Developing.Enterprise Java Applications with J2EE and UML.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Developing.Enterprise Java Applications with J2EE and UML.Pdf Developing Enterprise Java Applications with J2EE and UML by Khawar Zaman Ahmed, Cary E. Umrysh · Paperback: 288 pages ; Dimensions (in inches): 0.66 x 9.28 x 7.32 · Publisher: Addison-Wesley Pub Co; ISBN: 0201738295; 1st edition (December 15, 2001) · Average Customer Review: Based on 6 reviews. Table of Contents Copyright.................................................................................................................. 6 Dedication......................................................................................................... 7 Foreword.................................................................................................................. 8 Preface................................................................................................................... 10 Intended Audience .......................................................................................... 10 How to Use This Book......................................................................................11 Chapter Summaries ........................................................................................ 12 Conventions.................................................................................................... 13 Acknowledgments .................................................................................................. 15 Chapter 1. Introduction to Enterprise Software ....................................................... 17 What Is Enterprise Software?.......................................................................... 17 Evolution of Enterprise Software ..................................................................... 20 Enterprise Software and Component-Based Software ..................................... 22 Summary......................................................................................................... 23 Chapter 2. Introduction to the J2EE ........................................................................ 24 What Is the Java 2 Platform, Enterprise Edition?............................................. 24 A Brief History of J2EE .................................................................................... 25 Why J2EE? ..................................................................................................... 27 A Brief Overview of J2EE................................................................................. 30 Summary......................................................................................................... 39 Chapter 3. Introduction to the UML ......................................................................... 40 UML Overview................................................................................................. 41 Why Use the J2EE and the UML Together? .................................................... 43 Challenges in Modeling J2EE in the UML ........................................................ 45 Extension Mechanisms in the UML .................................................................. 46 The Approach to J2EE UML Modeling ............................................................. 49 Summary ........................................................................................................ 50 Chapter 4. UML and Java....................................................................................... 51 Representing Structure.................................................................................... 51 Representing Relationships............................................................................. 57 Summary......................................................................................................... 69 Chapter 5. Overview of Activities ............................................................................ 70 What Is a Software Development Process?..................................................... 70 Overview of Popular Approaches to Software Development ............................ 70 Approach Used in This Book ........................................................................... 79 Overview of Major Activities............................................................................. 80 Summary......................................................................................................... 82 Chapter 6. Architecture........................................................................................... 83 What Is Software Architecture?........................................................................ 83 Why Architecture?........................................................................................... 85 Key Concepts in Enterprise Application Architecture........................................ 86 Approaches to Software Architecture............................................................... 99 Putting It All Together.....................................................................................101 Summary .......................................................................................................102 Chapter 7. Analyzing Customer Needs ..................................................................103 Why Software Analysis and Design? ..............................................................103 Problem Analysis............................................................................................104 Use Case Modeling ........................................................................................105 Identifying the Actors......................................................................................106 Finding the Use Cases ...................................................................................107 Use Case Diagrams .......................................................................................109 Use Case Relationships .................................................................................110 Sequence Diagrams .......................................................................................113 Activity Diagrams............................................................................................115 Summary........................................................................................................118 Chapter 8. Creating the Design .............................................................................120 Use Case Analysis .........................................................................................120 Use Case Realizations ...................................................................................120 Refined Use Case Description........................................................................122 Sequence Diagrams .......................................................................................124 Collaboration Diagrams ..................................................................................129 Class Diagrams ..............................................................................................130 Coalescing the Analysis Classes....................................................................134 Packaging ......................................................................................................138 Summary........................................................................................................140 Chapter 9. Overview of J2EE Technologies...........................................................142 The Big Picture...............................................................................................142 Servlets..........................................................................................................143 JavaServer Pages (JSP) ................................................................................143 Enterprise JavaBeans (EJB)...........................................................................144 Session Beans ...............................................................................................144 Entity Beans...................................................................................................144 Message-Driven Beans..................................................................................145 Assembly and Deployment.............................................................................145 Case Study.....................................................................................................145 Summary........................................................................................................145 Chapter 10. Servlets..............................................................................................146 Introduction to Servlets...................................................................................147 Servlet Life Cycle ...........................................................................................149 Request Handling...........................................................................................152 Response Generation.....................................................................................153 HTTP Request Handlers.................................................................................155 The RequestDispatcher Interface ...................................................................156 Modeling Servlets in UML...............................................................................157 Modeling Other Servlet Aspects .....................................................................159
Recommended publications
  • We Are on the Right Track for Ensuring Our Success
    s »We have made great progress in »We are on the right track for networking our internal value ensuring our success as the chain electronically and in linking it to our customers, suppliers and Global network of innovation.« partners. This is enabling us to accelerate processes and cut costs.« Annual Report 2001 Annual s Annual Report 2001 Siemens Aktiengesellschaft Order No. A19100-F-V055-X-7600 Siemens Siemens is a network encompassing well over 400,000 people in 190 countries. information on contents for external orders We take pride in possessing in-depth knowledge of customers' requirements, the Telephone +49 89 636-33032 (Press Office) e-mail [email protected] expertise to create innovative solutions in electrical engineering and electronics, and +49 89 636-32474 (Investor Relations) Internet http://www.siemens.de/geschaeftsbericht_2001/order Fax +49 89 636-32825 (Press Office) Telephone +49 89 636-32910 the experience to successfully navigate even rough economic waters. But our greatest +49 89 636-32830 (Investor Relations) Fax +49 89 636-32908 e-mail [email protected] asset is undoubtedly our people, with their unparalleled motivation and their passion [email protected] for outperforming our competitors. Linked via a global network that enables them address for internal orders to exchange ideas with colleagues around the world, Siemens employees strive Siemens AG Wittelsbacherplatz 2 LZF, Fürth-Bislohe continuously to increase company value. D-80333 Munich Intranet http://c4bs.spls.de/ We at Siemens do not measure value solely in terms of short-term profitability. For Federal Republic of Germany Fax +49 911 654-4271 Internet http://www.siemens.com German Order no.
    [Show full text]
  • Mobile Banking
    MOBILE BANKING Overview of the banking industry The Indian Banking industry, which is governed by the Banking Regulation Act of India, 1949 can be broadly classified into two major categories, non-scheduled banks and scheduled banks. Scheduled banks comprise commercial banks and the co-operative banks. In terms of ownership, commercial banks can be further grouped into nationalized banks, the State Bank of India and its group banks, regional rural banks and private sector banks .These banks have over 67,000 branches spread over the country.The first phase of financial reforms resulted in the nationalization of 14 major banks in 1969 and resulted in a shift from Class banking to Mass banking. This in turn resulted in a significant growth in the geographical coverage of banks. Every bank had to earmark a minimum percentage of their loan portfolio to sectors identified as “priority sectors”. After the second phase of financial sector reforms and liberalization of the sector in the early nineties, the Public Sector Banks (PSB) s found it extremely difficult to compete with the new private sector banks and the foreign banks. The new private sector banks first made their appearance after the guidelines permitting them were issued in January 1993. Eight new private sector banks are presently in operation. These banks due to their late start have access to state-of-the-art technology, which in turn helps them to save on manpower costs and provide better services. Current scenario The industry is currently in a transition phase. On the one hand, the PSBs, which are the mainstay of the Indian Banking system, are in the process of shedding their flab in terms of excessive manpower, excessive non-Performing Assets (Npas) and excessive governmental equity, while on the other hand the private sector banks are consolidating themselves through mergers and acquisitions.
    [Show full text]
  • The Economics of Information the Relationship Between IT Spending, Profits, and Knowledge Capital®
    Concept Report Research and Advisory Services The Economics of Information The Relationship Between IT Spending, Profits, and Knowledge Capital® Concept Report, July 2001 Research by: Paul Strassmann Editied by: Jacques Halé Publishing by: Peter Bristow Chris Dickinson Steve Duke Samantha Henry Paul Makey Published July 2001 © 2001 by Paul A. Strassmann Important Notice The information available in this publication is given in good faith and is believed to be reliable. Butler Group expressly excludes any representation or warranty (express or implied) about the suitability of materials in this publication for your purposes and excludes to the fullest extent possible any liability in contract, tort or howsoever for implementation of, or reliance upon, the information contained in this publication. © P a u l A . S t r The Economics of Information a s s m a n n J u l y 2 0 0 CONCEPT REPORT 1 CONTENTS 5 Management Summary 11 Part 1: Transforming IT Costs into Profits 11 1.1 The Challenge 21 1.2 The Strategic Positioning of a Firm in Relation to IT 29 1.3 The Competitive Advantage in the Information Age 39 Part 2: Knowledge Capital® in European Firms 41 Introduction 45 2.1 Analysis of European Firms 55 2.2 Country Case – The UK Knowledge Capital® 65 Appendix A: Valuation of Knowledge Capital® 71 Appendix B: Valuation of Knowledge Capital® Rankings by Country 71 Belgian Firms 77 Danish Firms 83 Dutch Firms 91 Finnish Firms 97 French Firms 119 German Firms 139 Irish Firms 143 Italian Firms 151 Norwegian Firms 157 Portuguese Firms 161 Spanish Firms 167 Swedish Firms 177 UK Firms C o n c e p t R e p o r t Management Summary Concept Report, July 2001 © P a u l A .
    [Show full text]
  • List of Section 13F Securities, Fourth Quarter 2001
    OFFICIAL LIST OF SECTION 13(F) SECURITIES USER INFORMATION SHEET General This list of "Section 130securities" as defined by Rule 13f-1(c) [I7 CFR 240.13f-1 (c)] is made available to the public pursuant to Section13 (f) (3) of the Securities Exchange Act of 1934 [15 USC 78m(f) (3)]. It is made available for use in the preparation of reports filed with the Securities and Exhange Commission pursuant to Rule 13f-1 [17 CFR 240.13f-'I] under Section 13(f) of the Securities Exchange Act of 1934. An updated list is published on a quarterly basis. This list is current as of December. 15. 2001 ,and may be relied on by institutional investment managers filing Form 13F reports for the calendar quarter ending December30. 2001 . Institutional investment managers should report holdings-number of shares and fair market value--as of the last day of the calendar quarter as required by [ Section 13(f)(1) and Rule 13f-11 thereunder. Features (1) Additions and Deletions: Revisions made to the list of Section 13(f) securities are indicated in a column titled "STATUS." The word "ADDED" in the status column opposite the name of a security indicates that the security has become a Section 13(f) security. The word "DELETED" in the status col~~mnopposite the name of a security indicates that the security ceases to be a 13(f) security since the date of the last list. (2) List of options: An asterisk is placed next to the name of any security having a listed option and each option is individually listed with its own CUSlP number immediately below the name of the security having the option.
    [Show full text]
  • Weblogic Server 6.0 Review Inside Page 30
    WEBLOGIC SERVER 6.0 REVIEW INSIDE PAGE 30 TM The World’s Leading Java Resource Java COM June 2001 Volume:6 Issue:6 FREE! PRODUCT Sept 23–26, 2001 New York, NY PAGE 16 SHOWCASE CD! INSIDE! SHOW PROGRAM 183 From the Editor by Alan Williamson pg. 7 Industry Commentaries by Richard Green pg. 8 by Bruce Scott pg. 146 EXCLUSIVE: INTERVIEW WITH KEYNOTER...SCOTT DIETZEN Product Reviews Sun Blade pg. 20 WebLogic 6.0 pg. 30 JDJJ2EE: The Challenges and Pitfalls of J2EE Chris Kampmeier 36 ServletExec pg. 54 iPlanet pg. 62 2.0J2EE: Growing JSP and Servlet Sites Patrick Sean Neville 44 J2EE Editorial SPECIAL FOCUS by Ajit Sagar pg. 22 ON J2EE, J2SEJ2EE: & J2ME WebSphere Column Brady Flowers 56 Interview J2EE: The Impact of EJB 2.0 Tyler Jewell 64 Larry Freeman, Manager J2EE Blueprints Team pg. 26 J2SE: Building a Telephone/Voice Portal Klinner & Walker 78 First Look Optimal J pg. 140 J2SE: Making a Mountain out of an Anthill Neal Ford 86 J2ME Editorial J2SE: JNI Programming in C/C+ Blair Wyman 96 by Jason Briggs pg. 144 J2SE: Evolving Functionality Satya Komatineni 104 $AVE BIG J2SE: Optimization and Java Irvin J. Lustig 110 J2SE: Using JavaBeans in Dreamweaver Barbarelli & Deming 118 J2SE: Deployment of JavaServer Pages John Goodson 126 J2SE: Java Quirks – Dates and Calendars Roedy Green 134 ONE-TIME OFFER! J2ME: The Incredibly Shrinking Platform Jason Briggs 148 Stop by our booth for special pricing J2ME: A UI Framework for the MIDP API Glen Cordrey 154 J2ME: Java Thick Clients with J2ME Glenn Coates 164 Sonic Software www.sonicsoftware.com 2 JUNE 2001 Java COM Zero G www.zerog.com/installs JUNE 2001 3 Java COM BEA www.developer.bea.com 4 JUNE 2001 Java COM BEA www.developer.bea.com JUNE 2001 5 Java COM TogetherSoft www.togethersoft.com/jdjspecial.html 6 JUNE 2001 Java COM FROM THE EDITOR ALANWILLIAMSON, EDITOR-IN-CHIEF The rational The Dawn alternative of Content Version 4.5 t has been one hell of a journey to get where here at JDJ are looking forward to working with we are today.
    [Show full text]
  • Safari | J2EE" Technology in Practice: Building Business Applications With
    Table of Contents Foreword..............................................................................................................................................................1 Acknowledgments...............................................................................................................................................3 About the Editors................................................................................................................................................5 Chapter 1. A Multi−Vendor Standard for Distributed Enterprise Applications.........................................7 1.1 The Networked Economy..................................................................................................................7 1.2 Why Standardize?..............................................................................................................................7 1.3 Why Standardize on J2EE?................................................................................................................8 1.4 Why a Standard Based on Java Technologies?................................................................................10 1.5 Why a Book of Success Stories?.....................................................................................................11 Chapter 2. Overview of the J2EE Technology and Architecture.................................................................13 2.1 The Evolution of Distributed, Multitier Applications.....................................................................13
    [Show full text]
  • Growing Development of Foreign Encryption Products in the Face of U
    10 June 1999 Source: http://www.seas.gwu.edu/seas/institutes/cpi/library/docs/cpi-1999-02.pdf Growing Development of Foreign Encryption Products in the Face of U. S. Export Regulations Lance J. Hoffman David M. Balenson Karen A. Metivier-Carreiro Anya Kim Matthew G. Mundy June 10, 1999 Report GWU-CPI-1999-02 Cyberspace Policy Institute The George Washington University School of Engineering and Applied Science 2033 K St. NW Suite 340 . Washington, DC 20006 Phone: 202.994.5512 . Fax: 202.994.5505 Website: http://www.seas.gwu.edu/seas/institutes/cpi/ Email: [email protected] GROWING DEVELOPMENT OF FOREIGN ENCRYPTION PRODUCTS IN THE FACE OF U.S. EXPORT REGULATIONS Lance J. Hoffman* David M. Balenson** Karen A. Metivier-Carreiro* Anya Kim* Matthew G. Mundy** June 10, 1999 Report No. GWU-CPI-1999-02 *Cyberspace Policy Institute, School of Engineering and Applied Science, The George Washington University, Washington, DC **NAI Labs, The Security Research Division of Network Associates, Inc., Glenwood, MD This research was supported in part by Americans for Computer Privacy (ACP). EXECUTIVE SUMMARY Development of cryptographic products outside the United States is not only continuing but is expanding to additional countries; with rapid growth of the Internet, communications-related cryptography especially is experiencing high growth, especially in electronic mail, virtual private network, and IPsec products. This report surveys encryption products developed outside the United States and provides some information on the effect of the United States export control regime on American and foreign manufacturers. We have identified 805 hardware and/or software products incorporating cryptography manufactured in 35 countries outside the United States.
    [Show full text]
  • Innovation in Financial Services: Home Banking
    INDUSTRIAL PERFORMANCE CENTER Massachusetts Institute of Technology Cambridge, MA 02139 I NNOVATION IN FINANCIAL SERVICES CASE STUDY : H OME B ANKING Jeremy Shapiro MIT IPC Working Paper 99-004 March 1999 The views expressed herein are the author’s responsibility and do not necessary reflect those of the MIT Industrial Performance Center or the Massachusetts Institute of Technology. Innovation in Financial Services Case Study: Home Banking I. THE DEFINITION OF HOME BANKING AS AN INNOVATION.......................1 II. CONTEXT: MARKET STRUCTURE AND REGULATORY SYSTEM................5 A. UNITED STATES: A PORTRAIT OF FRAGMENTATION...............................................................5 B. GERMANY: ORGANIZED COMPETITION.................................................................................8 III. HISTORY AND STATE OF HOME BANKING ..........................................13 A. UNITED STATES ..............................................................................................................13 B. GERMANY......................................................................................................................22 IV. CONCLUSION: THE HOME BANKING INNOVATION IN COMPARATIVE PERSPECTIVE .....................................................................................34 A. SOURCES OF INNOVATION................................................................................................34 B. COMPARISON OF THE INNOVATION PROCESS.......................................................................35 I. The
    [Show full text]
  • Executive Summary
    EXECUTIVE SUMMARY Mobile banking is a system that allows customers of a financial institution to conduct a number of financial transactions through a mobile device such as a mobile phone or personal digital assistant.There are three types of mobile banking technology used.They are receive and send data via text messaging, web browsers and smart phone applications.The mobile banking services are funds transfer of inter bank and intra bank, balance enquiry services, request services like cheque book, bill payments and credit card payments, demat account services, mobile top up ,merchant payment, life insurance premium and stop payment instructions. The mobile banking service is benefitted to the customers and thebanks. The customers benefits are the funds or the banking transactions can be done without visiting the bank and there is no need of internet facility. It is also more secure than online banking. Any transactions taken is immediately made noticed to the customers thus reducing the frauds. It is cost saving to banks thus helps them to give more attention to their loyal customers and can perform better customer relationship. The mobile banking also has its other side of the coin. The banks charge the customers for providing them this service thus increasing their expense. The customers cannot do much transaction due to limit on the transaction. The profit earned by the banks is low due to increase in the expense in providing the service. The disadvantage of development in mobile banking is handset operability, security, reliability and scalability, application distribution and personalization. The precaution to be taken before using mobile banking are see that the mobile banking is activated the auto lock, keep the confidential details are not disclosed,download those sites which is a trustworthy and keep the Bluetooth always switched off because virus can destroy it.
    [Show full text]
  • Mastering Enterprise Javabeans™
    Mastering Enterprise JavaBeans™ Second Edition Mastering Enterprise JavaBeans™ Second Edition Ed Roman Scott Ambler Tyler Jewell Wiley Computer Publishing John Wiley & Sons, Inc. NEW YORK • CHICHESTER • WEINHEIM • BRISBANE • SINGAPORE • TORONTO Publisher: Robert Ipsen Editor: Robert M. Elliott Developmental Editor: Emilie Herman Managing Editor: John Atkins Associate New Media Editor: Brian Snapp Text Design & Composition: MacAllister Publishing Services, LLC Designations used by companies to distinguish their products are often claimed as trade- marks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should con- tact the appropriate companies for more complete information regarding trademarks and registration. This book is printed on acid-free paper. Copyright © 2002 by The Middleware Company. All rights reserved. Published by John Wiley & Sons, Inc. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copy- right Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850- 6008, E-Mail: [email protected]. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered.
    [Show full text]
  • Siemens Aktiengesellschaft
    As filed with the Securities and Exchange Commission on December 6, 2002 SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 20-F REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR (g) OF THE SECURITIES EXCHANGE ACT OF 1934 n OR ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended September 30, 2002. ¥ OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to . n Commission file number: 1-15174 Siemens Aktiengesellschaft (Exact name of Registrant as specified in its charter) Federal Republic of Germany (Jurisdiction of incorporation or organization) Wittelsbacherplatz 2 D-80333 Munich Federal Republic of Germany (Address of principal executive offices) Securities registered or to be registered pursuant to Section 12(b) of the Act: Name of each exchange Title of each class on which registered American Depositary Shares, each representing one New York Stock Exchange Common Share, no par value Common Shares, no par value* New York Stock Exchange * Listed, not for trading or quotation purposes, but only in connection with the registration of American Depositary Shares pursuant to the requirements of the Securities and Exchange Commission. Securities registered or to be registered pursuant to Section 12(g) of the Act: None Securities for which there is a reporting obligation pursuant to Section 15(d) of the Act: None The number of outstanding shares of each of the issuer’s classes of capital or common stock as of September 30, 2002: 890,374,001 common shares, no par value.
    [Show full text]
  • Siemens Aktiengesellschaft
    As filed with the Securities and Exchange Commission on August 27, 2002 SECURITIES ANDEXCHANGE COMMISSION Washington, D.C. 20549 FORM 20-F/A REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR (g) OF THE SECURITIES EXCHANGE ACT OF 1934 □ OR ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended September 30, 2001. ࠚ OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to . □ Commission file number: 1-15174 Siemens Aktiengesellschaft (Exact name of Registrant as specified in its charter) Federal Republic of Germany (Jurisdiction of incorporation or organization) Wittelsbacherplatz 2 D-80333 Munich Federal Republic of Germany (Address of principal executive offices) Securities registered or to be registered pursuant to Section 12(b) of the Act: Name of each exchange Title of each class on which registered American Depositary Shares, each representing one NewYork Stock Exchange Common Share, no par value Common Shares, no par value* NewYork Stock Exchange * Listed, not for trading or quotation purposes, but only in connection with the registration of American Depositary Shares pursuant to the requirements of the Securities and Exchange Commission. Securities registered or to be registered pursuant to Section 12(g) of the Act: None Securities for which there is a reporting obligation pursuant to Section 15(d) of the Act: None The number of outstanding shares of each of the issuer’s classes of capital or common stock as of September 30, 2001: 888,230,245 common shares, no par value.
    [Show full text]