List of Figures

 < Day Day Up > 



Chapter 1: Introduction to Patterns for E-Business

Figure 1-1: The Patterns for e-business layered asset model
Figure 1-2: Patterns representing a Custom design
Figure 1-3: Custom design with Self-Service, Information Aggregation, Access Integration and Application Integration
Figure 1-4: Self-Service--Directly Integrated Single Channel
Figure 1-5: Self-Service--Decomposition
Figure 1-6: Directly Integrated Single Channel application pattern--Runtime pattern
Figure 1-7: Directly Integrated Single Channel application pattern--Runtime pattern- Variation 1
Figure 1-8: Directly Integrated Single Channel application pattern- Windows® 2000 Product mapping

Chapter 2: Fundamental Concepts in Process Integration

Figure 2-1: Intra-enterprise integration
Figure 2-2: Inter-enterprise integration
Figure 2-3: Collaboration topologies
Figure 2-4: Definition of interaction
Figure 2-5: Decomposition of complex interactions
Figure 2-6: Decomposition of connectors
Figure 2-7: Relationship between connectors and adapters
Figure 2-8: Coupling adapters
Figure 2-9: Parallel interaction
Figure 2-10: Serial interaction
Figure 2-11: Classification of interactions
Figure 2-12: Classification of Process-focused Application Integration patterns
Figure 2-13: Classification of Extended Enterprise patterns

Chapter 3: Application Integration Pattern

Figure 3-1: Application pattern diagram conventions
Figure 3-2: Direct Connection application pattern
Figure 3-3: Message Connection variation
Figure 3-4: Call Connection variation
Figure 3-5: Broker application pattern
Figure 3-6: Router variation
Figure 3-7: Serial Process application pattern
Figure 3-8: Serial Workflow variation
Figure 3-9: Parallel Process application pattern
Figure 3-10: Parallel Workflow variation

Chapter 4: Extended Enterprise Pattern

Figure 4-1: Extended Enterprise context
Figure 4-2: Application pattern diagram conventions
Figure 4-3: Exposed Direct Connection application pattern
Figure 4-4: Message Connection variation
Figure 4-5: Call Connection variation
Figure 4-6: Exposed Broker application pattern
Figure 4-7: Router variation
Figure 4-8: Exposed Serial Process application pattern

Chapter 5: Runtime Patterns and Product Mappings

Figure 5-1: Broker Runtime pattern
Figure 5-2: Product mapping for Application Integration--Broker
Figure 5-3: Application Integration--Broker- Router variation Runtime pattern
Figure 5-4: Product mapping for Router
Figure 5-5: Exposed Broker Runtime pattern
Figure 5-6: Extended Enterprise--Exposed Broker product mapping
Figure 5-7: Exposed Broker--Router
Figure 5-8: Exposed Broker--Router- Web Services Gateway Product mapping

Chapter 6: Business Scenarios Used in this Book

Figure 6-1: ABC Electronics wholesale ordering process flow
Figure 6-2: ABC Electronics current IT infrastructure
Figure 6-3: ABC Electronics- Stage I and II architecture overview diagram
Figure 6-4: Stage I use case model
Figure 6-5: Stage II use case model
Figure 6-6: ABC Electronics- Stage III and IV architecture overview diagram
Figure 6-7: Stage III use case model
Figure 6-8: Stage IV use case model

Chapter 7: Technology Options

Figure 7-1: The evolving WS-Security roadmap
Figure 7-2: Integrated JMS Provider

Chapter 8: Router Solutions using Web Services Gateway

Figure 8-1: IBM Web Services Gateway
Figure 8-2: WSIF transformation
Figure 8-3: Basic Router implementation
Figure 8-4: Enhanced Router implementation
Figure 8-5: Extended enterprise implementation
Figure 8-6: Extended enterprise implementation
Figure 8-7: Product mapping for Router (using WebSphere Web Services Gateway)
Figure 8-8: Exposed Broker--Router variation Runtime pattern and product mapping
Figure 8-9: Exposed Broker--Router variation Runtime pattern and product mapping
Figure 8-10: Web Services Gateway implementation, stage 1
Figure 8-11: Web Services Gateway implementation, stage 2
Figure 8-12: Web Services Gateway implementation, stage 3
Figure 8-13: Web service development for target application
Figure 8-14: Wholesale application
Figure 8-15: Generated files
Figure 8-16: Register the business
Figure 8-17: Add a technical model
Figure 8-18
Figure 8-19: Create a session bean for the filter
Figure 8-20: Create a session bean for the filter
Figure 8-21: Developing a filter with WebSphere Studio
Figure 8-22: Installing the filter application - panel 3
Figure 8-23: Initial gateway configuration
Figure 8-24: Add a channel
Figure 8-25: Add a UDDI reference
Figure 8-26: Deploying a service - part 1
Figure 8-27: Deploying a service - part 2
Figure 8-28: Service for Wholesale1
Figure 8-29: Service for Wholesale2
Figure 8-30: Two target services for one service
Figure 8-31: Deploy the filter to the gateway
Figure 8-32: Adding a filter to a service
Figure 8-33: View the WSDL
Figure 8-34: Create a WSDL file in WebSphere Studio
Figure 8-35: Web service development for source application
Figure 8-36: Using the Web Service Explorer to test the Web service
Figure 8-37: Generated client binding files and deployment descriptors
Figure 8-38: Renaming the classes
Figure 8-39: Service references for Web services
Figure 8-40: Deploying Web services using the WebSphere administrative console
Figure 8-41: Tracing SOAP messages using TCPMon
Figure 8-42: Tracing SOAP messages using WebSphere Studio TCP/IP Monitor Server
Figure 8-43: WS-Security flow in a non-gateway environment
Figure 8-44: WS-Security flow in a gateway environment
Figure 8-45: Tivoli Performance Viewer
Figure 8-46: Microsoft Network Monitor

Chapter 9: Broker Solutions using WebSphere Business Integration Message Broker

Figure 9-1: WebSphere Business Integration Message Broker architecture
Figure 9-2: Basic Broker implementation
Figure 9-3: Extended enterprise implementation
Figure 9-4: Extended enterprise implementation
Figure 9-5: Product mapping for Application Integration--Broker
Figure 9-6: Exposed Broker Runtime pattern and product mapping
Figure 9-7: Step 2- Passthru message flow
Figure 9-8: Step 2- Passthru message flow
Figure 9-9: Step 2- Passthru message flow
Figure 9-10: Aggregation design
Figure 9-11: Real-time flow design
Figure 9-12: Aggregation design
Figure 9-13: Step 1- direct access to Web service
Figure 9-14: Passthru message flow
Figure 9-15: HTTPInput node properties
Figure 9-16: HttpRequest node properties
Figure 9-17: Add message flows to the broker archive file
Figure 9-18: Deploy the archive
Figure 9-19: Use setEndpoint to point the client to the message flow
Figure 9-20: Use getEndpoint to ensure the endpoint is correct
Figure 9-21: Test the message flow
Figure 9-22: Adding an endpoint to the Web Services Explorer
Figure 9-23: Invoke the Web service using the new end point
Figure 9-24: Overview of the complete Aggregation flow
Figure 9-25: Aggregation message flow - part 1
Figure 9-26: Aggregation message flow - part 2
Figure 9-27: Aggregation message flow - part 3
Figure 9-28: Aggregation message flow - part 4
Figure 9-29: Aggregation message flow - part 5
Figure 9-30: Aggregation message flow - part 6
Figure 9-31: Aggregation message flow - part 7
Figure 9-32: WebSphere bindings for the message-driven bean
Figure 9-33: Real-time message flow
Figure 9-34: Real-timeOptimizedFlow node settings



 < Day Day Up > 



Patterns. Broker Interactions for Intra- and Inter-Enterprise
Patterns. Broker Interactions for Intra- and Inter-Enterprise
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 102

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net