Checklist

Certification

You will get a certificate on completing this course.

University

This course is not affiliated with any university.

Price

This course costs very less.

Edvicer's Rewards

You can get a reward of 150 coins on buying this course. These coins can be redeemed for 1 coin= 1Re.

Real World SOA: Design and Implementation

Real World SOA: Design and Implementation

1425
Start anytime
Self paced
English
Course by
PluralsightCourses from Pluralsight
Certificate awarded
Intermediate
Login to earn 150Edvicer reward coin150 coins = INR 150

Limited Time Discount Offers

Save your money with Edvicer. Check out our premium courses with discount offers.

Discount offers - Edvicer

Limited Time Discount Offers

Save your money with Edvicer. Check out our premium courses with discount offers.

Map your Career

Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.

Career Mapper - Edvicer

Map your Career

Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.

Checklist

Certification

You will get a certificate on completing this course.

University

This course is not affiliated with any university.

Price

This course costs very less.

Edvicer's Rewards

You can get a reward of 150 coins on buying this course. These coins can be redeemed for 1 coin= 1Re.

Why should you choose this course?

Description

This course is a continuation of the course 'Real World SOA: Analysis and Design.' In that course, you studied SOA analysis and overall design, here you will get more detailed about implementation.

Syllabus

Introduction
What Is this Course About?
Should You Watch Both Courses?
Selected Technology
Course Structure
Prerequisites
Introduction
What We've Learned?
So, How Did We Achieve the Business Goals?
Introduction
What Is Integration?
How SOA and Integration Relate?
Integration Services
The Interface of Integration Services
Integration Services Design Tradeoffs
But What if Existing Systems Already Expose Web Services?
Bottom-up Analysis: Identify Integration Services
Case Study: Identify Integration Services
Summary
Introduction
What Are SOA Design Principles?
Principle #1: Contract Standardization
Standardization Techniques and Benefits
Principle #2: Loose Coupling
Coupling Reduction Strategies
Principle #3: Reusability
Principle #4: Abstraction
Principle #5: Autonomy
Principle #6: State Management
State Reduction Guidelines
Principle #7: Discoverability
Principle #8: Composability
Design Principles During the Analysis Phase
Where Are the Demos?
Summary
Introduction
Service Model and Channel Layer
Binding Elements
Channel Layer
Channel Factories and Channel Listeners
Channel Factories
Channel Listeners
Channel Shapes
Dispatcher
Demo: Programmatically Working with Channel Factories
Demo: Programmatically Working with Channel Shapes
Summary
Introduction
What Is a Service Contract?
Centralizing and Sharing Service Contracts
Sharing Contracts with Clients
The Contract Repository
Demo: The Contract Repository
The Full Discovery Process
Summary
Introduction
Client-service Session
Demo Preparation: RawCap and Wireshark
Demo: Transport Session
Demo: Application Session
Service State
Demo: Service State
Scalability: The Role of Session and State
Scalability Tip 1: HTTP-keep Alive
Scalability Tip 2: TCP Connection Pooling
Scalability Tip 3: Binary XML Encoding Over HTTP
Scenario Design Options: 'Unrelated' Calls
Demo: No Session with No State
Scenario Design Options: 'Related Calls'
Demo: Option1 – Session with Service State
Demo: Option2 – No Session with Persisted (Deferred) State
Demo: Option3 – No Session/State and Change Granularity
Scalability Tip 4: Separating Heavy Operations
Scalability Tip 5: Execution State (Memory) Management
Scalability Tip 6: Concurrency
Affected Design Principles
Summary
What's Next?
Introduction
What Is Message Reliability?
Reliable Messaging Protocol
Demo: Reliable Messaging
Scenario #1: Network Reliability – Lost Response
Demo: Scenario1
Scenario #2: Network Latency – Delayed Request
Demo: Scenario #2
Reliable Messaging and Concurrency
Demo: RM and Concurrency
Reliable Session and Service State
What About Guaranteed Delivery?
Reliable Messaging Pros, Cons, and Recommendations
Business Semantics
Remember: Study Your Reliability Requirements
Remember: We're in a Composition World!
Affected Design Principles
Summary
What's Next?
Introduction
Overview of Message Exchange Patterns (MEPs)
Understanding One-way
Case #1: HTTP Transport / No Application Session
Demo: Case #1
Case #2: HTTP Transport / Application Session
Demo: Case #2
Case #3: HTTP Transport / Application Session / One-way Contract
Demo: Case #3
Case #4: TCP Transport
Demo: Case #4
Case #5: TCP Transport / OneWayBindingElement
Demo: Case #5
Demo: Using Async with One-way
Recap: Recommendations for Using One-way
What’s Next?
Introduction
Datagram Pattern
Demo: Datagram
Duplex Pattern
Duplex in WCF
Demo: Duplex with NetTcpBinding
Demo: Duplex with WSDualHttpBinding
Design Recommendations for Duplex with TCP vs. HTTP
Duplex vs. Datagram vs. Async Request/Response
Publish-subscribe Pattern
Demo: Pub-sub Using Duplex
Publish-subscribe Using Datagram
'True' Asynchronous Patterns Require Queuing
Affected Design Principles
Summary
What’s Next?
Introduction
The Security Concerns
Scenario #1: Client Authentication
Why Trust-based Authentication?
Demo Preparation
Demo: Trust-based Authentication
Scenario #2: Assigning Accounts to Clients at Large Scale SOA
Scenario #3: Tokens for Composing Multiple Services
Demo: Tokens for Composing Multiple Services
Scenario #4: Token Propagation in Multi-level Compositions
Demo: Passthrough Token
Demo: ActAs Token
Other Authentication Scenarios
Scenario #5: Authorization
Demo: Authorization
Scenario #6: Integrity and Privacy
Side Node: SSL and TLS
Transport-based Integrity and Privacy
Demo: HTTP/TCP Transport Security (with Issued Tokens)
Message-based Integrity and Privacy
Demo: HTTP Message Security (with Issued Tokens)
TCP Message Security (with Issued Tokens)
Scenario #7: Transport Security and Load Balancers SSL Offloading
Demo: Transport Security and SSL Offloading
Scenario #8: End-to-End Protection Through Intermediaries
Other Attacks: Replay, Non-repudiation, Man-in-the-Middle
Affected Design Principles
Summary
What’s Next?
Introduction
Why Routing?
Why Not the WCF Out-of-the-Box Router?
Scenario #1: Untrusted Router
Step #1: Receive Messages
Step #2: Build Routing Logic
Step #3: Customize the Dispatching Process
Step #4: Understand Request Security Header
Step #5: Route Messages
Step #6: Understand Response Security Header
Demo: Untrusted Router
What About Authenticating to the Router Itself?
Scenario #2: Trusted Router
(Unique) Steps to Build the Trusted Router
Demo: Trusted Router
What if the Service Does Not Want the Router Identity?
Scenario #3: Duplex Router
Demo: Duplex Router
Extending the Router with Guaranteed Delivery
What About ESB Routing?
Affected Design Principles
Summary
What’s Next?
Introduction
What Is Dynamic Discovery?
Discovery Models
The Discovery Service
Demo: Part 1 – The Discovery Service
Demo: Part 2 – Making the Service Discoverable
Demo: Part 3 – Client Probing
Demo: Part 4 – Running the Demo
Discovery vs. Routing
Discovery with Routing
Discovery and Composition
What About Design Time Discoverability?
Affected Design Principles
Summary
Introduction
Before You Start: Prerequisites for this Module
Basic Definitions
Demo: Atomic Distributed Transaction
Scalability and Performance: Locking and Isolation Levels
Demo: Locking and Isolation Levels
Transaction Voting
Atomic Transactions in Our SOA Reference Architecture
The Problems of Atomic Transactions
Explicit Management of Transactions
Saga (Compensation)
Business Implications You Need to Plan For
Reservation
Affected Design Principles
Summary
Introduction
What Is this Module About?
What Is an ESB?
What Is the First Thing that You Noticed?
Sample Scenario
Part 1: Messaging Services
Part 2: Business Process Services
Part 3: Transformation Services
Part 4: Business Users Services
Demo: The Sample Scenario
Shall We Always Use the Services of an ESB Product?
Summary
Introduction
Exception Handling
Logging Exceptions and Taking Corrective Actions
Reporting System Exceptions
Reporting Business Exceptions
Reporting Exceptions by Composition Controllers
How to Report Exceptions?
Versioning
Overarching Guideline: Limited Use of Version Tolerance
Scenario: Update Service And/Or Data Contracts
Scenario: Update Binding Information
Scenario: Update Service Implementation and SLAs
Scenario: Update Fault Contracts
Summary
Introduction
Basics: Web Services vs. Web APIs vs. REST
SOA Implementation: Web Services vs. Web APIs (And REST)
Case Study: Extending the Ecosystem with REST APIs
Hypermedia as the Engine of Application State
Reusing Existing SOA Infrastructure
Summary
Introduction
So Why a Governance Module in a Design/Implementation Course?
Introduction to Governance
Introduction to SOA Governance
Policies
Processes
Roles and Responsibilities
Summary

What others say about this course

Write your review of Real World SOA: Design and Implementation

Facebook account of EdvicerLinkedin account of EdvicerInstagram account of Edvicer
Twitter account of EdvicerPinterest account of EdvicerYoutube account of Edvicer