software-system-architecture.tex 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. The software system architecture describes the relationships and properties of individual software components. It is a model that describes a software on a high-level design. The structure of an architecture can be represented mathematically as a graph, with the nodes representing the individual software components and the edges their relationships to each other. Although the individual components can be executed on the same computer, they are usually interconnected via networks. In general, a distinction is made between the architectures shown in Figure \ref{fig:software-system-architecture}.
  2. \begin{figure}[h!]
  3. \centering
  4. \includegraphics[width=1.0\textwidth]{network-architectures}
  5. \caption{Schematic representation of various software system architectures. In centralized applications (A), all clients (blue) are in connection with a central server (red), while in decentralized applications (B) several servers provide for improved stability. In distributed applications (C), all nodes have the same role with the same tasks, which is why we also speak of peers (green).}
  6. \label{fig:software-system-architecture}
  7. \end{figure}
  8. %\begin{itemize}
  9. % \item Centralized Applications
  10. % \item Decentralized Applications
  11. % \item Distributed Applications
  12. %\end{itemize}
  13. In the following, the characteristics and peculiarities of the different architectures are described in detail.
  14. \subsection{Centralized Applications}
  15. \label{sec:centralized-applications}
  16. In a centralized application, the software essentially runs on a central node with a static address with which all other nodes communicate. This central node is called a server and the nodes connected to it are called clients. The clients use services of the server.
  17. Typically, most web applications are designed as centralized applications. The clients are usually (mobile) apps or browsers that act as the interface to the user. Examples of this are social networks such as Facebook.
  18. The advantages of such an architecture include that new clients can easily join the system simply by connecting to the server. Also, the maintenance of the software is easy to perform, since only the server node needs to be updated. Such structures are also advantageous for the speed and the associated user experience since servers are generally reachable via fast connections, have sufficient resources and do not need to use complicated routes across several nodes. Due to the special role of the server, the authentication of a client in the system is easy to perform. Only the server has to check whether the client only performs the actions to which it is authorized and can intervene if necessary. If a client is offline, this has no negative impact on the architecture. Because the software essentially runs on the server, clients not only need to have low resources.
  19. The biggest disadvantage with this architecture is that with the failure or the blockade of the server, the entire system collapses. So, the server is the single point of failure of the whole system. Due to the design, the server has all the data. This makes him not only a popular target for hackers but also brings the clients into total dependency on the server. Having access to all the data can be used to provide an improved user experience by adapting the software to the user's needs. But it can also be used for targeted advertising or sensible data can even get sold to third parties. Furthermore, the server decides which data to send to the client, which brings with it the danger of censorship. As the number of clients increases, the server must scale to have sufficient resources.
  20. \subsection{Decentralized Applications}
  21. \label{sec:decentralized-applications}
  22. What are advantages and disadvantages of centralized applications is largely reversed in decentralized systems. Unlike centralized applications, decentralized applications do not have a single point of failure. But there is no node in the system that has all the data which makes accessing information sometimes hard. There are any number of nodes that perform the tasks of a server and by exchanging with other servers in total form a complete system.
  23. Thus, the advantages of decentralized applications include, in addition to the already mentioned increased reliability, even further advantages. Each server only records the amount of users covered by its resources. New servers contribute new resources to the overall system. Distributed applications can not be disabled easily because a new server can be started at any time that does not fall under a lock. Because the data are not centrally available, they can not be evaluated, so that user data are better protected. Also, there is no longer an attack target whereby hacking a single server loses lucrativeness.
  24. The drawbacks include the difficulty of finding data because they are spread across multiple servers. Search functionalities are thus difficult to implement. If a server is taken offline, the data is no longer available, even if the system itself remains functional. Since there is no longer a central point that is managed by an operator, rolling out updates is difficult. This raises the challenge that server nodes of different versions can still work together.
  25. Examples of decentralized applications are the social networks Diaspora and Mastodon. Each user can operate his own server in these networks. Unlike Facebook, the decision on the existence of the service is therefore not in the control of the operator, but the user. Bitcoin is also a decentralized application architecture. In doing so, transactions are carried out in a decentralized database (blockchain).
  26. \subsection{Distributed Applications}
  27. \label{sec:distributed-applications}
  28. A feature of distributed applications is the distributed computation across all nodes. At the same time, a single task is executed in parallel on several nodes of a system, and the entire system delivers the result in total.
  29. In distributed applications, there is no hierarchy with servers or clients. Each node is equal to the other nodes with everyone performing the same tasks. This is why a node in this architecture is called peer. The structure is then referred to as peer to peer (P2P). With such structures, there are no scaling problems, since each node contributes the required resources itself. Thus, the resources of the entire system grow with each new node added.
  30. BitTorrent is an application that belongs to this architecture type. It solves the problem of downloading large files efficiently. When downloading a file, it is offered by several nodes, so that different pieces can be loaded in parallel from different sources in difference to HTTP where only one source provides the file. Each node not only downloads, but also provides itself to other files. In order to avoid that nodes download only (so-called Leechers) but also contribute, they are penalized with slow download speeds. This principle is known as \textit{tit for tat}.
  31. \subsection{Comparison}
  32. \label{sec:architecture-comparison}
  33. The following table \ref{tab:comparison-architectures} compares the main features of the different architectures as described before.
  34. \begin{table}[h!]
  35. \centering
  36. \begin{tabular}{l|c|c|c|}
  37. \cline{2-4}
  38. & \multicolumn{1}{l|}{Centralized Systems} & \multicolumn{1}{l|}{Decentralized Systems} & \multicolumn{1}{l|}{Distributed Systems} \\ \hline
  39. \multicolumn{1}{|l|}{Scalability} & & + & ++ \\ \hline
  40. \multicolumn{1}{|l|}{Maintenance} & ++ & + & \\ \hline
  41. \multicolumn{1}{|l|}{\begin{tabular}[c]{@{}l@{}}System \\ Stability\end{tabular}} & & + & ++ \\ \hline
  42. \multicolumn{1}{|l|}{Performance} & ++ & + & \\ \hline
  43. \multicolumn{1}{|l|}{\begin{tabular}[c]{@{}l@{}}Data \\ Availability\end{tabular}} & ++ & + & \\ \hline
  44. \end{tabular}
  45. \caption{Comparison of different software system architectures on scalability, maintenance, system stability, performance and data availability.}
  46. \label{tab:comparison-architectures}
  47. \end{table}