The impact of distributed systems on the architecture and design of computer systems: advantages and challenges
DOI:
https://doi.org/10.56294/dm2024.225Keywords:
Distributed system, Fault tolerance, Performance, Scalability, System architectureAbstract
A distributed system can encompass a variety of configurations, including mainframes, personal computers, workstations, and minicomputers. The varying degrees of software flexibility and the ability to execute tasks in parallel facilitate simultaneous data processing across multiple processors. The higher the resilience of an application, the quicker it can recover after a system failure. Organisations increasingly adopt distributed computing systems as they face increased data generation and demand for enhanced application performance. These systems enable businesses to scale effectively in response to growing data volumes. Integrating additional hardware into a distributed system is generally simpler than upgrading a centralised system reliant on powerful servers. Distributed systems comprise numerous nodes that collaborate towards a common objective. This article aims to provide a comprehensive overview of distributed systems, their architectural frameworks, and essential components. This study examines how distributed systems influence the architecture and design of computer systems. The research methods consist of reviewing existing literature and analysing case studies on implementing distributed systems. Key findings indicate that the evolution of distributed systems is ongoing, driven by emerging technologies and the increasing demand for efficient, scalable, and secure solutions. Innovations such as edge computing, blockchain technology, 5G, and the integration of AI and machine learning are among the notable trends shaping the future landscape of distributed systems. Looking ahead, designers and architects need to stay informed about these advancements to create reliable and adaptable distributed systems that can address the dynamic needs of users and organisations
References
1. White B, Lepreau J, Stoller L, Ricci R, Guruprasad S, Newbold M, et al. An integrated experimental environment for distributed systems and networks. SIGOPS Oper Syst Rev. 2002 Dec 31;36(SI):255–70. Available from: https://doi.org/10.1145/844128.844152
2. Yu J, Wang G, Mu Y. Provably Secure Single Sign-on Scheme in Distributed Systems and Networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications [Internet]. Liverpool, United Kingdom: IEEE; 2012 [cited 2024 Oct 30]. p. 271–8. Available from: https://doi.org/10.1109/TrustCom.2012.228
3. Ports DR, Li J, Liu V, Sharma NK, Krishnamurthy A. Designing Distributed Systems Using Approximate Synchrony in Data Center Networks. In: Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’15) [Internet]; 2015 May 4–6, Usenix, Oakland. USENIX Association; 2015 [cited 2024 Oct 30]. p. 43–57. Available from: https://www.usenix.org/system/files/conference/nsdi15/nsdi15-paper-ports.pdf
4. Yakhno V, Kolumbet V, Halachev P, Khambir V, Ivanenko R. Methods and algorithms of optimization in computer engineering: review and comparative analysis. Data and Metadata. 2024 Jul 17;3:443. Available from: https://doi.org/10.56294/dm2024443
5. Coulouris G, Dollimore J, Kindberg T. Distributed Systems: Concepts and Design. Harlow (England): Pearson Education Limited; 2005.
6. Tanenbaum AS, van Steen M. Distributed Systems: Principles and Paradigms. Upper Saddle River: Pearson Education; 2002.
7. Xi B, Liu Z, Raghavachari M, Xia CH, Zhang L. A smart hill-climbing algorithm for application server configuration. In: Proceedings of the 13th international conference on World Wide Web [Internet]. New York NY USA: ACM; 2004 [cited 2024 Oct 30]. p. 287–96. Available from: https://dl.acm.org/doi/10.1145/988672.988711
8. Saboori A, Jiang G, Chen H. Autotuning Configurations in Distributed Systems for Performance Improvements Using Evolutionary Strategies. In: 2008 The 28th International Conference on Distributed Computing Systems [Internet]. Beijing, China: IEEE; 2008 [cited 2024 Oct 30]. p. 769–76. Available from: https://doi.org/10.1109/ICDCS.2008.11
9. Van Steen M, Pierre G. Replicating for Performance: Case Studies. In: Charron-Bost B, Pedone F, Schiper A, editors. Replication [Internet]. Berlin, Heidelberg: Springer Berlin Heidelberg; 2010 [cited 2024 Oct 30]. p. 73–89. (Lecture Notes in Computer Science; vol. 5959). Available from: https://doi.org/10.1007/978-3-642-11294-2_5
10. Gilbert S, Lynch N. Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services. SIGACT News. 2002 Jun;33(2):51–9. Available from: https://doi.org/10.1145/564585.564601
11. Atzori L, Iera A, Morabito G. The Internet of Things: A survey. Computer Networks. 2010 Oct;54(15):2787–805. Available from: https://doi.org/10.1016/j.comnet.2010.05.010
12. Madden SR, Franklin MJ, Hellerstein JM, Hong W. TinyDB: an acquisitional query processing system for sensor networks. ACM Trans Database Syst. 2005 Mar;30(1):122–73. Available from: https://doi.org/10.1145/1061318.1061322
13. Mottola L, Picco GP. Programming wireless sensor networks: Fundamental concepts and state of the art. ACM Comput Surv. 2011 Apr;43(3):1–51. Available from: https://doi.org/10.1145/1922649.1922656
14. Urdaneta G, Pierre G, Steen MV. A survey of DHT security techniques. ACM Comput Surv. 2011 Jan;43(2):1–49. Available from: https://doi.org/10.1145/1883612.1883615
15. Wams JMS, Van Steen M. Unifying user-to-user messaging systems. IEEE Internet Comput. 2004 Mar;8(2):76–82. Available from: https://doi.org/10.1109/MIC.2004.1273489
16. Weiser M. The computer for the 21st century. Scientific American. 1999 Sep;3:94–104. Available from: https://chanwutk.github.io/ucbhciprelim/assets/readings/1991-computer-for-21st-century.pdf
17. Poslad S. Ubiquitous computing: smart devices, environments and interactions. Chichester, U.K: Wiley; 2009.
18. Kreitz G, Niemela F. Spotify—Large Scale, Low Latency, P2P Music-on-Demand Streaming. In: 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P) [Internet]. Delft, Netherlands: IEEE; 2010 [cited 2024 Oct 30]. p. 1–10. Available from: https://doi.org/10.1109/P2P.2010.5569963
19. Salah T, Jamal Zemerly M, Chan Yeob Yeun, Al-Qutayri M, Al-Hammadi Y. The evolution of distributed systems towards microservices architecture. In: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) [Internet]. Barcelona, Spain: IEEE; 2016 [cited 2024 Oct 30]. p. 318–25. Available from: https://doi.org/10.1109/ICITST.2016.7856721
20. Bergstra JA, editor. Handbook of network and system administration. London: Elsevier; 2008. 1016 p.
21. McSherry F, Mironov I. Differentially private recommender systems: Building privacy into the Netflix Prize contenders. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining [Internet]. Paris France: ACM; 2009 [cited 2024 Oct 30]. p. 627–36. Available from: https://doi.org/10.1145/1557019.1557090
22. Ramakrishnan H, Keller B, Mirza B, Grama A, Karypis G. Privacy risks in recommender systems. IEEE Internet Comput. 2001; 5:54–62.
23. Amazon Web Services [Internet]. Summary of the Amazon EC2 and Amazon RDS service disruption in the US east region; 2011 Apr 29 [cited 2024 Oct 30]. Available from: http://aws.amazon.com/message/65648/
24. Lewis TG. Network Science: Theory and Applications. 1st ed. New York: John Wiley & Sons, Incorporated; 2011. 524 p.
25. Qin F, Tucek J, Sundaresan J, Zhou Y. Rx: treating bugs as allergies—a safe method to survive software failures. In: Proceedings of the twentieth ACM symposium on Operating systems principles [Internet]. Brighton United Kingdom: ACM; 2005 [cited 2024 Oct 30]. p. 235–48. Available from: https://doi.org/10.1145/1095810.1095833
26. Hunko I, Muliarevych O, Trishchuk R, Zybin S, Halachev P. The role of virtual reality in improving software testing methods and tools. JATIT. 2024 Jun 15; 102(11):4723–4734. Available from: https://www.jatit.org/volumes/Vol102No11/6Vol102No11.pdf
27. Popereshnyak, S., Grinenko, S., Grinenko, O., Kovalenko, O., & Radivilova, T. (2019). Methods for Assessing the Maturity Levels of Software Ecosystems. In Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) [Internet]. CEUR-WS; 2019 [cited 2024 Oct 30]. p. 251–61. Available from: https://ceur-ws.org/Vol-2654/paper20.pdf.
Published
Issue
Section
License
Copyright (c) 2024 Yevhenii Tytarchuk , Sergii Pakhomov , Dmytro Beirak , Vasyl Sydorchuk , Svitlana Vasylyuk Zaitseva (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
The article is distributed under the Creative Commons Attribution 4.0 License. Unless otherwise stated, associated published material is distributed under the same licence.