SlideShare a Scribd company logo
 A process is a program in execution. When we say
that two computers of a distributed system are
communicating with each other, we mean that two
processes, one running on each computer, are in
communication with each other.
 The two basic methods for information sharing are
as follows:
1. Original sharing or shared-data approach
2. Copy sharing or message-passing approach
 Simplicity
 Uniform semantics
 Efficiency
 Reliability
 Correctness
 Flexibility
 Security
 Portability
 A message is a block of information formatted by a
sending process in such a manner that it is
meaningful to the receiving process.
1. Address
2. Sequence number
3. Structural information
 Address: It contains characters that uniquely
identify the sending and receiving process in the
network.
 Sequence number: This is the message
identifier(ID), which is very useful for identifying
lost messages and duplicate messages in case of
system failures.
 Structural information: This element also has two
parts.
 A central issue in the communication structure is the
synchronization imposed on the communicating
processes by the communication primitives.
 One of the following two methods is commonly
used for this purpose:
1. Polling
2. Interrupt
 In interprocess communication, the message-
buffering strategy is strongly related to
synchronization strategy.
 The synchronous and asynchronous modes of
communication correspond respectively to the two
extremes of bufffering: a null buffer and a buffer
with unbounded capacity.
 In case of no buffering, there is no place to
temporarily store the message.
1. The message remains in the sender process
address space and the execution of the send is
delayed until the receiver executes the
corresponding receive.
2. The message is simply discarded and the
timeout mechanism is used to resend the message
after a timeout period.
 The null buffer strategy is generally not suitable for
synchronous communication between two process
in a distributed system because if the receiver is not
ready, a message has to be transferred two or more
times, and the receiver of the message has to wait
for the entire time taken to transfer the message
across the network.
 In the asynchronous mode of communication, since
a sender does not wait for the receiver to be ready,
there may be served pending messages that have not
yet been accepted by the receiver.
 Therefore, an bounded-capacity message buffer that
can store all unreceived messages is needed to
support asynchronous communication with the
assurance that all the messages sent to the receiver
will be delivered.
 Unbounded capacity of a buffer is practically
impossible.
 Therefore, in practice, systems using asynchronous
mode of communication use finite-bound buffers,
also known as multiple-message buffers.
1. Unsuccessful communication
2. Flow-controlled communication
 Almost all networks have an upper bound on the
size of data that can be transmitted at a time.
 This size is known as the maximum transfer
unit(MTU) of a network.
 On the other hand, messages larger than the MTU of
the network have to be fragmented and sent in
multiple packets.
 Such messages are known as multidatagram
messages.
 Due to the problems in transferring program objects in
their original form, they are first converted to stream
form that is suitable for transmission and placed into a
message buffer.
 This conversion process takes place on the sender side
and is known as encoding of a message data.
 The encoded message, when received by the receiver,
must be converted back from the stream form to the
original program objects before it can be used.
 The process of reconstruction of program objects from
message data on the receiver side is known as decoding
of the message data.
 Another important issue in message-based
communication is addressing of the parties involved
in an interation.
 A message-passing system usually supports two
types of process addressing:
1) Explicit addressing
2) Implicit addressing
 While a distributed system may offer potential for
parallelism, it is also prone to partial failures such as
a node crash or a communication link failure.
1) Loss of request message
2) Loss of response message
3) Unsuccessful execution of the request
1) Loss of request message: This may happen either
due to the failure communication link between the
sender and receiver or because the receiver’s node
is down at the time the request message reaches
there.
2) Loss of response message: This may happen either
due to the failure of communication link between
the sender and receiver or because the sender’s
node is down at the time the response message
reaches there.
3) Unsuccessful execution of the request: This
happens due to the receiver’s node crashing while
the request is being processed.
 The most elementary form of message-based
interaction is one-to-one communication in which a
single-sender process sends a message to a single-
receiver process.
1) One to many(single sender and multiple
receivers)
2) Many to one(multiple senders and single
receiver)
3)Many to many(multiple senders and multiple
receivers)
 In this scheme, there are multiple receivers for a
message sent by a single sender.
 One-to-many scheme is also known as multicast
communication.
 A special case of multicast communication is
broadcast communication, in which the message is
sent to all processors connected to a network.
 In this scheme, multiple senders send messages to a
single receiver.
 The single receiver may be selective or nonselective.
 A selective receiver specifies a unique sender, a
message exchange takes place only if that sender
sends a message.
 On the other hand, a non selective receiver specifies
a set of senders, and if any one sender in the set
sends a message to this receiver, a message
exchange takes place.
 In this scheme, multiple senders send messages to
multiple receivers.
 The one-to-many and many-to-one schemes are
implicit in this scheme.
 Hence the issues related to one-to-many and many-
to-one schemes, which already been described
above, also apply to the many-to-many
communication scheme.
 In addition, an important issue related to many-to-
many communication scheme is that of ordered
message delivery.
 The commonly used semantics for ordered delivery
of multicast messages are :
1) Absolute ordering
2) Consistent ordering
3) Casual ordering

More Related Content

What's hot

Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback model
ijcses
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobile
eSAT Publishing House
 
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networksAdvisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
eSAT Journals
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
MNM Jain Engineering College
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct dox
Baig Mirza
 
Distributed Coordination-Based Systems
Distributed Coordination-Based SystemsDistributed Coordination-Based Systems
Distributed Coordination-Based Systems
Ahmed Magdy Ezzeldin, MSc.
 
Dynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtnsDynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtns
JPINFOTECH JAYAPRAKASH
 
Slide05 Message Passing Architecture
Slide05 Message Passing ArchitectureSlide05 Message Passing Architecture
Slide05 Message Passing Architecture
อภิเษก หงษ์วิทยากร
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systems
SHATHAN
 
Unit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsUnit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed Systems
Nandakumar P
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
Journal For Research
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
AbDul ThaYyal
 
OS_Ch4
OS_Ch4OS_Ch4
Ch4 OS
Ch4 OSCh4 OS
Ch4 OS
C.U
 
Process
ProcessProcess
Process
Sachin MK
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
IJCNCJournal
 
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
Sehrish Asif
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
Prof. Dr. Noman Islam
 
Dynamic control of coding for progressive packet arrivals in dt ns
Dynamic control of coding for progressive packet arrivals in dt nsDynamic control of coding for progressive packet arrivals in dt ns
Dynamic control of coding for progressive packet arrivals in dt ns
IEEEFINALYEARPROJECTS
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
eSAT Journals
 

What's hot (20)

Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback model
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobile
 
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networksAdvisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct dox
 
Distributed Coordination-Based Systems
Distributed Coordination-Based SystemsDistributed Coordination-Based Systems
Distributed Coordination-Based Systems
 
Dynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtnsDynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtns
 
Slide05 Message Passing Architecture
Slide05 Message Passing ArchitectureSlide05 Message Passing Architecture
Slide05 Message Passing Architecture
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systems
 
Unit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsUnit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed Systems
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
OS_Ch4
OS_Ch4OS_Ch4
OS_Ch4
 
Ch4 OS
Ch4 OSCh4 OS
Ch4 OS
 
Process
ProcessProcess
Process
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
 
Dynamic control of coding for progressive packet arrivals in dt ns
Dynamic control of coding for progressive packet arrivals in dt nsDynamic control of coding for progressive packet arrivals in dt ns
Dynamic control of coding for progressive packet arrivals in dt ns
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 

Similar to Dos unit 2

Designing Distributed Systems
Designing Distributed SystemsDesigning Distributed Systems
Designing Distributed Systems
Dhananjay Singh
 
5_Interprocess Communication.pptx
5_Interprocess Communication.pptx5_Interprocess Communication.pptx
5_Interprocess Communication.pptx
ssuser2adefd1
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
Alagappa Govt Arts College, Karaikudi
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
musfirafatima3
 
Routing mee
Routing meeRouting mee
Routing mee
sara_3
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
Ravindra Raju Kolahalam
 
Learning Guide of Determine Best Fit Topology LO 2.pptx
Learning Guide of Determine Best Fit Topology LO 2.pptxLearning Guide of Determine Best Fit Topology LO 2.pptx
Learning Guide of Determine Best Fit Topology LO 2.pptx
aytenewbelay1
 
Lect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptxLect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptx
Amar Nath Dsilva
 
Chapter 4- Communication in distributed system.ppt
Chapter 4- Communication in distributed system.pptChapter 4- Communication in distributed system.ppt
Chapter 4- Communication in distributed system.ppt
AschalewAyele2
 
computer network notes with full details
computer network notes with  full detailscomputer network notes with  full details
computer network notes with full details
KajalSingh958233
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
GowriLatha1
 
Performance evaluation of mofo buffer management technique with different rou...
Performance evaluation of mofo buffer management technique with different rou...Performance evaluation of mofo buffer management technique with different rou...
Performance evaluation of mofo buffer management technique with different rou...
eSAT Journals
 
1 messagepassing-121015032028-phpapp01
1 messagepassing-121015032028-phpapp011 messagepassing-121015032028-phpapp01
1 messagepassing-121015032028-phpapp01
Zaigham Abbas
 
Apache ActiveMQ and Apache Camel
Apache ActiveMQ and Apache CamelApache ActiveMQ and Apache Camel
Apache ActiveMQ and Apache Camel
Omi Om
 
2nd
2nd2nd
Computer Networks for Computer Science Student
Computer Networks for Computer Science StudentComputer Networks for Computer Science Student
Computer Networks for Computer Science Student
rprajat007
 
dtn-180110112549.pdf
dtn-180110112549.pdfdtn-180110112549.pdf
dtn-180110112549.pdf
Muhammedsahil23
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
Haya Saani
 
MPI.pptx
MPI.pptxMPI.pptx
MPI.pptx
YuvrajWadavale1
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
MohammedAnas871930
 

Similar to Dos unit 2 (20)

Designing Distributed Systems
Designing Distributed SystemsDesigning Distributed Systems
Designing Distributed Systems
 
5_Interprocess Communication.pptx
5_Interprocess Communication.pptx5_Interprocess Communication.pptx
5_Interprocess Communication.pptx
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Routing mee
Routing meeRouting mee
Routing mee
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 
Learning Guide of Determine Best Fit Topology LO 2.pptx
Learning Guide of Determine Best Fit Topology LO 2.pptxLearning Guide of Determine Best Fit Topology LO 2.pptx
Learning Guide of Determine Best Fit Topology LO 2.pptx
 
Lect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptxLect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptx
 
Chapter 4- Communication in distributed system.ppt
Chapter 4- Communication in distributed system.pptChapter 4- Communication in distributed system.ppt
Chapter 4- Communication in distributed system.ppt
 
computer network notes with full details
computer network notes with  full detailscomputer network notes with  full details
computer network notes with full details
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
 
Performance evaluation of mofo buffer management technique with different rou...
Performance evaluation of mofo buffer management technique with different rou...Performance evaluation of mofo buffer management technique with different rou...
Performance evaluation of mofo buffer management technique with different rou...
 
1 messagepassing-121015032028-phpapp01
1 messagepassing-121015032028-phpapp011 messagepassing-121015032028-phpapp01
1 messagepassing-121015032028-phpapp01
 
Apache ActiveMQ and Apache Camel
Apache ActiveMQ and Apache CamelApache ActiveMQ and Apache Camel
Apache ActiveMQ and Apache Camel
 
2nd
2nd2nd
2nd
 
Computer Networks for Computer Science Student
Computer Networks for Computer Science StudentComputer Networks for Computer Science Student
Computer Networks for Computer Science Student
 
dtn-180110112549.pdf
dtn-180110112549.pdfdtn-180110112549.pdf
dtn-180110112549.pdf
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
 
MPI.pptx
MPI.pptxMPI.pptx
MPI.pptx
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
 

Recently uploaded

مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 

Dos unit 2

  • 1.
  • 2.  A process is a program in execution. When we say that two computers of a distributed system are communicating with each other, we mean that two processes, one running on each computer, are in communication with each other.  The two basic methods for information sharing are as follows: 1. Original sharing or shared-data approach 2. Copy sharing or message-passing approach
  • 3.
  • 4.  Simplicity  Uniform semantics  Efficiency  Reliability  Correctness  Flexibility  Security  Portability
  • 5.  A message is a block of information formatted by a sending process in such a manner that it is meaningful to the receiving process. 1. Address 2. Sequence number 3. Structural information
  • 6.  Address: It contains characters that uniquely identify the sending and receiving process in the network.  Sequence number: This is the message identifier(ID), which is very useful for identifying lost messages and duplicate messages in case of system failures.  Structural information: This element also has two parts.
  • 7.  A central issue in the communication structure is the synchronization imposed on the communicating processes by the communication primitives.  One of the following two methods is commonly used for this purpose: 1. Polling 2. Interrupt
  • 8.  In interprocess communication, the message- buffering strategy is strongly related to synchronization strategy.  The synchronous and asynchronous modes of communication correspond respectively to the two extremes of bufffering: a null buffer and a buffer with unbounded capacity.
  • 9.  In case of no buffering, there is no place to temporarily store the message. 1. The message remains in the sender process address space and the execution of the send is delayed until the receiver executes the corresponding receive. 2. The message is simply discarded and the timeout mechanism is used to resend the message after a timeout period.
  • 10.
  • 11.  The null buffer strategy is generally not suitable for synchronous communication between two process in a distributed system because if the receiver is not ready, a message has to be transferred two or more times, and the receiver of the message has to wait for the entire time taken to transfer the message across the network.
  • 12.  In the asynchronous mode of communication, since a sender does not wait for the receiver to be ready, there may be served pending messages that have not yet been accepted by the receiver.  Therefore, an bounded-capacity message buffer that can store all unreceived messages is needed to support asynchronous communication with the assurance that all the messages sent to the receiver will be delivered.
  • 13.  Unbounded capacity of a buffer is practically impossible.  Therefore, in practice, systems using asynchronous mode of communication use finite-bound buffers, also known as multiple-message buffers. 1. Unsuccessful communication 2. Flow-controlled communication
  • 14.  Almost all networks have an upper bound on the size of data that can be transmitted at a time.  This size is known as the maximum transfer unit(MTU) of a network.  On the other hand, messages larger than the MTU of the network have to be fragmented and sent in multiple packets.  Such messages are known as multidatagram messages.
  • 15.  Due to the problems in transferring program objects in their original form, they are first converted to stream form that is suitable for transmission and placed into a message buffer.  This conversion process takes place on the sender side and is known as encoding of a message data.  The encoded message, when received by the receiver, must be converted back from the stream form to the original program objects before it can be used.  The process of reconstruction of program objects from message data on the receiver side is known as decoding of the message data.
  • 16.  Another important issue in message-based communication is addressing of the parties involved in an interation.  A message-passing system usually supports two types of process addressing: 1) Explicit addressing 2) Implicit addressing
  • 17.  While a distributed system may offer potential for parallelism, it is also prone to partial failures such as a node crash or a communication link failure. 1) Loss of request message 2) Loss of response message 3) Unsuccessful execution of the request
  • 18. 1) Loss of request message: This may happen either due to the failure communication link between the sender and receiver or because the receiver’s node is down at the time the request message reaches there. 2) Loss of response message: This may happen either due to the failure of communication link between the sender and receiver or because the sender’s node is down at the time the response message reaches there. 3) Unsuccessful execution of the request: This happens due to the receiver’s node crashing while the request is being processed.
  • 19.  The most elementary form of message-based interaction is one-to-one communication in which a single-sender process sends a message to a single- receiver process. 1) One to many(single sender and multiple receivers) 2) Many to one(multiple senders and single receiver) 3)Many to many(multiple senders and multiple receivers)
  • 20.  In this scheme, there are multiple receivers for a message sent by a single sender.  One-to-many scheme is also known as multicast communication.  A special case of multicast communication is broadcast communication, in which the message is sent to all processors connected to a network.
  • 21.  In this scheme, multiple senders send messages to a single receiver.  The single receiver may be selective or nonselective.  A selective receiver specifies a unique sender, a message exchange takes place only if that sender sends a message.  On the other hand, a non selective receiver specifies a set of senders, and if any one sender in the set sends a message to this receiver, a message exchange takes place.
  • 22.  In this scheme, multiple senders send messages to multiple receivers.  The one-to-many and many-to-one schemes are implicit in this scheme.  Hence the issues related to one-to-many and many- to-one schemes, which already been described above, also apply to the many-to-many communication scheme.  In addition, an important issue related to many-to- many communication scheme is that of ordered message delivery.
  • 23.  The commonly used semantics for ordered delivery of multicast messages are : 1) Absolute ordering 2) Consistent ordering 3) Casual ordering