Distributed systems, Computer Networking

There are two dominant forms of building distributed systems: client-server systems, i.e. systems in which one machine acts as a server and act as clients; and peer-to-peer systems, where each host is both a server and a client. Standard web access follows the client-server model, and services such as BitTorrent follow the peer-to-peer model. However, in real life these are not completely distinct; for instance, internally Google applies some of each of these methodologies. Actually, client-server system are sometimes implemented as a chain of clients and servers, even though from the point of view of the client there's only one server.

Another possible building pattern is that in which the client communicates directly with only a server, but in the background its requests are actually processed by a cloud of machines, which actually resembles the way Google works internally. In this case, the cloud of machines  implements a system with lots of redundancy (e.g. via a big distributed ?le system). Some of the machines in the cloud hold data, and other machines hold meta-data. When some client requests, for instance, a ?le, the meta-data servers ?rst identify which other machines hold each piece of that ?le. This type of architecture represents the current trend being followed when creating large scale systems. So, in practice, we see that current successful large scale systems are a mix between client-server architectures and peer-to-peer systems, implemented with lots of storage and computational redundancy.

Posted Date: 3/13/2013 6:22:03 AM | Location : United States







Related Discussions:- Distributed systems, Assignment Help, Ask Question on Distributed systems, Get Answer, Expert's Help, Distributed systems Discussions

Write discussion on Distributed systems
Your posts are moderated
Related Questions
Control Frame: set_successor Station X wants to leave Successor S Predecessor P X sends set_successor frame to P With S as data field P changes its


Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us


Question The circuit in the figure is driven by a 9 mV amplitude signal generator with an output impedance of 2 kW. What is the output voltage amplitude from the circuit in the

What is a File server? File servers are helpful for sharing files across a network. With a file server, the client passes requests for file records over system to file server.

Q. Error Correction in Burst Error Correction? Error Correction-Burst Error Correction In its place of sending all the bits in a data unit together we can organize "N

Concept of how does the IP message finally reassemble?

IP plus port (IP on layer 3 and port on Layer 4 - In Encapsulation, socket base decision on Network Layer -Layer 3)

Bootp protocol normally use it in dhcp protocol, it is configured manually in order to give ip add or there relvent host. Rarp is a work just opposite of Arp. Rarp stand for rev