• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Ron McLeod
  • Paul Clapham
  • Tim Cooke
  • Jeanne Boyarsky
Sheriffs:
  • Rob Spoor
  • Devaka Cooray
  • Liutauras Vilda
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Tim Moores
  • Mikalai Zaikin
Bartenders:
  • Piet Souris

Passed SCEA part 2/3

 
Ranch Hand
Posts: 44
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Yesterday i got my result for SCEA part 2/3 : 96%

.......
Grade: P
Score: 96
This report shows the total points that could have been awarded in each section and the actual amount of points you were awarded. This information is provided in order to give you feedback on your relative strengths on a section basis. The maximum number of points you could have received is 100, minimum to pass is 70.

Class Diagram (44 maximum) .......................... 43
Component Diagram (44 maximum) ...................... 41
Sequence/Collaboration Diagrams (12 maximum) ........ 12


Summary of my submission:
UML version: 2.0, modeling tool: trial version of Sparx Enterprise Architect 5
Class diagram: 23 classes, only entity objects, don't changed the BDOM, extented some concepts: Customer, Equipment, Seat, Flight...tried to separate what may change from what is stable...
Component diagram (very clean): 33 components (all depencencies stereotyped and a lot of notes, showed only parent components for composite components...)
Sequence diagrams: components based
Documentation: 8 pages:
-Introduction: my vision of the requirements (summary of "must have" requirements: System should provide, allow or meet....)
-Assumptions: interviews, BDOM, use cases...
-Architectural choices: tiers, local vs distributed, session management, transaction model,QoS, security...
-Design choices: J2EE components, modules, J2EE design patterns...
-Glossary

Thanks for all ranchers

Akar
SCJP , SCWCD, SCBCD, ICED, IBM 340, SCEA
 
Ranch Hand
Posts: 498
Eclipse IDE Firefox Browser Fedora
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Congrats Akar, great score!



Regards,
 
Ranch Hand
Posts: 162
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi
What a score!!! Wow can I get that!!!

Congrats!
 
Ranch Hand
Posts: 1902
Hibernate Spring Java
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Congrats! Great showing and good job.
 
Ranch Hand
Posts: 97
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Good job.
That's an awesome score.
 
Ranch Hand
Posts: 154
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Did you use the existing framework or your own ?
How about Authentication and Authorization in your solution?
 
Akar Rafidj
Ranch Hand
Posts: 44
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Chao,

For MVC, i used my own framework but you can use any existing framework: WAF, Struts, JSF...J2EE recommandation (J2EE blueprint) is to use so existing frameworks, advantages: productivity, robustness, flexibility and extensibility, but don't try to kill a fly with a machine gun.
For security, i'll recommand studying an IBM redbook: "WebSphere V6: Security Handbook", free download from http://www.redbooks.ibm.com/
It's really excellent (almost chapters 5 through 8) with good samples. developed concepts may be applied to any J2EE server.
Hope this helps
Akar
 
Ranch Hand
Posts: 198
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Congrats!!!
 
chao cai
Ranch Hand
Posts: 154
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Did you discribe your security solution in detail,Even include in component diagram or sequence diagram?
 
Ranch Hand
Posts: 295
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Akar,

Congrats on the excellent score!

Would you be able to share how you have used the Mileage Account in FBN? Did you access the FMS database directly?

Thanks.
 
Ranch Hand
Posts: 196
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Exellent job!
 
chao cai
Ranch Hand
Posts: 154
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
thanks.
Did you include the DAO ,EJB, Bussiness Delegate class in you class diagram?
Can you tell me your assumption's structure
 
Ranch Hand
Posts: 333
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Congrats ...
 
Ajai
Ranch Hand
Posts: 198
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Akir,

i have already gone thru redbook chaps on security.

JAAS is programmatic security .Can I implement JAAS on stand alone client in conjunction with declarative EJB security or I will have to call EjbContext methods getCallerP in my EJBs to perform authorization (programmatic EJB security).

Did you specify the components which will be protected/un protected or just the approach used will suffice.

Thanks
 
Greenhorn
Posts: 14
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Great score!

Can you share your PART III exam experience....?

How lengthy was your answer ...?

Thanks
 
Akar Rafidj
Ranch Hand
Posts: 44
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

Chao
Did you discribe your security solution in detail,Even include in component diagram or sequence diagram?
--------------------



No, only what solution i selected for each client type and how credentials are exchanged between instance servers (if your architecture is distributed)

Would you be able to share how you have used the Mileage Account in FBN? Did you access the FMS database directly?
--------------------
Steven


It's up to to choose the solution which meets all requirements,you should take in mind easy to use, performances,security, reliability, readonly or read/write requests...For the assignment i think that you have the choice between screen scraping and JDBC

Chao
Did you include the DAO ,EJB, Bussiness Delegate class in you class diagram?
Can you tell me your assumption's structure
--------------------


My class diagram was neutral, only business objects. Read my first post for my documentation structure.In the assumptions chapter i tried to refine and clarify the use cases (without breaking the requirements), uses cases should be compatible,i wrote also what i understood from the interviews and the BDOM.

Ajail
i have already gone thru redbook chaps on security.

JAAS is programmatic security .Can I implement JAAS on stand alone client in conjunction with declarative EJB security or I will have to call EjbContext methods getCallerP in my EJBs to perform authorization (programmatic EJB security).

Did you specify the components which will be protected/un protected or just the approach used will suffice.

Thanks
--------------------


Yes you can when JAAS is activated on the server, at application installation step, you map security roles to users/groups. You may use the default server implementation of JAAS or your own and you configure the server to use it, but i think that you don't have to go at this level of details. If your standalone application runs inside a J2EE client container and you configure CSIv2 standard, you have nothing to add. Usually getCallerPrincipal and isCallerInRole are used when you want a fine control on method execution; for example you may have constraint on a method execution : "if condition == true OK for the role defined in the security-role-ref element".You may also use getCallerPrincipal if you want to monitor and log travel agents activities.
The approach used will suffice

Steve
Can you share your PART III exam experience....?
How lengthy was your answer ...?



Don't worry about part III, i recommand to study carefully your submission before taking the test, your answers should be coherent with what you wrote in your documentation

Akar
[ October 21, 2005: Message edited by: Akar Rafidj ]
 
Giju George
Ranch Hand
Posts: 333
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Akar,
Did you show different tiers in component diagram.. I mean did u physically seperate your components in diff tiers ??
 
Akar Rafidj
Ranch Hand
Posts: 44
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

Originally posted by Giju George:
Hi Akar,
Did you show different tiers in component diagram.. I mean did u physically seperate your components in diff tiers ??



I followed a standard, my components were aligned from left to right:
"Web/application client tier--->Business tier---->Integration tier ---->EIS tier"
The different tiers are obvious

Akar
 
Ranch Hand
Posts: 107
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi and congratulations!!!

I'm studying for SCEA Part I, and it's good to know about people geting the Part II. I'll need your help when I have concluded this phase.

Congrats again... and keep walking.

Regards,
Wilder C. Rodrigues
SCAJ, SCPJ, SCDJ, SCWCD, SCBCD, SCMAD.
Preparing for SCEA, Part I
 
Ranch Hand
Posts: 31
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Congratulations Akar!!

Could you please answer the following

In the Component Diagrams given in Mark Cade only the 'dependency' relationship between
various components is shown.In case we need to show the 'generalization'(inheritance) or
'realization' relationships then how do we show them ?

In case we dont show these relationships in the component diagram, then in which diagram
do we show them ?

Note - In the above I am referring to the components and not the various classes in
the 'class diagram'.

Thanks
Pankaj
 
Steven Wong
Ranch Hand
Posts: 295
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Akar,

Can you share your approach on how you handled the Alternate Flow in Price Itinerary?
It seems that the basic flow is the same - except for the return of additional payment.
Was wondering if I could just use the same flow for the alternate flow.
 
Greenhorn
Posts: 12
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi Akar,

"For security, i'll recommand studying an IBM redbook: "WebSphere V6: Security Handbook"

I searched but could not find a redbook with the above title. The closest one I got is: "IBM WebSphere V5.0 Security WebSphere Handbook Series". Is this the book that you recommended? If not, can you kindly provide a url for it? Thanks.
 
reply
    Bookmark Topic Watch Topic
  • New Topic