SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Service Oriented Architecture: 11
Representational State Transfer (REST)
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Representational State Transfer
• The Client references a Web resource using a
URL. A representation of the resource is
returned (in this case as an HTML document).
• The representation (e.g., Boeing747.html) places
the client application in a state.
REST
• "Representation State Transfer is intended to
evoke an image of how a well-designed Web
application behaves: a network of web pages (a
virtual state-machine), where:
– the user progresses through an application by
selecting links (state transitions),
– Resulting in the next page (representing the next state
of the application)
– being transferred to the user and rendered for their
use."
Parts Depot Web Services
• Parts Depot, Inc has deployed some web
services to enable its customers to:
– get a list of parts
– get detailed information about a particular part
– submit a Purchase Order (PO)
The REST way of Implementing the
Web Services
REST Service Implementation
• Service: Get a list of parts
– The web service makes available a URL to a parts list
resource. Example, a client would use this URL to get the
parts list:
• http://www.parts-depot.com/parts
• Note that how the web service generates the parts list is
completely transparent to the client. This is loose coupling.
– The web service may wish to allow the client to specify
whether he/she wants the parts list as an HTML
document, or as an XML document. This is how to specify
that an XML document is desired:
• http://www.parts-depot.com/parts?flavor=xml
Data Returned - Parts List
• <?xml version="1.0"?>
• <p:Parts xmlns:p="http://www.parts-depot.com"
• xmlns:xlink="http://www.w3.org/2019/xlink"
• xmlns:xsi="http://www.w3.org/2020/XMLSchema-instance"
• xsi:schemaLocation=
• "http://www.parts-depot.com
• http://www.parts-depot.com/parts.xsd">
• <Part id="00345" xlink:href="http://www.parts-depot.com/parts/00345"/>
• <Part id="00346" xlink:href="http://www.parts-depot.com/parts/00346"/>
• <Part id="00347" xlink:href="http://www.parts-depot.com/parts/00347"/>
• <Part id="00348" xlink:href="http://www.parts-depot.com/parts/00348"/>
• </p:Parts>
• Note that the parts list has links to get detailed info about each part. This is a key
feature of REST.
• The client transfers from one state to the next by examining and choosing from
among the alternative URLs in the response document.
REST Service Layer 2
• Service: Get detailed information about a
particular part
– The web service makes available a URL to each part resource.
Example, here's how a client requests a specific part:
• http://www.parts-depot.com/parts/00345?flavor=xml
• Again observe how this data is linked to still more
data - the specification for this part may be found
by traversing the hyperlink. Each response
document allows the client to drill down to get
more detailed information.
Data Returned
• <?xml version="1.0"?>
• <p:Part xmlns:p="http://www.parts-depot.com"
• xmlns:xlink="http://www.w3.org/1999/xlink"
• xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
• xsi:schemaLocation=
• "http://www.parts-depot.com
• http://www.parts-depot.com/part.xsd">
• <Part-ID>00345</Part-ID>
• <Name>Widget-A</Name>
• <Description>This part is used within the frap assembly</Description>
• <Specification xlink:href="http://www.parts-
depot.com/parts/00345/specification"/>
• <UnitCost currency="USD">0.10</UnitCost>
• <Quantity>10</Quantity>
• </p:Part>
REST Service Layer 3
• Service: Submit a Purchase Order (PO)
– The web service makes available a URL to submit a PO.
– The client creates a PO instance document which conforms to the PO
schema that Parts Depot has designed (and publicized in a WSDL
document).
– The client submits PO.xml as the payload of an HTTP POST.
Characteristics of a REST-based
Network
• Client-Server: a pull-based interaction style:
consuming components pull representations.
• Stateless: each request from client to server
must contain all the information necessary to
understand the request, and cannot take
advantage of any stored context on the server.
• Cache: to improve network efficiency
responses must be capable of being labeled as
cacheable or non-cacheable.
REST Characteristics
• Uniform interface: all resources are accessed
with a generic interface (e.g., HTTP GET, POST,
PUT, DELETE).
• Named resources - the system is comprised of
resources which are named using a URI.
• Interconnected resource representations - the
representations of the resources are
interconnected using URLs, thereby enabling a
client to progress from one state to another.
Implementing the Web Services using
SOAP
Assignment
• What do you understand by REST. Discuss its
usage in designing web services.
•

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Mulesoft Anypoint platform introduction
Mulesoft Anypoint platform introductionMulesoft Anypoint platform introduction
Mulesoft Anypoint platform introduction
 
Mule esb stripe
Mule esb stripeMule esb stripe
Mule esb stripe
 
Mule Sap Integration
Mule Sap IntegrationMule Sap Integration
Mule Sap Integration
 
Bt0083, server side programming theory
Bt0083, server side programming theoryBt0083, server side programming theory
Bt0083, server side programming theory
 
Development using anypointstudio
Development using anypointstudioDevelopment using anypointstudio
Development using anypointstudio
 
Mule message structure
Mule message structureMule message structure
Mule message structure
 
Enterprise resources and mule
Enterprise resources and muleEnterprise resources and mule
Enterprise resources and mule
 
Web service
Web serviceWeb service
Web service
 
Implementing an Esb using Mule
Implementing an Esb using MuleImplementing an Esb using Mule
Implementing an Esb using Mule
 
Mule execution
Mule executionMule execution
Mule execution
 
Onepush platformtotalsolution
Onepush platformtotalsolutionOnepush platformtotalsolution
Onepush platformtotalsolution
 
Sap
SapSap
Sap
 
Java web services
Java web servicesJava web services
Java web services
 
How a three-tier web application works
How a three-tier web application worksHow a three-tier web application works
How a three-tier web application works
 
3 Tier Animation
3 Tier Animation3 Tier Animation
3 Tier Animation
 
Mule Concur Connector
Mule Concur ConnectorMule Concur Connector
Mule Concur Connector
 
Enterprise Portal 2.0
Enterprise Portal 2.0Enterprise Portal 2.0
Enterprise Portal 2.0
 
Enterprise resources and mule
Enterprise resources and muleEnterprise resources and mule
Enterprise resources and mule
 
Mule esb
Mule esbMule esb
Mule esb
 
Integrating with LinkedIn using Mule ESB LinkedIn Connector
Integrating with LinkedIn using Mule ESB LinkedIn ConnectorIntegrating with LinkedIn using Mule ESB LinkedIn Connector
Integrating with LinkedIn using Mule ESB LinkedIn Connector
 

Ähnlich wie Soa 11 representational state transfer rest

0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
Zani10
 
Enterprise Software Architecture
Enterprise Software ArchitectureEnterprise Software Architecture
Enterprise Software Architecture
rahmed_sct
 

Ähnlich wie Soa 11 representational state transfer rest (20)

REST.ppt
REST.pptREST.ppt
REST.ppt
 
Angular - Chapter 7 - HTTP Services
Angular - Chapter 7 - HTTP ServicesAngular - Chapter 7 - HTTP Services
Angular - Chapter 7 - HTTP Services
 
Introduction to the Client OM in SharePoint 2010
Introduction to the Client OM in SharePoint 2010Introduction to the Client OM in SharePoint 2010
Introduction to the Client OM in SharePoint 2010
 
0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
 
Html intake 38 lect1
Html intake 38 lect1Html intake 38 lect1
Html intake 38 lect1
 
Ch-1_.ppt
Ch-1_.pptCh-1_.ppt
Ch-1_.ppt
 
Hia 1691-using iib-to_support_api_economy
Hia 1691-using iib-to_support_api_economyHia 1691-using iib-to_support_api_economy
Hia 1691-using iib-to_support_api_economy
 
distributing over the web
distributing over the webdistributing over the web
distributing over the web
 
Web service architecture
Web service architectureWeb service architecture
Web service architecture
 
REST Introduction.ppt
REST Introduction.pptREST Introduction.ppt
REST Introduction.ppt
 
Event-Based API Patterns and Practices
Event-Based API Patterns and PracticesEvent-Based API Patterns and Practices
Event-Based API Patterns and Practices
 
REST - Representational State Transfer
REST - Representational State TransferREST - Representational State Transfer
REST - Representational State Transfer
 
Enterprise Software Architecture
Enterprise Software ArchitectureEnterprise Software Architecture
Enterprise Software Architecture
 
Introduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptxIntroduction and Basics to web technology .pptx
Introduction and Basics to web technology .pptx
 
Components of a Generic Web Application Architecture
Components of  a Generic Web Application ArchitectureComponents of  a Generic Web Application Architecture
Components of a Generic Web Application Architecture
 
Apps 101 - Moving to the SharePoint 2013 App Model - Presented 7/27/13 at Sha...
Apps 101 - Moving to the SharePoint 2013 App Model - Presented 7/27/13 at Sha...Apps 101 - Moving to the SharePoint 2013 App Model - Presented 7/27/13 at Sha...
Apps 101 - Moving to the SharePoint 2013 App Model - Presented 7/27/13 at Sha...
 
API & Backend Integration
API & Backend IntegrationAPI & Backend Integration
API & Backend Integration
 
Serious Sencha - Data Layer and Server-Side REST Interface
Serious Sencha - Data Layer and Server-Side REST InterfaceSerious Sencha - Data Layer and Server-Side REST Interface
Serious Sencha - Data Layer and Server-Side REST Interface
 
Microservice 微服務
Microservice 微服務Microservice 微服務
Microservice 微服務
 
Introduction To REST
Introduction To RESTIntroduction To REST
Introduction To REST
 

Mehr von Vaibhav Khanna

Mehr von Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Kürzlich hochgeladen

CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
anilsa9823
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 

Soa 11 representational state transfer rest

  • 1. Service Oriented Architecture: 11 Representational State Transfer (REST) Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Representational State Transfer • The Client references a Web resource using a URL. A representation of the resource is returned (in this case as an HTML document). • The representation (e.g., Boeing747.html) places the client application in a state.
  • 3. REST • "Representation State Transfer is intended to evoke an image of how a well-designed Web application behaves: a network of web pages (a virtual state-machine), where: – the user progresses through an application by selecting links (state transitions), – Resulting in the next page (representing the next state of the application) – being transferred to the user and rendered for their use."
  • 4. Parts Depot Web Services • Parts Depot, Inc has deployed some web services to enable its customers to: – get a list of parts – get detailed information about a particular part – submit a Purchase Order (PO)
  • 5. The REST way of Implementing the Web Services
  • 6. REST Service Implementation • Service: Get a list of parts – The web service makes available a URL to a parts list resource. Example, a client would use this URL to get the parts list: • http://www.parts-depot.com/parts • Note that how the web service generates the parts list is completely transparent to the client. This is loose coupling. – The web service may wish to allow the client to specify whether he/she wants the parts list as an HTML document, or as an XML document. This is how to specify that an XML document is desired: • http://www.parts-depot.com/parts?flavor=xml
  • 7. Data Returned - Parts List • <?xml version="1.0"?> • <p:Parts xmlns:p="http://www.parts-depot.com" • xmlns:xlink="http://www.w3.org/2019/xlink" • xmlns:xsi="http://www.w3.org/2020/XMLSchema-instance" • xsi:schemaLocation= • "http://www.parts-depot.com • http://www.parts-depot.com/parts.xsd"> • <Part id="00345" xlink:href="http://www.parts-depot.com/parts/00345"/> • <Part id="00346" xlink:href="http://www.parts-depot.com/parts/00346"/> • <Part id="00347" xlink:href="http://www.parts-depot.com/parts/00347"/> • <Part id="00348" xlink:href="http://www.parts-depot.com/parts/00348"/> • </p:Parts> • Note that the parts list has links to get detailed info about each part. This is a key feature of REST. • The client transfers from one state to the next by examining and choosing from among the alternative URLs in the response document.
  • 8. REST Service Layer 2 • Service: Get detailed information about a particular part – The web service makes available a URL to each part resource. Example, here's how a client requests a specific part: • http://www.parts-depot.com/parts/00345?flavor=xml • Again observe how this data is linked to still more data - the specification for this part may be found by traversing the hyperlink. Each response document allows the client to drill down to get more detailed information.
  • 9. Data Returned • <?xml version="1.0"?> • <p:Part xmlns:p="http://www.parts-depot.com" • xmlns:xlink="http://www.w3.org/1999/xlink" • xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" • xsi:schemaLocation= • "http://www.parts-depot.com • http://www.parts-depot.com/part.xsd"> • <Part-ID>00345</Part-ID> • <Name>Widget-A</Name> • <Description>This part is used within the frap assembly</Description> • <Specification xlink:href="http://www.parts- depot.com/parts/00345/specification"/> • <UnitCost currency="USD">0.10</UnitCost> • <Quantity>10</Quantity> • </p:Part>
  • 10. REST Service Layer 3 • Service: Submit a Purchase Order (PO) – The web service makes available a URL to submit a PO. – The client creates a PO instance document which conforms to the PO schema that Parts Depot has designed (and publicized in a WSDL document). – The client submits PO.xml as the payload of an HTTP POST.
  • 11. Characteristics of a REST-based Network • Client-Server: a pull-based interaction style: consuming components pull representations. • Stateless: each request from client to server must contain all the information necessary to understand the request, and cannot take advantage of any stored context on the server. • Cache: to improve network efficiency responses must be capable of being labeled as cacheable or non-cacheable.
  • 12. REST Characteristics • Uniform interface: all resources are accessed with a generic interface (e.g., HTTP GET, POST, PUT, DELETE). • Named resources - the system is comprised of resources which are named using a URI. • Interconnected resource representations - the representations of the resources are interconnected using URLs, thereby enabling a client to progress from one state to another.
  • 13. Implementing the Web Services using SOAP
  • 14. Assignment • What do you understand by REST. Discuss its usage in designing web services. •