SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
MIDDLEWARE 
Presentation By, 
RISHIKESE M.R. 
S7CS-B 
SOE,CUSAT
SPECIAL THANKS TO … 
MY GUIDE :NEETHU S. KUMAR 
OUR CO-ORDIANTOR:Dr. SUDHEEP ELAYIDOM 
2 
School of Engineering,CUSAT
OVERVIEW 
•Introduction 
•What is Middleware 
•History 
•Middleware Application 
•Middleware Architecture 
•Uses Of Middleware 
•Middleware Objectives 
•Middleware in Distributed application 
•Types Of Middleware 
•Conclusion 
•Reference 
3 
School of Engineering,CUSAT
INTRODUCTION 
•Middlewareis computer software that provides services to software applications beyond those available from the operating system. 
•Middleware makes it easier for software developers to perform communication and input/output, so they can focus on the specific purpose of their application. 
•Middleware is the software that connects software components or enterprise applications. 
•Middleware is the software layer that lies between the operating system and the applications on each side of a distributed computer network . 
•Typically, it supports complex, distributed business software applications. 
4 
School of Engineering,CUSAT
WHAT IS MIDDLEWARE ? 
•Layer between OS and distributed applications. 
•Hides complexity and heterogeneity of distributed system . 
•Software that functions as a conversion or translation layer. 
•Bridges gap between low-level OS communications and programming language abstractions. 
•Provides common programming abstraction and infrastructure for distributed applications. 
5 
School of Engineering,CUSAT
HISTORY… 
•Till 1980 most computing was based on central host computers.The term middleware first appeared in the late 1980s to describe network connection management software RPC was first developed circa 1982 by Birrelland Nelson. 
•Early RPC systems that achieved wide use include those by Sun. 
•Then The OMG was formed in 1989, In the late 1990s HTTP became a major building block for various kinds of middleware. 
6 
School of Engineering,CUSAT
MIDDLEWARE APPLICATION 
•Middleware services are sets of distributed software that provide a more functional set of APIs than does the operating system and network services. 
•Locate transparently across the network, providing interaction with another application or service. 
•Be independent from network services. 
•Be reliable and available. 
•Scale up in capacity without losing functionality. 
7 
School of Engineering,CUSAT
MIDDLEWARE ARCHITECTURE 
8 
School of Engineering,CUSAT
USES OF MIDDLEWARE 
•Be reliable and available. 
•Scale –up in capacity without losing function. 
•Middleware reduces application development and maintenance efforts. 
•Middleware provides distributed computing. 
9 
School of Engineering,CUSAT
MIDDLEWARE OBJECTIVES 
•Hide heterogeneity 
•Location independence 
•Common functionality needed by many applications 
•Software portability and mobile code 
•Help integrate legacy facilities 
•Aid application interoperability 
•Aid scalability 
10 
School of Engineering,CUSAT
MIDDLEWARE (DISTRIBUTED APPLICATIONS) 
•Middlewarein the context of distributed applications is software that provides services beyond those provided by the operating system to enable the various components of a distributed system to communicate and manage data. 
•Middleware supports and simplifies complex distributed applications. 
•It includes web servers, application servers, messaging and similar tools that support application development and delivery. 
•Middleware is especially integral to modern information technology based on XML, SOAP, Web services, and service-oriented architecture. 
11 
School of Engineering,CUSAT
TYPES OF MIDDLEWARE 
There are different types of middleware and we are going to discuss about… 
•MESSAGE ORIENTED MIDDLEWARE 
•REMOTE PROCEDURE CALLS 
•OBJECT REQUEST BROKER 
•TRANSACTION PROCESSING MONITORS 
12 
School of Engineering,CUSAT
MOM (MESSAGE ORIENTED MIDDLEWARE) 
•MOM is a client / server infrastructure which allows the application to be distributed over multiple heterogeneous platforms. 
•Reduces complexity of applications spanning operating systems and network protocols by insulating them from un-necessary details. 
•Data is exchanged by message passing and/or message queuing 
•Providing the directory, security, and administrative services required to support messaging. 
13 
School of Engineering,CUSAT
MOM 
14 
School of Engineering,CUSAT
PROPERTIES OF MOM 
Asynchronous interaction 
•Client and server are only loosely coupled 
•Messages are queued 
•Good for application integration 
Support for reliable delivery service 
•Keep queues in persistent storage 
Processing of messages by intermediate message server(s) 
•May do filtering, transforming, logging, … 
•Networks of message servers 
Natural for database integration 
15 
School of Engineering,CUSAT
MOM ADVANTAGES 
●Asynchronous 
●Flexible 
●Portability 
●Interoperability 
●Reduces Complexity 
16 
School of Engineering,CUSAT
DISADVANTAGE OF MOM 
Poor programming abstraction (but has evolved) 
•Rather low-level (cf. Packets) 
•Request/reply more difficult to achieve, but can be done 
Message formats originally unknown to middleware 
•No type checking (JMS addresses this –implementation?) 
Queue abstraction only gives one-to-one communication 
•Limits scalability (JMS pub/sub –implementation?) 
17 
School of Engineering,CUSAT
MOM PRODUCTS 
•IBM WebsphereMQ Series 
•Sonic MQ 
•MS MQ 
•Java Message Queue 
18 
School of Engineering,CUSAT
MOM -ARCHITECTURE 
Database 
Transaction 
J2EE Application 
Middle Layer 
Listener 
Listener 
Message 
Message 
Message 
Message 
Message 
Process C 
Process B 
Process A 
A 
P 
P 
L 
I 
C 
A 
T 
I 
O 
N 
1 
2 
3 
4 
5 
6 
7 
8 
0 
9 
C 
B 
A 
Q1 
Q2 
19 
School of Engineering,CUSAT
RPC (REMOTE PROCEDURE CALL) 
•An inter-process communication. 
•Allows a computer program to cause a subroutine or procedure to execute in another address space without the programmer. 
•Explicitly coding the details for this remote interaction. 
20 
School of Engineering,CUSAT
RPC 
21 
School of Engineering,CUSAT
PROPERTIES OF RPC 
Language-level pattern of function call 
•easy to understand for programmer 
Synchronous request/replyinteraction 
•natural from a programming language point-of-view 
•matches replies to requests 
•built in synchronisation of requests and replies 
Distribution transparency (in the no-failure case) 
•hides the complexity of a distributed system 
Various reliabilityguarantees 
•deals with some distributed systems aspects of failure 
22 
School of Engineering,CUSAT
DISADVANTAGES OF RPC 
Synchronous request/reply interaction 
•tight coupling between client and server 
•client may block for a long time if server loaded 
leads to multi-threaded programming at client 
•slow/failed clients may delay servers when replying 
multi-threading essential at servers 
Distribution Transparency 
•Not possible to mask all problems 
RPC paradigm is not object-oriented 
•invoke functions on servers as opposed to methods on objects 
23 
School of Engineering,CUSAT
ORB (OBJECT REQUEST BROKER) 
•Middleware infrastructure that support the development of distributed object-oriented applications . 
•CORBA (Common Object Request Broker Architecture) is the most common example . 
•Distributed Component Object Model (DCOM) and COM+ specific to Microsoft is another example 24 
School of Engineering,CUSAT
ORB 
Client Application 
Remote Service 
(Object) 
ORB 
Locate service 
Activate service 
communicate 
Establish 
connection 
25 
School of Engineering,CUSAT
ADVANTAGES OF ORB 
•vendor-neutral and open standard. 
•portable. 
•wide variety of implementations. 
•hardware platforms, operating systems and languages. 
•takes the grunt work out of distributed programming. 
26 
School of Engineering,CUSAT
DISADVANTAGES OF ORB 
Specified by consensus and compromise. 
No reference implementation. 
Not perfect. 
27 
School of Engineering,CUSAT
TRANSACTION PROCESSING MONITORS 
•For long the dominant form of middleware. 
•Main goal is to support execution of distributed transactions. 
•Is a set of information which process the data transaction in database system. 
28 
School of Engineering,CUSAT
TRANSACTION PROCESSING MONITOR 
Database 
Processing 
Routines 
Client 
Client 
Client 
Client 
Client 
Transaction 
Processing 
Monitor 
29 
School of Engineering,CUSAT
TPMONITORS 
•TP monitors initially developed as multithreaded servers to support large numbers of terminals from a single process. 
•Provide infrastructure for building and administering complex transaction processing systems with a large number of clients and multiple servers. 
•Some commercial TP monitors: CICS from IBM, Pathway from Tandem, Top End from NCR, and Encinafrom Transarc 
30 
School of Engineering,CUSAT
COMMON SERVICES PROVIDED BY TPMONITORS 
•Presentation facilities to simplify creating user interfaces 
•Persistent queuing of client requests and server responses 
•Routing of client messages to servers 
•Coordination of two-phase commit when transactions access multiple servers. 
31 
School of Engineering,CUSAT
CONCLUSION 
●Middleware is connectivity software . 
●Consists of a set of enabling services. 
•Middleware is independent of network services. 
●Allow multiple processes running on one or more machines to interact with each other. 
●Middleware services are sets of distributed software. 
●Middleware is an important abstraction for building distributed systems. 
32 
School of Engineering,CUSAT
REFERNCE 
•www.google.comimages 
•Slideshare.com 
•Wikipedia 
•http://www.chetanasprojects.com/Thread-MIDDLEWARE- TECHNOLOGY-Seminar 
•http://seminarprojects.com/Thread-middleware-technologies 
•http://eprints.ucl.ac.uk/674/1/corba 
•http://www.swing-grid.ch/resources/middleware_tools 
33 
School of Engineering,CUSAT
QUESTIONS ??? 
34 
School of Engineering,CUSAT
THANK YOUYOU

Contenu connexe

Tendances

Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systemsSHATHAN
 
Distributed Operating System,Network OS and Middle-ware.??
Distributed Operating System,Network OS and Middle-ware.??Distributed Operating System,Network OS and Middle-ware.??
Distributed Operating System,Network OS and Middle-ware.??Abdul Aslam
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dosvanamali_vanu
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating SystemsDr Sandeep Kumar Poonia
 
Group Communication (Distributed computing)
Group Communication (Distributed computing)Group Communication (Distributed computing)
Group Communication (Distributed computing)Sri Prasanna
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented CommunicationDilum Bandara
 
Unit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsUnit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsNandakumar P
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource ManagementNASIRSAYYED4
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency ModelRajat Kumar
 
Federated Cloud Computing - The OpenNebula Experience v1.0s
Federated Cloud Computing  - The OpenNebula Experience v1.0sFederated Cloud Computing  - The OpenNebula Experience v1.0s
Federated Cloud Computing - The OpenNebula Experience v1.0sIgnacio M. Llorente
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architectureYisal Khan
 
File replication
File replicationFile replication
File replicationKlawal13
 

Tendances (20)

Distributed Mutual exclusion algorithms
Distributed Mutual exclusion algorithmsDistributed Mutual exclusion algorithms
Distributed Mutual exclusion algorithms
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systems
 
Distributed Operating System,Network OS and Middle-ware.??
Distributed Operating System,Network OS and Middle-ware.??Distributed Operating System,Network OS and Middle-ware.??
Distributed Operating System,Network OS and Middle-ware.??
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dos
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
Group Communication (Distributed computing)
Group Communication (Distributed computing)Group Communication (Distributed computing)
Group Communication (Distributed computing)
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
 
Stream oriented communication
Stream oriented communicationStream oriented communication
Stream oriented communication
 
Unit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsUnit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed Systems
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
 
Distributed Operating System_4
Distributed Operating System_4Distributed Operating System_4
Distributed Operating System_4
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency Model
 
11. dfs
11. dfs11. dfs
11. dfs
 
Federated Cloud Computing - The OpenNebula Experience v1.0s
Federated Cloud Computing  - The OpenNebula Experience v1.0sFederated Cloud Computing  - The OpenNebula Experience v1.0s
Federated Cloud Computing - The OpenNebula Experience v1.0s
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architecture
 
File replication
File replicationFile replication
File replication
 

En vedette

Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocolselvakumar_b1985
 
Kovair Omnibus Integration with Multi Vendor Tools
Kovair Omnibus Integration with Multi Vendor ToolsKovair Omnibus Integration with Multi Vendor Tools
Kovair Omnibus Integration with Multi Vendor ToolsKovair
 
WebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development TrainingWebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development TrainingVijaya Raghava Vuligundam
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system modelHarshad Umredkar
 
Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit INANDINI SHARMA
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 

En vedette (7)

Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Kovair Omnibus Integration with Multi Vendor Tools
Kovair Omnibus Integration with Multi Vendor ToolsKovair Omnibus Integration with Multi Vendor Tools
Kovair Omnibus Integration with Multi Vendor Tools
 
WebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development TrainingWebSphere Message Broker Application Development Training
WebSphere Message Broker Application Development Training
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
 
Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit I
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 

Similaire à Middleware and Middleware in distributed application

Campus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptxCampus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptxmdshoaghossain
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Manish tripathi-e-commerce-middleware
Manish tripathi-e-commerce-middlewareManish tripathi-e-commerce-middleware
Manish tripathi-e-commerce-middlewareA P
 
Client server architecture
Client server architectureClient server architecture
Client server architectureRituBhargava7
 
Comparison of Current Service Mesh Architectures
Comparison of Current Service Mesh ArchitecturesComparison of Current Service Mesh Architectures
Comparison of Current Service Mesh ArchitecturesMirantis
 
Developing Enterprise Applications for the Cloud, from Monolith to Microservices
Developing Enterprise Applications for the Cloud,from Monolith to MicroservicesDeveloping Enterprise Applications for the Cloud,from Monolith to Microservices
Developing Enterprise Applications for the Cloud, from Monolith to MicroservicesDavid Currie
 
Developing Enterprise Applications for the Cloud, from Monolith to Microservice
Developing Enterprise Applications for the Cloud, from Monolith to MicroserviceDeveloping Enterprise Applications for the Cloud, from Monolith to Microservice
Developing Enterprise Applications for the Cloud, from Monolith to MicroserviceJack-Junjie Cai
 
MicroserviceArchitecture in detail over Monolith.
MicroserviceArchitecture in detail over Monolith.MicroserviceArchitecture in detail over Monolith.
MicroserviceArchitecture in detail over Monolith.PLovababu
 
Lect 1 Distributed System.pptx
Lect 1 Distributed System.pptxLect 1 Distributed System.pptx
Lect 1 Distributed System.pptxPardonSamson
 
The Overview of Microservices Architecture
The Overview of Microservices ArchitectureThe Overview of Microservices Architecture
The Overview of Microservices ArchitectureParia Heidari
 
Microservices in Action
Microservices in ActionMicroservices in Action
Microservices in ActionBhagwat Kumar
 
Serverless microservices
Serverless microservicesServerless microservices
Serverless microservicesLalit Kale
 
Software Architecture for Cloud Infrastructure
Software Architecture for Cloud InfrastructureSoftware Architecture for Cloud Infrastructure
Software Architecture for Cloud InfrastructureTapio Rautonen
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to MicroservicesMahmoudZidan41
 

Similaire à Middleware and Middleware in distributed application (20)

Campus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptxCampus Network Design Presentaion.pptx
Campus Network Design Presentaion.pptx
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Manish tripathi-e-commerce-middleware
Manish tripathi-e-commerce-middlewareManish tripathi-e-commerce-middleware
Manish tripathi-e-commerce-middleware
 
Microservices Architecture
Microservices ArchitectureMicroservices Architecture
Microservices Architecture
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Comparison of Current Service Mesh Architectures
Comparison of Current Service Mesh ArchitecturesComparison of Current Service Mesh Architectures
Comparison of Current Service Mesh Architectures
 
Developing Enterprise Applications for the Cloud, from Monolith to Microservices
Developing Enterprise Applications for the Cloud,from Monolith to MicroservicesDeveloping Enterprise Applications for the Cloud,from Monolith to Microservices
Developing Enterprise Applications for the Cloud, from Monolith to Microservices
 
Developing Enterprise Applications for the Cloud, from Monolith to Microservice
Developing Enterprise Applications for the Cloud, from Monolith to MicroserviceDeveloping Enterprise Applications for the Cloud, from Monolith to Microservice
Developing Enterprise Applications for the Cloud, from Monolith to Microservice
 
MicroserviceArchitecture in detail over Monolith.
MicroserviceArchitecture in detail over Monolith.MicroserviceArchitecture in detail over Monolith.
MicroserviceArchitecture in detail over Monolith.
 
Lect 1 Distributed System.pptx
Lect 1 Distributed System.pptxLect 1 Distributed System.pptx
Lect 1 Distributed System.pptx
 
381101843.pptx
381101843.pptx381101843.pptx
381101843.pptx
 
The Overview of Microservices Architecture
The Overview of Microservices ArchitectureThe Overview of Microservices Architecture
The Overview of Microservices Architecture
 
Technical Architectures
Technical ArchitecturesTechnical Architectures
Technical Architectures
 
Distributed architecture (SAD)
Distributed architecture (SAD)Distributed architecture (SAD)
Distributed architecture (SAD)
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
Microservices
MicroservicesMicroservices
Microservices
 
Microservices in Action
Microservices in ActionMicroservices in Action
Microservices in Action
 
Serverless microservices
Serverless microservicesServerless microservices
Serverless microservices
 
Software Architecture for Cloud Infrastructure
Software Architecture for Cloud InfrastructureSoftware Architecture for Cloud Infrastructure
Software Architecture for Cloud Infrastructure
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 

Plus de Rishikese MR

Natural Language Processing
Natural Language ProcessingNatural Language Processing
Natural Language ProcessingRishikese MR
 
Crowd Sourcing With Smart Phone
Crowd Sourcing With Smart PhoneCrowd Sourcing With Smart Phone
Crowd Sourcing With Smart PhoneRishikese MR
 
The No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra ModelThe No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra ModelRishikese MR
 
Automatic 2D to 3D Video Conversion For 3DTV's
 Automatic 2D to 3D Video Conversion For 3DTV's Automatic 2D to 3D Video Conversion For 3DTV's
Automatic 2D to 3D Video Conversion For 3DTV'sRishikese MR
 
EMOTION BASED COMPUTING
EMOTION BASED COMPUTINGEMOTION BASED COMPUTING
EMOTION BASED COMPUTINGRishikese MR
 
BITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USESBITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USESRishikese MR
 
3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGERishikese MR
 
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.Rishikese MR
 
Google Glass and its Features
Google Glass and its FeaturesGoogle Glass and its Features
Google Glass and its FeaturesRishikese MR
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud ComputingRishikese MR
 
Artificial intelligence in gaming.
Artificial intelligence in gaming.Artificial intelligence in gaming.
Artificial intelligence in gaming.Rishikese MR
 
A seminar on neo4 j
A seminar on neo4 jA seminar on neo4 j
A seminar on neo4 jRishikese MR
 

Plus de Rishikese MR (19)

1 2 3 4 5 g
1 2 3 4 5 g1 2 3 4 5 g
1 2 3 4 5 g
 
Natural Language Processing
Natural Language ProcessingNatural Language Processing
Natural Language Processing
 
Fuzzy Logic
Fuzzy LogicFuzzy Logic
Fuzzy Logic
 
Crowd Sourcing With Smart Phone
Crowd Sourcing With Smart PhoneCrowd Sourcing With Smart Phone
Crowd Sourcing With Smart Phone
 
BLUE BRAIN
BLUE BRAINBLUE BRAIN
BLUE BRAIN
 
The No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra ModelThe No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra Model
 
CYBORG
CYBORG CYBORG
CYBORG
 
DATA WAREHOUSING
DATA WAREHOUSINGDATA WAREHOUSING
DATA WAREHOUSING
 
Automatic 2D to 3D Video Conversion For 3DTV's
 Automatic 2D to 3D Video Conversion For 3DTV's Automatic 2D to 3D Video Conversion For 3DTV's
Automatic 2D to 3D Video Conversion For 3DTV's
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
EMOTION BASED COMPUTING
EMOTION BASED COMPUTINGEMOTION BASED COMPUTING
EMOTION BASED COMPUTING
 
BITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USESBITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USES
 
3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE
 
OUTERNET
OUTERNETOUTERNET
OUTERNET
 
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.
 
Google Glass and its Features
Google Glass and its FeaturesGoogle Glass and its Features
Google Glass and its Features
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Artificial intelligence in gaming.
Artificial intelligence in gaming.Artificial intelligence in gaming.
Artificial intelligence in gaming.
 
A seminar on neo4 j
A seminar on neo4 jA seminar on neo4 j
A seminar on neo4 j
 

Dernier

LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456KiaraTiradoMicha
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyAnusha Are
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Dernier (20)

LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

Middleware and Middleware in distributed application

  • 1. MIDDLEWARE Presentation By, RISHIKESE M.R. S7CS-B SOE,CUSAT
  • 2. SPECIAL THANKS TO … MY GUIDE :NEETHU S. KUMAR OUR CO-ORDIANTOR:Dr. SUDHEEP ELAYIDOM 2 School of Engineering,CUSAT
  • 3. OVERVIEW •Introduction •What is Middleware •History •Middleware Application •Middleware Architecture •Uses Of Middleware •Middleware Objectives •Middleware in Distributed application •Types Of Middleware •Conclusion •Reference 3 School of Engineering,CUSAT
  • 4. INTRODUCTION •Middlewareis computer software that provides services to software applications beyond those available from the operating system. •Middleware makes it easier for software developers to perform communication and input/output, so they can focus on the specific purpose of their application. •Middleware is the software that connects software components or enterprise applications. •Middleware is the software layer that lies between the operating system and the applications on each side of a distributed computer network . •Typically, it supports complex, distributed business software applications. 4 School of Engineering,CUSAT
  • 5. WHAT IS MIDDLEWARE ? •Layer between OS and distributed applications. •Hides complexity and heterogeneity of distributed system . •Software that functions as a conversion or translation layer. •Bridges gap between low-level OS communications and programming language abstractions. •Provides common programming abstraction and infrastructure for distributed applications. 5 School of Engineering,CUSAT
  • 6. HISTORY… •Till 1980 most computing was based on central host computers.The term middleware first appeared in the late 1980s to describe network connection management software RPC was first developed circa 1982 by Birrelland Nelson. •Early RPC systems that achieved wide use include those by Sun. •Then The OMG was formed in 1989, In the late 1990s HTTP became a major building block for various kinds of middleware. 6 School of Engineering,CUSAT
  • 7. MIDDLEWARE APPLICATION •Middleware services are sets of distributed software that provide a more functional set of APIs than does the operating system and network services. •Locate transparently across the network, providing interaction with another application or service. •Be independent from network services. •Be reliable and available. •Scale up in capacity without losing functionality. 7 School of Engineering,CUSAT
  • 8. MIDDLEWARE ARCHITECTURE 8 School of Engineering,CUSAT
  • 9. USES OF MIDDLEWARE •Be reliable and available. •Scale –up in capacity without losing function. •Middleware reduces application development and maintenance efforts. •Middleware provides distributed computing. 9 School of Engineering,CUSAT
  • 10. MIDDLEWARE OBJECTIVES •Hide heterogeneity •Location independence •Common functionality needed by many applications •Software portability and mobile code •Help integrate legacy facilities •Aid application interoperability •Aid scalability 10 School of Engineering,CUSAT
  • 11. MIDDLEWARE (DISTRIBUTED APPLICATIONS) •Middlewarein the context of distributed applications is software that provides services beyond those provided by the operating system to enable the various components of a distributed system to communicate and manage data. •Middleware supports and simplifies complex distributed applications. •It includes web servers, application servers, messaging and similar tools that support application development and delivery. •Middleware is especially integral to modern information technology based on XML, SOAP, Web services, and service-oriented architecture. 11 School of Engineering,CUSAT
  • 12. TYPES OF MIDDLEWARE There are different types of middleware and we are going to discuss about… •MESSAGE ORIENTED MIDDLEWARE •REMOTE PROCEDURE CALLS •OBJECT REQUEST BROKER •TRANSACTION PROCESSING MONITORS 12 School of Engineering,CUSAT
  • 13. MOM (MESSAGE ORIENTED MIDDLEWARE) •MOM is a client / server infrastructure which allows the application to be distributed over multiple heterogeneous platforms. •Reduces complexity of applications spanning operating systems and network protocols by insulating them from un-necessary details. •Data is exchanged by message passing and/or message queuing •Providing the directory, security, and administrative services required to support messaging. 13 School of Engineering,CUSAT
  • 14. MOM 14 School of Engineering,CUSAT
  • 15. PROPERTIES OF MOM Asynchronous interaction •Client and server are only loosely coupled •Messages are queued •Good for application integration Support for reliable delivery service •Keep queues in persistent storage Processing of messages by intermediate message server(s) •May do filtering, transforming, logging, … •Networks of message servers Natural for database integration 15 School of Engineering,CUSAT
  • 16. MOM ADVANTAGES ●Asynchronous ●Flexible ●Portability ●Interoperability ●Reduces Complexity 16 School of Engineering,CUSAT
  • 17. DISADVANTAGE OF MOM Poor programming abstraction (but has evolved) •Rather low-level (cf. Packets) •Request/reply more difficult to achieve, but can be done Message formats originally unknown to middleware •No type checking (JMS addresses this –implementation?) Queue abstraction only gives one-to-one communication •Limits scalability (JMS pub/sub –implementation?) 17 School of Engineering,CUSAT
  • 18. MOM PRODUCTS •IBM WebsphereMQ Series •Sonic MQ •MS MQ •Java Message Queue 18 School of Engineering,CUSAT
  • 19. MOM -ARCHITECTURE Database Transaction J2EE Application Middle Layer Listener Listener Message Message Message Message Message Process C Process B Process A A P P L I C A T I O N 1 2 3 4 5 6 7 8 0 9 C B A Q1 Q2 19 School of Engineering,CUSAT
  • 20. RPC (REMOTE PROCEDURE CALL) •An inter-process communication. •Allows a computer program to cause a subroutine or procedure to execute in another address space without the programmer. •Explicitly coding the details for this remote interaction. 20 School of Engineering,CUSAT
  • 21. RPC 21 School of Engineering,CUSAT
  • 22. PROPERTIES OF RPC Language-level pattern of function call •easy to understand for programmer Synchronous request/replyinteraction •natural from a programming language point-of-view •matches replies to requests •built in synchronisation of requests and replies Distribution transparency (in the no-failure case) •hides the complexity of a distributed system Various reliabilityguarantees •deals with some distributed systems aspects of failure 22 School of Engineering,CUSAT
  • 23. DISADVANTAGES OF RPC Synchronous request/reply interaction •tight coupling between client and server •client may block for a long time if server loaded leads to multi-threaded programming at client •slow/failed clients may delay servers when replying multi-threading essential at servers Distribution Transparency •Not possible to mask all problems RPC paradigm is not object-oriented •invoke functions on servers as opposed to methods on objects 23 School of Engineering,CUSAT
  • 24. ORB (OBJECT REQUEST BROKER) •Middleware infrastructure that support the development of distributed object-oriented applications . •CORBA (Common Object Request Broker Architecture) is the most common example . •Distributed Component Object Model (DCOM) and COM+ specific to Microsoft is another example 24 School of Engineering,CUSAT
  • 25. ORB Client Application Remote Service (Object) ORB Locate service Activate service communicate Establish connection 25 School of Engineering,CUSAT
  • 26. ADVANTAGES OF ORB •vendor-neutral and open standard. •portable. •wide variety of implementations. •hardware platforms, operating systems and languages. •takes the grunt work out of distributed programming. 26 School of Engineering,CUSAT
  • 27. DISADVANTAGES OF ORB Specified by consensus and compromise. No reference implementation. Not perfect. 27 School of Engineering,CUSAT
  • 28. TRANSACTION PROCESSING MONITORS •For long the dominant form of middleware. •Main goal is to support execution of distributed transactions. •Is a set of information which process the data transaction in database system. 28 School of Engineering,CUSAT
  • 29. TRANSACTION PROCESSING MONITOR Database Processing Routines Client Client Client Client Client Transaction Processing Monitor 29 School of Engineering,CUSAT
  • 30. TPMONITORS •TP monitors initially developed as multithreaded servers to support large numbers of terminals from a single process. •Provide infrastructure for building and administering complex transaction processing systems with a large number of clients and multiple servers. •Some commercial TP monitors: CICS from IBM, Pathway from Tandem, Top End from NCR, and Encinafrom Transarc 30 School of Engineering,CUSAT
  • 31. COMMON SERVICES PROVIDED BY TPMONITORS •Presentation facilities to simplify creating user interfaces •Persistent queuing of client requests and server responses •Routing of client messages to servers •Coordination of two-phase commit when transactions access multiple servers. 31 School of Engineering,CUSAT
  • 32. CONCLUSION ●Middleware is connectivity software . ●Consists of a set of enabling services. •Middleware is independent of network services. ●Allow multiple processes running on one or more machines to interact with each other. ●Middleware services are sets of distributed software. ●Middleware is an important abstraction for building distributed systems. 32 School of Engineering,CUSAT
  • 33. REFERNCE •www.google.comimages •Slideshare.com •Wikipedia •http://www.chetanasprojects.com/Thread-MIDDLEWARE- TECHNOLOGY-Seminar •http://seminarprojects.com/Thread-middleware-technologies •http://eprints.ucl.ac.uk/674/1/corba •http://www.swing-grid.ch/resources/middleware_tools 33 School of Engineering,CUSAT
  • 34. QUESTIONS ??? 34 School of Engineering,CUSAT