SlideShare ist ein Scribd-Unternehmen logo
COMMUNICATION
1
3/30/2024
Outlines
 Layer protocols
 Types of Communication
 Remote Procedure Call
 Remote Object invocation
2
3/30/2024
 Inter-process communication is at the heart
of all distributed systems.
 It makes no sense to study distributed
systems without carefully examining the ways
that processes on different machines can
exchange information.
 Communication in distributed systems is
always based on low-level message passing
as offered by the underlying network.
 The rules that communicating processes
must adhere to, known as protocols.
3
3/30/2024
Communication
 Due to the absence of shared memory, all
communication in distributed systems is based
on sending and receiving messages.
 When process A wants to communicate with
process B, it first builds a message in its own
address space.
 Then, it executes a system call that causes the
OS to send the message over the network to B.
 Many different agreements are needed.
 In a variety of levels, varying from the low-level
details of bit transmission to the high-level
details of how information is to be expressed.
4
3/30/2024
 International Standards Organization (ISO) developed a
reference model that clearly identifies the various
levels involved, gives them standard names, and
points out which level should do which job.
 This model is called the Open Systems Interconnection
Reference Model (OSI-RM).
 The OSI model is designed to allow open systems to
communicate.
 An open system is one that is prepared to
communicate with any other open system by using
standard rules that govern the format, contents, and
meaning of the messages sent and received.
5
3/30/2024
 These rules are formalized in what are called
protocols.
 To allow a group of computers to communicate over a
network, they must all agree on the protocols to be
used.
 A distinction is made between two general types of
protocols.
1. Connection oriented protocols: before exchanging
data the sender and receiver first explicitly establish a
connection, and possibly negotiate the protocol they
will use(like telephone).
2. Connectionless protocols: no setup in advance is
needed. The sender just transmits the first message
when it is ready. Eg: dropping a letter in a mailbox.

6
3/30/2024
 With computers, both connection-oriented
and connectionless communication are
common.
 In the OSI model, communication is divided
up into seven levels or layers.
 Each layer deals with one specific aspect of
the communication.
 Each layer provides an interface to the one
above it.
 The interface consists of a set of operations
that together define the service the layer is
prepared to offer its users.
7
3/30/2024

 The collection of protocols used in a particular
system is called a protocol suite or protocol stack.
8
3/30/2024
9
 Physical: Physical characteristics of the media
Host (upper) Layers
Media (lower) Layers
 Data Link: Reliable data delivery across the link
 Network: Managing connections across the network
or routing
 Transport: End-to-end connection and reliability (handles
lost packets); TCP (connection-oriented),
UDP (connectionless), etc.
 Session: Managing sessions between applications
(dialog control and synchronization); rarely
supported
 Presentation: Data presentation to applications; concerned
with the syntax and semantics of the
information transmitted
 Application: Network services to applications; contains
protocols that are commonly needed by
users; FTP, HTTP, SMTP, ...
 A typical message as it appears on the network.
10
3/30/2024
 Middleware is an application that logically
lives in the application layer, but which
contains many general-purpose protocols
that warrant their own layers, independent of
other, more specific applications.
 A distinction can be made between high-level
communication protocols and protocols for
establishing various middleware services.
11
3/30/2024
 There are numerous protocols to support a variety of
middleware services such as:
1. Authorization protocols: establish authentication,
that is, provide proof of a claimed identity.
2. Commit protocol: establish that in a group of
processes either all processes carry out a particular
operation, or that the operation is not carried out at
all.
3. Locking protocol: protect against simultaneous
access by a collection of processes that are
distributed across multiple machines.
12
3/30/2024
 In principle, the core of the mail delivery system can be seen as
a middleware communication service.
 An electronic mail system is a typical example in
which communication is persistent.
 With persistent communication, a message that has
been submitted for transmission is stored by the
communication middleware as long as it takes to
deliver it to the receiver.
13
3/30/2024
 Persistent communication, a message is stored by
the communication system only as long as the
sending and receiving application are executing.
 Besides being persistent or transient, communication
can also be asynchronous or synchronous.
 The characteristic feature of asynchronous
communication is that a sender continues
immediately after it has submitted its message for
transmission.
 This means that the message is (temporarily) stored
immediately by the middleware upon submission.
 With synchronous communication, the sender is
blocked until its request is known to be accepted.
14
3/30/2024
15
 When a process on machine A calls a procedure
on machine B, the calling process on A is
suspended, and execution of the called
procedure takes place on B.
 Information can be transported from the
caller to the called in the parameters and can
come back in the procedure result.
 No message passing at all is visible to the
programmer.
 This method is known as Remote Procedure Call,
or often just RPC.
3/30/2024
 When read is actually a remote procedure (e.g., one that will run
on the file server's machine), a different version of read, called a
client stub, is put into the library.
 A server stub is the server-side equivalent of a client stub:
it is a piece of code that transforms requests coming in over the
network into local procedure calls.
 Following the call to send, the client stub calls receive, blocking
itself until the reply comes back.

16
3/30/2024
 The function of the client stub is to take its parameters, pack
them into a message, and send them to the server stub.
Passing Value Parameters
Passing Reference Parameters
 Packing parameters into a message is called parameter
marshaling.
 The steps involved in a doing a remote computation through
RPC.

17
3/30/2024
 This strict request-reply behaviour is unnecessary
when there is no result to return, and only leads to
blocking the client while it could have proceeded and
have done useful work just after requesting the
remote procedure to be called.
 To support such situations, RPC systems may provide
facilities for what are called asynchronous RPCs, by
which a client immediately continues after issuing the
RPC request.
 With asynchronous RPCs, the server immediately
sends a reply back to the client the moment the RPC
request is received, after which it calls the requested
procedure.
18
3/30/2024
19
(a) The interaction between client and server in a traditional RPC.
(b) The interaction using asynchronous RPC
A client and server interacting through two asynchronous RPCs.
3/30/2024
 Distributed Computing Environment (DCE), is specific
RPC system which was developed by the Open
Software Foundation (OSF), now called The Open
Group.
 DCE is a true middleware system in that it is designed
to execute as a layer of abstraction between existing
(network) operating systems and distributed
applications.
 Goals of DCE RPC
For a client to access a remote service by simply
calling a local procedure.
20
3/30/2024
21
3/30/2024
Questions?
22
3/30/2024

Weitere ähnliche Inhalte

Ähnlich wie Chapter 4- Communication in distributed system.ppt

Task communication
Task communicationTask communication
Task communication
1jayanti
 
OSI Layer
OSI LayerOSI Layer
OSI Layer
Mathi Vanan
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
Vishnu Vardhan
 
four
fourfour
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
PataniMenu
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environment
Maulik Patel
 
Network Models.pptx
Network  Models.pptxNetwork  Models.pptx
Network Models.pptx
AhmadAbba6
 
DS-Chapter DDEFR2-Communication_105220.ppt
DS-Chapter DDEFR2-Communication_105220.pptDS-Chapter DDEFR2-Communication_105220.ppt
DS-Chapter DDEFR2-Communication_105220.ppt
menoralemu03
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
Soumo Dhali
 
Osi model
Osi modelOsi model
Osi model
NowrinJahanSiam
 
Topic 5- Communications v1.pptx
Topic 5- Communications v1.pptxTopic 5- Communications v1.pptx
Topic 5- Communications v1.pptx
DanishMahmood23
 
Chapter 2B-Communication.ppt
Chapter 2B-Communication.pptChapter 2B-Communication.ppt
Chapter 2B-Communication.ppt
sirajmohammed35
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
Anujashejwal
 
Protocols and standards
Protocols and standardsProtocols and standards
Protocols and standards
PriyankaM69
 
Chapter 4 communication2
Chapter 4 communication2Chapter 4 communication2
Chapter 4 communication2
DBU
 
Networks software
Networks softwareNetworks software
Networks software
Mukesh Chinta
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
Robuilislam
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptx
FamiDan
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
Jacqueline Thomas
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications
Pokala Sai
 

Ähnlich wie Chapter 4- Communication in distributed system.ppt (20)

Task communication
Task communicationTask communication
Task communication
 
OSI Layer
OSI LayerOSI Layer
OSI Layer
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
 
four
fourfour
four
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environment
 
Network Models.pptx
Network  Models.pptxNetwork  Models.pptx
Network Models.pptx
 
DS-Chapter DDEFR2-Communication_105220.ppt
DS-Chapter DDEFR2-Communication_105220.pptDS-Chapter DDEFR2-Communication_105220.ppt
DS-Chapter DDEFR2-Communication_105220.ppt
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
Osi model
Osi modelOsi model
Osi model
 
Topic 5- Communications v1.pptx
Topic 5- Communications v1.pptxTopic 5- Communications v1.pptx
Topic 5- Communications v1.pptx
 
Chapter 2B-Communication.ppt
Chapter 2B-Communication.pptChapter 2B-Communication.ppt
Chapter 2B-Communication.ppt
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
 
Protocols and standards
Protocols and standardsProtocols and standards
Protocols and standards
 
Chapter 4 communication2
Chapter 4 communication2Chapter 4 communication2
Chapter 4 communication2
 
Networks software
Networks softwareNetworks software
Networks software
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptx
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications
 

Mehr von AschalewAyele2

Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
AschalewAyele2
 
Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdf
AschalewAyele2
 
Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptx
AschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
AschalewAyele2
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptx
AschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
AschalewAyele2
 
Chapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdfChapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdf
AschalewAyele2
 
Chapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptxChapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptx
AschalewAyele2
 
chapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.pptchapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.ppt
AschalewAyele2
 

Mehr von AschalewAyele2 (9)

Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
 
Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdf
 
Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
Chapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdfChapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdf
 
Chapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptxChapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptx
 
chapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.pptchapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.ppt
 

Kürzlich hochgeladen

Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 

Kürzlich hochgeladen (20)

Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 

Chapter 4- Communication in distributed system.ppt

  • 2. Outlines  Layer protocols  Types of Communication  Remote Procedure Call  Remote Object invocation 2 3/30/2024
  • 3.  Inter-process communication is at the heart of all distributed systems.  It makes no sense to study distributed systems without carefully examining the ways that processes on different machines can exchange information.  Communication in distributed systems is always based on low-level message passing as offered by the underlying network.  The rules that communicating processes must adhere to, known as protocols. 3 3/30/2024 Communication
  • 4.  Due to the absence of shared memory, all communication in distributed systems is based on sending and receiving messages.  When process A wants to communicate with process B, it first builds a message in its own address space.  Then, it executes a system call that causes the OS to send the message over the network to B.  Many different agreements are needed.  In a variety of levels, varying from the low-level details of bit transmission to the high-level details of how information is to be expressed. 4 3/30/2024
  • 5.  International Standards Organization (ISO) developed a reference model that clearly identifies the various levels involved, gives them standard names, and points out which level should do which job.  This model is called the Open Systems Interconnection Reference Model (OSI-RM).  The OSI model is designed to allow open systems to communicate.  An open system is one that is prepared to communicate with any other open system by using standard rules that govern the format, contents, and meaning of the messages sent and received. 5 3/30/2024
  • 6.  These rules are formalized in what are called protocols.  To allow a group of computers to communicate over a network, they must all agree on the protocols to be used.  A distinction is made between two general types of protocols. 1. Connection oriented protocols: before exchanging data the sender and receiver first explicitly establish a connection, and possibly negotiate the protocol they will use(like telephone). 2. Connectionless protocols: no setup in advance is needed. The sender just transmits the first message when it is ready. Eg: dropping a letter in a mailbox.  6 3/30/2024
  • 7.  With computers, both connection-oriented and connectionless communication are common.  In the OSI model, communication is divided up into seven levels or layers.  Each layer deals with one specific aspect of the communication.  Each layer provides an interface to the one above it.  The interface consists of a set of operations that together define the service the layer is prepared to offer its users. 7 3/30/2024
  • 8.   The collection of protocols used in a particular system is called a protocol suite or protocol stack. 8 3/30/2024
  • 9. 9  Physical: Physical characteristics of the media Host (upper) Layers Media (lower) Layers  Data Link: Reliable data delivery across the link  Network: Managing connections across the network or routing  Transport: End-to-end connection and reliability (handles lost packets); TCP (connection-oriented), UDP (connectionless), etc.  Session: Managing sessions between applications (dialog control and synchronization); rarely supported  Presentation: Data presentation to applications; concerned with the syntax and semantics of the information transmitted  Application: Network services to applications; contains protocols that are commonly needed by users; FTP, HTTP, SMTP, ...
  • 10.  A typical message as it appears on the network. 10 3/30/2024
  • 11.  Middleware is an application that logically lives in the application layer, but which contains many general-purpose protocols that warrant their own layers, independent of other, more specific applications.  A distinction can be made between high-level communication protocols and protocols for establishing various middleware services. 11 3/30/2024
  • 12.  There are numerous protocols to support a variety of middleware services such as: 1. Authorization protocols: establish authentication, that is, provide proof of a claimed identity. 2. Commit protocol: establish that in a group of processes either all processes carry out a particular operation, or that the operation is not carried out at all. 3. Locking protocol: protect against simultaneous access by a collection of processes that are distributed across multiple machines. 12 3/30/2024
  • 13.  In principle, the core of the mail delivery system can be seen as a middleware communication service.  An electronic mail system is a typical example in which communication is persistent.  With persistent communication, a message that has been submitted for transmission is stored by the communication middleware as long as it takes to deliver it to the receiver. 13 3/30/2024
  • 14.  Persistent communication, a message is stored by the communication system only as long as the sending and receiving application are executing.  Besides being persistent or transient, communication can also be asynchronous or synchronous.  The characteristic feature of asynchronous communication is that a sender continues immediately after it has submitted its message for transmission.  This means that the message is (temporarily) stored immediately by the middleware upon submission.  With synchronous communication, the sender is blocked until its request is known to be accepted. 14 3/30/2024
  • 15. 15  When a process on machine A calls a procedure on machine B, the calling process on A is suspended, and execution of the called procedure takes place on B.  Information can be transported from the caller to the called in the parameters and can come back in the procedure result.  No message passing at all is visible to the programmer.  This method is known as Remote Procedure Call, or often just RPC. 3/30/2024
  • 16.  When read is actually a remote procedure (e.g., one that will run on the file server's machine), a different version of read, called a client stub, is put into the library.  A server stub is the server-side equivalent of a client stub: it is a piece of code that transforms requests coming in over the network into local procedure calls.  Following the call to send, the client stub calls receive, blocking itself until the reply comes back.  16 3/30/2024
  • 17.  The function of the client stub is to take its parameters, pack them into a message, and send them to the server stub. Passing Value Parameters Passing Reference Parameters  Packing parameters into a message is called parameter marshaling.  The steps involved in a doing a remote computation through RPC.  17 3/30/2024
  • 18.  This strict request-reply behaviour is unnecessary when there is no result to return, and only leads to blocking the client while it could have proceeded and have done useful work just after requesting the remote procedure to be called.  To support such situations, RPC systems may provide facilities for what are called asynchronous RPCs, by which a client immediately continues after issuing the RPC request.  With asynchronous RPCs, the server immediately sends a reply back to the client the moment the RPC request is received, after which it calls the requested procedure. 18 3/30/2024
  • 19. 19 (a) The interaction between client and server in a traditional RPC. (b) The interaction using asynchronous RPC A client and server interacting through two asynchronous RPCs. 3/30/2024
  • 20.  Distributed Computing Environment (DCE), is specific RPC system which was developed by the Open Software Foundation (OSF), now called The Open Group.  DCE is a true middleware system in that it is designed to execute as a layer of abstraction between existing (network) operating systems and distributed applications.  Goals of DCE RPC For a client to access a remote service by simply calling a local procedure. 20 3/30/2024