OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

 


 

   RE: RE: [xml-dev] Are people really using Identity constraints specified

[ Lists Home | Date Index | Thread Index ]

So many layers - so little time in life.

For more on layers see:

 http://www.uwsg.iu.edu/usail/network/nfs/network_layers.html

also Google on 'OSI layers' for more links (if this interests you!)

Just depends on which lines you want to draw in the sand and how
many...

DW
==============================================================
Quoting Michael Kay <michael.h.kay@ntlworld.com>:

> > 
> > I remember reading a long time ago a posting by David 
> > Megginson.  Paraphrasing, David said, "when dealing with XML 
> > you are working down at the bare metal".  
> > 
> > Other technologies work down at the bare metal, such as 
> > TCP/IP.  Perhaps there are lessons to be learned there?  
> > Certain TCP/IP packets are rejected as bad and the other 
> > packets are accepted and passed up to other layers, where 
> > those layers perform additional constraint checking.
> > 
> 
> TCP is 4 layers above the bare metal, IP is 5 layers above, XML is 6 layers
> above, and a specific XML vocabulary (as described by a schema) is 7 layers
> above. Every layer in the protocol stack needs to check that its own rules
> are satisfied.
> 
> Michael Kay 
> 
> 
> -----------------------------------------------------------------
> The xml-dev list is sponsored by XML.org <http://www.xml.org>, an
> initiative of OASIS <http://www.oasis-open.org>
> 
> The list archives are at http://lists.xml.org/archives/xml-dev/
> 
> To subscribe or unsubscribe from this list use the subscription
> manager: <http://www.oasis-open.org/mlmanage/index.php>
> 
> 






 

News | XML in Industry | Calendar | XML Registry
Marketplace | Resources | MyXML.org | Sponsors | Privacy Statement

Copyright 2001 XML.org. This site is hosted by OASIS