Java CAPS basics : implementing common EAI patterns
著者
書誌事項
Java CAPS basics : implementing common EAI patterns
Prentice Hall, c2008
- : hardcover
大学図書館所蔵 件 / 全1件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Includes bibliographical references (p. 437-443) and index
内容説明・目次
内容説明
Use Java CAPS to Streamline IT Services and Leverage Legacy Applications
Design patterns are a useful tool for streamlining enterprise integration and Web development projects: the mission-critical projects that directly impact your competitiveness. Enterprise Integration Patterns by Gregor Hohpe and Bobby Woolf (Addison-Wesley, 2004) described many of the most useful patterns for enterprise developers. Until recently, however, implementing the patterns in that classic reference required the extensive use of raw Java code. Now there's a better alternative: Using Sun's Java Composite Application Suite (Java CAPS), architects and developers can implement enterprise integration patterns succinctly, elegantly, and completely.
In Java (TM) CAPS Basics, Sun's own Java CAPS experts show how to quickly put these new tools and technologies to work in your real-world enterprise application integration projects. After reviewing the challenges of enterprise integration, they introduce Java CAPS and show how it can simplify the development of today's state-of-the-art "composite" applications. Next, they bridge the gap between abstract pattern languages and practical implementation details. You will learn essential Java CAPS concepts and methods in the context of the patterns you'll actually use for real-world message and system management.
Coverage includes
Comparing approaches to enterprise application integration and finding ways to integrate non-invasively, with fewer changes and lower costs
Mastering the core integration tools provided by Java CAPS: eGate, eInsight, eWays and JMS
Using enterprise integration patterns to improve application reusability, scalability, resilience, security, and manageability
Implementing patterns for message exchange, correlation, infrastructure, routing, construction, transformation, and endpoints
Generating and using cryptographic objects such as X.509 Certificates, PKCS#12, and JKS Keystores
Using advanced techniques such as solution partitioning and subprocess implementation, many of which are covered nowhere else
Constructing two complete example solutions that bring together many of the patterns discussed and illustrated in this book
The companion CD contains detailed illustrations for most of the relevant patterns and two complete Java CAPS-based case studies (with solutions) that implement a number of the patterns discussed in the book. In addition, Part II contains a chapter on cryptographic objects used to configure security-related aspects of the suite. It also provides more than sixty detailed examples designed to illustrate the concepts and patterns presented in this book. Built with JCAPS eDesigner, these graphical, component-based examples can easily be used by business analysts and others with or without strong coding skills.
目次
Preface xiii
Acknowledgments xxv
About the Authors xxvii
SECTION I: PRELIMINARIES 1
Chapter 1: Enterprise Integration Styles 3
1.1 Introduction 3
1.2 File Transfer 3
1.3 Database Sharing 4
1.4 Remote Procedure Invocation 5
1.5 Messaging 6
1.6 Service Orchestration 7
1.7 Centralized versus Distributed 8
1.8 Chapter Summary 11
Chapter 2: Java CAPS Architecture 13
2.1 Introduction 13
2.2 Historical Note 13
2.3 Context 14
2.4 Java CAPS Architecture 16
2.5 Solution Development Stages 20
2.6 Chapter Summary 23
Chapter 3: Project Structure and Deployment 25
3.1 Introduction 25
3.2 From Logical Solution to Physical Deployment 26
3.3 Project Structure Considerations 26
3.4 Backup of Development Artifacts 36
3.5 Release Management 40
3.6 Deployment Architectures 50
3.7 Command-Line Build and Deployment 54
3.8 Chapter Summary 56
SECTION II: PATTERNS REVIEW AND APPLICATION 57
Chapter 4: Message Exchange Patterns 59
4.1 Introduction 59
4.2 Document Message 60
4.3 Command Message 60
4.4 Event Message 61
4.5 Request/Reply 63
4.6 Return Address 76
4.7 Correlation 77
4.8 Message Sequence 77
4.9 Message Expiration 82
4.10 Format Indicator 86
4.11 Data Streaming 88
4.12 Message Security 90
4.13 Chapter Summary 91
Chapter 5: Messaging Infrastructure 93
5.1 Introduction 93
5.2 Java Message Service (JMS) 94
5.3 JMS Implementation Interoperability 95
5.4 Using JMS to Integrate Non-Java Environments 95
5.5 Queues versus Topics 96
5.6 Sun SeeBeyond IQ Manager 97
5.7 Resilient JMS with JMS Grid 119
5.8 Competing Consumers 127
5.9 Point-to-Point Channel 131
5.10 Publish-Subscribe Channel 132
5.11 Datatype Channel 132
5.12 Invalid Message Channel 136
5.13 Dead Letter Channel 136
5.14 Guaranteed Delivery 140
5.15 Channel Adapter 150
5.16 Messaging Bridge 151
5.17 Message Bus 157
5.18 Chapter Summary 158
Chapter 6: Message Routing 161
6.1 Introduction 161
6.2 Overview 161
6.3 Fixed Router 163
6.4 Content-Based Router 165
6.5 Message Filter 168
6.6 Recipient List 169
6.7 Splitter 171
6.8 Aggregator 172
6.9 Resequencer 173
6.10 Composed Message Processor 175
6.11 Scatter-Gather 175
6.12 Routing Slip 176
6.13 Process Manager 177
6.14 Message Broker 177
6.15 Chapter Summary 178
Chapter 7: Message Construction 179
7.1 Introduction 179
7.2 Message 179
7.3 Object Type Definitions 180
7.4 Envelope Wrapper 188
7.5 Chapter Summary 202
Chapter 8: Message Transformation 203
8.1 Introduction 203
8.2 Envelope Wrapper 203
8.3 Content Enricher 203
8.4 Content Filter 204
8.5 Claim Check 205
8.6 Normalizer 206
8.7 Canonical Data Model 207
8.8 Chapter Summary 208
Chapter 9: Messaging Endpoints 209
9.1 Introduction 209
9.2 Messaging Gateway 209
9.3 Transactional Client 210
9.4 Polling Consumer 211
9.5 Event-Driven Consumer 216
9.6 Competing Consumers 217
9.7 Message Dispatcher 218
9.8 Selective Consumer 219
9.9 Durable Subscriber 219
9.10 Idempotent Receiver 220
9.11 Service Activator 223
9.12 Chapter Summary 225
Chapter 10: System Management 227
10.1 Introduction 227
10.2 Java CAPS Monitoring and Management 227
10.3 Solution-Specific Management 317
10.4 Chapter Summary 331
SECTION III: SPECIALIZED JAVA CAPS TOPICS 333
Chapter 11: Message Correlation 335
11.1 Introduction 335
11.2 Overview 336
11.3 JMSCorrelationID 337
11.4 eInsight Correlations 337
11.5 eInsight Correlation Processor: First Cut 338
11.6 Correlation Identifier 343
11.7 eInsight Correlation Processor: Second Cut 344
11.8 Derived Correlation Identifiers 349
11.9 Derived Correlation Identifiers: Alternative 354
11.10 Message Relationship Patterns 357
11.11 eGate Correlation with Dynamic Selectors 366
11.12 Chapter Summary 369
Chapter 12: Reusability 371
12.1 Introduction 371
12.2 Using JMS Request/Reply 371
12.3 Using New Web Service Collaborations 372
12.4 Using eInsight Subprocesses for Reusability 373
12.5 Using eInsight Web Services for Reusability 378
12.6 eInsight Service Process Reusability Note 382
12.7 Chapter Summary 382
Chapter 13: Scalability and Resilience 383
13.1 Introduction 383
13.2 Distributing Components 383
13.3 Exception Handling 388
13.4 Compensation 394
13.5 High-Availability Architecture 395
13.6 Chapter Summary 407
Chapter 14: Security Features 409
14.1 Introduction 409
14.2 HTTP Proxy Server Configuration 409
14.3 HTTP Basic Authentication 410
14.4 Secure Sockets Layer (SSL, TLS) 415
14.5 Secure Batch FTP Variants 433
14.6 Chapter Summary 435
Bibliography 437
Index 445
「Nielsen BookData」 より