1 Answer

0 votes
by

The SOAP protocol is used for message exchange between Web Services. But SOAP defines very basic semantics for message headers. It does not always define meaning to the header. Hence to extend SOAP, WS-* protocols specifications have been developed with semantics which can then be reused in various application scenarios.

WS -* protocols are a set of protocols (means standards and specifications) that helps us to implement certain needs and behaviors of a service. These protocols describe how to exchange messages in a secure, transactional, and reliable way by using the headers in the SOAP message. WCF can implement the WS -* protocols by using WsHttpBinding. This binding makes use of some of the WS -* protocols and adds the needed behaviors, such as transactional message calls, reliability, discovery, and addressing.

Related questions

0 votes
    What is the difference between JAX--WS and JAX-RPC?...
asked Jun 6, 2021 in Technology by JackTerrance
0 votes
    Step 1: server I've created a simple server with Node & Socket.io which declares a namespace under ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Jul 3, 2022 in Education by JackTerrance
0 votes
    The ws-discovery specifications explains how to protect your network from message alteration Denial of service replay ... for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Mar 11, 2022 in Education by JackTerrance
0 votes
    The 4 Ws of the 4W problem canvas are: a) Who, What, Where and Why b) Who, What, When and Why c) Who, ... d) Who, Where, When and Why Select the correct answer from above options...
asked Nov 13, 2021 in Education by JackTerrance
0 votes
    IPsec defines two protocols: _______ and ________. A. PGP; ESP B. AH; SSL A. PGP; SSL B. AH; ESP...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? A. SHA B. Kerberos V5 C. Both SHA and MD5 D. MD5...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    What are different layers of the IoT protocol stack? Write the classification of IoT protocols?...
asked Jan 18, 2023 in Technology by JackTerrance
0 votes
    Consistency of CAP theorem states that all the protocols must be satisfied by the transaction. There can be half-completed transactions. (1)False (2)True...
asked Apr 22, 2021 in Technology by JackTerrance
0 votes
    NiFi allows stable exchange through the use of protocols which have ________ encryption. (1)None of the options (2)All the options (3)2-way-ssl (4)1-way-ssl...
asked Apr 20, 2021 in Technology by JackTerrance
0 votes
    Based on the network security protocols, which of the following algorithms are used to generate message digests? (1)DES (2)AES (3)MD5 (4)RSA...
asked Mar 21, 2021 in Technology by JackTerrance
0 votes
    In 1997, the conference at Kyoto laid down the protocols for the developed countries for preventing climate change. For how ... years (d) 16 years Please answer the above question....
asked Aug 4, 2022 in Education by JackTerrance
0 votes
    Which conference in 1997 laid down the protocols for developed countries for prevention of climatic changes? (a) ... d) Conference at Shimla Please answer the above question....
asked Aug 4, 2022 in Education by JackTerrance
0 votes
    Which of the below are common network protocols? (a) TCP (b) UDP (c) TCP and UDP (d) CNP I have ... Technologies & Servlet of Java Select the correct answer from above options...
asked Feb 22, 2022 in Education by JackTerrance
0 votes
    What types of protocols are used in VPNs? (a) Application level protocols (b) Tunnelling protocols (c) Network ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    There are ________ types of VPN protocols. (a) 3 (b) 4 (c) 5 (d) 6 This question was addressed to me ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...