The impact of distributed systems on the architecture and design of computer systems: advantages and challenges

Authors

  • Yevhenii Tytarchuk Department of Computer Science and Digital Economy, Faculty of Economics, Information Technology and Service, Vinnytsia National Agrarian University, Ukraine Author
  • Sergii Pakhomov Department of Cybernetics of Chemical Technology Processes, Faculty of Chemical Technology, National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine Author
  • Dmytro Beirak Department of Software Engineering, Zhytomyr Polytechnic State University, Ukraine Author
  • Vasyl Sydorchuk Department of Software Engineering, Zhytomyr Polytechnic State University, Ukraine Author
  • Svitlana Vasylyuk Zaitseva Computer Science Department, Information Technologies Faculty, National University of Life and Environmental Sciences of Ukraine, Ukraine Author

DOI:

https://doi.org/10.56294/dm2024.225

Keywords:

Distributed system, Fault tolerance, Performance, Scalability, System architecture

Abstract

A distributed system can encompass a variety of configurations, including mainframes, personal computers, workstations, and minicomputers. The varying degrees of software flexibility and the ability to execute tasks in parallel facilitate simultaneous data processing across multiple processors. The higher the resilience of an application, the quicker it can recover after a system failure. Organisations increasingly adopt distributed computing systems as they face increased data generation and demand for enhanced application performance. These systems enable businesses to scale effectively in response to growing data volumes. Integrating additional hardware into a distributed system is generally simpler than upgrading a centralised system reliant on powerful servers. Distributed systems comprise numerous nodes that collaborate towards a common objective. This article aims to provide a comprehensive overview of distributed systems, their architectural frameworks, and essential components. This study examines how distributed systems influence the architecture and design of computer systems. The research methods consist of reviewing existing literature and analysing case studies on implementing distributed systems. Key findings indicate that the evolution of distributed systems is ongoing, driven by emerging technologies and the increasing demand for efficient, scalable, and secure solutions. Innovations such as edge computing, blockchain technology, 5G, and the integration of AI and machine learning are among the notable trends shaping the future landscape of distributed systems. Looking ahead, designers and architects need to stay informed about these advancements to create reliable and adaptable distributed systems that can address the dynamic needs of users and organisations

References

1. White B, Lepreau J, Stoller L, Ricci R, Guruprasad S, Newbold M, et al. An integrated experimental environment for distributed systems and networks. SIGOPS Oper Syst Rev. 2002 Dec 31;36(SI):255–70. Available from: https://doi.org/10.1145/844128.844152

2. Yu J, Wang G, Mu Y. Provably Secure Single Sign-on Scheme in Distributed Systems and Networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications [Internet]. Liverpool, United Kingdom: IEEE; 2012 [cited 2024 Oct 30]. p. 271–8. Available from: https://doi.org/10.1109/TrustCom.2012.228

3. Ports DR, Li J, Liu V, Sharma NK, Krishnamurthy A. Designing Distributed Systems Using Approximate Synchrony in Data Center Networks. In: Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’15) [Internet]; 2015 May 4–6, Usenix, Oakland. USENIX Association; 2015 [cited 2024 Oct 30]. p. 43–57. Available from: https://www.usenix.org/system/files/conference/nsdi15/nsdi15-paper-ports.pdf

4. Yakhno V, Kolumbet V, Halachev P, Khambir V, Ivanenko R. Methods and algorithms of optimization in computer engineering: review and comparative analysis. Data and Metadata. 2024 Jul 17;3:443. Available from: https://doi.org/10.56294/dm2024443

5. Coulouris G, Dollimore J, Kindberg T. Distributed Systems: Concepts and Design. Harlow (England): Pearson Education Limited; 2005.

6. Tanenbaum AS, van Steen M. Distributed Systems: Principles and Paradigms. Upper Saddle River: Pearson Education; 2002.

7. Xi B, Liu Z, Raghavachari M, Xia CH, Zhang L. A smart hill-climbing algorithm for application server configuration. In: Proceedings of the 13th international conference on World Wide Web [Internet]. New York NY USA: ACM; 2004 [cited 2024 Oct 30]. p. 287–96. Available from: https://dl.acm.org/doi/10.1145/988672.988711

8. Saboori A, Jiang G, Chen H. Autotuning Configurations in Distributed Systems for Performance Improvements Using Evolutionary Strategies. In: 2008 The 28th International Conference on Distributed Computing Systems [Internet]. Beijing, China: IEEE; 2008 [cited 2024 Oct 30]. p. 769–76. Available from: https://doi.org/10.1109/ICDCS.2008.11

9. Van Steen M, Pierre G. Replicating for Performance: Case Studies. In: Charron-Bost B, Pedone F, Schiper A, editors. Replication [Internet]. Berlin, Heidelberg: Springer Berlin Heidelberg; 2010 [cited 2024 Oct 30]. p. 73–89. (Lecture Notes in Computer Science; vol. 5959). Available from: https://doi.org/10.1007/978-3-642-11294-2_5

10. Gilbert S, Lynch N. Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services. SIGACT News. 2002 Jun;33(2):51–9. Available from: https://doi.org/10.1145/564585.564601

11. Atzori L, Iera A, Morabito G. The Internet of Things: A survey. Computer Networks. 2010 Oct;54(15):2787–805. Available from: https://doi.org/10.1016/j.comnet.2010.05.010

12. Madden SR, Franklin MJ, Hellerstein JM, Hong W. TinyDB: an acquisitional query processing system for sensor networks. ACM Trans Database Syst. 2005 Mar;30(1):122–73. Available from: https://doi.org/10.1145/1061318.1061322

13. Mottola L, Picco GP. Programming wireless sensor networks: Fundamental concepts and state of the art. ACM Comput Surv. 2011 Apr;43(3):1–51. Available from: https://doi.org/10.1145/1922649.1922656

14. Urdaneta G, Pierre G, Steen MV. A survey of DHT security techniques. ACM Comput Surv. 2011 Jan;43(2):1–49. Available from: https://doi.org/10.1145/1883612.1883615

15. Wams JMS, Van Steen M. Unifying user-to-user messaging systems. IEEE Internet Comput. 2004 Mar;8(2):76–82. Available from: https://doi.org/10.1109/MIC.2004.1273489

16. Weiser M. The computer for the 21st century. Scientific American. 1999 Sep;3:94–104. Available from: https://chanwutk.github.io/ucbhciprelim/assets/readings/1991-computer-for-21st-century.pdf

17. Poslad S. Ubiquitous computing: smart devices, environments and interactions. Chichester, U.K: Wiley; 2009.

18. Kreitz G, Niemela F. Spotify—Large Scale, Low Latency, P2P Music-on-Demand Streaming. In: 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P) [Internet]. Delft, Netherlands: IEEE; 2010 [cited 2024 Oct 30]. p. 1–10. Available from: https://doi.org/10.1109/P2P.2010.5569963

19. Salah T, Jamal Zemerly M, Chan Yeob Yeun, Al-Qutayri M, Al-Hammadi Y. The evolution of distributed systems towards microservices architecture. In: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) [Internet]. Barcelona, Spain: IEEE; 2016 [cited 2024 Oct 30]. p. 318–25. Available from: https://doi.org/10.1109/ICITST.2016.7856721

20. Bergstra JA, editor. Handbook of network and system administration. London: Elsevier; 2008. 1016 p.

21. McSherry F, Mironov I. Differentially private recommender systems: Building privacy into the Netflix Prize contenders. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining [Internet]. Paris France: ACM; 2009 [cited 2024 Oct 30]. p. 627–36. Available from: https://doi.org/10.1145/1557019.1557090

22. Ramakrishnan H, Keller B, Mirza B, Grama A, Karypis G. Privacy risks in recommender systems. IEEE Internet Comput. 2001; 5:54–62.

23. Amazon Web Services [Internet]. Summary of the Amazon EC2 and Amazon RDS service disruption in the US east region; 2011 Apr 29 [cited 2024 Oct 30]. Available from: http://aws.amazon.com/message/65648/

24. Lewis TG. Network Science: Theory and Applications. 1st ed. New York: John Wiley & Sons, Incorporated; 2011. 524 p.

25. Qin F, Tucek J, Sundaresan J, Zhou Y. Rx: treating bugs as allergies—a safe method to survive software failures. In: Proceedings of the twentieth ACM symposium on Operating systems principles [Internet]. Brighton United Kingdom: ACM; 2005 [cited 2024 Oct 30]. p. 235–48. Available from: https://doi.org/10.1145/1095810.1095833

26. Hunko I, Muliarevych O, Trishchuk R, Zybin S, Halachev P. The role of virtual reality in improving software testing methods and tools. JATIT. 2024 Jun 15; 102(11):4723–4734. Available from: https://www.jatit.org/volumes/Vol102No11/6Vol102No11.pdf

27. Popereshnyak, S., Grinenko, S., Grinenko, O., Kovalenko, O., & Radivilova, T. (2019). Methods for Assessing the Maturity Levels of Software Ecosystems. In Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) [Internet]. CEUR-WS; 2019 [cited 2024 Oct 30]. p. 251–61. Available from: https://ceur-ws.org/Vol-2654/paper20.pdf.

Downloads

Published

2024-12-26

Issue

Section

Original

How to Cite

1.
Tytarchuk Y, Pakhomov S, Beirak D, Sydorchuk V, Vasylyuk Zaitseva S. The impact of distributed systems on the architecture and design of computer systems: advantages and challenges. Data and Metadata [Internet]. 2024 Dec. 26 [cited 2025 Mar. 14];3:.225. Available from: https://dm.ageditor.ar/index.php/dm/article/view/225