SlideShare ist ein Scribd-Unternehmen logo
1 von 22
WEB SERVICES
ADVANCED WEB TECHNOLOGY
MODULE 3
DIVYA TIWARI
MEIT
TERNA ENGINEERING COLLEGE
INDEX
• Introduction of Web Services
• Extensible Markup Language (XML)
• Web Service Description Language (WSDL)
• Simple Object Access Protocol (SOAP)
• Universal Description, Discovery, and Integration (UDDI)
• Transactions
• Business Process Execution Language for Web Services
• WS-Security and Web Services Security specifications
• WS-Reliable Messaging
• WS-Policy
• WS-Attachments
• REST-ful web services
• Comparison of REST and SOAP
Introduction of Web Services
• Web services are self-contained, modular, distributed, dynamic applications that can be
described, published, located, or invoked over the network to create products, processes,
and supply chains.
• These applications can be local, distributed, or web-based. Web services are built on top
of open standards such as TCP/IP, HTTP, Java, HTML, and XML.
web service is, therefore, any service that −
• Is available over the Internet or private (intranet) networks
• Uses a standardized XML messaging system
• Is not tied to any one operating system or programming language
• Is self-describing via a common XML grammar
• Is discoverable via a simple find mechanism
Extensible Markup Language (XML)
XML is a simple tag-based language for describing information in a structured way.
Basic elements:
• Tags
• Attributes
• Text
Web Service Description Language
(WSDL)
• Web Service Description Language is a document written in XML, which contains the
description of Web services.
• It specifies the location of the service and the methods the service exposes.
• WSDL describes the services as a collection of communication endpoints capable of
exchanging messages.
• A WSDL document consists of the following six elements:
• Definition
• Data type
• Message
• Port type
• Binding
• Service
Simple Object Access Protocol (SOAP)
• SOAP is a technology to support the exchange of XML-coded messages over a
transport protocol, such as HTTP and SMTP. (wire stack)
• A SOAP message is a simple well-structured XML document, which always contains a
mandatory envelope and Body element.
• It can also contain a few optional elements, such as the Header element, which contains
the application-specific information, and the fault element, which contains the error and
status of the messages.
• The SOAP message inherits all features of XML, such as platform independence and self
documenting format.
• Elements of SOAP message are:
• Envelope
• Header
• Body
• Fault
Universal Description, Discovery, and
Integration (UDDI)
• UDDI refers to a centralized directory where the Web services offered by different
organizations are published.
• UDDI stores information about Web services and communicates with those Web services
using SOAP.
• UDDI also defines how to enable transactions between customers and reach new
customers.
• UDDI Application Programming Interface (API) has the get_businessDetail() method to
retrieve the details of a business. This method is redundant and can be removed from
API.
• UDDI has many get_methods that work on data objects, such as business services. These
data objects can be represented by XML documents.
• When a business changes its information, it registers that change in UDDI. In addition to
the get_businessDetail() method, other methods of UDDI can also be removed from the
UDDI API.
• These methods are the delete_business() method that is used to remove a business, the
save_business() method that is used to upload new businesses, and the find_business()
method that is used to search a particular business.
• All methods in UDDI API can be implemented by HTTP-based URIs. This produces
another type of architecture for representing Web services of businesses, called REST.
Transactions
• Transaction context management resides in the WS-Coordination (WS-C) (Microsoft,
BEA, IBM,`Web Service Coodination’, 2005), WSAtomicTransaction (WS-AT)
(Microsoft, BEA, IBM, `Web Service Atomic Transaction’, 2005) and WS-
BusinessActivity (WS-BA) (Microsoft, BEA, IBM,`Web Service Business Activity’,
2005) specifications.
• WS-C defines a coordination context, which represents an instance of coordinated
effort, allowing participant services to share a common view.
• WS-AT targets existing transactional systems with short interactions and full ACID
properties.
• WS-BA, on the other hand, is intended for applications involved in business processes
of long duration, whose relaxed properties increase concurrency and suit a wider range
of applications.
• Neither the Web services architecture nor any specifications prescribe explicit ways to
implement transactional capabilities, although it is clear that delivering such features
should minimally impact existing applications.
• Some propose approaching the problem of transaction monitoring and support by means
of intermediary (proxy) services (Mikalsen, 2002), while others by providing a
lightweight programming interface requiring minimal application code changes
(Vasquez, Miller, Verma, & Sheth, 2005). Whichever the case, protocol-specific
messages should also be embedded in exchanged messages and propagated though all
participants.
Business Process Execution Language for
Web Services
• Business Process Execution Language (BPEL) defines a notation for specifying
business process behavior based on Web Services.
• Business processes can be described in two ways:
• Executable business processes model actual behavior of a participant in a business
interaction.
• Business protocols, in contrast, use process descriptions that specify the mutually
visible message exchange behavior of each of the parties involved in the protocol,
without revealing their internal behavior. The process descriptions for business
protocols are called abstract processes.
• BPEL is used to model the behavior of both executable and abstract processes. The
scope includes:
• Sequencing of process activities, especially Web Service interactions
• Correlation of messages and process instances
• Recovery behavior in case of failures and exceptional conditions
• Bilateral Web Service based relationships between process roles
WS-Security and Web Services Security
specifications
• The WS-Security specification provides a framework and vocabulary for requesters and
providers to secure messaging as well as communicate information regarding security
and privacy.
• There are other security related specifications like:
• XML-Encryption specifies the process of encrypting data and messages.
• XML-Signature provides a mechanism for messages integrity and authentication,
and signer authentication.
• XACML (Extensible Access Control Markup Language) is an XML representation
of the Role-Based Access Control standard (RBAC). XACML plays an important
function in Web services authorization.
• Security Assertion Markup Language, or SAML, is an OASIS framework for
conveying user authentication and attribute information through XML assertions.
WS-Reliable Messaging
• Communication over a public network such as the Internet imposes physical limitations
to the reliability of exchanged messages.
• Even though failures are inevitable and unpredictable, certain techniques increase
message reliability and traceability even in the worst cases.
• At a minimum, senders are interested in determining whether the message has been
received by the partner, that it was received exactly once and in the correct order.
• It is necessary to determine the validity of the received message:
• Has the message been altered on its way to the receiver?
• Does it conform to standard formats?
• Does it agree with the business rules expected by the receiver?
• WS-Reliability and WS-Reliable Messaging have rules that dictate how and when
services must respond to other services concerning the receipt of a message and its
validity.
Messaging model
WS-Policy
• WS-Policy is a specification of a framework for defining the requirements and
capabilities of a service.
• In short, a policy is a set of assertions that express the capabilities and requirements of a
service.
• The specification WS-Policy (http://www128.ibm.com/developerworks/library/
specification/ws-polfram/) defines terms that can be used to organize a policy.
• Once a provider has a policy defined in XML, then he must publish that information by
referencing it in the description of the service.
WS-Attachments
• It is a method for attaching a policy to a WSDL file so that it can be published to the
UDDI and thus used in deciding on services.
• There are several mechanisms defined for accomplishing this task.
• The simplest method is to write the policy directly into the WSDL file.
• A more complex, and more powerful method is to construct the policy as a stand alone
file that is referenced in the WSDL file as a URI.
• WS-Policy and WS-PolicyAttachment together give us hierarchy based on to which
element the policy is attached and direction for merging policies together to create an
effective policy for an element (WS-PolicyAttachment, 2005).
REST-ful web services
• REST stands for Representational State Transfer. REST is an architectural style not a
protocol.
Advantages of RESTful Web Services:
• Fast: RESTful Web Services are fast because there is no strict specification like SOAP.
It consumes less bandwidth and resource.
• Language and Platform independent: RESTful web services can be written in any
programming language and executed in any platform.
• Can use SOAP: RESTful web services can use SOAP web services as the
implementation.
• Permits different data format: RESTful web service permits different data format
such as Plain Text, HTML, XML and JSON.
Comparison of REST and SOAP
MU Exam Questions
May 2017
• Describe SOAP protocol and message structure briefly. 10 marks
Dec 2018
• Describe SOAP protocol and message structure briefly. 10 marks
May 2019
• Explain in detail WS-Reliable Messaging. 10 marks
• SN: SOAP. 5 marks
• SN: REST-ful web services. 5 marks
Web services

Weitere ähnliche Inhalte

Was ist angesagt?

Web api開発をするなら ドキュメントは自動生成にしておこう__ph_per_kaigi2021_
Web api開発をするなら ドキュメントは自動生成にしておこう__ph_per_kaigi2021_Web api開発をするなら ドキュメントは自動生成にしておこう__ph_per_kaigi2021_
Web api開発をするなら ドキュメントは自動生成にしておこう__ph_per_kaigi2021_Akito Tsukahara
 
20180509 AWS Black Belt Online Seminar Amazon GuardDuty
20180509 AWS Black Belt Online Seminar Amazon GuardDuty20180509 AWS Black Belt Online Seminar Amazon GuardDuty
20180509 AWS Black Belt Online Seminar Amazon GuardDutyAmazon Web Services Japan
 
AWS Global Infrastructure Foundations
AWS Global Infrastructure Foundations AWS Global Infrastructure Foundations
AWS Global Infrastructure Foundations Amazon Web Services
 
Using Performance Insights to Optimize Database Performance (DAT402) - AWS re...
Using Performance Insights to Optimize Database Performance (DAT402) - AWS re...Using Performance Insights to Optimize Database Performance (DAT402) - AWS re...
Using Performance Insights to Optimize Database Performance (DAT402) - AWS re...Amazon Web Services
 
[AKIBA.AWS] VPCをネットワーク図で理解してみる
[AKIBA.AWS] VPCをネットワーク図で理解してみる[AKIBA.AWS] VPCをネットワーク図で理解してみる
[AKIBA.AWS] VPCをネットワーク図で理解してみるShuji Kikuchi
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingAmazon Web Services
 
AWS basics
AWS basicsAWS basics
AWS basicsmbaric
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGTanmoy Barman
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentityFredBrandonAuthorMCP
 
[AWSマイスターシリーズ] AWS SDK for PHP / Ruby / boto(Python) / JavaScript in Node.js
[AWSマイスターシリーズ] AWS SDK for PHP / Ruby / boto(Python) / JavaScript in Node.js[AWSマイスターシリーズ] AWS SDK for PHP / Ruby / boto(Python) / JavaScript in Node.js
[AWSマイスターシリーズ] AWS SDK for PHP / Ruby / boto(Python) / JavaScript in Node.jsAmazon Web Services Japan
 
他社製品と比較した際のAuth0のいいところ
他社製品と比較した際のAuth0のいいところ他社製品と比較した際のAuth0のいいところ
他社製品と比較した際のAuth0のいいところSatoshi Takayanagi
 
48. Azure Active Directory - Part 1
48. Azure Active Directory - Part 148. Azure Active Directory - Part 1
48. Azure Active Directory - Part 1Shawn Ismail
 
アジャイル開発のストーリーをGherkin記法で作成
アジャイル開発のストーリーをGherkin記法で作成アジャイル開発のストーリーをGherkin記法で作成
アジャイル開発のストーリーをGherkin記法で作成Shinya Nakajima
 
AWS Black Belt Techシリーズ Amazon WorkDocs / Amazon WorkMail
AWS Black Belt Techシリーズ Amazon WorkDocs / Amazon WorkMailAWS Black Belt Techシリーズ Amazon WorkDocs / Amazon WorkMail
AWS Black Belt Techシリーズ Amazon WorkDocs / Amazon WorkMailAmazon Web Services Japan
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing CloudSyntrix
 
Cloud computing information management
Cloud computing   information managementCloud computing   information management
Cloud computing information managementHallmark B-school
 
Aws organizations
Aws organizationsAws organizations
Aws organizationsOlaf Conijn
 

Was ist angesagt? (20)

Web api開発をするなら ドキュメントは自動生成にしておこう__ph_per_kaigi2021_
Web api開発をするなら ドキュメントは自動生成にしておこう__ph_per_kaigi2021_Web api開発をするなら ドキュメントは自動生成にしておこう__ph_per_kaigi2021_
Web api開発をするなら ドキュメントは自動生成にしておこう__ph_per_kaigi2021_
 
20180509 AWS Black Belt Online Seminar Amazon GuardDuty
20180509 AWS Black Belt Online Seminar Amazon GuardDuty20180509 AWS Black Belt Online Seminar Amazon GuardDuty
20180509 AWS Black Belt Online Seminar Amazon GuardDuty
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
 
AWS Global Infrastructure Foundations
AWS Global Infrastructure Foundations AWS Global Infrastructure Foundations
AWS Global Infrastructure Foundations
 
Using Performance Insights to Optimize Database Performance (DAT402) - AWS re...
Using Performance Insights to Optimize Database Performance (DAT402) - AWS re...Using Performance Insights to Optimize Database Performance (DAT402) - AWS re...
Using Performance Insights to Optimize Database Performance (DAT402) - AWS re...
 
[AKIBA.AWS] VPCをネットワーク図で理解してみる
[AKIBA.AWS] VPCをネットワーク図で理解してみる[AKIBA.AWS] VPCをネットワーク図で理解してみる
[AKIBA.AWS] VPCをネットワーク図で理解してみる
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud Computing
 
AWS basics
AWS basicsAWS basics
AWS basics
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and Identity
 
[AWSマイスターシリーズ] AWS SDK for PHP / Ruby / boto(Python) / JavaScript in Node.js
[AWSマイスターシリーズ] AWS SDK for PHP / Ruby / boto(Python) / JavaScript in Node.js[AWSマイスターシリーズ] AWS SDK for PHP / Ruby / boto(Python) / JavaScript in Node.js
[AWSマイスターシリーズ] AWS SDK for PHP / Ruby / boto(Python) / JavaScript in Node.js
 
他社製品と比較した際のAuth0のいいところ
他社製品と比較した際のAuth0のいいところ他社製品と比較した際のAuth0のいいところ
他社製品と比較した際のAuth0のいいところ
 
Aws
AwsAws
Aws
 
48. Azure Active Directory - Part 1
48. Azure Active Directory - Part 148. Azure Active Directory - Part 1
48. Azure Active Directory - Part 1
 
アジャイル開発のストーリーをGherkin記法で作成
アジャイル開発のストーリーをGherkin記法で作成アジャイル開発のストーリーをGherkin記法で作成
アジャイル開発のストーリーをGherkin記法で作成
 
AWS Black Belt Techシリーズ Amazon WorkDocs / Amazon WorkMail
AWS Black Belt Techシリーズ Amazon WorkDocs / Amazon WorkMailAWS Black Belt Techシリーズ Amazon WorkDocs / Amazon WorkMail
AWS Black Belt Techシリーズ Amazon WorkDocs / Amazon WorkMail
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud computing information management
Cloud computing   information managementCloud computing   information management
Cloud computing information management
 
Aws organizations
Aws organizationsAws organizations
Aws organizations
 

Ähnlich wie Web services

SOA standards
SOA standardsSOA standards
SOA standardsKumar
 
Applying xml
Applying xmlApplying xml
Applying xmlKumar
 
Week2 cloud computing week2
Week2 cloud computing week2Week2 cloud computing week2
Week2 cloud computing week2Ankit Gupta
 
nptl cc video.pptx
nptl cc video.pptxnptl cc video.pptx
nptl cc video.pptxMunmunSaha7
 
Web service implementation
Web service implementationWeb service implementation
Web service implementationYatindra Sahu
 
Unit-5_2 PPT on Distributed Web based System.pdf
Unit-5_2 PPT on Distributed Web based System.pdfUnit-5_2 PPT on Distributed Web based System.pdf
Unit-5_2 PPT on Distributed Web based System.pdframeshwarchintamani
 
Introduction to SOAP/WSDL Web Services and RESTful Web Services
Introduction to SOAP/WSDL Web Services and RESTful Web ServicesIntroduction to SOAP/WSDL Web Services and RESTful Web Services
Introduction to SOAP/WSDL Web Services and RESTful Web Servicesecosio GmbH
 
SOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdf
SOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdf
SOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdfNKannanCSE
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and developmentishmecse13
 
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...ecosio GmbH
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented ArchitectureMohamed Zaytoun
 
SOA - Unit 1 - Introduction to SOA with Web Services
SOA - Unit   1 - Introduction to SOA with Web ServicesSOA - Unit   1 - Introduction to SOA with Web Services
SOA - Unit 1 - Introduction to SOA with Web Serviceshamsa nandhini
 

Ähnlich wie Web services (20)

WSstandards.ppt
WSstandards.pptWSstandards.ppt
WSstandards.ppt
 
SOA standards
SOA standardsSOA standards
SOA standards
 
Applying xml
Applying xmlApplying xml
Applying xml
 
Week2 cloud computing week2
Week2 cloud computing week2Week2 cloud computing week2
Week2 cloud computing week2
 
nptl cc video.pptx
nptl cc video.pptxnptl cc video.pptx
nptl cc video.pptx
 
Unit iii soa
Unit iii soaUnit iii soa
Unit iii soa
 
Web service implementation
Web service implementationWeb service implementation
Web service implementation
 
Unit-5_2 PPT on Distributed Web based System.pdf
Unit-5_2 PPT on Distributed Web based System.pdfUnit-5_2 PPT on Distributed Web based System.pdf
Unit-5_2 PPT on Distributed Web based System.pdf
 
Introduction to SOAP/WSDL Web Services and RESTful Web Services
Introduction to SOAP/WSDL Web Services and RESTful Web ServicesIntroduction to SOAP/WSDL Web Services and RESTful Web Services
Introduction to SOAP/WSDL Web Services and RESTful Web Services
 
Wt unit 6 ppts web services
Wt unit 6 ppts web servicesWt unit 6 ppts web services
Wt unit 6 ppts web services
 
Java web services
Java web servicesJava web services
Java web services
 
Xml.ppt
Xml.pptXml.ppt
Xml.ppt
 
SOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdf
SOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdf
SOA UNIT-IV.pdfSOA UNIT-IV.pdfSOA UNIT-IV.pdf
 
Web service
Web serviceWeb service
Web service
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and development
 
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
 
Soa
SoaSoa
Soa
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
 
Mini-Training: Let's have a rest
Mini-Training: Let's have a restMini-Training: Let's have a rest
Mini-Training: Let's have a rest
 
SOA - Unit 1 - Introduction to SOA with Web Services
SOA - Unit   1 - Introduction to SOA with Web ServicesSOA - Unit   1 - Introduction to SOA with Web Services
SOA - Unit 1 - Introduction to SOA with Web Services
 

Mehr von Divya Tiwari

Digital stick by Divya & Kanti
Digital stick by Divya & KantiDigital stick by Divya & Kanti
Digital stick by Divya & KantiDivya Tiwari
 
Predicting house price
Predicting house pricePredicting house price
Predicting house priceDivya Tiwari
 
Testing strategies -2
Testing strategies -2Testing strategies -2
Testing strategies -2Divya Tiwari
 
Testing strategies part -1
Testing strategies part -1Testing strategies part -1
Testing strategies part -1Divya Tiwari
 
Performance measures
Performance measuresPerformance measures
Performance measuresDivya Tiwari
 
Programming using MPI and OpenMP
Programming using MPI and OpenMPProgramming using MPI and OpenMP
Programming using MPI and OpenMPDivya Tiwari
 
IoT applications and use cases part-2
IoT applications and use cases part-2IoT applications and use cases part-2
IoT applications and use cases part-2Divya Tiwari
 
Io t applications and use cases part-1
Io t applications and use cases part-1Io t applications and use cases part-1
Io t applications and use cases part-1Divya Tiwari
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Responsive web design with html5 and css3
Responsive web design with html5 and css3Responsive web design with html5 and css3
Responsive web design with html5 and css3Divya Tiwari
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 

Mehr von Divya Tiwari (13)

Digital stick by Divya & Kanti
Digital stick by Divya & KantiDigital stick by Divya & Kanti
Digital stick by Divya & Kanti
 
Predicting house price
Predicting house pricePredicting house price
Predicting house price
 
Testing strategies -2
Testing strategies -2Testing strategies -2
Testing strategies -2
 
Testing strategies part -1
Testing strategies part -1Testing strategies part -1
Testing strategies part -1
 
Performance measures
Performance measuresPerformance measures
Performance measures
 
Programming using MPI and OpenMP
Programming using MPI and OpenMPProgramming using MPI and OpenMP
Programming using MPI and OpenMP
 
IoT applications and use cases part-2
IoT applications and use cases part-2IoT applications and use cases part-2
IoT applications and use cases part-2
 
Io t applications and use cases part-1
Io t applications and use cases part-1Io t applications and use cases part-1
Io t applications and use cases part-1
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Responsive web design with html5 and css3
Responsive web design with html5 and css3Responsive web design with html5 and css3
Responsive web design with html5 and css3
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 

Kürzlich hochgeladen

Circuit Breaker arc phenomenon.pdf engineering
Circuit Breaker arc phenomenon.pdf engineeringCircuit Breaker arc phenomenon.pdf engineering
Circuit Breaker arc phenomenon.pdf engineeringKanchhaTamang
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineJulioCesarSalazarHer1
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoninghotman30312
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Lovely Professional University
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfJNTUA
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...MohammadAliNayeem
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdfKamal Acharya
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...ShivamTiwari995432
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor banktawat puangthong
 
How to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdfHow to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdftawat puangthong
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoAbhimanyu Sangale
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)NareenAsad
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...Roi Lipman
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualBalamuruganV28
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..MaherOthman7
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 

Kürzlich hochgeladen (20)

Circuit Breaker arc phenomenon.pdf engineering
Circuit Breaker arc phenomenon.pdf engineeringCircuit Breaker arc phenomenon.pdf engineering
Circuit Breaker arc phenomenon.pdf engineering
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoning
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor bank
 
How to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdfHow to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdf
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of Arduino
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 

Web services

  • 1. WEB SERVICES ADVANCED WEB TECHNOLOGY MODULE 3 DIVYA TIWARI MEIT TERNA ENGINEERING COLLEGE
  • 2. INDEX • Introduction of Web Services • Extensible Markup Language (XML) • Web Service Description Language (WSDL) • Simple Object Access Protocol (SOAP) • Universal Description, Discovery, and Integration (UDDI) • Transactions • Business Process Execution Language for Web Services • WS-Security and Web Services Security specifications • WS-Reliable Messaging • WS-Policy • WS-Attachments • REST-ful web services • Comparison of REST and SOAP
  • 3. Introduction of Web Services • Web services are self-contained, modular, distributed, dynamic applications that can be described, published, located, or invoked over the network to create products, processes, and supply chains. • These applications can be local, distributed, or web-based. Web services are built on top of open standards such as TCP/IP, HTTP, Java, HTML, and XML. web service is, therefore, any service that − • Is available over the Internet or private (intranet) networks • Uses a standardized XML messaging system • Is not tied to any one operating system or programming language • Is self-describing via a common XML grammar • Is discoverable via a simple find mechanism
  • 4. Extensible Markup Language (XML) XML is a simple tag-based language for describing information in a structured way. Basic elements: • Tags • Attributes • Text
  • 5. Web Service Description Language (WSDL) • Web Service Description Language is a document written in XML, which contains the description of Web services. • It specifies the location of the service and the methods the service exposes. • WSDL describes the services as a collection of communication endpoints capable of exchanging messages. • A WSDL document consists of the following six elements: • Definition • Data type • Message • Port type • Binding • Service
  • 6. Simple Object Access Protocol (SOAP) • SOAP is a technology to support the exchange of XML-coded messages over a transport protocol, such as HTTP and SMTP. (wire stack)
  • 7. • A SOAP message is a simple well-structured XML document, which always contains a mandatory envelope and Body element. • It can also contain a few optional elements, such as the Header element, which contains the application-specific information, and the fault element, which contains the error and status of the messages. • The SOAP message inherits all features of XML, such as platform independence and self documenting format. • Elements of SOAP message are: • Envelope • Header • Body • Fault
  • 8. Universal Description, Discovery, and Integration (UDDI) • UDDI refers to a centralized directory where the Web services offered by different organizations are published. • UDDI stores information about Web services and communicates with those Web services using SOAP. • UDDI also defines how to enable transactions between customers and reach new customers. • UDDI Application Programming Interface (API) has the get_businessDetail() method to retrieve the details of a business. This method is redundant and can be removed from API. • UDDI has many get_methods that work on data objects, such as business services. These data objects can be represented by XML documents.
  • 9. • When a business changes its information, it registers that change in UDDI. In addition to the get_businessDetail() method, other methods of UDDI can also be removed from the UDDI API. • These methods are the delete_business() method that is used to remove a business, the save_business() method that is used to upload new businesses, and the find_business() method that is used to search a particular business. • All methods in UDDI API can be implemented by HTTP-based URIs. This produces another type of architecture for representing Web services of businesses, called REST.
  • 10. Transactions • Transaction context management resides in the WS-Coordination (WS-C) (Microsoft, BEA, IBM,`Web Service Coodination’, 2005), WSAtomicTransaction (WS-AT) (Microsoft, BEA, IBM, `Web Service Atomic Transaction’, 2005) and WS- BusinessActivity (WS-BA) (Microsoft, BEA, IBM,`Web Service Business Activity’, 2005) specifications. • WS-C defines a coordination context, which represents an instance of coordinated effort, allowing participant services to share a common view. • WS-AT targets existing transactional systems with short interactions and full ACID properties. • WS-BA, on the other hand, is intended for applications involved in business processes of long duration, whose relaxed properties increase concurrency and suit a wider range of applications.
  • 11. • Neither the Web services architecture nor any specifications prescribe explicit ways to implement transactional capabilities, although it is clear that delivering such features should minimally impact existing applications. • Some propose approaching the problem of transaction monitoring and support by means of intermediary (proxy) services (Mikalsen, 2002), while others by providing a lightweight programming interface requiring minimal application code changes (Vasquez, Miller, Verma, & Sheth, 2005). Whichever the case, protocol-specific messages should also be embedded in exchanged messages and propagated though all participants.
  • 12. Business Process Execution Language for Web Services • Business Process Execution Language (BPEL) defines a notation for specifying business process behavior based on Web Services. • Business processes can be described in two ways: • Executable business processes model actual behavior of a participant in a business interaction. • Business protocols, in contrast, use process descriptions that specify the mutually visible message exchange behavior of each of the parties involved in the protocol, without revealing their internal behavior. The process descriptions for business protocols are called abstract processes.
  • 13. • BPEL is used to model the behavior of both executable and abstract processes. The scope includes: • Sequencing of process activities, especially Web Service interactions • Correlation of messages and process instances • Recovery behavior in case of failures and exceptional conditions • Bilateral Web Service based relationships between process roles
  • 14. WS-Security and Web Services Security specifications • The WS-Security specification provides a framework and vocabulary for requesters and providers to secure messaging as well as communicate information regarding security and privacy. • There are other security related specifications like: • XML-Encryption specifies the process of encrypting data and messages. • XML-Signature provides a mechanism for messages integrity and authentication, and signer authentication. • XACML (Extensible Access Control Markup Language) is an XML representation of the Role-Based Access Control standard (RBAC). XACML plays an important function in Web services authorization. • Security Assertion Markup Language, or SAML, is an OASIS framework for conveying user authentication and attribute information through XML assertions.
  • 15. WS-Reliable Messaging • Communication over a public network such as the Internet imposes physical limitations to the reliability of exchanged messages. • Even though failures are inevitable and unpredictable, certain techniques increase message reliability and traceability even in the worst cases. • At a minimum, senders are interested in determining whether the message has been received by the partner, that it was received exactly once and in the correct order. • It is necessary to determine the validity of the received message: • Has the message been altered on its way to the receiver? • Does it conform to standard formats? • Does it agree with the business rules expected by the receiver? • WS-Reliability and WS-Reliable Messaging have rules that dictate how and when services must respond to other services concerning the receipt of a message and its validity.
  • 17. WS-Policy • WS-Policy is a specification of a framework for defining the requirements and capabilities of a service. • In short, a policy is a set of assertions that express the capabilities and requirements of a service. • The specification WS-Policy (http://www128.ibm.com/developerworks/library/ specification/ws-polfram/) defines terms that can be used to organize a policy. • Once a provider has a policy defined in XML, then he must publish that information by referencing it in the description of the service.
  • 18. WS-Attachments • It is a method for attaching a policy to a WSDL file so that it can be published to the UDDI and thus used in deciding on services. • There are several mechanisms defined for accomplishing this task. • The simplest method is to write the policy directly into the WSDL file. • A more complex, and more powerful method is to construct the policy as a stand alone file that is referenced in the WSDL file as a URI. • WS-Policy and WS-PolicyAttachment together give us hierarchy based on to which element the policy is attached and direction for merging policies together to create an effective policy for an element (WS-PolicyAttachment, 2005).
  • 19. REST-ful web services • REST stands for Representational State Transfer. REST is an architectural style not a protocol. Advantages of RESTful Web Services: • Fast: RESTful Web Services are fast because there is no strict specification like SOAP. It consumes less bandwidth and resource. • Language and Platform independent: RESTful web services can be written in any programming language and executed in any platform. • Can use SOAP: RESTful web services can use SOAP web services as the implementation. • Permits different data format: RESTful web service permits different data format such as Plain Text, HTML, XML and JSON.
  • 20. Comparison of REST and SOAP
  • 21. MU Exam Questions May 2017 • Describe SOAP protocol and message structure briefly. 10 marks Dec 2018 • Describe SOAP protocol and message structure briefly. 10 marks May 2019 • Explain in detail WS-Reliable Messaging. 10 marks • SN: SOAP. 5 marks • SN: REST-ful web services. 5 marks