5441337113

5441337113



the beginning, REST derives the constraints from other application styles such as: (1) client-server constraints focus on separation of concerns principle and allow the clients and servers to evolve independently, (2) client-server communication must be stateless thus easing the task of monitoring and recovering from failures because each reąuest contains all the necessary information, (3) cache constraint is used to improve efficiency, scalability, and performance by eliminating some interactions through cacheable data, (4) layered system constraints allow an architecture to have hierarchical layers that improve system scalability by balancing of services across multiple networks [6].

The additional constraint distinguishes the REST style from other styles and is the uniform interface between components, which emphasises the generality of component interface. This constraint induces the other four interface constraints including resource identifiers, manipulation of a resource by using a representation, self-descriptive messages, and hypermedia engine of application State [6]. Example 2-2 shows a RESTful Web services reąuest and response. The reąuest is just a simple HTTP GET method, and the response is just a plain XML document.

Example 2-2 RESTful Web services reąuest/response sample Reąuest:

GET /parts/HD-150G HTTP/1.1 Host: www.harddisk.com Accept: application/xml

Response:

HTTP/l.l 200 OK Content-Type: application/xml

<?xml version="l.0"?>

<part>

<Name>150G Harddisk</Name>

<Description>This part is 150GB 7200RPM SATA Harddisk</Description>

<UnitCost currency="GBPn>15</UnitCost>

</part>

As shown in Example 2-2, in the RESTful Web services, the URI identifies the resource that is desired (e.g., orders), so a Web server can easily decide, based upon the identified resource as in Figurę 2-2. Furthermore, for RESTful Web services with explicit URI, the system/network administrators can apply Access Control Lists (ACLs) to secure services because each of them has a specific URI. Moreover, the HTTP method used in RESTful Web services enables the administrators to protect the services by enforcing the access control policy like disabling certain operations (e.g., PUT or DELETE). The dotted lines in Figurę 2-2 give the example of access control for RESTful Web services.

7


Zhangmin Lu, Student ID: 7315259



Wyszukiwarka

Podobne podstrony:
18 ing, Spatial Planning and the Environment; from the EU and various charity funds, such as the Dut
A3 Introduction  many other helpfui features, such as vocabulary-building exercises and verb conju
1.    Prirrt this page and color the shccp. Glue the page +o a thin piece ot car
5 novels part 1 V; iii) Scientific philosophy: The optimistic philosophy of natural philosophers
BIOLOGICAL AEROSOL MEASUREMENT IN DAIRY PLANTS bul whcn combined wilh other environmen(a) stresses s
cp 41 prevalence of tubcrculosis and other respiratory diseases such as colds. influenza and pncumon
m85 warriors from other war bands by the promise of loot. By the late 7th century the kings of the
m85 warriors from other war bands by the promise of loot. By the late 7th century the kings of the
assignments from other courses or semesters is a violation of the academic honesty guidelines and wi
Davis Falco05 1 r Extract from the Family Tree other p’M m Ihf phsutnlidius Falc Iht imtomilabtr on
The family is, after all, what distinguishes the hijra from most other members of Indian society, wh
16a 3 lt s fali/ Connect the dots from A to T. Start at the star Then color the rest of the picture.
image010 shrines from other territories, known only from scarce mentions, which deformed the overall
image035 Wolinians] will have no other choice.” The author of The Life from Priifen-ing (II, 7) thou
Exploring co-enforcement in the construction sectorEvidence from three case studies in Austria, Pola
20a 2 Connect the dots from A to T. Start at the star Then color the rest of the picture. © 02001 Sc

więcej podobnych podstron