Service Component Architecture Policy TC Issue 33 Capabilities.

Slides:



Advertisements
Similar presentations
Observations on WS-Policy Ashok Malhotra Oracle Corporation.
Advertisements

IONA Technologies Position Paper Constraints and Capabilities for Web Services
Claus von Riegen, SAP AG WS-Policy Overview W3C Workshop on Constraints and Capabilities for Web Services.
WS – Security Policy Prabath Siriwardena Director, Security Architecture.
Cross-Jurisdictional Immunization Data Exchange Project Updated 4/29/14.
This product includes material developed by the Globus Project ( Introduction to Grid Services and GT3.
SPECIFYING AND MONITORING GUARANTEES IN COMMERCIAL GRIDS THROUGH SLA Sven Graupner Vijay MachirajuAad van Moorsel IEEE/ACM International Symposium on Clustering.
Chapter 10: Introduction to Inheritance
SWE 4743 Strategy Patterns Richard Gesick. CSE Strategy Pattern the strategy pattern (also known as the policy pattern) is a software design.
OASIS Reference Model for Service Oriented Architecture 1.0
Presentation 7 part 2: SOAP & WSDL. Ingeniørhøjskolen i Århus Slide 2 Outline Building blocks in Web Services SOA SOAP WSDL (UDDI)
HAS. Patterns The use of patterns is essentially the reuse of well established good ideas. A pattern is a named well understood good solution to a common.
Institute for Software Research©2001, University of California, Irvine Product-Line Architectures André van der Hoek Institute for Software Research University.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Constraints and Capabilities Workshop Oracle Position Ashok Malhotra Greg Pavlik.
Methodology and Tools for End-to-End SOA Configurations By: Fumiko satoh, Yuichi nakamura, Nirmal K. Mukhi, Michiaki Tatsubori, Kouichi ono.
Design Patterns.
INTRODUCING SCA Byungwook Cho Nov.2007.
XForms: A case study Rajiv Shivane & Pavitar Singh.
Using Runtime Information for Adapting Enterprise Java Beans Application Servers Mircea Trofin *, John Murphy ** Performance Engineering Laboratory * DCU,
T Network Application Frameworks and XML Web Services and WSDL Sasu Tarkoma Based on slides by Pekka Nikander.
95-843: Service Oriented Architecture 1 Master of Information System Management Service Oriented Architecture Lecture 10: Service Component Architecture.
Profiling Metadata Specifications David Massart, EUN Budapest, Hungary – Nov. 2, 2009.
Dodick Zulaimi Sudirman Lecture 14 Introduction to Web Service Pengantar Teknologi Internet Introduction to Internet Technology.
11 CORE Architecture Mauro Bruno, Monica Scannapieco, Carlo Vaccari, Giulia Vaste Antonino Virgillito, Diego Zardetto (Istat)
Web Architecture: Extensible Language Tim Berners-Lee, Dan Connolly World Wide Web Consortium 元智資工所 系統實驗室 楊錫謦 1999/9/15.
FIMS v1.1 Version numbers in schema Richard Cartwright Quantel July 2013.
Tuscany: a SOA framework Jeffrey Guo Accelrys, Inc.
CBSE 2014 Modeling Components with UML. Bibliography Modelling components in UML – Main text: Kim Hamilton, Russell Miles, Learning UML 2.0, OReilly,
Secure Systems Research Group - FAU A Trust Model for Web Services Ph.D Dissertation Progress Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
SCA Bindings Simon Holdsworth Piotr Przybylski. Agenda n SCA Bindings Overview l Bindings TC Charter n Bindings l Web Services Binding l JMS Binding l.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
11 CORE Architecture Mauro Bruno, Monica Scannapieco, Carlo Vaccari, Giulia Vaste Antonino Virgillito, Diego Zardetto (Istat)
1 Policy-Enabling the SCA-based SOA
Kemal Baykal Rasim Ismayilov
Notes from Coulouris 5Ed Distributed Systems Notes on Components.
Service Component Architecture (SCA) Policy TC … Face to Face Agenda – Jan 24,
REST By: Vishwanath Vineet.
How to execute Program structure Variables name, keywords, binding, scope, lifetime Data types – type system – primitives, strings, arrays, hashes – pointers/references.
The goal of XML Protocol Develop technologies allowing peers to communicate…....in a distributed environment......using XML as encapsulation language.
Java Programming: Advanced Topics 1 Enterprise JavaBeans Chapter 14.
Introduction to Web Services Presented by Sarath Chandra Dorbala.
1 WS-Policy. 2 What’s the Problem? To use a web service a client needs more information than is provided in WSDL file. Examples: –Does service support.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
Text TCS INTERNAL Oracle PL/SQL – Introduction. TCS INTERNAL PL SQL Introduction PLSQL means Procedural Language extension of SQL. PLSQL is a database.
M1G Introduction to Programming 2 2. Creating Classes: Game and Player.
Service Component Architecture (SCA) Policy FrameWork V1.0 Ashok Malhotra – Oracle Anish Karmarkar – Oracle David Booz - IBM …
EJB Enterprise Java Beans JAVA Enterprise Edition
Making Sense of Service Broker Inside the Black Box.
SOAP, Web Service, WSDL Week 14 Web site:
Topics on Web Services COMP6017 Dr Nicholas Gibbins –
Service Description: Addressing & Policy COMP6017 Topics on Web Services Dr Nicholas Gibbins –
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
Java Web Services Orca Knowledge Center – Web Service key concepts.
Windows Communication Foundation and Web Services
Inline Vs. External Policy Attachment SCA Policy Framework
COMPONENT & DEPLOYMENT DIAGRAMS
Program Management Portal: Request Management, PCRs and the Client
Nurhak Karakaya & Murat Çavdar
Distribution and components
Types of Programming Languages
Section 11.1 Class Variables and Methods
Windows Communication Foundation and Web Services
Service Metadata Registry (COSMOS)
Making Sense of Service Broker
CBSE 2014 Modeling Components with UML
Web Service Metadata Exchange
Knowledge Byte In this section, you will learn about:
Presentation transcript:

Service Component Architecture Policy TC Issue 33 Capabilities

Introducing “Capabilities” into the Policy FW n Introduction - Examples of the problem n Part 1 - Capabilities for runtime implementations l Two alternatives are presented (part1a and part1b) n Part 2 – Capabilities for service instances

Introducing “Capabilities” into the Policy FW n Optional policy configuration - examples l Runtime implementation n Java component container does not have access to a transaction manager, and therefore ALL component instances hosted by the container cannot exploit transaction policy. n Web service binding implementation does not have the ability to participate in a reliable message exchange. l Service instances (i.e. configured services) n Service will participate in a transaction if sent by the client, but does NOT require the client to send a transaction context. n Service will participate in a reliable message exchange if the client so desires, but does NOT require the client to use any reliable messaging mechanism.

Capabilities for Runtime Implementations – Part 1 n Enables design time validation of policy n How to express a constraint that reflects policy which CANNOT be supported/configured by the runtime? l Bindings and implementations are the ultimate targets of policy configuration l SCA has the and definitions which represent the types of bindings and component implementations available in any given runtime n SCA vendors will provide runtimes for each bindingType and implementationType that they support n Today, these definitions can only declare policy that: 1.will always be enabled or 2.can be enabled BUT is not configurable via policy set or binding specific configuration

Capabilities for Runtime Implementations Proposal (part1a) – Preferred Apporach n What’s missing is how to declare that a particular policy is not supportable by the – QNames of policy intents Intents in the list are not supported by the binding implementation. Using section 4.12 step A definition of ‘required intent set’; It is an error if an intent that is in the ‘required intent set’ is also listed in of a related intents should be treated as mutually exclusive WRT inherited intents so that inherited intents can be ignored if they cannot be supported by child elements.

Capabilities for Runtime Implementations Proposal (part1b) - alternative n The corollary would be to provide a feature where the “known to be supported” policy is declared, any policy not listed is by definition – QNames of policy intents Only intents in the list are supported by the binding runtime. All other intents are implicitly not supported. It is an error to have intents that are not specified

Capabilities for Runtime Implementations - sample comp1 can be detected as in error at design time. comp2 contains no detectable errors.

Capabilities for Service Instances – Part 2 n Enables service design time expression of optional policy n How to express the desire for an optional policy? l SCA services can require that specific policy is enabled n All clients (references) end up being forced to comply to the service’s requirements, even if they don’t really need to. l Policy compatibility is defined as the intersection of consumer and provider policy l But, there is no way to express what policy alternatives are provided by a policySet Cheap solution: Create as many services as are needed to express all the desired policy alternatives

Capabilities for Service Instances n What’s missing is how to declare that a particular policy is optionally available for – QNames of policy intents Any listed intent is represented by concrete policy in at least one of the policy alternatives in the – QNames of policy intents. For service only. Any listed intent is satisfied by a policySet the same intent.

Capabilities for Service Instances - sample <policySet name="exa1" provides="sca:integrity" optionallyProvides="sca:atLeastOnce" appliesTo="binding.ws"> During deployment of comp1, exa1 is attached by the FW as usual When comp2 is deployed, a policySet which satisfies ref1 can be attached. At runtime, the policy intersection will result in picking the second alternative.