Professional Documents
Culture Documents
(b)With aid of a diagram, differentiate between Remote Method Invocation (RMI) and
Remote Procedure Call (RPC).
RPC and RMI are the mechanisms which enable a client to invoke the procedure or method from the
server through establishing communication between client and server. The common difference
between RPC and RMI is that RPC only supports procedural programming whereas RMI
supports object-oriented programming.
(c)Consider a simple server that carries out client requests without accessing other servers.
Explain why it is generally not possible to set a limit on the time taken by such a server to
respond to a client request.
Standalone servers typically do not have the capability to set a limit for response times to clients
because they are not connected to other systems. This means that they cannot detect when a client
request is taking too long to be responded to and take corrective action. In order to set a limit for time
taken by standalone servers to respond to client requests, they would have to be integrated with other
systems that can monitor response time and act accordingly.
(e) Discuss different types of security threats in any distributed system and measures taken
against them.
There are multiple types of security threats, including malware, phishing, social engineering,
ransomware, hacking, and denial-of-service attacks.
To protect against security threats, it is important to ensure that all computers, servers, and data
storage devices are kept up-to-date with the latest security patches and antivirus software. It is also
important to use secure passwords, encrypt data, and use secure protocols when sending sensitive
data over a network. Additionally, it is important to educate users on good security practices, such as
avoiding clicking on suspicious links and not responding to email phishing scams.