Distributed systems, Computer Networking

There are two dominant forms of building distributed systems: client-server systems, i.e. systems in which one machine acts as a server and act as clients; and peer-to-peer systems, where each host is both a server and a client. Standard web access follows the client-server model, and services such as BitTorrent follow the peer-to-peer model. However, in real life these are not completely distinct; for instance, internally Google applies some of each of these methodologies. Actually, client-server system are sometimes implemented as a chain of clients and servers, even though from the point of view of the client there's only one server.

Another possible building pattern is that in which the client communicates directly with only a server, but in the background its requests are actually processed by a cloud of machines, which actually resembles the way Google works internally. In this case, the cloud of machines  implements a system with lots of redundancy (e.g. via a big distributed ?le system). Some of the machines in the cloud hold data, and other machines hold meta-data. When some client requests, for instance, a ?le, the meta-data servers ?rst identify which other machines hold each piece of that ?le. This type of architecture represents the current trend being followed when creating large scale systems. So, in practice, we see that current successful large scale systems are a mix between client-server architectures and peer-to-peer systems, implemented with lots of storage and computational redundancy.

Posted Date: 3/13/2013 6:22:03 AM | Location : United States

Related Discussions:- Distributed systems, Assignment Help, Ask Question on Distributed systems, Get Answer, Expert's Help, Distributed systems Discussions

Write discussion on Distributed systems
Your posts are moderated
Related Questions
iLab 2: Office Network Expansion Connect to the iLab here. Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See "Due Da

Control Frames for Lost Tokens If station goes down ... token lost Predecessor listens for data frame or token Noticing none, retransmits token Sends whofoll

What do you mean by OSI? The Open System Interconnection (OSI) reference model explains how information from a software application in one computer moves by a network medium to

In Windows 2000, a domain describes both an administrative boundary and a security boundary for a collection of objects that are relevant to a particular group of users on a networ

QUESTION a) National regulations require the availability of the following services for all IP to PSTN, PSTN to IP, and IP to IP calls. Name any three types of these features

Vector-Distance algorithm illustrated in more detail below: Packet switches wait for next update message and they goes by entries in packet. If entry has least path to destinat

Question: (a) With mobile telecommunications providing an important engine for growth, continuing to stimulate growth and to ensure mobiles remain affordable for all, will re

Calculate data bandwidth requirements from and to each site.

What is the difference between a JDK and a JVM? JDK is Java Development Kit which is for development purpose and it contains execution environment also. But JVM is purely a

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4