Both, statements A and B, are false




 ©NIIT                  Architecting J2EE Solutions         Lesson 1B / Slide 3 of 43
Legacy Connectivity and Protocols


Pre-assessment Questions
         1.   Which J2EE client component makes application deployment a simple
              process?
              a)   Application Client
              b) HTML Page
              c)   Applet
              d) Java WebStart

         2.   Which option is identified as a business component?
              a)  EJB
              b) JSP
              c)  Servlet
              d) Applet




 ©NIIT                  Architecting J2EE Solutions        Lesson 1B / Slide 4 of 43
Legacy Connectivity and Protocols

Solutions to Pre-assessment Questions
         1.   c. Enables a client to migrate the project rollout to the new system
         2.   c. Both, statements A and B, are true
         3.   d. Both, statements A and B, are false
         4.   d. Java WebStart
         5.   a. EJB




 ©NIIT                  Architecting J2EE Solutions          Lesson 1B / Slide 5 of 43
Legacy Connectivity and Protocols


Objectives

    In this lesson you will learn to:


         •   Identify the types of legacy integration
         •   Examine the various approaches to legacy integration
         •   Implement legacy connectivity using JNI and JCA
         •   Identify the features of Different Protocols




 ©NIIT                   Architecting J2EE Solutions        Lesson 1B / Slide 6 of 43
Legacy Connectivity and Protocols


Legacy Integration
    •    Legacy integration is referred to as the integration of J2EE components with a
         legacy system.
    •    Legacy integration allows interconnectivity between different platforms and
         programming languages.
    •    Synchronous Integration:
           • Involves circular communication between a J2EE application and the
             Enterprise Information System (EIS).
           • Provides synchronous communication between a J2EE application and the
             EIS, which consists of the request/response interaction model.




 ©NIIT                    Architecting J2EE Solutions         Lesson 1B / Slide 7 of 43
Legacy Connectivity and Protocols


Legacy Integration (Contd.)
    •    Asynchronous Integration
           • Involves message-based communication between a J2EE application and
             EIS.
           • A message in asynchronous communication carries information used
             within a single business process of an enterprise or across the business
             processes of multiple enterprises.
           • The two types of asynchronous communication are:
               • Queue-based communication: Involves a message queue that does
                  not depend on application, which is sending and receiving messages.
                  Queue-based communication is also known as point-to-point
                  messaging.
               • Publish-subscribe Messaging : Involves a message board, where an
                  application publishes messages on a specific topic. Subscriber
                  applications can subscribe to a specific topic and receive all the
                  published messages on that topic.


 ©NIIT                   Architecting J2EE Solutions         Lesson 1B / Slide 8 of 43
Legacy Connectivity and Protocols


Approaches to Legacy Integration
    •    Different approaches to perform legacy integration are:
           • Data level integration
                • Integrates a J2EE application with the backend data stores that are
                   used in an integrated application.
                • Includes access to newly developed data stores produced by a legacy
                   system, for the specific purpose of data access.
                • Can be push-based or pull-based.
           • Application Interface Integration
                • Uses the integration frameworks and application programming
                   interfaces (APIs) of integrated applications to integrate two
                   applications.
                • Is preferable to other approaches, such as data level integration,
                   because it is transparent to the integrated application and preserves
                   data integrity of the application.



 ©NIIT                    Architecting J2EE Solutions         Lesson 1B / Slide 9 of 43
Legacy Connectivity and Protocols


Approaches to Legacy Integration
(Contd.)
    •    Different approaches to perform legacy integration are (Contd.):
           • Method Level Integration
                • Shares business logic as a collection of methods or operations that
                   the integrated application can invoke.
                • Is useful when each integrated application provides a similar set of
                   API or functional methods.
           • User Interface Level Integration
                • Accesses the existing applications through the user interfaces of the
                   applications.
                • Is suitable when you do not have direct access to a database or when
                   the business logic is embedded in the user interface.




 ©NIIT                    Architecting J2EE Solutions       Lesson 1B / Slide 10 of 43
Legacy Connectivity and Protocols


Legacy Connectivity
    •    Legacy connectivity means connecting a J2EE component with an already
         existing application or a library that may have been written in languages other
         than Java.
    •    Some techniques or architectures that provide connectivity to the legacy
         applications are:
           • Java native interface
           • J2EE connector architecture
           • Web services




 ©NIIT                    Architecting J2EE Solutions         Lesson 1B / Slide 11 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)

    •    Using Java Native Interface
          • Used to write the custom code that enables you to integrate new business
             logic with a legacy system.
          • Programmers use JNI to write Java native methods to handle the
             situations when an application cannot be written entirely in Java.
          • Enables Java to call native methods and also allows the native methods to
             create and manipulate the Java objects.
          • A native method can also update the Java objects that are passed to it or
             that are created by it.




 ©NIIT                   Architecting J2EE Solutions        Lesson 1B / Slide 12 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using Java Native Interface (Contd.)
          • Legacy program using JNI




 ©NIIT                    Architecting J2EE Solutions   Lesson 1B / Slide 13 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using Java Native Interface (Contd.)
         • The steps involved in writing native methods for java programs are:
              •    Write the Java code: Write a Java code to create a class that
                   declares the native method and includes a main method to call the
                   native method.
              •    Compile the Java code: Compile the created Java code using javac
                   command.
              •    Create the .h file: You use the javah command with the native
                   interface flag -jni to generate a header file for the native method.
              •    Write the native method implementation: Write the C or C++ code
                   to implement the native method. The name of the native function
                   consists of the prefix Java_, the package name, the class name,
                   and the name of the native method. The underscore (_) is used as
                   the separator between each component name.



 ©NIIT                  Architecting J2EE Solutions         Lesson 1B / Slide 14 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using Java Native Interface (Contd.)
         • The steps involved in writing native methods for java programs are
              (Contd.):
              The syntax of the native method declaration is:
              JNIEXPORT void JNICALL
              Java_PackageName_ClassName_NativeMethodName(JNIEnv *, jobject)
              3.   Create a shared library: Create a shared library file or a dynamic
                   link library (DLL) file by compiling the header file and the
                   implementation (C or C++) file. The command to create the DLL
                   file is:
                   CL -FeTemp.dll –LD msg.c
                   You need to specify the name of the DLL file and the native
                          language file.
              4.   Run the program: You can now execute the java program to
                   perform the desired task.

 ©NIIT                  Architecting J2EE Solutions         Lesson 1B / Slide 15 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using Java Native Interface (Contd.)
         • The advantage of JNI is:
              • It is faster than the other legacy integration approaches.
         • The disadvantages of JNI are:
              • It cannot connect to all legacy system.
              • The existing system needs to run in process.
              • It is platform-specific.
              • If you want to run the code on multiple platforms, it is difficult to
                   test and maintain the code.




 ©NIIT                  Architecting J2EE Solutions         Lesson 1B / Slide 16 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using J2EE Connector Architecture
          • J2EE Connector Architecture:
                • Defines a standard architecture for connecting a J2EE application
                  server to EIS.
                • Provides a Java solution to the connectivity problem between the
                  existing EISs and the various application servers.
                • Enables Java to call native methods and also allows the native
                  methods to create and manipulate the Java objects.
                • Enables a vendor to provide a standard resource adapter for its EIS.




 ©NIIT                    Architecting J2EE Solutions        Lesson 1B / Slide 17 of 43
Legacy Connectivity and Protocols

Legacy Connectivity (Contd.)
    •    Using J2EE Connector Architecture (Contd.)
          • The following figure shows the JCA architecture:




 ©NIIT                   Architecting J2EE Solutions           Lesson 1B / Slide 18 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using J2EE Connector Architecture (Contd.)
          • Types of contracts in JCA are:
                • System level contracts: Exist between a J2EE application server
                     and a resource adapter.
                • Application level contracts: Exist between an application server
                     and a J2EE application.




 ©NIIT                 Architecting J2EE Solutions      Lesson 1B / Slide 19 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using J2EE Connector Architecture (Contd.)
         • Three types of system contracts are:
              • Connection Management: Describes the agreement a J2EE
                  container with the resource adapter regarding establishing,
                  pooling, and closing down connections.
              • Transaction Management: Controls transactions in two different
                  ways by creating distributed transactions and local transactions.
              • Security: Enables the application server to connect to an EIS
                  system via resource adapter using security properties.




 ©NIIT                  Architecting J2EE Solutions        Lesson 1B / Slide 20 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using J2EE Connector Architecture (Contd.)
         • The JCA also defines a CCI for EIS access.
         • CCI:
              • Defines a client API that is a standard for application components.
              • Enables the application components and Enterprise Application
                    Integration (EAI) frameworks to perform interactions across
                    heterogeneous EISs using a common client API.
         • EAI is the process of creating an integrated framework for linking
              different legacy systems, applications, and data sources across an
              enterprise.




 ©NIIT                 Architecting J2EE Solutions        Lesson 1B / Slide 21 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using J2EE Connector Architecture (Contd.)
         • The steps for using the CCI API and a connector resource to access a
              database are:
              • Create a connector module that specifies the resource adapter file.
              • Create a connection pool that uses the connector module.
              • Create a JNDI context for a session, where the username and
                   password required to access a database are specified.
              • Use the lookup() method to locate the ConnectionFactory for the
                   resource adapter.
              • Use the getConnection() ConnectionFactory method to open a
                   connection to the database.
              • Perform the required operation on the database.
              • Close the connection to the database.


 ©NIIT                 Architecting J2EE Solutions       Lesson 1B / Slide 22 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using Web Services
         • Web Services:
              • Provide a distributed computing environment for using the
                  business services of applications.
              • Use standard XML protocols and formats, which makes the Web
                  Services platform independent, language independent, and vendor
                  independent.
              • Provide an approach to integrate to existing systems.
              • Provide standard ways to access middle-tier and back-end
                  services, such as database management systems and transaction
                  monitors.




 ©NIIT                 Architecting J2EE Solutions      Lesson 1B / Slide 23 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using Web Services (Contd.)
         • The advantage of Web services is that any system that is Internet-
              enabled can use Web services without a separate communications
              infrastructure, such as Common Object Request Broker Architecture
              (CORBA) or Java Message Service (JMS).
         • The disadvantage of Web services is that the XML parsing overhead
              may decrease the performance of the system.
         • The Web service APIs, such as Java API for XML-based RPC (JAX-RPC),
              Java API for XML Registries (JAXR), and SOAP (Simple Object Access
              Protocol) with Attachments API for Java (SAAJ) provides a standard
              Java API for connecting applications and legacy systems.




 ©NIIT                 Architecting J2EE Solutions      Lesson 1B / Slide 24 of 43
Legacy Connectivity and Protocols


Legacy Connectivity (Contd.)
    •    Using Web Services (Contd.)
         • The JAX APIs can be divided into two categories:
              • Document-oriented: Deals with XML documents processing.
              • Procedure-oriented: Deals with procedures. Web services use the
                  procedure-oriented APIs for connecting to legacy systems.
              • The procedure-oriented APIs are:
                  •     JAX-RPC: Sends SOAP method calls to remote sites over the
                       Internet and receives the response.
                  •     SAAJ: Provides messaging in Java applications using resource
                       factories similar to the Java Messaging Service (JMS). Sends
                       SOAP messages over the Internet in a standard way.
                  • JAXR: Provides a standard way to access business registries
                       and share information.




 ©NIIT                 Architecting J2EE Solutions        Lesson 1B / Slide 25 of 43
Legacy Connectivity and Protocols


Demonstration-Implementing Legacy
  Integration Using JNI
    •    Problem Statement
         • Homelike Hospital Ltd. research laboratories situated at US is
             conducting certain experiments on creating a vaccine. For this
             they require that the temperature be mentioned in Celsius. They
             are doing a sampling on a base of 15,000 persons per day but
             the sample data received till now has the temperature recorded
             in Fahrenheit. The Smart Software Developers have earlier
             developed a program for converting temperature from
             Fahrenheit to Celsius but that program was created using ‘C’, for
             Homelike Hospital Ltd. The software that is being used by
             Homelike Hospital Ltd at present is Java. Smart Software
             Developers have been assigned the responsibility of reusing that
             code in the current setup.



 ©NIIT                Architecting J2EE Solutions     Lesson 1B / Slide 26 of 43
Legacy Connectivity and Protocols


Demonstration-Implementing Legacy
  Integration Using JNI (Contd.)
    •    Solution
         • To solve the preceding problem, perform the following tasks:
             1. Write the Java code.
             2. Compile the Java code.
             3. Create the .h file.
             4. Write the native method implementation.
             5. Create a shared library.
             6. Run the program.




 ©NIIT                Architecting J2EE Solutions   Lesson 1B / Slide 27 of 43
Legacy Connectivity and Protocols


Demonstration-Implementing Legacy
  Integration Using Resource Adapter
    •    Problem Statement
         • ABC Corp. deals in computer hardware products and stores
             business information in EIS (PointBase Database). With the
             increase in its client base, the management of ABC Corp. has
             decided to implement J2EE, for providing the information of
             product to its clients over the Internet. The company has
             decided to use SQL Server 2000 to store the application data.
             The management also wants that earlier information of their
             products stored in the PointBase database, should also be
             accessible through the J2EE application. The management wants
             that the integration with the PointBase database should be done
             using JCA resource adapters to ensure that any future change or
             upgradation of its database will have minimum effect on the
             application.

 ©NIIT                Architecting J2EE Solutions    Lesson 1B / Slide 28 of 43
Legacy Connectivity and Protocols


Demonstration-Implementing Legacy
  Integration Using Resource Adapter
  (Contd.)
    •    Solution
         • To solve the preceding problem, perform the following tasks:
             1.   Create JCA administered object.
             2. Create a J2EE Web client.
             3. Run the Application.




 ©NIIT                Architecting J2EE Solutions   Lesson 1B / Slide 29 of 43
Legacy Connectivity and Protocols


Overview of Protocols
    •    You need the protocols over which you can connect to some legacy systems.
    •    Some of the protocols are Hypertext Transfer Protocol (HTTP), HTTP over
         secure socket layer (HTTPS), Internet Inter-ORB Protocol (IIOP), and Java
         Remote Method Protocol (JRMP).
    •    HTTP and HTTPS are primarily intended as Web page transport, IIOP and
         JRMP are transports for CORBA and RMI respectively.
    •    You can use IIOP as an alternative transport for RMI and it is the preferred
         transport for RMI in an EJB system.




 ©NIIT                  Architecting J2EE Solutions        Lesson 1B / Slide 30 of 43
Legacy Connectivity and Protocols


Overview of Protocols (Contd.)
    •    HTTP
         • HyperText Transfer Protocol (HTTP):
             • Is based on the request/response model.
             • Specifies how messages are transmitted and formatted.
             • Defines the actions, Web servers and browsers in response to
                  various requests from client.
             • Is a connectionless and stateless protocol.
         • A stateless protocol means that the information from an earlier request
             or response is not available to subsequent responses.
         • You can add some state between two requests to associate the content
             of the two requests.
         • You can add state by using cookies, URL rewriting, and HTTPS.



 ©NIIT                 Architecting J2EE Solutions       Lesson 1B / Slide 31 of 43
Legacy Connectivity and Protocols


Overview of Protocols (Contd.)
    •    HTTP (Contd.)
         • Some of the request formats used by HTTP are:
             • GET: Carries only a URL into the server and the server should
                  response with the data for the URL. The URL for a GET request is
                  reflected in the address bar of most browsers.
             • POST: Sends information along with the URL when the client sends
                  a request to the server.
             • HEAD: Obtains some information about a Web page without
                  loading the page. The HEAD method is used to determine whether
                  a Web page has changed from the last cached page.




 ©NIIT                 Architecting J2EE Solutions       Lesson 1B / Slide 32 of 43
Legacy Connectivity and Protocols


Overview of Protocols (Contd.)
    •    HTTP (Contd.)
         • Advantages of HTTP are:
             • It possesses simple request and response mechanism.
             • It is allowed through firewalls.
             • HTTP supports transmission of arbitrary data.
         • Disadvantages of HTTP are:
             • HTTP is non-transactional protocol.
             • It is insecure and inefficient, as it requires too many TCP
                  connections.




 ©NIIT                 Architecting J2EE Solutions        Lesson 1B / Slide 33 of 43
Legacy Connectivity and Protocols


Overview of Protocols (Contd.)
    •    HTTPS
         • HTTP over Secure Socket Layer (SSL) transmits data securely over a
             network.
         • HTTP over SSL (HTTPS) is a combination of HTTP over a Secure Socket
             Layer (SSL) transport.
         • HTTPS is a connection-based Web protocol that encrypts and decrypts
             user page requests and also the pages returned by the Web servers.
         • SSL provides encryption, authentication, and a session for maintaining
             state.
         • SSL uses a private key to encrypt data transferred over the SSL
             connection. The level of encryption and authentication depends on the
             capability of the client and the server.




 ©NIIT                 Architecting J2EE Solutions       Lesson 1B / Slide 34 of 43
Legacy Connectivity and Protocols


Overview of Protocols (Contd.)
    •    HTTPS (Contd.)
         • Advantages of HTTPS are:
             • It is a secure protocol.
             • It is allowed through firewalls.
             • It is widely supported and deployed protocol.
         • Disadvantages of HTTPS are:
             • It can process only 10% of the traffic HTTP can process.
             • Administration overheads are high in case you are using HTTPS.




 ©NIIT                 Architecting J2EE Solutions     Lesson 1B / Slide 35 of 43
Legacy Connectivity and Protocols


Overview of Protocols (Contd.)
    •    IIOP
         •      Internet Inter-ORB Protocol (IIOP) enables distributed programs written
                in different programming languages to communicate over the Internet.
         •      IIOP is developed by the Object Management Group (OMG) to
                implement CORBA connectivity over a network.
         •      J2EE uses IIOP in two ways:
                • By using the Java Interface Definition Language (Java IDL) APIs.
                • By running Remote Method Invocation (RMI) over IIOP.




 ©NIIT                    Architecting J2EE Solutions        Lesson 1B / Slide 36 of 43
Legacy Connectivity and Protocols

Overview of Protocols (Contd.)
    •    IIOP (Contd.)
         • The following figure shows the IIOP over the Internet:




 ©NIIT                 Architecting J2EE Solutions       Lesson 1B / Slide 37 of 43
Legacy Connectivity and Protocols


Overview of Protocols (Contd.)
    •    IIOP (Contd.)
         • Advantages of IIOP are:
              • It supports interoperability. For example, Java clients can call C++
                  servers and C client can call Java server.
              • It is used in legacy integration.
              • It is designed for remote object invocation.
              • IIOP provides built-in support for security and transactions.
         • Disadvantages of IIOP are:
              • Firewalls cannot be configured with an IIOP port.
              • All method invocations are remote, as a result performance is not
                  good.
              • IIOP supports only remote references.



 ©NIIT                  Architecting J2EE Solutions       Lesson 1B / Slide 38 of 43
Legacy Connectivity and Protocols


Overview of Protocols (Contd.)
    •    JRMP
         • Java Remote Method Protocol (JRMP) is a proprietary wire-level protocol
             for communication using Java Remote Method Invocation (RMI)
             technology.
         • JRMP can:
             • Invoke methods and pass arguments, return values, and
                   exceptions over the network.
             • Handle objects and JRMP does not restrict argument and return
                   types to data values.
         • JRMP is used to send method invocations and parameters and to return
             values and exceptions from one JVM to another.




 ©NIIT                 Architecting J2EE Solutions       Lesson 1B / Slide 39 of 43
Legacy Connectivity and Protocols


Overview of Protocols (Contd.)
    •    JRMP(Contd.)
         • JRMP Messages




 ©NIIT              Architecting J2EE Solutions   Lesson 1B / Slide 40 of 43
Legacy Connectivity and Protocols


Overview of Protocols (Contd.)
    •    JRMP(Contd.)
         • Advantages of JRMP are:
             • It supports parameter passing by reference or by value.
             • It supports distributed garbage collection.
             • It provides single multiplexed connection.
         • Disadvantages of JRMP are:
             • Servers are bound to arbitrary ports.
             • HTTP tunneling is limited.
             • Performance is low because all method invocations are remote.




 ©NIIT                 Architecting J2EE Solutions     Lesson 1B / Slide 41 of 43
Legacy Connectivity and Protocols


Summary
    In this lesson, you learned:
         • The legacy integration is of two types, synchronous and asynchronous.
         • Synchronous integration involves synchronous communication between
               a J2EE application and an Enterprise Information System (EIS).
         • The synchronous communication between a J2EE application and an EIS
               consists of the request/response interaction model.
         • Asynchronous integration involves message-based communication
               between a J2EE application and EIS.
         • Two types of asynchronous communication are queue-based
               communication and publish-subscribe messaging.
         • There are different approaches to perform legacy integration, such as
               data level integration, application interface level integration, method
               level integration, and user interface level integration.
         • Data level integration integrates the backend data stores, which are
               used in the integrated application.


 ©NIIT                  Architecting J2EE Solutions        Lesson 1B / Slide 42 of 43
Legacy Connectivity and Protocols


Summary(Contd.)
    •    Application interface level integration uses the integration frameworks and
         application programming interfaces (APIs) of integrated applications to
         integrate two applications.
    •    Method level integration shares business logic as a collection of methods or
         operations that the integrated application can invoke.
    •    User interface level integration accesses existing applications through their
         user interfaces.
    •    Java Native Interface (JNI) is used to write custom code that integrates new
         business logic with a legacy system.
    •    J2EE Connector Architecture (JCA) defines a standard architecture for
         connecting a J2EE application server to EIS.
    •    The Web service APIs, such as JAX-RPC, JAXR, and SAAJ provides a standard
         Java API for connecting applications and legacy systems
    •    Various protocols are required to connect over legacy systems. The protocols
         are HTTP, HTTPS, IIOP, and JRMP.


 ©NIIT                  Architecting J2EE Solutions        Lesson 1B / Slide 43 of 43

Más contenido relacionado

La actualidad más candente

Java session01
Java session01Java session01
Java session01Niit Care
 
3 f6 9_distributed_systems
3 f6 9_distributed_systems3 f6 9_distributed_systems
3 f6 9_distributed_systemsop205
 
3 f6 8_databases
3 f6 8_databases3 f6 8_databases
3 f6 8_databasesop205
 
Chapter 2 slides
Chapter 2 slidesChapter 2 slides
Chapter 2 slideslara_ays
 
8 - Architetture Software - Architecture centric processes
8 - Architetture Software - Architecture centric processes8 - Architetture Software - Architecture centric processes
8 - Architetture Software - Architecture centric processesMajong DevJfu
 
White Paper: Compartmentalized Continuous Integration: Enabling Rapid, Flexib...
White Paper: Compartmentalized Continuous Integration: Enabling Rapid, Flexib...White Paper: Compartmentalized Continuous Integration: Enabling Rapid, Flexib...
White Paper: Compartmentalized Continuous Integration: Enabling Rapid, Flexib...Perforce
 
Dot Net Interview Questions - Part 1
Dot Net Interview Questions - Part 1Dot Net Interview Questions - Part 1
Dot Net Interview Questions - Part 1ReKruiTIn.com
 
Software Patterns
Software PatternsSoftware Patterns
Software Patternskim.mens
 
4 - Architetture Software - Architecture Portfolio
4 - Architetture Software - Architecture Portfolio4 - Architetture Software - Architecture Portfolio
4 - Architetture Software - Architecture PortfolioMajong DevJfu
 
Seeing O S Processes To Improve Dependability And Safety
Seeing  O S  Processes To  Improve  Dependability And  SafetySeeing  O S  Processes To  Improve  Dependability And  Safety
Seeing O S Processes To Improve Dependability And Safetyalanocu
 
2010 01 lecture SIG UM MFES 2 - Patterns metrics quality
2010 01 lecture SIG UM MFES 2 - Patterns metrics quality2010 01 lecture SIG UM MFES 2 - Patterns metrics quality
2010 01 lecture SIG UM MFES 2 - Patterns metrics qualityjstvssr
 
Survey paper
Survey paperSurvey paper
Survey paperIJASCSE
 
Fragility in evolving software
Fragility in evolving softwareFragility in evolving software
Fragility in evolving softwarekim.mens
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overviewQA Club Kiev
 

La actualidad más candente (20)

Ajs 3 c
Ajs 3 cAjs 3 c
Ajs 3 c
 
Ajs 2 a
Ajs 2 aAjs 2 a
Ajs 2 a
 
Ajs 2 c
Ajs 2 cAjs 2 c
Ajs 2 c
 
Java session01
Java session01Java session01
Java session01
 
3 f6 9_distributed_systems
3 f6 9_distributed_systems3 f6 9_distributed_systems
3 f6 9_distributed_systems
 
3 f6 8_databases
3 f6 8_databases3 f6 8_databases
3 f6 8_databases
 
Chapter 2 slides
Chapter 2 slidesChapter 2 slides
Chapter 2 slides
 
8 - Architetture Software - Architecture centric processes
8 - Architetture Software - Architecture centric processes8 - Architetture Software - Architecture centric processes
8 - Architetture Software - Architecture centric processes
 
7494611
74946117494611
7494611
 
White Paper: Compartmentalized Continuous Integration: Enabling Rapid, Flexib...
White Paper: Compartmentalized Continuous Integration: Enabling Rapid, Flexib...White Paper: Compartmentalized Continuous Integration: Enabling Rapid, Flexib...
White Paper: Compartmentalized Continuous Integration: Enabling Rapid, Flexib...
 
Dot Net Interview Questions - Part 1
Dot Net Interview Questions - Part 1Dot Net Interview Questions - Part 1
Dot Net Interview Questions - Part 1
 
08 component level_design
08 component level_design08 component level_design
08 component level_design
 
Software Patterns
Software PatternsSoftware Patterns
Software Patterns
 
4 - Architetture Software - Architecture Portfolio
4 - Architetture Software - Architecture Portfolio4 - Architetture Software - Architecture Portfolio
4 - Architetture Software - Architecture Portfolio
 
Seeing O S Processes To Improve Dependability And Safety
Seeing  O S  Processes To  Improve  Dependability And  SafetySeeing  O S  Processes To  Improve  Dependability And  Safety
Seeing O S Processes To Improve Dependability And Safety
 
2010 01 lecture SIG UM MFES 2 - Patterns metrics quality
2010 01 lecture SIG UM MFES 2 - Patterns metrics quality2010 01 lecture SIG UM MFES 2 - Patterns metrics quality
2010 01 lecture SIG UM MFES 2 - Patterns metrics quality
 
Survey paper
Survey paperSurvey paper
Survey paper
 
Introducing MDSD
Introducing MDSDIntroducing MDSD
Introducing MDSD
 
Fragility in evolving software
Fragility in evolving softwareFragility in evolving software
Fragility in evolving software
 
Skype testing overview
Skype testing overviewSkype testing overview
Skype testing overview
 

Destacado

Comp tia n+_session_11
Comp tia n+_session_11Comp tia n+_session_11
Comp tia n+_session_11Niit Care
 
Java session14
Java session14Java session14
Java session14Niit Care
 
Java session05
Java session05Java session05
Java session05Niit Care
 
Jdbc session02
Jdbc session02Jdbc session02
Jdbc session02Niit Care
 
Java session02
Java session02Java session02
Java session02Niit Care
 
01 ds and algorithm session_01
01 ds and algorithm session_0101 ds and algorithm session_01
01 ds and algorithm session_01Niit Care
 
Java session11
Java session11Java session11
Java session11Niit Care
 
02 t1 s2_linux_lesson2
02 t1 s2_linux_lesson202 t1 s2_linux_lesson2
02 t1 s2_linux_lesson2Niit Care
 
02 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_0202 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_02Niit Care
 
Comp tia a+_session_02
Comp tia a+_session_02Comp tia a+_session_02
Comp tia a+_session_02Niit Care
 
11 ds and algorithm session_16
11 ds and algorithm session_1611 ds and algorithm session_16
11 ds and algorithm session_16Niit Care
 

Destacado (20)

Comp tia n+_session_11
Comp tia n+_session_11Comp tia n+_session_11
Comp tia n+_session_11
 
Dacj 1-1 b
Dacj 1-1 bDacj 1-1 b
Dacj 1-1 b
 
Java session14
Java session14Java session14
Java session14
 
Dacj 4 2-a
Dacj 4 2-aDacj 4 2-a
Dacj 4 2-a
 
Dacj 1-1 c
Dacj 1-1 cDacj 1-1 c
Dacj 1-1 c
 
Java session05
Java session05Java session05
Java session05
 
Dacj 1-3 c
Dacj 1-3 cDacj 1-3 c
Dacj 1-3 c
 
Jdbc session02
Jdbc session02Jdbc session02
Jdbc session02
 
Java session02
Java session02Java session02
Java session02
 
01 ds and algorithm session_01
01 ds and algorithm session_0101 ds and algorithm session_01
01 ds and algorithm session_01
 
Java session11
Java session11Java session11
Java session11
 
CompTIA A+ (2009 edition) certificate
CompTIA A+ (2009 edition) certificateCompTIA A+ (2009 edition) certificate
CompTIA A+ (2009 edition) certificate
 
Sql xp 09
Sql xp 09Sql xp 09
Sql xp 09
 
02 t1 s2_linux_lesson2
02 t1 s2_linux_lesson202 t1 s2_linux_lesson2
02 t1 s2_linux_lesson2
 
Sql xp 11
Sql xp 11Sql xp 11
Sql xp 11
 
02 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_0202 iec t1_s1_plt_session_02
02 iec t1_s1_plt_session_02
 
Sql xp 10
Sql xp 10Sql xp 10
Sql xp 10
 
Dacj 1-3 b
Dacj 1-3 bDacj 1-3 b
Dacj 1-3 b
 
Comp tia a+_session_02
Comp tia a+_session_02Comp tia a+_session_02
Comp tia a+_session_02
 
11 ds and algorithm session_16
11 ds and algorithm session_1611 ds and algorithm session_16
11 ds and algorithm session_16
 

Similar a Ajs 1 b

Vb.net session 03
Vb.net session 03Vb.net session 03
Vb.net session 03Niit Care
 
Building Enterprise Application with J2EE
Building Enterprise Application with J2EEBuilding Enterprise Application with J2EE
Building Enterprise Application with J2EECalance
 
Vb.net session 13
Vb.net session 13Vb.net session 13
Vb.net session 13Niit Care
 
Vb.net session 01
Vb.net session 01Vb.net session 01
Vb.net session 01Niit Care
 
Dependency Injection in .NET
Dependency Injection in .NETDependency Injection in .NET
Dependency Injection in .NETssusere19c741
 
Java v/s .NET - Which is Better?
Java v/s .NET - Which is Better?Java v/s .NET - Which is Better?
Java v/s .NET - Which is Better?NIIT India
 
SathishKumar Natarajan
SathishKumar NatarajanSathishKumar Natarajan
SathishKumar NatarajanSathish Kumar
 
App Connect v12. Unit testing with a Pipeline Example. Trevor Dolby Architect...
App Connect v12. Unit testing with a Pipeline Example. Trevor Dolby Architect...App Connect v12. Unit testing with a Pipeline Example. Trevor Dolby Architect...
App Connect v12. Unit testing with a Pipeline Example. Trevor Dolby Architect...mrle7
 
Clean architecture with asp.net core
Clean architecture with asp.net coreClean architecture with asp.net core
Clean architecture with asp.net coreSam Nasr, MCSA, MVP
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010bestip
 
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.pptL14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.pptAronBalais1
 
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.pptL14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.pptAxmedMaxamuud6
 

Similar a Ajs 1 b (20)

Vb.net session 03
Vb.net session 03Vb.net session 03
Vb.net session 03
 
Ajs 1 a
Ajs 1 aAjs 1 a
Ajs 1 a
 
Building Enterprise Application with J2EE
Building Enterprise Application with J2EEBuilding Enterprise Application with J2EE
Building Enterprise Application with J2EE
 
0764543857.excerpt.pdf
0764543857.excerpt.pdf0764543857.excerpt.pdf
0764543857.excerpt.pdf
 
Vb.net session 13
Vb.net session 13Vb.net session 13
Vb.net session 13
 
Vb.net session 01
Vb.net session 01Vb.net session 01
Vb.net session 01
 
Dependency Injection in .NET
Dependency Injection in .NETDependency Injection in .NET
Dependency Injection in .NET
 
Java v/s .NET - Which is Better?
Java v/s .NET - Which is Better?Java v/s .NET - Which is Better?
Java v/s .NET - Which is Better?
 
ECampusConnect
ECampusConnectECampusConnect
ECampusConnect
 
IEC.ppt
IEC.pptIEC.ppt
IEC.ppt
 
SathishKumar Natarajan
SathishKumar NatarajanSathishKumar Natarajan
SathishKumar Natarajan
 
Mannu_Kumar_CV
Mannu_Kumar_CVMannu_Kumar_CV
Mannu_Kumar_CV
 
Alpana_Srivastava
Alpana_SrivastavaAlpana_Srivastava
Alpana_Srivastava
 
App Connect v12. Unit testing with a Pipeline Example. Trevor Dolby Architect...
App Connect v12. Unit testing with a Pipeline Example. Trevor Dolby Architect...App Connect v12. Unit testing with a Pipeline Example. Trevor Dolby Architect...
App Connect v12. Unit testing with a Pipeline Example. Trevor Dolby Architect...
 
Dtacs
DtacsDtacs
Dtacs
 
Clean architecture with asp.net core
Clean architecture with asp.net coreClean architecture with asp.net core
Clean architecture with asp.net core
 
Java Interview Questions
Java Interview QuestionsJava Interview Questions
Java Interview Questions
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010
 
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.pptL14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
 
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.pptL14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
L14_DesignGoalsSubsystemDecompositionc_ch06lect1.ppt
 

Más de Niit Care

Más de Niit Care (14)

Ajs 4 c
Ajs 4 cAjs 4 c
Ajs 4 c
 
Ajs 1 c
Ajs 1 cAjs 1 c
Ajs 1 c
 
Dacj 4 2-c
Dacj 4 2-cDacj 4 2-c
Dacj 4 2-c
 
Dacj 4 2-b
Dacj 4 2-bDacj 4 2-b
Dacj 4 2-b
 
Dacj 4 1-c
Dacj 4 1-cDacj 4 1-c
Dacj 4 1-c
 
Dacj 4 1-b
Dacj 4 1-bDacj 4 1-b
Dacj 4 1-b
 
Dacj 1-3 a
Dacj 1-3 aDacj 1-3 a
Dacj 1-3 a
 
Dacj 1-2 c
Dacj 1-2 cDacj 1-2 c
Dacj 1-2 c
 
Dacj 1-2 a
Dacj 1-2 aDacj 1-2 a
Dacj 1-2 a
 
Dacj 1-1 a
Dacj 1-1 aDacj 1-1 a
Dacj 1-1 a
 
Dacj 2-2 b
Dacj 2-2 bDacj 2-2 b
Dacj 2-2 b
 
Dacj 2-2 a
Dacj 2-2 aDacj 2-2 a
Dacj 2-2 a
 
Dacj 2-1 c
Dacj 2-1 cDacj 2-1 c
Dacj 2-1 c
 
Dacj 2-1 b
Dacj 2-1 bDacj 2-1 b
Dacj 2-1 b
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Ajs 1 b

  • 1. Legacy Connectivity and Protocols Pre-assessment Questions 1. Which statement depicts the role of an architect in the post-construction phase? a) Focuses on the requirements of the developer b) Reviews the construction-level designs to analyze the problems and requests changes c) Enables a client to migrate the project rollout to the new system EJB home object d) Expands the details of the design and refines the design to converge on the final design ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 1 of 43
  • 2. Legacy Connectivity and Protocols Pre-assessment Questions 1. Consider the statements: Statement A: Layering is an architectural pattern that breaks up a complicated system into some modules. Statement B: Layers are divided based on the functional responsibilities of the modules. Identify the correct option. b) Statement A is true and statement B is false c) Statement A is false and statement B is true d) Both, statements A and B, are true e) Both, statements A and B, are false ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 2 of 43
  • 3. Legacy Connectivity and Protocols Pre-assessment Questions 1. Consider the statements: Statement A: Vertical scalability is achieved by adding new servers to the existing system. Statement B: Horizontal scalability is achieved by adding memory to the existing server or by adding more CPUs to the server. Identify the correct option. a) Statement A is true and statement B is false b) Statement A is false and statement B is true c) Both, statements A and B, are true d) Both, statements A and B, are false ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 3 of 43
  • 4. Legacy Connectivity and Protocols Pre-assessment Questions 1. Which J2EE client component makes application deployment a simple process? a) Application Client b) HTML Page c) Applet d) Java WebStart 2. Which option is identified as a business component? a) EJB b) JSP c) Servlet d) Applet ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 4 of 43
  • 5. Legacy Connectivity and Protocols Solutions to Pre-assessment Questions 1. c. Enables a client to migrate the project rollout to the new system 2. c. Both, statements A and B, are true 3. d. Both, statements A and B, are false 4. d. Java WebStart 5. a. EJB ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 5 of 43
  • 6. Legacy Connectivity and Protocols Objectives In this lesson you will learn to: • Identify the types of legacy integration • Examine the various approaches to legacy integration • Implement legacy connectivity using JNI and JCA • Identify the features of Different Protocols ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 6 of 43
  • 7. Legacy Connectivity and Protocols Legacy Integration • Legacy integration is referred to as the integration of J2EE components with a legacy system. • Legacy integration allows interconnectivity between different platforms and programming languages. • Synchronous Integration: • Involves circular communication between a J2EE application and the Enterprise Information System (EIS). • Provides synchronous communication between a J2EE application and the EIS, which consists of the request/response interaction model. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 7 of 43
  • 8. Legacy Connectivity and Protocols Legacy Integration (Contd.) • Asynchronous Integration • Involves message-based communication between a J2EE application and EIS. • A message in asynchronous communication carries information used within a single business process of an enterprise or across the business processes of multiple enterprises. • The two types of asynchronous communication are: • Queue-based communication: Involves a message queue that does not depend on application, which is sending and receiving messages. Queue-based communication is also known as point-to-point messaging. • Publish-subscribe Messaging : Involves a message board, where an application publishes messages on a specific topic. Subscriber applications can subscribe to a specific topic and receive all the published messages on that topic. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 8 of 43
  • 9. Legacy Connectivity and Protocols Approaches to Legacy Integration • Different approaches to perform legacy integration are: • Data level integration • Integrates a J2EE application with the backend data stores that are used in an integrated application. • Includes access to newly developed data stores produced by a legacy system, for the specific purpose of data access. • Can be push-based or pull-based. • Application Interface Integration • Uses the integration frameworks and application programming interfaces (APIs) of integrated applications to integrate two applications. • Is preferable to other approaches, such as data level integration, because it is transparent to the integrated application and preserves data integrity of the application. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 9 of 43
  • 10. Legacy Connectivity and Protocols Approaches to Legacy Integration (Contd.) • Different approaches to perform legacy integration are (Contd.): • Method Level Integration • Shares business logic as a collection of methods or operations that the integrated application can invoke. • Is useful when each integrated application provides a similar set of API or functional methods. • User Interface Level Integration • Accesses the existing applications through the user interfaces of the applications. • Is suitable when you do not have direct access to a database or when the business logic is embedded in the user interface. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 10 of 43
  • 11. Legacy Connectivity and Protocols Legacy Connectivity • Legacy connectivity means connecting a J2EE component with an already existing application or a library that may have been written in languages other than Java. • Some techniques or architectures that provide connectivity to the legacy applications are: • Java native interface • J2EE connector architecture • Web services ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 11 of 43
  • 12. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using Java Native Interface • Used to write the custom code that enables you to integrate new business logic with a legacy system. • Programmers use JNI to write Java native methods to handle the situations when an application cannot be written entirely in Java. • Enables Java to call native methods and also allows the native methods to create and manipulate the Java objects. • A native method can also update the Java objects that are passed to it or that are created by it. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 12 of 43
  • 13. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using Java Native Interface (Contd.) • Legacy program using JNI ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 13 of 43
  • 14. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using Java Native Interface (Contd.) • The steps involved in writing native methods for java programs are: • Write the Java code: Write a Java code to create a class that declares the native method and includes a main method to call the native method. • Compile the Java code: Compile the created Java code using javac command. • Create the .h file: You use the javah command with the native interface flag -jni to generate a header file for the native method. • Write the native method implementation: Write the C or C++ code to implement the native method. The name of the native function consists of the prefix Java_, the package name, the class name, and the name of the native method. The underscore (_) is used as the separator between each component name. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 14 of 43
  • 15. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using Java Native Interface (Contd.) • The steps involved in writing native methods for java programs are (Contd.): The syntax of the native method declaration is: JNIEXPORT void JNICALL Java_PackageName_ClassName_NativeMethodName(JNIEnv *, jobject) 3. Create a shared library: Create a shared library file or a dynamic link library (DLL) file by compiling the header file and the implementation (C or C++) file. The command to create the DLL file is: CL -FeTemp.dll –LD msg.c You need to specify the name of the DLL file and the native language file. 4. Run the program: You can now execute the java program to perform the desired task. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 15 of 43
  • 16. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using Java Native Interface (Contd.) • The advantage of JNI is: • It is faster than the other legacy integration approaches. • The disadvantages of JNI are: • It cannot connect to all legacy system. • The existing system needs to run in process. • It is platform-specific. • If you want to run the code on multiple platforms, it is difficult to test and maintain the code. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 16 of 43
  • 17. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using J2EE Connector Architecture • J2EE Connector Architecture: • Defines a standard architecture for connecting a J2EE application server to EIS. • Provides a Java solution to the connectivity problem between the existing EISs and the various application servers. • Enables Java to call native methods and also allows the native methods to create and manipulate the Java objects. • Enables a vendor to provide a standard resource adapter for its EIS. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 17 of 43
  • 18. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using J2EE Connector Architecture (Contd.) • The following figure shows the JCA architecture: ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 18 of 43
  • 19. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using J2EE Connector Architecture (Contd.) • Types of contracts in JCA are: • System level contracts: Exist between a J2EE application server and a resource adapter. • Application level contracts: Exist between an application server and a J2EE application. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 19 of 43
  • 20. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using J2EE Connector Architecture (Contd.) • Three types of system contracts are: • Connection Management: Describes the agreement a J2EE container with the resource adapter regarding establishing, pooling, and closing down connections. • Transaction Management: Controls transactions in two different ways by creating distributed transactions and local transactions. • Security: Enables the application server to connect to an EIS system via resource adapter using security properties. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 20 of 43
  • 21. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using J2EE Connector Architecture (Contd.) • The JCA also defines a CCI for EIS access. • CCI: • Defines a client API that is a standard for application components. • Enables the application components and Enterprise Application Integration (EAI) frameworks to perform interactions across heterogeneous EISs using a common client API. • EAI is the process of creating an integrated framework for linking different legacy systems, applications, and data sources across an enterprise. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 21 of 43
  • 22. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using J2EE Connector Architecture (Contd.) • The steps for using the CCI API and a connector resource to access a database are: • Create a connector module that specifies the resource adapter file. • Create a connection pool that uses the connector module. • Create a JNDI context for a session, where the username and password required to access a database are specified. • Use the lookup() method to locate the ConnectionFactory for the resource adapter. • Use the getConnection() ConnectionFactory method to open a connection to the database. • Perform the required operation on the database. • Close the connection to the database. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 22 of 43
  • 23. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using Web Services • Web Services: • Provide a distributed computing environment for using the business services of applications. • Use standard XML protocols and formats, which makes the Web Services platform independent, language independent, and vendor independent. • Provide an approach to integrate to existing systems. • Provide standard ways to access middle-tier and back-end services, such as database management systems and transaction monitors. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 23 of 43
  • 24. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using Web Services (Contd.) • The advantage of Web services is that any system that is Internet- enabled can use Web services without a separate communications infrastructure, such as Common Object Request Broker Architecture (CORBA) or Java Message Service (JMS). • The disadvantage of Web services is that the XML parsing overhead may decrease the performance of the system. • The Web service APIs, such as Java API for XML-based RPC (JAX-RPC), Java API for XML Registries (JAXR), and SOAP (Simple Object Access Protocol) with Attachments API for Java (SAAJ) provides a standard Java API for connecting applications and legacy systems. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 24 of 43
  • 25. Legacy Connectivity and Protocols Legacy Connectivity (Contd.) • Using Web Services (Contd.) • The JAX APIs can be divided into two categories: • Document-oriented: Deals with XML documents processing. • Procedure-oriented: Deals with procedures. Web services use the procedure-oriented APIs for connecting to legacy systems. • The procedure-oriented APIs are: • JAX-RPC: Sends SOAP method calls to remote sites over the Internet and receives the response. • SAAJ: Provides messaging in Java applications using resource factories similar to the Java Messaging Service (JMS). Sends SOAP messages over the Internet in a standard way. • JAXR: Provides a standard way to access business registries and share information. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 25 of 43
  • 26. Legacy Connectivity and Protocols Demonstration-Implementing Legacy Integration Using JNI • Problem Statement • Homelike Hospital Ltd. research laboratories situated at US is conducting certain experiments on creating a vaccine. For this they require that the temperature be mentioned in Celsius. They are doing a sampling on a base of 15,000 persons per day but the sample data received till now has the temperature recorded in Fahrenheit. The Smart Software Developers have earlier developed a program for converting temperature from Fahrenheit to Celsius but that program was created using ‘C’, for Homelike Hospital Ltd. The software that is being used by Homelike Hospital Ltd at present is Java. Smart Software Developers have been assigned the responsibility of reusing that code in the current setup. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 26 of 43
  • 27. Legacy Connectivity and Protocols Demonstration-Implementing Legacy Integration Using JNI (Contd.) • Solution • To solve the preceding problem, perform the following tasks: 1. Write the Java code. 2. Compile the Java code. 3. Create the .h file. 4. Write the native method implementation. 5. Create a shared library. 6. Run the program. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 27 of 43
  • 28. Legacy Connectivity and Protocols Demonstration-Implementing Legacy Integration Using Resource Adapter • Problem Statement • ABC Corp. deals in computer hardware products and stores business information in EIS (PointBase Database). With the increase in its client base, the management of ABC Corp. has decided to implement J2EE, for providing the information of product to its clients over the Internet. The company has decided to use SQL Server 2000 to store the application data. The management also wants that earlier information of their products stored in the PointBase database, should also be accessible through the J2EE application. The management wants that the integration with the PointBase database should be done using JCA resource adapters to ensure that any future change or upgradation of its database will have minimum effect on the application. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 28 of 43
  • 29. Legacy Connectivity and Protocols Demonstration-Implementing Legacy Integration Using Resource Adapter (Contd.) • Solution • To solve the preceding problem, perform the following tasks: 1. Create JCA administered object. 2. Create a J2EE Web client. 3. Run the Application. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 29 of 43
  • 30. Legacy Connectivity and Protocols Overview of Protocols • You need the protocols over which you can connect to some legacy systems. • Some of the protocols are Hypertext Transfer Protocol (HTTP), HTTP over secure socket layer (HTTPS), Internet Inter-ORB Protocol (IIOP), and Java Remote Method Protocol (JRMP). • HTTP and HTTPS are primarily intended as Web page transport, IIOP and JRMP are transports for CORBA and RMI respectively. • You can use IIOP as an alternative transport for RMI and it is the preferred transport for RMI in an EJB system. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 30 of 43
  • 31. Legacy Connectivity and Protocols Overview of Protocols (Contd.) • HTTP • HyperText Transfer Protocol (HTTP): • Is based on the request/response model. • Specifies how messages are transmitted and formatted. • Defines the actions, Web servers and browsers in response to various requests from client. • Is a connectionless and stateless protocol. • A stateless protocol means that the information from an earlier request or response is not available to subsequent responses. • You can add some state between two requests to associate the content of the two requests. • You can add state by using cookies, URL rewriting, and HTTPS. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 31 of 43
  • 32. Legacy Connectivity and Protocols Overview of Protocols (Contd.) • HTTP (Contd.) • Some of the request formats used by HTTP are: • GET: Carries only a URL into the server and the server should response with the data for the URL. The URL for a GET request is reflected in the address bar of most browsers. • POST: Sends information along with the URL when the client sends a request to the server. • HEAD: Obtains some information about a Web page without loading the page. The HEAD method is used to determine whether a Web page has changed from the last cached page. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 32 of 43
  • 33. Legacy Connectivity and Protocols Overview of Protocols (Contd.) • HTTP (Contd.) • Advantages of HTTP are: • It possesses simple request and response mechanism. • It is allowed through firewalls. • HTTP supports transmission of arbitrary data. • Disadvantages of HTTP are: • HTTP is non-transactional protocol. • It is insecure and inefficient, as it requires too many TCP connections. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 33 of 43
  • 34. Legacy Connectivity and Protocols Overview of Protocols (Contd.) • HTTPS • HTTP over Secure Socket Layer (SSL) transmits data securely over a network. • HTTP over SSL (HTTPS) is a combination of HTTP over a Secure Socket Layer (SSL) transport. • HTTPS is a connection-based Web protocol that encrypts and decrypts user page requests and also the pages returned by the Web servers. • SSL provides encryption, authentication, and a session for maintaining state. • SSL uses a private key to encrypt data transferred over the SSL connection. The level of encryption and authentication depends on the capability of the client and the server. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 34 of 43
  • 35. Legacy Connectivity and Protocols Overview of Protocols (Contd.) • HTTPS (Contd.) • Advantages of HTTPS are: • It is a secure protocol. • It is allowed through firewalls. • It is widely supported and deployed protocol. • Disadvantages of HTTPS are: • It can process only 10% of the traffic HTTP can process. • Administration overheads are high in case you are using HTTPS. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 35 of 43
  • 36. Legacy Connectivity and Protocols Overview of Protocols (Contd.) • IIOP • Internet Inter-ORB Protocol (IIOP) enables distributed programs written in different programming languages to communicate over the Internet. • IIOP is developed by the Object Management Group (OMG) to implement CORBA connectivity over a network. • J2EE uses IIOP in two ways: • By using the Java Interface Definition Language (Java IDL) APIs. • By running Remote Method Invocation (RMI) over IIOP. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 36 of 43
  • 37. Legacy Connectivity and Protocols Overview of Protocols (Contd.) • IIOP (Contd.) • The following figure shows the IIOP over the Internet: ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 37 of 43
  • 38. Legacy Connectivity and Protocols Overview of Protocols (Contd.) • IIOP (Contd.) • Advantages of IIOP are: • It supports interoperability. For example, Java clients can call C++ servers and C client can call Java server. • It is used in legacy integration. • It is designed for remote object invocation. • IIOP provides built-in support for security and transactions. • Disadvantages of IIOP are: • Firewalls cannot be configured with an IIOP port. • All method invocations are remote, as a result performance is not good. • IIOP supports only remote references. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 38 of 43
  • 39. Legacy Connectivity and Protocols Overview of Protocols (Contd.) • JRMP • Java Remote Method Protocol (JRMP) is a proprietary wire-level protocol for communication using Java Remote Method Invocation (RMI) technology. • JRMP can: • Invoke methods and pass arguments, return values, and exceptions over the network. • Handle objects and JRMP does not restrict argument and return types to data values. • JRMP is used to send method invocations and parameters and to return values and exceptions from one JVM to another. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 39 of 43
  • 40. Legacy Connectivity and Protocols Overview of Protocols (Contd.) • JRMP(Contd.) • JRMP Messages ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 40 of 43
  • 41. Legacy Connectivity and Protocols Overview of Protocols (Contd.) • JRMP(Contd.) • Advantages of JRMP are: • It supports parameter passing by reference or by value. • It supports distributed garbage collection. • It provides single multiplexed connection. • Disadvantages of JRMP are: • Servers are bound to arbitrary ports. • HTTP tunneling is limited. • Performance is low because all method invocations are remote. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 41 of 43
  • 42. Legacy Connectivity and Protocols Summary In this lesson, you learned: • The legacy integration is of two types, synchronous and asynchronous. • Synchronous integration involves synchronous communication between a J2EE application and an Enterprise Information System (EIS). • The synchronous communication between a J2EE application and an EIS consists of the request/response interaction model. • Asynchronous integration involves message-based communication between a J2EE application and EIS. • Two types of asynchronous communication are queue-based communication and publish-subscribe messaging. • There are different approaches to perform legacy integration, such as data level integration, application interface level integration, method level integration, and user interface level integration. • Data level integration integrates the backend data stores, which are used in the integrated application. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 42 of 43
  • 43. Legacy Connectivity and Protocols Summary(Contd.) • Application interface level integration uses the integration frameworks and application programming interfaces (APIs) of integrated applications to integrate two applications. • Method level integration shares business logic as a collection of methods or operations that the integrated application can invoke. • User interface level integration accesses existing applications through their user interfaces. • Java Native Interface (JNI) is used to write custom code that integrates new business logic with a legacy system. • J2EE Connector Architecture (JCA) defines a standard architecture for connecting a J2EE application server to EIS. • The Web service APIs, such as JAX-RPC, JAXR, and SAAJ provides a standard Java API for connecting applications and legacy systems • Various protocols are required to connect over legacy systems. The protocols are HTTP, HTTPS, IIOP, and JRMP. ©NIIT Architecting J2EE Solutions Lesson 1B / Slide 43 of 43