How to Manage Faults With Web Services Fault Management

Size: px
Start display at page:

Download "How to Manage Faults With Web Services Fault Management"

Transcription

1 Recovery Policies for Enhancing Web Services Reliability Abdelkarim Erradi 1, Piyush Maheshwari 2, Vladimir Tosic 1 1 School of Computer Science and Engineering University of New South Wales, Sydney, Australia {aerradi,vtosic}@cse.unsw.edu.au 2 IBM India Research Lab New Delhi, India pimahesh@in.ibm.com Abstract Web services are gaining acceptance as a standards-based approach for integrating loosely coupled services often distributed over a network. Hence, achieving high levels of reliability and availability in spite of service or infrastructure failures poses unique set of challenges. However, current Web services middleware provide limited constructs for specifying faults detection and recovery actions. Additionally, faults-handling logic often gets scattered and tangled with the service logic. Consequently, this negatively impacts maintainability and adaptability. To address these requirements for reliable and fault tolerant Web services execution, we propose a set extensible recovery policies to declaratively specify how to handle and recover from typical faults in Web services composition. The identified constructs were incorporated into a lightweight service management middleware named MASC (Manageable and Adaptive Service Composition) to transparently enact the fault management policies and facilitate the monitoring, configuration and control of managed services. Several experimental results with a service based supply chain management system illustrate the effectiveness of our approach to providing reliable and uninterrupted services. 1. Introduction Web services (WS) are rapidly becoming a predominant approach for building open distributed systems, via assembling a set of self-contained, discoverable and Internet-accessible software components. Services imply well-defined boundaries that communicate with each other using well-defined messages. Hence, Web services reliability is strongly dependant on the fault-handling mechanisms of the communication protocols and the messaging infrastructure mediating their interactions. Reliability can be defined as the continuity of correct service delivery. This implies zero or, at worst, relatively few failures and rapid recovery time [2]. In contrast to traditional client-server applications, a Web Services can compose a number of Web Services possibly hosted and managed by different providers across the Internet. Because the composed services are often geographically distributed without centralized control, no guarantees can be made about the reliability of the resulting composed service. The unreliability of any of the constituent Web Services could lead to the failure or QoS degradation of the composed service, even if other constituent services happen to be reliable. Addressing reliability and availability of Web services is a challenging task, particularly detecting and handling faults. This is because of the autonomy of the systems involved (i.e., service consumer has no influence over the factors affecting QoS provision and services can spontaneously appear and disappear on the Internet), the cross-administrative domains interactions and the Internet latency and its unmanaged nature. Moreover the dynamic discovery and late binding to continuously evolving Web services interfaces and offerings makes the problem of reliability more challenging than conventional client-server systems. These challenges call for further improvements in the Web services containers and the mediation infrastructure to support dependable composition of Web Services while taking into account their inherent autonomy and heterogeneity. To address the requirements for reliable and fault tolerant Web service interactions, we propose a policydriven middleware which intercepts the execution of composite services and transparently provides recovery services. We define an extensible set of crucial recovery policies (e.g., retry, skip, use equivalent service), with a well-defined behavior, to declaratively specify the handling and recovery from typical faults in service-centric business processes. The proposed policies are defined in a way that allows their automated enforcement by the proposed service management middleware. Our approach cleanly modularizes and externalizes the faults-handling logic and hence keeps the service composition simple and uncluttered. Furthermore, the recovery policies can evolve independently while allowing potential reuse. We have incorporated runtime support for the identified recovery constructs into a lightweight service management middleware named Manageable and Adaptive Service Composition (MASC 1 ). MASC is an extensible mediation layer that intercepts exchanged messages and transparently enforces the faults handling policies. MASC is an evolution of our 1

2 previous messaging platform presented in [5, 6]. In order to demonstrate the merits of our techniques, MASC was deployed in a supply chain management (SCM) system. The preliminary measurements confirmed the improved availability and reliability of the whole application at the acceptable increase in latency. The rest of this paper is structured as follows. Section 2 describes our solution approach and discusses the proposed MASC fault management policies. Section 3 then presents the architecture and features of MASC. In section 4, we present experimental results that demonstrate the capabilities of the proposed approach. Finally, we discuss related work in Section 5 while Section 6 draws some conclusions and presents some directions for future work. 2. Recovery strategies for reliable Web services Traditionally, distributed systems programming models rely on structured exceptions handling to trap and handle errors and timeouts. For Web services, exceptions cannot be propagated across service boundaries without being serialized and wrapped in a SOAP fault message in the format declared in the service contract. The service WSDL document can explicitly include one or more fault message descriptions for the entire service or for individual operations. Web services fault management requires first to identity and classify the typical faults that might occur during service execution and then specify a set of strategies to handle them Classification of main faults in distributed service-based applications Faults that can occur during Web services execution can be classified into three main categories according to their causalities: functional faults, operational faults, and faults linked to the violation of Service Level Agreements (SLAs) and collaboration policies. (1) Functional and behavioral faults refer to the scenario where a constituent service cannot complete a task execution or the service delivers incorrect results due to computational/logic errors, erroneous data flows or semantic incompatibility of the exchange messages. Additionally, behavioral failures can be caused by conversation exceptions such as improper invocation order of service operations, lost messages when processing fails and interrelated messages processed individually. Moreover conversation protocol errors can introduce inconsistent states between participating services or they can lead to circular wait deadlocks that could prevent the process enactment to compete as services could be waiting for input from each other. (2) Operational faults refer to communication infrastructure exceptions and middleware failures of the hosting servers and the database servers. Examples of such faults could be network unavailability causing disconnections, network congestion causing message loss, and overloaded application server causing excessive delays and timeouts. Operational failures can also result from configuration errors or security breaches such as Denial of Service attacks. Operational faults can render the service either entirely or partially unavailable or unable to accept new requests. (3) Violations of agreed upon SLAs and policies with regards to functional (e.g., price limits or delivery deadlines) and non-functional requirements (e.g. service response time, service availability and security). In this case the service execution might be completed but the results are not conforming to the negotiated SLAs and collaboration policies. The first step to handle the above faults is to detect them and recognize their type. Various techniques can be used to achieve this. First, the service may return fault messages as specified by its WSDL interface. Also, the service invocation infrastructure can use timers to raise timeout exceptions when the service does not respond within the set timeout interval. Moreover, the exchanged messages between composed services need to be validated against the interface contract provided by the source service, in case of a mismatch a fault should be raised. Additionally, monitoring probes can be used to detect violations of execution constraints (e.g. service response time), as stipulated by pre-established SLAs. Once a fault is detected, an exception event is raised to trigger the necessary recovery actions to handle the faults in an attempt to reach a successful process completion while satisfying the QoS constraints to the largest extent possible. Service composition languages, like WS-BPEL, provide the ability to scope activities and specify basic fault handlers or compensation handlers for scopes to deal with certain class of faults by compensating the effects of the service invocation. However, most approaches lack flexible faults handling mechanisms to cover all possible exceptions including QoS constraints violations. Moreover, attempting to describe all possible execution paths including exceptions using just fault and compensation handlers becomes either awkward or impractical. Hence, we advocate a policy-based approach to externalize faultshandling.

3 2.2. MASC policy language for faults management Our proposed approach uses a policy-driven model to faults management to simplify Web services development through the separation of the business logic and the faults handling policies. The essence of our approach is to augment the Web services descriptions with XML-based declarative policy assertions to specify the recovery and repair actions and the configuration parameters required by the middleware services to enact these actions. An example of such configuration parameters is the number of times a service invocation should be retried. These assertions are attached to the service contract but still evolve independently. We claim that this approach offers more effective and easier to change faults- handling. Our recovery policies define responses to each fault type in terms of high-level abstraction of management operations. The latter are enforced via mapping the policies into runtime monitoring and middleware configuration adjustments. The proposed adaptation policy language encompasses two distinct parts. The first part is used by the Events Monitors to detect faults and to trigger an update to the service Health State. The second part of the policy triggers the required management action(s) to restore a healthy state. The adaptation policies take as an input the health states that are designated as erroneous and decide on the appropriate management actions without being concerned with how that state was reached or what was the cause. Adaptation policies are associated with health states and not events. The Events Monitors are used to decouple the adaptation policies from particular system events, in order to enable generic policy based management. Policies control and respond to changes in the service state by prescribing corrective state transitions. Leaving events out of policies enables policy reuse in different contexts. Generally, one state may be changed as a result of many different events in a system. Instead of specifying a separate policy for every possible event that may cause the change, MASC simply specifies only one policy to change the state of the service and one or more detection policies to trigger it. The format the events monitoring policy is as follows: ON Event(s) WHEN Constraints Assertions TRIGGER Health state transition Events may signal indications that some significant aspect of the service operational conditions may be changed (e.g., service performance statistics dropping below allowable threshold). Hence some aspects of the service state should be checked and some management actions may be required. Events are only signals for attention, not necessary for action. Events Monitors can use the publish/subscribe communication paradigm to expresses interest in receiving certain types of event from various internal/external sources. The Events Monitors use the monitoring policies to perform filtering of events. For example they can submit event subscriptions with predicates on the event contents to filter the events they are interested in. In MASC, Event Monitors are used to decouple the adaptation policies from the system and management events. Event Monitors behave like call-back methods that respond to events by triggering process Health State changes if the conditions specified in the monitoring policy are satisfied. The Event Monitors keep a record of the past events in order to be able to process scenarios of events (e.g., a pattern of ordered or unordered events) that may be defined to trigger a health state change. The format the adaptation policy is shown below: POLICY PolicyName ON Health State Specification WHEN Constraints Assertions DO Management Operation(s) CONFIGURATION Adaptation Configuration POST-CONDITION Constraints Assertions The ON clause can specify a process health state. The when-clause specifies the predicates that must be true for actions to occur. These assertions can reference the schema of exchanged messages as well as environment variables such as the number of running process instances. They can also reference the policies of participant services such as the policies describing the transaction properties of the service operations (e.g., whether the operation is retriable, compensatable, cancellable or definite). The do-clause specifies an exception handling action. The latter can be a primitive action or a composite action. The Configuration clause specifies the parameters that govern the behavior of the adaptation policy. This clause leverages WS-Policy [9] to encode the adaptation policy configuration. The configuration also specifies the policy priority, which is used to determine the order of execution if several polices apply per health state. For example, a policy could stipulate that the system should first attempt n retries before failover to a known backup service. Finally the post-condition clause could be used to stipulate the required verification predicates to confirm if the recovery was successful and the bad health state is truly resolved. It could refer to the same verification

4 assertions that were used to confirm the existence of a bad or a deteriorated health state. Currently, the key constructs supported by MASC policy assertions are: retry, substitute, compensate, skip and dynamic update of the service composition instance. (1) Retry policy involves the invocation of the same faulty service hoping that the failure is transient (e.g., a transient database deadlock or transient overloaded server). This recovery construct specifies the number of retries and controls how retries are done, as shown in the listing in Figure 1. However, this strategy is only applicable to idempotent service operations that could receive invocation messages multiple times but only one of them gets processed or when multiple service invocations yield the same results and leave the system in a consistent state (e.g., Book search). In our architecture the retry policy is enforced at the SOAP messaging layer. The retry construct is implemented by placing the messages that fail to be delivered in a retry queue then the queue reader tries redelivery using the pattern specified by the recovery policy. Messages for which processing repeatedly fails are placed in a dead letter queue after exhausting the maximum number of allowed retries and no further delivery will be attempted. Also a fault message can be raised after the last unsuccessful retry. (2) Substitute (hot-swap) the faulty service and dynamically bind to a replacement service that offers equivalent functional and QoS properties. Equivalent services need to have equivalent input messages, preconditions, output messages and effects. This means that they leave the process in an equivalent state after any of the replaceable services is invoked. In some case a faulty service could be replaced by a service composition that has equivalent effects as the faulty service. In most cases, some input/output message transformations are required to address syntactical, structural and business protocol mismatches between services [3]. To implement the substitute policy, our approach introduces the concept of a Virtual Endpoint (VEP), on which multiple equivalent services, acting as a recovery block, can be configured. The Process Orchestration Engine sends requests to the VEP, and MASC infrastructure transparently discovers and selects a replacement service and then redirects the request messages. The selection of services is based on the service selection policies as well as the monitoring data and QoS metrics gathered from prior interactions or from trusted peers. Figure 1. Configuration of a Retry Recovery policy Figure 2. Configuration for Substitute Recovery policy (3) Parallel execution of services, a policy could be attached to the VEP to configure MASC to perform parallel execution of equivalent service and consider the results coming from the first responding service. This

5 strategy is more suitable for data lookup services and freely available services such as Web search. (4) Dynamic update of the service composition instance, the idea here is to augment the Web services composition engine with a Management Endpoint to manipulate running process instances to either (a) perform structure changes such as add/remove a process activity (b) process instance control commands like skip, wait, start, terminate, suspend and resume an activity or a process instance. Adaptation at the process layer is not covered in details in this paper. This is being addressed as part of our proposed AdaptiveBPEL framework [7]. Exception handling policies can be specified by a Process Designer at design time and then they can be attached to a VEP configured in MASC. 3. Implementation and experience This section presents the architecture of MASC middleware with emphasis on the modules that facilitate the enactment of the recovery policies. We are in the process of maturing our prototype implementation of MASC middleware, using the.net framework, Windows Communication Foundation (WCF) and Windows Workflow Foundation (WF) [12]. Although we decided to use.net as our implementation platform, the proposed architecture is not inherently tied to any particular platform. It can be easily extended to Java-based Web services platforms such as Axis 2. MASC uses broker and intercepting filters design patterns [10]. As shown in Figure 3, MASC can be deployed as a configurable add-on to a Web services composition engine to enact adaptation policies. The Web services composition uses MASC as a messaging layer to call external Web services via <invoke> or <reply>, or to wait for response messages via a <receive> activity. MASC acts as a transparent service proxy, clients direct service calls to the virtual endpoints configured in MASC and the later invokes the real services. This deployment allows intercepting, storing, transforming, retrying and routing messages going into and out of the composed services. Basically when a service is provided via MASC, first it needs to be registered with a Virtual Endpoint (VEP) along with its associate runtime policies using the constructs discussed in the previous Section. When an invoke request comes in, MASC takes care of the Find, Select and Bind process using the configured selection and binding policy. During service interactions, various monitoring data is collected MASC middleware architecture Figure 3. Conceptual architecture of MASC MASC groups managed equivalent services into virtual endpoints. Each VEP is bound to one or more mediators. The mediators intercept and manipulate both request and response messages according to the pre-configured policies (e.g., validate an outgoing message against the contract expected by the destination service). Basically the policies define the chain of actions to take on a given message before dispatch. The message is then queued for processing. MASC selects the appropriate service and

6 dispatches the message to it and the response is passed back to the requester via the same path. The diagram in Figure 3 shows MASC architecture Web services composition layer For the process orchestration layer we have selected the upcoming Microsoft Workflow Foundation (WF) [12] because of its simplicity, extensibility and the available documentation. When an incoming message triggers a start activity, the WF runtime engine creates a new process instance and starts it. The engine takes care of persistence, events and alarms handling, as well as Web services invocation. The engine dispatches incoming messages to the right process instance. First if the incoming SOAP message contains correlation data, the engine tries to find the correct instance that matches the correlation data. Otherwise if the request matches a start activity, a new process instance is created. To map abstract Web services defined in the composition to concrete Web services, WF uses a configuration file. In our proposed framework, the abstract WSs should be mapped to a MASC VEP so that the later can perform dynamic Find, Select, Bind and Invoke on behalf of the composition engine. Additionally, the VEP masks and handles any service faults according to the self-adaptive policies attached to the VEP. The adaptation enactment is managed by the adaptation layer Adaptation layer The Adaptation Manager acts as a Policy Enforcement Point (PEP) and it leverages the services of other actuators such as the WS Selection Manager and Messages Adaptation Manager Web services Selection Manger The dynamic mapping of abstract WSs defined in the composition to concrete WSs is outsourced to the WS Selection Manager. This allows shielding the orchestration engine from changes to available services. Hence, adding, modifying and selecting among available services could be done without the need to complicate the process with the routing logic for deciding which concrete services to use. The WS Selection Manager is responsible for the runtime selection among the equivalent services registered with the VEP. The selection of services is based on the QoS metrics gathered from prior interactions or from trusted peers. Various selection policies are supported, a VEP can be configured to choose between registered services in round-robin fashion, or to select the best performing service, or to broadcast the request to all services (registered with the VEP) in parallel and consider the first one that respond, etc.. The following selection policies are supported by the WS Selection Manager: Random Selection, this policy selects the service to be invoked randomly amongst the set of known services. Parallel Invocation, this policy invokes all the equivalent services in parallel using concurrent invocation threads. The first response to be received is returned to the client. All pending invocations are then aborted and their responses are ignored. Best Performing Service, this policy selects the service to be invoked as the one with the best performance considering the last n number of successful invocations Messages Adaptation Manager The Messages Adaptation Manager is responsible for resolving incompatibilities (i.e., structural, value and encoding) and enable interoperation with substituted services. Given that it is not so common to find perfectly substitutable services, MASC provides a set built-in generic handlers (e.g., transform a message with XSLT, split/merge messages) that can be extended and composed in a pipeline by the developers to resolve incompatibilities and mismatching interfaces (i.e., structural, encoding and missing parameter values) and enable interoperation with substituted services. More advanced data flow adaptation operators are being studied such as buffering multiple messages and aggregating them into a single one before sending them to the destination service MASC evaluation and assessment An initial prototype based on the generic architecture presented in the pervious Section was developed as a proof of concept. We conducted a series of benchmarking tests to assess the effectiveness of MASC in enhancing the reliability of Web services composition. The objective of this evaluation is to assess the features of our prototype implementation with regards to its effectiveness and performance under normal and failure conditions. Our goal is to identify areas of the platform that needs further improvement. We used an extended.net-based implementation of WS-I Supply Chain Management (SCM) application [13]. The SCM scenarios are designed as Web services based interactions that simulate the business activity of an online supplier of electronic goods. First a Web client calls the Retailer service's getcatalog operation. When the user submits the order, the Web client calls the Retailer service's submitorder operation. To fulfill orders, the Retailer Web service manages stock levels in three warehouses (WA, WB, and WC). If Warehouse A cannot fulfill an order, the Retailer checks Warehouse B; if Warehouse B cannot, the Retailer checks Warehouse C. When an item in stock falls below a certain threshold, the Warehouse must restock the item from the Manufacturer's inventory (MA, MB, and MC). Each use

7 case includes a logging call to a Logging Service in order to monitor the activities of the services. The customer can track orders by using the getevents operation of the logging facility Web service. During the SCM process enactment, participating Web services can log event by calling the logevent operation of the logging facility Web service. Our goal is to study the impact of introducing MASC middleware on the reliability and the round-trip response time of Web services used in the above SCM application. Additionally, our aim is to discover areas of the platform that needs further improvement. To this end, we simulated multiple concurrent Web service clients, each of which invokes deployed services multiple times. We deployed the SCM backend Web services (The Retailer, the Manufacturer and Warehouses Web services) in a P4 2.8GHz, 1GB RAM server running Windows 2003, Windows Communication Foundation (WCF). The composition engine and MASC were deployed in a Windows XP laptop with 500MB RAM. The machines were connected by 100MB LAN. To be able to compare the response time and throughput metrics, our experimental setup consists of two runtime configurations: one with MASC placed at the client side and other without MASC mediation. Both experiments use the identical application logic implemented in.net. The graph in Figure 4 summarizes some of the performance test results. We simulated multiple concurrent clients, each of which invokes the composite Order Placement service multiple times. We measured the execution time from the perspective of the client application using the Round Trip Time (RTT), which is a measurement in milliseconds from the time the client application sends a request to the point when it successfully receives the full reply from the Service Provider. Execution times were averaged after 500 repetitions. The graph in Figure 8 summarizes some of the performance test results. Avg. Process Execution Time (ms) BPEL 1045 BPEL with MASC Figure 4: Total execution time Direct invocation of participant Web services slightly outperforms channeling Web services interactions through MASC due to the overheads introduces by the added adaptability components (the process execution via MASC is 12 percent slower). Our analysis of the main reasons of the delays introduced by MASC points to the parsing overheads of the XML-encoded adaptation policies. We will enhance the performance of MASC by exploring policy caching mechanisms to offset the degraded performance. To establish the prototype's fault tolerance effectiveness, we periodically injected random exception events at various stages of the process to study the behavior of the system in response to QoS changes and service failures. For service failures, we randomly pick some of the available services and make them unavailable for a random amount of time. For service QoS degradation, we periodically pick some service instances and introduce a random number of seconds delay before sending a reply back to the composition engine. The results of the analysis from 500 repetitions show improved process reliability since 98% of process failures were handled effectively by MASC and the process was able to resume execution past the point of failure. Only a small number of exception scenarios could not be managed by the framework and thus require user intervention, such as the absence of a replacement Web service to substitute a failed service. Under identical conditions, direct invocation of participant services resulted in a process termination when exceptions are injected. These results indicate the effectiveness of MASC, but more analysis is clearly required. A more thorough and complete analysis is currently under way to be able to refine and optimize the system for increased performance. It is worth noting that we assume that Web services interactions channeled through MASC are stateless, meaning that messages are self-contained with enough information (or links to persistent data) to allow the participant service to establish the message context. This assumption is fundamental to adaptability properties of MASC, as this is also an encouraged practice in the Web services literature as in [1]. For services where state management is involved, state migration mechanisms are still to be investigated. 4. Related work and discussion Reliable Web services composition is active area of research and standardization. Several ongoing efforts recognize the need to extend the Web services middleware with mechanisms to ensure dependable service delivery in a Web-centric environment. We adopt a policy-based approach that builds on the emerging selfhealing architectures, such as the one presented in [11]. The key idea is to decouple between a sensor that detects the exceptional events and the effector that corrects them. In [4], Charfi and Mezini propose an aspect-oriented extension to BPEL to enable dynamic weaving of aspects into the service composition. A process runs inside a process container that provides middleware services to

8 BPEL processes. However we argue that some of the QoS aspects that they tried to address, e.g. security and state persistency, can be addressed more naturally via interception at lower-layer messaging middleware rather than augmenting the BPEL engine with the ability to call low-level middleware services. On the other hand our approach is policy-based and operates mostly at the underlying SOAP Layer to shield the Process Orchestration Layer from addressing middleware requirements. Our work is also closely related to the task-based recovery policies advocated by [8] as part of their extended Petri net model, called Self-Adaptive Recovery Net (SARN), for specifying exceptional behavior in Petri net based workflow systems. The proposed recovery policies are generic constructs, such as Skip Recovery Policy, that model the required modifications to adapt the structure of the workflow instance when a task failure event occurs. For each expected failure, these constructs are specified at design time as a sequence of primitive operations, such as delete a transition, to modify the workflow structure. SARN recovery policies are attached with either a single task or a set of tasks called a recovery region. However, SARN recovery constructs are tightly coupled with Petri net concepts such as Places, Transitions and Tokens. Our approach is more generic and does not change the process instance; rather the enforcement of the recovery policies is delegated to the underlying messaging middleware that mediates the Web services interactions. Our ongoing work is also looking at augmenting a process orchestration engine, such as WF [12], with policy-driven aspects weaving mechanisms to transparently enforce reliability policies and dynamically adapt the composition instance [7]. 5. Conclusion Web service compositions are rapidly emerging as critical building blocks for process integration. Hence, their reliable execution must be assured. Our approach cleanly specifies common reliability policies, such as retry and failover, capable of handling common service faults. The identified constructs were integrated into a Web services management middleware, named MASC, to transparently enact the recovery actions. MASC uses the interceptor pattern to add a level of indirection allowing exchanged messages to be introspected, manipulated and routed. This ability also allows fault-handling policies to be transparently applied to service calls by leveraging the emerging Web services policy model. The overarching goal is to ensure that the client of the Web Service is not exposed to, and does not have to deal with, the reliability problems; thus, the client continues to perceive continuous uptime of the Web Service, and it is shielded transparently from the occurrence of faults. The introduced mediation layer dynamically handles potential service faults and transparently hot-swaps to functionally equivalent backup services. This leverages the inherent plurality and the diversity of available services. Experimental results proved the feasibility and effectiveness of our approach and suggest its potential in adding valuable recovery services with limited overhead. In future work we plan to improve and extend our approach in a variety of areas, including policy-driven transactional service compositions as well as adding support for composite events to allow for a recovery action to take place based on multiple related events. Additionally, we are exploring predictive adaptation techniques beside the reactive ones presented in this paper. Moreover, complex recovery schemes are under study to manage checkpointing and recovery of composite services with distributed state. References [1] Alonso, G., Casati, F., Kuno, H. and Machiraju, V. 2003, Web Services: Concepts, Architectures, and Applications, Springer, Berlin. [2] Avizienis, A., Laprie, J.-C., Randell, B. and Landwehr, C. 2004, 'Basic concepts and taxonomy of dependable and secure computing', IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp [3] Benatallah, B., Casati, F., Grigori, D., Nezhad, H. R. M. and Toumani, F. 2005, 'Developing Adapters for Web Services Integration', in 17th International Conference on Advanced Information Systems Engineering (CAiSE'05), Porto, Portugal. [4] Charfi, A. and Mezini, M. 2005, 'An Aspect based Process Container for BPEL', in First Workshop on Aspect-Oriented Middleware Development (AOMD 2005), Grenoble, France. [5] Erradi, A. and Maheshwari, P. 2005, 'A Broker-based Approach for Improving Web Services Reliability', in IEEE International Conference on Web Services 2005 (ICWS'05), Orlando, Florida, USA. [6] Erradi, A. and Maheshwari, P. 2005, 'wsbus: QoS-aware Middleware for Reliable Web Services Interactions', in IEEE International Conference on e-technology, e-commerce and e- Service (EEE'05), Hong Kong. [7] Erradi, A., Maheshwari, P. 2005, 'AdaptiveBPEL: Policy- Driven Middleware for Flexible Web Services Composition', in EDOC Middleware for Web Services Workshop (MWS'05), Enschede, The Netherlands. [8] Hamadi, R. and Benatallah, B. 2004, 'Recovery Nets: Towards Self-Adaptive Workflow Systems', in 5th International Conference on Web Information Systems Engineering (WISE'04), LNCS 3306, pp , Springer Verlag,, Brisbane, Australia. [9] IBM et al. 2004, Web Services Policy Framework (WS-Policy), September ibm.com/developerworks/library/specification/ws-polfram. [10] Monday, P. B. 2003, Web Services Patterns: Java Edition, Apress. [11] Wile, D. S. and Egyed, A. 2004, 'An Externalized Infrastructure for Self-Healing Systems', in 4th Working IEEE / IFIP Conference on Software Architecture (WICSA'04), Oslo, Norway, pp [12] Microsoft.NET Framework [13] WS-I 2004, SCM Sample Application.

Service-Oriented Architectures

Service-Oriented Architectures Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems

More information

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

The Service Revolution software engineering without programming languages

The Service Revolution software engineering without programming languages The Service Revolution software engineering without programming languages Gustavo Alonso Institute for Pervasive Computing Department of Computer Science Swiss Federal Institute of Technology (ETH Zurich)

More information

A standards-based approach to application integration

A standards-based approach to application integration A standards-based approach to application integration An introduction to IBM s WebSphere ESB product Jim MacNair Senior Consulting IT Specialist Macnair@us.ibm.com Copyright IBM Corporation 2005. All rights

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Six Strategies for Building High Performance SOA Applications

Six Strategies for Building High Performance SOA Applications Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture

More information

Transactionality and Fault Handling in WebSphere Process Server Web Service Invocations. version 0.5 - Feb 2011

Transactionality and Fault Handling in WebSphere Process Server Web Service Invocations. version 0.5 - Feb 2011 Transactionality and Fault Handling in WebSphere Process Server Web Service Invocations version 0.5 - Feb 2011 IBM Corporation, 2011 This edition applies to Version 6.2 of WebSphere Process Server 1 /

More information

WSMB: a middleware for enhanced Web services interoperability

WSMB: a middleware for enhanced Web services interoperability WSMB: a middleware for enhanced Web services interoperability Trung Nguyen Kien, Abdelkarim Erradi and Piyush Maheshwari School of Computer Science and Engineering The University of New South Wales, Australia

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

Dependability in Web Services

Dependability in Web Services Dependability in Web Services Christian Mikalsen chrismi@ifi.uio.no INF5360, Spring 2008 1 Agenda Introduction to Web Services. Extensible Web Services Architecture for Notification in Large- Scale Systems.

More information

Challenges and Opportunities for formal specifications in Service Oriented Architectures

Challenges and Opportunities for formal specifications in Service Oriented Architectures ACSD ATPN Xi an China June 2008 Challenges and Opportunities for formal specifications in Service Oriented Architectures Gustavo Alonso Systems Group Department of Computer Science Swiss Federal Institute

More information

ActiveVOS Server Architecture. March 2009

ActiveVOS Server Architecture. March 2009 ActiveVOS Server Architecture March 2009 Topics ActiveVOS Server Architecture Core Engine, Managers, Expression Languages BPEL4People People Activity WS HT Human Tasks Other Services JMS, REST, POJO,...

More information

How To Understand A Self-Adapting Recovery Net (Sarn)

How To Understand A Self-Adapting Recovery Net (Sarn) DOI 10.1007/s10619-007-7020-1 Self-adapting recovery nets for policy-driven exception handling in business processes Rachid Hamadi Boualem Benatallah Brahim Medjahed Springer Science+Business Media, LLC

More information

Ensuring Cost-Optimal SLA Conformance for Composite Service Providers

Ensuring Cost-Optimal SLA Conformance for Composite Service Providers Ensuring Cost-Optimal SLA Conformance for Composite Service Providers Philipp Leitner Supervised by: Schahram Dustdar Distributed Systems Group Vienna University of Technology Argentinierstrasse 8/184-1

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

Service Oriented Architectures

Service Oriented Architectures 8 Service Oriented Architectures Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ The context for SOA A bit of history

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7 No. 7, September-October 2008 Applications At Your Service Mahesh H. Dodani, IBM,

More information

Service-Oriented Architecture and its Implications for Software Life Cycle Activities

Service-Oriented Architecture and its Implications for Software Life Cycle Activities Service-Oriented Architecture and its Implications for Software Life Cycle Activities Grace A. Lewis Software Engineering Institute Integration of Software-Intensive Systems (ISIS) Initiative Agenda SOA:

More information

SLA Business Management Based on Key Performance Indicators

SLA Business Management Based on Key Performance Indicators , July 4-6, 2012, London, U.K. SLA Business Management Based on Key Performance Indicators S. Al Aloussi Abstract-It is increasingly important that Service Level Agreements (SLAs) are taken into account

More information

Service Oriented Architecture (SOA) An Introduction

Service Oriented Architecture (SOA) An Introduction Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages

More information

Service-Oriented Architecture: Analysis, the Keys to Success!

Service-Oriented Architecture: Analysis, the Keys to Success! Service-Oriented Architecture: Analysis, the Keys to Success! Presented by: William F. Nazzaro CTO, Inc. bill@iconatg.com www.iconatg.com Introduction Service-Oriented Architecture is hot, but we seem

More information

AquaLogic Service Bus

AquaLogic Service Bus AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

What is the Difference Between Application-Level and Network Marketing?

What is the Difference Between Application-Level and Network Marketing? By Fabio Casati, Eric Shan, Umeshwar Dayal, and Ming-Chien Shan BUSINESS-ORIENTED MANAGEMENT OF WEB SERVICES Using tools and abstractions for monitoring and controlling s. The main research and development

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1.6) E14294-06 November 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include:

More information

The ConTract Model. Helmut Wächter, Andreas Reuter. November 9, 1999

The ConTract Model. Helmut Wächter, Andreas Reuter. November 9, 1999 The ConTract Model Helmut Wächter, Andreas Reuter November 9, 1999 Overview In Ahmed K. Elmagarmid: Database Transaction Models for Advanced Applications First in Andreas Reuter: ConTracts: A Means for

More information

Testing a SOA Application

Testing a SOA Application Srikanth Inaganti and Sriram Aravamudan Abstract Conventional software testing methodologies often do not provide an efficient and accurate test plan for SOA. Since SOA is a loosely coupled, distributed

More information

Figure 1: Illustration of service management conceptual framework

Figure 1: Illustration of service management conceptual framework Dagstuhl Seminar on Service-Oriented Computing Session Summary Service Management Asit Dan, IBM Participants of the Core Group Luciano Baresi, Politecnico di Milano Asit Dan, IBM (Session Lead) Martin

More information

Data-Aware Service Choreographies through Transparent Data Exchange

Data-Aware Service Choreographies through Transparent Data Exchange Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application

More information

Classic Grid Architecture

Classic Grid Architecture Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes

More information

EVALUATION. WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration COPY. Developer

EVALUATION. WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration COPY. Developer WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration Developer Web Age Solutions Inc. USA: 1-877-517-6540 Canada: 1-866-206-4644 Web: http://www.webagesolutions.com Chapter 6 - Introduction

More information

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services.

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. Stephen McGibbon Microsoft EMEA Tel. +445511490070 Email. stephenm@microsoft.com Abstract:

More information

A Model for Component Based E-governance Software Systems

A Model for Component Based E-governance Software Systems A Model for Component Based E-governance Software Systems A.SHRABAN KUMAR 1, G.JAYARAO 2,B.SHANKAR NAYAK 3, KBKS. DURGA 4 A.ESWARA RAO 5 1,2,3,4 Associate Professor CSE, St.MARTIN S ENGINEERING COLLEGE,

More information

An Architecture for Autonomic Web Service Process Planning

An Architecture for Autonomic Web Service Process Planning An Architecture for Autonomic Web Service Process Planning Colm Moore and Ming Xue Wang and Claus Pahl Dublin City University, School of Computing, Dublin 9, Ireland christopher.moore4@mail.dcu.ie, [mwang

More information

Next-Generation ESB. Kevin Conner SOA Platform Architect, Red Hat Keith Babo JBoss ESB Project Lead, Red Hat. June 23rd, 2010

Next-Generation ESB. Kevin Conner SOA Platform Architect, Red Hat Keith Babo JBoss ESB Project Lead, Red Hat. June 23rd, 2010 Next-Generation ESB Kevin Conner SOA Platform Architect, Red Hat Keith Babo JBoss ESB Project Lead, Red Hat June 23rd, 2010 Today's Menu Recent History ESB (Re)Defined Building From a Strong Core Beyond

More information

Oracle Service Bus: - When to use, where to use and when not to use

Oracle Service Bus: - When to use, where to use and when not to use Oracle Service Bus: - When to use, where to use and when not to use Session ID#: 244 Prepared by: Abhay Kumar Senior Consultant AST Corporation REMINDER Check in on the COLLABORATE mobile app Specialized.

More information

Monitoring services in Service Oriented Architecture 1

Monitoring services in Service Oriented Architecture 1 Proceedings of the International Multiconference on ISSN 1896-7094 Computer Science and Information Technology, pp. 735 744 2007 PIPS Monitoring services in Service Oriented Architecture 1 Ilona Bluemke,

More information

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives

More information

Getting Started with Service- Oriented Architecture (SOA) Terminology

Getting Started with Service- Oriented Architecture (SOA) Terminology Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a

More information

Methodology of performance evaluation of integrated service systems with timeout control scheme

Methodology of performance evaluation of integrated service systems with timeout control scheme Methodology of performance evaluation of integrated service systems with timeout control scheme Akira Kawaguchi and Hiroshi Yamada NTT Service Integration Laboratories, NTT Corporation 9-11, Midori-cho

More information

Monitoring MSDynamix CRM 2011

Monitoring MSDynamix CRM 2011 Monitoring MSDynamix CRM 2011 eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be

More information

Run-time Service Oriented Architecture (SOA) V 0.1

Run-time Service Oriented Architecture (SOA) V 0.1 Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...

More information

Scientific versus Business Workflows

Scientific versus Business Workflows 2 Scientific versus Business Workflows Roger Barga and Dennis Gannon The formal concept of a workflow has existed in the business world for a long time. An entire industry of tools and technology devoted

More information

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com Sentinet Overview Contents Overview... 3 Architecture... 3 Technology Stack... 4 Features Summary... 6 Repository... 6 Runtime Management... 6 Services Virtualization and Mediation... 9 Communication and

More information

Business Process Execution Language for Web Services

Business Process Execution Language for Web Services Business Process Execution Language for Web Services Second Edition An architect and developer's guide to orchestrating web services using BPEL4WS Matjaz B. Juric With Benny Mathew and Poornachandra Sarang

More information

Service Design Essentials

Service Design Essentials Srikanth Inaganti and Srini Chintala Enterprise level SOA transformation involves collaboration and integration across many projects that are critical to a business, with the iterative development of services

More information

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

Reengineering Open Source CMS using Service-Orientation: The Case of Joomla

Reengineering Open Source CMS using Service-Orientation: The Case of Joomla Reengineering Open Source CMS using Service-Orientation: The Case of Joomla Tagel Gutema tagelgutema@gmail.com Dagmawi Lemma Department of Computer Science, Addis Ababa University, Ethiopia dagmawil@yahoo.com

More information

Model-driven Adapter Development for Web Services Interactions

Model-driven Adapter Development for Web Services Interactions Model-driven Adapter Development for Web Services Interactions Hamid Reza Motahari Nezhad 1;2 1 The School of Computer Science and Engineering, The University Of New South Wales Sydney, NSW 2052, Australia

More information

LinuxWorld Conference & Expo Server Farms and XML Web Services

LinuxWorld Conference & Expo Server Farms and XML Web Services LinuxWorld Conference & Expo Server Farms and XML Web Services Jorgen Thelin, CapeConnect Chief Architect PJ Murray, Product Manager Cape Clear Software Objectives What aspects must a developer be aware

More information

Patterns in Software Engineering

Patterns in Software Engineering Patterns in Software Engineering Lecturer: Raman Ramsin Lecture 7 GoV Patterns Architectural Part 1 1 GoV Patterns for Software Architecture According to Buschmann et al.: A pattern for software architecture

More information

Toward Next Generation Distributed Business Information Systems: Five Inherent Capabilities of Service-Oriented Computing

Toward Next Generation Distributed Business Information Systems: Five Inherent Capabilities of Service-Oriented Computing Toward Next Generation Distributed Business Information Systems: Five Inherent Capabilities of -Oriented Computing Chung, Sam and Davalos, Sergio Abstract The research conducted examines how the emerging

More information

Guiding Principles for Modeling and Designing Reusable Services

Guiding Principles for Modeling and Designing Reusable Services Guiding Principles for Modeling and Designing Reusable Services Max Dolgicer Managing Director International Systems Group, Inc. mdolgicer@isg-inc.com http://www.isg-inc.com Agenda The changing notion

More information

Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures

Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable

More information

CA Data Protection. Content Provider Development Guide. Release 15.0

CA Data Protection. Content Provider Development Guide. Release 15.0 CA Data Protection Content Provider Development Guide Release 15.0 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation

More information

What s New in Sonic V7.5 Rick Kuzyk

What s New in Sonic V7.5 Rick Kuzyk What s New in Sonic V7.5 Sonic ESB 7.5 Senior Portfolio Specialist 2 What s New in Sonic V7.5 Sonic ESB Timeline Sonic XQ March 2002 World s First Enterprise Service Bus Sonic ESB 6.0 March 2005 Continuous

More information

Service-Oriented Computing and Service-Oriented Architecture

Service-Oriented Computing and Service-Oriented Architecture Service-Oriented Computing and Service-Oriented Architecture Week 3 Lecture 5 M. Ali Babar Lecture Outline Service-Oriented Computing (SOC) Service-Oriented Architecture (SOA) Designing service-based systems

More information

What You Need to Know About Transitioning to SOA

What You Need to Know About Transitioning to SOA What You Need to Know About Transitioning to SOA written by: David A. Kelly, ebizq Analyst What You Need to Know About Transitioning to SOA Organizations are increasingly turning to service-oriented architectures

More information

How service-oriented architecture (SOA) impacts your IT infrastructure

How service-oriented architecture (SOA) impacts your IT infrastructure IBM Global Technology Services January 2008 How service-oriented architecture (SOA) impacts your IT infrastructure Satisfying the demands of dynamic business processes Page No.2 Contents 2 Introduction

More information

Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators

Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators Branimir Wetzstein, Dimka Karastoyanova, Frank Leymann Institute of Architecture of Application Systems, University

More information

Core J2EE Patterns, Frameworks and Micro Architectures

Core J2EE Patterns, Frameworks and Micro Architectures Core J2EE Patterns, Frameworks and Micro Architectures Deepak.Alur@sun.com Patterns & Design Expertise Center Sun Software Services January 2004 Agenda Patterns Core J2EE Pattern Catalog Background J2EE

More information

An Oracle White Paper October 2013. Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus

An Oracle White Paper October 2013. Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus An Oracle White Paper October 2013 Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Table of Contents Introduction...

More information

SOA Success is Not a Matter of Luck

SOA Success is Not a Matter of Luck by Prasad Jayakumar, Technology Lead at Enterprise Solutions, Infosys Technologies Ltd SERVICE TECHNOLOGY MAGAZINE Issue L May 2011 Introduction There is nothing either good or bad, but thinking makes

More information

BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use

BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use Product Data Sheet BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use BEA AquaLogic Integrator delivers the best way for IT to integrate, deploy, connect and manage process-driven

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

Component-Based and Service-Oriented Software Engineering: Key Concepts and Principles

Component-Based and Service-Oriented Software Engineering: Key Concepts and Principles Component-Based and Service-Oriented Software Engineering: Key Concepts and Principles Hongyu Pei Breivold, Magnus Larsson ABB AB, Corporate Research, 721 78 Västerås, Sweden {hongyu.pei-breivold, magnus.larsson}@se.abb.com

More information

A Quick Introduction to SOA

A Quick Introduction to SOA Software Engineering Competence Center TUTORIAL A Quick Introduction to SOA Mahmoud Mohamed AbdAllah Senior R&D Engineer-SECC mmabdallah@itida.gov.eg Waseim Hashem Mahjoub Senior R&D Engineer-SECC Copyright

More information

LBPerf: An Open Toolkit to Empirically Evaluate the Quality of Service of Middleware Load Balancing Services

LBPerf: An Open Toolkit to Empirically Evaluate the Quality of Service of Middleware Load Balancing Services LBPerf: An Open Toolkit to Empirically Evaluate the Quality of Service of Middleware Load Balancing Services Ossama Othman Jaiganesh Balasubramanian Dr. Douglas C. Schmidt {jai, ossama, schmidt}@dre.vanderbilt.edu

More information

MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS

MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS Number: 70-595 Passing Score: 700 Time Limit: 150 min File Version: 26.5 http://www.gratisexam.com/ MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS Exam Name: TS: Developing

More information

SOACertifiedProfessional.Braindumps.S90-03A.v2014-06-03.by.JANET.100q. Exam Code: S90-03A. Exam Name: SOA Design & Architecture

SOACertifiedProfessional.Braindumps.S90-03A.v2014-06-03.by.JANET.100q. Exam Code: S90-03A. Exam Name: SOA Design & Architecture SOACertifiedProfessional.Braindumps.S90-03A.v2014-06-03.by.JANET.100q Number: S90-03A Passing Score: 800 Time Limit: 120 min File Version: 14.5 http://www.gratisexam.com/ Exam Code: S90-03A Exam Name:

More information

Extend the value of your core business systems.

Extend the value of your core business systems. Legacy systems renovation to SOA September 2006 Extend the value of your core business systems. Transforming legacy applications into an SOA framework Page 2 Contents 2 Unshackling your core business systems

More information

ESB as a SOA mediator: Minimizing Communications Complexity

ESB as a SOA mediator: Minimizing Communications Complexity ESB as a SOA mediator: Minimizing Communications Complexity Nadya Alexandra Calderón R., Sergio Daniel Moreno P. Universidad de los Andes. Ingeniería de Sistemas y Computación. Bogotá, Colombia n-calder@uniandes.edu.co,

More information

Demonstrating WSMX: Least Cost Supply Management

Demonstrating WSMX: Least Cost Supply Management Demonstrating WSMX: Least Cost Supply Management Eyal Oren 2, Alexander Wahler 1, Bernhard Schreder 1, Aleksandar Balaban 1, Michal Zaremba 2, and Maciej Zaremba 2 1 NIWA Web Solutions, Vienna, Austria

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

Distributed Objects and Components

Distributed Objects and Components Distributed Objects and Components Introduction This essay will identify the differences between objects and components and what it means for a component to be distributed. It will also examine the Java

More information

SODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE

SODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE SODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE Breno Mansur Rabelo Centro EData Universidade do Estado de Minas Gerais, Belo Horizonte, MG, Brazil breno.mansur@uemg.br Clodoveu Augusto Davis

More information

SOA Planning Guide. 2015 The Value Enablement Group, LLC. All rights reserved.

SOA Planning Guide. 2015 The Value Enablement Group, LLC. All rights reserved. SOA Planning Guide 1 Agenda q SOA Introduction q SOA Benefits q SOA Principles q SOA Framework q Governance q Measurement q Tools q Strategic (long term) View 2 Introduction to SOA q Service-oriented architecture

More information

Vertical Integration of Enterprise Industrial Systems Utilizing Web Services

Vertical Integration of Enterprise Industrial Systems Utilizing Web Services Vertical Integration of Enterprise Industrial Systems Utilizing Web Services A.P. Kalogeras 1, J. Gialelis 2, C. Alexakos 1, M. Georgoudakis 2, and S. Koubias 2 1 Industrial Systems Institute, Building

More information

Oracle SOA Suite: The Evaluation from 10g to 11g

Oracle SOA Suite: The Evaluation from 10g to 11g KATTA Durga Reddy TATA Consultancy Services. Oracle SOA Suite: The Evaluation from 10g to 11g Introduction Oracle SOA Suite is an essential middleware layer of Oracle Fusion Middleware. It provides a complete

More information

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8

Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes

More information

SOA for Healthcare: Promises and Pitfalls

SOA for Healthcare: Promises and Pitfalls SOA for Healthcare: Promises and Pitfalls Dennis B. Smith dbs@sei.cmu.edu SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The

More information

Overview of Luna High Availability and Load Balancing

Overview of Luna High Availability and Load Balancing SafeNet HSM TECHNICAL NOTE Overview of Luna High Availability and Load Balancing Contents Introduction... 2 Overview... 2 High Availability... 3 Load Balancing... 4 Failover... 5 Recovery... 5 Standby

More information

ESB Versus ActiveVOS

ESB Versus ActiveVOS Comparing and Contrasting an Enterprise Service Bus with ActiveVOS AN ACTIVE ENDPOINTS PAPER 2011 Active Endpoints, Inc. ActiveVOS is a trademark of Active Endpoints, Inc. All other company and product

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

Service Oriented Architecture 1 COMPILED BY BJ

Service Oriented Architecture 1 COMPILED BY BJ Service Oriented Architecture 1 COMPILED BY BJ CHAPTER 9 Service Oriented architecture(soa) Defining SOA. Business value of SOA SOA characteristics. Concept of a service, Enterprise Service Bus (ESB) SOA

More information

Designing an Enterprise Application Framework for Service-Oriented Architecture 1

Designing an Enterprise Application Framework for Service-Oriented Architecture 1 Designing an Enterprise Application Framework for Service-Oriented Architecture 1 Shyam Kumar Doddavula, Sandeep Karamongikar Abstract This article is an attempt to present an approach for transforming

More information

The glite File Transfer Service

The glite File Transfer Service The glite File Transfer Service Peter Kunszt Paolo Badino Ricardo Brito da Rocha James Casey Ákos Frohner Gavin McCance CERN, IT Department 1211 Geneva 23, Switzerland Abstract Transferring data reliably

More information

EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO.

EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES. Enterprise Application Integration. Peter R. Egli INDIGOO. EAI OVERVIEW OF ENTERPRISE APPLICATION INTEGRATION CONCEPTS AND ARCHITECTURES Peter R. Egli INDIGOO.COM 1/16 Contents 1. EAI versus SOA versus ESB 2. EAI 3. SOA 4. ESB 5. N-tier enterprise architecture

More information

5 Service-Oriented Architecture Principles and Technologies

5 Service-Oriented Architecture Principles and Technologies 121 5 Service-Oriented Architecture Principles and Technologies Has been published as: Using Architectural Patterns and Blueprints for Service-Oriented Architecture. In: IEEE Software, Volume 23, No 2,

More information

WebSphere ESB Best Practices

WebSphere ESB Best Practices WebSphere ESB Best Practices WebSphere User Group, Edinburgh 17 th September 2008 Andrew Ferrier, IBM Software Services for WebSphere andrew.ferrier@uk.ibm.com Contributions from: Russell Butek (butek@us.ibm.com)

More information

A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement

A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement Shuchi Gupta 1, Prof. Praveen Bhanodia 2 1 Department of Computer Science & Engineering, Patel College

More information

The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary

The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary Workflow The automation of a business process, in whole or part, during which documents, information

More information

API Management Introduction and Principles

API Management Introduction and Principles API Management Introduction and Principles by Vijay Alagarasan, Principal Architect, Enterprise Architecture and Strategy of Asurion Abstract: This article is focused on providing solutions for common

More information

Ontological Identification of Patterns for Choreographing Business Workflow

Ontological Identification of Patterns for Choreographing Business Workflow University of Aizu, Graduation Thesis. March, 2010 s1140042 1 Ontological Identification of Patterns for Choreographing Business Workflow Seiji Ota s1140042 Supervised by Incheon Paik Abstract Business

More information

Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware

Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware R. Goranova University of Sofia St. Kliment Ohridski,

More information

Event-based middleware services

Event-based middleware services 3 Event-based middleware services The term event service has different definitions. In general, an event service connects producers of information and interested consumers. The service acquires events

More information

Persistent, Reliable JMS Messaging Integrated Into Voyager s Distributed Application Platform

Persistent, Reliable JMS Messaging Integrated Into Voyager s Distributed Application Platform Persistent, Reliable JMS Messaging Integrated Into Voyager s Distributed Application Platform By Ron Hough Abstract Voyager Messaging is an implementation of the Sun JMS 1.0.2b specification, based on

More information

Peer-to-peer Cooperative Backup System

Peer-to-peer Cooperative Backup System Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup

More information

Assurance in Service-Oriented Environments

Assurance in Service-Oriented Environments Assurance in Service-Oriented Environments Soumya Simanta Research, Technology, and System Solutions (RTSS) Program Software Engineering Institute Carnegie Mellon University Pittsburgh 15232 28 th October,

More information