Thursday, December 11, 2008
Thursday, August 28, 2008
what is Payload?
Loosely coupled components can operate independently of each other with no problems. This is an excellent fit when designing Web services, where all components are not always available. Coupling generally refers to the act of joining two things together, such as the links in a chain. But in software development, coupling typically refers to the degree to which software components/modules depend upon each other. The degree to which components are linked defines whether they operate in a tightly coupled relationship or in a loosely coupled relationship. With tightly coupled components, each component and any auxiliary dependent objects must be present at execution time as well as compile time. On the other hand, loosely coupled components can operate independently from one another.
- Chief among the benefits of a service oriented architecture is that services and clients operate independently of their locations, known as location transparency. Learn some of the advantages of using it and also a few issues that could arise.
- One of the major benefits provided by a service oriented architecture (SOA) is the decoupling of the client requesting the service and the service itself.
- Through a registration and discovery mechanism, the SOA provides location transparency, which allows clients to not know (or care) about where a component or service is actually located.
URL
The idea is that a URL is a mechanical link to a resource's location, where it can be downloaded. For this reason, a URL contains a hostname and a local part, all of which can be resolved anywhere on the Internet.URL
A URL is a specialization of URI that defines the network location of a specific resource. Unlike a URN, the URL defines how the resource can be obtained. We use URLs every day in the form of http://damnhandy.com, etc. But a URL doesn’t have to be an HTTP URL, it can be ftp://damnhandy.com, smb://damnhandy.com, etc.
URI
A URI identifies a resource either by location, or a name, or both. More often than not, most of us use URIs that defines a location to a resource. The fact that a URI can identify a resources by both name and location has lead to a lot of the confusion in my opionion. A URI has two specializations known as URL and URN.
URN
What a URN tries to do is different. It tries to give a description of a resource without actually pointing at it. For example:urn:isbn:90-365-17273
A URI identifies a resource by name in a given namespace but not define how the resource maybe obtained. This type of URI is called a URN.
URI is merely the possibly overlapping union of strings that are a URL or a URN
The main objectives for SSL are:
Authenticating the client and server to each other: the SSL protocol supports the use of standard key cryptographic techniques (public key encryption) to authenticate the communicating parties to each other. Though the most frequent application consists in authenticating the service client on the basis of a certificate, SSL may also use the same methods to authenticate the client.
Ensuring data integrity: during a session, data cannot be either intentionally or unintentionally tampered with.
Securing data privacy: data in transport between the client and the server must be protected from interception and be readable only by the intended recipient. This prerequisite is necessary for both the data associated with the protocol itself (securing traffic during negotiations) and the application data that is sent during the session itself. SSL is in fact not a single protocol but rather a set of protocols that can additionally be further divided in two layers:
the protocol to ensure data security and integrity: this layer is composed of the SSL Record Protocol,
The protocols that are designed to establish an SSL connection: three protocols are used in this layer: the SSL Handshake Protocol, the SSL ChangeCipher SpecPprotocol and the SSL Alert Protocol. The SSL record protocol is responsible for data encryption and integrity. It is also used to encapsulate data sent by other SSL protocols, and therefore, it is also involved in the tasks associated with the SSL check data. The other three protocols cover the areas of session management, cryptographic parameter management and transfer of SSL messages between the client and the server. Prior to going into a more detailed discussion of the role of individual protocols and their functions let us describe two fundamental concepts related to the use of SSL.
Difference Between HTTP and HTTPS:
- HTTP utilizes tcp/udp (Transmission Control Protocol/User Datagram Protocol) port 80 to transfer packets for unencrypted web surfing. If you visit a website or webpage, and look at the address in the web browser, it will most likely begin with the following: http://. This means that the website is connected to your browser using the regular unsecure language, due to which there is a possiblilty for someone to spy on your computer’s conversation with the website. If you fill out a form on the website, someone might see the information you send to that site.
- HTTPS The "S" in HTTPS indicates a secure site. It is utilizes tcp/udp port 443 for encrypted web surfing via SSL (Secure Sockets Layer) or the more recent TLS (Transport Layer Security) protocols. HTTPS provides for reasonably secure bi-directional encrypted communication on the Internet. Https is used in many situations, such as log-in pages for banking, forms, corporate log ons, and other applications in which data needs to be secure. However, if not implemented properly, https is not infallible, and therefore it is extremely important for end users to be wary about accepting questionable certificates and cautious with their personal information while using the Internet.
In computer networks location transparency describes names used to identify network resources independent of both the user's location and the resource location.
A distributed system will need to employ a networked scheme for naming resources.
In other words it is an idea that the resources can be accessed by a user from anywhere on the network without knowing where the resource is located. A file could be on the user's own PC, or thousands of miles away on other servers.
url:
Uniform Resource Locator is a compact string of characters used to represent a resource available on the Internet.[1] In popular usage and many technical documents, it is a synonym for Uniform Resource Identifier (URI).
uri:
a Uniform Resource Identifier (URI) is a compact string of characters used to identify or name a resource on the Internet. The main purpose of this identification is to enable interaction with representations of the resource over a network, typically the World Wide Web, using specific protocols. URIs are defined in schemes defining a specific syntax and associated protocols.
urn:
A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that uses the urn scheme, and does not imply availability of the identified resource. Both URNs (names) and URLs (locators) are URIs, and a particular URI may be a name and a locator at the same time.
Wednesday, August 27, 2008
SECURE SOCKET LAYER(SSL):How It Works
1.An SSL Certificate enables encryption of sensitive information during online transactions.
2.Each SSL Certificate contains unique, authenticated information about the certificate owner.
3.A Certificate Authority verifies the identity of the certificate owner when it is issued.
SECURE SOCKET LAYER
Monday, August 4, 2008
Dynamic Link Library
Memory management
In Win32, the DLL files are organized into sections. Each section has its own set of attributes, such as being writable or read-only, executable (for code) or non-executable (for data), and so on.
The code in a DLL is usually shared among all the processes that use the DLL; that is, they occupy a single place in physical memory, and do not take up space in the page file. If the physical memory occupied by a code section is to be reclaimed, its contents are discarded, and later reloaded directly from the DLL file as necessary.
In contrast to code sections, the data sections of a DLL are usually private; that is, each process using the DLL has its own copy of all the DLL's data. Optionally, data sections can be made shared, allowing inter-process communication via this shared memory area. However, because user restrictions do not apply to the use of shared DLL memory, this creates a security hole; namely, one process can corrupt the shared data, which will likely cause all other sharing processes to behave undesirably. For example, a process running under a guest account can in this way corrupt another process running under a privileged account. This is an important reason to avoid the use of shared sections in DLLs.
If a DLL is compressed by certain executable packers (e.g. UPX), all of its code sections are marked as read-and-write, and will be unshared. Read-and-write code sections, much like private data sections, are private to each process. Thus DLLs with shared data sections should not be compressed if they are intended to be used simultaneously by multiple programs, since each program instance would have to carry its own copy of the DLL, resulting in increased memory consumption.
XSD Restrictions/Facets
If an XML element is of type "xs:date" and contains a string like "Hello World", the element will not validate.
With XML Schemas, you can also add your own restrictions to your XML elements and attributes. These restrictions are called facets.
In otherwards,Restrictions are used to define acceptable values for XML elements or attributes. Restrictions on XML elements are called facets.
The following type of restrictions are allowed in xml schema:
Restrictions on Values
Restrictions on a Series of Values
Restrictions on Whitespace Characters
Restrictions on Length
Restrictions for Datatypes and
Other Restrictions on a Series of Values
Definition For COM
OVERVIEW OF CORBA
Sunday, August 3, 2008
COM
CORBA
Saturday, August 2, 2008
Dynamic Link Library(DLL)
Dynamic linking differs from static linking in that it allows an executable module (either a .dll or .exe file) to include only the information needed at run time to locate the executable code for a DLL function. In static linking, the linker gets all of the referenced functions from the static link library and places it with your code into your executable.
Using dynamic linking instead of static linking offers several advantages. DLLs save memory, reduce swapping, save disk space, upgrade easier, provide after-market support, provide a mechanism to extend the MFC library classes, support multilanguage programs, and ease the creation of international versions.
Document Object model(DOM)
The XML DOM (Document Object Model) defines a standard way for accessing and manipulating XML documents.
please go through this link http://www.omg.org/gettingstarted/corbafaq.htm
Thursday, July 31, 2008
Dyanamic Link Library
Facets in XML Schema
Friday, July 25, 2008
XML Schemas are the Successors of DTDs
We think that very soon XML Schemas will be used in most Web applications as a replacement for DTDs. Here are some reasons:
XML Schemas are extensible to future additions
XML Schemas are richer and more powerful than DTDs
XML Schemas are written in XML
XML Schemas support data types
XML Schemas support namespaces
Tuesday, July 22, 2008
XML Schema
Please go through this tutorial for XML Schema from w3schools.
http://www.w3schools.com/schema/schema_intro.asp
Saturday, July 19, 2008
The Benefits of XSLT
The usual benefit cited for higher-level languages is development productivity. An XSLT application for transforming XML data structures can be made much more resilient to changes in the details of the XML documents than a procedural application coded using the low-level DOM and SAX interfaces. In the database world this feature is known as data independence, and it was the quest for data independence that led to the success of declarative languages like SQL and the demise of the older navigational data access languages. I firmly believe the same will happen in the XML world.
As with all declarative languages, there is a performance penalty. But for the vast majority of applications, the performance of today's XSLT processors is already good enough to meet the application requirements, and it is getting better.
USE OF SCRIPTING LANGUAGE
Scripting languages aren't intended for writing applications from scratch; they are intended primarily for plugging together components.
Scripting languages such as Perl,Visual Basic, and the Unix shells represent a very different style of programming than system programming languages.
In order to simplify the task of connecting components, scripting languages tend to be typeless.A typeless language makes it much easier to hook together components.
Why Use a DTD?
- With a DTD, each of your XML files can carry a description of its own format.
- With a DTD, independent groups of people can agree to use a standard DTD for interchanging data.
- Your application can use a standard DTD to verify that the data you receive from the outside world is valid.
- You can also use a DTD to verify your own data.
Friday, July 18, 2008
Entity
For Example: An entity declaration says, "wherever you see X, replace it with Y". Then, you sprinkle a bunch of X's around your document, which are the entity references. When the XML parser sees an X, it mentally substitutes Y in its place.
Parsed vs. Unparsed Entities
A Document Type Definition (DTD) defines the legal building blocks of an XML document. It defines the document structure with a list of legal elements and attributes.
A DTD can be declared inline inside an XML document, or as an external reference.
Internal DTD Declaration:
If the DTD is declared inside the XML file, it should be wrapped in a DOCTYPE definition with the following syntax:
External DTD Declaration:
If the DTD is declared in an external file, it should be wrapped in a DOCTYPE definition with the following syntax:
The DTD can contain several different types of declarations:
- Element declarations let you specify what kinds of tags can be used, and what (if anything) can appear inside the contents of the element.
- Attribute declarations define what attributes you can use inside a given element.
- Entity declarations define chunks of fixed text that can be included elsewhere.
- Notation declarations define file types (like JPG and WAV files) so you can refer to non-XML files like image and sound files.
DOCTYPE Declaration & DTDs
External DTD
In order to reference an external DTD, you must change both the XML declaration and the DOCTYPE declaration.
XML schema
defines elements that can appear in a document
defines attributes that can appear in a document
defines which elements are child elements
defines the order of child elements
defines the number of child elements
defines whether an element is empty or can include text
defines data types for elements and attributes
defines default and fixed values for elements and attributes
Definition of DTD
A DTD can be declared inline inside an XML document, or as an external reference.
VB script -basic concept
VBScript is a scripting language
A scripting language is a lightweight programming language
VBScript is a light version of Microsoft's programming language Visual Basic
How Does it Work?
When a VBScript is inserted into a HTML document, the Internet browser will read the HTML and interpret the VBScript. The VBScript can be executed immediately, or at a later event.
Thursday, July 17, 2008
Four key original design goals for Unicode :
- To create a universal standard that covered all writing systems.
- To use an efficient encoding that avoided mechanisms such as code page switching, shift-sequences and special states.
- To use a uniform encoding width in which each character was encoded as a 16-bit value.
- To create an unambiguous encoding in which any given 16-bit value always represented the same character regardless of where it occurred in the data.
Types of scripting languages
- Job control languages and shells
- GUI Scripting
- Application-specific languages
- Web browsers
- Web servers
- Text processing languages
- General-purpose dynamic languages
- Extension/embeddable languages
Java script
What is scripting?
Scripts may be evaluated as a document loads to modify the contents of the document dynamically.
Scripts may accompany a form to process input as it is entered. Designers may dynamically fill out parts of a form based on the values of other fields. They may also ensure that input data conforms to predetermined ranges of values, that fields are mutually consistent, etc.
Scripts may be triggered by events that affect the document, such as loading, unloading, element focus, mouse movement, etc.
Scripts may be linked to form controls (e.g., buttons) to produce graphical user interface elements.
Mainframe systems are designed to be used by large numbers of people. Most of those who interact with mainframes are end users— people who use the applications that are hosted on the system. However, because of the large number of end users, applications running on the system, and the sophistication and complexity of the system software that supports the users and applications, a variety of roles are needed to operate and support the system.
For Example:
In the IT field, these roles are referred to by a number of different titles, such as:
System programmers
System administrators
Application designers and programmers
System operators
Production control analysts
Interpreted (not compiled) by client. Compiled bytecodes downloaded from server,
executed on client.
Object-based. Uses built-in, extensible Object-oriented. Applets consist of
objects, but no classes or inheritance. object classes with inheritance
Code integrated with, and embedded Applets distinct from HTML
in, HTML. (accessed from HTML pages).
Variable data types not declared Variable data types must be
(loose typing). declared (strong typing).
Dynamic binding. Object references Static binding. Object references must
checked at runtime. exist at compile-time.
Cannot automatically write to hard Cannot automatically write to hard
disk. disk.
WAT IS JavaScript
JavaScript, despite the name, is essentially unrelated to the Java programming language, although both have the common C syntax, and JavaScript copies many Java names and naming conventions. The language was originally named "LiveScript" but was renamed in a co-marketing deal between Netscape and Sun, in exchange for Netscape bundling Sun's Java runtime with their then-dominant browser. The key design principles within JavaScript are inherited from the Self programming language."JavaScript" is a trademark of Sun Microsystems.
A scripting language, script language or extension language, is a programming language that controls a software application. "Scripts" are often treated as distinct from "programs", which execute independently from any other application. At the same time they are distinct from the core code of the application, which is usually written in a different language, and by being accessible to the end user they enable the behavior of the application to be adapted to the user's needs. Scripts are often, but not always, interpreted from the source code or "semi-compiled" to bytecode which is interpreted, unlike the applications they are associated with, which are traditionally compiled to native machine code for the system on which they run. Scripting languages are nearly always embedded in the application with which they are associated.
Wednesday, July 16, 2008
About Unicode
Incorporating Unicode into client-server or multi-tiered applications and websites offers significant cost savings over the use of legacy character sets. Unicode enables a single software product or a single website to be targeted across multiple platforms, languages and countries without re-engineering. It allows data to be transported through many different systems without corruption.
What is a mainframe?
Capabilities of Mainframe
Mainframe architecture includes a variety of network capabilities. Some of these capabilities include:
- IP communication among large numbers of Linux and operating systems running as Virtual machine.
- IP communication among independent operating systems running in logical partitions the same machine .
- System Network Architecture suite of protocols and equipment, including subarea and Advanced Peer-to-Peer Networking with high performance routing.
- Integration of SNA into IP networks using Enterprise technology.
Unicode
ISO-8859-1
Also know as Latin1, includes the latin based languages of the world. It includes most western european languges.
Characteristics of mainframes
2) Maximum I/O connectivity, which means mainframes excel at providing for huge disk farms.
3) Maximum I/O bandwidth, so connections between drives and processors have few choke-points.
4) Reliability--mainframes often allow for "graceful degradation" and service while the system is running.
Mainframes
what classifies a computer as a mainframe?
- A mainframe has 1 to 16 CPU's (modern machines more)
- Memory ranges from 128 Mb over 8 Gigabyte on line RAM
- Its processing power ranges from 80 over 550 Mips
- It has often different cabinets for
Storage
I/O
RAM - Separate processes (program) for
task management
program management
job management
serialization
catalogs
inter address space
communication
Historically, a mainframe is associated with centralized computing opposite from distributed computing. Meaning all computing takes (physically) place on the mainframe itself.
Mainframe Definition
MAINFRAME COMPUTERS
The term ‘mainframe’ was coined in the 1970s when the smaller minicomputers began available. In those days mainframes were huge and could occupy a whole room or take out an entire floor. Today mainframes have decreased in size nut with in an increase in computing power and are sometimes referred to as large servers.
In the 1960s and the 1970s, mainframes were popular, with quite a number of manufacturers, but the arrival of the cheaper microcomputers and the concept of distributed computing reduced the demand for mainframes and a lot of the companies went under.
Sunday, July 13, 2008
Why would you want to use a proxy? As I mentioned before, for security. If you are using a good proxy, the web sites you visit will not be able to tell who you actually are, or where you actually came from. For example, if you use a proxy and visit the "Snoop Page", the page most likely will not be able to gather accurate information on your connection.
The technical definition for "Proxy": The technique in which one host, usually a router, answers Address Resolution Protocol (ARP) requests intended for another machine. By "faking" its identity, the router accepts responsibility for routing packets to the "real" destination. Proxy ARP allows a site to use a single IP address with two physical networks. A proxy is a server that will act as the "middle-man" between you and whatever else you connect to. It is most commonly used as a "safety net" for your connection. Using a proxy usually hides the true identity of the person using it.
Wednesday, July 9, 2008
Function of the Web Browser
It also referred to as web clients or universal clients,because in the client/server model,the browser functions as the client program.
Web Browser can be of two types
1.Text based(view only text)
2.Graphical based(allows user to see more of what the www has to offer suchas graphics,photos and multimedia)
Some common browsers are:
- Mosaic
- Opera
- Amaya
- Hot Java
- Lynx(Text based)
Tuesday, July 8, 2008
what is www?
The World Wide Web (commonly shortened to the Web) is a system of interlinked hypertext documents accessed via the Internet. With a Web browser, a user views Web pages that may contain text, images, videos, and other multimedia and navigates between them using hyperlinks. The World Wide Web was created in 1989 by Sir Tim Berners-Lee, working at the European Organization for Nuclear Research (CERN) in Geneva, Switzerland and released in 1992. Since then, Berners-Lee has played an active role in guiding the development of Web standards (such as the markup languages in which Web pages are composed), and in recent years has advocated his vision of a Semantic Web.
what is internet?
internet is nothing but networks of network with which we can share the information across globe.the world wide web uses internet to privide the information.
Monday, July 7, 2008
An application server is a server program in a computer in a distributed network that provides the business logic for an application program. The application server is frequently viewed as part of a three-tier application, consisting of a graphical user interface (GUI) server, an application (business logic) server, and a database and transaction server. More descriptively, it can be viewed as dividing an application into:
A first-tier, front-end, Web browser-based graphical user interface, usually at a personal computer or workstation
A middle-tier business logic application or set of applications, possibly on a local area network or intranet server
A third-tier, back-end, database and transaction server, sometimes on a mainframe or large server
Advantage Of XML
The first benefit of XML is that because you are writing your own markup language, you are not restricted to a limited set of tags defined by proprietary vendors.Searching the data is easy and efficient. The code is much more legible to a person coming into the environment with no prior knowledge. In the above example, it is obvious that
Additional specifications of Web Service
WS-Security
Defines how to use XML Encryption and XML Signature in SOAP to secure message exchanges, as an alternative or extension to using HTTPS to secure the channel.
WS-Reliability
An OASIS standard protocol for reliable messaging between two Web services.
WS-Transaction
A way of handling transactions.
Types of Server
Audio/Video servers:-It bring multimedia capabilities to Web sites by enabling them to broadcast streaming multimedia content.
Chatservers :-It enable a large number of users to exchange information in an environment similar to Internet newsgroups that offer real-time discussion capabilities.
Fax server:-It is an ideal solution for organizations looking to reduce incoming and outgoing telephone resources but that need to fax actual documents.
One of the oldest of the Internet services, File Transfer Protocol makes it possible to move one or more files securely between computers while providing file security and organization as well as transfer control.
Proxy Servers:-Proxy servers sit between a client program (typically a Web browser) and an external server (typically another server on the Web) to filter requests, improve performance, and share connections.
Telnet server :-It enables users to log on to a host computer and perform tasks as if they're working on the remote computer itself.
Web service
The W3C Web service definition encompasses many different systems, but in common usage the term refers to clients and servers that communicate using XML messages that follow the SOAP standard. In such systems, there is often machine-readable description of the operations offered by the service written in the Web Services Description Language (WSDL)
What is Server?
what services can be offered?
A service is any application that is accessed by means of a URL for example Google. The output of a service may be XML, HTML an image etc. And in some cases the output of a service may be used as input to other services or as a query for the portal. Examples of integration of services in the portal are:
*a Google image search with an author name as search parameter
*annotation of records
In some cases the result of a link to a service is a web page ,in other cases the results can be integrated in the presentation (like an image or XML with a known schema). It may also possible to process the output of a service with a known HTML layout and make the results available to the portal. It is obvious that there are not very many restrictions in what type of services can potentially be offered to the user. Besides that a lot of intelligence can be added to the portal in dealing with these services in an appropriate way. For example some services might be accessed automatically based on other criteria than only the presence of a metadata field
What is Meant by XML?
Usage of web services
Thin client :
1. A thin client machine is going to communicate with a central processing server.
2. Thin may be defined as simply not needing the software or operating system installed on the user machine
3. This allows all end users' systems to be centrally managed and software deployed on a central server location as opposed to installed on each individual system.
Thick client :
1. A thick client will provide users with more features, graphics and choices making the applications more customizable.
2. Unlike thin clients, thick clients do not rely on a central processing server because the processing is done locally on the user system, and the server is accessed primarily for storage purposes.
3. Thick clients often are not well-suited for public environments.
.NET
The .NET Framework is a development and execution environment that allows different programming languages and libraries to work together seamlessly to create Windows-based applications that are easier to build, manage, deploy, and integrate with other networked systems.
Built on Web service standards, .NET enables both new and existing personal and business applications to connect with software and services across platforms, applications, and programming languages. These connections give users access to key information, whenever and wherever you need it.
SOAP
SOAP (Simple Object Access Protocol) is a way for a program running in one kind of operating system (such as Windows 2000) to communicate with a progam in the same or another kind of an operating system (such as Linux) by using the World Wide Web's Hypertext Transfer Protocol (HTTP)and its Extensible Markup Language (XML) as the mechanisms for information exchange.
An advantage of SOAP is that program calls are much more likely to get through firewall servers that screen out requests other than those for known applications (through the designated port mechanism). Since HTTP requests are usually allowed through firewalls, programs using SOAP to communicate can be sure that they can communicate with programs anywhere.
Reusable application components
There are things different applications need very often.
Web services can offer application components like currency conversion, weather reports or even language translation as services.
Ideally, there will only be one type of each application component, and anyone can use it in their application.
Connect existing software
Web services help solve the interoperability problem by giving different applications a way to link their data.
Using Web services you can exchange data between different applications and different platforms.
White Pages — address, contact, and known identifiers;
Yellow Pages — industrial categorizations based on standard taxonomies;
Green Pages — technical information about services exposed by the business.
The SOAP specification contains no mention of security facilities.
SOAP 1.1 specification does not specify a default encoding for the message body. There is an encoding defined in the spec, but it is not required that you use this encoding to be compliant: Any custom encoding that you choose can be specified in the encodingStyle attribute of the message or of individual elements in the message.
Because SOAP deals with objects serialized to plain text and not with stringified remote object references (interoperable object references, IORs, as defined in CORBA), distributed garbage collection has no meaning.
SOAP clients do not hold any stateful references to remote objects.
Service provider
Why we use SOAP?
Universal Description Discovery And Integration(UDDI)
- It is a directory for storing information about web services.
- It is a directory of web service interfaces described by WSDL
- It communicates via SOAP
- It is built into the Microsoft .NET platform.
Difference between Web server and Application server?
A Web server serves pages Application server provides
for viewing in a Web browser methods that client applications
can call
A Web server exclusively Whereas an application server
handles HTTP requests serves business logic to
application programs through any
number of protocols.
Where is SOAP used?
One of the most important uses of SOAP is to help enable XML Web Services. A web Service is an application provided as a service on the web. They are functional software components that can be accessed over the Internet. Web Services combines the best of component-based development and are based on Internet Standards that supports communication over the net.
SOAP
SOAP stands for Simple Object Access Protocol
SOAP is a communication protocol
SOAP is for communication between applications
SOAP is a format for sending messages
SOAP is designed to communicate via Internet
SOAP is platform independent
SOAP is language independent
SOAP is based on XML
SOAP is simple and extensible
SOAP allows you to get around firewalls
SOAP will be developed as a W3C standard
PROXY SERVER
Proxy servers sit between a client program typically a Web browser and an external server (typically another server on the Web) to filter requests, improve performance, and share connections.
FTP SERVER
One of the oldest of the Internet services, File Transfer Protocol makes it possible to move one or more files securely between computers while providing file security and organization as well as transfer control.
Types of servers
- Web server
- Proxy server
- FTP server
A proxy server is a server which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server requesting some services such as file,connection,web page,or other resources available from a different server. A proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server that passes all request and replies unmodified is usually called a gateway.
WEB SERVER
A Web server serves static content to a web brower by loading a file from a disk and serving it across the network to a user's web brower. This entire exchange is mediated by the brower and servering talkingto each otherusing HTTP.
SOAP
Advantages:
- Using SOAP over HTTP allows for easier communication through proxies and firewalls than previous remote execution technology.
- SOAP is versatile enough to allow for the use of different transport protocols. The standard stacks use HTTP as a transport protocol, but other protocols are also usable (e.g. SMTP).
- SOAP is platform independent.
- SOAP is language independent.
- SOAP is simple and extensible.
Sunday, July 6, 2008
"Internet Information Service" -- IIS
Internet Information Services (IIS) 6.0 is a powerful Web server that provides a highly reliable, manageable, and scalable Web application infrastructure for all versions of Windows Server 2003. IIS helps organizations increase Web site and application availability while lowering system administration costs. IIS 6.0 supports the Microsoft Dynamic Systems Initiative (DSI) with automated health monitoring, process isolation, and improved management capabilities. In IIS 6.0, an isolation mode that simulates the IIS 5.0 Web process model. Also called compatibility mode
Difference B/W Internet and World Wide Web
This is another difference between the Internet and the World Wide Web: the Internet supports many protocols, while the WWW is just one protocol of the many supported.
Web Server
Simple Object Acess Protocol (SOAP)
1.An envelope that defines a framework for describing what is in a message and how to process it
2. A set of encoding rules for expressing instances of application-defined datatypes
3. A convention for representing remote procedure calls and responses.
SOAP can potentially be used in combination with a variety of other protocols
Web Services Description Language (WSDL)
Universal Description Discovery And Integration (UDDI)
Web Browser
Thick client
work groups
Web Services- Thin client
Saturday, July 5, 2008
Web services
Internet and WWW are not the same thing.
Internet-It is massive public broadcast.It is combn. of small digital subnetworks that share cables and computers.It provides structure.
WWW-It is single largest & most popular subnetworks on the Internet.It provides dynamic n/w
Thursday, July 3, 2008
Welcome!
This blog is intended to give an insight on Web Services. Through this blog we can share interesting facts,concepts and other titbits related to Web services, XML and related stuff. Apart from the syllabus, you can learn new things relevant which would be very useful. I have created this blog for your own good. Make the best use of it!
Note:
- Contribution to the blog will carry marks
- Avoid irrelevant posts
- Do not post redundant information
- Before posting any information just check whether if anybody else have posted the same
Rajitha