xml and webservices
TRANSCRIPT
-
7/27/2019 XML and WebServices
1/35
XML and WebServices
2-mark Q & A
Unit I
1. What are the three major asects to e!tend the enterrise "rom a constrained net#ork to
broad reach o" #eb$1. Business-to-Consumer (B2C) Connection.
2. Business-to-Employee (B2E) Connection.
3. Business-to-Business (B2B) Connection.
2. What are the three ke% desin e'ements that b% omission contrib(te XML)s s(ccess$
1. No display is assumed.
2. There is no built-in data typing.3. No transport is assumed.!" speci#ication ma$es no assumption about ho% !"
is transported across the &nternet.
*. XML +istor%
!" is a meta language de#ined by %orld %ide %eb consortium ('3C) and standardied in1*.!" has gi+en rise to numerous +ertical industry +ocabularies in
support o# B2B e-commerce, horiontal +ocabularies that pro+ide ser+ice to a %ide range o#
industries and !" protocols that ha+e used !"s simple po%er o# combination to open upne% possibilities #or doing distributed computing.
,. What are the di""erent revo'(tion in #hich XML is 'a%in a major ro'e$
a)ata re+olutionb)/rchitectural re+olution
c)0o#t%are re+olution
. What are the advantaes o" !m'$
a.ml #iles are human readable.
b.'idespread industry support eists #or ml due to its inepensi+eness andcon+enience in usage.
c.&t pro+ides a %ay o# creating domain speci#ic +ocabulary.
d.&t allo%s data interchange bet%een di##erent computers.
e.&t pro+ides user selected +ie% o# data.
.What is /'ectronic 0ata Interchane/0I$
E& is o#ten used as the replacement #or business communication through con+entional businessdocuments such as purchase orders, reuest #or uotations, in+oice and shipping notices. This
$ind o# echange ta$es place bet%een trading partners. &n order to interchange data using E& to
trading partners must be agreed upon a common #ormat.
3.What is W*c Wor'd Wide Web4onsorti(m$
'3c is responsible #or the de+elopment o# %eb speci#ications that describe
communication protocols and technologies #or the %eb .!" %as de#ined by %3c to ensure that
-
7/27/2019 XML and WebServices
2/35
structured data is uni#orm and independent o# +endors o# applications.'3c has laid do%n certain
rules that meet to be #ollo%ed by the all ml applications. 0ome o# these rules are
a.!" must be directly usable o+er the internet.b.!l must support the %ide +ariety o# applications.
c.!" must be 04!".
d.!" documents must be human legible and clear.e.!" design must be #ormal and concise.
5.What is XML$
!" stands #or 5Etensible mar$up language6 a language de+eloped by the 'orld %ide %eb
consortium ('3C).&t is considered a meta language because it is used To de#ine other languages
through the use o# mar$up language ,%hich add structure and !eaning to document.
6.List o(t the reasons "or not (sin attrib(tes to store data.
1./ttributes cannot contain multiple +alues, %hile elements can ha+e multiple sub elements.
2./ttributes are not easily epandable to account #or #uture changes.
3./ttributes are more di##icult than elements to manipulate %ith programs.7./ttributes +alues are not easy to chec$ against a document type de#inition.
17.What is S8A9$
08/9-0imple 8b:ect /ccess 9rotocol. 0oap gi+es set o# rules #or mo+ing data directly to the
recipient or through and intermediate message ueue. 0oap uses common %eb protocols li$e;TT9,
-
7/27/2019 XML and WebServices
3/35
1./!'ain brie"'% abo(t data revo'(tion$
9rior to ml, ata %as closely associated %ith applications.!" strength is dataindependence.!" data description is not tied to any programming language, os, or transport
protocol it does not reuire to depend any a+ailable to %eb connected plat#orms also !"
pro+ides alternati+e to electronic data interchange.
1.What is the ro'e o" !m'$
!" is the set o# guidelines #oe describing structured data in plaintet rather than binaryrepresentation %ithin the short period, time.!" has been %idely used as language #or +ariety o#
application ranging #rom +ertical industry +ocabularies to horiontal industry application to
protocol.
13. What are X"orms$
#orms is an !" approach that o+ercomes the limitation #orms. oiceXML$
oice!" is an emerging standard #or speech enabled application. &ts !" synta de#ineselements to control a seuence o# interaction dialogues bet%een a user and an implementation
plat#orm. The element de#ined as a part o# oice!" control dialogues and rules #or
presentation in#ormation to and etracting in#ormation #rom and end-user using speech. oice
!" documents are stored on %eb ser+ers.
16. What is X9ath$
9ath is used to na+igate !" tree structures. 9ath gets its name #rom its use o# path notationto na+igate through the hierarchical tree structure o# an !" document. 9ath allo%s #or the
section o# the node or group o# node through the use o# a compact, on !" synta. &t is an
important !" technology due to its role in pro+iding a common synta and semantics #or#unctionality in both 0"T and pointer.
27.What are the /'ement ;amin ?('es (sed in XML$
D Names can contain letters, numbers and other characters.D Names must not begin %ith number or punctuation.
D Names must not start %ith the string ml in any upper or lo%ercase #orm.
D Names must not contain spaces
Unit @ II
1. What are the advantaes o" schema over 0
-
7/27/2019 XML and WebServices
4/35
7. The synta #or de#ining T is di##erent #rom the synta used #or creating an ml
document .But the synta #or de#ining 0 is the same as the synta o# an ml document.
2. What are the datat%es in an !m' schema$
1.9rimiti+e
2.eri+ed3./tomic
7."ist
F.nion
*. What is 08M$ What are the di""erent 'eve's o" 08M$
8! is a '3C supported standard programming inter#ace(/9&)that pro+ides a plat#orm and
neutral inter#ace to allo% de+elopers to programmatically access and modi#y content andstructure o# tree structured documents such as ;T!" or !".
The di##erent le+els o# 8! are
(a) 8! "e+el G
(b) 8! "e+el 1(c) 8! "e+el 2
(d) 8! "e+el 3
,. What are the dra#backs o" 4SS$
1. The bro%ser decides ho% to dispaly elements that the stylesheet doesHnt describe.2. /s bro%ser implements C00,some implementations may not al%ays be consistent.
. Write an% t#o di""erences bet#een XSL< and 4SS$
C00 0"T1. 0imple to use, and is suitable 1. &t is comple to use. #or simple document.
2. Cannot reorder, add, delete or 2. Can reorder, add, delete per#orm operations on elements
because it is elements. a%are o# the structure o# an !" document.
. What are the di""erent XSL< e'ements$
1. 0tylesheet2. alue-o#
3. oiceXML$
oice!" is an emerging standard #or speech-enabled applications. &ts !" synta de#ines
elements to control a seuence o# interaction dialogs bet%een a user and an implementation
plat#orm. oice!" uses !" tet to dri+e +oice dialogs.
5. What is XQ(er%$
Iuery is a '3C initiati+e to de#ine a standard set o# constructs #or uerying and searching
!" documents. Iuery brings database uery processing to !".
-
7/27/2019 XML and WebServices
5/35
6. What is Xorm$
-
7/27/2019 XML and WebServices
6/35
1. What is In"o Set$
/ '3C initiati+e to pro+ide a consistent set o# de#initions #or use in other speci#ications thatneed to re#er to the in#ormation in a %ell-#ormed !" document. &n#o 0et is the basis #or a
+ariety o# !" technologies. &n#o 0et supports distinctions that are important %hen di##erent
!" speci#ications must interoperate.
13. What is ?0?eso(rce 0escrition rame#ork$
/ #oundation #or processing metadata. &t pro+ides interoperability bet%een applications thatechange machine-understandable in#ormation on the %eb. L< emphasies #acilities to enable
automated processing o# %eb resources.
15. What is metadata$
"iterally data about data. !" element and attribute names are considered metadata in that they
may be used to describe the data contained in a document. !etadata isnt needed but it certainly
helps.
16. What are the comonents o" ?0$
L< is built on the #ollo%ing three de#initionsLesources
/ll things described by L< epressions are called resources.
9roperties9roperties are speci#ic aspects, characteristics, attributes or relations used to describe
resources.
0tatements
/ statement consists o# a resource, a property and a +alue.
27.What are ?0 vocab('aries$
L< is designed to ha+e the #ollo%ing characteristics1.&ndependence.
2.&nterchangeability.
3.0calability.7.9roperties #unctioning as resources.
F.alues #unctioning as resources.
.0tatements #unctioning as resources.
21. /!'ain abo(t cascadin st%'e sheet$
Cascading style sheet is one o# the presentation technologies o# ml.
C00 is an ml supporting technology #or adding style display properties such as #onts, color,
spacing to a %eb documents.C00 origins may be traced to the 0;!" %orld %hich used a style technologOy called
00" to control the display o# 0;!" document
Each rule is made up o# a selector typically an element name such as an html heading orparagraph or a user de#ined ml element to the selector.
0tyle rules ha+e the #ollo%ing synta
0elector Pproperty +alueQ
!ultiple style declaration #or a single selector are separated by a semicolon
-
7/27/2019 XML and WebServices
7/35
The #ollo%ing code has sho% ho% a css element can b added to a html or a ml document to
de#ine the color sie properties.
=0T?"E T?9ER6tetMcss6@T&T"E P#ont-sie -largeS color redQ
=M0T?"E@
22. What is 0 8CT?9E root-element 0?0TE! 5#ilename6@e#ining attributes in T
=> /TT"&0t element-name attribute-name attribute-type de#ault-+alue@
e.g. =>/TT"&0T payment type (/T/ 5chec$6)Eample
5document.dtd6
=> E"E!ENT memodoc(title,bodytet)@=> E"E!ENT title (9C/T/)@
=> E"E!ENT body tet (9C/T/)@
=> /TT"&0T title name (/T/ 5T eample6)
ml code
-
7/27/2019 XML and WebServices
8/35
=U ml +ersionR61.G6U@
=> 8CT?9E document 0?0TE! 5document.dtd6@
=memodoc@=title@ Eternal dtd =Mtitle@
=Bodytet@ This is the body o# eternal Td =Mbodytet@
=Mmemodoc@
2. What is va'id !m' doc(ment$
an ml document con#orms to the rule set out by a T the ml is said to be +alid %ith therespect to that T.
U;I< @III
1. What is +
-
7/27/2019 XML and WebServices
9/35
The 980T command is a reuest #or a ser+er to do something %ith data deli+ered as part o# the
980T message. 980T %as included in the 4TT9 speci#ication in order to deli+er ;T!" #rom
data to a ser+er #or processing by some ser+er program.
,. /!'ain XML-?94.
!"-L9C, %hich does remote procedure calls o+er the &nternet, is a great eample o# out-o#-the-bo thin$ing. &n con#ronting the communication problem o# ho% a program on machine /
can get some code on machine B to run, !"-L9C ignores the di##iculty entirely and delegates
the transport to ;TT9, #ocusing instead on the details o# %hat to say, not ho% to get the messagethere
. What data t%es does S8A9 (se$
!"-L9C uses !" 0chema data types to speci#y the parameter types o# the procedure call.ata types include scalars, numbers, strings, and dates, as %ell as comple record and list
structures.
.What is S8A9$08/9 is 0imple 8b:ect /ccess 9rotocol that o##er plat#orm, language /nd transport
independence #or data echange bet%een partners and 0uppliers. 08/9 is an !"-basedprotocol #or echanging in#ormation in a decentralied distributed en+ironment. the #undamental
change brought about by 08/9 has been the ability to mo+e data any%here across the %eb.
08/9 has opened opportunities #or etending the enterprise
3.What is +
-
7/27/2019 XML and WebServices
10/35
08/9 #ault occurs %hen an application cannot understand a 08/9 message or %hen err or
occurs during the processing o# a message. The in#ormation that can be returned as a part o# a
#ault includes the #ollo%ingW 08/9 code 08/9 de#ines a set o# #ault codes #or basic 08/9 Errors, although an application
may pro+ide its o%n codes.
W
-
7/27/2019 XML and WebServices
11/35
15. 0i""erence bet#een S8A9 and II89C8?94 & =?M/$
08/9 &&89,8L9C,AL!Ei. Tet based protocol that uses ml
ii. /ble to mo+e more easily across #ire%alls.
iii. 08/9 is standard dri+en Binary protocolsThe process is some%hat tedious these protocols are +endor ri+en
16.What are the arts in the S8A9 messae$
08/9 message consists o# these parts
W 08/9 En+elope 8uter most element o# a soap message. / en+elope element is a root o# a ml
document.
W 08/9 ;eader &t is optional usually header pro+ides in#ormation about directing 08/9 ser+ersto do processing be#ore passing the 08/9 message.
W 08/9 Body the ml document to be transported is loaded in the body element.
27 What is !m' ?94$/ protocol #or doing remote procedure calls o+er the 'eb %here the in#ormation about %hat
procedure to call and %hat parameters to pass are encoded as ml in the body o# an ;TT9 980Treuest to a ser+er.
21. 0e"ine S8A9$
W 08/9 is an ml based protocol #or echanging in#ormation in a decentralied en+ironment .
W &t is a combination o# ml and http and made #or data trans#er through %eb en+ironment.
W 08/9 allo%s ml to mo+e easily o+er the %eb. 0o de#ines an ml en+elop #or deli+ering the
ml content and gi+es a set o# rules #or ser+ers to do this :ob.W 08/9 consists o# three parts
1. Encoding rules that control !" tags that de#ine a 08/9 message and a
-
7/27/2019 XML and WebServices
12/35
3. "ayout o# screen presentation
D !" 2.G is a %3c standard recommendation.
1.
-
7/27/2019 XML and WebServices
13/35
/ 'eb ser+ice is anything that can de#ine itsel# +ia an internet. The things that can be epressed
as %eb ser+ices
1. 0o#t%are Component or /pplication, 2. / !o+ie re+ie%, 3. / tra+el pac$age
,. List o(t the advantae o" Web services techno'o%$
1. ecide on the ser+ice it %ants to pro+ide2. 9ic$ a registry #or uploading its in#ormation
3. ecide ho% to list its ser+ice at the registry
7. e#ine eplicitly ho% users can connect to its ser+ice
. What are the major asects o" Web service techno'oies$
o / ser+ice pro+ider pro+ides an inter#ace #or so#t%are that can carry out a speci#ied set o#
tas$s.
o / ser+ice reuester disco+ers and in+o$es a so#t%are ser+ice to pro+ide business solution.
o / repository or bro$er manages and publishes the ser+ice. 0er+ice pro+iders publish their
ser+ices %ith the bro$er, and reuests access those ser+ices by creating bindings to the ser+ice
pro+ider.
. List o(t the ke% techno'oies$
_ & is a protocol #or describing 'eb ser+ices components that allo%s businesses to register%ith an &nternet directory and ad+ertise their ser+ices.
_ '0" is the proposed standard #or describing a 'eb ser+ices. '0" is built around an !"-
based ser+ice &nter#ace e#inition "anguage that de#ines both the ser+ice inter#ace andimplementation details.
_ 08/9 is a protocol #or communicating %ith a & ser+ice.
3. What is U00I$
& means ni+ersal escription, isco+ery and &ntegration. & is a protocol #orcommunicating %ith registries. The core o# & is the & Business Legistry, a global,pubic, online directory.
5. What are Web Services ?eistr% 0irectories$
_ 'hite 9ages holding basic ser+ice-pro+ider in#ormation_ ?ello% 9ages listing ser+ices by category
_ 4reen 9ages describing ho% to connect and use the ser+ices.
6. What is WS0L$
'0" is 'eb 0er+ice, e#inition "anguage. '0" is the piece o# 'eb ser+ices #rame%or$ that
describes ho% to connect to %eb ser+ice pro+iders. The '0" speci#ication supports thebuilding o# %eb based computing ser+ices that target computer programs rather than human
users.
17. What are the risks in Web Services$
!aturity i##erent implementation may not %or$ together.
0ecurity 08/9 messages on port *G bypass #ire%alls. 0o net%or$ administrator has to
implement necessary security to pre+ent attac$s.
-
7/27/2019 XML and WebServices
14/35
Transaction Transaction must be speci#ied outside the %eb ser+ices #rame%or$ such as .NET
or A2EE.
Con#iguration !anagement Change management is not addressed.
11. What is ebXML$
eb!" is Electronic Business !". &t adds process to e-business interaction. &t represents aglobal initiati+e to de#ine processes that can interact o+er the %eb. The e##ort o# eb!" includesmultiple speci#ications that de#ine standard %ays to echanging business message,
communicating data and de#ining and registering business processes.
12. What is
-
7/27/2019 XML and WebServices
15/35
The main components o# .NET 9lat#orm are,
8perating 0ystem
0eries o# .NET Enterprise 0er+ers
.NET architecture is isual0tudio.NET (0.NET)
13. What are the ke% inredients o" the .;/< rame#ork$The $ey ingredients o# .NET
-
7/27/2019 XML and WebServices
16/35
2. List o(t the Web Service 9ack in =2//$
Aa+a /9& #or !" 9rocessing (A/9)
Aa+a /rchitecture #or !" Binding (A/B)
Aa+a /9& #or !" !essaging (A/!)
Aa+a /9& #or !9 Lemote 9rocedure Calls (A/-L9C)
Aa+a /9& #or !" Legistries (A/L)
Unit->
1. What is XFMS$
K!0 is a '3C initiati+e that targets the delegation o# trust processing decisions to one or more
specialied trust processors to gi+e businesses an easier %ay to manage digital signatures anddata encryption .&nstead o# relaying on proprietary public-$ey in#rastructure implementations,
companies can use standard inter#aces to %or$ %ith di##erent +endors to handle issues
surrounding digital certi#ication chec$ing, re+ocation status chec$ing, and +alidation.
2. 0e"ine XFMS str(ct(re$
K!0 speci#ies protocols #or distributing and registering public $eys and is suitable #or use in
con:unction %ith the proposed standard #or !" signature and as a companion standard #or!" encryption. K!0 has t%o parts
!" $ey in#ormation ser+ice speci#ication(-K&00)
!" $ey registration ser+ice speci#ication(-KL00).
*. 0e"ine X-FISS$
This de#ines a protocol #or a trust ser+ice that resol+es public Y$ey &n#ormation contained in
documents that con#orm to the !" signature speci#ication. / basic ob:ecti+e o# the protocoldesign is to minimie the compleity o# application implementations by allo%ing them to
become clients and there by to shielded #rom the compleity and synta o# the underlying 9K&
used to establish trust relationships.
,. 0e"ine X-F?SS$
This de#ines a protocol #or a %eb ser+ice that accepts registration o# public Y $ey in#ormation.
8nce registered the public $ey may be used in con:unction %ith other %eb ser+ices including -K&00.
-
7/27/2019 XML and WebServices
17/35
. Stes invo'ved in XML encr%tion$
0electing the !" to be encrypted.
Con+erting to canonical #orm i# using entities or namespaces %ith pre#ies.
Encrypting the resulting canonical #orm using public Y$ey encryption.
0ending the encrypted !" to the intended recipient.
. What are diita' sinat(res$
/ digital signature guarantees document authenticity. &n combination %ith 9ublic-$ey encryption
it is used to authenticate the identity o# the sender by encrypting %ith a pri+ate $ey and to
+alidate the content o# the message by transmitting a copy o# the digital hash o# the message.igital signatures can be used in a range o# applications #rom online credit card purchases to the
+eri#ication o# comple legal documents.
3. What is sin'e-ke% cr%torah%$
0ingle-$ey cryptography is the basis #or classic encryption. &n the past, the encryption systems
used a single secret $ey #or encoding and decoding in#ormation. ;o%e+er, single $ey encryptionsystems #ace the problem o# ma$ing the single $ey $no%n to the message recipient. &n electroniccommerce, single-$ey systems are e##ecti+e #or secure communication bet%een #ied de+ices
such as /T! machines and ser+ers. ;o%e+er, single-$ey cryptography does not %or$ %ell on
the %eb.
5. What is (b'ic ke% cr%torah%$
9ublic-$ey cryptography enables secure communication bet%een parties %ithout the need toechange a secret $ey. 9ublic-$ey cryptography uses a comple mathematical #ormula to
generate t%o separate but related $eys, one open to public and the other pri+ate, $no%n only to
one indi+idual. Encrypting %ith a public $ey ensures con#identiality. &t is the basis #or pri+acy,
authentication, data integrity, and non repudiation.
6. What are the !m' sec(rit% techno'oies$
The '3C is dri+ing three !" security technologiesD !" igital 0ignature
D !" Encryption
D !" $ey !anagement 0er+ices
17. Write the stes "or XML /ncr%tion$
1. 0electing the !" to be encrypted.2. Con+erting to canonical #orm i# using entities or namespaces.
3. Encrypting the resulting canonical #orm using public-$ey encryption.7. 0ending the encrypted !" to the intended recipient.
11. What is 8X$
The 8
-
7/27/2019 XML and WebServices
18/35
technology out sources and consumers using %eb an 9C based so#t%are. The #ocus o# 8
-
7/27/2019 XML and WebServices
19/35
D 0e -
-
7/27/2019 XML and WebServices
20/35
1 @marks
U;I< I
1.Loles and /d+antages o# !"
LolesW ml is a metalanguage de#ined by %3c.
W ml is a set o# rules and guidelines #or describing structured data.W ml goes beyond its technical speci#ication.
W ml has been the dri+ing #orce behind other standards and +ocabularies.
W ml is a speci#ication #or de#ining ne% mar$up language.W ml gi+e rise to +ertical industry +ocabularies in support o# B2B e-commerce.
W ;oriontal +ocabularies pro+ide ser+ice to %ide range o# industries.
W ml in#luence has been #elt in three %a+es,#rom industry speci#ic +ocabularies to
horiontal industry applications to protocol.W ml has enabled industry +ocabularies and protocol.
/d+antages
W ml #iles are human-readable.&t %as designed as tet.W 'idespread industry support eists #or ml.Tools and utilities are pro+ided %ith
%eb bro%ser,database,operating system.
W !a:or relational databases ha+e the capability to read and generate ml data.W ml support the interpretation and trans#ormation o# ml data #or %ebpage display
and report.
W ml must be compatible %ith 4!".
W ml design must be #ormal and concise.2.Eplain brie#ly !"The Three Le+olutions
The three re+olutions are,
1. ata Le+olution2. /rchitecture Le+olution
3. 0o#t%are Le+olution
ata Le+olutionDnderstood ho% data %as #ormatted and ho% process it
D9ro+ide alternati+es to specialie E&
D !" enables the creation o# program independent data #ormats
DEplain about !" 8rigin and Cultures
-
7/27/2019 XML and WebServices
21/35
-!"s origin arein 04!"
-!" has emerged #rom a document culture
-!" opens up options #or treating code as data/rchitectural Le+olution
The !" technologies pro+ide %ay to mo+e #rom tightly coupled system based
on eisting established in#ra structures such as C8LB/,L!& and C8! to looselycoupled system %hich can %or$ on the standard TC9M&9 protocol.
0o#t%are Le+olution
!" helps to build so#t%are in this re+olutionary %ay.The ne% idea is to createbuilding bloc$s that can be used in combination %ith other building bloc$ that are eisting
or yet to be created.
3.Eplain 'eb0er+ices. 'ebser+ices is both a process and set o# protocols #or #inding and connecting to0o#t%are eposed as ser+ices o+er the 'eb.
'ebser+ices builds on a 08/9 #oundation J #acilitates so#t%are interaction.
'ebser+ices /rchitecture
'ebser+icesRrepository[client[pro+ider./ ser+ice pro+ider -- inter#ace #or so#t%are that can carry out a speci#ied set o# tas$s.
/ ser+ice reuester--disco+ers and in+o$es a so#t%are ser+ice to gi+e business solution./ ser+ice pro+ider\manages J publishes the ser+ice.
Key Technologies.
W &-ni+ersal escription, isco+ery and integration.- / protocol #or describing %eb ser+ices components.
- & allo%s businesses to register %ith an &nternet directory so they can ad+ertise
their ser+ices and companies can #ind each other and carry out transactions o+er the %eb.
W '0" Y 'eb ser+ices escription language.- /n !" description o# both the ser+ice inter#ace J the implementation details o#
ho% to connect to and use a particular 'ebser+ice.
W 08/9-0imple 8b:ect access protocol.-/n !" based protocol #or echanging in#ormation in a decentralied J distributed
en+ironment.
-08/9 is a protocol #or communicating %ith a & ser+ice.'eb 0er+ices Lis$s
1.!aturity 2. 0ecurity 3.Transactions 7.Con#iguration !anagement.
eb!"
- ebml adds process to e-business interaction.- NMCE
-
7/27/2019 XML and WebServices
22/35
&nternal T
The T can be declared %ithin the ml document.The synta #or using internal
dtd is=>8CT?9E name o# dtd]describe the elementsX@.
Eample #or internal dtd.
Eternal TThe dtd can be declared as an eternal inter#ace.&t may be an eternal to an ml
source document.The synta #or using eternal dtd is
=>8CT?9E root-element 0?0TE! 5#[email protected] #or eternal dtd.
e#ining attributes in dtd
The synta #or speci#ying attributes in dtd is,
=>/TT"&0T element-name attribute-name attribute-type de#ault-+alue@Eample #or de#ining attributes.
9ossible attributes type
Eplain the possible +alues %ith their eplanation.0ome o# the +alues are
C/T/,&,&LE
-
7/27/2019 XML and WebServices
23/35
- 9arameter Entities
C/T/
'hen an !" data is parsed, all the !" is processed ecept the data inside the C/T/section.
Unit @ II
1. Eplain brie#ly ml Trans#ormationUml is supported by se+eral technologies that allo% ml to be manipulated and
modi#ies in +arious %ays. These technologies include 0"T, "in$, 9ath, and Iuery.
[_ 0"T 0"T is used to trans#orm an ml document. 0"T uses templates and
rules. The trans#ormation language 0"T may be used to Trans#orm ml into a +ariety o#
#ormats(#ig2.1F).0"T and css may complement each other._ "in$ "in$ %ill enable bidirectional %eb lin$ing._ 9ath 9ath is used to na+igate ml tree structure. Eplain #rom (#ig2.1).9ath is
used to speci#y nodes using their location in an ml tree._ Iuery Iuery brings database uery processing to ml,
-
7/27/2019 XML and WebServices
24/35
/TT"&0T element-name attribute-name attribute-type 5de#ault-+alue6@
some o# the de#ault attribute +alues in T(Table/-2)&mplied /ttribute
The synta #or implies attribute +alue is as #ollo%s
=>/TT"&0T element-name attribute-name attribute-type &!9"&E@
U;I< @ III
1. Brie#ly Eplain /bout ;TT9 J !"-L9C
;TT9;TT9 is an important building bloc$ #or using !" as a 'eb-based messaging
protocol. &n 12 that the #ace o# the &nternet %as changed through the use o# a simple
reuest-response protocol $no%n as ;TT9.
-
7/27/2019 XML and WebServices
25/35
are deli+ered to a bro%ser instead o# a #ile system. The #irst ;TT9 speci#ication %ritten by
Tim Berners-"ee is a study in simple elegance. Clients reuest #iles #rom ser+ers using a
simple tet string o# the #orm4ET Command
V4ET
-
7/27/2019 XML and WebServices
26/35
system. There are 2 types o# architecture patterns.
D"ayer 9attern
D9ipe and
-
7/27/2019 XML and WebServices
27/35
"ayers li$e osi layer concept are also adopted here.
08/9
-
7/27/2019 XML and WebServices
28/35
The transport protocol used by C8LB/, C8!, L!& or &&89, 8L9C, AL!& &0
respectably.
08/9 8+er+ie%(1)Encoding rules that control !" tags.
(2)Lules #or echange application de#ined data type.
(3)Con+entions #or representing remote procedure calls and responses.08/9 !essage 0tructure
08/9 consists o# 3 parts
Eplain 08/9 en+elopEplain 08/9 header
Eplain 08/9 body
08/9 esign 9atterns
0o#t%are architecture pattern pro+ide a high le+el conceptual +ie% o# a so#t%aresystem. There are 2 types o# architecture patterns.
D"ayer 9attern
D9ipe and 1. Eplain about 'eb 0er+ices TechnologiesU
'eb 0er+ices Technologies'eb ser+ices depends on se+eral enabling technologies 08/9, &,and '0".
The 'eb 0er+ice /rchitechture
/ ser+ice pro+ider
/ ser+ice reuester
/ repository or bro$er
Key Technologies
&
'0"
08/9
&
& is a protocol #or describing 'eb ser+ices components that allo%s business to
register %ith an &nternet directory so they can ad+ertise their ser+ices and complaies can
#ind each other and carry out transactions o+er the %eb.& #rame%or$ speci#ications
The & 9rogrammerHs /9& 0peci#ication
The & ata 0tructure 0peci#ication
&
-
7/27/2019 XML and WebServices
29/35
Con#iguration !anagement
'eb ser+ices pros J cons
08/908/9 is a protocol #or communicationg %ith a & ser+ice. 08/9 simpli#ies
& access by allo%ing applications to in+o$e ob:ect methods or #unctions residing on
remote ser+ers. The ad+antage o# 08/9 is that it can use uni+ersal ;TT9 to ma$e areuest and to rece+e a response. 08/9 reuests and responses use !" not only to target
the remote method but to ]ac$age any data that reuired by the method.
2. Eplain about eb!"Ueb!"
Electronic Business !" represents a global initiati+e to de#ine processes around
%hich business can interact o+er the 'eb. &t is the technology aimed at bringing the
bene#its o# B2B data echange to global audience o# small,medium, and large businesses.The broad e##ort o# eb!" includes multiple speci#ications that de#ine standard %ays o#
echanging business messages,conducting trading relationships,communicationg data in
common terms, and de#ining and registering business processes.
The $ey players behind eb!" N&CE
-
7/27/2019 XML and WebServices
30/35
0oap pro+ide loosely coupled message based architecture #or per#orming
interaction. ;o%e+er to use the loosely coupled %eb space #or commercial ser+er based
interaction. &t is +ery necessary to add transactional capability. To add transactionalcapability middle%are are depended %hich has it roots in tightly coupled ob:ect system.
TL/N0/CT&8N
/ transaction is a set o# so#t%are operations. / transaction should satis#y the #ollo%ingproperties called /C& properties.
1./tomicity- Either all o# the operations should be per#ormer or none o# them may be
per#ormed.2.Consistency- Le#er to data consistency.
3.&solation - 8nly one transaction can manipulate data at a particular time.
7.urability - &t means that update made by a committed transaction persist in the
database regardless o# #ailure that occur alter the commit transaction.0ECL&T?
The secured soc$et layer and transport layer security protocol and doing %ell #or %eb
based E-Commerce.
0oap and 'eb ser+ice protocoloesnt address security issue. 0oap specialied security implementation #or transaction
ml on .NET and A2EE.&ENT&T?
'eb based net%or$ need a %ay to authenticate and +alidity user. To do this system
+alidate user based on permission stored in database.9/0098LT
9assport !icroso#t authentication ser+ice that allo% user that as the %ebsite and
ser+ices. The passport can be integrated in !icroso#t hotmail E-mail ser+ice and entry #or
!icroso#t .NET ser+ices.The "iberty /lliance 9ro:ect
&t is a alternati+e to passport. &t is used to create uni+ersal digital identity ser+ice based on
open ser+ice.7. Eplain about .NETU
.NET is a !icroso#t #rame%or$.
!icroso#ts .NET is an umbrella term that describes !icroso#ts strategy #or deli+ering
so#t%are as ser+ices across the %eb.
.NET is an initiati+e represents a de+elopment #rame%or$ that integrates earlier
!icroso#t technologies %ith ne%er technologies built around !".
.NET allo%s de+elopers to build a ser+ice-oriented consciousness into so#t%are up #ront
rather than as an a#terthought.
The .NET architecture includes se+eral technology components
1. e+elopment tools.2. 0pecialied ser+ers.
3. 'eb ser+ices.7. e+ices.
The .Net plat#orm consists o# #i+e main components
1. 8perating system layer.
2. .NET building bloc$ ser+ices.3. .NET #rame%or$.
-
7/27/2019 XML and WebServices
31/35
7. .NET ser+ers
F. isual 0tudio .NET.
/ Common "anguage Luntime supports di##erent languages #or .NET
de+elopment.
The .NET #rame%or$ is architected around a uni#ied hub and spo$e programming
model designed to ma$e di##erent languages interchangeable. The .NET approach to so#t%are integration is based on a hub and spo$e con#iguration
%here a +ariety o# languages are translated into a C"L.
C8B8" can be used to de+elop .NET applications
UnitG >
1.Eplain brie#ly about the securityUThree 0ecurity reuirements
DCon#identialityR@Ensuring that in#ormations not made a+ailable
to unauthoried indi+iduals.D/uthenticationR@/bility to determine that the
message really comes #rom the listed sender.
Data integrityR@Ensuring that %hen in#ormation arri+es at itsdestination.Enoding and decoding methods
D0ingle-$ey cryptography
R@Both the sender and recei+er should $no% the secret $ey.R@Each $ey is replaced
eg a %ith b, b %ith c. so on
isad+antageR@decoding $ey must be communicated #rom
sender to re+cei+er.
R@&t does not scale to the %eb.
D9ublic $ey cryptographyR@Based on complementory public and pri+ate $eys.
R@No need to echange a secret $ey.
R@use mathematical #ormula to generate $ey.Con#identialityR@Encryption %ith public $ey ensures it.
/uthenticationR@ Encryption %ith pri+ate $ey ensures it.
ata &ntegrityR@Ensures that the message recei+ed is the messane sentigital integrity
R@&t is li$e %riting your name across the #ace o# a document.
R@&t guarantees document authenticity.!anaging certi#icates and pri+ate $eysS
R@Lepresent trusted entites in %ebsecurity.R@limited li#espans #or allo% changes in circumstance.
2.Eplain brie#ly about i) !" 0ecurity
-
7/27/2019 XML and WebServices
32/35
-!" Key !anagement 0er+ices
K!0
- K!0 is a %3c initiati+e- targets delegation o# trusts processing decisions to one or more specialied trust
processors
- it is one o# the three %3c speci#ication that de#ine the ml security architecture!0 0TLCTLE
- speci#ies protocol #or distributing and registering public $eys
- suitable #or use in con:unction %ithproposed standard- K!0 has t%o parts
- 1.the ml $ey in#ormation ser+ice speci#ication(-K&00)
- 2.ml $ey registration ser+ice speci#icayion(-KL00)
-K&00- de#ines a protocol #or a trust ser+ice
- basic ob:ecti+e is to minimie the compleity o# applicatrion implementation
- the ml signature speci#ication does not mandate use o# a particular trust policy
-KL00-de#ines aprotocol #or a %eb ser+ice that accepts registration o# public $ey
-a client ser+ice may reuest that reregistration ser+ice bind in#ormation to public $ey-the protocol pro+ides #or the authentication
3.Eplain brie#ly about i) !" igital 0ignature
ii) 4uidelines #or signing !" documents!" igital 0ignature
The !" digital signature speci#ication de#ines boyh the synta and rules #or
processing !" digital signature.signatures pro+ide integrity,message authentication and
signer authentication ser+ices #or data.igital signature Elements
The elements are
0igned&n#o-in#ormation that is actually signed
Canonicaliation!ethod-indicates algorithm used to canonicalie the signed element
0ignature!ethod-speci#ies algorithm used to con+ert the canonicalied signed&n#o into
signature +alue
Le#erence-includes the method to compute the digital hash and the resulting digest
+alue
Key&n#o-indicates the $ey used to +alidate signature.
Trans#orms-list o# processing steps applied to resources content be#ore digest is
computed
igestmethod-speci#ies algorithm applied to data a#ter Trans#orms is applied.
igestalue-holds +alue computed on the data being signed
0teps in signature generation
1. create a 0igned&n#o element %ith signature!ethod,Canonicaliation!ethod,and
Le#erences2. canonicalie the !" document
3. calculate the 0ignaturealue based on algorithms speci#ied in
0igned&n#o.
-
7/27/2019 XML and WebServices
33/35
7. construct the signature elements that includes signed&n#o,Key&n#o and
0ignaturealue.
4uidelines #or 0igning !" ocuments_ !" relies on substitution and trans#ormation
_ Content o# eternal stylesheet should be signed i# its re#erred
_ The in#ormation that %as presented must be signed_ Trans#ormations may alter content ,so the trans#ormed data should be signed
_ The security o# o+erall system depends on the security and integraty o# procedures and
personel as %ell as %ell as procedural en#orcement7.Eplain brie#ly about i) canonicaliation
ii)!" Encryption
C/N8N&C/"&_/T&8N
!" canonicaliation is the use o# an algorithm to generate the canonical #orm8# an !" document. !" is sub:ect to sur#ace representation changes or to processing
that discards some in#ormation.
The steps during the creation o# a core canonical #orm include
Encoding the document in the ni+ersal Character 0et T
-
7/27/2019 XML and WebServices
34/35
3.encrypting the resulting canonical #orm using public $ey encryption
7.sending the encrypted ml to the intended recipient
Encrypting ml data-1.ml subelement and content Encryption
-2.partial ml element encryption
-3.encrypting ml element content onlyF. Eplain the applications o# !" as occuring in three %a+esU
_ 'a+e 8ne ertical &ndustry ata escriptions
-
7/27/2019 XML and WebServices
35/35
- The oice !" standard pro+ides a plat#orm #or +oice applications
- oice !" documents describe con+ersations
- oice !" supports #orms and menus.D