SlideShare una empresa de Scribd logo
1 de 22
COMMUNICATION
1
3/30/2024
Outlines
 Layer protocols
 Types of Communication
 Remote Procedure Call
 Remote Object invocation
2
3/30/2024
 Inter-process communication is at the heart
of all distributed systems.
 It makes no sense to study distributed
systems without carefully examining the ways
that processes on different machines can
exchange information.
 Communication in distributed systems is
always based on low-level message passing
as offered by the underlying network.
 The rules that communicating processes
must adhere to, known as protocols.
3
3/30/2024
Communication
 Due to the absence of shared memory, all
communication in distributed systems is based
on sending and receiving messages.
 When process A wants to communicate with
process B, it first builds a message in its own
address space.
 Then, it executes a system call that causes the
OS to send the message over the network to B.
 Many different agreements are needed.
 In a variety of levels, varying from the low-level
details of bit transmission to the high-level
details of how information is to be expressed.
4
3/30/2024
 International Standards Organization (ISO) developed a
reference model that clearly identifies the various
levels involved, gives them standard names, and
points out which level should do which job.
 This model is called the Open Systems Interconnection
Reference Model (OSI-RM).
 The OSI model is designed to allow open systems to
communicate.
 An open system is one that is prepared to
communicate with any other open system by using
standard rules that govern the format, contents, and
meaning of the messages sent and received.
5
3/30/2024
 These rules are formalized in what are called
protocols.
 To allow a group of computers to communicate over a
network, they must all agree on the protocols to be
used.
 A distinction is made between two general types of
protocols.
1. Connection oriented protocols: before exchanging
data the sender and receiver first explicitly establish a
connection, and possibly negotiate the protocol they
will use(like telephone).
2. Connectionless protocols: no setup in advance is
needed. The sender just transmits the first message
when it is ready. Eg: dropping a letter in a mailbox.

6
3/30/2024
 With computers, both connection-oriented
and connectionless communication are
common.
 In the OSI model, communication is divided
up into seven levels or layers.
 Each layer deals with one specific aspect of
the communication.
 Each layer provides an interface to the one
above it.
 The interface consists of a set of operations
that together define the service the layer is
prepared to offer its users.
7
3/30/2024

 The collection of protocols used in a particular
system is called a protocol suite or protocol stack.
8
3/30/2024
9
 Physical: Physical characteristics of the media
Host (upper) Layers
Media (lower) Layers
 Data Link: Reliable data delivery across the link
 Network: Managing connections across the network
or routing
 Transport: End-to-end connection and reliability (handles
lost packets); TCP (connection-oriented),
UDP (connectionless), etc.
 Session: Managing sessions between applications
(dialog control and synchronization); rarely
supported
 Presentation: Data presentation to applications; concerned
with the syntax and semantics of the
information transmitted
 Application: Network services to applications; contains
protocols that are commonly needed by
users; FTP, HTTP, SMTP, ...
 A typical message as it appears on the network.
10
3/30/2024
 Middleware is an application that logically
lives in the application layer, but which
contains many general-purpose protocols
that warrant their own layers, independent of
other, more specific applications.
 A distinction can be made between high-level
communication protocols and protocols for
establishing various middleware services.
11
3/30/2024
 There are numerous protocols to support a variety of
middleware services such as:
1. Authorization protocols: establish authentication,
that is, provide proof of a claimed identity.
2. Commit protocol: establish that in a group of
processes either all processes carry out a particular
operation, or that the operation is not carried out at
all.
3. Locking protocol: protect against simultaneous
access by a collection of processes that are
distributed across multiple machines.
12
3/30/2024
 In principle, the core of the mail delivery system can be seen as
a middleware communication service.
 An electronic mail system is a typical example in
which communication is persistent.
 With persistent communication, a message that has
been submitted for transmission is stored by the
communication middleware as long as it takes to
deliver it to the receiver.
13
3/30/2024
 Persistent communication, a message is stored by
the communication system only as long as the
sending and receiving application are executing.
 Besides being persistent or transient, communication
can also be asynchronous or synchronous.
 The characteristic feature of asynchronous
communication is that a sender continues
immediately after it has submitted its message for
transmission.
 This means that the message is (temporarily) stored
immediately by the middleware upon submission.
 With synchronous communication, the sender is
blocked until its request is known to be accepted.
14
3/30/2024
15
 When a process on machine A calls a procedure
on machine B, the calling process on A is
suspended, and execution of the called
procedure takes place on B.
 Information can be transported from the
caller to the called in the parameters and can
come back in the procedure result.
 No message passing at all is visible to the
programmer.
 This method is known as Remote Procedure Call,
or often just RPC.
3/30/2024
 When read is actually a remote procedure (e.g., one that will run
on the file server's machine), a different version of read, called a
client stub, is put into the library.
 A server stub is the server-side equivalent of a client stub:
it is a piece of code that transforms requests coming in over the
network into local procedure calls.
 Following the call to send, the client stub calls receive, blocking
itself until the reply comes back.

16
3/30/2024
 The function of the client stub is to take its parameters, pack
them into a message, and send them to the server stub.
Passing Value Parameters
Passing Reference Parameters
 Packing parameters into a message is called parameter
marshaling.
 The steps involved in a doing a remote computation through
RPC.

17
3/30/2024
 This strict request-reply behaviour is unnecessary
when there is no result to return, and only leads to
blocking the client while it could have proceeded and
have done useful work just after requesting the
remote procedure to be called.
 To support such situations, RPC systems may provide
facilities for what are called asynchronous RPCs, by
which a client immediately continues after issuing the
RPC request.
 With asynchronous RPCs, the server immediately
sends a reply back to the client the moment the RPC
request is received, after which it calls the requested
procedure.
18
3/30/2024
19
(a) The interaction between client and server in a traditional RPC.
(b) The interaction using asynchronous RPC
A client and server interacting through two asynchronous RPCs.
3/30/2024
 Distributed Computing Environment (DCE), is specific
RPC system which was developed by the Open
Software Foundation (OSF), now called The Open
Group.
 DCE is a true middleware system in that it is designed
to execute as a layer of abstraction between existing
(network) operating systems and distributed
applications.
 Goals of DCE RPC
For a client to access a remote service by simply
calling a local procedure.
20
3/30/2024
21
3/30/2024
Questions?
22
3/30/2024

Más contenido relacionado

Similar a Chapter 4- Communication in distributed system.ppt

Similar a Chapter 4- Communication in distributed system.ppt (20)

Task communication
Task communicationTask communication
Task communication
 
OSI Layer
OSI LayerOSI Layer
OSI Layer
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
 
four
fourfour
four
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environment
 
Network Models.pptx
Network  Models.pptxNetwork  Models.pptx
Network Models.pptx
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
Osi model
Osi modelOsi model
Osi model
 
Topic 5- Communications v1.pptx
Topic 5- Communications v1.pptxTopic 5- Communications v1.pptx
Topic 5- Communications v1.pptx
 
Chapter 2B-Communication.ppt
Chapter 2B-Communication.pptChapter 2B-Communication.ppt
Chapter 2B-Communication.ppt
 
Computer Networks Notes Complete Syllabus
Computer Networks Notes Complete SyllabusComputer Networks Notes Complete Syllabus
Computer Networks Notes Complete Syllabus
 
Protocols and standards
Protocols and standardsProtocols and standards
Protocols and standards
 
Chapter 4 communication2
Chapter 4 communication2Chapter 4 communication2
Chapter 4 communication2
 
Networks software
Networks softwareNetworks software
Networks software
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptx
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 

Más de AschalewAyele2

Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
AschalewAyele2
 
Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdf
AschalewAyele2
 
Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptx
AschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
AschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
AschalewAyele2
 
Chapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdfChapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdf
AschalewAyele2
 
Chapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptxChapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptx
AschalewAyele2
 
chapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.pptchapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.ppt
AschalewAyele2
 

Más de AschalewAyele2 (9)

Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
 
Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdf
 
Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
Chapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdfChapter 4 Classification in data sience .pdf
Chapter 4 Classification in data sience .pdf
 
Chapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptxChapter 5-Naming in distributed system.pptx
Chapter 5-Naming in distributed system.pptx
 
chapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.pptchapter 1- introduction to distributed system.ppt
chapter 1- introduction to distributed system.ppt
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Chapter 4- Communication in distributed system.ppt

  • 2. Outlines  Layer protocols  Types of Communication  Remote Procedure Call  Remote Object invocation 2 3/30/2024
  • 3.  Inter-process communication is at the heart of all distributed systems.  It makes no sense to study distributed systems without carefully examining the ways that processes on different machines can exchange information.  Communication in distributed systems is always based on low-level message passing as offered by the underlying network.  The rules that communicating processes must adhere to, known as protocols. 3 3/30/2024 Communication
  • 4.  Due to the absence of shared memory, all communication in distributed systems is based on sending and receiving messages.  When process A wants to communicate with process B, it first builds a message in its own address space.  Then, it executes a system call that causes the OS to send the message over the network to B.  Many different agreements are needed.  In a variety of levels, varying from the low-level details of bit transmission to the high-level details of how information is to be expressed. 4 3/30/2024
  • 5.  International Standards Organization (ISO) developed a reference model that clearly identifies the various levels involved, gives them standard names, and points out which level should do which job.  This model is called the Open Systems Interconnection Reference Model (OSI-RM).  The OSI model is designed to allow open systems to communicate.  An open system is one that is prepared to communicate with any other open system by using standard rules that govern the format, contents, and meaning of the messages sent and received. 5 3/30/2024
  • 6.  These rules are formalized in what are called protocols.  To allow a group of computers to communicate over a network, they must all agree on the protocols to be used.  A distinction is made between two general types of protocols. 1. Connection oriented protocols: before exchanging data the sender and receiver first explicitly establish a connection, and possibly negotiate the protocol they will use(like telephone). 2. Connectionless protocols: no setup in advance is needed. The sender just transmits the first message when it is ready. Eg: dropping a letter in a mailbox.  6 3/30/2024
  • 7.  With computers, both connection-oriented and connectionless communication are common.  In the OSI model, communication is divided up into seven levels or layers.  Each layer deals with one specific aspect of the communication.  Each layer provides an interface to the one above it.  The interface consists of a set of operations that together define the service the layer is prepared to offer its users. 7 3/30/2024
  • 8.   The collection of protocols used in a particular system is called a protocol suite or protocol stack. 8 3/30/2024
  • 9. 9  Physical: Physical characteristics of the media Host (upper) Layers Media (lower) Layers  Data Link: Reliable data delivery across the link  Network: Managing connections across the network or routing  Transport: End-to-end connection and reliability (handles lost packets); TCP (connection-oriented), UDP (connectionless), etc.  Session: Managing sessions between applications (dialog control and synchronization); rarely supported  Presentation: Data presentation to applications; concerned with the syntax and semantics of the information transmitted  Application: Network services to applications; contains protocols that are commonly needed by users; FTP, HTTP, SMTP, ...
  • 10.  A typical message as it appears on the network. 10 3/30/2024
  • 11.  Middleware is an application that logically lives in the application layer, but which contains many general-purpose protocols that warrant their own layers, independent of other, more specific applications.  A distinction can be made between high-level communication protocols and protocols for establishing various middleware services. 11 3/30/2024
  • 12.  There are numerous protocols to support a variety of middleware services such as: 1. Authorization protocols: establish authentication, that is, provide proof of a claimed identity. 2. Commit protocol: establish that in a group of processes either all processes carry out a particular operation, or that the operation is not carried out at all. 3. Locking protocol: protect against simultaneous access by a collection of processes that are distributed across multiple machines. 12 3/30/2024
  • 13.  In principle, the core of the mail delivery system can be seen as a middleware communication service.  An electronic mail system is a typical example in which communication is persistent.  With persistent communication, a message that has been submitted for transmission is stored by the communication middleware as long as it takes to deliver it to the receiver. 13 3/30/2024
  • 14.  Persistent communication, a message is stored by the communication system only as long as the sending and receiving application are executing.  Besides being persistent or transient, communication can also be asynchronous or synchronous.  The characteristic feature of asynchronous communication is that a sender continues immediately after it has submitted its message for transmission.  This means that the message is (temporarily) stored immediately by the middleware upon submission.  With synchronous communication, the sender is blocked until its request is known to be accepted. 14 3/30/2024
  • 15. 15  When a process on machine A calls a procedure on machine B, the calling process on A is suspended, and execution of the called procedure takes place on B.  Information can be transported from the caller to the called in the parameters and can come back in the procedure result.  No message passing at all is visible to the programmer.  This method is known as Remote Procedure Call, or often just RPC. 3/30/2024
  • 16.  When read is actually a remote procedure (e.g., one that will run on the file server's machine), a different version of read, called a client stub, is put into the library.  A server stub is the server-side equivalent of a client stub: it is a piece of code that transforms requests coming in over the network into local procedure calls.  Following the call to send, the client stub calls receive, blocking itself until the reply comes back.  16 3/30/2024
  • 17.  The function of the client stub is to take its parameters, pack them into a message, and send them to the server stub. Passing Value Parameters Passing Reference Parameters  Packing parameters into a message is called parameter marshaling.  The steps involved in a doing a remote computation through RPC.  17 3/30/2024
  • 18.  This strict request-reply behaviour is unnecessary when there is no result to return, and only leads to blocking the client while it could have proceeded and have done useful work just after requesting the remote procedure to be called.  To support such situations, RPC systems may provide facilities for what are called asynchronous RPCs, by which a client immediately continues after issuing the RPC request.  With asynchronous RPCs, the server immediately sends a reply back to the client the moment the RPC request is received, after which it calls the requested procedure. 18 3/30/2024
  • 19. 19 (a) The interaction between client and server in a traditional RPC. (b) The interaction using asynchronous RPC A client and server interacting through two asynchronous RPCs. 3/30/2024
  • 20.  Distributed Computing Environment (DCE), is specific RPC system which was developed by the Open Software Foundation (OSF), now called The Open Group.  DCE is a true middleware system in that it is designed to execute as a layer of abstraction between existing (network) operating systems and distributed applications.  Goals of DCE RPC For a client to access a remote service by simply calling a local procedure. 20 3/30/2024