Chapter 13: internet and distributed application services

Ace your homework & exams now with Quizwiz!

Internet Inter -ORB Protocol (IIOP)

A component message - passing protocol

standard web protocols and services

Protocol- An optional header specifying the resources access protocol Host-the IP address or register name of an Internet host computer or device Port- An optional port number that, together with an IP address, specifies a socket Resource- The complete pathname to a resources on the host

Lightweight diretory access protocol( LDAP)

a basis for X.500 standards, it is which the Internet Engineering Task Force (IETF) adopted as sa formal internet standard. LDAP is a widely used, although not all products have all features of the most recent updates

Component object model plus (COM+)

a microsoft specification for component interoperability, has its roots in older micorosoft specifications, including object linking and embedding (ole) and the component object model (COM)

remote procedure call (RPC)

a protocol where a process on one machine can call a process on another machine. As with function or procedure calls in a single program, the calling process follows these steps: 1) pass parameters to the called process 2) wait for the called process to complete its task 3) Accept parameters back from the called process 4) resume execution with the instruction following the call

dynamic connections

a resources user asks fro a resource, and if it isn't found in the local resources registry, the resource locator searches for it in external locations

object request broker (ORB)

a service that maintains a component directory and routes messages between components

before accesing remote resources..

a user or system administrator must know the server and resource names to create a static connection within the resource registry

view layer

accepts user input and formats and displays processing results

file transfer protocol(FT)

and older web protocol, which HTTP is an extention. It specifies a client/server request and reponse language for copying files from one internet to host to another.

n layers or n tier architecture

architectures having more than three layers

static connection

are difficult to initialize and maintain because the OS must be configured to establish a connection each time it starts

directory services

are integral components of all operating systesm

higher levle protocols

are often layered above interprocess communication protocols

layers

can also be replicated in different forms. A single business logic layer might interact with multiple view layers from different applications

connections to remote resources

can be static or dynamic

business logic layer

carries out the rules and procedures of business processing

tiers:

data layer, business logic layer, view layer

Platform as a service (PaaS)

describes an architectural approach in which an organization rents acces to system software and hardware on which it installs its own application software and other services

directory services

describes middleware: 1) stores the name and network address of distributed resources 2) responds to directory queries 3) accepts directory updates 3) synchronizes replicated or distributed directory copies

middleware

describes software that glues together parts of a client/server of multitier application. Its a wide ranging system software category because applications connection and communication requirements vary.

distributed computing or distributed processing

distributing parts of an information system across many computer systems and locations

protocol advantage

divide the task of network interaction into several well defined pieces that can be implemented installed and updated separately. 2 2) provide flexibility needed to keep up with rapid changes in protocol standards 3) insulate application programs and many portions of the OS from detail of low level network communication protocols and physical network implementation, which ensure software portability across a wide range of network protocols and transmission data.

three layer architecture or three tier architecture

divides application software into the following client and server processes called layers or tiers

Simple mail transfer protocol( SMTP)

earliest email protocol, which defines how text messages are forward and routed between internet hosts.

peer to peer applciation process

either side of the applicaton can create it. A client or peer opens a named pipe as a network resources and reads or writes it as though it were a file on a shared directory. A server or peer on teh machine where the name pipe was created reads and writes the pipe as though it were a local file

Extensible Markup Language(XML)

extends HTML to describe the structure, format, and content of documents

Multipurpose Internet Mail Extensions (MIME)

extension of SMTP, its a protocol to allow including nontext files in email messages. Also used in HTTP and XML

second or third premises

if every local resources might be needed by remote users or processes, every computer is potentially both a client a server

advatages of P2P

include improved scalability and reduicng the number of computer and network connectiosn needed to support and application

Hyptertext transfer protocol (HTTP0

is a companion protocol to HTML and XML that specifies the language by which clients request doscuments and how servers respond to those requests

client/server architecture

is a method of organizing software to provide and access distributed information and computing resources. It divides software into two classes: client and server.

named pipe

is a pipe with two additional features 1) a name thats permanently placed in a file system directory 2) the capability to communicate between process on different computers

pipe

is a region of shared memory through which multiple processes executing on the same machine can exchange data. A) commonly used for communication between OS components, for queuing requests to an OS service and for exchanging messages between components in a large program.

HTTPS

is a secure version of HTTP that encrypts HTTP requests and responese. HTTP/2 is the latest HTTP Version

component

is a standardized interchangeable software module with the folowing characteristic 1)is executable 2) has a unique identifier 3) has a well known interface

socket

is a unique combination of an IP address and a port nunmber separated by a colon

software as a service (SaaS)

is a web based architectural approach in which users interact via web browser or other web enabled view layer with application software provided by a third party.

Secure Shell (SSH)

is an improved version of Telnet that encrypts data flowing between client and server

Simple Object Access Protocol (SOAP)

is an open minded, developed by the world wide web consortium for distributed object interaction that attempts to address the shortcoming of both CORBBA and COM+

remote desktop protocol(RDP)

is proprietary microsoft protocol that supports remote command layers interface with a full graphical user interface

Infrstructure as a service (Iaas)

is similar in amn yways to PaaS but the service provider supplies little or no system software.

OS

manages data movement between processe and shared memory region

data layer

manages stored data, usually in databases

server

manages system resources and provides access to theses resources through a well defined commnication interface

resource rgistry

resource locater maintains a local registry containing the names and locations of known resources and services. When local service provider processes are started they register themselves with the resource locator, which updates the resourse registry accordingly. Resources requests are checked against this registry.

resources distributed across network nodes...

resource users and providers must have some way of finding on another

distributed computing environment (DCE)

services into COM and called the resulting specification the distributed component object model (Dcom)

location transparency or network transparency

software and user interfaces are simplified by providing a common method of accessing both local and remote resources.

protocol stack

software implementing the transport, internet, and network interface layers of this model is commonly called protocol stack

common object request broke architecture (CORBA)

specifies the middleware objects use to interact across, networks and has these two key components

network OS directiories

stores information about: 1) registers users and their permissions to access directory objects 2) shared hardware resources such as printers 3) shared files, databases, and programs 3) computer systems and specialized hardware devices such as network storage appliances

cloud computing

summarizes new approaches to distributing and accessing software and hardware services across the internet.

peer to peer (P2P) architecture

the roles of client and server are combines into a single application or group of related applications

variation of client/server architecture

three layer architecture or three tier architecture

Post Office Protocol 3 (POP3) , Internet MEssage Access Protocol 4 (IMAP4)

today's email server is base on one or both. POP3 standardizes the interaction between email clients and servers so that client and server can run on different internet hosts. IMAP4 extends POP3 to permanently stores and manage e mail messages on the server which enables users to access stored e mail from any internet host.

Domain Name System (DNS0

used on the internet, is one example of dynamic connection. Every IP packet carries the destination node's IP address. Because nearly all remote services accesses uses internet protocols, finding the IP addresses of servers and P@P nodes with needed resources must be the first step to sending access request messages.

telenet protocol

users on one internet host can interact with the OS commnad layer of another host. Emulates a charcter based display device and keyboard and is limited to interacting and command line interfaces such as Windows Cmd.exe and the UNIX Bourne Shell

client

uses the communication interface to request resources and the server responds to these requests

service -oriented architecture (SOA)

was cointed to describe the design philosophy

named pipe creations

when its created, a directory entry is also created in the local file system. Programs can read or write the name pipe as they would read or write an ordinary file. Typically the server side of a client/server application creates the named pipe.

lower level P2P protocols and standards

which enable processes to communicate synchronously across a network. System software often uses these protocols to exchange data and coordinate activities. Distributed applications usually use higher level protocols,


Related study sets

Chapter 7 - Personality Stability, Development , and Change

View Set

Occupational Safety and Health Administration

View Set

Female Reproductive Disorder Practice Questions NCLEX

View Set

Chapter 19 - Hardware Support A+, Hardware Final Prep

View Set