Implementation of distributed systems, Computer Networking

Distributed systems are composed of a number of physically separate machines connected by one or more communication links. Unlike parallel systems, there's no shared clock or memory. This means that distributed systems are very loosely coupled; for example, if your web browsercrashes while visiting cnn.com, cnn.com itself will not crash. In general, we can identify several advantages in building distributed systems, such as:

 Shared resources do not need to be unnecessarily replicated. For example, you don't need to store all your ?les in all Edlab machines, but rather a distributed network ?lesystem lets it appear that your Edlab ?les are accessible on any of the Edlab machines. At the same time, you generally do not want to store all your ?les in just one machine, and so a distributed ?lesystem could use replication across multiple machines to provide fault tolerance.

 Expensive (or scarce) resources can be shared. As an example, a poster-size color laser printer can be shared via a local network. It is possible to present the same working environment to users, by keeping their ?les and pro?les on remote servers. For instance, today, as opposed to during the 1970s, each one of us owns or uses several computers, and we do not just use one big computer. Unfortunately, this is also a problem, since, say, data on our cellphone can be out of sync with data on our laptop. The good news is that distributed systems help to standardize these environments;

one possible solution to this problem, for instance, is to implement thin clients, in which the user might owns only one fast machine but lots of very simple "keyboard-screen" machines.

Posted Date: 3/13/2013 6:23:32 AM | Location : United States







Related Discussions:- Implementation of distributed systems, Assignment Help, Ask Question on Implementation of distributed systems, Get Answer, Expert's Help, Implementation of distributed systems Discussions

Write discussion on Implementation of distributed systems
Your posts are moderated
Related Questions
What is the role of IEEE in computer networking? IEEE, or the Institute of Electrical and Electronics Engineers, is an organization composed of engineers that issues and manage

5. Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frame are 25 bytes long. Calculate the efficiency of Stop-and-Wait ARQ in a system t


Cisco Router architecture Overall architecture of Cisco 2600 router is given below The Following components of routers are 1.    WIC slots 2.    communications

What is region? When hierarchical routing is used, the routers are separated into what we will call regions, with every router knowing all the details about how to route packet

MAC (media access control) and LLC (logical link control) are both layer 2 protocols.



Source Port Number This fields occupies  the first 16 bytes of the UDP header. This  fields typically hold the UDP port number  of the application sending  this datagram. The

What is the difference between trigger and rule? Ans) The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by cli