SlideShare una empresa de Scribd logo
1 de 21
Cloud Computing: 20
Cloud Service Modeling
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Basic Concept of WEB Services
6
• A Web service typically carries comprehensive business
logic, can be searched through the Web, and has to be
accessed through the Internet or Intranet environment.
Above all, a Web service is published in a standard language
and accessed through a standard protocol.
Basic Concept of WEB Services
• A Web service is a programmable module with standard
interface descriptions that provide universal accessibility
through standard communication protocols. The functions
offered by Web services can be implemented in different
programming languages on different platforms.
7
Basic Concept of WEB Services
 The paradigm of Web Services is changing the Internet
from a repository of Web Content into a repository of
Services in Three Significant Ways:
1. First, by means of each organization exposing its business
applications as services on the Internet and making them
accessible via standard programmatic interfaces, this model
of Web services offers a promising way to facilitate
Business-to-Business B2B) collaboration within and across
enterprise boundaries
8
Basic Concept of Web Services
2. Second, the Web services technology provides a uniform
and loosely coupled integration framework to increase
cross-language and cross-platform interoperability for
distributed computing and resource sharing over the
Internet, inside or outside of firewall.
3. Third, the paradigm of Web services opens a new cost-
effective way of engineering software to quickly develop
and deploy Web applications, by dynamically integrating
other independently published Web service components
into new business processes.
9
Modeling a Web Service
 The Web Services Description Language (WSDL) has
become an ad hoc industry standard for describing a Web
service
 Simple Object Access Protocol (SOAP) has become an ad
hoc industry standard for accessing a Web service.
 WSDL Version 2 and SOAP Version 1.2 are endorsed by the
World Wide Web Consortium (W3C).
10
Basic Concept of WSDL Modeling
 WSDL is “an XML format for describing network services as a
set of endpoints operating on messages containing either
document-oriented or procedure-oriented information”
(http://www.wsdl.org).
 It is created to define the public interface of a Web service,
including its functionalities and how to invoke them.
11
Basic Concept of WSDL Modeling
 A WSDL document defines the protocol bindings and
message formats required to interact with the Web services
listed in its directory.
 The supported operations and messages are described
abstractly, associated with a concrete network protocol and
message format.
12
WSDL and SOAP (Interface and
Protocol)
 WSDL provides a notation to answer the following three
questions:
 What is the service about?
 Where does it reside?
 How can it be invoked? (i.e., what, where, and how)
13
WSDL and SOAP (Interface and
Protocol)
 WSDL is often used in combination with SOAP and XML
schema to define a Web service over the Internet.
 A client program reads a WSDL document to understand
what it can do; data types used are embedded in the
WSDL file in the form of XML schema.
 The client then uses SOAP to actually invoke the
functions listed in the WSDL document.
14
Basic Elements of WSDL
 A Web service is defined as a set of
ports, each publishing a collection of
port types that bind to network
addresses using a common binding
mechanism.
 Every port type is a published
operation that is accessible through
messages.
 Messages are in turn categorized into
input messages containing incoming
data arguments and output messages
containing results.
 Each message consists of data
elements; every data element must
belong to a data type, either an XML
Schema Definition (XSD) simple type
or a XSD complex type.
15
Sample Segment of a WSDL Document
 The tag portType defines “productPrice” as
the name of a port, and “getPrice” as the
name of an operation.
 The “getPrice” operation defines an input
message named “getPriceRequest” and an
output message “getPriceResponse.”
 The tag message defines the parameters
and associated data types of the input
message and the output message.
 Compared to traditional programming
language, “productPrice” maps to a
function library, “getPrice” maps to a
function with “getPriceRequest” as the
input parameters and “getPriceResponse”
as the return parameters.
<message name="getPriceRequest">
<part name="productid"
type="xs:string"/></message>
<message name="getPriceResponse">
<part name="value"
type="xs:string"/></message>
<portType name="productPrice">
<operation name="getPrice">
<input
message="getPriceRequest"/>
<output
message="getPriceResponse"/>
</operation>
</portType>
16
Operation Types Defined in WSDL
 WSDL defines four types of operations: one-way, request-
response, solicit response, and notification.
 The one-way operation receives a message but does not
return a response message.
 The request-response operation receives a request and
returns a response.
 The solicit-response operation sends a request for a
response.
 The notification operation sends a message but does not
wait for a response.
 The request-response type is the most frequently used
operation type.
17
Web Services Communication
Protocol: SOAP
 SOAP is a simple and lightweight protocol for exchanging
structured and typed information among Web services.
 In the core of the Web services model, SOAP acts as the
messaging protocol for transport with binding to existing
Internet protocols, such as Hypertext Transfer Protocol
(HTTP) and Simple Mail Transfer Protocol (SMTP) as
underlying communication protocols.
 Defining a uniform way of passing XML-encoded data, SOAP
also enables a way of conducting Remote Procedure Calls
(RPCs) binding with HTTP.
18
Web Services Communication
Protocol: SOAP (Cont’d)
 In short, SOAP provides a way to communicate between
applications running on different operating systems, with
different technologies, and programming languages.
 SOAP is endorsed by W3C and key industry vendors such as
Sun Microsystems, IBM, Microsoft, etc.
 Detailed information about SOAP can be found at the W3C
Web site at http://www.w3c.org/TR/SOAP.
19
SOAP Envelope (Header and Body)
POST /InServicesComputing HTTP/1.1
Host: www.servicescomputing.org
Content-Type: application/soap+xml; charset=utf-8
Content-Length: 100
<?xml version="1.0"?>
<soap:Envelope
xmlns:soap="http://www.w3.org/2001/12/soap-
envelope"
soap:encodingStyle="http://www.w3.org/2001/12/soap-
encoding">
<soap:Header>
<m:Payment
xmlns:m="http://www.servicescomputing.org/paymen
t/"
soap:actor="http://www.servicescomputing.org/appm
l/">
soap:mustUnderstand="1">
123
</m:Payment>
</soap:Header>
<soap:Body>
<!-- Request message -->
<m:GetPrice
xmlns:m="http://www.servicescomputing.org/pr
ices">
<m:Item>Proceedings</m:Item>
</m:GetPrice>
<!-- Response message -->
<m:GetPriceResponse
xmlns:m="http://www.servicescomputing.org/pr
ices">
<m:Price>70</m:Price>
</m:GetPriceResponse>
...
<soap:Fault>
...
</soap:Fault>
</soap:Body>
</soap:Envelope>
20
Binding of WSDL to SOAP
 A WSDL document defines how to access a service
operation using the element binding: the message format
and protocol details for each port.
 The binding tag has two attributes: the name attribute and
the type attribute.
 The name attribute defines the name of the binding, and
the type attribute points to the port for the binding, in
this case it is the “productPrice” port.
21
Binding of WSDL to SOAP
 The tag soap:binding has two attributes: the style
attribute and the transport attribute. The style attribute
can be either “ RPC (Remote Procedure Call)” or
“document.”
 The transport attribute defines the SOAP protocol to use,
in this example it is “HTTP.” The tag operation defines
each operation that the port exposes. For each
operation, the corresponding SOAP action needs to be
defined. One needs to specify how the input and output
messages are encoded.
22
An example WSDL binding segment
<message name="getPriceRequest">
<part name="productid" type="xs:string"/>
</message>
<message name="getPriceResponse">
<part name="value" type="xs:string"/>
</message>
<portType name="productPrice">
<operation name="getPrice">
<input message="getPriceRequest"/>
<output message="getPriceResponse"/>
</operation>
</portType>
<binding type="productPrice"
name="b1">
<soap:binding style="document" trans-
port="http://schemas.xmlsoap.org/soa
p/http"/>
<operation>
<soap:operation
soapAction="http://servicescomputing
.org/getPrice"/>
<input>
<soap:body use="literal"/>
</input>
<output>
<soap:body use="literal"/>
</output>
</operation>
</binding>
23
Publishing a Web Service in Registry
 Universal Description, Discovery, and Integration (UDDI) is
an ad hoc industry standard that provides a “meta service”
for publishing and locating Web services by enabling robust
queries against rich metadata.
 The UDDI working group includes leading technology
vendors, such as IBM, HP, and Microsoft. Detailed
information about UDDI can be found at its official Web site
at http://www.uddi.org/.
24
Assignment
• What is the role of WSDL in Web Service
Modeling
• Explain the usage of SOAP in web service
modleing

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Web Services ppt
Web Services pptWeb Services ppt
Web Services ppt
 
Introduction to web services and how to in php
Introduction to web services and how to in phpIntroduction to web services and how to in php
Introduction to web services and how to in php
 
Introduction to webservices
Introduction to webservicesIntroduction to webservices
Introduction to webservices
 
Web service assignment
Web service assignmentWeb service assignment
Web service assignment
 
Web Services
Web ServicesWeb Services
Web Services
 
Web Service Interaction Models | Torry Harris Whitepaper
Web Service Interaction Models | Torry Harris WhitepaperWeb Service Interaction Models | Torry Harris Whitepaper
Web Service Interaction Models | Torry Harris Whitepaper
 
SOAP, UDDI, WSDL. XML definitions
SOAP, UDDI, WSDL. XML definitions SOAP, UDDI, WSDL. XML definitions
SOAP, UDDI, WSDL. XML definitions
 
Wsdl
WsdlWsdl
Wsdl
 
Web services
Web servicesWeb services
Web services
 
Ogsi protocol perspective
Ogsi protocol perspectiveOgsi protocol perspective
Ogsi protocol perspective
 
Introduction to Web Services
Introduction to Web ServicesIntroduction to Web Services
Introduction to Web Services
 
Understanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company indiaUnderstanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company india
 
Unit 5 WEB TECHNOLOGIES
Unit 5 WEB TECHNOLOGIES Unit 5 WEB TECHNOLOGIES
Unit 5 WEB TECHNOLOGIES
 
Web service Introduction
Web service IntroductionWeb service Introduction
Web service Introduction
 
Lecture 16 - Web Services
Lecture 16 - Web ServicesLecture 16 - Web Services
Lecture 16 - Web Services
 
Service view
Service viewService view
Service view
 
web service technologies
web service technologiesweb service technologies
web service technologies
 
Wsdl1
Wsdl1Wsdl1
Wsdl1
 
Web Services
Web ServicesWeb Services
Web Services
 
web technologies Unit 5
 web technologies Unit 5 web technologies Unit 5
web technologies Unit 5
 

Similar a Cloud computing 20 service modelling

Cloud computing 21 concept of wsdl modeling
Cloud computing 21 concept of wsdl modelingCloud computing 21 concept of wsdl modeling
Cloud computing 21 concept of wsdl modelingVaibhav Khanna
 
Web programming
Web programmingWeb programming
Web programmingsowfi
 
Web services for developer
Web services for developerWeb services for developer
Web services for developerRafiq Ahmed
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and developmentishmecse13
 
WebService-Java
WebService-JavaWebService-Java
WebService-Javahalwal
 
Service Oriented Architecture Luqman
Service Oriented Architecture LuqmanService Oriented Architecture Luqman
Service Oriented Architecture LuqmanLuqman Shareef
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technologysanjoysanyal
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technologysanjoysanyal
 
webservices overview
webservices overviewwebservices overview
webservices overviewelliando dias
 
Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxssuser403d87
 
Web Service
Web ServiceWeb Service
Web ServiceKumar S
 
Anatomy Of A Web Service
Anatomy Of A Web ServiceAnatomy Of A Web Service
Anatomy Of A Web Servicekchavd01
 
Advantage of WCF Over Web Services
Advantage of WCF Over Web ServicesAdvantage of WCF Over Web Services
Advantage of WCF Over Web ServicesSiva Tharun Kola
 

Similar a Cloud computing 20 service modelling (20)

Cloud computing 21 concept of wsdl modeling
Cloud computing 21 concept of wsdl modelingCloud computing 21 concept of wsdl modeling
Cloud computing 21 concept of wsdl modeling
 
Web programming
Web programmingWeb programming
Web programming
 
Web services for developer
Web services for developerWeb services for developer
Web services for developer
 
SOA web services concepts
SOA web services conceptsSOA web services concepts
SOA web services concepts
 
Web services
Web servicesWeb services
Web services
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and development
 
WebService-Java
WebService-JavaWebService-Java
WebService-Java
 
Java web services
Java web servicesJava web services
Java web services
 
Service Oriented Architecture Luqman
Service Oriented Architecture LuqmanService Oriented Architecture Luqman
Service Oriented Architecture Luqman
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technology
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technology
 
webservices overview
webservices overviewwebservices overview
webservices overview
 
Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptx
 
Web services
Web services Web services
Web services
 
Web Service
Web ServiceWeb Service
Web Service
 
Anatomy Of A Web Service
Anatomy Of A Web ServiceAnatomy Of A Web Service
Anatomy Of A Web Service
 
Xml.ppt
Xml.pptXml.ppt
Xml.ppt
 
Web Services
Web Services Web Services
Web Services
 
Web services
Web servicesWeb services
Web services
 
Advantage of WCF Over Web Services
Advantage of WCF Over Web ServicesAdvantage of WCF Over Web Services
Advantage of WCF Over Web Services
 

Más de Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

Más de Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Último

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 

Último (20)

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 

Cloud computing 20 service modelling

  • 1. Cloud Computing: 20 Cloud Service Modeling Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Basic Concept of WEB Services 6 • A Web service typically carries comprehensive business logic, can be searched through the Web, and has to be accessed through the Internet or Intranet environment. Above all, a Web service is published in a standard language and accessed through a standard protocol.
  • 3. Basic Concept of WEB Services • A Web service is a programmable module with standard interface descriptions that provide universal accessibility through standard communication protocols. The functions offered by Web services can be implemented in different programming languages on different platforms. 7
  • 4. Basic Concept of WEB Services  The paradigm of Web Services is changing the Internet from a repository of Web Content into a repository of Services in Three Significant Ways: 1. First, by means of each organization exposing its business applications as services on the Internet and making them accessible via standard programmatic interfaces, this model of Web services offers a promising way to facilitate Business-to-Business B2B) collaboration within and across enterprise boundaries 8
  • 5. Basic Concept of Web Services 2. Second, the Web services technology provides a uniform and loosely coupled integration framework to increase cross-language and cross-platform interoperability for distributed computing and resource sharing over the Internet, inside or outside of firewall. 3. Third, the paradigm of Web services opens a new cost- effective way of engineering software to quickly develop and deploy Web applications, by dynamically integrating other independently published Web service components into new business processes. 9
  • 6. Modeling a Web Service  The Web Services Description Language (WSDL) has become an ad hoc industry standard for describing a Web service  Simple Object Access Protocol (SOAP) has become an ad hoc industry standard for accessing a Web service.  WSDL Version 2 and SOAP Version 1.2 are endorsed by the World Wide Web Consortium (W3C). 10
  • 7. Basic Concept of WSDL Modeling  WSDL is “an XML format for describing network services as a set of endpoints operating on messages containing either document-oriented or procedure-oriented information” (http://www.wsdl.org).  It is created to define the public interface of a Web service, including its functionalities and how to invoke them. 11
  • 8. Basic Concept of WSDL Modeling  A WSDL document defines the protocol bindings and message formats required to interact with the Web services listed in its directory.  The supported operations and messages are described abstractly, associated with a concrete network protocol and message format. 12
  • 9. WSDL and SOAP (Interface and Protocol)  WSDL provides a notation to answer the following three questions:  What is the service about?  Where does it reside?  How can it be invoked? (i.e., what, where, and how) 13
  • 10. WSDL and SOAP (Interface and Protocol)  WSDL is often used in combination with SOAP and XML schema to define a Web service over the Internet.  A client program reads a WSDL document to understand what it can do; data types used are embedded in the WSDL file in the form of XML schema.  The client then uses SOAP to actually invoke the functions listed in the WSDL document. 14
  • 11. Basic Elements of WSDL  A Web service is defined as a set of ports, each publishing a collection of port types that bind to network addresses using a common binding mechanism.  Every port type is a published operation that is accessible through messages.  Messages are in turn categorized into input messages containing incoming data arguments and output messages containing results.  Each message consists of data elements; every data element must belong to a data type, either an XML Schema Definition (XSD) simple type or a XSD complex type. 15
  • 12. Sample Segment of a WSDL Document  The tag portType defines “productPrice” as the name of a port, and “getPrice” as the name of an operation.  The “getPrice” operation defines an input message named “getPriceRequest” and an output message “getPriceResponse.”  The tag message defines the parameters and associated data types of the input message and the output message.  Compared to traditional programming language, “productPrice” maps to a function library, “getPrice” maps to a function with “getPriceRequest” as the input parameters and “getPriceResponse” as the return parameters. <message name="getPriceRequest"> <part name="productid" type="xs:string"/></message> <message name="getPriceResponse"> <part name="value" type="xs:string"/></message> <portType name="productPrice"> <operation name="getPrice"> <input message="getPriceRequest"/> <output message="getPriceResponse"/> </operation> </portType> 16
  • 13. Operation Types Defined in WSDL  WSDL defines four types of operations: one-way, request- response, solicit response, and notification.  The one-way operation receives a message but does not return a response message.  The request-response operation receives a request and returns a response.  The solicit-response operation sends a request for a response.  The notification operation sends a message but does not wait for a response.  The request-response type is the most frequently used operation type. 17
  • 14. Web Services Communication Protocol: SOAP  SOAP is a simple and lightweight protocol for exchanging structured and typed information among Web services.  In the core of the Web services model, SOAP acts as the messaging protocol for transport with binding to existing Internet protocols, such as Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) as underlying communication protocols.  Defining a uniform way of passing XML-encoded data, SOAP also enables a way of conducting Remote Procedure Calls (RPCs) binding with HTTP. 18
  • 15. Web Services Communication Protocol: SOAP (Cont’d)  In short, SOAP provides a way to communicate between applications running on different operating systems, with different technologies, and programming languages.  SOAP is endorsed by W3C and key industry vendors such as Sun Microsystems, IBM, Microsoft, etc.  Detailed information about SOAP can be found at the W3C Web site at http://www.w3c.org/TR/SOAP. 19
  • 16. SOAP Envelope (Header and Body) POST /InServicesComputing HTTP/1.1 Host: www.servicescomputing.org Content-Type: application/soap+xml; charset=utf-8 Content-Length: 100 <?xml version="1.0"?> <soap:Envelope xmlns:soap="http://www.w3.org/2001/12/soap- envelope" soap:encodingStyle="http://www.w3.org/2001/12/soap- encoding"> <soap:Header> <m:Payment xmlns:m="http://www.servicescomputing.org/paymen t/" soap:actor="http://www.servicescomputing.org/appm l/"> soap:mustUnderstand="1"> 123 </m:Payment> </soap:Header> <soap:Body> <!-- Request message --> <m:GetPrice xmlns:m="http://www.servicescomputing.org/pr ices"> <m:Item>Proceedings</m:Item> </m:GetPrice> <!-- Response message --> <m:GetPriceResponse xmlns:m="http://www.servicescomputing.org/pr ices"> <m:Price>70</m:Price> </m:GetPriceResponse> ... <soap:Fault> ... </soap:Fault> </soap:Body> </soap:Envelope> 20
  • 17. Binding of WSDL to SOAP  A WSDL document defines how to access a service operation using the element binding: the message format and protocol details for each port.  The binding tag has two attributes: the name attribute and the type attribute.  The name attribute defines the name of the binding, and the type attribute points to the port for the binding, in this case it is the “productPrice” port. 21
  • 18. Binding of WSDL to SOAP  The tag soap:binding has two attributes: the style attribute and the transport attribute. The style attribute can be either “ RPC (Remote Procedure Call)” or “document.”  The transport attribute defines the SOAP protocol to use, in this example it is “HTTP.” The tag operation defines each operation that the port exposes. For each operation, the corresponding SOAP action needs to be defined. One needs to specify how the input and output messages are encoded. 22
  • 19. An example WSDL binding segment <message name="getPriceRequest"> <part name="productid" type="xs:string"/> </message> <message name="getPriceResponse"> <part name="value" type="xs:string"/> </message> <portType name="productPrice"> <operation name="getPrice"> <input message="getPriceRequest"/> <output message="getPriceResponse"/> </operation> </portType> <binding type="productPrice" name="b1"> <soap:binding style="document" trans- port="http://schemas.xmlsoap.org/soa p/http"/> <operation> <soap:operation soapAction="http://servicescomputing .org/getPrice"/> <input> <soap:body use="literal"/> </input> <output> <soap:body use="literal"/> </output> </operation> </binding> 23
  • 20. Publishing a Web Service in Registry  Universal Description, Discovery, and Integration (UDDI) is an ad hoc industry standard that provides a “meta service” for publishing and locating Web services by enabling robust queries against rich metadata.  The UDDI working group includes leading technology vendors, such as IBM, HP, and Microsoft. Detailed information about UDDI can be found at its official Web site at http://www.uddi.org/. 24
  • 21. Assignment • What is the role of WSDL in Web Service Modeling • Explain the usage of SOAP in web service modleing