Explain the proper distribution of functionality and code, Operating System

Assignment Help:

Explain the Proper Distribution of Functionality and Code

It is important to note that the bandwidth of the server operating system and server processor availability is fixed. The amount of processing capability remains consistent across any number of workstation platforms. Sharing this server bandwidth between multiple fronts - ends (clients) will eventually degrade performance. There is a saturation point (number of stations * load) at which perceptible performance at the workstation will decrease due to the overloading of the server computer. The objective of client/server application designer is to distribute functionality and code so as to avoid this saturation point for all normal case scenarios.

The difficulty lies in determining the saturation point. For instance, some server operating systems are more scalable. By adding more horse-power or addition processors to these systems, the saturation point will change. Careful analysis on the target environments might be needed for fine- tuning finished client - server applications. In addition , some emerging technologies and application have the capability of dynamically the execution location of client - server components. These technologies, by being properly architected, greatly increase the scalability and load balancing of the overall system. A goal of the application developer should be to achieve and ideally balanced machine state, although application distribution will vary from application to application and from developer to developer. The developer should keep in mind that the proper architecture and a careful mix of application functions between server and client will eventually determine the viability of the client - server technology.


Related Discussions:- Explain the proper distribution of functionality and code

Comparison of disk scheduling algorithms, COMPARISON OF DISK SCHEDULING ALG...

COMPARISON OF DISK SCHEDULING ALGORITHMS Name      Description                  Remarks      (Selection according to requestor)   RSS        Random scheduling     fo

Necessary conditions for deadlock, Here are the conditions necessary for a ...

Here are the conditions necessary for a deadlock to occur; note that all of them are necessary, and none is suf?cient: 1. ?nite resources: the resources are held in a mutually-e

Explain kernel-level threads (klt), KERNEL-LEVEL THREADS (KLT) In this...

KERNEL-LEVEL THREADS (KLT) In this level every thread management is done by kernel .No thread library except an API system calls to the kernel thread facility exists. The kern

Characteristics of suspend process, Characteristics of suspend process ...

Characteristics of suspend process Suspended process isn't immediately available for execution. The process may or may not be waiting on an event. For preventing t

Memory management, what is hashed page tables & explain of there work & fig...

what is hashed page tables & explain of there work & figure

integrator circuit, Referring to Figure below, discuss how you would alter...

Referring to Figure below, discuss how you would alter the circuit to obtain: 1. a straightforward amplifier with gain 1, 2. a straightforward amplifier with gain 10, 3. a

Explain process termination - operating system, Process termination A p...

Process termination A process terminates when it finishes implementing its final statement and asks the operating system to delete it by using the exit system call. At that tim

What are the three main activities of an operating system, What are the thr...

What are the three main activities of an operating system in regard to memory management? Keep track of which parts of memory are now being used and by whom. Decide which pr

What are the objectives of operating system?, What are the objectives of op...

What are the objectives of operating system? Objectives of OS 1.      Convenience: An OS makes a computer more suitable to use. 2.      Efficiency : An OS allows t

Define file permission in unix, The permission function is used to calculat...

The permission function is used to calculate what, if any access each class or level of user has to each file on a Unix machine. The permission task is one of the data components s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd