Free Essay

Middleware

In:

Submitted By msib13
Words 549
Pages 3
IT401 Information Technology Architectures

Discussion Board 3

August 22, 2015 The function of middle ware is to take care of requests. Imagine a room full of people that speak different languages. They need a translator in order to communicate with each other. This is also the case with different computer platforms or software. Middleware is like a translator. Middleware grants users to communicate with each other and other applications in a diversified computing environment (Rosencrace, 2000).

Common Object Request Broker Architecture (CORBA) is middleware that allows various computers and software to work together without being specifically configure to do so. CORBA is standardized by the Object Management Group (OMG), which is responsible for conceiving the standard architecture for distributed objects (Rouse, n.d.). This is done through an object request broker (ORB). An ORB is the part of the program that acts as an intermediary between the requests from the client for a service and the fulfillment of that request. ORB also implements security standards. This is all done in a transparent manner which is not apparent to the user (Gordon, 2015). Another part of the CORBA standard is the Interface Definition Language (IDL), which is used for the interface of remote objects. This is so that different languages can be used by clients (Rouse, n.d.). Advantages of CORBA is that this architecture does support many operating systems, platforms, and languages and it does take the tedious work out of distributed programming. Some of the disadvantages are that it is not perfect and can be rather complicated

SOA (Service Oriented Architecture) is basically a collection of services that communicate with each other. Whether it is data passing or accommodating an activity, each service functions autonomously by promoting loose couplings which can be used again (What is SOA? SOA and web services explained., n.d.). There are two parts to SOA: a service provider and service consumer. Additionally, these services do not need to know what the other service is doing in order to function because all the interaction takes place through the interface or shared boundary where information is exchanged. The predominant protocol used today are SOAP (Simple Object Access Protocol). SOAP, which is separate of the network layer, can use a range of different protocols such as HTTP and SMTP (What is SOA? SOA and web services explained., n.d.). One advantage to SOA is the ability to reuse the services which can save money. Also SOA has exceptional scalability and higher availability since service location is not an issue. Disadvantages to SOA is that it can be complicated and requires a lot of auditing and monitoring in order to function optimally (SOA disadvantages, 2007).

Works Cited

Gordon, A. (2015). Official (ISC)2 guide to the CISSP CBK, fourth edition, 4th edition. CRC Press.
Rosencrace, L. (2000, October 9). Middleware. Retrieved from www.computerworld.com: http://www.computerworld.com/article/2589065/app-development/middleware.html
Rouse, M. (n.d.). Object Management Group (OMG). Retrieved from www.techtarget.com: http://searchsoa.techtarget.com/definition/Object-Management-Group
SOA disadvantages. (2007, September 25). Retrieved from www.exforsys.com: http://www.exforsys.com/tutorials/soa/soa-disadvantages.html
What is SOA? SOA and web services explained. (n.d.). Retrieved from www.indiawebdevelopers.com: http://indiawebdevelopers.com/resource_center/articles/soa.html

Similar Documents

Free Essay

The Knuth Marris Pratt Algorithm

...Middleware for Distributed Systems Evolving the Common Structure for Network-centric Applications Richard E. Schantz BBN Technologies 10 Moulton Street Cambridge, MA 02138, USA schantz@bbn.com Douglas C. Schmidt Electrical & Computer Engineering Dept. University of California, Irvine Irvine, CA 92697-2625, USA schmidt@uci.edu 1 Overview of Trends, Challenges, and Opportunities Two fundamental trends influence the way we conceive and construct new computing and information systems. The first is that information technology of all forms is becoming highly commoditized i.e., hardware and software artifacts are getting faster, cheaper, and better at a relatively predictable rate. The second is the growing acceptance of a network-centric paradigm, where distributed applications with a range of quality of service (QoS) needs are constructed by integrating separate components connected by various forms of communication services. The nature of this interconnection can range from 1. The very small and tightly coupled, such as avionics mission computing systems to 2. The very large and loosely coupled, such as global telecommunications systems. The interplay of these two trends has yielded new architectural concepts and services embodying layers of middleware. These layers are interposed between applications and commonly available hardware and software infrastructure to make it feasible, easier, and more cost effective to develop and evolve systems using reusable software. Middleware...

Words: 10417 - Pages: 42

Free Essay

Linux

...2 Adaptive and Reflective Middleware 2.1 Introduction Middleware platforms and related services form a vital cog in the construction of robust distributed systems. Middleware facilitates the development of large software systems by relieving the burden on the applications developer of writing a number of complex infrastructure services needed by the system; these services include persistence, distribution, transactions, load balancing, clustering, and so on. The demands of future computing environments will require a more flexible system infrastructure that can adapt to dynamic changes in application requirements and environmental conditions. Next-generation systems will require predictable behavior in areas such as throughput, scalability, dependability, and security. This increase in complexity of an already complex software development process will only add to the already high rates of project failure. Middleware platforms have traditionally been designed as monolithic static systems. The vigorous dynamic demands of future environments such as large-scale distribution or ubiquitous and pervasive computing will require extreme scaling into large, small, and mobile environments. In order to meet the challenges presented in such environments, next-generation middleware researchers are developing techniques to enable middleware platforms to obtain information concerning environmental conditions and adapt their behavior to better serve their current deployment. Such capability...

Words: 10610 - Pages: 43

Free Essay

Engineer

...Yung Cheng 2324 Ravenhurst Dr. Plano, TX 75025 OBJECTIVE: Project leader / manager position in software development, information technology. EDUCATION: 2006 MBA, University of Texas at Dallas, Dallas 1996. MS in Computer Science, Georgia Institute of Technology, Atlanta TECHNICAL SKILLS: J2EE Framework, JAVA, JSP, C/C++, UNIX Shell scripts, JavaScript, JDBC, XML web service, Struts MIDDLEWARES: WEBLOG, , STRUTS, CORBA for JAVA and C++, EJB, WLI. WORKING EXPERIENCES: 1996.12 – 1997.7: Concerto Software, Software Engineer Developed software systems for large telephone centers including the development of a Flex Server for Meridian One Switch that enables agents to transfer inbound or outbound calls according to real-time statistics. 1997.7 – current: Verizon Corporation, Member Technical Staff • Local Number Portability (1997), Major Developer, Participated in planning, designing and implementing the LNP application that allows customer to change their local phone service carriers without changing their phone number • Advanced IP Services Ordering System (1998) Participated in planning, designing and implementing the web-based ordering system that allows retail customers to order Verizon IP services (VOIP, FaxOIP, Unify messaging) from internet. Was responsible for server side DB and architecture design and implementation. • Verizon Supply Interface (1999) Participated...

Words: 735 - Pages: 3

Premium Essay

Re: Middleware

...Middleware A middleware is an infrastructure that supports and connects enterprise applications. The middleware lies between the operating system and the enterprise application. It lies on each side of a distributed computer system network. Middleware supports sophisticated and distributed computer software applications. Any application between the computer kernel and user applications is considered to be a middleware. The most important aspect of the middleware is that it enables communication and input and output of the developers. Middleware becomes the link between the os-ware and the application software. This aspect of the middleware makes it possible for the applications to borrow the services of middleware. On the other hand, the middleware uses network layer services operating system (Myerson, 2002). Types of middleware Middleware gets used as a hybrid, public, or private. The best way to understand middleware is to look at some specific examples. The examples do not get built on any platform. However, they can be incorporated into cloud computing (Mohammed, 2005). Some common examples are Message-oriented middleware The infrastructural middleware supports sending and receiving messages in the distributed applications environment. According to Serein (1999) it helps to disburse applications to various other platforms. It eases the work of creating software applications to get incorporated in several operating Figure 2: Message oriented middleware Transaction...

Words: 900 - Pages: 4

Premium Essay

Cloud Computing

...IIIT, Hyderabad Cloud Computing for E-Governance A white paper Abstract The worldwide revolution in Internet is changing our lives in terms of the way we work, learn and interact. These changes naturally should reflect the way government functions in terms of the organization of the government, its relationship with its citizens, institutions and businesses and cooperation with other governments. Also, the increasing generalization of technology access by citizen and organizations brings expectations and demands on government. At the same time, governments are also proactive in this domain and are planning new ways of interacting, improving services, optimizing processes and revitalizing democracy by spending amount on IT. It aims to deliver more interactive services to citizens and businesses through E-Governance. For this, cloud computing may lead to significant cost savings. It entails use over the Internet of computing hardware and software infrastructure and applications that are remotely hosted. In this white paper, we describe how this newly emerged paradigm of cloud computing can be helpful for E-Governance. IIIT, Hyderabad January 2010 CLOUD COMPUTING FOR E-GOVERNANCE January 1, 2010 Table of Contents Executive Summary....................................................................................................................................... 3 1. E-Governance Requirements .......................................................................

Words: 4341 - Pages: 18

Free Essay

Financial Analyst

...Assad Rafiq PROFESSIONAL SUMMARY Possessing strong understanding of the Information Technology practice, extensive experience working with PeopleSoft (PIA) Administration for over the last 7 years. Demonstrated strong Technical and Problem Management skills. PeopleSoft Administrator, Oracle Database, LINUX, UNIX skills have enabled me to perform multiple installations, upgrades, performance tuning, and troubleshooting the infrastructure components required to establish and maintain the PeopleSoft PIA Architecture. PeopleSoft Server Administration – Installed and configured PeopleTools, File Server, Application Server, Process Scheduler Server, Tuxedo, WebLogic Web Server, PeopleSoft Internet Architecture (PIA) and Report Distribution, Load Balancing, Failover, Integration Broker, Single Signon, LDAP, Environment Management Framework, PeopleSoft Application Security Administration, Disaster Recovery, Business Continuity Planning for various PeopleSoft Oracle Database Instances. Expertise in performing routine maintenance activities - Environment Refreshes, PS Project Migration, File Object Migration, Performance Tuning of Web Server, Application Server, Tuxedo, Process Scheduler Server and Database, PeopleSoft Application Security. Successfully applied PeopleTools Product Patches, Application Patches, Bundles, Maintenance Packs, and PeopleTools Upgrades. Trouble shoot problems related to Server Components and Failed Process or Jobs, Performance Tuning, Turning on Traces...

Words: 1065 - Pages: 5

Free Essay

Erp Solutions with Sap.

...Fundamentals of Supply Chain Solutions with SAP Enterprise Resource Planning (ERP) Enterprise Resource Planning (ERP) is a framework for organizing, defining, and standardizing the business processes necessary to effectively plan and control an organization so the organization can use its internal knowledge to seek external advantage. The ERP system is a set of software applications that organize, define and standardize the business processes necessary to effectively plan and control an organization. Essentially, ERP applications are a computer model of a business, embodying the products and processes, information flow, procedures, and relationships between functions and activities. A set of planning applications can provide recommendations for what must be accomplished in order to meet the forecasted demand and keep the business functioning smoothly. Planning is at the core of ERP and is embodied in a top-down hierarchy of functions: master planning, detailed material and resource planning, and execution, such as production control and purchasing. Master planning is the executive level function that sets the operational business plan, supports the sales and operations planning (S&OP) process. Detailed material planning (Material Requirements Planning or MRP) uses bill of material and inventory information to develop a complete manufacturing and purchasing plan for all products, assemblies, components and materials. At this level capacity requirement planning (CRP) ties the...

Words: 2606 - Pages: 11

Free Essay

Ums Fee Stuctur

...|TeRm PaPeR for Oops … | | | |Topic:-Fee Structure Of a University | | | |03/12/2009 | |Submitted to:- Ms .Jagriti sharma | |Submitted by :Hitesh Arora | |RD-1801A21 | |Reg.no-10800783 | Contents for synopsis:- 1.Introduction 2. TOOLS / PLATFORMS & LANGUAGE 3. OBJECTIVE OF THE PROJECT 4. INPUT TO THE PROJECT 5. OUTPUT OF THE PROJECT 6. DATABASE DESIGN 7. DATA FLOW DIAGRAMS 8. SCOPE OF FUTURE APPLICATION 9.SOURCE CODE ACKNOWLEDGEMENT It acknowledges all the contributors involved in the preparation of this project. Including me, there is a hand of my teachers, some books and internet. I express most gratitude to my subject teacher, who guided me in the right direction. The guidelines provided by her helped me a lot in...

Words: 915 - Pages: 4

Premium Essay

Hdgjdhfszgd

...eBay - eCommerce Platform A case study in Scalability by Mohammad Usman Ahmed mohammad.ahmed@mail.mcgill.ca Table of Contents: 1. 2. 3. 4. 5. 6. 7. 8. The Application and its overall architecture Component Model and its interactions Technological aspects of the eBay Architecture Strengths and relative weaknesses of the Architecture Component Model and variations Key Quality Attributes favoured by the eBay Architecture Evolution of the Application and its Architecture Conclusion The Application and its overall architecture EBay is a highly successful eCommerce platform. The larger category of eBay includes 19 different platforms (e.g. skype, payPal, rent) but we'll be focusing on the search and trade platform. The other sister platforms became part of eBay due to recent acquisitions and in some cases result in architectural mismatch which would be an interesting topic for a separate case study, therefore this case study focuses on the original platform's architecture and its evolution in recent years. EBay is an eCommerce system where a user can browse to the website eBay .com and search for anything they want to buy, in auction or right away from the buyer, or to post some item for sale which other users can search for as prospective buyers. The users then arrange for payments online (using eBay's payPal system which is a separate system designed solely for that purpose and recently integrated onto the eBay platform) and receive the...

Words: 4022 - Pages: 17

Free Essay

Hello

...LOVELY PROFESSIONAL UNIVERSITY HOME WORK – I DOA: 9/7/2012 DOS: 9/17/2012 ------------------------------------------------------------------------------------------------------------------- Assignment COURSE- Modern Web Programming Tools and Techniques-I COURSE CODE- CAP618T SUBMITTED BY: SUBMITTED TO: Anil Kumar MANDEEP KAUR Roll-A11 Reg. - 11009839 Sec- D1R05 Q:1 Take a JavaBean Object named “Profession” with properties domain and expertise. Show the use of all 4 scope types on this object. Ans: Profession.jsp file package pk; public class profession { int domain; int expertise; public int getdomain() { return domain; } public void setdomain(int a) { this.domain=a; } public int getexpertise() { return expertise; } public void setexpertise(int b) { this.expertise=b; } } 1) Index.jsp file(for session Object) 2) Index.jsp file(for Page Object) 3) Index.jsp file(for Request Object) 4) Index.jsp file(for Application Object) Q:2 Discuss and Demonstrate the use of all page directive attributes. Give minimum 2 separate types of examples...

Words: 2181 - Pages: 9

Free Essay

Web Design

...The World Wide Web provides a new paradigm in computer networking for human communication, which had an impact on the delivery of information and continues to stand in rapid developments. The word Web Technology represents a discontinuity in the way applications are connected. Using the Web Technology as the basis for an application brings substantial advantages to the adopter. This report focuses on 2-tier architecture and mainly on the 3-tier architecture, which is the present web technology. This report will also review the client-side scripting and the server-side scripting. TABLE OF CONTENTS EXECUTIVE SUMMARY 2 1. Introduction 3 2. Need for technology 4 3. Terminology 5 4. 2-Tier Architecture 5 5. 3-Tier Architecture 7 6. Client Server Architecture 10 7. Conclusion 12 REFERENCES 13 1. INTRODUCTION Web sites have quickly evolved from simple, static pages to complex Web applications performing critical operations for many businesses. These applications involve dynamic data from multiple sources; ever changing and various features for e-commerce, personalization and many more. At the same time, customers and internal users have understandably come to expect and demand more and more sophistication in the Web-based applications they use every day. The result? Web application solution providers — and their client companies — face several new challenges. They must meet or exceed...

Words: 2397 - Pages: 10

Premium Essay

Nt1310 Unit 1 Exercise 1

...Introduction: With the advances of micro electro mechanical system technology, wireless communications and digital electronics, Wireless Sensor Networks have been used in everywhere such as battlefield surveillance, environment supervision and traffic control has become a reality. Wireless Sensor Networks consist of large number of sensor nodes which collect and route data to the external sink with a certain transmission regulation. Due to the limitations of bandwidth memory and computing capability of such nodes the applied routing topology should ensure the minimization of energy consumption and hence maximization the lifetime of the network. When the energy is limited, our main aim is to find a route which can minimize the energy consumption and maximize the network lifetime. In typical WSNs applications, data about a particular event is collected by the sensor nodes and then sent to the Base Station. Since nodes are deployed densely, the high density of the network may lead to nodes generating and transmitting redundant data, which results in unnecessary energy consumption. Data aggregation can be the solution for this problem. Data aggregation basically eliminates redundant data and reduces the communication load. Clustering method has been extensively exploited for increasing the network scalability. In this paper we propose an energy efficient load balanced data gathering routing protocol to minimize energy consumption and thus enhance the network lifetime. The cluster...

Words: 924 - Pages: 4

Free Essay

Database Hw2

...2.1 Define the following terms: Data Model – a collection of concepts that can be used to describe the structure of a database i.e. the types, relationships and the constraints that should hold good on the data contained in the database. Database Schema – The description of a database is called its database schema. Database State – The data in the database at a particular moment in time is called a database state. It is also called the current set of occurrences or instances in the database. Internal Schema – Internal Schema is one of the major parts of the Three Schema Architecture of a Database. It describes the physical storage structure of the database. Conceptual Schema –is a map of concepts  and their  relationships used for databases.  The conceptual schema hides the details of physical storage structures and concentrates on describing entities, data types, relationships, user operations, and constraints. External Schema -- External Schema describes the part of the database that a particular user group is interested in and hides the rest of the database from that user group. Data Independence – the capacity to change the schema at one level of a database system without having to change the schema at the next higher level. DDL – DDL or Data Definition Language is used to specify conceptual and internal schemas for the database and mappings. DML – DML or Data Manipulation Language as the name suggests is used for typical manipulations include retrieval, insertion...

Words: 778 - Pages: 4

Free Essay

Design

...ABAP (Advanced Business Application Programming) ABAP Workbench The ABAP Workbench component is a fully-fledged development environment for applications in the ABAP language. With it, you can create, edit, test, and organize application developments. It is fully integrated in the R/3 Basis system and, like other R/3 applications, is itself written in ABAP. Application Servers R/3 programs run on application servers. They are an important component of the R/3 System. The following sections describe application servers in more detail. Structure of an Application Server The application layer of an R/3 System is made up of the application servers and the message server. Application programs in an R/3 System are run on application servers. The application servers communicate with the presentation components, the database, and also with each other, using the message server. The following diagram shows the structure of an application server: [pic] The individual components are: Work Processes An application server contains work processes, which are components that can run an application. Each work process is linked to a memory area containing the context of the application being run. The context contains the current data for the application program. This needs to be available in each dialog step. Dispatcher Each application server contains a dispatcher. The dispatcher is the link between the work processes and the users logged onto the application server. Its...

Words: 2346 - Pages: 10

Free Essay

Wewe

...Traditional discussions around the architecture of business applications tend to focus on the application tier as being the connection between people and data and this holds for discussions around SOAs, Service Component Architectures (SCAs), or most other architectural perspectives in the industry today, including first-generation discussions around composite applications. Typically, however, the application tier contains structured business logic. However, building a composite application requires a mindset that not only is the productivity tier a critical element of the stack, but also it is where the most business value to enterprises can be found. To expand on the comparison between composite applications and SOA, both of them target flexibility and modularization. However, SOA provides flexibility at just one tier: that of the structured business logic in the middle tier. Composite applications target flexibility at all four tiers: presentation, productivity, application, and data. So, composite applications provide business value to the end users, in a way that goes far beyond what can be achieved with just service orientation. That said, a composite application is a great way to surface information out of a SOA, and having line-of-business (LOB) applications exposed as services makes it easier to build support for cross-functional processes into a composite application. Therefore to summarize, the ability to build and deploy composite applications requires a platform...

Words: 310 - Pages: 2