Questions about XSD

Posted on 2012-08-17
Last Modified: 2012-08-18
when the xs:schema element uses,

is there any actual information used from that URL or is it importantly to declaratively assert the format of the XML?  If it is to define the document, where does an assertion take place to verify that the URL is in fact used?

Question by:newbieweb
    LVL 60

    Accepted Solution

    It is important to know that "" is a URI, not a URL.
    A URI is a unique string to identify a resource, in this case an XML namespace.
    There is a practical reason why the "unique string" takes the form of a URL (web location). Since the owner of the domain can assume that no one else will use his domain to form a URI.
    But that is the confusing part. Though a URI is nothing but a string identifier, people think there should be something at the other end.... and sometimes something can be found there
    (for that reason my URIs are most often of a form like this "urn:company:project..."

    An XML namespace is a way to bind a construct to a certain vocabulary. Similar to how programming languages such as Python or Ruby bind methods to a certain module.
    In this question "" is the identifier of the XSD schema namespace. It is bound to the "xs:" prefix. You will have a namespace node like this
    it just says that each element prefixed with "xs:" is part of the schema namespace, such as xs:schema for example

    A schema parser knows the string (it is a hard wired identifier string inside the parser).
    It will not lookup the address for anything, and it will not check that the URL is used... since it is a URI, not a URL, it is a URI that happens to have a URL syntaxt

    I hope this helps


    Author Closing Comment


    Great answer!!!
    LVL 60

    Expert Comment

    by:Geert Bormans

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    The Client Need Led Us to RSS I recently had an investment company ask me how they might notify their constituents about their newsworthy publications.  Probably you would think "Facebook" or "Twitter" but this is an interesting client.  Their cons…
    Browsing the questions asked to the Experts of this forum, you will be amazed to see how many times people are headaching about monster regular expressions (regex) to select that specific part of some HTML or XML file they want to extract. The examp…
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.

    754 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now