YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Architecture - cs.cornell.edu · Architecture Client 1 Client 2 • • • Client 3 Secondary Site (cluster) Primary Site  (cluste Secondary Site (cluster) Communicati on

Architecture

Client 1 Client 2

• • •Client 3

Secondary Site(cluster)

Primary Sitewww.eScent.com

(cluster)Secondary Site

(cluster)

Communication

1. HTTP(TPC): www.eScent.com

IP: xxx.xxx.xxx.xxx

PrimaryCluster

4. HTTP(TCP): <frameset...eScent_y.com...>

SecondaryCluster

x

SecondaryCluster

y

SecondaryCluster

z

2. UDP: Request fromIP xxx.xxx.xxx.xxx

2. UDP: Request fromIP xxx.xxx.xxx.xxx

2. UDP: Request fromIP xxx.xxx.xxx.xxx

3. UDP:Ping = x

3. UDP:Ping = y

3. UDP:Ping = z

5. HTTP(TCP): eScent_y.com

ping

ping

ping A typical sequence of events:

1. The client requests a connection towww.eScent.com (which points to the primary clusterR)

2. R notifies all secondary clusters about the requestvia UDP (also possible by TPC, GMS, but notnecessary)

3. Secondary clusters ping the client and calculateround-trip latencies, sending them back to R.

4. R chooses between the first several responses anddirects the client to one of the secondary clusters.

Advantages:

1. Multicasting client requests through UDP proves tobe fast, efficient and with very small overhead(Reliability). Also helps for updating the distributeddatabase (no need to close sites!).

2. Framesets ensure that even in case of secondarycluster failure, the client will be connected to anotherone with minimum losses, like shopping baginformation (Availability).

Powered by:

BEA Weblogic 6.0

MS SQL Server 2000

Imple

menta

tion

State-of-the-art Tech no

Motion-enabled starting page!

W3C DOM 2 Web standard!

DHTML exploitedto full extend!

Weblogic 6.0 JSP 1.1server-side scripting

Cutting-edge To ols

BEA Weblogic 6.0 BetaMicrosoft SQL ServerBorland JBuilder 4.0

Allaire Homesite 4.51Macromedia Ultradev 1.0

Macromedia Flash 5.0Adobe Photoshop 5.5

Xara Webstyle 1.2

Designed and developed by Kamen YotovDepartment of Computer Science

Cornell University

Related Documents