Dueling Middleware WAVV 2000, Colorado Springs. Middleware Defined LAN DBMS Web Browser Client Workstation Local Area Network Middleware Web Server S/390.

Slides:



Advertisements
Similar presentations
ICS 434 Advanced Database Systems
Advertisements

Database System Concepts and Architecture
Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
Application Architecture T H E S O C R A T E S G R O U P, I N C.
Technical Architectures
Database Software File Management Systems Database Management Systems.
1 Chapter 2 Database System Concepts and Architecture.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 13 Application Architecture and Modeling.
1 Introduction The Database Environment. 2 Web Links Google General Database Search Database News Access Forums Google Database Books O’Reilly Books Oracle.
Bina Nusantara 13 C H A P T E R APPLICATION ARCHITECTURE AND MODELING.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
13-1 Chapter 13 – Application Architecture and Modeling Objectives: Define an information system’s architecture in terms of the KNOWLEDGE, PROCESSES, and.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
13-1 Chapter 13 - Objectives Define an information system’s architecture in terms of the KNOWLEDGE, PROCESSES, and COMMUNICATION building blocks. Differentiate.
Client-server database systems and ODBC l Client-server architecture and components l More on reliability and security l ODBC standard.
Business Intelligence Dr. Mahdi Esmaeili 1. Technical Infrastructure Evaluation Hardware Network Middleware Database Management Systems Tools and Standards.
Centralized and Client/Server Architecture and Classification of DBMS
DATABASE MANAGEMENT SYSTEMS 2 ANGELITO I. CUNANAN JR.
Charlie Crocker Vice President Farallon Geographics, Inc. An Overview of Internet Mapping Technology.
Client/Server Computing. Information processing is distributed among several workstations and servers on a network, with each function being assigned.
Chapter 3 Database Architectures and the Web Pearson Education © 2009.
Client/Server Architectures
IS 4506 Database Connectivity.  Overview Two and Three-Tier C/S Architecture ASP Database Connection ODBC - Connection to DBMS Overview of transaction.
System Architecture & Hardware Configurations Dr. D. Bilal IS 592 Spring 2005.
PHASE 3: SYSTEMS DESIGN Chapter 7 Data Design.
Database Architectures and the Web
Chapter 12 Designing Distributed and Internet Systems
Systems Analysis & Design
Database System Concepts and Architecture Lecture # 3 22 June 2012 National University of Computer and Emerging Sciences.
1 Chapter 3 Database Architecture and the Web Pearson Education © 2009.
Database Architectures and the Web Session 5
Chapter 2 CIS Sungchul Hong
CSC271 Database Systems Lecture # 4.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
Csi315csi315 Client/Server Models. Client/Server Environment LAN or WAN Server Data Berson, Fig 1.4, p.8 clients network.
CSS/417 Introduction to Database Management Systems Workshop 4.
An application architecture specifies the technologies to be used to implement one or more (and possibly all) information systems in terms of DATA, PROCESS,
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
Mainframe (Host) - Communications - User Interface - Business Logic - DBMS - Operating System - Storage (DB Files) Terminal (Display/Keyboard) Terminal.
Personal Computer - Stand- Alone Database  Database (or files) reside on a PC - on the hard disk.  Applications run on the same PC and directly access.
Database Architectures Database System Architectures Considerations – Data storage: Where do the data and DBMS reside? – Processing: Where.
Introduction to Microsoft Windows 2000 Welcome to Chapter 1 Windows 2000 Server.
1 Database Management Systems (DBMS). 2 Database Management Systems (DBMS) n Overview of: ä Database Management Components ä Database Systems Architecture.
3-Tier Architecture Chandrasekaran Rajagopalan Cs /01/99.
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
Distributed database system
Application Development
JSP Server Integrated with Oracle8i Project2, CMSC691X Summer02 Ching-li Peng Ying Zhang.
WEB SERVER SOFTWARE FEATURE SETS
Integrating the Mainframe Liberating Enterprise Data.
Integrating the Mainframe Liberating Enterprise Data.
Opening the Box and Liberating S/390 Enterprise Data International Sales Meeting, June 1999 Bill Coleman and Peter King.
ViaSQL Technical Overview. Viaserv, Inc. 2 ViaSQL Support for S/390 n Originally a VSE product n OS/390 version released in 1999 n Identical features.
Chapter 2 Database Environment.
Migrating Mainframe Data Liberating Enterprise Data.
Middleware Solutions for VSE and. 2 Middleware products for data access, delivery, and integration. Designed for organizations seeking the combined benefits.
Remote Stored Procedures. n Customer-written CICS application programs n Provides LAN applications with access to CICS resources n Invoked by LAN-based.
Integrating the Mainframe Liberating Enterprise Data.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
ISC321 Database Systems I Chapter 2: Overview of Database Languages and Architectures Fall 2015 Dr. Abdullah Almutairi.
Database Architectures and the Web
Database System Concepts and Architecture
The Client/Server Database Environment
Application Architecture and Modeling
File Operations Access Permissions.
A Network Operating System Edited By Maysoon AlDuwais
The Database Environment
Presentation transcript:

Dueling Middleware WAVV 2000, Colorado Springs

Middleware Defined LAN DBMS Web Browser Client Workstation Local Area Network Middleware Web Server S/390

Significant Investments Hardware Hardware Data Data Applications Applications People People Hardware Hardware Data Data Applications Applications People People

Low-tech Middleware 3270 Emulation 3270 Emulation FTP FTP Screen Scrapers Screen Scrapers Sneaker Net Sneaker Net 3270 Emulation 3270 Emulation FTP FTP Screen Scrapers Screen Scrapers Sneaker Net Sneaker Net

Viaserv Over The Years Liberating Enterprise Data

Solutions Over The Years Client/Server Client/Server Decision Support Decision Support Data Warehousing Data Warehousing Business Intelligence Business Intelligence E-Business E-Business Enterprise Information Portals Enterprise Information Portals Client/Server Client/Server Decision Support Decision Support Data Warehousing Data Warehousing Business Intelligence Business Intelligence E-Business E-Business Enterprise Information Portals Enterprise Information Portals

It Still Comes Down To Basics ODBC and JDBC access to S/390 data and applications ODBC and JDBC access to S/390 data and applications

A Relational Layer RelationalEngine VSAM IMS D

Two Very Different Approaches S/390 RelationalEngine RelationalEngine CICS 1 2 Standalone Engine CICS-Coupled Engine

So What’s Important? Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features

Full DML Support SELECT SELECT INSERT INSERT UPDATE UPDATE DELETE DELETE SELECT SELECT INSERT INSERT UPDATE UPDATE DELETE DELETE

CICS Control of Files VSAM shareoptions are problematic VSAM shareoptions are problematic Robust transaction management Robust transaction management Standard security features Standard security features Concurrency controls Concurrency controls VSAM shareoptions are problematic VSAM shareoptions are problematic Robust transaction management Robust transaction management Standard security features Standard security features Concurrency controls Concurrency controls

Transaction Management Read and write capabilities Read and write capabilities Transaction management Transaction management Long and short transactions Long and short transactions Read and write capabilities Read and write capabilities Transaction management Transaction management Long and short transactions Long and short transactions

Programmatic Access LAN clients access CICS resources LAN clients access CICS resources access any S/390 data store utilize existing business logic special processing CICS clients access LAN resources CICS clients access LAN resources mainframe is central SQL access to LAN-based DBMS utilize newly-evolved business logic data distribution LAN clients access CICS resources LAN clients access CICS resources access any S/390 data store utilize existing business logic special processing CICS clients access LAN resources CICS clients access LAN resources mainframe is central SQL access to LAN-based DBMS utilize newly-evolved business logic data distribution

Data Movement Move data directly into target DBMS Move data directly into target DBMS Bi-directional Bi-directional Ideally, SQL is used to select the data Ideally, SQL is used to select the data Move data directly into target DBMS Move data directly into target DBMS Bi-directional Bi-directional Ideally, SQL is used to select the data Ideally, SQL is used to select the data VSAM DL/I Other Oracle Other SQL Server

Security Workstation-side Workstation-side support for user authentication Server-side Server-side use standard CICS security support SQL GRANT and REVOKE Workstation-side Workstation-side support for user authentication Server-side Server-side use standard CICS security support SQL GRANT and REVOKE

Scalability Multi-user, multi-tasking server Multi-user, multi-tasking server Multiple users serviced by one address space or partition Multiple users serviced by one address space or partition Multi-user, multi-tasking server Multi-user, multi-tasking server Multiple users serviced by one address space or partition Multiple users serviced by one address space or partition

Advanced Features Client-idle timeout Client-idle timeout Data compression Data compression Cross-datasource joins Cross-datasource joins Cursors and dynamic events Cursors and dynamic events Client-idle timeout Client-idle timeout Data compression Data compression Cross-datasource joins Cross-datasource joins Cursors and dynamic events Cursors and dynamic events

So What’s Important? Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features

Liberating Enterprise Data Desktop Access Desktop Access Web Integration Web Integration Data Staging and Movement Data Staging and Movement Multi-tiered Applications Multi-tiered Applications Desktop Access Desktop Access Web Integration Web Integration Data Staging and Movement Data Staging and Movement Multi-tiered Applications Multi-tiered Applications S/390

Liberating Enterprise Data Services Professional

Liberating Enterprise Data