Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Name:

Course:
Institute:
Instructor:
TASK 1:
Enterprise JavaBeans:
Enterprise JavaBeans is a mostly-used technology that objectives at helping disbursed
component-primarily based packages written in Java. One of the important thing functions of
the Enterprise JavaBeans structure is the support of declarative disbursed transactions,
without requiring specific coding. Offerings consist of the transaction, naming, and staying
power support. Transaction support An EJB box needs to support transactions. EJB specs
offer a method of transaction control known as declarative transaction control.

EJB model services:


1. EJB provides Life Cycle Management: - JRun is a software server that works for
constructing and deploying server-aspect Java applications.
- It routinely will increase and decreases the quantity of to be had to bean times so that there
isn't always plenty of load at the modern-day server.
2. Security service provided by EJB: - EJB guides authentication and role-pushed get entry
to manipulate for this reason imparting security.
3. Session Management in EJB service: - The Server JRun continues state for stateful
consultation beans and entity beans. - Passivation and activation call back methods are
maintained by session beams, at the same time as for the entity bean
4. EJB model provides Transaction: - EJB offers 2 sorts of transactions:
1. Container-controlled transactions
2. Bean-controlled transactions
EJB limitation:
The no file I/O is a safety concern. By loading documents the use of Class.getResource() and
bundling non-EJB configure documents with EJB-jar.
2. While mapping a CMP bean with SQL Server database, an attribute of float kind want to
be mapped with database column of kind FLOAT only,
3. A multi-column table primary key and one or more foreign keys which share any person of
the primary key columns, then the foreign keys need to incorporate columns which aren't of
number one key or precisely the equal number one key column.
4. While the use of root-leaf technique with the purpose to map inheritance, the foreign-key
constraints are to be eliminated from the database for keeping off referential integrity-
associated issues. The identical system is to be accompanied at the same time as the use of
secondary maps with more than one table
5. EJBs do not from analyzing or write documents thru the local file system. The EJB
Specification simply says that document operations are “now no longer properly proper” to
enterprise records processing.
6. Materialized query table mapping is not supported by The EJB to relational database
mapping tools
QUESTION 2:
In this architecture for the given scenario of a bank system in which they have decided to
introduce more branches and receive monthly transaction reports in a head office which is
located in Muscat the different layers of the distributed system are formed by implementing
client tier or user layer which in turn queries the server (database) for the data. Then a
presentation layer or web tier provides configuration and control services flow for the client.
The web tier or presentation layer contains a Web Application Manager, a distribution server,
and an instance of a distribution server. Further business logic or business tier based on no. of
component, application Server such JavaEE like EJB. Provide business functionality,
increasing using SOA and Micro-services. The business tier provides business services like
ordering, inventory management, and billing it moves data between layer and work as a
backbone of architecture Data accessing layer or information system tier encapsulates
commercial enterprise common sense similarly, to the remote presentation layer and
commercial enterprise logic layer to similarly assure the protection of the system
TASK 2:
QUESTION 3:
"On Some Critical Issues in Component Selection in Component-based Software
Development"
Developing a component-primarily based application (CBA) is not a theoretical idealism,
however turning into possible because of the integrated high-satisfactory of numerous off-
the-shelf component products, monetary pressures, and massive quantity of present software
program components because of the advantages it provides, like decreased improvement fee
and much less time-to-market. Moreover, the pleasantness of the product additionally
increases. An aspect is broadly speaking decided on primarily based totally on the capability
it provides, in conjunction with different vital elements which include the cost of pleasant
attributes like maintainability, capability, security, fee, etc.
Most software program corporations have extended their inclination in the direction of the
CBSD or component-based distribute system because of the blessings it provides, like
decreased improvement value and much less time-to-market. Moreover, the excellent of the
product also increases.
An issue is more often than not decided on primarily based totally on the capability it
provides, alongside different essential factors along with the cost of excellent attributes like
capability, security, value, maintainability, etc. There are many potential
Candidate additives that offer identical capability as preferred with the aid of using the target
software for which the software program is to be developed. The maximum critical venture
for the developers/ integrators is to pick the exceptional matching issue from the COTS
library which satisfies all of the practical requirements, without compromising at the
excellence of the general product and minimal value.

In a research article, the researcher has proposed a combined selection approach forCOTS
components primarily based totally on different n at two levels, viz. Local-level and most
important global level. At the local level, all the Individual choice or selection processes of
different business areas are Located, under the supervision of the process at the global level,
and at the global level, the combined selection process takes place, which results in the
selection of the best combination of the COTS. Another researcher has proposed tree step
Win-Win Spiral
Model, which uses approaches of risk-driven for identifying risk firstly, Then to examine risk
and finally resolve the risk in an iterative process of evaluation.WinWin follows the lowing
iterative steps:
a. Identify the stakeholders and their win conditions.
b. win conditions reconciling and establishing objectives next level
Options and constraints
c. product Evaluation and process alternatives and solving of risk
d. Define next level of product and process, including partitions.
e. authenticate
f. Reconsideration
Both the customer and the developers are benefited and are In a win-win
situation, in the sense that the customer wins by getting a product that
fulfills the majority of his requirements the developer wins by working to
realistic and achievable Budgets and deadlines.
Another researcher has proposed a fuzzy set Theory base, where decision-makers assist
selection from a finite number of options whilst there is greater than one target and each
qualitative and quantitative element must be considered.

QUESTION 4:
As the time flies it will become more understanding that the software program's extensive
structures have become extra complicated and large which results in improve productivity,
lessened cost, and enhanced quality by reusing formerly developed components. Due to those
improvements in monetary considerations, there may be a bent toward additives primarily
based on software program improvement, and research display that these days such structures
improvement is exceeding 40% of the full evolved software program structures
The component choice for desired software needs to be made
keeping in thought first-rate for stakeholders' expectations.
The quality of a system relies upon the useful and non-functional traits of the system, which
tend to vary from one system to other. Therefore, it is integral to
develop an aspect choice framework that:
a. Automate the element choice process.
b. Optimize the thing determination process.
c. Be scaled up for giant systems which are necessary for component selection.
d. Be understood and carried out easily. User-friendly software has always been chosen on
priorities.
e. Employ genuine strategies for component selection is required for a new component
selection.
f. Address the construct versus purchase issue if occurs during a framework selection and
implementation.
g. Select aspects maintained after forming a framework of component implication.
CONCLUSION:
Among many of the toughest duties in component-based software engineering (CBSE)
component selection or choice is one of the toughest tasks. It is tough to discover the most
appropriate element choice. CBSE is a most desirable technique which is used to increase a
software program device from pre-present software program additives. Crucial position in
CBSE is performed in appropriate software program element choice. Many techniques have
been recommended to clear up element choice problems. By enhancing the incorporate
element choice framework the elasticity metric in this paper is executed in the selection of
choice framework. Pliability is a versatile degree that assesses software programs best in
phrases of its additives best. The validation of this proposed answer is executed via
accumulating a pattern of folks who solved a digital questionnaire composed of 20 questions.
The questionnaire is shipped via social sites which include Twitter, Facebook, and emails.
The result of the validation confirmed that the use of the incorporated element choice
framework with pliability metric is appropriate for element choice.
References:
Cecchet, E., Marguerite, J., & Zwaenepoel, W. (2002). Performance and scalability of EJB
applications. ACM Sigplan Notices, 37(11), 246-261.
Rutherford, M. J., Anderson, K., Carzaniga, A., Heimbigner, D., & Wolf, A. L. (2002, June).
Reconfiguration in the Enterprise JavaBean component model. In International Working
Conference on Component Deployment (pp. 67-81). Springer, Berlin, Heidelberg.
Maji, A. K., Mukhoty, A., Majumdar, A. K., Mukhopadhyay, J., Sural, S., Paul, S., &
Majumdar, B. (2008, January). Security analysis and implementation of web-based
telemedicine services with a four-tier architecture. In 2008 Second International Conference
on Pervasive Computing Technologies for Healthcare (pp. 46-54). IEEE.
Pande, J. (2012). On some critical issues in component selection in component-based
software development. International Journal of Computer Applications, 46(4), 44-50.
Al-Tarawneh, F. H. (2014). A framework for cots software evaluation and selection for COTS
mismatches handling and non-functional requirements (Doctoral dissertation, Universiti
Utara Malaysia).

You might also like