SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Web Service Extensions
1. Abstract:
Service-oriented architecture (SOA) is a best-practice architecture pattern for the systematic design of
request/reply applications.
Web Service extensions (WS-*) are conventions that allow systems to access the services through
networks, in a neutral manner. The major WS specifications are WS-Core Messaging, WS-Metadata,
WS-Security, WS-Discovery, WS-Reliable Messaging, WS-Transactions, WS-Enumeration Transfer and
Eventing and WS-Management.
The purpose of this paper is to enlighten the reader about the various Web Services conventions, which
are re-inventing technology today.
2. Web Services and SOA:
The primary intentions of SOA are: business-level software modularity and rapid, non-intrusive reuse
of business software in new runtime contexts. We need to understand the essence of SOA, as well as its
strengths and limitations, to identify its role in the overall architecture of today's modern enterprise IT.
Web Service consumers are software applications that embed a service interface proxy. Simply put, any
software that uses the following standards is a web-service:
- Web Services Description Language (WSDL)
- Simple Object Access Protocol (SOAP)
- Universal Description, Discovery and Integration (UDDI)
A brief description of the standards is given below. These standards have been referred to throughout
the document.
!SOAP: It is an XML based message format having bindings to underlying protocols (Ex: HTTP, SMTP
etc).
!WSDL: It is an XML based language for describing Web Services and how to access them.
!UDDI: It is a protocol for publishing metadata about Web Services, to enable applications to find Web
Services either at design time or run time.
Network and Transport Protocols
TCP/IP, HTTP, HTTPS, FTP, SMTP
Discovery &
Publication
UDDI
Service
Description
WSDL
Data Exchange Protocols
SOAP
Data Representation
DSL
Web Services Architecture diagram
3. WS-Core Messaging:
4. WS-Metadata:
Core Messaging is one of the WS-Specifications used to express messages in a definite form in the web
services architecture. Messaging in Web Services is achieved using SOAP, which is an XML document
information item containing an envelope (<Envelope>), header (<Header>) and a body (<Body>),
collectively also called as the SOAP elements.
WS-Addressing is a common addressing mechanism required to route the messages and address the
services in the multitransport messaging environment. The Addressing specification contains the
To/From/ReplyTo/FaultTo header blocks and is used to address the agents that process the message
and its replies. These headers rely on a WS-Addressing defined structure called an 'endpoint reference'
that combines the information needed to properly address a SOAP message.
Web Services use metadata to describe what other endpoints (identified by URI's) need to know, to
interact with them.
The Web Service Metadata provides information such as WSDL (specifies message exchange patterns),
XML Schema (specifies the message interchange formats) and WS Policy (specifies the capabilities and
requirements of web services). These are known as Metadata Units. The collection of units is
represented by a Metadata element. In brief, Metadata tells a user: whom the information is from, who
it is intended for and also the details about the information content. Metadata tags (XML tags) would
not interfere with the normal working of the application but would allow a preprocessor to interpret the
metadata tags and generate the appropriate code for Web Services.
As evidenced by the definitions, Web services are about technology specifications, whereas SOA is a
software architectural principle/methodology. Web services are based on Internet standards, are
platform agonistic, are widely available, have complete vendor support and are a key enabler of SOA.
The remainder of the sections describes the basic WS Extensions in detail.
Contract
Metadata
Web Services Metadata Architecture
XML Schema
Message
Interchange
Formats
WS -Policy
Capabilities
&
RequirementsWSDL
Message
Exchange
Patterns
Web Services metadata specification defines three request-response message interactions:
! One retrieves the WS-Policy associated with the receiving end point (requester) or target
namespace.
! The second retrieves the XML Schema associated with the receiving end point (requester) or target
namespace.
! The third retrieves the WSDL associated with the receiving end point or target namespace.
5. WS-Security:
6. WS-Discovery:
WS-Security defines SOAP extensions in order to implement client authentication, message integrity
and message confidentiality at the message level. The advantage of WS-Security is that it works in
conjunction with other Web Service extensions.
SOAP is regarded as the standard for communication. Hence, a secure transport for SOAP messages
like Secure Sockets Layer (SSL) or Transport Layer Security (TLS) etc. should be available between the
communicating Web Services. This also requires provision for end-to-end security to maximize the
reach of Web Services. Authentication involves identification of the sender, service or other resources.
Once authenticated, the user needs to be authorized to use a specific resource. Message confidentiality
keeps an unauthorized third party from reading a message during transmission.
WS-Trust uses the mechanisms of WS-Security for the issuance, exchange and validation of security
tokens. In order to ensure that the communication between 2 parties is secure, security credentials
should be exchanged between the 2 parties i.e. one party needs to determine if the other party can be
trusted. This mechanism is achieved by issuing security tokens that establish the trust relationship.
WS-Secure Conversation is built on top of WS-Security to enable secure conversation between two
services.
WS-Security Policy complements WS-Security by specifying a set of rules to accommodate a wide
variety of security models.
This specification defines a protocol to locate services i.e. a developer of a client application can learn
about the existence of a Web Service, its capabilities and method of interaction, given the URL to a
common directory containing Web Service information. UDDI specifies a protocol for querying and
updating this common directory. A UDDI entry contains 3 parts: service provider, Web Services offered
and bindings to the implementations. Each of these parts provides progressively more detailed
information about the Web service.
The specifications intend to meet the following requirements:
! Enable smooth transitions between ad hoc and managed networks.
! Enable discovery of resource-limited service implementations.
! Support bootstrapping to other Web service protocols as well as other transports.
! Enable discovery of services by type and within scope.
7. WS-Reliable Messaging:
WS-Reliable Messaging describes a protocol that allows messages to be delivered reliably between
distributed applications in the presence of a software component failure, system failure, or network
failures. At the most basic level, reliable messaging refers to the ability of a sender to deliver a message
“once and only once” to its intended receiver.
Many conditions may interrupt an exchange of messages between two services. This is especially an
issue when unreliable transport protocols such as HTTP 1.0 and SMTP [SMTP] are used for transmission
or when a message exchange spans multiple transport-layer connections. WS-Reliable Messaging is a
protocol that enables the end-to-end reliable delivery of messages based on specific delivery
assurance characteristics. The specification defines four different message delivery assurances:
! At-Least-Once Delivery: Each message is delivered at least one time.
! At-Most-Once Delivery: Duplicate messages will not be delivered.
! Exactly-Once Delivery: This is the logical “and” of the two prior delivery assurances.
! In-Order Delivery: Messages are delivered in the same order they were sent.
The diagram below illustrates the entities and events involved in a simple reliable message exchange.
The Application Source sends a message for reliable delivery. The Reliable Messaging (RM) Source
accepts the message and transmits it one or more times to the RM destination. Once the RM
Destination receives the message, it acknowledges the delivery. Finally, the RM Destination delivers the
message to the Application Destination.
Application
Destination
RM
Destination
Application
Source
RM
Source
Initial Sender Ultimate Receiver
A simple reliable message exchange
send
Transmit
Transmit
Acknowledge
Receive
deliver
8. WS-Transactions:
9. WS-Enumeration Transfer and Eventing:
Transactions are an important building block in all of the business applications. A transaction can be
defined as a unit of work that involves one or more resources and is either completed in its entirety or is
not done at all. Participating resources are locked for the duration of the transaction. Ws-Transactions
describe an extensive framework for short duration and long duration business transactions.
WS-Transaction defines two distinct transactional models:
! WS-Atomic Transaction: These correspond to the traditional transactions with ACID properties
(Atomicity, Consistency, Isolation and Durability). This model supports transactions that are short-
lived.
! WS-Business Activity: This specifies the protocols for long running transactions. The model allows
participants to take part in the transactions without the resources being locked. This model has a
mechanism to inform the participants to take necessary actions if the transaction outcome is
different from the expected outcome of the participants.
Co-ordination is the act of one agent (the coordinator) disseminating a message to all the other
participants, to make sure that all the participants receive the same specific message. WS Co-
ordination specifies the basic transaction infrastructure support. This specification describes a
framework for providing protocols that co-ordinate the actions of distributed applications. It includes:
! Creation of a coordinator for a specific coordination protocol.
! Registration of the participants with the coordinator.
! Propagation of context: Here the coordinator takes the initiative of passing the transaction related
information to the participants.
This section briefs about the specifications that provide enumeration of service resources, their state
management, which involves sessions between the source and requestor and event notification in the
web services architecture. They are based on WS-Enumeration [WS-Enum], WS-Transfer [WS-
Transfer], and WS-Eventing [WS-Eventing].
Protocol Pre-conditions:
! The RM Source must have an endpoint reference that uniquely identifies the RM destination
endpoint.
! The source must have knowledge of the destination's policies, if any, and the RM Source must be
capable of formulating messages that adhere to these policies.
If a secure exchange of messages is required, then the RM source and RM destination must have a
security policy in place.
WS-Enumeration specification defines simple rules for enumeration that allows the data source to
provide a session abstraction, called an enumeration context, to a consumer through a sequence of
data items. Many scenarios require data exchange using more than just a single request/response
message pair. Types of applications that require these longer data exchanges include database
queries, data streaming etc. Enumeration, in particular, is achieved though establishing a session
between the data source and the requestor. In its simplest form, WS-Enumeration defines a single
operation, 'Pull', which allows a data source, to produce a sequence of XML elements in the body of a
message. In addition to enumerating the data entities present in a Web service, it is convenient to be
able to perform several basic operations on them. These operations are introduced in the WS-Transfer
specification.
WS-Transfer is a protocol for manipulating resources and their representations. A requestor can
create, modify, delete resources, as well as retrieve XML representations of those resources. Specifically
WS-Transfer defines two operations for sending and receiving the XML representation of a given
resource and two operations for creating and deleting a resource and its corresponding XML
representation. This specification needs to meet the following requirements:
! Provide a protocol for managing resources and their representations.
! Minimize additional mechanisms beyond the current Web Service architecture.
Web services often want to receive messages when events occur in other services and applications. This
specification defines a protocol for one Web service (called an "event sink") to register interest in
another Web service (called an "event source") in receiving messages about events (called
"notifications"). This registration process is called Subscription. To improve robustness, the subscription
is leased by an event source to an event sink, and the subscription expires over time. An event source
may allow an event sink to renew the subscription. When an event source determines that an event has
occurred, it will provide that information to all of the matching subscriptions. This is similar to
publishing topics or subjects in a traditional publish/subscribe event notification system. There are
many mechanisms by which event sources may deliver events to event sinks.
Subscriptions lease resources that must be eventually recovered. The primary mechanism used to
reclaim resources is an expiration time for each subscription. The other mechanisms include querying
the status of the subscription, renewing the subscription or unsubscribing the subscription.
10. WS-Management:
WS-Management is a reusable middleware platform that enables communication between the client
and the server application. It builds on several components of the architecture, providing a common
set of operations that are required by all systems management solutions. The philosophy of Web
Service Management Layer (WSML) is to extract all the web service related code present on the client
and place it inside the WSML. Whenever a client makes a request to the server for some functionality,
the request will actually be made to the service stub (shown in the figure). The WSML will translate this
request to an available Web Service and send the result back to the client.
11. Conclusion:
12. References:
What has been presented in this paper, is an easy to understand overview of the various web service
extensions that are currently at different points of standardization. The effective and wide scale use of
web services within enterprises require robust implementations of these extensions to be in place and
used along with the other necessary infrastructure required for maintenance and management of the
services.
! Web Services Architecture and Its Specifications: Essentials for Understanding WS-* Mar.2005.
By Luis Felipe Cabrera, Chris Kurt
! SOA and Web Services – The road to EAI
http://java.sun.com/developer/technicalArticles/WebServices/soa/
! Securing the Web Services and JAVA WSDP 1.5 XWS Security Framework
http://java.sun.com/developer/technicalArticles/WebServices/security/
! Web Services Policy Framework
http://specs.xmlsoap.org/ws/2004/09/policy/ws-policy.pdf
! Web Services Dynamic Discovery
http://msdn.microsoft.com/ws/2005/04/ws-discovery/
! From Open Grid Services Infrastructure to WS- Resource Framework
http://www.globus.org/wsrf/specs/ogsi_to_wsrf_1.0.pdf
! W3C member submission
http://www.w3.org/Submission/
Client Application
Web Services Management Architecture
Service Type
Web Service
WSML
Web Service
Web Service
Service
Initiation
Service
Security
Service
Co-ordination
Service
Management
Torry Harris Business Solutions Inc, a US based services provider with a large base of technologists
located in the UK, India and China has provided cost effective solutions at a design, development
and support level to a variety of enterprise clients across the world since 1998. The company
specializes in integration, distributed computing, and its focus on SOA is a result of nearly a decade of
expertise gathered in the middleware space. The company has partnerships with almost all the
leading SOA and integration product vendors. SOA, involving the creation of autonomous parts of a
solution, lends itself admirably to the cost effective model of offshore service collaboration. A
separate white paper entitled “SOA Implementation with an offshore partner” available for
download, explores this model in a more detailed manner. Further information about the company
and a variety of white papers on SOA are available at www.thbs.com/soa.
For more information, write to us at soa@thbs.com.
Torry Harris

Mais conteúdo relacionado

Mais procurados

Service Oriented Development With Windows Communication Foundation 2003
Service Oriented Development With Windows Communication Foundation 2003Service Oriented Development With Windows Communication Foundation 2003
Service Oriented Development With Windows Communication Foundation 2003Jason Townsend, MBA
 
Reliability evaluation model for composite web services
Reliability evaluation model for composite web servicesReliability evaluation model for composite web services
Reliability evaluation model for composite web servicesdannyijwest
 
Secc tutorials development and deployment of rest web services in java_v2.0
Secc tutorials development and deployment of rest web services in java_v2.0Secc tutorials development and deployment of rest web services in java_v2.0
Secc tutorials development and deployment of rest web services in java_v2.0Aravindharamanan S
 
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356IOSR Journals
 
Complete Architecture and Development Guide To Windows Communication Foundati...
Complete Architecture and Development Guide To Windows Communication Foundati...Complete Architecture and Development Guide To Windows Communication Foundati...
Complete Architecture and Development Guide To Windows Communication Foundati...Abdul Khan
 
Service usage classification with encrypted
Service usage classification with encryptedService usage classification with encrypted
Service usage classification with encryptedKamal Spring
 
ONC Direct Project Boot Camp
ONC Direct Project Boot CampONC Direct Project Boot Camp
ONC Direct Project Boot CampBrian Ahier
 
Enhancement in Web Service Architecture
Enhancement in Web Service ArchitectureEnhancement in Web Service Architecture
Enhancement in Web Service ArchitectureIJERA Editor
 
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-servicesIjirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-servicesIJIR JOURNALS IJIRUSA
 
Efficient retrieval of web services using prioritization and clustering
Efficient retrieval of web services using prioritization and clusteringEfficient retrieval of web services using prioritization and clustering
Efficient retrieval of web services using prioritization and clusteringAlexander Decker
 
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYQOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcsandit
 
Lecture 16 - Web Services
Lecture 16 - Web ServicesLecture 16 - Web Services
Lecture 16 - Web Servicesphanleson
 

Mais procurados (18)

Service Oriented Development With Windows Communication Foundation 2003
Service Oriented Development With Windows Communication Foundation 2003Service Oriented Development With Windows Communication Foundation 2003
Service Oriented Development With Windows Communication Foundation 2003
 
Reliability evaluation model for composite web services
Reliability evaluation model for composite web servicesReliability evaluation model for composite web services
Reliability evaluation model for composite web services
 
Secc tutorials development and deployment of rest web services in java_v2.0
Secc tutorials development and deployment of rest web services in java_v2.0Secc tutorials development and deployment of rest web services in java_v2.0
Secc tutorials development and deployment of rest web services in java_v2.0
 
Unit iii soa
Unit iii soaUnit iii soa
Unit iii soa
 
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
 
Soa module 5
Soa module 5Soa module 5
Soa module 5
 
Complete Architecture and Development Guide To Windows Communication Foundati...
Complete Architecture and Development Guide To Windows Communication Foundati...Complete Architecture and Development Guide To Windows Communication Foundati...
Complete Architecture and Development Guide To Windows Communication Foundati...
 
ISUG SSB Lior King
ISUG SSB Lior KingISUG SSB Lior King
ISUG SSB Lior King
 
Service usage classification with encrypted
Service usage classification with encryptedService usage classification with encrypted
Service usage classification with encrypted
 
Introduction to Web Services
Introduction to Web ServicesIntroduction to Web Services
Introduction to Web Services
 
ONC Direct Project Boot Camp
ONC Direct Project Boot CampONC Direct Project Boot Camp
ONC Direct Project Boot Camp
 
Enhancement in Web Service Architecture
Enhancement in Web Service ArchitectureEnhancement in Web Service Architecture
Enhancement in Web Service Architecture
 
Soa
SoaSoa
Soa
 
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-servicesIjirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
Ijirsm ashok-kumar-ps-compulsiveness-of-res tful-web-services
 
Efficient retrieval of web services using prioritization and clustering
Efficient retrieval of web services using prioritization and clusteringEfficient retrieval of web services using prioritization and clustering
Efficient retrieval of web services using prioritization and clustering
 
Qos
QosQos
Qos
 
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYQOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITY
 
Lecture 16 - Web Services
Lecture 16 - Web ServicesLecture 16 - Web Services
Lecture 16 - Web Services
 

Destaque

Top 40 Facebook Fan Pages
Top 40 Facebook Fan PagesTop 40 Facebook Fan Pages
Top 40 Facebook Fan PagesLikeable Media
 
PepsiCo powerpoint
PepsiCo powerpointPepsiCo powerpoint
PepsiCo powerpointBrad Schwer
 
Fourth Quarter 2013 Investor Presentation
Fourth Quarter 2013 Investor PresentationFourth Quarter 2013 Investor Presentation
Fourth Quarter 2013 Investor PresentationThor_Industries
 
Eucalyptus on Xen - Build Enterprise Private Cloud | Torry Harris Whitepaper
Eucalyptus on Xen - Build Enterprise Private Cloud | Torry Harris WhitepaperEucalyptus on Xen - Build Enterprise Private Cloud | Torry Harris Whitepaper
Eucalyptus on Xen - Build Enterprise Private Cloud | Torry Harris WhitepaperTorry Harris Business Solutions
 
Lilim kiss 18++ part 2
Lilim kiss 18++ part 2Lilim kiss 18++ part 2
Lilim kiss 18++ part 2truyenonline
 
Sales presentation
Sales presentationSales presentation
Sales presentationNoor Ahmad
 
Timken2006AnnualReport
Timken2006AnnualReportTimken2006AnnualReport
Timken2006AnnualReportfinance39
 
Toys R Us
Toys R UsToys R Us
Toys R Usafa4
 
Toys "R" Us Marketing Plan
Toys "R" Us Marketing PlanToys "R" Us Marketing Plan
Toys "R" Us Marketing PlanAri Ratner
 
LEGO- Niche MArketing
LEGO- Niche MArketingLEGO- Niche MArketing
LEGO- Niche MArketingPravin Bokil
 
Lego: Strategy Analysis & Business Model
Lego: Strategy Analysis & Business ModelLego: Strategy Analysis & Business Model
Lego: Strategy Analysis & Business ModelEvgenii Gvozdev
 
The Lego case study, the great turnaround 2003 - 2013
The Lego case study, the great turnaround 2003 - 2013The Lego case study, the great turnaround 2003 - 2013
The Lego case study, the great turnaround 2003 - 2013John Ashcroft
 
Een zeker pensioen in een onzekere wereld
Een zeker pensioen in een onzekere wereldEen zeker pensioen in een onzekere wereld
Een zeker pensioen in een onzekere wereldJos Berkemeijer
 

Destaque (17)

Top 40 Facebook Fan Pages
Top 40 Facebook Fan PagesTop 40 Facebook Fan Pages
Top 40 Facebook Fan Pages
 
PepsiCo powerpoint
PepsiCo powerpointPepsiCo powerpoint
PepsiCo powerpoint
 
Fourth Quarter 2013 Investor Presentation
Fourth Quarter 2013 Investor PresentationFourth Quarter 2013 Investor Presentation
Fourth Quarter 2013 Investor Presentation
 
Trader Vic's Menu
Trader Vic's MenuTrader Vic's Menu
Trader Vic's Menu
 
Eucalyptus on Xen - Build Enterprise Private Cloud | Torry Harris Whitepaper
Eucalyptus on Xen - Build Enterprise Private Cloud | Torry Harris WhitepaperEucalyptus on Xen - Build Enterprise Private Cloud | Torry Harris Whitepaper
Eucalyptus on Xen - Build Enterprise Private Cloud | Torry Harris Whitepaper
 
Lilim kiss 18++ part 2
Lilim kiss 18++ part 2Lilim kiss 18++ part 2
Lilim kiss 18++ part 2
 
Sales presentation
Sales presentationSales presentation
Sales presentation
 
Npd
NpdNpd
Npd
 
Timken2006AnnualReport
Timken2006AnnualReportTimken2006AnnualReport
Timken2006AnnualReport
 
Toys R Us
Toys R UsToys R Us
Toys R Us
 
Toys r us
Toys r usToys r us
Toys r us
 
toy market segments
toy market segments toy market segments
toy market segments
 
Toys "R" Us Marketing Plan
Toys "R" Us Marketing PlanToys "R" Us Marketing Plan
Toys "R" Us Marketing Plan
 
LEGO- Niche MArketing
LEGO- Niche MArketingLEGO- Niche MArketing
LEGO- Niche MArketing
 
Lego: Strategy Analysis & Business Model
Lego: Strategy Analysis & Business ModelLego: Strategy Analysis & Business Model
Lego: Strategy Analysis & Business Model
 
The Lego case study, the great turnaround 2003 - 2013
The Lego case study, the great turnaround 2003 - 2013The Lego case study, the great turnaround 2003 - 2013
The Lego case study, the great turnaround 2003 - 2013
 
Een zeker pensioen in een onzekere wereld
Een zeker pensioen in een onzekere wereldEen zeker pensioen in een onzekere wereld
Een zeker pensioen in een onzekere wereld
 

Semelhante a Web Service Extensions | Torry Harris Whitepaper

Uunit 5-xml&web security
Uunit 5-xml&web securityUunit 5-xml&web security
Uunit 5-xml&web securityssuser3a47cb
 
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESijcsit
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesCSEIJJournal
 
What is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfWhat is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfAngelicaPantaleon3
 
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...Jason Townsend, MBA
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soaijbuiiir1
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and developmentishmecse13
 
A Message-Passing Model For Service Oriented Computing
A Message-Passing Model For Service Oriented ComputingA Message-Passing Model For Service Oriented Computing
A Message-Passing Model For Service Oriented ComputingCheryl Brown
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)ijwscjournal
 
A Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access ControlA Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access Controlijwscjournal
 
A Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access ControlA Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access Controlijwscjournal
 
Introduction to webservices
Introduction to webservicesIntroduction to webservices
Introduction to webservicesGagandeep Singh
 
Ogsi protocol perspective
Ogsi protocol perspectiveOgsi protocol perspective
Ogsi protocol perspectivePooja Dixit
 
Web Service Implementation Using ASP.NET
Web Service Implementation Using ASP.NETWeb Service Implementation Using ASP.NET
Web Service Implementation Using ASP.NETPonraj
 

Semelhante a Web Service Extensions | Torry Harris Whitepaper (20)

Uunit 5-xml&web security
Uunit 5-xml&web securityUunit 5-xml&web security
Uunit 5-xml&web security
 
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
What is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfWhat is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdf
 
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...
Tulsa Tech Fest2008 Service Oriented Development With Windows Communication F...
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soa
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and development
 
WCF
WCFWCF
WCF
 
A Message-Passing Model For Service Oriented Computing
A Message-Passing Model For Service Oriented ComputingA Message-Passing Model For Service Oriented Computing
A Message-Passing Model For Service Oriented Computing
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
A Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access ControlA Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access Control
 
A Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access ControlA Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access Control
 
W4502140150
W4502140150W4502140150
W4502140150
 
Introduction to webservices
Introduction to webservicesIntroduction to webservices
Introduction to webservices
 
Service view
Service viewService view
Service view
 
Ogsi protocol perspective
Ogsi protocol perspectiveOgsi protocol perspective
Ogsi protocol perspective
 
Web services
Web servicesWeb services
Web services
 
Xml.ppt
Xml.pptXml.ppt
Xml.ppt
 
Web Service Implementation Using ASP.NET
Web Service Implementation Using ASP.NETWeb Service Implementation Using ASP.NET
Web Service Implementation Using ASP.NET
 

Mais de Torry Harris Business Solutions

Application Oriented Networks: An SOA Perspective | Torry Harris Whitepaper
Application Oriented Networks: An SOA Perspective | Torry Harris WhitepaperApplication Oriented Networks: An SOA Perspective | Torry Harris Whitepaper
Application Oriented Networks: An SOA Perspective | Torry Harris WhitepaperTorry Harris Business Solutions
 
Outsourcing SOA Implementation | Torry Harris Whitepaper
Outsourcing SOA Implementation | Torry Harris WhitepaperOutsourcing SOA Implementation | Torry Harris Whitepaper
Outsourcing SOA Implementation | Torry Harris WhitepaperTorry Harris Business Solutions
 
SOA Offshore Onsite Delivery Model | Torry Harris Whitepaper
SOA Offshore Onsite Delivery Model | Torry Harris WhitepaperSOA Offshore Onsite Delivery Model | Torry Harris Whitepaper
SOA Offshore Onsite Delivery Model | Torry Harris WhitepaperTorry Harris Business Solutions
 
SOA Open Source Implementation | Torry Harris Whitepaper
SOA Open Source Implementation | Torry Harris WhitepaperSOA Open Source Implementation | Torry Harris Whitepaper
SOA Open Source Implementation | Torry Harris WhitepaperTorry Harris Business Solutions
 
Comparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris WhitepaperComparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris WhitepaperTorry Harris Business Solutions
 
BPM - The Soft Science of Change | Torry Harris Whitepaper
BPM - The Soft Science of Change | Torry Harris WhitepaperBPM - The Soft Science of Change | Torry Harris Whitepaper
BPM - The Soft Science of Change | Torry Harris WhitepaperTorry Harris Business Solutions
 
EAI Performance Analysis Web-Methods | Torry Harris Whitepaper
EAI Performance Analysis Web-Methods | Torry Harris WhitepaperEAI Performance Analysis Web-Methods | Torry Harris Whitepaper
EAI Performance Analysis Web-Methods | Torry Harris WhitepaperTorry Harris Business Solutions
 

Mais de Torry Harris Business Solutions (20)

A Guide to SOA Implementation | Torry Harris Whitepaper
A Guide to SOA Implementation | Torry Harris WhitepaperA Guide to SOA Implementation | Torry Harris Whitepaper
A Guide to SOA Implementation | Torry Harris Whitepaper
 
Application Rationalization | Torry Harris Whitepaper
Application Rationalization | Torry Harris WhitepaperApplication Rationalization | Torry Harris Whitepaper
Application Rationalization | Torry Harris Whitepaper
 
Application Oriented Networks: An SOA Perspective | Torry Harris Whitepaper
Application Oriented Networks: An SOA Perspective | Torry Harris WhitepaperApplication Oriented Networks: An SOA Perspective | Torry Harris Whitepaper
Application Oriented Networks: An SOA Perspective | Torry Harris Whitepaper
 
Outsourcing SOA Implementation | Torry Harris Whitepaper
Outsourcing SOA Implementation | Torry Harris WhitepaperOutsourcing SOA Implementation | Torry Harris Whitepaper
Outsourcing SOA Implementation | Torry Harris Whitepaper
 
SOA Migration Services | Torry Harris
SOA Migration Services | Torry HarrisSOA Migration Services | Torry Harris
SOA Migration Services | Torry Harris
 
SOA Roadmap and Education | Torry Harris
SOA Roadmap and Education | Torry HarrisSOA Roadmap and Education | Torry Harris
SOA Roadmap and Education | Torry Harris
 
SOA Offshore Onsite Delivery Model | Torry Harris Whitepaper
SOA Offshore Onsite Delivery Model | Torry Harris WhitepaperSOA Offshore Onsite Delivery Model | Torry Harris Whitepaper
SOA Offshore Onsite Delivery Model | Torry Harris Whitepaper
 
SOA Test Methodology | Torry Harris Whitepaper
SOA Test Methodology | Torry Harris WhitepaperSOA Test Methodology | Torry Harris Whitepaper
SOA Test Methodology | Torry Harris Whitepaper
 
SOA for Retail | Torry Harris Whitepaper
SOA for Retail | Torry Harris WhitepaperSOA for Retail | Torry Harris Whitepaper
SOA for Retail | Torry Harris Whitepaper
 
SOA for Telecom | Torry Harris Whitepaper
SOA for Telecom | Torry Harris WhitepaperSOA for Telecom | Torry Harris Whitepaper
SOA for Telecom | Torry Harris Whitepaper
 
A Guide to SOA Governance | Torry Harris Whitepaper
A Guide to SOA Governance | Torry Harris WhitepaperA Guide to SOA Governance | Torry Harris Whitepaper
A Guide to SOA Governance | Torry Harris Whitepaper
 
SOA Maturity Model | Torry Harris Whitepaper
SOA Maturity Model | Torry Harris WhitepaperSOA Maturity Model | Torry Harris Whitepaper
SOA Maturity Model | Torry Harris Whitepaper
 
SOA Open Source Implementation | Torry Harris Whitepaper
SOA Open Source Implementation | Torry Harris WhitepaperSOA Open Source Implementation | Torry Harris Whitepaper
SOA Open Source Implementation | Torry Harris Whitepaper
 
Migration and Security in SOA | Torry Harris Whitepaper
Migration and Security in SOA | Torry Harris WhitepaperMigration and Security in SOA | Torry Harris Whitepaper
Migration and Security in SOA | Torry Harris Whitepaper
 
Web Services in SOA | Torry Harris
Web Services in SOA | Torry HarrisWeb Services in SOA | Torry Harris
Web Services in SOA | Torry Harris
 
Cloud Catalyst Programme | Torry Harris Whitepaper
Cloud Catalyst Programme | Torry Harris WhitepaperCloud Catalyst Programme | Torry Harris Whitepaper
Cloud Catalyst Programme | Torry Harris Whitepaper
 
Cloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris WhitepaperCloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris Whitepaper
 
Comparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris WhitepaperComparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris Whitepaper
 
BPM - The Soft Science of Change | Torry Harris Whitepaper
BPM - The Soft Science of Change | Torry Harris WhitepaperBPM - The Soft Science of Change | Torry Harris Whitepaper
BPM - The Soft Science of Change | Torry Harris Whitepaper
 
EAI Performance Analysis Web-Methods | Torry Harris Whitepaper
EAI Performance Analysis Web-Methods | Torry Harris WhitepaperEAI Performance Analysis Web-Methods | Torry Harris Whitepaper
EAI Performance Analysis Web-Methods | Torry Harris Whitepaper
 

Último

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Último (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Web Service Extensions | Torry Harris Whitepaper

  • 2. 1. Abstract: Service-oriented architecture (SOA) is a best-practice architecture pattern for the systematic design of request/reply applications. Web Service extensions (WS-*) are conventions that allow systems to access the services through networks, in a neutral manner. The major WS specifications are WS-Core Messaging, WS-Metadata, WS-Security, WS-Discovery, WS-Reliable Messaging, WS-Transactions, WS-Enumeration Transfer and Eventing and WS-Management. The purpose of this paper is to enlighten the reader about the various Web Services conventions, which are re-inventing technology today. 2. Web Services and SOA: The primary intentions of SOA are: business-level software modularity and rapid, non-intrusive reuse of business software in new runtime contexts. We need to understand the essence of SOA, as well as its strengths and limitations, to identify its role in the overall architecture of today's modern enterprise IT. Web Service consumers are software applications that embed a service interface proxy. Simply put, any software that uses the following standards is a web-service: - Web Services Description Language (WSDL) - Simple Object Access Protocol (SOAP) - Universal Description, Discovery and Integration (UDDI) A brief description of the standards is given below. These standards have been referred to throughout the document. !SOAP: It is an XML based message format having bindings to underlying protocols (Ex: HTTP, SMTP etc). !WSDL: It is an XML based language for describing Web Services and how to access them. !UDDI: It is a protocol for publishing metadata about Web Services, to enable applications to find Web Services either at design time or run time. Network and Transport Protocols TCP/IP, HTTP, HTTPS, FTP, SMTP Discovery & Publication UDDI Service Description WSDL Data Exchange Protocols SOAP Data Representation DSL Web Services Architecture diagram
  • 3. 3. WS-Core Messaging: 4. WS-Metadata: Core Messaging is one of the WS-Specifications used to express messages in a definite form in the web services architecture. Messaging in Web Services is achieved using SOAP, which is an XML document information item containing an envelope (<Envelope>), header (<Header>) and a body (<Body>), collectively also called as the SOAP elements. WS-Addressing is a common addressing mechanism required to route the messages and address the services in the multitransport messaging environment. The Addressing specification contains the To/From/ReplyTo/FaultTo header blocks and is used to address the agents that process the message and its replies. These headers rely on a WS-Addressing defined structure called an 'endpoint reference' that combines the information needed to properly address a SOAP message. Web Services use metadata to describe what other endpoints (identified by URI's) need to know, to interact with them. The Web Service Metadata provides information such as WSDL (specifies message exchange patterns), XML Schema (specifies the message interchange formats) and WS Policy (specifies the capabilities and requirements of web services). These are known as Metadata Units. The collection of units is represented by a Metadata element. In brief, Metadata tells a user: whom the information is from, who it is intended for and also the details about the information content. Metadata tags (XML tags) would not interfere with the normal working of the application but would allow a preprocessor to interpret the metadata tags and generate the appropriate code for Web Services. As evidenced by the definitions, Web services are about technology specifications, whereas SOA is a software architectural principle/methodology. Web services are based on Internet standards, are platform agonistic, are widely available, have complete vendor support and are a key enabler of SOA. The remainder of the sections describes the basic WS Extensions in detail. Contract Metadata Web Services Metadata Architecture XML Schema Message Interchange Formats WS -Policy Capabilities & RequirementsWSDL Message Exchange Patterns
  • 4. Web Services metadata specification defines three request-response message interactions: ! One retrieves the WS-Policy associated with the receiving end point (requester) or target namespace. ! The second retrieves the XML Schema associated with the receiving end point (requester) or target namespace. ! The third retrieves the WSDL associated with the receiving end point or target namespace. 5. WS-Security: 6. WS-Discovery: WS-Security defines SOAP extensions in order to implement client authentication, message integrity and message confidentiality at the message level. The advantage of WS-Security is that it works in conjunction with other Web Service extensions. SOAP is regarded as the standard for communication. Hence, a secure transport for SOAP messages like Secure Sockets Layer (SSL) or Transport Layer Security (TLS) etc. should be available between the communicating Web Services. This also requires provision for end-to-end security to maximize the reach of Web Services. Authentication involves identification of the sender, service or other resources. Once authenticated, the user needs to be authorized to use a specific resource. Message confidentiality keeps an unauthorized third party from reading a message during transmission. WS-Trust uses the mechanisms of WS-Security for the issuance, exchange and validation of security tokens. In order to ensure that the communication between 2 parties is secure, security credentials should be exchanged between the 2 parties i.e. one party needs to determine if the other party can be trusted. This mechanism is achieved by issuing security tokens that establish the trust relationship. WS-Secure Conversation is built on top of WS-Security to enable secure conversation between two services. WS-Security Policy complements WS-Security by specifying a set of rules to accommodate a wide variety of security models. This specification defines a protocol to locate services i.e. a developer of a client application can learn about the existence of a Web Service, its capabilities and method of interaction, given the URL to a common directory containing Web Service information. UDDI specifies a protocol for querying and updating this common directory. A UDDI entry contains 3 parts: service provider, Web Services offered and bindings to the implementations. Each of these parts provides progressively more detailed information about the Web service.
  • 5. The specifications intend to meet the following requirements: ! Enable smooth transitions between ad hoc and managed networks. ! Enable discovery of resource-limited service implementations. ! Support bootstrapping to other Web service protocols as well as other transports. ! Enable discovery of services by type and within scope. 7. WS-Reliable Messaging: WS-Reliable Messaging describes a protocol that allows messages to be delivered reliably between distributed applications in the presence of a software component failure, system failure, or network failures. At the most basic level, reliable messaging refers to the ability of a sender to deliver a message “once and only once” to its intended receiver. Many conditions may interrupt an exchange of messages between two services. This is especially an issue when unreliable transport protocols such as HTTP 1.0 and SMTP [SMTP] are used for transmission or when a message exchange spans multiple transport-layer connections. WS-Reliable Messaging is a protocol that enables the end-to-end reliable delivery of messages based on specific delivery assurance characteristics. The specification defines four different message delivery assurances: ! At-Least-Once Delivery: Each message is delivered at least one time. ! At-Most-Once Delivery: Duplicate messages will not be delivered. ! Exactly-Once Delivery: This is the logical “and” of the two prior delivery assurances. ! In-Order Delivery: Messages are delivered in the same order they were sent. The diagram below illustrates the entities and events involved in a simple reliable message exchange. The Application Source sends a message for reliable delivery. The Reliable Messaging (RM) Source accepts the message and transmits it one or more times to the RM destination. Once the RM Destination receives the message, it acknowledges the delivery. Finally, the RM Destination delivers the message to the Application Destination. Application Destination RM Destination Application Source RM Source Initial Sender Ultimate Receiver A simple reliable message exchange send Transmit Transmit Acknowledge Receive deliver
  • 6. 8. WS-Transactions: 9. WS-Enumeration Transfer and Eventing: Transactions are an important building block in all of the business applications. A transaction can be defined as a unit of work that involves one or more resources and is either completed in its entirety or is not done at all. Participating resources are locked for the duration of the transaction. Ws-Transactions describe an extensive framework for short duration and long duration business transactions. WS-Transaction defines two distinct transactional models: ! WS-Atomic Transaction: These correspond to the traditional transactions with ACID properties (Atomicity, Consistency, Isolation and Durability). This model supports transactions that are short- lived. ! WS-Business Activity: This specifies the protocols for long running transactions. The model allows participants to take part in the transactions without the resources being locked. This model has a mechanism to inform the participants to take necessary actions if the transaction outcome is different from the expected outcome of the participants. Co-ordination is the act of one agent (the coordinator) disseminating a message to all the other participants, to make sure that all the participants receive the same specific message. WS Co- ordination specifies the basic transaction infrastructure support. This specification describes a framework for providing protocols that co-ordinate the actions of distributed applications. It includes: ! Creation of a coordinator for a specific coordination protocol. ! Registration of the participants with the coordinator. ! Propagation of context: Here the coordinator takes the initiative of passing the transaction related information to the participants. This section briefs about the specifications that provide enumeration of service resources, their state management, which involves sessions between the source and requestor and event notification in the web services architecture. They are based on WS-Enumeration [WS-Enum], WS-Transfer [WS- Transfer], and WS-Eventing [WS-Eventing]. Protocol Pre-conditions: ! The RM Source must have an endpoint reference that uniquely identifies the RM destination endpoint. ! The source must have knowledge of the destination's policies, if any, and the RM Source must be capable of formulating messages that adhere to these policies. If a secure exchange of messages is required, then the RM source and RM destination must have a security policy in place.
  • 7. WS-Enumeration specification defines simple rules for enumeration that allows the data source to provide a session abstraction, called an enumeration context, to a consumer through a sequence of data items. Many scenarios require data exchange using more than just a single request/response message pair. Types of applications that require these longer data exchanges include database queries, data streaming etc. Enumeration, in particular, is achieved though establishing a session between the data source and the requestor. In its simplest form, WS-Enumeration defines a single operation, 'Pull', which allows a data source, to produce a sequence of XML elements in the body of a message. In addition to enumerating the data entities present in a Web service, it is convenient to be able to perform several basic operations on them. These operations are introduced in the WS-Transfer specification. WS-Transfer is a protocol for manipulating resources and their representations. A requestor can create, modify, delete resources, as well as retrieve XML representations of those resources. Specifically WS-Transfer defines two operations for sending and receiving the XML representation of a given resource and two operations for creating and deleting a resource and its corresponding XML representation. This specification needs to meet the following requirements: ! Provide a protocol for managing resources and their representations. ! Minimize additional mechanisms beyond the current Web Service architecture. Web services often want to receive messages when events occur in other services and applications. This specification defines a protocol for one Web service (called an "event sink") to register interest in another Web service (called an "event source") in receiving messages about events (called "notifications"). This registration process is called Subscription. To improve robustness, the subscription is leased by an event source to an event sink, and the subscription expires over time. An event source may allow an event sink to renew the subscription. When an event source determines that an event has occurred, it will provide that information to all of the matching subscriptions. This is similar to publishing topics or subjects in a traditional publish/subscribe event notification system. There are many mechanisms by which event sources may deliver events to event sinks. Subscriptions lease resources that must be eventually recovered. The primary mechanism used to reclaim resources is an expiration time for each subscription. The other mechanisms include querying the status of the subscription, renewing the subscription or unsubscribing the subscription. 10. WS-Management: WS-Management is a reusable middleware platform that enables communication between the client and the server application. It builds on several components of the architecture, providing a common set of operations that are required by all systems management solutions. The philosophy of Web Service Management Layer (WSML) is to extract all the web service related code present on the client and place it inside the WSML. Whenever a client makes a request to the server for some functionality, the request will actually be made to the service stub (shown in the figure). The WSML will translate this request to an available Web Service and send the result back to the client.
  • 8. 11. Conclusion: 12. References: What has been presented in this paper, is an easy to understand overview of the various web service extensions that are currently at different points of standardization. The effective and wide scale use of web services within enterprises require robust implementations of these extensions to be in place and used along with the other necessary infrastructure required for maintenance and management of the services. ! Web Services Architecture and Its Specifications: Essentials for Understanding WS-* Mar.2005. By Luis Felipe Cabrera, Chris Kurt ! SOA and Web Services – The road to EAI http://java.sun.com/developer/technicalArticles/WebServices/soa/ ! Securing the Web Services and JAVA WSDP 1.5 XWS Security Framework http://java.sun.com/developer/technicalArticles/WebServices/security/ ! Web Services Policy Framework http://specs.xmlsoap.org/ws/2004/09/policy/ws-policy.pdf ! Web Services Dynamic Discovery http://msdn.microsoft.com/ws/2005/04/ws-discovery/ ! From Open Grid Services Infrastructure to WS- Resource Framework http://www.globus.org/wsrf/specs/ogsi_to_wsrf_1.0.pdf ! W3C member submission http://www.w3.org/Submission/ Client Application Web Services Management Architecture Service Type Web Service WSML Web Service Web Service Service Initiation Service Security Service Co-ordination Service Management
  • 9. Torry Harris Business Solutions Inc, a US based services provider with a large base of technologists located in the UK, India and China has provided cost effective solutions at a design, development and support level to a variety of enterprise clients across the world since 1998. The company specializes in integration, distributed computing, and its focus on SOA is a result of nearly a decade of expertise gathered in the middleware space. The company has partnerships with almost all the leading SOA and integration product vendors. SOA, involving the creation of autonomous parts of a solution, lends itself admirably to the cost effective model of offshore service collaboration. A separate white paper entitled “SOA Implementation with an offshore partner” available for download, explores this model in a more detailed manner. Further information about the company and a variety of white papers on SOA are available at www.thbs.com/soa. For more information, write to us at soa@thbs.com. Torry Harris