Client-server Basics. 1. Motivation
|
|
- Kory Kelly
- 5 years ago
- Views:
Transcription
1 Page 1 of 8 Client-server Basics Oxford Brookes University 2004 Contents 1. Motivation 2. Basic Model of the Web 3. Extensions - Caching and Proxies 4. High Performance Web Servers 5. Web Services Appendices A. References 1. Motivation Resource naming, sharing and allocation are fundamental issues in computer science. In the earliest days computers were single processor entities and there was no communication between computers. A computer would run a single user-job to completion, then the next would be loaded and run. This was perceived to be inefficient usage of a scarce resource which led to the development of time sharing, multi-tasking operating systems which could share the single processor resource amongst multiple jobs loaded onto the computer. Sending a job to another computer involved sending a physical deck of cards, paper tape or magnetic tape and the results would be returned in similar manner usually as physical printer output. One of the early motivations for computer networks was to eliminate the need for physical media and enable a direct communication path between computers. In the 1960s host-satellite systems started to emerge. Graphical displays are a good example. The processing power needed to drive the display was considerable and to drive a display from the same processor that was running the application took too much resource away from the application. Thus architectures emerged in which the graphics display was driven by a separate processor, the satellite processor, linked in some way to the main processor, the host; an early example of distribution. As computers became more powerful and the demands for computing resources grew, distributed computing systems emerged. A distributed system can call upon a range of resources in order to carry out a computation, for example, multiple processors, filestores, peripherals etc. Two general models emerged, depending on how the resources were coupled. The two are known as tightly-coupled distributed systems and loosely-coupled distributed systems. Multiple processors communicating through shared memory is typical of the former class. A collection of workstations accessing resources such as printers and filestores is typical of the latter. Tightly-coupled systems occupy a limited geographical area (the same chip, or rack) in order to maximise interconnection speeds. Looselycoupled systems can operate over local or wide area networks. The client-server model is a particular kind of loosely-coupled distributed system. The basic idea of a client server system is that a client can send a request to a server to perform some task and receive a response. A time server is a simple example. The client requests the server for the current time, the server sends the current time to the client in the response. A print server is another example, the client sends a document to the server, the server prints it and sends a response to the client that this has been done. A file server is another. The client requests a file from the server, the server returns it. The basic request/response idea is illustrated in figure 1.1. below.
2 Page 2 of 8 Figure 1.1: Request/response Model Benefits of this approach include: Resource allocation: server can provide same kind of service to many clients Server can be optimised/specialised to provide particular kinds of service What price do we pay for this? Loosely-coupled systems introduce delays, not least due to the time taken to transmit requests and responses over a network. Delays may also occur if the server is heavily loaded because requests are arriving faster than the server can service them. Client-server systems can fail in different ways to, say, a local procedure invocation. Server might not be able to provide requested service, e.g. requested file might not exist (easy: send error response) When client sends request to server, server might not be operational Server might receive request from client, start to process it, then fail Client might fail whilst server is processing request Network might fail to deliver request or response correctly Network link might fail whilst request or response is being transmitted Client-server systems have to be able to handle such situations gracefully. Further issues arise when we study client-server systems more closely, for example: Protocols: request and response messages need to be transmitted correctly; client-server systems require data to be delivered reliably and in the correct order Naming/addressing: how are names and addresses of services allocated? The number of services is potentially very large Scalabiliy: how easy is it to extend a system to deal with increasing demand? Caching: what economies are possible if the same client asks for the same thing repeatedly, or different clients ask for the same thing? Security: transmission of request and response, denial-of-service attacks (bombard a service with "false" requests, thus denying service to genuine clients) Authentication: who is allowed to use a service? If a request is from a client that is allowed to
3 Page 3 of 8 use the service, how do you know that that client is who it claims to be? Control flow: can a server invoke other servers in computing the response to a request? Some of these issues will be explored in this module, and others in the Semester 2 modules in the course. These issues are instances of more general issues that arise in distributed systems. It is likely that you will have encountered these if you have studied a course on distributed systems. The key notion is transparency: concealment from user and application programmer of the separation of the system into components. The system is perceived as a whole rather than collection of individual components. There are different kinds of transparency (see Emmerich, 2000): Access Interface to service request is same for communication between components on same host and on different hosts Location Components can be identified in service requests without physical locations being known Migration Components can be migrated to another host without affecting operation of users or programs Replication Users and programmers not aware service is provided by replica of original component rather than master Concurrency Several components may concurrently request services from a shared component, while shared component s integrity is preserved, and neither users nor programmers have to see how concurrency is controlled Scalability Transparent to users and designers how system scales to accommodate growing load Performance Transparent to users how system performance is achieved Failure Concealment of faults from users, clients and server components We conclude this introduction by looking at how these ideas and issues apply to the Web. 2. Basic Model of the Web In order for the Web to work, there was a need for a way of requesting Web pages and having them delivered from a remote server to the browser. In December 1990 when the first web pages were served from a server in CERN, the decision had already been made to use a very simple protocol called HyperText Transfer Protocol (HTTP) running over the Internet using TCP/IP. Routing the pages through the network and uniquely addreessing the destination is done by the Internet Protocol (IP). Communication between the hosts is achieved by the Transmission Control Protocol (TCP). The HTTP architecture agreed is shown in Figure 1.2. Only the Client is allowed to make requests. It asks the server on the Internet at the site to deliver the page file.htm to the Client for browsing. The Server may be able to find the file (called a document or a page) and, if so, it will deliver it to the Client. If the file cannot be located, an error response is sent instead.
4 Page 4 of 8 Figure 2.1: Request/response Model of HTTP A simple example showing the format of the HTTP request and response messages is shown in Figures 2.2 and 2.3. The request message requests a particular resource, in this case the document The response message either returns the document or includes an error message. The structure of the request and response messages is explained in detail in the HTTP Primer. Figure 2.2: HTTP Request Message
5 Page 5 of 8 Figure 2.3: HTTP Response Message The protocols involved in HTTP message transfer are illustrated in Figure 2.4. More details are given in the HTTP Primer. Figure 2.4: Protocols used in HTTP Message Transfer 3. Extensions - Caching and Proxies As soon as the web started getting used, it became clear that this simple model was not that efficient. Suppose the user downloads a web page and then a second. If the user wants to refer back to the first page, then the model as it stands would require the page to be requested again. In consequence, almost
6 Page 6 of 8 from day one the possibility of having a cache of already downloaded web pages was seen as useful. When the user hits the back button on the browser, the page is retrieved from a local cache on the computer running the browser rather than request the page again. Browsers have over the years added other features such as History files and Bookmark lists which also can make use of a local cache. At the Server end, there is also a use for a cache. If the server has a large main memory, rather than retrieve each file from disc, it is able to keep the last set of pages requested in main memory in order to improve its response to users. Organisations soon began to find that their staff were using the Web a great deal. In some cases this was good news as they were accessing relevant information needed to do their job. Sometimes the staff were downloading information of a more private nature, organising their holidays, purchasing goods etc. This led to the introduction of a device called a proxy which to the Client looks like a Server and to a Server looks like a Client. Proxies have a wide range of uses. They can be used to control what pages the organisation's staff are allowed to access. If the proxy is placed on the firewall between the company's Intranet and the Internet, it is possible to check what documents are being requested. The organisation can set up the network so that all external requests go the proxy which onward routes the ones that the organisation is happy with and sends back an unavailable error message otherwise. Figure 3.1: Caching and Proxies Proxies also can contain caches. In this case, the cache serves a set of users rather than a single user. In an organisation, it is likely that a set of users will request similar pages due to the nature of their work, so a proxy cache also has value. User A requests a page that is stored in the proxy cache and when user B requests the same page, it is returned from the proxy rather than requesting it from the Server. Figure 3.1 shows the overall arrangement of a site with a proxy cache. If a proxy is of use to an organisation, it may also be of value to a Department, to an Internet service Provider, to a Community and even a country. For example, the UK has an academic cache aimed at reducing the traffic between the UK and the USA to lower the need for expensive bandwidth between the UK and the USA. Some countries have national caches to censor information that arrives in the country. Information cannot be left in a cache forever as eventually it will be out-of-date and the cache will fill up. The Server may have updated a Web page but all the caches are still returning the old version. With the potential of there being a whole series of caches between the user and the site from which a page is required, mechanisms are needed to handle stale pages in the various caches and to ensure that pages of the appropriate freshness are returned to the user. 4. High Performance Web Servers Web sites that receive thousands or millions of hits per day cannot be implemented as single server
7 Page 7 of 8 systems. One type of technique that can be employed is for requests to do to a front-end server that then distributes them to one of a set of back-end servers in such a way that the work is spread evenly across the back-end servers. The idea is illustrated in Figure 4.1. Figure 4.1: Workload Distribution Further consideration of this topic is outside the scope of this module. A very good survey article is Cardellini et al, Web Services The request from the client to the server may be more complex than a request for a pre-existing document. Some computation might be involved. One generalisation of this is the Common Gateway Interface (CGI), another is Java Servlets. These topics are considered later in the module. Another generalization is to Web Services. This topic will be covered in a later module in the course (P00773 Web Deployment). The basic idea of a Web Service is a software application: identified by a URI whose interfaces and bindings are capable of being defined, described and discovered by XML artifacts and which can support direct interactions with other software applications using XML-based messages via Internet-based protocols The general idea is illustrated in Figure 5.1.
8 Page 8 of 8 Figure 5.1: Web Services Architecture Appendix A References 1. Wolfgang Emmerich (2000), Engineering Distributed Objects, John Wiley & Sons, ISBN V. Cardellini, E. Casallicchio and P.S. Yu, The State of the Art in Locally Distributed Web-Server Systems, ACM Computing Surveys, 34(2), pp Available through ACM Digital Library.
02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is
More informationChapter 17: Distributed Systems (DS)
Chapter 17: Distributed Systems (DS) Silberschatz, Galvin and Gagne 2013 Chapter 17: Distributed Systems Advantages of Distributed Systems Types of Network-Based Operating Systems Network Structure Communication
More informationFundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy
System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationDistributed Systems. Bina Ramamurthy. 6/13/2005 B.Ramamurthy 1
Distributed Systems Bina Ramamurthy 6/13/2005 B.Ramamurthy 1 Introduction Distributed system is the one in which hardware and software components at networked computers communicate and coordinate their
More informationCourse Snapshot. The Next Few Classes. Parallel versus Distributed Systems. Distributed Systems. We have covered all the fundamental OS components:
Course Snapshot The Next Few Classes We have covered all the fundamental OS components: Architecture and OS interactions Processes and threads Synchronization and deadlock Process scheduling Memory management
More informationVirtual private networks
Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible
More informationCourse Snapshot. The Next Few Classes
Course Snapshot We have covered all the fundamental OS components: Architecture and OS interactions Processes and threads Synchronization and deadlock Process scheduling Memory management File systems
More informationON-LINE EXPERT SUPPORT THROUGH VPN ACCESS
ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2006 Kerio Technologies. All Rights Reserved. Printing Date: May 3, 2006 This guide provides detailed description on configuration of the local network
More informationIntroduction. Distributed Systems. Introduction. Introduction. Instructor Brian Mitchell - Brian
Distributed 1 Directory 1 Cache 1 1 2 Directory 2 Cache 2 2... N Directory N Interconnection Network... Cache N N Instructor Brian Mitchell - Brian bmitchel@mcs.drexel.edu www.mcs.drexel.edu/~bmitchel
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network
More informationChapter 1: Distributed Information Systems
Chapter 1: Distributed Information Systems Contents - Chapter 1 Design of an information system Layers and tiers Bottom up design Top down design Architecture of an information system One tier Two tier
More informationHEP replica management
Primary actor Goal in context Scope Level Stakeholders and interests Precondition Minimal guarantees Success guarantees Trigger Technology and data variations Priority Releases Response time Frequency
More informationIntroduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University
Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Release Date: March 16, 2007 This guide provides detailed description on configuration of the local network which
More informationDistributed Systems. Definitions. Why Build Distributed Systems? Operating Systems - Overview. Operating Systems - Overview
Distributed Systems Joseph Spring School of Computer Science Distributed Systems and Security Areas for Discussion Definitions Operating Systems Overview Challenges Heterogeneity Limitations and 2 Definitions
More informationIntroduction 1.1 SERVER-CENTRIC IT ARCHITECTURE AND ITS LIMITATIONS
1 Introduction The purpose of this chapter is to convey the basic idea underlying this book. To this end we will first describe conventional server-centric IT architecture and sketch out its limitations
More informationUnit 5: Distributed, Real-Time, and Multimedia Systems
Unit 5: Distributed, Real-Time, and Multimedia Systems Unit Overview Unit 5 provides an extension to the core topics of operating systems. It introduces distributed systems and special-purpose operating
More informationCSC 453 Operating Systems
CSC 453 Operating Systems Lecture 1: An Introduction What Is an Operating System? An operating system is the software that serves as an interface between the user (or his/her software applications) and
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationClient Server & Distributed System. A Basic Introduction
Client Server & Distributed System A Basic Introduction 1 Client Server Architecture A network architecture in which each computer or process on the network is either a client or a server. Source: http://webopedia.lycos.com
More informationDistributed System Chapter 16 Issues in ch 17, ch 18
Distributed System Chapter 16 Issues in ch 17, ch 18 1 Chapter 16: Distributed System Structures! Motivation! Types of Network-Based Operating Systems! Network Structure! Network Topology! Communication
More informationSoftware. Linux. Squid Windows
Proxy Server Introduction A proxy server services client requests by forwarding : the requests to the destination server. The requests appear to come from the proxy server and not from the client. the
More informationAFTN Terminal. Architecture Overview
AFTN Terminal Architecture Overview Flight ATM Systems Ltd. Document Number AFTNTERM-ARCH Rev A0.01 Filename: GEN_AFTN_Terminal Architecture.doc Paper size: A4 Template: Flight ATM.dot persons, without
More informationAQU Information Systems Fundamentals Spring 2012 Pg. 9.1
AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity
More informationFull file at
ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the
More informationHigh Performance Computing Course Notes HPC Fundamentals
High Performance Computing Course Notes 2008-2009 2009 HPC Fundamentals Introduction What is High Performance Computing (HPC)? Difficult to define - it s a moving target. Later 1980s, a supercomputer performs
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More informationTechnical papers Web caches
Technical papers Web caches Web caches What is a web cache? In their simplest form, web caches store temporary copies of web objects. They are designed primarily to improve the accessibility and availability
More informationHadoop File System S L I D E S M O D I F I E D F R O M P R E S E N T A T I O N B Y B. R A M A M U R T H Y 11/15/2017
Hadoop File System 1 S L I D E S M O D I F I E D F R O M P R E S E N T A T I O N B Y B. R A M A M U R T H Y Moving Computation is Cheaper than Moving Data Motivation: Big Data! What is BigData? - Google
More informationPART IV. Internetworking Using TCP/IP
PART IV Internetworking Using TCP/IP Internet architecture, addressing, binding, encapsulation, and protocols in the TCP/IP suite Chapters 20 Internetworking: Concepts, Architecture, and Protocols 21 IP:
More informationIntroduction to Distributed Systems
Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]
More informationAdvOSS AAA: Architecture, Call flows and implementing emerging business use cases
AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases An AdvOSS White Paper Latest version of this white paper can always be found at http://advoss.com/resources/whitepapers/advoss-aaa-workflows.pdf
More informationModule 16: Distributed System Structures
Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication
More informationDistributed systems. Distributed Systems Architectures. System types. Objectives. Distributed system characteristics.
Distributed systems Distributed Systems Architectures Virtually all large computer-based systems are now distributed systems. Information processing is distributed over several computers rather than confined
More informationDeployment Scenarios for Standalone Content Engines
CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This
More informationModule 16: Distributed System Structures. Operating System Concepts 8 th Edition,
Module 16: Distributed System Structures, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationthe Corba/Java Firewall
Firewall Security for Corba and J2EE/EJB with the IIOP Domain Boundary Controller Corba and Java-RMI based applications can be directly and securely made accessible to users outside the internal network,
More informationContents. The Workshop IPv6 Collaborations in ASEAN Framework..8. The Results of IPv6 Collaborations in ASEAN..19. Conclusion and Recommendation 20
Page 1 Contents i. Project Overview Executive Summary 2 a. Introduction i. Background...3 ii. Objective.3 iii. Scope of Work.3 iv. Budget.. 6 v. Action Plan for Expected Results 7 ii. iii. iv. The Workshop
More informationFeatures of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy
Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from
More informationFull file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T
More informationAgent-Enabling Transformation of E-Commerce Portals with Web Services
Agent-Enabling Transformation of E-Commerce Portals with Web Services Dr. David B. Ulmer CTO Sotheby s New York, NY 10021, USA Dr. Lixin Tao Professor Pace University Pleasantville, NY 10570, USA Abstract:
More informationDistributed Systems. Lecture 4 Othon Michail COMP 212 1/27
Distributed Systems COMP 212 Lecture 4 Othon Michail 1/27 What is a Distributed System? A distributed system is: A collection of independent computers that appears to its users as a single coherent system
More informationNetwork Services, Cloud Computing and Virtualization
Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor
More informationMicroservices Beyond the Hype. SATURN San Diego May 3, 2016 Paulo Merson
Microservices Beyond the Hype SATURN San Diego May 3, 2016 Paulo Merson Our goal Try to define microservice Discuss what you gain and what you lose with microservices 2 Defining Microservice Unfortunately
More informationDistributed Systems
95-702 Distributed Systems Course administration and a brief introduction to the material. Instructors: Michael McCarthy & Joe Mertz Week 1: Five (optional, dated) videos are also available 1 Course Web
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationModulo II Introdução Sistemas Distribuídos
Modulo II Introdução Sistemas Distribuídos Prof. Ismael H F Santos April 05 Prof. Ismael H. F. Santos - ismael@tecgraf.puc-rio.br 1 Ementa Sistemas Distribuídos Cliente-Servidor April 05 Prof. Ismael H.
More informationNetwork fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department
Network fundamentals IB Computer Science Content developed by Dartford Grammar School Computer Science Department HL Topics 1-7, D1-4 1: System design 2: Computer Organisation 3: Networks 4: Computational
More informationTable of Contents. Cisco RFC1483 Bridging Baseline Architecture
Table of Contents RFC1483 Bridging Baseline Architecture...1 Introduction...1 Assumption...1 Technology Brief...1 Advantages and Disadvantages of RFC1483 Bridging...1 Advantages...2 Disadvantages...2 Implementation
More informationChapter 2 System Models
CSF661 Distributed Systems 分散式系統 Chapter 2 System Models 吳俊興國立高雄大學資訊工程學系 Chapter 2 System Models 2.1 Introduction 2.2 Physical models 2.3 Architectural models 2.4 Fundamental models 2.5 Summary 2 A physical
More informationUNIVERSITY OF CAGLIARI
UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet SDN: Control Plane ACK: content taken from Foundations of Modern
More informationTHE ZADARA CLOUD. An overview of the Zadara Storage Cloud and VPSA Storage Array technology WHITE PAPER
WHITE PAPER THE ZADARA CLOUD An overview of the Zadara Storage Cloud and VPSA Storage Array technology Zadara 6 Venture, Suite 140, Irvine, CA 92618, USA www.zadarastorage.com EXECUTIVE SUMMARY The IT
More informationDistributed Systems: Models and Design
Distributed Systems: Models and Design Nicola Dragoni Embedded Systems Engineering DTU Informatics 1. Architectural Models 2. Interaction Model 3. Design Challenges 4. Case Study: Design of a Client-Server
More informationChapter 2: Technology Infrastructure: The Internet and the World Wide Web
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that
More informationSYN Flood Attack Protection Technology White Paper
Flood Attack Protection Technology White Paper Flood Attack Protection Technology White Paper Keywords: flood, Cookie, Safe Reset Abstract: This document describes the technologies and measures provided
More informationSAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node
Topic 2 focuses on networking. It covers: Definition of a network. Characteristics and functions of network devices. Specification of local area network (LAN). Network software. Application software. Basic
More informationDistributed Systems. Why use distributed systems? What is a distributed system? Intro to Distributed Systems and Networks.
Intro to Distributed Systems and Networks Hank Levy Distributed Systems Nearly all systems today are distributed in some way, e.g.: they use email they access files over a network they access printers
More informationDistributed Systems. Overview. Distributed Systems September A distributed system is a piece of software that ensures that:
Distributed Systems Overview Distributed Systems September 2002 1 Distributed System: Definition A distributed system is a piece of software that ensures that: A collection of independent computers that
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationTHE IMPACT OF E-COMMERCE ON DEVELOPING A COURSE IN OPERATING SYSTEMS: AN INTERPRETIVE STUDY
THE IMPACT OF E-COMMERCE ON DEVELOPING A COURSE IN OPERATING SYSTEMS: AN INTERPRETIVE STUDY Reggie Davidrajuh, Stavanger University College, Norway, reggie.davidrajuh@tn.his.no ABSTRACT This paper presents
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More informationAn Enhanced Binning Algorithm for Distributed Web Clusters
1 An Enhanced Binning Algorithm for Distributed Web Clusters Hann-Jang Ho Granddon D. Yen Jack Lee Department of Information Management, WuFeng Institute of Technology SingLing Lee Feng-Wei Lien Department
More informationOverview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016
Overview Content Delivery 15-441 15-441 Computer Networking 15-641 Lecture 15: The Web Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Web Protocol interactions HTTP versions Caching Cookies
More informationChapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline
More information1. Introduction. 2. Why Mi-Token? Product Overview
Product Overview 2016 01 1. Introduction Mi-Token has been delivering authentication solutions to financial, enterprise and government institutions for almost ten years. Mi-Token was designed from the
More informationDistributed Systems. Thoai Nam Faculty of Computer Science and Engineering HCMC University of Technology
Distributed Systems Thoai Nam Faculty of Computer Science and Engineering HCMC University of Technology Chapter 1: Introduction Distributed Systems Hardware & software Transparency Scalability Distributed
More informationEnsuring the Success of E-Business Sites. January 2000
Ensuring the Success of E-Business Sites January 2000 Executive Summary Critical to your success in the e-business market is a high-capacity, high-availability and secure web site. And to ensure long-term
More informationNetwork Connectivity and Mobility
Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network
More informationAn Introduction to the Amoeba Distributed Operating System Apan Qasem Computer Science Department Florida State University
An Introduction to the Amoeba Distributed Operating System Apan Qasem Computer Science Department Florida State University qasem@cs.fsu.edu Abstract The Amoeba Operating System has been in use in academia,
More informationSystem Analysis & design
Assiut University Faculty of Computers and Information System Analysis & design Year 2 Academic Year 2014/ 2015 Term (2) Copyright 2014 Dr. Hossam Ragab 8 A n important component of the design phase is
More information9.1 Introduction 9.2 Name services and the DNS 9.3 Discovery services 9.6 Summary
Teaching material based on Distributed Systems: Concepts and Design, Edition 3, Addison-Wesley 2001. Distributed Systems Course Name Services Copyright George Coulouris, Jean Dollimore, Tim Kindberg 2001
More informationFree upgrade of computer power with Java, web-base technology and parallel computing
Free upgrade of computer power with Java, web-base technology and parallel computing Alfred Loo\ Y.K. Choi * and Chris Bloor* *Lingnan University, Hong Kong *City University of Hong Kong, Hong Kong ^University
More informationCMPE 151: Network Administration. Servers
CMPE 151: Network Administration Servers Announcements Unix shell+emacs tutorial. Basic Servers Telnet/Finger FTP Web SSH NNTP Let s look at the underlying protocols. Client-Server Model Request Response
More informationDistributed Systems Architectures. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 12 Slide 1
Distributed Systems Architectures Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 12 Slide 1 Objectives To explain the advantages and disadvantages of different distributed systems architectures
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica
TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10 / 2II45), on Monday November 2, 2015, from 13.30 to 16.30 hours. Indicate on
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica
TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10), on Monday November 7, 2016, from 13.30 to 16.30 hours. Before you start, read
More informationAntelope Consulting FINAL, JULY Appendix K: Glossary
Antelope Consulting FINAL, JULY 2001 DFID Internet Costs Study Appendix K: Glossary TESSA N GROVES, 16 SEPTEMBER 2001 Admin Lease rate APEC APEC TEL Call Detail Record Circuit-switched, Circuit switching
More informationSystem types. Distributed systems
System types 1 Personal systems that are designed to run on a personal computer or workstation Distributed systems where the system software runs on a loosely integrated group of cooperating processors
More informationService-Oriented Architecture
Service-Oriented Architecture The Service Oriented Society Imagine if we had to do everything we need to get done by ourselves? From Craftsmen to Service Providers Our society has become what it is today
More informationA New Architecture for HTTP Proxies Using Workstation Caches
A New Architecture for HTTP Proxies Using Workstation Caches Author Names : Prabhakar T V (tvprabs@cedt.iisc.ernet.in) R. Venkatesha Prasad (vprasad@cedt.iisc.ernet.in) Kartik M (kartik_m@msn.com) Kiran
More informationChapter Outline. Chapter 2 Distributed Information Systems Architecture. Layers of an information system. Design strategies.
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationTHE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES Specimen Answers Question 1 DOM Document Object Model CSS Cascading Style Sheets XSL extensible Stylesheet
More informationCYAN SECURE WEB Installing on Windows
CYAN SECURE WEB September 2009 Applies to: 1.7 and above Table of Contents 1 Introduction... 2 2 Preparation... 2 3 Network Integration... 3 3.1 Out-of-line Deployment... 3 3.2 DMZ Deployment... 3 4 Proxy
More informationSystem Models for Distributed Systems
System Models for Distributed Systems INF5040/9040 Autumn 2015 Lecturer: Amir Taherkordi (ifi/uio) August 31, 2015 Outline 1. Introduction 2. Physical Models 4. Fundamental Models 2 INF5040 1 System Models
More informationThe internet What is it??
The internet What is it?? The internet is a global system of interconnected computer network that use the standard internet protocol suit (TCP/IP) to serve billions of users word wide. In other word it
More informationA guide to CLARiSUITE TM network solutions
Technical FAQ s CLARiSUITE Code Assurance A guide to CLARiSUITE TM network solutions Overview IT infrastructure security, integrity and stability are primary concerns of Videojet and its customers. Management
More informationProcesses in Distributed Systems
Processes in Distributed Systems Distributed Systems L-A Sistemi Distribuiti L-A Andrea Omicini andrea.omicini@unibo.it Ingegneria Due Alma Mater Studiorum Università di Bologna a Cesena Academic Year
More informationSecurely Access Services Over AWS PrivateLink. January 2019
Securely Access Services Over AWS PrivateLink January 2019 Notices This document is provided for informational purposes only. It represents AWS s current product offerings and practices as of the date
More informationManaged Services Rely on us to manage your business services
Managed Services Rely on us to manage your business services Your business relies on a number of interconnected systems used by different departments from HR, Marketing, Sales and IT. Keeping all these
More informationDesign of a Simple, Distributed Network Access Control System
1 Design of a Simple, Distributed Network Access Control System By David Boen, Daniel Dent, Victor Chan, Andrew Tjia Abstract Network access control describes the measures used to control network nodes
More informationPervasive Web Application Architecture. History Scalability Availability Development Application Architecture
Pervasive Web Application Architecture History Scalability Availability Development Application Architecture It support multiple devices, such as PCs, WAP phones, PDAs and voice-only phones enables to
More informationfirewalls perimeter firewall systems firewalls security gateways secure Internet gateways
Firewalls 1 Overview In old days, brick walls (called firewalls ) built between buildings to prevent fire spreading from building to another Today, when private network (i.e., intranet) connected to public
More informationA Balanced Introduction to Computer Science, 3/E David Reed, Creighton University 2011 Pearson Prentice Hall ISBN
A Balanced Introduction to Computer Science, 3/E David Reed, Creighton University 2011 Pearson Prentice Hall ISBN 978-0-13-216675-1 Chapter 3 The Internet and the Web 1 History of Internet recall: the
More informationOptimizing your network for the cloud-first world
Optimizing your network for the cloud-first world Why performing cloud and network modernization together assures seamless, reliable user app delivery. Citrix.com ebook Align Cloud Strategy to Business
More informationHypertext Transport Protocol HTTP/1.1
Hypertext Transport Protocol HTTP/1.1 Jim Gettys Digital Equipment Corporation, ISBU Visiting Scientist, World Wide Web Consortium 10/17/96 20-Apr-01 1 Acknowledgments HTTP/1.1 Authors Roy Fielding (UCI)
More information