Web service built from other web services
How can a web service built from other web services have transaction properties? Compare this mechanism with that provided by a TP monitor.
Expert
A web service built from other web services has transaction properties using nested transaction model. It allows transactions to consist of other transactions: a top-level transaction may contain sub-transactions. In a nested transaction model, the sub-transactions are within the scope of the top-level transaction (t). Transactions in a nested transaction model also adhere to the ACID properties of transactions—that is, t completes effectively only when ts1 and ts2 both complete successfully. When either sub-transaction fails, the top-level transaction would fail, thus guarantee atomicity.
The nested transaction model permits services to be built independently and later joined into applications. Each service can find out the scope of its transaction boundaries. The application or service which orchestrates the combination of services controls the scope of top-level transaction. The transaction processing (TP) monitors enhance the underlying operating system’s scalability and its capability to manage big transaction volumes, by taking on some of the roles of the underlying operating system. For illustration, a TP monitor, in addition to managing transactions, too performs connection pooling and task or thread scheduling and pooling.
Explain 3-way TCP/IP Handshake?
Explain the role of mount protocol?
Explain the term quality of service? Also specify the two categories of the QoS attributes?
State the merits and de-merits of the secret key encryption?
Define briefly the term Multiplexing? Also describe the categories of Multiplexing.
Describe the SOAP Envelope element: A SOAP message will contain the SOAP element such as the root element. SOAP element name space must always have the value of: as that described the Envelope.
Mobile telephone networks started with analog technology. Analog cellular networks were known as first generation (1G) networks. Such networks had limited capacity, and were subject to fraud and eavesdropping. Digital cellular telephone networks are known as second generation or 2G networks. Digi
Explain what do you meant by the 2G?
Elucidate what are the security features in LANwriter?
Explain what is meant by the term Beaconing?
18,76,764
1944704 Asked
3,689
Active Tutors
1432606
Questions Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!