SlideShare a Scribd company logo
Service Oriented Architecture: 14
Service Integration with ESB
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Enterprise Service Bus (ESB)
ā€¢ An Enterprise Service Bus (ESB) is fundamentally
an architecture. It is a set of rules and principles
for integrating numerous applications together
over a bus-like infrastructure.
ā€¢ The core concept of the ESB Architecture is that
you integrate different applications by putting a
communication bus between them and then
enable each application to talk to the bus.
ā€¢ This decouples systems from each other, allowing
them to communicate without dependency on or
knowledge of other systems on the bus.
ESB Vs Point to point Integration
ā€¢ The concept of ESB was born out of the need to
move away from point-to-point integration,
which becomes brittle and hard to manage over
time.
ā€¢ Point-to-point integration results in custom
integration code being spread among
applications with no central way to monitor or
troubleshoot.
ā€¢ This is often referred to as "spaghetti code" and
does not scale because it creates tight
dependencies between applications.
What is ESB
ā€¢ Enterprise Service Bus (ESB) is a
standardized integration platform that combines
messaging, web services, data transformation, and
intelligent routing, to reliably connect and coordinate
the interaction of a significant number of
heterogeneous applications with transactional
integrity.
ā€¢ It can also be defined as a software architecture model
used for designing and implementing communication
between mutually interacting software applications in
a Service Oriented Architecture (SOA).
ESB Integration
ESB Implementation
ā€¢ The ESB architecture has some key principles that allow
for business agility and scale.
ā€¢ The key focus is to decouple systems from each other
while allowing them to communicate in a consistent
and manageable way.
ā€¢ The "bus" concept decouples applications from each
other. This is usually achieved using a messaging server
like JMS or AMQP.
ā€¢ The data that travels on the bus is a canonical format
and is almost always XML.
ā€¢ There is an "adapter" between the application and the
bus that marshals data between the two parties.
ESB Implementation
ā€¢ The adapter is responsible for talking to the backend
application and transforming data from the application
format to the bus format.
ā€¢ The adapter can also perform a host of other activities such
as message routing transaction management, Security,
monitoring, error handling, etc.
ā€¢ ESBs are generally stateless; the state is embedded in the
messages passing through the bus.
ā€¢ The canonical message format is the contract between
systems.
ā€¢ The canonical format means that there is one consistent
message format traveling on the bus and that every
application on the bus can communicate with each other
ESB Core functionalities
ā€¢ Decoupling One of the most important things that can be
done via ESB is to decouple clients from service providers.
ā€¢ Transport Protocol Conversion ESB gives the ability to
accept one input protocol and communicate with another
service provider on a different protocol.
ā€¢ Message Enhancement ESB allows to isolate the client and
make some basic changes to the message.
ā€¢ For example, changing date format of incoming message or
appending informational data to messages.
ā€¢ Message Transformation ESB facilitates transformation of
an incoming message into several outgoing formats and
structure.
ā€¢ For example, XML to JSON, XML to Java objects.
ESB Core functionalities
ā€¢ Routing ESB has the ability to redirect a client request to a
particular service provider based on deterministic or variable
routing criteria.
ā€¢ Security ESB protects services from unauthorized access.
ā€¢ Process Choreography and Service Orchestration ESB manages
process flow and complex business services to perform a business
operation.
ā€¢ Process choreography is about business services while service
orchestration is the ability to manage the coordination of their
actual implementations. It is also capable of abstracting business
services from actual implemented services.
ā€¢ Transaction Management ESB provides the ability to provide a
single unit of work for a business request, providing framework for
coordination of multiple disparate systems.
Integration core principles
ā€¢ Orchestration: Composing several existing fine-grained
components into a single higher order composite service.
This can be done to achieve appropriate "granularity" of
services and promote reuse and manageability of the
underlying components.
ā€¢ Transformation: Data transformation between canonical
data formats and specific data formats required by each
ESB connector.
ā€¢ Canonical data formats can greatly simplify the
transformation requirements associated with a large ESB
implementation where there are many consumers and
providers, each with their own data formats and
definitions.
Integration core principles
ā€¢ Transportation: Transport protocol negotiation between multiple
formats (such as HTTP, JMS, JDBC).
ā€¢ Mediation: Providing multiple interfaces for the purpose of
ā€“ a) supporting multiple versions of a service for backwards
compatibility or alternatively,
ā€“ b) to allow for multiple channels to the same underlying component
implementation.
ā€¢ Non-functional consistency: For a typical ESB initiative, this can
include consistency around the way security and monitoring
policies are applied and implemented.
ā€¢ Additionally, the goals of scalability and availability can be achieved
by using multiple instances of an ESB to provide increased
throughput (scalability) and eliminate single-points-of-failure
(SPOFs), which is the key objective for highly available systems.
Assignment
ā€¢ Explain the concept of ESB and Key concerns
in ESB Implementation
ā€¢ Explain the ESB Core functionalities, and core
principles of ESB Integration
ā€¢ Thank You

More Related Content

What's hot

Mule real-world-old
Mule real-world-oldMule real-world-old
Mule real-world-old
Praneethchampion
Ā 
Mule message structure
Mule message structureMule message structure
Mule message structure
Shanky Gupta
Ā 
Arch andmodulesmule
Arch andmodulesmuleArch andmodulesmule
Arch andmodulesmule
JavierMarRas
Ā 
Mule
MuleMule
A Short Introduction of Mule ESB
A Short Introduction of Mule ESBA Short Introduction of Mule ESB
A Short Introduction of Mule ESB
Swapnil Sahu
Ā 
E-Services course Chapter 3 ISI by Ettaieb Abdessattar
E-Services course Chapter 3 ISI by Ettaieb AbdessattarE-Services course Chapter 3 ISI by Ettaieb Abdessattar
E-Services course Chapter 3 ISI by Ettaieb Abdessattar
Abdessattar Ettaieb
Ā 
Mule esb2
Mule esb2Mule esb2
Mule esb2
himajareddys
Ā 
Mule architecture
Mule architectureMule architecture
Mule architecture
Khasim Saheb
Ā 
Mule ESB
Mule ESBMule ESB
Mule ESB
Khasim Cise
Ā 
Overview of Mule Esb
Overview of Mule EsbOverview of Mule Esb
Overview of Mule Esb
javeed_mhd
Ā 
Fundamentals of Mule Esb
Fundamentals of Mule EsbFundamentals of Mule Esb
Fundamentals of Mule Esb
Praneethchampion
Ā 
Cordova training - Day 8 - REST API's
Cordova training - Day 8 - REST API'sCordova training - Day 8 - REST API's
Cordova training - Day 8 - REST API's
Binu Paul
Ā 
Enterprise resources and mule
Enterprise resources and muleEnterprise resources and mule
Enterprise resources and mule
himajareddys
Ā 
Complete integration with mule esb
Complete integration with mule esbComplete integration with mule esb
Complete integration with mule esb
Son Nguyen
Ā 
Srilekha mule esb
Srilekha mule esbSrilekha mule esb
Srilekha mule esb
srilekha2820
Ā 
Mule esb-connectors
Mule esb-connectorsMule esb-connectors
Mule esb-connectors
himajareddys
Ā 
Mule esb
Mule esbMule esb
Mule esb
charan teja R
Ā 
Mule Esb Basics
Mule Esb BasicsMule Esb Basics
Mule Esb Basics
mdfkhan625
Ā 
Mule esb
Mule esbMule esb
Mule esb
himajareddys
Ā 
Mule esb
Mule esbMule esb

What's hot (20)

Mule real-world-old
Mule real-world-oldMule real-world-old
Mule real-world-old
Ā 
Mule message structure
Mule message structureMule message structure
Mule message structure
Ā 
Arch andmodulesmule
Arch andmodulesmuleArch andmodulesmule
Arch andmodulesmule
Ā 
Mule
MuleMule
Mule
Ā 
A Short Introduction of Mule ESB
A Short Introduction of Mule ESBA Short Introduction of Mule ESB
A Short Introduction of Mule ESB
Ā 
E-Services course Chapter 3 ISI by Ettaieb Abdessattar
E-Services course Chapter 3 ISI by Ettaieb AbdessattarE-Services course Chapter 3 ISI by Ettaieb Abdessattar
E-Services course Chapter 3 ISI by Ettaieb Abdessattar
Ā 
Mule esb2
Mule esb2Mule esb2
Mule esb2
Ā 
Mule architecture
Mule architectureMule architecture
Mule architecture
Ā 
Mule ESB
Mule ESBMule ESB
Mule ESB
Ā 
Overview of Mule Esb
Overview of Mule EsbOverview of Mule Esb
Overview of Mule Esb
Ā 
Fundamentals of Mule Esb
Fundamentals of Mule EsbFundamentals of Mule Esb
Fundamentals of Mule Esb
Ā 
Cordova training - Day 8 - REST API's
Cordova training - Day 8 - REST API'sCordova training - Day 8 - REST API's
Cordova training - Day 8 - REST API's
Ā 
Enterprise resources and mule
Enterprise resources and muleEnterprise resources and mule
Enterprise resources and mule
Ā 
Complete integration with mule esb
Complete integration with mule esbComplete integration with mule esb
Complete integration with mule esb
Ā 
Srilekha mule esb
Srilekha mule esbSrilekha mule esb
Srilekha mule esb
Ā 
Mule esb-connectors
Mule esb-connectorsMule esb-connectors
Mule esb-connectors
Ā 
Mule esb
Mule esbMule esb
Mule esb
Ā 
Mule Esb Basics
Mule Esb BasicsMule Esb Basics
Mule Esb Basics
Ā 
Mule esb
Mule esbMule esb
Mule esb
Ā 
Mule esb
Mule esbMule esb
Mule esb
Ā 

Similar to Soa 14 service integration with esb

Introduction to Enterprise Service Bus
Introduction to Enterprise Service BusIntroduction to Enterprise Service Bus
Introduction to Enterprise Service Bus
Mahmoud Ezzat
Ā 
ESB Fundamentals 3.7
ESB Fundamentals 3.7ESB Fundamentals 3.7
ESB Fundamentals 3.7
StephenKardian
Ā 
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Tamim Khan
Ā 
Enterprise resources and mule
Enterprise resources and muleEnterprise resources and mule
Enterprise resources and mule
D.Rajesh Kumar
Ā 
Enterprise Service Bus interview
Enterprise Service Bus interviewEnterprise Service Bus interview
Enterprise Service Bus interview
Amir Yousefi
Ā 
2011-ESB-WP-Draft
2011-ESB-WP-Draft2011-ESB-WP-Draft
2011-ESB-WP-Draft
Brian Taylor
Ā 
01 esb fundamentals
01   esb fundamentals01   esb fundamentals
01 esb fundamentals
StephenKardian
Ā 
Enterprise Service Bus Features and Advantages.docx
Enterprise Service Bus Features and Advantages.docxEnterprise Service Bus Features and Advantages.docx
Enterprise Service Bus Features and Advantages.docx
cirek63365
Ā 
Unit-I-Introduction.pptx
Unit-I-Introduction.pptxUnit-I-Introduction.pptx
Unit-I-Introduction.pptx
keerthanamp4
Ā 
Introduction to Mule ESB
Introduction to Mule ESBIntroduction to Mule ESB
Introduction to Mule ESB
Deepak Bisht
Ā 
Overview of ESB at Azilen Tech Meetup
Overview of ESB at Azilen Tech MeetupOverview of ESB at Azilen Tech Meetup
Overview of ESB at Azilen Tech Meetup
Azilen Technologies Pvt. Ltd.
Ā 
integeration
integerationintegeration
integeration
Shuaibullah Abbasi
Ā 
ITI005En-SOA (II)
ITI005En-SOA (II)ITI005En-SOA (II)
ITI005En-SOA (II)
Huibert Aalbers
Ā 
Why Enterprise Service Bus (ESB)
Why Enterprise Service Bus (ESB)Why Enterprise Service Bus (ESB)
Why Enterprise Service Bus (ESB)
VTR Ravi Kumar
Ā 
Mule esb demo
Mule esb demoMule esb demo
Mule esb demo
cibij
Ā 
Service Oriented Architecture (SOA) [2/5] : Enterprise Service Bus
Service Oriented Architecture (SOA) [2/5] : Enterprise Service BusService Oriented Architecture (SOA) [2/5] : Enterprise Service Bus
Service Oriented Architecture (SOA) [2/5] : Enterprise Service Bus
IMC Institute
Ā 
Mule ESB
Mule ESBMule ESB
Mule ESB
Muralidhar Gumma
Ā 
mule esb
mule esbmule esb
Mule ESB
Mule ESBMule ESB
Mule ESB
Bui Kiet
Ā 
Enterprise Service Bus
Enterprise Service BusEnterprise Service Bus
Enterprise Service Bus
Hamed Hatami
Ā 

Similar to Soa 14 service integration with esb (20)

Introduction to Enterprise Service Bus
Introduction to Enterprise Service BusIntroduction to Enterprise Service Bus
Introduction to Enterprise Service Bus
Ā 
ESB Fundamentals 3.7
ESB Fundamentals 3.7ESB Fundamentals 3.7
ESB Fundamentals 3.7
Ā 
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Ā 
Enterprise resources and mule
Enterprise resources and muleEnterprise resources and mule
Enterprise resources and mule
Ā 
Enterprise Service Bus interview
Enterprise Service Bus interviewEnterprise Service Bus interview
Enterprise Service Bus interview
Ā 
2011-ESB-WP-Draft
2011-ESB-WP-Draft2011-ESB-WP-Draft
2011-ESB-WP-Draft
Ā 
01 esb fundamentals
01   esb fundamentals01   esb fundamentals
01 esb fundamentals
Ā 
Enterprise Service Bus Features and Advantages.docx
Enterprise Service Bus Features and Advantages.docxEnterprise Service Bus Features and Advantages.docx
Enterprise Service Bus Features and Advantages.docx
Ā 
Unit-I-Introduction.pptx
Unit-I-Introduction.pptxUnit-I-Introduction.pptx
Unit-I-Introduction.pptx
Ā 
Introduction to Mule ESB
Introduction to Mule ESBIntroduction to Mule ESB
Introduction to Mule ESB
Ā 
Overview of ESB at Azilen Tech Meetup
Overview of ESB at Azilen Tech MeetupOverview of ESB at Azilen Tech Meetup
Overview of ESB at Azilen Tech Meetup
Ā 
integeration
integerationintegeration
integeration
Ā 
ITI005En-SOA (II)
ITI005En-SOA (II)ITI005En-SOA (II)
ITI005En-SOA (II)
Ā 
Why Enterprise Service Bus (ESB)
Why Enterprise Service Bus (ESB)Why Enterprise Service Bus (ESB)
Why Enterprise Service Bus (ESB)
Ā 
Mule esb demo
Mule esb demoMule esb demo
Mule esb demo
Ā 
Service Oriented Architecture (SOA) [2/5] : Enterprise Service Bus
Service Oriented Architecture (SOA) [2/5] : Enterprise Service BusService Oriented Architecture (SOA) [2/5] : Enterprise Service Bus
Service Oriented Architecture (SOA) [2/5] : Enterprise Service Bus
Ā 
Mule ESB
Mule ESBMule ESB
Mule ESB
Ā 
mule esb
mule esbmule esb
mule esb
Ā 
Mule ESB
Mule ESBMule ESB
Mule ESB
Ā 
Enterprise Service Bus
Enterprise Service BusEnterprise Service Bus
Enterprise Service Bus
Ā 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
Ā 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
Ā 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
Ā 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
Ā 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
Ā 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
Ā 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
Ā 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
Ā 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
Ā 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
Ā 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
Ā 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
Ā 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
Ā 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
Ā 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
Ā 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
Ā 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
Ā 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
Ā 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
Ā 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
Ā 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Ā 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Ā 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Ā 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Ā 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Ā 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Ā 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
Ā 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Ā 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Ā 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Ā 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Ā 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Ā 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
Ā 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Ā 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Ā 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Ā 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
Ā 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Ā 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
Ā 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
Ā 

Recently uploaded

DevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps ServicesDevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps Services
seospiralmantra
Ā 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
Ā 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
Ā 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
Maitrey Patel
Ā 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
Ā 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
OnePlan Solutions
Ā 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
Ā 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
Ā 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
Ā 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
Ā 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
Ā 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
Paul Brebner
Ā 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
kalichargn70th171
Ā 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
Ā 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
Ā 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Peter Caitens
Ā 
Benefits of Artificial Intelligence in Healthcare!
Benefits of  Artificial Intelligence in Healthcare!Benefits of  Artificial Intelligence in Healthcare!
Benefits of Artificial Intelligence in Healthcare!
Prestware
Ā 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
Luigi Fugaro
Ā 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
Ā 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
Massimo Artizzu
Ā 

Recently uploaded (20)

DevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps ServicesDevOps Consulting Company | Hire DevOps Services
DevOps Consulting Company | Hire DevOps Services
Ā 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Ā 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Ā 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
Ā 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Ā 
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Transforming Product Development using OnePlan To Boost Efficiency and Innova...
Ā 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
Ā 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Ā 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
Ā 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Ā 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
Ā 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
Ā 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
Ā 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Ā 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Ā 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Ā 
Benefits of Artificial Intelligence in Healthcare!
Benefits of  Artificial Intelligence in Healthcare!Benefits of  Artificial Intelligence in Healthcare!
Benefits of Artificial Intelligence in Healthcare!
Ā 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
Ā 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
Ā 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
Ā 

Soa 14 service integration with esb

  • 1. Service Oriented Architecture: 14 Service Integration with ESB Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Enterprise Service Bus (ESB) ā€¢ An Enterprise Service Bus (ESB) is fundamentally an architecture. It is a set of rules and principles for integrating numerous applications together over a bus-like infrastructure. ā€¢ The core concept of the ESB Architecture is that you integrate different applications by putting a communication bus between them and then enable each application to talk to the bus. ā€¢ This decouples systems from each other, allowing them to communicate without dependency on or knowledge of other systems on the bus.
  • 3. ESB Vs Point to point Integration ā€¢ The concept of ESB was born out of the need to move away from point-to-point integration, which becomes brittle and hard to manage over time. ā€¢ Point-to-point integration results in custom integration code being spread among applications with no central way to monitor or troubleshoot. ā€¢ This is often referred to as "spaghetti code" and does not scale because it creates tight dependencies between applications.
  • 4. What is ESB ā€¢ Enterprise Service Bus (ESB) is a standardized integration platform that combines messaging, web services, data transformation, and intelligent routing, to reliably connect and coordinate the interaction of a significant number of heterogeneous applications with transactional integrity. ā€¢ It can also be defined as a software architecture model used for designing and implementing communication between mutually interacting software applications in a Service Oriented Architecture (SOA).
  • 6. ESB Implementation ā€¢ The ESB architecture has some key principles that allow for business agility and scale. ā€¢ The key focus is to decouple systems from each other while allowing them to communicate in a consistent and manageable way. ā€¢ The "bus" concept decouples applications from each other. This is usually achieved using a messaging server like JMS or AMQP. ā€¢ The data that travels on the bus is a canonical format and is almost always XML. ā€¢ There is an "adapter" between the application and the bus that marshals data between the two parties.
  • 7. ESB Implementation ā€¢ The adapter is responsible for talking to the backend application and transforming data from the application format to the bus format. ā€¢ The adapter can also perform a host of other activities such as message routing transaction management, Security, monitoring, error handling, etc. ā€¢ ESBs are generally stateless; the state is embedded in the messages passing through the bus. ā€¢ The canonical message format is the contract between systems. ā€¢ The canonical format means that there is one consistent message format traveling on the bus and that every application on the bus can communicate with each other
  • 8. ESB Core functionalities ā€¢ Decoupling One of the most important things that can be done via ESB is to decouple clients from service providers. ā€¢ Transport Protocol Conversion ESB gives the ability to accept one input protocol and communicate with another service provider on a different protocol. ā€¢ Message Enhancement ESB allows to isolate the client and make some basic changes to the message. ā€¢ For example, changing date format of incoming message or appending informational data to messages. ā€¢ Message Transformation ESB facilitates transformation of an incoming message into several outgoing formats and structure. ā€¢ For example, XML to JSON, XML to Java objects.
  • 9. ESB Core functionalities ā€¢ Routing ESB has the ability to redirect a client request to a particular service provider based on deterministic or variable routing criteria. ā€¢ Security ESB protects services from unauthorized access. ā€¢ Process Choreography and Service Orchestration ESB manages process flow and complex business services to perform a business operation. ā€¢ Process choreography is about business services while service orchestration is the ability to manage the coordination of their actual implementations. It is also capable of abstracting business services from actual implemented services. ā€¢ Transaction Management ESB provides the ability to provide a single unit of work for a business request, providing framework for coordination of multiple disparate systems.
  • 10. Integration core principles ā€¢ Orchestration: Composing several existing fine-grained components into a single higher order composite service. This can be done to achieve appropriate "granularity" of services and promote reuse and manageability of the underlying components. ā€¢ Transformation: Data transformation between canonical data formats and specific data formats required by each ESB connector. ā€¢ Canonical data formats can greatly simplify the transformation requirements associated with a large ESB implementation where there are many consumers and providers, each with their own data formats and definitions.
  • 11. Integration core principles ā€¢ Transportation: Transport protocol negotiation between multiple formats (such as HTTP, JMS, JDBC). ā€¢ Mediation: Providing multiple interfaces for the purpose of ā€“ a) supporting multiple versions of a service for backwards compatibility or alternatively, ā€“ b) to allow for multiple channels to the same underlying component implementation. ā€¢ Non-functional consistency: For a typical ESB initiative, this can include consistency around the way security and monitoring policies are applied and implemented. ā€¢ Additionally, the goals of scalability and availability can be achieved by using multiple instances of an ESB to provide increased throughput (scalability) and eliminate single-points-of-failure (SPOFs), which is the key objective for highly available systems.
  • 12. Assignment ā€¢ Explain the concept of ESB and Key concerns in ESB Implementation ā€¢ Explain the ESB Core functionalities, and core principles of ESB Integration ā€¢ Thank You