Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

Service Encapsulation

By Exforsys | on October 17, 2007 |
SOA Tutorial

Service Encapsulation

What is Encapsulation?

In the realm of computer networking, the term encapsulation is utilized to include data from an upper layer protocol in to a protocol on a lower layer. Such a method of abstraction through networking allows many different layers to add on functionality and features.

The World Wide Web, for instance, is based on the Internet Protocol. The vast majority of applications utilize either the Transmission Control Protocol or the User Datagram Protocol. Thus, a lot of user data is then encapsulated in to the form of a UDP datagram, which is subsequently encapsulated in to the form of an Internet Protocol packet. The packet is then transmitted over a data link layer protocol, such as Ethernet.

The data link layer takes care of the physical transmission of the data. The Internet Protocol adds the addresses of individual computers and the UDP adds on “application addressing,” which is the port that specifies the service, like a TFTP or web server.

Encapsulation is utilized both by the Internet protocol suite and the OSI model. In the process of encapsulation, the more abstract layer is referred to as the upper layer protocol. The more specific layer is known as the lower layer protocol.

Service Encapsulation & Loose Coupling

Loosely coupled application parts should be able to readily put the scissors right in to the structure of the Business without disrupting supporting Information Technology systems. At the same time, the synchronous command and control nature of Service Oriented Architecture is one method of tightly coupling application components that do not allow for such a wide degree of flexibility. Service Oriented Architecture can be loosely coupled in the technical domain, where common web services technology is utilized, but it is not really in the functional domain where Service Oriented Architecture may be associate with calling foreign services and thus eliminating the redundancies of data.

The availability of stored data and services might be made to disappear after an act of outsourcing, which might lead to costly consequences and major risks. All this has to do with the creation of dependencies via Service Oriented Architecture. So in a way, Service Oriented Architecture’s promise of delivering loose coupling, which tends to be asynchronous, can at the functional level be regarded as hype.

Encapsulation in Object Oriented Programming

Object Oriented Programming can be viewed as a programming paradigm that utilizes objects in order to design computer programs and design applications. Several techniques are employed from an array of previously established paradigms, including encapsulation, inheritance, polymorphism, and modularity. It was not commonly employed in mainstream software application development until the last decade, although a lot of modern programming languages are capable of supporting Object Oriented Programming.

The roots of Object Oriented Programming extend back to the ‘60s, during which time the nascent field of software engineering had begun to play around with the idea of a software crisis. As hardware and software both continued to develop and grow in complexity, how could the quality of software be maintained? Object oriented programming thus addresses this problem through a strong emphasis of modularity in software.

Object Oriented Programming is frequently viewed as a collection of objects that cooperate. This is different than the popular view of a program as a list of instructions to a computational device. When it comes to Object Oriented Programming, each object is able to receive messages, send messages, and process to data. Every object is capable of being viewed as an independent tiny machine that plays a specific role or has a particular responsibility.

Encapsulation works to hide the details of how a specific class functions from objects that utilize its code or might send messages to it. So the Dog class, to use our previous example, has a bark () method. The code for this bark () method defines exactly how the bark comes about (i.e. through inhale () and exhale () at a specific volume and pitch.) Timmy, Lassie’s friend, does not need to know exactly how Lassie barks, though. Encapsulation is thus attained by spelling out which classes may utilize the members of an object. The result is that each object exposes to a class a specific interface – which can be those members that are accessible to a particular class.

The purpose of encapsulation is the prevention of interface clients from depending on those bits of an implementation that may change in the future, thus allowing such changes to be made in a simpler fashion, without making any changes to the clients.

« « Service Abstraction
Service Loose Coupling » »

Author Description

Avatar

Editorial Team at Exforsys is a team of IT Consulting and Training team led by Chandra Vennapoosa.

Free Training

RSSSubscribe 0 Followers
  • Popular
  • Recent
  • SOA and Web Services

    October 8, 2007 - 0 Comment
  • Service Oriented Infrastructure

    October 21, 2007 - 0 Comment
  • SOA Architecture

    September 26, 2007 - 0 Comment
  • Service Oriented Design and Development

    October 10, 2007 - 0 Comment
  • SOA Concepts

    September 26, 2007 - 0 Comment
  • SOA and Network Management Architecture

    October 10, 2007 - 0 Comment
  • SOA Future

    September 27, 2007 - 0 Comment
  • SOA and Business Architecture

    October 11, 2007 - 0 Comment
  • SOA Principles

    September 29, 2007 - 0 Comment
  • Service Orientation and Interoperability

    October 11, 2007 - 0 Comment
  • Service Autonomy

    November 9, 2007 - 0 Comment
  • Service Oriented Infrastructure

    October 21, 2007 - 0 Comment
  • Service Reusability

    October 20, 2007 - 0 Comment
  • Standardized Service Contract

    October 20, 2007 - 0 Comment
  • Service Discoverability

    October 20, 2007 - 0 Comment
  • Service Loose Coupling

    October 17, 2007 - 0 Comment
  • Service Abstraction

    October 15, 2007 - 0 Comment
  • Service Composability

    October 15, 2007 - 0 Comment
  • Service Orientation and Interoperability

    October 11, 2007 - 0 Comment
  • SOA and Business Architecture

    October 11, 2007 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • Service Autonomy
  • Service Oriented Infrastructure
  • Service Reusability
  • Standardized Service Contract
  • Service Discoverability

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2023. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT