Open In App

Distributed Component Object Model (DCOM)

Last Updated : 22 Jul, 2020
Improve
Improve
Like Article
Like
Save
Share
Report

In the last two decades, a massive range of modifications took place in an object-oriented and distributed component-oriented paradigm. To fulfill this demand, Microsoft developed Distributed Component Object Model. DCOM can be defined as COM with inclusion of a long wire and this is an extension to Component Object Model (COM). DCOM- Distributed Component Object Model– helps remote object via running on a protocol known as the.

Object Remote Procedure Call (ORPC). 10 million people use of Windows every day in networked environments DCOM emerge as extensively used primary purpose of DCOM is to support development of components that can be dynamically activated and that can engage with every other. DCOM object model is based on implementations of interfaces.

(DCOM) both object and component paradigm consists of a number of issues.

1. Interoperability
2. Versioning
3. Language independence
4. Size and complexity of system 

Dynamic Data Exchange :
Dynamic Data Exchange or DDE, used to be designed for Microsoft Windows to enable applications to exchange information of any specific type. As DDE protocol is actually a little complicated and this complexity used to be interpreted by using many software program vendors, Dynamic Data Exchange Management Library (DDEML) was created. This library simplified interfacing with DDE protocol as well as furnished a frequent interface for all developers.

DCOM Architecture :
DCOM structure is designed for promoting software interoperability.

  • The architecture supports a “software bus” on which reusable software program components can be used and built-in with one any other seamlessly.
  • In order to furnish support for this reusable software component, complete object model is based totally on an object-based programming model.
  • Object model used to be selected due to fact of its incapability to provide inheritance.
  • This means that architecture is successful in keeping off fragile base class syndrome which exists in different models.
  • The fragile base class syndrome seems when one class inherits members and behavior of any other class.
  • Class which offers behavior and member functions is recognized as base class while other class is recognized as derived class.
  • If the member and functionality of base class modifications then behavior and member functions of derived class additionally change.
  • Changes like this end result in having to alter base class which in turn requires compilation of all dependent classes.
  • DCOM architecture shown in fig 1.0 possesses a special infrastructure as it helps continual storage.



Working of DCOM :
For working of DCOM, COM object desires to be configured effectively on both computer systems and you hardly had to uninstall and reinstall objects numerous times to get them to work effectively on a particular task. Windows Registry consists of DCOM configuration information in three identifiers i.e. CLSID, PROGID, and APPID.

  1. CLSID –
    Class Identifier or CLSID is a Global Unique Identifier or GUID to create a unique identity for an entity. Windows stores this CLSID for every setup class in a program for performing a particular task. When you want to run a class, you need right CLSID, so Windows is aware of place to go and locate program.

  2. PROGID –
    Programmatic Identifier or PROGID is a non-obligatory or you can say an optional identifier a programmer can use as an alternative for any complex and strict CLSID. PROGIDs are generally less complicated to read and can be easily understood. There are no restrictions on how many PROGIDs can have an identical name, which motives problems on occasion.

  3. APPID –
    Application Identifier or APPID is a type of unique identifier for every available app also called App IDs hel ps in securing and authenticating your apps. It identifies all of classes that are part of identical executable andpermissions required to get entry to it. DCOM can’t work if APPID isn’t correct i.e. for DCOM to work perfectly you need to have a correct APPID. You will likely get permissions errors making an attempt to create remote object, in my experience.


Previous Article
Next Article

Similar Reads

Difference between COM and DCOM
1. Component Object Model (COM) : Component object model was introduced by Microsoft in the year 1993. It is an interface standard designed for software components. It helps for the inter process communication irrespective of the programming language to be used. COM is termed as a software architecture that allows systems to be built from the diffe
2 min read
Difference between CORBA and DCOM
CORBA and DCOM are two middleware solutions for handling distributed objects. These solutions provide better commanding over distributed computing objects but the question is which technology is to be made as standard. Let us see the detailed comparison between them. 1. Common Object Request Broker Architecture (CORBA) : The Common Object Request B
3 min read
Difference Between OSI Model and TCP/IP Model
Data communication is a process or act in which we can send or receive data. For data communication two models are available. We will discuss these two models in this article and also see the differences between these two articles. OSI ModelTCP/IP ModelOSI ModelOSI stands for Open Systems Interconnection. It has 7 layers Physical layer, Data Link l
3 min read
Similarities between TCP/IP model and OSI model
Pre-Requisite: Layers of OSI Model, TCP/IP Model OSI Model or Open Systems Interconnection is an architecture of 7 layers in which each layer has its work to perform whereas TCP/IP is a concise version of the OSI Model. TCP/IP Model consists of 4 layers rather than the 7 layers of the OSI Model. There are so many similarities between the TCP/IP mod
5 min read
What is OSI Model? - Layers of OSI Model
OSI stands for Open Systems Interconnection, where open stands to say non-proprietary. It is a 7-layer architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit the data from one person to another across the globe. The OSI reference model was developed by ISO - 'International Organiza
13 min read
This is exactly why we still use the OSI model when we have TCP/IP Model
What is the OSI Model?OSI is an acronym for Open Systems Interconnection. The International Organization for Standardization (ISO) created the OSI model (ISO). It's a model for how applications communicate over the internet. In order to facilitate interoperability between diverse devices and applications, the OSI model describes computing functions
10 min read
Difference between Component and Object
1. Component : A component is a collection of objects that furnish a set of offerings to different systems. They have many elements in frequent with objects.Components can also be run both locally or in a distributed fashion. Many examples of locally run components exist and are oftentimes used to supply precise performance to exterior programs.Com
2 min read
File Caching in Distributed File Systems
File caching enhances I/O performance because previously read files are kept in the main memory. Because the files are available locally, the network transfer is zeroed when requests for these files are repeated. Performance improvement of the file system is based on the locality of the file access pattern. Caching also helps in reliability and sca
12 min read
Distributed Objects Computing: The next generation of client-server computing
Software technology is in the midst of a major computational shift towards distributed object computing DOC. Distributed computing is poised for a second client-server revolution, a transition from first generation client-server era to the next generation client-server era. In this new client-server model, servers are plentiful instead of scarce(be
2 min read
What is DDoS(Distributed Denial of Service)?
Distributed Denial of Service (DDoS) is a type of DOS attack where multiple systems, which are trojan infected, target a particular system which causes a DoS attack. A DDoS attack uses multiple servers and Internet connections to flood the targeted resource. A DDoS attack is one of the most powerful weapons on the cyber platform. When you come to k
6 min read
Article Tags :