Tuesday, June 4, 2019

Distributed Systems Definitions

Distributed Systems DefinitionsDistributed SystemsThere is always compromise when we use distributed systems. Being a distributed systems expertise means knowing the best compromise to make.There is no global clock.Distributed systems definition A distributed systems is defined as a collection of nonparasitic computers that appears to its users as single coherent system.Softwargon systems that operate on more than one computerInternet, Intranet. Mobile computation, Wireless and other modern technologies.Distributed Systems areasParallel computingGrid computingCluster computingDistributed computingMotivation for distributed systemsResources sharingGeographical and legacy reasonsFlexibilityScalabilityRobustnessSecuritySystem DesignDistributed permeative SystemsRequirements for pervasive systemsWireless, small, battery poweredDiscover environment.Embrace contextual changes.Encourage ad hoc compositionRecognize sharing as the defaultPersonal put vs. shared spaceNo central admin1.Dist ributed SystemsA distributed systems is defined by collection of autonomous independent systems that shown to users as a single system via through and through interlock. The characteristics of distributed system are multiple autonomous components which are not all shared by the users. Resources butt jointnot be shared to all the users. Software running on the system is concurrent on different passageors. In which happened to be multiple point of control and multiple points of failure. Some common characteristics can be achieved use distributed systems resource sharing, openness, concurrency, scalability, fault tolerance, transparency. Types of distributed systems include distributed computing systems, distributed informative systems, distributed pervasive systems.2.Transmission Control protocolTransmission Control Protocol totally depends on network radio link to transfer data, TCP requires nexus between client and emcee, It does like a three way handshake. host A sends a SYN to B, B sends a SYN and ACK and Host A sends a ACK to B then TCP connection is established. I use this as reference http//www.inetdaemon.com/tutorials/internet/tcp/3-way_handshake.shtml.3.User Datagram ProtocolUser Datagram protocol is connectionless. It does not check if the packets are received are not and there is no guaranteed connection. There is chance in packet loss during transmission, more unreliable way to send data. The advantage is speed and cost free. UDP mostly used in online gaming which uses more interaction and respond quickly from player, video drift like YouTube, twitch4.Lamport Bakery AlgorithmLesile Lamports bakery algorithm is designed for the safety purpose of using shared resources between multiple threads by mutual exclusion. There will be a global counter that displays the digit threads being served. The remaining threads lose to wait in the line. When the thread completes its process the next thread being served. There are some limitations in the analogy. Its is possible that more than one thread have comparable number and when they request it. Request cannot be providedSo to clear this limitation individually thread is provided with a priority. The priority is based on the lower mensurate or higher value then thread will enter the critical section.Critical sectionThe critical section requires immediate attention overture to resources and only be executed one thread at a time. When a thread enters a critical section, Its has to have its turn and must have smallest number because in case the other threads have the selfsame(prenominal) number the smallest will be executed first.5.Remote Procedure Call(RPC)Remote procedure foreshadow is based on the client and server model. The client machine sends the data to the server machine based on request from user its is a coetaneous operation that requires suspend the current broadcast until the RPC is returned. Its a light weight process so multiple RPC can be performed at the same time.RPC Is like a occasion call, the calling arguments are passed through to the remote procedure and the caller waits for the response from the remote procedure. The RPC is made between two networked systems. A thread can be blocked until either a request or reply is arrived or it will time out. When the request is received the server will send a dispatch routine that performs the requested services and sends the client a reply.6. Internet ProtocolsInternet protocols are used for computer communication and also used to position a computers address. An IP address as a 32 bit number and this called as IPV4 the development of IPV6 is predicted that depletion of available addresses. So IPV6 uses 128 bits for a address.IPV4 example 172.16.254.1 (IPV4) and 2001db801234056781 (IPv6).7. SynchronizationSynchronization policy is not to go into deadlock condition. Consider multiple process tries to access resources which is in the distributed environment. The synchronicity process i s to handle all the requests from the process and seize them the resources based on the priority requested client and with pre-defined conditions synchronizing the clients with their request without going into deadlock condition.8. serverA server is a computer programs that runs in a computer or other computer and it provides other computer to connect through via network. A computer that usually runs server program are usually the server. If it run every time then it usually called the dedicated server. In client/server program the server program always waits and fulfills the client request. The few types of servers from other number of possibilitiesApplication ServerIts in the distributed networks that provide the business logic for an employment program.Proxy ServerA proxy server is packet that acts as a mediator between endpoint devices such as computer and a client and other server from which a user or client requesting a service.Virtual ServerA virtual server is a program t hat usually runs on the shared server. The way it seems to each user that they have the complete control over the server.Policy ServerPolicy server is a security component which has a policy based network that provides authorization services and facilitates tracking and control of files.9. ClientA client is a computer that retrieves information from or users resources provided by the server or main computer. Web browsers are clients that connect to the web servers and retrieve web pages for display same as email clients and multiplayer video games.A client is a part of client-server architecture and client and servers are computer programs that may be run in the same computer and get connected to each other through Inter process communication (ii) techniques through Internet sockets. There are different types of clients fatten out client, Thin Client and Hybrid Client.Fat ClientA fat client is also said to be rich client which stores bulk number of data and does not rely on data pr ocessing operations itself.Thin ClientA tailor client is a minimal sieve of client. It requires resources from the host computer. It process data only provided by an application server.Hybrid ClientA hybrid client is combination of both fat and thin client. But relies on the server for storing the persistent data. Fat client supports (multimedia support, high performance) and thin client supports (high manageability, flexibility).10. BandwidthBandwidth is referred in bits, how many bits of data are transferred per second in a connection. Higher bandwidth often translates into high performance, although overall performance also depends on the other factors. Bandwidth can measured in units of bits per second(bps).11. Synchronous and Asynchronous callsA synchronous call can be defined by call opens a socket and waits for a response before closing the socket. Using synchronous calls server can waste resources, and can timeout. Such as running a server upgrade or downloading a big file .When using Asynchronous calls can be defined by, the client sends the request and then immediately a response is sent to the specified callback server. A http 202 response is immediately returned from the HTTP connection that invoked the service.Asynchronous calls do not wait for a response to the close the socket.Once the service is complete, the response is sent to the specified callback server.12. rattle on ProtocolA chat protocol is a method of communication now used in the modern days to revolve subject matter. This is epidemic protocol sometimes pronounced as gossip protocol where the gossips spread the information in a manner similar to virus spread. Most often distributed systems use gossip protocol to solve the mighty difficulty problems because the network might be huge, because gossip solutions are the easiest ones to spread the solutions.There are three prevailing types of Gossip protocolsDissemination ProtocolsThey basically work as a flooding agents in the network . It produces the worst case loadsEvent dissemination protocols It uses high latency to score events. Gossips occurs periodically and the events dont trigger any gossip.Background data dissemination Protocols Constantly gossip about the information associated with the participating nodes. Latency isnt a concernAnti-entropy protocolsAnti-entropy protocols are used to repair the replicate the data. By comparing the replicas and reconciling differences.Protocols that computes aggregates These compute the network-wide aggregates by sampling the information at the nodes in the network and combing the set to arrive at a system-wide value- The largest value for some measurement nodes are making, the smallest etc. The key requirement is that the aggregate must be computable by fixed-size pair wise information exchanges these typically terminate the after a number rounds of information exchange logarithmic in the system size.13. Network lot TranslationNetwork address Translation (NAT) is the virtualization of internet protocol addresses. NAT is a process of remapping the IP address space into one another by modifying the network information in internet protocol. The technique was originally used to improve security and decrease the number of IP addresses an organization needs. The more advanced implementations used in NAT are the Ip masquerading.Ip masquerading is also form of NAT which allows the internal computers with no known address outside their networks, to communicate to the outside.14. MiddlewareMiddleware is defined as the software layer that is between the operating system and system applications and it can be found in both client and server machines. When two computers are getting communicated the middle ware hides the information of both computers to one another. The middleware also acts as a bridge between the client and server. The middleware allows the client and server to communicate with each other so that there arent any issues such as incompatib le OS, programs.15. DHCPDHCP (Dynamic host configuration protocol) is a client/server protocol. There is a DHCP server that will dynamically distribute network configuration parameters. It assigns the IP address to the network dynamically. When a client connects to a network, the DHCP clients sends a broadcast request a information. DHCP manages a pool of IP addresses and information about the client such as default gateway, domain name, name servers.A DHCP server can assign a new address whenever it wants based on administrator assignment policies.DHCP server have three methods of allocating IP address1) Dynamic allocation 2) automatic rifle allocation 3) Manual Allocation16.Inter-process communicationInter process communication is interfaces that allow programmer to coordinate activates among different program processes that can run concurrently in a an operating system. This allows program to handle many user requests at the same time. The single request may lead to multiple pro cess running on this situation process needs to communicate each other. So IPC interfaces will take care.17.BluetoothBluetooth is a wireless technology was designed in 1994 by Ericsson. Bluetooth uses UHF radio waves which covers a short distances of ISM band from 2.4 Ghz to 2.485 Ghz. It was the wireless alternative to RS-232 data cables. It uses a radio technology called frequency-hopping spread spectrum. Data is getting divided into packets and transmits each packets to designated Bluetooth channels. The channels bandwidth is of 1MHz.A Bluetooth device can connect up to maximum of 7 devices. It switches rapidly from one to another using a round robin scheduling algorithm.18.One time padOne time pad is an encryption technique. In this technique the actual message is converted into binary form and data is padded with extra new random binary bits the logic is implemented along with it. When the process is done we should be having a new binary bits which is no longer similar to the o riginal message or the padded bits. These bits are padded using XOR binary operator. The blow up bits has to lengthy so decrypting will take a time. If its too short the padding can be easily decrypted.19.Authorization

No comments:

Post a Comment