SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Service Oriented Architecture: 9
SOA Technologies WSDL
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
First-generation Web services
• The W3C framework for Web services consists of a
foundation built on top of three
core XMLspecifications:
– Web Services Description Language (WSDL)
– Simple Object Access Protocol (SOAP)
– Universal Description, Discovery, and Integration (UDDI)
• These technology standards, coupled with service-
oriented design principles, form a basic XML-driven
SOA.
• This first-generation Web services architecture allows
for the creation of independent Web services capable
of encapsulating isolated units of business functionality
Web Services Description Language
(WSDL)
• Web services need to be defined in a consistent
manner so that they can be discovered by and
interfaced with other services and applications.
• +The Web Services Description Language is a W3C
specification providing the foremost language for the
description of Web service definitions.
• The integration layer introduced by the Web services
framework establishes a standard, universally
recognized and supported programmatic interface.
• WSDL enables communication between these layers by
providing standardized endpoint descriptions
WSDL documents representing Web
services to applications
Primary Constructs for WSDL
Definitions
• A Web service is defined and expressed by a
WSDL document through constructs that
collectively represent this definition.
• The root definitions element acts as the container
for the entire service definition.
• A WSDL definition can host collections of the
following primary constructs:
– • interface (previously known as portType)
– • message
– • service
– • binding
• The first two constructs represent the service
interface definition, and the latter two provide
the service implementation details.
Abstract interface definition Construct
• Individual Web service interfaces are represented
by WSDL interface elements.
• These constructs contain a group of logically
related operations.
• In a component-based architecture, a WSDL
interface is comparable to a component interface.
• An operation is therefore the equivalent of a
component method, as it represents a single
action or function.
Interface Example
• An Example of Web service interface
represented by the interface element is:
Message Construct
• A typical operation element consists of a group of
related input and output messages.
• The execution of an operation requires the
transmission or exchange of these messages
between the service requestor and the service
provider.
• Operation messages are represented by message
constructs that are declared separately under the
definitions element.
• The message names then are referenced in the
operation’s input or output child elements.
Message Construct Example
• The input element within an operation
construct referencing a message block
WSDL “Part”
• A message element can contain one or more
input or output parameters that belong to an
operation.
• Each part element defines one such parameter.
• It provides a name/ value set, along with an
associated data type.
• In a component-based architecture, a WSDL part
is the equivalent of an input or output parameter
(or a return value) of a component method.
Message Construct with “Part”
• Example of A message block with part
constructs representing operation parameters
Abstract interface definition Summary
• The fundamental constructs that can be assembled to
establish an abstract interface definition are:
• • interfaces represent service interfaces, and can
contain multiple operations
• • operations represent a Web service function, and can
reference multiple messages
• • messages represent collections of input or output
parameters, and can contain multiple parts
• • parts represent either incoming or outgoing
operation parameter data
Assignment
• Discuss the primary constructs for WSDL
documents that are used for representing
Web services to applications
• Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to RESTful Webservice
Introduction to RESTful WebserviceIntroduction to RESTful Webservice
Introduction to RESTful Webservice
Eftakhairul Islam
 

Was ist angesagt? (20)

Core concepts - mule
Core concepts - muleCore concepts - mule
Core concepts - mule
 
WebServices SOAP WSDL and UDDI
WebServices SOAP WSDL and UDDIWebServices SOAP WSDL and UDDI
WebServices SOAP WSDL and UDDI
 
Introduction to web services
Introduction to web servicesIntroduction to web services
Introduction to web services
 
Dataweave
DataweaveDataweave
Dataweave
 
Introduction to RESTful Webservice
Introduction to RESTful WebserviceIntroduction to RESTful Webservice
Introduction to RESTful Webservice
 
Anypoint mq queues and exchanges
Anypoint mq queues and exchangesAnypoint mq queues and exchanges
Anypoint mq queues and exchanges
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)
 
Mule message structure
Mule message structureMule message structure
Mule message structure
 
Muletransformers
MuletransformersMuletransformers
Muletransformers
 
Mulesoft ppt
Mulesoft pptMulesoft ppt
Mulesoft ppt
 
Mule web services
Mule web servicesMule web services
Mule web services
 
Wso2 integration platform deep dive eu con 2016
Wso2 integration platform deep dive   eu con 2016Wso2 integration platform deep dive   eu con 2016
Wso2 integration platform deep dive eu con 2016
 
Anypoint connector dev kit
Anypoint connector dev kitAnypoint connector dev kit
Anypoint connector dev kit
 
Wso2 con eu 2016 an introduction to the wso2 integration platform by chanak...
Wso2 con eu 2016   an introduction to the wso2 integration platform by chanak...Wso2 con eu 2016   an introduction to the wso2 integration platform by chanak...
Wso2 con eu 2016 an introduction to the wso2 integration platform by chanak...
 
Mule rabbitmq
Mule rabbitmqMule rabbitmq
Mule rabbitmq
 
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
 
Mule concepts components
Mule concepts componentsMule concepts components
Mule concepts components
 
Mule concepts filters scopes_routers
Mule concepts filters scopes_routersMule concepts filters scopes_routers
Mule concepts filters scopes_routers
 
Core concepts in mule
Core concepts in muleCore concepts in mule
Core concepts in mule
 
Mule enterprise service bus
Mule enterprise service busMule enterprise service bus
Mule enterprise service bus
 

Ă„hnlich wie Soa 9 soa technologies wsdl

Web service
Web serviceWeb service
Web service
abhay singh
 
Semantic Web Services (Standards, Monitoring, Testing and Security)
Semantic Web Services  (Standards, Monitoring, Testing and Security)Semantic Web Services  (Standards, Monitoring, Testing and Security)
Semantic Web Services (Standards, Monitoring, Testing and Security)
Reza Gh
 
Web Services Composition
Web Services CompositionWeb Services Composition
Web Services Composition
eldorina
 

Ă„hnlich wie Soa 9 soa technologies wsdl (20)

Java web services
Java web servicesJava web services
Java web services
 
Web services
Web servicesWeb services
Web services
 
Efficient retrieval of web services using prioritization and clustering
Efficient retrieval of web services using prioritization and clusteringEfficient retrieval of web services using prioritization and clustering
Efficient retrieval of web services using prioritization and clustering
 
Xml.ppt
Xml.pptXml.ppt
Xml.ppt
 
Unit iii soa
Unit iii soaUnit iii soa
Unit iii soa
 
WebService-Java
WebService-JavaWebService-Java
WebService-Java
 
Unit 3-SOA Technologies
Unit 3-SOA TechnologiesUnit 3-SOA Technologies
Unit 3-SOA Technologies
 
dotNETfinal.ppt
dotNETfinal.pptdotNETfinal.ppt
dotNETfinal.ppt
 
dotNETfinal.ppt
dotNETfinal.pptdotNETfinal.ppt
dotNETfinal.ppt
 
Distributed system architecture
Distributed system architectureDistributed system architecture
Distributed system architecture
 
Understanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company indiaUnderstanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company india
 
Introduction to SOAP/WSDL Web Services and RESTful Web Services
Introduction to SOAP/WSDL Web Services and RESTful Web ServicesIntroduction to SOAP/WSDL Web Services and RESTful Web Services
Introduction to SOAP/WSDL Web Services and RESTful Web Services
 
web programming
web programmingweb programming
web programming
 
Web service
Web serviceWeb service
Web service
 
SOA standards
SOA standardsSOA standards
SOA standards
 
Semantic Web Services (Standards, Monitoring, Testing and Security)
Semantic Web Services  (Standards, Monitoring, Testing and Security)Semantic Web Services  (Standards, Monitoring, Testing and Security)
Semantic Web Services (Standards, Monitoring, Testing and Security)
 
Web Services Composition
Web Services CompositionWeb Services Composition
Web Services Composition
 
Web services
Web servicesWeb services
Web services
 
Web services
Web services Web services
Web services
 
Dot net training-navimumbai
Dot net training-navimumbaiDot net training-navimumbai
Dot net training-navimumbai
 

Mehr von Vaibhav Khanna

Mehr von Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

KĂĽrzlich hochgeladen

Jax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined DeckJax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined Deck
Marc Lester
 

KĂĽrzlich hochgeladen (20)

The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)
 
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
 
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
 
Microsoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMicrosoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdf
 
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAOpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
 
Jax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined DeckJax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined Deck
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdfStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
 
Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14
 
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
 
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
 
OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
 
Alluxio Monthly Webinar | Simplify Data Access for AI in Multi-Cloud
Alluxio Monthly Webinar | Simplify Data Access for AI in Multi-CloudAlluxio Monthly Webinar | Simplify Data Access for AI in Multi-Cloud
Alluxio Monthly Webinar | Simplify Data Access for AI in Multi-Cloud
 
BusinessGPT - Security and Governance for Generative AI
BusinessGPT  - Security and Governance for Generative AIBusinessGPT  - Security and Governance for Generative AI
BusinessGPT - Security and Governance for Generative AI
 
Weeding your micro service landscape.pdf
Weeding your micro service landscape.pdfWeeding your micro service landscape.pdf
Weeding your micro service landscape.pdf
 
Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabber
 
From Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST APIFrom Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST API
 
^Clinic ^%[+27788225528*Abortion Pills For Sale In birch acres
^Clinic ^%[+27788225528*Abortion Pills For Sale In birch acres^Clinic ^%[+27788225528*Abortion Pills For Sale In birch acres
^Clinic ^%[+27788225528*Abortion Pills For Sale In birch acres
 
^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto
^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto
^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto
 

Soa 9 soa technologies wsdl

  • 1. Service Oriented Architecture: 9 SOA Technologies WSDL Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. First-generation Web services • The W3C framework for Web services consists of a foundation built on top of three core XMLspecifications: – Web Services Description Language (WSDL) – Simple Object Access Protocol (SOAP) – Universal Description, Discovery, and Integration (UDDI) • These technology standards, coupled with service- oriented design principles, form a basic XML-driven SOA. • This first-generation Web services architecture allows for the creation of independent Web services capable of encapsulating isolated units of business functionality
  • 3. Web Services Description Language (WSDL) • Web services need to be defined in a consistent manner so that they can be discovered by and interfaced with other services and applications. • +The Web Services Description Language is a W3C specification providing the foremost language for the description of Web service definitions. • The integration layer introduced by the Web services framework establishes a standard, universally recognized and supported programmatic interface. • WSDL enables communication between these layers by providing standardized endpoint descriptions
  • 4. WSDL documents representing Web services to applications
  • 5. Primary Constructs for WSDL Definitions • A Web service is defined and expressed by a WSDL document through constructs that collectively represent this definition. • The root definitions element acts as the container for the entire service definition. • A WSDL definition can host collections of the following primary constructs: – • interface (previously known as portType) – • message – • service – • binding
  • 6. • The first two constructs represent the service interface definition, and the latter two provide the service implementation details.
  • 7. Abstract interface definition Construct • Individual Web service interfaces are represented by WSDL interface elements. • These constructs contain a group of logically related operations. • In a component-based architecture, a WSDL interface is comparable to a component interface. • An operation is therefore the equivalent of a component method, as it represents a single action or function.
  • 8. Interface Example • An Example of Web service interface represented by the interface element is:
  • 9. Message Construct • A typical operation element consists of a group of related input and output messages. • The execution of an operation requires the transmission or exchange of these messages between the service requestor and the service provider. • Operation messages are represented by message constructs that are declared separately under the definitions element. • The message names then are referenced in the operation’s input or output child elements.
  • 10. Message Construct Example • The input element within an operation construct referencing a message block
  • 11. WSDL “Part” • A message element can contain one or more input or output parameters that belong to an operation. • Each part element defines one such parameter. • It provides a name/ value set, along with an associated data type. • In a component-based architecture, a WSDL part is the equivalent of an input or output parameter (or a return value) of a component method.
  • 12. Message Construct with “Part” • Example of A message block with part constructs representing operation parameters
  • 13. Abstract interface definition Summary • The fundamental constructs that can be assembled to establish an abstract interface definition are: • • interfaces represent service interfaces, and can contain multiple operations • • operations represent a Web service function, and can reference multiple messages • • messages represent collections of input or output parameters, and can contain multiple parts • • parts represent either incoming or outgoing operation parameter data
  • 14. Assignment • Discuss the primary constructs for WSDL documents that are used for representing Web services to applications • Thank You