StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Distributed Systems - Essay Example

Cite this document
Summary
This paper 'Distributed Systems' tells us that the term web 2.0 has demonstrated its popularity with over 9.5 million citations in Google. It is defined as “Web 2.0 is the business revolution in the computer industry caused by the move to the internet as a platform, and any attempt to understand the rules for success…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Distributed Systems
Read Text Preview

Extract of sample "Distributed Systems"

?Web 2.0 The term web 2.0 has demonstrated its rich features and popularity with over 9.5 million citations in Google. It is defined as “Web 2.0 is the business revolution in the computer industry caused by the move to the internet as platform, and an attempt to understand the rules for success on that new platform. Chief among those rules is this: Build applications that harness network effects to get better the more people use them” (Pang 2009). Unfortunately, there is still no exact definition available for this technology. In order to understand the concept of Web 2.0, one needs to be an information technology expert. The innovative web 2.0 has aid users to explore Internet in different ways. Similarly, this comes with the idea of collaboration and communication with users, people and organizations of analogous interest (Wang, Ching-Huang Wang et al. 2010). Moreover, many people discuss Web 2.0 by indicating YouTube, face book, twitter etc. These websites support features of Web2.0, as is composed of Rich Internet Application (RIA), Ajax, flash, web services, Service Oriented Architecture (SOA), iterative language and social web. The technologies associated with RIA are AJAX, Java FX, Microsoft Silverlight and Flex.The idea is to integrate desktop computing experience to the browser by integrating more than one application on the web browser. On the other hand, another key component called as SOA provides a flexible platform for Tesco to add new services. For instance, Tesco is one of the popular chains of stores in the UK. The variety of products is continuously increasing along with added functionality and services for the customer, SOA provides room to add new products and services. The primary objective of SOA is to add services as the business expands. Furthermore, Web 2.0 has introduced new social networking websites including improved interactions with employees, customers, suppliers etc. Web 2.0 shares significant contribution to core applications, transforming them to be more effective. Likewise, it has also laid a path for next generation technologies to be extremely efficient in overall procurement and strategic sales models. Tesco can adapt next generation technologies to contribute towards customer loyalty and competitive advantage with the aid of Web 2.0. Moreover, semantic tagging technologies enhance the flow of internal and external information overload that consequently increases information oriented product utilization. Furthermore, Web 2.0 technology is utilized for taking feedback of a new software or product. This will enable developers of Tesco, to minimize the product development phase along with aiming valuable marketing resources. Likewise, aiming bloggers and other prominent web users can contribute to organize representation for Tesco and spread positive intent in the public (, Seven Core Benefits of Web 2.0 for Traditional Industries). Implementing Web 2.0 to interactive e-learning systems augment learner-centric interactivity and communication, between participants in web-based learning. Moreover, Web 2.0 enables the instructors to achieve easily, the idea of enthusiastic ‘constructivism’ as promoted by researchers in the last two decades. The main idea related to ‘constructivism’ highlights the development of better and efficient learning environments for students, instructors, knowledge creation, and co-construction (Yueh-Min Huang, Yang et al. 2009). Furthermore, Web2.0 facilitates classroom-learning environments. Moreover, web 2.0 has introduced new ways to spread online business along with its global reach to the audience. However, the core components including API’s and ‘widgets’ along with a layer of complex processes are required to develop an online business. Those businesses who are able to master these components gain a competitive advantage. Previously, the basic aim of publishing websites is to attract users. In comparison to the web 2.0 technologies, the distribution of services is cost effective and dominant. However, there are some advantages associated with it. For instance, loss of control for the web contents and other security issues, but using the communication channels associated with web 2.0 efficiently, will certainly develop a core competence factor for the online businesses. If Tesco manages to efficiently master web 2.0 technologies, it will display a successful business currently and in future (Waterhouse 2007). Moreover, a Web 2.0 technology facilitates communication and collaboration with customers and staff of Tesco. However, the technologies require evaluation, in order to analyze the impact and assessment methodologies that may consist of surveys, observations and interviews. These methodologies are utilized to calculate the impact over time on multiple business domains. Furthermore, these technologies associated with Web 2.0 facilitates in communication and collaboration, from corner to corner, to many industries in order to implement them (ANDRIOLE 2010). AJAX Security Current web technologies based on web 2.0 incorporates rich web application that are mostly incorporated with AJAX. Rich web application operates on a browser that is not compatible to provide optimum levels of security. Rich web applications imposed developers to develop browsers compatible with rich interactive contents. However, the purpose for developing a browser was to show web pages and hyperlinked documents. The advances that are integrated in browsers impose developers to focus more on functionality and support of rich web applications rather than its security. “The key goal of AJAX-style applications is to decompose jarring transitions that download an entire new Web page into a series of smaller, more frequent transactions. Developers consider AJAX to be "asynchronous" because data can be updated without interrupting the user. For example, Google Maps dramatically reduces the perceived latency of scrolling a map by only downloading the newly visible tiles and moving the rest. In the middleware community, however, the formal definition of asynchrony refers to the capability of sending a message at any time, in either direction. AJAX provides the upstream direction, but HTTP would appear to make server-initiated transmission impossible” (Khare 2005). The outcome is that the development architecture of Ajax contains some complicated area on which most of the inexperienced developers make mistakes. Moreover, the coding to develop rich web applications is vulnerable to cross-site request forgery (CSRF) along with cross-site scripting (XSS). Moreover, web-programming languages such as ASP.NET and java applets are also vulnerable to hackers. The existence of Ajax integrated on the websites along with java script in web 2.0, hackers launch attacks that are based on Java scripts. However, the elimination of these attacks, Ajax is considered as a reliable framework. Moreover, the study related to fortifying Java script high jacking revealed that still all the projects do not have the same level and measures of protection and security. Direct web reporting (DWR) is considered to provide optimal level of protection from these threats. The framework of direct web reporting integrates itself with the libraries of Ajax in order to provide interface widgets to the users. However, the other side of the problem is related to the framework that handles the asynchronous traffic. There are websites that are associated with Ajax and JavaScript Object Notation (JSON) as this approach is vulnerable to Java script high jacking. In comparison, a more secure approach is to incorporate XML. Secondly, the is also an issues related to invoke the asynchronous traffic as XMLHttpRequest manage XML communication. Website developers needs awareness regarding the rich web application technology, when using Ajax, requires an architectural methodology that combines security protection at the design level of application (Ajax security becomes urgent issue in enterprise web 2.0. 2007). Ajax allows websites to display interactive contents without refreshing the page. If the website is poorly coded, Ajax will allow a hacker to breach in to the website’s program execution functions. Moreover, contents hidden in java script can also be exploited. Developers must code the website with adequate security measures in order to eliminate these self-provided loop holes to the hackers (Vijayan 2007). "Another newly discovered web security threat centers on the use of Web 2.0 and AJAX ( Asynchronous JavaScript and XML) technologies for malicious activities." Ben-Yitzhak says, "Hackers have found an easy way to widely distribute malicious code via popular Internet sites. They can create 'invisible' attacks by inserting malicious code into Internet content, and calling it using AJAX technology"(Shelah 2006). In order to experience Ajax, Google maps are the best source that provides added functionalities along with security issues. One of the virus named as Yamanner worm was exploited in a popular web based email service from Yahoo Inc. The functionality includes scripts that embedded in messages so that they can be executed in a browser. Moreover, the worm was developed and constructed on JavaScript gathered email addresses and resends them to remote servers so that the spammers can be facilitated (Mimoso 2006). On 30th January 2006, forum systems released an alert associated with Ajax security and performance issues. There is an advantage to use asynchronous JavaScript and XML as they provide efficient and interactive web services. Although, the reliability on XML, considering it a content type for responses and request payloads concludes that the applications are exposed for web services vulnerabilities and threats. After integrating XML content filtering in Tesco, it will provides security for web services and capabilities to augment XML to guarantee secure and expandable Ajax applications. Ajax technology significantly increases the network traffic related to XML, resulting in providing more opportunities for hackers and intruders to breach the web services. There are many advantages of Ajax, as the services are based on business-to-business and business to consumer that converts the browser in to a portal of web services. The negative part includes data that is corrupted that consequently forces the browser to respond slowly or crash it. Malformed messages affects on server performance due to unnecessary exception handling and parsing. Moreover, as these web services are rich in application, they consume more bandwidth as compared to traditional web services resulting in system wide performance degradation (Taft 2006). Proposals and Conclusions Web 2.0 will facilitates Tesco to introduce a web platform that will be extremely efficient in implementing strategies related to the nature of the business. The development of web 2.0 applications facilitates efficient utilization of core enterprise applications for the company. Tesco can also implement semantic tagging technology as the websites are already integrated with E-commerce services. This will significantly increase the navigation of web pages resulting in increase in sales targets. Moreover, web 2.0 targets the marketing resources in an effective manner, accelerates the process of product development life cycle, and illustrates optimal feedback for new products and the list of advantages goes on (, Benefits of Web 2.0 Applications ). In order to achieve all these features, cloud computing has played as a core component for web 2.0. The term ‘Cloud Computing’ portrays a concept of a cloud that illustrates the Internet or probably a huge network environment. The imaginary Internet cloud of a large network environment is reliable in terms of sending data and receiving data. However, it is now incorporated with a high level of cloud abstraction. To elaborate it a bit further, instead of including network components such as routers, switches and servers, there are services. Moreover, this does not conclude that the network components are not present; they work at the back end to provide high-level services, capable to build application (What is cloud computing?). Moreover, cloud computing consists of applications that are provided as a service on the Internet and the provision of hardware and system software services provided by the data centers. Likewise, the services provided over the Internet are referred as (Software as a Service) ‘SaaS’. Few sellers use the term (Infrastructure as a service) IaaS and (Platform as a service) PaaS ’in order to demonstrate their products and services. However, these terms are avoided and not accepted globally, due to variation (ARMBRUST, FOX et al. 2010). The Commerce Department’s National Institute of Standards and Technology (NIST) have illustrated some helpful definitions that focus on three concepts (Ryan, Loeffler 2010): Cloud infrastructure as a service ‘IaaS’ consists of provisioning elementary computing resources Cloud software as a service ‘SaaS’ accessing a software application running on a cloud infrastructure Cloud platform as a service (PaaS) providing the accessibility to users for implementing created applications with provider-supported programming language and tools The core components of a cloud are consists of the data center hardware and software. When these resources are made available to the public, they are referred as public clouds and the service provided by the cloud is called as utility computing. Moreover, private clouds are only available to private organizations and are not accessible by public. Accordingly, cloud computing is the combination of ‘SaaS’ and utility computing (ARMBRUST, FOX et al. 2010). Today, cloud computing represents a more innovative and productive approach in terms of providing the provision of web 2.0, in order to provide online services along with online operating systems. Microsoft Azure provides an online operating system along with the set of development tools and services. Moreover, Google Docs provides online word processors along with spreadsheets and presentation applications similar to Microsoft Office. Furthermore, Google Apps gives the freedom to the developers to execute their codes and applications on Google infrastructure. Sun Microsystems provides computing power by charging $1 per hour for one CPU. In addition, Amazon provides web services named as EC2 and S3. Moreover, Yahoo has also announced recently that it will utilize ‘Apache Hadoop framework’ that will enable users to work on thousand of nodes and one million bytes of data. Accordingly, the contribution of cloud computing is covering every aspect of computation required for small, medium and large businesses (Han 2010). Solution on web 2.0 provides many cost effective short term and long-term benefits. Tesco can avail services from multiple cloud-computing providers, to improve computerized business processes and high availability of services within the organization. Cloud computing also provides standardization of APIs, by operating on compatible applications to enable hybrid cloud computing. As Tesco has already an I.T department, cloud computing will aid to operate on IT infrastructure to save staff, and financial resources. Cloud computing is also flexible and facilitate organizations to initialize a project robustly without upsetting on the cost, that may include disk storage, CPU and RAM. Likewise, Tesco can buy spaces for data storage on data centers located in different geographical area due to its global presence, that enables them to protect their data in terms of natural disasters and hazards. Furthermore, one advantage that is more significant is related to the uptime and availability of services at all times. In addition, cloud computing is also efficient for handling large data sets incorporated by the services associated with web 2.0. The pay for use business model facilitates academic institutions to analyze data in terabytes by distributed computing over hundreds of computers in only short time cost (Han 2010). Furthermore, the integration of Web 2.0 and semantic web has produced a new revolutionary e-portfolio. Previously, the development and implementation approach of e-portfolios have faced various challenges and limitations. However, a research by (Kim, Ng et al. 2010) on a design based on Private-Public data index systems that integrate cloud computing applications and storage with the architecture of Semantic web architecture. The integration aided semantic web-based virtualization along with advanced intellectual search achievable. The hardware and software architecture for Web 2.0 is incorporated with cloud computing technologies as they provide back end integration of hardware and software. In order to implement secure web services on a web2.0 platform based on Ajax, adequate security framework must be addressed in the design stage of the application development process. This is because Ajax has some complex areas where non experienced developers fails to cope up with the adequate security measures, resulting in attacks on the websites. The coursework demonstrated the overall concept of Web 2.0 along with understand the features of common integrated software packages along with the key features of computer networks in modern business practice. Moreover, advantages related to cloud computing and web 2.0 are demonstrated. Attacks vectors named as Ajax security are discussed in detail along with its resolution and consequences. Furthermore, the functionality of the threats related to AJAX is demonstrated. References PANG, L., 2009. A Survey of Web 2.0 Technologies for Classroom Learning. International Journal of Learning, 16(9), pp. 743-759. WANG, J., CHING-HUANG WANG, YUEH-CHIU FANG and CHUN-FU LIN, 2010. Benefits of Web 2.0 in the College Writing Classroom. International Journal of Learning, 17(2), pp. 439-450. , Seven Core Benefits of Web 2.0 for Traditional Industries . Available: http://www.contentmanager.net/magazine/article_1252_web2_0_benefits.html [3/14/2011, 2011]. YUEH-MIN HUANG, YANG, S.J.H. and CHIN-CHUNG TSAI, 2009. Web 2.0 for interactive e-learning. Interactive Learning Environments, 17(4), pp. 257-259. WATERHOUSE, D., 2007. The distributed web offers advantages. Reed Business Information Limited. ANDRIOLE, S.J., 2010. Business Impact of Web 2.0 Technologies. Communications of the ACM, 53(12), pp. 67-79. Ajax security becomes urgent issue in enterprise web 2.0. 2007. MarketWatch: Technology, 6(5), pp. 23-24. VIJAYAN, J., 2007. Researchers Warn of AJAX Security Risks. Computerworld. SHELAH, S., 2006. Finjan report highlights caching and Web 2.0 security risks: Web Security Trends Report (Q3 2006): AJAX technology for Web 2.0 sites is a basis for inserting malicious code into websites. Globes (Israel), . MIMOSO, M.S., 2006. Tread Cautiously with AJAX. Information Security, 9(8), pp. 17-17. KHARE, R., 2005. Pushing AJAX Forward. InfoWorld, 27(21), pp. 41-41. TAFT, D.K., 2006. Forum Systems issues AJAX alert. eWeek, 23(6), pp. 29. ARMBRUST, M., FOX, A., GRIFFITH, R., JOSEPH, A.D., KATZ, R., KONWINSKI, A., LEE, G., PATTERSON, D., RABKIN, A., STOICA, I. and ZAHARIA, M., 2010. A View of Cloud Computing. Communications of the ACM, 53(4), pp. 50-58. HAN, Y., 2010. On the Clouds: A New Way of Computing. Information Technology & Libraries, 29(2), pp. 87-92. RYAN, W.M. and LOEFFLER, C.M., 2010. Insights into Cloud Computing. Intellectual Property & Technology Law Journal, 22(11), pp. 22-28. , Benefits of Web 2.0 Applications . Available: http://ezinearticles.com/?Benefits-of-Web-2.0-Applications&id=1455149 [5/3/2011, 2011]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“PSM: Distributed systems Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1410357-psm-distributed-systems
(PSM: Distributed Systems Essay Example | Topics and Well Written Essays - 2500 Words)
https://studentshare.org/environmental-studies/1410357-psm-distributed-systems.
“PSM: Distributed Systems Essay Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/environmental-studies/1410357-psm-distributed-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Distributed Systems

Distributed Computer System

hellip; The paper will critically look at the factors motivating the adoption of Distributed Systems in order to evaluate the reality of a true distributed computing environment.... There are varied definitions of Distributed Systems, but most of them tend to have some commonalities.... The development of distributed computer systems coincides with the increasing demand for Distributed Systems in business.... The success of Distributed Systems rests in the interconnectedness of various components to achieve a unified system....
11 Pages (2750 words) Essay

Networking and Distributed Systems

This paper will examine the networking and Distributed Systems applications and identify how they assist IT in performing basic functions.... Detail study of networking and Distributed Systems A set of machines that are networked together ensure that these applications run smoothly.... Through the use of networks and Distributed Systems, the exchange of data is made possible and much easier.... Distributed Systems allow for the study of computer components....
4 Pages (1000 words) Research Paper

Distributed Systems Assessment

Communication between components in a distributed system may be done using "Message Passing", "Remote Procedure Call" or "Remote Object Invocation".... It is very useful in distributed computing as the procedure can be executed virtually at any location.... The key features of these three mechanisms are given below: ...
5 Pages (1250 words) Essay

FingerID: A new Security Model on Distributed System By using Finger Print

The research will address the factors that are needed to ensure security in Distributed Systems.... Fingerprint recognition systems are among the most frequently deployed biometric systems, due to their correctness, size, cost, performance and proven track record [5], [6], [7]....
20 Pages (5000 words) Essay

Distributed Systems Security

The author of this essay "Distributed Systems Security" comments on new possibilities on the sharing of information.... Distributed Systems SecurityIntroductionThe efficiency of internet access to the majority has paved way for new possibilities on the sharing of information.... What Is Security in Distributed Systems?... The DFS advanced in the option link in the encryption level in order to prevent the eavesdroppers from the discovery of file systems content (Kistler, 1995)....
2 Pages (500 words) Essay

Knowledge Workers and Integrated Distributed Systems

The paper "Knowledge Workers and Integrated Distributed Systems" discusses that soft skills are becoming increasingly important and since the technological medium is becoming the primary mode of communication, programmers who work in teams would find it very useful to possess knowledge.... , professional programmers in the IT industry, to possess the ability to work within integrated distribution systems and utilize the tools of technology effectively....
7 Pages (1750 words) Essay

Main Features of Networks and Distributed Systems

This coursework demonstrates the main features of networks and Distributed Systems.... This paper considers the advantages of Distributed Systems, challenges for a distributed system, fallacies of distributed computing, reasons for the failure of a commercially distributed computer system and relation with Peter Deutsch's Fallacies.... There are various types of Distributed Systems such as distributed information systems, distributed computing systems, distributed pervasive or embedded systems (Lee, 2007)....
7 Pages (1750 words) Coursework

Distributed Systems Programming

The paper "Distributed Systems Programming" describes that at any instant the server must be able to communicate simultaneously with many clients and to wait for the incoming requests on its specific server port at the same time.... Distributed computing also refers to the use of Distributed Systems to solve computational problems.... he most three significant characteristics of Distributed Systems are; concurrency of components, lack of a global clock, and independent failure of components....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us