CAN Implementation Sub-project: Content Manager Amol Bakshi CSCI 599 14 October 2002.

Slides:



Advertisements
Similar presentations
SOAP.
Advertisements

Distributed Object & Remote Invocation Vidya Satyanarayanan.
Remote Method Invocation
Approaches to EJB Replication. Overview J2EE architecture –EJB, components, services Replication –Clustering, container, application Conclusions –Advantages.
Copyright W. Howden1 Lecture 7: Functional and OO Design Descriptions.
10/31/2007cs6221 Internet Indirection Infrastructure ( i3 ) Paper By Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Sharma Sonesh Sharma.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
S A B D C T = 0 S gets message from above and sends messages to A, C and D S.
Performed by:Gidi Getter Svetlana Klinovsky Supervised by:Viktor Kulikov 08/03/2009.
02/02/2004CSCI 315 Operating Systems Design1 Interprocesses Communication Notice: The slides for this lecture have been largely based on those accompanying.
The Architecture of Transaction Processing Systems
02/01/2010CSCI 315 Operating Systems Design1 Interprocess Communication Notice: The slides for this lecture have been largely based on those accompanying.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
CONTENTS Workflow & WFMS Need for workflow instances scheduling Need to schedule Integrating WFMSs with PM Requirements for WFMS.
IETF 80: NETEXT Working Group – Logical Interface Support for IP Hosts 1 Logical Interface Support for IP Hosts Sri Gundavelli Telemaco Melia Carlos Jesus.
SNMPv3 Yen-Cheng Chen Department of Information Management National Chi Nan University
Service Broker Lesson 11. Skills Matrix Service Broker Service Broker, provides a solution to common problems with message delivery and consistency that.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Client/Server Software Architectures Yonglei Tao.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
IT 210 The Internet & World Wide Web introduction.
CEN Network Fundamentals Chapter 19 Binding Protocol Addresses (ARP) To insert your company logo on this slide From the Insert Menu Select “Picture”
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
Silberschatz, Galvin and Gagne  2002 Modified for CSCI 399, Royden, Operating System Concepts Operating Systems Lecture 12 Communicating over.
Integration Broker PeopleTools Integration Broker Steps –Introduction & terminologies –Application Server PUB/SUB services (Application Server)
Lecture Set 14 B new Introduction to Databases - Database Processing: The Connected Model (Using DataReaders)
Needs for Accessing Database To make your web site more dynamic and maintainable, you can display information on your web pages that are retrieved from.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
MobileMAN Internal meetingHelsinki, June 8 th 2004 NETikos activity in MobileMAN project Veronica Vanni NETikos S.p.A.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
1 WS-Routing. 2 Why WS-Routing? SOAP (by itself) doesn’t define a message path –Header blocks describe functions to be performed by intermediaries that.
Mainframe (Host) - Communications - User Interface - Business Logic - DBMS - Operating System - Storage (DB Files) Terminal (Display/Keyboard) Terminal.
Chapter 19 - Binding Protocol Addresses
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
SCALABLE EVOLUTION OF HIGHLY AVAILABLE SYSTEMS BY ABHISHEK ASOKAN 8/6/2004.
Client Call Back Client Call Back is useful for multiple clients to keep up to date about changes on the server Example: One auction server and several.
Lecture Set 14 B new Introduction to Databases - Database Processing: The Connected Model (Using DataReaders)
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Architecture Models. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
CAN Implementation– Proxy Module Qun Cao October 14, 2002.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
Eric Tryon Brian Clark Christopher McKeowen. System Architecture The architecture can be broken down to three different basic layers Stub/skeleton layer.
Networking Material taken mainly from HowStuffWorks.com.
Communication Protocol Engineering Lab.
ERP Course: Enterprise Application Integration Readings: Chapter 3 from Gustavo Alonso et al Peter Dolog dolog [at] cs [dot] aau [dot] dk E2-201 Information.
EPICS to TANGO Translator Rok Šabjan on behalf of Rok Štefanič Presented at ICALEPCS, Knoxville, October.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
HNDIT Rapid Application Development
Seminar on Service Oriented Architecture Distributed Systems Architectural Models From Coulouris, 5 th Ed. SOA Seminar Coulouris 5Ed.1.
Secure middleware patterns E.B.Fernandez. Middleware security Architectures have been studied and several patterns exist Security aspects have not been.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
Copyright © 2004, Keith D Swenson, All Rights Reserved. OASIS Asynchronous Service Access Protocol (ASAP) Tutorial Overview, OASIS ASAP TC May 4, 2004.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
1 Binding Protocol Addresses (ARP ). 2 Resolving Addresses Hardware only recognizes MAC addresses IP only uses IP addresses Consequence: software needed.
ADO .NET from. ADO .NET from “ADO .Net” Evolution/History of ADO.NET MICROSOFT .NET “ADO .Net” Evolution/History of ADO.NET History: Most applications.
C# 1 CSC 298 ADO.NET. C# 2 ADO.NET  A data access technology that maps very well to the world of the web (disconnected architecture)  data is retrieved.
Lecture 14 Mobile IP. Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile.
Topic 4: Distributed Objects Dr. Ayman Srour Faculty of Applied Engineering and Urban Planning University of Palestine.
6. Application Server Issues for the Project
ADO.NET Framework.
MVC Architecture, Symfony Framework for PHP Web Apps
Remote Method Invocation
Server Concepts Dr. Charles W. Kann.
CHAPTER 3 Architectures for Distributed Systems
Lec 5 Layers Computer Networks Al-Mustansiryah University
Lecture Set 14 B new Introduction to Databases - Database Processing: The Connected Model (Using DataReaders)
Distribution Infrastructures
Message Queuing.
Ch 17 - Binding Protocol Addresses
Presentation transcript:

CAN Implementation Sub-project: Content Manager Amol Bakshi CSCI October 2002

CSCI599, Oct. 14, Amol: 2 of 8 Role of Content Manager in a CAN All pairs are ultimately stored in a database (such as Microsoft Access) Lookup, Add, and Delete operations access the “target” database Content Manager (CM) is a wrapper around the database that executes the operations on the target node

CSCI599, Oct. 14, Amol: 3 of 8 CAN Implementation Communication Engine Content Manager Routing Manager Message Dispatcher Proxy CLIENT DB next-node original

CSCI599, Oct. 14, Amol: 4 of 8 CM Pseudo-code Invoked by Message Dispatcher with message format ProcessMsg(byte[] message){ –Check if current node is target node –If it is, access the node database –Perform add/delete/lookup operation on database –Via Comm.Engine, send the result of operation to originating proxy –If not, forward message as-is to routing manager }

CSCI599, Oct. 14, Amol: 5 of 8 Database Access in C#/.NET OleDbConnection cConn = new OleDbConnection(“Provider=Microsoft.Net.OLEDB.4.0;Data Source=c:\\can.mdb”); OleDbCommand cComm = new OleDbCommand(“Select * from can”, cConn); OleDbDataAdapter canDA = new OleDbDataAdapter(); canDA.SelectCommand = cComm; DataSet canDS = new DataSet(“CANdata”); canDA.Fill(canDS, “KeyValInfo”);

CSCI599, Oct. 14, Amol: 6 of 8 CM and Other CAN Components (1) CM and Proxy –No direct interaction between CM and Proxy –CM of the target node will indirectly contact the originating Proxy with the result of the operation –IP addr and channel ID of Proxy encapsulated in the Message CM and Comm. Engine (CE) –All communication routed through CE –CM invokes SendMsg of CE to contact original Proxy (described above)

CSCI599, Oct. 14, Amol: 7 of 8 CM and Other CAN Components (2) CM and Message Dispatcher (MD) –CM provides ProcessMsg interface to MD –CM does not call any service of the MD CM and Routing Manager (RM) –CM needs to know if the current node is the target node (esp. important for ‘add’ operation) –RM maintains virtual topology and maps to physical topology; hence can provide this information –CM invokes a TargetNode(key) function from RM with a boolean return value

CSCI599, Oct. 14, Amol: 8 of 8 Design Issue: Blocking or Non-Blocking? Blocking calls within components –Easy to implement –Eventually terminate (at CommEngine?) –e.g. MD -> CM -> RM -> CE Non-blocking calls –greater throughput –harder to implement –overload CE(?)