Assignment-1: Scalability: The Uncertain Trend in Distributed Systems Is Towards
Assignment-1: Scalability: The Uncertain Trend in Distributed Systems Is Towards
Q1. What is distributed system? Give the important goals to build the
distributed system.
A1. A distributed system contains multiple nodes that are physically separate
but linked together using the network. All the nodes in this system
communicate with each other and handle processes in tandem. There are two
general ways that distributed systems function:
1. Each machine works toward a common goal and the end-user views
results as one cohesive unit.
2. Each machine has its own end-user and the distributed system facilitates
sharing resources or communication services.
Distributed systems have endless use cases, a few being electronic banking
systems, massive multiplayer online games, and sensor networks.
There are various important goals that must be met to build a distributed
system worth the effort.
OSI Layer model has seven layers while TCP/IP model has four layers.
OSI Layer model is no longer used while TCP/IP is still used in computer
networking.
To define the functionality of upper layers, OSI uses three separate
layers (application, presentation and session) while TCP/IP uses a single
layer (application).
Mutual Exclusion
Mutual exclusion implies there should be a resource that can only be held by
one process at a time. This means that the resources should be non-sharable.
No preemption
A resource cannot be preempted from a process by force. A process can only
release a resource voluntarily.
Circular wait
A process is waiting for the resource held by the second process, which is
waiting for the resource held by the third process and so on, till the last process
is waiting for a resource held by the first process. This forms a circular chain.
Ignorance -ignore the problem; assume that a deadlock will never occur.
This is a common approach.
Detection - let a deadlock occur, detect it, and then deal with it by
aborting and later restarting a process that causes deadlock.
Q2. Define the term secret key cryptography with its characteristics.
A2. In secret-key cryptography, a sequence of bits, called the secret key, is used
as an input to a mathematical function to encrypt a plaintext message; the
same key is also used to decrypt the resulting ciphertext message and obtain
the original plaintext. Such cryptographic system, requiring the key to be
shared by both parties, is also known as symmetric-key cryptography.
Characteristics of secret key cryptography :
A3. Effective caching aids both content consumers and content providers. Some
of the benefits that caching brings to content delivery are:
Increased performance on the same hardware: For the server where the
content originated, more performance can be squeezed from the same
hardware by allowing aggressive caching.
Q6. Write short notes on Fault tolerant services & CORBA remote object
references.
An OS’s ability to recover and tolerate faults without failing can be handled by
hardware, software, or a combined solution leveraging load balancers. Some
computer systems use multiple duplicate fault tolerant systems to handle
CORBA includes its own root object class, because some object-programming
languages may have different inheritance structures. In the Java binding for
CORBA, all CORBA object references (local or remote) implement
the org.omg.CORBA.Object interface. So, when a client of a remote CORBA
object receives a stub for the object, it actually gets
an org.omg.CORBA.Object that serves as a proxy for the remote object.