SlideShare uma empresa Scribd logo
1 de 21
Presents Introduction  To Web Services
Overview As an example we consider Ashram Hotels, a five star hotel.   Ashram Hotels has been in hospitality business for more than 20 years and has acquired many     different  application systems which work on different operating systems.  Their goal is to facilitate data transfer between these systems and make data access seamless Confidential
Data Data exists in text files, excel sheets, databases  and other propretiary formats.  These need to be transferred between one system to another say Housekeeping and Reservation systems. Data access to the user should be seamless – that they need not log on to different systems to access information.   Confidential
Ashram Hotels Technology -Systems Confidential SYSTEMS ,[object Object]
 Customer Relationship Management (CRM) will be compatible with PMS, Reservation System and other systems.e-Mail Server CRM Reservation System PMS SERVICES Services consists of: ,[object Object]
Wireless services for all wireless clients internal and external.
Delivery.com is a service where guests can order from nearby restaurants, laundry etc. e-Fax VOIP G-Maps Delivery.com Wireless
Access To access the various systems  in previous slide employee and also guests (for some of the systems) need an interface (client interface).  These can be a web page, an application, mobile device etc.  The card key system also needs to de-activate when the guest checks out which is another client interface.  Confidential
Ashram Hotels Technology - Clients Confidential CLIENTS ,[object Object]
 Kiosks are available for check-In and other guest services.
Microsoft Surface (MS Surface) available for guests in the lobby  .
Online Reservations, Wireless Communications and E-fax are other technical features available for guests.
Legacy methods of reservations and check-in and out will also be options for guests – like reception desk, TV and even Fax. Kiosks Room Key/Check In MS Surface iPhone Online Res. Wireless Devices eFax TV Res.
Issues There are different clients and systems which may not be compatible with some of the clients.  With self-reservation on the rise Ashram hotels is behind the competition. Employees and guests need to refer to say Google Maps for directions rather than that being integrated.   Reports to directors and executives takes many weeks to prepare.  Confidential
Solution Integrating these various systems to the clients is the solution.  The best solution is to utilize what systems in place and integrate them with the clients and between themselves.  The method of integration is called middleware services and sometimes loosely called web services- as most of the data is transferred over the web via HTTP protocol.  Confidential
Ashram Hotels – Integration Platform Confidential
Middleware Services Confidential Each system has different  protocols to communicate with their middle-ware.  Some use XML (a customized HTML)  - a stream or a file is passed.  Documents can also be passed between systems MS technology ‘s SOAP has recently gained a lot of popularity  with Web Services .  Web Services is the global method which includes receiving messages from all kinds of clients i.e. wireless devices and traditional systems. Middleware Services  can be loosely defined as  services which bring about communication between heterogeneous application systems.  E.g. J2EE app with .NET app or any other proprietary applications.  The middleware connects users /systems with other systems.
Between Systems Middleware Systems exist internally between say two or more systems which may have to be written.  These integration APIs (Application Programming Interface) can be bought or written. WARNING: Sometimes an API is not available between systems.   Confidential
Web Services When two systems cannot be integrated or an external client wants to get access one of the system say Expedia would like to access available rooms; then we define a middleware  service for users/systems to access data on Ashram application system. To implement  the middleware we use web services which use open protocol over HTML.   As the data is request/response and is transmitted over the web these services are called web services. Amazon and Google provide web services for external users/vendors. Confidential
Web Services 2 What are Web Services? Web services are application components Web services communicate using open protocols Web services are self-contained and self-describing Web services can be discovered using UDDI Web services can be used by other applications XML is the basis for Web services Reference: http://www.w3schools.com/webservices/ws_intro.asp Confidential
What is SOAP? SOAP is an XML-based protocol to let applications exchange information over HTTP. Or more simple: SOAP is a protocol for accessing a Web Service. SOAP stands for Simple Object Access Protocol SOAP is a communication protocol SOAP is a format for sending messages SOAP is designed to communicate via Internet  SOAP is platform independent SOAP is language independent SOAP is based on XML SOAP is simple and extensible SOAP allows you to get around firewalls SOAP is a W3C standard Confidential

Mais conteúdo relacionado

Mais procurados

Xml For Dummies Chapter 15 Using Xml With Web Servicesit-slideshares.blogsp...
Xml For Dummies   Chapter 15 Using Xml With Web Servicesit-slideshares.blogsp...Xml For Dummies   Chapter 15 Using Xml With Web Servicesit-slideshares.blogsp...
Xml For Dummies Chapter 15 Using Xml With Web Servicesit-slideshares.blogsp...phanleson
 
SOA - From Webservices to APIs
SOA - From Webservices to APIsSOA - From Webservices to APIs
SOA - From Webservices to APIsHolger Reinhardt
 
Introduction to web services and how to in php
Introduction to web services and how to in phpIntroduction to web services and how to in php
Introduction to web services and how to in phpAmit Kumar Singh
 
Web programming
Web programmingWeb programming
Web programmingsowfi
 
Web Service
Web ServiceWeb Service
Web ServiceKumar S
 
Web service Introduction
Web service IntroductionWeb service Introduction
Web service IntroductionMadhukar Kumar
 
Xml web services
Xml web servicesXml web services
Xml web servicesRaghu nath
 
Khude Barta - Online Messaging Application
Khude Barta - Online Messaging ApplicationKhude Barta - Online Messaging Application
Khude Barta - Online Messaging ApplicationArman Hossain
 
Web Services - Architecture and SOAP (part 1)
Web Services - Architecture and SOAP (part 1)Web Services - Architecture and SOAP (part 1)
Web Services - Architecture and SOAP (part 1)Martin Necasky
 
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...ecosio GmbH
 
Topic5 Web Services
Topic5 Web ServicesTopic5 Web Services
Topic5 Web Servicessanjoysanyal
 
Day1 : web service basics
Day1 :  web service basics Day1 :  web service basics
Day1 : web service basics Testing World
 
Rest vs soap
Rest vs soapRest vs soap
Rest vs soapNaseers
 

Mais procurados (20)

Introduction to Web Services
Introduction to Web ServicesIntroduction to Web Services
Introduction to Web Services
 
Xml For Dummies Chapter 15 Using Xml With Web Servicesit-slideshares.blogsp...
Xml For Dummies   Chapter 15 Using Xml With Web Servicesit-slideshares.blogsp...Xml For Dummies   Chapter 15 Using Xml With Web Servicesit-slideshares.blogsp...
Xml For Dummies Chapter 15 Using Xml With Web Servicesit-slideshares.blogsp...
 
SOA - From Webservices to APIs
SOA - From Webservices to APIsSOA - From Webservices to APIs
SOA - From Webservices to APIs
 
Introduction to web services and how to in php
Introduction to web services and how to in phpIntroduction to web services and how to in php
Introduction to web services and how to in php
 
SOA & WCF
SOA & WCFSOA & WCF
SOA & WCF
 
Web programming
Web programmingWeb programming
Web programming
 
Web Service
Web ServiceWeb Service
Web Service
 
Web service Introduction
Web service IntroductionWeb service Introduction
Web service Introduction
 
Web Services
Web ServicesWeb Services
Web Services
 
Webservices
WebservicesWebservices
Webservices
 
Xml web services
Xml web servicesXml web services
Xml web services
 
Khude Barta - Online Messaging Application
Khude Barta - Online Messaging ApplicationKhude Barta - Online Messaging Application
Khude Barta - Online Messaging Application
 
Web Services - Architecture and SOAP (part 1)
Web Services - Architecture and SOAP (part 1)Web Services - Architecture and SOAP (part 1)
Web Services - Architecture and SOAP (part 1)
 
CISSPills #1.03
CISSPills #1.03CISSPills #1.03
CISSPills #1.03
 
Overview of web services
Overview of web servicesOverview of web services
Overview of web services
 
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
Introduction to Service Oriented Architectures, SOAP/WSDL Web Services and RE...
 
Topic5 Web Services
Topic5 Web ServicesTopic5 Web Services
Topic5 Web Services
 
Understanding Web services
Understanding Web servicesUnderstanding Web services
Understanding Web services
 
Day1 : web service basics
Day1 :  web service basics Day1 :  web service basics
Day1 : web service basics
 
Rest vs soap
Rest vs soapRest vs soap
Rest vs soap
 

Destaque

101129 ssa ppt
101129 ssa ppt101129 ssa ppt
101129 ssa pptfbean
 
Linguarum comparatio work in progress
Linguarum comparatio    work in progressLinguarum comparatio    work in progress
Linguarum comparatio work in progressmafaldina95
 
Elu ohus pp[1]
Elu ohus pp[1]Elu ohus pp[1]
Elu ohus pp[1]Marju
 
2011 KPA Member Accomplish
2011 KPA Member Accomplish2011 KPA Member Accomplish
2011 KPA Member AccomplishSarah Burress
 
2013 KPA Awards Presentation
2013 KPA Awards Presentation2013 KPA Awards Presentation
2013 KPA Awards PresentationSarah Burress
 
2012 Annual Awards Luncheon
2012 Annual Awards Luncheon2012 Annual Awards Luncheon
2012 Annual Awards LuncheonSarah Burress
 
Digital into the Third Dimension
Digital into the Third DimensionDigital into the Third Dimension
Digital into the Third DimensionProphets Agency
 
La lirica amorosa nella Grecia del periodo arcaico
La lirica amorosa nella Grecia del periodo arcaicoLa lirica amorosa nella Grecia del periodo arcaico
La lirica amorosa nella Grecia del periodo arcaicomafaldina95
 
Christmas Presentation
Christmas PresentationChristmas Presentation
Christmas Presentationmhaaga
 
2013 KPA Foundation Spring Academic Conference Slideshow
2013 KPA Foundation Spring Academic Conference Slideshow2013 KPA Foundation Spring Academic Conference Slideshow
2013 KPA Foundation Spring Academic Conference SlideshowSarah Burress
 
2012 Annual Awards Ceremony
2012 Annual Awards Ceremony2012 Annual Awards Ceremony
2012 Annual Awards CeremonySarah Burress
 
2011 KPA Member Accomplishments
2011 KPA Member Accomplishments2011 KPA Member Accomplishments
2011 KPA Member AccomplishmentsSarah Burress
 
2014 New Board Member Orientation
2014 New Board Member Orientation2014 New Board Member Orientation
2014 New Board Member OrientationSarah Burress
 
2011 KPA Member Accomplishments
2011 KPA Member Accomplishments2011 KPA Member Accomplishments
2011 KPA Member AccomplishmentsSarah Burress
 

Destaque (20)

Nivel 1
Nivel 1Nivel 1
Nivel 1
 
101129 ssa ppt
101129 ssa ppt101129 ssa ppt
101129 ssa ppt
 
Linguarum comparatio work in progress
Linguarum comparatio    work in progressLinguarum comparatio    work in progress
Linguarum comparatio work in progress
 
Why hibernater1
Why hibernater1Why hibernater1
Why hibernater1
 
Elu ohus pp[1]
Elu ohus pp[1]Elu ohus pp[1]
Elu ohus pp[1]
 
2011 KPA Member Accomplish
2011 KPA Member Accomplish2011 KPA Member Accomplish
2011 KPA Member Accomplish
 
2013 KPA Awards Presentation
2013 KPA Awards Presentation2013 KPA Awards Presentation
2013 KPA Awards Presentation
 
2012 Annual Awards Luncheon
2012 Annual Awards Luncheon2012 Annual Awards Luncheon
2012 Annual Awards Luncheon
 
Digital into the Third Dimension
Digital into the Third DimensionDigital into the Third Dimension
Digital into the Third Dimension
 
La lirica amorosa nella Grecia del periodo arcaico
La lirica amorosa nella Grecia del periodo arcaicoLa lirica amorosa nella Grecia del periodo arcaico
La lirica amorosa nella Grecia del periodo arcaico
 
The Age Of Confusion
The Age Of ConfusionThe Age Of Confusion
The Age Of Confusion
 
Christmas Presentation
Christmas PresentationChristmas Presentation
Christmas Presentation
 
2013 KPA Foundation Spring Academic Conference Slideshow
2013 KPA Foundation Spring Academic Conference Slideshow2013 KPA Foundation Spring Academic Conference Slideshow
2013 KPA Foundation Spring Academic Conference Slideshow
 
2012 Annual Awards Ceremony
2012 Annual Awards Ceremony2012 Annual Awards Ceremony
2012 Annual Awards Ceremony
 
Ce intro slide show
Ce intro slide showCe intro slide show
Ce intro slide show
 
2011 KPA Member Accomplishments
2011 KPA Member Accomplishments2011 KPA Member Accomplishments
2011 KPA Member Accomplishments
 
2014 New Board Member Orientation
2014 New Board Member Orientation2014 New Board Member Orientation
2014 New Board Member Orientation
 
2011 KPA Member Accomplishments
2011 KPA Member Accomplishments2011 KPA Member Accomplishments
2011 KPA Member Accomplishments
 
Byrårelationens strategiska betydelse
Byrårelationens strategiska betydelseByrårelationens strategiska betydelse
Byrårelationens strategiska betydelse
 
Digital kampanjstrategi
Digital kampanjstrategiDigital kampanjstrategi
Digital kampanjstrategi
 

Semelhante a Introduction to Web Services

Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxssuser403d87
 
SOA Fundamentals
SOA  FundamentalsSOA  Fundamentals
SOA Fundamentalsabhi1112
 
Web services and SOA [Modified]
Web services and SOA [Modified]Web services and SOA [Modified]
Web services and SOA [Modified]Subin Sugunan
 
Performance of Web Services on Smart Phone Platforms
Performance of Web Services on Smart Phone PlatformsPerformance of Web Services on Smart Phone Platforms
Performance of Web Services on Smart Phone PlatformsIOSR Journals
 
Web services and SOA
Web services and SOAWeb services and SOA
Web services and SOASubin Sugunan
 
Sreerag what is a web service
Sreerag   what is a web serviceSreerag   what is a web service
Sreerag what is a web serviceSreerag Gopinath
 
Web Service Implementation Using ASP.NET
Web Service Implementation Using ASP.NETWeb Service Implementation Using ASP.NET
Web Service Implementation Using ASP.NETPonraj
 
Overview note e-comerce
Overview note e-comerceOverview note e-comerce
Overview note e-comerceshahin raj
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
Sending the data already gathered from the client to the Server
Sending the data already gathered from the client to the ServerSending the data already gathered from the client to the Server
Sending the data already gathered from the client to the Serverhussam242
 
Data As A Service Composition Of Daas And Negotiation...
Data As A Service Composition Of Daas And Negotiation...Data As A Service Composition Of Daas And Negotiation...
Data As A Service Composition Of Daas And Negotiation...Christina Berger
 
Enterprise API deployment best practice
Enterprise API deployment best practiceEnterprise API deployment best practice
Enterprise API deployment best practiceSanjay Roy
 
The Middleware technology that connects the enterprise
The Middleware technology that connects the enterpriseThe Middleware technology that connects the enterprise
The Middleware technology that connects the enterprise Kasun Indrasiri
 
Web Services
Web ServicesWeb Services
Web Serviceschidi
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionAustina Francis
 

Semelhante a Introduction to Web Services (20)

Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptx
 
SOA Fundamentals
SOA  FundamentalsSOA  Fundamentals
SOA Fundamentals
 
Service view
Service viewService view
Service view
 
Web services
Web servicesWeb services
Web services
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
Web services and SOA [Modified]
Web services and SOA [Modified]Web services and SOA [Modified]
Web services and SOA [Modified]
 
Performance of Web Services on Smart Phone Platforms
Performance of Web Services on Smart Phone PlatformsPerformance of Web Services on Smart Phone Platforms
Performance of Web Services on Smart Phone Platforms
 
Web services and SOA
Web services and SOAWeb services and SOA
Web services and SOA
 
Sreerag what is a web service
Sreerag   what is a web serviceSreerag   what is a web service
Sreerag what is a web service
 
Web Service Implementation Using ASP.NET
Web Service Implementation Using ASP.NETWeb Service Implementation Using ASP.NET
Web Service Implementation Using ASP.NET
 
Overview note e-comerce
Overview note e-comerceOverview note e-comerce
Overview note e-comerce
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Sending the data already gathered from the client to the Server
Sending the data already gathered from the client to the ServerSending the data already gathered from the client to the Server
Sending the data already gathered from the client to the Server
 
Data As A Service Composition Of Daas And Negotiation...
Data As A Service Composition Of Daas And Negotiation...Data As A Service Composition Of Daas And Negotiation...
Data As A Service Composition Of Daas And Negotiation...
 
Enterprise API deployment best practice
Enterprise API deployment best practiceEnterprise API deployment best practice
Enterprise API deployment best practice
 
The Middleware technology that connects the enterprise
The Middleware technology that connects the enterpriseThe Middleware technology that connects the enterprise
The Middleware technology that connects the enterprise
 
Web Services
Web ServicesWeb Services
Web Services
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
 
UNIT 3 web iiiBCA.pptx
UNIT 3 web iiiBCA.pptxUNIT 3 web iiiBCA.pptx
UNIT 3 web iiiBCA.pptx
 
Web services
Web servicesWeb services
Web services
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Introduction to Web Services

  • 1. Presents Introduction To Web Services
  • 2. Overview As an example we consider Ashram Hotels, a five star hotel. Ashram Hotels has been in hospitality business for more than 20 years and has acquired many different application systems which work on different operating systems. Their goal is to facilitate data transfer between these systems and make data access seamless Confidential
  • 3. Data Data exists in text files, excel sheets, databases and other propretiary formats. These need to be transferred between one system to another say Housekeeping and Reservation systems. Data access to the user should be seamless – that they need not log on to different systems to access information. Confidential
  • 4.
  • 5.
  • 6. Wireless services for all wireless clients internal and external.
  • 7. Delivery.com is a service where guests can order from nearby restaurants, laundry etc. e-Fax VOIP G-Maps Delivery.com Wireless
  • 8. Access To access the various systems in previous slide employee and also guests (for some of the systems) need an interface (client interface). These can be a web page, an application, mobile device etc. The card key system also needs to de-activate when the guest checks out which is another client interface. Confidential
  • 9.
  • 10. Kiosks are available for check-In and other guest services.
  • 11. Microsoft Surface (MS Surface) available for guests in the lobby .
  • 12. Online Reservations, Wireless Communications and E-fax are other technical features available for guests.
  • 13. Legacy methods of reservations and check-in and out will also be options for guests – like reception desk, TV and even Fax. Kiosks Room Key/Check In MS Surface iPhone Online Res. Wireless Devices eFax TV Res.
  • 14. Issues There are different clients and systems which may not be compatible with some of the clients. With self-reservation on the rise Ashram hotels is behind the competition. Employees and guests need to refer to say Google Maps for directions rather than that being integrated. Reports to directors and executives takes many weeks to prepare. Confidential
  • 15. Solution Integrating these various systems to the clients is the solution. The best solution is to utilize what systems in place and integrate them with the clients and between themselves. The method of integration is called middleware services and sometimes loosely called web services- as most of the data is transferred over the web via HTTP protocol. Confidential
  • 16. Ashram Hotels – Integration Platform Confidential
  • 17. Middleware Services Confidential Each system has different protocols to communicate with their middle-ware. Some use XML (a customized HTML) - a stream or a file is passed. Documents can also be passed between systems MS technology ‘s SOAP has recently gained a lot of popularity with Web Services . Web Services is the global method which includes receiving messages from all kinds of clients i.e. wireless devices and traditional systems. Middleware Services can be loosely defined as services which bring about communication between heterogeneous application systems. E.g. J2EE app with .NET app or any other proprietary applications. The middleware connects users /systems with other systems.
  • 18. Between Systems Middleware Systems exist internally between say two or more systems which may have to be written. These integration APIs (Application Programming Interface) can be bought or written. WARNING: Sometimes an API is not available between systems. Confidential
  • 19. Web Services When two systems cannot be integrated or an external client wants to get access one of the system say Expedia would like to access available rooms; then we define a middleware service for users/systems to access data on Ashram application system. To implement the middleware we use web services which use open protocol over HTML. As the data is request/response and is transmitted over the web these services are called web services. Amazon and Google provide web services for external users/vendors. Confidential
  • 20. Web Services 2 What are Web Services? Web services are application components Web services communicate using open protocols Web services are self-contained and self-describing Web services can be discovered using UDDI Web services can be used by other applications XML is the basis for Web services Reference: http://www.w3schools.com/webservices/ws_intro.asp Confidential
  • 21. What is SOAP? SOAP is an XML-based protocol to let applications exchange information over HTTP. Or more simple: SOAP is a protocol for accessing a Web Service. SOAP stands for Simple Object Access Protocol SOAP is a communication protocol SOAP is a format for sending messages SOAP is designed to communicate via Internet SOAP is platform independent SOAP is language independent SOAP is based on XML SOAP is simple and extensible SOAP allows you to get around firewalls SOAP is a W3C standard Confidential
  • 22. What is WSDL WSDL is an XML-based language for locating and describing Web services. WSDL stands for Web Services Description Language WSDL is based on XML WSDL is used to describe Web services WSDL is used to locate Web services WSDL is a W3C standard Confidential
  • 23. What is UDDI? UDDI is a directory service where companies can register and search for Web services. UDDI stands for Universal Description, Discovery and Integration UDDI is a directory for storing information about web services UDDI is a directory of web service interfaces described by WSDL UDDI communicates via SOAP UDDI is built into the Microsoft .NET platform Confidential
  • 24. What is REST? A RESTful web service (also called a RESTfulweb API) is a simple web service implemented using HTTP and the principles of REST. It is a collection of resources, with four defined aspects: the base URI for the web service, such as http://example.com/resources/ the Internet media type of the data supported by the web service. This is often JSON, XML or YAML but can be any other valid Internet media type. the set of operations supported by the web service using HTTP methods (e.g., POST, GET, PUT or DELETE). The API must be hypertext driven Confidential
  • 25. Web Services Summary Web services elements are SOAP, WSDL and UDDI which communicate between applications over HTML protocol using XML based requests and responses. REST is also a different kind of web services which uses as end-points a URL. The best example of REST service is the web. Confidential
  • 26. City Stay Hotels – Integration Platform Confidential
  • 27. A Use Case Confidential External Vendors Guest Requests Tickets TicketMaster System creates request Sends to middleware
  • 28. Web Services Over twelve years of experince in various industries implementing integration of different systems and applications using web services, middleware programs. Trained technical and non-technical personnel on web services, middleware technologies etc. Some clients who have benefitted : ResortQuest Comcast, WildBlue, CenturyLink HP, Motorola, Nextel. Confidential

Notas do Editor

  1. These are notes who can see them?