没有合适的资源?快使用搜索试试~ 我知道了~
J2EE Connector Architecture and Enterprise Application Integrati...
需积分: 3 35 下载量 194 浏览量
2008-11-07
23:10:39
上传
评论
收藏 4.75MB PDF 举报
温馨提示
试读
242页
J2EE Connector Architecture and Enterprise Application Integration一本很不错的书
资源推荐
资源详情
资源评论
Front Matter
Table of Contents
About the Author
J2EE Connector Architecture and Enterprise Application Integration
Rahul Sharma
Beth Stearns
Tony Ng
Publisher: Addison Wesley
First Edition December 01, 2001
ISBN: 0-201-77580-8, 416 pages
The Java(TM) 2 Enterprise Edition (J2EE) platform connector architecture is the key component in
Java’s support for enterprise application integration (EAI) and for linking enterprise information
systems (EISs) with Web services. Because many services are now provided through the Web, it is
essential that business enterprises have an efficient EAI solution. J2EE(TM) Connector Architecture
and Enterprise Application Integration is the definitive guide to showing enterprise organizations
how to incorporate existing enterprise infrastructure and applications, taking them into the
Web-enabled economy of the future.
Written for application component developers who are building Connector architecture applications,
J2EE(TM) Connector Architecture and Enterprise Application Integration explains how to connect
applications not only to one another but also to a multitude of EISs and legacy systems. This book is
also of interest to independent software developers (ISVs) and others who develop resource adapters
for specific EISs. Readers will learn how to link underlying infrastructure products with J2EE
application server and platform technologies.
TEAMFLY
TEAMFLY PRESENTS
A
Table of Content
TABLE OF CONTENT.............................................................................................................................................A
FOREWORD ...........................................................................................................................................................I
PREFACE ............................................................................................................................................................ III
Conventions Used in This Book.................................................................................................................... III
Graphics........................................................................................................................................................ III
Typographic Conventions..............................................................................................................................IV
Other Sources of Information ........................................................................................................................IV
Contents of the Book.......................................................................................................................................V
ACKNOWLEDGMENTS ......................................................................................................................................VIII
CHAPTER 1. ENTERPRISE APPLICATION INTEGRATION......................................................................................... 1
1.1 What Is Enterprise Application Integration?............................................................................................ 2
1.2 Web-driven Application Integration ......................................................................................................... 3
1.3 Enterprise Information Systems................................................................................................................ 4
1.4 Challenges in EIS Integration................................................................................................................... 6
1.5 Enterprise Application Integration Approaches....................................................................................... 7
1.6 J2EE Connector Architecture and EAI................................................................................................... 13
1.7 Conclusion .............................................................................................................................................. 15
CHAPTER 2. J2EE CONNECTOR ARCHITECTURE OVERVIEW.............................................................................. 16
2.1 What Is the J2EE Platform? ................................................................................................................... 16
2.2 J2EE Connector Architecture Overview................................................................................................. 19
2.3 Example Scenario ................................................................................................................................... 22
2.4 Conclusion .............................................................................................................................................. 26
CHAPTER 3. MANAGING CONNECTIONS............................................................................................................. 27
3.1 Connection Management Contract......................................................................................................... 28
3.2 Connection Management Architecture ................................................................................................... 28
3.3 Application Programming Model ........................................................................................................... 30
3.4 Conclusion .............................................................................................................................................. 31
CHAPTER 4. WORKING WITH TRANSACTIONS .................................................................................................... 32
4.1 Introduction to Transactions................................................................................................................... 32
4.2 Developing Transactional Applications ................................................................................................. 35
4.3 Transaction Levels.................................................................................................................................. 38
4.4 Sample Application Transaction Scenario.............................................................................................. 38
4.5 Conclusion .............................................................................................................................................. 40
CHAPTER 5. MANAGING SECURITY.................................................................................................................... 41
5.1 Security Concepts.................................................................................................................................... 41
5.2 Security Model for EIS Connections....................................................................................................... 43
5.3 Understanding EIS Sign-On ................................................................................................................... 44
5.4 Managing Security.................................................................................................................................. 45
5.5 Security Example .................................................................................................................................... 47
5.6 Conclusion .............................................................................................................................................. 49
CHAPTER 6. ASYNCHRONOUS MESSAGING........................................................................................................ 50
6.1 Synchronous Communication ................................................................................................................. 50
6.2 Asynchronous Communication ............................................................................................................... 52
6.3 Connector Architecture 2.0 Message Handling...................................................................................... 53
6.4 Communication Trade-offs ..................................................................................................................... 54
6.5 Enterprise Messaging Technologies....................................................................................................... 55
6.6 Java Message Service ............................................................................................................................. 56
6.7 JMS and EAI ........................................................................................................................................... 59
6.8 J2EE Platform and EAI .......................................................................................................................... 60
6.9 Message-driven Bean.............................................................................................................................. 61
6.10 Example................................................................................................................................................. 62
6.11 Conclusion ............................................................................................................................................ 64
CHAPTER 7. COMMON CLIENT INTERFACE......................................................................................................... 66
7.1 Overview of the CCI................................................................................................................................ 66
7.2 CCI Programming Example ................................................................................................................... 67
7.3 Connection Interfaces............................................................................................................................. 70
7.4 Interaction Interfaces.............................................................................................................................. 72
7.5 Data Representation Interfaces .............................................................................................................. 74
7.6 Metadata Interfaces ................................................................................................................................ 75
7.7 Exception Interfaces................................................................................................................................ 76
7.8 Code Examples........................................................................................................................................ 76
B
7.9 Conclusion .............................................................................................................................................. 78
CHAPTER 8. TOOLS AND FRAMEWORKS............................................................................................................. 79
8.1 Types of Tools ......................................................................................................................................... 79
8.2 Connector Architecture Tools Support................................................................................................... 80
8.3 EIS Access Objects.................................................................................................................................. 81
8.4 Guidelines for Access Objects ................................................................................................................ 85
8.5 EJB 2.0 Container-Managed Persistence............................................................................................... 86
8.6 Conclusion .............................................................................................................................................. 87
CHAPTER 9. XML AND THE CONNECTOR ARCHITECTURE................................................................................. 88
9.1 Enterprise Application Integration and XML......................................................................................... 88
9.2 Overview of XML Concepts .................................................................................................................... 89
9.3 Defining Document Types and Formats ................................................................................................. 89
9.4 Java Technologies Supporting XML....................................................................................................... 90
9.5 XML and Connector Architecture........................................................................................................... 93
9.6 XML Support in Connector Architecture................................................................................................ 96
9.7 Conclusion .............................................................................................................................................. 97
CHAPTER 10. BUILDING A RESOURCE ADAPTER................................................................................................ 98
10.1 Implementing a Resource Adapter........................................................................................................ 98
10.2 System Contract Interfaces ................................................................................................................... 99
10.3 Managing Transactions ...................................................................................................................... 103
10.4 Implementing Security Management................................................................................................... 104
10.5 Handling Connection Events .............................................................................................................. 105
10.6 Distributing a Resource Adapter ........................................................................................................ 106
10.7 Using an Adapter in the Runtime Environment.................................................................................. 107
10.8 Conclusion .......................................................................................................................................... 108
CHAPTER 11. RESOURCE ADAPTER PACKAGING AND DEPLOYMENT ............................................................... 109
11.1 Deployment Approaches..................................................................................................................... 110
11.2 Packaging a Resource Adapter........................................................................................................... 111
11.3 Deployment and Configuration........................................................................................................... 113
11.4 Connection Factory Creation ............................................................................................................. 113
11.5 Using Packaging and Deployment Tools............................................................................................ 113
11.6 Conclusion .......................................................................................................................................... 117
CHAPTER 12. CONNECTION MANAGEMENT CONTRACT................................................................................... 119
12.1 Connection Management Contract..................................................................................................... 119
12.2 Contract Overview.............................................................................................................................. 119
12.3 Scenarios............................................................................................................................................. 121
12.4 Connection Management Classes and Interfaces............................................................................... 128
12.5 Conclusion .......................................................................................................................................... 132
CHAPTER 13. TRANSACTION MANAGEMENT CONTRACT ................................................................................. 133
13.1 Transaction Management Contract.................................................................................................... 133
13.2 Local Transaction Management ......................................................................................................... 135
13.3 XAResource Transaction Management............................................................................................... 137
13.4 Requirements for Transaction Management Contract ....................................................................... 140
13.5 Connection Sharing ............................................................................................................................ 141
13.6 Transaction Scenarios ........................................................................................................................ 142
13.7 Conclusion .......................................................................................................................................... 144
13.7 Conclusion .......................................................................................................................................... 145
CHAPTER 14. SECURITY MANAGEMENT CONTRACT........................................................................................ 146
14.1 Interfaces and Classes ........................................................................................................................ 146
14.2 Security Management Contract .......................................................................................................... 148
14.3 Conclusion .......................................................................................................................................... 150
CHAPTER 15. FUTURE DIRECTIONS.................................................................................................................. 151
15.1 Connector Architecture 2.0................................................................................................................. 151
15.2 J2EE and EAI...................................................................................................................................... 153
15.3 Conclusion .......................................................................................................................................... 153
CHAPTER 16. THE SAP CONNECTOR ............................................................................................................... 154
16.1 Architecture of SAP Systems............................................................................................................... 154
16.2 Architecture of the SAP Connector..................................................................................................... 156
16.3 Example............................................................................................................................................... 159
CHAPTER 17. DEVELOPING APPLICATIONS WITH JCA -BASED TOOLS............................................................. 162
17.1 Enterprise Access Builder (EAB) 101................................................................................................. 162
17.2 JCA Application Development Process .............................................................................................. 163
17.3 Future Directions................................................................................................................................ 174
17.4 Conclusion .......................................................................................................................................... 175
C
C
HAPTER 18. EMBRACING THE J2EE CONNECTOR ARCHITECTURE: THE BEA WEBLOGIC EXPERIENCE ....... 177
18.1 WebLogic Server's Implementation of the J2EE Connector Architecture Specification.................... 177
18.2 WebLogic Integration 2.0 ................................................................................................................... 182
18.3 BEA Partners Adopting the J2EE Connector Architecture................................................................ 186
APPENDIX A. API REFERENCE ........................................................................................................................ 187
A.1 javax.resource Package........................................................................................................................ 187
A.2 javax.resource.cci Package.................................................................................................................. 187
A.3 javax.resource.spi Package.................................................................................................................. 203
A.4 javax.resource.spi.security Package .................................................................................................... 216
GLOSSARY ....................................................................................................................................................... 220
I
Foreword
Standards can redefine a marketplace—consider the impact that SQL had in launching the relational database
market. Standards can also create new markets—without HTML, HTTP, and SSL, we would still be waiting for
the World Wide Web. That is why the Java community is so excited about Web Services and the Java™ 2
Enterprise Edition (J2EE™) Connector Architecture: we expect a similarly dramatic impact on application
integration.
By application integration (or simply “integration”), I do not just mean Enterprise Application Integration (EAI),
which I would characterize as Intranet integration, which happens behind the firewall. I am also including
business-to-business application integration (B2BI) wherein the applications from one company directly
interoperate with the applications of a business partner across the Internet or a Virtual Private Network. In fact,
EAI and B2BI are already converging: individual business units increasingly have their own IT infrastructure and
applications. So just as Web technologies are widely used on our Intranets, we can expect XML, Web Services,
and J2EE adapters to become common on our corporate networks. But I would take this one step further. The
majority of new applications today are built to plug into the Web. Going forward, we should demand that both
commercial off-the-shelf applications as well as “home grown” applications be “integration ready” out of the
box—ready to plug into this emerging integration “backplane” of Web Services.
Technology alone is never sufficient to drive this level of change. There also must be a compelling business case.
Today, large companies depend on tens of thousands of applications. Most of these applications operate in silos,
interconnecting only with their close peers. And the trend is toward proliferation. At the same time, the rigors of
competition are forcing our businesses to specialize—to focus on only what they do well. But as we divest and
outsource, we are forced to more closely integrate with our business partners.
Integration “after the fact” is such a pain point that some application vendors are now suggesting that the only
antidote is to purchase every business application from a single supplier so that they are “pre-integrated”—call
this “worst of breed.” For larger businesses such a prospect is absurd. What about the legacy applications and data?
What about the increasing demand for vertically specialized applications? What about the in-house software
essential for competitive differentiation?
So, while integration may well be the biggest source of information technology (IT) pain today, the integration
solutions market nevertheless remains fragmented. Growth is stilted by a lack of standards. Instead of a unifying
architecture, we have numerous small vendors offering highly proprietary technologies:
1. Proprietary protocols— The litmus test for a proprietary protocol is whether the same software stack
has to run on both sides of the network. The Web analogy is compelling—without HTML and HTTP, a
World Wide Web of heterogeneous clients talking to heterogeneous servers would not have happened.
Proprietary protocols simply do not work for the scale of integration we need on the Web. Beware: While
XML is a standard, XML document-passing conventions can still be highly proprietary. That's why the
emerging family of Web Services standards is so essential—SOAP, WSDL, UDDI, ebXML, BTP, and so
on. Without such standards, users will be unable to mix and match integration solutions as they have Web
technologies.
2. Proprietary adapters— Adapters map between new standards (such as Java technology and the J2EE
platform) and legacy technologies (including COBOL/CICS). Even with the emergence of XML and Web
Services, adapters remain essential because very little of today's legacy is going to directly support Web
Services. Adapters solve what could be called the “last mile” problem of integration—how do I get from
my XML/Web Services “backbone” into the legacy? Without a standard model for adapters, it's nearly
impossible to get critical mass. Instead of an enterprise software vendor delivering standard adapters with
its product, adapters are “one-off” by a small integration vendor or the system integrator.
3. Proprietary containers— Protocols and adapters are hosted in containers. Virtually all integration
solutions on the market today depend on proprietary containers. These containers are themselves
proprietary not just because the adapters and protocols are. Consider that little investment protection is
offered for the additional programming required to move data from one integration platform to another:
o Synchronous and asynchronous messaging (for hub-and-spoke as well as peer-to-peer integration
server networks)
o Security (authentication, authorization, privacy, non-repudiation)
o Transactions, compensating actions, and guaranteed delivery
o Message (data dependent) routing, load balancing, and failover
o Rules management, workflow, and multi-vendor collaboration
o Naming/directory (LDAP, UDDI)
o Transformation
o Repository and content management
剩余241页未读,继续阅读
资源评论
Oftentap-米点联系人
- 粉丝: 4
- 资源: 8
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功