SlideShare a Scribd company logo
Understanding Java EE
Ms. Sophia Dcruz
Enterprise Java
USIT506
What is an Enterprise Application?
 EA is a business application.
 In corporate environment, applications are complex, scalable, distributed,
component-based and mission centric.
 They may be deployed on a variety of platforms across corporate networks,
intranets or the Internet.
 Challenges Of Enterprise Application Development:
1. Programming Productivity
2. Response to Demand
3. Integration with Existing System
4. Freedom to Choose
5. Maintaining Security
EA…
 Architecture of an EA:
 A distributed, multi-tiered application model.
 Application logic is divided into components. (Different components on
different systems at different locations)
 EA divided into following tiers:
1. Client Tier Services: Runs on client machine
2. Web Tier Services: Runs on the server
3. Business Tier Services: Runs on the server
4. Enterprise Information System[EIS]: Runs on EIS server
What is Java Enterprise Edition?
 Java EE is a set of coordinated technologies
 Enables developing, deploying and managing multi-tier server centric EA.
 Advantages:
1. Powerful set of APIs
2. Reduced Development Time
3. Reduced Application Complexity
4. Improved Application Performance
 Java EE is also influenced by the internet
 Write Once, Run Anywhere (WORA) philosophy
Java EE …
 Java EE provides a collection of:
1. Standardized components that help creating commercial application.
2. Standard interface that define how various application modules
interconnect.
3. Standard services that define how different software modules communicate.
Java EE Technologies
1. Web Application Technologies (Java Servlet, JSP, JSTL, JSF,Facelets)
2. Enterprise Application Technologies (EJB, JPA, JTA, JMS, Java EE Connector)
3. Web Services Technologies (SOAP and RESTful, JAXR)
4. Security Technologies (JACC, JASPIC)
Web Application Technologies
1. Java Servlet:
 Extends the functionality of a web server.
 Receive a request, dynamically generate response, send response containing HTML/XML
document.
2. JavaServer Pages (JSP):
 Helps to generate dynamic content for a web client.
 Contains two types of text: Static Data, JSP elements
3. JavaServer Pages Standard Tag Library (JSTL)
 Encapsulates core functionality of JSP
 Allows creating standard set of tags
 Has iterator and conditional tags for handling control flow
 Tags for manipulating XML documents
 Tags for accessing databases using SQL
Web App Technologies…
4. JavaServer Faces (JSF)
 User interface for building web application
5. Facelets
 Page declaration language developed for use with JSF
 Built specifically for JSF
Enterprise Application Technologies
1. Enterprise JavaBeans (EJB)
 Has methods to implement modules of business logic.
 They are scalable, transactional, secure and are building blocks
2. Java Persistence API (JPA)
 API for Object-Relational Mapping (ORM)
 Helps bridge the gap between object oriented model and a relational database.
 JPA consists of:
1. The Java Persistence API
2. The query language
3. Object/relation mapping meta data
Enterprise Application Technologies…
3. Java Transaction API (JTA)
 Standard interface for demarcating transactions.
 Provides command over commit and rollbacks.
4. Java Message Service (JMS)
 Messaging standard that allows Java EE application components to create, send,
receive and read messages.
 Enables loosely coupled, reliable and asynchronous communication.
5. Java EE Connector Architecture
 Helps create resource adapters that support access to EIS can be plugged into
any Java EE product.
6. Java Mail
 A service provider interface that allows application components to send emails.
Web Services Technologies
1. SOAP and RESTful
 Java API for RESTful Web Services (JAX-RS): Web services built according to REST
architectural style.
 Java API for XML-Based Web Services (JAX-WS): Supports web services using the
SOAP/ HTTP protocol.
2. Java API for XML Registries (JAXR)
 Accessing business and general-purpose registries over the Web.
Security Technologies
1. JACC
 Java Authorization Contract for Containers (JACC) defines a contract between a
Java EE application server and an authorization policy provider.
 Enables to authenticate and enforce access controls upon users.
2. JASPIC
 Java Authentication Service Provider Interface for Containers defines a Service
Provider Interface by which authentication providers implement message
authentication mechanisms.
Java EE Evolution
GlassFish Server 4.0
 Built using an open source license.
 GlassFish Server 4.0 provides the following:
1. A lightweight and extensible core based on OSGi Alliance standards
2. A web container
3. An easy-to-use Administration Console for configuration and management
4. Update Tool connectivity for updates and add-on components
5. Support for high availability clustering and load balancing
GlassFish Server …
 Administration
 The main responsibilities are to establish a secure GlassFish Server
environment and to oversee the services, resources and users that
participate in that environment.
 The key tasks include
 configuring resources and services
 managing GlassFish Server at runtime
 fixing problems that are associated with the server
 installing software, integrating add-on components
 deploying applications.
GlassFish Server …
 Developers: Offers a lightweight runtime that starts in seconds and enables
rapid iterative development with Active Redeploy that saves session state
when an application is redeployed.
 IT Operations: For IT Operations, GlassFish Server offers a feature-rich web
console for manual operation and a feature-equivalent command line utility
for automated environment.
Features of GlassFish Server…
 Java API for JSON Processing 1.0
 Java API for WebSockets 1.0
 Java Batch 1.0
 Concurrency Utilities for Java EE 1.0
 Java Message Service [JMS] 2.0
 Java API for RESTful Web Services
[JAX-RS] 2.0
 Enterprise Java Beans [EJB] 3.2
 Contexts and Dependency Injection
for Java EE [CDI] 1.1
 Java Persistence API [JPA] 2.1
 JavaServer Faces [JSF] 2.2
 Java Servlet 3.1
 Bean Validation [BV] 1.1
 Expression Language [EL] 3.0
 Interceptors 1.2
 Java Transaction API [JTA] 1.2
 JavaServer Pages [JSP] 2.3
 JavaMail 1.5
Java EE Architecture,
Server and Containers
Introduction
 Applications are developed to support companies in their business operations.
 They take data as input, process the data based on business rules and provide
data or information as output. Based on this fact, all applications have three
elements:
 The User Interface or the presentation element, through which data is taken as
input
 The Application Logic or the business rule element, which helps in implementing
the operations to be performed on the data input
 The Data Storage or the data management element, which manages the storage
and retrieval of data
 These three elements form the core of all application architecture used in
Commercial Application Development.
Introduction…
 As a developer, before deciding on the number of tiers in application architecture,
the following factors must be considered:
 Scalability: The capability of an application to adapt to any new hardware
environment
 Availability: The ability of an application to cater to the increased demands from
client
 Extensibility: The ability of an application to incrementally add features from
time to time to improve performance and provide better functionality to the
client
 Maintainability: The ability of an application to respond to bug-fixes with the
minimal utilization of resources in terms of people, time and technology
 Security: The ability of an application to maintain the integrity of data
 Performance: The ability of an application to respond to a client request in the
minimum time
Types of System Architecture
1. Single Tier Architecture
2. Two Tier Architecture
3. Three Tier Architecture
4. Multi Tier Architecture
5. Enterprise Architecture
Single Tier Architecture
 The user interface of a Web application i.e. the presentation layer, The
middle ware i.e. the business rules ,The data access layer are all contained in
one single computer.
Single Tier …
 Advantages:
 The simplest and least expensive alternative
 Less equipment to purchase and maintain
 Disadvantages:
 This type of implementation is lower security and the lack of scalability. An
architecture is scalable when it can be easily expanded or augmented to meet increasing
performance needs
 Having all of the site's major components and data on a single computer behind the
domain firewall leaves the site more vulnerable to malicious attacks
 Running all of the site's components on a single computer also limits expansion and
optimization possibilities
 If the developer knows that the application will not grow over time, then the
developer may decide to use single tier architecture.
Two Tier Architecture
 In this architecture, an application is divided into two components:
 Client
 Implements the user interface
 Contains business logic
 Server
 Used to store and access business data, captured by the user interface run on the
Client in a data store at the Server
 The User Interface is always physically located in the user's desktop
 The database management services are always physically located on a
Server
 Advantages:
 Adds additional security by removing sensitive customer data from the single
computer
 Having the database on a separate computer improves the overall performance
of the site
 Allows optimizing each machine for more specific performance requirements
 Disadvantages:
 The increased cost and complexity of the architecture
Three Tier Architecture
 User Services - Presentation Layer: Provides service such as the Graphical
User Interface and other automation tasks that the application has to perform
 Business Services - Business Layer: Implements business rules. This layer
encapsulates the business logic from users such that they need not know
how business logic is applied When business is upgraded, only the business
layer is affected and must be a upgraded, the rest of the application services
can remain untouched
 Data Services - Data Layer: Provides data availability and integrity. It is
responsible for adding, modifying and deleting data from the data store
 Most expensive but most scalable and secure
 The main functions of:
 The Presentation Layer is network I/O
 The Business Layer is CPU-intensive
 The Data Layer is disk I/O intensive
Multi Tier Architecture
 User Interface Tier: Handles users interaction with the application.
 Presentation Tier: Provides an interface for the end user to the application
data manipulation code spec.
 Business Tier: Contains business rules, data manipulation and so on.(brain)
 Infrastructure Services: Provides additional functionalities (messaging,
transactional support, etc. )
 Integration Tier/ Data Access Tier: Provide access to backend resources
 Data Tier: Any DBMS, Binary Files, Plain text files, etc.
Enterprise Java TYIT Sem 5 Unit 1 Chapter 1 and 2 PPT
Enterprise Architecture
Java EE Server
 Java EE Server is a server application that implements the Java EE platform
APls and provides the standard Java EE services.
 Java EE servers are sometimes called Application Servers because they allow
serving application data to clients, much as how Web Servers serve web pages
to Web Browsers.
 Java EE servers host several application component types that correspond to
the tiers in a multi-tiered application. The Java EE server provides services to
these components in the form of a Container.
 During the deployment process, installation of Java EE application
components takes place in the Java EE Containers on the Java EE Server.
Java EE Containers
 Containers are like interface connecting them with the low-level platform
specific functionality.
 Container is the only way to access the functionality of a component object. The
component is first assembled into Java EE Module and deployed into its container.
Then only the component can be executed.
 The following are the services provided by container to a component:
 Allows configuring a web component or enterprise bean so that only authorized
users can access the system resources
 Allows specifying relationships among methods that make up a single
transaction so that all methods in one transaction are treated as a single unit
 Provides a unified interface to multiple naming and directory services in the
enterprise so that application components can access these services
 Manage low-level communications between clients and enterprise beans.
Container Types
1. Enterprise JavaBeans [EJB] Container: provides local and remote access to
EJB, is responsible for spawning the EJB on demand, binding the EJB to
appropriate naming service so that other applications can find and use the
EJB.
2. Web Container: Hosts web application, responsible for instantiating,
initializing and invoking Servlets and supporting the HTTP and HTTPS
protocols.
3. Application Client Container: Provides services required for the execution of
application client components.
4. Applet Container: Gives a secure environment to applets

More Related Content

PPTX
Introduction to ejb and struts framework
PPTX
J2EE Notes JDBC database Connectiviy and Programs related to JDBC
PPSX
Intorduction to struts
DOCX
Project report for final year project
PDF
enterprisejavaunit-1chapter-2-210914075956.pdf
PPTX
Enterprise java unit-1_chapter-2
PDF
A dynamic application using jboss
PPTX
Web programming and development - Introduction
Introduction to ejb and struts framework
J2EE Notes JDBC database Connectiviy and Programs related to JDBC
Intorduction to struts
Project report for final year project
enterprisejavaunit-1chapter-2-210914075956.pdf
Enterprise java unit-1_chapter-2
A dynamic application using jboss
Web programming and development - Introduction

Similar to Enterprise Java TYIT Sem 5 Unit 1 Chapter 1 and 2 PPT (20)

PDF
Framework adoption for java enterprise application development
PPT
Enterprise Software Architecture
PPTX
Java ee introduction
PPTX
Java EE 7 introduction
PPT
J2 ee architecture
DOC
George Jordanov CV
PDF
Overview of JEE Technology
DOCX
DOC
KaranDeepSinghCV
DOCX
Actively looking for an opportunity to work as a challenging Dot Net Developer
DOCX
Actively looking for an opportunity to work as a challenging Dot Net Developer
PPT
J2ee connector architecture
PDF
Managing a complex database toolbar application for ie, chrome & firefox
PDF
Donation Toolbar Application for IE, Chrome & Firefox
PPT
Netserv Technology Services
PPT
J2 EEE SIDES
DOCX
All the amazing features of asp.net core
PPT
Introduction to java ee
PPT
Enterprise application developement
PDF
Dairy management system project report..pdf
Framework adoption for java enterprise application development
Enterprise Software Architecture
Java ee introduction
Java EE 7 introduction
J2 ee architecture
George Jordanov CV
Overview of JEE Technology
KaranDeepSinghCV
Actively looking for an opportunity to work as a challenging Dot Net Developer
Actively looking for an opportunity to work as a challenging Dot Net Developer
J2ee connector architecture
Managing a complex database toolbar application for ie, chrome & firefox
Donation Toolbar Application for IE, Chrome & Firefox
Netserv Technology Services
J2 EEE SIDES
All the amazing features of asp.net core
Introduction to java ee
Enterprise application developement
Dairy management system project report..pdf
Ad

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Electronic commerce courselecture one. Pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Programs and apps: productivity, graphics, security and other tools
Electronic commerce courselecture one. Pdf
MYSQL Presentation for SQL database connectivity
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
sap open course for s4hana steps from ECC to s4
Encapsulation_ Review paper, used for researhc scholars
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Spectroscopy.pptx food analysis technology
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Ad

Enterprise Java TYIT Sem 5 Unit 1 Chapter 1 and 2 PPT

  • 1. Understanding Java EE Ms. Sophia Dcruz Enterprise Java USIT506
  • 2. What is an Enterprise Application?  EA is a business application.  In corporate environment, applications are complex, scalable, distributed, component-based and mission centric.  They may be deployed on a variety of platforms across corporate networks, intranets or the Internet.  Challenges Of Enterprise Application Development: 1. Programming Productivity 2. Response to Demand 3. Integration with Existing System 4. Freedom to Choose 5. Maintaining Security
  • 3. EA…  Architecture of an EA:  A distributed, multi-tiered application model.  Application logic is divided into components. (Different components on different systems at different locations)  EA divided into following tiers: 1. Client Tier Services: Runs on client machine 2. Web Tier Services: Runs on the server 3. Business Tier Services: Runs on the server 4. Enterprise Information System[EIS]: Runs on EIS server
  • 4. What is Java Enterprise Edition?  Java EE is a set of coordinated technologies  Enables developing, deploying and managing multi-tier server centric EA.  Advantages: 1. Powerful set of APIs 2. Reduced Development Time 3. Reduced Application Complexity 4. Improved Application Performance  Java EE is also influenced by the internet  Write Once, Run Anywhere (WORA) philosophy
  • 5. Java EE …  Java EE provides a collection of: 1. Standardized components that help creating commercial application. 2. Standard interface that define how various application modules interconnect. 3. Standard services that define how different software modules communicate.
  • 6. Java EE Technologies 1. Web Application Technologies (Java Servlet, JSP, JSTL, JSF,Facelets) 2. Enterprise Application Technologies (EJB, JPA, JTA, JMS, Java EE Connector) 3. Web Services Technologies (SOAP and RESTful, JAXR) 4. Security Technologies (JACC, JASPIC)
  • 7. Web Application Technologies 1. Java Servlet:  Extends the functionality of a web server.  Receive a request, dynamically generate response, send response containing HTML/XML document. 2. JavaServer Pages (JSP):  Helps to generate dynamic content for a web client.  Contains two types of text: Static Data, JSP elements 3. JavaServer Pages Standard Tag Library (JSTL)  Encapsulates core functionality of JSP  Allows creating standard set of tags  Has iterator and conditional tags for handling control flow  Tags for manipulating XML documents  Tags for accessing databases using SQL
  • 8. Web App Technologies… 4. JavaServer Faces (JSF)  User interface for building web application 5. Facelets  Page declaration language developed for use with JSF  Built specifically for JSF
  • 9. Enterprise Application Technologies 1. Enterprise JavaBeans (EJB)  Has methods to implement modules of business logic.  They are scalable, transactional, secure and are building blocks 2. Java Persistence API (JPA)  API for Object-Relational Mapping (ORM)  Helps bridge the gap between object oriented model and a relational database.  JPA consists of: 1. The Java Persistence API 2. The query language 3. Object/relation mapping meta data
  • 10. Enterprise Application Technologies… 3. Java Transaction API (JTA)  Standard interface for demarcating transactions.  Provides command over commit and rollbacks. 4. Java Message Service (JMS)  Messaging standard that allows Java EE application components to create, send, receive and read messages.  Enables loosely coupled, reliable and asynchronous communication. 5. Java EE Connector Architecture  Helps create resource adapters that support access to EIS can be plugged into any Java EE product. 6. Java Mail  A service provider interface that allows application components to send emails.
  • 11. Web Services Technologies 1. SOAP and RESTful  Java API for RESTful Web Services (JAX-RS): Web services built according to REST architectural style.  Java API for XML-Based Web Services (JAX-WS): Supports web services using the SOAP/ HTTP protocol. 2. Java API for XML Registries (JAXR)  Accessing business and general-purpose registries over the Web.
  • 12. Security Technologies 1. JACC  Java Authorization Contract for Containers (JACC) defines a contract between a Java EE application server and an authorization policy provider.  Enables to authenticate and enforce access controls upon users. 2. JASPIC  Java Authentication Service Provider Interface for Containers defines a Service Provider Interface by which authentication providers implement message authentication mechanisms.
  • 14. GlassFish Server 4.0  Built using an open source license.  GlassFish Server 4.0 provides the following: 1. A lightweight and extensible core based on OSGi Alliance standards 2. A web container 3. An easy-to-use Administration Console for configuration and management 4. Update Tool connectivity for updates and add-on components 5. Support for high availability clustering and load balancing
  • 15. GlassFish Server …  Administration  The main responsibilities are to establish a secure GlassFish Server environment and to oversee the services, resources and users that participate in that environment.  The key tasks include  configuring resources and services  managing GlassFish Server at runtime  fixing problems that are associated with the server  installing software, integrating add-on components  deploying applications.
  • 16. GlassFish Server …  Developers: Offers a lightweight runtime that starts in seconds and enables rapid iterative development with Active Redeploy that saves session state when an application is redeployed.  IT Operations: For IT Operations, GlassFish Server offers a feature-rich web console for manual operation and a feature-equivalent command line utility for automated environment.
  • 17. Features of GlassFish Server…  Java API for JSON Processing 1.0  Java API for WebSockets 1.0  Java Batch 1.0  Concurrency Utilities for Java EE 1.0  Java Message Service [JMS] 2.0  Java API for RESTful Web Services [JAX-RS] 2.0  Enterprise Java Beans [EJB] 3.2  Contexts and Dependency Injection for Java EE [CDI] 1.1  Java Persistence API [JPA] 2.1  JavaServer Faces [JSF] 2.2  Java Servlet 3.1  Bean Validation [BV] 1.1  Expression Language [EL] 3.0  Interceptors 1.2  Java Transaction API [JTA] 1.2  JavaServer Pages [JSP] 2.3  JavaMail 1.5
  • 19. Introduction  Applications are developed to support companies in their business operations.  They take data as input, process the data based on business rules and provide data or information as output. Based on this fact, all applications have three elements:  The User Interface or the presentation element, through which data is taken as input  The Application Logic or the business rule element, which helps in implementing the operations to be performed on the data input  The Data Storage or the data management element, which manages the storage and retrieval of data  These three elements form the core of all application architecture used in Commercial Application Development.
  • 20. Introduction…  As a developer, before deciding on the number of tiers in application architecture, the following factors must be considered:  Scalability: The capability of an application to adapt to any new hardware environment  Availability: The ability of an application to cater to the increased demands from client  Extensibility: The ability of an application to incrementally add features from time to time to improve performance and provide better functionality to the client  Maintainability: The ability of an application to respond to bug-fixes with the minimal utilization of resources in terms of people, time and technology  Security: The ability of an application to maintain the integrity of data  Performance: The ability of an application to respond to a client request in the minimum time
  • 21. Types of System Architecture 1. Single Tier Architecture 2. Two Tier Architecture 3. Three Tier Architecture 4. Multi Tier Architecture 5. Enterprise Architecture
  • 22. Single Tier Architecture  The user interface of a Web application i.e. the presentation layer, The middle ware i.e. the business rules ,The data access layer are all contained in one single computer.
  • 23. Single Tier …  Advantages:  The simplest and least expensive alternative  Less equipment to purchase and maintain  Disadvantages:  This type of implementation is lower security and the lack of scalability. An architecture is scalable when it can be easily expanded or augmented to meet increasing performance needs  Having all of the site's major components and data on a single computer behind the domain firewall leaves the site more vulnerable to malicious attacks  Running all of the site's components on a single computer also limits expansion and optimization possibilities  If the developer knows that the application will not grow over time, then the developer may decide to use single tier architecture.
  • 24. Two Tier Architecture  In this architecture, an application is divided into two components:  Client  Implements the user interface  Contains business logic  Server  Used to store and access business data, captured by the user interface run on the Client in a data store at the Server  The User Interface is always physically located in the user's desktop  The database management services are always physically located on a Server
  • 25.  Advantages:  Adds additional security by removing sensitive customer data from the single computer  Having the database on a separate computer improves the overall performance of the site  Allows optimizing each machine for more specific performance requirements  Disadvantages:  The increased cost and complexity of the architecture
  • 26. Three Tier Architecture  User Services - Presentation Layer: Provides service such as the Graphical User Interface and other automation tasks that the application has to perform  Business Services - Business Layer: Implements business rules. This layer encapsulates the business logic from users such that they need not know how business logic is applied When business is upgraded, only the business layer is affected and must be a upgraded, the rest of the application services can remain untouched  Data Services - Data Layer: Provides data availability and integrity. It is responsible for adding, modifying and deleting data from the data store  Most expensive but most scalable and secure
  • 27.  The main functions of:  The Presentation Layer is network I/O  The Business Layer is CPU-intensive  The Data Layer is disk I/O intensive
  • 28. Multi Tier Architecture  User Interface Tier: Handles users interaction with the application.  Presentation Tier: Provides an interface for the end user to the application data manipulation code spec.  Business Tier: Contains business rules, data manipulation and so on.(brain)  Infrastructure Services: Provides additional functionalities (messaging, transactional support, etc. )  Integration Tier/ Data Access Tier: Provide access to backend resources  Data Tier: Any DBMS, Binary Files, Plain text files, etc.
  • 31. Java EE Server  Java EE Server is a server application that implements the Java EE platform APls and provides the standard Java EE services.  Java EE servers are sometimes called Application Servers because they allow serving application data to clients, much as how Web Servers serve web pages to Web Browsers.  Java EE servers host several application component types that correspond to the tiers in a multi-tiered application. The Java EE server provides services to these components in the form of a Container.  During the deployment process, installation of Java EE application components takes place in the Java EE Containers on the Java EE Server.
  • 32. Java EE Containers  Containers are like interface connecting them with the low-level platform specific functionality.  Container is the only way to access the functionality of a component object. The component is first assembled into Java EE Module and deployed into its container. Then only the component can be executed.  The following are the services provided by container to a component:  Allows configuring a web component or enterprise bean so that only authorized users can access the system resources  Allows specifying relationships among methods that make up a single transaction so that all methods in one transaction are treated as a single unit  Provides a unified interface to multiple naming and directory services in the enterprise so that application components can access these services  Manage low-level communications between clients and enterprise beans.
  • 33. Container Types 1. Enterprise JavaBeans [EJB] Container: provides local and remote access to EJB, is responsible for spawning the EJB on demand, binding the EJB to appropriate naming service so that other applications can find and use the EJB. 2. Web Container: Hosts web application, responsible for instantiating, initializing and invoking Servlets and supporting the HTTP and HTTPS protocols. 3. Application Client Container: Provides services required for the execution of application client components. 4. Applet Container: Gives a secure environment to applets