IBM E-Business: Technology, Solution, and Design Overview 6.3 Gather Requirements
Total Page:16
File Type:pdf, Size:1020Kb
Front cover IBM e-business Technology, Solution, and Design Overview Learn the IBM way of building e-business applications Discover the array of IBM products and solutions for e-business Prepare yourself for IBM certification exams Brian R. Smith Charles Ackeifi Thomas G. Bradford Prabhakar Gopalan Jennifer Maynard Abdulamir Mryhij ibm.com/redbooks International Technical Support Organization IBM e-business Technology, Solution, and Design Overview August 2003 SG24-6248-01 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Second Edition (August 2003) © Copyright International Business Machines Corporation 2001, 2003. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team that wrote this redbook. ix Become a published author . xi Comments welcome. xi Chapter 1. What e-business is . 1 1.1 This publication as a guide to your understanding . 3 1.1.1 We guide. 3 1.1.2 We reference . 3 1.1.3 We elaborate. 8 1.2 IBM Certified for e-business . 9 1.2.1 IBM Certified for e-business - Solution designer. 10 Chapter 2. e-business concepts and technologies . 19 2.1 Patterns for e-business . 20 2.1.1 The Patterns for e-business layered asset model. 20 2.1.2 How to use the Patterns for e-business . 21 2.1.3 Summary. 29 2.2 Technology options . 29 2.2.1 Java technology . 30 2.2.2 XML. 31 2.2.3 Java 2 Platform, Enterprise Edition. 36 2.2.4 Presentation layer technologies . 39 2.2.5 Web application server . 47 2.2.6 Integration server . 55 2.2.7 Protocols . 57 2.2.8 Objects . 67 2.2.9 Struts. 67 2.2.10 Eclipse . 68 2.2.11 MVC patterns . 68 2.2.12 Common Object Request Broker Architecture (CORBA) . 73 2.2.13 Transactions . 73 Chapter 3. e-business infrastructure management . 83 3.1 Common Information Model (CIM) . 84 3.2 Infrastructure management . 84 3.3 Performance and availability management . 85 3.4 Performance management . 85 3.4.1 Bottlenecks . 86 3.4.2 Technologies. 87 3.5 Availability management . 96 3.6 IBM Tivoli performance and availability solutions . 97 3.7 Configuration and operations management . 97 3.7.1 Configuration and operations management overview. 97 3.7.2 IBM Tivoli Configuration and Operations Management solutions . 98 3.8 Storage Management . 98 © Copyright IBM Corp. 2003. All rights reserved. iii 3.8.1 Importance of Storage Management . 98 3.8.2 Storage Management technologies . 99 3.8.3 Decision hints and tips in choosing a Storage Management solution. 101 3.8.4 IBM Tivoli Storage Management solutions . 102 3.8.5 IBM's top ten data protection recommendations. 103 3.9 Suggested further reading/references. 104 Chapter 4. Security . 105 4.1 Security for e-business . 106 4.2 Cryptography principles . 107 4.2.1 Symmetric (secret) key cryptography . 108 4.2.2 Asymmetric (public) key cryptography . 109 4.2.3 Digital signature algorithm (DSA) . 110 4.2.4 Digital certificates . 112 4.3 Secure Sockets Layer (SSL) protocol . 114 4.3.1 Record layer protocol . 115 4.3.2 Communication protocols . 115 4.4 Secure Electronic Transaction (SET) protocol . 116 4.5 Techniques for securing the end-to-end model. 120 4.5.1 Firewalls . 120 4.5.2 Directory services . 124 4.5.3 Security architecture . 126 4.6 WebSphere Application Server security model. 127 4.7 Approaches for securing e-business solutions . 135 4.7.1 Securing e-business using packet filtering and application firewalls. 135 4.7.2 Securing e-business using circuit-level gateways. 136 4.7.3 Securing e-business using SET . 137 4.7.4 Securing e-business using VPN . 137 Chapter 5. Design criteria and considerations for e-business solutions . 139 5.1 Understand current business policy . 140 5.2 Validate skills needed . 140.