8 CHAPTER 1 CHARACTERIZATION OF DISTRIBUTED SYSTEMSThis script is base terjemahan - 8 CHAPTER 1 CHARACTERIZATION OF DISTRIBUTED SYSTEMSThis script is base Bahasa Indonesia Bagaimana mengatakan

8 CHAPTER 1 CHARACTERIZATION OF DIS

8 CHAPTER 1 CHARACTERIZATION OF DISTRIBUTED SYSTEMS

This script is based on the functionality provided by Apama [www.progress.com], a
commercial product in the financial world originally developed out of research carried out at the University of Cambridge. The script detects a complex temporal sequence based on the share prices of Microsoft, HP and a basket of other share prices, resulting in decisions to buy or sell particular shares.
This style of technology is increasingly being used in other areas of financial
systems including the monitoring of trading activity to manage risk (in particular,
tracking exposure), to ensure compliance with regulations and to monitor for patterns of
activity that might indicate fraudulent transactions. In such systems, events are typically
intercepted and passed through what is equivalent to a compliance and risk firewall
before being processed (see also the discussion of firewalls in Section 1.3.1 below).

1.3 Trends in distributed systems

Distributed systems are undergoing a period of significant change and this can be traced back to a number of influential trends:
• the emergence of pervasive networking technology;
• the emergence of ubiquitous computing coupled with the desire to support user
mobility in distributed systems;
• the increasing demand for multimedia services;
• the view of distributed systems as a utility.

1.3.1 Pervasive networking and the modern Internet
The modern Internet is a vast interconnected collection of computer networks of many
different types, with the range of types increasing all the time and now including, for
example, a wide range of wireless communication technologies such as WiFi, WiMAX,
Bluetooth (see Chapter 3) and third-generation mobile phone networks. The net result is
that networking has become a pervasive resource and devices can be connected (if
desired) at any time and in any place.
Figure 1.3 illustrates a typical portion of the Internet. Programs running on the computers connected to it interact by passing messages, employing a common means of communication. The design and construction of the Internet communication mechanisms (the Internet protocols) is a major technical achievement, enabling a program running anywhere to address messages to programs anywhere else and abstracting over the myriad of technologies mentioned above.
The Internet is also a very large distributed system. It enables users, wherever they
are, to make use of services such as the World Wide Web, email and file transfer.
(Indeed, the Web is sometimes incorrectly equated with the Internet.) The set of services
is open-ended - it can be extended by the addition of server computers and new types of
service. The figure shows a collection of intranets - subnetworks operated by companies
and other organizations and typically protected by firewalls. The role of a firewall is to
protect an intranet by preventing unauthorized messages from leaving or entering. A

SECTION 1.3 TRENDS IN DISTRIBUTED SYSTEMS 9

Figure 1.3 A typical portion of the Internet




intranet
ISP








desktop computer:
server:
network link:





firewall is implemented by filtering incoming and outgoing messages. Filtering might
be done by source or destination, or a firewall might allow only those messages related
to email and web access to pass into or out of the intranet that it protects. Internet Service
Providers (ISPs) are companies that provide broadband links and other types of
connection to individual users and small organizations, enabling them to access services
anywhere in the Internet as well as providing local services such as email and web
hosting. The intranets are linked together by backbones. A backbone is a network link
with a high transmission capacity, employing satellite connections, fibre optic cables
and other high-bandwidth circuits.
Note that some organizations may not wish to connect their internal networks to the Internet at all. For example, police and other security and law enforcement agencies are likely to have at least some internal intranets that are isolated from the outside world (the most effective firewall possible - the absence of any physical connections to the Internet). Firewalls can also be problematic in distributed systems by impeding legitimate access to services when resource sharing between internal and external users is required. Hence, firewalls must often be complemented by more fine-grained mechanisms and policies, as discussed in Chapter 11.
The implementation of the Internet and the services that it supports has entailed the development of practical solutions to many distributed system issues (including most of those defined in Section 1.5). We shall highlight those solutions throughout the book, pointing out their scope and their limitations where appropriate.

10 CHAPTER 1 CHARACTERIZATION OF DISTRIBUTED SYSTEMS

1.3.2 Mobile and ubiquitous computing
Technological advances in device miniaturization and wireless networking have led increasingly to the integration of small and portable computing devices into distributed systems. These devices include:
• Laptop computers.
• Handheld devices, including mobile phones, smart phones, GPS-enabled devices,
pagers, personal digital assistants (PDAs), video cameras and digital cameras.
• Wearable devices, such as smart watches with functionality similar to a PDA.
• Devices embedded in appliances such as washing machines, hi-fi systems, cars
and refrigerators.
The portability of many of these devices, together with their ability to connect
conveniently to networks in different places, makes mobile computing possible. Mobile
computing is the performance of computing tasks while the user is on the move, or
visiting places other than their usual environment. In mobile computing, users who are
away from their ‘home’ intranet (the intranet at work, or their residence) are still
provided with access to resources via the devices they carry with them. They can
continue to access the Internet; they can continue to access resources in their home
intranet; and there is increasing provision for users to utilize resources such as printers
or even sales points that are conveniently nearby as they move around. The latter is also
known as location-aware or context-aware computing. Mobility introduces a number of
challenges for distributed systems, including the need to deal with variable connectivity
and indeed disconnection, and the need to maintain operation in the face of device
mobility (see the discussion on mobility transparency in Section 1.5.7).
Ubiquitous computing is the harnessing of many small, cheap computational
devices that are present in users’ physical environments, including the home, office and
even natural settings. The term ‘ubiquitous’ is intended to suggest that small computing
devices will eventually become so pervasive in everyday objects that they are scarcely
noticed. That is, their computational behaviour will be transparently and intimately tied
up with their physical function.
The presence of computers everywhere only becomes useful when they can communicate with one another. For example, it may be convenient for users to control their washing machine or their entertainment system from their phone or a ‘universal remote control’ device in the home. Equally, the washing machine could notify the user via a smart badge or phone when the washing is done.
Ubiquitous and mobile computing overlap, since the mobile user can in principle
benefit from computers that are everywhere. But they are distinct, in general. Ubiquitous
computing could benefit users while they remain in a single environment such as the
home or a hospital. Similarly, mobile computing has advantages even if it involves only
conventional, discrete computers and devices such as laptops and printers.
Figure 1.4 shows a user who is visiting a host organization. The figure shows the user’s home intranet and the host intranet at the site that the user is visiting. Both intranets are connected to the rest of the Internet.
The user has access to three forms of wireless connection. Their laptop has a
means of connecting to the host’s wireless LAN. This network provides coverage of a

SECTION 1.3 TRENDS IN DISTRIBUTED SYSTEMS 11


Figure 1.4 Portable and handheld devices in a distributed system



Internet




Host intranet
Wireless LAN


Mobile













Home intranet


GPS satellite signal

phone 3G phone network
Printer Laptop
Camera Host site



Few hundred metres (a floor of a building, say). It connects to the rest of the host intranet via a gateway or access point. The user also has a mobile (cellular) telephone, which is connected to the Internet. The phone gives access to the Web and other Internet services, constrained only by what can be presented on its small display, and may also provide location information via built-in GPS functionality. Finally, the user carries a digital camera, which can communicate over a personal area wireless network (with range up to about 10m) with a device such as a printer.
With a suitable system infrastructure, the user can perform some simple tasks in
the host site using the devices they carry. While journeying to the host site, the user can
fetch the latest stock prices from a web server using the mobile phone and can also use
the built-in GPS and route finding software to get directions to the site location. During
the meeting with their hosts, the user can show them a recent photograph by sending it
from the digital camera directly to a suitably enabled (local) printer or projector in the
meeting room (discovered using a location service). This requires only the wireless link
between the camera and printer or projector. And they can in principle send a document
from their laptop to the same printer, utilizing the wireless LAN and wired Ethern
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
BAB 8 1 KARAKTERISASI SISTEM TERDISTRIBUSIScript ini didasarkan pada fungsi yang disediakan oleh Apama [www.progress.com], produk komersial di dunia keuangan awalnya dikembangkan dari penelitian yang dilakukan di Universitas Cambridge. Script mendeteksi urutan sementara kompleks yang didasarkan pada harga saham Microsoft, HP dan keranjang lain harga saham, mengakibatkan keputusan untuk membeli atau menjual saham tertentu. Gaya ini teknologi semakin sering digunakan di bidang keuangan sistem termasuk pemantauan kegiatan untuk mengelola risiko (khususnya, perdagangan Pelacakan eksposur), untuk memastikan kepatuhan terhadap peraturan dan untuk memantau untuk pola kegiatan yang mungkin menunjukkan transaksi penipuan. Pada sistem seperti itu, peristiwa yang biasanya dicegat dan melewati apa setara dengan firewall kepatuhan dan resiko sebelum diproses (Lihat juga diskusi firewall di bagian 1.3.1 di bawah ini). 1.3 tren dalam sistem terdistribusi Sistem terdistribusi sedang mengalami periode perubahan signifikan dan ini dapat ditelusuri kembali ke sejumlah berpengaruh tren: • munculnya teknologi jaringan meresap; • munculnya komputasi mana-mana ditambah dengan keinginan untuk mendukung pengguna mobilitas dalam sistem terdistribusi; • meningkatnya permintaan untuk layanan multimedia; • pandangan sistem terdistribusi sebagai utilitas. 1.3.1 meresap networking dan modern Internet Modern Internet adalah koleksi saling berhubungan jaringan komputer banyak jenis yang berbeda, dengan berbagai jenis meningkat sepanjang waktu dan sekarang termasuk, untuk contoh, berbagai macam teknologi komunikasi nirkabel seperti WiFi, WiMAX, Bluetooth (Lihat Bab 3) dan jaringan ponsel generasi ketiga. Hasil bersih jaringan yang telah menjadi sumber daya yang meresap dan perangkat dapat terhubung (jika diinginkan) pada setiap saat dan di setiap tempat. 1.3 gambar menggambarkan porsi khas Internet. Program yang berjalan pada komputer yang terhubung berinteraksi dengan melewati pesan, mempekerjakan umum alat komunikasi. Desain dan konstruksi mekanisme komunikasi Internet (Internet protokol) adalah prestasi teknis besar, memungkinkan program yang berjalan di mana saja Mengalamatkan pesan ke program di mana saja lain dan abstrak atas berbagai teknologi yang disebutkan di atas. Internet juga merupakan sistem terdistribusi yang sangat besar. Hal ini memungkinkan pengguna, dimanapun mereka yang, untuk menggunakan layanan seperti sebagai World Wide Web, email dan file transfer. (Memang, Web terkadang salah disamakan dengan Internet.) Set Layanan terbuka - itu dapat diperpanjang dengan penambahan komputer server dan jenis baru Layanan. Gambar menunjukkan kumpulan intranet - Subnetwork yang dioperasikan oleh perusahaan dan organisasi lainnya dan biasanya dilindungi oleh firewall. Peran firewall untuk melindungi intranet dengan mencegah pesan yang tidak sah dari meninggalkan atau memasuki. A BAGIAN 1.3 TREN DALAM SISTEM TERDISTRIBUSI 9Gambar 1.3 A khas sebagian dari InternetintranetISPdesktop komputer: Server: link jaringan: Firewall ini dilaksanakan dengan menyaring pesan masuk dan keluar. Penyaringan mungkin dilakukan oleh sumber atau tujuan, atau firewall mungkin membiarkan hanya pesan tersebut terkait Akses email dan web untuk lulus masuk atau keluar dari intranet yang melindungi. Layanan Internet Provider (ISP) adalah perusahaan yang menyediakan link broadband dan jenis lainnya koneksi ke pengguna perorangan dan organisasi kecil, memungkinkan mereka untuk mengakses Layanan di mana saja di Internet serta menyediakan layanan lokal seperti email dan web hosting. Intranet dihubungkan bersama-sama oleh backbones. Backbone adalah link jaringan dengan kapasitas tinggi transmisi, mempekerjakan koneksi satelit, kabel serat optik dan sirkuit bandwidth tinggi lainnya. Note that some organizations may not wish to connect their internal networks to the Internet at all. For example, police and other security and law enforcement agencies are likely to have at least some internal intranets that are isolated from the outside world (the most effective firewall possible - the absence of any physical connections to the Internet). Firewalls can also be problematic in distributed systems by impeding legitimate access to services when resource sharing between internal and external users is required. Hence, firewalls must often be complemented by more fine-grained mechanisms and policies, as discussed in Chapter 11. The implementation of the Internet and the services that it supports has entailed the development of practical solutions to many distributed system issues (including most of those defined in Section 1.5). We shall highlight those solutions throughout the book, pointing out their scope and their limitations where appropriate. 10 CHAPTER 1 CHARACTERIZATION OF DISTRIBUTED SYSTEMS1.3.2 Mobile and ubiquitous computingTechnological advances in device miniaturization and wireless networking have led increasingly to the integration of small and portable computing devices into distributed systems. These devices include: • Laptop computers. • Handheld devices, including mobile phones, smart phones, GPS-enabled devices, pagers, personal digital assistants (PDAs), video cameras and digital cameras. • Wearable devices, such as smart watches with functionality similar to a PDA. • Devices embedded in appliances such as washing machines, hi-fi systems, cars and refrigerators. The portability of many of these devices, together with their ability to connect conveniently to networks in different places, makes mobile computing possible. Mobile computing is the performance of computing tasks while the user is on the move, or visiting places other than their usual environment. In mobile computing, users who are away from their ‘home’ intranet (the intranet at work, or their residence) are still provided with access to resources via the devices they carry with them. They can continue to access the Internet; they can continue to access resources in their home intranet; and there is increasing provision for users to utilize resources such as printers or even sales points that are conveniently nearby as they move around. The latter is also known as location-aware or context-aware computing. Mobility introduces a number of challenges for distributed systems, including the need to deal with variable connectivity and indeed disconnection, and the need to maintain operation in the face of device mobility (see the discussion on mobility transparency in Section 1.5.7). Ubiquitous computing is the harnessing of many small, cheap computational devices that are present in users’ physical environments, including the home, office and even natural settings. The term ‘ubiquitous’ is intended to suggest that small computing devices will eventually become so pervasive in everyday objects that they are scarcely noticed. That is, their computational behaviour will be transparently and intimately tied up with their physical function. The presence of computers everywhere only becomes useful when they can communicate with one another. For example, it may be convenient for users to control their washing machine or their entertainment system from their phone or a ‘universal remote control’ device in the home. Equally, the washing machine could notify the user via a smart badge or phone when the washing is done. Ubiquitous and mobile computing overlap, since the mobile user can in principle benefit from computers that are everywhere. But they are distinct, in general. Ubiquitous computing could benefit users while they remain in a single environment such as the home or a hospital. Similarly, mobile computing has advantages even if it involves only conventional, discrete computers and devices such as laptops and printers. Figure 1.4 shows a user who is visiting a host organization. The figure shows the user’s home intranet and the host intranet at the site that the user is visiting. Both intranets are connected to the rest of the Internet. The user has access to three forms of wireless connection. Their laptop has a means of connecting to the host’s wireless LAN. This network provides coverage of a SECTION 1.3 TRENDS IN DISTRIBUTED SYSTEMS 11 Figure 1.4 Portable and handheld devices in a distributed systemInternetHost intranetWireless LANMobile Home intranetGPS satellite signal phone 3G phone networkPrinter LaptopCamera Host siteFew hundred metres (a floor of a building, say). It connects to the rest of the host intranet via a gateway or access point. The user also has a mobile (cellular) telephone, which is connected to the Internet. The phone gives access to the Web and other Internet services, constrained only by what can be presented on its small display, and may also provide location information via built-in GPS functionality. Finally, the user carries a digital camera, which can communicate over a personal area wireless network (with range up to about 10m) with a device such as a printer. With a suitable system infrastructure, the user can perform some simple tasks in the host site using the devices they carry. While journeying to the host site, the user can fetch the latest stock prices from a web server using the mobile phone and can also use the built-in GPS and route finding software to get directions to the site location. During the meeting with their hosts, the user can show them a recent photograph by sending it from the digital camera directly to a suitably enabled (local) printer or projector in the Ruang Meeting (ditemukan menggunakan Layanan lokasi). Hal ini memerlukan hanya link nirkabel antara kamera dan printer atau proyektor. Dan mereka dapat pada prinsipnya mengirim dokumen dari laptop mereka untuk printer yang sama, memanfaatkan LAN nirkabel dan kabel Ethern
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2024 I Love Translation. All reserved.

E-mail: