SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Web Services and Middleware; Network programming;
Low level data communications
Message and queuing services;
08/12/2015 1Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
Integrative Programming andTechnology
 application integration technology
 Allows applications to be integrated more rapidly, easily and less
expensively
 program-to- program interactions whereas web for program-to-user
interactions
 allow companies to reduce the cost of doing e-business, to deploy
solutions faster and to open up new opportunities
 Web services model built on emerging standards such as
 HTTP
 XML
 Simple Object Access Protocol (SOAP)
 Web Services Description Language (WSDL)
 Universal Description, Discovery and Integration (UDDI)
08/12/2015 2Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
 developed in order to distribute an object and serve it to various users
in the web environments
 used in the server situations while solving the web-scalability problem
of the other distributed object technologies
 WSDL, and SOAP exploit XML.
 WSDL is an XML describing the web service.
 SOAP is an XML describing the called method, its parameters, and its
return value, can be delivered over the HTTP
08/12/2015 3Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
08/12/2015 4Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
1. A client that wants to be serviced should first find the supported services
from the pre-existing registry before compiling a code.
2. After finding its services through searching, the client gains the Web
Service Description Language (WSDL) that a server previously registers.
From theWSDL, the client knows the service provider location and the
parameters to the found method.
3. After the client binds the described service during the compile time, it
calls the local agent whenever the client invokes a method call, and
the local agent delivers it to the server side agent through Simple Object
Access Protocol (SOAP) over HTTP, FTP, SMTP, andTCP during the
runtime.
4. The server side agent activates the appropriate object, and delivers
the calls to the object.
08/12/2015 5Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
Network:
 A network is a collection of computers and other devices that can send data to and receive data
from each other.
 A network is often connected by wires.
 However, wireless networks transmit data through infrared light and microwaves.
Node:
 Each machine on a network is called a node.
 Most nodes are computers, but printers, routers, bridges, gateways etc.. can also be nodes.
 Nodes that are fully functional computers are also called hosts.
Packet:
 All modern computer networks are packet-switched networks: data traveling on the network is
broken into chunks called packets and each packet is handled separately.
 Each packet contains information about who sent it and where it's going.
Protocol: A protocol is a precise set of rules defining how computers communicate: the format of
addresses, how data is split into packets
08/12/2015 6Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
IP:
 IP was designed to allow multiple routes between any two points and
to route packets of data around damaged routers.
TCP:
 Since there are multiple routes between two points, and the packets
that make up a particular data stream.
 Furthermore, they may not arrive in the order they were sent, if they
even arrive at all.
UDP:
 UDP is an unreliable protocol that does not guarantee that packets will
arrive at their destination or that they will arrive in the same order
they were sent.
Ports:
 Each computer with an IP address has several thousand logical ports.
 Each port is identified by a number between 1 and 65,535. Each port can
be allocated to a particular service.
 Port numbers 1 through 255 are reserved by IP for well-known services
If you connect to port 80 of a host, for instance, you may expect to find
an HTTP server.
08/12/2015 7Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
Internet:
 largest IP-based network for connecting machines together.
 Java: easy-to-use, cross-platform model for network communications.
What is a Socket?
 Sockets are a means of using IP to communicate between machines, so sockets
allow Java to interoperate with legacy systems by simply talking to existing
servers using their pre-defined protocol.
 Internet protocol: User Datagram Protocol (UDP) andTransmissionControl
Protocol (TCP).
Internet Addresses or IP Addresses
 Every network node has an address, a series of bytes that uniquely identify it.
 Internet addresses are manipulated in Java by the use of the InetAddress class.
InetAddress takes care of the Domain Name System (DNS) look-up and reverse
look-up;
 IP addresses can be specified by either the host name or the raw IP address.
InetAddress provides methods to getByName(), getAllByName(),
getLocalHost(), getAddress(), etc.
 IP addresses are a 32-bit number, often represented as a "quad" of four 8-bit
numbers separated by periods.
 They are organized into classes (A, B, C, D, and E). For example 126.255.255.255
Client/Server Computing- Java language communicate with remote file system
08/12/2015 8Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
How UDPclients and UDPservers communicate over sockets
Creating UDP Servers:
To create a server with UDP, do the following:
1. Create a DatagramSocket attached to a port.
int port = 1234;
DatagramSocket socket = new DatagramSocket(port);
2. Allocate space to hold the incoming packet, and create an instance of DatagramPacket to hold the
incoming data.
byte[] buffer = new byte[1024];
DatagramPacket packet = new DatagramPacket(buffer, buffer.length);
3. Block until a packet is received, then extract the information you need from the packet.
// Block on receive()
socket.receive(packet);
// Extract the packet data
byte[] data = packet.getData();
// Find out where packet came from
// so we can reply to the same host/port
InetAddress remoteHost = packet.getAddress();
int remotePort = packet.getPort();
08/12/2015 9Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
Creating UDP Clients
1. First allocate space to hold the data we are sending and create an instance
of DatagramPacket to hold the data.
byte[] buffer = new byte[1024];
int port = 1234;
InetAddress host = InetAddress.getByName("magelang.com");
DatagramPacket packet = new DatagramPacket(buffer,
buffer.length, host, port);
2. Create a DatagramSocket and send the packet using this socket.
DatagramSocket socket = new DatagramSocket();//free local port to
use
socket.send(packet);
// Find out where we are sending from
InetAddress localHostname = socket.getLocalAddress();
int localPort = socket.getLocalPort();
08/12/2015 10Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
HowTCPclients andTCPservers communicate over sockets
CreatingTCP Servers:
To create aTCP server, do the following:
1. Create a ServerSocket attached to a port number.
ServerSocket server = new ServerSocket(port);
2.Wait for connections from clients requesting connections to that port.
// Block on accept()
Socket channel = server.accept();
You'll get a Socket object as a result of the connection.
3. Get input and output streams associated with the socket.
out = new PrintWriter (channel.getOutputStream());
out.println("Hey! I heard you over this socket!");
reader = new InputStreamReader (channel.getInputStream());
in = new BufferedReader (reader);
Now you can read and write to the socket, thus, communicating with the client.
String data = in.readLine();
08/12/2015 11Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
CreatingTCP Clients:
To create aTCP client, do the following:
1. Create a Socket object attached to a remote host, port.
Socket client = new Socket(host, port);
When the constructor returns, you have a connection.
2. Get input and output streams associated with the socket.
out = new PrintWriter (client.getOutputStream());
out.println("Watson!" + "Come here...I need you!");
reader = new InputStreamReader (client.getInputStream());
in = new BufferedReader (reader);
Now you can read and write to the socket, thus, communicating with the
server.
String data = in.readLine();
08/12/2015 12Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
TCP/IP(Transmission Control Protocol/Internet Protocol)
 The Protocol upon which the whole Internet is based
 Each node must be configured forTCP/IP to function properly.
 A software-based protocol
 TCP/IP is basically the binding together of Internet Protocols used to
connect hosts on the internet- Main ones are IP andTCP
 TCP and IP have special packet structure
 IP (Internet Protocol) is responsible for delivering packets of data
between systems on the internet and specifies their format. Packets
forwarded based on a four byte destination IP address (IP number)
IP DOES NOT MAKE GUARANTEES! It is very simple - essentially: send
and forget.
 TCP (TransmissionControl Protocol) is responsible for verifying the
correct delivery of data/packets from client to server. Data can be lost
.SoTCP also adds support to detect errors and retransmit data until
completely received
08/12/2015 13Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
08/12/2015 14Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
 Version — Indicates the version of IP currently used.
 IP Header Length (IHL) — Indicates the datagram header length in 32-bit words.
 Type-of-Service — Specifies how an upper-layer protocol would like a current datagram to
be handled, and assigns datagram various levels of importance.
 Total Length — Specifies the length, in bytes, of the entire IP packet, including the data
and header.
 Identification — Contains an integer that identifies the current datagram. This field is used
to help piece together datagram fragments.
 Flags — Consists of a 3-bit field of which the two low-order (least-significant) bits control
fragmentation. The low-order bit specifies whether the packet can be fragmented. The
middle bit specifies whether the packet is the last fragment in a series of fragmented
packets.The third or high-order bit is not used.
 Fragment Offset — Indicates the position of the fragment’s data relative to the beginning
of the data in the original datagram, which allows the destination IP process to properly
reconstruct the original datagram.
 Time-to-Live — Maintains a counter that gradually decrements down to zero, at which
point the datagram is discarded.
 Protocol — Indicates which upper-layer protocol receives incoming packets after IP
processing is complete.
 Header Checksum — Helps ensure IP header integrity.
 Source Address — Specifies the sending node.
 Destination Address — Specifies the receiving node.
 Options — Allows IP to support various options, such as security.
 Data — Contains upper-layer sent in packet.
08/12/2015 15Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
08/12/2015 16Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
 There are 12 fields inTCP Packet:
 Source Port and Destination Port — Identifies points at which upper-
layer source and destination processes receiveTCP services.
 Sequence Number In the connection-establishment phase, this field also
can be used to identify an initial sequence number to be used in an
upcoming transmission.
 Acknowledgment Number — Contains the sequence number of the next
byte of data the sender of the packet expects to receive.
 Data Offset — Indicates the number of 32-bit words in theTCP header.
 Reserved — Remains reserved for future use.
 Flags — Carries a variety of control information, including the SYN and
ACK bits used for connection establishment, and the FIN bit used for
connection termination.
 Window — Specifies the size of the sender’s receive window (that is, the
buffer space available for incoming data).
 Checksum — Indicates whether the header was damaged in transit.
 Urgent Pointer — Points to the first urgent data byte in the packet.
 Options — Specifies variousTCP options.
 Data — Contains upper-layer sent in packet.
08/12/2015 17Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia

Weitere ähnliche Inhalte

Was ist angesagt?

Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print Sharing
Gene Carboni
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
Tuhin_Das
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
shivli0769
 

Was ist angesagt? (20)

Virtual Box Presentation
Virtual Box Presentation Virtual Box Presentation
Virtual Box Presentation
 
Network devices
Network devicesNetwork devices
Network devices
 
Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print Sharing
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Types of server
Types of serverTypes of server
Types of server
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
History of ms office
History of ms office History of ms office
History of ms office
 
04 The Purpose of Straight-Through and Crossover Cables.pptx
04 The Purpose of Straight-Through and Crossover Cables.pptx04 The Purpose of Straight-Through and Crossover Cables.pptx
04 The Purpose of Straight-Through and Crossover Cables.pptx
 
Network Cabling
Network CablingNetwork Cabling
Network Cabling
 
Osi model
Osi modelOsi model
Osi model
 
Python/Flask Presentation
Python/Flask PresentationPython/Flask Presentation
Python/Flask Presentation
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Computer Networks Module I
Computer Networks Module IComputer Networks Module I
Computer Networks Module I
 
network hardware
network hardwarenetwork hardware
network hardware
 
Network cable
Network cableNetwork cable
Network cable
 

Ähnlich wie IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya

Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
amrit47
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
Jaya Prasanna
 
Networking Java Socket Programming
Networking Java Socket ProgrammingNetworking Java Socket Programming
Networking Java Socket Programming
Mousmi Pawar
 
Networking
NetworkingNetworking
Networking
Tuan Ngo
 

Ähnlich wie IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya (20)

Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in Java
 
NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 
Networking in Java
Networking in JavaNetworking in Java
Networking in Java
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Md13 networking
Md13 networkingMd13 networking
Md13 networking
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Networking Java Socket Programming
Networking Java Socket ProgrammingNetworking Java Socket Programming
Networking Java Socket Programming
 
Socket Programming by Rajkumar Buyya
Socket Programming by Rajkumar BuyyaSocket Programming by Rajkumar Buyya
Socket Programming by Rajkumar Buyya
 
Lecture25
Lecture25Lecture25
Lecture25
 
Communication middleware
Communication middlewareCommunication middleware
Communication middleware
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
5_6278455688045789623.pptx
5_6278455688045789623.pptx5_6278455688045789623.pptx
5_6278455688045789623.pptx
 
Networking
NetworkingNetworking
Networking
 
Network protocols and Java programming
Network protocols and Java programmingNetwork protocols and Java programming
Network protocols and Java programming
 

Mehr von VijiPriya Jeyamani

Mehr von VijiPriya Jeyamani (11)

Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...
Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...
Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...
 
Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...
Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...
Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...
 
Dr. J. VijiPriya Information and Communication Technology Chapter 5,6
Dr. J. VijiPriya  Information and Communication Technology Chapter 5,6Dr. J. VijiPriya  Information and Communication Technology Chapter 5,6
Dr. J. VijiPriya Information and Communication Technology Chapter 5,6
 
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...
Human Computer Interaction Chapter 2  Interaction and Interaction Design Basi...Human Computer Interaction Chapter 2  Interaction and Interaction Design Basi...
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...
 
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...
Human Computer Interaction Chapter 3 HCI in the Software Process and  Design ...Human Computer Interaction Chapter 3 HCI in the Software Process and  Design ...
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...
 
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
 
Human Computer Interaction Chapter 5 Universal Design and User Support - Dr....
Human Computer Interaction Chapter 5 Universal Design and User Support -  Dr....Human Computer Interaction Chapter 5 Universal Design and User Support -  Dr....
Human Computer Interaction Chapter 5 Universal Design and User Support - Dr....
 
Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya
 Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya
Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya
 
CLISP Lab Manual - Dr.J.VijiPriya
CLISP Lab Manual - Dr.J.VijiPriyaCLISP Lab Manual - Dr.J.VijiPriya
CLISP Lab Manual - Dr.J.VijiPriya
 
Integrative Programming and Technology Chapter 4- Dr. J. VijiPriya
Integrative Programming and Technology Chapter 4- Dr. J. VijiPriyaIntegrative Programming and Technology Chapter 4- Dr. J. VijiPriya
Integrative Programming and Technology Chapter 4- Dr. J. VijiPriya
 
Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriyaInformation and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
 

Kürzlich hochgeladen

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 

Kürzlich hochgeladen (20)

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 

IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya

  • 1. Web Services and Middleware; Network programming; Low level data communications Message and queuing services; 08/12/2015 1Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia Integrative Programming andTechnology
  • 2.  application integration technology  Allows applications to be integrated more rapidly, easily and less expensively  program-to- program interactions whereas web for program-to-user interactions  allow companies to reduce the cost of doing e-business, to deploy solutions faster and to open up new opportunities  Web services model built on emerging standards such as  HTTP  XML  Simple Object Access Protocol (SOAP)  Web Services Description Language (WSDL)  Universal Description, Discovery and Integration (UDDI) 08/12/2015 2Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 3.  developed in order to distribute an object and serve it to various users in the web environments  used in the server situations while solving the web-scalability problem of the other distributed object technologies  WSDL, and SOAP exploit XML.  WSDL is an XML describing the web service.  SOAP is an XML describing the called method, its parameters, and its return value, can be delivered over the HTTP 08/12/2015 3Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 4. 08/12/2015 4Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 5. 1. A client that wants to be serviced should first find the supported services from the pre-existing registry before compiling a code. 2. After finding its services through searching, the client gains the Web Service Description Language (WSDL) that a server previously registers. From theWSDL, the client knows the service provider location and the parameters to the found method. 3. After the client binds the described service during the compile time, it calls the local agent whenever the client invokes a method call, and the local agent delivers it to the server side agent through Simple Object Access Protocol (SOAP) over HTTP, FTP, SMTP, andTCP during the runtime. 4. The server side agent activates the appropriate object, and delivers the calls to the object. 08/12/2015 5Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 6. Network:  A network is a collection of computers and other devices that can send data to and receive data from each other.  A network is often connected by wires.  However, wireless networks transmit data through infrared light and microwaves. Node:  Each machine on a network is called a node.  Most nodes are computers, but printers, routers, bridges, gateways etc.. can also be nodes.  Nodes that are fully functional computers are also called hosts. Packet:  All modern computer networks are packet-switched networks: data traveling on the network is broken into chunks called packets and each packet is handled separately.  Each packet contains information about who sent it and where it's going. Protocol: A protocol is a precise set of rules defining how computers communicate: the format of addresses, how data is split into packets 08/12/2015 6Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 7. IP:  IP was designed to allow multiple routes between any two points and to route packets of data around damaged routers. TCP:  Since there are multiple routes between two points, and the packets that make up a particular data stream.  Furthermore, they may not arrive in the order they were sent, if they even arrive at all. UDP:  UDP is an unreliable protocol that does not guarantee that packets will arrive at their destination or that they will arrive in the same order they were sent. Ports:  Each computer with an IP address has several thousand logical ports.  Each port is identified by a number between 1 and 65,535. Each port can be allocated to a particular service.  Port numbers 1 through 255 are reserved by IP for well-known services If you connect to port 80 of a host, for instance, you may expect to find an HTTP server. 08/12/2015 7Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 8. Internet:  largest IP-based network for connecting machines together.  Java: easy-to-use, cross-platform model for network communications. What is a Socket?  Sockets are a means of using IP to communicate between machines, so sockets allow Java to interoperate with legacy systems by simply talking to existing servers using their pre-defined protocol.  Internet protocol: User Datagram Protocol (UDP) andTransmissionControl Protocol (TCP). Internet Addresses or IP Addresses  Every network node has an address, a series of bytes that uniquely identify it.  Internet addresses are manipulated in Java by the use of the InetAddress class. InetAddress takes care of the Domain Name System (DNS) look-up and reverse look-up;  IP addresses can be specified by either the host name or the raw IP address. InetAddress provides methods to getByName(), getAllByName(), getLocalHost(), getAddress(), etc.  IP addresses are a 32-bit number, often represented as a "quad" of four 8-bit numbers separated by periods.  They are organized into classes (A, B, C, D, and E). For example 126.255.255.255 Client/Server Computing- Java language communicate with remote file system 08/12/2015 8Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 9. How UDPclients and UDPservers communicate over sockets Creating UDP Servers: To create a server with UDP, do the following: 1. Create a DatagramSocket attached to a port. int port = 1234; DatagramSocket socket = new DatagramSocket(port); 2. Allocate space to hold the incoming packet, and create an instance of DatagramPacket to hold the incoming data. byte[] buffer = new byte[1024]; DatagramPacket packet = new DatagramPacket(buffer, buffer.length); 3. Block until a packet is received, then extract the information you need from the packet. // Block on receive() socket.receive(packet); // Extract the packet data byte[] data = packet.getData(); // Find out where packet came from // so we can reply to the same host/port InetAddress remoteHost = packet.getAddress(); int remotePort = packet.getPort(); 08/12/2015 9Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 10. Creating UDP Clients 1. First allocate space to hold the data we are sending and create an instance of DatagramPacket to hold the data. byte[] buffer = new byte[1024]; int port = 1234; InetAddress host = InetAddress.getByName("magelang.com"); DatagramPacket packet = new DatagramPacket(buffer, buffer.length, host, port); 2. Create a DatagramSocket and send the packet using this socket. DatagramSocket socket = new DatagramSocket();//free local port to use socket.send(packet); // Find out where we are sending from InetAddress localHostname = socket.getLocalAddress(); int localPort = socket.getLocalPort(); 08/12/2015 10Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 11. HowTCPclients andTCPservers communicate over sockets CreatingTCP Servers: To create aTCP server, do the following: 1. Create a ServerSocket attached to a port number. ServerSocket server = new ServerSocket(port); 2.Wait for connections from clients requesting connections to that port. // Block on accept() Socket channel = server.accept(); You'll get a Socket object as a result of the connection. 3. Get input and output streams associated with the socket. out = new PrintWriter (channel.getOutputStream()); out.println("Hey! I heard you over this socket!"); reader = new InputStreamReader (channel.getInputStream()); in = new BufferedReader (reader); Now you can read and write to the socket, thus, communicating with the client. String data = in.readLine(); 08/12/2015 11Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 12. CreatingTCP Clients: To create aTCP client, do the following: 1. Create a Socket object attached to a remote host, port. Socket client = new Socket(host, port); When the constructor returns, you have a connection. 2. Get input and output streams associated with the socket. out = new PrintWriter (client.getOutputStream()); out.println("Watson!" + "Come here...I need you!"); reader = new InputStreamReader (client.getInputStream()); in = new BufferedReader (reader); Now you can read and write to the socket, thus, communicating with the server. String data = in.readLine(); 08/12/2015 12Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 13. TCP/IP(Transmission Control Protocol/Internet Protocol)  The Protocol upon which the whole Internet is based  Each node must be configured forTCP/IP to function properly.  A software-based protocol  TCP/IP is basically the binding together of Internet Protocols used to connect hosts on the internet- Main ones are IP andTCP  TCP and IP have special packet structure  IP (Internet Protocol) is responsible for delivering packets of data between systems on the internet and specifies their format. Packets forwarded based on a four byte destination IP address (IP number) IP DOES NOT MAKE GUARANTEES! It is very simple - essentially: send and forget.  TCP (TransmissionControl Protocol) is responsible for verifying the correct delivery of data/packets from client to server. Data can be lost .SoTCP also adds support to detect errors and retransmit data until completely received 08/12/2015 13Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 14. 08/12/2015 14Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 15.  Version — Indicates the version of IP currently used.  IP Header Length (IHL) — Indicates the datagram header length in 32-bit words.  Type-of-Service — Specifies how an upper-layer protocol would like a current datagram to be handled, and assigns datagram various levels of importance.  Total Length — Specifies the length, in bytes, of the entire IP packet, including the data and header.  Identification — Contains an integer that identifies the current datagram. This field is used to help piece together datagram fragments.  Flags — Consists of a 3-bit field of which the two low-order (least-significant) bits control fragmentation. The low-order bit specifies whether the packet can be fragmented. The middle bit specifies whether the packet is the last fragment in a series of fragmented packets.The third or high-order bit is not used.  Fragment Offset — Indicates the position of the fragment’s data relative to the beginning of the data in the original datagram, which allows the destination IP process to properly reconstruct the original datagram.  Time-to-Live — Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded.  Protocol — Indicates which upper-layer protocol receives incoming packets after IP processing is complete.  Header Checksum — Helps ensure IP header integrity.  Source Address — Specifies the sending node.  Destination Address — Specifies the receiving node.  Options — Allows IP to support various options, such as security.  Data — Contains upper-layer sent in packet. 08/12/2015 15Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 16. 08/12/2015 16Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
  • 17.  There are 12 fields inTCP Packet:  Source Port and Destination Port — Identifies points at which upper- layer source and destination processes receiveTCP services.  Sequence Number In the connection-establishment phase, this field also can be used to identify an initial sequence number to be used in an upcoming transmission.  Acknowledgment Number — Contains the sequence number of the next byte of data the sender of the packet expects to receive.  Data Offset — Indicates the number of 32-bit words in theTCP header.  Reserved — Remains reserved for future use.  Flags — Carries a variety of control information, including the SYN and ACK bits used for connection establishment, and the FIN bit used for connection termination.  Window — Specifies the size of the sender’s receive window (that is, the buffer space available for incoming data).  Checksum — Indicates whether the header was damaged in transit.  Urgent Pointer — Points to the first urgent data byte in the packet.  Options — Specifies variousTCP options.  Data — Contains upper-layer sent in packet. 08/12/2015 17Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia