Documentation Home
> Sun Java Enterprise System Deployment Planning Guide
Sun Java Enterprise System Deployment Planning Guide
Book Information
Index
Numbers and Symbols
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
Q
R
S
T
U
W
Preface
Chapter 1 Introduction to Deployment Planning
About Java Enterprise System
System Services
Built-In Services and Custom-Developed Services
Migrating to Java Enterprise System
About Deployment Planning
Solution Life Cycle
Business Analysis Phase
Technical Requirements Phase
Logical Design Phase
Deployment Design Phase
Implementation Phase
Operations Phase
Chapter 2 Business Analysis
About Business Analysis
Defining Business Requirements
Setting Business Goals
Scope
Priorities
Critical Qualities
Growth Factors
Safety Margin
Understanding User Needs
Developing Operational Requirements
Supporting Existing Usage Patterns
Understanding Corporate Culture
Stakeholders
Standards and Policies
Regulatory Requirements
Security
Site Distribution
Using an Incremental Approach
Understanding Service Level Agreements
Defining Business Constraints
Migration Issues
Schedule Mandates
Budget Limitations
Cost of Ownership
Chapter 3 Technical Requirements
About Technical Requirements
Usage Analysis
Use Cases
Quality of Service Requirements
Performance
Availability
Fault-Tolerant Systems
Prioritizing Service Availability
Loss of Services
Scalability
Estimating Growth
Security Requirements
Elements of a Security Plan
Latent Capacity
Serviceability Requirements
Service Level Requirements
Chapter 4 Logical Design
About Logical Architectures
Designing a Logical Architecture
Java Enterprise System Components
Component Dependencies
Web Container Support
Logically Distinct Services Provided by Messaging Server
Access Components
Multitiered Architecture Design
Example Logical Architectures
Messaging Server Example
Messaging Server Use Cases
Use Case 1: User Logs in Successfully to Messaging Server
Use Case 2: Logged-In User Reads and Deletes Mail
Use Case 3: Logged-In User Sends Email Message
Identity-Based Communications Example
Use Cases for Identity-Based Communications Example
Use Case 1: User Logs in Successfully and Portal Retrieves User’s Configuration
Use Case 2: Portal Server Displays Email and Calendar Information
Access Zones
Deployment Scenario
Chapter 5 Deployment Design
About Deployment Design
Project Approval
Deployment Design Outputs
Factors Affecting Deployment Design
Deployment Design Methodology
Estimating Processor Requirements
Example Estimating Processor Requirements
Determine Baseline CPU Estimate for User Entry Points
Include CPU Estimates for Service Dependencies
Study Use Cases for Peak Load Usage
Modify Estimates for Other Load Conditions
Update the CPU Estimates
Estimating Processor Requirements for Secure Transactions
CPU Estimates for Secure Transactions
Specialized Hardware to Handle SSL Transactions
Determining Availability Strategies
Availability Strategies
Single Server System
Horizontally Redundant Systems
Sun Cluster Software
Availability Design Examples
Load Balancing Example for Messaging Server
Failover Example Using Sun Cluster Software
Replication of Directory Services Example
Single Master Replication
Multi-Master Replication
Determining Strategies for Scalability
Latent Capacity
Scalability Example
Identifying Performance Bottlenecks
Optimizing Disk Access
Designing for Optimum Resource Usage
Managing Risks
Example Deployment Architecture
Chapter 6 Implementation of a Deployment Design
About Implementing Deployment Designs
Installing and Configuring Software
Developing Pilots and Prototypes
Testing Pilot and Prototype Deployments
Rolling Out a Production Deployment
© 2010, Oracle Corporation and/or its affiliates