EnterPrise2 - Syracuse University`s College of Engineering and
Download
Report
Transcript EnterPrise2 - Syracuse University`s College of Engineering and
.NET Application
Design Considerations
Mark Sapossnek
CS 594
Computer Science Department
Metropolitan College
Boston University
A couple of additions
And many deletions
By
Jim Fawcett
CSE681 – Software Modeling and Analysis
Summer 2003
Agenda
Design Model and Process
.NET System Architecture
.NET Design Patterns
Security
Scalability
Availability
Design Model and Process
Microsoft Enterprise Services Framework
Services-Based Application Design Model
Design Process
Design Principles
Design Model and Process
Services-Based Application Model
Application 1
Application 2
User Services
Can be implemented
as Web Services
Business Services
Data Services
Design Model and Process
MSF Design Process Overview
Conceptual
Logical
Scenarios
Physical
Objects and Services,
UI, Logical DB
Components,
UI, Physical DB
http://
Design Model and Process
Conceptual Design
Conceptual
Logical
Scenarios
Physical
Objects and Services,
UI, Logical DB
Components,
UI, Physical DB
http://
The goal of conceptual design is to understand what the users do
and to identify business needs. The output is scenarios or use cases.
Design Model and Process
Logical Design
Conceptual
Logical
Scenarios
Physical
Objects and Services,
UI, Logical DB
Components,
UI, Physical DB
http://
The goal of logical design is to lay out the
structure of the solution and the
communication among elements.
The output is a set of objects and services,
high-level user interface design,
and logical database design.
Design Model and Process
Conceptual
Physical Design
Physical
Conceptual
Logical
Scenarios
Objects and Services,
UI, Logical DB
Components,
UI, Physical DB
http://
The goal of physical design is to apply real-world technology constraints to the logical
model, including implementation and performance considerations. The output is a set of
components, UI design for a particular platform, and physical database design.
Design Model and Process
Design Principles
Understand and solve the business problem
Communicate effectively with users and project teams
Design based on a modular approach
Consistent
Distributable (Web-centric)
Implementation language-independent
Flexible
Reusable
Reliable
Balance innovation and discipline through each iteration
Pay attention to the Enterprise Architecture and
Infrastructure
Agenda
Design Model and Process
.NET System Architecture
.NET Design Patterns
Security
Scalability
Availability
.NET System Architecture
Distributed System Architecture
Rendering engine
Input/Output
Presentation logic
I/O Processing
Business logic
Data logic
Data engine
Everything Else
Data Management
Database
.NET System Architecture
Windows DNA Application Architecture
Rendering engine
HTML 3.2 Browser
Presentation logic
IIS/ASP (.asp)
Business logic
Data logic
Data logic
Data engine
COM Components
SQL Server Database
.NET System Architecture
.NET Application Architecture
Rendering engine
HTML 3.2 Browser
Presentation logic
IIS/ASP (.aspx, .ascx)
Business logic
Data logic
Data logic
Data engine
.NET Assemblies
Web
Services
SQL Server Database
.NET System Architecture
Web Service Architecture
Rendering engine
Presentation logic
Business logic
Data logic
Data logic
Data engine
SOAP Clients
Web Service (.asmx)
.NET Assemblies
SQL Server Database
.NET System Architecture
Web Services Application Model
Partner
Web Service
Web Services
Internet + XML
Partner
Web Service
YourCompany.com
Application
Business
Logic
Tier
Data Access and
Storage Tier
Other
Applications
Agenda
Design Model and Process
.NET System Architecture
.NET Design Patterns
Security
Scalability
Availability
.NET Design Patterns
Samples
IBuySpy (http://www.ibuyspy.com/)
MSDN Sample: Duwamish 7.0
MSDN Sample: Fitch & Mather Stocks 7.0
Using Uniform Modeling Language (UML)
Discuss design patterns of each sample
application
IBuySpy Example
E-Commerce Store Front
Selling fictional spy equipment
Shows how to build a portal site
Demonstrates use of ASP.NET applications
.NET Design Patterns
IBuySpy Portal Sample
.NET Design Patterns
IBuySpy Design Patterns
Clean code/HTML content separation using
server controls
Pages that are constructed from
dynamically-loaded User Controls
Configurable output caching of portal page
regions
Modular site layout defined by XML configuration
file
.NET Design Patterns
IBuySpy Design Patterns
XML serialization that maps XML config file to
custom config classes
Cached config settings automatically reloaded
when file changes
Role-based security to control user access to
portal content
Duwamish Example
A Sales and Inventory system for a book store.
Functions:
Point of Sale
Order Entry
Shipping and Receiving
Catalog
.NET Design Patterns
Duwamish Sample Application
.NET Design Patterns
Duwamish Activity Diagram
.NET Design Patterns
Duwamish Sequence Diagram
.NET Design Patterns
Duwamish Design Patterns
Move processing to the data rather than moving
data to the processing
Pass all data back to the client in a method call
Minimize the time that a database resource is
locked
Use Binary/HTTP for remoting
.NET Design Patterns
Duwamish Design Patterns
Use ASP.NET within its Web layer and utilize the
ASP.NET caching features
Publish a single XML Web service named
CatalogService to expose its book catalog
search functions to the Internet
Fitch & Mather Example
A Web-based expense reporting system for a
fictional company
Original implementation was ASP and COM
Ported to .NET and COM+
What is COM+ ?
COM+ provides the following services:
Transaction services
Security services
Synchronization services
Queued components
Event Service
JIT Activation and Object Pooling
In Memory Database
Load Balancing
Many of these services are available administratively as
well as programmatically.
COM+ Application
COM+ Server
Application
(DLLHOST.EXE)
Component
Context
proxy manager
proxy
Component DLL
RPC channel
interceptor
stub
client
context
client
object
.NET Design Patterns
Fitch & Mather 7.0 Sample
A port of the MSDN Fitch & Mather 2000 sample
to .NET technologies
Not a complete deployable application
Focus on
Performance
Technology porting issues from the Windows DNA
architecture to the .NET Framework
Legacy integration and interoperability
Real-life deployment scenarios in a distributed
computing environment.
.NET Design Patterns
Fitch & Mather 7.0 Architecture
.NET Design Patterns
Fitch & Mather 7.0 Activity Diagram
.NET Design Patterns
Fitch & Mather 7.0 - Transactions
Transaction Composability
Transactions are composed
by a transaction root object
from individual transactional
or nontransactional objects
Transaction root objects are
located at a layer above the
data access layer
No objects in data access
layer marked for requiring
new transaction
Objects that perform write
operation must at least
support transactions
.NET Design Patterns
Fitch & Mather 7.0 - Security
Use forms authentication with the combination of forms
and role-based security
Show login page and verify user credentials on access to
restricted resources
Issue an authentication cookie as means of re-acquiring user
identity at a later stage.
Based on the user’s identity/roles, replace the principal object
on the current thread to reflect the identity of the user.
In the application OnAuthenticateRequest event handler of
Global.asax, automatically replace the principal on the
thread every time authentication happens.
On BLL and DAL components, place code segments into the
constructor of each class to verify the identity of the user and
whether they are authenticated. Throw an exception if they
are not.
.NET Design Patterns
UML Models
Agenda
Design Model and Process
.NET System Architecture
.NET Design Patterns
Security
Scalability
Availability
Security
Overview
Security is A PAIN:
Authentication
Privacy
Authorization
Integrity
Nonrepudiation
Who‘s there?
No eavesdroppers
What are you allowed to do?
Did the data get changed?
Keep your promises
As always: understand the requirements
E.g. Search vs. bank account vs. news
Do you just need personalization?
Security
Questions to Ask
Authentication
How does the user provide their credentials?
Where are credentials stored?
Temporary or persistent
Security
Authentication Approaches
IIS/Windows
Basic, Digest, NTLM, Kerberos, Certificates
ASP.NET
Windows
Forms-based (cookie) authentication
Microsoft Passport authentication
Custom authentication
Security
Forms-Based Authentication
Easy to implement
ASP.NET provides redirection
Custom Login UI (no popup dialogs)
Custom credential verification
Custom application roles
Support for advanced usage
Application defined data
Control over cookie lifetime, paths
Security
Authorization Strategies
ASP.NET
Windows Security & ACLs
URL Authorization
Custom Authorization
All applications
Declarative Method Authorization
Explicit Authorization
Agenda
Design Model and Process
.NET System Architecture
.NET Design Patterns
Security
Scalability
Availability
Scalability
How Do You Handle Success?
…
Scalability
Approach 1 – Scale Up
…
SMP:
Symmetric
MultiProcessor
Can only get so big
Expensive
Scalability
Approach 2 – Scale Out
…
…
Less expensive, though more to manage
Symmetric (load balancing) or asymmetric
(partitioning)
Scalability
Approach 3 – Partition Database
Scale out with database
…
…
Scale up database
Partition database
Scalability
Design for Scalability
Design a stateless application if possible
Use a database for state management
Run on a cluster of Web servers
Use caching or offline content generation
Partition the database tier or the Web tier
Use stored procedures
Use transactions intelligently
Use asynchronous programming techniques
Benchmark your application – performance
measurement and tuning
Scalability
Use a Database for State Management
Design your Web application to run on a cluster
of Web servers
Shared nothing, stateless
This means you must manage user session
state somewhere other than the Web server
Use a database
Scalability
Single Stateless Application Server
A single stateless server running your
application code
Application
Code
Scalability
Multiple Identical Stateless
Application Servers
The application code is cloned across a set of
identical servers
Application
Code
Application
Code
Application
Code
Scalability
Partition the Database Tier
Functional
Each functional area of the site gets its own DB
This allows you control over how you deploy into the
production environment
Dedicated hardware to certain functions
Class of hardware per function
Table
Takes some planning
SQL Server 2000 makes this easier than ever before
Huge scale opportunity for large tables
Scalability
Partition the Web Tier
Just like database functional partitioning, you
can dedicate clusters to application functions
WWW.mydomain.com is handled by one cluster
SEARCH.mydomain.com is handled by another
cluster
You can also create clusters of clusters
Use DNS Round Robin to distribute traffic across multiple
load balanced clusters that serve one function
Scalability
Partition the Web Tier
Use DNS Host names or hardware solutions to
distribute traffic to dedicated clusters
Once you have a stateless application, this is
how you achieve huge scale
Scalability throttling with inexpensive hardware
Scalability
Benefits of Partitioning
More control over traffic flow through the
application
Users who are searching or registering are moved off
of the WWW cluster to keep the response time of the
WWW cluster snappy
Application and server tuning can be different for
each function
Search servers may have more memory, more CPUs
than the servers handling WWW
Scalability
Benefits of Partitioning
Different content management techniques can be used
on different functions
WWW may be primarily static content or dynamically generated
offline. WWW may use XML and XSL for high performance UI
formatting and internationalization
Registration requires real-time database access and custom
code
Administration of the clusters can be handled separately
Database partitioning gives you scale-out capabilities at
the database tier
Scalability
Using Stored Procedures
There is a real performance benefit to stored
procedures
Compiled code in the database
DBA can tune stored procedures
Can’t tune embedded SQL
Good separation (API) between table structure
and application code
Tradeoff is database portability
Scalability
Using Transactions Intelligently
Transactions are powerful but they do have overhead
Use them intelligently
Not every COM component ‘requires’ a transaction
Design your components with your transactions in mind
Be aware of the transactional semantics of the
underlying database
Long-lived locks in the DB will kill application performance
Look for blocking and deadlocks when testing
Scalability
Using Messaging
Use store and forward where applicable
Can provide a high degree of scalability by
decoupling the user experience from the backend
processing
MSMQ
Underlying messaging technology on Windows
COM+ Queued Components
Combines ease of COM programming with MSMQ
Tradeoffs
Manual implementation of 2 phase commit semantics
(Compensating Transactions)
Scalability
Performance Tuning
Performance Tuning is the process by which you
measure individual operations on your site
Still a bit of a black art
Need to measure for detail but analyze with a holistic view of the
system
Database performance is key; focus there first
Know your tools
PerfMon
WAST
SQL Server Profiler
SQL Server Index Tuning Wizard
SQL Server Query Analyzer
Scalability
Framework/CLR Best Practices
Enable Web Garden: run applications in
multiple worker processes (with processor
affinity)
Use Early Binding: Late Binding requires work at
runtime
“Pre-JIT” to start up faster (available in beta 2)
Make chunky and not chatty calls
Implement Dispose method on the object that
cleans up your resources and release the
reference (set to null) once you are done
Scalability
Framework/CLR Best Practices
Use value type for small data
Do not cache strings or arrays length: Strings
are immutable
For best inlining performance
Minimize the use of virtual methods
Use sealed types if possible
Scalability
ASP.NET Best Practices
Disable “ViewState” if you are not doing Postback
Disable session state for all pages or Web Methods that
don’t require/need session data
Set to “readonly” if you read but do not update session state
Design pages around these ASP.NET built-in caching
features
Always use System.Data.SqlClient for SQL Server
Access
Use DataReaders for ASP.NET data access
Scalability
ASP.NET Best Practices
Avoid apartment threaded COM components
Migrate apartment threaded components to .NET
Alternatively, enable the <%@ AspCompat=“true” %> directive
for pages that utilize apartment COM objects
Always generate early-bound managed wrappers for COM
components (avoid late bound hit)
Recommend UI Logic in ASP.NET Pages
Business and data logic in re-usable components
User Controls for UI reuse
Recommend web pages & components run in same
process
Leverage web services only for application to application
communication (not intra application)
Agenda
Design Model and Process
.NET System Architecture
.NET Design Patterns
Security
Scalability
Availability
Availability
What Is High Availability?
The question you must ask yourself is:
How much downtime can my organization afford
without losing productivity, profits, sales, etc.?
It is a combination of people, process, AND
technology
Availability
How Much Availability Do I Need?
Understand the business need
Five nines (99.999% uptime) is 5 minutes of
downtime per year
Formulas for downtime:
% Uptime/year = (8760 - # of total hours down per
year)/8760
% Uptime/month = ((24 * # of days in the month) - #
of total hours down in that calendar month)/(24 * # of
days in the month)
% Uptime/week = (168 - # of total hours down in that
week)/168
Availability
How Do I Achieve High Availability?
It’s deceptively simple …
Plan and prepare
Deploy systems to create redundancy – this is the key
to high availability from a technology standpoint
Use more than one method – avoid a single point of failure
Test, test, test
Monitor on a continuous basis
Availability
Improved Availability with ASP.NET
ASP.NET has been designed with assumption
that failures will occur on systems
Designing for failure reduced fragility
Detects/recovers from common problems
Access violations, memory leaks, deadlocks
Preemptive cycling of applications
Time- and request-based settings
Net Result: Users should never think that an
ASP.NET application is down or unavailable
Conclusion
Follow design process
Understand the architecture and design
trade-offs
Study design patterns of other .NET applications
Build security into the overall design
Chose appropriate design patterns for scalability
and availability
Resources
Microsoft Solutions Framework
http://www.microsoft.com/business/micro
soft/mcs/msf.asp
Microsoft Operations Framework
http://www.microsoft.com/business/micro
soft/mcs/mof.asp
General .NET information
http://msdn.microsoft.com/net
.NET Framework SDK