SlideShare a Scribd company logo
SOA Design Pattern 2011.04.07
Contents ,[object Object],[object Object],[object Object],[object Object]
1. Introduction ,[object Object],[object Object]
Patterns - Why ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Type of SOA pattern Service Inventory Design Patterns Service Composition Design Patterns Service Design Patterns
Work assignment Huu Hau : 6, 7, 8 Van Khanh: 9, 10, 17 Lan anh : 11, 12, 13 Vu Doan: 14, 15, 16 Doan Lap 18,19,20,21
Service Inventory Design Patterns
Chapter 6
Chapter 7
Chapter 8
Chapter 9 Inventory Implementation Patterns
Dual Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Canonical Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],B A C
State Repository ,[object Object],[object Object],[object Object],[object Object]
Stateful Services ,[object Object],[object Object],[object Object],[object Object]
Service Grid ,[object Object],[object Object],[object Object],[object Object],[object Object]
Inventory Endpoint ,[object Object],[object Object],[object Object],[object Object]
Cross Domain Utility Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 10 Inventory Governance Patterns
Canonical Expression ,[object Object],[object Object],[object Object],[object Object],[object Object]
Metadata Centralization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Canonical Versioning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3. Service Composition Design Patterns
Chapter 17 Capability Composition Patterns
Capability Composition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Capability Recomposition ,[object Object],[object Object],[object Object],[object Object]
Canonical Versioning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 18  Service Messaging Patterns
Intermediate Routing ,[object Object],[object Object],[object Object],[object Object]
State Messaging Problem: When  services are required to maintain state information  in memory between message exchanges with consumers, their scalability can be comprised, and they can become a  performance burden  on the surrounding infrastructure. Solution: Instead of retaining the state data in memory, its storage is temporarily delegated to messages
Chapter 19  Composition Implementation Patterns
Composition Autonomy Problem:  Composition controller services naturally lose autonomy  when delegating processing tasks to composed services, some of which may be shared across multiple compositions. Solution: All composition participants can be isolated to maximize the autonomy  of the composition as a whole
Atomic Service Transaction Problem: When  runtime activities  that span multiple  services fail, the parent business  task is  incomplete  and actions performed and changes made up to that point may compromise the  integrity of the underlying solution and architecture . Solution: Runtime service activities can be  wrapped in a transaction with  rollback feature that resets all actions and changes  if the parent business task cannot be successfully completed
Chapter 20  Service Interaction Security Patterns
Data Confidentiality Problem:  Within service compositions , data is often required to pass through one or more intermediaries. Point-to-point security protocols, such as those frequently used at the transport-layer, may allow messages containing sensitive information to be intercepted and viewed by such intermediaries Solution: The message contents are encrypted independently from the transport,  ensuring that only  intended recipients  can access the protected data.
Data Format Transformation Problem: How can a service verify  the credentials provided  by a consumer? Solution: Service capabilities  require that consumers  provide credentials that can be authenticated  against an identity store
Chapter 21  Transformation Patterns
Data Format Transformation Problem: How can services interact  with programs that  communicate  with different data formats? Solution: Intermediary data format  transformation logic needs  to be introduced in order to  dynamically translate one  data format into another
Protocol Bridging Problem: How can a service exchange data with  consumers that use  different communication protocols? Solution: Bridging logic is introduced to enable communication between different communication protocols by dynamically converting one protocol to another at runtime
4. Service Design Patterns
Chapter 11  Foundational Service Patterns
Functional Decomposition  Problem: To solve a large, complex business problem a corresponding amount of solution logic needs to be created, resulting in a self-contained application with traditional governance and reusability constraints Solution: The large business problem  can be broken down into a  set of smaller, related  problems, allowing the r equired solution logic to  also be decomposed into a  corresponding set of smaller,  related solution logic units
Service Encapsulation Problem: Solution logic designed for a single  application environment is typically  limited in its potential to interoperate  with or be leveraged by other parts  of an enterprise Solution: Solution logic can be encapsulated  by a service so that it is positioned  as an enterprise resource capable  of functioning beyond the boundary  for which it is initially delivered
Chapter 12 Service Implementation Patterns
Service Façade Problem: The coupling of the core service logic  to contracts and implementation  resources can inhibit its evolution  and negatively impact service  consumers Solution: A service façade component is  used to abstract a part of the service architecture with negative coupling potential
Service Façade Problem: The coupling of the core service logic  to contracts and implementation  resources can inhibit its evolution  and negatively impact service  consumers Solution: A service façade component is  used to abstract a part of the service architecture with negative coupling potential
Redundant Implementation Problem: A service that is being actively reused  introduces a potential single point of failure t hat may jeopardize the reliability of all compositions in which it participates if an unexpected error condition occurs Solution: Multiple implementations of  services with high reuse potential or providing critical functionality  can be deployed to guarantee high availability and increased reliability, even when unexpected exceptions  or outages occur
Chapter 13  Service Security Patterns
Exception Shielding Problem: Unfiltered exception data output by  a service may contain internal  implementation details that can  compromise the security of the  service and its surrounding  environment Solution: Potentially unsafe exception data is “sanitized” by replacing it with  exception data that is safe by  design before it is made available to consumers.Unsafe exception- related data is “sanitized,” a process  by which this information is  identified and replaced with  exception information that is  safe by design
Message screening Problem: An attacker can transmit messages with malicious or malformed content to a service, resulting in undesirable behavior Solution: The service is equipped or supplemented with special screening routines that assume that all input data is harmful until proven otherwise
Chapter 14
Chapter 15
Chapter 16
Thanks for your attentions!

More Related Content

What's hot

SOA Principles : 4.service loose coupling
SOA Principles : 4.service loose couplingSOA Principles : 4.service loose coupling
SOA Principles : 4.service loose coupling
Mohamed Zakarya Abdelgawad
 
SOA Course : service process model
SOA Course : service process modelSOA Course : service process model
SOA Course : service process model
Mohamed Zakarya Abdelgawad
 
Introduction to business process execution language
Introduction to business process execution languageIntroduction to business process execution language
Introduction to business process execution language
suranisaunak
 
SOA Principles : 6. service composibility
SOA Principles : 6. service composibilitySOA Principles : 6. service composibility
SOA Principles : 6. service composibility
Mohamed Zakarya Abdelgawad
 
SOA Course - Next Generation
SOA Course - Next GenerationSOA Course - Next Generation
SOA Course - Next Generation
Mohamed Zakarya Abdelgawad
 
SOA unit-3-notes-Introduction to Service Oriented Architecture
SOA unit-3-notes-Introduction to Service Oriented ArchitectureSOA unit-3-notes-Introduction to Service Oriented Architecture
SOA unit-3-notes-Introduction to Service Oriented Architecture
Ramco Institute of Technology, Rajapalayam, Tamilnadu, India
 
SOA PRINCIPLES :2. Service Reusability
SOA PRINCIPLES :2. Service ReusabilitySOA PRINCIPLES :2. Service Reusability
SOA PRINCIPLES :2. Service Reusability
Mohamed Zakarya Abdelgawad
 
BPEL, BPEL vs ESB (Integration)
BPEL, BPEL vs ESB (Integration)BPEL, BPEL vs ESB (Integration)
BPEL, BPEL vs ESB (Integration)
ejlp12
 
Service Oriented Computing - Session1 : Intro
Service Oriented Computing - Session1 : IntroService Oriented Computing - Session1 : Intro
Service Oriented Computing - Session1 : Intro
Mohamed Zakarya Abdelgawad
 
SOA Principles : 8. service statelessness
SOA Principles : 8. service statelessnessSOA Principles : 8. service statelessness
SOA Principles : 8. service statelessness
Mohamed Zakarya Abdelgawad
 
SOA Principles : 3.service discoverability
SOA Principles : 3.service discoverabilitySOA Principles : 3.service discoverability
SOA Principles : 3.service discoverability
Mohamed Zakarya Abdelgawad
 
Web services-Notes
Web services-NotesWeb services-Notes
Building Service Oriented Architecture based applications
Building Service Oriented Architecture based applicationsBuilding Service Oriented Architecture based applications
Building Service Oriented Architecture based applications
Ramco Institute of Technology, Rajapalayam, Tamilnadu, India
 
JDC2008 - Enterprise Integration and Service Oriented Design
JDC2008 - Enterprise Integration and Service Oriented DesignJDC2008 - Enterprise Integration and Service Oriented Design
JDC2008 - Enterprise Integration and Service Oriented DesignHossam Karim
 
Principles of soa
Principles of soaPrinciples of soa
Principles of soa
Krishna_in
 
03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA Architecture03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA Architecture
Pouria Ghatrenabi
 
Service design principles and patterns
Service design principles and patternsService design principles and patterns
Service design principles and patterns
Return on Intelligence
 

What's hot (19)

SOA Principles : 4.service loose coupling
SOA Principles : 4.service loose couplingSOA Principles : 4.service loose coupling
SOA Principles : 4.service loose coupling
 
SOA Course : service process model
SOA Course : service process modelSOA Course : service process model
SOA Course : service process model
 
Introduction to business process execution language
Introduction to business process execution languageIntroduction to business process execution language
Introduction to business process execution language
 
SOA Principles : 6. service composibility
SOA Principles : 6. service composibilitySOA Principles : 6. service composibility
SOA Principles : 6. service composibility
 
SOA Course - Next Generation
SOA Course - Next GenerationSOA Course - Next Generation
SOA Course - Next Generation
 
SOA unit-3-notes-Introduction to Service Oriented Architecture
SOA unit-3-notes-Introduction to Service Oriented ArchitectureSOA unit-3-notes-Introduction to Service Oriented Architecture
SOA unit-3-notes-Introduction to Service Oriented Architecture
 
SOA PRINCIPLES :2. Service Reusability
SOA PRINCIPLES :2. Service ReusabilitySOA PRINCIPLES :2. Service Reusability
SOA PRINCIPLES :2. Service Reusability
 
BPEL, BPEL vs ESB (Integration)
BPEL, BPEL vs ESB (Integration)BPEL, BPEL vs ESB (Integration)
BPEL, BPEL vs ESB (Integration)
 
Service Oriented Computing - Session1 : Intro
Service Oriented Computing - Session1 : IntroService Oriented Computing - Session1 : Intro
Service Oriented Computing - Session1 : Intro
 
SOA Principles : 8. service statelessness
SOA Principles : 8. service statelessnessSOA Principles : 8. service statelessness
SOA Principles : 8. service statelessness
 
Soa & Bpel With Web Sphere
Soa & Bpel With Web SphereSoa & Bpel With Web Sphere
Soa & Bpel With Web Sphere
 
SOA Principles : 3.service discoverability
SOA Principles : 3.service discoverabilitySOA Principles : 3.service discoverability
SOA Principles : 3.service discoverability
 
Web services-Notes
Web services-NotesWeb services-Notes
Web services-Notes
 
Building Service Oriented Architecture based applications
Building Service Oriented Architecture based applicationsBuilding Service Oriented Architecture based applications
Building Service Oriented Architecture based applications
 
JDC2008 - Enterprise Integration and Service Oriented Design
JDC2008 - Enterprise Integration and Service Oriented DesignJDC2008 - Enterprise Integration and Service Oriented Design
JDC2008 - Enterprise Integration and Service Oriented Design
 
Principles of soa
Principles of soaPrinciples of soa
Principles of soa
 
03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA Architecture03 Service Oriented Architecture Series - Basic SOA Architecture
03 Service Oriented Architecture Series - Basic SOA Architecture
 
Soa & Bpel
Soa & BpelSoa & Bpel
Soa & Bpel
 
Service design principles and patterns
Service design principles and patternsService design principles and patterns
Service design principles and patterns
 

Viewers also liked

Framework w architekturze SOA
Framework w architekturze SOAFramework w architekturze SOA
Framework w architekturze SOA
3camp
 
On the Radar: SnapLogic
On the Radar: SnapLogicOn the Radar: SnapLogic
On the Radar: SnapLogic
SnapLogic
 
Slash n: Tech Talk Track 2 – Website Architecture-Mistakes & Learnings - Sidd...
Slash n: Tech Talk Track 2 – Website Architecture-Mistakes & Learnings - Sidd...Slash n: Tech Talk Track 2 – Website Architecture-Mistakes & Learnings - Sidd...
Slash n: Tech Talk Track 2 – Website Architecture-Mistakes & Learnings - Sidd...slashn
 
HTTP/2 for Developers
HTTP/2 for DevelopersHTTP/2 for Developers
HTTP/2 for Developers
Svetlin Nakov
 
Basic design pattern interview questions
Basic design pattern interview questionsBasic design pattern interview questions
Basic design pattern interview questions
jinaldesailive
 
SOA Pattern : Legacy Wrappers
SOA Pattern : Legacy Wrappers SOA Pattern : Legacy Wrappers
SOA Pattern : Legacy Wrappers WSO2
 
Some REST Design Patterns (and Anti-Patterns) - SOA Symposium 2009
Some REST Design Patterns (and Anti-Patterns) - SOA Symposium 2009Some REST Design Patterns (and Anti-Patterns) - SOA Symposium 2009
Some REST Design Patterns (and Anti-Patterns) - SOA Symposium 2009Cesare Pautasso
 
B2B and e-commerce Architecture
B2B and e-commerce ArchitectureB2B and e-commerce Architecture
B2B and e-commerce Architecture
Sonia Grover
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Frameworks Are The Future of Design
Frameworks  Are The Future of DesignFrameworks  Are The Future of Design
Frameworks Are The Future of Design
Joe Lamantia
 
Building a Scalable Architecture for web apps
Building a Scalable Architecture for web appsBuilding a Scalable Architecture for web apps
Building a Scalable Architecture for web apps
Directi Group
 
E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4
Qamar Farooq
 
Framework Design Guidelines
Framework Design GuidelinesFramework Design Guidelines
Framework Design Guidelines
brada
 
Facebook Architecture - Breaking it Open
Facebook Architecture - Breaking it OpenFacebook Architecture - Breaking it Open
Facebook Architecture - Breaking it Open
HARMAN Services
 
A Comprehensive Introduction to Everything SOA
A Comprehensive Introduction to Everything SOAA Comprehensive Introduction to Everything SOA
A Comprehensive Introduction to Everything SOA
Mehmet Akyuz
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
Avirot Mitamura
 
SOA Integration Blueprint with Oracle SOA Suite
SOA Integration Blueprint with Oracle SOA SuiteSOA Integration Blueprint with Oracle SOA Suite
SOA Integration Blueprint with Oracle SOA Suite
Matthias Furrer
 
facebook architecture for 600M users
facebook architecture for 600M usersfacebook architecture for 600M users
facebook architecture for 600M users
Jongyoon Choi
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
Nascenia IT
 

Viewers also liked (20)

Framework w architekturze SOA
Framework w architekturze SOAFramework w architekturze SOA
Framework w architekturze SOA
 
On the Radar: SnapLogic
On the Radar: SnapLogicOn the Radar: SnapLogic
On the Radar: SnapLogic
 
Slash n: Tech Talk Track 2 – Website Architecture-Mistakes & Learnings - Sidd...
Slash n: Tech Talk Track 2 – Website Architecture-Mistakes & Learnings - Sidd...Slash n: Tech Talk Track 2 – Website Architecture-Mistakes & Learnings - Sidd...
Slash n: Tech Talk Track 2 – Website Architecture-Mistakes & Learnings - Sidd...
 
HTTP/2 for Developers
HTTP/2 for DevelopersHTTP/2 for Developers
HTTP/2 for Developers
 
Basic design pattern interview questions
Basic design pattern interview questionsBasic design pattern interview questions
Basic design pattern interview questions
 
SOA Pattern : Legacy Wrappers
SOA Pattern : Legacy Wrappers SOA Pattern : Legacy Wrappers
SOA Pattern : Legacy Wrappers
 
Some REST Design Patterns (and Anti-Patterns) - SOA Symposium 2009
Some REST Design Patterns (and Anti-Patterns) - SOA Symposium 2009Some REST Design Patterns (and Anti-Patterns) - SOA Symposium 2009
Some REST Design Patterns (and Anti-Patterns) - SOA Symposium 2009
 
B2B and e-commerce Architecture
B2B and e-commerce ArchitectureB2B and e-commerce Architecture
B2B and e-commerce Architecture
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Frameworks Are The Future of Design
Frameworks  Are The Future of DesignFrameworks  Are The Future of Design
Frameworks Are The Future of Design
 
Building a Scalable Architecture for web apps
Building a Scalable Architecture for web appsBuilding a Scalable Architecture for web apps
Building a Scalable Architecture for web apps
 
E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4
 
Framework Design Guidelines
Framework Design GuidelinesFramework Design Guidelines
Framework Design Guidelines
 
Facebook Architecture - Breaking it Open
Facebook Architecture - Breaking it OpenFacebook Architecture - Breaking it Open
Facebook Architecture - Breaking it Open
 
A Comprehensive Introduction to Everything SOA
A Comprehensive Introduction to Everything SOAA Comprehensive Introduction to Everything SOA
A Comprehensive Introduction to Everything SOA
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
SOA Unit I
SOA Unit ISOA Unit I
SOA Unit I
 
SOA Integration Blueprint with Oracle SOA Suite
SOA Integration Blueprint with Oracle SOA SuiteSOA Integration Blueprint with Oracle SOA Suite
SOA Integration Blueprint with Oracle SOA Suite
 
facebook architecture for 600M users
facebook architecture for 600M usersfacebook architecture for 600M users
facebook architecture for 600M users
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 

Similar to Soa design pattern

unit 5 cloud.pptx
unit 5 cloud.pptxunit 5 cloud.pptx
unit 5 cloud.pptx
MrPrathapG
 
Private cloud reference model ms
Private cloud reference model msPrivate cloud reference model ms
Private cloud reference model ms
chrisjosewanjira
 
Lecture 9 - SOA in Context
Lecture 9 - SOA in ContextLecture 9 - SOA in Context
Lecture 9 - SOA in Context
phanleson
 
Unit 5- Cloud Applications.pdf
Unit 5- Cloud Applications.pdfUnit 5- Cloud Applications.pdf
Unit 5- Cloud Applications.pdf
MaryJacob24
 
Contemporary research challenges and applications of service oriented archite...
Contemporary research challenges and applications of service oriented archite...Contemporary research challenges and applications of service oriented archite...
Contemporary research challenges and applications of service oriented archite...
Dr. Shahanawaj Ahamad
 
Over view of software artitecture
Over view of software artitectureOver view of software artitecture
Over view of software artitecture
ABDEL RAHMAN KARIM
 
CBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU PresentationCBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU Presentation
mgp1560
 
CBSE VS SOA Presentation
CBSE VS SOA PresentationCBSE VS SOA Presentation
CBSE VS SOA Presentation
Maulik Parikh
 
Dynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented SoftwareDynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented Software
Madjid KETFI
 
Distributed information sys
Distributed information sysDistributed information sys
Distributed information sys
Meena Chauhan
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06Jay van Zyl
 
MuCon 2015 - Microservices in Integration Architecture
MuCon 2015 - Microservices in Integration ArchitectureMuCon 2015 - Microservices in Integration Architecture
MuCon 2015 - Microservices in Integration Architecture
Kim Clark
 
Advanced Software Engineering.ppt
Advanced Software Engineering.pptAdvanced Software Engineering.ppt
Advanced Software Engineering.ppt
Rvishnupriya2
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal Application
Mike Taylor
 
Cloud manager client provisioning guideline draft 1.0
Cloud manager client provisioning guideline draft 1.0Cloud manager client provisioning guideline draft 1.0
Cloud manager client provisioning guideline draft 1.0
Sandeep Sharma IIMK Smart City,IoT,Bigdata,Cloud,BI,DW
 
Three layer API Design Architecture
Three layer API Design ArchitectureThree layer API Design Architecture
Three layer API Design Architecture
Harish Kumar
 
Patterns&Antipatternsof SOA
Patterns&Antipatternsof SOAPatterns&Antipatternsof SOA
Patterns&Antipatternsof SOA
Mohamed Samy
 
Jayant Ghorpade - Cloud Computing White Paper
Jayant Ghorpade - Cloud Computing White PaperJayant Ghorpade - Cloud Computing White Paper
Jayant Ghorpade - Cloud Computing White PaperJayant Ghorpade
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.com
Arun Somu Panneerselvam
 

Similar to Soa design pattern (20)

unit 5 cloud.pptx
unit 5 cloud.pptxunit 5 cloud.pptx
unit 5 cloud.pptx
 
Private cloud reference model ms
Private cloud reference model msPrivate cloud reference model ms
Private cloud reference model ms
 
Lecture 9 - SOA in Context
Lecture 9 - SOA in ContextLecture 9 - SOA in Context
Lecture 9 - SOA in Context
 
Unit 5- Cloud Applications.pdf
Unit 5- Cloud Applications.pdfUnit 5- Cloud Applications.pdf
Unit 5- Cloud Applications.pdf
 
Building a SaaS Style Application
Building a SaaS Style ApplicationBuilding a SaaS Style Application
Building a SaaS Style Application
 
Contemporary research challenges and applications of service oriented archite...
Contemporary research challenges and applications of service oriented archite...Contemporary research challenges and applications of service oriented archite...
Contemporary research challenges and applications of service oriented archite...
 
Over view of software artitecture
Over view of software artitectureOver view of software artitecture
Over view of software artitecture
 
CBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU PresentationCBSE VS SOA SJSU Presentation
CBSE VS SOA SJSU Presentation
 
CBSE VS SOA Presentation
CBSE VS SOA PresentationCBSE VS SOA Presentation
CBSE VS SOA Presentation
 
Dynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented SoftwareDynamic Interface Adaptability in Service Oriented Software
Dynamic Interface Adaptability in Service Oriented Software
 
Distributed information sys
Distributed information sysDistributed information sys
Distributed information sys
 
AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06AA using WS vanZyl 2002-05-06
AA using WS vanZyl 2002-05-06
 
MuCon 2015 - Microservices in Integration Architecture
MuCon 2015 - Microservices in Integration ArchitectureMuCon 2015 - Microservices in Integration Architecture
MuCon 2015 - Microservices in Integration Architecture
 
Advanced Software Engineering.ppt
Advanced Software Engineering.pptAdvanced Software Engineering.ppt
Advanced Software Engineering.ppt
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal Application
 
Cloud manager client provisioning guideline draft 1.0
Cloud manager client provisioning guideline draft 1.0Cloud manager client provisioning guideline draft 1.0
Cloud manager client provisioning guideline draft 1.0
 
Three layer API Design Architecture
Three layer API Design ArchitectureThree layer API Design Architecture
Three layer API Design Architecture
 
Patterns&Antipatternsof SOA
Patterns&Antipatternsof SOAPatterns&Antipatternsof SOA
Patterns&Antipatternsof SOA
 
Jayant Ghorpade - Cloud Computing White Paper
Jayant Ghorpade - Cloud Computing White PaperJayant Ghorpade - Cloud Computing White Paper
Jayant Ghorpade - Cloud Computing White Paper
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.com
 

Soa design pattern

  • 1. SOA Design Pattern 2011.04.07
  • 2.
  • 3.
  • 4.
  • 5. Type of SOA pattern Service Inventory Design Patterns Service Composition Design Patterns Service Design Patterns
  • 6. Work assignment Huu Hau : 6, 7, 8 Van Khanh: 9, 10, 17 Lan anh : 11, 12, 13 Vu Doan: 14, 15, 16 Doan Lap 18,19,20,21
  • 11. Chapter 9 Inventory Implementation Patterns
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Chapter 10 Inventory Governance Patterns
  • 20.
  • 21.
  • 22.
  • 23. 3. Service Composition Design Patterns
  • 24. Chapter 17 Capability Composition Patterns
  • 25.
  • 26.
  • 27.
  • 28. Chapter 18 Service Messaging Patterns
  • 29.
  • 30. State Messaging Problem: When services are required to maintain state information in memory between message exchanges with consumers, their scalability can be comprised, and they can become a performance burden on the surrounding infrastructure. Solution: Instead of retaining the state data in memory, its storage is temporarily delegated to messages
  • 31. Chapter 19 Composition Implementation Patterns
  • 32. Composition Autonomy Problem: Composition controller services naturally lose autonomy when delegating processing tasks to composed services, some of which may be shared across multiple compositions. Solution: All composition participants can be isolated to maximize the autonomy of the composition as a whole
  • 33. Atomic Service Transaction Problem: When runtime activities that span multiple services fail, the parent business task is incomplete and actions performed and changes made up to that point may compromise the integrity of the underlying solution and architecture . Solution: Runtime service activities can be wrapped in a transaction with rollback feature that resets all actions and changes if the parent business task cannot be successfully completed
  • 34. Chapter 20 Service Interaction Security Patterns
  • 35. Data Confidentiality Problem: Within service compositions , data is often required to pass through one or more intermediaries. Point-to-point security protocols, such as those frequently used at the transport-layer, may allow messages containing sensitive information to be intercepted and viewed by such intermediaries Solution: The message contents are encrypted independently from the transport, ensuring that only intended recipients can access the protected data.
  • 36. Data Format Transformation Problem: How can a service verify the credentials provided by a consumer? Solution: Service capabilities require that consumers provide credentials that can be authenticated against an identity store
  • 37. Chapter 21 Transformation Patterns
  • 38. Data Format Transformation Problem: How can services interact with programs that communicate with different data formats? Solution: Intermediary data format transformation logic needs to be introduced in order to dynamically translate one data format into another
  • 39. Protocol Bridging Problem: How can a service exchange data with consumers that use different communication protocols? Solution: Bridging logic is introduced to enable communication between different communication protocols by dynamically converting one protocol to another at runtime
  • 40. 4. Service Design Patterns
  • 41. Chapter 11 Foundational Service Patterns
  • 42. Functional Decomposition Problem: To solve a large, complex business problem a corresponding amount of solution logic needs to be created, resulting in a self-contained application with traditional governance and reusability constraints Solution: The large business problem can be broken down into a set of smaller, related problems, allowing the r equired solution logic to also be decomposed into a corresponding set of smaller, related solution logic units
  • 43. Service Encapsulation Problem: Solution logic designed for a single application environment is typically limited in its potential to interoperate with or be leveraged by other parts of an enterprise Solution: Solution logic can be encapsulated by a service so that it is positioned as an enterprise resource capable of functioning beyond the boundary for which it is initially delivered
  • 44. Chapter 12 Service Implementation Patterns
  • 45. Service Façade Problem: The coupling of the core service logic to contracts and implementation resources can inhibit its evolution and negatively impact service consumers Solution: A service façade component is used to abstract a part of the service architecture with negative coupling potential
  • 46. Service Façade Problem: The coupling of the core service logic to contracts and implementation resources can inhibit its evolution and negatively impact service consumers Solution: A service façade component is used to abstract a part of the service architecture with negative coupling potential
  • 47. Redundant Implementation Problem: A service that is being actively reused introduces a potential single point of failure t hat may jeopardize the reliability of all compositions in which it participates if an unexpected error condition occurs Solution: Multiple implementations of services with high reuse potential or providing critical functionality can be deployed to guarantee high availability and increased reliability, even when unexpected exceptions or outages occur
  • 48. Chapter 13 Service Security Patterns
  • 49. Exception Shielding Problem: Unfiltered exception data output by a service may contain internal implementation details that can compromise the security of the service and its surrounding environment Solution: Potentially unsafe exception data is “sanitized” by replacing it with exception data that is safe by design before it is made available to consumers.Unsafe exception- related data is “sanitized,” a process by which this information is identified and replaced with exception information that is safe by design
  • 50. Message screening Problem: An attacker can transmit messages with malicious or malformed content to a service, resulting in undesirable behavior Solution: The service is equipped or supplemented with special screening routines that assume that all input data is harmful until proven otherwise
  • 54. Thanks for your attentions!