AOS ASIGNMENT # 1 ROJA VEMOORI 1354058 1.1) Give 5 types of hardware resources and five types of data or software resources that can usefuly be shared. Give examples of their sharing as it ocurs in practice in distributed systems. A) Hardware resources: i) CPU :CPU is an imparted aset as most servers, for example, file servers do some computation for their customers. i) Memory : cache server (holds recently acesed web pages in its RAM, for spedier aces by other local machines. i) Disk : file server, virtual disk server, feature on interest server and so on iv) Scren : Network window frameworks, for example, X-1 ,permit forms in remote machines to upgrade the content of windows. v) Printer : Networked printers acknowledge print employments from …show more content…
Clash redesigns might result in inconsistent results. Most valuable for files that change ocasionaly, for example, software Binaries i) Object: Potential outcomes for software objects are boundles. E.g. shared whiteboard, shared diary, rom Boking framework, and so forth. iv) Database : Database are proposed to record the complete state of some related sets of information. They have ben shared since the time that multi-client machines showed up. They incorporate methods to overse concurent overhauls. v) Video/audio stream: Servers can store whole videos on disk and convey them at playback sped to numerous customers al the while. _______________________________________ 1.4) A user arives at a railway station that hey has never visited before, carying a PDA that is capable of wireles networking. Sugest how the user could be provided with information about he local services and amenities at he station, without entering the stations name or atributes. what echnical chalenges must be …show more content…
One technique is for the local remote network to give the URL of web pages about he locality over a local remote network. For this to work:(1) The user must run a system on her gadget hat listens for these URL's, and which gives the user suficient control that she is not overwhelmed by undesirable URL's of the spots she pases through and (2) The method for engendering the URL (e.g. infrared or a 802.1 remote LAN) ought o have an achieve that relates to the physical spread of the spot itself. _______________________________________ 1.7) A server program writen in one language (for example, C+) provides the implementation of a BLOB object hat is intended to be acesed by clients that may be writen in a diferent language (for example, Java). The client and server computers may have diferent hardware, but al of them are atached to an internet. Describe the problems due to each of the five aspects of heterogeneity that ned to be solved to make it posible for a client object to invoke a method on the server object. A) As the machines are conected to an internet, we can expect hat Internet protocols manage contrasts in networks. But he machines may have distinctive hardware - hence we ned
A computer and a server are usually two unique and separate devices and each are customized to handle specific functions and purposes. For example a web server will not need any type of display or monitor and can be located anywhere. But when it comes to a data server or client, there is typically a need for some form of display monitor so information can be reviewed and tracked. It is not uncommon in some occurrences that a device can function both as a computer and a server for the same application. This also can hold true for a application act as a client to other server for various other
Consumers are using at a majority rate of peer to peer file sharing, which is the networking of two or more computers that share files while on one server. Using P2P has been a much reliable in which all the shared contents by the consumers has less failures in maintaining and the consumer can control their resources.
In the field of computer information, there is a vast amount of information that is used for operations. This information must be stored somewhere in order to be used in the future, and for programs to use
Chapter 12 Electronic Commerce Systems 1. Which of the following statements is correct? a. TCP/IP is the basic protocol that permits communication between Internet sites. b. TCP/IP controls web browsers that access the web. c. TCP/IP is the document format used to produce web pages. d. TCP/IP is used to transfer text files, programs, spreadsheets, and databases across the Internet. e. TCP/IP is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format. 2. Which of the following best describes a system of computers that connects the internal users of an organization distributed over a wide geographic area? a. LAN b. Internet c. decentralized network d. multidrop network e. intranet 3. Sniffer software is a. used by malicious websites to sniff data from cookies stored on the
The client and server architecture is a distributed application that divide the tasks between the entities that provides the resource or service, called servers, and the entities that request for a service, called clients. Fundamentally, clients and servers are two software entities where one software is fulfilling the request of another software entity. The client machine request for the service and the server machine interprets the request message received from the client machine. In order to fulfill the request of client machine, the server may have to refer various knowledge domains, process data and sometimes make an additional request to another server. The client and server may reside on the same machine or sometimes lie
If any user crashes a computer and if some shared residue file is deleted, it poses serious threat to the stability of the entire network.
Planning for an effective storage solution, whether it is on premise or off premise can be a challenging task. Off premise planning becomes more complicated as the components that make up the storage network are generally in the control of the cloud provider. It becomes critical to maintain the integrity and security of the data, while still offering a seamless storage solution to the business. The business user does not care where the data is located, or where an application is hosted. It must be available as needed, with little to no noticeable performance degradation.
Distributed file system organizes file and directory services of individual servers into a global directory in such a way that remote data access is not location-specific but is identical from any client with the client being unaware of the location. Organization is hierarchical and directory-based.
Today, as a society, we all seem to accept the trend of doing multiple things at the same time because of the limited amount of time we are given on a daily basis. We find ourselves juggling many tasks at once; whether it is time with family, work, or even a favorite hobby, we all have to find time to manage all of these things while maintaining some kind of balance. It can be very difficult today to find time to do all of these things and one way to make it a lot easier is by using computers. While scientifically proven that it is impossible for our brains to do multiple tasks at the same time, we still seem to try. But now that we have so many amazing mini computer systems working around us, we can now do the multi-tasking that our hearts desire. Our computers can do many processes simultaneously, allowing us to do many things that we want at the same time. But how do these computers handle all of these processes and applications at the same time? Well, in short, computer memory. To describe the way that memory works, I will be explaining a few of the many components of computer memory and how it is managed. Memory management is the act of managing computer memory. The topics that I will include in the paper will consist of the following: Dynamic memory allocation, Virtual memory, memory leaks and stale references, fragmentation, large memory and cache systems.
Generally, an URL has two major components: the first part “Protocol Identifier” and the second part “Resource name”. The Protocol Identifier represents the name of the protocol to be used to achieve the resource. In addition to the commonest one for web pages – Hypertext Transfer Protocol (HTTP) that is typically used to serve up hypertext documents, there are many different protocols used to access different types of resources on the internet, such as File Transfer Protocol (FTP) for file transfer, MAILTO for email features, JDBC for database access and many other applications.
"URL is an acronym for Uniform Resource Locator, and is used to determine addresses on the World Wide Web. URL generally affirmed by sounding out every letter yet, in a few quarters, pronounced "Earl" - is an exclusive address for a file that is approachable on the Internet. An easy way out to get to a Web site is to enter the URL of its home page file in your Web browser 's address line. However, any file inside that Web site can likewise be indicated with a URL. Such a file may be any Web (HTML) page other than the home page, an image file, or a program such as a typical gateway interface application or Java applet. The URL includes the name of the protocol to be utilized to obtain the file resource, a domain name that recognizes a typical computer on the Internet, and a pathname, a hierarchical description that dictates the location of a file in that computer. (1)
By separating the data into identifiable blocks, the information can be easily located. (1) Each grouping of data, which takes its name from the method of organising paper-based information, is referred to as a “file”. The file system is comprised of two specific parts: a collection of files and a directory structure, which provides data about and organises all of the files in the file system. (3) Some filesystems will be used on local data storage devices, whereas others provide access over a network, through a network protocol such as NFS. (2)
RAM – The ram is mostly used to hold programs and any files the user has opened. The RAM has a constant flow of data between
Simplifying the workings of a computer, there are two means by which information is stored, the hard disk and random-access memory (RAM). The hard disk is
Different types of objects are available in The Eden Distributed Operating System, which are performing functions for this system to carry out the routine tasks. These objects are working together and sending and receiving responses. Messages are sent through these objects and smooth communications and interactions are obtained. Professionals