01 - Understanding Microsoft BackOfficeby Greg Sullivan
Computer users have longed for more efficient and convenient ways to share information since before the advent of desktop computing devices. The eventual connection of personal computers into computer networks represented an important step in the evolution of computing process models. Since then, the focus of information technology has shifted to the effective management of distributed computers, data, and processes. Personal computers were accepted in enterprise computing environments because of the information processing power they offered, the personal workgroup empowerment they enabled, and the independence from centralized information systems organizations they accommodated. This claim is supported by the measurable success of companies such as Microsoft, Intel, Novell and Compaq. Many of the successful software companies took full advantage of this distribution of computing power by creating tools to place into users' hands. The personal productivity tools bundled in Microsoft Office (Excel, Word, PowerPoint, and Access) are good examples. With power increasingly distributed across the computing enterprise, it became essential to find an effective way to harness the full capability of all computers within the organization. Microsoft BackOffice is the glue that enables an enterprise to effectively leverage the full power of computer processors while providing the most benefit to information users in a controlled and secure environment. As an introduction to understanding Microsoft BackOffice, this chapter acquaints you with the following:
Figure 1.1 depicts the Microsoft BackOffice products and their primary roles in the information technology enterprise. Fig. 1.1 - The Microsoft BackOffice suite of products is comprised of six stand-alone server applications which coexist in an integrated package. Each product is designed to be competitive on its own, in addition to integrating into a heterogeneous computing environment. Consequently, these individual products leverage the synergy of Microsoft BackOffice as a single package. Microsoft BackOffice products contain server-based components, as well as software that is installed on client personal computers (PCs). Some of the products include substantial capabilities that are optional or only appropriate in particular environments or networks. In this respect, Microsoft BackOffice is a much more sophisticated product than a typical desktop application such as Microsoft Word. In addition to the individual components, the Microsoft BackOffice CD includes an integrated installation utility. This utility will help you select the options you need for your server, and then make recommendations on the type of computer you need to support those options. This book is about Microsoft BackOffice 2.0, which is the third release of the Microsoft BackOffice product package. Microsoft BackOffice 1.0 was first released in the third quarter of 1995. An upgrade was subsequently packaged as Microsoft BackOffice 1.5 and released in the fourth quarter of 1995. Microsoft BackOffice 2.0 contains these individual products:
Windows NT is sometimes referred to as "industrial strength" Windows. Two versions of Windows NT are available for purchase. The first is known as Windows NT Workstation. Purchase this version if you choose to use Windows NT on a stand-alone computer. The other version, Windows NT Server, should be purchased if you are using it as a network operating system or need an individual workstation to take advantage of the extra power of Windows NT Server.
Table 1.1 illustrates the differences between Windows NT Workstation and Windows NT Server.
The differences between Windows NT Workstation and Windows NT Server are significant. The retail version of Windows NT Server supports more processors than the retail version of Windows NT Workstation. This implies Windows NT Server is suitable for users who require, or prefer, more processors. Windows NT Server is further distinguishable from Windows NT Workstation in that it is designed to share resources with large numbers of users. It provides connectivity to remote networks via Remote Access Server (RAS) as well as connectivity to other networks such as Novell, Digital Pathworks, and Apple.
The Microsoft Internet Information Server provides the same functionality base you would expect from an Internet product including the following:
Many organizations today are gaining a presence on the Internet by creating their own WWW pages and exposing them to the Internet via a WWW server. The Microsoft Internet Information Server allows organizations to build WWW pages in the traditional manner using Hypertext Markup Language (HTML). Additionally, the Microsoft Internet Information Server supports the operation of multiple WWW servers on the same physical computer in cases where more than one WWW page is appropriate. To address security concerns, Microsoft incorporated support for the Secure Sockets Layer (SSL), which is based on the widely accepted RSA public-key cryptography system. The Microsoft Internet Information Server also supports Private Communication Technology (PCT) security. PCT provides the same level of security as SSL, but is more efficient. In addition to SSL and PCT, Microsoft has worked with major credit card companies to develop a secure forum for financial transactions over the Internet. This is known as Secure Transaction Technology (STT) and will be available in a future release of the Microsoft Internet Information Server. CGI adds functionality to WWW pages by allowing developers to build customized modules that can be loaded and executed based on the actions of WWW page visitors. This allows WWW page creators to enhance a WWW page beyond the restrictions of HTML programming. The Microsoft Internet Information Server supports CGI. The Microsoft Internet Information Server also comes with an Internet Services Application Programming Interface (ISAPI). This is one of the most important features of this product because it allows developers to create Dynamic Link Libraries (DLLs) for execution by the WWW server. As such, ISAPI provides much the same functionality as CGI. However, ISAPI is far more efficient because the DLLs load into memory at WWW server run time as opposed to on demand. Also, DLL execution is faster because a separate process is not spawned as is the case with CGI. One of the most powerful uses of the Internet is to connect the outside world with internal information. Subject to the appropriate security, this allows an organization to interact with the world via the Internet such as a customer placing an order on your WWW page and having the order placed directly into your order entry database. ISAPI makes this, as well as connectivity to other application servers, possible.
Microsoft Exchange is truly an industrial strength messaging system. It replaces the Microsoft Mail product line. Microsoft Exchange Server was redesigned from the bottom up to overcome many of the limitations of Microsoft Mail.
Microsoft BackOffice 2.0 contains Microsoft SQL Server 6.0. However, Microsoft SQL Server 6.5 was released shortly after the release of Microsoft BackOffice 2.0. Therefore, the section of this book that covers Microsoft SQL Server also indicates specific 6.5 features. A margin icon is used to point out those issues pertaining to Microsoft SQL Server 6.5.
SMS simplifies the administrative tasks associated with these important functions. Perhaps the greatest value of Microsoft SMS is in the "hidden savings" to the organization. Today's information systems managers are plagued by many hidden costs associated with managing large networks of PCs. Some of the issues that drive up the network costs, which Microsoft SMS will help to reduce include the following:
Fig. 1.2 - Each Microsoft BackOffice product provides an application service to the users of your enterprise network. A great deal of synergy exists among the individual BackOffice products; this, in fact, is an important design goal of Microsoft BackOffice. The individual products are based upon popular, modern computing concepts. Understanding the principles upon which Microsoft BackOffice is built is essential to successful implementation of the Microsoft BackOffice components. To this end, it is important to see how Microsoft BackOffice works in the world of client-server computing, the role it plays in an enterprise network, and the value it brings to your computing enterprise.
Fig. 1.3 - In the host-based process model all processing occurs on the host. In the host-based process model, all processing occurs on the host. Traditionally, this means the mainframe or minicomputer contained all the computing power of the organization. Terminals that connect users to the mainframe or minicomputer are incapable of processing data because these devices do not contain computer processors. Consequently, they became known as dumb terminals. Today, it is common for desktop computer users to connect their personal computers to a host computer. Because the personal computer does contain a processor, it is not referred to as a dumb terminal; however, it can be configured to behave as a dumb terminal by means of a terminal emulation program, which enables computers with processors to perform the duty of a dumb terminal. Consequently, today's personal computers are allowed to participate in the host-based process model.
Fig. 1.4 - In the shared resource process model all processing occurs on the workstations. The advantage of the shared resource process model is it allows computer users to share expensive devices. Hardware components such as printers, disk drives, and modems become more affordable because their usage can be distributed across a greater number of computer users. Network operating systems, such as Novell NetWare, became popular by exploiting the need to share these devices.
Client-server computing is the distribution of processing across the computing enterprise. Software applications are constructed in parts so as to execute a portion on the desktop personal computer (the "client" of client-server) and the remainder on some sort of powerful computer shared by many users (the "server" of client-server). Figure 1.5 offers a graphical representation of the client-server process model. Fig. 1.5 - In the client-server process model processing occurs where it best fits, whether it be on the client, the server, or both. True client-server computing is message-based and event-driven. Message-based implies that a client sends a request to a server and receives a response. Event-driven means an event occurs that triggers the creation and sending of a message (such as a data value changing). Processing can occur on the clients and the servers in this scenario. Microsoft has long participated in the client-server phase of the process model evolution. Their operating systems allow client PCs to connect with server computers and pass messages back and forth. Microsoft Office applications form the basis for the client side of client-server computing by providing tools that enable desktop processing of enterprise information. Microsoft development tools permit developers to build their own client-server applications. Recently, Microsoft integrated Microsoft Office applications with their development tools. This provides computer users a wide range of possibilities in managing information.
Microsoft BackOffice products address the server side of client-server, with each product providing a specific set of services. A design goal of Microsoft BackOffice is to take full advantage of the client-server process model. This has been accomplished in such a way as to provide a smooth transition into subsequent phases of the process model evolution.
Today, we distinguish data from information. Computer users assemble data on their desktops for the purpose of making decisions. Data is assembled into meaningful groups to support these thought processes. The assimilation of data from around the network onto the desktop creates information. The ability to process information, as opposed to bytes of data, now has become the predominant need of computer users. Microsoft has addressed the need to assimilate, process, and analyze information by introducing the document-centric approach to desktop computing. In this approach, information is retained as an object. These "information objects" are accessed by the appropriate tool or set of tools. An information object may contain sections appropriate for manipulation by a spreadsheet, with other sections accessible by word processors or database management tools. Although the client-server process model represents an effective way to distribute processes, Microsoft BackOffice also facilitates the effective distribution of data, software, and information objects. Microsoft BackOffice makes possible the effective sharing of data in a computing enterprise across legacy systems, client-server systems, and new distributed systems, resulting in the convenient and transparent availability of information objects throughout the organization. Microsoft refers to the concept of connecting all types of systems for the purpose of processing information (as opposed to data) as Information networking. This definition of an information network directly maps to the product strategy of Microsoft BackOffice. While it may seem a bit self-fulfilling at first, it should not diminish the value of this important concept.
Microsoft Office and Microsoft BackOffice allow Microsoft customers to take full advantage of the information networking revolution. The individual products of Microsoft BackOffice address information networking as indicated by distributing the following:
Information networking is based on sound, proven technology principles such as object-oriented technology. Microsoft supports the distribution of software components with their Common Object Model (COM). COM is the base object model upon which all Microsoft operating systems are built. Furthermore, Microsoft pledges to provide interfaces compliant with industry standards as they emerge. Built upon COM is Microsoft's object linking and embedding (OLE). OLE defines how data will be combined on the desktop into meaningful information. With OLE, different types of data can be combined into a single document; this is known as document-centric computing. Today document-centric computing is limited to the computing desktop. As software and information objects become distributed, OLE will reach across the network.
The unified installation for Microsoft BackOffice products results in less installation headaches. An integrated security model means users have fewer passwords to remember and only logon once to access all Microsoft BackOffice services. To demonstrate the ease with which users can be administered, figure 1.6 shows a User Manager dialog box in which user parameters, including security, are set by an administrator. Fig. 1.6 - Users on Microsoft BackOffice networks are created through the Windows NT Server User Manager dialog box. Users can also log on to the information network as a whole, as opposed to having to log on to individual server applications.
Most important is the value Microsoft BackOffice offers in leveraging the future. Microsoft has painted a clear vision in defining information networking as the goal. Microsoft BackOffice launches the computing world into the future, providing the next step beyond client-server computing.
|