MIS603: Comprehensive Report on Microservice Architecture
VerifiedAdded on 2022/08/21
|13
|2828
|12
Report
AI Summary
This report provides a comprehensive overview of microservice architecture. It begins with a historical perspective on computing and then delves into the seven layers of the computer, providing insights into software architecture. The report then explores various types of software architecture, including information technology, business, information, and application architectures. A significant portion is dedicated to analyzing monolithic architecture, discussing its advantages (simplicity, ease of testing and deployment) and disadvantages (complexity, difficulty in scaling, and reliability issues). The report concludes by summarizing the core concepts of software architecture and the OSI network layer. It highlights object orientation and its role in isolating changes within software systems, emphasizing the integration of processing and data into modular components.

Running head: REPORT
Micro service Architecture
Name of the Student
Name of the University
Author’s Note
Micro service Architecture
Name of the Student
Name of the University
Author’s Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1REPORT
Table of Contents
Introduction......................................................................................................................................3
History and Present Situation of Computer.....................................................................................3
7 Layers of Computer......................................................................................................................4
Software Architecture......................................................................................................................7
Types of Software Architecture.......................................................................................................7
Advantages and Disadvantages of Monolithic Architecture...........................................................9
Conclusion.....................................................................................................................................11
References......................................................................................................................................12
Table of Contents
Introduction......................................................................................................................................3
History and Present Situation of Computer.....................................................................................3
7 Layers of Computer......................................................................................................................4
Software Architecture......................................................................................................................7
Types of Software Architecture.......................................................................................................7
Advantages and Disadvantages of Monolithic Architecture...........................................................9
Conclusion.....................................................................................................................................11
References......................................................................................................................................12

2REPORT
Introduction
Computer architecture means the interconnectivity of the hardware elements of the
computer and the processing and data transfer mode. Various configurations of the computer
architecture have been developed for speeding up the components of the system by increasing
the data processing (Hwang & Jotwani, 2016). The computer architecture of the devices making
up the computer system guide the function. The computer architecture describes the logical
interface, which is targeted by the compliers and the programming languages. This report aims to
discuss the history and current situation of computer and the seven layers of the computer, which
will provide the idea of the software architecture with the layering such as SOA, TCPI, SaaS and
OSI. This report also discusses the benefits and drawbacks of the monolithic architecture.
History and Present Situation of Computer
In 19th century, the computer was designed by Charles Babbage. The basic framework of
the computer was analytical engine, which was also designed by him. After the creation of the
computer, computer are categorized into five generation (Metropolis, 2014). Every generation
had lasted for particular time and every generation had provided improved and new computer.
First generation computer was built in (1937 - 1946), which was the first electronic computer. In
the second generation (1947 - 1962), transistors were used instead of the vacuum tubes that was
more reliable. In the third generation (1963 - 1971), the integrated circuits were used in those
generation computers (Topaloglu, 2015). In the fourth generation (1971 – 1980), the computers
were based on the VLSI microprocessors. And in the fifth generation (1980 - present), the
computers are based on the ULSI microprocessors.
Introduction
Computer architecture means the interconnectivity of the hardware elements of the
computer and the processing and data transfer mode. Various configurations of the computer
architecture have been developed for speeding up the components of the system by increasing
the data processing (Hwang & Jotwani, 2016). The computer architecture of the devices making
up the computer system guide the function. The computer architecture describes the logical
interface, which is targeted by the compliers and the programming languages. This report aims to
discuss the history and current situation of computer and the seven layers of the computer, which
will provide the idea of the software architecture with the layering such as SOA, TCPI, SaaS and
OSI. This report also discusses the benefits and drawbacks of the monolithic architecture.
History and Present Situation of Computer
In 19th century, the computer was designed by Charles Babbage. The basic framework of
the computer was analytical engine, which was also designed by him. After the creation of the
computer, computer are categorized into five generation (Metropolis, 2014). Every generation
had lasted for particular time and every generation had provided improved and new computer.
First generation computer was built in (1937 - 1946), which was the first electronic computer. In
the second generation (1947 - 1962), transistors were used instead of the vacuum tubes that was
more reliable. In the third generation (1963 - 1971), the integrated circuits were used in those
generation computers (Topaloglu, 2015). In the fourth generation (1971 – 1980), the computers
were based on the VLSI microprocessors. And in the fifth generation (1980 - present), the
computers are based on the ULSI microprocessors.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3REPORT
As result, the multiple different improvements to computer development, the computers
are being used in the every aspects of the life. In the present life, the computers are being used
for analyzing the primary interest by measuring the variables, equipment the resources off
software development that includes the access to the programmers (Kulisch & Miranker, 2014).
Present day’s computer reveal the potential to the real-time computers and help in growing the
shortage of the software among the users.
7 Layers of Computer
Fig: Layers of Computer (Source: Bora et al., 2014)
Application Layer
This layer supports the process of the process of the end-user as well as the application.
In this layer, user authentication and privacy of the users are considered, the service quality is
identified and the partners of communication are also recognized (Layer, 2017). In this layer,
every aspect is application specific. For the email and file transfer as well as the services of
network software are provided in this layer. The Telnet and the FTP are the applications, which
exist in the overall application level. The architectures of the tiered application are the part of the
As result, the multiple different improvements to computer development, the computers
are being used in the every aspects of the life. In the present life, the computers are being used
for analyzing the primary interest by measuring the variables, equipment the resources off
software development that includes the access to the programmers (Kulisch & Miranker, 2014).
Present day’s computer reveal the potential to the real-time computers and help in growing the
shortage of the software among the users.
7 Layers of Computer
Fig: Layers of Computer (Source: Bora et al., 2014)
Application Layer
This layer supports the process of the process of the end-user as well as the application.
In this layer, user authentication and privacy of the users are considered, the service quality is
identified and the partners of communication are also recognized (Layer, 2017). In this layer,
every aspect is application specific. For the email and file transfer as well as the services of
network software are provided in this layer. The Telnet and the FTP are the applications, which
exist in the overall application level. The architectures of the tiered application are the part of the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4REPORT
layer. Telnet, FTP, HTTP, SNMP, WWW browsers and NFS are some example of Application
Layer.
Presentation Layer
Presentation layer gives the independence from the various types of representation of data
such as encryption of the data by translating from network to the application format (Davie &
Peterson, 2019). This layer works for transforming the data into the type, which the application
can be able in accepting. This formats of the layer and the data encryption are for being sent over
the network and provide the freedom from the affinity issues. This is considered as the syntax
layer as well. Some of the examples of the presentation layer are MIDI, JPEG, ASCII, TIFF,
GIFF, MPEG, EBCDIC, PICT and encryption.
Session Layer
Session layer abolish, creates and handles the connection among the applications. This
session layer terminates and coordinates the exchanges, conversations and dialogues among the
application at the every single end of this layer (Köksal & Tekinerdogan, 2017). Session layer
deals with the coordination session and connection session. Some of the examples of this layer
are RPC, NFS, SQL and NetBios names.
Transport Layer
The layer 4 of computer, by creating the logical paths, this layer offers the both switching
and routing technology as transmission of the data via virtual circuits. Transport layer has the
responsibility for the flow control and the error recovery of end system (Turner, 2014). This
layer ensures that the data is transferring completely. Some of the example of the transport layer
are TCP, SPX and UDP.
layer. Telnet, FTP, HTTP, SNMP, WWW browsers and NFS are some example of Application
Layer.
Presentation Layer
Presentation layer gives the independence from the various types of representation of data
such as encryption of the data by translating from network to the application format (Davie &
Peterson, 2019). This layer works for transforming the data into the type, which the application
can be able in accepting. This formats of the layer and the data encryption are for being sent over
the network and provide the freedom from the affinity issues. This is considered as the syntax
layer as well. Some of the examples of the presentation layer are MIDI, JPEG, ASCII, TIFF,
GIFF, MPEG, EBCDIC, PICT and encryption.
Session Layer
Session layer abolish, creates and handles the connection among the applications. This
session layer terminates and coordinates the exchanges, conversations and dialogues among the
application at the every single end of this layer (Köksal & Tekinerdogan, 2017). Session layer
deals with the coordination session and connection session. Some of the examples of this layer
are RPC, NFS, SQL and NetBios names.
Transport Layer
The layer 4 of computer, by creating the logical paths, this layer offers the both switching
and routing technology as transmission of the data via virtual circuits. Transport layer has the
responsibility for the flow control and the error recovery of end system (Turner, 2014). This
layer ensures that the data is transferring completely. Some of the example of the transport layer
are TCP, SPX and UDP.

5REPORT
Network Layer
Network layers provides the switching technology and routing technology by creating the
logical paths are considered as the virtual circuits to transmission of data among nodes. Routing
and forwarding are the functions of the network layer (Liu et al., 2017). Packet sequencing,
control, congestion, addressing, error management and internetworking are also the functions of
this layer. IPX, IP and AppleTalk DDP are some examples of Network layer.
Data Link Layer
Data link layer is also known as the protocol layer in the program, which manages the
transfer of the data in and out of the network’s physical link. In the OSI model of computer
architecture, data link layer is the second layer that is set for the telecommunication protocol
(Bora et al., 2014). The data bits in this layer are encoded, organization and decoded and before
the data re transferred as the frames between the adjacent nodes on the same WAN or same
LAN. This layer determines the process in which the devices recover from the issues, which can
our when the nodes try to send the frames all at once. Some of the example of data link layer are
ATM, Frame Relay, IEEE 802.3/802.2, HDLC, IEEE 802.5/802.2 and FDDI.
Physical Layer
Layer 1 of the OSI model conveys the stream of the bit, radio or light signal and electric
impulse using the network in the level of mechanical and electrical. This gives the system
hardware the means of sending as well as receiving the data on carrier, which includes the
physical aspects, cards and cable (Iskander et al., 2015). With the elements of the physical layer,
ATM and PS232 are the protocols.
Network Layer
Network layers provides the switching technology and routing technology by creating the
logical paths are considered as the virtual circuits to transmission of data among nodes. Routing
and forwarding are the functions of the network layer (Liu et al., 2017). Packet sequencing,
control, congestion, addressing, error management and internetworking are also the functions of
this layer. IPX, IP and AppleTalk DDP are some examples of Network layer.
Data Link Layer
Data link layer is also known as the protocol layer in the program, which manages the
transfer of the data in and out of the network’s physical link. In the OSI model of computer
architecture, data link layer is the second layer that is set for the telecommunication protocol
(Bora et al., 2014). The data bits in this layer are encoded, organization and decoded and before
the data re transferred as the frames between the adjacent nodes on the same WAN or same
LAN. This layer determines the process in which the devices recover from the issues, which can
our when the nodes try to send the frames all at once. Some of the example of data link layer are
ATM, Frame Relay, IEEE 802.3/802.2, HDLC, IEEE 802.5/802.2 and FDDI.
Physical Layer
Layer 1 of the OSI model conveys the stream of the bit, radio or light signal and electric
impulse using the network in the level of mechanical and electrical. This gives the system
hardware the means of sending as well as receiving the data on carrier, which includes the
physical aspects, cards and cable (Iskander et al., 2015). With the elements of the physical layer,
ATM and PS232 are the protocols.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6REPORT
Software Architecture
The software architecture of the computing system or program is the depiction of that
system, which aids to understand the process in which the system behaves. The software
architecture serves the blueprint for the project development and the system (Garlan, 2014). The
definition of the work assignment needs to be implemented by the implementation and the design
team. Software architecture is the main carrier of the qualities of the system like security,
modifiability and the performance that can be obtained with the unifying the architectural vision.
The architecture is the artifact for the initial analysis for ensuring that the approach of the design
are yielding the acceptable system. Anyone will be able in identifying the risks of the design and
mitigating the risks in the development process by busing the effective architecture.
Types of Software Architecture
The design of the software architecture considers the requirements and structure of the
system for getting the successful architecture of the system. This is very necessary for focusing
on the things that will help the users for creating the architecture. The essential features of the
architecture are:
The architecture never should try for addressing the requirements and needs of the
multiple stakeholders.
This must handle both the requirements of the quality and functions.
This must realize all the scenarios and use cases and should hide the details of the
implementation.
The types of the software architecture are as follows:
Information Technology Architecture
Software Architecture
The software architecture of the computing system or program is the depiction of that
system, which aids to understand the process in which the system behaves. The software
architecture serves the blueprint for the project development and the system (Garlan, 2014). The
definition of the work assignment needs to be implemented by the implementation and the design
team. Software architecture is the main carrier of the qualities of the system like security,
modifiability and the performance that can be obtained with the unifying the architectural vision.
The architecture is the artifact for the initial analysis for ensuring that the approach of the design
are yielding the acceptable system. Anyone will be able in identifying the risks of the design and
mitigating the risks in the development process by busing the effective architecture.
Types of Software Architecture
The design of the software architecture considers the requirements and structure of the
system for getting the successful architecture of the system. This is very necessary for focusing
on the things that will help the users for creating the architecture. The essential features of the
architecture are:
The architecture never should try for addressing the requirements and needs of the
multiple stakeholders.
This must handle both the requirements of the quality and functions.
This must realize all the scenarios and use cases and should hide the details of the
implementation.
The types of the software architecture are as follows:
Information Technology Architecture
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7REPORT
Business Architecture
Information Architecture
Application Architecture
Fig: Types of Software Architecture (Source: Created by Author)
Information Technology Architecture
This architecture discusses the building blocks of the software and hardware, which make
up the entire information system of any organization.
Business Architecture
Business architecture describes the strategies of the key process of the business,
organization and the governance within an organization (Sommerville et al., 2019). This
architecture focuses on the design and analysis of the business process.
Information Architecture
This architecture defines data management of the resources and the resources of the
physical and logical data assets.
T y p e s o f S o ft w a r e A r c h it e c t u r e
Information Technology
Architecture
Business Architecture
Information
Architecture
Application Architecture
Business Architecture
Information Architecture
Application Architecture
Fig: Types of Software Architecture (Source: Created by Author)
Information Technology Architecture
This architecture discusses the building blocks of the software and hardware, which make
up the entire information system of any organization.
Business Architecture
Business architecture describes the strategies of the key process of the business,
organization and the governance within an organization (Sommerville et al., 2019). This
architecture focuses on the design and analysis of the business process.
Information Architecture
This architecture defines data management of the resources and the resources of the
physical and logical data assets.
T y p e s o f S o ft w a r e A r c h it e c t u r e
Information Technology
Architecture
Business Architecture
Information
Architecture
Application Architecture

8REPORT
Application Architecture
This architecture serves the blueprint of the each application system and the relationship
as well as interaction to any organization’s business process (Lagerström et al., 2014).
Advantages and Disadvantages of Monolithic Architecture
The monolithic architecture is a traditional model for designing the software program.
Monolithic means the composed all the aspects in single piece. This architecture is designed for
being self-contained and the components of this program are interdependent and interconnected
than the loosely couples in this case with the software program.in the architecture that is tightly
couples, the components and the associated components should be presented for the coding to be
complied or executed (Namiot & Sneps-Sneppe, 2014). The monolithic architecture is the
cohesive unit of the code, whose elements are designed for working together and sharing the
resources and memories. There are multiple benefits of the monolithic architecture and
drawbacks as well. This architecture have the better throughput than the advance approaches like
the MSA (Microservice Architecture) and the architecture can be easier for debugging and
testing as less components than the variables.
Benefits of Monolithic Architecture
Simple in developing
Simple for testing. For instance, the user will be able to implement the end-to-end testing
by launching testing and the application of UI with the Selenium.
Deploying is very simple. The user only needs to copy the packaged application to the
server.
Simple for scaling by running several copies behind the load balancer.
Application Architecture
This architecture serves the blueprint of the each application system and the relationship
as well as interaction to any organization’s business process (Lagerström et al., 2014).
Advantages and Disadvantages of Monolithic Architecture
The monolithic architecture is a traditional model for designing the software program.
Monolithic means the composed all the aspects in single piece. This architecture is designed for
being self-contained and the components of this program are interdependent and interconnected
than the loosely couples in this case with the software program.in the architecture that is tightly
couples, the components and the associated components should be presented for the coding to be
complied or executed (Namiot & Sneps-Sneppe, 2014). The monolithic architecture is the
cohesive unit of the code, whose elements are designed for working together and sharing the
resources and memories. There are multiple benefits of the monolithic architecture and
drawbacks as well. This architecture have the better throughput than the advance approaches like
the MSA (Microservice Architecture) and the architecture can be easier for debugging and
testing as less components than the variables.
Benefits of Monolithic Architecture
Simple in developing
Simple for testing. For instance, the user will be able to implement the end-to-end testing
by launching testing and the application of UI with the Selenium.
Deploying is very simple. The user only needs to copy the packaged application to the
server.
Simple for scaling by running several copies behind the load balancer.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9REPORT
The key benefits of this monolithic architecture is that thee application have the huge
number of the cross-cutting issues like rate limiting and logging and have security
features like DOS protection and audit trails (Namiot & Sneps-Sneppe, 2014).
When the system is running using the same application, this is very simple in hooking up
the components to the cross cutting issues.
The performance benefits can also be there as the access of the shared memory is faster
than the IPC (Inter Process Communication).
Drawbacks of Monolithic Architecture
This is the simple approach, which has the limitation in complexity and size.
The applications are very complex and large for understanding completely and making
changes correctly and fast.
The application size can make the startup time very slow.
The user should redeploy the overall application on every update.
The effect of the change is not very well in understanding that leads to the manual testing
to the extensive level.
The continuous deployment of this architecture if very difficult.
The monolithic architecture can be difficult for scaling while the various modules have
the conflicting requirements of the resources.
The other problems with the monolithic application is the reliability. Thee bug in the
module such as memory lock can bring down the overall process of the monolithic
architecture (Dmitry & Manfred, 2014). As all the examples of this application are
identical, the bug will affect the availability of the overall application.
The key benefits of this monolithic architecture is that thee application have the huge
number of the cross-cutting issues like rate limiting and logging and have security
features like DOS protection and audit trails (Namiot & Sneps-Sneppe, 2014).
When the system is running using the same application, this is very simple in hooking up
the components to the cross cutting issues.
The performance benefits can also be there as the access of the shared memory is faster
than the IPC (Inter Process Communication).
Drawbacks of Monolithic Architecture
This is the simple approach, which has the limitation in complexity and size.
The applications are very complex and large for understanding completely and making
changes correctly and fast.
The application size can make the startup time very slow.
The user should redeploy the overall application on every update.
The effect of the change is not very well in understanding that leads to the manual testing
to the extensive level.
The continuous deployment of this architecture if very difficult.
The monolithic architecture can be difficult for scaling while the various modules have
the conflicting requirements of the resources.
The other problems with the monolithic application is the reliability. Thee bug in the
module such as memory lock can bring down the overall process of the monolithic
architecture (Dmitry & Manfred, 2014). As all the examples of this application are
identical, the bug will affect the availability of the overall application.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10REPORT
The monolithic applications have the obstacle for adopting the new technologies. As the
changes in the languages or the framework will impact the overall application and this
will be very expensive in cost and time.
The services of monolithic architecture tend to get the entangled and tightly couples
because the application evolves and makes this difficult for isolating the services for code
maintainability or independent scaling.
This architecture is difficult for understanding because of the side-effects, dependencies
and the magic that are not obvious while any user looks at the specific controller or
service.
Conclusion
This paper has discussed about the basic concept of the software architecture and the OSI
network layer. This paper discussed the object orientation for isolating the changes in the
software systems by combining the processing and data into the modules of the system. There
are advantages in the computer layers as the layers provides multiple features in the computer
system for the networking. This paper successfully identified the advantages and disadvantages
of the monolithic architecture as the architecture is designed for being self-contained and the
components of this program are interdependent and interconnected. This report presented the
overall concept of the computer technology and its application in the system, which will be very
beneficial for the users.
The monolithic applications have the obstacle for adopting the new technologies. As the
changes in the languages or the framework will impact the overall application and this
will be very expensive in cost and time.
The services of monolithic architecture tend to get the entangled and tightly couples
because the application evolves and makes this difficult for isolating the services for code
maintainability or independent scaling.
This architecture is difficult for understanding because of the side-effects, dependencies
and the magic that are not obvious while any user looks at the specific controller or
service.
Conclusion
This paper has discussed about the basic concept of the software architecture and the OSI
network layer. This paper discussed the object orientation for isolating the changes in the
software systems by combining the processing and data into the modules of the system. There
are advantages in the computer layers as the layers provides multiple features in the computer
system for the networking. This paper successfully identified the advantages and disadvantages
of the monolithic architecture as the architecture is designed for being self-contained and the
components of this program are interdependent and interconnected. This report presented the
overall concept of the computer technology and its application in the system, which will be very
beneficial for the users.

11REPORT
References
Bora, G., Bora, S., Singh, S., & Arsalan, S. M. (2014). OSI reference model: An
overview. International Journal of Computer Trends and Technology (IJCTT), 7(4), 214-
218.
Davie, B. S., & Peterson, L. L. (2019). Computer networks. Morgan kaufmann.
Dmitry, N., & Manfred, S. S. (2014). On micro-services architecture. International Journal of
Open Information Technologies, 2(9).
Garlan, D. (2014). Software architecture: a travelogue. In Proceedings of the on Future of
Software Engineering (pp. 29-39).
Hwang, K., & Jotwani, N. (2016). Advanced computer architecture, 3e. McGraw-Hill Education.
Iskander, M. F., Yun, Z., Qazi, F. A., Sasaki, G., & Das, A. (2016, November). Physical layer
based approach for advanced directional networking. In MILCOM 2016-2016 IEEE
Military Communications Conference (pp. 424-429). IEEE.
Köksal, Ö., & Tekinerdogan, B. (2017, June). Feature-driven domain analysis of session layer
protocols of internet of things. In 2017 IEEE International Congress on Internet of
Things (ICIOT) (pp. 105-112). IEEE.
Kulisch, U. W., & Miranker, W. L. (2014). Computer arithmetic in theory and practice.
Academic press.
Lagerström, R., Baldwin, C., MacCormack, A., & Aier, S. (2014, January). Visualizing and
measuring enterprise application architecture: an exploratory telecom case. In 2014 47th
Hawaii International Conference on System Sciences (pp. 3847-3856). IEEE.
References
Bora, G., Bora, S., Singh, S., & Arsalan, S. M. (2014). OSI reference model: An
overview. International Journal of Computer Trends and Technology (IJCTT), 7(4), 214-
218.
Davie, B. S., & Peterson, L. L. (2019). Computer networks. Morgan kaufmann.
Dmitry, N., & Manfred, S. S. (2014). On micro-services architecture. International Journal of
Open Information Technologies, 2(9).
Garlan, D. (2014). Software architecture: a travelogue. In Proceedings of the on Future of
Software Engineering (pp. 29-39).
Hwang, K., & Jotwani, N. (2016). Advanced computer architecture, 3e. McGraw-Hill Education.
Iskander, M. F., Yun, Z., Qazi, F. A., Sasaki, G., & Das, A. (2016, November). Physical layer
based approach for advanced directional networking. In MILCOM 2016-2016 IEEE
Military Communications Conference (pp. 424-429). IEEE.
Köksal, Ö., & Tekinerdogan, B. (2017, June). Feature-driven domain analysis of session layer
protocols of internet of things. In 2017 IEEE International Congress on Internet of
Things (ICIOT) (pp. 105-112). IEEE.
Kulisch, U. W., & Miranker, W. L. (2014). Computer arithmetic in theory and practice.
Academic press.
Lagerström, R., Baldwin, C., MacCormack, A., & Aier, S. (2014, January). Visualizing and
measuring enterprise application architecture: an exploratory telecom case. In 2014 47th
Hawaii International Conference on System Sciences (pp. 3847-3856). IEEE.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.