Distributed system, Computer Networking

Assignment Help:

You should develop a system consisting of an application acting as a broker and several agents that need to communicate between them. The agents can only communicate in pairs (i.e. each agent can only communicate with one agent at the time). At any given time, several agents should be able to communicate in pairs. Each agent is controlled by a user. Each agent takes a message from the user and sends it to another agent or displays the message it receives to the user. The broker will keep an updated list of agents who have registered themselves as available for connection. The broker will also keep a list of agents that are connected and their status (i.e. are they available for communication? are they already busy communicating and then temporary unavailable for communication?, etc). If requested, the broker should make this information available to the agents. In this way, an agent can specify another agent it wishes to communicate with. Each agent can run on a different machine. Once two agents have agreed to communicate, messages should be routed directly from one agent to the other without using the broker as intermediary. Each agent should allow the user to:

  1. Get a list of every user connected and waiting to start a communication session from the broker.
  2. Decide with whom the user can start a communication session (among the other available users).
  3. Decide when to end the connection.
  4. Send and receive messages from the other user.

In your report you should outline the major issues involved in this application pertaining to distributed systems (such as possible communication protocols that will be used in the system, concurrency control a justified selection of the architecture on which a prototype system may be based, the application you have built (design, implementation, evaluation etc).

Your program must be based on the case study scenario listed above and any assumptions you had to make. Please clearly state your assumptions.


Related Discussions:- Distributed system

Explain the bit-level encryption, Q. Explain the Bit-Level Encryption? ...

Q. Explain the Bit-Level Encryption? Bit-Level Encryption - Data is divided into blocks of bits then altered by encoding/decoding, permutation, substitution, exclusive OR

Name some common or popular databases, Name some common or popular database...

Name some common or popular databases Many of the popular databases also provide support of and to the middleware and consequently, the term middleware has become lesser known.

Cable connection, - EIA/ TIA specifies and RJ-45 connector for unshielded t...

- EIA/ TIA specifies and RJ-45 connector for unshielded twisted-pair (UTP) cable. The letter RJ stand for registered jack and the number 45 refers to a specific wiring sequence.

Tcp segment structure - transport layer, TCP Segment Structure Figure ...

TCP Segment Structure Figure shows the format of the TCP segment. The  header consists  of a 20 bytes  fixed  part  plus a variable size  options fields. The description  o

Networking, can we correct errors using crc?

can we correct errors using crc?

Characteristics of udp, UDP sends packets 'blind' down the network, and rel...

UDP sends packets 'blind' down the network, and relies on upper-layer protocols to form connections and identify errors. TCP is a connection-oriented protocol that can give reliabl

Describe about the server and browser software, Describe about the Server a...

Describe about the Server and browser software Most of the server and browser software developed by various vendors carry out encryption using either a 40-bit or a 128-bit sec

Give example of the network layer, Most protocol suites have dissimilar OSI...

Most protocol suites have dissimilar OSI layer protocols within them. At layer 3, IP is for TCP/IP. TCP is layer 4. IPX is for IPX/SPX. SPX is layer 4. DDP is for Appletal

How to Assign switch ports to VLAN, Assign switch ports to VLANs. Refe...

Assign switch ports to VLANs. Refer to the port assignment table at the starting of the lab to assign ports to the VLANs. Use the interface range command to make simpler this

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd