SlideShare une entreprise Scribd logo
1  sur  2
The Service bus

The .NET Service Bus is a core part of the .NET Services offering focused on making the ESB pattern a
reality at Internet scope as part of the Azure™ Services Platform

The .NET Service Bus provides many of the same architectural characteristics found in typical ESB
solutions, including things like identity and access control, naming, a service registry, and a common
messaging fabric. The primary difference is one of scope. In the case of the .NET Service Bus, the
components must be designed to operate in the cloud, at a global Internet scope, and in a highly
scalable and federated manner

. While it’s usually simple to initiate communication from on-premise applications to services
running in the cloud, the reverse is more difficult because on-premise software is usually running
behind multiple firewalls or NAT devices. The Microsoft® .NET Service Bus addresses this problem
space by making it easy to create secure bidirectional communication channels between on-premise
software and services in the cloud.

The ESB pattern has grown in popularity over the years because it simplifies the management of
multiple service connections. One way it does this is by enabling publish/subscribe architectures,
which provides for even looser-coupling throughout an enterprise. With a publish/subscribe
architecture, consumers no longer have to be directly connected to services anymore – everything
just needs a connection to the bus – and nodes can be added or removed at will over time. This type
of architecture also enables event distribution. You can have multiple subscribers to a single
message type, and you can also have multiple publishers of that same message type, giving you N-
to-N multicast capabilities.

Tackling bidirectional communication at Internet scope is not trivial due to some of today’s realities.
The first problem is the shortage of IPv4 addresses. For all practical purposes, we’ve run out. It’s
difficult to acquire a public IPv4 address anymore. Instead, most Internet providers, corporate
networks, and wireless networks use dynamic IP address allocation and network address translation
(NAT) techniques. Such IP addresses are private to those networks and are not publicly addressable
from the outside.

Another challenge is related to security. In most enterprise environments, on-premise software is
almost completely shielded from the outside world by layers and layers of firewalls and other
protective network devices. This is necessary because of the widespread security threads inherent in
the Internet.1 Most network environments allow a variety of outbound ports through their firewalls
but highly constrain the number of allowed inbound ports.2 Ports 80 (HTTP) and 443 (HTTPS) are
often the only sanctioned inbound ports, presenting a big challenge for different types of
bidirectional communication.

The Microsoft® .NET Service Bus is a concrete implementation of the service bus pattern designed to
operate at Internet scope within highly-scalable Microsoft data centers. The .NET Service Bus
provides a federated identity and access control mechanism (via the .NET Access Control Service), a
1
  No one refutes the fact that the Internet is full of bad guys. These days, if you have anything of value, you must design
against the threat of being attacked. Hence, most corporate environments shield themselves heavily with multiple firewall
layers.
2
  An inbound port is required for an external node to initiate communication with an application sitting within the firewall.
federated naming system, a dynamic service registry, and a robust messaging fabric capable of
overcoming the connectivity challenges

Contenu connexe

Tendances

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkMariana Hansen
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
Inside the Cato Networks Management Console
Inside the Cato Networks Management ConsoleInside the Cato Networks Management Console
Inside the Cato Networks Management ConsoleDavid Greenfield
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)Mohit Kumar
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpnAreeba Gill
 
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGNBarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGNAbbie Barbir
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 

Tendances (16)

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
VPN
VPNVPN
VPN
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Inside the Cato Networks Management Console
Inside the Cato Networks Management ConsoleInside the Cato Networks Management Console
Inside the Cato Networks Management Console
 
Vpn
VpnVpn
Vpn
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Presentation1
Presentation1Presentation1
Presentation1
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)Update CV_Mohit Kumar(1)
Update CV_Mohit Kumar(1)
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGNBarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 

En vedette

Mochilas Viaxeiras
Mochilas ViaxeirasMochilas Viaxeiras
Mochilas Viaxeirasluis425
 
Lecturas verano 2016
Lecturas verano 2016Lecturas verano 2016
Lecturas verano 2016bibliobrozos
 
Diario da mochila viaxeira (Biblioteca PdB)
Diario da mochila viaxeira (Biblioteca PdB)Diario da mochila viaxeira (Biblioteca PdB)
Diario da mochila viaxeira (Biblioteca PdB)bibliobrozos
 
Caderno viaxeiro
Caderno viaxeiroCaderno viaxeiro
Caderno viaxeirobibliato
 
El principe de la niebla
El principe de la nieblaEl principe de la niebla
El principe de la nieblabibliobaralla
 
Guía de usuarios da biblioteca
Guía de usuarios da bibliotecaGuía de usuarios da biblioteca
Guía de usuarios da bibliotecabibliobrozos
 
Roald Dahl: el Gran Gigante Bonachón
Roald Dahl: el Gran Gigante BonachónRoald Dahl: el Gran Gigante Bonachón
Roald Dahl: el Gran Gigante Bonachóndinamizalectura
 
Paseo literario : Málaga y la Generación del 27
Paseo literario : Málaga y la Generación del 27Paseo literario : Málaga y la Generación del 27
Paseo literario : Málaga y la Generación del 27dinamizalectura
 

En vedette (10)

Mochilas Viaxeiras
Mochilas ViaxeirasMochilas Viaxeiras
Mochilas Viaxeiras
 
Lecturas verano 2016
Lecturas verano 2016Lecturas verano 2016
Lecturas verano 2016
 
Diario da mochila viaxeira (Biblioteca PdB)
Diario da mochila viaxeira (Biblioteca PdB)Diario da mochila viaxeira (Biblioteca PdB)
Diario da mochila viaxeira (Biblioteca PdB)
 
Caderno viaxeiro
Caderno viaxeiroCaderno viaxeiro
Caderno viaxeiro
 
El principe de la niebla
El principe de la nieblaEl principe de la niebla
El principe de la niebla
 
Guía de usuarios da biblioteca
Guía de usuarios da bibliotecaGuía de usuarios da biblioteca
Guía de usuarios da biblioteca
 
Roald Dahl: el Gran Gigante Bonachón
Roald Dahl: el Gran Gigante BonachónRoald Dahl: el Gran Gigante Bonachón
Roald Dahl: el Gran Gigante Bonachón
 
Paseo literario : Málaga y la Generación del 27
Paseo literario : Málaga y la Generación del 27Paseo literario : Málaga y la Generación del 27
Paseo literario : Málaga y la Generación del 27
 
Andrea (romanía)
Andrea (romanía)Andrea (romanía)
Andrea (romanía)
 
Manuel 1º e.s.o
Manuel 1º e.s.oManuel 1º e.s.o
Manuel 1º e.s.o
 

Similaire à Service Bus

Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Inc.
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R Olime17
 
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...edirin aphunu
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxtodd581
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxglendar3
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)Tuan Yang
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Securityphanleson
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003lime17
 

Similaire à Service Bus (20)

Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data Center
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
WebRTC presentation
WebRTC presentationWebRTC presentation
WebRTC presentation
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R O
 
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
Enterprise Connectivity
Enterprise ConnectivityEnterprise Connectivity
Enterprise Connectivity
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003
 
Unit 2
Unit 2Unit 2
Unit 2
 

Dernier

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Service Bus

  • 1. The Service bus The .NET Service Bus is a core part of the .NET Services offering focused on making the ESB pattern a reality at Internet scope as part of the Azure™ Services Platform The .NET Service Bus provides many of the same architectural characteristics found in typical ESB solutions, including things like identity and access control, naming, a service registry, and a common messaging fabric. The primary difference is one of scope. In the case of the .NET Service Bus, the components must be designed to operate in the cloud, at a global Internet scope, and in a highly scalable and federated manner . While it’s usually simple to initiate communication from on-premise applications to services running in the cloud, the reverse is more difficult because on-premise software is usually running behind multiple firewalls or NAT devices. The Microsoft® .NET Service Bus addresses this problem space by making it easy to create secure bidirectional communication channels between on-premise software and services in the cloud. The ESB pattern has grown in popularity over the years because it simplifies the management of multiple service connections. One way it does this is by enabling publish/subscribe architectures, which provides for even looser-coupling throughout an enterprise. With a publish/subscribe architecture, consumers no longer have to be directly connected to services anymore – everything just needs a connection to the bus – and nodes can be added or removed at will over time. This type of architecture also enables event distribution. You can have multiple subscribers to a single message type, and you can also have multiple publishers of that same message type, giving you N- to-N multicast capabilities. Tackling bidirectional communication at Internet scope is not trivial due to some of today’s realities. The first problem is the shortage of IPv4 addresses. For all practical purposes, we’ve run out. It’s difficult to acquire a public IPv4 address anymore. Instead, most Internet providers, corporate networks, and wireless networks use dynamic IP address allocation and network address translation (NAT) techniques. Such IP addresses are private to those networks and are not publicly addressable from the outside. Another challenge is related to security. In most enterprise environments, on-premise software is almost completely shielded from the outside world by layers and layers of firewalls and other protective network devices. This is necessary because of the widespread security threads inherent in the Internet.1 Most network environments allow a variety of outbound ports through their firewalls but highly constrain the number of allowed inbound ports.2 Ports 80 (HTTP) and 443 (HTTPS) are often the only sanctioned inbound ports, presenting a big challenge for different types of bidirectional communication. The Microsoft® .NET Service Bus is a concrete implementation of the service bus pattern designed to operate at Internet scope within highly-scalable Microsoft data centers. The .NET Service Bus provides a federated identity and access control mechanism (via the .NET Access Control Service), a 1 No one refutes the fact that the Internet is full of bad guys. These days, if you have anything of value, you must design against the threat of being attacked. Hence, most corporate environments shield themselves heavily with multiple firewall layers. 2 An inbound port is required for an external node to initiate communication with an application sitting within the firewall.
  • 2. federated naming system, a dynamic service registry, and a robust messaging fabric capable of overcoming the connectivity challenges