Technical data
Enterprise Data Center Topology: Portal, Wireless, and Business Intelligence Applications
1-6 Advanced Topologies for Enterprise Deployments
The Oracle Internet Directory contains data for external and internal users. Oracle
Application Server Single Sign-On authenticates users based on the data in Oracle
Internet Directory.
You can install the OracleAS Metadata Repository and the Oracle Internet Directory in
a Real Application Clusters or Oracle Application Server Cold Failover Clusters
environment.
J2EE Business Logic DMZ
In this tier, you deploy and run your applications on J2EE and Web Cache instances.
The applications can access the business data in the customer database.
The number of J2EE and Web Cache instances and computers depend on the number
of applications that you are running and the number of users. You should have at least
two instances so that you can cluster them using OracleAS Clusters. Clustered
instances provide greater availability and scalability, and improve performance.
The J2EE firewall prevents Web servers (in the Web Server Tier DMZ) from directly
accessing the computers in this tier.
Intranet
This tier contains the computers that run enterprise processes, including databases
that contain the business data. The databases can be in a high availability environment
such as Real Application Clusters or Oracle Application Server Cold Failover Clusters.
Applications running in the J2EE Business Logic tier can access the databases. If Web
servers in the Web Server Tier DMZ become compromised, the intranet firewall
prevents the Web servers from accessing the entire corporate intranet.
1.4 Enterprise Data Center Topology: Portal, Wireless, and Business
Intelligence Applications
This deployment topology supports J2EE applications as well as applications that use
components in the Portal and Wireless, and the Business Intelligence and Forms
middle tiers. If you do not need these components, see Section 1.3, "Enterprise Data
Center Topology: J2EE Applications", which describes a topology that uses only the
components in the J2EE and Web Cache middle tier.
Target Users
This topology is intended for enterprises who have users internal as well as external to
the organization. Requests from external users go through firewalls.
Description
This topology (Figure 1–3) distributes Oracle Application Server components over
multiple computers and tiers. Access to the computers in each tier is guarded by
firewalls. This distributed topology enables you to scale the number of computers in
each tier (to increase performance and availability) without affecting computers in
other tiers. For example, if you discover a bottleneck in the computers running your
applications, you can add computers to the Web Server Tier DMZ and run Business
Intelligence and Forms middle tiers on them.