SlideShare a Scribd company logo
Distributed 
Computing 
Environment 
Presented By : Ravi Bhushan
Introduction 
 DCE is an architecture defined by the Open Software Foundation (OSF) to 
provide an Open Systems platform to address the challenges of distributed 
computing. 
 The DCE supplies a framework and toolkit for developing client/server 
applications. 
 Based On Client – Server Model. 
1988 :- Other Unix licensees + Sun Microsystem formed the Open Software Foundation (OSF).
The framework includes 
 Remote Procedure Call (RPC) mechanism known as DCE/RPC. 
 Naming (directory) Service. 
 Time Service. 
 Authentication Service. 
 Authorization Service. 
 Distributed File System (DFS) known as DCE/DFS. 
The first distributed computing programs were a pair of programs called Creeper & Reaper invented in 1970s
Contributions to DCE 
 DCE/RPC was derived from the Network Computing System (NCS) created 
at Apollo Computer in 1980. 
 Naming service - Digital. 
 DCE/DFS -AFS by CMU. 
 Authentication system –Kerberos. 
 Authorization system -Access Control Lists (ACLs). 
OSF’s projects became part of The Open Group, which released DCE 1.2.2 under a free software license on 12 January 
2005.
Architecture 
 The largest unit of management in DCE is a cell. 
 The highest privileges within a cell are assigned to a role called cell 
administrator , who is a real OS – Level user. 
 Privileges can be awarded to or removed from the following categories : 
 user_obj : Owner 
 group_obj : Group member 
 other_obj : Any other DCE/non-DCE principal. 
The first Internet-based distributed computing project was started in 1988 by the DEC System Research Center.
Major Components of DCE Cell 
1) Security Server : that is responsible for authentication. 
2) C.D.S : that is the repository of resources and ACLs. 
3) D.T.S : that provides an accurate clock for proper functioning of the entire cell. 
 Modern DCE implementations such as IBM’s are fully capable of interoperating with 
Kerberos as the security server, LDAP for the CDS and the Network Time Protocol 
implementations for the time server. 
Distributed.net was a project founded in 1997 - considered the first to use the internet to distribute data for 
calculation and collect the results.
Architecture Of DCE
Services of DCE 
 Remote Procedure Call (RPC) 
 Directory Service 
 Security Service 
 Time Service 
 File Service 
 Threads 
SETI@Home started in May 1999 : Analyze the radio signals that were being collected by the Arecibo Radio Telescope in 
Puerto Rico.
Remote Procedure Call 
 A procedure call is a method of implementing the Client/Server Communication. 
 The procedure call is translated into network communications by the underlying RPC 
mechanism. 
 In DCE RPC, one or more DCE RPC interfaces are defined using the DCE interface 
definition language (IDL). Each interface comprises a set of associated RPC calls 
(called operations), each with their input and output parameters. 
 The IDL when compiled generates data structure definitions and executable stubs 
for both the client and the server. The matching client and server executable stubs 
handle the necessary data transformations. 
Compute Against Cancer® (CAC) : Create immediate impact in the lives of cancer patients and their families today, while 
at the same time empowering the research that will result in improved therapies — and perhaps even the cure.
Directory Service 
 The DCE Directory Service advertises that the server supports the new interface 
defined using the IDL. 
 DCE Security Service also ensures that only authorized client end users can access the 
newly defined server function. 
 The DCE Directory Service is a central repository for information about resources in the 
distributed system. Typical resources are: 
 Users 
 Machines 
 RPC-based services. 
Gomez Distributed PEER Client : Evaluate the performance of large websites to find bottlenecks.
The DCE Directory Service consists of 
several parts: 
 Cell Directory Service (CDS): The CDS manages a database of information 
about the resources in a group of machines called a DCE cell. 
 Global Directory Service (GDS): The Global Directory Service implements an 
international, standard directory service and provides a global namespace 
that connects the local DCE cells into one worldwide hierarchy. 
 Global Directory Agent (GDA): The GDA acts as a go-between for cell and 
global directory services. 
 Directory Service programming interface: Both CDS and GDS are accessed 
using a single Directory Service application programming interface (API). 
 Wikipedia 
A collaborative project to produce a complete a free encyclopedia from scratch. 
The encyclopedia is available in many non-English languages.
Security Service 
 There are three aspects to DCE security: 
 Authentication: This identifies that a DCE user or service is allowed to use the 
service. 
 Secure communications: Communication over the network can be checked for 
tampering or encrypted for privacy. 
 Authorization: This issues the permission to access the service. 
 These are implemented by several services and facilities which include the 
Registry Service, Privilege Service, Access Control List (ACL) Facility, and 
Login Facility.
Time Service 
 The DCE Time Service (DTS) provides synchronized time on the computers 
participating in a Distributed Computing Environment. DTS synchronizes a 
DCE host’s time with Coordinated Universal Time (UTC), an international 
time standard. 
 DTS also provides services which return a time range to an application 
,and which compare time ranges from different machines. 
 This is used to schedule and synchronize events across the network. 
 Open Mind Indoor Common Sense 
Help teach indoor mobile robots to be smarter. It will create a repository of knowledge which will enable people to 
create more intelligent mobile robots for use in home and office environments.
File Service 
 The DCE File Service (DFS) allows users to access and share files stored on 
a File Server anywhere on the network, without having to know the 
physical location of the file. 
 The File Service achieves high performance, particularly through caching 
of file system data. Many users can access files that are located on a 
given File Server without a large amount of network traffic or delays. 
Speed:- 
A distributed system may have more total computing power than a mainframe.
Threads 
 DCE Threads supports the creation, management, and synchronization of 
multiple threads of control within a single process. This component is 
conceptually a part of the operating system layer, the layer below DCE. 
 All operating systems do not provide a threads facility and DCE 
components require threads be present, so this user-level threads 
package is included in DCE. 
Inherent distribution of applications:- 
Some applications are inherently distributed. E.g., an ATM-banking application.
DCE Benefits 
 Security – The DCE Security Server authenticates all users and servers. 
 Lower maintenance costs - The use of formal interface definitions by DCE RPC allows any number of 
programmers to write applications that communicate correctly, while keeping versions and 
configurations in sync. The interface definition can be maintained and versioned, and the version 
number compiled into the application will ensure that each client finds a compatible server. 
 Scalability and availability - The use of replication for both security and directory servers aids in 
network response time, as well as service availability. 
 Reduced risk - DCE is a proven technology, which has been successfully deployed for years at 
hundreds of large organizations .
References 
 http://en.wikipedia.org/wiki/Distributed_Computing_Environment 
 http://distributedcomputing.info/ 
Is
Distributed computing environment
Distributed computing environment

More Related Content

What's hot

Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
Alagappa Govt Arts College, Karaikudi
 
Applications of paralleL processing
Applications of paralleL processingApplications of paralleL processing
Applications of paralleL processing
Page Maker
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
Haitham Ahmed
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
gaurav jain
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
Kathirvel Ayyaswamy
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
purplesea
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
Acad
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
Grid protocol architecture
Grid protocol architectureGrid protocol architecture
Grid protocol architecture
Pooja Dixit
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
MNM Jain Engineering College
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computing
Vajira Thambawita
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
Sunita Sahu
 
Kerberos
KerberosKerberos
Kerberos
Sutanu Paul
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
Sudarsun Santhiappan
 

What's hot (20)

Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Applications of paralleL processing
Applications of paralleL processingApplications of paralleL processing
Applications of paralleL processing
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Grid protocol architecture
Grid protocol architectureGrid protocol architecture
Grid protocol architecture
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computing
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Kerberos
KerberosKerberos
Kerberos
 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
 

Similar to Distributed computing environment

Dce rpc
Dce rpcDce rpc
Dce rpc
pratosh123
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based Services
HTS Hosting
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
IGEEKS TECHNOLOGIES
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
IGEEKS TECHNOLOGIES
 
Acronyms of service now
Acronyms of service nowAcronyms of service now
Acronyms of service now
ErMK
 
04 Client Server Computing
04 Client Server Computing04 Client Server Computing
04 Client Server Computing
Laguna State Polytechnic University
 
Quiz 1 cloud computing
Quiz 1 cloud computing Quiz 1 cloud computing
Quiz 1 cloud computing
Lahore Garrison University
 
Software Defined presentation
Software Defined presentationSoftware Defined presentation
Software Defined presentation
John Rhodes
 
Kollective_SD_ECDN_WP[1]
Kollective_SD_ECDN_WP[1]Kollective_SD_ECDN_WP[1]
Kollective_SD_ECDN_WP[1]
Glen Howard
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
prakashvs7
 
Distributed Computing Environment
Distributed Computing EnvironmentDistributed Computing Environment
Distributed Computing Environment
Purushottam Dahal
 
Cloud foundry architecture and deep dive
Cloud foundry architecture and deep diveCloud foundry architecture and deep dive
Cloud foundry architecture and deep dive
Animesh Singh
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
DrThenmozhiKarunanit
 
cloud computing
cloud computingcloud computing
cloud computing
Kalai Selvi
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Engr. Md. Jamal Uddin Rayhan
 
Highly Available XenApp Cloud
Highly Available XenApp CloudHighly Available XenApp Cloud
Highly Available XenApp Cloud
ijitcs
 
Running head SERVERS1Running head SERVERS1.docx
Running head SERVERS1Running head SERVERS1.docxRunning head SERVERS1Running head SERVERS1.docx
Running head SERVERS1Running head SERVERS1.docx
charisellington63520
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
OECLIB Odisha Electronics Control Library
 
introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptx
Mugabo4
 
Cloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdfCloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdf
Palanikumar72221
 

Similar to Distributed computing environment (20)

Dce rpc
Dce rpcDce rpc
Dce rpc
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based Services
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
Acronyms of service now
Acronyms of service nowAcronyms of service now
Acronyms of service now
 
04 Client Server Computing
04 Client Server Computing04 Client Server Computing
04 Client Server Computing
 
Quiz 1 cloud computing
Quiz 1 cloud computing Quiz 1 cloud computing
Quiz 1 cloud computing
 
Software Defined presentation
Software Defined presentationSoftware Defined presentation
Software Defined presentation
 
Kollective_SD_ECDN_WP[1]
Kollective_SD_ECDN_WP[1]Kollective_SD_ECDN_WP[1]
Kollective_SD_ECDN_WP[1]
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 
Distributed Computing Environment
Distributed Computing EnvironmentDistributed Computing Environment
Distributed Computing Environment
 
Cloud foundry architecture and deep dive
Cloud foundry architecture and deep diveCloud foundry architecture and deep dive
Cloud foundry architecture and deep dive
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
cloud computing
cloud computingcloud computing
cloud computing
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
 
Highly Available XenApp Cloud
Highly Available XenApp CloudHighly Available XenApp Cloud
Highly Available XenApp Cloud
 
Running head SERVERS1Running head SERVERS1.docx
Running head SERVERS1Running head SERVERS1.docxRunning head SERVERS1Running head SERVERS1.docx
Running head SERVERS1Running head SERVERS1.docx
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptx
 
Cloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdfCloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdf
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Distributed computing environment

  • 1. Distributed Computing Environment Presented By : Ravi Bhushan
  • 2. Introduction  DCE is an architecture defined by the Open Software Foundation (OSF) to provide an Open Systems platform to address the challenges of distributed computing.  The DCE supplies a framework and toolkit for developing client/server applications.  Based On Client – Server Model. 1988 :- Other Unix licensees + Sun Microsystem formed the Open Software Foundation (OSF).
  • 3. The framework includes  Remote Procedure Call (RPC) mechanism known as DCE/RPC.  Naming (directory) Service.  Time Service.  Authentication Service.  Authorization Service.  Distributed File System (DFS) known as DCE/DFS. The first distributed computing programs were a pair of programs called Creeper & Reaper invented in 1970s
  • 4. Contributions to DCE  DCE/RPC was derived from the Network Computing System (NCS) created at Apollo Computer in 1980.  Naming service - Digital.  DCE/DFS -AFS by CMU.  Authentication system –Kerberos.  Authorization system -Access Control Lists (ACLs). OSF’s projects became part of The Open Group, which released DCE 1.2.2 under a free software license on 12 January 2005.
  • 5. Architecture  The largest unit of management in DCE is a cell.  The highest privileges within a cell are assigned to a role called cell administrator , who is a real OS – Level user.  Privileges can be awarded to or removed from the following categories :  user_obj : Owner  group_obj : Group member  other_obj : Any other DCE/non-DCE principal. The first Internet-based distributed computing project was started in 1988 by the DEC System Research Center.
  • 6. Major Components of DCE Cell 1) Security Server : that is responsible for authentication. 2) C.D.S : that is the repository of resources and ACLs. 3) D.T.S : that provides an accurate clock for proper functioning of the entire cell.  Modern DCE implementations such as IBM’s are fully capable of interoperating with Kerberos as the security server, LDAP for the CDS and the Network Time Protocol implementations for the time server. Distributed.net was a project founded in 1997 - considered the first to use the internet to distribute data for calculation and collect the results.
  • 8. Services of DCE  Remote Procedure Call (RPC)  Directory Service  Security Service  Time Service  File Service  Threads SETI@Home started in May 1999 : Analyze the radio signals that were being collected by the Arecibo Radio Telescope in Puerto Rico.
  • 9. Remote Procedure Call  A procedure call is a method of implementing the Client/Server Communication.  The procedure call is translated into network communications by the underlying RPC mechanism.  In DCE RPC, one or more DCE RPC interfaces are defined using the DCE interface definition language (IDL). Each interface comprises a set of associated RPC calls (called operations), each with their input and output parameters.  The IDL when compiled generates data structure definitions and executable stubs for both the client and the server. The matching client and server executable stubs handle the necessary data transformations. Compute Against Cancer® (CAC) : Create immediate impact in the lives of cancer patients and their families today, while at the same time empowering the research that will result in improved therapies — and perhaps even the cure.
  • 10. Directory Service  The DCE Directory Service advertises that the server supports the new interface defined using the IDL.  DCE Security Service also ensures that only authorized client end users can access the newly defined server function.  The DCE Directory Service is a central repository for information about resources in the distributed system. Typical resources are:  Users  Machines  RPC-based services. Gomez Distributed PEER Client : Evaluate the performance of large websites to find bottlenecks.
  • 11. The DCE Directory Service consists of several parts:  Cell Directory Service (CDS): The CDS manages a database of information about the resources in a group of machines called a DCE cell.  Global Directory Service (GDS): The Global Directory Service implements an international, standard directory service and provides a global namespace that connects the local DCE cells into one worldwide hierarchy.  Global Directory Agent (GDA): The GDA acts as a go-between for cell and global directory services.  Directory Service programming interface: Both CDS and GDS are accessed using a single Directory Service application programming interface (API).  Wikipedia A collaborative project to produce a complete a free encyclopedia from scratch. The encyclopedia is available in many non-English languages.
  • 12. Security Service  There are three aspects to DCE security:  Authentication: This identifies that a DCE user or service is allowed to use the service.  Secure communications: Communication over the network can be checked for tampering or encrypted for privacy.  Authorization: This issues the permission to access the service.  These are implemented by several services and facilities which include the Registry Service, Privilege Service, Access Control List (ACL) Facility, and Login Facility.
  • 13. Time Service  The DCE Time Service (DTS) provides synchronized time on the computers participating in a Distributed Computing Environment. DTS synchronizes a DCE host’s time with Coordinated Universal Time (UTC), an international time standard.  DTS also provides services which return a time range to an application ,and which compare time ranges from different machines.  This is used to schedule and synchronize events across the network.  Open Mind Indoor Common Sense Help teach indoor mobile robots to be smarter. It will create a repository of knowledge which will enable people to create more intelligent mobile robots for use in home and office environments.
  • 14. File Service  The DCE File Service (DFS) allows users to access and share files stored on a File Server anywhere on the network, without having to know the physical location of the file.  The File Service achieves high performance, particularly through caching of file system data. Many users can access files that are located on a given File Server without a large amount of network traffic or delays. Speed:- A distributed system may have more total computing power than a mainframe.
  • 15. Threads  DCE Threads supports the creation, management, and synchronization of multiple threads of control within a single process. This component is conceptually a part of the operating system layer, the layer below DCE.  All operating systems do not provide a threads facility and DCE components require threads be present, so this user-level threads package is included in DCE. Inherent distribution of applications:- Some applications are inherently distributed. E.g., an ATM-banking application.
  • 16. DCE Benefits  Security – The DCE Security Server authenticates all users and servers.  Lower maintenance costs - The use of formal interface definitions by DCE RPC allows any number of programmers to write applications that communicate correctly, while keeping versions and configurations in sync. The interface definition can be maintained and versioned, and the version number compiled into the application will ensure that each client finds a compatible server.  Scalability and availability - The use of replication for both security and directory servers aids in network response time, as well as service availability.  Reduced risk - DCE is a proven technology, which has been successfully deployed for years at hundreds of large organizations .