Abstract
This paper presents a short survey of contemporary work in communication models for distributed computer systems, and then discusses in detail the Remote Pipe and Procedure Model. The survey portion of the paper discusses two classes of models for distributed communication: message based models and remote procedure call models. The advantages and disadvantages of both approaches are outlined.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Birrell, A., and Nelson, B., Implementing Remote Procedure Calls, ACM Trans. on Computer Systems 2, 1 (February 1984), pp. 39–59.
Birrell, A., Secure Communication Using Remote Procedure Calls, ACM Trans. on Computer Systems 3, 1 (February 1985), pp. 1–14.
Brown, M., et. al., The Alpine File System, ACM Trans. on Computer Systems 3, 4 (November 1985), pp. 261–293.
Cheriton, D., and Zwaenepoel, W., Distributed Process Groups in the V Kernel, ACM Trans. on Comp. Systems 3, 2 (May 1985), pp. 77–107.
Gifford, D., Information Storage in a Decentralized Computer System, Report CSL-81-8, Xerox Palo Alto Research Center, Palo Alto, CA.
Gifford, D. et. al., An Architecture for Large Scale Information Systems, Proc. of the Tenth ACM Symposium on Operating Systems Principles, ACM Ops. Sys. Review 19, 5, pp. 161–170.
Herlihy, M., and Liskov, B., A Value Transmission Method for Abstract Data Types, ACM Trans. on Programming Languages and Systems 4, 4 (October 1982), pp. 527–551.
Jones, M., et. al., Matchmaker: An Interface Specification Language for Distributed Processing, Proc. of the 12th Annual ACM Symp. on Princ. of Prog. Languages, January 1985, pp. 225–235.
Liskov, B., and Scheifler, R., Guardians and Actions: Linguistic Support for Robust, Distributed Programs, ACM Trans. on Prog. Lang. and Sys. 5, 3 (July 1983), pp. 381–404.
Needham, R., and Schroeder, M., Using Encryption for Authentication in Large Networks of Computers, Comm. ACM 21, 12 (December 1978), pp. 993–998.
Nelson, B., Remote Procedure Call, Report CSL-81-9, Xerox Palo Alto Research Center, May 1981.
Postel, J., Internetwork Protocols, IEEE Trans. on Comm. COM-28, 4, pp. 604–611.
Rashid, R., and Robertson, G., Accent: A communication oriented network operating system kernel, Proc. of the Eighth Symposium on Operating System Principles, Pacific Grove, CA, Dec. 1981, pp. 164–175.
Experience with Processes and Monitors in Mesa, Comm. ACM 23, 2 (February 1980), pp. 105–117.
Voydock, V., and Kent, S., Security Mechanisms in High-Level Network Protocols, Comp. Surveys 15, 2 (June 1983), pp. 135–171.
White, J., A high-level framework for network-based resource sharing, Proc. Nat. Comp. Conf. 1976, AFIPS Press, pp. 561–570.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1987 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gifford, D.K. (1987). Communication Models for Distributed Computation. In: Paker, Y., Banatre, JP., BozyiÄŸit, M. (eds) Distributed Operating Systems. NATO ASI Series, vol 28. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-46604-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-46604-5_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-46606-9
Online ISBN: 978-3-642-46604-5
eBook Packages: Springer Book Archive