Introducing the BEA Tuxedo System
Total Page:16
File Type:pdf, Size:1020Kb
BEA Tuxedo Introducing the BEA Tuxedo System BEA Tuxedo Release 7.1 Document Edition 7.1 May 2000 Copyright Copyright © 2000 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software and documentation is subject to and made available only pursuant to the terms of the BEA Systems License Agreement and may be used or copied only in accordance with the terms of that agreement. It is against the law to copy the software except as specifically allowed in the agreement. This document may not, in whole or in part, be copied photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior consent, in writing, from BEA Systems, Inc. Use, duplication or disclosure by the U.S. Government is subject to restrictions set forth in the BEA Systems License Agreement and in subparagraph (c)(1) of the Commercial Computer Software-Restricted Rights Clause at FAR 52.227-19; subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013, subparagraph (d) of the Commercial Computer Software--Licensing clause at NASA FAR supplement 16-52.227-86; or their equivalent. Information in this document is subject to change without notice and does not represent a commitment on the part of BEA Systems. THE SOFTWARE AND DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. FURTHER, BEA Systems DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE USE, OR THE RESULTS OF THE USE, OF THE SOFTWARE OR WRITTEN MATERIAL IN TERMS OF CORRECTNESS, ACCURACY, RELIABILITY, OR OTHERWISE. Trademarks or Service Marks BEA, ObjectBroker, TOP END, and Tuxedo are registered trademarks of BEA Systems, Inc. BEA Builder, BEA Connect, BEA Manager, BEA MessageQ, BEA Jolt, M3, eSolutions, eLink, WebLogic, and WebLogic Enterprise are trademarks of BEA Systems, Inc. All other company names may be trademarks of the respective companies with which they are associated. Introducing the BEA Tuxedo System Document Edition Date Software Version 7.1 May 2000 BEA Tuxedo Release 7.1 Contents 1. BEA Tuxedo System Fundamentals For More Information................................................................................. 1-1 What Is the BEA Tuxedo System...................................................................... 1-2 Features of the BEA Tuxedo System ......................................................... 1-3 Anatomy of the Client/Server Model ................................................................ 1-5 Characteristics of Client/Server Architecture ............................................ 1-5 Differences Between 2-Tier and 3-Tier Client/Server Architectures......... 1-6 Client/Server Variations to Suit Your Needs ............................................. 1-8 How the BEA Tuxedo System Fits into the Client/Server Model..................... 1-9 What Are Clients, Servers, and Services in a BEA Tuxedo Environment...... 1-11 What Is a BEA Tuxedo Client.................................................................. 1-11 What Is a BEA Tuxedo Server................................................................. 1-12 What Are BEA Tuxedo Services ............................................................. 1-12 Services Provided by the BEA Tuxedo System .............................................. 1-12 Administrative Services ........................................................................... 1-12 Application Processing Services .............................................................. 1-13 BEA Family of Products ................................................................................. 1-14 2. BEA Tuxedo System Architecture Basic Architecture of the BEA Tuxedo System ................................................ 2-1 What You Can Do Using the ATMI.................................................................. 2-4 What Are the BEA Tuxedo Messaging Paradigms ........................................... 2-8 What Is Conversational Communication........................................................... 2-9 How the EventBroker Works .......................................................................... 2-10 What Types of Events Are Reported............................................................... 2-11 How Are Events Reported............................................................................... 2-12 What Is Queue-based Communication............................................................ 2-13 Introducing the BEA Tuxedo System iii Using Application Queues........................................................................2-13 What Is Request/Reply Communication ......................................................... 2-14 What Is Synchronous Messaging .............................................................2-15 What Is Asynchronous Messaging ...........................................................2-16 What Is Unsolicited Communication .............................................................. 2-17 What Are Nested and Forwarded Service Requests........................................ 2-18 Nested Requests........................................................................................ 2-18 Forwarded Requests ................................................................................. 2-20 How the BEA Tuxedo System Processes Messages ....................................... 2-21 What Are the Benefits of Service Request Processing............................. 2-24 What Are Typed Buffers ................................................................................. 2-24 Characteristics of Buffer Types................................................................ 2-25 Using the MIB ................................................................................................. 2-29 Types of MIB Users ........................................................................................ 2-30 Classes, Attributes, and States in the MIB ...................................................... 2-30 BEA Tuxedo Application Processing Services ............................................... 2-31 What Is Data Compression .............................................................................. 2-31 What Is Data-dependent Routing .................................................................... 2-32 Uses of Data-dependent Routing.............................................................. 2-33 Example of Data-dependent Routing with a Horizontally Partitioned Database ............................................................................................ 2-34 Example of Data-dependent Routing with Rule-based Servers ...............2-35 Example of Data-dependent Routing with Distributed Application ........2-36 What Are Encoding and Decoding of Data ..................................................... 2-37 What Is Data Encryption ................................................................................. 2-38 What Is Data Marshalling................................................................................ 2-38 What Is Load Balancing ..................................................................................2-39 Assigning a Load Factor........................................................................... 2-40 What Is Message Prioritization........................................................................2-41 What Is Meant by Naming............................................................................... 2-42 Naming Services....................................................................................... 2-42 Advertising Services................................................................................. 2-43 Naming Events .........................................................................................2-44 BEA Tuxedo Administrative Services ............................................................2-44 iv Introducing the BEA Tuxedo System 3. Three Ways of Viewing the BEA Tuxedo System Infrastructure Basic BEA Tuxedo System Infrastructure ........................................................ 3-1 Management View: Using Administrative Tools.............................................. 3-2 Available BEA Tuxedo System MIBs ....................................................... 3-3 Using the BEA Administration Console ........................................................... 3-4 Browser Requirements ............................................................................... 3-4 Benefits of Using the BEA Administration Console......................................... 3-5 Exploring the Main Menu of the BEA Administration Console....................... 3-6 Using the Configuration Tool .................................................................... 3-7 What Is the Tree ......................................................................................... 3-8 Using the Power Bar .................................................................................. 3-9 Managing Operations Using the MIB ............................................................. 3-10 Types of MIB Users ........................................................................................ 3-11 Classes, Attributes, and States in the MIB ...................................................... 3-11 Using Command-Line Utilities ....................................................................... 3-12 Configuring Your