Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
BAB 8 1 KARAKTERISASI SISTEM TERDISTRIBUSIScript ini didasarkan pada fungsi yang disediakan oleh Apama [www.progress.com], produk komersial di dunia keuangan awalnya dikembangkan dari penelitian yang dilakukan di Universitas Cambridge. Script mendeteksi urutan sementara kompleks yang didasarkan pada harga saham Microsoft, HP dan keranjang lain harga saham, mengakibatkan keputusan untuk membeli atau menjual saham tertentu. Gaya ini teknologi semakin sering digunakan di bidang keuangan sistem termasuk pemantauan kegiatan untuk mengelola risiko (khususnya, perdagangan Pelacakan eksposur), untuk memastikan kepatuhan terhadap peraturan dan untuk memantau untuk pola kegiatan yang mungkin menunjukkan transaksi penipuan. Pada sistem seperti itu, peristiwa yang biasanya dicegat dan melewati apa setara dengan firewall kepatuhan dan resiko sebelum diproses (Lihat juga diskusi firewall di bagian 1.3.1 di bawah ini). 1.3 tren dalam sistem terdistribusi Sistem terdistribusi sedang mengalami periode perubahan signifikan dan ini dapat ditelusuri kembali ke sejumlah berpengaruh tren: • munculnya teknologi jaringan meresap; • munculnya komputasi mana-mana ditambah dengan keinginan untuk mendukung pengguna mobilitas dalam sistem terdistribusi; • meningkatnya permintaan untuk layanan multimedia; • pandangan sistem terdistribusi sebagai utilitas. 1.3.1 meresap networking dan modern Internet Modern Internet adalah koleksi saling berhubungan jaringan komputer banyak jenis yang berbeda, dengan berbagai jenis meningkat sepanjang waktu dan sekarang termasuk, untuk contoh, berbagai macam teknologi komunikasi nirkabel seperti WiFi, WiMAX, Bluetooth (Lihat Bab 3) dan jaringan ponsel generasi ketiga. Hasil bersih jaringan yang telah menjadi sumber daya yang meresap dan perangkat dapat terhubung (jika diinginkan) pada setiap saat dan di setiap tempat. 1.3 gambar menggambarkan porsi khas Internet. Program yang berjalan pada komputer yang terhubung berinteraksi dengan melewati pesan, mempekerjakan umum alat komunikasi. Desain dan konstruksi mekanisme komunikasi Internet (Internet protokol) adalah prestasi teknis besar, memungkinkan program yang berjalan di mana saja Mengalamatkan pesan ke program di mana saja lain dan abstrak atas berbagai teknologi yang disebutkan di atas. Internet juga merupakan sistem terdistribusi yang sangat besar. Hal ini memungkinkan pengguna, dimanapun mereka yang, untuk menggunakan layanan seperti sebagai World Wide Web, email dan file transfer. (Memang, Web terkadang salah disamakan dengan Internet.) Set Layanan terbuka - itu dapat diperpanjang dengan penambahan komputer server dan jenis baru Layanan. Gambar menunjukkan kumpulan intranet - Subnetwork yang dioperasikan oleh perusahaan dan organisasi lainnya dan biasanya dilindungi oleh firewall. Peran firewall untuk melindungi intranet dengan mencegah pesan yang tidak sah dari meninggalkan atau memasuki. A BAGIAN 1.3 TREN DALAM SISTEM TERDISTRIBUSI 9Gambar 1.3 A khas sebagian dari InternetintranetISPdesktop komputer: Server: link jaringan: Firewall ini dilaksanakan dengan menyaring pesan masuk dan keluar. Penyaringan mungkin dilakukan oleh sumber atau tujuan, atau firewall mungkin membiarkan hanya pesan tersebut terkait Akses email dan web untuk lulus masuk atau keluar dari intranet yang melindungi. Layanan Internet Provider (ISP) adalah perusahaan yang menyediakan link broadband dan jenis lainnya koneksi ke pengguna perorangan dan organisasi kecil, memungkinkan mereka untuk mengakses Layanan di mana saja di Internet serta menyediakan layanan lokal seperti email dan web hosting. Intranet dihubungkan bersama-sama oleh backbones. Backbone adalah link jaringan dengan kapasitas tinggi transmisi, mempekerjakan koneksi satelit, kabel serat optik dan sirkuit bandwidth tinggi lainnya. Note that some organizations may not wish to connect their internal networks to the Internet at all. For example, police and other security and law enforcement agencies are likely to have at least some internal intranets that are isolated from the outside world (the most effective firewall possible - the absence of any physical connections to the Internet). Firewalls can also be problematic in distributed systems by impeding legitimate access to services when resource sharing between internal and external users is required. Hence, firewalls must often be complemented by more fine-grained mechanisms and policies, as discussed in Chapter 11. The implementation of the Internet and the services that it supports has entailed the development of practical solutions to many distributed system issues (including most of those defined in Section 1.5). We shall highlight those solutions throughout the book, pointing out their scope and their limitations where appropriate. 10 CHAPTER 1 CHARACTERIZATION OF DISTRIBUTED SYSTEMS1.3.2 Mobile and ubiquitous computingTechnological advances in device miniaturization and wireless networking have led increasingly to the integration of small and portable computing devices into distributed systems. These devices include: • Laptop computers. • Handheld devices, including mobile phones, smart phones, GPS-enabled devices, pagers, personal digital assistants (PDAs), video cameras and digital cameras. • Wearable devices, such as smart watches with functionality similar to a PDA. • Devices embedded in appliances such as washing machines, hi-fi systems, cars and refrigerators. The portability of many of these devices, together with their ability to connect conveniently to networks in different places, makes mobile computing possible. Mobile computing is the performance of computing tasks while the user is on the move, or visiting places other than their usual environment. In mobile computing, users who are away from their ‘home’ intranet (the intranet at work, or their residence) are still provided with access to resources via the devices they carry with them. They can continue to access the Internet; they can continue to access resources in their home intranet; and there is increasing provision for users to utilize resources such as printers or even sales points that are conveniently nearby as they move around. The latter is also known as location-aware or context-aware computing. Mobility introduces a number of challenges for distributed systems, including the need to deal with variable connectivity and indeed disconnection, and the need to maintain operation in the face of device mobility (see the discussion on mobility transparency in Section 1.5.7). Ubiquitous computing is the harnessing of many small, cheap computational devices that are present in users’ physical environments, including the home, office and even natural settings. The term ‘ubiquitous’ is intended to suggest that small computing devices will eventually become so pervasive in everyday objects that they are scarcely noticed. That is, their computational behaviour will be transparently and intimately tied up with their physical function. The presence of computers everywhere only becomes useful when they can communicate with one another. For example, it may be convenient for users to control their washing machine or their entertainment system from their phone or a ‘universal remote control’ device in the home. Equally, the washing machine could notify the user via a smart badge or phone when the washing is done. Ubiquitous and mobile computing overlap, since the mobile user can in principle benefit from computers that are everywhere. But they are distinct, in general. Ubiquitous computing could benefit users while they remain in a single environment such as the home or a hospital. Similarly, mobile computing has advantages even if it involves only conventional, discrete computers and devices such as laptops and printers. Figure 1.4 shows a user who is visiting a host organization. The figure shows the user’s home intranet and the host intranet at the site that the user is visiting. Both intranets are connected to the rest of the Internet. The user has access to three forms of wireless connection. Their laptop has a means of connecting to the host’s wireless LAN. This network provides coverage of a SECTION 1.3 TRENDS IN DISTRIBUTED SYSTEMS 11 Figure 1.4 Portable and handheld devices in a distributed systemInternetHost intranetWireless LANMobile Home intranetGPS satellite signal phone 3G phone networkPrinter LaptopCamera Host siteFew hundred metres (a floor of a building, say). It connects to the rest of the host intranet via a gateway or access point. The user also has a mobile (cellular) telephone, which is connected to the Internet. The phone gives access to the Web and other Internet services, constrained only by what can be presented on its small display, and may also provide location information via built-in GPS functionality. Finally, the user carries a digital camera, which can communicate over a personal area wireless network (with range up to about 10m) with a device such as a printer. With a suitable system infrastructure, the user can perform some simple tasks in the host site using the devices they carry. While journeying to the host site, the user can fetch the latest stock prices from a web server using the mobile phone and can also use the built-in GPS and route finding software to get directions to the site location. During the meeting with their hosts, the user can show them a recent photograph by sending it from the digital camera directly to a suitably enabled (local) printer or projector in the Ruang Meeting (ditemukan menggunakan Layanan lokasi). Hal ini memerlukan hanya link nirkabel antara kamera dan printer atau proyektor. Dan mereka dapat pada prinsipnya mengirim dokumen dari laptop mereka untuk printer yang sama, memanfaatkan LAN nirkabel dan kabel Ethern
Sedang diterjemahkan, harap tunggu..