Sun Java logo     Copyright      Index      Next     

Sun logo
Sun Java Enterprise System 2005Q1 Deployment Planning Guide 

Contents


List of Figures

List of Tables

Preface
Who Should Use This Book
How This Book Is Organized
Related Documentation
Books in This Documentation Set
Accessing Sun Resources Online
Contacting Sun Technical Support
Related Third-Party Web Site References
Sun Welcomes Your Comments

Chapter 1   Introduction to Deployment Planning
About Java Enterprise System
System Services
Built-In Services and Custom-Developed Services
Migrating to Java Enterprise System
About Deployment Planning
Solution Life Cycle
Business Analysis Phase
Technical Requirements Phase
Logical Design Phase
Deployment Design Phase
Implementation Phase
Operations Phase

Chapter 2   Business Analysis
About Business Analysis
Defining Business Requirements
Setting Business Goals
Scope
Priorities
Critical Qualities
Growth Factors
Safety Margin
Understanding User Needs
Developing Operational Requirements
Supporting Existing Usage Patterns
Understanding Corporate Culture
Stakeholders
Standards and Policies
Regulatory Requirements
Security
Site Distribution
Using an Incremental Approach
Understanding Service Level Agreements
Defining Business Constraints
Migration Issues
Schedule Mandates
Budget Limitations
Cost of Ownership

Chapter 3   Technical Requirements
About Technical Requirements
Usage Analysis
Use Cases
Quality of Service Requirements
Performance
Availability
Fault-Tolerant Systems
Prioritizing Service Availability
Loss of Services
Scalability
Estimating Growth
Security Requirements
Elements of a Security Plan
Latent Capacity
Serviceability Requirements
Service Level Requirements

Chapter 4   Logical Design
About Logical Architectures
Designing a Logical Architecture
Java Enterprise System Components
Component Dependencies
Web Container Support
Logically Distinct Services Provided by Messaging Server
Access Components
Multitiered Architecture Design
Example Logical Architectures
Messaging Server Example
Messaging Server Use Cases
Identity-Based Communications Example
Use Cases for Identity-Based Communications Example
Access Zones
Deployment Scenario

Chapter 5   Deployment Design
About Deployment Design
Project Approval
Deployment Design Outputs
Factors Affecting Deployment Design
Deployment Design Methodology
Estimating Processor Requirements
Example Estimating Processor Requirements
Determine Baseline CPU Estimate for User Entry Points
Include CPU Estimates for Service Dependencies
Study Use Cases for Peak Load Usage
Modify Estimates for Other Load Conditions
Update the CPU Estimates
Estimating Processor Requirements for Secure Transactions
CPU Estimates for Secure Transactions
Specialized Hardware to Handle SSL Transactions
Determining Availability Strategies
Availability Strategies
Single Server System
Horizontally Redundant Systems
Sun Cluster Software
Availability Design Examples
Load Balancing Example for Messaging Server
Failover Example Using Sun Cluster Software
Replication of Directory Services Example
Single Master Replication
Multi-Master Replication
Determining Strategies for Scalability
Latent Capacity
Scalability Example
Identifying Performance Bottlenecks
Optimizing Disk Access
Designing for Optimum Resource Usage
Managing Risks
Example Deployment Architecture

Chapter 6   Implementation of a Deployment Design
About Implementing Deployment Designs
Installing and Configuring Software
Developing Pilots and Prototypes
Testing Pilot and Prototype Deployments
Rolling Out a Production Deployment

Index


Copyright      Index      Next     


Part No: 819-0058-10.   Copyright 2005 Sun Microsystems, Inc. All rights reserved.