A secondary element of building transaction-protected applications is creating the administrative infrastructure around the application necessary to support a transaction environment.
There are four components to this infrastructure:
Copyright Sleepycat Software