Distributed Coordination-Based Systems Chapter 12.

Презентация:



Advertisements
Похожие презентации
© 2009 Avaya Inc. All rights reserved.1 Chapter Nine, Voic Pro in SCN Module Four – Distributed Voic Pro.
Advertisements

Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Copyright 2003 CCNA 4 Chapter 14 ISDN and DDR By Your Name.
© 2009 Avaya Inc. All rights reserved.1 Chapter Nine, Voic Pro in SCN Module Three – Backup Voic Pro.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Chapter 12 Upon completion you will be able to: Transmission Control Protocol Be able to name and understand the services offered.
Copyright 2003 CCNA 2 Chapter 17 TCP/IP Suite Error and Control Messages By Your Name.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Implementation Configuring VRF Tables.
© 2005 Cisco Systems, Inc. All rights reserved. INTRO v Module Summary TCP/IP is the most widely used networking protocol, with functions that can.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v Route Selection Using Policy Controls Applying Route-Maps as BGP Filters.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Complex MPLS VPNs Introducing Central Services VPNs.
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Designing the Network Management Architecture ARCH v
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS Concepts Introducing MPLS Labels and Label Stacks.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Completing ISDN Calls Configuring ISDN BRI and PRI.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v BGP Overview Understanding BGP Path Attributes.
DISTRIBUTED COMPUTING PARADIGMS. Paradigm? A MODEL 2for notes.
Lecture # Computer Architecture Computer Architecture = ISA + MO ISA stands for instruction set architecture is a logical view of computer system.
© 2009 Avaya Inc. All rights reserved.1 Chapter Four, UMS Web Services Module Two – IMAP Service.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Operating and Configuring Cisco IOS Devices Configuring a Router.
© 2002 IBM Corporation Confidential | Date | Other Information, if necessary © Wind River Systems, released under EPL 1.0. All logos are TM of their respective.
Транксрипт:

Distributed Coordination-Based Systems Chapter 12

Introduction to Coordination Models A taxonomy of coordination models (adapted from [cabri.g2000])

Coordination Model (1) The principle of a publish/subscribe system as implemented in TIB/Rendezvous.

Coordination Model (2) The overall architecture of a wide-area TIB/Rendezvous system.

Basic Messaging Attributes of a TIB/Rendezvous message field. AttributeTypeDescription NameStringThe name of the field, possibly NULL IDIntegerA message-unique field identifier SizeIntegerThe total size of the field (in bytes) CountIntegerThe number of elements in the case of an array TypeConstantA constant indicating the type of data DataAny typeThe actual data stored in a field

Events (1) Processing listener events for subscriptions in TIB/Rendezvous.

Events (2) Processing incoming messages in TIB/Rendezvous.

Processes a)Priority scheduling of events through a queue group. b)A semantically equivalent queue for the queue group with the specific event objects from (a).

Naming (1) Examples of valid and invalid subject names. ExampleValid? Books.Computer_systems.Distributed_SystemsYes.ftp.cuss.vu.nilNo (starts with a '.') ftp.cuss.vu.nilYes NEWS.res.com.soYes Marten..van_SteenNo (empty label) Marten.R.van_SteenYes

Naming (2) Examples of using wildcards in subject names. Subject NameMatches *.cuss.vu.nilftp.cuss.vu.nil ni.vu.>nil.vu.cuss.ftp nil.vu.cuss.zephyr nil.vu.few.www NEWS.comp.*.booksNEWS.comp.so.books NEWS.comp.ai.books NEWS.comp.se.books NEWS.comp.theory.books

Synchronization (1) The organization of transactional messaging as a separate layer in TIB/Rendezvous.

Synchronization (2) The organization of a transaction in TIB/Rendezvous.

Reliable Communication The principle of PGM. a)A message is sent along a multicast tree b)A router will pass only a single NACK for each message c)A message is retransmitted only to receivers that have asked for it.

Security Establishing a secure channel in TIB/Rendezvous.

Overview of Jini The general organization of a JavaSpace in Jini.

Architecture The layered architecture of a Jini System.

Communication Events Using events in combination with a JavaSpace

Processes (1) A JavaSpace can be replicated on all machines. The dotted lines show the partitioning of the JavaSpace into subspaces. a)Tuples are broadcast on WRITE b)READs are local, but the removing of an instance when calling TAKE must be broadcast

Processes (2) Unreplicated JavaSpace. a)A WRITE is done locally. b)A READ or TAKE requires the template tuple to be broadcast in order to find a tuple instance

Processes (3) Partial broadcasting of tuples and template tuples.

The Jini Lookup Service (1) The organization of a service item. FieldDescription ServiceIDThe identifier of the service associated with this item. Service A (possibly remote) reference to the object implementing the service. AttributeSetsA set of tuples describing the service.

The Jini Lookup Service (2) Examples of predefined tuples for service items. Tuple TypeAttributes ServiceInfoName, manufacturer, vendor, version, model, serial number LocationFloor, room, building Address Street, organization, organizational unit, locality, state or province, postal code, country

Synchronization of Transactions The general organization of a transaction in Jini. Thick lines show communication as required by Jini's transaction protocol

Caching and Replication The position of PAM with respect to security services.

Comparison of TIB/Rendezvous and Jini IssueTIB/RendezvousJini Major design goalUncoupling of processesFlexible integration Coordination modelPublish/subscribeGenerative communication Network communicationMulticastingJava RMI MessagesSelf-describingProcess specific Event mechanismFor incoming messagesAs a callback service ProcessesGeneral purpose NamesCharacter stringsByte strings Naming servicesNoneLookup service Transactions (operations)MessagesMethod invocations Transactions (scope)Single process (see text)Multiple processes LockingNoAs JavaSpace operations Caching and replicationNo Reliable communicationYes Process groupsYesNo Recovery mechanismsNo explicit support SecuritySecure channelsBased entirely on Java