SlideShare uma empresa Scribd logo
1 de 13
Presented By:
Amirali Charania 81
 Sumeet Sawant 79
   A service oriented architecture is an
    information technology approach of strategy
    in which application make use of services
    available in a network such as World Wide
    Web.
   A service provides a specific function,
    typically a business function, such as
    analyzing an individual’s credit history or
    processing a purchase order.
   The aggregated, or composite, service can be
    used to satisfy a more complex business
    requirement.
   In fact, one way of looking at an SOA is an
    approach to connecting applications so that
    they can communicate with each other.
   In other words, a SOA is way of sharing
    functions in a widespread and flexible way.
   SOA is a software architecture model
    ◦ in which business functionality are logically
      grouped and encapsulated into
      self contained,
      distinct and reusable units
        called services that
      represent a high level business concept
      can be distributed over a network
      can be reused to create new business applications
      contain contract with specification of the purpose,
       functionality, interfaces (coarse grained), constraints,
       usage
         ... of the business functionality
• A collection of services           services




• classified into types       type    type      type




• arranged into layers




• Governed by architectural
  patterns and policies
   Centralized business functions used by
    multiple entities

   Integration with partners

   Existence of old technologies that are still
    working
   A homogeneous IT environment

   When true real-time performance is critical

   When tight coupling is not an inconvenience
   XML is the foundation for virtually all Web
    services standards, such as XML schema,
    SOAP, Web Services Description Language
    (WSDL), and Universal Description, Discovery,
    and Integration (UDDI).

   These standards leverage the core concept of
    XML-based representations, a worldwide
    supported format that carries out information
    interchange between service providers and
    requesters in an SOA.
   Using XML resolves the challenge of working
    with different data formats in different
    applications across multiple platforms.

   XML has the benefit of ease of representation,
    being text-based, flexible, and extensible by
    nature.
   SOAP: This simple XML-based protocol lets
    applications exchange information over
    transportation protocols like HTTP. Using
    XML in SOAP guarantees that the SOAP
    protocol is:
    ◦ Platform independent.
    ◦ Internet usable.
   WSDL: WSDL is a document written in XML to
    describe a Web service. It specifies the
    location of the service and the operations (or
    methods) the service exposes to let
    individuals access those services. A WSDL file
    describes four main things:
    ◦ Data types of messages
    ◦ Binding information for the transport protocol, such
      as HTTP and JMS
    ◦ Service address to be used when calling it
   WS-Security
        The WS-Security protocol is based on adding SOAP
         extensions to the message header to store security
         metadata that's intended to provide protection through
         message integrity, confidentiality, and authentication.
        Those extensions provide a general-purpose
         mechanism to associate security tokens to the message
         rather than a fixed security mechanism.
        The generic platform supports different security
         mechanisms.
        protocol is designed to be extensible.
   This presentation examined the fundamentals
    of SOA and covered the following topics:
        The value of SOA, how it can benefit an organization,
         and when it should and shouldn't be used

        SOA concepts, including services, processes, and the
         role of standards and service registry

        Basic SOA architecture, including more technical
         concepts, such as the role of Web services, ESB

Mais conteúdo relacionado

Mais procurados

Part II - Summary of service oriented architecture (SOA) concepts, technology...
Part II - Summary of service oriented architecture (SOA) concepts, technology...Part II - Summary of service oriented architecture (SOA) concepts, technology...
Part II - Summary of service oriented architecture (SOA) concepts, technology...Mohammed Omar
 
Introduction to Micro Services
Introduction to Micro ServicesIntroduction to Micro Services
Introduction to Micro ServicesShashi Shekhar
 
Can IBM i play with SOA?
Can IBM i play with SOA?Can IBM i play with SOA?
Can IBM i play with SOA?LANSA
 
Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)Mazhar Ishaq Khokhar
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented ArchitectureSyed Mustafa
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesAIRCC Publishing Corporation
 
service orentation documentation
service orentation documentationservice orentation documentation
service orentation documentationpavan nani
 
Semantic Mediation Bus Presentation at VORTE 2012
Semantic Mediation Bus Presentation at VORTE 2012Semantic Mediation Bus Presentation at VORTE 2012
Semantic Mediation Bus Presentation at VORTE 2012Wen Zhu
 

Mais procurados (19)

Part II - Summary of service oriented architecture (SOA) concepts, technology...
Part II - Summary of service oriented architecture (SOA) concepts, technology...Part II - Summary of service oriented architecture (SOA) concepts, technology...
Part II - Summary of service oriented architecture (SOA) concepts, technology...
 
Web services
Web servicesWeb services
Web services
 
Introduction to Micro Services
Introduction to Micro ServicesIntroduction to Micro Services
Introduction to Micro Services
 
Widget SOA
Widget SOAWidget SOA
Widget SOA
 
Can IBM i play with SOA?
Can IBM i play with SOA?Can IBM i play with SOA?
Can IBM i play with SOA?
 
Soa chapter 5
Soa chapter 5Soa chapter 5
Soa chapter 5
 
Web Service Extensions | Torry Harris Whitepaper
Web Service Extensions | Torry Harris WhitepaperWeb Service Extensions | Torry Harris Whitepaper
Web Service Extensions | Torry Harris Whitepaper
 
Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)
 
Soa web pres new
Soa web pres newSoa web pres new
Soa web pres new
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
 
Web Services ppt
Web Services pptWeb Services ppt
Web Services ppt
 
CISSPills #1.03
CISSPills #1.03CISSPills #1.03
CISSPills #1.03
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014
 
It's all semantics! -The premises and promises of the semantic web
It's all semantics! -The premises and promises of the semantic webIt's all semantics! -The premises and promises of the semantic web
It's all semantics! -The premises and promises of the semantic web
 
service orentation documentation
service orentation documentationservice orentation documentation
service orentation documentation
 
Introduction to SOA
Introduction to SOAIntroduction to SOA
Introduction to SOA
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Semantic Mediation Bus Presentation at VORTE 2012
Semantic Mediation Bus Presentation at VORTE 2012Semantic Mediation Bus Presentation at VORTE 2012
Semantic Mediation Bus Presentation at VORTE 2012
 

Semelhante a Soa

Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soaijbuiiir1
 
E-Services course Chapter II ISI by Ettaieb Abdessattar
E-Services course Chapter II ISI by Ettaieb AbdessattarE-Services course Chapter II ISI by Ettaieb Abdessattar
E-Services course Chapter II ISI by Ettaieb AbdessattarAbdessattar Ettaieb
 
WDSOA'05 Whitepaper: SOA and the Future of Application Development
WDSOA'05 Whitepaper: SOA and the Future of Application DevelopmentWDSOA'05 Whitepaper: SOA and the Future of Application Development
WDSOA'05 Whitepaper: SOA and the Future of Application DevelopmentRajesh Raheja
 
Introduction to webservices
Introduction to webservicesIntroduction to webservices
Introduction to webservicesGagandeep Singh
 
Soa session 1 part 1(2)
Soa session 1 part 1(2)Soa session 1 part 1(2)
Soa session 1 part 1(2)Shilpi Jain
 
Enterprise Service Bus
Enterprise Service BusEnterprise Service Bus
Enterprise Service BusHamed Hatami
 
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptNKannanCSE
 
An Empirical Study on Testing of SOA based Services
An Empirical Study on Testing of SOA based ServicesAn Empirical Study on Testing of SOA based Services
An Empirical Study on Testing of SOA based ServicesAbhishek Kumar
 
5 ijitcs v7-n1-7-an empirical study on testing of soa based services
5 ijitcs v7-n1-7-an empirical study on testing of soa based    services5 ijitcs v7-n1-7-an empirical study on testing of soa based    services
5 ijitcs v7-n1-7-an empirical study on testing of soa based servicesAbhishek Srivastava
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and developmentishmecse13
 
The New Enterprise Alphabet - .Net, XML And XBRL
The New Enterprise Alphabet - .Net, XML And XBRLThe New Enterprise Alphabet - .Net, XML And XBRL
The New Enterprise Alphabet - .Net, XML And XBRLJorgen Thelin
 
Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...Mohammed Omar
 

Semelhante a Soa (20)

Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soa
 
Soa & Bpel With Web Sphere
Soa & Bpel With Web SphereSoa & Bpel With Web Sphere
Soa & Bpel With Web Sphere
 
Soa & Bpel With Web Sphere
Soa & Bpel With Web SphereSoa & Bpel With Web Sphere
Soa & Bpel With Web Sphere
 
E-Services course Chapter II ISI by Ettaieb Abdessattar
E-Services course Chapter II ISI by Ettaieb AbdessattarE-Services course Chapter II ISI by Ettaieb Abdessattar
E-Services course Chapter II ISI by Ettaieb Abdessattar
 
WDSOA'05 Whitepaper: SOA and the Future of Application Development
WDSOA'05 Whitepaper: SOA and the Future of Application DevelopmentWDSOA'05 Whitepaper: SOA and the Future of Application Development
WDSOA'05 Whitepaper: SOA and the Future of Application Development
 
As044285288
As044285288As044285288
As044285288
 
Introduction to webservices
Introduction to webservicesIntroduction to webservices
Introduction to webservices
 
Soa session 1 part 1(2)
Soa session 1 part 1(2)Soa session 1 part 1(2)
Soa session 1 part 1(2)
 
Web services
Web servicesWeb services
Web services
 
Enterprise Service Bus
Enterprise Service BusEnterprise Service Bus
Enterprise Service Bus
 
integeration
integerationintegeration
integeration
 
Basic concepts of soa
Basic concepts of soaBasic concepts of soa
Basic concepts of soa
 
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
SOA@MODULE-III.pptSOA@MODULE-III.pptSOA@MODULE-III.ppt
 
An Empirical Study on Testing of SOA based Services
An Empirical Study on Testing of SOA based ServicesAn Empirical Study on Testing of SOA based Services
An Empirical Study on Testing of SOA based Services
 
5 ijitcs v7-n1-7-an empirical study on testing of soa based services
5 ijitcs v7-n1-7-an empirical study on testing of soa based    services5 ijitcs v7-n1-7-an empirical study on testing of soa based    services
5 ijitcs v7-n1-7-an empirical study on testing of soa based services
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and development
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
The New Enterprise Alphabet - .Net, XML And XBRL
The New Enterprise Alphabet - .Net, XML And XBRLThe New Enterprise Alphabet - .Net, XML And XBRL
The New Enterprise Alphabet - .Net, XML And XBRL
 
WCF
WCFWCF
WCF
 
Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...Part I -Summary of service oriented architecture (soa) concepts, technology, ...
Part I -Summary of service oriented architecture (soa) concepts, technology, ...
 

Mais de أحلام انصارى

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...أحلام انصارى
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticأحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognitionأحلام انصارى
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorأحلام انصارى
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interactionأحلام انصارى
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website أحلام انصارى
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 

Mais de أحلام انصارى (20)

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Dmz
Dmz Dmz
Dmz
 
Cryptography
Cryptography Cryptography
Cryptography
 

Soa

  • 1. Presented By: Amirali Charania 81 Sumeet Sawant 79
  • 2. A service oriented architecture is an information technology approach of strategy in which application make use of services available in a network such as World Wide Web.  A service provides a specific function, typically a business function, such as analyzing an individual’s credit history or processing a purchase order.
  • 3. The aggregated, or composite, service can be used to satisfy a more complex business requirement.  In fact, one way of looking at an SOA is an approach to connecting applications so that they can communicate with each other.  In other words, a SOA is way of sharing functions in a widespread and flexible way.
  • 4. SOA is a software architecture model ◦ in which business functionality are logically grouped and encapsulated into  self contained,  distinct and reusable units called services that  represent a high level business concept  can be distributed over a network  can be reused to create new business applications  contain contract with specification of the purpose, functionality, interfaces (coarse grained), constraints, usage ... of the business functionality
  • 5. • A collection of services services • classified into types type type type • arranged into layers • Governed by architectural patterns and policies
  • 6. Centralized business functions used by multiple entities  Integration with partners  Existence of old technologies that are still working
  • 7. A homogeneous IT environment  When true real-time performance is critical  When tight coupling is not an inconvenience
  • 8. XML is the foundation for virtually all Web services standards, such as XML schema, SOAP, Web Services Description Language (WSDL), and Universal Description, Discovery, and Integration (UDDI).  These standards leverage the core concept of XML-based representations, a worldwide supported format that carries out information interchange between service providers and requesters in an SOA.
  • 9. Using XML resolves the challenge of working with different data formats in different applications across multiple platforms.  XML has the benefit of ease of representation, being text-based, flexible, and extensible by nature.
  • 10. SOAP: This simple XML-based protocol lets applications exchange information over transportation protocols like HTTP. Using XML in SOAP guarantees that the SOAP protocol is: ◦ Platform independent. ◦ Internet usable.
  • 11. WSDL: WSDL is a document written in XML to describe a Web service. It specifies the location of the service and the operations (or methods) the service exposes to let individuals access those services. A WSDL file describes four main things: ◦ Data types of messages ◦ Binding information for the transport protocol, such as HTTP and JMS ◦ Service address to be used when calling it
  • 12. WS-Security  The WS-Security protocol is based on adding SOAP extensions to the message header to store security metadata that's intended to provide protection through message integrity, confidentiality, and authentication.  Those extensions provide a general-purpose mechanism to associate security tokens to the message rather than a fixed security mechanism.  The generic platform supports different security mechanisms.  protocol is designed to be extensible.
  • 13. This presentation examined the fundamentals of SOA and covered the following topics:  The value of SOA, how it can benefit an organization, and when it should and shouldn't be used  SOA concepts, including services, processes, and the role of standards and service registry  Basic SOA architecture, including more technical concepts, such as the role of Web services, ESB