DS - Chapter 1 and 2
DS - Chapter 1 and 2
1
SYSTEMS
Enhanced performance
Concurrency
Memory considerations: The distributed systems work on both local and shared
memory.
Synchronization issues
Applications must need to adapt gracefully without affecting other parts of the
systems in case of failures.
Since they are widespread, security is a major issue.
QOS parameters
The distributed systems must offer the following QOS:
Performance
Reliability
Availability
Security
Distributed Systems 3.3
Web Search
The task of a web search engine is to index the entire contents of the World Wide
Web.
Distributed search is a search engine model in which the tasks of Web crawling,
indexing and query processing are distributed among multiple computers and
networks.
The search engines were supported by a single supercomputer . But in recent years,
they have moved to a distributed model.
Google search relies upon thousands of computers crawling the Web from multiple
locations all over the world.
1.4 Introduction of Distributed System
The products that are connected to the pervasive network are easily available.
The main goal of pervasive computing is to create an environment where the
connectivity of devices is embedded in such a way that the connectivity is
unobtrusive and always available.
Internet can be seen as a large distributed system.
Internet Service Providers (ISPs) are companies that provide broadband links and
other types of connection to individual users and small organizations, enabling
them to access services anywhere in the Internet as well as providing local services
such as email and web hosting.
The intranets are linked together by backbones network link with a high
transmission capacity, employing satellite connections, fibre optic cables and other
high-bandwidth circuits.
Internet is now build into numerous small devices from laptops to watches.
These devices must have high degree of portability. Mobile computing supports
this.
They could connect tens/hundreds of They could connect a few devices for every
computing devices in every room/person, person, small enough to carry around –
becoming “invisible” and part of the devices connected to cellular networks or
environment – WANs, LANs, PANs – WLANs
networking in small spaces
They could connect even the non- mobile They are actually a subset of ubiquitous
devices and offer various forms of computing.
communication.
They could support all form of devices They support only conventional, discrete
that are connected to the internet from computers and devices.
laptops to watches.
1.8 Introduction of Distributed System
Mobile (cellular) telephone connected to the Internet. The phone gives access
to the Web and other Internet services.
Digital camera that communicates over a personal area wireless network.
This scenario demands associations between devices are routinely created and
destroyed called as spontaneous interoperation. This interoperation must be fast
and convenient.
A distributed multimedia system should be able to perform the same functions for
continuous media types such as audio and video.
It should be able to store and locate audio or video files, to transmit them across
thenetwork to support the presentation of the media types to the user and
optionally also to share the media types across a group of users.
The processing of such media files includes handling of temporal dimensions and
integrity of media.
The distributed multimedia computing allows a wide range of new multimedia
services and applications to be provided on the desktop.
Distributed Systems 3.9
Transparency Description
Relocation Hide that a resource may be moved to another location while in use
e) Security
Every system must consider strong security measurement. Distributed Systems
somehow deals with sensitive information; so secure mechanism must be in place. The
foolowing attacks are more common in distributed systems:
Denial of service attacks: When the requested service is not available at the time
of request it is Denial of Service (DOS) attack. This attack is done by bombarding
the service with a large number of useless requests that the serious users are unable
to use it.
Distributed Systems 3.13
Security of mobile code: Mobile code needs to be handled with care since they
are transmitted in an open environment.
f) Scalability
Distributed systems must be scalable as the number of user increases.
Size: Number of users and resources to be processed. Problem associated with this
is overloading.
Masking failures: Some failures that have been detected can be hidden or
made less severe. Examples of hiding failures include retransmission of
messages and maintaining a redundant copy of same data.
Tolerating failures: All the failures cannot be handled. Some failures must be
accepted by the user. Example of this is waiting for a video file to be streamed
in.
1.14 Introduction of Distributed System
Recovery from failures: Recovery involves the design of software so that the
state of
permanent data can be recovered or rolled back after a server has crashed.
Redundancy: Services can be made to tolerate failures by the use of redundant
components. Examples for this includes: maintenance of two different paths
between same source and destination.
Availability is also a major concern in the fault tolerance. The availabilityof a
system is a measure of the proportion of time that it is available for use. It is a
useful performance metric.
h) Quality of Service:
The distributed systems must confirm the following non functional requirements:
Reliability:A reliable distributed system is designed to be as fault tolerant as
possible. Reliability is the quality of a measurement indicating the degree to
which the measure is consistent.
Security: Security is the degree of resistance to, or protection from, harm. It
applies to any vulnerable and valuable asset, such as a person, dwelling,
community, nation, or organization. Distributed systems spread across wide
geographic locations. So security is a major concern.
Adaptability:The frequent changing of configurations and resource
availability demands the distributed system to de highly adaptable.
The Web gradually grew worldwide encompassing sites other than high energy
physics, but popularity really increased when graphical user interfaces became
available, notably Mosaic (Vetter et al., 1994).
A document was fetched from a server, transferred to a client, and presented on the
screen.
Since 1994, Web developments are primarily initiated and controlled by the World
Wide Web Consortium, which is a collaboration between CERN and M.I.T.
HTML
One of its most powerful features is the ability to express parts of a document
in the form of a script.
XML can be used to define arbitrary structures. In other words, it provides the
means to define different document types.
1.16 Introduction of Distributed System
The pages of a website can usually be accessed from a simple Uniform Resource
Locator (URL) otherwise called as web address.
Absolute URL:
Absolute URL is a complete address of a resource on the web. This completed
address comprises of protocol used, server name, path name and file name.
Example: http:// www.abc.com / xyz /index.htm.
http is the protocol.
abc.com is the server name.
index.htm is the file name.
The protocol part tells the web browser how to handle the file. Other protocols
also that can be used to create URL are: FTP, https, Gophe, mailto, news
Relative URL
Relative URL is a partial address of a webpage. Unlike absolute URL, the
protocol and server part are omitted from relative URL. Relative URLs are used
for internal links i.e. to create links to file that are part of same website as the
WebPages on which you are placing the link.
Example:
To link an image on abc.com/xyz/internet_referemce_models, we can use the
relative URL which can take the form like /internet_technologies/internet-
osi_model.jpg.
Distributed Systems 3.17
Web services
Web services allow exchange of information between applications on the web.
Using web services, applications can easily interact with each other.
The web services are offered using concept of Utility Computing.
Distributed Systems 3.19
REVIEW QUESTIONS
PART-A
1. Define centralized computing.
The process of computation was started from working on a single processor. This uni-
processor computing can be termed as centralized computing.
Enhanced performance
Concurrency
Memory considerations: The distributed systems work on both local and shared
memory.
Synchronization issues
Applications must need to adapt gracefully without affecting other parts of the
systems in case of failures.
Since they are widespread, security is a major issue.
1.20 Introduction of Distributed System
Works on a programming model that supports the management of large parallel and
distributed computations.
Distributed Systems 3.21
9. What is MMOG?
These games simulate real-life as much as possible. As such it is necessary to
constantly evolve the game world using a set of laws.These laws are a complex set of
rules that the game engine applies with every clock tick
14. Give the differences between ubiquitous computing and mobile computing
Tolerating failures: All the failures cannot be handled. Some failures must be accepted
by the user. Example of this is waiting for a video file to be streamed in.
Recovery from failures: Recovery involves the design of software so that the state of
permanent data can be recovered or rolled back after a server has crashed.
Redundancy: Services can be made to tolerate failures by the use of redundant
components. Examples for this includes: maintenance of two different paths between
same source and destination.
PART – B
1. What are the issues in distributed systems?
2. Explain web search as a distributed system.
3. Brief about MMOGs.
4. Describe financial trading.
5. Explain the trends in distributed systems.
6. Elucidate the resource sharing nature of distributed system.
7. Brief about the challenges in distributed system.
8. Describe WWW.
9. Explain HTML.