Patterns: Extended Enterprise SOA and Web Services

Book description

Service-oriented architecture (SOA) promotes the ability to communicate with external enterprises. But what are the issues in creating these Extended Enterprise communications? This IBM IBM Redbooks publication addresses these issues for Web services implementations of SOA, using the Patterns for e-business.

The Patterns for e-business are a group of proven, reusable assets that can be used to increase the speed of developing and deploying e-business applications. This book focuses on building Extended Enterprise SOA solutions using WebSphere Application Server V6, WebSphere Partner Gateway V6, the Web services gateway component of WebSphere Application Server Network Deployment V6, and WebSphere Business Integration Server Foundation V5.1.

Part 1 introduces the Patterns for e-business, and describes the patterns and product mappings within this framework for building Extended Enterprise solutions.

Part 2 describes the business scenario used throughout this book, and describes the technologies for implementing an SOA solution.

Part 3 provides a set of Extended Enterprise scenarios that include simple as well as more complex SOA solutions that use an Enterprise Service Bus.

Please note that the additional material referenced in the text is not available from IBM.

Table of contents

  1. Notices
    1. Trademarks
  2. Preface
    1. The team that wrote this redbook
    2. Become a published author
    3. Comments welcome
  3. Part 1: Patterns for e-business and Extended Enterprise
    1. Chapter 1: Welcome to this redbook
      1. An introduction to this document
      2. Patterns for e-business SOA series of redbooks
      3. How to read this redbook
    2. Chapter 2: Introduction to the Patterns for e-business
      1. The Patterns for e-business layered asset model
      2. How to use the Patterns for e-business (1/3)
      3. How to use the Patterns for e-business (2/3)
      4. How to use the Patterns for e-business (3/3)
        1. Selecting a Business, Integration, Composite pattern, or a Custom design
        2. Selecting Application patterns
        3. Review Runtime patterns
        4. Reviewing Product mappings
        5. Reviewing guidelines and related links
      5. Patterns for e-business naming conventions
      6. Summary
    3. Chapter 3: Beyond the enterprise
      1. Overview of Extended Enterprise
      2. On Demand Business
        1. Key business attributes
        2. Key technology attributes
        3. Key requirements for integration flexibility
        4. The on demand Operating Environment
      3. Approaches for delivering the Extended Enterprise (1/5)
      4. Approaches for delivering the Extended Enterprise (2/5)
      5. Approaches for delivering the Extended Enterprise (3/5)
      6. Approaches for delivering the Extended Enterprise (4/5)
      7. Approaches for delivering the Extended Enterprise (5/5)
        1. SOA and Web services
        2. Traditional approaches
        3. Ensuring quality of service
    4. Chapter 4: Extended Enterprise pattern
      1. Using the Extended Enterprise business pattern
      2. General guidelines
        1. Business and IT drivers
        2. Context
        3. Solution
        4. Employing the pattern
        5. What is next?
      3. Extended Enterprise application patterns (1/4)
      4. Extended Enterprise application patterns (2/4)
      5. Extended Enterprise application patterns (3/4)
      6. Extended Enterprise application patterns (4/4)
        1. Exposed Direct Connection application pattern
        2. Exposed Direct Connection: Message Connection variation
        3. Exposed Direct Connection: Call Connection variation
        4. Exposed Broker application pattern
        5. Exposed Broker: Router variation
        6. Exposed Serial Process application pattern
        7. Exposed Serial Process: Workflow variation
    5. Chapter 5: Product descriptions
      1. Runtime product descriptions (1/2)
      2. Runtime product descriptions (2/2)
        1. IBM WebSphere Application Server V6
        2. IBM DB2 Universal Database Enterprise Server Edition V8.2
        3. IBM Cloudscape
        4. IBM WebSphere MQ V5.3
        5. IBM WebSphere Business Integration Message Broker V5.0
        6. IBM WebSphere Business Integration Server Foundation V5.1
        7. IBM WebSphere Partner Gateway V6.0
      3. Development product descriptions
        1. IBM Rational Application Developer V6
        2. IBM WebSphere Studio Application Developer Integration Edition V5.1
    6. Chapter 6: Extended Enterprise runtime patterns
      1. Extended Enterprise runtime patterns
        1. Generic and SOA profiles
      2. Node types (1/2)
      3. Node types (2/2)
        1. App server/services
        2. Network infrastructure
        3. Protocol firewall
        4. Domain firewall
        5. Connector
        6. Exposed Connector
        7. Exposed ESB Gateway
        8. ESB
        9. Rules Directory
        10. Directory and Security Services
        11. Exposed Broker
        12. Exposed Router
        13. Exposed Process Manager
        14. Business Service Choreography
        15. Staff Worklist Adapter
      4. Exposed Direct Connection runtime pattern
        1. Generic profile
        2. SOA profile
      5. Exposed Broker runtime pattern
        1. Generic profile
        2. SOA profile
      6. Exposed Router variation
        1. Generic profile
        2. SOA profile
      7. Exposed Serial Process runtime pattern
        1. Generic profile
        2. SOA profile
      8. Exposed Serial Workflow variation
        1. Generic profile
        2. SOA profile
    7. Chapter 7: Product mappings
      1. Product mappings
      2. Exposed Direct Connection product mapping
        1. Generic profile
        2. SOA profile
      3. Exposed Broker product mapping
        1. Exposed Broker: Generic profile
        2. Exposed Router variation: SOA profile
      4. Exposed Serial Process product mapping
        1. Generic profile
        2. SOA profile
  4. Part 2: Business scenario and guidelines
    1. Chapter 8: Business scenario used in this book
      1. WS-I sample business scenario
      2. ITSO Good sample business scenario
        1. Business context
        2. Applications in the supply chain management
        3. Example of using the ITSO Good sample application
    2. Chapter 9: Technology options
      1. Web services
        1. XSD
        2. WSDL
        3. SOAP
        4. UDDI
        5. WS-BPEL
        6. WS-Security
      2. J2EE
        1. JMS
        2. Web services for J2EE
        3. JAX-RPC
      3. Transport protocols
        1. HTTP
        2. HTTP/S
  5. Part 3: Scenario implementation
    1. Chapter 10: Exposed Direct Connection runtime pattern: generic profile
      1. Business scenario
      2. Design guidelines (1/4)
      3. Design guidelines (2/4)
      4. Design guidelines (3/4)
      5. Design guidelines (4/4)
        1. Analyze business requirements
        2. Selecting a pattern
        3. Analyze design options
        4. Products
      6. Development guidelines (1/8)
      7. Development guidelines (2/8)
      8. Development guidelines (3/8)
      9. Development guidelines (4/8)
      10. Development guidelines (5/8)
      11. Development guidelines (6/8)
      12. Development guidelines (7/8)
      13. Development guidelines (8/8)
        1. Exposed Direct Connection interaction: Generic profile
        2. Securing applications using WS-Security
        3. Generating sample key stores
        4. Configuring WS-Security integrity
        5. Configuring WS-Security confidentiality
        6. Exporting EAR files from Rational Application Developer
      14. Runtime guidelines (1/5)
      15. Runtime guidelines (2/5)
      16. Runtime guidelines (3/5)
      17. Runtime guidelines (4/5)
      18. Runtime guidelines (5/5)
        1. Solution topology
        2. Configuring WebSphere Application Server profiles
        3. Hosting the WSDL files
        4. Installing the applications
        5. Securing the application server using Global Security
        6. Configuring an HTTP server for SSL pass-through
        7. Changing the Web service client bindings configuration
        8. Testing the scenario
        9. Viewing SOAP messages using the TCP/IP Monitor
    2. Chapter 11: Exposed Direct Connection runtime pattern: SOA profile
      1. Business scenario
      2. Design guidelines (1/3)
      3. Design guidelines (2/3)
      4. Design guidelines (3/3)
        1. Analyze IT infrastructure requirements
        2. Selecting a pattern
        3. Analyze design options
        4. Products
      5. Development guidelines
        1. Exposed Direct Connection interaction: SOA profile
      6. Runtime guidelines (1/18)
      7. Runtime guidelines (2/18)
      8. Runtime guidelines (3/18)
      9. Runtime guidelines (4/18)
      10. Runtime guidelines (5/18)
      11. Runtime guidelines (6/18)
      12. Runtime guidelines (7/18)
      13. Runtime guidelines (8/18)
      14. Runtime guidelines (9/18)
      15. Runtime guidelines (10/18)
      16. Runtime guidelines (11/18)
      17. Runtime guidelines (12/18)
      18. Runtime guidelines (13/18)
      19. Runtime guidelines (14/18)
      20. Runtime guidelines (15/18)
      21. Runtime guidelines (16/18)
      22. Runtime guidelines (17/18)
      23. Runtime guidelines (18/18)
        1. Solution topology
        2. Creating the basic infrastructure
        3. Create and configure a service integration bus
        4. Create and configure the Web service gateway
        5. Connecting the ESB and the Exposed ESB Gateway
        6. Adding WS-Security to the Web service gateway
    3. Chapter 12: Exposed Broker runtime pattern: generic profile
      1. Business scenario
      2. Design guidelines
        1. Analyze business requirements
        2. Selecting a pattern
        3. Analyze design options
        4. Products
      3. Development guidelines (1/4)
      4. Development guidelines (2/4)
      5. Development guidelines (3/4)
      6. Development guidelines (4/4)
        1. Scenario implementation: Exposed Broker runtime pattern
        2. Mediations
        3. Developing a mediation handler class
        4. Assigning and exporting the mediation handlers
      7. Runtime guidelines (1/5)
      8. Runtime guidelines (2/5)
      9. Runtime guidelines (3/5)
      10. Runtime guidelines (4/5)
      11. Runtime guidelines (5/5)
        1. Solution topology
        2. Creating the basic infrastructure
        3. Configuring the service integration bus
        4. Creating the gateway service
        5. Installing and defining the mediation application
        6. Creating additional destinations
        7. Changing the Warehouse endpoint URL
        8. Testing the scenario
        9. Adding WS-Security to the solution
    4. Chapter 13: Exposed Router runtime pattern: SOA profile
      1. Business scenario
      2. Design guidelines (1/2)
      3. Design guidelines (2/2)
        1. Analyze business requirements
        2. Selecting a pattern
        3. Analyze design options
        4. Products
      4. Development guidelines
        1. Scenario implementation: Exposed Router SOA profile interaction
      5. Runtime guidelines (1/5)
      6. Runtime guidelines (2/5)
      7. Runtime guidelines (3/5)
      8. Runtime guidelines (4/5)
      9. Runtime guidelines (5/5)
        1. Solution topology
        2. Creating the basic infrastructure
        3. Scenario implementation overview
        4. Configuring WebSphere Partner Gateway
        5. Configuring WebSphere Application Server
        6. Testing the WebSphere Partner Gateway configuration
    5. Chapter 14: Exposed Serial Process runtime pattern: generic profile
      1. Business scenario
      2. Design guidelines
        1. Analyze business requirements
        2. Selecting a pattern
        3. Analyze design options
        4. Products
      3. Development guidelines (1/6)
      4. Development guidelines (2/6)
      5. Development guidelines (3/6)
      6. Development guidelines (4/6)
      7. Development guidelines (5/6)
      8. Development guidelines (6/6)
        1. Scenario implementation: Serial process interaction
        2. Creating the basic infrastructure
        3. Configuring WebSphere Studio
        4. Creating Manufacturer and LoggingFacility Web services clients
        5. Create Java proxy classes
        6. Create a business process using Process Choreographer
        7. Create the Warehouse service
        8. Exporting the Enterprise Application files
      9. Runtime guidelines (1/2)
      10. Runtime guidelines (2/2)
        1. Testing with Web Services Explorer
        2. Testing the business process with ITSO Good
        3. Deploying the business process
    6. Chapter 15: Exposed Serial Process runtime pattern: SOA profile
      1. Business scenario
      2. Design guidelines
        1. Analyze the business requirement
        2. Selecting a pattern
        3. Analyze design options
        4. Products
      3. Development guidelines (1/2)
      4. Development guidelines (2/2)
        1. Scenario implementation: Serial process interaction
        2. Creating the basic infrastructure
        3. Creating a Manufacturer Web service client
        4. Modify the Manufacturer proxy class
        5. Modify the Warehouse business process
        6. Generate deployment code and export the process
      5. Runtime guidelines (1/2)
      6. Runtime guidelines (2/2)
        1. Configuring the ESB
        2. Configuring the Exposed ESB Gateway
        3. Testing the business process with ITSO Good
  6. Part 4: Appendixes
    1. Appendix A: Additional material
      1. Locating the Web material
      2. Using the Web material
      3. System requirements for downloading the Web material
      4. How to use the Web material
    2. Appendix B: Microsoft .NET Web services
      1. Overview and context of .NET Web services
      2. How Microsoft .NET is used in the Redbook scenarios
      3. Microsoft .NET Web service development overview
      4. Implementing a Microsoft .NET Web service
      5. Create a new Web service project
      6. Generating a C# file using a WSDL file and wsdl.exe
      7. Modifying the C# file
      8. Finalizing and deploying the Web service
      9. Testing the .NET Web service
      10. Implementing a test J2EE Client
      11. Creating a new Rational Application Developer project
      12. Importing the necessary WSDLs and XSDs
      13. Deploying and testing the J2EEClient
      14. Enabling transport-level security with SSL
      15. Configuring the .NET Web service to require SSL (1/2)
      16. Configuring the .NET Web service to require SSL (2/2)
      17. Importing the SSL certificate into a key database (1/2)
      18. Importing the SSL certificate into a key database (2/2)
    3. Appendix C: CICS Transaction Server Web services
      1. CICS Transaction Server V3.1 Web services support
      2. Creating Web services for CICS
      3. CICS Web services assistant
      4. CICS resources for Web services
      5. Creating and hosting a ManufacturerC Web service
    4. Appendix D: WSAdmin Automation Platform
      1. Employing WSAdmin Automation Platform
      2. Overview of WSAdmin Automation Platform
      3. Downloading WSAdmin Automation Platform
      4. Running WSAdmin Automation Platform
      5. WSAdmin Automation Platform examples
      6. The You Name It option
  7. Abbreviations and acronyms
  8. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources
    4. How to get IBM Redbooks
    5. Help from IBM
  9. Index (1/3)
  10. Index (2/3)
  11. Index (3/3)
  12. Back cover

Product information

  • Title: Patterns: Extended Enterprise SOA and Web Services
  • Author(s): Martin Keen, Hong Hua Chin, Chidambaram Ganapathi, David Ghazaleh, Pål Krogdahl, Wendy Neave, Mandeep Sahni, Jacob Thorwart
  • Release date: January 2006
  • Publisher(s): IBM Redbooks
  • ISBN: None