SlideShare a Scribd company logo
1 of 31
DADIMOS College
Department of Computer Science
Introduction to Distributed System
Chapter Two
Architecture
By Kelil Mohammed
Introduction
 Distributed systems are often complex pieces of
software, of which the components are by definition
dispersed across multiple machines
 The organization of distributed systems is mostly about
the software components that constitute the system.
Software Architectures
 describe the organization and interaction of software
components; focuses on logical organization of
software (component interaction, etc.)
6/22/2023 By Kelil M. 2
Introduction…cont’d
System Architectures
 describe the placement of software components on
physical machines
 The realization of an architecture may be centralized
(most components located on a single machine),
decentralized (most machines have approximately the
same functionality), or hybrid (some combination).
• i.e., System Architecture can be realized in:
Centralized or
Decentralized or
Hybrid
6/22/2023 By Kelil M. 3
Architectural style
Architectural style is formulated in terms of
components, the way that components are
connected to each other, the data exchanged between
components, and finally how these elements are
jointly configured into a system.
 is the logical organization of distributed systems into
software components
6/22/2023 By Kelil M. 4
Architectural style…cont’d
A component is a modular unit with well-defined
interfaces that is replaceable and reusable within its
environment
A connector is a mechanism that mediates
communication, coordination, or cooperation among
components
 e.g., facilities for RPC(remote procedure call),
message passing, or streaming data
 In other words, a connector allows for the flow of
control and data between components.
6/22/2023 By Kelil M. 5
Types of Architecture style
 The basic idea of architectural style is to organize
logically different components, and distribute those
components over the various machines.
Layered architectures
Object-based architectures
Data-centered architectures
Event-based architectures
6/22/2023 By Kelil M. 6
Layered Architecture
 Each layer uses previous layer to implement new
functionality that is exported to the layer above.
 Components are organized in a layered fashion where a
component at layer N is allowed to call components at
the underlying layer N-1, but not the other way around;
e.g., network layers
 The advantage of using this approach is that, the calls
always follow a predefined path, and that components in
each layer can be easily replaced or modified without
affecting the entire architecture.
6/22/2023 By Kelil M. 7
Layered Architecture…
6/22/2023 By Kelil M. 8
the layered architectural style
Object Based Architecture
 Each of the components are referred to as objects where
each object can interact with other objects through a given
connector or interface.
 Each objects are connected through a remote procedure call
(RPC) mechanism (client-server paradigm)
 component = object
 connector = RPC or RMI
6/22/2023 By Kelil M. 9
Data Centered Architecture
 based on a data center, where the primary communication
happens via a central data repository.
 This common repository can be either active or passive.
 this is more like a producer consumer problem.
 communication between objects happen through this shared
common storage.
 This supports different components (or objects) by providing
a persistent storage space for those components (such as a
MySQL database).
 All the information related to the nodes in the system are
stored in this persistent storage.
6/22/2023 By Kelil M. 10
Data Centered Architecture…
6/22/2023 By Kelil M. 11
Event Based Architecture
 Components communicate through the propagation of
events
 When an event is generated, it will be sent to the bus
system.
 With this, everyone else will be notified telling that
such an event has occurred.
 So, if anyone is interested, that node can pull the event
from the bus and use it.
 Sometimes these events could be data, or even URLs to
resources.
 So the receiver can access whatever the information is
given in the event and process accordingly.
6/22/2023 By Kelil M. 12
Event Based…cont’d
6/22/2023 By Kelil M. 13
the event-based architectural style
Event Based…cont’d
 Publish/subscribe approach:
 For distributed systems, event propagation is generally
associated with what are known as publish/subscribe
systems
 components (processes) can publish events and
subscribe to events
 Events are delivered to subscriber once published by
publisher
 Processes publish events after which the middleware
ensures that only subscribed processes will receive
them.
6/22/2023 By Kelil M. 14
Event Based…cont’d
 Decoupled in space:
 communicating components need not explicitly refer to each
other
 Coupled in time:
 communicating components must execute at the same time
 Event Based architectural style is based on the publisher-
subscriber architecture.
 Between each node there is no direct communication or
coordination.
 Instead, objects which are subscribed to the service
communicate through the event bus.
6/22/2023 By Kelil M. 15
Event Based…cont’d
 The event based architecture supports, several communication
styles.
 Publisher-subscriber
 Broadcast
 Point-to-Point
 Decouples sender & receiver; asynchronous communication
 An event can be defined as "a significant change in state".
 For example, when a consumer purchases a car, the car's
state changes from "for sale" to "sold". A car dealer's system
architecture may treat this state change as an event to be
produced, published, detected and consumed by various
applications within the architecture.
6/22/2023 By Kelil M. 16
Event Based…cont’d
 The major advantages of event-based architecture is that
the Components are decoupled in space - loosely coupled.
 They need not explicitly refer to each other.
 For example, If we have an alarm system that records
information when the front door opens, the door itself
doesn't know that the alarm system will add information
when the door opens, just that the door has been
opened.
6/22/2023 By Kelil M. 17
System Architecture
 The logical organization of distributed systems into
software components or how are components organized
in a system
 Deciding on software components, their interaction, and
their placement leads to an instance of a software
architecture, also called a system architecture.
6/22/2023 By Kelil M. 18
Centralized Architectures
Client Server Architecture
 Based on client-server interaction/request-reply behaviour.
Server: is a process that implements a service.
 example: file system service, database service).
Client: is a process that requests a service from a server.
6/22/2023 By Kelil M. 19
Cont’d…
 Communication between a client and a server can be
implemented by means:
Simple connectionless protocol
Connection oriented protocol.
Connectionless protocol:
 A client/server communication can be by a connectionless
protocol if the underlying network is fairly reliable; efficient
since there is no much overhead
 But assuring reliability is difficult
 the client cannot detect whether the original request
message was lost, or that transmission of the reply failed.
6/22/2023 By Kelil M. 20
6/22/2023 By Kelil M. 21
Connection oriented protocol:
 A client/server communication can be by connection-
oriented protocol if the underlying network is unreliable
 Establishing and terminating connections is expensive
 Not entirely appropriate in a local-area network due to
relatively low performance
 Works perfectly fine in wide-area network.
 Relatively costly, especially when request/reply messages
are small.
 Example: TCP/IP connections
 The Client /Server architecture has a centralized security
database.
 This database contains security details like credentials and
access details.
 Users can't log in to a server, without the security
credentials.
 So, it makes this architecture a bit more stable and secure
than Peer to Peer.
 The stability comes where the security database can allow
resource usage in a much more meaningful way.
 But on the other hand, the system might get slow, as the server
only can handle a limited amount of workload at a given time.
6/22/2023 By Kelil M. 22
Advantages and Disadvantages of centralized
System Architecture
Advantages:
 Easier to Build and Maintain
 Better Security
 Stable
Disadvantages:
 Single point of failure
 Less scalable
6/22/2023 By Kelil M. 23
Application Layering
 No clear distinction between a client and a server; for
instance a server for a distributed database may act as a
client when it forwards requests to different file servers
 Many client‐server applications are organized into three
layers:
The user-interface level
The processing level
The data level
6/22/2023 By Kelil M. 24
Application Layering …
 User‐interface level: contains user interface applications
 character based screen (CLI) or graphical window (GUI)
 Processing level: contains the core functionality of the
application.
 Data level: contains the data (database or file system) that a
client wants to manipulate through the application.
 It is responsible for keeping data consistent across different
applications
 example: bank case
6/22/2023 By Kelil M. 25
6/22/2023 By Kelil M. 26
Example 1. The general organization of an Internet search
engine into three different layers shown on slide #25
 Interface: type in a keyword string
 Processing level: processes to generate DB queries,
rank replies, format response
 Data level: database of web pages
Internet search engine example..
6/22/2023 By Kelil M. 27
Cont’d...
Example 2. Stock broker's decision support system
Interface: likely more complex than simple search
Processing: programs to analyze data; rely on
statistics, AI perhaps, may require large simulations
Data level: DB of financial information
Example 3. Desktop "office suites"
Interface: access to various documents, data,
Processing: word processing, database queries,
spreadsheets,.
Data : file systems and/or databases
6/22/2023 By Kelil M. 28
Multi-Tiered Architectures
• Single-tiered: dumb terminal/mainframe configuration
• Two-tiered: client/single server configuration
• Three-tiered: each layer on separate machine
Physically Two-Tired architecture
6/22/2023 By Kelil M. 29
Cont’d...
 The server tier in two-tiered architecture becomes more and
more distributed
 A single server is no longer adequate for modern information
systems
 This leads to three-tiered architecture
• Server may acting as a client
6/22/2023 By Kelil M. 30
Decentralized Architectures
Vertical distribution: is achieved by placing logically different
components on different machines.
 It splits up a server’s functionality over multiple computers
 Improves scalability
Horizontal distribution: replicates a server’s functionality over
multiple computers
 Avoids single- point of failure and allows load balancing
 Improves scalability and reliability
• E.g., replicated web server
 Read about the different approaches of peer-to-peer
6/22/2023 By Kelil M. 31
======= End of Chapter Two ======

More Related Content

Similar to DADIMOS College Introduction to Distributed Systems Chapter Two Architectural Styles

Cloud computing
Cloud computingCloud computing
Cloud computingMisha Ali
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Souvik Pal
 
Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11koolkampus
 
Architectural Design.pptx
Architectural Design.pptxArchitectural Design.pptx
Architectural Design.pptxssuser8c0d24
 
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdfSuitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdfDr. Richard Otieno
 
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...IJCSIS Research Publications
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...IJCSIS Research Publications
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Modeltom termini
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptxJohn Veigas
 
Architectural Design Report G4
Architectural Design Report G4Architectural Design Report G4
Architectural Design Report G4Prizzl
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...IJAAS Team
 

Similar to DADIMOS College Introduction to Distributed Systems Chapter Two Architectural Styles (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
 
Ch12
Ch12Ch12
Ch12
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 
Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11Distributed Systems Architecture in Software Engineering SE11
Distributed Systems Architecture in Software Engineering SE11
 
Architectural Design.pptx
Architectural Design.pptxArchitectural Design.pptx
Architectural Design.pptx
 
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdfSuitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
 
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Bluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security ModelBluedog white paper - Our WebObjects Web Security Model
Bluedog white paper - Our WebObjects Web Security Model
 
Cloud Module 1.pptx
Cloud Module 1.pptxCloud Module 1.pptx
Cloud Module 1.pptx
 
Architectural Design Report G4
Architectural Design Report G4Architectural Design Report G4
Architectural Design Report G4
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 

More from TadeseBeyene

micro chapter 3jjgffffyeyhhuyerfftfgggffgjj
micro chapter 3jjgffffyeyhhuyerfftfgggffgjjmicro chapter 3jjgffffyeyhhuyerfftfgggffgjj
micro chapter 3jjgffffyeyhhuyerfftfgggffgjjTadeseBeyene
 
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhh
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhhChapter fourvvvvvvvbbhhgggghhhhhhheryuuuhh
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhhTadeseBeyene
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptxTadeseBeyene
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptxTadeseBeyene
 
Moniter & Administrator Network & System Security.pptx
Moniter & Administrator Network & System Security.pptxMoniter & Administrator Network & System Security.pptx
Moniter & Administrator Network & System Security.pptxTadeseBeyene
 
monitor and Admin Network .pptx
monitor and Admin Network .pptxmonitor and Admin Network .pptx
monitor and Admin Network .pptxTadeseBeyene
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptxTadeseBeyene
 
Assisit with devlopment.pptx
Assisit with devlopment.pptxAssisit with devlopment.pptx
Assisit with devlopment.pptxTadeseBeyene
 
Chapter 3 And 4.pptx
Chapter 3 And 4.pptxChapter 3 And 4.pptx
Chapter 3 And 4.pptxTadeseBeyene
 
pdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxpdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxTadeseBeyene
 
Chap 1 - Introduction GUI.pptx
Chap 1 - Introduction GUI.pptxChap 1 - Introduction GUI.pptx
Chap 1 - Introduction GUI.pptxTadeseBeyene
 
Chap 1 - mobile Introduction.pptx
Chap 1 - mobile Introduction.pptxChap 1 - mobile Introduction.pptx
Chap 1 - mobile Introduction.pptxTadeseBeyene
 
Chap - 2 - Event Handling.pptx
Chap - 2 - Event Handling.pptxChap - 2 - Event Handling.pptx
Chap - 2 - Event Handling.pptxTadeseBeyene
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfTadeseBeyene
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptxTadeseBeyene
 

More from TadeseBeyene (20)

micro chapter 3jjgffffyeyhhuyerfftfgggffgjj
micro chapter 3jjgffffyeyhhuyerfftfgggffgjjmicro chapter 3jjgffffyeyhhuyerfftfgggffgjj
micro chapter 3jjgffffyeyhhuyerfftfgggffgjj
 
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhh
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhhChapter fourvvvvvvvbbhhgggghhhhhhheryuuuhh
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhh
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
Chapter four.pptx
Chapter four.pptxChapter four.pptx
Chapter four.pptx
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptx
 
Moniter & Administrator Network & System Security.pptx
Moniter & Administrator Network & System Security.pptxMoniter & Administrator Network & System Security.pptx
Moniter & Administrator Network & System Security.pptx
 
monitor and Admin Network .pptx
monitor and Admin Network .pptxmonitor and Admin Network .pptx
monitor and Admin Network .pptx
 
provide1923.pptx
provide1923.pptxprovide1923.pptx
provide1923.pptx
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptx
 
Assisit with devlopment.pptx
Assisit with devlopment.pptxAssisit with devlopment.pptx
Assisit with devlopment.pptx
 
Chapter 3 And 4.pptx
Chapter 3 And 4.pptxChapter 3 And 4.pptx
Chapter 3 And 4.pptx
 
chapter2.pptx
chapter2.pptxchapter2.pptx
chapter2.pptx
 
pdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxpdf to ppt window configuration .pptx
pdf to ppt window configuration .pptx
 
Chap 1 - Introduction GUI.pptx
Chap 1 - Introduction GUI.pptxChap 1 - Introduction GUI.pptx
Chap 1 - Introduction GUI.pptx
 
CHP 1 Apply.pptx
CHP 1 Apply.pptxCHP 1 Apply.pptx
CHP 1 Apply.pptx
 
Chap 1 - mobile Introduction.pptx
Chap 1 - mobile Introduction.pptxChap 1 - mobile Introduction.pptx
Chap 1 - mobile Introduction.pptx
 
Chap - 2 - Event Handling.pptx
Chap - 2 - Event Handling.pptxChap - 2 - Event Handling.pptx
Chap - 2 - Event Handling.pptx
 
chapter 1.pptx
chapter 1.pptxchapter 1.pptx
chapter 1.pptx
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

DADIMOS College Introduction to Distributed Systems Chapter Two Architectural Styles

  • 1. DADIMOS College Department of Computer Science Introduction to Distributed System Chapter Two Architecture By Kelil Mohammed
  • 2. Introduction  Distributed systems are often complex pieces of software, of which the components are by definition dispersed across multiple machines  The organization of distributed systems is mostly about the software components that constitute the system. Software Architectures  describe the organization and interaction of software components; focuses on logical organization of software (component interaction, etc.) 6/22/2023 By Kelil M. 2
  • 3. Introduction…cont’d System Architectures  describe the placement of software components on physical machines  The realization of an architecture may be centralized (most components located on a single machine), decentralized (most machines have approximately the same functionality), or hybrid (some combination). • i.e., System Architecture can be realized in: Centralized or Decentralized or Hybrid 6/22/2023 By Kelil M. 3
  • 4. Architectural style Architectural style is formulated in terms of components, the way that components are connected to each other, the data exchanged between components, and finally how these elements are jointly configured into a system.  is the logical organization of distributed systems into software components 6/22/2023 By Kelil M. 4
  • 5. Architectural style…cont’d A component is a modular unit with well-defined interfaces that is replaceable and reusable within its environment A connector is a mechanism that mediates communication, coordination, or cooperation among components  e.g., facilities for RPC(remote procedure call), message passing, or streaming data  In other words, a connector allows for the flow of control and data between components. 6/22/2023 By Kelil M. 5
  • 6. Types of Architecture style  The basic idea of architectural style is to organize logically different components, and distribute those components over the various machines. Layered architectures Object-based architectures Data-centered architectures Event-based architectures 6/22/2023 By Kelil M. 6
  • 7. Layered Architecture  Each layer uses previous layer to implement new functionality that is exported to the layer above.  Components are organized in a layered fashion where a component at layer N is allowed to call components at the underlying layer N-1, but not the other way around; e.g., network layers  The advantage of using this approach is that, the calls always follow a predefined path, and that components in each layer can be easily replaced or modified without affecting the entire architecture. 6/22/2023 By Kelil M. 7
  • 8. Layered Architecture… 6/22/2023 By Kelil M. 8 the layered architectural style
  • 9. Object Based Architecture  Each of the components are referred to as objects where each object can interact with other objects through a given connector or interface.  Each objects are connected through a remote procedure call (RPC) mechanism (client-server paradigm)  component = object  connector = RPC or RMI 6/22/2023 By Kelil M. 9
  • 10. Data Centered Architecture  based on a data center, where the primary communication happens via a central data repository.  This common repository can be either active or passive.  this is more like a producer consumer problem.  communication between objects happen through this shared common storage.  This supports different components (or objects) by providing a persistent storage space for those components (such as a MySQL database).  All the information related to the nodes in the system are stored in this persistent storage. 6/22/2023 By Kelil M. 10
  • 12. Event Based Architecture  Components communicate through the propagation of events  When an event is generated, it will be sent to the bus system.  With this, everyone else will be notified telling that such an event has occurred.  So, if anyone is interested, that node can pull the event from the bus and use it.  Sometimes these events could be data, or even URLs to resources.  So the receiver can access whatever the information is given in the event and process accordingly. 6/22/2023 By Kelil M. 12
  • 13. Event Based…cont’d 6/22/2023 By Kelil M. 13 the event-based architectural style
  • 14. Event Based…cont’d  Publish/subscribe approach:  For distributed systems, event propagation is generally associated with what are known as publish/subscribe systems  components (processes) can publish events and subscribe to events  Events are delivered to subscriber once published by publisher  Processes publish events after which the middleware ensures that only subscribed processes will receive them. 6/22/2023 By Kelil M. 14
  • 15. Event Based…cont’d  Decoupled in space:  communicating components need not explicitly refer to each other  Coupled in time:  communicating components must execute at the same time  Event Based architectural style is based on the publisher- subscriber architecture.  Between each node there is no direct communication or coordination.  Instead, objects which are subscribed to the service communicate through the event bus. 6/22/2023 By Kelil M. 15
  • 16. Event Based…cont’d  The event based architecture supports, several communication styles.  Publisher-subscriber  Broadcast  Point-to-Point  Decouples sender & receiver; asynchronous communication  An event can be defined as "a significant change in state".  For example, when a consumer purchases a car, the car's state changes from "for sale" to "sold". A car dealer's system architecture may treat this state change as an event to be produced, published, detected and consumed by various applications within the architecture. 6/22/2023 By Kelil M. 16
  • 17. Event Based…cont’d  The major advantages of event-based architecture is that the Components are decoupled in space - loosely coupled.  They need not explicitly refer to each other.  For example, If we have an alarm system that records information when the front door opens, the door itself doesn't know that the alarm system will add information when the door opens, just that the door has been opened. 6/22/2023 By Kelil M. 17
  • 18. System Architecture  The logical organization of distributed systems into software components or how are components organized in a system  Deciding on software components, their interaction, and their placement leads to an instance of a software architecture, also called a system architecture. 6/22/2023 By Kelil M. 18
  • 19. Centralized Architectures Client Server Architecture  Based on client-server interaction/request-reply behaviour. Server: is a process that implements a service.  example: file system service, database service). Client: is a process that requests a service from a server. 6/22/2023 By Kelil M. 19
  • 20. Cont’d…  Communication between a client and a server can be implemented by means: Simple connectionless protocol Connection oriented protocol. Connectionless protocol:  A client/server communication can be by a connectionless protocol if the underlying network is fairly reliable; efficient since there is no much overhead  But assuring reliability is difficult  the client cannot detect whether the original request message was lost, or that transmission of the reply failed. 6/22/2023 By Kelil M. 20
  • 21. 6/22/2023 By Kelil M. 21 Connection oriented protocol:  A client/server communication can be by connection- oriented protocol if the underlying network is unreliable  Establishing and terminating connections is expensive  Not entirely appropriate in a local-area network due to relatively low performance  Works perfectly fine in wide-area network.  Relatively costly, especially when request/reply messages are small.  Example: TCP/IP connections
  • 22.  The Client /Server architecture has a centralized security database.  This database contains security details like credentials and access details.  Users can't log in to a server, without the security credentials.  So, it makes this architecture a bit more stable and secure than Peer to Peer.  The stability comes where the security database can allow resource usage in a much more meaningful way.  But on the other hand, the system might get slow, as the server only can handle a limited amount of workload at a given time. 6/22/2023 By Kelil M. 22
  • 23. Advantages and Disadvantages of centralized System Architecture Advantages:  Easier to Build and Maintain  Better Security  Stable Disadvantages:  Single point of failure  Less scalable 6/22/2023 By Kelil M. 23
  • 24. Application Layering  No clear distinction between a client and a server; for instance a server for a distributed database may act as a client when it forwards requests to different file servers  Many client‐server applications are organized into three layers: The user-interface level The processing level The data level 6/22/2023 By Kelil M. 24
  • 25. Application Layering …  User‐interface level: contains user interface applications  character based screen (CLI) or graphical window (GUI)  Processing level: contains the core functionality of the application.  Data level: contains the data (database or file system) that a client wants to manipulate through the application.  It is responsible for keeping data consistent across different applications  example: bank case 6/22/2023 By Kelil M. 25
  • 26. 6/22/2023 By Kelil M. 26 Example 1. The general organization of an Internet search engine into three different layers shown on slide #25  Interface: type in a keyword string  Processing level: processes to generate DB queries, rank replies, format response  Data level: database of web pages
  • 27. Internet search engine example.. 6/22/2023 By Kelil M. 27
  • 28. Cont’d... Example 2. Stock broker's decision support system Interface: likely more complex than simple search Processing: programs to analyze data; rely on statistics, AI perhaps, may require large simulations Data level: DB of financial information Example 3. Desktop "office suites" Interface: access to various documents, data, Processing: word processing, database queries, spreadsheets,. Data : file systems and/or databases 6/22/2023 By Kelil M. 28
  • 29. Multi-Tiered Architectures • Single-tiered: dumb terminal/mainframe configuration • Two-tiered: client/single server configuration • Three-tiered: each layer on separate machine Physically Two-Tired architecture 6/22/2023 By Kelil M. 29
  • 30. Cont’d...  The server tier in two-tiered architecture becomes more and more distributed  A single server is no longer adequate for modern information systems  This leads to three-tiered architecture • Server may acting as a client 6/22/2023 By Kelil M. 30
  • 31. Decentralized Architectures Vertical distribution: is achieved by placing logically different components on different machines.  It splits up a server’s functionality over multiple computers  Improves scalability Horizontal distribution: replicates a server’s functionality over multiple computers  Avoids single- point of failure and allows load balancing  Improves scalability and reliability • E.g., replicated web server  Read about the different approaches of peer-to-peer 6/22/2023 By Kelil M. 31 ======= End of Chapter Two ======