Distributed Systems Project: Retail Company Globalization Strategy

Verified

Added on  2022/08/17

|43
|9700
|236
Project
AI Summary
This project addresses the design and analysis of a distributed system for a retail enterprise undergoing global expansion. The assignment requires the student to model a distributed system, considering architectural models like client-server and peer-to-peer, and addressing requirements such as employee access to catalogs, shared files, and corporate resources. The project also involves identifying hardware components like printers and routers. The second part of the assignment focuses on updating the initial design to incorporate additional requirements, including support for autonomous agents, distributed system states, and a centralized service for user management. The project also emphasizes the importance of system robustness, fault tolerance, and the implementation of database, email, and file-sharing servers. The student is expected to identify potential system slowdowns and implement solutions such as hardware and software backups. The assignment requires the use of diagramming software to visualize the distributed system, and the student is expected to cite scholarly resources to support their analysis and design choices.
Document Page
Running head: DISTRIBUTED SYSTEMS
DISTRIBUTED SYSTEMS
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1DISTRIBUTED SYSTEMS
Discussions
Case Scenario
There is a retail enterprise whose task is to manufacture and distribute three lines of
clothing to 30 stores in the United States and this enterprise is launching a globalization
strategy. Their plan of strategy is maximizing their online presence and expanding the
distribution channels of the company.
The total number of employees in the company includes 3000. The headquarters of the
company is in South Carolina and their primary manufacturing units are in Maine and Seattle.
The wish of the company is to open three international stores in New Zealand, England and
Spain. The infrastructure of computing of the company includes roughly 500 computers, 200
terminals those are connected to servers in South Carolina, Maine and Seattle and 300
printers.
Answer 1
A distributed system is a system whose components are situated on various computers those
are networked and that coordinates and communicates their activities by transmitting
messages to each other (Abadi et al.,2016). The components interact with each other to
accomplish common objectives.
There are various types of models of distributed systems. The models are as follows:
Architectural models
Interaction models
Fault model
Document Page
2DISTRIBUTED SYSTEMS
Architectural models: the model of architecture refers to the responsibilities those are
distributed between the components of the system and the way these components are placed
(Van Steen & Tanenbaum, 2017).
There are two types of architectural models. These include client-server model and the
peer-to-peer model.
Client-server model: the system is structured as a sequence of procedures known as
servers that provide services to the various servers known as clients.
The model of client-server is based on a simple requested that is deployed with the
primitives of send/receive or utilising procedure calls those are remote.
The client first sends a message request to the server in order to ask for some of the
services that the server can provide.
The server then does the work and then returns an output or a code that is erroneous if the
work cannot be executed.
Peer-to-peer: All the procedures play the same role
The procedures interact without a specific distinction between the servers and the clients.
The communication pattern depends on the specific application
A large number of objects of data are shared; any computer holds a very small part of the
database of application.
Interaction models:
The models of interaction are for time handling that is for the execution of
procedures, delivery of messages, drifts of clocks and many more. There are two types of
models of interaction (Aldin et al.,2019). These include Synchronous and asynchronous
distributed systems.
Document Page
3DISTRIBUTED SYSTEMS
Synchronous distributed systems: The features of the synchronous distributed systems are
as follows:
The upper and the lower bounds on the procedures of execution time can be easily set
The messages transmitted are received within a known time that is bounded.
The rates of drift between the local clocks have a known bound.
Asynchronous distributed Systems: there are different distributed systems those are
asynchronous. They don’t have bound on procedure time of execution, no bound on delays of
transmission of messages and no bound on rates of drift between the local clocks.
Fault models: in the fault models, failure can occur both in the channels of communication
and in the procedures. The reason can be faults of both hardwares and softwares. The faults
model are required to create systems with a behaviour that is predictive in case of some faults
(Rouland, Hamid & Jaskolka, 2018). Such a type of system will according to the predictions
as long the faults those are real behave as defined by the model of fault.
The model of the distributed systems that will be identified in this diagram include
Everyone in the company’s headquarters should have admittance to the catalog of
clothing line, files those are shared and the assets of the company.
The hardwares of the company such as the printers, scanners and the routers will be
recognised
All the employees of the company will be able to access the webpage that is corporate
and the corporate intranet for shipping, sales, processing and the tasks of internal
administrative.
The company has 3000 employees, the headquarters of the company is in South Carolina, and
the units of manufacturing are in Seattle and Maine. The company wants to open three
international stores in England, Spain and New Zealand. The computing infrastructure of the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4DISTRIBUTED SYSTEMS
company has 300 computers of which 200 computers are in the headquarters and 150
computers both in the manufacturing units. There are 300 printers of which 150 printers are
in the headquarters and 125 printers both in the manufacturing units. There are 200 point-of-
sale terminals of which 100 terminals are in the headquarters and 50 terminals both in the
manufacturing units.
Document Page
Running head: DISTRIBUTED SYSTEMS
Document Page
Running head: DISTRIBUTED SYSTEMS
References
Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., ... & Ghemawat, S.
(2016). Tensorflow: Large-scale machine learning on heterogeneous distributed
systems. arXiv preprint arXiv:1603.04467.
Aldin, H. N. S., Deldari, H., Moattar, M. H., & Ghods, M. R. (2019). Consistency models in
distributed systems: A survey on definitions, disciplines, challenges and
applications. arXiv preprint arXiv:1902.03305.
Rouland, Q., Hamid, B., & Jaskolka, J. (2018, October). Formalizing reusable
communication models for distributed systems architecture. In International
Conference on Model and Data Engineering (pp. 198-216). Springer, Cham.
Van Steen, M., & Tanenbaum, A. S. (2017). Distributed systems. Leiden, The Netherlands:
Maarten van Steen.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1DISTRIBUTED SYSTEMS
Answer 2
In this, the above diagram is to replaced with the following requirements. The requirements
include:
The system should support more than one agent those are autonomous for the shared
assets while accessing the shared states in order to execute the updates those are based on
real-time.
The state of the system should be distributed across more than one nodes of client or
server
There should be only one service that is centralized that will support the users. It should
support the user to log on, addition of clients or servers, deletion of servers or clients and
perform any other tasks in order to keep the system organized
The system should be robust and it should consist of provisions in order to manage the
fault-tolerance or the gaps in communication.
The server can sometimes become slow when huge amount of work is done and this may
result in slow internet and the work will be done slowly in the company. The server can slow
down due to the large amount of usage of memory (Mirhosseini, Sriraman & Wenisch, 2019).
The server can become slow due to some of the problems of CPU that is high time of
response of services or unavailability. Increase utilisation of the hard disk that includes
increase in the number of logs and loss of data. Increase in network adapter and it is due to
unstable bandwidth, poor time of response and poor application or the performance of service
(Misra et al.,2019).
A robust system or a computer system with robustness means is the capability of a system of
computer to cope up with the errors during the execution and then cope up with the input that
Document Page
2DISTRIBUTED SYSTEMS
is erroneous (Tran et al.,2017). Robustness can include various areas of computer science
such as the robust programming, robust machine learning, and robust security network.
Fault tolerance refers to the capability of a system to continue operating without any
interruption when one or more than one components of the system fail. The main aim of a
fault tolerant system is to prevent the disruption that is arising from a point of failure that is
single making sure the continuity of business of the company and the high availability of the
applications and the systems those are critical (Abdi et al.,2017). The systems those are fault
tolerant use the backup components that take the place of the components those are failed
making sure that there is no loss of service. These include:
Hardware systems: The systems those are backed up by the systems those are same. Like
example, a server can be made fault tolerant by utilising an equivalent server that is
running in parallel and with all the operations those are always mirrored to the backup
server
The software systems: The systems those are backed by the instances of other software.
For example, a database with the information of the customers can be replicated
continuously to other machine. If the database that is primary does not work, the
operations can be redirected to the second database automatically.
Power sources: The sources of power those are made fault tolerant using the sources those
are alternative. For example, various organizations have various generators of power that
can take over in case when the main line electricity falls.
Fault tolerance can play an important role in the strategy of recovery of disaster (Ganesan et
al.,2017). For example, a system that has the fault-tolerance with the components of backup
in the cloud can easily restore the critical systems quickly even if the disaster that is induced
by the humans or nature destroys the infrastructure of the company.
Document Page
Running head: DISTRIBUTED SYSTEMS
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Running head: DISTRIBUTED SYSTEMS
References
Abdi, F., Tabish, R., Rungger, M., Zamani, M., & Caccamo, M. (2017, April). Application
and system-level software fault tolerance through full system restarts. In 2017
ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS) (pp.
197-206). IEEE.
Ganesan, A., Alagappan, R., Arpaci-Dusseau, A. C., & Arpaci-Dusseau, R. H. (2017).
Redundancy does not imply fault tolerance: Analysis of distributed storage reactions
to single errors and corruptions. In 15th {USENIX} Conference on File and Storage
Technologies ({FAST} 17) (pp. 149-166).
Mirhosseini, A., Sriraman, A., & Wenisch, T. F. (2019, February). Enhancing server
efficiency in the face of killer microseconds. In 2019 IEEE International Symposium
on High Performance Computer Architecture (HPCA) (pp. 185-198). IEEE.
Misra, P. A., Borge, M. F., Goiri, Í., Lebeck, A. R., Zwaenepoel, W., & Bianchini, R. (2019,
March). Managing tail latency in datacenter-scale file systems under production
constraints. In Proceedings of the Fourteenth EuroSys Conference 2019 (pp. 1-15).
Tran, T. A., Oh, K., Na, I. S., Lee, G. S., Yang, H. J., & Kim, S. H. (2017). A robust system
for document layout analysis using multilevel homogeneity structure. Expert Systems
With Applications, 85, 99-113.
Document Page
1DISTRIBUTED SYSTEMS
Answer 3:
The servers that will be implemented to the company include the database server,
email server and a file sharing system. These protocols will help in to handle the
communications between the various entities.
A database server is the portion that is at the backend of an application of database
that follows the tradition of the model of client-server. The portion of back-end is called the
instance (Fadhilah, Tulloh & Novianto, 2018). It can also refer to the physical computer that
is utilised in order to host the database. The database server is a higher-end computer that is
used in order to host the database. The server of database is independent of the architecture of
the database. The databases those are relational, flat files and the databases those are non-
relational. All of these databases can be accommodated on the servers of database. In the
model of client server, there is always a dedicated host that is used in order to execute and
server up the assets, typically multiple applications of software (Gunawan et al.,2016). There
are also various clients that can connect to the server and then utilise the resources those are
provided and hosted by the server. When the databases are considered in the model of client
server, the server of database can be at the backend of the application of database or it can be
the hardware of the computer that is used in order to host the instance. Sometimes, it can also
refer to the combination of the both softwares and the hardwares (Jawad, 2020).
A file does not normally execute the tasks of computational or execute the programs
on behalf of the workstations of the client. The file server is usually found in the schools and
the offices where various users use the local area network in order to connect their client
computers. A file server can be non-dedicated or dedicated (Amrutha, & Revathy, 2017). A
file server that is dedicated is particularly designed for the utilisation as the file server, with
the various workstations those are attached in order to read and write the files and the
Document Page
2DISTRIBUTED SYSTEMS
databases. The servers of the files can be categorized by the technique of access. The HTTP
or the File Transfer Protocol accesses the servers of the internet frequently. The servers those
are on the LAN are generally accessed by the FICS/SMB protocol or the NFS protocol
(Namee, Karnbunjong & Polpinij, 2019). The server of database that offers access to a
database that is shared through a device driver of database and they are not regarded as the
servers of the file as they may need. The servers of the file provide some form security of the
system in order to restrict access to files to particular users. In large companies, this job is
usually delegated to the directory services such as the openLDAP or the Active Directory of
Microsoft. The servers that work within the environment of hierarchical computing that treats
the users, files and the applications of computer as unique but the entities those are related on
the network and the give the access that is based on the credential of the group (Grothe et
al.,2016). In several cases, the service of directory spans many servers of file for large
companies. In the past and in the companies those are smaller; the authentication can take
place directly at the server.
A mail server is a system of computer that sends and then receives email. In several
cases, the servers of web and the servers of mail are integrated in a single system.
Nevertheless, large ISPs and the public services of email can utilise dedicated hardware in
order to send and receive the email (Gandhi, 2019).
The ERP that is used in this Company is SAP ERP. SAP is the leader of the market in
offering ERP services and solutions. ERP is software that is created to the organizations
belonging to various sectors of industries regardless of the strength and the size. The package
of ERP is designed in order to support and combine every area of functions of the procedure
of business such as the procurement of services and goods, distribution and sales, accounting,
sales and many more (Singh & Sood, 2018). A system of ERP has various functions. The
functions of ERP are as follows:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
3DISTRIBUTED SYSTEMS
Supports the combined procedure of business inside the company
Upgrades the planning of capital and assists in executing the plans of the organizations
and the strategies.
Assists to speed up the procedure of making of decisions over the examination of the data
that is accurate
Assists to extend the network of the business to the wider domains by expanding the
services and the products in order to reach the customers, partners and the suppliers
Recognises the risks of operations in order to upgrade the governance
Offers protection against the data breaches of the organization and the threats of security
to stop the information leakage
It makes the company adaptable to the changes those are rapid in the procedure of the
business according to the requirements
It provides long-term profits by offering means in order to maximize the base of the
customers
By combining the procedures of business, the ERP provides the following benefits-
It saves time and expenses
It permits faster making of decisions by the management, using the data and the tools of
reporting that is designed in the systems
Single source of data and then sharing of data among all the units of the company
Assists in tracking all the transactions that takes place in the company from beginning till
the end
It supplies information that is based on real time whenever it is needed
Offers synchronized transfer of information in between various functional areas such as
the sales, marketing, human resources and many more.
Document Page
Running head: DISTRIBUTED SYSTEMS
Document Page
Running head: DISTRIBUTED SYSTEMS
References
Amrutha, N. T., & Revathy, N. (2017). Client Server Architecture for IT Company.
Fadhilah, M. R., Tulloh, R., & Novianto, H. (2018). Perancangan Dan Implementasi
Database Server Dengan Mariadb Dan Linux Centos (studi Kasus: Pt. Infomedia
Nusantara). eProceedings of Applied Science, 4(3).
Gandhi, A. (2019). MAIL SERVER COMMUNICATION: PHP.
Grothe, M., Mainka, C., Rösler, P., Jupke, J., Kaiser, J., & Schwenk, J. (2016, August). Your
cloud in my company: Modern rights management services revisited. In 2016 11th
International Conference on Availability, Reliability and Security (ARES) (pp. 217-
222). IEEE.
Gunawan, I., Setiabudi, D. H., Noertjahyana, A., & Hermawan, Y. (2016). Securing Client-
Server Application Design for Information System Inventory. In Proceedings of
Second International Conference on Electrical Systems, Technology and Information
2015 (ICESTI 2015) (pp. 573-580). Springer, Singapore.
Jawad, W. K. (2020). Design and Implementation of E-Human Resource Management
System for IT Company. International Journal of Scientific Research and
Engineering Development, 3(1).
Namee, K., Karnbunjong, S., & Polpinij, J. (2019, November). The Integration of File Server
Function and Task Management Function to Replace Web Application on Cloud
Platform for Cost Reduction. In 2019 IEEE Asia Pacific Conference on Circuits and
Systems (APCCAS) (pp. 405-408). IEEE.
Singh, S. K., & Sood, K. (2018). SAP Sales Cloud (SAP Hybris Cloud for Sales, SAP Hybris
C4C): Sales Force Automation with SAP C/4HANA (SAP PRESS). SAP PRESS.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1DISTRIBUTED SYSTEMS
Answer 4
In this scenario, the file system that is implemented should handle the communications
between various platforms.
A file system administers the way the data is stored and retrieved. Without a file
system, the data that is kept in the medium if storage would a large piece of data. By
separating the large piece of data and then providing each of the pieces a name, the data can
be easily recognised and isolated. There are various types of file systems. Each one of the file
systems has various structures, speed, logic and many more properties. Some files are
designed to be utilised for particular applications (Gamido, Gamido & Sison, 2019). The file
systems can be utilised on various types of devices of storage that utilise various types of
media. Some of the file systems are utilised on the local data devices of storage, others offer
access of files through a protocol of network. Some of the systems of the files are virtual,
means that the files those are supplied are computed on request or they are merely a mapping
into a various file system utilised as a backup store. The system of files administers access to
both the file content and the metadata about those types of files. It is responsible in order to
arrange the space of storage, efficiency, reliability and then tuning with regard to the medium
of physical storage are essential considerations of design. File management is the procedure
of managing a system that handles the data those is digital. Therefore, a file management
system that is effective upgrades the overall functionality of the workflow of business. It also
organizes essential data and offers a searchable database for the retrieval that is quick. A
system of file management permits the admins to set the restrictions, permissions and the
roles for the files (Gulzar, Rao & Aamir, 2019). This consists of granting various levels of
access to the files and allocating various roles for particular users. This maximizes the
efficiency as the correct user gets the right files. A security of computer strengthens with the
modern software of file management, it provides encryption in order to login and then
Document Page
2DISTRIBUTED SYSTEMS
support the connections those are secure. It permits the admins to receive the reports of data
that will assist them to upgrade the decisions of business.
The network includes an ERP server with two instances for load balancing. The ERP
that is used in SAP ERP. Load balancing a method that is utilised in order to distribute the
workloads across the ERP server other compute assets in order to optimize the efficiency,
reliability and capacity of the network. Load balancing is executed by a device that can be
physical or virtual that recognises in real time which server in the pool can best meet a given
request of client by making sure that the traffic of the network does not overwhelm the
server. In addition to increasing the capacity of the network and the performance of the
network, the load balancing offers failover (Rathore, 2018). If one of the servers fails, a load
balancer automatically redirects the workload to a backup server, thus resolving the effect on
the users.
The load balancing is categorized as supporting either layer 4 or layer 7. The load
balancer of layer 4 distributes the traffic that is based on the data of transport such as the
addresses of IP and the Transmission Control Protocol port numbers. The devices of load
balancing of layer 7 making the decisions of routing based on the features of application level
that consist of header information of HTTP and the actual contents of the message including
the cookies and the URLs (Mesbahi & Rahmani, 2016). The load balancers of layer 7 are
more common, but the load balancers of layer 4 are popular particularly in the
implementation of edge.
The balancers of load handle the requests those are incoming from the various users
for information and various services. They are placed between the servers that handle those
requests and the internet. Once a request is received, the load balancer decides the server in
the pool that is available and is online and then it routes the request to that server in the pool.
Document Page
3DISTRIBUTED SYSTEMS
During the times, when there are heavy load, a load balancer can dynamically add various
servers in response to the spikes those are present in the traffic. The load balancers can easily
drop the servers when the demand is low (Eisenbud et al.,2016). A load balancer can be a
physical device, an instance of software or integration of both. The vendors have
implemented the software into the hardware and sold them to the end users as standalone
devices and it is sold generally in pairs to offer failover if one of the servers goes down. The
networks those are growing needs purchasing bigger devices.
The servers such as the database server, email server and the remote connection are
connected to the mainframe computer. The mainframes are the kind of computers is known
for their very large size, their storage size, power of processing and high level reliability.
They are utilised by large companies for the applications those are critical needing very high
volumes of processing of data (Canfield et al.,2019). There are several features of
mainframes computers those are common to the vendors of mainframes. All the mainframes
computers have the capability to execute more than one operating systems. The mainframes
can add or swap the capacity of system without any disruption. The mainframe computers are
designed in order to handle very high volume of output and input and then emphasize
throughout the computing. A single mainframe computer can replace many smaller servers. A
min advantage of the mainframe computers is that they are very stable when they are
compared with the other computers. This is very useful in the environment of usage where
the uptime is essential (Oppitz & Tomsu, 2018). A problem of the hardware will influence
the users that work with the mainframe and they can bring the users to a stop.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Running head: DISTRIBUTED SYSTEMS
Document Page
Running head: DISTRIBUTED SYSTEMS
References
Canfield, S., Notohardjono, B., Ecker, R., & Khambati, S. (2019). Mainframe Computer
Connector Wear Correlation and Prediction Analysis.
Eisenbud, D. E., Yi, C., Contavalli, C., Smith, C., Kononov, R., Mann-Hielscher, E., ... &
Hosein, J. D. (2016). Maglev: A fast and reliable software network load balancer.
In 13th {USENIX} Symposium on Networked Systems Design and Implementation
({NSDI} 16) (pp. 523-535).
Gamido, H. V., Gamido, M. V., & Sison, A. M. (2019). Developing a secured image file
management system using modified AES. Bulletin of Electrical Engineering and
Informatics, 8(4), 1461-1467.
Gulzar, U., Rao, A., & Aamir, S. (2019). Multi-Cloud Storage based File Management
System (Doctoral dissertation, Department of Computer Science, COMSATS
University Islamabad, Lahore campus).
Mesbahi, M., & Rahmani, A. M. (2016). Load balancing in cloud computing: a state of the
art survey. International Journal of Modern Education and Computer Science, 8(3),
64.
Oppitz, M., & Tomsu, P. (2018). Making of Digital Computers. In Inventing the Cloud
Century (pp. 75-95). Springer, Cham.
Rathore, N. (2018). Performance of hybrid load balancing algorithm in distributed web server
system. Wireless Personal Communications, 101(3), 1233-1246.
Document Page
1DISTRIBUTED SYSTEMS
Answer 5
A node is a physical device that is present within the network of other tools that has the
ability to send, receive or forward the information. A personal computer is the most common
node (Jia, Chen & Zhao, 2017). It is called the internet node. The modems, switches and the
printers are also called the nodes, as are the other devices those connect over the Wi-Fi or
Ethernet. The nodes of the network are the physical pieces that make up the network. They
generally consist of any type of device that both receives and then communicate the
information (Pustovoitov, Sokol & Natalia, 2018). Therefore, they can receive and then store
the data, transmit the data elsewhere or develop and then send the data instead.
In this, the scenario will remain as it is but the nodes those are used in the network design
will be given a name.
There are various naming conventions in order to name the nodes. These include the name of
the node, domain of the node, fully qualified node name, directory of network, resolution of
name, resolver of name (Shang et al.,2016).
Name of node: A character scheme that recognises the node. This name must be distinctive in
the domain and it cannot contain periods and slashes.
Domain of node: A character string that adds to the end of the name of the node. Together,
the name of the node and the domain of the node must form a string that is distinctive.
FQNN: the string that is formed by the combination of the name of the node and the domain
of the node.
Network directory: A directory in the space of the pathname deployed by the name of the
node. Each directory of the network- there can be multiple one on a node and it has a related
node domain
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2DISTRIBUTED SYSTEMS
Resolution of name: The procedure by which the name converts an FQNN to a list of address
of destination that the layer of transport knows the way to get to
Resolver of name: A code that deploys one technique of converting an FQNN to a list of
address of destination.
Document Page
Running head: DISTRIBUTED SYSTEMS
Document Page
Running head: DISTRIBUTED SYSTEMS
References
Jia, W. U., Chen, Z., & Zhao, M. (2017). Effective information transmission based on
socialization nodes in opportunistic networks. Computer networks, 129, 297-305.
Pustovoitov, P., Sokol, G., & Natalia, R. (2018, February). Routing procedure in
network with nodes dynamic usage rate. In 2018 14th International Conference on
Advanced Trends in Radioelecrtronics, Telecommunications and Computer
Engineering (TCSET) (pp. 1170-1173). IEEE.
Shang, W., Bannis, A., Liang, T., Wang, Z., Yu, Y., Afanasyev, A., ... & Zhang, L. (2016,
April). Named data networking of things. In 2016 IEEE first international conference
on internet-of-things design and implementation (IoTDI) (pp. 117-128). IEEE.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1DISTRIBUTED SYSTEMS
Answer 6
There are several clock synchronization model inserted in the company for the
allocation of files and distribution of the files.
Physical clocks: A physical clock is a physical procedure that is coupled with a technique of
measuring that procedure in order to record the passage of time (Lamport, 2019). Most of the
physical clocks are based on the cyclic procedures. One or more physical clocks are utilised
in order to establish a time-line clock for a database that is temporal.
Clock synchronization algorithms: In clock synchronization algorithms one node has a
receiver that is based on real time (Bogomolov, Herrera & Steiner, 2016). This node also
called the timeserver node whose time of the clock is regarded as right and it is utilised as the
time of reference. The goal of the algorithm is to keep the clock of the nodes synchronized.
Network Time Protocol: The network time protocol is a protocol of networking for the
synchronization of clock between the computer system over the packet that is switched,
networks of data and variable latency (O'Donoghue, Sibold & Fries, 2017).
Berkley Algorithm: The Berkley algorithm is a technique of clock synchronization that is
utilised in the distributed systems (Stoica et al.,2017). The algorithm assumes that each of the
node of machines in the network either does not have an accurate source of time or does not
have a server of UTC.
Clock Synchronization in Wireless Networks: the clock synchronization in the networks
those are wireless is very important for communication but it also offers the capability to
detect the movement, proximity and location (Mongelli & Scanzio, 2016). The problem of
synchronization includes four parts that includes sending time, accessing time, propagation
time and the receiving time.
Document Page
2DISTRIBUTED SYSTEMS
Logical clocks: A logical clock is a mechanism that is utilised in order to capture the causal
and the chronological relationships in a system that is distributed (Tong et al.,2018). The
distributed systems cannot have a physically global clock that is synchronized, so a clock that
is logical permits global ordering on the events from various procedures in these systems.
Total ordered multicast: the total ordered multicast in a distributed systems means that
updating a database that is replicated and then leaving it in an inconsistent state (Babay &
Amir, 2016).
Vector clocks: A vector clock is an algorithm in order to generate a partial ordering of the
events in the system that is distributed and then detecting the causality violations. Just in the
Lamport timestamps, the interprocedure messages include the state of sending logical clock
of the procedure (Yingchareonthawornchai et al.,2018)
In serial terminology, the synchronization of clock can refer to the recovery of the
clock that accomplishes frequency synchronization that is opposed to the synchronization of
full phase. This type of synchronization of clock is utilised in the synchronization in
telecommunications and in the detection of the automatic baud rate. The isochronous
operations refer to the system with the synchronization of frequency and it loses constraints
on the synchronization of phase. The synchronous operations offer a much tight
synchronization that is based in time in addition to the frequency.
The clock inaccuracies cause several problems in the distributed systems. The clocks
of various processors require to be synchronized in order to restrict the errors. This is to have
an efficient communication or the sharing of the resources. Therefore, the clocks need to be
administered and continuously adjusted. Otherwise, the clocks will drift apart. The skew of
the clock introduces a mismatch in the value of time of the two clocks.
Document Page
Running head: DISTRIBUTED SYSTEMS
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Running head: DISTRIBUTED SYSTEMS
References
Babay, A., & Amir, Y. (2016, June). Fast total ordering for modern data centers. In 2016
IEEE 36th International Conference on Distributed Computing Systems (ICDCS) (pp.
669-679). IEEE.
Bogomolov, S., Herrera, C., & Steiner, W. (2016). Benchmark for verification of faulttolerant
clock synchronization algorithms.
Lamport, L. (2019). Time, clocks, and the ordering of events in a distributed system.
In Concurrency: the Works of Leslie Lamport (pp. 179-196).
Mongelli, M., & Scanzio, S. (2016). A neural approach to synchronization in wireless
networks with heterogeneous sources of noise. Ad Hoc Networks, 49, 1-16.
O'Donoghue, K., Sibold, D., & Fries, S. (2017). New security mechanisms for network time
synchronization protocols. In 2017 IEEE International Symposium on Precision Clock
Synchronization for Measurement, Control, and Communication (ISPCS) (pp. 1-6).
IEEE.
Stoica, I., Song, D., Popa, R. A., Patterson, D., Mahoney, M. W., Katz, R., ... & Goldberg, K.
(2017). A berkeley view of systems challenges for ai. arXiv preprint
arXiv:1712.05855.
Tong, Z., Pakin, S., Lang, M., & Yuan, X. (2018). Fast classification of mpi applications
using lamport’s logical clocks. Journal of Parallel and Distributed Computing, 120,
77-88.
Document Page
1DISTRIBUTED SYSTEMS
Yingchareonthawornchai, S., Nguyen, D. N., Kulkarni, S. S., & Demirbas, M. (2018).
Analysis of bounds on hybrid vector clocks. IEEE Transactions on Parallel and
Distributed Systems, 29(9), 1947-1960.
Document Page
2DISTRIBUTED SYSTEMS
Answer 7
The tree structure for the allocation of files is very important for the distributed systems.
The method of allocation defines the way the files are to be stored in the blocks of the disk.
The nature of direct access of the disks provides the users the flexibility to deploy the files. In
several cases, the various files or many files are stored on the similar disk (Dewan, Hansdah
& Singh, 2018). The main issue that occurs in the operating system is the way the spaces are
assigned to the files so that the use of the disk is very efficient and quick admittance to the
files are possible. There are mainly three techniques of file assigning in the disk. Each of the
techniques has it pros and cons. Mainly a system utilises on method for all then files within
the system (Wu & Huang, 2017).
Contiguous allocation
Linked allocation
Indexed allocation
The main idea that is behind the contiguous methods of allocation is to offer
Efficient utilization of disk space
Fast access to the block of files
In the tree structure system of directory, any entry of the directory can be either a file or
the sub directory. The tree-structured system of directory overcomes the disadvantages of the
two level system of directory (Zeng et al.,2017). The same kinds of files can be now grouped
in one directory.
Each of the end user has its own directory and it cannot enter in the other directory of the
user. However, the end user has the permission to read the data of the root but the user cannot
alter or write this (Mechtly et al.,2019). Only the administrator of the system has the entire
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
3DISTRIBUTED SYSTEMS
access of the directory of root. Searching is more efficient in the structure of directory. The
concept of present directory of working is utilised. A file can be accessed by two kinds of
paths, either it can be absolute or it can be relative.
The path that is absolute is the path of the file with respect to the directory of the root of
the system while the relative path is a path that is with respect to the present working
directory of the system (Lin, 2018). In the tree-structured systems of directory, the end user is
provided with the privilege in order to develop the files as well as the directories. A tree
structure is present in the distributed system that is used in order to allocate the files. The
Company must implement the tree structure so that the files those are present in the company
is appropriately allocated. A distributed system is a system whose components are situated on
various computers those are networked and that coordinates and communicates their
activities by transmitting messages to each other (Abadi et al., 2016). The components
interact with each other to accomplish common objectives.
Document Page
Running head: DISTRIBUTED SYSTEMS
Document Page
Running head: DISTRIBUTED SYSTEMS
References
Dewan, H., Hansdah, R., & Singh, P. (2018, September). Sigma-Tree: Design of a Data
Structure for Storing File Data Allocation Map in a Distributed File System. In 2018
IEEE International Conference on Smart Cloud (SmartCloud) (pp. 90-98). IEEE.
Lin, X. (2018). Examining NTFS File System. In Introductory Computer Forensics (pp. 163-
197). Springer, Cham.
Mechtly, B., Helbert, F., Cox, D., & Hastings, Z. (2019). The visible file system: an
application for teaching file system internals. Journal of Computing Sciences in
Colleges, 34(4), 24-31.
Wu, L., & Huang, L. (2017). A Survey to Structure of Directories in File System.
In Advances in Computer and Computational Sciences (pp. 91-103). Springer,
Singapore.
Zeng, K., Lu, Y., Wan, H., & Shu, J. (2017, March). Efficient storage management for aged
file systems on persistent memory. In Design, Automation & Test in Europe
Conference & Exhibition (DATE), 2017 (pp. 1769-1774). IEEE.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1DISTRIBUTED SYSTEMS
Answer 8
The technical issue that can be solved by the distributed system is that it can solve the
huge load on the network due to the large number of devices those are connected to the
network of the company.
The problem is that there are large numbers of devices such as the computers, printers,
terminals and many other devices are connected to the network. The network can get
slower when these systems will work in unison. Therefore, a distributed approach is
required so that the network is not slowed down and the operation of the company will
not be hampered. The distributed system will help to reduce the problem and at the same
time will increase the security of the systems.
There are various types of models of distributed systems. The models are as follows:
Architectural models
Interaction models
Fault model
Architectural models: the model of architecture refers to the responsibilities those are
distributed between the components of the system and the way these components are placed
(Van Steen & Tanenbaum, 2017).
There are two types of architectural models. These include client-server model and the
peer-to-peer model.
Client-server model: the system is structured as a sequence of procedures known as
servers that provide services to the various servers known as clients.
The model of client-server is based on a simple requested that is deployed with the
primitives of send/receive or utilising procedure calls those are remote.
Document Page
2DISTRIBUTED SYSTEMS
The client first sends a message request to the server in order to ask for some of the
services that the server can provide.
The server then does the work and then returns an output or a code that is erroneous if the
work cannot be executed.
Peer-to-peer: All the procedures play the same role
The procedures interact without a specific distinction between the servers and the clients.
The communication pattern depends on the specific application
A large number of objects of data are shared; any computer holds a very small part of the
database of application.
Interaction models:
The models of interaction are for time handling that is for the execution of
procedures, delivery of messages, drifts of clocks and many more. There are two types of
models of interaction (Aldin et al.,2019). These include Synchronous and asynchronous
distributed systems.
Synchronous distributed systems: The features of the synchronous distributed systems are
as follows:
The upper and the lower bounds on the procedures of execution time can be easily set
The messages transmitted are received within a known time that is bounded.
The rates of drift between the local clocks have a known bound.
Asynchronous distributed Systems: there are different distributed systems those are
asynchronous. They don’t have bound on procedure time of execution, no bound on delays of
transmission of messages and no bound on rates of drift between the local clocks.
Document Page
3DISTRIBUTED SYSTEMS
Fault models: in the fault models, failure can occur both in the channels of communication
and in the procedures. The reason can be faults of both hardwares and softwares. The faults
model are required to create systems with a behaviour that is predictive in case of some faults
(Rouland, Hamid & Jaskolka, 2018). Such a type of system will according to the predictions
as long the faults those are real behave as defined by the model of fault.
The model of the distributed systems that will be identified in this diagram include
Everyone in the company’s headquarters should have admittance to the catalog of
clothing line, files those are shared and the assets of the company.
The hardwares of the company such as the printers, scanners and the routers will be
recognised
All the employees of the company will be able to access the webpage that is corporate
and the corporate intranet for shipping, sales, processing and the tasks of internal
administrative.
These models will help the company to solve the problems. The company can implement
any of these models and will help to solve the problem of too much load in the network of the
company due to the operations of the large numbers of devices. The company need to
implement various servers in the network so that the operations are done fast and the network
does not slow down due to the heavy load.
There are several advantages of the distributed systems. One of the easiest advantages is
the resiliency and the redundancy. If an organization is serving the website from a set of
servers those are distributed, rather than a single server, it may be able to stay up even if one
of the servers fails physically. If the data is distributed between more than one servers, a very
common occurrence in the modern systems those are distributed, there may not be any loss of
data even if the devices of storage stops working.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4DISTRIBUTED SYSTEMS
There are large numbers of resources in the system such as the ERP server and the
various servers those are implemented in the system. Theses servers will help to distribute
the load in the system by taking the load and by performing the activity of the server.
These servers can solve the load that is on the network. These servers will help to speed
up the work by reducing the load on the network and the operations of the company will
not be hampered.
Fault tolerance refers to the capability of a system to continue operating without any
interruption when one or more than one components of the system fail. The main aim of a
fault tolerant system is to prevent the disruption that is arising from a point of failure that is
single making sure the continuity of business of the company and the high availability of the
applications and the systems those are critical (Abdi et al.,2017). The systems those are fault
tolerant use the backup components that take the place of the components those are failed
making sure that there is no loss of service. A fault tolerance system will also help to
decrease the load on the network, if one of the systems fails then a backup system will take
its place and hence the operations will go on without any interruption.
The admittance to the data is the procedure of sharing and accessing the data as
appropriate. To utilise and mange the data, the user must have the access to the data. In
several ways, controlling the admittance to the data is one of the best ways of
safeguarding the data from misuse (Buchert, 2016). The employees should have the
responsibility in order to manage the access to the data. when the data is managed, these
are the guidelines that should be followed:
Authorize the admittance to data only when required: By limiting the admittance to the data,
the user can help to reduce the risk of exposure of data. The access to the data must be
Based on an interest that is legitimate
Document Page
5DISTRIBUTED SYSTEMS
Consistent with the authorization of the recipient in order to access the data
Granted in order to fulfil an operational need
Restricted to only the data that is required
Granted only for as long as the data is required
Reviewing the admittance regularly: the user or the company must review the admittance
to the data regularly. The admittance to the data must be revoked when it is no longer
required
The passwords should not be shared: the admittance to the data can be shared but the
access to the accounts and the devices must not be shared. The passwords of the devices or
the accounts where the data is kept must not be shared so that an unauthorized person can
access it and view the sensitive data and the information that is present in the devices or the
systems.
The communication channels in the distributed system will occur with the help of the
various protocols in the system. The protocols include the higher-level protocols, transport
protocols and the lower-level protocols. A remote procedure call will also occur in the
distributed system that will help to lessen the effort of communication and the
communication channels (Benamrane, Mamoun & Benaini, 2017). There is a lot of
importance of the communication channel. A breakdown in the channel of communication
leads to an inefficient flow of information. The managers of the company in order to optimize
the productivity of the worker and to make sure the smooth running of the company should
deploy an effective channel of communication.
Fault tolerance refers to the capability of a system to continue operating without any
interruption when one or more than one components of the system fail. The main aim of a
fault tolerant system is to prevent the disruption that is arising from a point of failure that
Document Page
6DISTRIBUTED SYSTEMS
is single making sure the continuity of business of the company and the high availability
of the applications and the systems those are critical (Abdi et al.,2017). The systems those
are fault tolerant use the backup components that take the place of the components those
are failed making sure that there is no loss of service. These include:
Hardware systems: The systems those are backed up by the systems those are same. Like
example, a server can be made fault tolerant by utilising an equivalent server that is running
in parallel and with all the operations those are always mirrored to the backup server
The software systems: The systems those are backed by the instances of other software. For
example, a database with the information of the customers can be replicated continuously to
other machine. If the database that is primary does not work, the operations can be redirected
to the second database automatically.
Power sources: The sources of power those are made fault tolerant using the sources those are
alternative. For example, various organizations have various generators of power that can
take over in case when the main line electricity falls.
Fault tolerance can play an important role in the strategy of recovery of disaster (Ganesan et
al.,2017). For example, a system that has the fault-tolerance with the components of backup
in the cloud can easily restore the critical systems quickly even if the disaster that is induced
by the humans or nature destroys the infrastructure of the company.
The fault tolerance models include the replication model, recovery shepherd model
and the circuit breaker model (Ledmi, Bendjenna & Hemam, 2018).
Replication model: Offering more than one similar instances of the same system, directing
the tasks to all of them is parallel and then selecting the right output that is based on quorum.
A lockstep machine that has fault-tolerance utilises elements those are replicated and then
operating them in parallel. At any time, all the replications of every element should always be
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7DISTRIBUTED SYSTEMS
in the similar state. Similar inputs are offered to every replication and the similar outputs are
expected. The result of the replications is differentiated using a circuit of voting. The fault
tolerant machines those are made are usually made fully synchronous.
Recovery shepherding model: The recovery shepherding model is a model in order to enable
the programs of the software to recover from the fatal errors (Wu, 2017). Differentiating with
the failure obvious technique of computing, the shepherding of recovery works generally on
the compiled program binary directly and they do not need to recompile to the program
Circuit breaker mode: The circuit breaker model is a model in order to avoid the failures
those are catastrophic in the distributed systems.
Document Page
8DISTRIBUTED SYSTEMS
References
Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., ... & Ghemawat, S.
(2016). Tensorflow: Large-scale machine learning on heterogeneous distributed
systems. arXiv preprint arXiv:1603.04467.
Abdi, F., Tabish, R., Rungger, M., Zamani, M., & Caccamo, M. (2017, April). Application
and system-level software fault tolerance through full system restarts. In 2017
ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS) (pp.
197-206). IEEE.
Aldin, H. N. S., Deldari, H., Moattar, M. H., & Ghods, M. R. (2019). Consistency models in
distributed systems: A survey on definitions, disciplines, challenges and
applications. arXiv preprint arXiv:1902.03305.
Benamrane, F., Mamoun, M. B., & Benaini, R. (2017). New method for controller-to-
controller communication in distributed SDN architecture. International Journal of
Communication Networks and Distributed Systems, 19(3), 357-367.
Buchert, T. (2016). Managing large-scale, distributed systems research experiments with
control-flows (Doctoral dissertation).
Ganesan, A., Alagappan, R., Arpaci-Dusseau, A. C., & Arpaci-Dusseau, R. H. (2017).
Redundancy does not imply fault tolerance: Analysis of distributed storage reactions
to single errors and corruptions. In 15th {USENIX} Conference on File and Storage
Technologies ({FAST} 17) (pp. 149-166).
Ledmi, A., Bendjenna, H., & Hemam, S. M. (2018, October). Fault Tolerance in Distributed
Systems: A Survey. In 2018 3rd International Conference on Pattern Analysis and
Intelligent Systems (PAIS) (pp. 1-5). IEEE.
Document Page
9DISTRIBUTED SYSTEMS
Mirhosseini, A., Sriraman, A., & Wenisch, T. F. (2019, February). Enhancing server
efficiency in the face of killer microseconds. In 2019 IEEE International Symposium
on High Performance Computer Architecture (HPCA) (pp. 185-198). IEEE.
Misra, P. A., Borge, M. F., Goiri, Í., Lebeck, A. R., Zwaenepoel, W., & Bianchini, R. (2019,
March). Managing tail latency in datacenter-scale file systems under production
constraints. In Proceedings of the Fourteenth EuroSys Conference 2019 (pp. 1-15).
Rouland, Q., Hamid, B., & Jaskolka, J. (2018, October). Formalizing reusable
communication models for distributed systems architecture. In International
Conference on Model and Data Engineering (pp. 198-216). Springer, Cham.
Tran, T. A., Oh, K., Na, I. S., Lee, G. S., Yang, H. J., & Kim, S. H. (2017). A robust system
for document layout analysis using multilevel homogeneity structure. Expert Systems
With Applications, 85, 99-113.
Van Steen, M., & Tanenbaum, A. S. (2017). Distributed systems. Leiden, The Netherlands:
Maarten van Steen.
Wu, J. (2017). Distributed system design. CRC press.
chevron_up_icon
1 out of 43
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]