Transparency
Transparency
In distributed systems, transparency is defined as the masking from the user and the application
programmer regarding the separation of components, so that the whole system seems to be like a
single entity rather than individual components.
Aim of Transparency:
Transparency’s major goal is to make certain features of distribution opaque to application
programmers so they may focus on the design of their specific activity.
Access Transparency
Location Transparency
Concurrency Transparency
Replication Transparency
Failure Transparency
Mobility Transparency
Performance Transparency
Scaling Transparency
Parallelism Transparency
1. Access Transparency: Access Transparency allows the same operations to be used to access
local and remote resources. The file distribution must be hidden from the clients. The storing of
data on separate servers that are physically separated, and a common set of actions should be
available to access both remote and local files. Applications for local files are to be designed such
that they should be able to run on remote files as well.
Examples – The File system in Network File System (NFS), SQL queries, and web navigation
exhibits the feature of access transparency.
2. Location Transparency: Location Transparency permits access to resources regardless of their
physical or network location. There should be a view of a consistent file namespace for the clients.
It must possess the feature of moving files such that their pathnames are not to be affected. There
is no information regarding the physical location of the object in case of a location transparent
name. It is a quite vital and critical feature for facilitating resource movement and service
availability. Location and Access Transparency together makes Network transparency.
8. Scaling (Size) Transparency: Scaling Transparency enables systems and applications to scale
up without requiring changes to the system architecture or application techniques. The resources
that are not of any relevance to the user are hidden from the user and application programmers.
The smooth development and evolution with this type of transparency are critical for most
businesses. A system should be able to scale down to small surroundings when necessary, as well
as be space and/or time-efficient when required.
Note: Access and location transparency are the two most significant types of transparency; their
presence or absence has the most impact on how distributed resources are used.
Degree of Transparency:
It is normally preferable, but it is not always the best option.
It is not a good idea to keep a physical resource like a printer hidden from its users.
A trade-off between a high level of transparency and a system’s performance is required.