Notes on “URI Schemes and Web Protocols” (Tag issue [schemeProtocols49])schemeProtocols49 Noah Mendelsohn Dec. 5, 2005.

Slides:



Advertisements
Similar presentations
Integrated Healthcare Management system. Standards based design. [ Supports HXP (Health Exchange Protocol) a standard in exchanging health care data ]
Advertisements

Give it a REST already Arnon Rotem-Gal-Oz VP R&D xsights
XPointer and HTTP Range A possible design for a scalable and extensible RDF Data Access protocol. Bryan Thompson Presented to the RDF Data Access.
XPointer and HTTP Range A possible design for a scalable and extensible RDF Data Access protocol. Bryan Thompson draft Presented to the RDF.
REST Vs. SOAP.
A REST-ful Web Services Approach to Library Federated Search using SRU Kevin Reiss Rutgers-Newark Law Library CALI 2005 – June 11th.
Reinventing using REST. Anything addressable by a URI is called a resource GET, PUT, POST, DELETE WebDAV (MOVE, LOCK)
The following 10 questions test your knowledge of Internet-based client management in Configuration Manager Configuration Manager 2007 Internet-Based.
ONE STOP THE TOTAL SERVICE SOLUTION FOR REMOTE DEVICE MANAGMENT.
Virtual Ticketing Agents using Web Services and J2EE Advisor: Dr. Chung-E-Wang Date: 05/06/03 Naveen Repala.
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management Dave Salisbury ( )
1 Introduction to XML. XML eXtensible implies that users define tag content Markup implies it is a coded document Language implies it is a metalanguage.
8.
Technical Architectures
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
PKI 2: Protezione del traffico Web tramite SSL Fabrizio Grossi.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
DATABASE APPLICATION DEVELOPMENT SAK 3408 The Web and DBMS.
Overview Distributed vs. decentralized Why distributed databases
Week 2 IBS 685. Static Page Architecture The user requests the page by typing a URL in a browser The Browser requests the page from the Web Server The.
Networks: HTTP and DNS1 Internet, HTTP and DNS Examples.
0-1 Team 1 Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auto-Owners.
0-1 Team ?? Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auraria.
Client, Server, HTTP, IP Address, Domain Name. Client-Server Model Client Bob Yahoo Server yahoo.com/finance.html A text file named finance.html.
Do LSIDs Need to Resolve? Joel Sachs
Documenting Software Architectures
Server Load Balancing. Introduction Why is load balancing of servers needed? If there is only one web server responding to all the incoming HTTP requests.
Towards a Safe Playground for HTTPS and Middle-Boxes with QoS2 Zhenyu Zhou CS Dept., Duke University.
Remotely authenticating against the Service Framework.
SASL-SAML update Klaas Wierenga Kitten WG 9-Nov-2010.
Performance Testing Case Study
1/19 Component Design On-demand Learning Series Software Engineering of Web Application - Principles of Good Component Design Hunan University, Software.
Layer 4 of the TCP/IP protocol stack: Application level Services: TELNET, FTP, SMTP, HTTP, DNS, RIP, NFS Hierarchy of protocols and services.
Everything the web administrator needs to know about MOM 2005 Chris Adams Program Manager IIS Product Unit Microsoft Corp.
Advanced Web Forms with Databases Programming Right from the Start with Visual Basic.NET 1/e 13.
Prohibiting Redirection & Synthesized DNS Responses in Top Level Domains Mar 2010 Kuala Lumpur APTLD Meeting.
Versioning, Extensibility & Postel’s Law Noah Mendelsohn Tufts University Web:
Copyright 2012 & 2015 – Noah Mendelsohn Introduction to: The Architecture of the World Wide Web Noah Mendelsohn Tufts University
DCOM (Overview) by- Jeevan Varma Anga.
Dynamic Content On Edge Cache Server (using Microsoft.NET) Name: Aparna Yeddula CS – 522 Semester Project Project URL: cs.uccs.edu/~ayeddula/project.html.
Introduction  Client/Server technology is seen by many as the solution to the difficulty of linking together the various departments of corporation.
Introduction to World Wide Web Authoring © Directorate of Information Systems and Services University of Aberdeen, 1999 IT Training Workshop.
Class 2 Agenda Networking Basics Networking Basics Nestle Case Nestle Case Text Chapter Review Text Chapter Review.
Project Dragon Small Business Website Content Management System.
ILDG Middleware Status Chip Watson ILDG-6 Workshop May 12, 2005.
MobileMAN Internal meetingHelsinki, June 8 th 2004 NETikos activity in MobileMAN project Veronica Vanni NETikos S.p.A.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 05. Review Software design methods Design Paradigms Typical Design Trade-offs.
CoBrow Collaborative Browsing A Virtual Presence Service RE 1003 RE 4003.
Draft-barnes-geopriv-policy-uri. -03 (err… -02) We updated the draft (-02) in early September – … and forgot to post it We updated it again (-03) right.
NHIN DIRECT REST IMPLEMENTATION Prepared by: The NHIN Direct REST Team June 8, 2010.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Web Architecture update for WSAWG/WSDL TAG published Principles of the Web Contents: –Identifiers Most of the work –Formats Not much –Protocols Summary.
Cloud Based Tools Created by. Cloud Based Tools Presentation Collaboration Engagement Organization Others areas of your choice can be listed **List each.
Final Class Diagram for C++ Implementation Clickermatic Software Clicker.
Chapter 29 World Wide Web & Browsing World Wide Web (WWW) is a distributed hypermedia (hypertext & graphics) on-line repository of information that users.
Managing Enterprise GIS Geodatabases
National Computational Science National Center for Supercomputing Applications National Computational Science Integration of the MyProxy Online Credential.
Web Technologies Lecture 10 Web services. From W3C – A software system designed to support interoperable machine-to-machine interaction over a network.
INFSO-RI Enabling Grids for E-sciencE BAR: The Current Status Charaka Palansuriya EPCC.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Communicating over the Network Network Fundamentals – Chapter 2.
System Architecture CS 560. Project Design The requirements describe the function of a system as seen by the client. The software team must design a system.
Protocol Bindings Joint oneM2M Call, 31 Aug 2016.
David Huynh, Stefano Mazzocchi, David Karger Piggy Bank: Experience the Semantic Web inside your web browser Web Semantics: Science, Services and Agents.
The Client-Server Model
Introduction to: The Architecture of the World Wide Web
Web Engineering.
Representational State Transfer
Introduction to: The Architecture of the World Wide Web
Introduction to: The Architecture of the World Wide Web
Week 05 Node.js Week 05
Presentation transcript:

Notes on “URI Schemes and Web Protocols” (Tag issue [schemeProtocols49])schemeProtocols49 Noah Mendelsohn Dec. 5, 2005

Status First draft 16 June 2005 ( ) Latest draft 16 June 2005 ( )

Tradeoffs Web Architecture allows flexibility for general case Common practice is scheme implies protocol family –This matters to users and to deployed software There are downsides to requiring multiple URIs when the same resource is supported by multiple protocols

Overall approach Rules: what the Web architecture allows you to do Guidelines: suggested common practice(*) (*) In some cases, there are pros and cons to a given implementation choice. In such cases guidelines explain advantages of each.

Rules Server: (R1) any resource can in principle be served with any protocol, but…R1 –…(R2) must serve faithfully (I.e. retrieve representations or update state of named resource).R2 –(R3) Scheme sets expectations for integrity (http and https are therefore different…not all protocols are appropriate in all cases)R3 Client: (R7) it’s always safe to attempt access to any resource using any protocolR7 –Modulo integrity concerns…a compromised HTTP implementation may not reliably fail access to an https resource.

General Server Guidelines (G4) Serving with protocol associated w/scheme is desirableG4 –Users expect this –Supports dispatching on Scheme (G5) Serve existing schemes with new protocolsG5 –No need to change links or create 2 URIs for the same resource when using new protocols –Specifically: (G6) support http scheme if possibleG6

General User Agent Guidelines Heuristic: (G8) choose protocol based on schemeG8 (G9) Don’t attempt access with untrustworthy protocols (accessing with HTTP is risky)G9