[http://creativecommons.org/licenses/by/3.0/]
This work is licensed under a CC
Attribution 3.0 Unported License [http://creativecommons.org/licenses/by/3.0/]
The two core constraints of REST are identification and a uniform interface. Starting from identification, we take a look at how the Web mixes identification with access, by using an identification scheme that not only supports decentralized and (mostly) anarchic growth. The Domain Name System (DNS) makes the growth at some level a bit more controlled, but as demonstrated by some TLDs (and ICANN's recent decision to sell new TLDs to the highest bidder), apart from the technical robustness, little else is stable about the way how the DNS is managed. Once identification and access are solved, the second important constrained coming into play is that of the uniform interface. In most real-life cases, this means that actual interactions in the application scenario are mapped to methods of the Hypertext Transfer Protocol (HTTP).
tel:
URIs have GSTN country codes in themwww.ischool.berkeley.edu
identifies the www
computer.edu
are different from .com
.biz
[http://www.neustarregistry.biz/])academia.edu
[http://academia.edu/] and even berkeley.academia.edu
[http://berkeley.academia.edu/]?trust built into them
bestorigin
expect subcategories to be linked to from thecategory thing
expect a book to be handed to you when following theget itlink
GET
retrieves a resource's representation (safe and idempotent)PUT
requests to put a resource at a known URI (idempotent)DELETE
removes a resource (idempotent)POST
does everything elsePOST