The middle and front tiers have to be downloaded and built in order to use the CMW. The files needed to build these programs are here -- direct.tar.bz2 -- sha256 checksum: 5a02cece7c71535b655d38e676d146f5dda1fb7dc1f61a17cfa752271a6919e0.
An account is needed to use the CMW. To get an account send an email to support@webEbenezer.net and include a password between 10 and 70 characters long that you want for your account. Also include your public ssh key in the email. We'll reply by giving you an account number. After receiving your account number, update your cmwAmbassador.cfg file accordingly.
Links to some of the files in the archive:
cmwAmbassador.cc middle tier.
cmwAmbassador.cfg input file read by the ambassador.
direct.cc front tier.
cmw.req input file relayed to the ambassador.
remote.mdl middle file that cmw.req refers to.
remote_messages_middle.cg.hh CMW output based on cmw.req and remote.mdl.
remote_messages_middle.cg.cc CMW output.
Linux specific files:
Windows specific files:
Why use a 3-tier architecture?
Originally we used a 2-tier system. We switched to a 3-tier architecture for performance, network administrative and security reasons. In the 2-tier architecture, the front tier had to establish a TCP connection to the back tier each time it ran. In the 3-tier architecture, the middle tier keeps a TCP connection with the back tier and uses it to serve front tier instances. The front tier communicates with the middle tier using UDP.
In the 2-tier architecture, every user had to be given permission to get through your firewall in order to communicate with the remote back tier. With the 3-tier architecture, all requests are mediated by the ambassador so only the machine the ambassador is running on needs attention from a network administrator.