Implementation of distributed systems, Computer Networking

Distributed systems are composed of a number of physically separate machines connected by one or more communication links. Unlike parallel systems, there's no shared clock or memory. This means that distributed systems are very loosely coupled; for example, if your web browsercrashes while visiting cnn.com, cnn.com itself will not crash. In general, we can identify several advantages in building distributed systems, such as:

 Shared resources do not need to be unnecessarily replicated. For example, you don't need to store all your ?les in all Edlab machines, but rather a distributed network ?lesystem lets it appear that your Edlab ?les are accessible on any of the Edlab machines. At the same time, you generally do not want to store all your ?les in just one machine, and so a distributed ?lesystem could use replication across multiple machines to provide fault tolerance.

 Expensive (or scarce) resources can be shared. As an example, a poster-size color laser printer can be shared via a local network. It is possible to present the same working environment to users, by keeping their ?les and pro?les on remote servers. For instance, today, as opposed to during the 1970s, each one of us owns or uses several computers, and we do not just use one big computer. Unfortunately, this is also a problem, since, say, data on our cellphone can be out of sync with data on our laptop. The good news is that distributed systems help to standardize these environments;

one possible solution to this problem, for instance, is to implement thin clients, in which the user might owns only one fast machine but lots of very simple "keyboard-screen" machines.

Posted Date: 3/13/2013 6:23:32 AM | Location : United States







Related Discussions:- Implementation of distributed systems, Assignment Help, Ask Question on Implementation of distributed systems, Get Answer, Expert's Help, Implementation of distributed systems Discussions

Write discussion on Implementation of distributed systems
Your posts are moderated
Related Questions
Extranets can also be utilized to link an intranet to the Internet in order that remote offsite access can be built into a company's intranet through an authorized individual. It c

Message Passing Programme Development Environment In a multicomputer system, the computational load among various processors must be balanced. To pass information among variou


Routers The network  layer (also  called layer3) manages device  addressing  tracks the location  of devices on the network  and determines  the best  way to  move data. Which

The project idea is : Analyze Snort or PCAP data from a public WIFI hotspot (describe traffice seen and what it is, protocols, ports, etc). This is what is expected. Initially r


Point out the drawbacks of Token Ring. Few of the drawbacks of Token Ring are: a. Token Ring is very costly. All topology components cost much more than other more popular s

What is difference between Baseband and Broadband Transmission in ccna? Ans) In a baseband transmission, the entire bandwidth of the cable is consumed by a one signal. In bro

Can you define how L2F data tunneling process works?

Application Layer The  application layer is where  network  applications and their  application layer protocols  reside. The internet application layer includes many protocols