SlideShare a Scribd company logo
Cloud Computing: 20
Cloud Service Modeling
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Basic Concept of WEB Services
6
• A Web service typically carries comprehensive business
logic, can be searched through the Web, and has to be
accessed through the Internet or Intranet environment.
Above all, a Web service is published in a standard language
and accessed through a standard protocol.
Basic Concept of WEB Services
• A Web service is a programmable module with standard
interface descriptions that provide universal accessibility
through standard communication protocols. The functions
offered by Web services can be implemented in different
programming languages on different platforms.
7
Basic Concept of WEB Services
 The paradigm of Web Services is changing the Internet
from a repository of Web Content into a repository of
Services in Three Significant Ways:
1. First, by means of each organization exposing its business
applications as services on the Internet and making them
accessible via standard programmatic interfaces, this model
of Web services offers a promising way to facilitate
Business-to-Business B2B) collaboration within and across
enterprise boundaries
8
Basic Concept of Web Services
2. Second, the Web services technology provides a uniform
and loosely coupled integration framework to increase
cross-language and cross-platform interoperability for
distributed computing and resource sharing over the
Internet, inside or outside of firewall.
3. Third, the paradigm of Web services opens a new cost-
effective way of engineering software to quickly develop
and deploy Web applications, by dynamically integrating
other independently published Web service components
into new business processes.
9
Modeling a Web Service
 The Web Services Description Language (WSDL) has
become an ad hoc industry standard for describing a Web
service
 Simple Object Access Protocol (SOAP) has become an ad
hoc industry standard for accessing a Web service.
 WSDL Version 2 and SOAP Version 1.2 are endorsed by the
World Wide Web Consortium (W3C).
10
Basic Concept of WSDL Modeling
 WSDL is “an XML format for describing network services as a
set of endpoints operating on messages containing either
document-oriented or procedure-oriented information”
(http://www.wsdl.org).
 It is created to define the public interface of a Web service,
including its functionalities and how to invoke them.
11
Basic Concept of WSDL Modeling
 A WSDL document defines the protocol bindings and
message formats required to interact with the Web services
listed in its directory.
 The supported operations and messages are described
abstractly, associated with a concrete network protocol and
message format.
12
WSDL and SOAP (Interface and
Protocol)
 WSDL provides a notation to answer the following three
questions:
 What is the service about?
 Where does it reside?
 How can it be invoked? (i.e., what, where, and how)
13
WSDL and SOAP (Interface and
Protocol)
 WSDL is often used in combination with SOAP and XML
schema to define a Web service over the Internet.
 A client program reads a WSDL document to understand
what it can do; data types used are embedded in the
WSDL file in the form of XML schema.
 The client then uses SOAP to actually invoke the
functions listed in the WSDL document.
14
Basic Elements of WSDL
 A Web service is defined as a set of
ports, each publishing a collection of
port types that bind to network
addresses using a common binding
mechanism.
 Every port type is a published
operation that is accessible through
messages.
 Messages are in turn categorized into
input messages containing incoming
data arguments and output messages
containing results.
 Each message consists of data
elements; every data element must
belong to a data type, either an XML
Schema Definition (XSD) simple type
or a XSD complex type.
15
Sample Segment of a WSDL Document
 The tag portType defines “productPrice” as
the name of a port, and “getPrice” as the
name of an operation.
 The “getPrice” operation defines an input
message named “getPriceRequest” and an
output message “getPriceResponse.”
 The tag message defines the parameters
and associated data types of the input
message and the output message.
 Compared to traditional programming
language, “productPrice” maps to a
function library, “getPrice” maps to a
function with “getPriceRequest” as the
input parameters and “getPriceResponse”
as the return parameters.
<message name="getPriceRequest">
<part name="productid"
type="xs:string"/></message>
<message name="getPriceResponse">
<part name="value"
type="xs:string"/></message>
<portType name="productPrice">
<operation name="getPrice">
<input
message="getPriceRequest"/>
<output
message="getPriceResponse"/>
</operation>
</portType>
16
Operation Types Defined in WSDL
 WSDL defines four types of operations: one-way, request-
response, solicit response, and notification.
 The one-way operation receives a message but does not
return a response message.
 The request-response operation receives a request and
returns a response.
 The solicit-response operation sends a request for a
response.
 The notification operation sends a message but does not
wait for a response.
 The request-response type is the most frequently used
operation type.
17
Web Services Communication
Protocol: SOAP
 SOAP is a simple and lightweight protocol for exchanging
structured and typed information among Web services.
 In the core of the Web services model, SOAP acts as the
messaging protocol for transport with binding to existing
Internet protocols, such as Hypertext Transfer Protocol
(HTTP) and Simple Mail Transfer Protocol (SMTP) as
underlying communication protocols.
 Defining a uniform way of passing XML-encoded data, SOAP
also enables a way of conducting Remote Procedure Calls
(RPCs) binding with HTTP.
18
Web Services Communication
Protocol: SOAP (Cont’d)
 In short, SOAP provides a way to communicate between
applications running on different operating systems, with
different technologies, and programming languages.
 SOAP is endorsed by W3C and key industry vendors such as
Sun Microsystems, IBM, Microsoft, etc.
 Detailed information about SOAP can be found at the W3C
Web site at http://www.w3c.org/TR/SOAP.
19
SOAP Envelope (Header and Body)
POST /InServicesComputing HTTP/1.1
Host: www.servicescomputing.org
Content-Type: application/soap+xml; charset=utf-8
Content-Length: 100
<?xml version="1.0"?>
<soap:Envelope
xmlns:soap="http://www.w3.org/2001/12/soap-
envelope"
soap:encodingStyle="http://www.w3.org/2001/12/soap-
encoding">
<soap:Header>
<m:Payment
xmlns:m="http://www.servicescomputing.org/paymen
t/"
soap:actor="http://www.servicescomputing.org/appm
l/">
soap:mustUnderstand="1">
123
</m:Payment>
</soap:Header>
<soap:Body>
<!-- Request message -->
<m:GetPrice
xmlns:m="http://www.servicescomputing.org/pr
ices">
<m:Item>Proceedings</m:Item>
</m:GetPrice>
<!-- Response message -->
<m:GetPriceResponse
xmlns:m="http://www.servicescomputing.org/pr
ices">
<m:Price>70</m:Price>
</m:GetPriceResponse>
...
<soap:Fault>
...
</soap:Fault>
</soap:Body>
</soap:Envelope>
20
Binding of WSDL to SOAP
 A WSDL document defines how to access a service
operation using the element binding: the message format
and protocol details for each port.
 The binding tag has two attributes: the name attribute and
the type attribute.
 The name attribute defines the name of the binding, and
the type attribute points to the port for the binding, in
this case it is the “productPrice” port.
21
Binding of WSDL to SOAP
 The tag soap:binding has two attributes: the style
attribute and the transport attribute. The style attribute
can be either “ RPC (Remote Procedure Call)” or
“document.”
 The transport attribute defines the SOAP protocol to use,
in this example it is “HTTP.” The tag operation defines
each operation that the port exposes. For each
operation, the corresponding SOAP action needs to be
defined. One needs to specify how the input and output
messages are encoded.
22
An example WSDL binding segment
<message name="getPriceRequest">
<part name="productid" type="xs:string"/>
</message>
<message name="getPriceResponse">
<part name="value" type="xs:string"/>
</message>
<portType name="productPrice">
<operation name="getPrice">
<input message="getPriceRequest"/>
<output message="getPriceResponse"/>
</operation>
</portType>
<binding type="productPrice"
name="b1">
<soap:binding style="document" trans-
port="http://schemas.xmlsoap.org/soa
p/http"/>
<operation>
<soap:operation
soapAction="http://servicescomputing
.org/getPrice"/>
<input>
<soap:body use="literal"/>
</input>
<output>
<soap:body use="literal"/>
</output>
</operation>
</binding>
23
Publishing a Web Service in Registry
 Universal Description, Discovery, and Integration (UDDI) is
an ad hoc industry standard that provides a “meta service”
for publishing and locating Web services by enabling robust
queries against rich metadata.
 The UDDI working group includes leading technology
vendors, such as IBM, HP, and Microsoft. Detailed
information about UDDI can be found at its official Web site
at http://www.uddi.org/.
24
Assignment
• What is the role of WSDL in Web Service
Modeling
• Explain the usage of SOAP in web service
modleing

More Related Content

What's hot

Introduction to web services and how to in php
Introduction to web services and how to in phpIntroduction to web services and how to in php
Introduction to web services and how to in php
Amit Kumar Singh
 
Introduction to webservices
Introduction to webservicesIntroduction to webservices
Introduction to webservices
Gagandeep Singh
 
Web service assignment
Web service assignmentWeb service assignment
Web service assignment
ancymary1996
 
Web Service Interaction Models | Torry Harris Whitepaper
Web Service Interaction Models | Torry Harris WhitepaperWeb Service Interaction Models | Torry Harris Whitepaper
Web Service Interaction Models | Torry Harris Whitepaper
Torry Harris Business Solutions
 
SOAP, UDDI, WSDL. XML definitions
SOAP, UDDI, WSDL. XML definitions SOAP, UDDI, WSDL. XML definitions
SOAP, UDDI, WSDL. XML definitions
Wish Mrt'xa
 
Wsdl
WsdlWsdl
Ogsi protocol perspective
Ogsi protocol perspectiveOgsi protocol perspective
Ogsi protocol perspective
Pooja Dixit
 
Introduction to Web Services
Introduction to Web ServicesIntroduction to Web Services
Introduction to Web Services
Thanachart Numnonda
 
Understanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company indiaUnderstanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company india
Jignesh Aakoliya
 
Unit 5 WEB TECHNOLOGIES
Unit 5 WEB TECHNOLOGIES Unit 5 WEB TECHNOLOGIES
Unit 5 WEB TECHNOLOGIES
tamilmozhiyaltamilmo
 
Web service Introduction
Web service IntroductionWeb service Introduction
Web service Introduction
Madhukar Kumar
 
Lecture 16 - Web Services
Lecture 16 - Web ServicesLecture 16 - Web Services
Lecture 16 - Web Services
phanleson
 
Service view
Service viewService view
Service view
Pooja Dixit
 
web service technologies
web service technologiesweb service technologies
web service technologies
Yash Darak
 
Web Services
Web ServicesWeb Services
Web Services
Antonio Villegas
 
web technologies Unit 5
 web technologies Unit 5 web technologies Unit 5
web technologies Unit 5
madhusrinivasan9
 

What's hot (20)

Web Services ppt
Web Services pptWeb Services ppt
Web Services ppt
 
Introduction to web services and how to in php
Introduction to web services and how to in phpIntroduction to web services and how to in php
Introduction to web services and how to in php
 
Introduction to webservices
Introduction to webservicesIntroduction to webservices
Introduction to webservices
 
Web service assignment
Web service assignmentWeb service assignment
Web service assignment
 
Web Services
Web ServicesWeb Services
Web Services
 
Web Service Interaction Models | Torry Harris Whitepaper
Web Service Interaction Models | Torry Harris WhitepaperWeb Service Interaction Models | Torry Harris Whitepaper
Web Service Interaction Models | Torry Harris Whitepaper
 
SOAP, UDDI, WSDL. XML definitions
SOAP, UDDI, WSDL. XML definitions SOAP, UDDI, WSDL. XML definitions
SOAP, UDDI, WSDL. XML definitions
 
Wsdl
WsdlWsdl
Wsdl
 
Web services
Web servicesWeb services
Web services
 
Ogsi protocol perspective
Ogsi protocol perspectiveOgsi protocol perspective
Ogsi protocol perspective
 
Introduction to Web Services
Introduction to Web ServicesIntroduction to Web Services
Introduction to Web Services
 
Understanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company indiaUnderstanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company india
 
Unit 5 WEB TECHNOLOGIES
Unit 5 WEB TECHNOLOGIES Unit 5 WEB TECHNOLOGIES
Unit 5 WEB TECHNOLOGIES
 
Web service Introduction
Web service IntroductionWeb service Introduction
Web service Introduction
 
Lecture 16 - Web Services
Lecture 16 - Web ServicesLecture 16 - Web Services
Lecture 16 - Web Services
 
Service view
Service viewService view
Service view
 
web service technologies
web service technologiesweb service technologies
web service technologies
 
Wsdl1
Wsdl1Wsdl1
Wsdl1
 
Web Services
Web ServicesWeb Services
Web Services
 
web technologies Unit 5
 web technologies Unit 5 web technologies Unit 5
web technologies Unit 5
 

Similar to Cloud computing 20 service modelling

Cloud computing 21 concept of wsdl modeling
Cloud computing 21 concept of wsdl modelingCloud computing 21 concept of wsdl modeling
Cloud computing 21 concept of wsdl modeling
Vaibhav Khanna
 
Web programming
Web programmingWeb programming
Web programming
sowfi
 
Web services for developer
Web services for developerWeb services for developer
Web services for developer
Rafiq Ahmed
 
SOA web services concepts
SOA web services conceptsSOA web services concepts
SOA web services concepts
XAVIERCONSULTANTS
 
Web services
Web servicesWeb services
Web services
Akshay Ballarpure
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and development
ishmecse13
 
WebService-Java
WebService-JavaWebService-Java
WebService-Java
halwal
 
Java web services
Java web servicesJava web services
Java web services
kumar gaurav
 
Service Oriented Architecture Luqman
Service Oriented Architecture LuqmanService Oriented Architecture Luqman
Service Oriented Architecture LuqmanLuqman Shareef
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technologysanjoysanyal
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technologysanjoysanyal
 
webservices overview
webservices overviewwebservices overview
webservices overviewelliando dias
 
Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptx
ssuser403d87
 
Web services
Web services Web services
Web services
UMA MAHESWARI
 
Web Service
Web ServiceWeb Service
Web Service
Kumar S
 
Anatomy Of A Web Service
Anatomy Of A Web ServiceAnatomy Of A Web Service
Anatomy Of A Web Service
kchavd01
 
Xml.ppt
Xml.pptXml.ppt
Web services
Web servicesWeb services
Web services
ishmecse13
 
Advantage of WCF Over Web Services
Advantage of WCF Over Web ServicesAdvantage of WCF Over Web Services
Advantage of WCF Over Web Services
Siva Tharun Kola
 

Similar to Cloud computing 20 service modelling (20)

Cloud computing 21 concept of wsdl modeling
Cloud computing 21 concept of wsdl modelingCloud computing 21 concept of wsdl modeling
Cloud computing 21 concept of wsdl modeling
 
Web programming
Web programmingWeb programming
Web programming
 
Web services for developer
Web services for developerWeb services for developer
Web services for developer
 
SOA web services concepts
SOA web services conceptsSOA web services concepts
SOA web services concepts
 
Web services
Web servicesWeb services
Web services
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and development
 
WebService-Java
WebService-JavaWebService-Java
WebService-Java
 
Java web services
Java web servicesJava web services
Java web services
 
Service Oriented Architecture Luqman
Service Oriented Architecture LuqmanService Oriented Architecture Luqman
Service Oriented Architecture Luqman
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technology
 
Topic6 Basic Web Services Technology
Topic6 Basic Web Services TechnologyTopic6 Basic Web Services Technology
Topic6 Basic Web Services Technology
 
webservices overview
webservices overviewwebservices overview
webservices overview
 
Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptx
 
Web services
Web services Web services
Web services
 
Web Service
Web ServiceWeb Service
Web Service
 
Anatomy Of A Web Service
Anatomy Of A Web ServiceAnatomy Of A Web Service
Anatomy Of A Web Service
 
Xml.ppt
Xml.pptXml.ppt
Xml.ppt
 
Web Services
Web Services Web Services
Web Services
 
Web services
Web servicesWeb services
Web services
 
Advantage of WCF Over Web Services
Advantage of WCF Over Web ServicesAdvantage of WCF Over Web Services
Advantage of WCF Over Web Services
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 

Recently uploaded (20)

AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 

Cloud computing 20 service modelling

  • 1. Cloud Computing: 20 Cloud Service Modeling Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Basic Concept of WEB Services 6 • A Web service typically carries comprehensive business logic, can be searched through the Web, and has to be accessed through the Internet or Intranet environment. Above all, a Web service is published in a standard language and accessed through a standard protocol.
  • 3. Basic Concept of WEB Services • A Web service is a programmable module with standard interface descriptions that provide universal accessibility through standard communication protocols. The functions offered by Web services can be implemented in different programming languages on different platforms. 7
  • 4. Basic Concept of WEB Services  The paradigm of Web Services is changing the Internet from a repository of Web Content into a repository of Services in Three Significant Ways: 1. First, by means of each organization exposing its business applications as services on the Internet and making them accessible via standard programmatic interfaces, this model of Web services offers a promising way to facilitate Business-to-Business B2B) collaboration within and across enterprise boundaries 8
  • 5. Basic Concept of Web Services 2. Second, the Web services technology provides a uniform and loosely coupled integration framework to increase cross-language and cross-platform interoperability for distributed computing and resource sharing over the Internet, inside or outside of firewall. 3. Third, the paradigm of Web services opens a new cost- effective way of engineering software to quickly develop and deploy Web applications, by dynamically integrating other independently published Web service components into new business processes. 9
  • 6. Modeling a Web Service  The Web Services Description Language (WSDL) has become an ad hoc industry standard for describing a Web service  Simple Object Access Protocol (SOAP) has become an ad hoc industry standard for accessing a Web service.  WSDL Version 2 and SOAP Version 1.2 are endorsed by the World Wide Web Consortium (W3C). 10
  • 7. Basic Concept of WSDL Modeling  WSDL is “an XML format for describing network services as a set of endpoints operating on messages containing either document-oriented or procedure-oriented information” (http://www.wsdl.org).  It is created to define the public interface of a Web service, including its functionalities and how to invoke them. 11
  • 8. Basic Concept of WSDL Modeling  A WSDL document defines the protocol bindings and message formats required to interact with the Web services listed in its directory.  The supported operations and messages are described abstractly, associated with a concrete network protocol and message format. 12
  • 9. WSDL and SOAP (Interface and Protocol)  WSDL provides a notation to answer the following three questions:  What is the service about?  Where does it reside?  How can it be invoked? (i.e., what, where, and how) 13
  • 10. WSDL and SOAP (Interface and Protocol)  WSDL is often used in combination with SOAP and XML schema to define a Web service over the Internet.  A client program reads a WSDL document to understand what it can do; data types used are embedded in the WSDL file in the form of XML schema.  The client then uses SOAP to actually invoke the functions listed in the WSDL document. 14
  • 11. Basic Elements of WSDL  A Web service is defined as a set of ports, each publishing a collection of port types that bind to network addresses using a common binding mechanism.  Every port type is a published operation that is accessible through messages.  Messages are in turn categorized into input messages containing incoming data arguments and output messages containing results.  Each message consists of data elements; every data element must belong to a data type, either an XML Schema Definition (XSD) simple type or a XSD complex type. 15
  • 12. Sample Segment of a WSDL Document  The tag portType defines “productPrice” as the name of a port, and “getPrice” as the name of an operation.  The “getPrice” operation defines an input message named “getPriceRequest” and an output message “getPriceResponse.”  The tag message defines the parameters and associated data types of the input message and the output message.  Compared to traditional programming language, “productPrice” maps to a function library, “getPrice” maps to a function with “getPriceRequest” as the input parameters and “getPriceResponse” as the return parameters. <message name="getPriceRequest"> <part name="productid" type="xs:string"/></message> <message name="getPriceResponse"> <part name="value" type="xs:string"/></message> <portType name="productPrice"> <operation name="getPrice"> <input message="getPriceRequest"/> <output message="getPriceResponse"/> </operation> </portType> 16
  • 13. Operation Types Defined in WSDL  WSDL defines four types of operations: one-way, request- response, solicit response, and notification.  The one-way operation receives a message but does not return a response message.  The request-response operation receives a request and returns a response.  The solicit-response operation sends a request for a response.  The notification operation sends a message but does not wait for a response.  The request-response type is the most frequently used operation type. 17
  • 14. Web Services Communication Protocol: SOAP  SOAP is a simple and lightweight protocol for exchanging structured and typed information among Web services.  In the core of the Web services model, SOAP acts as the messaging protocol for transport with binding to existing Internet protocols, such as Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) as underlying communication protocols.  Defining a uniform way of passing XML-encoded data, SOAP also enables a way of conducting Remote Procedure Calls (RPCs) binding with HTTP. 18
  • 15. Web Services Communication Protocol: SOAP (Cont’d)  In short, SOAP provides a way to communicate between applications running on different operating systems, with different technologies, and programming languages.  SOAP is endorsed by W3C and key industry vendors such as Sun Microsystems, IBM, Microsoft, etc.  Detailed information about SOAP can be found at the W3C Web site at http://www.w3c.org/TR/SOAP. 19
  • 16. SOAP Envelope (Header and Body) POST /InServicesComputing HTTP/1.1 Host: www.servicescomputing.org Content-Type: application/soap+xml; charset=utf-8 Content-Length: 100 <?xml version="1.0"?> <soap:Envelope xmlns:soap="http://www.w3.org/2001/12/soap- envelope" soap:encodingStyle="http://www.w3.org/2001/12/soap- encoding"> <soap:Header> <m:Payment xmlns:m="http://www.servicescomputing.org/paymen t/" soap:actor="http://www.servicescomputing.org/appm l/"> soap:mustUnderstand="1"> 123 </m:Payment> </soap:Header> <soap:Body> <!-- Request message --> <m:GetPrice xmlns:m="http://www.servicescomputing.org/pr ices"> <m:Item>Proceedings</m:Item> </m:GetPrice> <!-- Response message --> <m:GetPriceResponse xmlns:m="http://www.servicescomputing.org/pr ices"> <m:Price>70</m:Price> </m:GetPriceResponse> ... <soap:Fault> ... </soap:Fault> </soap:Body> </soap:Envelope> 20
  • 17. Binding of WSDL to SOAP  A WSDL document defines how to access a service operation using the element binding: the message format and protocol details for each port.  The binding tag has two attributes: the name attribute and the type attribute.  The name attribute defines the name of the binding, and the type attribute points to the port for the binding, in this case it is the “productPrice” port. 21
  • 18. Binding of WSDL to SOAP  The tag soap:binding has two attributes: the style attribute and the transport attribute. The style attribute can be either “ RPC (Remote Procedure Call)” or “document.”  The transport attribute defines the SOAP protocol to use, in this example it is “HTTP.” The tag operation defines each operation that the port exposes. For each operation, the corresponding SOAP action needs to be defined. One needs to specify how the input and output messages are encoded. 22
  • 19. An example WSDL binding segment <message name="getPriceRequest"> <part name="productid" type="xs:string"/> </message> <message name="getPriceResponse"> <part name="value" type="xs:string"/> </message> <portType name="productPrice"> <operation name="getPrice"> <input message="getPriceRequest"/> <output message="getPriceResponse"/> </operation> </portType> <binding type="productPrice" name="b1"> <soap:binding style="document" trans- port="http://schemas.xmlsoap.org/soa p/http"/> <operation> <soap:operation soapAction="http://servicescomputing .org/getPrice"/> <input> <soap:body use="literal"/> </input> <output> <soap:body use="literal"/> </output> </operation> </binding> 23
  • 20. Publishing a Web Service in Registry  Universal Description, Discovery, and Integration (UDDI) is an ad hoc industry standard that provides a “meta service” for publishing and locating Web services by enabling robust queries against rich metadata.  The UDDI working group includes leading technology vendors, such as IBM, HP, and Microsoft. Detailed information about UDDI can be found at its official Web site at http://www.uddi.org/. 24
  • 21. Assignment • What is the role of WSDL in Web Service Modeling • Explain the usage of SOAP in web service modleing