MIDDLEWARE
INTRODUCTION
❖An e-commerce application; being web based application has to be three tiered.
❖ First is user interface layer; responsible for creating interactive, flashy web pages like HTML.
❖Second are Web containers and scripting engines.
❖Third tier is data layer which comprises of DBMS.
❖Automation of back-end and front end operations is effected by middleware.
❖ First connecting, then communicating, integrating distributed systems to external sites, talking between client and server over heterogeneous networks, systems architectures : all this is
facilitated by middleware technologies
❖Middleware technologies offer undercover functions to seamlessly integrate various
applications with instant info to make it accessible across diverse architectures, protocols and networks.
MEANING
➢ A set of common business-unaware services that enable application processes and end users to interact with each other across a network.
➢A software that resides above the network and below the business-aware application software.
➢A software that sits between two or more types of software and translates information between them.
➢Serve to “glue together” separate, often complex and already existing programs.
➢A mechanism that allows one entity (application or database) to communicate with another entity.
➢Facilitates communications between two or more software systems.
➢EXAMPLES: Internet Protocols ( TCP/IP and HTTP) and Network Control Program (CORBA).
DECIDING ON ENTERPRISE MIDDLEWARE
MAIL & COLLABORATION
NETWORK AND SYSTEM MANAGEMENT
SECURITY SOLUTIONS
PAYMENT SOLUTIONS
DBMS
MAIL & COLLABORATION
❑
Takes care of handling the communication and collaboration needs of the user.
❑
high levels of security and system performance to keep employees in touch.
❑
Proprietary Local Email systems : Use of local email systems; messages are addressed to another person in the system by using their actual/user name.
❑
Online Services: A business which provides wide variety of info resources like news, weather, sports etc. like MSN
❑Email via ISP:
A business that provides access to internet and email through local phone line. Like Messenger, Outlook Express.
❑Web based Email:
Websites that provide free email accounts. Example yahoo mail.
NSM
▪
Administration and management of the networks and computer systems in the organisation.
▪Broad subject of managing computer networks.
▪Includes Security, performance and reliability
▪
Includes gathering requirements, purchasing equipment and software, distributing it to where it is to be used, configuring, maintenance & enhancement etc.
▪The department that performs systems management is sometimes called Management
Information Systems.
TRENDS AND ISSUES IN SYSTEMS MANAGEMENT
• Ownership cost
• Right balance of resources and control
• Outsourcing of all or part of Info systems
• Tactical versus strategic purchasing decisions
• Use of graphical user interface
• Security Management
SECURITY SOLUTIONS
➢ Security is an essential part of any transaction that takes place over the internet.
➢Customer will lose his/her faith if security is compromised.
ESSENTIAL REQUIREMENTS FOR SAFE E-PAYMENTS o Confidential
oIntegrity oAvailability oAuthenticity
oNon-Repudiability oEncryption
oAuditability
MEASURES TO ENSURE SECURITY
Sender encrypts the data using secret code
Only specified receiver can decrypt using same or different secret code.
ENCRYPTION
E-signature authenticated through
encryption and password
DIGITAL
SIGNATURE Unique digital id
used to verify identity of an individual website or user.
SECURITY CERTIFICATES
SECURITY PROTOCOLS IN INTERNET
SSL (secure Socket Layer)
Authentication Encryption Integrity
Non-repudiability Example: https
Secure HTTP
Extends the HTTP internet protocol with public key encryption, DS and authentication
Works by negotiating encryption scheme used between client and server
Secure Electronic Transaction
Secure protocol developed by Mastercard and Visa with Digi Wallet software , Merchant software, Payment gateway and Certificate Authority software