SlideShare una empresa de Scribd logo
1 de 8
Slides for Chapter 1
Characterization of Distributed Systems
From Coulouris, Dollimore and Kindberg
Distributed Systems:
Concepts and Design
Edition 3, © Addison-Wesley 2001
Instructor’s Guide for Coulouris, Dollimore
and Kindberg Distributed Systems: Concepts
and Design Edn. 3
© Addison-Wesley Publishers 2000
intranet
ISP
desktop computer:
backbone
satellite link
server:
network link:
Figure 1.1
A typical portion of the Internet
Instructor’s Guide for Coulouris, Dollimore
and Kindberg Distributed Systems: Concepts
and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 1.2
A typical intranet
the rest of
email server
Web server
Desktop
computers
File server
router/firewall
print and other servers
other servers
print
Local area
network
email server
the Internet
Instructor’s Guide for Coulouris, Dollimore
and Kindberg Distributed Systems: Concepts
and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 1.3
Portable and handheld devices in a distributed system
Laptop
Mobile
Printer
Camera
Internet
Host intranet Home intranet
WAP
Wireless LAN
phone
gateway
Host site
Instructor’s Guide for Coulouris, Dollimore
and Kindberg Distributed Systems: Concepts
and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 1.4
Web servers and web browsers
Internet
BrowsersWeb servers
www.google.com
www.cdk3.net
www.w3c.org
Protocols
Activity.html
http://www.w3c.org/Protocols/Activity.html
http://www.google.comlsearch?q=kindberg
http://www.cdk3.net/
File system of
www.w3c.org
Instructor’s Guide for Coulouris, Dollimore
and Kindberg Distributed Systems: Concepts
and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 1.5
Computers in the Internet
Date Computers Web servers
1979, Dec. 188 0
1989, July 130,000 0
1999, July 56,218,000 5,560,866
Instructor’s Guide for Coulouris, Dollimore
and Kindberg Distributed Systems: Concepts
and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 1.6
Computers vs. Web servers in the Internet
Date Computers Web servers Percentage
1993, July 1,776,000 130 0.008
1995, July 6,642,000 23,500 0.4
1997, July 19,540,000 1,203,096 6
1999, July 56,218,000 6,598,697 12
Instructor’s Guide for Coulouris, Dollimore
and Kindberg Distributed Systems: Concepts
and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 1.7
Transparencies
Access transparency: enables local and remote resources to be accessed using identical
operations.
Location transparency: enables resources to be accessed without knowledge of their
location.
Concurrency transparency: enables several processes to operate concurrently using shared
resources without interference between them.
Replication transparency: enables multiple instances of resources to be used to increase
reliability and performance without knowledge of the replicas by users or application
programmers.
Failure transparency: enables the concealment of faults, allowing users and application
programs to complete their tasks despite the failure of hardware or software components.
Mobility transparency: allows the movement of resources and clients within a system
without affecting the operation of users or programs.
Performance transparency: allows the system to be reconfigured to improve performance as
loads vary.
Scaling transparency: allows the system and applications to expand in scale without change
to the system structure or the application algorithms.

Más contenido relacionado

Destacado

Chapter 7 slides
Chapter 7 slidesChapter 7 slides
Chapter 7 slides
lara_ays
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system models
AbDul ThaYyal
 
Chapter 6 slides
Chapter 6 slidesChapter 6 slides
Chapter 6 slides
lara_ays
 
4.file service architecture
4.file service architecture4.file service architecture
4.file service architecture
AbDul ThaYyal
 
Chapter 4 slides
Chapter 4 slidesChapter 4 slides
Chapter 4 slides
lara_ays
 
Chapter 5 slides
Chapter 5 slidesChapter 5 slides
Chapter 5 slides
lara_ays
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
AbDul ThaYyal
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
AbDul ThaYyal
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
AbDul ThaYyal
 
4. concurrency control
4. concurrency control4. concurrency control
4. concurrency control
AbDul ThaYyal
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
karan2190
 
Writing A Research Paper In 10 Easy Steps
Writing A Research Paper In 10 Easy StepsWriting A Research Paper In 10 Easy Steps
Writing A Research Paper In 10 Easy Steps
lauren
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
Rupsee
 

Destacado (20)

2. microkernel new
2. microkernel new2. microkernel new
2. microkernel new
 
Chapter 6 os
Chapter 6 osChapter 6 os
Chapter 6 os
 
Chapter 7 slides
Chapter 7 slidesChapter 7 slides
Chapter 7 slides
 
Chapter 17 corba
Chapter 17 corbaChapter 17 corba
Chapter 17 corba
 
3. challenges
3. challenges3. challenges
3. challenges
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system models
 
Chapter 6 slides
Chapter 6 slidesChapter 6 slides
Chapter 6 slides
 
4.file service architecture
4.file service architecture4.file service architecture
4.file service architecture
 
Chapter 4 slides
Chapter 4 slidesChapter 4 slides
Chapter 4 slides
 
Chapter 5 slides
Chapter 5 slidesChapter 5 slides
Chapter 5 slides
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
 
How to Write a Research Paper, Fast!
How to Write a Research Paper, Fast!How to Write a Research Paper, Fast!
How to Write a Research Paper, Fast!
 
How to Write a Research Paper
How to Write a Research Paper How to Write a Research Paper
How to Write a Research Paper
 
4. concurrency control
4. concurrency control4. concurrency control
4. concurrency control
 
Arboles03
Arboles03Arboles03
Arboles03
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
 
Writing A Research Paper In 10 Easy Steps
Writing A Research Paper In 10 Easy StepsWriting A Research Paper In 10 Easy Steps
Writing A Research Paper In 10 Easy Steps
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 

Similar a Chapter 1 slides

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 

Similar a Chapter 1 slides (20)

1.ppt
1.ppt1.ppt
1.ppt
 
Cloud Basics.pptx
Cloud Basics.pptxCloud Basics.pptx
Cloud Basics.pptx
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptx
 
Chapter 1 Introduction- DS.pptx
Chapter 1 Introduction- DS.pptxChapter 1 Introduction- DS.pptx
Chapter 1 Introduction- DS.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
 
Cloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptxCloud-Computing-ppt.pptx
Cloud-Computing-ppt.pptx
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
cloud computing
cloud computingcloud computing
cloud computing
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
Cloud-Computing-ppt by Banshidhar Behra.pptx
Cloud-Computing-ppt by Banshidhar Behra.pptxCloud-Computing-ppt by Banshidhar Behra.pptx
Cloud-Computing-ppt by Banshidhar Behra.pptx
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
yiolui;uiluilulyiolui;uiluilulyiolui;uiluilul
yiolui;uiluilulyiolui;uiluilulyiolui;uiluilulyiolui;uiluilulyiolui;uiluilulyiolui;uiluilul
yiolui;uiluilulyiolui;uiluilulyiolui;uiluilul
 
cc.doc
cc.doccc.doc
cc.doc
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating SystemCSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating System
 

Más de soe sumijan

Más de soe sumijan (9)

Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)
 
Chapter 2 slides
Chapter 2 slidesChapter 2 slides
Chapter 2 slides
 
Computer Vision Pertemuan 06
Computer Vision Pertemuan 06Computer Vision Pertemuan 06
Computer Vision Pertemuan 06
 
Computer Vision Pertemuan 05
Computer  Vision Pertemuan 05Computer  Vision Pertemuan 05
Computer Vision Pertemuan 05
 
Computer Vision Pertemuan 04
Computer  Vision Pertemuan 04Computer  Vision Pertemuan 04
Computer Vision Pertemuan 04
 
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
 
Pertemuan 01-02
Pertemuan 01-02Pertemuan 01-02
Pertemuan 01-02
 
Multimedia dan Computer Vision
Multimedia dan Computer VisionMultimedia dan Computer Vision
Multimedia dan Computer Vision
 
Aplikasi sistem real time
Aplikasi sistem real timeAplikasi sistem real time
Aplikasi sistem real time
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Chapter 1 slides

  • 1. Slides for Chapter 1 Characterization of Distributed Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 3, © Addison-Wesley 2001
  • 2. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 intranet ISP desktop computer: backbone satellite link server: network link: Figure 1.1 A typical portion of the Internet
  • 3. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 1.2 A typical intranet the rest of email server Web server Desktop computers File server router/firewall print and other servers other servers print Local area network email server the Internet
  • 4. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 1.3 Portable and handheld devices in a distributed system Laptop Mobile Printer Camera Internet Host intranet Home intranet WAP Wireless LAN phone gateway Host site
  • 5. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 1.4 Web servers and web browsers Internet BrowsersWeb servers www.google.com www.cdk3.net www.w3c.org Protocols Activity.html http://www.w3c.org/Protocols/Activity.html http://www.google.comlsearch?q=kindberg http://www.cdk3.net/ File system of www.w3c.org
  • 6. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 1.5 Computers in the Internet Date Computers Web servers 1979, Dec. 188 0 1989, July 130,000 0 1999, July 56,218,000 5,560,866
  • 7. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 1.6 Computers vs. Web servers in the Internet Date Computers Web servers Percentage 1993, July 1,776,000 130 0.008 1995, July 6,642,000 23,500 0.4 1997, July 19,540,000 1,203,096 6 1999, July 56,218,000 6,598,697 12
  • 8. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 1.7 Transparencies Access transparency: enables local and remote resources to be accessed using identical operations. Location transparency: enables resources to be accessed without knowledge of their location. Concurrency transparency: enables several processes to operate concurrently using shared resources without interference between them. Replication transparency: enables multiple instances of resources to be used to increase reliability and performance without knowledge of the replicas by users or application programmers. Failure transparency: enables the concealment of faults, allowing users and application programs to complete their tasks despite the failure of hardware or software components. Mobility transparency: allows the movement of resources and clients within a system without affecting the operation of users or programs. Performance transparency: allows the system to be reconfigured to improve performance as loads vary. Scaling transparency: allows the system and applications to expand in scale without change to the system structure or the application algorithms.