--%>

Protocol stack of XML Web Services

Explain the protocol stack of XML Web Services.

E

Expert

Verified

Web service protocol stack is the protocol stack (that is, a stack of computer networking protocols) which is employed to define, locate, implement, and form Web services interact with one other. The Web service protocol stack usually stacks four protocols:

(Service) Transport Protocol: accountable for transporting messages among network applications and comprises protocols like HTTP, SMTP, FTP, and also the more recent Blocks Extensible Exchange Protocol (BEEP).

(XML) Messaging Protocol: accountable for encoding messages in a general XML format and hence they can be understood at either end of the network connection. Presently, this area comprises such protocols as XML-RPC, WS-Addressing, and SOAP.

(Service) Description Protocol: employed for explaining the public interface to a particular Web service. The WSDL interface format is usually utilized for this purpose.

(Service) Discovery Protocol: centralizes services into a general registry such that network Web services can publish their position and description, and makes it simple to discover what services are accessible on the network. Universal Description Discovery and Integration (abbreviated as UDDI) was intended for this aim, however it has not been broadly adopted.

   Related Questions in Programming Languages

  • Q : Define Unicode Unicode : It is a 16-bit

    Unicode: It is a 16-bit character set designed to make it simpler to exchange and exhibit information which makes use of a broad range of dissimilar languages and symbols.

  • Q : CORBA allows high performance

    'CORBA was designed to allow high performance distributed applications to be written’. Discuss. Definitely, ’CORBA was designed to allow high performance distributed applications to be written’ because it provides:

  • Q : Define User Datagram Protocol User

    User Datagram Protocol: The User Datagram Protocol (abbreviated as UDP) is a set of rules which permit communication among two processes across a network. The protocol is unreliable, that means that information is not guaranteed to be

  • Q : Explain Sign extension Sign extension :

    Sign extension: Whenever an integer value from a type with a specific range is stored in a variable with a larger range, Java employs sign extension to determine the resultant value. The most important bit in the original value is employed to fill the

  • Q : Define software Define the term

    Define the term software?

  • Q : Explain Try statement Try statement :

    Try statement: The try statement performs as an exception handler - a position where exception objects are caught and dealt with. In its most common form, it comprises of a try clause, one or more catch clauses and the finally clause.

  • Q : Throughout system testing the

    Someone complains that throughout system testing the application frequently crashes. What probable process problem does which indicate?

  • Q : Differences between logical and

    What are the differences between logical and physical address spaces?

  • Q : Assembly program that reads in five

     I need to write assembly program that reads in five numbers from the user. The user can then be prompted for one of the following pieces of information to be computed and returned: . the mean of the five numbers; . the largest number in the set; . the smallest number in the set; . t

  • Q : What is Character Set What is Character

    What is Character Set. Briefly explain it?