Client-server Basics. 1. Motivation

Size: px
Start display at page:

Download "Client-server Basics. 1. Motivation"

Transcription

1 Page 1 of 8 Client-server Basics Oxford Brookes University 2004 Contents 1. Motivation 2. Basic Model of the Web 3. Extensions - Caching and Proxies 4. High Performance Web Servers 5. Web Services Appendices A. References 1. Motivation Resource naming, sharing and allocation are fundamental issues in computer science. In the earliest days computers were single processor entities and there was no communication between computers. A computer would run a single user-job to completion, then the next would be loaded and run. This was perceived to be inefficient usage of a scarce resource which led to the development of time sharing, multi-tasking operating systems which could share the single processor resource amongst multiple jobs loaded onto the computer. Sending a job to another computer involved sending a physical deck of cards, paper tape or magnetic tape and the results would be returned in similar manner usually as physical printer output. One of the early motivations for computer networks was to eliminate the need for physical media and enable a direct communication path between computers. In the 1960s host-satellite systems started to emerge. Graphical displays are a good example. The processing power needed to drive the display was considerable and to drive a display from the same processor that was running the application took too much resource away from the application. Thus architectures emerged in which the graphics display was driven by a separate processor, the satellite processor, linked in some way to the main processor, the host; an early example of distribution. As computers became more powerful and the demands for computing resources grew, distributed computing systems emerged. A distributed system can call upon a range of resources in order to carry out a computation, for example, multiple processors, filestores, peripherals etc. Two general models emerged, depending on how the resources were coupled. The two are known as tightly-coupled distributed systems and loosely-coupled distributed systems. Multiple processors communicating through shared memory is typical of the former class. A collection of workstations accessing resources such as printers and filestores is typical of the latter. Tightly-coupled systems occupy a limited geographical area (the same chip, or rack) in order to maximise interconnection speeds. Looselycoupled systems can operate over local or wide area networks. The client-server model is a particular kind of loosely-coupled distributed system. The basic idea of a client server system is that a client can send a request to a server to perform some task and receive a response. A time server is a simple example. The client requests the server for the current time, the server sends the current time to the client in the response. A print server is another example, the client sends a document to the server, the server prints it and sends a response to the client that this has been done. A file server is another. The client requests a file from the server, the server returns it. The basic request/response idea is illustrated in figure 1.1. below.

2 Page 2 of 8 Figure 1.1: Request/response Model Benefits of this approach include: Resource allocation: server can provide same kind of service to many clients Server can be optimised/specialised to provide particular kinds of service What price do we pay for this? Loosely-coupled systems introduce delays, not least due to the time taken to transmit requests and responses over a network. Delays may also occur if the server is heavily loaded because requests are arriving faster than the server can service them. Client-server systems can fail in different ways to, say, a local procedure invocation. Server might not be able to provide requested service, e.g. requested file might not exist (easy: send error response) When client sends request to server, server might not be operational Server might receive request from client, start to process it, then fail Client might fail whilst server is processing request Network might fail to deliver request or response correctly Network link might fail whilst request or response is being transmitted Client-server systems have to be able to handle such situations gracefully. Further issues arise when we study client-server systems more closely, for example: Protocols: request and response messages need to be transmitted correctly; client-server systems require data to be delivered reliably and in the correct order Naming/addressing: how are names and addresses of services allocated? The number of services is potentially very large Scalabiliy: how easy is it to extend a system to deal with increasing demand? Caching: what economies are possible if the same client asks for the same thing repeatedly, or different clients ask for the same thing? Security: transmission of request and response, denial-of-service attacks (bombard a service with "false" requests, thus denying service to genuine clients) Authentication: who is allowed to use a service? If a request is from a client that is allowed to

3 Page 3 of 8 use the service, how do you know that that client is who it claims to be? Control flow: can a server invoke other servers in computing the response to a request? Some of these issues will be explored in this module, and others in the Semester 2 modules in the course. These issues are instances of more general issues that arise in distributed systems. It is likely that you will have encountered these if you have studied a course on distributed systems. The key notion is transparency: concealment from user and application programmer of the separation of the system into components. The system is perceived as a whole rather than collection of individual components. There are different kinds of transparency (see Emmerich, 2000): Access Interface to service request is same for communication between components on same host and on different hosts Location Components can be identified in service requests without physical locations being known Migration Components can be migrated to another host without affecting operation of users or programs Replication Users and programmers not aware service is provided by replica of original component rather than master Concurrency Several components may concurrently request services from a shared component, while shared component s integrity is preserved, and neither users nor programmers have to see how concurrency is controlled Scalability Transparent to users and designers how system scales to accommodate growing load Performance Transparent to users how system performance is achieved Failure Concealment of faults from users, clients and server components We conclude this introduction by looking at how these ideas and issues apply to the Web. 2. Basic Model of the Web In order for the Web to work, there was a need for a way of requesting Web pages and having them delivered from a remote server to the browser. In December 1990 when the first web pages were served from a server in CERN, the decision had already been made to use a very simple protocol called HyperText Transfer Protocol (HTTP) running over the Internet using TCP/IP. Routing the pages through the network and uniquely addreessing the destination is done by the Internet Protocol (IP). Communication between the hosts is achieved by the Transmission Control Protocol (TCP). The HTTP architecture agreed is shown in Figure 1.2. Only the Client is allowed to make requests. It asks the server on the Internet at the site to deliver the page file.htm to the Client for browsing. The Server may be able to find the file (called a document or a page) and, if so, it will deliver it to the Client. If the file cannot be located, an error response is sent instead.

4 Page 4 of 8 Figure 2.1: Request/response Model of HTTP A simple example showing the format of the HTTP request and response messages is shown in Figures 2.2 and 2.3. The request message requests a particular resource, in this case the document The response message either returns the document or includes an error message. The structure of the request and response messages is explained in detail in the HTTP Primer. Figure 2.2: HTTP Request Message

5 Page 5 of 8 Figure 2.3: HTTP Response Message The protocols involved in HTTP message transfer are illustrated in Figure 2.4. More details are given in the HTTP Primer. Figure 2.4: Protocols used in HTTP Message Transfer 3. Extensions - Caching and Proxies As soon as the web started getting used, it became clear that this simple model was not that efficient. Suppose the user downloads a web page and then a second. If the user wants to refer back to the first page, then the model as it stands would require the page to be requested again. In consequence, almost

6 Page 6 of 8 from day one the possibility of having a cache of already downloaded web pages was seen as useful. When the user hits the back button on the browser, the page is retrieved from a local cache on the computer running the browser rather than request the page again. Browsers have over the years added other features such as History files and Bookmark lists which also can make use of a local cache. At the Server end, there is also a use for a cache. If the server has a large main memory, rather than retrieve each file from disc, it is able to keep the last set of pages requested in main memory in order to improve its response to users. Organisations soon began to find that their staff were using the Web a great deal. In some cases this was good news as they were accessing relevant information needed to do their job. Sometimes the staff were downloading information of a more private nature, organising their holidays, purchasing goods etc. This led to the introduction of a device called a proxy which to the Client looks like a Server and to a Server looks like a Client. Proxies have a wide range of uses. They can be used to control what pages the organisation's staff are allowed to access. If the proxy is placed on the firewall between the company's Intranet and the Internet, it is possible to check what documents are being requested. The organisation can set up the network so that all external requests go the proxy which onward routes the ones that the organisation is happy with and sends back an unavailable error message otherwise. Figure 3.1: Caching and Proxies Proxies also can contain caches. In this case, the cache serves a set of users rather than a single user. In an organisation, it is likely that a set of users will request similar pages due to the nature of their work, so a proxy cache also has value. User A requests a page that is stored in the proxy cache and when user B requests the same page, it is returned from the proxy rather than requesting it from the Server. Figure 3.1 shows the overall arrangement of a site with a proxy cache. If a proxy is of use to an organisation, it may also be of value to a Department, to an Internet service Provider, to a Community and even a country. For example, the UK has an academic cache aimed at reducing the traffic between the UK and the USA to lower the need for expensive bandwidth between the UK and the USA. Some countries have national caches to censor information that arrives in the country. Information cannot be left in a cache forever as eventually it will be out-of-date and the cache will fill up. The Server may have updated a Web page but all the caches are still returning the old version. With the potential of there being a whole series of caches between the user and the site from which a page is required, mechanisms are needed to handle stale pages in the various caches and to ensure that pages of the appropriate freshness are returned to the user. 4. High Performance Web Servers Web sites that receive thousands or millions of hits per day cannot be implemented as single server

7 Page 7 of 8 systems. One type of technique that can be employed is for requests to do to a front-end server that then distributes them to one of a set of back-end servers in such a way that the work is spread evenly across the back-end servers. The idea is illustrated in Figure 4.1. Figure 4.1: Workload Distribution Further consideration of this topic is outside the scope of this module. A very good survey article is Cardellini et al, Web Services The request from the client to the server may be more complex than a request for a pre-existing document. Some computation might be involved. One generalisation of this is the Common Gateway Interface (CGI), another is Java Servlets. These topics are considered later in the module. Another generalization is to Web Services. This topic will be covered in a later module in the course (P00773 Web Deployment). The basic idea of a Web Service is a software application: identified by a URI whose interfaces and bindings are capable of being defined, described and discovered by XML artifacts and which can support direct interactions with other software applications using XML-based messages via Internet-based protocols The general idea is illustrated in Figure 5.1.

8 Page 8 of 8 Figure 5.1: Web Services Architecture Appendix A References 1. Wolfgang Emmerich (2000), Engineering Distributed Objects, John Wiley & Sons, ISBN V. Cardellini, E. Casallicchio and P.S. Yu, The State of the Art in Locally Distributed Web-Server Systems, ACM Computing Surveys, 34(2), pp Available through ACM Digital Library.

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is

More information

Chapter 17: Distributed Systems (DS)

Chapter 17: Distributed Systems (DS) Chapter 17: Distributed Systems (DS) Silberschatz, Galvin and Gagne 2013 Chapter 17: Distributed Systems Advantages of Distributed Systems Types of Network-Based Operating Systems Network Structure Communication

More information

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Distributed Systems. Bina Ramamurthy. 6/13/2005 B.Ramamurthy 1

Distributed Systems. Bina Ramamurthy. 6/13/2005 B.Ramamurthy 1 Distributed Systems Bina Ramamurthy 6/13/2005 B.Ramamurthy 1 Introduction Distributed system is the one in which hardware and software components at networked computers communicate and coordinate their

More information

Course Snapshot. The Next Few Classes. Parallel versus Distributed Systems. Distributed Systems. We have covered all the fundamental OS components:

Course Snapshot. The Next Few Classes. Parallel versus Distributed Systems. Distributed Systems. We have covered all the fundamental OS components: Course Snapshot The Next Few Classes We have covered all the fundamental OS components: Architecture and OS interactions Processes and threads Synchronization and deadlock Process scheduling Memory management

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Course Snapshot. The Next Few Classes

Course Snapshot. The Next Few Classes Course Snapshot We have covered all the fundamental OS components: Architecture and OS interactions Processes and threads Synchronization and deadlock Process scheduling Memory management File systems

More information

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2006 Kerio Technologies. All Rights Reserved. Printing Date: May 3, 2006 This guide provides detailed description on configuration of the local network

More information

Introduction. Distributed Systems. Introduction. Introduction. Instructor Brian Mitchell - Brian

Introduction. Distributed Systems. Introduction. Introduction. Instructor Brian Mitchell - Brian Distributed 1 Directory 1 Cache 1 1 2 Directory 2 Cache 2 2... N Directory N Interconnection Network... Cache N N Instructor Brian Mitchell - Brian bmitchel@mcs.drexel.edu www.mcs.drexel.edu/~bmitchel

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network

More information

Chapter 1: Distributed Information Systems

Chapter 1: Distributed Information Systems Chapter 1: Distributed Information Systems Contents - Chapter 1 Design of an information system Layers and tiers Bottom up design Top down design Architecture of an information system One tier Two tier

More information

HEP replica management

HEP replica management Primary actor Goal in context Scope Level Stakeholders and interests Precondition Minimal guarantees Success guarantees Trigger Technology and data variations Priority Releases Response time Frequency

More information

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Release Date: March 16, 2007 This guide provides detailed description on configuration of the local network which

More information

Distributed Systems. Definitions. Why Build Distributed Systems? Operating Systems - Overview. Operating Systems - Overview

Distributed Systems. Definitions. Why Build Distributed Systems? Operating Systems - Overview. Operating Systems - Overview Distributed Systems Joseph Spring School of Computer Science Distributed Systems and Security Areas for Discussion Definitions Operating Systems Overview Challenges Heterogeneity Limitations and 2 Definitions

More information

Introduction 1.1 SERVER-CENTRIC IT ARCHITECTURE AND ITS LIMITATIONS

Introduction 1.1 SERVER-CENTRIC IT ARCHITECTURE AND ITS LIMITATIONS 1 Introduction The purpose of this chapter is to convey the basic idea underlying this book. To this end we will first describe conventional server-centric IT architecture and sketch out its limitations

More information

Unit 5: Distributed, Real-Time, and Multimedia Systems

Unit 5: Distributed, Real-Time, and Multimedia Systems Unit 5: Distributed, Real-Time, and Multimedia Systems Unit Overview Unit 5 provides an extension to the core topics of operating systems. It introduces distributed systems and special-purpose operating

More information

CSC 453 Operating Systems

CSC 453 Operating Systems CSC 453 Operating Systems Lecture 1: An Introduction What Is an Operating System? An operating system is the software that serves as an interface between the user (or his/her software applications) and

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Client Server & Distributed System. A Basic Introduction

Client Server & Distributed System. A Basic Introduction Client Server & Distributed System A Basic Introduction 1 Client Server Architecture A network architecture in which each computer or process on the network is either a client or a server. Source: http://webopedia.lycos.com

More information

Distributed System Chapter 16 Issues in ch 17, ch 18

Distributed System Chapter 16 Issues in ch 17, ch 18 Distributed System Chapter 16 Issues in ch 17, ch 18 1 Chapter 16: Distributed System Structures! Motivation! Types of Network-Based Operating Systems! Network Structure! Network Topology! Communication

More information

Software. Linux. Squid Windows

Software. Linux. Squid Windows Proxy Server Introduction A proxy server services client requests by forwarding : the requests to the destination server. The requests appear to come from the proxy server and not from the client. the

More information

AFTN Terminal. Architecture Overview

AFTN Terminal. Architecture Overview AFTN Terminal Architecture Overview Flight ATM Systems Ltd. Document Number AFTNTERM-ARCH Rev A0.01 Filename: GEN_AFTN_Terminal Architecture.doc Paper size: A4 Template: Flight ATM.dot persons, without

More information

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the

More information

High Performance Computing Course Notes HPC Fundamentals

High Performance Computing Course Notes HPC Fundamentals High Performance Computing Course Notes 2008-2009 2009 HPC Fundamentals Introduction What is High Performance Computing (HPC)? Difficult to define - it s a moving target. Later 1980s, a supercomputer performs

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Technical papers Web caches

Technical papers Web caches Technical papers Web caches Web caches What is a web cache? In their simplest form, web caches store temporary copies of web objects. They are designed primarily to improve the accessibility and availability

More information

Hadoop File System S L I D E S M O D I F I E D F R O M P R E S E N T A T I O N B Y B. R A M A M U R T H Y 11/15/2017

Hadoop File System S L I D E S M O D I F I E D F R O M P R E S E N T A T I O N B Y B. R A M A M U R T H Y 11/15/2017 Hadoop File System 1 S L I D E S M O D I F I E D F R O M P R E S E N T A T I O N B Y B. R A M A M U R T H Y Moving Computation is Cheaper than Moving Data Motivation: Big Data! What is BigData? - Google

More information

PART IV. Internetworking Using TCP/IP

PART IV. Internetworking Using TCP/IP PART IV Internetworking Using TCP/IP Internet architecture, addressing, binding, encapsulation, and protocols in the TCP/IP suite Chapters 20 Internetworking: Concepts, Architecture, and Protocols 21 IP:

More information

Introduction to Distributed Systems

Introduction to Distributed Systems Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]

More information

AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases

AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases An AdvOSS White Paper Latest version of this white paper can always be found at http://advoss.com/resources/whitepapers/advoss-aaa-workflows.pdf

More information

Module 16: Distributed System Structures

Module 16: Distributed System Structures Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Distributed systems. Distributed Systems Architectures. System types. Objectives. Distributed system characteristics.

Distributed systems. Distributed Systems Architectures. System types. Objectives. Distributed system characteristics. Distributed systems Distributed Systems Architectures Virtually all large computer-based systems are now distributed systems. Information processing is distributed over several computers rather than confined

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition,

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition, Module 16: Distributed System Structures, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

the Corba/Java Firewall

the Corba/Java Firewall Firewall Security for Corba and J2EE/EJB with the IIOP Domain Boundary Controller Corba and Java-RMI based applications can be directly and securely made accessible to users outside the internal network,

More information

Contents. The Workshop IPv6 Collaborations in ASEAN Framework..8. The Results of IPv6 Collaborations in ASEAN..19. Conclusion and Recommendation 20

Contents. The Workshop IPv6 Collaborations in ASEAN Framework..8. The Results of IPv6 Collaborations in ASEAN..19. Conclusion and Recommendation 20 Page 1 Contents i. Project Overview Executive Summary 2 a. Introduction i. Background...3 ii. Objective.3 iii. Scope of Work.3 iv. Budget.. 6 v. Action Plan for Expected Results 7 ii. iii. iv. The Workshop

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Full file at   Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T

More information

Agent-Enabling Transformation of E-Commerce Portals with Web Services

Agent-Enabling Transformation of E-Commerce Portals with Web Services Agent-Enabling Transformation of E-Commerce Portals with Web Services Dr. David B. Ulmer CTO Sotheby s New York, NY 10021, USA Dr. Lixin Tao Professor Pace University Pleasantville, NY 10570, USA Abstract:

More information

Distributed Systems. Lecture 4 Othon Michail COMP 212 1/27

Distributed Systems. Lecture 4 Othon Michail COMP 212 1/27 Distributed Systems COMP 212 Lecture 4 Othon Michail 1/27 What is a Distributed System? A distributed system is: A collection of independent computers that appears to its users as a single coherent system

More information

Network Services, Cloud Computing and Virtualization

Network Services, Cloud Computing and Virtualization Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor

More information

Microservices Beyond the Hype. SATURN San Diego May 3, 2016 Paulo Merson

Microservices Beyond the Hype. SATURN San Diego May 3, 2016 Paulo Merson Microservices Beyond the Hype SATURN San Diego May 3, 2016 Paulo Merson Our goal Try to define microservice Discuss what you gain and what you lose with microservices 2 Defining Microservice Unfortunately

More information

Distributed Systems

Distributed Systems 95-702 Distributed Systems Course administration and a brief introduction to the material. Instructors: Michael McCarthy & Joe Mertz Week 1: Five (optional, dated) videos are also available 1 Course Web

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Modulo II Introdução Sistemas Distribuídos

Modulo II Introdução Sistemas Distribuídos Modulo II Introdução Sistemas Distribuídos Prof. Ismael H F Santos April 05 Prof. Ismael H. F. Santos - ismael@tecgraf.puc-rio.br 1 Ementa Sistemas Distribuídos Cliente-Servidor April 05 Prof. Ismael H.

More information

Network fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department

Network fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department Network fundamentals IB Computer Science Content developed by Dartford Grammar School Computer Science Department HL Topics 1-7, D1-4 1: System design 2: Computer Organisation 3: Networks 4: Computational

More information

Table of Contents. Cisco RFC1483 Bridging Baseline Architecture

Table of Contents. Cisco RFC1483 Bridging Baseline Architecture Table of Contents RFC1483 Bridging Baseline Architecture...1 Introduction...1 Assumption...1 Technology Brief...1 Advantages and Disadvantages of RFC1483 Bridging...1 Advantages...2 Disadvantages...2 Implementation

More information

Chapter 2 System Models

Chapter 2 System Models CSF661 Distributed Systems 分散式系統 Chapter 2 System Models 吳俊興國立高雄大學資訊工程學系 Chapter 2 System Models 2.1 Introduction 2.2 Physical models 2.3 Architectural models 2.4 Fundamental models 2.5 Summary 2 A physical

More information

UNIVERSITY OF CAGLIARI

UNIVERSITY OF CAGLIARI UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet SDN: Control Plane ACK: content taken from Foundations of Modern

More information

THE ZADARA CLOUD. An overview of the Zadara Storage Cloud and VPSA Storage Array technology WHITE PAPER

THE ZADARA CLOUD. An overview of the Zadara Storage Cloud and VPSA Storage Array technology WHITE PAPER WHITE PAPER THE ZADARA CLOUD An overview of the Zadara Storage Cloud and VPSA Storage Array technology Zadara 6 Venture, Suite 140, Irvine, CA 92618, USA www.zadarastorage.com EXECUTIVE SUMMARY The IT

More information

Distributed Systems: Models and Design

Distributed Systems: Models and Design Distributed Systems: Models and Design Nicola Dragoni Embedded Systems Engineering DTU Informatics 1. Architectural Models 2. Interaction Model 3. Design Challenges 4. Case Study: Design of a Client-Server

More information

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that

More information

SYN Flood Attack Protection Technology White Paper

SYN Flood Attack Protection Technology White Paper Flood Attack Protection Technology White Paper Flood Attack Protection Technology White Paper Keywords: flood, Cookie, Safe Reset Abstract: This document describes the technologies and measures provided

More information

SAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node

SAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node Topic 2 focuses on networking. It covers: Definition of a network. Characteristics and functions of network devices. Specification of local area network (LAN). Network software. Application software. Basic

More information

Distributed Systems. Why use distributed systems? What is a distributed system? Intro to Distributed Systems and Networks.

Distributed Systems. Why use distributed systems? What is a distributed system? Intro to Distributed Systems and Networks. Intro to Distributed Systems and Networks Hank Levy Distributed Systems Nearly all systems today are distributed in some way, e.g.: they use email they access files over a network they access printers

More information

Distributed Systems. Overview. Distributed Systems September A distributed system is a piece of software that ensures that:

Distributed Systems. Overview. Distributed Systems September A distributed system is a piece of software that ensures that: Distributed Systems Overview Distributed Systems September 2002 1 Distributed System: Definition A distributed system is a piece of software that ensures that: A collection of independent computers that

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

THE IMPACT OF E-COMMERCE ON DEVELOPING A COURSE IN OPERATING SYSTEMS: AN INTERPRETIVE STUDY

THE IMPACT OF E-COMMERCE ON DEVELOPING A COURSE IN OPERATING SYSTEMS: AN INTERPRETIVE STUDY THE IMPACT OF E-COMMERCE ON DEVELOPING A COURSE IN OPERATING SYSTEMS: AN INTERPRETIVE STUDY Reggie Davidrajuh, Stavanger University College, Norway, reggie.davidrajuh@tn.his.no ABSTRACT This paper presents

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

An Enhanced Binning Algorithm for Distributed Web Clusters

An Enhanced Binning Algorithm for Distributed Web Clusters 1 An Enhanced Binning Algorithm for Distributed Web Clusters Hann-Jang Ho Granddon D. Yen Jack Lee Department of Information Management, WuFeng Institute of Technology SingLing Lee Feng-Wei Lien Department

More information

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016 Overview Content Delivery 15-441 15-441 Computer Networking 15-641 Lecture 15: The Web Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Web Protocol interactions HTTP versions Caching Cookies

More information

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline

More information

1. Introduction. 2. Why Mi-Token? Product Overview

1. Introduction. 2. Why Mi-Token? Product Overview Product Overview 2016 01 1. Introduction Mi-Token has been delivering authentication solutions to financial, enterprise and government institutions for almost ten years. Mi-Token was designed from the

More information

Distributed Systems. Thoai Nam Faculty of Computer Science and Engineering HCMC University of Technology

Distributed Systems. Thoai Nam Faculty of Computer Science and Engineering HCMC University of Technology Distributed Systems Thoai Nam Faculty of Computer Science and Engineering HCMC University of Technology Chapter 1: Introduction Distributed Systems Hardware & software Transparency Scalability Distributed

More information

Ensuring the Success of E-Business Sites. January 2000

Ensuring the Success of E-Business Sites. January 2000 Ensuring the Success of E-Business Sites January 2000 Executive Summary Critical to your success in the e-business market is a high-capacity, high-availability and secure web site. And to ensure long-term

More information

Network Connectivity and Mobility

Network Connectivity and Mobility Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network

More information

An Introduction to the Amoeba Distributed Operating System Apan Qasem Computer Science Department Florida State University

An Introduction to the Amoeba Distributed Operating System Apan Qasem Computer Science Department Florida State University An Introduction to the Amoeba Distributed Operating System Apan Qasem Computer Science Department Florida State University qasem@cs.fsu.edu Abstract The Amoeba Operating System has been in use in academia,

More information

System Analysis & design

System Analysis & design Assiut University Faculty of Computers and Information System Analysis & design Year 2 Academic Year 2014/ 2015 Term (2) Copyright 2014 Dr. Hossam Ragab 8 A n important component of the design phase is

More information

9.1 Introduction 9.2 Name services and the DNS 9.3 Discovery services 9.6 Summary

9.1 Introduction 9.2 Name services and the DNS 9.3 Discovery services 9.6 Summary Teaching material based on Distributed Systems: Concepts and Design, Edition 3, Addison-Wesley 2001. Distributed Systems Course Name Services Copyright George Coulouris, Jean Dollimore, Tim Kindberg 2001

More information

Free upgrade of computer power with Java, web-base technology and parallel computing

Free upgrade of computer power with Java, web-base technology and parallel computing Free upgrade of computer power with Java, web-base technology and parallel computing Alfred Loo\ Y.K. Choi * and Chris Bloor* *Lingnan University, Hong Kong *City University of Hong Kong, Hong Kong ^University

More information

CMPE 151: Network Administration. Servers

CMPE 151: Network Administration. Servers CMPE 151: Network Administration Servers Announcements Unix shell+emacs tutorial. Basic Servers Telnet/Finger FTP Web SSH NNTP Let s look at the underlying protocols. Client-Server Model Request Response

More information

Distributed Systems Architectures. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 12 Slide 1

Distributed Systems Architectures. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 12 Slide 1 Objectives To explain the advantages and disadvantages of different distributed systems architectures

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10 / 2II45), on Monday November 2, 2015, from 13.30 to 16.30 hours. Indicate on

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10), on Monday November 7, 2016, from 13.30 to 16.30 hours. Before you start, read

More information

Antelope Consulting FINAL, JULY Appendix K: Glossary

Antelope Consulting FINAL, JULY Appendix K: Glossary Antelope Consulting FINAL, JULY 2001 DFID Internet Costs Study Appendix K: Glossary TESSA N GROVES, 16 SEPTEMBER 2001 Admin Lease rate APEC APEC TEL Call Detail Record Circuit-switched, Circuit switching

More information

System types. Distributed systems

System types. Distributed systems System types 1 Personal systems that are designed to run on a personal computer or workstation Distributed systems where the system software runs on a loosely integrated group of cooperating processors

More information

Service-Oriented Architecture

Service-Oriented Architecture Service-Oriented Architecture The Service Oriented Society Imagine if we had to do everything we need to get done by ourselves? From Craftsmen to Service Providers Our society has become what it is today

More information

A New Architecture for HTTP Proxies Using Workstation Caches

A New Architecture for HTTP Proxies Using Workstation Caches A New Architecture for HTTP Proxies Using Workstation Caches Author Names : Prabhakar T V (tvprabs@cedt.iisc.ernet.in) R. Venkatesha Prasad (vprasad@cedt.iisc.ernet.in) Kartik M (kartik_m@msn.com) Kiran

More information

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Layers of an information system. Design strategies.

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Layers of an information system. Design strategies. Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES Specimen Answers Question 1 DOM Document Object Model CSS Cascading Style Sheets XSL extensible Stylesheet

More information

CYAN SECURE WEB Installing on Windows

CYAN SECURE WEB Installing on Windows CYAN SECURE WEB September 2009 Applies to: 1.7 and above Table of Contents 1 Introduction... 2 2 Preparation... 2 3 Network Integration... 3 3.1 Out-of-line Deployment... 3 3.2 DMZ Deployment... 3 4 Proxy

More information

System Models for Distributed Systems

System Models for Distributed Systems System Models for Distributed Systems INF5040/9040 Autumn 2015 Lecturer: Amir Taherkordi (ifi/uio) August 31, 2015 Outline 1. Introduction 2. Physical Models 4. Fundamental Models 2 INF5040 1 System Models

More information

The internet What is it??

The internet What is it?? The internet What is it?? The internet is a global system of interconnected computer network that use the standard internet protocol suit (TCP/IP) to serve billions of users word wide. In other word it

More information

A guide to CLARiSUITE TM network solutions

A guide to CLARiSUITE TM network solutions Technical FAQ s CLARiSUITE Code Assurance A guide to CLARiSUITE TM network solutions Overview IT infrastructure security, integrity and stability are primary concerns of Videojet and its customers. Management

More information

Processes in Distributed Systems

Processes in Distributed Systems Processes in Distributed Systems Distributed Systems L-A Sistemi Distribuiti L-A Andrea Omicini andrea.omicini@unibo.it Ingegneria Due Alma Mater Studiorum Università di Bologna a Cesena Academic Year

More information

Securely Access Services Over AWS PrivateLink. January 2019

Securely Access Services Over AWS PrivateLink. January 2019 Securely Access Services Over AWS PrivateLink January 2019 Notices This document is provided for informational purposes only. It represents AWS s current product offerings and practices as of the date

More information

Managed Services Rely on us to manage your business services

Managed Services Rely on us to manage your business services Managed Services Rely on us to manage your business services Your business relies on a number of interconnected systems used by different departments from HR, Marketing, Sales and IT. Keeping all these

More information

Design of a Simple, Distributed Network Access Control System

Design of a Simple, Distributed Network Access Control System 1 Design of a Simple, Distributed Network Access Control System By David Boen, Daniel Dent, Victor Chan, Andrew Tjia Abstract Network access control describes the measures used to control network nodes

More information

Pervasive Web Application Architecture. History Scalability Availability Development Application Architecture

Pervasive Web Application Architecture. History Scalability Availability Development Application Architecture Pervasive Web Application Architecture History Scalability Availability Development Application Architecture It support multiple devices, such as PCs, WAP phones, PDAs and voice-only phones enables to

More information

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways Firewalls 1 Overview In old days, brick walls (called firewalls ) built between buildings to prevent fire spreading from building to another Today, when private network (i.e., intranet) connected to public

More information

A Balanced Introduction to Computer Science, 3/E David Reed, Creighton University 2011 Pearson Prentice Hall ISBN

A Balanced Introduction to Computer Science, 3/E David Reed, Creighton University 2011 Pearson Prentice Hall ISBN A Balanced Introduction to Computer Science, 3/E David Reed, Creighton University 2011 Pearson Prentice Hall ISBN 978-0-13-216675-1 Chapter 3 The Internet and the Web 1 History of Internet recall: the

More information

Optimizing your network for the cloud-first world

Optimizing your network for the cloud-first world Optimizing your network for the cloud-first world Why performing cloud and network modernization together assures seamless, reliable user app delivery. Citrix.com ebook Align Cloud Strategy to Business

More information

Hypertext Transport Protocol HTTP/1.1

Hypertext Transport Protocol HTTP/1.1 Hypertext Transport Protocol HTTP/1.1 Jim Gettys Digital Equipment Corporation, ISBU Visiting Scientist, World Wide Web Consortium 10/17/96 20-Apr-01 1 Acknowledgments HTTP/1.1 Authors Roy Fielding (UCI)

More information