SlideShare a Scribd company logo
1 of 34
ARYA GROUP OF COLLEGES
UNIT V
Distributed System
By
rashi Jain
Assistant Professor
Computer Science ENGG. Department
Acerc, Jaipur
RTU syllabus Of UNIT V
๏‚— Distributed Agreement: Concept of
Faults, failure and recovery, Byzantine
Faults, Adversaries, Byzantine
Agreement, Impossibility of Consensus
and Randomized Distributed Agreement
๏‚— Replicated Data Management: concepts
and issues, Database Techniques,
Atomic multicast and Update
Propagation.
๏‚— CORBA case study: Introduction,
Architecture, CORBA RMI,CORBA
Lecture Plan of Unit V
๏‚— Concepts of faults ,failure and recovery
๏‚— Fault Classification Lecture
1
๏‚— failure models in distributed system
๏‚— Recovery in Distributed system
๏‚— Byzantine faults
๏‚— Adversaries
๏‚— Byzantine Agreement Lecture 2
๏‚— Impossibility of Consensus
๏‚— Randomized Distributed Agreement
๏‚— Exponential time shared memory consensusLecture 3
๏‚— Polynomial time shared memory consensus
๏‚— Message passing Randomized consensus
Lecture Plan of Unit V(Cont..)
๏‚— Memory management Algorithm
๏‚— Replicated data management
Lecture 4
๏‚— Concepts and Issues
๏‚— Database Techniques
๏‚— Atomic multicast
๏‚— Update Propagation
๏‚— Epidemic Algorithm Lecture 5
๏‚— Antientropy
๏‚— Update Logs
๏‚— Case study : CORBA
Lecture 6
Concept of Fault, Failure &
Recovery
๏‚— Definition:
โ—ฆ Fault tolerance is the ability of a system to
perform its function correctly even in the
presence of internal faults.
๏‚— The concept of fault, failure & Recovery
is described by using following points.
โ—ฆ Fault Classification
โ—ฆ Failure model in distributed system
โ—ฆ Recovery in Distributed system.
Fault Classification
๏‚— Fault can be classified as transient or
permanent.
๏‚— A transient fault will eventually disappear
without any apparent intervention.
๏‚— A permanent one will remain unless it is
removed by some external agency.
๏‚— Classification of faults
โ—ฆ Crash Fault
โ—ฆ Omission fault
โ—ฆ Timing Fault
โ—ฆ Byzantine fault
Failure Model in Distributed
System
๏‚— Definition
โ—ฆ It define a precise specification of the faults
that can be exhibited by processes and
communication channels.
โ—ฆ Omission Failure
โ—ฆ Timing Failure
โ—ฆ Arbitrary Failure
Recovery In Distributed
System
๏‚— Definition
โ—ฆ A transaction processing system will go through
a recovery of the database to cope when the
system fails, it involves the backup, journals,
checkpoint and recovery manager.
๏‚— Types of Recovery Techniques:
โ—ฆ Journal: A journal maintain an audit trail of
transaction and database changes.
โ—ฆ Checkpoint: It is to provide a snapshot of the
data within the database.
โ—ฆ Recovery Manager: A recovery manager is a
program which restores the database to a
correct condition which can restart the
transaction processing.
Byzantine Faults
๏‚— Definition:
โ—ฆ A Byzantine fault is an arbitrary fault that
occur during execution of an algorithm by a
distributed system.
๏‚— It encompasses both omission failures
and commission failure.
๏‚— When a byzantine fault has occurred
the system may respond in any
unpredictable way, unless it is designed
to have byzantine fault tolerance.
Adversaries
๏‚— Definition:
โ—ฆ An adversary is a demon that has a great
deal of control over the environment in
which your protocol executes and will try to
make your protocol fail.
๏‚— The adversary has the power to
examine the global state and to
schedule the execution of the protocol.
๏‚— Adversary is the ability to destroy or
modify message and change the
protocol that some of the processors
execute.
Byzantine Agreement
๏‚— Definition:
โ—ฆ It refers to distributed agreement
algorithm in which a failed processor can
send arbitrary message into the network.
โ—ฆ A failed processor can try to prevent the
nonfailed processor from reaching an
agreement.
Impossibility Of Consensus
๏‚— Consensus is the task of getting all
processes in a group to agree on some
specific value based on the votes of
each processes.
๏‚— The impossibility result depend
completely on the fact that the
distributed system is asynchronous.
While processor can fail the system is
otherwise reliable.
Randomized Distributed
Agreement
๏‚— A randomized algorithm is one which
contains an assignment to a variable
based on the outcome of tossing a fair
coin or a random number generator.
๏‚— The randomized distributed agreement
can be described by using some point
that is as follows.
โ—ฆ Exponential Time Shared memory
Consensus.
โ—ฆ Polynomial Time Shared memory
Consensus.
โ—ฆ Message Passing Randomized Consensus.
Randomized Distributed Agreement(Cont..)
๏‚— Exponential Time Shared memory Consensus:
โ—ฆ It is simple-minded approach to writing a
consensus protocol in a shared memory
system.
โ—ฆ We initialize by choosing a value to prefer,
Vp we look at the value preferred by every
other processors {Vj}. If all other processors
have the same value Vi =Vp, we decide on
value Vp. Otherwise we flip a coin and set
Vp to the value of the coin Flip.
Polynomial Time Shared memory
Consensus
๏‚— This protocol make it that every processor
obtains the same value on its flip() on a
given round r.
๏‚— If every processor obtain the same value
for flip() on an arbitrary round r will
probability at least Psame, the
SM_Consensus protocol will require
O(1/Psame) rounds.
๏‚— If Psame is independent of N, only an
expected constant number of round are
required. So it is worthwhile to spend a fair
amount of effort to get every processor to
flip the same coin.
Message Passing Randomized
Consensus
๏‚— It is similar to the shared memory
consensus protocol except shared
variable is the V array.
๏‚— The element V[i] is written to by
processor i only and is read by every
other processor. So array V makes
shared memory look like a broadcast
medium.
๏‚— A naive translation of the
SM_consensus protocol to the
MP_consensus protocol is o
broadcast all updates.
Memory Management Algorithm
๏‚— Definition
โ—ฆ In multiprogramming system, to share the
processor with a number of processes
that must be kept in memory. These
memory management is achieved through
memory management algorithms.
๏‚— Methods of Memory Management:
โ—ฆ Fixed Partitioning
โ—ฆ Variable Partitioning
โ—ฆ Paging
โ—ฆ Segmentation
Memory Management Algorithm(Cont..)
๏‚— Fixed Partitioning
โ—ฆ In this method, memory is divided into
partitions whose sizes are fixed.
Operating system is placed into the lowest
bytes of the memory. Processes are
classified on entry of the system
according to their memory they
requirements.
(nkB)
(3nkB)
(6nkB)
Operating System
Small
Medium
Large
Memory Management Algorithm(Cont..)
๏‚— Variable Partitioning
โ—ฆ In it, the memory size may vary
dynamically.
โ—ฆ In it, we keep a table(linked list) indicating
used/free areas in memory.
๏‚— There are three algorithms for
searching the list of free blocks for a
specific amount of memory.
โ—ฆ First Fit: Allocate the first free block that is
large enough for the new process. This is
the fast algorithm.
โ—ฆ Best Fit
Memory Management Algorithm(Cont..)
๏‚— Paging
โ—ฆ Paging permit a program to allocate
noncontiguous blocks of memory. The OS
divide the program into pages which are
blocks of small and fixed size. Then it divide
the physical memory into frames which are
block of size equals to page size.
๏‚— The OS uses a page table to map
program pages to memory frames.
Replicated Data Management
๏‚— Definition
โ—ฆ Replication is the process of copying &
maintaining database objects in multiple
database that make up a distributed
database system.
โ—ฆ Replication can improve the performance &
protect the availability of application because
alternate data access option exist.
๏‚— The replicated data management is
described by using some point.
โ—ฆ Concept & Issues
โ—ฆ Database Techniques
โ—ฆ Atomic Multicast
โ—ฆ Update Propagation
Replicated Data Management(Cont..)
๏‚— Concept & Issues:
โ—ฆ Basic replication environment support
application that require read-only access to
the table data that originates from a primary
site.
๏‚— The concept of basic replication
environments
โ—ฆ Use of basic replication
๏‚– Information distribution, off loading & Information
transport.
โ—ฆ Read-only table snapshots
๏‚– It is a local copy of table data that originates from
one or more remote master tables.
โ—ฆ Snapshots Refreshes
๏‚– A table snapshot is a transaction- consistent
reflection of its master data as that data existed at a
specific point in time.
Replicated Data Management(Cont..)
๏‚— Database Techniques:
โ—ฆ It is a technique that are used for managing
replicated data, that is called database
techniques.
๏‚— It will examine the fundamentals
algorithms for maintaining data
consistency in a distributed database.
๏‚— Types of Database techniques:
โ—ฆ Database logging & Recovery
โ—ฆ Two-phase Commit
โ—ฆ Three-phase Commit
โ—ฆ Replicated-Data- Management
โ—ฆ Dynamic Quorum Changes
Atomic Multicast
๏‚— Definition:
โ—ฆ If one processor on the delivery list
receives a reliable multicast messages,
every processor on the delivery list
receives the message.
๏‚— Some point to describe the Atomic
multicast.
โ—ฆ Virtual Synchrony
โ—ฆ Ordered Multicasts
โ—ฆ Reliable & Casual multicast
โ—ฆ Group Membership
โ—ฆ Atomic group multicasts.
Update Propagation
๏‚— The use of update propagation is to
replicate the database it manages.
๏‚— Updates need to be propagated to all
sites.
๏‚— The update propagation can be
described by using some point that is
as follows.
โ—ฆ Epidemic Algorithms
โ—ฆ Antientropy
โ—ฆ Update Logs
Update Propagation(Cont..)
๏‚— Epidemic Algorithms
โ—ฆ When a server updates a data items d, it
should start the process of distributing the
update.
๏‚— Antientropy:
โ—ฆ A distributing updates is to have one site
contact another to exchange recent updates,
that is called Antientropy.
๏‚— Update Logs
โ—ฆ Every processor p keeps a log L of the
updates that it has processed. The log is an
listing of event records, where each event
corresponding to an update.
Case Study: CORBA
๏‚— Definition
โ—ฆ CORBA is a middleware design that
allows application programs to
communicate with one another
irrespective of their programming
language, their hardware and software
platforms, the networks they communicate
over and their implementers.
โ—ฆ Applications are built from CORBA
objects, which implement interfaces
defined in CORBAโ€™s interface definition
language.
Case Study: CORBA(Cont..)
๏‚— The Common object Request Broker
architecture is described as follows:
โ—ฆ Architecture
โ—ฆ CORBA RMI
โ—ฆ CORBA Services
Case Study: CORBA(Cont..)
๏‚— Architecture of CORBA:
โ—ฆ It designed to support the role of an object
request broker that enables clients to
invoke methods in remote objects, where
both clients and server can be
implemented in a variety of programming
language.
Case Study: CORBA(Cont..)
๏‚— In the CORBA architecture contains
three additional components:
โ—ฆ The object adapter
โ—ฆ The implementation Repository
โ—ฆ The interface Repository
๏‚— CORBA provides for both static &
Dynamic invocations.
โ—ฆ Static invocation are used when the remote
interface of the CORBA object is known at
compile time, enabling client stub & Server
skeleton to be used.
โ—ฆ If the remote interface is not known at
compile time, dynamic invocation must be
Case Study: CORBA(Cont..)
๏‚— Object Adapter:
โ—ฆ The role of an object adapter is to bridge
the gap between CORBA objects with IDL
interfaces and the programming language
interface of the corresponding servant
classes.
๏‚— Skeleton:
โ—ฆ Skeleton classes are generated in the
language of the server by an IDL
compiler. The skeleton unmarshals the
arguments in request messages and
marshals exception and result in reply
messages.
Case Study: CORBA(Cont..)
๏‚— Client Stub:
โ—ฆ In the client language, a set of stub
procedures is generated from an IDL
interfaces by an IDL compiler for the client
language.
๏‚— Implementation Repository:
โ—ฆ It is responsible for activating registered
servers on demand and for locating servers
that are currently running.
โ—ฆ The object adapter name is used to refer to
servers when registering and activating them.
๏‚— Interface Repository
โ—ฆ It is to provide information about registered
Case Study: CORBA(Cont..)
๏‚— CORBA RMI:
โ—ฆ CORBA RMI requires more of the
programmer than programming in a single
language RMI system such as Java RMI.
๏‚— CORBA Services:
โ—ฆ CORBA naming Services
โ—ฆ CORBA Event Services
โ—ฆ CORBA notification Services
โ—ฆ CORBA Security Services.
Thank You

More Related Content

Similar to 6CS5_DS_Unit-5.pptx

Chapter 9 OS
Chapter 9 OSChapter 9 OS
Chapter 9 OSC.U
ย 
Replication in Distributed Real Time Database
Replication in Distributed Real Time DatabaseReplication in Distributed Real Time Database
Replication in Distributed Real Time DatabaseGhanshyam Yadav
ย 
Operating system
Operating systemOperating system
Operating systemHussain Ahmady
ย 
Os solved question paper
Os solved question paperOs solved question paper
Os solved question paperAnkit Bhatnagar
ย 
Google File System
Google File SystemGoogle File System
Google File SystemDreamJobs1
ย 
Operating system memory management
Operating system memory managementOperating system memory management
Operating system memory managementrprajat007
ย 
Coa presentation5
Coa presentation5Coa presentation5
Coa presentation5rickypatel151
ย 
Memory Management
Memory ManagementMemory Management
Memory ManagementShipra Swati
ย 
UNIT-2 OS.pptx
UNIT-2 OS.pptxUNIT-2 OS.pptx
UNIT-2 OS.pptxssusera387fd1
ย 
Chapter 2 part 1
Chapter 2 part 1Chapter 2 part 1
Chapter 2 part 1rohassanie
ย 
Introduction to Operating System (Important Notes)
Introduction to Operating System (Important Notes)Introduction to Operating System (Important Notes)
Introduction to Operating System (Important Notes)Gaurav Kakade
ย 
Distributed systems and scalability rules
Distributed systems and scalability rulesDistributed systems and scalability rules
Distributed systems and scalability rulesOleg Tsal-Tsalko
ย 
Dos unit3
Dos unit3Dos unit3
Dos unit3JebasheelaSJ
ย 
Memory allocation for real time operating system
Memory allocation for real time operating systemMemory allocation for real time operating system
Memory allocation for real time operating systemAsma'a Lafi
ย 
Software for embedded systems complete
Software for embedded systems completeSoftware for embedded systems complete
Software for embedded systems completeAnand Kumar
ย 
Processscheduling 161001112521
Processscheduling 161001112521Processscheduling 161001112521
Processscheduling 161001112521marangburu42
ย 
Processscheduling 161001112521
Processscheduling 161001112521Processscheduling 161001112521
Processscheduling 161001112521marangburu42
ย 
SO-Memoria.pdf
SO-Memoria.pdfSO-Memoria.pdf
SO-Memoria.pdfKadu37
ย 
SO-Memoria.pdf
SO-Memoria.pdfSO-Memoria.pdf
SO-Memoria.pdfssuser143a20
ย 

Similar to 6CS5_DS_Unit-5.pptx (20)

Chapter 9 OS
Chapter 9 OSChapter 9 OS
Chapter 9 OS
ย 
Replication in Distributed Real Time Database
Replication in Distributed Real Time DatabaseReplication in Distributed Real Time Database
Replication in Distributed Real Time Database
ย 
Operating system
Operating systemOperating system
Operating system
ย 
Os solved question paper
Os solved question paperOs solved question paper
Os solved question paper
ย 
Google File System
Google File SystemGoogle File System
Google File System
ย 
Operating system memory management
Operating system memory managementOperating system memory management
Operating system memory management
ย 
Coa presentation5
Coa presentation5Coa presentation5
Coa presentation5
ย 
Memory Management
Memory ManagementMemory Management
Memory Management
ย 
UNIT-2 OS.pptx
UNIT-2 OS.pptxUNIT-2 OS.pptx
UNIT-2 OS.pptx
ย 
Chapter 2 part 1
Chapter 2 part 1Chapter 2 part 1
Chapter 2 part 1
ย 
Introduction to Operating System (Important Notes)
Introduction to Operating System (Important Notes)Introduction to Operating System (Important Notes)
Introduction to Operating System (Important Notes)
ย 
Distributed systems and scalability rules
Distributed systems and scalability rulesDistributed systems and scalability rules
Distributed systems and scalability rules
ย 
Dos unit3
Dos unit3Dos unit3
Dos unit3
ย 
Memory allocation for real time operating system
Memory allocation for real time operating systemMemory allocation for real time operating system
Memory allocation for real time operating system
ย 
Software for embedded systems complete
Software for embedded systems completeSoftware for embedded systems complete
Software for embedded systems complete
ย 
Processscheduling 161001112521
Processscheduling 161001112521Processscheduling 161001112521
Processscheduling 161001112521
ย 
Processscheduling 161001112521
Processscheduling 161001112521Processscheduling 161001112521
Processscheduling 161001112521
ย 
SO-Memoria.pdf
SO-Memoria.pdfSO-Memoria.pdf
SO-Memoria.pdf
ย 
SO-Memoria.pdf
SO-Memoria.pdfSO-Memoria.pdf
SO-Memoria.pdf
ย 
Module3 part1
Module3 part1Module3 part1
Module3 part1
ย 

Recently uploaded

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7Call Girls in Nagpur High Profile Call Girls
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .DerechoLaboralIndivi
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
ย 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
ย 

Recently uploaded (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
ย 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 

6CS5_DS_Unit-5.pptx

  • 1. ARYA GROUP OF COLLEGES UNIT V Distributed System By rashi Jain Assistant Professor Computer Science ENGG. Department Acerc, Jaipur
  • 2. RTU syllabus Of UNIT V ๏‚— Distributed Agreement: Concept of Faults, failure and recovery, Byzantine Faults, Adversaries, Byzantine Agreement, Impossibility of Consensus and Randomized Distributed Agreement ๏‚— Replicated Data Management: concepts and issues, Database Techniques, Atomic multicast and Update Propagation. ๏‚— CORBA case study: Introduction, Architecture, CORBA RMI,CORBA
  • 3. Lecture Plan of Unit V ๏‚— Concepts of faults ,failure and recovery ๏‚— Fault Classification Lecture 1 ๏‚— failure models in distributed system ๏‚— Recovery in Distributed system ๏‚— Byzantine faults ๏‚— Adversaries ๏‚— Byzantine Agreement Lecture 2 ๏‚— Impossibility of Consensus ๏‚— Randomized Distributed Agreement ๏‚— Exponential time shared memory consensusLecture 3 ๏‚— Polynomial time shared memory consensus ๏‚— Message passing Randomized consensus
  • 4. Lecture Plan of Unit V(Cont..) ๏‚— Memory management Algorithm ๏‚— Replicated data management Lecture 4 ๏‚— Concepts and Issues ๏‚— Database Techniques ๏‚— Atomic multicast ๏‚— Update Propagation ๏‚— Epidemic Algorithm Lecture 5 ๏‚— Antientropy ๏‚— Update Logs ๏‚— Case study : CORBA Lecture 6
  • 5. Concept of Fault, Failure & Recovery ๏‚— Definition: โ—ฆ Fault tolerance is the ability of a system to perform its function correctly even in the presence of internal faults. ๏‚— The concept of fault, failure & Recovery is described by using following points. โ—ฆ Fault Classification โ—ฆ Failure model in distributed system โ—ฆ Recovery in Distributed system.
  • 6. Fault Classification ๏‚— Fault can be classified as transient or permanent. ๏‚— A transient fault will eventually disappear without any apparent intervention. ๏‚— A permanent one will remain unless it is removed by some external agency. ๏‚— Classification of faults โ—ฆ Crash Fault โ—ฆ Omission fault โ—ฆ Timing Fault โ—ฆ Byzantine fault
  • 7. Failure Model in Distributed System ๏‚— Definition โ—ฆ It define a precise specification of the faults that can be exhibited by processes and communication channels. โ—ฆ Omission Failure โ—ฆ Timing Failure โ—ฆ Arbitrary Failure
  • 8. Recovery In Distributed System ๏‚— Definition โ—ฆ A transaction processing system will go through a recovery of the database to cope when the system fails, it involves the backup, journals, checkpoint and recovery manager. ๏‚— Types of Recovery Techniques: โ—ฆ Journal: A journal maintain an audit trail of transaction and database changes. โ—ฆ Checkpoint: It is to provide a snapshot of the data within the database. โ—ฆ Recovery Manager: A recovery manager is a program which restores the database to a correct condition which can restart the transaction processing.
  • 9. Byzantine Faults ๏‚— Definition: โ—ฆ A Byzantine fault is an arbitrary fault that occur during execution of an algorithm by a distributed system. ๏‚— It encompasses both omission failures and commission failure. ๏‚— When a byzantine fault has occurred the system may respond in any unpredictable way, unless it is designed to have byzantine fault tolerance.
  • 10. Adversaries ๏‚— Definition: โ—ฆ An adversary is a demon that has a great deal of control over the environment in which your protocol executes and will try to make your protocol fail. ๏‚— The adversary has the power to examine the global state and to schedule the execution of the protocol. ๏‚— Adversary is the ability to destroy or modify message and change the protocol that some of the processors execute.
  • 11. Byzantine Agreement ๏‚— Definition: โ—ฆ It refers to distributed agreement algorithm in which a failed processor can send arbitrary message into the network. โ—ฆ A failed processor can try to prevent the nonfailed processor from reaching an agreement.
  • 12. Impossibility Of Consensus ๏‚— Consensus is the task of getting all processes in a group to agree on some specific value based on the votes of each processes. ๏‚— The impossibility result depend completely on the fact that the distributed system is asynchronous. While processor can fail the system is otherwise reliable.
  • 13. Randomized Distributed Agreement ๏‚— A randomized algorithm is one which contains an assignment to a variable based on the outcome of tossing a fair coin or a random number generator. ๏‚— The randomized distributed agreement can be described by using some point that is as follows. โ—ฆ Exponential Time Shared memory Consensus. โ—ฆ Polynomial Time Shared memory Consensus. โ—ฆ Message Passing Randomized Consensus.
  • 14. Randomized Distributed Agreement(Cont..) ๏‚— Exponential Time Shared memory Consensus: โ—ฆ It is simple-minded approach to writing a consensus protocol in a shared memory system. โ—ฆ We initialize by choosing a value to prefer, Vp we look at the value preferred by every other processors {Vj}. If all other processors have the same value Vi =Vp, we decide on value Vp. Otherwise we flip a coin and set Vp to the value of the coin Flip.
  • 15. Polynomial Time Shared memory Consensus ๏‚— This protocol make it that every processor obtains the same value on its flip() on a given round r. ๏‚— If every processor obtain the same value for flip() on an arbitrary round r will probability at least Psame, the SM_Consensus protocol will require O(1/Psame) rounds. ๏‚— If Psame is independent of N, only an expected constant number of round are required. So it is worthwhile to spend a fair amount of effort to get every processor to flip the same coin.
  • 16. Message Passing Randomized Consensus ๏‚— It is similar to the shared memory consensus protocol except shared variable is the V array. ๏‚— The element V[i] is written to by processor i only and is read by every other processor. So array V makes shared memory look like a broadcast medium. ๏‚— A naive translation of the SM_consensus protocol to the MP_consensus protocol is o broadcast all updates.
  • 17. Memory Management Algorithm ๏‚— Definition โ—ฆ In multiprogramming system, to share the processor with a number of processes that must be kept in memory. These memory management is achieved through memory management algorithms. ๏‚— Methods of Memory Management: โ—ฆ Fixed Partitioning โ—ฆ Variable Partitioning โ—ฆ Paging โ—ฆ Segmentation
  • 18. Memory Management Algorithm(Cont..) ๏‚— Fixed Partitioning โ—ฆ In this method, memory is divided into partitions whose sizes are fixed. Operating system is placed into the lowest bytes of the memory. Processes are classified on entry of the system according to their memory they requirements. (nkB) (3nkB) (6nkB) Operating System Small Medium Large
  • 19. Memory Management Algorithm(Cont..) ๏‚— Variable Partitioning โ—ฆ In it, the memory size may vary dynamically. โ—ฆ In it, we keep a table(linked list) indicating used/free areas in memory. ๏‚— There are three algorithms for searching the list of free blocks for a specific amount of memory. โ—ฆ First Fit: Allocate the first free block that is large enough for the new process. This is the fast algorithm. โ—ฆ Best Fit
  • 20. Memory Management Algorithm(Cont..) ๏‚— Paging โ—ฆ Paging permit a program to allocate noncontiguous blocks of memory. The OS divide the program into pages which are blocks of small and fixed size. Then it divide the physical memory into frames which are block of size equals to page size. ๏‚— The OS uses a page table to map program pages to memory frames.
  • 21. Replicated Data Management ๏‚— Definition โ—ฆ Replication is the process of copying & maintaining database objects in multiple database that make up a distributed database system. โ—ฆ Replication can improve the performance & protect the availability of application because alternate data access option exist. ๏‚— The replicated data management is described by using some point. โ—ฆ Concept & Issues โ—ฆ Database Techniques โ—ฆ Atomic Multicast โ—ฆ Update Propagation
  • 22. Replicated Data Management(Cont..) ๏‚— Concept & Issues: โ—ฆ Basic replication environment support application that require read-only access to the table data that originates from a primary site. ๏‚— The concept of basic replication environments โ—ฆ Use of basic replication ๏‚– Information distribution, off loading & Information transport. โ—ฆ Read-only table snapshots ๏‚– It is a local copy of table data that originates from one or more remote master tables. โ—ฆ Snapshots Refreshes ๏‚– A table snapshot is a transaction- consistent reflection of its master data as that data existed at a specific point in time.
  • 23. Replicated Data Management(Cont..) ๏‚— Database Techniques: โ—ฆ It is a technique that are used for managing replicated data, that is called database techniques. ๏‚— It will examine the fundamentals algorithms for maintaining data consistency in a distributed database. ๏‚— Types of Database techniques: โ—ฆ Database logging & Recovery โ—ฆ Two-phase Commit โ—ฆ Three-phase Commit โ—ฆ Replicated-Data- Management โ—ฆ Dynamic Quorum Changes
  • 24. Atomic Multicast ๏‚— Definition: โ—ฆ If one processor on the delivery list receives a reliable multicast messages, every processor on the delivery list receives the message. ๏‚— Some point to describe the Atomic multicast. โ—ฆ Virtual Synchrony โ—ฆ Ordered Multicasts โ—ฆ Reliable & Casual multicast โ—ฆ Group Membership โ—ฆ Atomic group multicasts.
  • 25. Update Propagation ๏‚— The use of update propagation is to replicate the database it manages. ๏‚— Updates need to be propagated to all sites. ๏‚— The update propagation can be described by using some point that is as follows. โ—ฆ Epidemic Algorithms โ—ฆ Antientropy โ—ฆ Update Logs
  • 26. Update Propagation(Cont..) ๏‚— Epidemic Algorithms โ—ฆ When a server updates a data items d, it should start the process of distributing the update. ๏‚— Antientropy: โ—ฆ A distributing updates is to have one site contact another to exchange recent updates, that is called Antientropy. ๏‚— Update Logs โ—ฆ Every processor p keeps a log L of the updates that it has processed. The log is an listing of event records, where each event corresponding to an update.
  • 27. Case Study: CORBA ๏‚— Definition โ—ฆ CORBA is a middleware design that allows application programs to communicate with one another irrespective of their programming language, their hardware and software platforms, the networks they communicate over and their implementers. โ—ฆ Applications are built from CORBA objects, which implement interfaces defined in CORBAโ€™s interface definition language.
  • 28. Case Study: CORBA(Cont..) ๏‚— The Common object Request Broker architecture is described as follows: โ—ฆ Architecture โ—ฆ CORBA RMI โ—ฆ CORBA Services
  • 29. Case Study: CORBA(Cont..) ๏‚— Architecture of CORBA: โ—ฆ It designed to support the role of an object request broker that enables clients to invoke methods in remote objects, where both clients and server can be implemented in a variety of programming language.
  • 30. Case Study: CORBA(Cont..) ๏‚— In the CORBA architecture contains three additional components: โ—ฆ The object adapter โ—ฆ The implementation Repository โ—ฆ The interface Repository ๏‚— CORBA provides for both static & Dynamic invocations. โ—ฆ Static invocation are used when the remote interface of the CORBA object is known at compile time, enabling client stub & Server skeleton to be used. โ—ฆ If the remote interface is not known at compile time, dynamic invocation must be
  • 31. Case Study: CORBA(Cont..) ๏‚— Object Adapter: โ—ฆ The role of an object adapter is to bridge the gap between CORBA objects with IDL interfaces and the programming language interface of the corresponding servant classes. ๏‚— Skeleton: โ—ฆ Skeleton classes are generated in the language of the server by an IDL compiler. The skeleton unmarshals the arguments in request messages and marshals exception and result in reply messages.
  • 32. Case Study: CORBA(Cont..) ๏‚— Client Stub: โ—ฆ In the client language, a set of stub procedures is generated from an IDL interfaces by an IDL compiler for the client language. ๏‚— Implementation Repository: โ—ฆ It is responsible for activating registered servers on demand and for locating servers that are currently running. โ—ฆ The object adapter name is used to refer to servers when registering and activating them. ๏‚— Interface Repository โ—ฆ It is to provide information about registered
  • 33. Case Study: CORBA(Cont..) ๏‚— CORBA RMI: โ—ฆ CORBA RMI requires more of the programmer than programming in a single language RMI system such as Java RMI. ๏‚— CORBA Services: โ—ฆ CORBA naming Services โ—ฆ CORBA Event Services โ—ฆ CORBA notification Services โ—ฆ CORBA Security Services.