10. Point-to-Point Integration
Specifically, linking every component to every other
component will require N(N-1)/2 physical connections
N = Total Number of Components in the Network
e.g: If there are 10 components in the network,
Total number of physical connections = 10 (10-1)/2
= 45
10
18. Message Oriented Middleware
(MOM)
●
●
●
This creates a loosely-coupled distributed system
Such a system can continue to function reliably,
without downtime, even when individual
components or connections fail
Examples:
●
IBM MQSeries, Sun JMS, Microsoft MSMQ
18
19. Messaging Systems - Benefits
●
Supports Remote Communications
●
Ability work as a message bus
●
Supports Asynchronous Communication
●
Supports Throttling (Controlling the rate at
which the receiver consumes the requests)
●
More reliable
●
Can be used for disconnected operations
●
Supports mediation
19
20. Messaging Systems - Issues
●
●
●
●
Complex Programming Model
Sequence Issues – There is no guarantee of
the message delivery sequence
All the transactions cannot be asynchronous.
(Airline booking system should be more
synchronous than asynchronous)
Not suited for syncing systems with big
chunks of data.
20
21. Most of the enterprise integrations are based on
message oriented design patterns
which are known as
Enterprise Integration Pattens
21
33. Lanka Gate: A Typical SOA
Environment
Portlet Applications
Application
Services
Citizens
Private Sector Companies
Credit Card
Payment Service
Mobile Portal
Country Portal
Private Sector
VPN
Lanka Gate
Lanka Gate
Mobile Service
Providers
Lanka Government
Network
Certificate
Authority
Services
Services
Services
Services
Application
Application
Application
Application
33
34. A typical SOA environment
●
Service Interfaces/ Contracts
●
Service Transparency
●
Service Composition
●
Service Registry or Publication
●
Service Governance
34
38. The Core Characteristics of SOA
3) Service Composition
–
There are two general types of composite services
●
Simple
●
Complex
–
Simple: Simply wraps one or more lowerlevel
services together into a more coarsegrained operation
–
Complex: (Work Flow Type BPM)
●
●
WSBPEL
Entry Point of invoking WSBPEL is usally a web
service
38
45. WS-Security
●
●
The same cryptography techniques (Confidentiality,
Integrity, Non-repudiation and Authentication) are
applied in the web services security stack as well
It basically provides a XML based Abstraction Layer
for the above established cryptography techniques
45
47. WS-Security
●
●
●
Transport level security is completely independent
of message level security.
For example, in order to have the message level
security, it is not required to have a HTTPS secured
message channel.
But if all you need to do is keep messages
confidential between point A and point B, using SSL
is perfectly sufficient
47
48. WS-Security
●
How does WS-Security handles Authenticity,
Integrity, Non-Repudiation and Confidentiality?
–
Security Tokens are used for Authenticity
–
XML Signature is used for Integrity and NonRepudiation
–
XML Encryption is used for Confidentiality
48
59. An Introduction
●
●
ROA consists of REST based web services
Resource Oriented services focus on distinct
data objects upon which a handful of basic,
standard operations can be performed
–
Retrieving the resources (GET)
–
Modifying the resources (POST)
–
Creating new resources (PUT)
–
Deleting resources (DELETE)
60. SOAP Web Services
Cons
Pros
●
●
●
●
Language, Platform and
Transport agnostic
Designed to handle in
distributed environments
●
●
More difficult and more
“heavy-weight” than REST
Harder to develop. Require
tools or frameworks
Better usage of WS*
standards
Built in error handling
features
●
Highly Extensible
●
Suitable for end-end security
60
61. REST Web Services
Cons
Pros
●
●
●
●
Language and Platform
agnostic
Much simpler to develop
than SOAP
Small learning curve. Less
reliance to tools/ frameworks
Unlike SOAP, no need of
having an additional
messaging layer
●
●
●
Not transport agnostic.
Supports only HTTP
transports
Only good at point-point
communication model
Lack of standards support
for security, policy, reliable
messaging, etc
61
64. API Management
●
●
●
API Gateway - To secure, manage, protect
and scale API calls
API Publisher – Enabling platform for API
Providers / developers
API Store – Enable service consumers to selfregister and discover existing APIs
64