SlideShare ist ein Scribd-Unternehmen logo
1 von 49
System Models 
Ajayakumar.M.V 
IT Department
System models 
Purpose 
• illustrate/describe common properties and 
design choices for distributed system in a 
single descriptive model.
System Models 
Two types of models 
1. Architectural Models 
2. Fundamental Models
1. Architectural Models 
• It consider , 
1. the placement of the components across a 
network of computers. 
2. the inter-relationships between the 
components. 
3. Determine the distribution of data and 
computational tasks among the physical 
nodes of the system. 
4. Evaluating the performance , reliability, 
scalability and other properties of distributed 
systems.
Architectural Model- including 
1. Software layers 
2. System Architectures 
3. Variations on the client-server model 
4. Interfaces and objects. 
5. Design requirements for distributed 
Architectures.
1. Software layers
Software Layers 
• In the layered view of a system each layer offers its services 
to the level above and builds its own service on the services 
of the layer below. 
Applications 
Middleware 
Operating system Platform 
Computer and network hardware 
Dr.Almetwally Mostyafa Summer 2009 
8
• Lowest level layers that provide services to 
other higher layers.
Middleware 
• Its purpose is to mask heterogeneity and 
provide a convenient programming model. 
• Eg CORBA, 
• Java RMI, 
• DCOM
2. System Architectures
System Architectures 
1. Client- server model 
2. Services provided by multiple servers. 
3. Proxy servers and caches. 
4. Peer processes
1. Client- server model 
• The system is structured as a set of processes, 
called servers, that offer services to the 
users , called clients. 
• The client-server model is usually based on a 
simple request/reply protocol, implemented 
with send/receive primitives or RPC or RMI. 
• The client sends a request message to the 
server asking for some service. 
• The server does the work and return a result 
or error code if the work could not be 
performed.
• A server can itself request services from other 
servers, thus the server itself acts like a client.
2. Services provided by multiple 
servers 
• Services may be implemented as several 
server processes in separate host computers 
interacting as necessary to provide a service 
to client processes.
3. Proxy Servers and Caches 
Proxy Servers 
• proxy servers are used to increase availability 
and performance of the services by reducing 
the load on the network and web-server. 
• Proxy server provides copies(replications) of 
resources which are managed by other server.
Cache 
• A store of recently used data objects that is 
closer to the client process than those remote 
objects. 
• When an object is needed by a client process 
the caching service checks the cache and 
supplies the objects from there in case of an 
up-to-date copy is available. 
• Purpose : is to increase performance and 
availability by avoiding frequent accesses to 
remote servers.
4. Peer processes 
• All processes(objects) play similar roles 
without distinction between client or servers. 
• A large number of data objects are shared; 
any individual computers hold only a small 
part of the application database. 
• It distributes shared resources widely. 
• It share computing and communication loads.
Peer processes
3. Variations on the client-server model 
• Several variations on the client-server model. 
The following are reasons of variation. 
1.The use of mobile code and mobile agents. 
2.Users need for low-cost computers with 
limited hardware resources. 
3.The requirement to add and remove mobile 
devices in a convenient manner.
Variations on the client-server model 
Including :- 
1. Mobile code 
2. Mobile agents 
3. Network computers 
4. Thin clients 
5. Mobile devices and spontaneous networking
1. Mobile code 
• It is used to refer to code that can be sent 
from one computer to another and run at the 
destination. 
• Example : java applets
Step : 1 
• The user running a browser selects a link to an 
applets whose code is stored on a web server. 
• The code is downloaded to the browser and 
runs there.
Step : 2 
• Client interacts with the applet.
Advantages & Disadvantages 
Advantages: 
1.Remote invocations are replaced by local 
ones. 
2.Good interactive response. 
3.Does not suffer from the delays. 
Disadvantages: 
• Security threat to the local resources in the 
destination computer.
2. Mobile Agents 
• Mobile agent is a running program that travels 
from one computer to another carrying out a 
task to someone’s behalf, such as collecting 
information, eventually returning with the 
results. 
• Mobile agent is a complete program(including 
both code & data) that can work 
independently. 
• Mobile agent can invoke local 
resources/data.
Mobile Agents
Advantages & Disadvantages 
Advantages: 
• Reduce communication cost and time by 
replacing remote invocation with local ones. 
Disadvantages: 
1.Limited applicability 
2.Security threat of the visited sites resources
3. Network Computers 
• Network computers do not store locally operating 
system or application code. 
• Downloads its operating system and any applications 
needed by the user from a remote file server. 
• Applications run locally but files are managed by a 
remote file server. 
• Users can migrate from one network computer to 
another. 
• Its processor and memory capacities can be 
restricted to reduce its cost.
Advantages 
• The network computers can be simpler, with 
limited capacity, it does not need even a local 
hard disk. 
• User can login from any computers. 
• No user effort for software management or 
administration.
4. Thin Clients 
• Thin clients do not download code (operating 
system or application) from the server to run 
it locally. 
• All code is run on the server, in parallel for 
several clients. 
• The thin client only runs the user interface.
• It is same as network computer scheme but 
instead of downloading the application code 
into the user’s computer, it runs them on a 
server machine, compute server. 
Disadvantages: 
High latencies:- increasing of the delays in 
highly interactive graphical applications.
Thin Client
5. Mobile Devices and 
Spontaneous Networking 
• Mobile Devices : Mobile devices are hardware 
computing components that move between 
physical locations. 
• Spontaneous Network: integrate mobile 
devices and other devices into a given 
network.
Advantages & Disadvantages 
Advantages: 
1.Easy connection to a local network. 
2.Easy integration with local services. 
Disadvantages: 
1.Limited connectivity 
2.Less Security and privacy
4. Interfaces and Objects 
• Interface definitions: 
a set of functions are available 
• In object oriented language : 
many objects can be encapsulated in processes. 
Eg: CORBA, RMI
5. Design Requirements for 
Distributed Architectures 
Including 
1.Performance issues 
2.Quality of services 
3.Use of caching & replication 
4.Dependability issues
1. Performance issues 
Following are the performance issues 
1.Responsiveness 
2.Throughput 
3.Balancing computational loads
1. Responsiveness 
• The load and performance of the server and 
network.
2. Throughput 
• The rate at which computational work is done. 
• It is affected by processing speeds and by 
data transfer rates.
3. Balancing computational loads 
• Several computers for a service.
2. Quality of service 
• Reliability 
• Security 
• Performance and adaptability
3. Use of Caching and Replication 
• Performance issues are bars to successful 
deploy distributed system. 
• Purpose : is to increase performance and 
availability by avoiding frequent accesses to 
remote servers.
4. Dependability Issues 
Including 
1.Correctness 
2.Fault tolerance : by redundancy 
3.Security
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes SAhammedShakil
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computingpurplesea
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating SystemsDr Sandeep Kumar Poonia
 
Synchronization in distributed computing
Synchronization in distributed computingSynchronization in distributed computing
Synchronization in distributed computingSVijaylakshmi
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsAya Mahmoud
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoTFabMinds
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingSayed Chhattan Shah
 
Consistency protocols
Consistency protocolsConsistency protocols
Consistency protocolsZongYing Lyu
 

Was ist angesagt? (20)

Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
6.distributed shared memory
6.distributed shared memory6.distributed shared memory
6.distributed shared memory
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
 
Synchronization in distributed computing
Synchronization in distributed computingSynchronization in distributed computing
Synchronization in distributed computing
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systems
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
 
message passing
 message passing message passing
message passing
 
Distributed System - Security
Distributed System - SecurityDistributed System - Security
Distributed System - Security
 
Consistency protocols
Consistency protocolsConsistency protocols
Consistency protocols
 

Ähnlich wie 4. system models

02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdfRobeliaJoyVillaruz
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networkingabhinav2727
 
Client server architecture
Client server architectureClient server architecture
Client server architectureRituBhargava7
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to MicroservicesMahmoudZidan41
 
строим Microkernel architecture на базе паттерна pipes and filters
строим Microkernel architecture на базе паттерна pipes and filtersстроим Microkernel architecture на базе паттерна pipes and filters
строим Microkernel architecture на базе паттерна pipes and filterscorehard_by
 
Lect 1 Distributed System.pptx
Lect 1 Distributed System.pptxLect 1 Distributed System.pptx
Lect 1 Distributed System.pptxPardonSamson
 
Odbc and data access objects
Odbc and data access objectsOdbc and data access objects
Odbc and data access objectsSangeetha Sg
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure orYogeshKumar187055
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportHasibul Islam Nirob
 
Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance SHIKHA GAUTAM
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit iJAIGANESH SEKAR
 
Part 1 network computing
Part 1 network computingPart 1 network computing
Part 1 network computingLinh Nguyen
 
Data center proposal
Data center proposalData center proposal
Data center proposalMuhammad Ahad
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdfNehaam3
 

Ähnlich wie 4. system models (20)

02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf
 
ds2p1.pptx
ds2p1.pptxds2p1.pptx
ds2p1.pptx
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
строим Microkernel architecture на базе паттерна pipes and filters
строим Microkernel architecture на базе паттерна pipes and filtersстроим Microkernel architecture на базе паттерна pipes and filters
строим Microkernel architecture на базе паттерна pipes and filters
 
Lect 1 Distributed System.pptx
Lect 1 Distributed System.pptxLect 1 Distributed System.pptx
Lect 1 Distributed System.pptx
 
Odbc and data access objects
Odbc and data access objectsOdbc and data access objects
Odbc and data access objects
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure or
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project Report
 
Mobile Agent
Mobile AgentMobile Agent
Mobile Agent
 
Technical Architectures
Technical ArchitecturesTechnical Architectures
Technical Architectures
 
DSchap-02.ppt
DSchap-02.pptDSchap-02.ppt
DSchap-02.ppt
 
Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
 
Client server model
Client server modelClient server model
Client server model
 
PPTS DS UNIT-1.pptx
PPTS DS UNIT-1.pptxPPTS DS UNIT-1.pptx
PPTS DS UNIT-1.pptx
 
Part 1 network computing
Part 1 network computingPart 1 network computing
Part 1 network computing
 
Data center proposal
Data center proposalData center proposal
Data center proposal
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 

Mehr von AbDul ThaYyal

Chapter 15 distributed mm systems
Chapter 15 distributed mm systemsChapter 15 distributed mm systems
Chapter 15 distributed mm systemsAbDul ThaYyal
 
Chapter 14 replication
Chapter 14 replicationChapter 14 replication
Chapter 14 replicationAbDul ThaYyal
 
Chapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency controlChapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency controlAbDul ThaYyal
 
Chapter 11d coordination agreement
Chapter 11d coordination agreementChapter 11d coordination agreement
Chapter 11d coordination agreementAbDul ThaYyal
 
Chapter 11c coordination agreement
Chapter 11c coordination agreementChapter 11c coordination agreement
Chapter 11c coordination agreementAbDul ThaYyal
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systemsAbDul ThaYyal
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworkingAbDul ThaYyal
 
Chapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systemsChapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systemsAbDul ThaYyal
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system modelsAbDul ThaYyal
 
4.file service architecture
4.file service architecture4.file service architecture
4.file service architectureAbDul ThaYyal
 
4.file service architecture (1)
4.file service architecture (1)4.file service architecture (1)
4.file service architecture (1)AbDul ThaYyal
 

Mehr von AbDul ThaYyal (20)

Chapter 17 corba
Chapter 17 corbaChapter 17 corba
Chapter 17 corba
 
Chapter 15 distributed mm systems
Chapter 15 distributed mm systemsChapter 15 distributed mm systems
Chapter 15 distributed mm systems
 
Chapter 14 replication
Chapter 14 replicationChapter 14 replication
Chapter 14 replication
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency controlChapter 12 transactions and concurrency control
Chapter 12 transactions and concurrency control
 
Chapter 11d coordination agreement
Chapter 11d coordination agreementChapter 11d coordination agreement
Chapter 11d coordination agreement
 
Chapter 11c coordination agreement
Chapter 11c coordination agreementChapter 11c coordination agreement
Chapter 11c coordination agreement
 
Chapter 11b
Chapter 11bChapter 11b
Chapter 11b
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 9 names
Chapter 9 namesChapter 9 names
Chapter 9 names
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
 
Chapter 7 security
Chapter 7 securityChapter 7 security
Chapter 7 security
 
Chapter 6 os
Chapter 6 osChapter 6 os
Chapter 6 os
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
Chapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systemsChapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systems
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system models
 
4.file service architecture
4.file service architecture4.file service architecture
4.file service architecture
 
4.file service architecture (1)
4.file service architecture (1)4.file service architecture (1)
4.file service architecture (1)
 

4. system models

  • 2. System models Purpose • illustrate/describe common properties and design choices for distributed system in a single descriptive model.
  • 3. System Models Two types of models 1. Architectural Models 2. Fundamental Models
  • 4. 1. Architectural Models • It consider , 1. the placement of the components across a network of computers. 2. the inter-relationships between the components. 3. Determine the distribution of data and computational tasks among the physical nodes of the system. 4. Evaluating the performance , reliability, scalability and other properties of distributed systems.
  • 5. Architectural Model- including 1. Software layers 2. System Architectures 3. Variations on the client-server model 4. Interfaces and objects. 5. Design requirements for distributed Architectures.
  • 7.
  • 8. Software Layers • In the layered view of a system each layer offers its services to the level above and builds its own service on the services of the layer below. Applications Middleware Operating system Platform Computer and network hardware Dr.Almetwally Mostyafa Summer 2009 8
  • 9. • Lowest level layers that provide services to other higher layers.
  • 10. Middleware • Its purpose is to mask heterogeneity and provide a convenient programming model. • Eg CORBA, • Java RMI, • DCOM
  • 12. System Architectures 1. Client- server model 2. Services provided by multiple servers. 3. Proxy servers and caches. 4. Peer processes
  • 13. 1. Client- server model • The system is structured as a set of processes, called servers, that offer services to the users , called clients. • The client-server model is usually based on a simple request/reply protocol, implemented with send/receive primitives or RPC or RMI. • The client sends a request message to the server asking for some service. • The server does the work and return a result or error code if the work could not be performed.
  • 14. • A server can itself request services from other servers, thus the server itself acts like a client.
  • 15. 2. Services provided by multiple servers • Services may be implemented as several server processes in separate host computers interacting as necessary to provide a service to client processes.
  • 16.
  • 17. 3. Proxy Servers and Caches Proxy Servers • proxy servers are used to increase availability and performance of the services by reducing the load on the network and web-server. • Proxy server provides copies(replications) of resources which are managed by other server.
  • 18.
  • 19. Cache • A store of recently used data objects that is closer to the client process than those remote objects. • When an object is needed by a client process the caching service checks the cache and supplies the objects from there in case of an up-to-date copy is available. • Purpose : is to increase performance and availability by avoiding frequent accesses to remote servers.
  • 20. 4. Peer processes • All processes(objects) play similar roles without distinction between client or servers. • A large number of data objects are shared; any individual computers hold only a small part of the application database. • It distributes shared resources widely. • It share computing and communication loads.
  • 22. 3. Variations on the client-server model • Several variations on the client-server model. The following are reasons of variation. 1.The use of mobile code and mobile agents. 2.Users need for low-cost computers with limited hardware resources. 3.The requirement to add and remove mobile devices in a convenient manner.
  • 23. Variations on the client-server model Including :- 1. Mobile code 2. Mobile agents 3. Network computers 4. Thin clients 5. Mobile devices and spontaneous networking
  • 24. 1. Mobile code • It is used to refer to code that can be sent from one computer to another and run at the destination. • Example : java applets
  • 25. Step : 1 • The user running a browser selects a link to an applets whose code is stored on a web server. • The code is downloaded to the browser and runs there.
  • 26. Step : 2 • Client interacts with the applet.
  • 27. Advantages & Disadvantages Advantages: 1.Remote invocations are replaced by local ones. 2.Good interactive response. 3.Does not suffer from the delays. Disadvantages: • Security threat to the local resources in the destination computer.
  • 28. 2. Mobile Agents • Mobile agent is a running program that travels from one computer to another carrying out a task to someone’s behalf, such as collecting information, eventually returning with the results. • Mobile agent is a complete program(including both code & data) that can work independently. • Mobile agent can invoke local resources/data.
  • 30. Advantages & Disadvantages Advantages: • Reduce communication cost and time by replacing remote invocation with local ones. Disadvantages: 1.Limited applicability 2.Security threat of the visited sites resources
  • 31. 3. Network Computers • Network computers do not store locally operating system or application code. • Downloads its operating system and any applications needed by the user from a remote file server. • Applications run locally but files are managed by a remote file server. • Users can migrate from one network computer to another. • Its processor and memory capacities can be restricted to reduce its cost.
  • 32.
  • 33. Advantages • The network computers can be simpler, with limited capacity, it does not need even a local hard disk. • User can login from any computers. • No user effort for software management or administration.
  • 34. 4. Thin Clients • Thin clients do not download code (operating system or application) from the server to run it locally. • All code is run on the server, in parallel for several clients. • The thin client only runs the user interface.
  • 35. • It is same as network computer scheme but instead of downloading the application code into the user’s computer, it runs them on a server machine, compute server. Disadvantages: High latencies:- increasing of the delays in highly interactive graphical applications.
  • 37. 5. Mobile Devices and Spontaneous Networking • Mobile Devices : Mobile devices are hardware computing components that move between physical locations. • Spontaneous Network: integrate mobile devices and other devices into a given network.
  • 38. Advantages & Disadvantages Advantages: 1.Easy connection to a local network. 2.Easy integration with local services. Disadvantages: 1.Limited connectivity 2.Less Security and privacy
  • 39.
  • 40. 4. Interfaces and Objects • Interface definitions: a set of functions are available • In object oriented language : many objects can be encapsulated in processes. Eg: CORBA, RMI
  • 41. 5. Design Requirements for Distributed Architectures Including 1.Performance issues 2.Quality of services 3.Use of caching & replication 4.Dependability issues
  • 42. 1. Performance issues Following are the performance issues 1.Responsiveness 2.Throughput 3.Balancing computational loads
  • 43. 1. Responsiveness • The load and performance of the server and network.
  • 44. 2. Throughput • The rate at which computational work is done. • It is affected by processing speeds and by data transfer rates.
  • 45. 3. Balancing computational loads • Several computers for a service.
  • 46. 2. Quality of service • Reliability • Security • Performance and adaptability
  • 47. 3. Use of Caching and Replication • Performance issues are bars to successful deploy distributed system. • Purpose : is to increase performance and availability by avoiding frequent accesses to remote servers.
  • 48. 4. Dependability Issues Including 1.Correctness 2.Fault tolerance : by redundancy 3.Security