lect-01 - Computer Science 425 Distributed Systems Lecture...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
2006, 2007 M. T. Harandi Lecture 1-1 Computer Science 425 Distributed Systems Lecture 1 Introduction & Overview
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2006, 2007 M. T. Harandi Lecture 1-2 A Distributed System is: a collection of independent computers that appear to the users as a single computer Andrew Tannenbaum Many components Connected via a network Sharing resources What is a Distributed System?
Background image of page 2
2006, 2007 M. T. Harandi Lecture 1-3 intranet ISP desktop computer: backbone satellite link server: network link: Distributed System Example -- the Internet
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2006, 2007 M. T. Harandi Lecture 1-4 The Internet A vast interconnected collection of computer networks of many types. Intranets – subnetworks operated by companies and organizations. ISPs – companies that provide modem links and other types of connections to users. Intranets are linked by backbones – network links of large bandwidth, such as satellite connections, fiber optic cables, and other high-bandwidth circuits.
Background image of page 4
2006, 2007 M. T. Harandi Lecture 1-5 A Typical Intranet the rest of email server Web server Desktop computers File server router/firewall print and other servers other servers print Local area network email server the Internet
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2006, 2007 M. T. Harandi Lecture 1-6 Intranets Composed of several local area networks (LANs) linked by backbone connections. Connected to the Internet via a router. A firewall is used to protect an intranet by preventing unauthorized message leaving/entering, and is implemented by filtering incoming and outgoing messages.
Background image of page 6
2006, 2007 M. T. Harandi Lecture 1-7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 16

lect-01 - Computer Science 425 Distributed Systems Lecture...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online