Lecture 2 - Distributed Systems Models
Lecture 2 - Distributed Systems Models
1
Presentation Outline
Introduction
Physical Models:
Three Generations of DS: Early, Internet-Scale, Contemporary
Architectural Models
Software Layers
System Architectures
Client-Server
Clients and a Single Server, Multiple Servers, Proxy Servers with Caches, Peer
Model
Alternative Client-Sever models driven by:
Mobile code, mobile agents, network computers, thin clients, mobile devices,
and spontaneous networking
Design Challenges/Requirements
Fundamental Models – formal description
Interaction, failure, and security models.
Summary
2 2
Introduction
4 4
Characterization: Challenges
(Difficulties and Threats)
5 5
Characterization: Dealing with Challenges
Observations
Widely varying models of use
The structure and the organization of systems allow for distribution
of workloads, redundant services, and high availability.
Wide range of system environments
A flexible and modular structure allows for implementing different
solutions for different hardware, OS, and networks.
Internal problems
The relationship between components and the patterns of
interaction can resolve concurrency issues, while structure and
organization of component can support failover mechanisms.
External threats
Security has to be built into the infrastructure and it is fundamental
for shaping the relationship between components.
6 6
Architectural model
7 7
Fundamental Models
9
Physical Models
Software Layers
System Architectures
Interfaces and Objects
Design Requirements
11
Architectural Models – Intro [1]
12 12
Architectural Models – Intro [2]
peer
peer
13 peer
peer
13
a) Software Architecture and Layers
Layer N
Layer 2
Layer 1
14 14
Software and hardware service layers in
distributed systems
Applications, services
Middleware
Operating system
Platform
15 15
Platform
16 16
Middleware
17 17
b) System Architecture
18 18
Client Server Basic Model:
Clients invoke individual servers
result result
Server
Client
Key:
Process: Computer:
client
client server
server
client
client Server/client
Server/client server
server
client
client Server/client
Server/client Server/client
Server/client
server
server
20 20
Clients and Servers
21 21
A service provided by multiple servers
Service
Server
Client
Server
Client
Server
22 22
Proxy servers (replication transparency) and
caches: Web proxy server
Client Web
server
Proxy
server
Client Web
server
23 23
Peer Processes: A distributed application based
on peer processes
Peer 2
Peer 1
Application
Application
Sharable Peer 3
objects
Application
Peer 4
Application
Peers 5 .... N
peer
peer
peer
peer
peer
peer
peer
peer
peer
peer
peer
peer
peer
peer
25 25
Variants of Client Sever Model: Mobile code
and Web applets
a) client request results in the downloading of applet code
Client Web
Applet code server
Web
Client Applet server
27 27
Thin clients and compute servers
Compute server
Network computer or PC
28 28
Mobile devices and spontaneous networking
[3rd Generation Distributed System]
30 30
d) Design Requirements/Challenges of Distributed
Systems
Performance Issues
Responsiveness
Quality of Service:
Reliability
Security
Adaptive performance.
Dependability issues:
Correctness, security, and fault tolerance
31 31
3. Fundamental Models
Interaction models
Failure model
Security model
32
Fundamental models
processes
Security Model – discusses possible threats to processes and
communication channels.
33 33
Fundamental models Contd…
34 34
a) Interaction Model
35 35
Interaction Model:
Performance of Communication Channel
36 36
Interaction Model:
Computer clocks and timing events
37 37
Interaction Model:
Two variants of the interaction model
38 38
Interaction Model:
Event Ordering
39 39
b) Failure Model
40 40
Processes and channels
process p process q
send m receive
Communication channel
Outgoing message buffer Incoming message buffer
42 42
Timing failures
43 43
Masking Failures
44 44
c) Security Model
45 45
Protecting Objects: Objects and principals
Access rights Object
invocation
Client
result Server
46 46
The enemy
Copy of m
The enemy
m’
Processp m Processq
Communication channel
47 47
Defeating security threats: Secure channels
PrincipalA PrincipalB
49 49
Review Questions
50 50
Review Nov 18
51 51