SlideShare a Scribd company logo
1 of 11
Service Oriented Architecture: 21
Enterprise SOA Architecture
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
• Enterprise systems also called “enterprise
resource planning systems”.
• Collects data from many divisions of firm for
use in nearly all of internal business acivities.
• Suite of integrated software modules and a
common central database.
• Information entered in one process in
immediately available for other process.
Definition of Enterprise system
• Business value of enterprise systems:
• 1:Increase operational efficiency.
• 2.enable rapid responses to customer request for information
or products.
• 3.provide firm wide information to support decision making.
• 4.include analytical tools to evaluate overall organizational
performance.
Enterprise systems
• An enterprise usually has a large number of
• applications. Each of the applications caters to
the specific needs of different units within the
enterprise.
• an Enterprise is a large organization having
• forward and backward linkages with other
• organizations.
• The Enterprise would, in all likelihood, be
• involved in B2B and B2C transactions.
Architecture for Enterprise-wide soa
Strawman for Enterprise-wide soa
• A key feature of the architecture is the use of
• Enterprise Service Bus (ESB) that enables a smooth
communication between the applications.
• The business processes of the enterprise may be exposed as
services that can be classified as follows:->
• 1. Client Services
• 2. Business Process Management Services
• 3. Business Application Services
• 4. Data Services.
Enterprise service bus
• Client Services enable and deliver content to
users. These include the Enterprise Portal,
CRM functionality of Sales and Marketing and
the distribution functionality including Client
• Reporting.
1: Client Services
• Business Process Management Services
handle orchestration of business processes
implemented in business applications.
• These services control the flow and
interaction of business services.
2:Business Process Management
Services
• The Business Application on Services
encapsulate access to the functionality of the
business processes of the enterprise
implemented in the various applications.
3:Business Application Services
• Data Services encapsulate access to data in various sources.
• There are typically two types of Data services that need to be
provided in an enterprise:
1: Information Services that transform and replicate data stored
across the enterprise in various data sources.
• 2:Integration services that provide the ability to interact with
structured and unstructured data services (like the databases
and flat files).
4:Data Services
Assignment
• Explain the Enterprise wide SOA Architecture.

More Related Content

What's hot

Database management systems cs403 power point slides lecture 01
Database management systems   cs403 power point slides lecture 01Database management systems   cs403 power point slides lecture 01
Database management systems cs403 power point slides lecture 01Md.Abu Sayed
 
Hi600 u05_inst_slides
Hi600 u05_inst_slidesHi600 u05_inst_slides
Hi600 u05_inst_slidesljmcneill33
 
360 identity-management
360 identity-management360 identity-management
360 identity-managementOri Levi
 
Syscon Infotech - Logistics Software Solutions
Syscon Infotech - Logistics Software SolutionsSyscon Infotech - Logistics Software Solutions
Syscon Infotech - Logistics Software SolutionsNilayJhaveri
 
Electronic Document Management Case Study
Electronic Document Management Case StudyElectronic Document Management Case Study
Electronic Document Management Case StudyDougWinning
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement SpecificationVishal Singh
 
7(srs template)
7(srs template)7(srs template)
7(srs template)randhirlpu
 
User account configuration
User account configurationUser account configuration
User account configurationArshad Havaldar
 
Mobile Bill Management System - Project Proposal
Mobile Bill Management System - Project ProposalMobile Bill Management System - Project Proposal
Mobile Bill Management System - Project ProposalAnuja Herath
 
Benefits of Document management system
Benefits of Document management systemBenefits of Document management system
Benefits of Document management systemDigismartek
 

What's hot (14)

Database management systems cs403 power point slides lecture 01
Database management systems   cs403 power point slides lecture 01Database management systems   cs403 power point slides lecture 01
Database management systems cs403 power point slides lecture 01
 
Hi600 u05_inst_slides
Hi600 u05_inst_slidesHi600 u05_inst_slides
Hi600 u05_inst_slides
 
Proposal DMS
Proposal   DMS Proposal   DMS
Proposal DMS
 
Lecture 05 dblc
Lecture 05 dblcLecture 05 dblc
Lecture 05 dblc
 
360 identity-management
360 identity-management360 identity-management
360 identity-management
 
Syscon Infotech - Logistics Software Solutions
Syscon Infotech - Logistics Software SolutionsSyscon Infotech - Logistics Software Solutions
Syscon Infotech - Logistics Software Solutions
 
Electronic Document Management Case Study
Electronic Document Management Case StudyElectronic Document Management Case Study
Electronic Document Management Case Study
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
DocTrix DocFlow 2013
DocTrix DocFlow 2013DocTrix DocFlow 2013
DocTrix DocFlow 2013
 
7(srs template)
7(srs template)7(srs template)
7(srs template)
 
Client server architecture in .net by varun tiwari
Client server architecture in .net by varun tiwariClient server architecture in .net by varun tiwari
Client server architecture in .net by varun tiwari
 
User account configuration
User account configurationUser account configuration
User account configuration
 
Mobile Bill Management System - Project Proposal
Mobile Bill Management System - Project ProposalMobile Bill Management System - Project Proposal
Mobile Bill Management System - Project Proposal
 
Benefits of Document management system
Benefits of Document management systemBenefits of Document management system
Benefits of Document management system
 

Similar to Soa 21 enterprise soa architecture

Enterprise resource planning_system
Enterprise resource planning_systemEnterprise resource planning_system
Enterprise resource planning_systemJithin Zcs
 
Management Information Systems - Chapter 2
Management Information Systems - Chapter 2Management Information Systems - Chapter 2
Management Information Systems - Chapter 2Joel Briza
 
SE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdfSE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdfRAVALCHIRAG1
 
Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...SuhaimiHasim1
 
Lesson 1 - Introduction to Enterprise Systems for Management.pdf
Lesson 1 - Introduction to Enterprise Systems for Management.pdfLesson 1 - Introduction to Enterprise Systems for Management.pdf
Lesson 1 - Introduction to Enterprise Systems for Management.pdfcalf_ville86
 
Cloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soaCloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soaVaibhav Khanna
 
An overview - Enterprise
An overview - EnterpriseAn overview - Enterprise
An overview - EnterpriseUsman Tariq
 
Views on building blocks
Views on building blocksViews on building blocks
Views on building blocksRitesh Khanna
 
Agent-Based Workflow
Agent-Based WorkflowAgent-Based Workflow
Agent-Based WorkflowLarry Suarez
 
Enterprise Systems.ppt
Enterprise Systems.pptEnterprise Systems.ppt
Enterprise Systems.pptNeenuWilson7
 
SOA Service Oriented Architecture
SOA Service Oriented ArchitectureSOA Service Oriented Architecture
SOA Service Oriented ArchitectureVinay Rajadhyaksha
 
Asg Path To Optimization1
Asg Path To Optimization1Asg Path To Optimization1
Asg Path To Optimization1miket60
 
Current trendsin eis
Current trendsin eisCurrent trendsin eis
Current trendsin eisYogita Negi
 
System Analysis And Design_FinalPPT_NirmishaK
System Analysis And Design_FinalPPT_NirmishaKSystem Analysis And Design_FinalPPT_NirmishaK
System Analysis And Design_FinalPPT_NirmishaKShehla Ghori
 

Similar to Soa 21 enterprise soa architecture (20)

lecture 1.pptx
lecture 1.pptxlecture 1.pptx
lecture 1.pptx
 
Enterprise resource planning_system
Enterprise resource planning_systemEnterprise resource planning_system
Enterprise resource planning_system
 
Management Information Systems - Chapter 2
Management Information Systems - Chapter 2Management Information Systems - Chapter 2
Management Information Systems - Chapter 2
 
SE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdfSE_Unit 3_System & Requirement Engineering.pdf
SE_Unit 3_System & Requirement Engineering.pdf
 
Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...Modul 1 - Introduction to Digital Transformation Technologies and Integration...
Modul 1 - Introduction to Digital Transformation Technologies and Integration...
 
e-Business systems - introduction it knowledge week 7
e-Business systems - introduction	 it knowledge week 7e-Business systems - introduction	 it knowledge week 7
e-Business systems - introduction it knowledge week 7
 
11.online library management system
11.online library management system11.online library management system
11.online library management system
 
Architures of ERP System
Architures of ERP System Architures of ERP System
Architures of ERP System
 
Lesson 1 - Introduction to Enterprise Systems for Management.pdf
Lesson 1 - Introduction to Enterprise Systems for Management.pdfLesson 1 - Introduction to Enterprise Systems for Management.pdf
Lesson 1 - Introduction to Enterprise Systems for Management.pdf
 
Cloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soaCloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soa
 
An overview - Enterprise
An overview - EnterpriseAn overview - Enterprise
An overview - Enterprise
 
Views on building blocks
Views on building blocksViews on building blocks
Views on building blocks
 
Chap02
Chap02Chap02
Chap02
 
Agent-Based Workflow
Agent-Based WorkflowAgent-Based Workflow
Agent-Based Workflow
 
ERP for IT
ERP for ITERP for IT
ERP for IT
 
Enterprise Systems.ppt
Enterprise Systems.pptEnterprise Systems.ppt
Enterprise Systems.ppt
 
SOA Service Oriented Architecture
SOA Service Oriented ArchitectureSOA Service Oriented Architecture
SOA Service Oriented Architecture
 
Asg Path To Optimization1
Asg Path To Optimization1Asg Path To Optimization1
Asg Path To Optimization1
 
Current trendsin eis
Current trendsin eisCurrent trendsin eis
Current trendsin eis
 
System Analysis And Design_FinalPPT_NirmishaK
System Analysis And Design_FinalPPT_NirmishaKSystem Analysis And Design_FinalPPT_NirmishaK
System Analysis And Design_FinalPPT_NirmishaK
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 

Recently uploaded (20)

Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 

Soa 21 enterprise soa architecture

  • 1. Service Oriented Architecture: 21 Enterprise SOA Architecture Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. • Enterprise systems also called “enterprise resource planning systems”. • Collects data from many divisions of firm for use in nearly all of internal business acivities. • Suite of integrated software modules and a common central database. • Information entered in one process in immediately available for other process. Definition of Enterprise system
  • 3. • Business value of enterprise systems: • 1:Increase operational efficiency. • 2.enable rapid responses to customer request for information or products. • 3.provide firm wide information to support decision making. • 4.include analytical tools to evaluate overall organizational performance. Enterprise systems
  • 4. • An enterprise usually has a large number of • applications. Each of the applications caters to the specific needs of different units within the enterprise. • an Enterprise is a large organization having • forward and backward linkages with other • organizations. • The Enterprise would, in all likelihood, be • involved in B2B and B2C transactions. Architecture for Enterprise-wide soa
  • 6. • A key feature of the architecture is the use of • Enterprise Service Bus (ESB) that enables a smooth communication between the applications. • The business processes of the enterprise may be exposed as services that can be classified as follows:-> • 1. Client Services • 2. Business Process Management Services • 3. Business Application Services • 4. Data Services. Enterprise service bus
  • 7. • Client Services enable and deliver content to users. These include the Enterprise Portal, CRM functionality of Sales and Marketing and the distribution functionality including Client • Reporting. 1: Client Services
  • 8. • Business Process Management Services handle orchestration of business processes implemented in business applications. • These services control the flow and interaction of business services. 2:Business Process Management Services
  • 9. • The Business Application on Services encapsulate access to the functionality of the business processes of the enterprise implemented in the various applications. 3:Business Application Services
  • 10. • Data Services encapsulate access to data in various sources. • There are typically two types of Data services that need to be provided in an enterprise: 1: Information Services that transform and replicate data stored across the enterprise in various data sources. • 2:Integration services that provide the ability to interact with structured and unstructured data services (like the databases and flat files). 4:Data Services
  • 11. Assignment • Explain the Enterprise wide SOA Architecture.