Preview

Failures in a Distributed System

Good Essays
Open Document
Open Document
833 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Failures in a Distributed System
Failures in a Distributed System Paper
Phyllis Lenoir
POS/355
November 19, 2012
Asho Rao

A distributed system is an application that executes a collection of protocols to coordinate the actions of multiple processes on a network, where all component work together to perform a single set of related tasks. A distributed system can be much larger and more powerful given the combined capabilities of the distributed components, than combinations of stand-alone systems. But it's not easy - for a distributed system to be useful, it must be reliable. This is a difficult goal to achieve because of the complexity of the interactions between simultaneously running components. A distributed system must have the following characteristics: * Fault-Tolerant: It can recover from component failures without performing incorrect actions. * Highly Available: It can restore operations, permitting it to resume providing services even when some components have failed. * Recoverable: Failed components can restart themselves and rejoin the system, after the cause of failure has been repaired. * Consistent: The system can coordinate actions by multiple components often in the presence of concurrency and failure. This underlies the ability of a distributed system to act like a non-distributed system. * Scalable: It can operate correctly even as some aspect of the system is scaled to a larger size. For example, we might increase the size of the network on which the system is running. This increases the frequency of network outages and could degrade a "non-scalable" system. Similarly, we might increase the number of users or servers, or overall load on the system. In a scalable system, this should not have a significant effect. * Predictable Performance: The ability to provide desired responsiveness in a timely manner. * Secure: The system authenticates access to data and services
These are high standards, which are challenging to achieve. Probably



References: Introduction to Distributed Systems Design. Retrieved from: http://www.code.google.com/ edu/parallel/dsd-tutorial.html Concurrent Reading. Retrieved from http://www.s.uiowa.edu/...

You May Also Find These Documents Helpful

  • Powerful Essays

    Primary hardware that must have a backup to ensure availability is the web server and the database server. In addition to having a primary and a backup of each of these two servers a replication server must also be implemented into the architecture in order for the databases on each server to mirror each other. With proper planning and implementation of this system if the primary servers have a failure there will not be any interruption of service to the customer who is accessing the…

    • 2777 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Is589

    • 325 Words
    • 2 Pages

    When it comes to the Host-based architecture, we notice that all the computer resources are centralized, the server processed all messages, overload can occur and that will enable the system to quickly process data, therefore the system will encounter slow response time. This architecture also is very expensive and difficult to upgrade.…

    • 325 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    effectively and economically at the desired level of readiness after it is placed in operational…

    • 1175 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Among them the first approach was proposed in 1984 by Chandy and Lamport, to build a possible global state of a distributed system [20]. The goal ofthis protocol is to build a consistent distributed snapshot of the distributed system. A distributed snapshot is a collection of process checkpoints (one per process), and a collection of in-flight messages (an ordered list of messages for each point to point channel). The protocol assumes ordered loss-less communication channel; for a given application, messages can be sent or received after or before a process took its checkpoint. A message from process p to process q that is sent by the application after the checkpoint of process p but received before process q checkpointed is said to be an orphan message. Orphan messages must be avoided by the protocol, because they are going to be re-generated by the application, if it were to restart in that snapshot. Similarly, a message from process p to process q that is sent by the application before the checkpoint of process p but received after the checkpoint of process q is said to be missing. That message must belong to the list of messages in channel p to q, or the snapshot is inconsistent. A snapshot that includes no orphan message, and for which all the saved channel messages are missing messages is consistent, since the application can be started from that state and pursue its computation…

    • 1211 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Distributed systems originally referred to a computer network that was physically and geographically located. Now the term is used to describe a process that run on a several systems and are interacting with each other by a physical…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    6 – Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs.…

    • 1464 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Manages information-consistency capacities, i.e., gives a dependable byte stream between two nodes on a system. TCP and UDP exert at this particular level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Cmgt 554 Week4

    • 1618 Words
    • 7 Pages

    Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Retrieved from The University of Phoenix eBook Collection database.…

    • 1618 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    M150a Review Questions

    • 2913 Words
    • 11 Pages

    Distributed system: A system consists of separate computers that exchange data and information across a network to produce results for a user.…

    • 2913 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    4. Is creating redundancy for systems such as Active Directory or Web servers a part of the…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Os

    • 1341 Words
    • 6 Pages

    +• Synchronization: With multiple active processes having potential access to shared address spaces or shared I/O resources, care must be taken to provide effective synchronization. Synchronization is a facility that enforces mutual exclusion and event…

    • 1341 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Cookies Are Us Case Study

    • 436 Words
    • 2 Pages

    | Capability to support the existing and newer services with the existing hardware via software upgrades…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    Within a network consists of a model that interlinks computers with one another by its methods and protocols, this model is known as the “Open Systems Interconnection (OSI) model”, (2010. PP.28). It is a framework that defines and dissects its methods protocols into another model consisting of seven different layers. Each different layer increases from one layer to the next, all in which rely on the services the lower level provides to the next until data becomes present upon viewing a computer screen. Seven layers defining the “seven-layer model”, (2010. PP.28), are: physical, data-link, network, transport, session, presentation, and application. Each consists of different functions and purposes.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Scalable Infrastructure: Data can be stored and managed well in servers and not on private servers. IT personnel will no longer have to keeping software up-to-date. This will be handled by vendors.…

    • 4913 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Ensuring the right equipment is being used, and there is redundancy built into the network infrastructure will help increase the availability, and uptime of services.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays