CMPE172 Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

CA

A certificate authority (___) is a third-party organization issues, confirms and validates server certificates. browser connects to a site via HTTPS and downloads the certificate and looks up the certificate chain

scale

Techniques to ______ a relational database: Master-slave replication. Master-master replication. Federation. Sharding. Denormalization

SOA

A service is a well-defined function that is universally available and responds to requests from ―service consumers.‖ Once an enterprise assembles a collection of useful services, managing the services becomes a critical function. First, applications need some form of service directory, a centralized list of all available services. Second, each service needs to describe its interface in such a way that an application can ―negotiate‖ a communications contract with the service. These two functions, service discovery and negotiation, are the key elements that make up a service-oriented architecture (___)

Cookie

Drawbacks of __________-based authorization: Stateful. The server has to keep a record of active sessions and check with the database every time a request arrives, which requires some overhead on the server-side. It is also difficult to decouple the authorization process from the application server. are usually bundled with domains. If your application interacts with multiple domains, additional configuration may be required. does not play well with mobile clients does not accommodate well the use case where users of one product or service would like to grant third-party clients access to their information on the platform.

streaming

Characteristics of a ___________ platform: Event-based data flows Scalable central nervous system Integrate of any kind of applications and systems. Distributed storage for decoupling applications. Stateless service and stateful business processes.

solutions

Integration __________ have to deal with a few fundamental challenges: Networks are unreliable Networks are slow Any two applications are different: Different programming languages, operating platforms, and data formats Change is inevitable

JWT

JSON Web Token (____) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. can be signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA or ECDSA. consist of three parts separated by dots (.): Header, Payload, Signature

7

Layer __ load balancing allows the load balancer to route a request based on information in the request itself, for a request for an image can be routed to image servers that store it and are highly optimized to serve up multimedia

HTTP

_____ is perhaps the most popular application protocol used in the Internet since 1989 is an asymmetric request-response client-server protocol. An HTTP client sends a request message to an HTTP server. The server, in turn, returns a response message. In other words, HTTP is a pull protocol, the client pulls information from the server (instead of server pushes information down to the client). is a stateless protocol. In other words, the current request does not know what has been done in the previous requests. permits negotiating of data type and representation, so as to allow systems to be built independently of the data being transferred.

integration

Six types of ____________: ◦ Information portals ◦ Data replication ◦ Shared business functions ◦ Service-oriented architectures ◦ Distributed business processes ◦ Business-to-business integration

synchronous

With ____________ communication, a call is made to a remote server, which blocks until the operation completes. We know when things have completed successfully or not.

asynchronous

With _______________ communication, the caller doesn't wait for the operation to complete before returning, and may not even care whether or not the operation completes at all. Useful for long running jobs, where keeping a connection open for a long period of time between the client and server is impractical. For unreliable distributed workloads. More complex

Stage

________: One will not typically load transformed data directly into the target data warehouse. Data should first enter a staging database, making it easier to roll back if something goes wrong

TCP/IP

Transmission Control Protocol/Internet Protocol (___/__) suite was created by the U.S. Department of Defense (DoD) to ensure that communications could survive any conditions and that data integrity wouldn't be compromised under malicious attacks.

request

4 ways of ________ handling: ◦ Request/response ◦ Pub/subscribe - extremely important now ◦ Notification - one to one ◦ Async

reverse proxy

A _________ ______ is a web server. Centralizes internal services and provides unified interfaces to the public. Increased security - Hide information about backend servers, blacklist IPs, limit number of connections per client. Increased scalability and flexibility - Clients only see the it's IP, allowing to scale servers or change their configuration. SSL termination - Decrypt incoming requests and encrypt server responses. Compression, Caching etc

content

A _________ delivery network (CDN) is a globally distributed network of proxy servers, serving content from locations closer to the user. Generally, static files such as HTML/CSS/JS, photos, and videos are served from CDN, although some CDNs such as Amazon's CloudFront support dynamic content. The site's DNS resolution will tell clients which server to contact. Serving content from CDNs can significantly improve performance in two ways: Users receive content at data centers close to them, Your servers do not have to serve requests that the CDN fulfills.

4

A layer __ load-balancer takes routing decision based on IPs and TCP or UDP ports

Beanstalk

AWS Elastic __________ is an easy-to-use service for deploying and scaling web applications and services developed with Java, .NET, PHP, Node.js, Python, Ruby, Go, and Docker on familiar servers such as Apache, Nginx, Passenger, and IIS. Once code is uploaded, Elastic Beanstalk automatically handles the deployment, from capacity provisioning, load balancing, auto-scaling to application health monitoring. Full control over the AWS resources powering the application and can access the underlying resources at any time. There is no additional charge for Elastic Beanstalk - pay only for the AWS resources needed to store and run applications.

EC2

AWS ___: Allows users to rent virtual computers on which to run their own computer applications. encourages scalable deployment of applications, uses APIs to configure a virtual machine, which Amazon calls an "instance", containing any software desired. Users can create, launch, and terminate server-instances as needed, paying by the second for active servers - hence the term "elastic". provides users with control over the geographical location of instances that allows for latency optimization and high levels of redundancy.

Lambda

AWS _________: Without provisioning or managing servers. Only pay for the compute time consumed. Event-driven, Serverless computing platform. It is a computing service that runs code in response to events and automatically manages the computing resources required by that code. Can run code for virtually any type of application or backend service - all with zero administration. Once code is uploaded, Lambda takes care of everything required to run and scale the code with high availability. Code can be set up to automatically trigger from other AWS services or call it directly from any web or mobile app.

S3

Amazon ___ or Amazon Simple Storage Service is a service offered by Amazon Web Services (AWS) that provides object storage through a web service interface. uses the same scalable storage infrastructure that Amazon.com uses to run its global e-commerce network. can be employed to store any type of object which allows for uses like storage for Internet applications, backup and recovery, disaster recovery, data archives, data lakes for analytics, and hybrid cloud storage. guarantees 99.9% uptime

Elastic Block

Amazon ________ _______ Store (Amazon EBS) is a raw block-level storage service designed to be used with Amazon EC2 instances. When mounted to Amazon EC2 instances, Amazon EBS volumes can be used like any other raw block device: they can be formatted with a specific file system, host operating systems and applications, and have snapshots or clones made from them

Kinesis

Amazon _________ makes it easy to collect, process, and analyze real-time, streaming data so as to get timely insights and react quickly to new information. offers key capabilities to cost-effectively process streaming data at any scale, along with the flexibility to choose the tools that best suit the requirements of the application. can ingest real-time data such as video, audio, application logs, website clickstreams, and IoT telemetry data for machine learning, analytics, and other applications. enables one to process and analyze data as it arrives and respond instantly instead of having to wait until all data is collected before the processing can begin

CloudFront

Amazon _____________ is a fast content delivery network (CDN) service that securely delivers data, videos, applications, and APIs to customers globally with low latency, high transfer speeds, all within a developer- friendly environment. Content delivery networks provide a globally- distributed network of proxy servers which cache content, such as web videos or other bulky media, more locally to consumers. Improves access speed for downloading the content

messaging

Benefits of ____________ include: -Remote Communication -Platform/Language Integration -Asynchronous Communication. -Messaging enables a send-and-forget approach to communication -Variable Timing -Throttling -Reliable Communication -Disconnected Operation -Mediation -Thread Management

streaming

Benefits of a ___________ platform in the enterprise architecture: Large and elastic scalability Flexibility of architecture. Event-driven microservices. Openness without commitment to a unique technology or data format Independent and decoupled business services Multi-tenancy Industrialized deployment

object

CORBA, Sun's Java/RMI and Microsoft's COM/DCOM, were the three most popular distributed ________ paradigms between mutually interacting software applications in a SOA

CORBA

Common Object Request Broker Architecture (_________) is a standard developed by the Object Management Group (OMG) to provide interoperability among distributed objects. is essentially a design specification for distributed objects to communicate with one another, whether locally or on remote devices, written in different languages, or at different locations on a network. often described as a "software bus" because it is a software-based communications interface through which objects are located and accessed

replication

Data ____________: Many business systems require access to the same data. For example, a customer's address may be used in the customer care system (when the customer calls to change it), the accounting system (to compute sales tax), the shipping system (to label the shipment), and the billing system (to send an invoice)

Servers

Features of ________: They have large storage capacity. They are able to provide information to many computers simultaneously, therefore have large RAM. Its processor speed is high, as it may have to execute multi-tasking too.

integration

Four main ____________ approaches: File Transfer, Shared Database, Remote Procedure Invocation, Messaging.

portals

Information __________ aggregate information from multiple sources into a single display to avoid having the user access multiple systems for information. Simple information portals divide the screen into multiple zones, each of which displays information from a different system.

challenges

Messaging _____________: -Complex programming model. Asynchronous messaging requires developers to work with an event-driven programming mode -Sequence issues. Message channels guarantee message delivery, but they do not guarantee when the message will be delivered -Synchronous scenarios. Not all applications can operate in a send-and-forget mode. If a user is looking for airline tickets, he or she is going to want to see the ticket price right away, not after some undetermined time -Performance. Messaging systems do add some overhead to communication. It takes effort to package application data into a message and send it, and to receive a message and process it -Limited platform support. Many proprietary messaging systems are not available on all platforms. Often, transferring a file via FTP is the only integration option -Vendor lock-in. Many messaging system implementations rely on proprietary protocols

Hub

Middleware ____ architectures: Basic idea is a server that routes messages. can be seen as less tightly coupled architectures.

bus/ring

Middleware ____/_____ architectures: - Fast. The network hardware and software are tailored for the production workload - Secure. There are many barriers to breaking into the core enterprise servers - Flexible. New channels can be added easily

Memory Cache

Popular queries can be served from a ________ _______ such as Redis or Memcached to reduce response times. also useful for handling the unevenly distributed traffic and traffic spikes

Protobuf

Protocol Buffers (__________) is a method of serializing structured data. It is useful in developing programs to communicate with each other over a wire or for storing data. The method involves an interface description language that describes the structure of some data and a program that generates source code from that description for generating or parsing a stream of bytes that represents the structured data. Google developed it for internal use and provided a code generator for multiple languages under an open source license. The design goals for Protocol Buffers emphasized simplicity and performance. In particular, it was designed to be smaller and faster than XML

INTEGRATION

THE NEED FOR _______________: Enterprises are typically comprised of hundreds, if not thousands, of applications that are custom built, acquired from a third party, part of a legacy system, or a combination thereof, operating in multiple tiers of different operating system platforms. It is not uncommon to find an enterprise that has 30 different Web sites, three instances of SAP, and countless departmental solutions

Enterprise

The ___________ Service Bus is a software architecture which connects all the services together over a bus like infrastructure. falls under ―Integration. essentially is a product (based on messaging) which helps with integrating multiple applications in an organization. routes, filters, mediates and transforms the messages between applications it is acting as a bridge for. implements a communication system between mutually interacting software applications in a SOA

Authoritative

These DNS cache servers are called "Not ___________ DNS servers" as they provide request resolution based in a cached value acquired from "___________ DNS servers". An ___________ Root Name Server maintains and provides a list of authoritative name servers for each of the top-level domains (.com, .org, etc.). An ___________ Top Level Domain Name Server maintains and provides a list of authoritative name servers for all domains (gmail.com, wikipedia.org, etc.).

distributed

Three common ____________ architecture patterns in use: 1. Middleware bus (or ring) architectures 2. Hub-and-spoke architectures 3. Loosely coupled architectures

streaming

Use cases for a __________ platform: Event-driven processing of big data sets (e.g., logs, IoT sensors, social feeds) Mission-critical, real-time applications (e.g., payments, fraud detection, customer experience) Decoupled integration between different legacy applications and modern applications Microservices architecture Analytics (e.g., for data science, machine learning)

event-based

With an ______-______ collaboration, we invert things. Instead of a client initiating requests asking for things to be done, it instead says 'this thing happened' and expects other parties to know what to do. are asynchronous by their nature

IP

__ is an unreliable, connectionless protocol. IP doesn't care whether a packet gets to it's destination or not. Nor does IP know about connections and port numbers. IP's job is too send and route packets to other computers. IP packets are independent entities and may arrive out of order or not at all. It is TCP's job to make sure packets arrive and are in the correct order. About the only thing IP has in common with TCP is the way it receives data and adds it's own IP header information to the TCP data.

UI

__-level integration ties integration logic to user interface code. is scripting- or proxy-based. Scripting-based integration embeds integration code into the UI component events, common with client/server applications

TLS

___ has two distinct layers: ___ Record Protocol establishes a secure connection with encryption methods like data encryption standard. ___ Handshake Protocol allows authentication for the servers and clients together. Before data can be exchanged, it has to convert cryptographic keys and algorithms. after the initial handshake is successful, switches to a secured method of communication

TCP

___ is a connection-oriented, reliable, byte stream service. is responsible for routing application protocols to the correct application on the destination computer. is responsible for breaking down a stream of bytes into segments and reconnecting them at the other end, retransmitting whatever might be lost and also organizing the segments in the correct order. Source Port and Destination Port fields together identify the two local end points of the particular connection. A port plus its hosts' IP address forms a unique end point

Non-repudiation

___-____________: A mechanism to prove that the sender really sent this message

UDP

___: certain data types do not require reliable delivery and extra overhead. Real-time traffic for example, needs to be transported in an efficient way without error correction and retransmission mechanisms. is considered to be a connectionless protocol. It leaves reliability to be handled by the application layer. All it cares about is fast transmission

ERP

____ SYSTEMS ARE ONE OF THE MOST POPULAR INTEGRATION POINTS IN TODAY'S ENTERPRISES. The advent of XML, XSL, and Web services certainly marks the most significant advance of standards-based features in an integration solution; Protocol Buffers - recent addition

two

____ Tier: User interface is stored at client machine and the database is stored on the server. Also called fat client thin server architecture

File Transfer

____ _________: One application writes a file that another later reads. The applications need to agree on the filename and location, the format of the file, the timing of when it will be written and read, and who will delete the file. Advantage is that integrators need no knowledge of the internals of an application. Issue is that updates tend to occur infrequently, and as a result systems can get out of synchronization

Web service

____ __________ architectures use the technologies that implement the ____ __________ standards such as SOAP, WSDL, and UDDI. are a widely implemented, which gives you a real chance of interoperating with different vendors' implementations. are cheap, often bundled with other technology such as the operating system (Microsoft .NET) or the Java package. are designed to work over the Internet so, for instance, they don't run into difficulties with firewalls.

data

____-level integration: integrate the backend datastores that the integrated applications use. Data-level integration can be push- or pull- based

AMQP

_____ (Advanced Message Queuing Protocol): is a binary application layer protocol. open source published standard for asynchronous messaging. Has routing features. It provides flow controlled, message-oriented communication with message-delivery guarantees such as at-most-once. Authentication and/or encryption based on TLS. It assumes an underlying reliable transport layer protocol such as TCP. RabbitMQ is an open-source message-broker software that originally implemented it. Because it is a streamed binary messaging system with tightly mandated messaging behavior, the interoperability of clients from different vendors is assured

Load Balancer

_____ _______: Used to distribute incoming traffic across the group of backend servers: Ensures availability and reliability of requests by sending to server which can best complete the job. Various techniques: Round robin, least connections, least time, hash etc. Conducts continuous health checks on servers to ensure they can handle requests

Data Encryption

_____ ___________ Standard (DES): The most common SKC scheme used today. DES is a block- cipher employing a 56-bit key that operates on 64-bit blocks. DES has a complex set of rules and transformations that were designed specifically to yield fast hardware implementations and slow software implementations. Advanced Encryption Standard (AES). The algorithm can use a variable block length and key length; the latest specification allowed any combination of keys lengths of 128, 192, or 256 bits and blocks of length 128, 192, or 256 bits

ACID

_____ is a set of properties of relational database transactions. ◦ Atomicity - Each transaction is all or nothing ◦ Consistency - Any transaction will bring the database from one valid state to another ◦ Isolation - Executing transactions concurrently has the same results as if the transactions were executed serially ◦ Durability - Once a transaction has been committed, it will remain so

HTTP

_____ is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, protocol which can be used for many tasks beyond its use for hypertext, such as name servers and distributed object management systems, through extension of its request methods, error codes and headers

XMPP

_____(Extensible Messaging and Presence Protocol) is Asynchronous Application protocol for doing real-time chat (and many other things, for that matter) - it then has to be transported across the network somehow, so you need a transport binding. There are three main transport bindings for XMPP: TCP/IP, which is what one usually uses on the Internet with native clients on; HTTP (called BOSH), which is what one has traditionally used when using XMPP in the browser (as TCP-IP isn't available to Javascript apps in the browser); Websockets (transport protocol), one uses when doing XMPP in a modern browser, So if you're developing a chat application in a browser, you'd choose XMPP as the application protocol and you'd use websockets (in a modern browser) or BOSH (in an older browser) as the network transport.

MQTT

_____: developed by IBM and open sourced to standards bodies. has become the de facto standard for constrained devices. is often used between IoT devices and the management platform and in some cases for communicating through adaptors. is a separate wire protocol for constrained devices with fewer features. _____ and AMQP are different technology stacks or protocols. They are related in that they both use messaging bus. It is possible to take _____ and then go from service to server. AMQP is more popular for server to server scenarios

STOMP

______ (Simple (or Streaming) Text Oriented Message Protocol): To support bidirectional communication with a web server. created for use in scripting languages with frames inspired by HTTP. It provides higher semantics on top of the WebSockets protocol and defines a handful of frame types that are mapped onto WebSockets frames. Some of these types are Connect; Subscribe; Unsubscribe; Send (messages sent to the server); Message (for messages send from the server) BEGIN, COMMIT, ROLLBACK (transaction management). WebSocket API enables web applications to handle bidirectional communications whereas ______ is a simple text-orientated messaging protocol.

Three

______ Tier Architecture: Presentation Layer (Client tier). Application Layer (Business tier). Database Layer (Data tier). Extra middleware - stores all the business logic, improves flexibility. Client request goes to the server through that middle layer and the response of server is received by middleware. Gives the best performance. This system comes expensive. Simple to use

Hash

______ functions, also called message digests and one-way encryption, are algorithms that, in some sense, use no key. Instead, a fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered. Hash algorithms are typically used to provide a digital fingerprint of a file's contents, often used to ensure that the file has not been altered by an intruder or virus. Functions are also commonly employed by many operating systems to encrypt passwords. Hash functions, then, provide a measure of the integrity of a file

HTTPS

______ is the secured version of HTTP: "HyperText Transfer Protocol" uses SSL/TLS. SSL stands for "Secure Sockets Layer". A protocol created by Netscape. Netscape gave control of SSL protocol to the IETF: Internet Engineering Task Force. Before 1999 ended, IETF released TLS version 1.0 (Which was really SSL 3.1). TLS 1.3 brings great security improvements and removes old weaker features

types

______ of middleware: MESSAGE ORIENTED MIDDLEWARE OBJECT MIDDLEWARE REMOTE PROCEDURE CALL (RPC) MIDDLEWARE DATABASE MIDDLEWARE TRANSACTION MIDDLEWARE PORTALS: facilitate front-end integration

proxy

______: Acts as an intermediary for requests from clients seeking resources from servers that provide those resources. Instead of connecting directly to a server that can fulfill a requested resource, such as a file or web page for example, the client directs the request to the proxy server, which evaluates the request and performs the required network transactions. This serves as a method to simplify or control the complexity of the request, or provide additional benefits such as load balancing, privacy, or security. were devised to add structure and encapsulation to distributed systems

Block

_______ Storage: Stores data in fixed size chunks. No metadata associated with blocks. Used just like a disk storage service

Caesar

_______ cipher: Substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.

SAML

_______ is a single sign on protocol that allows applications to communicate with each other to determine whether a user is authenticated or not for applications managed by a single account SAML Terms. Security Assertion Markup Language.

JAAS

_______ provides API mechanisms and services for enabling authentication and authorization in Java-based application solutions. is the Java implementation of the Pluggable Authentication Module (PAM) framework originally developed for Sun's Solaris operating system. Using PAM, ______ Authentication modules allow integrating authentication technologies such as Kerberos, RSA, smart cards, and biometric authentication systems

public key

_______-____ cryptography: Private keys are simply extremely large and random numbers. Public Keys are (x, y) points on an Elliptic Curve, generated by using the Private Key as a scalar. Private and Public Key cryptography derives its security from the Discrete Log Problem, given the starting value and the end value, it's difficult to deduce the scalar (Private Key)

public key

_______-____ cryptography: depends upon the existence of so-called one-way functions, or mathematical functions that are easy to computer whereas their inverse function is relatively difficult to compute (eg - Multiplication vs. factorization & Exponentiation vs. logarithms). RSA: The first, and still most common, PKC implementation, named for the three MIT mathematicians who developed it — Ronald Rivest, Adi Shamir, and Leonard Adleman

Cloud-Native

_______-_______ Architecture: Independent services Flexible deployment Scalable services - Kubernetes Resiliency High uptime Automatic load balancing and failover DevOps Usage of public cloud platforms but also private or hybrid Vendor-agnostic deployment Faster upgrades Higher utilization and lower infrastructure cost Shorter time to results and increased flexibility

Object

________ Storage: Data bundled in variable chunks with associated metadata with unique identifiers. Storage of unstructured data like music, image, and video files. Storage for backup files, database dumps, and log files. storage service

single sign on

________ ____ __: authenticate once, authorize many. ex: Kerberos

Kafka

________ is a distributed publish-subscribe messaging system that was created as a fast, scalable, and durable alternative to existing solutions. It is designed to broker enormous message streams for extremely low-latency analysis -Highly Scalable -Highly Durable; persists the messages on the disks, which provides intra-cluster replication. -Highly Reliable; replicates data and is able to support multiple subscribers. Additionally, it automatically balances consumers in the event of failure. -High Performance -High throughput for both publishing and subscribing, utilizing disk structures that are capable of offering constant levels of performance, even when dealing with many terabytes of stored messages.

Redis

________ is a popular open-source in-memory data structure store which supports a wide array of data structures and not just key-value pairs. It supports data structures such as strings, hashes, lists, sets, sorted sets with range queries, bitmaps, hyperloglogs and geospatial indexes with radius queries. has replication built-in which can provide easy redundancy across multiple Availability Domains. It can also support different levels of disk persistence. is single threaded, so it cannot effectively benefit from multi-core instances.

Master-master

________-_______ replication: Both masters serve reads and writes and coordinate with each other on writes. If either master goes down, the system can continue to operate with both reads and writes.

Master-slave

________-________ replication: The master serves reads and writes, replicating writes to one or more slaves, which serve only reads. Slaves can also replicate to additional slaves in a tree-like fashion. If the master goes offline, the system can continue to operate in read-only mode until a slave is promoted to a master or a new master is provisioned

TIGHT

_________ COUPLING: These architectures typically result in brittle, hard-to-maintain, and poorly scalable solutions. A great example is a local method invocation. Many integration approaches have aimed to make remote communications simple by packaging a remote data exchange into the same semantics as a local method call. This strategy resulted in the notion of a Remote Procedure Call (RPC) or Remote Method Invocation (RMI), supported by many popular frameworks and platforms: CORBA, Microsoft DCOM, .NET Remoting, Java RMI, and most recently, RPC-style Web services.

Loose

_________ Coupling: We should use a standard data format that is self-describing and platform-independent, such as XML. Should send it to an addressable channel. A channel is a logical address that both sender and receiver can agree on without being aware of each other's identity. Channel to queue up sent requests until the network and the receiving system are ready. The two systems still depend on a common data format, but we can remove this dependency by allowing for data format transformations inside the channel. If the format of one system changes, we only have to change the transformer and not the other participating systems

Shared

_________ Database: used to make data available more quickly and enforce an agreed- upon set of data formats. Biggest challenge is coming up with a suitable design and unified schema for the shared database.

Virtual

_________ Network: Allows a virtual machine to communicate with your network, host machine, and other virtual servers in different locations. Allow data centers/services to efficiently scale and change their network without needing physical changes

Remote

_________ Procedure Invocation: One application exposes some of its functionality so that it can be accessed remotely by other applications as a remote procedure. The communication occurs in real time and synchronously. To integrate applications' functionality rather than their data. A number of technologies, such as CORBA, COM, .NET Remoting, and Java RMI, implement it.

enterprise

_________ Software: Rarely known for the friendliness of its user interface. High licensing and support costs. Lack of flexibility and agility

Clients

_________ are the individual components which are connected in a network. They have a basic configuration. Client sends a request/query to server and server responds accordingly.

Software

_________ as a Service: Third party hosts the application

Publish

_________ to data warehouse - loading the data to the target tables. Some data warehouses overwrite existing information every time the ETL pipeline loads a new batch - this might happen daily, weekly or monthly

Method

_________-level integration: a less frequently used superset of application-level integration, aggregates common operations on multiple applications into a single application that fronts the integrated applications

Integrity

_________: Assuring the receiver that the received message has not been altered in any way from the original.

OAuth2

_________: provides both authentication and authorization. In this approach, the user logs into a system. That system will then request authentication, usually in the form of a token. The user will then forward this request to an authentication server, which will either reject or allow this authentication. From here, the token is provided to the user, and then to the requester. Such a token can then be checked at any time independently of the user by the requester for validation, and can be used over time with strictly limited scope and age of validity.

Enterprise

__________ Software more simply as software-based solutions used or created by an organization to benefit one or more of its stakeholders. This simple view of the term puts the focus on situations where executing that software is critical to the mission or business function of the organization and where it is essential to invest in continued operation of that software over some period of time. also termed as EAS(Enterprise Application Software)

Platform

__________ as a Service: Provides a platform for software creation. Responsible for managing applications and data. Uses the cloud computes hosted infrastructure

Transform

__________ data - removing extraneous or erroneous data (cleaning), applying business rules, checking data integrity (ensuring that the data was not corrupted in source, or corrupted by ETL, and that no data was dropped in previous stages), and creating aggregates as necessary

Privacy

__________/confidentiality: Ensuring that no one can read the message except the intended receiver.

Dictionary

___________ Attack - Typically a guessing attack which uses precompiled list of options. Rather than trying every option, only try complete options which are likely to work.

Container

___________ Services: Allow applications to be abstracted from their environment. virtualize at the OS level, while virtual machines virtualize at the hardware level

distributed

___________ application: An enterprise application often incorporates an n-tier architecture (a more sophisticated version of a client/server architecture), enabling it to be distributed across several computers. Even though this results in processes on different machines communicating with each other. Communicating parts are tightly coupled—they dependent directly on each other, so one tier cannot function without the others. Also, communication between tiers tends to be synchronous

federated

___________ identity management: authenticate once, authorize many, across different networks/service providers. used when networks are owned by different organizations. SSO: When user wants to log into a website that supports Windows Live ID the user will first be redirected to the nearest authentication server; once authenticated, the user is given an encrypted time-limited "global" cookie. ex: SAML, OAUTH2

Integration

___________ methods: Data-level integration, User interface (UI)-level integration, Application-level integration, Method-level integration.

categories

___________ of middleware: - Real-time category is good for quick request/response interaction with another application - Message queuing excels at the secure delivery of messages when the sender is not interested in an immediate response. - Remote database access can have poor performance for production transaction processing but is excellent for processing ad hoc queries on remote databases.

Messaging

___________: One application publishes a message to a common message channel. Other applications can read the message from the channel at a later time. The applications must agree on a channel as well as on the format of the message. used to integrate applications in a more loosely coupled, asynchronous fashion (great answer to the problems of distributed systems). Sending a message does not require both systems to be up and ready at the same time

Sharding

___________: distributes data across different databases such that each database can only manage a subset of the data. For a users database as number of users increases, more shards are added to the cluster. results in Less read and write traffic, Less replication, More cache hits. Index size is also reduced, which generally improves performance with faster queries. If one shard goes down, the other shards are still operational, although you'll want to add some form of replication to avoid data loss. Like federation, there is no single central master serializing writes, allowing you to write in parallel with increased throughput.Common ways to shard a table of users is either through the user's last name initial or the user's geographic location.

integrated

____________ applications are independent applications that can each run by themselves but that coordinate with each other in a loosely coupled way. This enables each application to focus on one comprehensive set of functionality and yet delegate to other applications for related functionality.

Kerberos

____________ is an authentication protocol that allows to identify each user, who provides a secret password, however, it does not validate to which resources or services can this user access. used in Active Directory. In this platform, Kerberos provides information about the privileges of each user, but it is responsibility of each service to determine if the user has access to its resources.

Containers

____________: Allows independent ____________ to run within a single Linux instance, avoiding the overhead of starting and maintaining virtual machines. Lower footprint Faster startup times Repeatable Better resource utilization of servers, Better integration into the whole development ecosystem Suited for Continuous Integration/Delivery lifecycle

Federation

_____________ (or functional partitioning) splits up databases by function. For example, instead of a single, monolithic database, you could have three databases: forums, users, and products. This results in less read and write traffic to each database and therefore less replication lag. Smaller databases result in more data that can fit in memory. Cache hits due to improved cache locality. With no single central master serializing writes you can write in parallel, increasing throughput.

Distributed

_____________ business processes: One of the key drivers of integration is that a single business transaction is often spread across many different systems. A previous example showed us that a simple business function such as placing an order can easily touch half a dozen systems

Application

_____________-level integration: probably the best way to integrate applications, uses the integrated application's integration frameworks and APIs

WebSocket

_____________: a communications protocol, providing full-duplex communication channels over a single TCP connection. The client establishes a connection through a handshake. This process starts with the client sending a regular HTTP request to the server. An Upgrade header is included in this request that informs the server that the client wishes to establish a _____________ connection. If the server supports the protocol, it agrees to the upgrade and communicates this through an Upgrade header in the response. Now that the handshake is complete the initial HTTP connection is replaced by a _____________ connection that uses the same underlying TCP/IP connection. At this point either party can starting sending data. With it one can transfer as much data as you like without incurring the overhead associated with traditional HTTP requests

COMMERCIAL

______________ MESSAGING SYSTEMS: -Operating systems: Microsoft Windows 2000 and Windows XP operating systems include the Microsoft Message Queuing (MSMQ) service software. -Application servers. Sun Microsystems first incorporated the Java Messaging Service (JMS) into J2EE specification. -EAI suites. Products from these vendors offer proprietary—but functionally rich—suites that encompass messaging, business process automation, workflow, portals, and other functions. -Web services toolkits - reliable message delivery over Web services (i.e., WS-Reliability, WS-ReliableMessaging

Memcached

______________ is a widely adopted in-memory key-value store. It is fast, flexible and lightweight. Its manageable design promotes fast deployment and solves many problems related to large data caches. Its APIs provide access to a very large hash table distributed across multiple machines. server is multi-threaded, meaning it makes good use of the larger instance shapes which offer multiple cores.

Authentication

______________: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.)

Middleware

______________: software that is necessary in practice to build distributed applications. Needed to integrate two applications in one or more machines. Need: - Internal Applications have changing API's - Handling business process changes: - Optimizing Processes

infrastructure

_______________ as a Service: High level API‟s to manage compute infrastructure such as servers, network, OS, systems, etc. Responsible for managing applications, runtime, OSes, middleware

middleware

_______________: Can be viewed as providing services to whoever requests them. Applications can also request services of each other, through the common infrastructure. RPC technology makes a remote procedure syntactically the same for the programmer as a local procedure call. RPC used widely in earlier _______________'s. Should provide: ease of use, location transparency, message delivery integrity, message format integrity, and language transparency. Depends on: Protocol dependency. Configuration dependency. Message format dependency. Message semantic dependencies. Session state dependency. Security dependency.

Asynchronous

________________ workflows help reduce request times for expensive operations that would otherwise be performed in-line. They can also help by doing time-consuming work in advance, such as periodic aggregation of dataCDN caching. Message queues receive, hold, and deliver messages. An application publishes a job to the queue, then notifies the user of job status. A worker picks up the job from the queue, processes it, then signals the job is complete

Microservices

__________________: Main goal is a shorter time to results and increased flexibility for development, deployment, and operations of software. Advantages: Tackles complexity; has a well-defined boundary in the form of APIs; much faster to develop, and much Easier to understand and maintain; Technologies chosen based on new services; Deployed independently; Each service to be scaled independently. Challenges: Microservice places emphasis on service size; Complexity that arises for distributed systems; Need to write code to handle partial failure; Ends up with a partitioned database architecture; Distributed transactions and eventual consistency; Testing/Debugging is also much more complex; Difficulty in implementing (later)changes that span multiple services; Deploying (overall system) more complex; Multiple instances for services need be configured, deployed, scaled, and monitored; Need to implement a service discovery mechanism; clustering solution, such as Kubernetes

enterprise

benefits of _________ software: Information sharing will be easy Save business data in a convenient and usable format Maximum reliability EliminatingRedundancies Automated Processes Agility Real-time access to business information SimplifyingIT


Ensembles d'études connexes

Exam 1 (Ch. 1-5 and Dietary Supplements)

View Set

OB: Chapter 14 Nursing Management During Labor and Birth

View Set

University Mottos with Translation

View Set

SUPPLMENTAL INFORMATION: CRA Key Things to Remember (Back 01)

View Set

PROPERTY & CASUALTY QUESTIONS GA EXAM

View Set