09 Distributed Object-Based Systems
09 Distributed Object-Based Systems
Chapter 09
(version 27th November 2001)
01 Introduction
02 Communication
03 Processes
04 Naming
05 Synchronization
06 Consistency and Replication
07 Fault Tolerance
08 Security
09 Distributed Object-Based Systems
10 Distributed File Systems
11 Distributed Document-Based Systems
12 Distributed Coordination-Based Systems
00 – 1 /
Distributed Object-Based Systems
CORBA
DCOM
Globe
Background:
Local OS Local OS
Network
Client application
1. Call by the
application
Client Callback 4. Call by the ORB
proxy interface
3. Response from server
Client
ORB
2. Request to server
Client application
1. Call by the 4. Call by the
application application
Client Polling
proxy interface
3. Response from server
Client
ORB
2. Request to server
Client application
Client
proxy Invocation request
Request-level
interceptor
Client
ORB
Message-level
interceptor
Local OS
To server
Tagged Profile
Interoperable Object Reference (IOR)
Repository Profile
Profile
identifier ID
Network
Invocation
Grouping
ActiveX Documents Scripting
(Controls)
In-place
Document editing
OLE Embedding
linking Drag
and drop
Interprocess
data transfer Persistent Object
Persistent references activation
COM storage
Class SCM
SCM Client application object Object
Local OS Local OS
Registry Registry
Network
Microsoft RPC
Supplier Consumer
Event Consumer
Interface object
containing m_event
m_event
Object
Invocation Invocation implementing
is stored is passed m_event
to consumer
Event
store
Process A Process B
Marshaled
Client application client proxy Client application
Object
Object
stub
Object server
DNS
Local object
Process
Network
Interface
Control
subobject
Replication Semantics
subobject subobject
Communication
subobject
Communication
with other local
objects
Control
subobject
Replication Semantics
subobject subobject
Communication
subobject
Communication
with other local
objects
5. Make contact
– “slave/master-slave/tcp/ip”
0
Method Description
Called to synchronize replicas of the se-
mantics subobjects, obtain locks if neces-
! sary, etc.
Provide marshaled arguments of a specific
method, and pass invocation to local ob-
E! jects in other address spaces
Called after the control subobject has in-
voked a specific method at the semantics
subobject
Security domain of B
Principal object
of process B
Process B
7
Local object B
6
Distributed
shared 5
object Security domain of A
2 Kerberos
1
Local object A
4 3
Process A
Principal object
of process A