Distributed technologies CORBA, Enterprise JavaBeans, Web services: a comparative presentation

Author(s):  
D. Vassilopoulos ◽  
T. Pilioura ◽  
A. Tsalgatidou
Author(s):  
Mohamed Gharzouli ◽  
Makhlouf Derdour

Recently, several models have been proposed to design distributed and collaborative infrastructures for web services based systems. In this area, Peer-to-Peer (P2P) networks and Multi-Agents Systems offer many techniques for web services discovery and composition. However, both of the two combinations (P2P/web services and MAS/web services) have suffered from some problems. This article presents a generic P2P/MAS architecture for semantic web services discovery. It tries to merge these two distributed technologies and demonstrate how P2P networks can implement open-MAS architectures to build a collaborative distributed system. The main objective of this article is to find the most appropriate P2P protocol to make such systems. Before the presentation of the proposed architecture, it already presents a background of P2P categories and models. After, it chooses four different P2P protocols wherever it analyzes and discusses, for each one, the stabilization and traffic generation of the network.


Author(s):  
Kamel Karoui

With the interconnection of computers in networks, particularly through the Internet, it becomes possible to connect applications on distant computers. An application works perfectly whether it isdistant or local. Moreover, a distant applicationallows us to benefit from the following additional advantages: • Data and processes can be stored on a remote server that has a bigger storage capacity than the local host. Data can be shared between users using, for example, Remote Procedure Call (RPC), Remote Method Invocation (RMI), Java Message Service (JMS), and Enterprise JavaBeans (EJB) (Frénot, 2000): • Distant application can be used at the same time by several users; • Updating data and processes can be done only in one host; • Flexibility on distribution of the load: An application can be executed on the available machine; and • High availability: A faulty machine does not affect the others. Many approaches have been proposed and developed for communication between distant hosts on a network such as Message Passing (MP), Remote Evaluation (REV), Remote Object Invocation (ROI), Mobile Agents (MA), Common Object Request Broker Architecture (CORBA), Web Services (WS), RPC, and RMI (Dejan, LaForge, & Chauhan, 1998). In this article, we will focus on two particular paradigms: The Web Services and the Mobile Agents. WS defines a standard to invoke distant applications and to recover results across the Web. Its invocation is made in synchronous mode. MA has the faculty to move easily between a network’s hosts to execute user requests. MA communication is made in asynchronous mode. The fusion of these two complementary technologies will solve many problems. This article is composed of the following sections: In the first two sections, we introduce the concepts of WS and MA, their advantages and disadvantages. In the third section, we present different kinds of interaction between MA and WS. Finally, we study an example in the last section.


2014 ◽  
Vol 6 (3) ◽  
pp. 58-71 ◽  
Author(s):  
Mohamed Gharzouli ◽  
Makhlouf Derdour

Recently, several models have been proposed to design distributed and collaborative infrastructures for web services based systems. In this area, Peer-to-Peer (P2P) networks and Multi-Agents Systems offer many techniques for web services discovery and composition. However, both of the two combinations (P2P/web services and MAS/web services) have suffered from some problems. This article presents a generic P2P/MAS architecture for semantic web services discovery. It tries to merge these two distributed technologies and demonstrate how P2P networks can implement open-MAS architectures to build a collaborative distributed system. The main objective of this article is to find the most appropriate P2P protocol to make such systems. Before the presentation of the proposed architecture, it already presents a background of P2P categories and models. After, it chooses four different P2P protocols wherever it analyzes and discusses, for each one, the stabilization and traffic generation of the network.


2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


2004 ◽  
Vol 124 (1) ◽  
pp. 176-181
Author(s):  
Tomoaki Maruo ◽  
Keinosuke Matsumoto ◽  
Naoki Mori ◽  
Masashi Kitayama ◽  
Yoshio Izumi

Sign in / Sign up

Export Citation Format

Share Document