SlideShare uma empresa Scribd logo
1 de 2
The Service bus

The .NET Service Bus is a core part of the .NET Services offering focused on making the ESB pattern a
reality at Internet scope as part of the Azure™ Services Platform

The .NET Service Bus provides many of the same architectural characteristics found in typical ESB
solutions, including things like identity and access control, naming, a service registry, and a common
messaging fabric. The primary difference is one of scope. In the case of the .NET Service Bus, the
components must be designed to operate in the cloud, at a global Internet scope, and in a highly
scalable and federated manner

. While it’s usually simple to initiate communication from on-premise applications to services
running in the cloud, the reverse is more difficult because on-premise software is usually running
behind multiple firewalls or NAT devices. The Microsoft® .NET Service Bus addresses this problem
space by making it easy to create secure bidirectional communication channels between on-premise
software and services in the cloud.

The ESB pattern has grown in popularity over the years because it simplifies the management of
multiple service connections. One way it does this is by enabling publish/subscribe architectures,
which provides for even looser-coupling throughout an enterprise. With a publish/subscribe
architecture, consumers no longer have to be directly connected to services anymore – everything
just needs a connection to the bus – and nodes can be added or removed at will over time. This type
of architecture also enables event distribution. You can have multiple subscribers to a single
message type, and you can also have multiple publishers of that same message type, giving you N-
to-N multicast capabilities.

Tackling bidirectional communication at Internet scope is not trivial due to some of today’s realities.
The first problem is the shortage of IPv4 addresses. For all practical purposes, we’ve run out. It’s
difficult to acquire a public IPv4 address anymore. Instead, most Internet providers, corporate
networks, and wireless networks use dynamic IP address allocation and network address translation
(NAT) techniques. Such IP addresses are private to those networks and are not publicly addressable
from the outside.

Another challenge is related to security. In most enterprise environments, on-premise software is
almost completely shielded from the outside world by layers and layers of firewalls and other
protective network devices. This is necessary because of the widespread security threads inherent in
the Internet.1 Most network environments allow a variety of outbound ports through their firewalls
but highly constrain the number of allowed inbound ports.2 Ports 80 (HTTP) and 443 (HTTPS) are
often the only sanctioned inbound ports, presenting a big challenge for different types of
bidirectional communication.

The Microsoft® .NET Service Bus is a concrete implementation of the service bus pattern designed to
operate at Internet scope within highly-scalable Microsoft data centers. The .NET Service Bus
provides a federated identity and access control mechanism (via the .NET Access Control Service), a
1
  No one refutes the fact that the Internet is full of bad guys. These days, if you have anything of value, you must design
against the threat of being attacked. Hence, most corporate environments shield themselves heavily with multiple firewall
layers.
2
  An inbound port is required for an external node to initiate communication with an application sitting within the firewall.
federated naming system, a dynamic service registry, and a robust messaging fabric capable of
overcoming the connectivity challenges

Mais conteúdo relacionado

Mais procurados

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 
Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)
Mohit Kumar
 

Mais procurados (16)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
VPN
VPNVPN
VPN
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Inside the Cato Networks Management Console
Inside the Cato Networks Management ConsoleInside the Cato Networks Management Console
Inside the Cato Networks Management Console
 
Vpn
VpnVpn
Vpn
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Presentation1
Presentation1Presentation1
Presentation1
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGNBarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 

Destaque (10)

Mochilas Viaxeiras
Mochilas ViaxeirasMochilas Viaxeiras
Mochilas Viaxeiras
 
Lecturas verano 2016
Lecturas verano 2016Lecturas verano 2016
Lecturas verano 2016
 
Diario da mochila viaxeira (Biblioteca PdB)
Diario da mochila viaxeira (Biblioteca PdB)Diario da mochila viaxeira (Biblioteca PdB)
Diario da mochila viaxeira (Biblioteca PdB)
 
Caderno viaxeiro
Caderno viaxeiroCaderno viaxeiro
Caderno viaxeiro
 
El principe de la niebla
El principe de la nieblaEl principe de la niebla
El principe de la niebla
 
Guía de usuarios da biblioteca
Guía de usuarios da bibliotecaGuía de usuarios da biblioteca
Guía de usuarios da biblioteca
 
Roald Dahl: el Gran Gigante Bonachón
Roald Dahl: el Gran Gigante BonachónRoald Dahl: el Gran Gigante Bonachón
Roald Dahl: el Gran Gigante Bonachón
 
Paseo literario : Málaga y la Generación del 27
Paseo literario : Málaga y la Generación del 27Paseo literario : Málaga y la Generación del 27
Paseo literario : Málaga y la Generación del 27
 
Andrea (romanía)
Andrea (romanía)Andrea (romanía)
Andrea (romanía)
 
Manuel 1º e.s.o
Manuel 1º e.s.oManuel 1º e.s.o
Manuel 1º e.s.o
 

Semelhante a Service Bus

Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
ajaymane22
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
reddydivakara
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R O
lime17
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
todd581
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
glendar3
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
phanleson
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003
lime17
 

Semelhante a Service Bus (20)

Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
WebRTC presentation
WebRTC presentationWebRTC presentation
WebRTC presentation
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R O
 
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
Enterprise Connectivity
Enterprise ConnectivityEnterprise Connectivity
Enterprise Connectivity
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003
 
Unit 2
Unit 2Unit 2
Unit 2
 

Último

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Service Bus

  • 1. The Service bus The .NET Service Bus is a core part of the .NET Services offering focused on making the ESB pattern a reality at Internet scope as part of the Azure™ Services Platform The .NET Service Bus provides many of the same architectural characteristics found in typical ESB solutions, including things like identity and access control, naming, a service registry, and a common messaging fabric. The primary difference is one of scope. In the case of the .NET Service Bus, the components must be designed to operate in the cloud, at a global Internet scope, and in a highly scalable and federated manner . While it’s usually simple to initiate communication from on-premise applications to services running in the cloud, the reverse is more difficult because on-premise software is usually running behind multiple firewalls or NAT devices. The Microsoft® .NET Service Bus addresses this problem space by making it easy to create secure bidirectional communication channels between on-premise software and services in the cloud. The ESB pattern has grown in popularity over the years because it simplifies the management of multiple service connections. One way it does this is by enabling publish/subscribe architectures, which provides for even looser-coupling throughout an enterprise. With a publish/subscribe architecture, consumers no longer have to be directly connected to services anymore – everything just needs a connection to the bus – and nodes can be added or removed at will over time. This type of architecture also enables event distribution. You can have multiple subscribers to a single message type, and you can also have multiple publishers of that same message type, giving you N- to-N multicast capabilities. Tackling bidirectional communication at Internet scope is not trivial due to some of today’s realities. The first problem is the shortage of IPv4 addresses. For all practical purposes, we’ve run out. It’s difficult to acquire a public IPv4 address anymore. Instead, most Internet providers, corporate networks, and wireless networks use dynamic IP address allocation and network address translation (NAT) techniques. Such IP addresses are private to those networks and are not publicly addressable from the outside. Another challenge is related to security. In most enterprise environments, on-premise software is almost completely shielded from the outside world by layers and layers of firewalls and other protective network devices. This is necessary because of the widespread security threads inherent in the Internet.1 Most network environments allow a variety of outbound ports through their firewalls but highly constrain the number of allowed inbound ports.2 Ports 80 (HTTP) and 443 (HTTPS) are often the only sanctioned inbound ports, presenting a big challenge for different types of bidirectional communication. The Microsoft® .NET Service Bus is a concrete implementation of the service bus pattern designed to operate at Internet scope within highly-scalable Microsoft data centers. The .NET Service Bus provides a federated identity and access control mechanism (via the .NET Access Control Service), a 1 No one refutes the fact that the Internet is full of bad guys. These days, if you have anything of value, you must design against the threat of being attacked. Hence, most corporate environments shield themselves heavily with multiple firewall layers. 2 An inbound port is required for an external node to initiate communication with an application sitting within the firewall.
  • 2. federated naming system, a dynamic service registry, and a robust messaging fabric capable of overcoming the connectivity challenges