9
Connect Judiciously but Thoughtlessly
There are three common and potentially overlapping scenarios when connecting applications and services to each other and to fixed infrastructure services: connecting within a secure trusted network behind a DMZ (Demilitarized Zone, a perimeter network), connecting over an untrusted network, and connecting over a transitory or unstable network, whether trusted or not. Each organization involved in providing or enabling that access will have its own processes for provisioning and managing that connectivity. However, all of them serve a purpose orthogonal to the needs of an application architecture.
This chapter discusses a point of view for connectivity that begins and ends with the needs of the application ...
Get Edge Computing Patterns for Solution Architects now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.