Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
Middleware Technologies
Overview
 Introduction
 Brief History of EAI/Middleware
 Middleware Categories
 CORBA
 Middleware and Computer Telephony
 Middleware Usage Considerations
 Middleware costs
 Advantages and Disadvantages of Middleware
 Conclusion
 Reference
Introduction
 Middleware is the "glue" that connects diverse computer systems.
Typically, legacy systems store information in proprietary formats,
use propriety protocols to communicate, and may even be running
on hardware that's no longer manufactured or supported.
Brief History of EAI/Middleware
 Enterprise applications, from as early as the 1960s through the late
1970s, were simple in design and functionality, developed largely in
part to end repetitive tasks.
 By the 1980s, several corporations were beginning to understand
the value and necessity for application integration.
 Enterprise Resource Planning (ERP)
As ERP applications became much more prevalent in the 1990s,
there was a need for corporations to be able to leverage already
existing applications and data within the ERP system; this could only
be done by introducing EAI.
Middleware Technologies ppt
Legacy Enterprise Situation
Mainframe
Stock Inventory
C/C++
Sales Order Processing
ERP
Customer Billing
Mainframe
Legacy Application
WWW
E-Commerce
WWW
Supply Chain Mgmt
RDBMS
Customer Database
Middleware/ EAI Enterprise Solution
Mainframe
Stock Inventory
C/C++
Sales Order Processing
ERP
Customer Billing
Mainframe
Legacy Application
WWW
E-Commerce
WWW
Supply Chain Mgmt
RDBMS
Customer Database
EAI Infrastructure Services
Middleware can be divided in to 7 categories of services:
 Data Management Services (i.e. Database and file system middleware).
 Communication Services (i.e. RPC (Remote Procedure Call) and
messaging middleware).
 Distribution Services (i.e. location, time and security services).
 Object Management Services (i.e. by using Object Request Brokers
(ORBs)).
 Application Co-operation Services (i.e. Transaction-Processing (TP) monitors, e-
mail, etc.).
 Presentation Services (i.e. User Interfaces, printing and multi-media middleware).
 System Management Services (i.e. Configuration-, change-, operations-, problem-,
and performance-management services)
Data Management Services
 One example of a middleware supporting these features are CI-Link
from Cornut Informatique in France. CI-Link is a middleware that
connects MS-Windows and Macintosh applications to SQL
databases under UNIX. It comes with a high-level built-in
development language which lets you centralise tasks on the server.
CI-Link is compatible with the several relational DBMSs like Oracle,
Informix, Ingres and Progress.
 Another database middleware candidate is Accessworks from
Oracle Corporation, in co-operation with Digital. Accessworks
provides a desktop API via ODBC, SQL services, and read/write
access to a wide area of databases, etc. Accessworks is
available for the most common client desktops such as MS-DOS,
MS-Windows, OS/2, Macintosh, Open VMS, and UNIX systems.
Communication Services
 Middleware supporting the communication services can be divided
into two different groups: RPC and messaging systems. RPCs
provide facilities for synchronous procedure calls on remote systems
as if they were local.
 The most famous RPC toolset is DCE (Distributed Computing
Environment) from OSF, but also available from most UNIX
hardware vendors.
 Messaging middleware enables distributed applications to send and
receive messages asynchronously using a set of APIs. One
example of a such a middleware API is Communications
Integrator from Covia Technologies.
Remote Procedure call
Object Management Services
 Tools supporting object management services use Object Request
Brokers (ORBs) to provide transparent communications between
objects sited on different locations in a network.
 OMG’s CORBA is an example of this technology. IONA’s ORBIX is
the most famous implementation of CORBA.
 In addition to provide communication between objects, CORBA
middleware also provide communication with the WWW, RDBMs
and ODBMs.
CORBA
 A middleware platform that supports a standardized OO architecture
for software applications
- Common Object Request Broker Architecture
- Open standard - developed by the Object Management Group
- CORBA is a component of OMG’s Object Management
Architecture
 CORBA supports distributed object computing
 CORBA uses a broker
- an intermediary handling requests in a system
- facilitates communication between clients and server objects
- separates a component’s interface from its implementation
Middleware Technologies ppt
Middleware Technologies ppt
Distribution Services:
 The distribution services can be divided into three categories:
location services, security services, and time services. Tools
supporting location services provide a directory and naming
service.
 The directory service allows a client to access a remote file, a
remote table, or a remote process without having to know where that
object is physically located in the network
Application Co-operation Services:
 Tools supporting application co-operation services are
providing support for a large number of concurrent users that
access transactions programs and services (i.e. databases,
security, workflows), local and distributed load balancing to
optimise performance, and efficiently synchronising data updates
to multiple databases during a single transaction using standard
protocols.
 Tuxedo from Novell is an example of a TP monitor providing
these features plus several others. The advantage by using TP
monitors are their ability to manage several thousands of users,
concurrent database accesses, and large volumes of data.
Middleware Technologies ppt
Presentation Middleware
 Tools supporting presentation services provide features for
mapping GUIs and transparent printing.
 These services are often included in other tools. But there exists
dedicated tools for mapping character based UIs intoGUIs.
 X Windows is an example of a toolset providing presentation
services.
Mobile Middleware
 MM is the software component that can be integrated with any
application to add mobility. It constitutes services that can be
transmitted over the mobile network to the clients on move. Also
enables to add new features to an existing system quite easily.
 Mobile Agent (MA) is a software component that operates
autonomously. MA allows codes to move freely around the network,
thus enabling us to have much more flexible architecture with better
network performance. These code snippets executed on top of a
runtime platform, interact with the local system in a controlled way,
through a set of well-defined interfaces provided by the agent
platform.
Middleware Technologies ppt
Middleware service components
The services in our proposed architecture are classified into two
broad categories: Application services, and Network services.
COM/DCOM
 Microsoft’s middleware infrastructure in many ways
similar to CORBA
 Defines a binary standard for component
interoperability
programming language independence
 Platform independent
Windows (95, 98, NT)
Mac
Unix
 Distribution transparency
does exploit operational characteristics
 Dynamic component loading and unloading
DCOM
 DCOM = COM binary standard
+
runtime infrastructure for communicating across distributed
address spaces initially only on Windows
 recently adding Mac and Unix
 Uses OSF’s DCE RPC as a basis for remote interaction
proxy/stub mechanism
 Attempts to address challenges of distributed computing
interacting components should be “close” to one another
some components’ locations are fixed
inverse relationship between component size and flexibility
Distribution in COM/DCOM — In-Process
Middleware and Computer Telephony
 Middleware in computer telephony tends to be software that sits
right above that part of the operating system that deals with
telephony. This is the Telephone Server Application Programming
Interface (TSAPI) in NetWare and the Telephone Application
Programming Interface (TAPI) in Windows.
 TAPI is an evolutionary API providing convergence of both
traditional PSTN telephony and IP Telephony. IP Telephony is an
emerging set of technologies which enables voice, data, and video
collaboration over existing LANs, WANs, and the Internet.
TAPI Objective
LAN
Legacy Phone Switch
*LAN IP-PSTN Bridge
Move from this….
To this….
Middleware Usage Considerations
 There is a gap between principles and practice. Many popular
middleware services use proprietary implementations.
 The sheer number of middleware services is a barrier to using them.
To keep their computing environment manageably simple,
developers have to select a small number of services that meet their
needs for functionality and platform coverage.
 While middleware services raise the level of abstraction of
programming distributed applications, they still leave the application
developer with hard design choices.
Middleware costs
 A technology may impose an otherwise unnecessary interface
standard, it might require investment in other technologies (see
bullets below), it might require investment of time or money, or it
may directly conflict with security or real – time requirements.
 As an example, at a start-up telecommunications carrier-of-carriers
service provider, AFN Communications, there were approximately
$20 million dollars expended just to implement operational and
business support systems that were fully integrated across a
client/server middleware information “bus”, which indicates that all
applications are integrated via a common path
Advantages of Middleware:
 Real time information access among systems
 Streamlines business processes and helps raise
organizational efficiency.
 Maintains information integrity across multiple systems
Disadvantages of Middleware
 Prohibitively high development costs.
 EAI implementations are very time consuming, and need a lot of
resources.
 There are few people with experience in the market place.
 There exists relatively few satisfying standards.
 The tools are not good enough.
 Too many platforms to be covered.
 Middleware often threatens the real-time performance of a system.
 Middleware products are not very mature.
EAI / Middleware Leaders
 BEA Systems (worldwide locations).
 CrossWorlds Software (Australia).
 IONA Technologies (Ireland, Scotland, California).
 Level 8 Systems (North Carolina, California, New Jersey, Virgina,
London, Milan, and Paris).
 Mercator Software (England, Massachusetts).
 NEON (purchased in 2001 by Sybase) (California).
 SeeBeyond (California, multiple U.S. States, Australia, Korea,
Japan, Singapore, Cyprus, multiple European locations).
 Software AG (Germany).
Conclusion:
 Middleware technologies are very important to succeed with an
incremental migration of legacy systems into client/server systems,
but that it is hard to find the correct tools and people to accomplish
the work.
References:
 www.google.com
 www.wikipedia.org
 www.oeclib.in
 www.projectsreports.org
Questions:
 What is Middleware technology?
 Mention different types of Middleware.
 What are Advantages and Disadvantages of
Middleware?
THANK YOU!

More Related Content

What's hot

Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
Rishikese MR
 
Hypervisor
HypervisorHypervisor
Hypervisor
kalpita surve
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
NASIRSAYYED4
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
Seminar Links
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
Sunita Sahu
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
Dr. Ramkumar Lakshminarayanan
 
Third Party Cloud Management
Third Party Cloud ManagementThird Party Cloud Management
Third Party Cloud Management
Orchestrate Mortgage and Title Solutions, LLC
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
gaurav jain
 
Virtualization
VirtualizationVirtualization
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
Virtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelVirtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference Model
Dr Neelesh Jain
 
Load Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptLoad Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newppt
Utshab Saha
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
Saiteja Kaparthi
 
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
shivli0769
 
Introduction to CloudStack
Introduction to CloudStack Introduction to CloudStack
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
Ripal Ranpara
 
Sdn ppt
Sdn pptSdn ppt
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 

What's hot (20)

Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
 
Hypervisor
HypervisorHypervisor
Hypervisor
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Third Party Cloud Management
Third Party Cloud ManagementThird Party Cloud Management
Third Party Cloud Management
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Virtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelVirtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference Model
 
Load Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptLoad Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newppt
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Cloud security
Cloud securityCloud security
Cloud security
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Introduction to CloudStack
Introduction to CloudStack Introduction to CloudStack
Introduction to CloudStack
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Sdn ppt
Sdn pptSdn ppt
Sdn ppt
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 

Similar to Middleware Technologies ppt

middleware-technologies-8871-AmKEtL9-_1_.ppt
middleware-technologies-8871-AmKEtL9-_1_.pptmiddleware-technologies-8871-AmKEtL9-_1_.ppt
middleware-technologies-8871-AmKEtL9-_1_.ppt
BinduBindu57
 
Middleware1
Middleware1Middleware1
Middleware1
nava rathna
 
Middleware
MiddlewareMiddleware
Middleware
nava rathna
 
Cloud computing
Cloud computingCloud computing
Cloud computing
perfectican
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
raksharao
 
e-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdfe-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdf
petermulei3
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performance
csandit
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
csandit
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
cscpconf
 
TYBSC CS 2018 WEB SERVICES NOTES
TYBSC CS 2018 WEB SERVICES NOTESTYBSC CS 2018 WEB SERVICES NOTES
TYBSC CS 2018 WEB SERVICES NOTES
WE-IT TUTORIALS
 
Introduction to WebSphere Message Broker
Introduction to WebSphere Message BrokerIntroduction to WebSphere Message Broker
Introduction to WebSphere Message Broker
Ant Phillips
 
Unit 1
Unit 1Unit 1
Unit 1
Ravi Kumar
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
Appaji K
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
ojaswiniwagh
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computing
Alexander Decker
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
Alexander Decker
 
Impacts of Cloud Computing in the Society
Impacts of Cloud Computing in the SocietyImpacts of Cloud Computing in the Society
Impacts of Cloud Computing in the Society
theijes
 
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter GantenZarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa
 
SaaSPlex - Powered By Cloud
SaaSPlex - Powered By CloudSaaSPlex - Powered By Cloud
SaaSPlex - Powered By Cloud
La Lakis
 
cloud computing based its solutions term paper
cloud computing based its solutions term papercloud computing based its solutions term paper
cloud computing based its solutions term paper
Shashi Bhushan
 

Similar to Middleware Technologies ppt (20)

middleware-technologies-8871-AmKEtL9-_1_.ppt
middleware-technologies-8871-AmKEtL9-_1_.pptmiddleware-technologies-8871-AmKEtL9-_1_.ppt
middleware-technologies-8871-AmKEtL9-_1_.ppt
 
Middleware1
Middleware1Middleware1
Middleware1
 
Middleware
MiddlewareMiddleware
Middleware
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
e-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdfe-commerce systems and infrastructure.pdf
e-commerce systems and infrastructure.pdf
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performance
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
 
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TE...
 
TYBSC CS 2018 WEB SERVICES NOTES
TYBSC CS 2018 WEB SERVICES NOTESTYBSC CS 2018 WEB SERVICES NOTES
TYBSC CS 2018 WEB SERVICES NOTES
 
Introduction to WebSphere Message Broker
Introduction to WebSphere Message BrokerIntroduction to WebSphere Message Broker
Introduction to WebSphere Message Broker
 
Unit 1
Unit 1Unit 1
Unit 1
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computing
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
 
Impacts of Cloud Computing in the Society
Impacts of Cloud Computing in the SocietyImpacts of Cloud Computing in the Society
Impacts of Cloud Computing in the Society
 
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter GantenZarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter Ganten
 
SaaSPlex - Powered By Cloud
SaaSPlex - Powered By CloudSaaSPlex - Powered By Cloud
SaaSPlex - Powered By Cloud
 
cloud computing based its solutions term paper
cloud computing based its solutions term papercloud computing based its solutions term paper
cloud computing based its solutions term paper
 

More from OECLIB Odisha Electronics Control Library

5G technology-ppt
5G technology-ppt5G technology-ppt
Futex ppt
Futex  pptFutex  ppt
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
OECLIB Odisha Electronics Control Library
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
OECLIB Odisha Electronics Control Library
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
OECLIB Odisha Electronics Control Library
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
Steganography ppt
Steganography pptSteganography ppt
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
OECLIB Odisha Electronics Control Library
 
Soa ppt
Soa pptSoa ppt
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
OECLIB Odisha Electronics Control Library
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
OECLIB Odisha Electronics Control Library
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
Wimax ppt
Wimax pptWimax ppt
Wibree ppt
Wibree pptWibree ppt
Wearable Computing
Wearable ComputingWearable Computing
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 

More from OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Recently uploaded

Hire a private investigator to get cell phone records
Hire a private investigator to get cell phone recordsHire a private investigator to get cell phone records
Hire a private investigator to get cell phone records
HackersList
 
Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024
The Digital Insurer
 
Lessons Of Binary Analysis - Christien Rioux
Lessons Of Binary Analysis - Christien RiouxLessons Of Binary Analysis - Christien Rioux
Lessons Of Binary Analysis - Christien Rioux
crioux1
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
Performance Budgets for the Real World by Tammy Everts
Performance Budgets for the Real World by Tammy EvertsPerformance Budgets for the Real World by Tammy Everts
Performance Budgets for the Real World by Tammy Everts
ScyllaDB
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Data Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber SecurityData Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber Security
anupriti
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
this resume for sadika shaikh bca student
this resume for sadika shaikh bca studentthis resume for sadika shaikh bca student
this resume for sadika shaikh bca student
SadikaShaikh7
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
How Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global ScaleHow Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global Scale
ScyllaDB
 
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecGDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
James Anderson
 
K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024
The Digital Insurer
 
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
anupriti
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
What Not to Document and Why_ (North Bay Python 2024)
What Not to Document and Why_ (North Bay Python 2024)What Not to Document and Why_ (North Bay Python 2024)
What Not to Document and Why_ (North Bay Python 2024)
Margaret Fero
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
uuuot
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 

Recently uploaded (20)

Hire a private investigator to get cell phone records
Hire a private investigator to get cell phone recordsHire a private investigator to get cell phone records
Hire a private investigator to get cell phone records
 
Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024
 
Lessons Of Binary Analysis - Christien Rioux
Lessons Of Binary Analysis - Christien RiouxLessons Of Binary Analysis - Christien Rioux
Lessons Of Binary Analysis - Christien Rioux
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
Performance Budgets for the Real World by Tammy Everts
Performance Budgets for the Real World by Tammy EvertsPerformance Budgets for the Real World by Tammy Everts
Performance Budgets for the Real World by Tammy Everts
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Data Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber SecurityData Protection in a Connected World: Sovereignty and Cyber Security
Data Protection in a Connected World: Sovereignty and Cyber Security
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
this resume for sadika shaikh bca student
this resume for sadika shaikh bca studentthis resume for sadika shaikh bca student
this resume for sadika shaikh bca student
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
How Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global ScaleHow Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global Scale
 
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecGDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
 
K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024
 
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
What Not to Document and Why_ (North Bay Python 2024)
What Not to Document and Why_ (North Bay Python 2024)What Not to Document and Why_ (North Bay Python 2024)
What Not to Document and Why_ (North Bay Python 2024)
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 

Middleware Technologies ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On Middleware Technologies
  • 2. Overview  Introduction  Brief History of EAI/Middleware  Middleware Categories  CORBA  Middleware and Computer Telephony  Middleware Usage Considerations  Middleware costs  Advantages and Disadvantages of Middleware  Conclusion  Reference
  • 3. Introduction  Middleware is the "glue" that connects diverse computer systems. Typically, legacy systems store information in proprietary formats, use propriety protocols to communicate, and may even be running on hardware that's no longer manufactured or supported.
  • 4. Brief History of EAI/Middleware  Enterprise applications, from as early as the 1960s through the late 1970s, were simple in design and functionality, developed largely in part to end repetitive tasks.  By the 1980s, several corporations were beginning to understand the value and necessity for application integration.  Enterprise Resource Planning (ERP) As ERP applications became much more prevalent in the 1990s, there was a need for corporations to be able to leverage already existing applications and data within the ERP system; this could only be done by introducing EAI.
  • 6. Legacy Enterprise Situation Mainframe Stock Inventory C/C++ Sales Order Processing ERP Customer Billing Mainframe Legacy Application WWW E-Commerce WWW Supply Chain Mgmt RDBMS Customer Database
  • 7. Middleware/ EAI Enterprise Solution Mainframe Stock Inventory C/C++ Sales Order Processing ERP Customer Billing Mainframe Legacy Application WWW E-Commerce WWW Supply Chain Mgmt RDBMS Customer Database EAI Infrastructure Services
  • 8. Middleware can be divided in to 7 categories of services:  Data Management Services (i.e. Database and file system middleware).  Communication Services (i.e. RPC (Remote Procedure Call) and messaging middleware).  Distribution Services (i.e. location, time and security services).  Object Management Services (i.e. by using Object Request Brokers (ORBs)).  Application Co-operation Services (i.e. Transaction-Processing (TP) monitors, e- mail, etc.).  Presentation Services (i.e. User Interfaces, printing and multi-media middleware).  System Management Services (i.e. Configuration-, change-, operations-, problem-, and performance-management services)
  • 9. Data Management Services  One example of a middleware supporting these features are CI-Link from Cornut Informatique in France. CI-Link is a middleware that connects MS-Windows and Macintosh applications to SQL databases under UNIX. It comes with a high-level built-in development language which lets you centralise tasks on the server. CI-Link is compatible with the several relational DBMSs like Oracle, Informix, Ingres and Progress.  Another database middleware candidate is Accessworks from Oracle Corporation, in co-operation with Digital. Accessworks provides a desktop API via ODBC, SQL services, and read/write access to a wide area of databases, etc. Accessworks is available for the most common client desktops such as MS-DOS, MS-Windows, OS/2, Macintosh, Open VMS, and UNIX systems.
  • 10. Communication Services  Middleware supporting the communication services can be divided into two different groups: RPC and messaging systems. RPCs provide facilities for synchronous procedure calls on remote systems as if they were local.  The most famous RPC toolset is DCE (Distributed Computing Environment) from OSF, but also available from most UNIX hardware vendors.  Messaging middleware enables distributed applications to send and receive messages asynchronously using a set of APIs. One example of a such a middleware API is Communications Integrator from Covia Technologies.
  • 12. Object Management Services  Tools supporting object management services use Object Request Brokers (ORBs) to provide transparent communications between objects sited on different locations in a network.  OMG’s CORBA is an example of this technology. IONA’s ORBIX is the most famous implementation of CORBA.  In addition to provide communication between objects, CORBA middleware also provide communication with the WWW, RDBMs and ODBMs.
  • 13. CORBA  A middleware platform that supports a standardized OO architecture for software applications - Common Object Request Broker Architecture - Open standard - developed by the Object Management Group - CORBA is a component of OMG’s Object Management Architecture  CORBA supports distributed object computing  CORBA uses a broker - an intermediary handling requests in a system - facilitates communication between clients and server objects - separates a component’s interface from its implementation
  • 16. Distribution Services:  The distribution services can be divided into three categories: location services, security services, and time services. Tools supporting location services provide a directory and naming service.  The directory service allows a client to access a remote file, a remote table, or a remote process without having to know where that object is physically located in the network
  • 17. Application Co-operation Services:  Tools supporting application co-operation services are providing support for a large number of concurrent users that access transactions programs and services (i.e. databases, security, workflows), local and distributed load balancing to optimise performance, and efficiently synchronising data updates to multiple databases during a single transaction using standard protocols.  Tuxedo from Novell is an example of a TP monitor providing these features plus several others. The advantage by using TP monitors are their ability to manage several thousands of users, concurrent database accesses, and large volumes of data.
  • 19. Presentation Middleware  Tools supporting presentation services provide features for mapping GUIs and transparent printing.  These services are often included in other tools. But there exists dedicated tools for mapping character based UIs intoGUIs.  X Windows is an example of a toolset providing presentation services.
  • 20. Mobile Middleware  MM is the software component that can be integrated with any application to add mobility. It constitutes services that can be transmitted over the mobile network to the clients on move. Also enables to add new features to an existing system quite easily.  Mobile Agent (MA) is a software component that operates autonomously. MA allows codes to move freely around the network, thus enabling us to have much more flexible architecture with better network performance. These code snippets executed on top of a runtime platform, interact with the local system in a controlled way, through a set of well-defined interfaces provided by the agent platform.
  • 22. Middleware service components The services in our proposed architecture are classified into two broad categories: Application services, and Network services.
  • 23. COM/DCOM  Microsoft’s middleware infrastructure in many ways similar to CORBA  Defines a binary standard for component interoperability programming language independence  Platform independent Windows (95, 98, NT) Mac Unix  Distribution transparency does exploit operational characteristics  Dynamic component loading and unloading
  • 24. DCOM  DCOM = COM binary standard + runtime infrastructure for communicating across distributed address spaces initially only on Windows  recently adding Mac and Unix  Uses OSF’s DCE RPC as a basis for remote interaction proxy/stub mechanism  Attempts to address challenges of distributed computing interacting components should be “close” to one another some components’ locations are fixed inverse relationship between component size and flexibility
  • 25. Distribution in COM/DCOM — In-Process
  • 26. Middleware and Computer Telephony  Middleware in computer telephony tends to be software that sits right above that part of the operating system that deals with telephony. This is the Telephone Server Application Programming Interface (TSAPI) in NetWare and the Telephone Application Programming Interface (TAPI) in Windows.  TAPI is an evolutionary API providing convergence of both traditional PSTN telephony and IP Telephony. IP Telephony is an emerging set of technologies which enables voice, data, and video collaboration over existing LANs, WANs, and the Internet.
  • 27. TAPI Objective LAN Legacy Phone Switch *LAN IP-PSTN Bridge Move from this…. To this….
  • 28. Middleware Usage Considerations  There is a gap between principles and practice. Many popular middleware services use proprietary implementations.  The sheer number of middleware services is a barrier to using them. To keep their computing environment manageably simple, developers have to select a small number of services that meet their needs for functionality and platform coverage.  While middleware services raise the level of abstraction of programming distributed applications, they still leave the application developer with hard design choices.
  • 29. Middleware costs  A technology may impose an otherwise unnecessary interface standard, it might require investment in other technologies (see bullets below), it might require investment of time or money, or it may directly conflict with security or real – time requirements.  As an example, at a start-up telecommunications carrier-of-carriers service provider, AFN Communications, there were approximately $20 million dollars expended just to implement operational and business support systems that were fully integrated across a client/server middleware information “bus”, which indicates that all applications are integrated via a common path
  • 30. Advantages of Middleware:  Real time information access among systems  Streamlines business processes and helps raise organizational efficiency.  Maintains information integrity across multiple systems
  • 31. Disadvantages of Middleware  Prohibitively high development costs.  EAI implementations are very time consuming, and need a lot of resources.  There are few people with experience in the market place.  There exists relatively few satisfying standards.  The tools are not good enough.  Too many platforms to be covered.  Middleware often threatens the real-time performance of a system.  Middleware products are not very mature.
  • 32. EAI / Middleware Leaders  BEA Systems (worldwide locations).  CrossWorlds Software (Australia).  IONA Technologies (Ireland, Scotland, California).  Level 8 Systems (North Carolina, California, New Jersey, Virgina, London, Milan, and Paris).  Mercator Software (England, Massachusetts).  NEON (purchased in 2001 by Sybase) (California).  SeeBeyond (California, multiple U.S. States, Australia, Korea, Japan, Singapore, Cyprus, multiple European locations).  Software AG (Germany).
  • 33. Conclusion:  Middleware technologies are very important to succeed with an incremental migration of legacy systems into client/server systems, but that it is hard to find the correct tools and people to accomplish the work.
  • 34. References:  www.google.com  www.wikipedia.org  www.oeclib.in  www.projectsreports.org
  • 35. Questions:  What is Middleware technology?  Mention different types of Middleware.  What are Advantages and Disadvantages of Middleware?