Tuesday, April 2, 2019
Distributed Systems Definitions
Distributed Systems DefinitionsDistributed SystemsThere is always compromise when we use distributed clays. Being a distributed systems expertise means k promptlying the better compromise to make.There is no global clock.Distributed systems definition A distributed systems is define as a collection of independent electronic computers that appears to its exploiters as individual(a) luculent system. packet systems that operate on more than than peerless computerInternet, Intranet. industrious deliberation, Wireless and some other modern technologies.Distributed Systems beasParallel computingGrid computingCluster computingDistributed computingMotivation for distributed systemsResources sharingGeographical and legacy reasonsFlexibilityScalabilityRobustnessSecuritySystem DesignDistributed permeant SystemsRequirements for pervasive systemsWireless, small, battery poweredDiscover environment.Embrace contextual changes.Encourage ad hoc compositionRecognize sharing as the de faultPersonal topographic point vs. sh ard spaceNo central admin1.Distributed SystemsA distributed systems is defined by collection of autonomous independent systems that shown to users as a single system via through ne dickensrk. The characteristics of distributed system be sextuple autonomous components which are non all shared by the users. Resources nookie non be shared to all the users. Soft ware running on the system is concurrent on diametrical processors. In which happened to be multiple point of control and multiple points of failure. Some vulgar characteristics can be achieved using distributed systems resource sharing, openness, concurrency, scalability, fault tolerance, transparency. Types of distributed systems include distributed computing systems, distributed informative systems, distributed pervasive systems.2.Transmission Control protocolTransmission Control protocol totally depends on profits selective breeding link to transfer data, TCP requires co nnection between knob and waiter, It does like a three way handshake. master of ceremonies A sends a SYN to B, B sends a SYN and ACK and Host A sends a ACK to B then TCP connection is established. I employ this as reference http//www.inetdaemon.com/tutorials/internet/tcp/3-way_handshake.shtml.3.User Datagram ProtocolUser Datagram protocol is connectionless. It does not check if the packets are received are not and there is no guaranteed connection. There is chance in packet loss during transmission, more unreliable way to send data. The advantage is speed and cost free. UDP mostly used in online gaming which uses more interaction and respond quickly from player, characterisation streaming like YouTube, twitch4.Lamport Bakery AlgorithmLesile Lamports bakery algorithmic rule is designed for the safety purpose of using shared resources between multiple weave by mutual exclusion. There lead be a global counter that displays the round ties being served. The remaining threads befool to wait in the line. When the thread completes its process the next thread being served. There are some limitations in the analogy. Its is possible that more than one thread go identical number and when they collect it. pick up cannot be providedSo to clear this limitation each thread is provided with a priority. The priority is base on the lower value or high value then thread leave behind enter the critical section. particular sectionThe critical section requires immediate attention access to resources and tho be executed one thread at a condemnation. When a thread enters a critical section, Its has to have its turn and must have smallest number because in case the other threads have the same number the smallest will be executed first.5.Remote Procedure Call(RPC)Remote purpose call is based on the thickening and emcee model. The lymph node mechanism sends the data to the innkeeper machine based on crave from user its is a synchronous operation that requires suspend the current platform until the RPC is returned. Its a light weight process so multiple RPC can be performed concurrently.RPC Is like a function call, the calling arguments are passed through to the strange procedure and the caller waits for the response from the remote procedure. The RPC is made between two meshinged systems. A thread can be blocked until either a request or reply is get ind or it will time out. When the request is received the server will send a dispatch tour that performs the requested services and sends the node a reply.6. Internet ProtocolsInternet protocols are used for computer colloquy and also used to identify a computers report. An IP cite as a 32 bit number and this called as IPV4 the development of IPV6 is predicted that depletion of available addresses. So IPV6 uses 128 bits for a address.IPV4 example 172.16.254.1 (IPV4) and 2001db801234056781 (IPv6).7. SynchronizationSynchronization policy is not to go into deadlock condition. Consider multiple process tries to access resources which is in the distributed environment. The synchronization process is to handle all the requests from the process and assign them the resources based on the priority requested leaf node and with pre-defined conditions synchronizing the clients with their request without departure into deadlock condition.8. legionA server is a computer architectural plans that runs in a computer or other computer and it provides other computer to connect through via network. A computer that normally runs server broadcast are usually the server. If it run every time then it usually called the dedicated server. In client/server program the server program always waits and fulfills the client request. The few types of servers from other number of possibilitiesApplication legionIts in the distributed networks that provide the business logic for an application program.Proxy ServerA proxy server is software that acts as a mediator between endpoint constru ctions such as computer and a client and some other server from which a user or client requesting a service.Virtual ServerA virtual server is a program that usually runs on the shared server. The way it seems to each user that they have the complete control over the server.Policy ServerPolicy server is a security component which has a policy based network that provides authorization services and facilitates tracking and control of files.9. knobA client is a computer that retrieves knowledge from or users resources provided by the server or main computer. Web browsers are clients that connect to the tissue servers and retrieve web pages for display same as email clients and multiplayer video games.A client is a part of client-server architecture and client and servers are computer programs that may be run in the same computer and get attached to each other through Inter process communication (ii) techniques through Internet sockets. There are different types of clients Fat cli ent, contract Client and crisscross Client.Fat ClientA expand client is also said to be rich client which stores bulk number of data and does not rely on data processing operations itself.Thin ClientA thin client is a minimal screen out of client. It requires resources from the host computer. It process data only provided by an application server.Hybrid ClientA hybrid client is combination of two fat and thin client. But relies on the server for storing the persistent data. Fat client supports (multimedia support, high performance) and thin client supports (high manageability, flexibility).10. BandwidthBandwidth is referred in bits, how m any(prenominal) bits of data are transferred per second in a connection. Higher bandwidth oftentimes translates into high performance, although general performance also depends on the other factors. Bandwidth can measured in units of bits per second(bps).11. Synchronous and asynchronous callsA synchronous call can be defined by call opens a socket and waits for a response earlier closing the socket. Using synchronous calls server can waste resources, and can timeout. Such as running a server upgrade or downloading a big file.When using Asynchronous calls can be defined by, the client sends the request and then immediately a response is direct to the specified callback server. A http 202 response is immediately returned from the HTTP connection that invoked the service.Asynchronous calls do not wait for a response to the close the socket. erst the service is complete, the response is sent to the specified callback server.12. Gossip ProtocolA gossip protocol is a method of communication now used in the modern days to deal out message. This is epidemic protocol sometimes pronounced as gossip protocol where the gossips spread the information in a manner similar to virus spread. Most often distributed systems use gossip protocol to solve the mighty difficulty problems because the network might be huge, because gossip sol utions are the easiest ones to spread the solutions.There are three prevailing types of Gossip protocolsDissemination ProtocolsThey basically work as a flooding agents in the network. It produces the worst case loads progeny dissemination protocols It uses high latency to report events. Gossips occurs periodically and the events dont trigger any gossip.Background data dissemination Protocols Constantly gossip about the information associated with the participating nodes. Latency isnt a concernAnti-entropy protocolsAnti-entropy protocols are used to pickle the replicate the data. By comparing the replicas and reconciling differences.Protocols that computes aggregates These compute the network-wide aggregates by take in the information at the nodes in the network and combing the values to arrive at a system-wide value- The largest value for some measurement nodes are making, the smallest and so on The key requirement is that the aggregate must be computable by fixed-size pair wise information exchanges these typically terminate the after a number rounds of information exchange logarithmic in the system size.13. meshwork Address TranslationNetwork address Translation (NAT) is the virtualization of internet protocol addresses. NAT is a process of remapping the IP address space into one another by modifying the network information in internet protocol. The technique was in the beginning used to improve security and decrease the number of IP addresses an musical arrangement needs. The more advanced implementations used in NAT are the Ip masquerading.Ip masquerading is also form of NAT which allows the internal computers with no known address foreign their networks, to communicate to the outside.14. MiddlewareMiddleware is defined as the software layer that is between the in operation(p) system and system applications and it can be found in both client and server machines. When two computers are getting communicated the middle ware hides the information of bo th computers to one another. The middleware also acts as a bridgework between the client and server. The middleware allows the client and server to communicate with each other so that there arent any issues such as incompatible OS, programs.15. DHCPDHCP (Dynamic host configuration protocol) is a client/server protocol. There is a DHCP server that will dynamically distribute network configuration parameters. It assigns the IP address to the network dynamically. When a client connects to a network, the DHCP clients sends a broadcast request a information. DHCP manages a pool of IP addresses and information about the client such as default gateway, domain name, name servers.A DHCP server can assign a new address whenever it wants based on administrator assignment policies.DHCP server have three methods of allocating IP address1) Dynamic allocation 2) Automatic allocation 3) Manual Allocation16.Inter-process communicationInter process communication is interfaces that allow programmer t o coordinate activates among different program processes that can run concurrently in a an run system. This allows program to handle many user requests at the same time. The single request may lead to multiple process running on this situation process needs to communicate each other. So IPC interfaces will take care.17.BluetoothBluetooth is a wireless technology was designed in 1994 by Ericsson. Bluetooth uses UHF radio waves which covers a short distances of ISM band from 2.4 gigacycle to 2.485 Ghz. It was the wireless alternative to RS-232 data cables. It uses a radio technology called frequency-hopping spread spectrum. Data is getting divided into packets and transmits each packets to designated Bluetooth channels. The channels bandwidth is of 1MHz.A Bluetooth device can connect up to maximum of 7 devices. It switches rapidly from one to another using a round robin scheduling algorithm.18.One time padOne time pad is an encryption technique. In this technique the actual message is converted into binary form and data is aggrandise with extra new random binary bits the logic is implemented along with it. When the process is done we should be having a new binary bits which is no longer similar to the original message or the padded bits. These bits are padded using XOR binary operator. The padding bits has to lengthy so decrypting will take a time. If its too short the padding can be easily decrypted.19.Authorization
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment