Function of UDDI
Describe the function of UDDI and its operation.
Expert
The Universal Description, Discovery and Integration (UDDI) service is the specification to which web service registries conform. The UDDI includes of a data model and an application program interface (abbreviated as API).
The UDDI data model explains four core object types.
The businessEntity objects explain individual businesses that give web services. These objects carry information such as the contact information and business address.
The businessService objects elucidate available web services. Information taken in such objects comprises a service name and description and also bindingTemplate objects.
The bindingTemplate objects explain where a particular object is positioned and how it must be accessed.
This comprises the access point of the service and details of protocol to use (e.g. FTP or HTTP).
The tModel explains the technical model of interface. This explains the interface. The tModel comprises pointers to the WSDL files which explain the interface. The UDDI API is an extension of SOAP; it gives an RPC interface to the registry database. The techniques provided by the UDDI API let registry data to be searched or published.
The publishing interface to UDDI is employed by service provider to advertise the accessibility of their services. The API comprises save_binding, save_service, save_business, save_tModel, delete_binding, delete_business and delete_tModel methods for creating the UDDI objects. It also includes getAuthToken and discard_authToken methods, these make sure that the UDDI data is merely modified by such users who are authorized to do so.
The search interface to UDDI is employed by potential clients looking for the service details. The API comprises find_business, find_binding, find_service and find_tModel techniques to find UDDI objects matching particular criteria. This too includes getBindingDetail, getServiceDetail, getBusinessDetail, and get_tModelDetail to acquire details of specific UDDI objects
Describe the term checksum. Explain the steps that are carried out in the generation of the checksum?
Explain what are Asymmetrical protocols?
Compare and contrast digital subscriber line (DSL) and the cable modem. (Use bullets for each of the items you compare and contrast. Give at least six key in points of comparison.) Which is more better, DSL or cable modems? Elucidate.
What do you mean by the Bridge? Specify the different limitations of the bridges?
Normal 0 false false
Describe the data units at various layers of the TCP-IP protocol suite?
Briefly describe the relationship between the VPN and firewalls?
What is the definition of WML (WMLScript)?
Web browser: A software application which allows browsing, searching and collecting information from Web is termed as Web browser.
1) A composite signal is composed of three sine waves. The first wave has a frequency of 1 Hz, phase shift of 0 and maximum amplitude of 5 volts; the second wave has a frequency of 1 Hz, phase shift of 180 degrees (π radians) and maximum amplitude of 2 volts, and t
18,76,764
1936889 Asked
3,689
Active Tutors
1429077
Questions Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!