Professional Documents
Culture Documents
Chapter 2
ARCHITECTURES
1
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
2
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
Communication via
propagation of events
Mostly
Publish/Subscribe
-Data Centric
Architecture
-E.g. Share
distributed
file systems or
-Web-based
distributed
systems
2. Decentralized Architectures
I.
II.
III.
IV.
3. Hybrid Architectures
I. Edge-Server Systems
II. Collaborative Distributed Systems
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
Centralized Architectures
Idempotent Operations
Operations that can be repeated multiple
times without any harm
Example of Idempotent operation:
Getting quotes on a stock or doing a
search on the web
Example of none Idempotent operation:
Buying stocks
9
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
10
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
2 Tier Architectures
3 Tier Architectures
Multitiered Architectures
12
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
13
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
Thin
Client
Fat
Client
17
Unstructured Peer-to-Peer
Architectures (1)
19
Unstructured Peer-to-Peer
Architectures (2)
20
Figure 2-11. Generating a specific overlay network using a twolayered unstructured peer-to-peer system [adapted with
permission from Jelasity and Babaoglu (2005)].
22
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
Superpeers (1)
23
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
Superpeers (2)
A hybrid architecture
An idempotent class of distributed
systems
Deployed on the Internet where servers
are at the edge of the network (i.e. first
entry to network)
Each client connects to the Internet by
means of an edge server
25
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
26
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
Information needed to
download a specific file
Example:
Interceptors (1)
An Interceptor is a software that breaks the
usual flow of control and allows other
(application specific) code to be executed
Interceptors are good for providing
transparent:
A. Replication
B. Performance
31
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
Interceptors (2)
May want to send to
many other Bs (i.e.
replicated)
32
Computational reflection
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
Self-managing
Self-healing (through replication)
Self-configuring
Self-Optimizing
34
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5
35
36
37
38
Terminate every binding between a component on a nonfaulty node, and a component on the node that just failed.