SlideShare a Scribd company logo
1 of 21
Introduction to Block Chain
Technology
Definition of a Distributed System
A distributed system is a collection of independent
computers that appears to its users as a single
coherent system
.... or ...
as a single system.
Resource Sharing and the Web
• Hardware resources (reduce costs)
• Data resources (shared usage of information)
• Service resources
• search engines
• computer-supported cooperative working
• Service vs. server (node or process )
Distributed application
• one single “system”
• one or several autonomous subsystems
• a collection of processors
• parallel processing
• Increased performance, reliability, fault tolerance
• partitioned or replicated data
• increased performance, reliability, fault tolerance
• Dependable systems, grid systems, enterprise systems
Why Distribution?
• Sharing of information and services
• Possibility to add components improves
• Availability
• Reliability
• fault tolerance
• performance
• scalability
Goals of DS
• Making resources accessible
• Distribution transparency
• Openness
• Scalability
• Security
• System design requirements
Challenges for Making Resources Accessible
• Naming
• Access control
• Security
• Availability
• Performance
• Mutual exclusion of users, fairness
• Consistency in some cases
Transparencies
• Access : Hide differences in data representation and how a
resource is accessed
• Location: Hide where a resource is located
• Migration : Hide that a resource may move to another
location
• Relocation : Hide that a resource may be moved to another
locationwhile in use (the others don’t notice)
• Replication :Hide that a resource is replicated
• Concurrency :Hide that a resource may be shared by
severalcompetitive users
• Failure :Hide the failure and recovery of a resource
• Persistence: Hide whether a (software) resource is in memory
or ondisk
Omission and arbitrary failures
• Fail-stop:Process halts and remains halted. Other processes may
detect this state.
• Crash:Process halts and remains halted. Other processes may not
be able to detect thisstate.
• Omission:A message inserted in an outgoing message buffer
never arrives at the otherend’s incoming message buffer.
• Send-omission:A process completes send, but the message is not
put in its outgoingmessage buffer.
• Receive-omission : A message is put in a process’s
incoming message buffer, but that process does not receive it.
• Arbitrary(Byzantine) :Process/channel exhibits arbitrary
behaviour: it maysend/transmit arbitrary messages at arbitrary
times, commit omissions; a process maystop or take an incorrect
step
Timing failures
• Clock: Process’s local clock exceeds the bounds
on its rate of drift from real time.
• Performance : Process exceeds the bounds on
the interval between two steps.
• Performance: A message’s transmission takes
longer than the stated bound.
Failure Handling
• More components
• increased fault rate
• Increased possibilities
•more redundancy => more possibilities for fault tolerance
• no centralized control => no fatal failure
• Issues
• Detecting failures
• Masking failures
• Recovery from failures
• Tolerating failures
• Redundancy
• partial failures
Concurrency
• Concurrency:
• Several simultaneous users => integrity of data
• mutual exclusion
• synchronization
• transaction processing in data bases
• Replicated data: consistency of information?
• Partitioned data: how to determine the state of
the system?
• Order of messages?
• There is no global clock!
Challenges for Scalability
• The system will remain effective when there is
a significant increase in
• number of resources
• number of users
• The architecture and the implementation
must allow it
• The algorithms must be efficient under the
circumstances to be expected
Challenges for Security
• Security: confidentiality, integrity, availability
• Vulnerable components
• channels (links <–> end-to-end paths)
• processes (clients, servers, outsiders)
• Threats
• information leakage
• integrity violation
• denial of service
• illegitimate usage
• Current issues:
• Denial-of-service attacks, security of mobile code,
information flow;
• open wireless ad-hoc environments
Security Model
• Threats to channels
• eavesdropping (data, traffic)
• tampering, replaying
• masquerading
• denial of service
• Threats to processes
• server: client’s identity;
• client: server’s identity
• unauthorized access (insecure access model)
• unauthorized information flow (insecure flow model)
Defeating Security Threats
• Techniques
• Cryptography
• authentication
• access control techniques
• intranet: firewalls
• services, objects: access control lists, capabilities
• Policies
• access control models
• lattice models
• information flow models
• Leads to: secure channels, secure processes, controlled
access,controlled flows
Distributed systems
• Distributed systems are a computing paradigm whereby two or
more nodes work with each other in a coordinated fashion in
order to achieve a common outcome
• DS modeled in such a way that end users see it as a single logical
platform
• Node can be defined as an individual player in a distributed
system and have their own memory and processor.
• All nodes are capable of sending and receiving messages to and
from each other.
• Nodes can be honest, faulty, or malicious
• A node that can exhibit arbitrary behavior is also known as a
Byzantine node.
• This arbitrary behavior can be intentionally malicious, which
is detrimental to the operation of the network.
• Generally, any unexpected behavior of a node on the network
can be categorized as Byzantine.
Challenge in distributed system Design
• Coordination between nodes
• Fault tolerance
• Even if some of the nodes become faulty or network
links break, the distributed system should tolerate
• D S should continue to work flawlessly in order to
achieve the desired result.
• Several algorithms and mechanisms has been proposed
to overcome these issues.
• Distributed systems are so challenging to design that a theorem
known as the CAP theorem has been proved and states that a
distributed system cannot have all much desired properties
simultaneously.

More Related Content

Similar to Introduction to Blockchain and Distributed Systems

Building data intensive applications
Building data intensive applicationsBuilding data intensive applications
Building data intensive applicationsAmit Kejriwal
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationSam Bowne
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing SecurityDevyani Vaidya
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating systemudaya khanal
 
Patterns of Distributed Application Design
Patterns of Distributed Application DesignPatterns of Distributed Application Design
Patterns of Distributed Application DesignGlobalLogic Ukraine
 
Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)Abdullah Ozturk
 
Final Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptxFinal Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptxHasibAhmadKhaliqi1
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITDeepraj Bhujel
 
Cis017 6 revision-2015_distributed
Cis017 6 revision-2015_distributedCis017 6 revision-2015_distributed
Cis017 6 revision-2015_distributedabdullah al-Thani
 
Applications of Distributed Systems
Applications of Distributed SystemsApplications of Distributed Systems
Applications of Distributed Systemssandra sukarieh
 
Patterns of Distributed Application Design
Patterns of Distributed Application DesignPatterns of Distributed Application Design
Patterns of Distributed Application DesignOrkhan Gasimov
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptMuhammadAbdullah311866
 
Csld phan tan va song song
Csld phan tan va song songCsld phan tan va song song
Csld phan tan va song songLê Anh Trung
 

Similar to Introduction to Blockchain and Distributed Systems (20)

Building data intensive applications
Building data intensive applicationsBuilding data intensive applications
Building data intensive applications
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Lecture 9.pptx
Lecture 9.pptxLecture 9.pptx
Lecture 9.pptx
 
3. challenges
3. challenges3. challenges
3. challenges
 
Unit 1
Unit 1Unit 1
Unit 1
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
Unit 1
Unit 1Unit 1
Unit 1
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident Preparation
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Patterns of Distributed Application Design
Patterns of Distributed Application DesignPatterns of Distributed Application Design
Patterns of Distributed Application Design
 
Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)
 
Final Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptxFinal Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptx
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - IT
 
Cis017 6 revision-2015_distributed
Cis017 6 revision-2015_distributedCis017 6 revision-2015_distributed
Cis017 6 revision-2015_distributed
 
Applications of Distributed Systems
Applications of Distributed SystemsApplications of Distributed Systems
Applications of Distributed Systems
 
Patterns of Distributed Application Design
Patterns of Distributed Application DesignPatterns of Distributed Application Design
Patterns of Distributed Application Design
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.ppt
 
Csld phan tan va song song
Csld phan tan va song songCsld phan tan va song song
Csld phan tan va song song
 

More from KGSCSEPSGCT

Unit4_Managing Contracts.ppt
Unit4_Managing Contracts.pptUnit4_Managing Contracts.ppt
Unit4_Managing Contracts.pptKGSCSEPSGCT
 
REST Introduction.ppt
REST Introduction.pptREST Introduction.ppt
REST Introduction.pptKGSCSEPSGCT
 
3-SchemaExamples.pdf
3-SchemaExamples.pdf3-SchemaExamples.pdf
3-SchemaExamples.pdfKGSCSEPSGCT
 
Converting DTDs to XML Schemas.pdf
Converting DTDs to XML Schemas.pdfConverting DTDs to XML Schemas.pdf
Converting DTDs to XML Schemas.pdfKGSCSEPSGCT
 
XML-INTRODUCTION.pdf
XML-INTRODUCTION.pdfXML-INTRODUCTION.pdf
XML-INTRODUCTION.pdfKGSCSEPSGCT
 

More from KGSCSEPSGCT (12)

Unit4_Managing Contracts.ppt
Unit4_Managing Contracts.pptUnit4_Managing Contracts.ppt
Unit4_Managing Contracts.ppt
 
WSstandards.ppt
WSstandards.pptWSstandards.ppt
WSstandards.ppt
 
UDDI.ppt
UDDI.pptUDDI.ppt
UDDI.ppt
 
ROA.ppt
ROA.pptROA.ppt
ROA.ppt
 
REST Introduction.ppt
REST Introduction.pptREST Introduction.ppt
REST Introduction.ppt
 
3-SchemaExamples.pdf
3-SchemaExamples.pdf3-SchemaExamples.pdf
3-SchemaExamples.pdf
 
Converting DTDs to XML Schemas.pdf
Converting DTDs to XML Schemas.pdfConverting DTDs to XML Schemas.pdf
Converting DTDs to XML Schemas.pdf
 
XSL- XSLT.pdf
XSL- XSLT.pdfXSL- XSLT.pdf
XSL- XSLT.pdf
 
XML-INTRODUCTION.pdf
XML-INTRODUCTION.pdfXML-INTRODUCTION.pdf
XML-INTRODUCTION.pdf
 
XSLT.ppt
XSLT.pptXSLT.ppt
XSLT.ppt
 
2-DTD.ppt
2-DTD.ppt2-DTD.ppt
2-DTD.ppt
 
XML Schema.pdf
XML Schema.pdfXML Schema.pdf
XML Schema.pdf
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

Introduction to Blockchain and Distributed Systems

  • 1. Introduction to Block Chain Technology
  • 2. Definition of a Distributed System A distributed system is a collection of independent computers that appears to its users as a single coherent system .... or ... as a single system.
  • 3. Resource Sharing and the Web • Hardware resources (reduce costs) • Data resources (shared usage of information) • Service resources • search engines • computer-supported cooperative working • Service vs. server (node or process )
  • 4. Distributed application • one single “system” • one or several autonomous subsystems • a collection of processors • parallel processing • Increased performance, reliability, fault tolerance • partitioned or replicated data • increased performance, reliability, fault tolerance • Dependable systems, grid systems, enterprise systems
  • 5. Why Distribution? • Sharing of information and services • Possibility to add components improves • Availability • Reliability • fault tolerance • performance • scalability
  • 6. Goals of DS • Making resources accessible • Distribution transparency • Openness • Scalability • Security • System design requirements
  • 7. Challenges for Making Resources Accessible • Naming • Access control • Security • Availability • Performance • Mutual exclusion of users, fairness • Consistency in some cases
  • 8. Transparencies • Access : Hide differences in data representation and how a resource is accessed • Location: Hide where a resource is located • Migration : Hide that a resource may move to another location • Relocation : Hide that a resource may be moved to another locationwhile in use (the others don’t notice) • Replication :Hide that a resource is replicated • Concurrency :Hide that a resource may be shared by severalcompetitive users • Failure :Hide the failure and recovery of a resource • Persistence: Hide whether a (software) resource is in memory or ondisk
  • 9. Omission and arbitrary failures • Fail-stop:Process halts and remains halted. Other processes may detect this state. • Crash:Process halts and remains halted. Other processes may not be able to detect thisstate. • Omission:A message inserted in an outgoing message buffer never arrives at the otherend’s incoming message buffer. • Send-omission:A process completes send, but the message is not put in its outgoingmessage buffer. • Receive-omission : A message is put in a process’s incoming message buffer, but that process does not receive it. • Arbitrary(Byzantine) :Process/channel exhibits arbitrary behaviour: it maysend/transmit arbitrary messages at arbitrary times, commit omissions; a process maystop or take an incorrect step
  • 10. Timing failures • Clock: Process’s local clock exceeds the bounds on its rate of drift from real time. • Performance : Process exceeds the bounds on the interval between two steps. • Performance: A message’s transmission takes longer than the stated bound.
  • 11. Failure Handling • More components • increased fault rate • Increased possibilities •more redundancy => more possibilities for fault tolerance • no centralized control => no fatal failure • Issues • Detecting failures • Masking failures • Recovery from failures • Tolerating failures • Redundancy • partial failures
  • 12. Concurrency • Concurrency: • Several simultaneous users => integrity of data • mutual exclusion • synchronization • transaction processing in data bases • Replicated data: consistency of information? • Partitioned data: how to determine the state of the system? • Order of messages? • There is no global clock!
  • 13. Challenges for Scalability • The system will remain effective when there is a significant increase in • number of resources • number of users • The architecture and the implementation must allow it • The algorithms must be efficient under the circumstances to be expected
  • 14. Challenges for Security • Security: confidentiality, integrity, availability • Vulnerable components • channels (links <–> end-to-end paths) • processes (clients, servers, outsiders) • Threats • information leakage • integrity violation • denial of service • illegitimate usage • Current issues: • Denial-of-service attacks, security of mobile code, information flow; • open wireless ad-hoc environments
  • 16. • Threats to channels • eavesdropping (data, traffic) • tampering, replaying • masquerading • denial of service • Threats to processes • server: client’s identity; • client: server’s identity • unauthorized access (insecure access model) • unauthorized information flow (insecure flow model)
  • 17.
  • 18. Defeating Security Threats • Techniques • Cryptography • authentication • access control techniques • intranet: firewalls • services, objects: access control lists, capabilities • Policies • access control models • lattice models • information flow models • Leads to: secure channels, secure processes, controlled access,controlled flows
  • 19. Distributed systems • Distributed systems are a computing paradigm whereby two or more nodes work with each other in a coordinated fashion in order to achieve a common outcome • DS modeled in such a way that end users see it as a single logical platform • Node can be defined as an individual player in a distributed system and have their own memory and processor. • All nodes are capable of sending and receiving messages to and from each other. • Nodes can be honest, faulty, or malicious
  • 20. • A node that can exhibit arbitrary behavior is also known as a Byzantine node. • This arbitrary behavior can be intentionally malicious, which is detrimental to the operation of the network. • Generally, any unexpected behavior of a node on the network can be categorized as Byzantine.
  • 21. Challenge in distributed system Design • Coordination between nodes • Fault tolerance • Even if some of the nodes become faulty or network links break, the distributed system should tolerate • D S should continue to work flawlessly in order to achieve the desired result. • Several algorithms and mechanisms has been proposed to overcome these issues. • Distributed systems are so challenging to design that a theorem known as the CAP theorem has been proved and states that a distributed system cannot have all much desired properties simultaneously.