{"id":145,"date":"2011-07-22T18:08:58","date_gmt":"2011-07-22T18:08:58","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=145"},"modified":"2015-05-03T08:15:56","modified_gmt":"2015-05-03T08:15:56","slug":"remote-function-calls","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/remote-function-calls\/","title":{"rendered":"RFC"},"content":{"rendered":"<p><span style=\"color: #0000ff;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #4c4c4c;\"><!--more--><br \/>\nCommunication between systems in an SAP environment can be between two SAP Systems or between an SAP system and a non-SAP system. Remote Function Call (RFC) is used for communication between two SAP Systems. \u00a0An RFC can also be used for communication within a system.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\"> RFC is an interface based on CPI-C (<strong>Common Programming Interface for Communication<\/strong>) protocol.<\/span><br \/>\n<\/span><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #4c4c4c;\">Describe the synchronous and asynchronous communication:<\/span><\/h3>\n<p><strong><!--more--><br \/>\n<\/strong><br \/>\n<strong><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\">Communication Types:<\/span><\/span><br \/>\n<\/strong><br \/>\n<span style=\"color: #0000ff;\">(a) <strong>Synchronous Communication:<\/strong>\u00a0<span style=\"color: #4c4c4c;\">Synchronous Communication is implemented where there is a need for immediate return of data (response) from the receiving system to the sender system. The receiving system should be active at the time this communication is made so that it can process the function call at that very time.<\/span><\/span><\/p>\n<p><span style=\"color: #4c4c4c;\"><!--more--><br \/>\nThis communication is very helpful when real-time response is required from the destination system.<\/span><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff;\">(b) <strong>Asynchronous Communication: <\/strong><span style=\"color: #4c4c4c;\">In Asynchronous Communication, the receiving system may or may not be available to receive the function call request made from the sender system. The function call can be processed at a later time when the receiving system gets available. Till that time the function call remains in an outbound queue of the sending system and the call is repeated at regular intervals until the receiving system gets available to process the request.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff;\"><!--more--><br \/>\n<\/span><\/p>\n<p><span style=\"color: #4c4c4c;\">The advantage of this communication is that the receiving system need not be available all the time to process the request especially in cases where the receiving system is temporarily unavailable due to upgrade.\u00a0<\/span><\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"text-decoration: underline;\"><strong><br \/>\n<\/strong><span style=\"color: #4c4c4c; text-decoration: underline;\">Types of RFCs:<\/span><\/span><\/h3>\n<p><!--more--><br \/>\n<strong><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><br \/>\nBased on Types of Communication:<\/span><\/span><br \/>\n<\/strong><!--more--><br \/>\n<strong><span style=\"color: #0000ff;\">(a) Synchronous RFC<\/span><span style=\"color: #0000ff;\">:<\/span><\/strong> <span style=\"color: #0000ff;\"><span style=\"color: #4c4c4c;\">This RFC is based on Synchronous Communication which means both the source system and destination system involved must be available at the time function call is made.<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><br \/>\n<\/span><\/p>\n<p><!--more--><br \/>\n<strong><span style=\"color: #0000ff;\">(b) Transactional RFC (tRFC):<\/span><\/strong><span style=\"color: #0000ff;\"><span style=\"color: #4c4c4c;\"> This RFC is also known as Asynchronous RFC and is based on Asynchronous Communication Method. The remote system need not be available at the time tRFC is executed.<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><br \/>\n<\/span><\/p>\n<h3><!--more--><br \/>\n<span style=\"color: #0000ff;\"><!--more--><br \/>\n<span style=\"color: #e63518;\">Next \u00a0<span style=\"text-decoration: underline;\"><em><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/sap-rfc-authorization\" target=\"_blank\"><span style=\"color: #e63518; text-decoration: underline;\">RFC Authorization Concepts<\/span><\/a><\/em><\/span><\/span><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><!--more--><br \/>\n<script type=\"text\/javascript\">\/\/ < ![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\n\n\/\/ ]]><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":38,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/145"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=145"}],"version-history":[{"count":56,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/145\/revisions"}],"predecessor-version":[{"id":2120,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/145\/revisions\/2120"}],"up":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}