SlideShare a Scribd company logo
Dos unit 2
 A process is a program in execution. When we say
that two computers of a distributed system are
communicating with each other, we mean that two
processes, one running on each computer, are in
communication with each other.
 The two basic methods for information sharing are
as follows:
1. Original sharing or shared-data approach
2. Copy sharing or message-passing approach
Dos unit 2
 Simplicity
 Uniform semantics
 Efficiency
 Reliability
 Correctness
 Flexibility
 Security
 Portability
 A message is a block of information formatted by a
sending process in such a manner that it is
meaningful to the receiving process.
1. Address
2. Sequence number
3. Structural information
 Address: It contains characters that uniquely
identify the sending and receiving process in the
network.
 Sequence number: This is the message
identifier(ID), which is very useful for identifying
lost messages and duplicate messages in case of
system failures.
 Structural information: This element also has two
parts.
 A central issue in the communication structure is the
synchronization imposed on the communicating
processes by the communication primitives.
 One of the following two methods is commonly
used for this purpose:
1. Polling
2. Interrupt
 In interprocess communication, the message-
buffering strategy is strongly related to
synchronization strategy.
 The synchronous and asynchronous modes of
communication correspond respectively to the two
extremes of bufffering: a null buffer and a buffer
with unbounded capacity.
 In case of no buffering, there is no place to
temporarily store the message.
1. The message remains in the sender process
address space and the execution of the send is
delayed until the receiver executes the
corresponding receive.
2. The message is simply discarded and the
timeout mechanism is used to resend the message
after a timeout period.
Dos unit 2
 The null buffer strategy is generally not suitable for
synchronous communication between two process
in a distributed system because if the receiver is not
ready, a message has to be transferred two or more
times, and the receiver of the message has to wait
for the entire time taken to transfer the message
across the network.
 In the asynchronous mode of communication, since
a sender does not wait for the receiver to be ready,
there may be served pending messages that have not
yet been accepted by the receiver.
 Therefore, an bounded-capacity message buffer that
can store all unreceived messages is needed to
support asynchronous communication with the
assurance that all the messages sent to the receiver
will be delivered.
 Unbounded capacity of a buffer is practically
impossible.
 Therefore, in practice, systems using asynchronous
mode of communication use finite-bound buffers,
also known as multiple-message buffers.
1. Unsuccessful communication
2. Flow-controlled communication
 Almost all networks have an upper bound on the
size of data that can be transmitted at a time.
 This size is known as the maximum transfer
unit(MTU) of a network.
 On the other hand, messages larger than the MTU of
the network have to be fragmented and sent in
multiple packets.
 Such messages are known as multidatagram
messages.
 Due to the problems in transferring program objects in
their original form, they are first converted to stream
form that is suitable for transmission and placed into a
message buffer.
 This conversion process takes place on the sender side
and is known as encoding of a message data.
 The encoded message, when received by the receiver,
must be converted back from the stream form to the
original program objects before it can be used.
 The process of reconstruction of program objects from
message data on the receiver side is known as decoding
of the message data.
 Another important issue in message-based
communication is addressing of the parties involved
in an interation.
 A message-passing system usually supports two
types of process addressing:
1) Explicit addressing
2) Implicit addressing
 While a distributed system may offer potential for
parallelism, it is also prone to partial failures such as
a node crash or a communication link failure.
1) Loss of request message
2) Loss of response message
3) Unsuccessful execution of the request
1) Loss of request message: This may happen either
due to the failure communication link between the
sender and receiver or because the receiver’s node
is down at the time the request message reaches
there.
2) Loss of response message: This may happen either
due to the failure of communication link between
the sender and receiver or because the sender’s
node is down at the time the response message
reaches there.
3) Unsuccessful execution of the request: This
happens due to the receiver’s node crashing while
the request is being processed.
 The most elementary form of message-based
interaction is one-to-one communication in which a
single-sender process sends a message to a single-
receiver process.
1) One to many(single sender and multiple
receivers)
2) Many to one(multiple senders and single
receiver)
3)Many to many(multiple senders and multiple
receivers)
 In this scheme, there are multiple receivers for a
message sent by a single sender.
 One-to-many scheme is also known as multicast
communication.
 A special case of multicast communication is
broadcast communication, in which the message is
sent to all processors connected to a network.
 In this scheme, multiple senders send messages to a
single receiver.
 The single receiver may be selective or nonselective.
 A selective receiver specifies a unique sender, a
message exchange takes place only if that sender
sends a message.
 On the other hand, a non selective receiver specifies
a set of senders, and if any one sender in the set
sends a message to this receiver, a message
exchange takes place.
 In this scheme, multiple senders send messages to
multiple receivers.
 The one-to-many and many-to-one schemes are
implicit in this scheme.
 Hence the issues related to one-to-many and many-
to-one schemes, which already been described
above, also apply to the many-to-many
communication scheme.
 In addition, an important issue related to many-to-
many communication scheme is that of ordered
message delivery.
 The commonly used semantics for ordered delivery
of multicast messages are :
1) Absolute ordering
2) Consistent ordering
3) Casual ordering

More Related Content

PPTX
Message Passing Systems
PDF
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
PPTX
Exploiting friendship relations for efficient routing in mobile
PDF
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
PDF
PPT
IETF-72 P2PSIP Routing Modes
PPT
Remote Procedure Call
PPT
Peer to Peer services and File systems
Message Passing Systems
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Exploiting friendship relations for efficient routing in mobile
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
IETF-72 P2PSIP Routing Modes
Remote Procedure Call
Peer to Peer services and File systems

What's hot (20)

PDF
Congestion control in packet switched wide area networks using a feedback model
PDF
Advisedly delayed packet attack on tcp based mobile
PDF
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
PPT
Distributed System-Multicast & Indirect communication
DOCX
Arun prjct dox
PDF
Distributed Coordination-Based Systems
DOCX
Dynamic control of coding for progressive packet arrivals in dtns
PDF
Slide05 Message Passing Architecture
PPT
Communications is distributed systems
PPTX
Unit 3 cs6601 Distributed Systems
PDF
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
PPT
Chapter 11
PPT
Ch4 OS
 
PPT
Process
PDF
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
PPTX
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
PPTX
Security management in mobile ad hoc networks
DOCX
Dynamic control of coding for progressive packet arrivals in dt ns
PDF
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Congestion control in packet switched wide area networks using a feedback model
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Distributed System-Multicast & Indirect communication
Arun prjct dox
Distributed Coordination-Based Systems
Dynamic control of coding for progressive packet arrivals in dtns
Slide05 Message Passing Architecture
Communications is distributed systems
Unit 3 cs6601 Distributed Systems
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
Chapter 11
Ch4 OS
 
Process
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
Security management in mobile ad hoc networks
Dynamic control of coding for progressive packet arrivals in dt ns
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Ad

Similar to Dos unit 2 (20)

PDF
Designing Distributed Systems
PPTX
5_Interprocess Communication.pptx
PPTX
Message passing in Distributed Computing Systems
PPTX
Computer Networks.pptx
PPTX
Routing mee
PPTX
Learning Guide of Determine Best Fit Topology LO 2.pptx
PPTX
Lect-3-M2M-IoT.pptx
PPT
Chapter 4- Communication in distributed system.ppt
PDF
computer network notes with full details
PPTX
Inter process communication
PDF
Performance evaluation of mofo buffer management technique with different rou...
PPT
1 messagepassing-121015032028-phpapp01
ODP
Apache ActiveMQ and Apache Camel
DOCX
PDF
LECTURE 3,4 &5Communication.pdfDistributed systems for computer students both...
PDF
LECTURE 3,4 &5Communication.pdf distributed systems continued
PPTX
Computer Networks for Computer Science Student
PPTX
Delay Tolerant Network (DTN)
PDF
dtn-180110112549.pdf
PPTX
MPI.pptx
Designing Distributed Systems
5_Interprocess Communication.pptx
Message passing in Distributed Computing Systems
Computer Networks.pptx
Routing mee
Learning Guide of Determine Best Fit Topology LO 2.pptx
Lect-3-M2M-IoT.pptx
Chapter 4- Communication in distributed system.ppt
computer network notes with full details
Inter process communication
Performance evaluation of mofo buffer management technique with different rou...
1 messagepassing-121015032028-phpapp01
Apache ActiveMQ and Apache Camel
LECTURE 3,4 &5Communication.pdfDistributed systems for computer students both...
LECTURE 3,4 &5Communication.pdf distributed systems continued
Computer Networks for Computer Science Student
Delay Tolerant Network (DTN)
dtn-180110112549.pdf
MPI.pptx
Ad

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Pre independence Education in Inndia.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Basic Mud Logging Guide for educational purpose
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
master seminar digital applications in india
PDF
Anesthesia in Laparoscopic Surgery in India
Complications of Minimal Access Surgery at WLH
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Pre independence Education in Inndia.pdf
01-Introduction-to-Information-Management.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
RMMM.pdf make it easy to upload and study
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Basic Mud Logging Guide for educational purpose
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Cell Structure & Organelles in detailed.
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
O5-L3 Freight Transport Ops (International) V1.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
master seminar digital applications in india
Anesthesia in Laparoscopic Surgery in India

Dos unit 2

  • 2.  A process is a program in execution. When we say that two computers of a distributed system are communicating with each other, we mean that two processes, one running on each computer, are in communication with each other.  The two basic methods for information sharing are as follows: 1. Original sharing or shared-data approach 2. Copy sharing or message-passing approach
  • 4.  Simplicity  Uniform semantics  Efficiency  Reliability  Correctness  Flexibility  Security  Portability
  • 5.  A message is a block of information formatted by a sending process in such a manner that it is meaningful to the receiving process. 1. Address 2. Sequence number 3. Structural information
  • 6.  Address: It contains characters that uniquely identify the sending and receiving process in the network.  Sequence number: This is the message identifier(ID), which is very useful for identifying lost messages and duplicate messages in case of system failures.  Structural information: This element also has two parts.
  • 7.  A central issue in the communication structure is the synchronization imposed on the communicating processes by the communication primitives.  One of the following two methods is commonly used for this purpose: 1. Polling 2. Interrupt
  • 8.  In interprocess communication, the message- buffering strategy is strongly related to synchronization strategy.  The synchronous and asynchronous modes of communication correspond respectively to the two extremes of bufffering: a null buffer and a buffer with unbounded capacity.
  • 9.  In case of no buffering, there is no place to temporarily store the message. 1. The message remains in the sender process address space and the execution of the send is delayed until the receiver executes the corresponding receive. 2. The message is simply discarded and the timeout mechanism is used to resend the message after a timeout period.
  • 11.  The null buffer strategy is generally not suitable for synchronous communication between two process in a distributed system because if the receiver is not ready, a message has to be transferred two or more times, and the receiver of the message has to wait for the entire time taken to transfer the message across the network.
  • 12.  In the asynchronous mode of communication, since a sender does not wait for the receiver to be ready, there may be served pending messages that have not yet been accepted by the receiver.  Therefore, an bounded-capacity message buffer that can store all unreceived messages is needed to support asynchronous communication with the assurance that all the messages sent to the receiver will be delivered.
  • 13.  Unbounded capacity of a buffer is practically impossible.  Therefore, in practice, systems using asynchronous mode of communication use finite-bound buffers, also known as multiple-message buffers. 1. Unsuccessful communication 2. Flow-controlled communication
  • 14.  Almost all networks have an upper bound on the size of data that can be transmitted at a time.  This size is known as the maximum transfer unit(MTU) of a network.  On the other hand, messages larger than the MTU of the network have to be fragmented and sent in multiple packets.  Such messages are known as multidatagram messages.
  • 15.  Due to the problems in transferring program objects in their original form, they are first converted to stream form that is suitable for transmission and placed into a message buffer.  This conversion process takes place on the sender side and is known as encoding of a message data.  The encoded message, when received by the receiver, must be converted back from the stream form to the original program objects before it can be used.  The process of reconstruction of program objects from message data on the receiver side is known as decoding of the message data.
  • 16.  Another important issue in message-based communication is addressing of the parties involved in an interation.  A message-passing system usually supports two types of process addressing: 1) Explicit addressing 2) Implicit addressing
  • 17.  While a distributed system may offer potential for parallelism, it is also prone to partial failures such as a node crash or a communication link failure. 1) Loss of request message 2) Loss of response message 3) Unsuccessful execution of the request
  • 18. 1) Loss of request message: This may happen either due to the failure communication link between the sender and receiver or because the receiver’s node is down at the time the request message reaches there. 2) Loss of response message: This may happen either due to the failure of communication link between the sender and receiver or because the sender’s node is down at the time the response message reaches there. 3) Unsuccessful execution of the request: This happens due to the receiver’s node crashing while the request is being processed.
  • 19.  The most elementary form of message-based interaction is one-to-one communication in which a single-sender process sends a message to a single- receiver process. 1) One to many(single sender and multiple receivers) 2) Many to one(multiple senders and single receiver) 3)Many to many(multiple senders and multiple receivers)
  • 20.  In this scheme, there are multiple receivers for a message sent by a single sender.  One-to-many scheme is also known as multicast communication.  A special case of multicast communication is broadcast communication, in which the message is sent to all processors connected to a network.
  • 21.  In this scheme, multiple senders send messages to a single receiver.  The single receiver may be selective or nonselective.  A selective receiver specifies a unique sender, a message exchange takes place only if that sender sends a message.  On the other hand, a non selective receiver specifies a set of senders, and if any one sender in the set sends a message to this receiver, a message exchange takes place.
  • 22.  In this scheme, multiple senders send messages to multiple receivers.  The one-to-many and many-to-one schemes are implicit in this scheme.  Hence the issues related to one-to-many and many- to-one schemes, which already been described above, also apply to the many-to-many communication scheme.  In addition, an important issue related to many-to- many communication scheme is that of ordered message delivery.
  • 23.  The commonly used semantics for ordered delivery of multicast messages are : 1) Absolute ordering 2) Consistent ordering 3) Casual ordering