SlideShare a Scribd company logo
1 of 15
Unit 1: Intersystem Communications
COP4858 PROGRAM & TECH ENHANCED 463773
Gilbert Mancilla
Hughval Williams
Define the role of Distributed Component Object Model
(DCOM), CORBA and Remote Method Invocation (RMI), in
distributed processing.
DCOM enables component applications to operate across the
Internet
Speeding development
Lowering integration costs
Improving deployment flexibility
Cobra
COBRA owned by Object Management Group OMG is
middleware
CORBA Interface Definition Language IDL provides the
language- and
OS-neutral inter-object commication it supports the
construction and
integration of object-oriented software components in mixed
distributed environments. object request broker
Cobra’s client to object implementation
Remote Method Invocation
RMI provides ORB functionality that is fully integrated with the
Java language and runtime environment. Unlike CORBA,
however, the RMI
ORB is fully integrated with the Java language and runtime
environment.
Cobra vs RMI
B) Describe how web services are used to integrate disparate
applications in an organization: for example, describe the role
of the WSDL Web Service Definition Language, SOAP Simple
Object Access Protocol, and UDDI Universal Description,
Discovery and Integration ,architectures in creating and using
web services.
WSDL ( Web Service Definition Language)
WSDL is a document written in XML. The document describes a
Web service. It specifies the location of the service and the
operations (or methods) the service exposes.
Web service as collections of network endpoints or ports
Messages are abstract descriptions of data being exchanged
Port types are abstraction collection of operations
Concrete protocol and data format specification for a particular
port type constitutes a binding
SOAP
SOAP is an XML based protocol for accessing Web Services.
SOAP stands for Simple Object Access Protocol
SOAP simply a procedural call
SOAP is a stateless protocol
SOAP Body
SOAP
SOAP
header
SOAP envelope
Header
block
Header
data
Header
data
Header
data
Body child element
Body child element
11
UDDI (Universal Description, Discovery and Integration)
UDDI is a platform-independent framework for describing
services.
It’s a directory service where companies are in search of web
services.
UDDI uses WSDL to describe interfaces to web services
SOAP, WSDL and UDDI together make systems flexible
Together is more of a declarative type of programming
UDDI working with WSDL AND SOAP
C) Describe the role of socket programming in communicating
between systems and
contrast the protocols and uses of TCP/IP sockets and Datagram
sockets.
A socket is one of the most fundamental technologies of
computer networking. Sockets allow applications to
communicate using standard mechanisms built into network
hardware and operating systems.
Three socket types are available:
Stream sockets provide a bidirectional, reliable, sequenced, and
unduplicated flow of message data.
Datagram sockets support bidirectional data flow, but don't
guarantee that the message data is sequenced, reliable, or
unduplicated.
Raw sockets give you access to the underlying communication
protocols that support socket abstractions.
Role of Socket programming
In a nutshell, a socket represents a single connection between
exactly two pieces of software.
A socket provides a bidirectional communication endpoint for
sending and receiving data with another socket. Socket
connections normally run between two different computers on a
LAN or across the Internet, but they can also be used for inter
process communication on a single computer.
What do you need for socket communication ?
Basically 4 parameters
Source Identifier (IP address)
Source Port
Destination Identifier
Destination Port
Software applications that rely on the Internet and other
computer networks continue to grow in popularity. The
following software packages rely on sockets:
Web browsers
instant messaging applications
peer to peer file sharing systems
.
.
Contrast the protocols and uses
of TCP/IP sockets and Datagram sockets
There are two types of Internet Protocol (IP) traffic. They
are TCP or Transmission Control Protocol and UDP or User
Datagram Protocol. TCP is connection oriented – once a
connection is established, data can be sent bidirectional. UDP is
a simpler, connectionless Internet protocol. Multiple messages
are sent as packets in chunks using UDP
Describe the purpose of message and queuing services and how
they work
One popular messaging services is Short messaging services
(SMS)
Short message service is a mechanism of delivery of short
messages over the mobile networks.
This messaging services has a store and forward way of
transmitting messages to and from mobiles.
The message (text only) from the sending mobile is stored in a
central short message center (SMS) which then forwards it to
the destination mobile. This means that in the case that the
recipient is not available, the short message is stored and can be
sent later. Each short message can be no longer than 160
characters.
Short Message Service:
How does SMS work?
A typical organization of network elements in a GSM network
supporting SMS
How does it work:
The SMC (Short Message Center) does the job of store and
forward of messages between the mobile station. On the other
hand the SME which can be found in the fixed network or a
mobile station, sends and receives short messages.
The SMS GWMS (SMS gateway MSC) is a gateway MSC that
can also receive short messages. The gateway MSC is a mobile
network’s point of contact with other networks. On receiving
the short message from the short message center, GMSC uses
the SS7 network to interrogate the current position of the
mobile station form the HLR, the home location register.
HLR : The main database in a mobile network.
Functions:
It holds information of the subscription profile of the mobile
and also about the routing information for the subscriber, i.e.
the area (covered by a MSC) where the mobile is currently
situated. The GMSC is thus able to pass on the message to the
correct MSC.
MSC (Mobile Switching Center) is the entity in a GSM network
which does the job of switching connections between mobile
stations or between mobile stations and the fixed network.
A VLR (Visitor Location Register) corresponds to each MSC
and contains temporary information about the mobile,
information like mobile identification and the cell (or a group
of cells) where the mobile is currently situated.
The present state of SMS
SMS has seen unprecedented growth in the last few years. In
Europe SMS has already crossed three billion messages per
month mark. The current figures and future projections in the
European market below, clearly demonstrate the popularity of
SMS in Europe.
Message Queuing
Purpose
Message Queuing technology enables applications running
at different times to communicate across heterogeneous
networks and systems that may be temporarily offline.
Applications send messages to queues and read messages from
queues. The following illustration on the next page shows how a
queue can hold messages that are generated by multiple sending
applications and read by multiple receiving applications.
Message Queuing provides guaranteed message delivery,
efficient routing, security, and priority-based messaging.
Figure above represent Message queuing service
What Is JMS?
The Java Message Service is a Java API that allows applications
to create, send, receive, and read messages.
It provides enough features to support sophisticated messaging
applications.
JMS server can communicate between client using many
protocols the following protocols:
RMI, TCP/IP, HTTP
E) List commonly used low level data communications
protocols (e.g. RS232), state conditions for when each protocol
should be used
Female "DB-9" connector (properly known as DE9F):
A VGA connector for monitors
Male "DB-9" connector (properly known as DE9M): COM1 and
COM2
female DB-25 connector (also known as DB25S):
the parallel (printer) port
male DB-25P connector (also known as DB25P): Printer cable
that connects to the
Parallel port

More Related Content

Similar to DCOM, CORBA, RMI Comparison

Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02dvicky12
 
Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxssuser403d87
 
Web services ankur ppt
Web services ankur pptWeb services ankur ppt
Web services ankur pptan_techi
 
Java RMI Detailed Tutorial
Java RMI Detailed TutorialJava RMI Detailed Tutorial
Java RMI Detailed TutorialMasud Rahman
 
Context And Concept Of Web Services
Context And Concept Of Web ServicesContext And Concept Of Web Services
Context And Concept Of Web ServicesFatih Taşkın
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networkstechbed
 
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTA SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTIJNSA Journal
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and NetworksChristian Reina
 
112321 112333 wirless application protocol
112321 112333 wirless application protocol112321 112333 wirless application protocol
112321 112333 wirless application protocolJAINIK PATEL
 
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESijcsit
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesCSEIJJournal
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesAIRCC Publishing Corporation
 

Similar to DCOM, CORBA, RMI Comparison (20)

Internetworking
InternetworkingInternetworking
Internetworking
 
Resume
ResumeResume
Resume
 
Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02
 
Overview of web services
Overview of web servicesOverview of web services
Overview of web services
 
6. The grid-COMPUTING OGSA and WSRF
6. The grid-COMPUTING OGSA and WSRF6. The grid-COMPUTING OGSA and WSRF
6. The grid-COMPUTING OGSA and WSRF
 
Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptx
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
Web services ankur ppt
Web services ankur pptWeb services ankur ppt
Web services ankur ppt
 
Java RMI Detailed Tutorial
Java RMI Detailed TutorialJava RMI Detailed Tutorial
Java RMI Detailed Tutorial
 
Web Service Extensions | Torry Harris Whitepaper
Web Service Extensions | Torry Harris WhitepaperWeb Service Extensions | Torry Harris Whitepaper
Web Service Extensions | Torry Harris Whitepaper
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
Context And Concept Of Web Services
Context And Concept Of Web ServicesContext And Concept Of Web Services
Context And Concept Of Web Services
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTA SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENT
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
 
112321 112333 wirless application protocol
112321 112333 wirless application protocol112321 112333 wirless application protocol
112321 112333 wirless application protocol
 
Internet
InternetInternet
Internet
 
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 

More from willcoxjanay

Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxCritical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxwillcoxjanay
 
Critical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxCritical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxwillcoxjanay
 
Critical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxCritical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxwillcoxjanay
 
Critical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxCritical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxwillcoxjanay
 
Critical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxCritical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxwillcoxjanay
 
Critical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxCritical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxwillcoxjanay
 
Critical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxCritical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxwillcoxjanay
 
Critical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxCritical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxwillcoxjanay
 
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxCritical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxwillcoxjanay
 
Critical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxCritical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxwillcoxjanay
 
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxCritical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxwillcoxjanay
 
Critical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxCritical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxwillcoxjanay
 
Critical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxCritical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxwillcoxjanay
 
Critical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxCritical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxwillcoxjanay
 
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxCritical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxwillcoxjanay
 
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxCritical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxwillcoxjanay
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxwillcoxjanay
 
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxCriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxwillcoxjanay
 
Critical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxCritical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxwillcoxjanay
 
Critical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxCritical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxwillcoxjanay
 

More from willcoxjanay (20)

Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docxCritical Response Rubric Category 0 1 1.5 2 Timelin.docx
Critical Response Rubric Category 0 1 1.5 2 Timelin.docx
 
Critical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docxCritical Response Rubric- Please view the videos provided on Asha De.docx
Critical Response Rubric- Please view the videos provided on Asha De.docx
 
Critical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docxCritical Reflective AnalysisIn developing your genogram and learni.docx
Critical Reflective AnalysisIn developing your genogram and learni.docx
 
Critical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docxCritical Reflection Projectzzz.docx
Critical Reflection Projectzzz.docx
 
Critical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docxCritical reflection on the reading from Who Speaks for Justice, .docx
Critical reflection on the reading from Who Speaks for Justice, .docx
 
Critical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docxCritical Reflection ExerciseStudents are expected to have co.docx
Critical Reflection ExerciseStudents are expected to have co.docx
 
Critical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docxCritical Reading StrategiesThe University of Minnesota published.docx
Critical Reading StrategiesThe University of Minnesota published.docx
 
Critical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docxCritical Qualitative Research Designpages 70–76Related to un.docx
Critical Qualitative Research Designpages 70–76Related to un.docx
 
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docxCritical InfrastructuresThe U.S. Department of Homeland Security h.docx
Critical InfrastructuresThe U.S. Department of Homeland Security h.docx
 
Critical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docxCritical Infrastructure Protection Discussion Questions How.docx
Critical Infrastructure Protection Discussion Questions How.docx
 
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docxCritical InfrastructuresIn terms of critical infrastructure and ke.docx
Critical InfrastructuresIn terms of critical infrastructure and ke.docx
 
Critical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docxCritical Infrastructure Case StudyPower plants are an important .docx
Critical Infrastructure Case StudyPower plants are an important .docx
 
Critical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docxCritical Infrastructure and a CyberattackPresidential Decisi.docx
Critical Infrastructure and a CyberattackPresidential Decisi.docx
 
Critical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docxCritical Incident Protection (CIP)Plans need to have your name o.docx
Critical Incident Protection (CIP)Plans need to have your name o.docx
 
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docxCritical Evaluation of Qualitative or Quantitative Research Stud.docx
Critical Evaluation of Qualitative or Quantitative Research Stud.docx
 
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docxCritical Analysis of Phillips argument in her essay Zombie Studies.docx
Critical Analysis of Phillips argument in her essay Zombie Studies.docx
 
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docxCritical Appraisal Process for Quantitative ResearchAs you cri.docx
Critical Appraisal Process for Quantitative ResearchAs you cri.docx
 
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docxCriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
CriteriaExcellentSuperiorGoodWork neededFailingIntrodu.docx
 
Critical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docxCritical analysis of primary literature - PracticePurposeThis.docx
Critical analysis of primary literature - PracticePurposeThis.docx
 
Critical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docxCritical analysis of one relevant curriculum approach or model..docx
Critical analysis of one relevant curriculum approach or model..docx
 

Recently uploaded

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 

Recently uploaded (20)

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

DCOM, CORBA, RMI Comparison

  • 1. Unit 1: Intersystem Communications COP4858 PROGRAM & TECH ENHANCED 463773 Gilbert Mancilla Hughval Williams Define the role of Distributed Component Object Model (DCOM), CORBA and Remote Method Invocation (RMI), in distributed processing. DCOM enables component applications to operate across the Internet Speeding development Lowering integration costs Improving deployment flexibility
  • 2. Cobra COBRA owned by Object Management Group OMG is middleware CORBA Interface Definition Language IDL provides the language- and OS-neutral inter-object commication it supports the construction and integration of object-oriented software components in mixed distributed environments. object request broker Cobra’s client to object implementation Remote Method Invocation RMI provides ORB functionality that is fully integrated with the Java language and runtime environment. Unlike CORBA, however, the RMI ORB is fully integrated with the Java language and runtime environment. Cobra vs RMI B) Describe how web services are used to integrate disparate applications in an organization: for example, describe the role of the WSDL Web Service Definition Language, SOAP Simple Object Access Protocol, and UDDI Universal Description, Discovery and Integration ,architectures in creating and using
  • 3. web services. WSDL ( Web Service Definition Language) WSDL is a document written in XML. The document describes a Web service. It specifies the location of the service and the operations (or methods) the service exposes. Web service as collections of network endpoints or ports Messages are abstract descriptions of data being exchanged Port types are abstraction collection of operations Concrete protocol and data format specification for a particular port type constitutes a binding SOAP SOAP is an XML based protocol for accessing Web Services. SOAP stands for Simple Object Access Protocol SOAP simply a procedural call SOAP is a stateless protocol SOAP Body SOAP SOAP header SOAP envelope Header block Header data
  • 4. Header data Header data Body child element Body child element 11 UDDI (Universal Description, Discovery and Integration) UDDI is a platform-independent framework for describing services. It’s a directory service where companies are in search of web services. UDDI uses WSDL to describe interfaces to web services SOAP, WSDL and UDDI together make systems flexible Together is more of a declarative type of programming UDDI working with WSDL AND SOAP C) Describe the role of socket programming in communicating
  • 5. between systems and contrast the protocols and uses of TCP/IP sockets and Datagram sockets. A socket is one of the most fundamental technologies of computer networking. Sockets allow applications to communicate using standard mechanisms built into network hardware and operating systems. Three socket types are available: Stream sockets provide a bidirectional, reliable, sequenced, and unduplicated flow of message data. Datagram sockets support bidirectional data flow, but don't guarantee that the message data is sequenced, reliable, or unduplicated. Raw sockets give you access to the underlying communication protocols that support socket abstractions. Role of Socket programming In a nutshell, a socket represents a single connection between exactly two pieces of software. A socket provides a bidirectional communication endpoint for sending and receiving data with another socket. Socket connections normally run between two different computers on a LAN or across the Internet, but they can also be used for inter process communication on a single computer.
  • 6. What do you need for socket communication ? Basically 4 parameters Source Identifier (IP address) Source Port Destination Identifier Destination Port Software applications that rely on the Internet and other
  • 7. computer networks continue to grow in popularity. The following software packages rely on sockets: Web browsers instant messaging applications peer to peer file sharing systems .
  • 8. . Contrast the protocols and uses of TCP/IP sockets and Datagram sockets There are two types of Internet Protocol (IP) traffic. They are TCP or Transmission Control Protocol and UDP or User Datagram Protocol. TCP is connection oriented – once a connection is established, data can be sent bidirectional. UDP is a simpler, connectionless Internet protocol. Multiple messages are sent as packets in chunks using UDP Describe the purpose of message and queuing services and how they work
  • 9. One popular messaging services is Short messaging services (SMS) Short message service is a mechanism of delivery of short messages over the mobile networks. This messaging services has a store and forward way of transmitting messages to and from mobiles. The message (text only) from the sending mobile is stored in a central short message center (SMS) which then forwards it to the destination mobile. This means that in the case that the recipient is not available, the short message is stored and can be sent later. Each short message can be no longer than 160 characters. Short Message Service: How does SMS work?
  • 10. A typical organization of network elements in a GSM network supporting SMS How does it work: The SMC (Short Message Center) does the job of store and forward of messages between the mobile station. On the other hand the SME which can be found in the fixed network or a mobile station, sends and receives short messages. The SMS GWMS (SMS gateway MSC) is a gateway MSC that can also receive short messages. The gateway MSC is a mobile network’s point of contact with other networks. On receiving the short message from the short message center, GMSC uses the SS7 network to interrogate the current position of the mobile station form the HLR, the home location register. HLR : The main database in a mobile network. Functions:
  • 11. It holds information of the subscription profile of the mobile and also about the routing information for the subscriber, i.e. the area (covered by a MSC) where the mobile is currently situated. The GMSC is thus able to pass on the message to the correct MSC. MSC (Mobile Switching Center) is the entity in a GSM network which does the job of switching connections between mobile stations or between mobile stations and the fixed network. A VLR (Visitor Location Register) corresponds to each MSC and contains temporary information about the mobile, information like mobile identification and the cell (or a group of cells) where the mobile is currently situated. The present state of SMS SMS has seen unprecedented growth in the last few years. In Europe SMS has already crossed three billion messages per month mark. The current figures and future projections in the European market below, clearly demonstrate the popularity of
  • 12. SMS in Europe. Message Queuing Purpose Message Queuing technology enables applications running at different times to communicate across heterogeneous networks and systems that may be temporarily offline. Applications send messages to queues and read messages from queues. The following illustration on the next page shows how a queue can hold messages that are generated by multiple sending applications and read by multiple receiving applications. Message Queuing provides guaranteed message delivery, efficient routing, security, and priority-based messaging.
  • 13. Figure above represent Message queuing service What Is JMS? The Java Message Service is a Java API that allows applications to create, send, receive, and read messages. It provides enough features to support sophisticated messaging applications. JMS server can communicate between client using many protocols the following protocols: RMI, TCP/IP, HTTP
  • 14. E) List commonly used low level data communications
  • 15. protocols (e.g. RS232), state conditions for when each protocol should be used Female "DB-9" connector (properly known as DE9F): A VGA connector for monitors Male "DB-9" connector (properly known as DE9M): COM1 and COM2 female DB-25 connector (also known as DB25S): the parallel (printer) port male DB-25P connector (also known as DB25P): Printer cable that connects to the Parallel port