|
[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message] RE: RE: Are people really using Identity constraints specified
So many layers - so little time in life. For more on layers see: http://www.uwsg.iu.edu/usail/network/nfs/network_layers.html also Google on 'OSI layers' for more links (if this interests you!) Just depends on which lines you want to draw in the sand and how many... DW ============================================================== Quoting Michael Kay <michael.h.kay@n...>: > > > > I remember reading a long time ago a posting by David > > Megginson. Paraphrasing, David said, "when dealing with XML > > you are working down at the bare metal". > > > > Other technologies work down at the bare metal, such as > > TCP/IP. Perhaps there are lessons to be learned there? > > Certain TCP/IP packets are rejected as bad and the other > > packets are accepted and passed up to other layers, where > > those layers perform additional constraint checking. > > > > TCP is 4 layers above the bare metal, IP is 5 layers above, XML is 6 layers > above, and a specific XML vocabulary (as described by a schema) is 7 layers > above. Every layer in the protocol stack needs to check that its own rules > are satisfied. > > Michael Kay > > > ----------------------------------------------------------------- > The xml-dev list is sponsored by XML.org <http://www.xml.org>, an > initiative of OASIS <http://www.oasis-open.org> > > The list archives are at http://lists.xml.org/archives/xml-dev/ > > To subscribe or unsubscribe from this list use the subscription > manager: <http://www.oasis-open.org/mlmanage/index.php> > >
|
PURCHASE STYLUS STUDIO ONLINE TODAY!Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced! Download The World's Best XML IDE!Accelerate XML development with our award-winning XML IDE - Download a free trial today! Subscribe in XML format
|
|||||||||

Cart








