Middleware - creating the illusion The Martian C/S book (Part 3)

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Remote Procedure Call sockets TCP, UDP Internet Protocol (IP) Remote Procedure Call: hides communication details behind a procedure call and helps bridge.
6/4/2015Page 1 Enterprise Service Bus (ESB) B. Ramamurthy.
Distributed systems and their properties (Lecture 2 for Programming of Interactive Systems) Fredrik Kilander & Wei Li.
Middleware Technologies compiled by: Thomas M. Cosley.
Outcomes What is RPC? The difference between conventional procedure call and RPC? Understand the function of client and server stubs How many steps could.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Communication in Distributed Systems –Part 2
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
© Chinese University, CSE Dept. Distributed Systems / Distributed Systems Topic 4: RPCs vs. CORBA Dr. Michael R. Lyu Computer Science & Engineering.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
Module – 7 network-attached storage (NAS)
An adapted reference model for networked communication.
 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Network and Active Directory Performance Monitoring and Troubleshooting NETW4008 Lecture 8.
Chapter 2 Architectural Models. Keywords Middleware Interface vs. implementation Client-server models OOP.
Ch 1. Mobile Adaptive Computing Myungchul Kim
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Designing Active Directory for Security
1 Chapter 2. Communication. STEM-PNU 2 Layered Protocol TCP/IP : de facto standard Our Major Concern Not always 7-layered Protocol But some other protocols.
Communication Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Seven Configuring and Managing Exchange Server.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
CORBA IS 8030 – Integrated Computing Environments Dr. Hoganson CORBA Common Object Request Broker Architecture Published by Object Management Group (OMG)
SEMINOR. INTRODUCTION 1. Middleware is connectivity software that provides a mechanism for processes to interact with other processes running on multiple.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved RPC Tanenbaum.
Client/Server Computing: Clients, Severs, & Operating Systems The Martian C/S (Part 2) PCMag: 7/1/97 NOS PCMag: Beyond Unix.
Presented By: Samreen Tahir Coda is a network file system and a descendent of the Andrew File System 2. It was designed to be: Highly Highly secure Available.
Distributed Object Frameworks DCE and CORBA. Distributed Computing Environment (DCE) Architecture proposed by OSF Goal: to standardize an open UNIX envt.
Common Object Request Broker Architecture (CORBA) The Common Object Request Broker Architecture (CORBA) is a specification of a standard architecture for.
GLOBE DISTRIBUTED SHARED OBJECT. INTRODUCTION  Globe stands for GLobal Object Based Environment.  Globe is different from CORBA and DCOM that it supports.
1 Conventional Procedure Call read(fd,buf,nbytes) a)Parameter passing in a local procedure call: the stack before the call to read b)The stack while the.
70-412: Configuring Advanced Windows Server 2012 services
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Introduction to Active Directory
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
1 Distributed Systems Distributed Object-Based Systems Chapter 10.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
Introduction to Microsoft Windows 2000 Security Microsoft Windows 2000 Security Services Overview Security subsystem components Local security authority.
1 Chapter 2. Communication. STEMPusan National University STEM-PNU 2 Layered Protocol TCP/IP : de facto standard Our Major Concern Not always 7-layered.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
John R Durrett1 Client/Server Computing Byte April 1995 & The Martian C/S book.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Security Outline Encryption Algorithms Authentication Protocols
Java Distributed Object System
CSCE 715: Network Systems Security
#01 Client/Server Computing
Inventory of Distributed Computing Concepts and Web services
Message Digest Cryptographic checksum One-way function Relevance
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
DISTRIBUTED COMPUTING
Mobile Agents.
Inventory of Distributed Computing Concepts
Security Vulnerabilities in RPC (csci5931)
Remote Procedure Call (invocation) RPC
Lecture 6: RPC (exercises/questions)
Advanced Computer Networks
Lecture 6: RPC (exercises/questions)
Lecture 7: RPC (exercises/questions)
Inventory of Distributed Computing Concepts
Communication.
#01 Client/Server Computing
Presentation transcript:

Middleware - creating the illusion The Martian C/S book (Part 3)

Transparency: creating a seamless C/S system Location: redirection Namespace Containment Logon Replication Distributed access Distributed time Failure Administrative

Security OS security insufficient Forgeries & Trojan Horses Authentication –passwords –Kerberos (trusted third party)Kerberos Authorization –Access Control Lists –Win95, Un*x, NT Audit trails Encryption Cryptographic checksums

RPC hide the intricacy behind “stub” RPC runtime or middleware Server stub and procedure Fig 9-1 Problems –Containment transparency –Client-stub Server-stub Interface –Failures –Binding or how does a client find the server static, dynamic, automatic

MOM Store and forward Removes direct connection requirement More versitile Comparison: –MOM vs. RPC –Post office vs Telephone –Asynchronous vs. Synchronous –Call-return vs. Queued –Persistent vs. transitory –Slow vs. Fast –Adaptable vs. dedicated

Transport Stacks