SlideShare a Scribd company logo
1
Systems Integration
Lecture 4
2
Integration Topologies
3
Intro
 System integration is multifaceted and can be
approached through different architectural
models, depending on the number and nature of
components that need to be connected.
– Point-to-Point Connection
– The Broker (and its variants)
– Message Bus.
– Publish/Subscribe
4
Point – to – Point Integration (P2P)
 P2P is the architectural pattern in which every system is
directly connected to all other systems and apps it needs to
work in tandem and share information with.
 This model can be realized via APIs, webhooks, or custom
code.
 With a P2P connection, data is extracted from one system,
modified or formatted, and then sent to another system.
 Each application implements all the logic for data
translation, transformation, and routing, taking into account
the protocols and supported data models of other integrated
components.
5
6
P2P
 With P2P as the size of your integration network grows and
as the frequency of change increases, the operational cost
associated with this approach becomes significant.
 Major advantage of the Point-to-Point Connection pattern
is simplicity of implementation.
 The weakness of the Point-to-Point Connection pattern is
the duplication of transformation and routing code between
systems, and the high configuration cost of endpoint
address changes.
 To minimize these weaknesses, you can add another layer
of indirection between endpoints that contains a broker.
P2P: When to use it
 Say, to interconnect six modules you need to
perform 15 integrations. This results in the
so-called star/spaghetti integration.
 This approach suits companies that don’t
have complex business logic and run their
operations on just a few software modules. It
is also a perfect option for businesses aiming
at connecting to SaaS applications.
7
Broker
 The Broker pattern and its variants are often used in both application
design and integration design.
 The intent of a broker is to decouple source systems from target
systems.
 In the context of Distributed Object Integration, the source system may
send a marshaled set of parameters when the source system requests a
method invocation from the target system.
 In the context of Service-Oriented Integration, the source system may
send a message that requests a service from a target system. While the
contexts vary significantly, both use a Broker pattern to decouple the
source systems and the target systems.
8
Broker
9
 There are three responsibilities that are involved in
communication as follows:
 Routing. Routing involves determining the location of a
target system, and it is performed by using direct and indirect
communication.
 Endpoint registration. Endpoint registration is the
mechanism that a system can use to register itself with the
Broker so that other systems can discover that system.
 Transformation. Transformation is the process where an
element is converted from one format to another.
Broker
10
Broker
 A Direct broker establishes initial communication between endpoints.
After the initial communication, the two endpoints communicate
directly by using client-side and server-side Proxies.
 The Indirect broker behaves like a middleman such that all the
communication between endpoints passes through it. Using an
indirect broker allows a sender to be unaware of target details and
provides central control of the message flow. In this way, Indirect
Broker is similar to Mediator.
– While the Indirect Broker pattern is useful when you need to
control communications, Direct Broker offers better
performance, especially when an additional intermediary is
not needed for all communications.
11
Broker: Message Broker
 A Message Broker communicates exclusively by using
messages and indirect communication. The Message
Broker is an important and frequently used integration
pattern. It is often referred to as a Hub-and-Spoke
architecture.
12
Hub – and – Spoke
 The hub-and-spoke model is a more advanced type of
integration architecture that addresses the issues of point-
to-point. The connections between all subsystems are
handled by a central hub (message broker), so they don’t
communicate with each other directly.
 The hub serves as a message-oriented middleware with a
centralized integration engine to translate operations into a
single canonical language and route messages to the right
destinations. The spokes (adapters) connecting the hub to
the subsystems are managed individually.
13
Hub – and – Spoke
14
Hub – and – Spoke
 Pros and cons: Since every system has only one connection to the
central hub, things get better in terms of security and architecture
simplicity.
 However, the centralization of the hub can be a weakness in such a
model. The whole infrastructure is dependent on the single
integration engine which can become the key bottleneck as the
workload increases.
 When to use it: The hub-and-spoke model is widely-used in e-
commerce, financial operations, and payment processing. Besides,
it’s a preferable architecture for highly regulated industries that face
significant security risks.
15
Broker examples
 Five examples of the Broker pattern:
– Microsoft Distributed Common Object Model (DCOM)
– Microsoft .NET Framework Remoting
– Common Object Request Broker Architecture (CORBA)
– Universal Description Discovery and Integration (UDDI)
– Microsoft BizTalk Server 2004
16
Message Bus
 A Message Bus provide a common communication
mechanism between disparate systems.
 To provide this common mechanism, the systems must have
three elements:
– A set of agreed-upon message schemas
– A set of common command messages
– A shared infrastructure for sending bus messages to recipients
 This shared infrastructure can be achieved either by using a
Message Router or by using a Publish/Subscribe
mechanism.
17
Message Bus
 The Publish/Subscribe pattern describes a collaboration
where one system subscribes to change messages or to
event messages that are produced by another system.
 In the Message Bus context, a system can subscribe to
bus messages. After the system subscribes, the system is
then sent all the messages that are addressed to this
common bus.
 Although message buses often use Publish/Subscribe
implementations, these implementations are used by
other topologies as well.
18
Message Bus
 The advantage of a message bus is that once it is established,
the cost of adding new applications is minimal. A new
application can subscribe to bus messages without affecting
other subscribers.
 The disadvantage of a message bus is the significant amount of
work that is involved in creating common message schemas,
command messages, and shared infrastructure within an
enterprise.
19
Publish/Subscribe
20
 Publish/Subscribe pattern helps keep cooperating
systems synchronized by one-way propagation of
messages because one publisher sends a message to
any number of intended subscribers.
 However, there are significant differences in the next
level of design within the pattern.
 These differences lead to three refinements of the
Publish/Subscribe pattern:
– List-Based Publish/Subscribe,
– Broadcast-Based Publish/Subscribe, and
– Content-Based Publish/Subscribe.

More Related Content

PDF
[WSO2Con EU 2017] Building Next Generation Banking Middleware at ING: The Rol...
KEY
Spring integration motivation and history
PDF
Designing Distributed Systems
PPTX
Integration Patterns With Spring integration
PPTX
NServiceBus workshop presentation
PDF
Introduction to NServiceBus
PDF
SmartTechTalk : Asynchronous messaging
PPTX
JDC2008 - Enterprise Integration and Service Oriented Design
[WSO2Con EU 2017] Building Next Generation Banking Middleware at ING: The Rol...
Spring integration motivation and history
Designing Distributed Systems
Integration Patterns With Spring integration
NServiceBus workshop presentation
Introduction to NServiceBus
SmartTechTalk : Asynchronous messaging
JDC2008 - Enterprise Integration and Service Oriented Design

Similar to Unit 4.pdf (20)

PPTX
Why Enterprise Service Bus (ESB)
PPTX
How Software Works in system environment
PDF
ESB Overview
PPT
Enterprise_Integration.ppt
DOCX
Understanding the basic need of Service Oriented Architecture and getting sta...
PPTX
SOA Pattern-Asynchronous Queuing
PDF
[Workshop] Digital Transformation: Breaking Down Boundaries for Greater Conne...
PPTX
Presentation des différents broker de messages
PDF
From MoMs to DaDs : The evolution of EAI
PPTX
The Intricacies Of Enterprise Integration Soa Vs Esb
PPT
Introduction to WebSphere Message Broker
PPT
08 message and_queues_dieter_gawlick
PPT
Jms intro
PPTX
Webinar: Implementation of 10 Integration Patterns on iPaaS Platform
PDF
OMG Data-Distribution Service (DDS) Tutorial - 2009
PPTX
Distributed system architecture
PPTX
Architectures with Windows Azure
DOC
integeration
PDF
IBM InterConnect 2015 - IIB Effective Application Development
PPTX
The Overview of Microservices Architecture
Why Enterprise Service Bus (ESB)
How Software Works in system environment
ESB Overview
Enterprise_Integration.ppt
Understanding the basic need of Service Oriented Architecture and getting sta...
SOA Pattern-Asynchronous Queuing
[Workshop] Digital Transformation: Breaking Down Boundaries for Greater Conne...
Presentation des différents broker de messages
From MoMs to DaDs : The evolution of EAI
The Intricacies Of Enterprise Integration Soa Vs Esb
Introduction to WebSphere Message Broker
08 message and_queues_dieter_gawlick
Jms intro
Webinar: Implementation of 10 Integration Patterns on iPaaS Platform
OMG Data-Distribution Service (DDS) Tutorial - 2009
Distributed system architecture
Architectures with Windows Azure
integeration
IBM InterConnect 2015 - IIB Effective Application Development
The Overview of Microservices Architecture
Ad

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Mushroom cultivation and it's methods.pdf
Encapsulation_ Review paper, used for researhc scholars
A comparative analysis of optical character recognition models for extracting...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
OMC Textile Division Presentation 2021.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Building Integrated photovoltaic BIPV_UPV.pdf
cloud_computing_Infrastucture_as_cloud_p
Web App vs Mobile App What Should You Build First.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Tartificialntelligence_presentation.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Unlocking AI with Model Context Protocol (MCP)
DP Operators-handbook-extract for the Mautical Institute
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Chapter 5: Probability Theory and Statistics
Programs and apps: productivity, graphics, security and other tools
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Heart disease approach using modified random forest and particle swarm optimi...
Mushroom cultivation and it's methods.pdf
Ad

Unit 4.pdf

  • 3. 3 Intro  System integration is multifaceted and can be approached through different architectural models, depending on the number and nature of components that need to be connected. – Point-to-Point Connection – The Broker (and its variants) – Message Bus. – Publish/Subscribe
  • 4. 4 Point – to – Point Integration (P2P)  P2P is the architectural pattern in which every system is directly connected to all other systems and apps it needs to work in tandem and share information with.  This model can be realized via APIs, webhooks, or custom code.  With a P2P connection, data is extracted from one system, modified or formatted, and then sent to another system.  Each application implements all the logic for data translation, transformation, and routing, taking into account the protocols and supported data models of other integrated components.
  • 5. 5
  • 6. 6 P2P  With P2P as the size of your integration network grows and as the frequency of change increases, the operational cost associated with this approach becomes significant.  Major advantage of the Point-to-Point Connection pattern is simplicity of implementation.  The weakness of the Point-to-Point Connection pattern is the duplication of transformation and routing code between systems, and the high configuration cost of endpoint address changes.  To minimize these weaknesses, you can add another layer of indirection between endpoints that contains a broker.
  • 7. P2P: When to use it  Say, to interconnect six modules you need to perform 15 integrations. This results in the so-called star/spaghetti integration.  This approach suits companies that don’t have complex business logic and run their operations on just a few software modules. It is also a perfect option for businesses aiming at connecting to SaaS applications. 7
  • 8. Broker  The Broker pattern and its variants are often used in both application design and integration design.  The intent of a broker is to decouple source systems from target systems.  In the context of Distributed Object Integration, the source system may send a marshaled set of parameters when the source system requests a method invocation from the target system.  In the context of Service-Oriented Integration, the source system may send a message that requests a service from a target system. While the contexts vary significantly, both use a Broker pattern to decouple the source systems and the target systems. 8
  • 9. Broker 9  There are three responsibilities that are involved in communication as follows:  Routing. Routing involves determining the location of a target system, and it is performed by using direct and indirect communication.  Endpoint registration. Endpoint registration is the mechanism that a system can use to register itself with the Broker so that other systems can discover that system.  Transformation. Transformation is the process where an element is converted from one format to another.
  • 11. Broker  A Direct broker establishes initial communication between endpoints. After the initial communication, the two endpoints communicate directly by using client-side and server-side Proxies.  The Indirect broker behaves like a middleman such that all the communication between endpoints passes through it. Using an indirect broker allows a sender to be unaware of target details and provides central control of the message flow. In this way, Indirect Broker is similar to Mediator. – While the Indirect Broker pattern is useful when you need to control communications, Direct Broker offers better performance, especially when an additional intermediary is not needed for all communications. 11
  • 12. Broker: Message Broker  A Message Broker communicates exclusively by using messages and indirect communication. The Message Broker is an important and frequently used integration pattern. It is often referred to as a Hub-and-Spoke architecture. 12
  • 13. Hub – and – Spoke  The hub-and-spoke model is a more advanced type of integration architecture that addresses the issues of point- to-point. The connections between all subsystems are handled by a central hub (message broker), so they don’t communicate with each other directly.  The hub serves as a message-oriented middleware with a centralized integration engine to translate operations into a single canonical language and route messages to the right destinations. The spokes (adapters) connecting the hub to the subsystems are managed individually. 13
  • 14. Hub – and – Spoke 14
  • 15. Hub – and – Spoke  Pros and cons: Since every system has only one connection to the central hub, things get better in terms of security and architecture simplicity.  However, the centralization of the hub can be a weakness in such a model. The whole infrastructure is dependent on the single integration engine which can become the key bottleneck as the workload increases.  When to use it: The hub-and-spoke model is widely-used in e- commerce, financial operations, and payment processing. Besides, it’s a preferable architecture for highly regulated industries that face significant security risks. 15
  • 16. Broker examples  Five examples of the Broker pattern: – Microsoft Distributed Common Object Model (DCOM) – Microsoft .NET Framework Remoting – Common Object Request Broker Architecture (CORBA) – Universal Description Discovery and Integration (UDDI) – Microsoft BizTalk Server 2004 16
  • 17. Message Bus  A Message Bus provide a common communication mechanism between disparate systems.  To provide this common mechanism, the systems must have three elements: – A set of agreed-upon message schemas – A set of common command messages – A shared infrastructure for sending bus messages to recipients  This shared infrastructure can be achieved either by using a Message Router or by using a Publish/Subscribe mechanism. 17
  • 18. Message Bus  The Publish/Subscribe pattern describes a collaboration where one system subscribes to change messages or to event messages that are produced by another system.  In the Message Bus context, a system can subscribe to bus messages. After the system subscribes, the system is then sent all the messages that are addressed to this common bus.  Although message buses often use Publish/Subscribe implementations, these implementations are used by other topologies as well. 18
  • 19. Message Bus  The advantage of a message bus is that once it is established, the cost of adding new applications is minimal. A new application can subscribe to bus messages without affecting other subscribers.  The disadvantage of a message bus is the significant amount of work that is involved in creating common message schemas, command messages, and shared infrastructure within an enterprise. 19
  • 20. Publish/Subscribe 20  Publish/Subscribe pattern helps keep cooperating systems synchronized by one-way propagation of messages because one publisher sends a message to any number of intended subscribers.  However, there are significant differences in the next level of design within the pattern.  These differences lead to three refinements of the Publish/Subscribe pattern: – List-Based Publish/Subscribe, – Broadcast-Based Publish/Subscribe, and – Content-Based Publish/Subscribe.