Implementation of distributed systems, Computer Networking

Distributed systems are composed of a number of physically separate machines connected by one or more communication links. Unlike parallel systems, there's no shared clock or memory. This means that distributed systems are very loosely coupled; for example, if your web browsercrashes while visiting cnn.com, cnn.com itself will not crash. In general, we can identify several advantages in building distributed systems, such as:

 Shared resources do not need to be unnecessarily replicated. For example, you don't need to store all your ?les in all Edlab machines, but rather a distributed network ?lesystem lets it appear that your Edlab ?les are accessible on any of the Edlab machines. At the same time, you generally do not want to store all your ?les in just one machine, and so a distributed ?lesystem could use replication across multiple machines to provide fault tolerance.

 Expensive (or scarce) resources can be shared. As an example, a poster-size color laser printer can be shared via a local network. It is possible to present the same working environment to users, by keeping their ?les and pro?les on remote servers. For instance, today, as opposed to during the 1970s, each one of us owns or uses several computers, and we do not just use one big computer. Unfortunately, this is also a problem, since, say, data on our cellphone can be out of sync with data on our laptop. The good news is that distributed systems help to standardize these environments;

one possible solution to this problem, for instance, is to implement thin clients, in which the user might owns only one fast machine but lots of very simple "keyboard-screen" machines.

Posted Date: 3/13/2013 6:23:32 AM | Location : United States







Related Discussions:- Implementation of distributed systems, Assignment Help, Ask Question on Implementation of distributed systems, Get Answer, Expert's Help, Implementation of distributed systems Discussions

Write discussion on Implementation of distributed systems
Your posts are moderated
Related Questions
Explain Persistence timer? To deal with the zero-size windows What if a receiver advertises that the window size is 0 (by sending ACK) and this ACK is lost? - A


1. Write a critical analysis of the client/server vs. service architecture method for developing service architectures.  You must explain what the client/server method is in terms

State in brief about the Graceful degradation With FDMA or TDMA, a fixed number of users can concurrently access the system. Though, with CDMA, as more user concurrently access

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.

Q. Show VLAN Membership and Configuration? VLAN Membership - May be classified by - Switch port numbers - MAC addresses - IP addresses - IP multicast addresse

After powering up his PC, Bob notices the PC was not able to properly connect to network devices. He obtained the following information from his workstation: C:\>ipconfig Win

Connection Oriented Multiplexing And De multiplexing TCP socket  identified by 4 tuple: a.Source IP address b.Source port number c.Destination IP address d.Destina

What is the difference between TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but d

Data Sharing One of the most important uses of networking is to allow the sharing of data. Before networking was common an accounting employee who wanted to prepare a report f