Function of UDDI
Describe the function of UDDI and its operation.
Expert
The Universal Description, Discovery and Integration (UDDI) service is the specification to which web service registries conform. The UDDI includes of a data model and an application program interface (abbreviated as API).
The UDDI data model explains four core object types.
The businessEntity objects explain individual businesses that give web services. These objects carry information such as the contact information and business address.
The businessService objects elucidate available web services. Information taken in such objects comprises a service name and description and also bindingTemplate objects.
The bindingTemplate objects explain where a particular object is positioned and how it must be accessed.
This comprises the access point of the service and details of protocol to use (e.g. FTP or HTTP).
The tModel explains the technical model of interface. This explains the interface. The tModel comprises pointers to the WSDL files which explain the interface. The UDDI API is an extension of SOAP; it gives an RPC interface to the registry database. The techniques provided by the UDDI API let registry data to be searched or published.
The publishing interface to UDDI is employed by service provider to advertise the accessibility of their services. The API comprises save_binding, save_service, save_business, save_tModel, delete_binding, delete_business and delete_tModel methods for creating the UDDI objects. It also includes getAuthToken and discard_authToken methods, these make sure that the UDDI data is merely modified by such users who are authorized to do so.
The search interface to UDDI is employed by potential clients looking for the service details. The API comprises find_business, find_binding, find_service and find_tModel techniques to find UDDI objects matching particular criteria. This too includes getBindingDetail, getServiceDetail, getBusinessDetail, and get_tModelDetail to acquire details of specific UDDI objects
Describe the functionality of PING.
Explain the characteristics of the Code Division multiple Accesses?
What is the main difference among BGP and IGP route summarization?
Give a brief explanation of Versionate.
What is Beaconing? Also state where it is employed.
Explain several benefits attained by using Client/Server oriented TP Monitors?
What is Trojan horse. State its definition?
Write down the merits and demerits of a cloud service deployment.
What do you mean by virtual channel?
Tunneling: Tunneling is a method given to transfer data securely among two networks. The data is divided into smaller packets and passed via the tunnel. The data passing via the tunnel has 3 layers of encryption. The data is encapsulated. Tunneling ca
18,76,764
1947799 Asked
3,689
Active Tutors
1424054
Questions Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!