
Chapter 1. Transaction management imperatives 21
1.3.2 Architecting e-business application infrastructures
In a typical e-business environment, the application infrastructure consists of
three separate tiers, and the communication between these is restricted, as
Figure 1-6 shows.
Figure 1-6 A typical e-business application infrastructure
The tiers are typically:
Demilitarized Zone The tier accessible by all external users of the applications.
This tier functions as the gatekeeper to the entire system,
and functions such as access control and intrusion
detection are enforced here. The only other part of the
intra-company network that the DMZ can ...