SlideShare a Scribd company logo
1 of 13
Cloud Computing: 12
Cloud services requirements in SOA
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Cloud Service Management
Service in SOA and Cloud
• A service is a self-contained unit of software that performs a
specific task.
• It has three components: an interface, a contract, and
implementation.
– The interface defines how a service provider will perform
requests from a service consumer,
– the contract defines how the service provider and the
service consumer should interact,
– the implementation is the actual service code itself.
Business Services
• Business Services are services that perform specific
business functions and are required for the successful
completion of a business process.
• They might also be called Application Services since
they are used to develop composite services and
business applications that automate business
processes.
• For example, a retail enterprise might have an
– “Inventory Service,”
– “Customer Management Service,” and
– “Shipping Service” in its repository of business services.
Business Services
• Business Services can be further divided into
• Entity Services, Capability Services, Activity Services, and Process
Services.
• Entity Services are the data-centric components of the enterprise
system and are responsible for exposing the information stored in
backend databases. They can be thought of as the “nouns” of the
business process.
• Capability Services and Activity Services, meanwhile, are the
“verbs.” They are the action-centric components that implement
business capabilities.
• Rounding out the business services category are Process Services,
which contain the business logic and couple the Entity Services and
Activity and Capability Services via service orchestration to create
composite business services.
Infrastructure Services
• The other main category of services is Infrastructure Services, which are
part of a centrally managed infrastructure component such as an
Enterprise Service Bus (ESB).
• Infrastructure Services provide the technical functionality necessary for
the implementation of business processes in cloud, but do not directly add
business value.
• Examples of Infrastructure Services include SaaS Integration Services,
Authentication Services, Event Logging Services, and Exception Handling
Services.
• Infrastructure Services are further divided into Communication Services
and Utility Services.
• Communication Services are mainly concerned with transporting
messages both within and without the enterprise
• Utility Services provide other technical capabilities not related to message
transfer.
7
What is an Enterprise Service Bus
(ESB)?
• An enterprise service bus is an infrastructure used for
building compound applications
• The enterprise service bus is the glue that holds the
compound application together
• The enterprise service bus is an emerging style for
integrating enterprise applications in an
implementation-independent fashion
• An enterprise service bus can be thought of as an
abstraction layer on top of an Enterprise Messaging
System
8
Key Characteristics of an ESB
• Streamlines development
• Supports multiple binding strategies
• Performs data transformation
• Intelligent routing
• Real time monitoring
• Exception handling
• Service security
Services Positioning in SOA in layers
• To get a better sense of the role of services in SOA, you can
think of SOA in terms of abstract layers:
• Enterprise Layer
• Process Layer
• Service Layer
• Component Layer
• Object Layer
Enterprise Application Integration
EAI, short for “enterprise application integration,” is a
framework that makes use of software and computer systems
to enable data integration across applications within a single
organization, while also simplifying business processes among
connected applications and data sources.
There are three main types of EAI:
• The Presentation Integration Model
• The Data Integration Model
• The Functional Integration Model
12
EAI Limitations
• An EAI can be a tightly coupled solution
• An EAI can be location-specific
• An EAI can be based on proprietary transport
technology
Asssignment
• What is a service in Service oriented
Architecture
• Briefly discuss the concept of cloud service
management

More Related Content

What's hot

Cloud management (IBM)
Cloud management (IBM)Cloud management (IBM)
Cloud management (IBM)Vivek Trivedi
 
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture  - Overcoming HIPAA Challenges - Click SoftwareCloud Service Architecture  - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture - Overcoming HIPAA Challenges - Click SoftwareIsrael AWS User Group
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing OverviewShylaja Balaji
 
Managed Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil GasManaged Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil GasJeff Holden
 
Vuzion - Building A Profitable Cloud Managed Service Business
Vuzion - Building A Profitable Cloud Managed Service Business Vuzion - Building A Profitable Cloud Managed Service Business
Vuzion - Building A Profitable Cloud Managed Service Business Vuzion
 
Presentation cloud management
Presentation   cloud managementPresentation   cloud management
Presentation cloud managementxKinAnx
 
Cloud Services Corporate Presentation
Cloud Services Corporate PresentationCloud Services Corporate Presentation
Cloud Services Corporate PresentationVijay Vasandi
 
5 essentials for managing hybrid cloud (2)
5 essentials for managing hybrid cloud (2)5 essentials for managing hybrid cloud (2)
5 essentials for managing hybrid cloud (2)Heidelberg India
 
Digital Integration Hub - Maximise Your APIs
Digital Integration Hub - Maximise Your APIsDigital Integration Hub - Maximise Your APIs
Digital Integration Hub - Maximise Your APIsDaniel Toomey
 
7 Innovations That Will Transform IT Operations
7 Innovations That Will Transform IT Operations7 Innovations That Will Transform IT Operations
7 Innovations That Will Transform IT OperationsVistara
 
Transform IT Operations with CSC
Transform IT Operations with CSCTransform IT Operations with CSC
Transform IT Operations with CSCAmazon Web Services
 
Cloud and big data
Cloud and big dataCloud and big data
Cloud and big dataBALAJIK155
 
iPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergenceiPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergenceRaveendra Babu Darsi
 
Informatica Cloud: Enterprise-Class Data Integration as a Service
 Informatica Cloud: Enterprise-Class Data Integration as a Service Informatica Cloud: Enterprise-Class Data Integration as a Service
Informatica Cloud: Enterprise-Class Data Integration as a ServiceDarren Cunningham
 

What's hot (20)

Cloud management (IBM)
Cloud management (IBM)Cloud management (IBM)
Cloud management (IBM)
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture  - Overcoming HIPAA Challenges - Click SoftwareCloud Service Architecture  - Overcoming HIPAA Challenges - Click Software
Cloud Service Architecture - Overcoming HIPAA Challenges - Click Software
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
 
Managed Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil GasManaged Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil Gas
 
Vuzion - Building A Profitable Cloud Managed Service Business
Vuzion - Building A Profitable Cloud Managed Service Business Vuzion - Building A Profitable Cloud Managed Service Business
Vuzion - Building A Profitable Cloud Managed Service Business
 
Top Cloud Computing Interview Questions
Top Cloud Computing Interview QuestionsTop Cloud Computing Interview Questions
Top Cloud Computing Interview Questions
 
Presentation cloud management
Presentation   cloud managementPresentation   cloud management
Presentation cloud management
 
Cloud Services Corporate Presentation
Cloud Services Corporate PresentationCloud Services Corporate Presentation
Cloud Services Corporate Presentation
 
5 essentials for managing hybrid cloud (2)
5 essentials for managing hybrid cloud (2)5 essentials for managing hybrid cloud (2)
5 essentials for managing hybrid cloud (2)
 
Digital Integration Hub - Maximise Your APIs
Digital Integration Hub - Maximise Your APIsDigital Integration Hub - Maximise Your APIs
Digital Integration Hub - Maximise Your APIs
 
Teodor's Accreditation
Teodor's AccreditationTeodor's Accreditation
Teodor's Accreditation
 
7 Innovations That Will Transform IT Operations
7 Innovations That Will Transform IT Operations7 Innovations That Will Transform IT Operations
7 Innovations That Will Transform IT Operations
 
Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101
 
Transform IT Operations with CSC
Transform IT Operations with CSCTransform IT Operations with CSC
Transform IT Operations with CSC
 
Cloud and big data
Cloud and big dataCloud and big data
Cloud and big data
 
iPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergenceiPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergence
 
cloud computing tools
cloud computing toolscloud computing tools
cloud computing tools
 
Informatica Cloud: Enterprise-Class Data Integration as a Service
 Informatica Cloud: Enterprise-Class Data Integration as a Service Informatica Cloud: Enterprise-Class Data Integration as a Service
Informatica Cloud: Enterprise-Class Data Integration as a Service
 
Infrastructure-as-a-Service (IaaS)
Infrastructure-as-a-Service (IaaS)Infrastructure-as-a-Service (IaaS)
Infrastructure-as-a-Service (IaaS)
 

Similar to Cloud computing 12 cloud services requirements in soa

Enterprise Service Bus
Enterprise Service BusEnterprise Service Bus
Enterprise Service BusHamed Hatami
 
OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)Colin Bell
 
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...ecosio GmbH
 
Clearly Defining what is a (SOA) Business Service? (as of 2010)
Clearly Defining what is a (SOA) Business Service? (as of 2010)Clearly Defining what is a (SOA) Business Service? (as of 2010)
Clearly Defining what is a (SOA) Business Service? (as of 2010)Akiva Marks
 
CMAD Group Workbook 6 SOA
CMAD Group Workbook 6 SOACMAD Group Workbook 6 SOA
CMAD Group Workbook 6 SOAAlexander Doré
 
Soa Overview
Soa OverviewSoa Overview
Soa OverviewTerry Cho
 
Soa 21 enterprise soa architecture
Soa 21 enterprise soa architectureSoa 21 enterprise soa architecture
Soa 21 enterprise soa architectureVaibhav Khanna
 
Introduction to Enterprise Service Bus
Introduction to Enterprise Service BusIntroduction to Enterprise Service Bus
Introduction to Enterprise Service BusMahmoud Ezzat
 
Service Analysis And Design
Service Analysis And DesignService Analysis And Design
Service Analysis And DesignRody Middelkoop
 
Integration with dynamics ax 2012
Integration with dynamics ax 2012Integration with dynamics ax 2012
Integration with dynamics ax 2012Ali Raza Zaidi
 
Private cloud reference model ms
Private cloud reference model msPrivate cloud reference model ms
Private cloud reference model mschrisjosewanjira
 
Unit 2 -SOA design
Unit 2 -SOA designUnit 2 -SOA design
Unit 2 -SOA designssuser3a47cb
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmedsaifam
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecturegulimran
 
Introduction to SOAP/WSDL Web Services and RESTful Web Services
Introduction to SOAP/WSDL Web Services and RESTful Web ServicesIntroduction to SOAP/WSDL Web Services and RESTful Web Services
Introduction to SOAP/WSDL Web Services and RESTful Web Servicesecosio GmbH
 

Similar to Cloud computing 12 cloud services requirements in soa (20)

Enterprise Service Bus
Enterprise Service BusEnterprise Service Bus
Enterprise Service Bus
 
OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)
 
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
 
Clearly Defining what is a (SOA) Business Service? (as of 2010)
Clearly Defining what is a (SOA) Business Service? (as of 2010)Clearly Defining what is a (SOA) Business Service? (as of 2010)
Clearly Defining what is a (SOA) Business Service? (as of 2010)
 
CMAD Group Workbook 6 SOA
CMAD Group Workbook 6 SOACMAD Group Workbook 6 SOA
CMAD Group Workbook 6 SOA
 
Soa Overview
Soa OverviewSoa Overview
Soa Overview
 
Soa 21 enterprise soa architecture
Soa 21 enterprise soa architectureSoa 21 enterprise soa architecture
Soa 21 enterprise soa architecture
 
Soa Next Generation
Soa Next GenerationSoa Next Generation
Soa Next Generation
 
Introduction to Enterprise Service Bus
Introduction to Enterprise Service BusIntroduction to Enterprise Service Bus
Introduction to Enterprise Service Bus
 
Service Analysis And Design
Service Analysis And DesignService Analysis And Design
Service Analysis And Design
 
Integration with dynamics ax 2012
Integration with dynamics ax 2012Integration with dynamics ax 2012
Integration with dynamics ax 2012
 
Private cloud reference model ms
Private cloud reference model msPrivate cloud reference model ms
Private cloud reference model ms
 
Unit 2 -SOA design
Unit 2 -SOA designUnit 2 -SOA design
Unit 2 -SOA design
 
SOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptxSOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptx
 
Microservice's in detailed
Microservice's in detailedMicroservice's in detailed
Microservice's in detailed
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmed
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
 
Bpm soa
Bpm soaBpm soa
Bpm soa
 
ITI005En-SOA (II)
ITI005En-SOA (II)ITI005En-SOA (II)
ITI005En-SOA (II)
 
Introduction to SOAP/WSDL Web Services and RESTful Web Services
Introduction to SOAP/WSDL Web Services and RESTful Web ServicesIntroduction to SOAP/WSDL Web Services and RESTful Web Services
Introduction to SOAP/WSDL Web Services and RESTful Web Services
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 

Recently uploaded (20)

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 

Cloud computing 12 cloud services requirements in soa

  • 1. Cloud Computing: 12 Cloud services requirements in SOA Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 3. Service in SOA and Cloud • A service is a self-contained unit of software that performs a specific task. • It has three components: an interface, a contract, and implementation. – The interface defines how a service provider will perform requests from a service consumer, – the contract defines how the service provider and the service consumer should interact, – the implementation is the actual service code itself.
  • 4. Business Services • Business Services are services that perform specific business functions and are required for the successful completion of a business process. • They might also be called Application Services since they are used to develop composite services and business applications that automate business processes. • For example, a retail enterprise might have an – “Inventory Service,” – “Customer Management Service,” and – “Shipping Service” in its repository of business services.
  • 5. Business Services • Business Services can be further divided into • Entity Services, Capability Services, Activity Services, and Process Services. • Entity Services are the data-centric components of the enterprise system and are responsible for exposing the information stored in backend databases. They can be thought of as the “nouns” of the business process. • Capability Services and Activity Services, meanwhile, are the “verbs.” They are the action-centric components that implement business capabilities. • Rounding out the business services category are Process Services, which contain the business logic and couple the Entity Services and Activity and Capability Services via service orchestration to create composite business services.
  • 6. Infrastructure Services • The other main category of services is Infrastructure Services, which are part of a centrally managed infrastructure component such as an Enterprise Service Bus (ESB). • Infrastructure Services provide the technical functionality necessary for the implementation of business processes in cloud, but do not directly add business value. • Examples of Infrastructure Services include SaaS Integration Services, Authentication Services, Event Logging Services, and Exception Handling Services. • Infrastructure Services are further divided into Communication Services and Utility Services. • Communication Services are mainly concerned with transporting messages both within and without the enterprise • Utility Services provide other technical capabilities not related to message transfer.
  • 7. 7 What is an Enterprise Service Bus (ESB)? • An enterprise service bus is an infrastructure used for building compound applications • The enterprise service bus is the glue that holds the compound application together • The enterprise service bus is an emerging style for integrating enterprise applications in an implementation-independent fashion • An enterprise service bus can be thought of as an abstraction layer on top of an Enterprise Messaging System
  • 8. 8 Key Characteristics of an ESB • Streamlines development • Supports multiple binding strategies • Performs data transformation • Intelligent routing • Real time monitoring • Exception handling • Service security
  • 9. Services Positioning in SOA in layers • To get a better sense of the role of services in SOA, you can think of SOA in terms of abstract layers: • Enterprise Layer • Process Layer • Service Layer • Component Layer • Object Layer
  • 10. Enterprise Application Integration EAI, short for “enterprise application integration,” is a framework that makes use of software and computer systems to enable data integration across applications within a single organization, while also simplifying business processes among connected applications and data sources. There are three main types of EAI: • The Presentation Integration Model • The Data Integration Model • The Functional Integration Model
  • 11.
  • 12. 12 EAI Limitations • An EAI can be a tightly coupled solution • An EAI can be location-specific • An EAI can be based on proprietary transport technology
  • 13. Asssignment • What is a service in Service oriented Architecture • Briefly discuss the concept of cloud service management