showcase_home

In a nutshell

In a competitive and dynamic  business environment as the current one, applications such as Supply Chain Management, ERPs, CRMs  and Business Intelligence have gained crucial importance but also helped create misalignment between architectures, unable to communicate with each other due to different protocols or languages.
In line with its vision of bringing application effectiveness to its customer base, Sunnyvale developed and launched Adapter-Logic Application (ALA): a fast and scalable Java-based multi-threaded adapter with a small footprint.

Adapter-Logic Application rapidly enables heterogeneus softwares, systems or architectures to exchange data even when they employ different communication protocols, languages or standards.


howitworks_thumb

How it works

Acting as a frontend component of non-integrable applications, ALA can receive requests via standard protocols and transform them into application proprietary language. Viceversa applications that use proprietary protocols can retrive data from external contexts thanks to the translation operations made possible by ALA.
Configurations are done with an user-readable XML file that allowes system administrators to decide what frontend interfaces must ALA activate during boot and what backend systems have to be integrated.
The result is a complete integration of all these systems, while providing applications vital to the business of the company, face major difficulties in modern service-oriented architecture (SOA) where, for example, the data exchange protocol is HTTP.


Scalability

To improve scalability and connect as many platform as possibile, Sunnyvale ALA uses pluggable Controllers and Connectors.

Controllers are components specifically designed to handle the clients requests.
Sunnyvale developed a Controller for the most used application protocols around: HTTP, JMS, TIBCO Rendezvous, SAP R/3s RFCs and IDOCs, raw socket, CORBA, Platform Symphony etc.
As soon as a Controller receives calls, it normalizes the invocation data as Document Object Model and pass it to the next player in the team, the  A.L.A. Router whose its responsiblility is the A.L.A. configuration management, service routing, input data validation, data transformation where required, and connector instantiation.

Connectors are the back-end sockets created by a separate thread to avoid any backlog problems and directly connected to the target application or system.

By combining controllers and connectors, ALA's end-users create services that integrate and work with a wide range of different target architectures.

 


articlesEasy installation

Adapter-Logic Application comes with an easy, Windows-like, cross-platform, application installer that helps deploy the product in a few clicks.
The straightforward installer is a pure java application that runs on every operating system with a java virtual machine previously installed.
If your host system is not equipped with graphical environment, you can always install the software using a command line wizard that makes the installation process even simpler.

 





Small footprint

To ensure compatibility with legacy systems, Adapter-Logic Application has been engineered to consume a scarse computational resources in term of disk space, memory allocation, input/output operations and CPU usage.
This fantastic feature allows customers to deploy ALA also on old generation servers.

Where system performances are crucial and have to be monitored, administrators can leverage JMX technology to connect to Adapter-Logic Application and have a complete real-time snapshot of application activity.

 

 

 

High availability and load balancing

Entering the enterprise market means also the challenge that requires high reliability of a product, in other words it is necessary to ensure the customer a  redundant software that protects him from hardware accidents, network failure or malfunction of the host server.
ALA implements mechanisms for high availability at Controller level, which are capable of operating in cluster mode "active / passive" or balancing the load "active / active" according to the protocol they run.

In the "active / active" cluster mode, a balancer is deployed in front of multiple ALA instances, allowing them to divide the workload, on the understanding that if an instance would be less, the remaining will be able to handle requests totally transparent to the client.

In the "active / passive" cluster configuration, it is possible for system administrators to replicate the same Controller's configuration across multiple ALA instances thus forming a "Cluster Group". Within the same group, only one Controller, positioning itself as "Active", will accept calls from clients and the status of all Controllers is shared at regular intervals using protocols such as UDP, TCP and IP Multicast (configurable).
A possible failure of the active Controller will be detected by others and one, the first inside the activation queue, would take its place declearing itself as "Active" in less than a fraction of a second and continuing to accept requests.

Through these two technologies, Adapter-Logic Application won the most important challenge: knowing how to ensure service delivery in areas where even the slightest failure would result in substantial damage to the business of the company.