StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Distributed Software Control: A Distributed Computer System - Report Example

Cite this document
Summary
This report "Distributed Software Control: A Distributed Computer System" presents cloud computing as a Remote Procedure Call by offering advantages relating to time and cost. The concept of cloud computing is used in time-sharing, physical computer networking to offer access to services…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful

Extract of sample "Distributed Software Control: A Distributed Computer System"

Application of distributed software control a distributed computer system Name University Lecturer Course Date Abstract Remote Procedure Call as powerful distributed software control is client/server/client based programs. It is an establishment of an abstract version of operating system, a storage device, a server or network resources. Remote Procedure Call utilizes software to enable part of hardware to run several operating systems concurrently. This has assisted in saving their processing clients input. Storage is the puddlling together of physical storage from several network storage devices into what looks like a single storage device which is controlled from a central console. It is mainly applied in storage area networks. This paper will examine Remote Procedure Call Distributed Computer System, its mechanism and related systems. It will provide a background on distributed computer system and describe its features (characteristics, deployment models, and approaches to Remote Procedure Call). It will also touch on data presentation systems in the Remote Procedure Call and source code compilation. There will be a discussion on the protocol compiler, and examine stubs used in computing. It will finish by providing a conclusion to the contents. Table of Contents Abstract 2 Introduction 4 Remote Procedure Call as Distributed Computer System 5 Mechanism of remote procedure call 6 The development of Remote Procedure Call software 8 Client application 11 Changing Local Procedures into Remote Procedures 11 Assurance Considerations in Cloud Computing 12 Conclusion 13 References 14 Introduction Distributed computer system is where the data is processed by more than one server/computer. A transaction begins in one computer and it is processed by clients’ server before it is send to the remote server for further processing and later it is send back to clients’ server. The processing of a transaction may not be taking place the same time in each processor but it is done in sequence. In distributed computing, Client/server which is a computing system that assists the client make requests from the remote servers using a network for processing. This system improves the processing of clients requests and it is user friendly. Client/server is cost effective, faster; use available infrastructure, as well as, the bandwidth for accommodation of businesses needs for applications, storage, and high speed access. They also provide increased flexibility and scalability for changing IT needs as compared to centralized In Remote Procedure Call client server (software) will send a message to software that is a server, for performance of some task. In Remote Procedure Call, client is the system that requests for services while remote server is processor of the message to provide a reply. The transaction begins by the client sending a request for some tasks to be processed by the remote server. This request is first validated by the user interface of client software and then it is sending in network friendly format to remote server. This remote server completes the request by carrying out the requested tasks requested. This implies that Server software has responsibility of processing the received requests by retrieval, updating the database, ensure that data integrity is maintained and send response. The server software has the ability to process complex transactions and can operate on another machine within the network. Client/server system has remote computing recourses that enable it perform its tasks. It has also a server and user that interact to make communication easier. It is also salable. Remote Procedure Call as Distributed Computer System The Remote Procedure Calls is distributed computer system that uses network applications to communicate and execute its tasks. It is a powerful a powerful distributed system which has client and server software. It expands local procedure calling in that the calling procedure is existence virtually. This relieves the application environment of the restrictions of hosting network, storage and computing hardware. This decoupling implies partitioning each device into many devices, merging several physical devices into one reasonable pool or both at a go. Remote Procedure Calls (RPC) ensures that applications on a network interact with both local and remote servers by use of specialized procedure calls that does not show how networking system operates but completes the transaction. This is made possible during the development of distributed computer system by having same semantics of a remote call regardless of the location of processing server and client. In this case network avails capabilities, which are accessed through mechanisms that are standard and promote the application by heterogeneous thick and thin client platforms. It also pools computing resources to serve to enable multitenant model with different physical and virtual resources. The location is independent and client cannot ascertain the exact location of the resources other than at a higher level of abstraction. Resource examples include network bandwidth, and storage. Cloud computing systems control and optimize the use of resources automatically through leveraging a metering mechanism at an abstraction appropriate to the service type. Usage of resources can be controlled, monitored, and reported for transparency provision for both the customer and the provider of the service. Mechanism of remote procedure call In Remote procedure call, cloud computing allows the client to make calls using local stub which calls the operating system network to enable the connect to remote site where a reply is received after thee client is accepts the message. In this case the software is hosted on a remote server and accessed through the Internet by clients making procedural call. The functioning of the application does not depend on the client’s system’s architecture and it works mainly on server components that are usually outside the user’s network. The server is owned and managed by the firm that has sold the application to the client. An example is the free email services that we use daily like GMAIL, Yahoo mail etc. these programs perfectly fit the definition of a remote procedure call. It means that they have a vendor hosting the service like Google or Yahoo, the logic and data are stored in a central location and end users can use the data and the software, in this case the mails are the data and the email application like for example GMAIL is the software. This simple application can later be plugged into a wide range of software applications for use by businesses or end-users. Remote Procedure Call software use the network or the Internet to modify, expand and to grow. In fact Remote Procedure Call is one form of a clouding computing service. In cloud computing/Remote Procedure Call, most of the programs reside and run on servers that are part of a server ‘farm’ and they execute tasks based on requests made over a network by using a web browser that runs JavaScript programs. The diagram shows how remote procedure call is done. A remote procedural call works a similar way as a normal call where a client makes a call which is received by the server. When a client makes a call through client stud the message is marshalled or converted into network compliance package which can be transferred. This message is sent to remote system as shown in the diagram above. However as shown in the diagram a call is made in a single or many arguments which are taken to the client’s stub and the arguments are converted/marshalled into network compliance in readiness for transmission. The client’s stud calls the operating system to enable it to connect to remote sight then the massage is sent. Once the massage is sent to the remote sight, the system waits for a reply. The remote site which is in the form of server stub will processes the message after receiving it by changing the arguments into machine compliance for the massage to be received. Then the server stub consults local procedure calls to pass the arguments that have been received for processing or executing a reply. The server processes the massage and when it is through with the processing sends it to server stub for conversion into network compliance and sending it the client stub. Once it has been received by the client’s stub, it is read and taken to the client server or client calls function. It is interesting to note that translation takes place twice in the client’s stub that is converting the massage to network compliance before sending and converting the reply into machine acceptance massage. The development of Remote Procedure Call software In developing a distributed system for a RPC one needs to consider the development of server programs that will execute requests, client software that will send requests and protocol for server/client interaction. These programs are usually complied individually to eliminate errors. Protocol Compiler In developing and running an error free protocol, Visual studio 2010 will provide a direct and simple venue to write RPC (distributed) applications. It allows a programmer to debug the main features of their source codes separately. Visual studio 2010 compiler will accept remote application in C++ a language which produces a server skeleton, client and filter routines as well as outputs. Server skeleton does not show the network procedures to be used by clients to execute the requests while client stubs has an interface with library. Visual studio 2010 enables the compilation of server, client and system source codes. This requires. A programmer writes server procedures and links them with server skeleton in Visual studio 2010 to have an executable server application. In order for one to use a remote application there is preparation of an application for local procedure calls to the client stubs produced which will assist stubs generate an executable application. The end result will have a header file with definitions, routines for each header file, server and clients stub applications and time-out for servers. The Codes for Server and Client software will be Client application Changing Local Procedures into Remote Procedures When writing an application it is done in one machine but it has to be converted to run in a network. The program is written and test using the local system and then it is structured to have an extension Call repgen with the –a and –C options. Then it is modified to hhave _client.c and _server.c which are compiled and run. Assurance Considerations in Cloud Computing The nature of services that cloud computing provides has numerous challenges to assurance providers. In order for the assurance provider to provide users with trust in the infrastructure and software services in the cloud, he/she should address the following key assurance issues. Transparency – providers of cloud computing should demonstrate the set up of security controls that assure customers on security of their information from destruction, change, and/or unauthorized access. The key considerations to help in deciding are: the level of transparency, whether transparency will aid malefactors, and what should be transparent. Supplier transparency is critical in areas like the employees of the provider who have access to customer’s information, segregation of different customer’s information, and the controls that are set to detect, prevent and/or react to breaches. Privacy–concerns of privacy are increasing worldwide; thus, it is imperative for cloud computing providers to prove to potential and current customers that privacy controls are set, and demonstrate the ability of detecting, preventing and reacting to breaches at the shortest time possible. Reporting and information lines of communication have to be set up before the commencement of service provision, and they should be tested periodically (Gordon et al., 2010). Compliance–it is necessary for organizations to comply with regulations, laws, and standards. Concerns are that data storage might not be in one place; hence retrieval is not easy. It is important to make sure that if authorities demand data, the provision will not compromise other information. Audits completed by regulatory, legal, or standard authorities themselves indicate that overreach of seizures is plenty. The use of cloud computing does not guarantee a business that it will obtain its information when needed with some providers reserving the right of withholding information from authorities. Trans-border information flow–the physical location of information in the cloud can be an issue because it dictates jurisdiction, as well as, a legal obligation. Laws governing personal information vary from one country to another. One can allow what is a violation in another. Certification–it is necessary for providers of cloud computing service to assure customers that they are doing the required things. Independent assurance from audits by third-party is essential in an assurance program (Gordon et al., 2010). Conclusion Cloud computing is Remote Procedure Call by offering advantages relating to time and cost. The concept of cloud computing is used in time-sharing, physical computer networking to offer access to services. The characteristics of cloud computing include on-demand self-service, and measured value, among others. Cloud computing service models include Infrastructure as a service, platform as a service, and software as a service. Deployment models include private cloud, public cloud, community cloud, and hybrid cloud. Benefits of cloud computing are cost containment and reduction, immediacy, availability, scalability, efficiency, and resiliency. Risks associated with cloud computing include failure of the provider to offer services at agreed performance levels, and delays in retrieval of information due to the dynamic nature of cloud computing, among other risks. Assurance considerations for cloud computing are transparency, privacy, compliance, trans-border information flow, and certification. References Babar, M A., 2012.Cloud Computing Service and Deployment Models. University of Copenhagen Buchanan, 2000. Distributed Systems and Networks. New York: McGraw Hill Conway, G., 2011. Introduction to Cloud Computing, White Paper. Innovation Value Institute Couloris, D. & Kindberg, A. W., 2005. Distributed Systems: Concepts and Designs, ISBN 0321263545 Engates, J., 2012. Small Business Harness the Power of Cloud Computing. , Available online from (accessed on 7th January 2014) Etro, F., 2009.The Economic Impact of Cloud Computing on Business Creation, Employment, and Output in Europe, Forthcoming on Review of Business and Economics.Bicocca, University of Milan Gordon J., Hayashi C., Elron D., Huang L., & Neill R., 2010. Exploring the Future of Cloud Computing: Riding the Next Wave of Technology-Driven Transformation, The World Economic Forum Report. Geneva, Switzerland, The World Economic Forum Kang C. (n.d.). A Distributed Storage Schema for Cloud Computing Based Raster GIS Systems. Geography Department, Clark University Li, M & Baker, M, 2005. The Grid Core Technologies.New York: Wiley ISBN 13-978-0-470-09417-4 Mell P. & Grance T., 2011.The NIST Definition of Cloud Computing, NIST Special Publication 800-145. Gaithersburg, National Institute of Standards and Technology O’Gara M., Geelan J., Gourley B., O’Connor G., & McMillan L. 2009. .Introduction to Cloud Computing. SYS-CON Media, Inc. Smyth P., 2009. Cloud Computing: A Strategy Guide for Board Level Executives.Kinetix technology group Tanenbaum, A.S, 2003. Computer Networks. New York: Prentice Hall Tanenbaum A.S & Steen, V., 2006. Distributed Systems, Principles and Paradigms Boston: Prentice Hall Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Distributed Software Control: A Distributed Computer System Report, n.d.)
Distributed Software Control: A Distributed Computer System Report. https://studentshare.org/logic-programming/2051317-software-in-a-distributed-computing-environment
(Distributed Software Control: A Distributed Computer System Report)
Distributed Software Control: A Distributed Computer System Report. https://studentshare.org/logic-programming/2051317-software-in-a-distributed-computing-environment.
“Distributed Software Control: A Distributed Computer System Report”. https://studentshare.org/logic-programming/2051317-software-in-a-distributed-computing-environment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Distributed Software Control: A Distributed Computer System

XIS13-6: Grid Services and Distributed Networking

his next generation virtual system is intended to be self-managing, self-repairing, fault tolerant and scalable system.... These goals plan to achieve through an extension of Decision Support system (DSS) that is to enable the middle ware to real time analyze the gathered information and to control the information providing resources /sensors.... Hence Grid services can be applied for an anomaly detection system too.... Present-day powerful computer and high-speed network technology with sophisticated software has dramatically changed the way in which modem computing, scientific research and resource shearing is done....
5 Pages (1250 words) Essay

What is the operating system

It is a fundamental component in a computer system's system software.... It is a fundamental component in a computer system's system software.... The operating system is the software that, essentially, takes care of all programs that run on a computer.... In order to function, application programs will normally need an operating Operating Systems An operating system, or the OS, is the most fundamental and important software used to run a computer....
2 Pages (500 words) Essay

An Ethical Approach towards Developing the Student Workload Project

The student workload tracker project was aimed at developing a computer system.... The student workload tracker project was aimed at developing a computer system that would enhance the scheduling process of student's assignments in school.... The ethical issues may also involve the role of the developer of the system concerning the objective of the information technology system.... As the paper outlines, the ethical issues may also involve the role of the developer of the system concerning the objective of the information technology system....
10 Pages (2500 words) Essay

An Ethical Approach towards Developing the Student Workload Tracker Project

The student workload tracker project was aimed at developing a computer system that would enhance the scheduling process of student's assignments in school.... hellip; Software reliability monitoring is essential since vulnerabilities in the software's codes may completely alter the performance of the system.... Moreover, the ethical issues may also involve the role of the developer of the system concerning the objective of the information technology system....
9 Pages (2250 words) Essay

The Management of Distributed Projects

The main idea of this paper under the title "The Management of distributed Projects" touches upon the sources of information we use in our organizations that are well distributed globally, a bigger base for the information they know about the market.... nbsp; The first factor is employing proper communication tools to be used by the globally distributed worker teams.... Commitment among the members is another key factor that determines the trust that globally distributed worker teams will have on each other....
9 Pages (2250 words) Assignment

Distributed Software Development

distributed software stresses the correlation between qualities of services to the society and quality processes.... distributed software ensures that the needs of the customers get matching responses from different organization (Galvina & Nsmite, 2011, p.... distributed software development though complex; offers solutions to emerging challenges in the world (Jaakkola, 2009, p.... Global software distribution ensures that physical border obstacles are reduced and there is enhanced team work....
4 Pages (1000 words) Essay

The Connection Between the Internet and Distributed Application Services

Every computer within the cluster often operates as a complete unit and not as a tightly coupled multiprocessing system.... nbsp;… The term cluster is used in computer technology to refer to a group of loosely coupled computers that are configured to work as a unit.... The main advantages of clustering include increasing the computing power of computers by combining the individual power of each computer.... Notably, a computer has the power to process data independently (Englander, 2003)....
5 Pages (1250 words) Essay

Operating Systems - Types and Destination

Operating System plays a significant role in the computer system since, without them, the computer will not run.... The paper "Operating Systems - Types and Destination" explains that for a computer to run, it requires an operating system, and thus system developers like IBM, Microsoft, Google, and Apple have to come up with new versions of operating systems that meet the consumer requirements and low price.... hellip; Operating system (OS) is software that is used in computers to manage the hardware and the software so that they can work interactively without causing a halt to the computer....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us