Define remote procedure call (rpc), Computer Networking

Assignment Help:

RPC adumbrates the intricacies of the network by using the ordinary procedure call mechanism familiar to each programmer. A client process calls a function on a remote server and suspends itself upto it gets back the results. Parameters are passed like in any ordinary processes. The RPC, like ordinary processes, is synchronous. The process that issues the call waits upto it gets the results.

Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends it to the remote server. The server receives the request, unpacks the parameters, calls the processes, and sends the reply back to the client. It is a telephone-like metaphor.

 


Related Discussions:- Define remote procedure call (rpc)

Itc597, restore the scrambled bits to their original order

restore the scrambled bits to their original order

Line layer - sonet sdh , Line Layer The line layer provides the synchr...

Line Layer The line layer provides the synchronization multiplexer, multiplexing and automatic  protection switching for the layer . primary  concerned with the  reliable trans

What do you mean by platform independence, What do you mean by platform ind...

What do you mean by platform independence? Platform independence means that we can write and compile the java code in one platform (eg Windows) and can implement the class in a

Managing and securing the web utility of the router, Managing and Securing ...

Managing and Securing the Web Utility of the Router Step 1: Configure web access. Navigate to the Administration section. Change the router password to cisco. For Web Uti

Write down the purpose of arp?, Address Resolution Protocol resolves the MA...

Address Resolution Protocol resolves the MAC address if the IP address is known. It is a layer 3 protocol.

Briefly explain three benefits of networking, Question 1 What are the as...

Question 1 What are the aspects you should consider while creating a showreel? Question 2 What are the different patterns of writing a resume? Elaborate each of them wit

Wireless access - computer network, Wireless Access Wireless access co...

Wireless Access Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless an

Briefly describe three security requirements of an agent, QUESTION (a) ...

QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd