SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Page 1
SAP BEST
ONLINE TRAINING
TIBCO ONLINE TRAINING
IND +91 8688888976
USA +1666-313-4151
Email :
info@sapbestonlinetraining.com
www.sapbestonlinetraining.com
Page 2
Objective of EAI
⇒Objective of EAI is to connect disparate systems in a cost-efficient
fashion. Such integration is possible by employing a set of enabling
techniques such; the key techniques include loose coupling or the
reduction of topological by introducing a common medium between the to-
be integrated systems (integrate once, re-compose many times).
⇒ Specific integration cases aside (such as batch integration, ETL for
data warehousing, common database / operational data stores, etc), EAI
vendors offers a generic model based on message-oriented middleware
(MOM). This model includes the following functions :
⇨To-be-integrated application
⇨ Connectivity between applications and transport
⇨ Transport
⇨ Transformation & Routing
⇨ Task Flow
⇨ Business Process Management
Page 3
⇒ Connectivity
The Connectivity function encapsulates the transport and target application interface by
connecting each integrated application to the transport function. In the EAI world, the
connectivity function is provided by adapters and connectors.
⇒ Transport
Transport performs two important functions:
⇨ Moves the data across the network.
⇨ Facilitates some of the key aspects loose coupling, most importantly temporal and
technological de-coupling.
⇒ Transformation & Routing
In almost all integration activities, transformation from source format to target format
is required. The base transformation process involves format modifications (both syntax
and semantic mapping). More sophisticated transformation services offer message
augmentation (message boosting) or data cleansing (for example removal of duplicates)
that may be required to handle the differences between the to-be-integrated applications.
Integration Stack
Page 4
Except for basic point-to-point integration routing of messages is a key
component of an integration solution. These message routing activities
encompass:
Managing the delivery of the messages over communication connections,
including protocol conversion, flow control, guaranteed delivery, and
connection optimization (for example, connection pooling)
Multi-point message decomposition/re-composition, enabling one to
many and many to one message routing
Content-based routing with associated directory-based or rules-based
routing.
Transformation and routing function are typically provided by the same
component of an integration broker and for that reason we group them
together.
Task Flow
The Task Flow Management function of the broker coordinates relatively
simple, short time activities amongst the integrated systems. Task flow
management allows for re-combining applications functionality to yield a
more complex functionality.
Integration Stack
Page 5
Rendezvous software suite includes two main components—a
Rendezvous programming language interface (API) and the Rendezvous
daemon.
The Rendezvous daemon runs on each participating computer on your
network. All information that travels between program processes passes
through the Rendezvous daemon as the information enters and exits host
computers.
Rendezvous software allows looser coupling between the components of a
distributed system. Loose coupling decreases costs for development,
operation and maintenance, and increases system longevity.
Rendezvous software uses subject-based addressing™ technology to
direct messages to their destinations, so program processes can
communicate without knowing the details of network addresses or
connections.
Introduction to Rendezvous Software
Page 6
To better understand the concept of RV, lets go thru some of the
Networking Basics –
⇒ Connection-Oriented and Connectionless Protocols
⇒ Connection-Oriented Protocols: These protocols require that a
logical connection be established between two devices before transferring
data. This is generally accomplished by following a specific set of rules
that specify how a connection should be initiated, negotiated, managed
and eventually terminated. Usually one device begins by sending a
request to open a connection, and the other responds. They pass control
information to determine if and how the connection should be set up. If
this is successful, data is sent between the devices. When they are
finished, the connection is broken.
Example : tcp/ip, ftp, telnet
⇒ Connectionless Protocols: These protocols do not establish a
connection between devices. As soon as a device has data to send to
another, it just sends it.
Example : udp
Networking Basics
Page 7
⇒ RV runs on TRDP – TIBCO Reliable Datagram Protocol. It is
implemented by rvd. TRDP is built on top of UDP and adds a sequence
number to each outbound packet. TRDP uses buffer to store outbound
messages for specific interval (Typically 60 sec.) If message packet is
lost, the consuming rvd requests retransmission.
⇒ In contrast to TCP/IP which is pessimistic, TRDP is optimistic: it
assumes messages will arrive at their destination. If the message is lost,
then TRDP sends negative acknowledgement (NAK) requesting
retransmission.
If stronger delivery assurance is required, RV Certified (RVCM) or RV
Transactional (RVTX) is used.
⇒ RVCM uses ledger files at both Publisher and Subscriber ends.
These ledger files stores messages, and these messages sit in ledger file
until it gets confirmation from all receivers.
TRDP – TIBCO Reliable Datagram Protocol
Page 8
⇒ Computer hardware and operating system platforms use different conventions for
data representation. Data from one platform can be unintelligible on another
platform
⇒ Messages are the common currency that Rendezvous programs use to exchange
data. Rendezvous messages contain fields of self-describing data. Every message
has a subject name, which describes its destination.
⇒ All data that enters or leaves a program through the Rendezvous daemon must
be encapsulated in the fields of a message. As an abstraction, a message is a
collection of self-describing data fields,
Fields
⇒ Each field contains one data item of a specific datatype. Programs can identify
and access the individual fields of a message either by name or by numeric
identifiers.
⇒ From the programmer’s point of view, a message is a set of fields. Programs
manipulate messages using API calls.
Wire Format
⇒ At a lower level, beyond these abstract operations, each message exists as a
byte sequence in Rendezvous wire format—a uniform representation suitable for
network communication among diverse hardware, operating system.
Messages and Data
Page 9
⇒ The software mechanism for sending and delivering messages is
called a transport. A transport defines the delivery scope—that is, the set
of possible destinations for the messages it sends.
Network Transport Parameters
⇒ Several independent distributed applications run on the same
network, and you must isolate them from one another (service
parameter).
⇒ Programs use the Rendezvous routing daemon, rvrd, to cooperate
across a WAN with programs that belong to a particular service group,
and the local programs must join the same service group.
⇒ A program runs on a computer with more than one network interface,
and you must select a specific network for outbound multicast
Rendezvous communications (network parameter).
⇒ A program runs on one computer, but connects with a Rendezvous
daemon process running on a different computer, and you must specify
the remote daemon to support network communications (daemon
parameter).
Transport
Page 10
⇒ Create a Process
⇒ Use RV Publisher and RV subscriber activities.
⇒ Use RV subscriber as Startup activity
⇒ Listen on Subject “Input”
⇒ Use transition to send this message to RV publisher activity.
⇒ Publish the same message using RV publisher on subject “Output”.
⇒ Use tibco send to publish a sample “DCOTG” on subject “Input”.
⇒ Use tibco listen to listen on “Output” subject.
⇒ Go to test mode and test this sample application.
⇒ Observe – Observe the directory structure of your project
Workshop
Page 11
sap best
online training
IND +91 8688888976
USA +1666-313-4151
Email :
info@sapbestonlinetraining.com
www.sapbestonlinetraining.com
Page 12
thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Ex 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chenEx 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chenĐô GiẢn
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Nisha Menon K
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented CommunicationDilum Bandara
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIIpkaviya
 
The Network Layer
The Network LayerThe Network Layer
The Network Layeradil raja
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layeradil raja
 
Interprocess Communication
Interprocess CommunicationInterprocess Communication
Interprocess CommunicationDeepak H L
 
Unit 5 Application Layer
Unit 5 Application LayerUnit 5 Application Layer
Unit 5 Application LayerKalpanaC14
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layeradil raja
 
Unit 4 - Transport Layer
Unit 4 - Transport LayerUnit 4 - Transport Layer
Unit 4 - Transport LayerKalpanaC14
 
transport layer
transport layer transport layer
transport layer usman19
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsAya Mahmoud
 

Was ist angesagt? (19)

Bhargavi osi
Bhargavi osiBhargavi osi
Bhargavi osi
 
Ex 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chenEx 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chen
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit III
 
The Network Layer
The Network LayerThe Network Layer
The Network Layer
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
 
Interprocess Communication
Interprocess CommunicationInterprocess Communication
Interprocess Communication
 
5. Distributed Operating Systems
5. Distributed Operating Systems5. Distributed Operating Systems
5. Distributed Operating Systems
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Unit 5 Application Layer
Unit 5 Application LayerUnit 5 Application Layer
Unit 5 Application Layer
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
Ppp
PppPpp
Ppp
 
Unit 4 - Transport Layer
Unit 4 - Transport LayerUnit 4 - Transport Layer
Unit 4 - Transport Layer
 
3 Osi Architecture
3 Osi Architecture3 Osi Architecture
3 Osi Architecture
 
transport layer
transport layer transport layer
transport layer
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systems
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Week2 lec2-bscs1
Week2 lec2-bscs1Week2 lec2-bscs1
Week2 lec2-bscs1
 

Andere mochten auch

Footloose evaluation 1
Footloose evaluation 1Footloose evaluation 1
Footloose evaluation 1AshleighG
 
Geografiaydemografia 091105205803-phpapp02
Geografiaydemografia 091105205803-phpapp02Geografiaydemografia 091105205803-phpapp02
Geografiaydemografia 091105205803-phpapp02Carlos Oyarzun Gallardo
 
保養化妝品 萃取精油-教材-詹翔霖教授-Bernice
保養化妝品 萃取精油-教材-詹翔霖教授-Bernice保養化妝品 萃取精油-教材-詹翔霖教授-Bernice
保養化妝品 萃取精油-教材-詹翔霖教授-Bernice文化大學
 
Www.superiorcustompins.com
Www.superiorcustompins.comWww.superiorcustompins.com
Www.superiorcustompins.comrichardbrown78
 
26-11-2012 El Gobernador Guillermo Padrés acompañado del presidente Felipe Ca...
26-11-2012 El Gobernador Guillermo Padrés acompañado del presidente Felipe Ca...26-11-2012 El Gobernador Guillermo Padrés acompañado del presidente Felipe Ca...
26-11-2012 El Gobernador Guillermo Padrés acompañado del presidente Felipe Ca...Guillermo Padrés Elías
 
2013年6月6日(木)19時 アーリーバード特別編 レジュメ
2013年6月6日(木)19時 アーリーバード特別編 レジュメ2013年6月6日(木)19時 アーリーバード特別編 レジュメ
2013年6月6日(木)19時 アーリーバード特別編 レジュメGLOBAL TASKFORCE (GTF)
 
Justin bieber fer
Justin bieber ferJustin bieber fer
Justin bieber ferfervasquez8
 
Calendarization & Normalization in EnergyCAP
Calendarization & Normalization in EnergyCAPCalendarization & Normalization in EnergyCAP
Calendarization & Normalization in EnergyCAPEnergyCAP, Inc.
 
jcps pd 2010
jcps pd 2010jcps pd 2010
jcps pd 2010JCPS
 
Politica sectorial-2002-2012
Politica sectorial-2002-2012Politica sectorial-2002-2012
Politica sectorial-2002-2012Luis Antonio Lipe
 
01 chapter-one-where-models-of-teaching-come-from
01 chapter-one-where-models-of-teaching-come-from01 chapter-one-where-models-of-teaching-come-from
01 chapter-one-where-models-of-teaching-come-fromkasdi haryanta
 

Andere mochten auch (20)

Footloose evaluation 1
Footloose evaluation 1Footloose evaluation 1
Footloose evaluation 1
 
Biggie & Tupac
Biggie & TupacBiggie & Tupac
Biggie & Tupac
 
Geografiaydemografia 091105205803-phpapp02
Geografiaydemografia 091105205803-phpapp02Geografiaydemografia 091105205803-phpapp02
Geografiaydemografia 091105205803-phpapp02
 
2472 vits bc
2472 vits bc2472 vits bc
2472 vits bc
 
保養化妝品 萃取精油-教材-詹翔霖教授-Bernice
保養化妝品 萃取精油-教材-詹翔霖教授-Bernice保養化妝品 萃取精油-教材-詹翔霖教授-Bernice
保養化妝品 萃取精油-教材-詹翔霖教授-Bernice
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
Luis emi
Luis emiLuis emi
Luis emi
 
Www.superiorcustompins.com
Www.superiorcustompins.comWww.superiorcustompins.com
Www.superiorcustompins.com
 
26-11-2012 El Gobernador Guillermo Padrés acompañado del presidente Felipe Ca...
26-11-2012 El Gobernador Guillermo Padrés acompañado del presidente Felipe Ca...26-11-2012 El Gobernador Guillermo Padrés acompañado del presidente Felipe Ca...
26-11-2012 El Gobernador Guillermo Padrés acompañado del presidente Felipe Ca...
 
My workstation
My workstationMy workstation
My workstation
 
2013年6月6日(木)19時 アーリーバード特別編 レジュメ
2013年6月6日(木)19時 アーリーバード特別編 レジュメ2013年6月6日(木)19時 アーリーバード特別編 レジュメ
2013年6月6日(木)19時 アーリーバード特別編 レジュメ
 
Justin bieber fer
Justin bieber ferJustin bieber fer
Justin bieber fer
 
Calendarization & Normalization in EnergyCAP
Calendarization & Normalization in EnergyCAPCalendarization & Normalization in EnergyCAP
Calendarization & Normalization in EnergyCAP
 
jcps pd 2010
jcps pd 2010jcps pd 2010
jcps pd 2010
 
Tema 5
Tema 5Tema 5
Tema 5
 
Politica sectorial-2002-2012
Politica sectorial-2002-2012Politica sectorial-2002-2012
Politica sectorial-2002-2012
 
01 chapter-one-where-models-of-teaching-come-from
01 chapter-one-where-models-of-teaching-come-from01 chapter-one-where-models-of-teaching-come-from
01 chapter-one-where-models-of-teaching-come-from
 
Supply chain management
Supply chain managementSupply chain management
Supply chain management
 
Friend Benicio Del Toro
Friend Benicio Del ToroFriend Benicio Del Toro
Friend Benicio Del Toro
 
Temmuz 2013 Bülten
Temmuz 2013 BültenTemmuz 2013 Bülten
Temmuz 2013 Bülten
 

Ähnlich wie tibco online training

Whitepaper TRANSCONNECT - EN | SQL Projekt AG
Whitepaper TRANSCONNECT - EN | SQL Projekt AG Whitepaper TRANSCONNECT - EN | SQL Projekt AG
Whitepaper TRANSCONNECT - EN | SQL Projekt AG SQL Projekt AG
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
netconf, restconf, grpc_basic
netconf, restconf, grpc_basicnetconf, restconf, grpc_basic
netconf, restconf, grpc_basicGyewan An
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networkstechbed
 
A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...Jennifer Perry
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jhamanish jha
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adiAdiseshaK
 
NETWORK MANAGEMENT - 2015
NETWORK MANAGEMENT - 2015NETWORK MANAGEMENT - 2015
NETWORK MANAGEMENT - 2015Ammad khan
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusAnujashejwal
 
Brown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdfBrown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdfWendieEscaliente
 
01-MessagePassingFundamentals.ppt
01-MessagePassingFundamentals.ppt01-MessagePassingFundamentals.ppt
01-MessagePassingFundamentals.pptHarshitPal37
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...IJMER
 
Task communication
Task communicationTask communication
Task communication1jayanti
 

Ähnlich wie tibco online training (20)

Whitepaper TRANSCONNECT - EN | SQL Projekt AG
Whitepaper TRANSCONNECT - EN | SQL Projekt AG Whitepaper TRANSCONNECT - EN | SQL Projekt AG
Whitepaper TRANSCONNECT - EN | SQL Projekt AG
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
netconf, restconf, grpc_basic
netconf, restconf, grpc_basicnetconf, restconf, grpc_basic
netconf, restconf, grpc_basic
 
Week10 transport
Week10 transportWeek10 transport
Week10 transport
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
 
NETWORK MANAGEMENT - 2015
NETWORK MANAGEMENT - 2015NETWORK MANAGEMENT - 2015
NETWORK MANAGEMENT - 2015
 
Components of client server application
Components of client server applicationComponents of client server application
Components of client server application
 
Example summary of SDN + NFV + Cloud Technology
Example summary of SDN + NFV + Cloud TechnologyExample summary of SDN + NFV + Cloud Technology
Example summary of SDN + NFV + Cloud Technology
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
 
Brown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdfBrown Simple Digital Marketing Presentation.pdf
Brown Simple Digital Marketing Presentation.pdf
 
01-MessagePassingFundamentals.ppt
01-MessagePassingFundamentals.ppt01-MessagePassingFundamentals.ppt
01-MessagePassingFundamentals.ppt
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
 
Transport layer
Transport layer Transport layer
Transport layer
 
Task communication
Task communicationTask communication
Task communication
 

tibco online training

  • 1. Page 1 SAP BEST ONLINE TRAINING TIBCO ONLINE TRAINING IND +91 8688888976 USA +1666-313-4151 Email : info@sapbestonlinetraining.com www.sapbestonlinetraining.com
  • 2. Page 2 Objective of EAI ⇒Objective of EAI is to connect disparate systems in a cost-efficient fashion. Such integration is possible by employing a set of enabling techniques such; the key techniques include loose coupling or the reduction of topological by introducing a common medium between the to- be integrated systems (integrate once, re-compose many times). ⇒ Specific integration cases aside (such as batch integration, ETL for data warehousing, common database / operational data stores, etc), EAI vendors offers a generic model based on message-oriented middleware (MOM). This model includes the following functions : ⇨To-be-integrated application ⇨ Connectivity between applications and transport ⇨ Transport ⇨ Transformation & Routing ⇨ Task Flow ⇨ Business Process Management
  • 3. Page 3 ⇒ Connectivity The Connectivity function encapsulates the transport and target application interface by connecting each integrated application to the transport function. In the EAI world, the connectivity function is provided by adapters and connectors. ⇒ Transport Transport performs two important functions: ⇨ Moves the data across the network. ⇨ Facilitates some of the key aspects loose coupling, most importantly temporal and technological de-coupling. ⇒ Transformation & Routing In almost all integration activities, transformation from source format to target format is required. The base transformation process involves format modifications (both syntax and semantic mapping). More sophisticated transformation services offer message augmentation (message boosting) or data cleansing (for example removal of duplicates) that may be required to handle the differences between the to-be-integrated applications. Integration Stack
  • 4. Page 4 Except for basic point-to-point integration routing of messages is a key component of an integration solution. These message routing activities encompass: Managing the delivery of the messages over communication connections, including protocol conversion, flow control, guaranteed delivery, and connection optimization (for example, connection pooling) Multi-point message decomposition/re-composition, enabling one to many and many to one message routing Content-based routing with associated directory-based or rules-based routing. Transformation and routing function are typically provided by the same component of an integration broker and for that reason we group them together. Task Flow The Task Flow Management function of the broker coordinates relatively simple, short time activities amongst the integrated systems. Task flow management allows for re-combining applications functionality to yield a more complex functionality. Integration Stack
  • 5. Page 5 Rendezvous software suite includes two main components—a Rendezvous programming language interface (API) and the Rendezvous daemon. The Rendezvous daemon runs on each participating computer on your network. All information that travels between program processes passes through the Rendezvous daemon as the information enters and exits host computers. Rendezvous software allows looser coupling between the components of a distributed system. Loose coupling decreases costs for development, operation and maintenance, and increases system longevity. Rendezvous software uses subject-based addressing™ technology to direct messages to their destinations, so program processes can communicate without knowing the details of network addresses or connections. Introduction to Rendezvous Software
  • 6. Page 6 To better understand the concept of RV, lets go thru some of the Networking Basics – ⇒ Connection-Oriented and Connectionless Protocols ⇒ Connection-Oriented Protocols: These protocols require that a logical connection be established between two devices before transferring data. This is generally accomplished by following a specific set of rules that specify how a connection should be initiated, negotiated, managed and eventually terminated. Usually one device begins by sending a request to open a connection, and the other responds. They pass control information to determine if and how the connection should be set up. If this is successful, data is sent between the devices. When they are finished, the connection is broken. Example : tcp/ip, ftp, telnet ⇒ Connectionless Protocols: These protocols do not establish a connection between devices. As soon as a device has data to send to another, it just sends it. Example : udp Networking Basics
  • 7. Page 7 ⇒ RV runs on TRDP – TIBCO Reliable Datagram Protocol. It is implemented by rvd. TRDP is built on top of UDP and adds a sequence number to each outbound packet. TRDP uses buffer to store outbound messages for specific interval (Typically 60 sec.) If message packet is lost, the consuming rvd requests retransmission. ⇒ In contrast to TCP/IP which is pessimistic, TRDP is optimistic: it assumes messages will arrive at their destination. If the message is lost, then TRDP sends negative acknowledgement (NAK) requesting retransmission. If stronger delivery assurance is required, RV Certified (RVCM) or RV Transactional (RVTX) is used. ⇒ RVCM uses ledger files at both Publisher and Subscriber ends. These ledger files stores messages, and these messages sit in ledger file until it gets confirmation from all receivers. TRDP – TIBCO Reliable Datagram Protocol
  • 8. Page 8 ⇒ Computer hardware and operating system platforms use different conventions for data representation. Data from one platform can be unintelligible on another platform ⇒ Messages are the common currency that Rendezvous programs use to exchange data. Rendezvous messages contain fields of self-describing data. Every message has a subject name, which describes its destination. ⇒ All data that enters or leaves a program through the Rendezvous daemon must be encapsulated in the fields of a message. As an abstraction, a message is a collection of self-describing data fields, Fields ⇒ Each field contains one data item of a specific datatype. Programs can identify and access the individual fields of a message either by name or by numeric identifiers. ⇒ From the programmer’s point of view, a message is a set of fields. Programs manipulate messages using API calls. Wire Format ⇒ At a lower level, beyond these abstract operations, each message exists as a byte sequence in Rendezvous wire format—a uniform representation suitable for network communication among diverse hardware, operating system. Messages and Data
  • 9. Page 9 ⇒ The software mechanism for sending and delivering messages is called a transport. A transport defines the delivery scope—that is, the set of possible destinations for the messages it sends. Network Transport Parameters ⇒ Several independent distributed applications run on the same network, and you must isolate them from one another (service parameter). ⇒ Programs use the Rendezvous routing daemon, rvrd, to cooperate across a WAN with programs that belong to a particular service group, and the local programs must join the same service group. ⇒ A program runs on a computer with more than one network interface, and you must select a specific network for outbound multicast Rendezvous communications (network parameter). ⇒ A program runs on one computer, but connects with a Rendezvous daemon process running on a different computer, and you must specify the remote daemon to support network communications (daemon parameter). Transport
  • 10. Page 10 ⇒ Create a Process ⇒ Use RV Publisher and RV subscriber activities. ⇒ Use RV subscriber as Startup activity ⇒ Listen on Subject “Input” ⇒ Use transition to send this message to RV publisher activity. ⇒ Publish the same message using RV publisher on subject “Output”. ⇒ Use tibco send to publish a sample “DCOTG” on subject “Input”. ⇒ Use tibco listen to listen on “Output” subject. ⇒ Go to test mode and test this sample application. ⇒ Observe – Observe the directory structure of your project Workshop
  • 11. Page 11 sap best online training IND +91 8688888976 USA +1666-313-4151 Email : info@sapbestonlinetraining.com www.sapbestonlinetraining.com