Documente Academic
Documente Profesional
Documente Cultură
The term distributed objects usually refers to software modules that are
designed to work together,
but reside either in multiple computers connected via a network or in
different processes inside the same computer.
One object sends a message to another object in a remote machine or process
to perform some task.
The results are sent back to the calling object.
Consequently,the stub passes caller arguments over the network to the server
skeleton.
waits for a response and returns back the result to the client stub.
Note, there is no direct communication between the caller and the called
object.
2. stub marshalls call type and input arguments into a request message
3. client stub sends the message over the network to the server and blocks
the current execution thread
5. skeleton unpacks call type from the request message and looks up the
procedure on the called object
6. skeleton unmarshalls procedure arguments
10. skeleton sends the message over the network back to the client
11. client stub receives the response message from the network
13. stub passes output arguments to the caller, releases execution thread
and caller then continues in execution
RPC
In computer science, a remote procedure call (RPC) is an inter-process
communication that allows
the programmer explicitly coding the details for this remote interaction.
That is, the programmer writes essentially the same code whether
1. The client calls the Client stub. The call is a local procedure call,
with parameters pushed on to the stack in the normal way.
2. The client stub packs the parameters into a message and makes a system
call to send the message. Packing the parameters is called marshalling.
3. The kernel sends the message from the client machine to the server
machine.
5. Finally, the server stub calls the server procedure. The reply traces
the same in other direction
This makes it possible for multiple users on multiple machines to share files
and storage resources.
Network File System (NFS) is a network file system protocol originally developed by
Sun Microsystems in 1984,
is accessed. NFS, like many other protocols, builds on the Open Network Computing
Remote Procedure Call (ONC RPC) system.
The implementation details are defined in RFC 1094. Sun used version 1 only for in-
house experimental purposes.
and released it outside of Sun, they decided to release the new version as v2,
NFSv2
Version 2 of the protocol (defined in RFC 1094, March 1989) originally operated
entirely over UDP.
Its designers meant to keep the protocol stateless, with locking (for example)
implemented outside of the core protocol. People involved in the creation of NFS
version 2 include Rusty Sandberg, Bob Lyon, Bill Joy, and Steve Kleiman.
NFSv3
* support for 64-bit file sizes and offsets, to handle files larger than 2
gigabytes (GB);
* additional file attributes in many replies, to avoid the need to re-fetch them;
* a READDIRPLUS operation, to get file handles and attributes along with file
names when scanning a directory;
While several vendors had already added support for NFS Version 2 with TCP as a
transport,
Sun Microsystems added support for TCP as a transport for NFS at the same time it
added support for Version 3.
Using TCP as a transport made using NFS over a WAN more feasible.
Platforms
NFS is often used with Unix operating systems such as Solaris, AIX,
HP-UX,
The Andrew File System (AFS) is a distributed networked file system which
uses a set of trusted servers to present a homogeneous,
Features
AFS[1] has several benefits over traditional networked file systems,
particularly in the areas of security and scalability
Each client caches files on the local filesystem for increased speed on
subsequent requests for the same file.
This also allows limited filesystem access in the event of a server crash or
a network outage.
Read and write operations on an open file are directed only to the locally
cached copy. When a modified file is closed,
named path in an AFS cell. Once created, users of the filesystem may create
directories and files as usual without concern for the physical location of
the volume. A volume may have a quota assigned to it in order to limit the
amount of space consumed. As needed, AFS administrators can move that volume
to another server and disk location without the need to notify users;
indeed the operation can occur while files in that volume are being used.
The file name space on an Andrew workstation is partitioned into a shared and
local name space. The shared name space (usually mounted as /afs on the Unix
filesystem) is identical on all workstations. The local name space is unique
to each workstation. It only contains temporary files needed for workstation
initialization and symbolic links to files in the shared name space.
Available permissions
Lookup (l)
allows a user to list the contents of the AFS directory, examine the ACL
associated with the directory and access subdirectories.
Insert (i)
Delete (d)
Administer (a)
allows a user to change the ACL for the directory. Users always have this
right on their home directory, even if they accidentally remove themselves
from the ACL.
Read (r)
Write (w)
Lock (k)
allows the processor to run programs that need to "flock" files in the
directory.