Availability Guide for Application Design

Contents
Availability Guide for Application Design525637-004
viii
Figures
Figure 3-1. Standards Supported and Enhanced by NonStop Products 3-2
Figure 3-2. Web Services and NonStop Servers 3-8
Figure 3-3. The iTP Secure WebServer Architecture 3-14
Figure 4-1. Transaction Concurrency 4-5
Figure 4-2. Protecting Transaction Data 4-7
Figure 4-3. An RDF Product Provides Protection Against Site Failure 4-13
Figure 4-4. Remote, Duplicate Transactions Provide Protection Against Site
Failure 4-16
Figure 4-5. Remote, Duplicate Transactions With the Logic in the Server 4-17
Figure 4-6. Queue Files and Transaction Playback 4-21
Figure 4-7. Queue Files and Trickle Catchup 4-23
Figure 4-8. Eliminating Batch Windows With NetBatch-Plus 4-26
Figure 4-9. Concurrent Batch and Online Activity 4-27
Figure 4-10. Batch Processing With and Without Batch Windows 4-30
Figure 5-1. Open Transaction Monitor 5-2
Figure 5-2. Components in a NonStop Tuxedo Application 5-5
Figure 5-3. Fault-Tolerant WSL Process Configuration 5-9
Figure 6-1. The Pathway Transaction-Processing Environment 6-2
Figure 6-2. The Role of NonStop TS/MP in the Pathway Transaction-Processing
Environment 6-5
Figure 6-3. The Role of Pathway/XM in the Pathway Transaction-Processing
Environment 6-9
Figure 6-4. Components in a Typical RSC/MP Application That Uses Pathsend
Interprocess Sessions 6-12
Figure 6-5. Components in a Typical Pathsend Application 6-19
Figure 6-6. Components Supporting Pathway/iTS Applications 6-25
Figure 7-1. Process Pair—Generic Model 7-5
Figure 8-1.
Instrumented Operations Management Model 8-7
Figure 8-2.
Failure Detection, Analysis, Resolution, and Recovery 8-8
Figure 8-3. Pathway Application Objects and Their Relationships 8-11
Figure 8-4. Server Process State Changes—A Dynamic Model 8-13
Figure 8-5. Overview of DSM Architecture 8-18
Figure 8-6. DSM Message Flow 8-19
Figure 8-7. Transposing Event Data Into Command Data 8-24
Figure 8-8. EMS FastStart Architecture 8-27
Figure 8-9. Flow of Event Messages Through EMS 8-32
Figure 9-1. Relative Costs of Fixing Defects 9-8
Figure 10-1. Isolating Data From the Application Through Data
Encapsulation 10-16