Top Banner
A Distribute d Approach To SOA Infrastruc ture
13
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Download Presentation

A Distributed Approach To

SOA Infrastructur

e

Page 2: Download Presentation

Anne Thomas ManesVP & Research Director, Burton Group

Joined Burton Group in 2003 to launch a research and advisory service on application platform strategies

25 years experience in distributed computing technologies at IBM, DEC, Sun, and Systinet

Involved in Web services from the beginning:

Presented at the W3C Web Services Workshop (for Sun)

Participated in the SOAP, WSDL, UDDI, WS-Security, and WS-I standardization groups (for Sun and Systinet)

Author of Web Services: A Manager’s Guide (2003)

Page 3: Download Presentation

Eric NewcomerChief Technology Officer, IONA Technologies

Joined IONA in November 1999, after 16 years at Digital/Compaq, mostly in DB and TP

Responsible for IONA's technology and standards strategies

Involved in Web services from the beginning:

Co-submitter of SOAP and founding member of the XML Protocols Working Group at W3C

Co-editor of the W3C Web Services Architecture specification

Co-author of WS-Transactions specifications & co-chair of OASIS WS-Transactions technical committee

Co-chair Service Component Architecture (SCA) policy working group

Co-author of Principles of Transaction Processing (1997), author of Understanding Web Services (2002), co-author of Understanding SOA with Web Services (2004)

New Book Now Available!

Page 4: Download Presentation

A Distributed Approach To

SOA Infrastructur

e

Page 5: Download Presentation

Call centerWebself-service

Partnercustomer service

Retailcustomer service

Accountmanagement

Profilemanagement

Orderprocessing

Applications consuming services

Managed communications infrastructure

Shared, reusable services

Applications Sharing Services

Page 6: Download Presentation

Adapters Adapters Adapters Adapters

Web service Resource

WSDL/SOAP JCA

MOM

JMS/MOM

Message Bus (SOAP/MOM/WSRM)

Packagedapplications

CICS, IMS,Tuxedo,CORBA

B2Bprotocols

In-houseapplications

EAI Style ESB Architecture

Page 7: Download Presentation

ProvisioningFulfillment

Incremental, Dynamic, Tech-Neutral

Au

tho

rize

Proprietary EAI Broker or JEE-Based Solution

Transformation Business Rules

MetaData Orchestration

Custom Services

Routing Security

Tools Management

Au

tho

rize

NetworkProprietaryProtocol

TIBRV

ProprietaryProtocol

Server-centric, Hub-based

Adapter

Customer Care

Adapter

OrderManagement

AdapterAdapter

ProprietaryProtocol

ProprietaryProtocol

ProprietaryProtocol

ProprietaryProtocol

ARTIX

ARTIX

ARTIX

ARTIX

ARTIX

Fully Distributed ApproachEndpoint Services

Transformation Business Rules

MetaData Orchestration

Custom Services

Routing Security

Tools Management

Endpoint Services

Transformation Business Rules

MetaData Orchestration

Custom Services

Routing Security

Tools Management

Transformation Business Rules

MetaData Orchestration

Custom Services

Routing Security

Tools Management

SOAP/HTTP

Network Clients

Page 8: Download Presentation

Famous Example: World Wide Web

Human to computer interactions fully distributedClick on URL results in direct access to server (or intermediary)Performance is okScalability is okWeb software added to system endpoints

Page 9: Download Presentation

Endpoint topologies

Page 10: Download Presentation

SOA Business Store

Meta

Data

Mod

el

Serv

ices

ContractsContracts

SOA Tools ProjectR

ep

osi

tory

SOA Business Store

ConfigConfig

PolicyPolicy

Serv

ices

BusinessServicesBusinessServices

ESB Service Endpoints

CORBA / J2EESystems

CORBA / J2EESystems

JAVA / J2EE Systems

JAVA / J2EE Systems

MOM BasedSystems

MOM BasedSystems

MainframeTransactionsMainframe

Transactions

ArtixArtix ArtixArtix ArtixArtix CeltixCeltix

Consumers

POLICY:All Endpoints

Must be Authenticated

POLICY:All Endpoints

Must be Authenticated

ArtixArtix

Example: Distributed Policy EnforcementExample: Distributed Policy Enforcement

ConfigurationAutomatically

Updated

ConfigurationAutomatically

Updated

ExecuteTransaction

ExecuteTransaction

IONA SecurityFramework

EstablishCredentialsEstablish

Credentials

DataServices

DataServices

OrchestrationOrchestration CompositeServices

CompositeServices

ManagementServices

ManagementServices

TransactionServices

TransactionServices

LocationServicesLocationServices

SecurityServicesSecurityServices

Service Intermediaries

ExecuteWeb Service

Call

ExecuteWeb Service

CallOrchestrationOrchestration

Page 11: Download Presentation

Key PointsInherently Distributed Approach

Lightweight, standards-based endpointsBoth open source and closed sourceFlexible deployment model for intermediariesTransports/Data Formats divorced from implementation

Repository for single point of controlLogical and Physical View of the NetworkAbility to administer both policies and implementationsLike our runtime, extensible to support different deployment containers.

Page 12: Download Presentation

For More InformationDec 19th Webcast:

Open Source and Closed Source Software for SOA Infrastructure www.iona.com/webcasts

SOA White Papers www.iona.com/whitepaper

Webcast Replays www.iona.com/webcasts

Download Artixwww.iona.com/downloads/artix.htm

Download Celtixwww.iona.com/downloads/celtix.htm

Page 13: Download Presentation

Q&A