Introduction to
OSF DCE


Preface

1. Overview of DCE

1.1 Why Distributed Computing?

1.1.1 Why DCE?

1.1.2 Potential Users of DCE

1.2 Models of Distributed Computing

1.2.1 The Client/Server Model

1.2.2 The Remote Procedure Call Model

1.2.3 The Data Sharing Model

1.2.4 The Distributed Object Model

1.3 Architectural Overview of DCE

1.3.1 Overview of DCE Technology Components

1.3.2 The DCE Cell

1.3.3 Integration of the DCE Technology Components

1.3.4 Relationship of DCE to Network and System Services

1.3.5 DCE Internationalization

2. DCE Configuration

2.1 Introduction to DCE Configuration

2.2 Basic Configuration Components

2.3 DCE Machine Configuration Examples

2.3.1 DCE User Machine Configuration

2.3.2 DCE Administrator Machine Configuration

2.3.3 DCE Server Machine Configuration

2.4 DCE Cell Configuration Examples

2.4.1 A Simple DCE Cell

2.4.2 A DCE Cell with DFS

2.4.3 A Connected DCE Cell

3. DCE Technology Components

3.1 DCE Threads

3.1.1 What is DCE Threads?

3.1.2 End User's Perspective

3.1.3 Programming with DCE Threads

3.1.4 DCE Threads Administration

3.1.5 Additional Information on DCE Threads

3.2 DCE Remote Procedure Call

3.2.1 What is DCE RPC?

3.2.2 End User's Perspective

3.2.3 Programming with DCE RPC

3.2.4 DCE RPC Administration

3.2.5 How an RPC Call Works

3.2.6 System Independence

3.2.7 Additional Information on RPC

3.3 DCE Directory Service

3.3.1 DCE Directory Service Architecture

3.3.2 DCE Cell Directory Service

3.3.3 DCE Global Directory Service

3.3.4 DCE Global Directory Agent

3.3.5 The Directory Service Interfaces

3.4 DCE Distributed Time Service

3.4.1 What is DTS?

3.4.2 End User's Perspective

3.4.3 Programming with DTS

3.4.4 DTS Administration

3.4.5 Interaction with the Network Time Protocol

3.4.6 Additional Information on DTS

3.5 DCE Security Service

3.5.1 What is the DCE Security Service?

3.5.2 How DCE Security Works

3.5.3 End User's Perspective

3.5.4 Programming with DCE Security

3.5.5 DCE Security Service Administration

3.5.6 DCE Security and Kerberos

3.5.7 Secure Remote Utilities

3.5.8 The Generic Security Service API

3.5.9 The Public Key Certification API

3.5.10 Additional Information on DCE Security

3.6 DCE Distributed File Service

3.6.1 What is DFS?

3.6.2 DFS Configuration

3.6.3 End User's Perspective

3.6.4 Programming with DFS

3.6.5 DFS Administration

3.6.6 Additional Information on DFS

3.7 DCE/File-Access

3.7.1 What is DCE/File-Access?

3.7.2 End User's Perspective

3.7.3 DCE/File-Access Administration

3.7.4 Additional Information on DFS

3.8 DCE Cross-Component Facilities

3.8.1 Host Services

3.8.2 Application Message Service

3.8.3 Serviceability

3.8.4 Backing Store Databases

3.9 The DCE Control Program

3.10 Two DCE Application Examples

The greet Application: An Implementation Using DCE RPC

The greet Application: An Implementation Using DCE DFS

4. Integration of DCE Technology Components

4.1 Integration Matrix

4.2 Integration by Technology Component

4.3 Implications of Mutual Dependencies

A. Overview of DCE Documentation

A.1 DCE Documentation

A.2 Reading Paths

B. List of Acronyms and Abbreviations