Free Essay

Web Server Paper

In:

Submitted By crystalrose09
Words 1202
Pages 5
Web Servers
Angel Eyes Ereaux
Web 407

Web Servers The following contains an explanation of the role of a web server as well as what web services are, along with the functions of layered web architecture. Examples are also included throughout and contain explanations of how they are used. WSDL, SOAP and UDDI roles will be explained as well along with what exactly each of them has to do with the significance of Web services. Web Services Web Service, software that is used to change protocols into web site applications. This is what is known as the basic development of different applications used for business and internet users around the world. Web servers control the applications while using the web set up that helps with the contact. Web servers are very important due to the simple fact that they provide tools for the application of code which then is able to implement and maintain any and all applications that are provided. On the other hand the Web Service architecture is also very important for web services such as data delivery, standard protocols along with the registration of the Web Services. In order to have proficient web service the user has to register with the Universal Description, Discovery, and Integration (UDDI). UDDI can help companies produce and enlarge their name, in other words other companies, businesses and people can find out about and get to know the business. Web services have additional advantages which can and does include allowing service providers functionality, therefore not having a problem with any platform that they would like to use to display information. Web Services Description Language (WSDL) as well as Universal Description, Discovery, and Integration (UDDI) are both tools that not only help for web services when it comes to the application process but also are capable of being used on any new system. Web Services Description Language (WSDL) is in cooperation and was developed with IBM and Microsoft as well as being a part of the W3C which uses XML language. Web Services Description Language (WSDL) is just as important as the Universal Description, Discovery, and Integration (UDDI) because it not only describes but also contains any and all contract for application communication.
Web Platforms Web platforms are for as well as used on any and all systems. It is and can be software or even a hardware both can and are processed on the web. Web platforms help with the development of applications such as URLs, JavaScript, and HTTP. Although each one of these applications can be designed on different platforms there is one stipulation and that is that this can only happen when using different programming languages, however the user does have the choice as to whether they want it to be open source or proprietary. Hypertext Transfer Protocol (HTTP) is the most standard and frequently used. Hypertext Transfer Protocol (HTTP) helps with the transference of any and all information from the intranet and continues on to the web. Hypertext Transfer Protocol (HTTP) also helps determine how information is and should be formatted, as well as the way the information is being transmitted along with the response the server should expect when a command is given. In other words Hypertext Transfer Protocol (HTTP) is like the controller, it is the actual carrier for any and all information that needs to be exchanged over the internet. Extensible Markup language is also known as XML, it uses syntax tags to identify various types of data within a file, it also is a text based meta markup language which can and does store data as well as transport it. Since Extensible Markup language XML uses tags by their names it can and does identify them without a problem, it is also known as the standard format for transferring data. The Simple Object Access Protocol also known as (SOAP) is a lightweight protocol that was developed by Microsoft so that applications can exchange any and all information needed exchanging with HTTP. Simple Object Access Protocol (SOAP) can and does make it possible for one program that is running on a certain kind of operating system to communicate with a program that is running on a different kind of operating system. An example of this is Windows XP and Linux being able to communicate due to Simple Object Access Protocol (SOAP), although this can only happen when using HTTP and XML. Simple Object Access Protocol (SOAP) can and does support response protocols for interactive applications as well as back to back messages once again making Simple Object Access Protocol (SOAP) useful on several different types of applications. When it comes to choosing the correct software or deciding whether to go open source or proprietary the company should not only consider what can and will meet their needs but also need to evaluate each software in determining which would be the best choice for the company.
References
MSDN. (2003, October). Understanding WSDL. Retrieved from http://msdn.microsoft.com/en-us/library/ms996486.aspx
SearchSOA.com. (2011, January). Universal,Description, Discovery and Integration. Retrieved from http://searchsoa.techtarget.com/definition/UDDI
WiseGeek. (2003, January). What is the Difference between Http and Https. Retrieved from http://www.wisegeek.com/what-is-the-difference-between-http-and-https.htm

|Content and Organization |Percent Earned: |Comments: |
|70 Percent | | |
|All key elements of the assignment are covered in a |50 |Your paper provided a good high level description of the|
|substantive way. | |web server and the layered web architecture however it |
|Role of the web server defined | |was missing a few examples of web services. The Google |
|Describe the functions of the layered web architecture | |map application provides developers API’s the ability to|
|Definition of web services | |send a request to their servers and receive back the map|
|Web Services examples | |of their choice. This allows the developer to build an |
|Define Role of WSDL | |application that includes the use of map technology |
|Define Role of SOAP | |within their own application without having to develop |
|Define role of UDDI | |the capability from scratch. |
|The content is comprehensive and demonstrates a thorough | | |
|understanding of good website design. | | |
|The paper links theory to relevant examples of current | | |
|experience and industry practice and uses the vocabulary of| | |
|the theory correctly. | | |
|The plan/paper is organized logically and provides the | | |
|reader an easy understanding of how the website will come | | |
|together. | | |
|Readability and Style |Percent Earned |Comments: |
|20 Percent | | |
|Paragraph transitions are present and logical and maintain |20 |Good organization of your discussion |
|the flow throughout the paper. | | |
|The tone is appropriate to the content and assignment. | | |
|Sentences are complete, clear, and concise. | | |
|Sentences are well-constructed, with consistently strong, | | |
|varied sentences. | | |
|Sentence transitions are present and maintain the flow of | | |
|thought. | | |
|Mechanics |Percent Earned |Comments: |
|10 Percent | | |
|The paper, including the title page, reference page, |10 |Good work with your citations and formatting. |
|tables, and appendices, follow APA guidelines for format. | | |
|Citations of original works within the body of the paper | | |
|follow APA guidelines. | | |
|The paper is laid out with effective use of headings, font | | |
|styles, and white space. | | |
|Rules of grammar, usage, and punctuation are followed. | | |
|Spelling is correct. | | |
| | | |
|Points Possible |100 |Points earned: 80 |

Similar Documents

Free Essay

Capstone Final Documentation

...CNS Capstone A COMPREHENSIVE NETWORK DEVELOPMENT PROJECT SUBMITTED TO THE IT / COMPUTER NETWORKS SYSTEMS PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE ASSOCIATE DEGREE By Instructor – Roman Danyew Table of Contents Introduction to Cornerstone Communications………………………….................. 3 STAR MEDICAL’s Proposal Overview ……………………………….................. 4 Executive Summary………………………………………………………………... 6 Assumptions and Constraints………………………………………………………. 7 Deliverables………………………………………………………………………... 8 Project Details Implementation and Timeline……………………………………………… 9 Network Topology........................................................................................ 11 IP Schema…………………………………………………………………. 16 Security…………………………………………………………………….. 17 Active Directory Structure…………………………………………………………. 18 Active Directory and Exchange……………………………………………………..19 Website hosting and developing…………………………………………………… 20 Maintenance and Training Plan …………………………………………………….22 Risk Analysis………………………………………………………………………. 23 Backup Plan…………………………………………………………………………24 Cost Analysis………………………………………………………………………. 25 Appendix…………………………………………………………………………… 26 Appendix A: Cost Analysis…………………………………………………27 Appendix B: Hardware…………………………………………………….. 29 Introduction to Cornerstone Cornerstone Communications has been providing networking and data communications...

Words: 7795 - Pages: 32

Premium Essay

Telcom

...Integrating Wireless Sensor Networks with the Web Walter Colitti Vrije Universiteit Brussel - ETRO Pleinlaan 2, 1050 Brussels +32 2 629 10 27 Kris Steenhaut Vrije Universiteit Brussel - ETRO Pleinlaan 2, 1050 Brussels +32 2 629 29 76 Niccolò De Caro Vrije Universiteit Brussel - ETRO University of Perugia - DIEI +32 2 629 10 27 wcolitti@etro.vub.ac.be ksteenha@etro.vub.ac.be ndecaro@etro.vub.ac.be ABSTRACT IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) has accelerated the integration of Wireless Sensor Networks (WSNs) and smart objects with the Internet. At the same time, the Constrained Application Protocol (CoAP) has made it possible to provide resource constrained devices with RESTful web service functionalities and consequently to integrate WSNs and smart objects with the Web. The use of Web services on top of IP based WSNs facilitates the software reusability and reduces the complexity of the application development. This work focuses on RESTful WSNs. It describes CoAP, highlights the main differences with HTTP and reports the results of a simple experiment showing the benefits of CoAP in terms of power consumption compared to HTTP. The paper also describes the design and development of an end-to-end IP based architecture integrating a CoAP over 6LowPAN Contiki based WSN with an HTTP over IP based application. The application allows a user to access WSN data directly from a Web browser. The main system’s building blocks and functionalities...

Words: 4422 - Pages: 18

Premium Essay

Website Migration Project

...the selling and buying of goods and services is being done n online. That is why Tony chips should also have a website where it can be able to advertize its business and reach many customers. This paper will cover the steps and requirements on how Tony chips will transfer web hosting from an external source to internal as well as how to make their website redundant. In the efforts to build that redundant and scalable website, the key principles of availability, performance, reliability, scalability, manageability and cost require much attention (Matsudaira, 2012). Also, the SDLC must be duly followed as it is the requirement of any system. These are systems planning, system analysis, system design, system implementation, and lastly system support/security (Shelly & Rosenblatt, 2012). System Planning In this phase, the familiarization of the processes involved and objectives of the business must be well highlighted. A formal business plan needs to be in place to show which operations the company will undertake. There is a need to know all participants in the whole migration process and the time when they will you require then in the migration process. As the one of the requirements is that the website needs to be hosting should be internal, it means that a server there is a server requirement. Besides that, the website’s redundancy needs to be planned for, and the way customers will be able to place their orders online. We require architecture in this case that allows dynamicity...

Words: 3258 - Pages: 14

Premium Essay

Nt1330 Unit 3 Research Paper

...functions and use of different Servers in benefitting a small web-presence business needs With the 21st century been in the digital era the use and need for technology and computers is increasing and people want everything right there in front of them with only one click away. Web servers Web servers deliver web content from anywhere in the world to your computer, they can either be software which is a computer application the aids the delivery of web content or they can be hardware so the computer itself that delivers web content. A web server works by breaking the URL down into 3 parts, the protocol (http), the server name (web address) and the file name. So your computer communicates with the server name translating it into an IP address which will connect to the desired web server, following the protocol the browser sent a request to the web server asking for the file name and text. A web server can benefit a small business as since it’s designed to run multiple applications such a messaging, databases and email. Having a server makes it easier for your employees to communicate and share data. Due to the server being able to store images, documents etc. It can be used as a hub for sharing information with colleagues, with being able to access the server from anywhere in the world. Most servers are...

Words: 1535 - Pages: 7

Premium Essay

Inventory System

... This paper describes the Inventory Management System sufficiently to determine the feasibility and usability of a finished system. The core concept is to track the sale of items from the cash registers with additional features for interpreting the data. It uses a client-server model with a connected database to allow multiple stores and warehouses to be connected. This allows for later expansion while still supporting the targeted small businesses. The core features and final framework should be completed within 2 weeks, leaving 5 weeks to implement additional features and testing. 1. Operational Concepts The Inventory Management System is a real-time inventory database capable of connecting multiple stores. This can be used to track the inventory of a single store, or to manage the distribution of stock between several branches of a larger franchise. However, the system merely records sales and restocking data and provides notification of low stock at any location through email at a specified interval. The goal is to reduce the strain of tracking rather than to handle all store maintenance. Further features may include the ability to generate reports of sales, but again the interpretation is left to the management. In addition, since theft does occasionally occur, the system provides solutions for confirming the store inventory and for correcting stock quantities. 2. System Requirements The Inventory Management System uses a web-based interface...

Words: 1417 - Pages: 6

Free Essay

Dell Sun

...PowerEdge™ Servers Dell PowerEdge 6450 and 8450 with Microsoft® Windows® 2000 Advanced Server 1 Enterprise Systems Group (ESG) Dell White Paper 2 By Dave Jaffe and Todd Muirhead 3 dave_jaffe@dell.com 4 todd_muirhead@dell.com 5 [pic] Contents Executive Summary 3 Introduction 4 Solution Overview 6 The Database Servers 8 The Hardware 8 The Software 9 The Application Servers 11 The Hardware 11 The Software 11 Migrating the Application 13 The Tests 15 Conclusions 17 Acknowledgements 18 Bibliography 19 Appendix A : Baseball Database Organization 20 Database Tables 20 Master 20 Teammaster 20 Batting 21 Pitching 21 Fielding 22 Sample Query 22 Figure 1: The Dell and Sun Solution Implementations 6 Table 1: Database Server Comparison: PowerEdge 6450 and 8450 vs. Sun Enterprise 4500 8 Table 2: RAID Organization for Three Configurations 9 Table 3: Oracle Database Layout 9 Table 4: Oracle9i Tuning Parameters 10 Table 5: Application Servers: Dell PowerEdge 1550 vs. Sun Enterprise 220R 11 Table 6: Oracle Pricing 12 Table 7: 4-CPU Test Results: PowerEdge 6450 vs. Sun E4500 w/ 4 CPUs 15 Table 8: 8-CPU Test Results: PowerEdge 8450 vs. Sun E4500 w/ 8 CPUs 16 Section 1 Executive Summary Following studies showing the advantages of migrating Tier 1 web servers and Tier 2 application servers from Sun Microsystems, Inc. servers to Dell...

Words: 4937 - Pages: 20

Premium Essay

It540 Unit 3 Assignment

...Abstract……………………………………………………………………………………………3 Part One: Screen Shots for OSForensics………………………………………………………………….4&5 Part Two: What servers were compromised?...................................................................................................6 Was network equipment compromised?.............................................................................................................................6&7 What user accounts were employed to gain access?..................................................................7&8 What vulnerabilities were exploited?..............................................................................................8 What can be done to prevent a recurrence?................................................................................8&9 Conclusion………………………………………………………………………………………...9 References……………………………………………………………………………………….10 Abstract The purpose of this paper was to perform a forensics analysis of a network break-in. In the first part of the paper, six screen shots are inserted from the OSForensics software. In the second part of the paper, it discussed how to go about finding information when you are told there has been a break-in. There were five essay questions that went along with this scenario. The first question discussed utilities that would be used to establish what servers were compromised. Web shells, administrative interfaces, and general attack activity were three indicators to make this determination...

Words: 1627 - Pages: 7

Free Essay

Cittrix Cluster Instructions

...CITRIIX LICENSE CLUSTERING INTRUCTIONS The following steps describe the overall process involved in installing and configuring licensing on a cluster-enabled server. These steps assume you configured the clustering on the hardware on which you intend to install the license server. A detailed procedure follows. 1. Ensure that the first node has control of the cluster resources. 2. On the first node of the cluster, start the Citrix Licensing installation from the command-line and install it on the first node to the shared cluster drive (not the quorum drive). 3. Move the resources from the active node in the cluster to the second node. 4. Install the license server on the second node to the same shared location as the first node. 5. Obtain license files that specify the cluster name of the license server as the host name. After obtaining license files, you must add them to the license server and then reread them. 6. Configure your Citrix product to use the cluster name—not the node name—of the license server cluster. Note: When a clustered license server fails over, the cluster service renames the lmgrd_debug.log to the name of the node that previously hosted the services. Then it starts the services on the new active node and creates a new lmgrd_debug.log. To install licensing on a cluster-enabled server 1. Install Java on both cluster nodes. You can find a supported version on the Citrix product CD in the Support folder. 2. Ensure that the cluster IP address, cluster...

Words: 1830 - Pages: 8

Premium Essay

Capstone

...advertising; the other sought a degree in graphic design technology. The graphic designer was learning how to take an art form that was originally done with paper, pens, acetate, tape and glue and apply those same skills using computerized graphics, layers, vectors and pixels. Business work such as accounting, proposals, estimates, invoices and contracts was performed on an IBM compatible machine while all the graphic and design work was performed on a Mac LC II. Internal communications were executed using a 9600 baud modem system. External communications were performed through U.S. mail, telephone calls and a relatively new technology called facsimile transmissions (fax). Primary project output consisted of creating marketing and advertising materials such as logos, corporate branding materials, advertisements and other promotional print driven materials. Like many partnerships, Creative Image owners eventually dissolved the working relationship to pursue other ventures; however the business license was retained for 20 years in order to continue to allow freelance work by the artist. In 2011, the designer re-entered college to support 20 years of freelance design experience with a Bachelor’s Degree and redirect a career based upon print experience into establishing an expertise on creating successful web presence. Thus began the reinvigoration of Creative Image Group. State of the Company Today the company primarily creates and maintains corporate websites...

Words: 1523 - Pages: 7

Free Essay

Web Application Security

...Web Server Application Attacks Brooks Gunn Professor Nyeanchi CIS 502 July 10, 2013 Web Server Application Attacks Many organizations have begun to use web applications instead of client/server or distributed applications. These applications has provided organizations with better network performance, lower cost of ownership, thinner clients, and a way for any user to access the application. We applications significantly reduce the number of software programs that must be installed and maintained in end user workstations (Gregory 2010). Web applications are becoming a primary target for cyber criminals and hackers. They have become major targets because of the enormous amounts of data being shared through these applications and they are so often used to manage valuable information. Some criminals simply just want vandalize and cause harm to operations. There are several different types of web application attacks. Directory traversal, buffer overflows, and SQL injections are three of the more common attacks. One of the most common attacks on web based applications is directory traversal. This attack’s main purpose is the have an application access a computer file that is not intended to be accessible. It is a form of HTTP exploit in which the hacker will use the software on a Web server to access data in a directory other than the server’s root directory. The hacker could possibly execute commands...

Words: 1620 - Pages: 7

Premium Essay

Client Technology Tracking System Milestone2

... | |Date Created: 09/22/2011 |Date Last Updated: 09/22/2011 | |CAUSE AND EFFECT ANALYSIS |SYSTEM IMPROVEMENT OBJECTIVES | |Problem or Opportunity |Causes and Effects |System Objective |System Constraint | |The current system dose not accurately track |The papers placed in the three-ring binder are |A searchable database with configuration |Nixed the idea of having configuration and | |configuration information, leading to wasted time |disorganized so the information is never really |information is needed. |component information on the Internet for security | |for technicians and clients. |complete. |Design the system so it is easy to update. |reasons. | | |The three-ring binder paperwork cannot be updated |...

Words: 638 - Pages: 3

Free Essay

Website Migration

...Term Paper Website Migration CIS University 09/07/15 Tony’s Chips has recently been sold to a new independent company. The new company has hired me to manage a project that will move the old Website from an externally hosted solution to an internal one. The company’s leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. Therefore, the site will be redesigned so that customers will be able to place orders through the website and have them delivered as before. The design of the new system will be able to provide more data storage, faster retrieval, better security features and recovery solutions in the event that the website has any problems. With the operational reliability of the existing system, this will make it easier to improve the new system. The first part of the project goal is to discuss what it will take to build the web architecture, then what will have to be done to move the existing Website with minimal downtime, and then provide a disaster recovery plan in the event that the website should crash or stop working. In order to build the architecture, migrate the existing website along with adding the ability for the customers to place orders online and providing for redundancy of the site the system development life cycle (SDLC) will be used. The SDLC consists of five phases that will be utilized in this project and the five phases are systems planning, systems analysis...

Words: 2274 - Pages: 10

Free Essay

Research Windows

...How Windows Server 2008 Delivers Business Value Published: January 2008 © 2008 Microsoft Corporation. All rights reserved. This document is developed prior to the product’s release to manufacturing, and as such, we cannot guarantee that all details included herein will be exactly as what is found in the shipping product. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. The information represents the product at the time this document was printed and should be used for planning purposes only. Information subject to change at any time without prior notice. This whitepaper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Active Directory, PowerShell, SharePoint, SoftGrid, Windows, Windows Media, the Windows logo, Windows Vista, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. Table of Contents Table of Contents ii Introduction 1 Make Your Infrastructure More Efficient with Virtualization 1 Server Virtualization...

Words: 10609 - Pages: 43

Free Essay

Server Roles in Windows Server 2008 R2

...A server role in Windows Server 2008 R2 is defined as a service, feature, or program which allows a specific job function within a computer network. Many of these services are optional and do not come installed with Windows Server 2008 by default. Once roles are properly installed and configured they can become automated at a System Administrator’s disposal. The server roles available in Windows Server 2008 R2 are listed as follows: Active Directory Certificate Services This service is used for assigning and managing digital certificates used in software such as Adobe PDF’s. The AD-CS service is an excellent way to offer an extra layer of security among documents and files. Security layers consist of file encryption, digital signatures, and key authentication. AD-CS can also aid with Hyper Text Transfer Protocol Service (HTTPS) and authentication for employees using VPN services. Active Directory Domain Services Active Directory Domain Services allows computer, user, and device information to be stored. This allows for an easier, visual based management in a tree structured format; the domain is the host controller. AD-DS makes IT administration easier by allocating resources in one central, secure location. Active Directory Federation Services (ADFS) ADFS is a service which authenticates users in-between two parties over an extranet. This server provides user identity which recognizes and authenticates a user between two different servers, businesses, or locations in...

Words: 837 - Pages: 4

Free Essay

Research Oon Wcm

...WEB CONTENT MANAGEMENT SYSTEM February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express permission of the Government of the HKSAR. Disclaimer: Whilst the Government endeavours to ensure the accuracy of the information in this paper, no express or implied warranty is given by the Government as to the accuracy of the information. The Government of HKSAR accepts no liability for any error or omission arising from or related to the use of the information. TABLE OF CONTENTS Summary ............................................................................................................................. 2 I. Introduction..................................................................................................................... 3 What is a Web Content Management System? ............................................................... 3 Impact and Business Trends with WCMS ...................................................................... 5 The Common Components of WCMS............................................................................ 6 II. Security Concerns and Precautionary Measures ............................................................ 8 III. Conclusion.................................................................................................................. 11 Web Content Management...

Words: 2233 - Pages: 9