Preview

Resumen de Modelos de Sistemas Distribuidos

Powerful Essays
Open Document
Open Document
1862 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Resumen de Modelos de Sistemas Distribuidos
Ingeniería en Telemática
Ingeniería en Telemática | Resumen de Modelos de Sistemas Distribuidos | Sistemas Distribuidos | | Profesor: Lilian Dinorah Coronado de AlbaAlumno: Vega López Ana Cristina de JesúsMatricula: 090842San Luis Potosí, SLP. | 14/08/2013 |

|

System models
In this chapter generally be described three key areas for designing distributed systems such as Physical models, Architectural models, Fundamental models, Physical models relate to the types of computers and devices that provide connectivity between them.
Architectural models refer to computationally and tasks they perform, and the interconnection network. The models used are the client-server and peer-to-peer. Fundamental models relate to solutions to the problems of distributed systems. This section explains the interaction between models, fault models, and security models.
Physical models:
Representation of hardware and network technologies used.
Baseline physical model: Software and hardware components of the computer network that coordinate the actions only through message passing.
Early distributed systems: They consist of between 10 and 100 nodes interconnected with limited Internet connectivity and services as local printers and file servers, e-mail and file transfer over the Internet.
Internet-scale distributed systems: Such systems exploit the infrastructure offered by the Internet to become truly global. They incorporate large numbers of nodes and provide distributed system services for global organizations and across organizational boundaries. These systems have high level of heterogeneity.
Contemporary distributed systems: In the above systems, nodes were desktop computers and therefore static, discrete and autonomous. The emergence of mobile computing has led to need for added capabilities such as service discovery and support for spontaneous interoperation.
The emergence of ubiquitous computing has led to a move from discrete nodes to

You May Also Find These Documents Helpful

  • Best Essays

    Singh, R. K. & Ramajujam, T. (2009). “New Model of Network-A-Future Aspect of the Computer Networks: Journal of Computing, Vol. 1, Issue 1, ISSN: 2151-9617.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ITN Final Chp 7 Through 12

    • 7250 Words
    • 75 Pages

    As discussed in this textbook, three layers of a network model are the components required for a typical network, including local area networks.…

    • 7250 Words
    • 75 Pages
    Satisfactory Essays
  • Powerful Essays

    The point when individuals discuss about OSI, they are typically alluding to what is formally known as the Basic Reference Model (BRM) for Open Systems Interconnection (OSI). The BRM…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Cmgt 554 Week4

    • 1618 Words
    • 7 Pages

    Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Retrieved from The University of Phoenix eBook Collection database.…

    • 1618 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1330 Unit 2 Study Guide

    • 407 Words
    • 2 Pages

    Large-Scale Complex IT Systems (Ian Sommerville, Dave Cliff, Radu Calinescu,Justin Keen, Tim Kelly , Marta Kwiatkowska,John McDermid, and Richard Paige):…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    The functions and characteristics of a network operating system or (NOS) for short are explained by the following;…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    Within a network consists of a model that interlinks computers with one another by its methods and protocols, this model is known as the “Open Systems Interconnection (OSI) model”, (2010. PP.28). It is a framework that defines and dissects its methods protocols into another model consisting of seven different layers. Each different layer increases from one layer to the next, all in which rely on the services the lower level provides to the next until data becomes present upon viewing a computer screen. Seven layers defining the “seven-layer model”, (2010. PP.28), are: physical, data-link, network, transport, session, presentation, and application. Each consists of different functions and purposes.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    M150a Review Questions

    • 2913 Words
    • 11 Pages

    Distributed system: A system consists of separate computers that exchange data and information across a network to produce results for a user.…

    • 2913 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3350 Unit 4

    • 572 Words
    • 3 Pages

    * Discuss the inter-dependence of workstation hardware(network card, cabling; permissions; system bus; local-system architecture eg memory, processor, I/O devices) with network components.(P6,M3)…

    • 572 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz Comp Archi

    • 438 Words
    • 3 Pages

    4) Please describe how the clock works in the digital circuit and what are main concerns on the clock design (performance, power).…

    • 438 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cnt 4513 Study Guild

    • 578 Words
    • 3 Pages

    a) client-server: dedicated servers, fixed IP, not scalable, single-point-of-failure. (E.g., Web, FTP, Telnet, and e-mail)…

    • 578 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The network utilization between the hospital and offices mainframe would be that the IBM’s technology offers considerably huge servers within a distinguishing strength conducting a large amount of transactions as well as input/output operations in parallel (Network Management, 2013). However, the mainframe is accomplished by serving a huge numbers of network nodes geographically separated across the world at the same time as conducting a elevated volume of input and output operation to disk storage, printers in addition to other attached computers (Network Management, 2013). Several the capabilities would be the IP communication among huge numbers of Linux as well as z/OS operating systems running as z/VM (Virtual Machine) guest machines (Network Management, 2013).…

    • 500 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    An initial task in a security assessment will focus on the basic hardware, software, and network of the system, also known as the infrastructure. Identifying types of hardware and software will dictate a large part of the requirements necessary to protect the environment. Also, a thorough analysis of the hardware will help in identifying what exists where. This information can be used for planning for replacement (Chapter, 2003).…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The Open System Interconnection Reference Model or OSI Reference Model or OSI Model is essentially a conceptual description for layered communications and computer network protocol design. It was created as part of the Open Systems Interconnection or OSI initiative. In its most fundamental form, it separates network architecture into seven distinct layers: the Application, Presentation, Session, Transport, Network, Data-Link, and Physical Layers. As a result it is frequently referred to as the OSI Seven Layer Model. A layer is a collection of theoretically similar functions that provide services to the layer directly above it and obtains service from the layer beneath it. On each single layer an instance provides services to the instances at the layer above and requests service from the layer beneath. An example of this relates to a layer that provides error-free communications across a network which then provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that comprise the contents of the path.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays