SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Computer Engineering and Intelligent Systems                                                              www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012




                                     Distribution Systems Efficiency
                                      Omar Al-Heyasat (corresponding author)
                          Computer Engineering Department, Al-Balqa' Applied University
                  omarheyasat@hotmail.com, ashraf.abuain@fet.edu.jo, P.O.Box: 15008 Amman 11134
                                            Ashraf Abdel-Karim Abu-Ein
                          Computer Engineering Department, Al-Balqa' Applied University
                  omarheyasat@hotmail.com, ashraf.abuain@fet.edu.jo, P.O.Box: 15008 Amman 11134
                                           Hazem (Moh’d Said) Hatamleh
                 Computer Science Department, Al-Balqa' Applied University, Ajlun University College
                                               Ahmed A.M Sharadqeh
                          Computer Engineering Department, Al-Balqa' Applied University,
                                              sharadqh_78@yahoo.com
                                              As'ad Mahmoud Alnaser
                            Computer Science Department, Al-Balqa' Applied University,
                                              Ajlun University College
                                Jordan, hazim-hh@bau.edu.jo, asad1_99@yahoo.com
Abstract
This paper constructing a measurement system for determining the efficiency of the distributed system. This efficiency
depends on many parameters like number of terminals, number of customers and kind of information, number of
nodes, and number of messages. It is found that the efficiency depends strongly on number of messages sent or
received inside the distributed system, as the number of messages increased the efficiency decreased.
Keywords: distributed system, terminals, efficiency.

1. Introduction
  Distributed systems are a mean to decrease the time needed to perform some task and software errors arise from a
number of different problems, such as incorrect or incomplete specifications, coding errors, and faults and failures in
the hardware, operating system or network. Model checking is an important technology which is finding increasing
use as a means of reducing software errors. Unfortunately, despite impressive recent advances, the size of systems for
which model checking is feasible remains rather limited. This weakness is particularly critical in the context of
distributed systems: concurrency and asynchrony result in inherent non-determinism that significantly increases the
number of states to be analyzed and this affects the distributed systems efficiency. As a result, most system builders
continue to use testing as the major means to identify bugs in their implementations. There are, however, two
problems with software testing. First, testing is generally done in an ad hoc manner: the software developer must
hand translate the requirements into specific dynamic checks on the program state. Second, test coverage is often
rather limited, covering only some execution paths. To mitigate the first problem, software often includes dynamic
checks on a system’s state in order to identify problems at run-time. Recently, there has been some interest in
run-time verification and monitoring techniques, which provide a little more rigor in testing by automatically
synthesizing monitors from formal specifications. These monitors may then be deployed off-line for debugging or
on-line for dynamically checking that safety properties are not being violated during system execution.
Unfortunately, testing or runtime monitoring of distributed systems involves considerable overhead: for every event
(sending of a message, receiving of a message, or a local state update), each process sends a message about the event
to a central monitor. The central monitor constructs and analyzes a computation lattice of the global states out of
the collected events. Passing messages to a central monitor at every event and constructing a global computation
lattice, which can be exponential in size in the number of events, leads to severe communication and computation
overhead. The distributed systems may be effectively monitored at runtime against formally specified safety
requirements by distributing the task of monitoring among the processes involved in the distributed computation.
Effective monitoring means not only linear efficiency, but also decentralized monitoring where few or no additional
messages need to be passed for monitoring purposes.
Many researches dealt with such problem, Santhi B et al. (2010) presented novel algorithms for energy efficient


                                                         100
Computer Engineering and Intelligent Systems                                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012



scheduling of Directed Acyclic Graph (DAG) based applications on Dynamic Voltage Scaling (DVS) enabled
systems. Experimental results show that our proposed algorithms give better results than the existing algorithms.
Byung-G, 2006, considered replication strategies for storage systems that aggregate the disks of many nodes spread
over the Internet. Maintaining replication in such systems can be prohibitively expensive, since every transient
network or host failure could potentially lead to copying a server's worth of data over the Internet to maintain
replication levels. They also names the following insights in designing an efficient replication algorithm emerge from
the paper's analysis. First, durability can be provided separately from availability; the former is less expensive to
ensure and a more useful goal for many wide-area applications. Second, the focus of a durability algorithm must be
to create new copies of data objects faster than permanent disk failures destroy the objects; careful choice of policies
for what nodes should hold what data can decrease repair time. Third, increasing the number of replicas of each data
object does not help a system tolerate a higher disk failure probability, but does help tolerate bursts of failures.
Finally, ensuring that the system makes use of replicas that recover after temporary failure is critical to efficiency.
Based on these insights, the paper proposes the Carbonite replication algorithm for keeping data durable at a low cost.
A simulation of Carbonite storing 1 TB of data over a 365 day trace of Planet Lab activity shows that Carbonite is
able to keep all data durable and uses 44% more network traffic than a hypothetical system that only responds to
permanent failures. In comparison, Total Recall and D-Hash require almost a factor of two more network traffic than
this hypothetical system.
Koushik S., et al. 2004, described an efficient decentralized algorithm to monitor the execution of a distributed
program in order to check for violations of safety properties. The monitoring is based on formulas written in PT-DTL,
a variant of past time linear temporal logic that we define. PT-DTL is suitable for expressing temporal properties of
distributed systems. Specifically, the formulas of PT-DTL are relative to a particular process and are interpreted over
a projection of the trace of global states that represents what that process is aware of. A formula relative to one
process may refer to the local states of other processes through remote expressions and remote formulas. In order to
correctly evaluate remote expressions, they introduced the notion of knowledge vector and provide an algorithm
which keeps a process aware of other processes’ local states, if those states may affect the validity of a monitored
PT-DTL formula. Both the logic and the monitoring algorithm are illustrated through a number of examples. Finally,
they described an implementation of the algorithm in a tool called DIANA.



1.1 Distributed systems


A distributed system is a collection of k processes (p1, . . . , pk), each with its own local state. The local state of a
process is given by the values bound to its variables. Note that there are no global or shared variables. Processes
communicate with each other using asynchronous messages whose order of arrival is indeterminate. The
computation of each process is abstractly modeled by a set of events, and a distributed computation is specified by a
partial order on the events. There are three types of events:

     (1) internal events change the local state of a process;

     (2) send events occur when a process sends a message to another process; and

     (3) receive events occur when a message is received by a process.

Figure 1 represents a simulation to some distributed system.




                                                          101
Computer Engineering and Intelligent Systems                                                             www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012




                                          Figure 1 simulation of    a distributed system
The time, T,     needed for some distributed system to perform some task can be calculated as:
T= f (T{NO.(P, E, M)})                                                                                         (1)
where: No. number of, P: number of processes, E: no. of nodes, M: number of messages.
2.   Results and discussion

The time needed to perform some given task for a distributed system is adopted to measure the efficiency of such
system. From equation (1) the time needed to perform some task is given as:
T=T1+T2+T3+T4                                                                                                  (2)
Where: T1: time needed for the event to processed internally ( inside the process), T2: the time needed to send a
message M and/or receiving it. T3: the time needed to process the task inside the received node or process, and T4:
the time needed to accomplish the task and display the result.
But as we said the total time needed depends strongly on the construction of the distributed system, i. e. on the
number of processes, P, nodes, N, and events or messages, M, so equation (2) can be rewritten as:


T= PT1+2MT2+ NT3+T4                                                                                            (3)
Now to measure the efficiency of the studied distributed system let the desired time to perform the task is 900µs then
the efficiency, η,    can be defined as:
η=actual time/ desired time                                                                                    (4)
The number of processes here are assumed to be three, with 150 µs each, the time needed to send or receive a
messages is 50µs, the time needed to perform the task inside the node is 100 µs, the time to accomplish the task is
100 µs. So the efficiency is η=900/1300= 70%.
It can be noticed that the efficiency depends on number of messages sent or received inside the distributed system.
See figure 2 below.




                                                              102
Computer Engineering and Intelligent Systems                                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012




                                                                                              η




                              Figure 2 efficiency of the distributed system vs. no. of messages.
3.   Conclusion

It is clear that the efficiency of any distributed system depends strongly on the system composition, number of
processes, number of events or nodes, no of messages, time needed to process the task, and the time to accomplish
the task, as the number of such things increased the time needed becomes longer and so the efficiency decreases.


References
[1] Santhi Baskaran1 and P. Thambidurai, 2010, Energy Efficient Real-Time Scheduling in Distributed Systems,
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 4, May 2010, 35 ISSN (Online):
1694-0784, ISSN (Print): 1694-0814
 [2] M. Frans Kaashoek,? John Kubiatowicz,. and Robert Morris, 2010,                 Efficient Replica Maintenance for
Distributed     Storage     Systems      MIT     Computer   Science   and   Artificial   Intelligence   Laboratory,   Rice
University/MPI-SWS, . University of California, Berkeley, This research was supported by the National Science
Foundation under Cooperative Agreement No. ANI-0225660, http:// project-iris.net/. Andreas Haeberlen was
supported in part      by the Max Planck Society. Emil Sit was supported in part by the Cambridge-MIT Institute.
Hakim Weatherspoon was supported by an Intel Foundation PhD Fellowship.
[3] Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Ros¸2004, Efficient Decentralized Monitoring of Safety in
Distributed Systems, ACM Journal Name, Vol. V, No. N, October 2004, Pages 1–18.
[4] James D Thomas, Katia Sycara ,                   2010, Heterogeneity, Stability, and Efficiency in Distributed,
jthomas+@cs.cmu.edu, katia+@ri.cmu.edu Sponsored by NSF grant IRI9612131 and ONR grant N000149611222.
[5] Tad Hogg and Bernardo A. Huberman. Controlling chaos in distributed systems. IEEE Trans. on Systems, Man
and Cybernetics, 21(6):1325–1332, November/ December 1991.
[6] J. O. Kephart, Tad Hogg, and Bernardo A. Huberman. Dynamics of computational ecosystems. Physical Review
A, 40, 1989.


                                                             103
Computer Engineering and Intelligent Systems                                                        www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.7, 2012




[7] William H. Press, Saul A. Tukolsky,William T. Vertterling, and Brian P. Flannery. Numerical Recipies in C.
Cambridge University Press, 1992.
[8] Andrea Schaerf, Yoav Shoham, and Moshe Tennenholtz. Adaptive load balancing: A study in multiagent learning.
Journal of Artificial Intelligence Research, (2):475–500, 1995.




                                                         104
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.

More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org


The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. Prospective authors of
IISTE journals can find the submission instruction on the following page:
http://www.iiste.org/Journals/

The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.

IISTE Knowledge Sharing Partners

EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Más contenido relacionado

La actualidad más candente

Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationiaemedu
 
Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...IJECEIAES
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 
An efficient recovery mechanism
An efficient recovery mechanismAn efficient recovery mechanism
An efficient recovery mechanismijcsa
 
On the Internet Delay Space Dimensionality
On the Internet Delay Space DimensionalityOn the Internet Delay Space Dimensionality
On the Internet Delay Space DimensionalityBruno Abrahao
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET Journal
 
International Journal of Computer Science and Security Volume (3) Issue (3)
International Journal of Computer Science and Security Volume (3) Issue (3)International Journal of Computer Science and Security Volume (3) Issue (3)
International Journal of Computer Science and Security Volume (3) Issue (3)CSCJournals
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
 
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...Neelamani Samal
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIOSR Journals
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYijgca
 
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data ClusteringA Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clusteringidescitation
 
On Text Realization Image Steganography
On Text Realization Image SteganographyOn Text Realization Image Steganography
On Text Realization Image SteganographyCSCJournals
 
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...IRJET Journal
 

La actualidad más candente (19)

Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow application
 
Ie3514301434
Ie3514301434Ie3514301434
Ie3514301434
 
Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
An efficient recovery mechanism
An efficient recovery mechanismAn efficient recovery mechanism
An efficient recovery mechanism
 
On the Internet Delay Space Dimensionality
On the Internet Delay Space DimensionalityOn the Internet Delay Space Dimensionality
On the Internet Delay Space Dimensionality
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
 
F505052131
F505052131F505052131
F505052131
 
International Journal of Computer Science and Security Volume (3) Issue (3)
International Journal of Computer Science and Security Volume (3) Issue (3)International Journal of Computer Science and Security Volume (3) Issue (3)
International Journal of Computer Science and Security Volume (3) Issue (3)
 
Chap3
Chap3Chap3
Chap3
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
 
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data ClusteringA Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clustering
 
On Text Realization Image Steganography
On Text Realization Image SteganographyOn Text Realization Image Steganography
On Text Realization Image Steganography
 
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
 

Similar a Distribution systems efficiency

Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsJigisha Aryya
 
A Deterministic Model Of Time For Distributed Systems
A Deterministic Model Of Time For Distributed SystemsA Deterministic Model Of Time For Distributed Systems
A Deterministic Model Of Time For Distributed SystemsJim Webb
 
From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions Gabriele D'Angelo
 
Data Analysis In The Cloud
Data Analysis In The CloudData Analysis In The Cloud
Data Analysis In The CloudMonica Carter
 
Survey on replication techniques for distributed system
Survey on replication techniques for distributed systemSurvey on replication techniques for distributed system
Survey on replication techniques for distributed systemIJECEIAES
 
An optimized cost-based data allocation model for heterogeneous distributed ...
An optimized cost-based data allocation model for  heterogeneous distributed ...An optimized cost-based data allocation model for  heterogeneous distributed ...
An optimized cost-based data allocation model for heterogeneous distributed ...IJECEIAES
 
A SIMPLE MESSAGE-OPTIMAL ALGORITHM FOR RANDOM SAMPLING FROM A DISTRIBUTED STREAM
A SIMPLE MESSAGE-OPTIMAL ALGORITHM FOR RANDOM SAMPLING FROM A DISTRIBUTED STREAMA SIMPLE MESSAGE-OPTIMAL ALGORITHM FOR RANDOM SAMPLING FROM A DISTRIBUTED STREAM
A SIMPLE MESSAGE-OPTIMAL ALGORITHM FOR RANDOM SAMPLING FROM A DISTRIBUTED STREAMNexgen Technology
 
Stream Processing Environmental Applications in Jordan Valley
Stream Processing Environmental Applications in Jordan ValleyStream Processing Environmental Applications in Jordan Valley
Stream Processing Environmental Applications in Jordan ValleyCSCJournals
 
Using a Cloud to Replenish Parched Groundwater Modeling Efforts
Using a Cloud to Replenish Parched Groundwater Modeling EffortsUsing a Cloud to Replenish Parched Groundwater Modeling Efforts
Using a Cloud to Replenish Parched Groundwater Modeling EffortsJoseph Luchette
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layerKuldeep Pathak
 
Detailed Simulation of Large-Scale Wireless Networks
Detailed Simulation of Large-Scale Wireless NetworksDetailed Simulation of Large-Scale Wireless Networks
Detailed Simulation of Large-Scale Wireless NetworksGabriele D'Angelo
 
Chap10.ppt Chemistry applications in computer science
Chap10.ppt Chemistry applications in computer scienceChap10.ppt Chemistry applications in computer science
Chap10.ppt Chemistry applications in computer sciencepranshu19981
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYijgca
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYijgca
 
Web based-distributed-sesnzer-using-service-oriented-architecture
Web based-distributed-sesnzer-using-service-oriented-architectureWeb based-distributed-sesnzer-using-service-oriented-architecture
Web based-distributed-sesnzer-using-service-oriented-architectureAidah Izzah Huriyah
 
Embedded Intro India05
Embedded Intro India05Embedded Intro India05
Embedded Intro India05Rajesh Gupta
 

Similar a Distribution systems efficiency (20)

Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systems
 
A Deterministic Model Of Time For Distributed Systems
A Deterministic Model Of Time For Distributed SystemsA Deterministic Model Of Time For Distributed Systems
A Deterministic Model Of Time For Distributed Systems
 
From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions
 
Report_Internships
Report_InternshipsReport_Internships
Report_Internships
 
DTN
DTNDTN
DTN
 
Data Analysis In The Cloud
Data Analysis In The CloudData Analysis In The Cloud
Data Analysis In The Cloud
 
Survey on replication techniques for distributed system
Survey on replication techniques for distributed systemSurvey on replication techniques for distributed system
Survey on replication techniques for distributed system
 
An optimized cost-based data allocation model for heterogeneous distributed ...
An optimized cost-based data allocation model for  heterogeneous distributed ...An optimized cost-based data allocation model for  heterogeneous distributed ...
An optimized cost-based data allocation model for heterogeneous distributed ...
 
A SIMPLE MESSAGE-OPTIMAL ALGORITHM FOR RANDOM SAMPLING FROM A DISTRIBUTED STREAM
A SIMPLE MESSAGE-OPTIMAL ALGORITHM FOR RANDOM SAMPLING FROM A DISTRIBUTED STREAMA SIMPLE MESSAGE-OPTIMAL ALGORITHM FOR RANDOM SAMPLING FROM A DISTRIBUTED STREAM
A SIMPLE MESSAGE-OPTIMAL ALGORITHM FOR RANDOM SAMPLING FROM A DISTRIBUTED STREAM
 
Stream Processing Environmental Applications in Jordan Valley
Stream Processing Environmental Applications in Jordan ValleyStream Processing Environmental Applications in Jordan Valley
Stream Processing Environmental Applications in Jordan Valley
 
Using a Cloud to Replenish Parched Groundwater Modeling Efforts
Using a Cloud to Replenish Parched Groundwater Modeling EffortsUsing a Cloud to Replenish Parched Groundwater Modeling Efforts
Using a Cloud to Replenish Parched Groundwater Modeling Efforts
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
 
Detailed Simulation of Large-Scale Wireless Networks
Detailed Simulation of Large-Scale Wireless NetworksDetailed Simulation of Large-Scale Wireless Networks
Detailed Simulation of Large-Scale Wireless Networks
 
Chap10.ppt
Chap10.pptChap10.ppt
Chap10.ppt
 
Chap10.ppt Chemistry applications in computer science
Chap10.ppt Chemistry applications in computer scienceChap10.ppt Chemistry applications in computer science
Chap10.ppt Chemistry applications in computer science
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
 
10 3
10 310 3
10 3
 
Web based-distributed-sesnzer-using-service-oriented-architecture
Web based-distributed-sesnzer-using-service-oriented-architectureWeb based-distributed-sesnzer-using-service-oriented-architecture
Web based-distributed-sesnzer-using-service-oriented-architecture
 
Embedded Intro India05
Embedded Intro India05Embedded Intro India05
Embedded Intro India05
 

Más de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Más de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Último (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Distribution systems efficiency

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 Distribution Systems Efficiency Omar Al-Heyasat (corresponding author) Computer Engineering Department, Al-Balqa' Applied University omarheyasat@hotmail.com, ashraf.abuain@fet.edu.jo, P.O.Box: 15008 Amman 11134 Ashraf Abdel-Karim Abu-Ein Computer Engineering Department, Al-Balqa' Applied University omarheyasat@hotmail.com, ashraf.abuain@fet.edu.jo, P.O.Box: 15008 Amman 11134 Hazem (Moh’d Said) Hatamleh Computer Science Department, Al-Balqa' Applied University, Ajlun University College Ahmed A.M Sharadqeh Computer Engineering Department, Al-Balqa' Applied University, sharadqh_78@yahoo.com As'ad Mahmoud Alnaser Computer Science Department, Al-Balqa' Applied University, Ajlun University College Jordan, hazim-hh@bau.edu.jo, asad1_99@yahoo.com Abstract This paper constructing a measurement system for determining the efficiency of the distributed system. This efficiency depends on many parameters like number of terminals, number of customers and kind of information, number of nodes, and number of messages. It is found that the efficiency depends strongly on number of messages sent or received inside the distributed system, as the number of messages increased the efficiency decreased. Keywords: distributed system, terminals, efficiency. 1. Introduction Distributed systems are a mean to decrease the time needed to perform some task and software errors arise from a number of different problems, such as incorrect or incomplete specifications, coding errors, and faults and failures in the hardware, operating system or network. Model checking is an important technology which is finding increasing use as a means of reducing software errors. Unfortunately, despite impressive recent advances, the size of systems for which model checking is feasible remains rather limited. This weakness is particularly critical in the context of distributed systems: concurrency and asynchrony result in inherent non-determinism that significantly increases the number of states to be analyzed and this affects the distributed systems efficiency. As a result, most system builders continue to use testing as the major means to identify bugs in their implementations. There are, however, two problems with software testing. First, testing is generally done in an ad hoc manner: the software developer must hand translate the requirements into specific dynamic checks on the program state. Second, test coverage is often rather limited, covering only some execution paths. To mitigate the first problem, software often includes dynamic checks on a system’s state in order to identify problems at run-time. Recently, there has been some interest in run-time verification and monitoring techniques, which provide a little more rigor in testing by automatically synthesizing monitors from formal specifications. These monitors may then be deployed off-line for debugging or on-line for dynamically checking that safety properties are not being violated during system execution. Unfortunately, testing or runtime monitoring of distributed systems involves considerable overhead: for every event (sending of a message, receiving of a message, or a local state update), each process sends a message about the event to a central monitor. The central monitor constructs and analyzes a computation lattice of the global states out of the collected events. Passing messages to a central monitor at every event and constructing a global computation lattice, which can be exponential in size in the number of events, leads to severe communication and computation overhead. The distributed systems may be effectively monitored at runtime against formally specified safety requirements by distributing the task of monitoring among the processes involved in the distributed computation. Effective monitoring means not only linear efficiency, but also decentralized monitoring where few or no additional messages need to be passed for monitoring purposes. Many researches dealt with such problem, Santhi B et al. (2010) presented novel algorithms for energy efficient 100
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 scheduling of Directed Acyclic Graph (DAG) based applications on Dynamic Voltage Scaling (DVS) enabled systems. Experimental results show that our proposed algorithms give better results than the existing algorithms. Byung-G, 2006, considered replication strategies for storage systems that aggregate the disks of many nodes spread over the Internet. Maintaining replication in such systems can be prohibitively expensive, since every transient network or host failure could potentially lead to copying a server's worth of data over the Internet to maintain replication levels. They also names the following insights in designing an efficient replication algorithm emerge from the paper's analysis. First, durability can be provided separately from availability; the former is less expensive to ensure and a more useful goal for many wide-area applications. Second, the focus of a durability algorithm must be to create new copies of data objects faster than permanent disk failures destroy the objects; careful choice of policies for what nodes should hold what data can decrease repair time. Third, increasing the number of replicas of each data object does not help a system tolerate a higher disk failure probability, but does help tolerate bursts of failures. Finally, ensuring that the system makes use of replicas that recover after temporary failure is critical to efficiency. Based on these insights, the paper proposes the Carbonite replication algorithm for keeping data durable at a low cost. A simulation of Carbonite storing 1 TB of data over a 365 day trace of Planet Lab activity shows that Carbonite is able to keep all data durable and uses 44% more network traffic than a hypothetical system that only responds to permanent failures. In comparison, Total Recall and D-Hash require almost a factor of two more network traffic than this hypothetical system. Koushik S., et al. 2004, described an efficient decentralized algorithm to monitor the execution of a distributed program in order to check for violations of safety properties. The monitoring is based on formulas written in PT-DTL, a variant of past time linear temporal logic that we define. PT-DTL is suitable for expressing temporal properties of distributed systems. Specifically, the formulas of PT-DTL are relative to a particular process and are interpreted over a projection of the trace of global states that represents what that process is aware of. A formula relative to one process may refer to the local states of other processes through remote expressions and remote formulas. In order to correctly evaluate remote expressions, they introduced the notion of knowledge vector and provide an algorithm which keeps a process aware of other processes’ local states, if those states may affect the validity of a monitored PT-DTL formula. Both the logic and the monitoring algorithm are illustrated through a number of examples. Finally, they described an implementation of the algorithm in a tool called DIANA. 1.1 Distributed systems A distributed system is a collection of k processes (p1, . . . , pk), each with its own local state. The local state of a process is given by the values bound to its variables. Note that there are no global or shared variables. Processes communicate with each other using asynchronous messages whose order of arrival is indeterminate. The computation of each process is abstractly modeled by a set of events, and a distributed computation is specified by a partial order on the events. There are three types of events: (1) internal events change the local state of a process; (2) send events occur when a process sends a message to another process; and (3) receive events occur when a message is received by a process. Figure 1 represents a simulation to some distributed system. 101
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 Figure 1 simulation of a distributed system The time, T, needed for some distributed system to perform some task can be calculated as: T= f (T{NO.(P, E, M)}) (1) where: No. number of, P: number of processes, E: no. of nodes, M: number of messages. 2. Results and discussion The time needed to perform some given task for a distributed system is adopted to measure the efficiency of such system. From equation (1) the time needed to perform some task is given as: T=T1+T2+T3+T4 (2) Where: T1: time needed for the event to processed internally ( inside the process), T2: the time needed to send a message M and/or receiving it. T3: the time needed to process the task inside the received node or process, and T4: the time needed to accomplish the task and display the result. But as we said the total time needed depends strongly on the construction of the distributed system, i. e. on the number of processes, P, nodes, N, and events or messages, M, so equation (2) can be rewritten as: T= PT1+2MT2+ NT3+T4 (3) Now to measure the efficiency of the studied distributed system let the desired time to perform the task is 900µs then the efficiency, η, can be defined as: η=actual time/ desired time (4) The number of processes here are assumed to be three, with 150 µs each, the time needed to send or receive a messages is 50µs, the time needed to perform the task inside the node is 100 µs, the time to accomplish the task is 100 µs. So the efficiency is η=900/1300= 70%. It can be noticed that the efficiency depends on number of messages sent or received inside the distributed system. See figure 2 below. 102
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 η Figure 2 efficiency of the distributed system vs. no. of messages. 3. Conclusion It is clear that the efficiency of any distributed system depends strongly on the system composition, number of processes, number of events or nodes, no of messages, time needed to process the task, and the time to accomplish the task, as the number of such things increased the time needed becomes longer and so the efficiency decreases. References [1] Santhi Baskaran1 and P. Thambidurai, 2010, Energy Efficient Real-Time Scheduling in Distributed Systems, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 4, May 2010, 35 ISSN (Online): 1694-0784, ISSN (Print): 1694-0814 [2] M. Frans Kaashoek,? John Kubiatowicz,. and Robert Morris, 2010, Efficient Replica Maintenance for Distributed Storage Systems MIT Computer Science and Artificial Intelligence Laboratory, Rice University/MPI-SWS, . University of California, Berkeley, This research was supported by the National Science Foundation under Cooperative Agreement No. ANI-0225660, http:// project-iris.net/. Andreas Haeberlen was supported in part by the Max Planck Society. Emil Sit was supported in part by the Cambridge-MIT Institute. Hakim Weatherspoon was supported by an Intel Foundation PhD Fellowship. [3] Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Ros¸2004, Efficient Decentralized Monitoring of Safety in Distributed Systems, ACM Journal Name, Vol. V, No. N, October 2004, Pages 1–18. [4] James D Thomas, Katia Sycara , 2010, Heterogeneity, Stability, and Efficiency in Distributed, jthomas+@cs.cmu.edu, katia+@ri.cmu.edu Sponsored by NSF grant IRI9612131 and ONR grant N000149611222. [5] Tad Hogg and Bernardo A. Huberman. Controlling chaos in distributed systems. IEEE Trans. on Systems, Man and Cybernetics, 21(6):1325–1332, November/ December 1991. [6] J. O. Kephart, Tad Hogg, and Bernardo A. Huberman. Dynamics of computational ecosystems. Physical Review A, 40, 1989. 103
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.7, 2012 [7] William H. Press, Saul A. Tukolsky,William T. Vertterling, and Brian P. Flannery. Numerical Recipies in C. Cambridge University Press, 1992. [8] Andrea Schaerf, Yoav Shoham, and Moshe Tennenholtz. Adaptive load balancing: A study in multiagent learning. Journal of Artificial Intelligence Research, (2):475–500, 1995. 104
  • 6. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar