Intro To Tech Streams
Intro To Tech Streams
Session Plan
• Client Server
• Internet Technologies
• Wireless Web
• Mainframe Overview
• J2EE Overview
• .NET Overview
Client / Server Computing
Elements of C-S Computing
t
es
qu
Re
Client
Server
Network
Re
su
lt
Client machine
Server machine
What is C / S Computing?
User Interface
Presentation Logic
Application Logic
ke
Server
ro
Client
st
ey
K
Presentation Logic
Network
Di Application Logic
sp
la
ys
DBMS
True Client-Server Model
ke
Server
ro
Client
st
ey
K
Application Logic
Presentation Logic Network
Pr
o DBMS
Re ces
su sed
lts
Distributed Client-Server Model
Client
ri sed
Server
ue es
es
Presentation Logic Q oc
Pr
Application Logic
Application Logic Network
Pr
oc DBMS
Re es
su sed
lts
Advantages of C / S Computing
• Enhanced Data Sharing
• Integrated Services
• Sharing Resources Among Diverse Platforms
• Data Interchangeability and Interoperability
• Masked Physical Data Access
• Location Independence of Data and Processing
• Centralized Management
Components of C / S Applications
• Client Side
• Server Side
The Client Services
• Request for Services
– Remote Procedure Call (RPC)
– Fax / Print Services
– Window Services
– Remote Boot Services
– Utility Services
– Message Services
– Network Services
– Application Services
– Database Services
– Network Management Services
Dynamic Data Exchange (DDE)
• Client Side
• Server Side
The Server Services
• Request Processing
• File Services
• Fax / Print / Image Services
• Database Services
• Communication Services
• Security Services
The Server Operating Systems
• Netware
• OS/2
• Windows NT
• MVS
• OPENVMS
• UNIX
• DCE (Distributed Computing Environment)
• Linux
The Future of C / S Computing
• The Single-system image is a reality
• Powerful workstation technology will be available to
everyone providing information wherever it is needed.
• Information will be available for use by owners and
authorized users, without the constant need for
professional systems developers and their complex
programming languages.
• The future will bring information captured at its source
and available immediately to authorized users.
• The future will provide information from data in its
original form: image, video, graphics, document,
spreadsheet, or structured data , without the need to
be aware of specific software for each other.
Internet Technologies
Server Client
F F
Proxy Server
i i
r r
e e
Internet W
W
a a
l l
l l
Web Server
Clients
n Tier Web Architecture
Server Client
FS F
F
Proxy Server
i i
r r
e e
Internet W
W
App Server a a
l l
l l
DB Clients
n Tier Architecture continued….
Server
Web Server
File System Client
File System
Load Balancer
Primary DataBase Web Server
Client
Flow of Data
– Cdma2000
• CDMA technology with increased bandwidth
-- W-CDMA with increased bandwidth and faster transfers
Wireless Web Technology
• Three technologies are used to provide Web
access to wireless devices
– Wireless Application Protocol (WAP)
• Communication protocols standardizing
wireless internet access across all
devices
– Wireless Markup Language
– Web clipping
• Cut out only certain pieces of an Internet
page (handheld devices have small
screens)
WAP and WML
• Wireless Application Protocol (WAP)
– Developed by Nokia, Ericsson, Motorola, etc.
– A set of communication protocols designed to enable
different kinds of wireless devices to communicate
and access the Internet
– Designed to standardize development across different
wireless technologies worldwide
– Intended primarily for Internet-enabled digital phones,
pagers and other handheld devices
– Uses Web sites specifically designed for wireless
handheld devices that have small screens and low-
bandwidth constraints
WAP and WML
• Wireless Markup Language (WML)
– The scripting language used to create Web content to be
delivered to wireless handheld devices, based on XML
– Removes “unnecessary” content from Web pages
– WML tags are used to “mark up” a Web page to specify how
the page should be formatted on a wireless device
– WML works with the WAP to deliver the content
– Similar to HTML, but it does not require input devices
• Micro-browsers
– Designed with limited bandwidth and limited memory
requirements
– Access the Web via the wireless Internet
WAP and WML
• How wireless Internet works:
– A WAP gateway, which acts as a proxy server, receives the
request, translates it and sends it to the appropriate Internet
server
– Server responds by sending the requested WML document
– The WAP gateway parses this document's WML (i.e., it
analyzes the WML document, checking it for correctness) and
sends the proper text to the digital phone
• Deck
A WML document
• Card
– Consists of one user interaction, providing the WML browser
with a small, self-contained document for browsing
Web Clipping
• Web clipping
– Allows users to take relevant pieces of a Web site and deliver it to a
wireless device, eliminating excess content and graphics
– Palm devices use Web clipping
• Proxy server
– Lies between client (such as a Web browser) and Web server
– A query is received by a proxy server controlled by the wireless ISP
– Proxy server goes to the Web site and “clips” the necessary data
• The proxy server transmits the data back to your wireless device
• If the proxy server does not have the information, it passes the
request to the regular server
Bluetooth
• Bluetooth:
– A wireless technology that provides short-range, high-speed
voice and data communication between digital devices
– Conceived by Ericsson in 1994
– Provides up to 1 Mbps (megabits per second) of data transfer
capability between devices as much as 30 feet apart
– Can also be used to create wireless offices
• Bluetooth Special Interest Group
– Initially comprising Ericsson, IBM, Intel, Toshiba and Nokia
– Developed an open specification for the technology and to
encouraged cross-platform capabilities for the different wireless
devices
Wireless Local Area Networks
• Easier to install and maintain without disrupting an
office
• Computers can easily be moved without having to
install a new network connection in each location
• Radio Frequency WLANs (RF WLANs)
– Used to network devices at a distance
• Infrared and laser WLANs
– Do not require FCC approval
– Do not have the same interference issues
– Can be used only for short distances
Wireless Local Area Networks
• Infrared technology
– More cost efficient than laser technology
– Equipment has a longer lifespan
– Technology is less susceptible to weather
– Reliable and easy to install
– The system is portable
• Transceivers
– Send the signal between the buildings and are linked
to the network using fiber-optic cable (used with
infrared technology)
Wireless Communications
• Wireless communications can be unreliable and slow, wireless-
device bandwidth is about one fifth of the capabilities of a
standard dial-up connection
• General packet radio services (GPRS)
– Enables devices to transmit data at speeds of up to 114
kbps
• Universal mobile telecommunications standard (UMTS)
– Will offer transfer speeds of up to 2 Mbps for wireless
devices
• Smart phones
– Mobile phones that send and receive both voice and data
messages
– Used to securely send and receive secure mobile
transactions
IEEE Standards
• IEEE 802.11
• IEEE 802.11b
• IEEE 802.11a
• IEEE 802.11e
• HiperLAN/2
• Interoperability
802.11 802.11a 802.11b
Published in June Also published in late 1999 Published in late
1997 as a supplement to 802.11 1999 as supplement
to 802.11
2.4GHz operating Operates in 5GHz band (less
frequency RF interference than 2.4GHz Still operates in
range) 2.4GHz band
1 to 2 Mbps
throughput Users Orthogonal Frequency Data rates can be
Division Multiplexing (OFDM) as high as 11 Mbps
Can choose between
frequency hopping or Supports data rates up to 54 Only direct
direct sequence spread Mbps sequence modulation
modulation is specified
Currently no products
available, widely deployed
802.11e HiperLAN/2 Interoperability
Currently under Development led by the 802.11a and
development European Telecommunications 802.11b work on
Standards Institute (ETSI) different frequencies,
Working to improve so little chance for
security issues Operates in the 5 GHz range, interoperability
uses OFDM technology, and
Extensions to MAC support data rates over Can coexist in one
layer, longer keys, and 50Mbps like 802.11a network
key management
systems HiperLAN/2 is not
interoperable with
Adds 128-bit AES 802.11a or 802.11b
encryption
Functionality of Wireless LAN
• Basic Configuration
• WLAN Communication
• WLAN Packet Structure
Basic Configuration
802.11 Communication
• CSMA/CA (Carrier Sense Multiple
Access/Collision Avoidance) instead of
Collision Detection
• WLAN adapter cannot send and receive
traffic at the same time on the same channel
• Hidden Node Problem
• Four-Way Handshake
Hidden Node Problem
Four-Way Handshake
Source Destination
RTS – Req
uest to Sen
d
a r t o Send
TS – C le
C
DATA
ACK
Wireless Application Layers
Application Layers
Basic WLAN Architecture
Secure LAN (SLAN)
• Insertion Attacks
• Interception and monitoring wireless traffic
• Mis-configuration
• Jamming
• Client to Client Attacks
Wireless Securities
• Security Technologies
– Cryptography
– Privacy
– Authentication
– Validation and Digital Hashing
– Digital Signatures
Summary of Wireless Lan
Wireless LAN Wireless WAN
2 Mbps @ 2.4GHz is here 9.6 kbps circuit & packet
128 kbps - 2Mbps packet
Challenges Challenges
• lower equipment cost • build it and they will come?
• higher data rate • build it when they come?
• VSAM advantages
– High performance indexed and direct datasets
– Alternate Index support
– Similar block management for all file types
– MVS uses VSAM intensively eg. Catalogs are VSAM datasets
– Path and upgrade service support
File systems - On Mainframes
Non VSAM Datasets
– Hierarchical Advantages
– Good when resource consumption is more important than flexibility
– Some real life data has natural hierarchy
– Good performance for large stable databases
– Relational Advantages
– Concepts easier to understand
– Simpler programming
– Tabular design
– Concentrate on ‘what not How’
– Simplified data base/Program Maintenance
Batch Processing
• Job, program and task
– A job can be considered as consisting of one or more job steps.
– A job step is nothing but execution of a program
– A program is an executable called a load module.
– A job step internally becomes an MVS task.
• A program written in a high level language or assembly language is
called a source module.
• A source module is translated by a compiler or assembler into an object
module.
• Object modules are linked together by the linkage editor to create a
load module which is in a loadable and executable form.
• Batch jobs are submitted by the users and they are run in batch
address spaces
OLTP
• CICS/ESA
• Customer Information Control System
– DB/DC system
– Transaction Manager
– Terminal/transaction oriented system
– Multi-asking
– Single Address Space architecture
– Multiple program environment
– Controlled user access
– Table-driven
• CICS/ESA Application Development
– CSP, COBOL, PL/1, RPG, Assembler, C etc.
OLTP
• Information Management System (IMS)
– DB/DC System
– Contains IMS/DB and IMS/DC components
– Message oriented
– Multiple address space architecture
– Controlled user access
– Supports hierarchical model of data base design
• IMS address spaces
– IMS control region
– Data language I region (DLI)
– IMS resource lock manager (IRLM)
– Message Processing program Regions (MPP)
– Interactive Fast Path regions (IFP)
– Batch Message Processing regions (BMP)
– Batch Processing Program regions (BPP)
• IMS/ESA application development
• Application Development Facility II (ADF II)
• COBOL, C, PL/1, Pascal, Assembler etc.
TOOLS & UTILITIES
• Tools
– Configuration Management tools
– Debugging tools
– Job Analysis tools
• Utilities
– File Manipulation utilities
– File Comparison utilities
– Search utilities
– Reconciliation utilities
– MQ utilities
– Tape Utilities
CONFIGURATION MANAGEMENT TOOLS
• Purpose of any CM tool
– Facilitate concurrent development
– Standard source promotion process
– Defining appropriate access
– Maintaining previous versions
– Tracking differences in various versions
• CM tools
– Endevor
– CCF Librarian
– Panvalet
DEBUGGING TOOLS
• Purpose of Debugging Tools
• Features of Xpeditor as a debugging tool
– Step by step execution of programs
– GO until
• Break-Point
• Value changes
• End of program
• Xpeditor for Online Programs
• Xpeditor for Batch Programs
• ABEND-AID/FX for Online Programs
• STROBE for Online Programs
FILE MANIPULATION UTILITIES
• Purpose of File manipulation utilities
– Creation/Editing/Deletion of VSAM files
– Mapping of flat files to copybooks
– STARTOOL
Utilities – Cont…
• Comparison Utilities
• Purpose of file comparison utilities:
– Comparison of PDS/it’s members for Retrofit
– Comparison of sequential files for Parallel test result verification
• SuperCE Utility (3;13)
– Options in comparison
• Compare type :
– File: Simplest & fastest
– Line: Default option
– Word: a group of words separated by a blank or a line
delimiter
– Byte: output listing data set consists of a hex printout with
character equivalents listed on the right.
Search utility
• Search Utilities
• Purpose of string search utilities:
– Impact analysis
– Cross reference generation
• Legacy Integration
– MQ integration and Workflow
– CICS based Integration-CTG
• Legacy Modernization
– Web sphere
• Grid Computing
– On Demand Computing
Infosys Sample projects
• AETNA
• AMEX
• RBS
• ….Pl contact them for more info
J2EE Overview
J2EE as End-to-End Architecture
J2EE is End-To-End Solution
N-Tier J2EE Architecture
J2EE Component &
Container Architecture
J2EE Containers and Components
• Containers and Components are key concepts of J2EE
• Components run within containers
• Containers provide host execution environments for the components
J2EE Architecture
Containers and Components
Containers and Components
• Containers do their work invisibly
– No complicated APIs
– They control by interposition
• Containers implement J2EE
– Look similar to components
– Vendors making the containers have great freedom to innovate
.NET Overview
.NET Technical Architecture
Orchestration
Adapters
Enterprise
Security
Biztalk
Services
MSMQ
Biztalk
Component
Component
Component
Component
.NET Framework
CLR
Windows
Patterns, Models, Architectures – http://msdn.microsoft.com/architecture/
.NET Framework
Platform and Tools
VB C++ C# J# …
Operating System
.NET Application Design Patterns
Business Logic & Data Integration
Presentation
Messaging Fabric & Persistence
.NET & Windows ADO.NET
Response
8.
Execute
10b.
Get/Set
Resources
13.
Biz Method Business Remove Disconnected 14.
Request CRUD
Service DataSet &/or Data Query
Data
Facade ObjectSpaces Access Database
<<de-serialize>> 9. 12. Object
IIS & ASP.NET 18. Response Assemble CRUD R MSMQ
Serialized
XML
Data Data Directory
16. Redirect
DataSet VO WS
ASPX
MSMQ
(ASCX) <<creates>> 10c.
Value Object
1. Request Assembler CRUD
ASPX/MX 17. State?
Data
Front Data <<uses>> <<describes>>
10a.
Controller Access
Invoke
4. Dispatch 2. Fill State Proxy
11a. Attributed
XML 3. Validate Get/Set 11b. Disconnected Connection
Action to C# Assembly
XML Remove CRUD DataSet &/or Pooling &
Form & & Serviced
DataSet Data ObjectSpaces Transactions
Forward <<uses>> Component
Mappings VO
Base
Form
5. Get Delegate ASCX Control
Code
Behind 15. Fill State <<uses>> Key Other Infrastructure
6. Execute R
<<supplies>>
Storage Rich
Store
Metadata
Repository
Data
Synch Caching
Execution Process
Management
Session
Management
Scale Out /
Fail over
Leading the Industry Web Services Effort
Gartner Group: “Major Vendor Web Services Platform Influence Magic Quadrant”
2003
Challengers Leaders
Microsoft
IBM
Microsoft .NET 46.5%
BEA IBM WebSphere 19%
Oracle SAP Sun ONE 8.2%
Fujitsu
Sun
HP 44 System Integrators**
CA Novell
Microsoft .NET 58%
Siebel
J2EE 40%
Peoplesoft