Networked Graphics Building Networked Virtual Environments and Networked Games Chapter 8: Middleware and Object-Sharing Systems.

Slides:



Advertisements
Similar presentations
Networked Graphics Building Networked Virtual Environments and Networked Games Chapter 4: More Than Two.
Advertisements

IEEE Virtual Reality 2011 Introduction to Networked Graphics Anthony Steed Part 4: Application Support Tools Research Issues.
Add State Reserve (1S) Grants Chapter 4. Add State Reserve (1S) Grants 4-2 Objectives Understand How to Add a State Reserve (1S) Grant Enter Grant Plan.
Kerberos Authentication for Multi-organization Cross-Realm Kerberos Authentication User sent request to local Authentication Server Local AS shares cross-realm.
Writing Routine Requests and Positive Messages Chapter 8.
Consistency in NFS and AFS. Network File System (NFS) Uses client caching to reduce network load Built on top of RPC Server cache: X Client A cache: XClient.
Local Area Networks Outline –Basic Components of a LAN –Network Architectures –Topologies and LAN Technologies –Selecting a LAN –Improving LAN Performance.
List servers (listservs) Skills: subscribe to a list server (listserv), send messages to a list and unsubscribe IT concepts: list server, subscription,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
SACMAT02-1 Security Prototype Defining a Signature Constraint.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 4: Dynamic Host Configuration Protocol.
Worksheet: Mapping your authorization and consent use cases to the UMA architecture 17 Aug 2014 Questions? Send mail to
New Filing Procedures DeLong Grant Law Partners. Referencing Number System  Include these three parts in the number Client last name Date file opened.
Internet-Based Client Access
HTTP client wide area network (Internet) HTTP proxy HTTP server HTTP gateway firewall HTTP tunnel Copyright Springer Verlag Berlin Heidelberg 2004.
Ophelia User-friendly Network Multi-player Game Engine Albert Öhrling.
Introduction to Networked Graphics Part 4 of 5: Bandwidth Management & Scalability.
Slide 1 Physical Architecture Layer Design Chapter 13.
Networked Graphics Building Networked Virtual Environments and Networked Games Chapter 12: Scalability.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
A system sharing informati on and services with individuals and groups webster.com/dictionary/ne tworking webster.com/dictionary/ne.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 18: Replication.
Slides for Chapter 14: Replication From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 3, © Addison-Wesley 2001.
Kerberos. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open source or in supported commercial software.
Author - Title- Date - n° 1 Partner Logo EU DataGrid, Work Package 5 The Storage Element.
The Client This is the overview of the client that manages the rendering of scenes, interaction, interpolation of local model, and inter- action with the.
IS 4506 Establishing Microsoft NNTP Service.  Overview NNTP Service benefits How the NNTP Service works Configuring and managing NNTP Service.
© 2010 Computer Science Faculty, Kabul University HTTP CONTINUED… 4 TH LECTURE 2, May, 2010 Baseer Ahmad Baheer.
1 Workgroup and Workflow Technologies CDO for Exchange 2000 Server CDO for Exchange Management Workflow for Exchange 2000 Server.
Maintain and Modify Grants Chapter 8. Maintain and Modify Grants 8-2 Objectives Understand How to Modify an Approved Grant Learn How to Edit Budget Information.
Networked Graphics Building Networked Virtual Environments and Networked Games Issues in Networking Graphics.
Networked Graphics Building Networked Virtual Environments and Networked Games Chapter 13: Application Support Issues.
Add National Reserve (1N) Grants Chapter 5. Add National Reserve (1N) Grants 5-2 Objectives Understand How to Add a National Reserve (1N) Grant Enter.
Add Formula Grants Chapter 3. Add Formula Grants 3-2 Objectives Understand How to Add a Formula Grant Enter Grant Plan Information Enter Program Funding.
SERVER I SLIDE: 3. SERVER I Topic for tomorrow: Chapter 3: Configuring Hyper-V ■■ Objective 3.1: Create and configure virtual machine settings (Group.
PoC client A SIP/IP Core A PoC server A (participating & controlling) 3. RINGING 2. INVITE 1. INVITE 8. OK 7. OK PoC Client A Home Network & Controlling.
1 Microsoft Outlook Web Access Outlook Web Access Overview Outlook Web Access Environments.
1 Chapter Overview Understanding the Authentication Process Understanding the Authorization Process Creating and Managing Logins.
Networked Graphics Building Networked Virtual Environments and Networked Games Chapter 11: Latency and Consistency.
Endpoints Lesson 17. Skills Matrix Endpoints Endpoints provide a reliable, securable, scalable messaging system that enables SQL Server to communicate.
Networked Graphics Building Networked Virtual Environments and Networked Games Chapter 2: One on one (101)
Network Concept. Networking Techniques Switch Network.
Computer Games Technology Group 2 B B B
Internet The internet is the largest computer network system in the world. It consists of many smaller networks connected together by a global public.
Informing AAA about what lower layer protocol is carrying EAP
CCNA 3 Chapter 10 Virtual Trunking Protocol
Pertemuan 12 Virtual Trunking Protocol
Chapter 7: Introduction to Data Communications and Networking
Extending Java RMI for Dynamic Reconfiguration
Application Layer Functionality and Protocols
Application Layer Functionality and Protocols
File service architecture
Application Layer Functionality and Protocols
Application Layer Functionality and Protocols
Chapter 12: Physical Architecture Layer Design
PART VI Application Layer.
Application Layer Functionality and Protocols
Application Layer Functionality and Protocols
Connecting to the Network
Networking for Home and Small Businesses – Chapter 6
Application Layer Functionality and Protocols
Application Layer Functionality and Protocols
Application Layer Functionality and Protocols
LAN Switching and Wireless – Chapter 4
Proxy Pattern Definition of “Proxy”: Authority or power to act for another Original Gang of Four pattern, much used Stands in for a “real object” (similar.
List servers (listservs)
Realizing a Peer-to-Peer System using a common API
Session 1 – Introduction to Information Security
Communication.
IS 4506 Configuring the FTP Service
Presentation transcript:

Networked Graphics Building Networked Virtual Environments and Networked Games Chapter 8: Middleware and Object-Sharing Systems

OBJECT SHARING SYSTEMS

Client A Objects Application Network Object-Sharing Client B Objects Application Network Object-Sharing Shared Objects

Client A Objects Application Network Object-Sharing Client B Objects Application Network Object-Sharing

RAKNET

Client A ReplicaObjects Application ReplicaManager 1 2 Server ReplicaObjects Application ReplicaManager 4 Client C ReplicaObjects Application ReplicaManager Client B ReplicaObjects Application ReplicaManager

Client A ReplicaObjects Application ReplicaManager Server ReplicaObjects Application ReplicaManager 1 Client C ReplicaObjects Application ReplicaManager Client B ReplicaObjects Application ReplicaManager

BOIDS USING OBJECT SHARING

GENERAL OBJECT SHARING

OWNERSHIP

Client AClient BClient C

Client AServer Client B Request Move Object O to XYZ Move Object O to XYZ Client A attempts to move Object O to XYZ Object O moves to XYZ Server authorizes move

Client AServer Client B Request Move Object O to XYZ 2 Move Object O to XYZ 2 Client A moves Object O from XYZ 1 to XYZ 2 Client A confirms moves Object O moves to XYZ 2 Server authorizes move

Client AServer Client B Request Move Object O to XYZ 2 Reject Movement Client A moves Object O from XYZ 1 to XYZ 2 Client A moves Object O from XYZ 2 back to XYZ 1 Server refuses move

Client AServer Client B Request Lock Object O Grant Lock Object O Client A requests lock on Object O Client A gets lock and makes move to XYZ 1 Object O moves to XYZ 1 Server grants lock Move Object O to XYZ 1 Client A makes move to XYZ 2 Object O moves to XYZ 2 Move Object O to XYZ 2

Client AServer Client B Request Lock & Move Object O to to XYZ 2 Grant Lock Object O Client A requests lock and move Object O from XYZ 1 to XYZ 2 Client A gets lock and makes move to XYZ 2 Object O moves to XYZ 1 Server grants lock Move Object O to XYZ 1 Object O moves to XYZ 2 Move Object O to XYZ 2

SCENE-GRAPHS, OBJECT-SHARING AND MESSAGES

SUMMARY