Tuesday, May 15, 2018

Microsoft Transaction Server (MTS)

Microsoft Transaction Server (MTS) provides a reliable environment for running applications. Besides, it provides error recovery protection for all transactional applications running on Microsoft® Internet Information Server version 4.0 (HS.)
Microsoft Transaction Server (MTS) is designed for flexibility, providing businesses with many deployment choices based on their existing systems and continuously changing requirements.

Location Transparency

MTS application components are location transparent. It is unnecessary for the client of a component to know the physical location of the component in the file system or on the network. If this knowledge is unavailable to the client, it forces a consistent approach for interaction with components.
The same exact components can be deployed so that all users can share them. This means that only one set of source code needs to be supported for multiple configurations. This lowers the costs associated With maintaining code and it increases deployment options.
Note It is a good idea to place business objects in a central location on the network. Objects can be shared among applications, and unit testing can be conducted before any components are deployed. Maintenance costs are decreased because changes to rules only occur at a single point.

Integration with DOOM

MTS uses the distributed version of Component Object Model (COM) for component-to-component communications across a network. DCOM is a fast, native object transport for Windows NT and Microsoft Windows 95 and is licensed as an open-industry standard to technology vendors through the Open Group.

Database and Resource Manager Flexibility

MTS is designed to work with any resource manager, including relational databases, file systems, and image stores, that supports a transactional two-phase commit protocol. This enables businesses to deploy high-performance applications on MTS that take advantage of existing investments in UNIX and mainframe data stores.

Integration with Microsoft SQL Server

MTS is tightly integrated with Microsoft SQL Server™ through support of the OLE Transactions two-phase commit protocol, and through common use of the Distributed Transaction Coordinator.

Support for Clients from Win32 to HTML

Microsoft Win32 "fat" clients and HTML "thin" clients can access MTS applications at the same time. This provides businesses with an unlimited number of client deployment options for MTS applications.

No Client Footprint

MTS does not require any specific code or libraries to operate on a client system that accesses MTS applications; thus lowering the cost and complexity of distributed applications.

Application Partitioning

Administrators can easily partition an application across 'multiple servers by deploying an application NTs components into several packages, with each package running on its own server. This improves system fault isolation, while increasing application performance and scalability.

Automatic Support for Transactions

MTS automatically provides transaction support to applications running on the server, providing a reliable failure isolation and recovery mechanism. Transaction support is transparent to the application programmer. This is a considerable improvement compared to previous generations of transaction processing systems, where developers had to program low-level operation control primitives into their applications explicitly.

Process Isolation

Using MTS packages developers and administrators can easily isolate components, so they operate in their system process. It provides an additional level of failure isolation and data protection.
When a component registered with MTS, it runs as a separate process. The InProcServer32 key from the code is replaced with LocalServer32. It specifies Mtx.exe as a surrogate for the in-process server. Acting as a surrogate allows MTS to provide a wrapper for the real component.

Automatic Distributed Security Service

MTS provides a distributed security service integrated with Windows NT security. It allows developers to prevent unauthorized access to business applications, even if the application includes components purchased from third parties.

No comments:

Post a Comment

Featured on Text Engineer

How to Select A Web Hosting Provider?

Most of us face difficulty choosing when we have too many options. Well, talking about IDEAL, do you believe there is IDEAL web host...