SlideShare a Scribd company logo
The Service bus

The .NET Service Bus is a core part of the .NET Services offering focused on making the ESB pattern a
reality at Internet scope as part of the Azure™ Services Platform

The .NET Service Bus provides many of the same architectural characteristics found in typical ESB
solutions, including things like identity and access control, naming, a service registry, and a common
messaging fabric. The primary difference is one of scope. In the case of the .NET Service Bus, the
components must be designed to operate in the cloud, at a global Internet scope, and in a highly
scalable and federated manner

. While it’s usually simple to initiate communication from on-premise applications to services
running in the cloud, the reverse is more difficult because on-premise software is usually running
behind multiple firewalls or NAT devices. The Microsoft® .NET Service Bus addresses this problem
space by making it easy to create secure bidirectional communication channels between on-premise
software and services in the cloud.

The ESB pattern has grown in popularity over the years because it simplifies the management of
multiple service connections. One way it does this is by enabling publish/subscribe architectures,
which provides for even looser-coupling throughout an enterprise. With a publish/subscribe
architecture, consumers no longer have to be directly connected to services anymore – everything
just needs a connection to the bus – and nodes can be added or removed at will over time. This type
of architecture also enables event distribution. You can have multiple subscribers to a single
message type, and you can also have multiple publishers of that same message type, giving you N-
to-N multicast capabilities.

Tackling bidirectional communication at Internet scope is not trivial due to some of today’s realities.
The first problem is the shortage of IPv4 addresses. For all practical purposes, we’ve run out. It’s
difficult to acquire a public IPv4 address anymore. Instead, most Internet providers, corporate
networks, and wireless networks use dynamic IP address allocation and network address translation
(NAT) techniques. Such IP addresses are private to those networks and are not publicly addressable
from the outside.

Another challenge is related to security. In most enterprise environments, on-premise software is
almost completely shielded from the outside world by layers and layers of firewalls and other
protective network devices. This is necessary because of the widespread security threads inherent in
the Internet.1 Most network environments allow a variety of outbound ports through their firewalls
but highly constrain the number of allowed inbound ports.2 Ports 80 (HTTP) and 443 (HTTPS) are
often the only sanctioned inbound ports, presenting a big challenge for different types of
bidirectional communication.

The Microsoft® .NET Service Bus is a concrete implementation of the service bus pattern designed to
operate at Internet scope within highly-scalable Microsoft data centers. The .NET Service Bus
provides a federated identity and access control mechanism (via the .NET Access Control Service), a
1
  No one refutes the fact that the Internet is full of bad guys. These days, if you have anything of value, you must design
against the threat of being attacked. Hence, most corporate environments shield themselves heavily with multiple firewall
layers.
2
  An inbound port is required for an external node to initiate communication with an application sitting within the firewall.
federated naming system, a dynamic service registry, and a robust messaging fabric capable of
overcoming the connectivity challenges

More Related Content

What's hot

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
Parth Akbari
 
VPN
VPNVPN
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Mariana Hansen
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
Inside the Cato Networks Management Console
Inside the Cato Networks Management ConsoleInside the Cato Networks Management Console
Inside the Cato Networks Management Console
David Greenfield
 
Vpn
VpnVpn
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
Abrish06
 
Presentation1
Presentation1Presentation1
Presentation1
MyLa De La Peña
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
Farah M. Altufaili
 
Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)
Mohit Kumar
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
Areeba Gill
 
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGNBarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
Abbie Barbir
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
Angelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
Rama Krishna Nakka
 

What's hot (16)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
VPN
VPNVPN
VPN
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Inside the Cato Networks Management Console
Inside the Cato Networks Management ConsoleInside the Cato Networks Management Console
Inside the Cato Networks Management Console
 
Vpn
VpnVpn
Vpn
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Presentation1
Presentation1Presentation1
Presentation1
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGNBarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 

Viewers also liked

Mochilas Viaxeiras
Mochilas ViaxeirasMochilas Viaxeiras
Mochilas Viaxeirasluis425
 
Lecturas verano 2016
Lecturas verano 2016Lecturas verano 2016
Lecturas verano 2016
bibliobrozos
 
Diario da mochila viaxeira (Biblioteca PdB)
Diario da mochila viaxeira (Biblioteca PdB)Diario da mochila viaxeira (Biblioteca PdB)
Diario da mochila viaxeira (Biblioteca PdB)
bibliobrozos
 
Caderno viaxeiro
Caderno viaxeiroCaderno viaxeiro
Caderno viaxeirobibliato
 
El principe de la niebla
El principe de la nieblaEl principe de la niebla
El principe de la niebla
bibliobaralla
 
Guía de usuarios da biblioteca
Guía de usuarios da bibliotecaGuía de usuarios da biblioteca
Guía de usuarios da biblioteca
bibliobrozos
 
Roald Dahl: el Gran Gigante Bonachón
Roald Dahl: el Gran Gigante BonachónRoald Dahl: el Gran Gigante Bonachón
Roald Dahl: el Gran Gigante Bonachón
dinamizalectura
 
Paseo literario : Málaga y la Generación del 27
Paseo literario : Málaga y la Generación del 27Paseo literario : Málaga y la Generación del 27
Paseo literario : Málaga y la Generación del 27
dinamizalectura
 
Andrea (romanía)
Andrea (romanía)Andrea (romanía)
Andrea (romanía)
bibliobaralla
 

Viewers also liked (10)

Mochilas Viaxeiras
Mochilas ViaxeirasMochilas Viaxeiras
Mochilas Viaxeiras
 
Lecturas verano 2016
Lecturas verano 2016Lecturas verano 2016
Lecturas verano 2016
 
Diario da mochila viaxeira (Biblioteca PdB)
Diario da mochila viaxeira (Biblioteca PdB)Diario da mochila viaxeira (Biblioteca PdB)
Diario da mochila viaxeira (Biblioteca PdB)
 
Caderno viaxeiro
Caderno viaxeiroCaderno viaxeiro
Caderno viaxeiro
 
El principe de la niebla
El principe de la nieblaEl principe de la niebla
El principe de la niebla
 
Guía de usuarios da biblioteca
Guía de usuarios da bibliotecaGuía de usuarios da biblioteca
Guía de usuarios da biblioteca
 
Roald Dahl: el Gran Gigante Bonachón
Roald Dahl: el Gran Gigante BonachónRoald Dahl: el Gran Gigante Bonachón
Roald Dahl: el Gran Gigante Bonachón
 
Paseo literario : Málaga y la Generación del 27
Paseo literario : Málaga y la Generación del 27Paseo literario : Málaga y la Generación del 27
Paseo literario : Málaga y la Generación del 27
 
Andrea (romanía)
Andrea (romanía)Andrea (romanía)
Andrea (romanía)
 
Manuel 1º e.s.o
Manuel 1º e.s.oManuel 1º e.s.o
Manuel 1º e.s.o
 

Similar to Service Bus

Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Inc.
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
ajaymane22
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
Batzaya Dashdondog
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
ammulu99
 
Cnetworks
CnetworksCnetworks
Cnetworks
riyasekaran
 
Cn
CnCn
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
Rodel Morales
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
OECLIB Odisha Electronics Control Library
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
reddydivakara
 
WebRTC presentation
WebRTC presentationWebRTC presentation
WebRTC presentation
Veselin Pizurica
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
Jennifer Wood
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R O
lime17
 
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
edirin aphunu
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
todd581
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
glendar3
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
Tuan Yang
 
Enterprise Connectivity
Enterprise ConnectivityEnterprise Connectivity
Enterprise Connectivity
ST Engineering iDirect
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
phanleson
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003
lime17
 
Unit 2
Unit 2Unit 2

Similar to Service Bus (20)

Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
WebRTC presentation
WebRTC presentationWebRTC presentation
WebRTC presentation
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R O
 
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
Enterprise Connectivity
Enterprise ConnectivityEnterprise Connectivity
Enterprise Connectivity
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003
 
Unit 2
Unit 2Unit 2
Unit 2
 

Recently uploaded

Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 

Recently uploaded (20)

Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 

Service Bus

  • 1. The Service bus The .NET Service Bus is a core part of the .NET Services offering focused on making the ESB pattern a reality at Internet scope as part of the Azure™ Services Platform The .NET Service Bus provides many of the same architectural characteristics found in typical ESB solutions, including things like identity and access control, naming, a service registry, and a common messaging fabric. The primary difference is one of scope. In the case of the .NET Service Bus, the components must be designed to operate in the cloud, at a global Internet scope, and in a highly scalable and federated manner . While it’s usually simple to initiate communication from on-premise applications to services running in the cloud, the reverse is more difficult because on-premise software is usually running behind multiple firewalls or NAT devices. The Microsoft® .NET Service Bus addresses this problem space by making it easy to create secure bidirectional communication channels between on-premise software and services in the cloud. The ESB pattern has grown in popularity over the years because it simplifies the management of multiple service connections. One way it does this is by enabling publish/subscribe architectures, which provides for even looser-coupling throughout an enterprise. With a publish/subscribe architecture, consumers no longer have to be directly connected to services anymore – everything just needs a connection to the bus – and nodes can be added or removed at will over time. This type of architecture also enables event distribution. You can have multiple subscribers to a single message type, and you can also have multiple publishers of that same message type, giving you N- to-N multicast capabilities. Tackling bidirectional communication at Internet scope is not trivial due to some of today’s realities. The first problem is the shortage of IPv4 addresses. For all practical purposes, we’ve run out. It’s difficult to acquire a public IPv4 address anymore. Instead, most Internet providers, corporate networks, and wireless networks use dynamic IP address allocation and network address translation (NAT) techniques. Such IP addresses are private to those networks and are not publicly addressable from the outside. Another challenge is related to security. In most enterprise environments, on-premise software is almost completely shielded from the outside world by layers and layers of firewalls and other protective network devices. This is necessary because of the widespread security threads inherent in the Internet.1 Most network environments allow a variety of outbound ports through their firewalls but highly constrain the number of allowed inbound ports.2 Ports 80 (HTTP) and 443 (HTTPS) are often the only sanctioned inbound ports, presenting a big challenge for different types of bidirectional communication. The Microsoft® .NET Service Bus is a concrete implementation of the service bus pattern designed to operate at Internet scope within highly-scalable Microsoft data centers. The .NET Service Bus provides a federated identity and access control mechanism (via the .NET Access Control Service), a 1 No one refutes the fact that the Internet is full of bad guys. These days, if you have anything of value, you must design against the threat of being attacked. Hence, most corporate environments shield themselves heavily with multiple firewall layers. 2 An inbound port is required for an external node to initiate communication with an application sitting within the firewall.
  • 2. federated naming system, a dynamic service registry, and a robust messaging fabric capable of overcoming the connectivity challenges