Web Service Design Issues

Author(s):  
Jana Polgar ◽  
Robert Mark Braum ◽  
Tony Polgar

Web Services are gaining in popularity because of the benefits they provide. One of the major benefits is their support for interoperability in a heterogeneous environment, which leads to the capability to add systems and solutions that require different platforms. As long as the various systems are enabled for Web Services, the services can be used to facilitate interoperation. Web Services let enterprise application developers reuse and customize existing information assets. Web Services provide developers with standard ways to access middle-tier and back-end services, such as database management systems and transaction monitors, and to integrate them with other applications.

2010 ◽  
pp. 556-564
Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


Author(s):  
Vincent Yen

In large organizations, typical systems portfolios consist of a mix of legacy systems, proprietary applications, databases, off-the-shelf packages, and client-server systems. Software systems integration is always an important issue and yet a very complex and difficult area in practice. Consider the software integration between two organizations on a supply chain; the level of complexity and difficulty multiply quickly. How to make heterogeneous systems work with each other within an enterprise or across the Internet is of paramount interest to businesses and industry. Web services technologies are being developed as the foundation of a new generation of business-to-business (B2B) and enterprise application integration (EAI) architectures, and important parts of components as grid (www.grid.org), wireless, and automatic computing (Kreger, 2003). Early technologies in achieving software application integration use standards such as the common object request broker architecture (CORBA) of the Object Management Group (www.omg.org), the distributed component object model (DCOM) of Microsoft, and Java/RMI, the remote method invocation mechanism. CORBA and DCOM are tightly coupled technologies, while Web services are not. Thus, CORBA and DCOM are more difficult to learn and implement than Web services. It is not surprising that the success of these standards is marginal (Chung, Lin, & Mathieu, 2003). The development and deployment of Web services requires no specific underlying technology platform. This is one of the attractive features of Web services. Other favorable views on the benefits of Web services include: a simple, lowcost EAI supporting the cross-platform sharing of functions and data; and an enabler of reducing integration complexity and time (Miller, 2003). To reach these benefits, however, Web services should meet many technology requirements and capabilities. Some of the requirements include (Zimmermann, Tomlinson & Peuser, 2003): • Automation Through Application Clients: It is required that arbitrary software applications running in different organizations have to directly communicate with each other. • Connectivity for Heterogeneous Worlds: Should be able to connect many different computing platforms. • Information and Process Sharing: Should be able to export and share both data and business processes between companies or business units. • Reuse and Flexibility: Existing application components can be easily integrated regardless of implementation details. • Dynamic Discovery of Services, Interfaces, and Implementations: It should be possible to let application clients dynamically, i.e., at runtime, look for and download service address, service binding, and service interface information. • Business Process Orchestration Without Programming: Allows orchestration of business activities into business processes, and executes such aggregated process automatically. The first five requirements are technology oriented. A solution to these requirements is XML-based Web services, or simply Web services. It employs Web standards of HTTP, URLs, and XML as the lingua franca for information and data encoding for platform independence; therefore it is far more flexible and adaptable than earlier approaches. The last requirement relates to the concept of business workflow and workflow management systems. In supply chain management for example, there is a purchase order process at the buyer’s side and a product fulfillment process at the supplier’s side. Each process represents a business workflow or a Web service if it is automated. These two Web services can be combined into one Web service that represents a new business process. The ability to compose new Web services from existing Web services is a powerful feature of Web services; however, it requires standards to support the composition process. This article will provide a simplified exposition of the underlying basic technologies, key standards, the role of business workflows and processes, and critical issues.


Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


2014 ◽  
Vol 989-994 ◽  
pp. 4350-4354
Author(s):  
Chun Shan ◽  
Lu Xia Wu ◽  
Yang Yang ◽  
Jing Feng Xue

Communication between heterogeneous systems is difficult to be achieved without affecting the existing systems in Enterprise Application Integration. A kind of dynamic web services publishing software based on CXF is proposed in this paper. The purpose of this software are twofold. Firstly, it encapsulates specified data called by other systems into web service published dynamically which unifies customization among heterogeneous systems. Secondly, the function of service monitoring provided allows users to get the real-time information of published web services. The proposal software has been deployed in a Chinese large-scale military enterprise. Practice in the enterprise shows that the software can simplify web service development, quickly build a web service which encapsulates large amounts of data, and achieve information sharing within the enterprise environment.


Author(s):  
Jörg Holetschek ◽  
Gabriele Droege ◽  
Anton Güntsch ◽  
Nils Köster ◽  
Jeannine Marquardt ◽  
...  

Botanic gardens are an invaluable refuge for plant diversity for conservation, education and research. Worldwide, they manage over 100,000 species, roughly 30% of all plant species diversity, and over 41% of known threatened species; the botanic gardens in Germany house approximately 50,000 different species (Marquardt et al. in press). Scientists in need of plant material rely upon these resources for their research; they require a pooled, up-to-date inventory of ideally all accessions of these gardens. Sharing data from (living) specimen collections online has become routine in the past years; initiatives like PlantSearch of Botanic Gardens Conservation International and the Global Biodiversity Information Facility (GBIF) allow requesting specimens of interest. However, these catalogues are accessible for everyone. Legitimate concerns about potential theft and legal issues keep curators of living collections from sharing their full catalogues; in most cases, only filtered views of the data will be fed into these networks. Gardens4Science (http://gardens4science.biocase.org) aims at overcoming this issue by creating a trusted network between botanic gardens that allows an unfiltered access on the constituents’ accession catalogues. This unified data pool needs to be automatically synchronized with the individual garden’s catalogues, irrespective of the collection management systems used locally. For the three-year construction phase of Gardens4Science, focus is on Cactaceae and Bromeliaceae, since these families are well-represented in the collections and ideal models for studying the origin of biodiversity on evolutionary time scale. Gardens4Science’s technical architecture (Fig. 1) is based on existing tools for setting up biodiversity networks: The BioCASe (Biological Collections Access Service) Provider Software acts as an interface to the local databases that shields the network from their peculiarities (database management systems and data models used). BioCASe transforms the data into the Access to Biological Collections Data schema (ABCD) and publishes them as a BioCASe-compliant web service (Holetschek and Döring 2008, Holetschek et al. 2012). The data portal is based on portal software from the Global Genome Biodiversity Network and provides a user-specific view on the data. Registered trusted users will be able to display full details of individual accessions, whereas guest users will see only an aggregated view (Droege et al. 2014). The Berlin Indexing and Harvesting Toolkit (B-HIT) is used for harvesting the BioCASe web services of the local catalogues and creating a unified index database (Kelbert et al. 2015). Harvesting is done in regular intervals in order to keep the index in sync with the source databases and does not require any action on the provider’s side. The BioCASe (Biological Collections Access Service) Provider Software acts as an interface to the local databases that shields the network from their peculiarities (database management systems and data models used). BioCASe transforms the data into the Access to Biological Collections Data schema (ABCD) and publishes them as a BioCASe-compliant web service (Holetschek and Döring 2008, Holetschek et al. 2012). The data portal is based on portal software from the Global Genome Biodiversity Network and provides a user-specific view on the data. Registered trusted users will be able to display full details of individual accessions, whereas guest users will see only an aggregated view (Droege et al. 2014). The Berlin Indexing and Harvesting Toolkit (B-HIT) is used for harvesting the BioCASe web services of the local catalogues and creating a unified index database (Kelbert et al. 2015). Harvesting is done in regular intervals in order to keep the index in sync with the source databases and does not require any action on the provider’s side. In addition to harvesting, B-HIT performs several data cleaning steps. Foremost, it reconciles scientific names from the source databases with a taxonomic backbone (currently caryophyllales.org for Cactaceae and the Butcher and Gouda checklist for Bromeliaceae), which allows harmonizing the taxonomies from the different sources and the correction of outdated species names and orthographic mistakes. Provenance information are validated (for example specified geographic coordinates versus country) and corrected, if possible; date values are parsed and converted into a standard format. The issues found and potential corrections are compiled in reports and send to the curators, so the mistakes can be rectified in the source databases. In the construction phase, Gardens4Science consists of seven German Botanic gardens that share their accessions of the Bromeliaceae and Cactaceae families. Up to now (March 2019), 19.539 records have been published in Evo-BoGa, with about 3,500 to be added until the end of the project in January 2020. After the construction phase, it is planned to extend the network to include more Botanic Gardens – both from Germany and other countries – as well as additional plant families.


Author(s):  
Dušan Savić ◽  
Siniša Vlajić ◽  
Marijana Despotović-Zrakić

Applications are often multi-tier and require application servers, workflow engines, and database management systems. Cloud computing is a computing paradigm wherein the resources such as processors, storage, and software applications are provided as services via the Internet. Moving an enterprise application to the cloud can be a challenge. This application needs to be split into the components that then automatically deploy on the cloud. In this chapter, the authors introduce a way to automatically derivate the main architecture components from the software requirements that can serve as a basis for an architecture diagram in the MOCCA method. The proposed approach is model and use case driven.


2011 ◽  
pp. 1113-1120
Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


2012 ◽  
Vol 9 (2) ◽  
pp. 42-68 ◽  
Author(s):  
Apostolos Papageorgiou ◽  
Marius Schatke ◽  
Stefan Schulte ◽  
Ralf Steinmetz

Reducing the size of the wirelessly transmitted data during the invocation of third-party Web services is a worthwhile goal of many mobile application developers. Among many adaptation mechanisms that can be used for the mediation of such Web service invocations, the automated enhancement of caching mechanisms is a promising approach that can spare the re-transmission of entire content fields of the exchanged messages. However, it is usually impeded by technological constraints and by various other factors, such as the inherent risk of using responses that are not fresh, i.e., are not up-to-date. This paper presents the roadmap, the most important technical and algorithmic details, and a thorough evaluation of the first solution for generically and automatically enriching the communication with any third-party Web service in a way that cached responses can be exploited while a freshness of 100% is maintained.


2021 ◽  
Vol 4 (1) ◽  
pp. 168-180
Author(s):  
PO Obilikwu ◽  
VS Terwase

Web services provide application to application integration across different platforms. However, the consumption of web services generates request traffic that must be attended to by an instance of the web server without fail. To guarantee dependability of the web service, the instances of the web service are replicated as a way of scaling the web service. The Replication Oriented Architecture (ROA) has been designed and implemented using the Java Enterprise application development platform and interesting results have been obtained. Improvements in the PHP scripting language have made it a popular programming language for web and enterprise application development. In this paper, an implementation of the ROA architecture using PHP is done. The implementation is simulated on the Apache Jmeter and results compared to the results obtained in the Java implementation. The results show that both application development platforms achieve web service scalability as a quality of service (QOS) expected of a web service. In specific terms, 50.9% at 95.0% confidence level improvement in response time was achieved when PHP is used which compares favorably with 22.5% improvement at 95.0% confidence level achieved on the Java platform.


Sign in / Sign up

Export Citation Format

Share Document