SlideShare une entreprise Scribd logo
1  sur  22
COMMUNICATION
1
3/30/2024
Outlines
 Layer protocols
 Types of Communication
 Remote Procedure Call
 Remote Object invocation
2
3/30/2024
 Inter-process communication is at the heart
of all distributed systems.
 It makes no sense to study distributed
systems without carefully examining the ways
that processes on different machines can
exchange information.
 Communication in distributed systems is
always based on low-level message passing
as offered by the underlying network.
 The rules that communicating processes
must adhere to, known as protocols.
3
3/30/2024
Communication
 Due to the absence of shared memory, all
communication in distributed systems is based
on sending and receiving messages.
 When process A wants to communicate with
process B, it first builds a message in its own
address space.
 Then, it executes a system call that causes the
OS to send the message over the network to B.
 Many different agreements are needed.
 In a variety of levels, varying from the low-level
details of bit transmission to the high-level
details of how information is to be expressed.
4
3/30/2024
 International Standards Organization (ISO) developed a
reference model that clearly identifies the various
levels involved, gives them standard names, and
points out which level should do which job.
 This model is called the Open Systems Interconnection
Reference Model (OSI-RM).
 The OSI model is designed to allow open systems to
communicate.
 An open system is one that is prepared to
communicate with any other open system by using
standard rules that govern the format, contents, and
meaning of the messages sent and received.
5
3/30/2024
 These rules are formalized in what are called
protocols.
 To allow a group of computers to communicate over a
network, they must all agree on the protocols to be
used.
 A distinction is made between two general types of
protocols.
1. Connection oriented protocols: before exchanging
data the sender and receiver first explicitly establish a
connection, and possibly negotiate the protocol they
will use(like telephone).
2. Connectionless protocols: no setup in advance is
needed. The sender just transmits the first message
when it is ready. Eg: dropping a letter in a mailbox.

6
3/30/2024
 With computers, both connection-oriented
and connectionless communication are
common.
 In the OSI model, communication is divided
up into seven levels or layers.
 Each layer deals with one specific aspect of
the communication.
 Each layer provides an interface to the one
above it.
 The interface consists of a set of operations
that together define the service the layer is
prepared to offer its users.
7
3/30/2024

 The collection of protocols used in a particular
system is called a protocol suite or protocol stack.
8
3/30/2024
9
 Physical: Physical characteristics of the media
Host (upper) Layers
Media (lower) Layers
 Data Link: Reliable data delivery across the link
 Network: Managing connections across the network
or routing
 Transport: End-to-end connection and reliability (handles
lost packets); TCP (connection-oriented),
UDP (connectionless), etc.
 Session: Managing sessions between applications
(dialog control and synchronization); rarely
supported
 Presentation: Data presentation to applications; concerned
with the syntax and semantics of the
information transmitted
 Application: Network services to applications; contains
protocols that are commonly needed by
users; FTP, HTTP, SMTP, ...
 A typical message as it appears on the network.
10
3/30/2024
 Middleware is an application that logically
lives in the application layer, but which
contains many general-purpose protocols
that warrant their own layers, independent of
other, more specific applications.
 A distinction can be made between high-level
communication protocols and protocols for
establishing various middleware services.
11
3/30/2024
 There are numerous protocols to support a variety of
middleware services such as:
1. Authorization protocols: establish authentication,
that is, provide proof of a claimed identity.
2. Commit protocol: establish that in a group of
processes either all processes carry out a particular
operation, or that the operation is not carried out at
all.
3. Locking protocol: protect against simultaneous
access by a collection of processes that are
distributed across multiple machines.
12
3/30/2024
 In principle, the core of the mail delivery system can be seen as
a middleware communication service.
 An electronic mail system is a typical example in
which communication is persistent.
 With persistent communication, a message that has
been submitted for transmission is stored by the
communication middleware as long as it takes to
deliver it to the receiver.
13
3/30/2024
 Persistent communication, a message is stored by
the communication system only as long as the
sending and receiving application are executing.
 Besides being persistent or transient, communication
can also be asynchronous or synchronous.
 The characteristic feature of asynchronous
communication is that a sender continues
immediately after it has submitted its message for
transmission.
 This means that the message is (temporarily) stored
immediately by the middleware upon submission.
 With synchronous communication, the sender is
blocked until its request is known to be accepted.
14
3/30/2024
15
 When a process on machine A calls a procedure
on machine B, the calling process on A is
suspended, and execution of the called
procedure takes place on B.
 Information can be transported from the
caller to the called in the parameters and can
come back in the procedure result.
 No message passing at all is visible to the
programmer.
 This method is known as Remote Procedure Call,
or often just RPC.
3/30/2024
 When read is actually a remote procedure (e.g., one that will run
on the file server's machine), a different version of read, called a
client stub, is put into the library.
 A server stub is the server-side equivalent of a client stub:
it is a piece of code that transforms requests coming in over the
network into local procedure calls.
 Following the call to send, the client stub calls receive, blocking
itself until the reply comes back.

16
3/30/2024
 The function of the client stub is to take its parameters, pack
them into a message, and send them to the server stub.
Passing Value Parameters
Passing Reference Parameters
 Packing parameters into a message is called parameter
marshaling.
 The steps involved in a doing a remote computation through
RPC.

17
3/30/2024
 This strict request-reply behaviour is unnecessary
when there is no result to return, and only leads to
blocking the client while it could have proceeded and
have done useful work just after requesting the
remote procedure to be called.
 To support such situations, RPC systems may provide
facilities for what are called asynchronous RPCs, by
which a client immediately continues after issuing the
RPC request.
 With asynchronous RPCs, the server immediately
sends a reply back to the client the moment the RPC
request is received, after which it calls the requested
procedure.
18
3/30/2024
19
(a) The interaction between client and server in a traditional RPC.
(b) The interaction using asynchronous RPC
A client and server interacting through two asynchronous RPCs.
3/30/2024
 Distributed Computing Environment (DCE), is specific
RPC system which was developed by the Open
Software Foundation (OSF), now called The Open
Group.
 DCE is a true middleware system in that it is designed
to execute as a layer of abstraction between existing
(network) operating systems and distributed
applications.
 Goals of DCE RPC
For a client to access a remote service by simply
calling a local procedure.
20
3/30/2024
21
3/30/2024
Questions?
22
3/30/2024

Contenu connexe

Similaire à Chapter 4- Communication in distributed system.ppt

Task communication
Task communicationTask communication
Task communication1jayanti
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference ModelVishnu Vardhan
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environmentMaulik Patel
 
Network Models.pptx
Network  Models.pptxNetwork  Models.pptx
Network Models.pptxAhmadAbba6
 
Topic 5- Communications v1.pptx
Topic 5- Communications v1.pptxTopic 5- Communications v1.pptx
Topic 5- Communications v1.pptxDanishMahmood23
 
Chapter 2B-Communication.ppt
Chapter 2B-Communication.pptChapter 2B-Communication.ppt
Chapter 2B-Communication.pptsirajmohammed35
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusAnujashejwal
 
Protocols and standards
Protocols and standardsProtocols and standards
Protocols and standardsPriyankaM69
 
Chapter 4 communication2
Chapter 4 communication2Chapter 4 communication2
Chapter 4 communication2DBU
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptxFamiDan
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Pokala Sai
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer ) dimuthu22
 

Similaire à Chapter 4- Communication in distributed system.ppt (20)

Task communication
Task communicationTask communication
Task communication
 
OSI Layer
OSI LayerOSI Layer
OSI Layer
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
 
four
fourfour
four
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environment
 
Network Models.pptx
Network  Models.pptxNetwork  Models.pptx
Network Models.pptx
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
Osi model
Osi modelOsi model
Osi model
 
Topic 5- Communications v1.pptx
Topic 5- Communications v1.pptxTopic 5- Communications v1.pptx
Topic 5- Communications v1.pptx
 
Chapter 2B-Communication.ppt
Chapter 2B-Communication.pptChapter 2B-Communication.ppt
Chapter 2B-Communication.ppt
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
 
Protocols and standards
Protocols and standardsProtocols and standards
Protocols and standards
 
Chapter 4 communication2
Chapter 4 communication2Chapter 4 communication2
Chapter 4 communication2
 
Networks software
Networks softwareNetworks software
Networks software
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptx
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 

Plus de AschalewAyele2

Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdfAschalewAyele2
 
Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdfAschalewAyele2
 
Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxAschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxAschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
Chapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdfChapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdfAschalewAyele2
 
Chapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptxChapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptxAschalewAyele2
 
chapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.pptchapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.pptAschalewAyele2
 

Plus de AschalewAyele2 (9)

Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
 
Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdf
 
Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
Chapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdfChapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdf
 
Chapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptxChapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptx
 
chapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.pptchapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.ppt
 

Dernier

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Dernier (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Chapter 4- Communication in distributed system.ppt

  • 2. Outlines  Layer protocols  Types of Communication  Remote Procedure Call  Remote Object invocation 2 3/30/2024
  • 3.  Inter-process communication is at the heart of all distributed systems.  It makes no sense to study distributed systems without carefully examining the ways that processes on different machines can exchange information.  Communication in distributed systems is always based on low-level message passing as offered by the underlying network.  The rules that communicating processes must adhere to, known as protocols. 3 3/30/2024 Communication
  • 4.  Due to the absence of shared memory, all communication in distributed systems is based on sending and receiving messages.  When process A wants to communicate with process B, it first builds a message in its own address space.  Then, it executes a system call that causes the OS to send the message over the network to B.  Many different agreements are needed.  In a variety of levels, varying from the low-level details of bit transmission to the high-level details of how information is to be expressed. 4 3/30/2024
  • 5.  International Standards Organization (ISO) developed a reference model that clearly identifies the various levels involved, gives them standard names, and points out which level should do which job.  This model is called the Open Systems Interconnection Reference Model (OSI-RM).  The OSI model is designed to allow open systems to communicate.  An open system is one that is prepared to communicate with any other open system by using standard rules that govern the format, contents, and meaning of the messages sent and received. 5 3/30/2024
  • 6.  These rules are formalized in what are called protocols.  To allow a group of computers to communicate over a network, they must all agree on the protocols to be used.  A distinction is made between two general types of protocols. 1. Connection oriented protocols: before exchanging data the sender and receiver first explicitly establish a connection, and possibly negotiate the protocol they will use(like telephone). 2. Connectionless protocols: no setup in advance is needed. The sender just transmits the first message when it is ready. Eg: dropping a letter in a mailbox.  6 3/30/2024
  • 7.  With computers, both connection-oriented and connectionless communication are common.  In the OSI model, communication is divided up into seven levels or layers.  Each layer deals with one specific aspect of the communication.  Each layer provides an interface to the one above it.  The interface consists of a set of operations that together define the service the layer is prepared to offer its users. 7 3/30/2024
  • 8.   The collection of protocols used in a particular system is called a protocol suite or protocol stack. 8 3/30/2024
  • 9. 9  Physical: Physical characteristics of the media Host (upper) Layers Media (lower) Layers  Data Link: Reliable data delivery across the link  Network: Managing connections across the network or routing  Transport: End-to-end connection and reliability (handles lost packets); TCP (connection-oriented), UDP (connectionless), etc.  Session: Managing sessions between applications (dialog control and synchronization); rarely supported  Presentation: Data presentation to applications; concerned with the syntax and semantics of the information transmitted  Application: Network services to applications; contains protocols that are commonly needed by users; FTP, HTTP, SMTP, ...
  • 10.  A typical message as it appears on the network. 10 3/30/2024
  • 11.  Middleware is an application that logically lives in the application layer, but which contains many general-purpose protocols that warrant their own layers, independent of other, more specific applications.  A distinction can be made between high-level communication protocols and protocols for establishing various middleware services. 11 3/30/2024
  • 12.  There are numerous protocols to support a variety of middleware services such as: 1. Authorization protocols: establish authentication, that is, provide proof of a claimed identity. 2. Commit protocol: establish that in a group of processes either all processes carry out a particular operation, or that the operation is not carried out at all. 3. Locking protocol: protect against simultaneous access by a collection of processes that are distributed across multiple machines. 12 3/30/2024
  • 13.  In principle, the core of the mail delivery system can be seen as a middleware communication service.  An electronic mail system is a typical example in which communication is persistent.  With persistent communication, a message that has been submitted for transmission is stored by the communication middleware as long as it takes to deliver it to the receiver. 13 3/30/2024
  • 14.  Persistent communication, a message is stored by the communication system only as long as the sending and receiving application are executing.  Besides being persistent or transient, communication can also be asynchronous or synchronous.  The characteristic feature of asynchronous communication is that a sender continues immediately after it has submitted its message for transmission.  This means that the message is (temporarily) stored immediately by the middleware upon submission.  With synchronous communication, the sender is blocked until its request is known to be accepted. 14 3/30/2024
  • 15. 15  When a process on machine A calls a procedure on machine B, the calling process on A is suspended, and execution of the called procedure takes place on B.  Information can be transported from the caller to the called in the parameters and can come back in the procedure result.  No message passing at all is visible to the programmer.  This method is known as Remote Procedure Call, or often just RPC. 3/30/2024
  • 16.  When read is actually a remote procedure (e.g., one that will run on the file server's machine), a different version of read, called a client stub, is put into the library.  A server stub is the server-side equivalent of a client stub: it is a piece of code that transforms requests coming in over the network into local procedure calls.  Following the call to send, the client stub calls receive, blocking itself until the reply comes back.  16 3/30/2024
  • 17.  The function of the client stub is to take its parameters, pack them into a message, and send them to the server stub. Passing Value Parameters Passing Reference Parameters  Packing parameters into a message is called parameter marshaling.  The steps involved in a doing a remote computation through RPC.  17 3/30/2024
  • 18.  This strict request-reply behaviour is unnecessary when there is no result to return, and only leads to blocking the client while it could have proceeded and have done useful work just after requesting the remote procedure to be called.  To support such situations, RPC systems may provide facilities for what are called asynchronous RPCs, by which a client immediately continues after issuing the RPC request.  With asynchronous RPCs, the server immediately sends a reply back to the client the moment the RPC request is received, after which it calls the requested procedure. 18 3/30/2024
  • 19. 19 (a) The interaction between client and server in a traditional RPC. (b) The interaction using asynchronous RPC A client and server interacting through two asynchronous RPCs. 3/30/2024
  • 20.  Distributed Computing Environment (DCE), is specific RPC system which was developed by the Open Software Foundation (OSF), now called The Open Group.  DCE is a true middleware system in that it is designed to execute as a layer of abstraction between existing (network) operating systems and distributed applications.  Goals of DCE RPC For a client to access a remote service by simply calling a local procedure. 20 3/30/2024