This document discusses fault tolerance and distributed systems concepts. It covers availability, reliability, safety, maintainability, and different types of failures like crash, omission, timing, and arbitrary failures. It also discusses failure masking through redundancy, process groups, client-server communication failures, atomic multicast, virtual synchrony, message ordering, distributed commit protocols, and recovery techniques.
This ppt covers different aspects about timing issues and various algorithms involved in having better sync between different systems in a distributed environment
4.1Introduction
- Potential Threats and Attacks on Computer System
- Confinement Problems
- Design Issues in Building Secure Distributed Systems
4.2 Cryptography
- Symmetric Cryptosystem Algorithm: DES
- Asymmetric Cryptosystem
4.3 Secure Channels
- Authentication
- Message Integrity and Confidentiality
- Secure Group Communication
4.4 Access Control
- General Issues
- Firewalls
- Secure Mobile Code
4.5 Security Management
- Key Management
- Issues in Key Distribution
- Secure Group Management
- Authorization Management
Client-Centric Consistency
Provide guarantees about ordering of operations only for a single client, i.e.
Effects of an operations depend on the client performing it
Effects also depend on the history of client’s operations
Applied only when requested by the client
No guarantees concerning concurrent accesses by different clients
Assumption:
Clients can access different replicas, e.g. mobile users
Synchronization in distributed computingSVijaylakshmi
Synchronization in distributed systems is achieved via clocks. The physical clocks are used to adjust the time of nodes. Each node in the system can share its local time with other nodes in the system. The time is set based on UTC (Universal Time Coordination).
This ppt covers different aspects about timing issues and various algorithms involved in having better sync between different systems in a distributed environment
4.1Introduction
- Potential Threats and Attacks on Computer System
- Confinement Problems
- Design Issues in Building Secure Distributed Systems
4.2 Cryptography
- Symmetric Cryptosystem Algorithm: DES
- Asymmetric Cryptosystem
4.3 Secure Channels
- Authentication
- Message Integrity and Confidentiality
- Secure Group Communication
4.4 Access Control
- General Issues
- Firewalls
- Secure Mobile Code
4.5 Security Management
- Key Management
- Issues in Key Distribution
- Secure Group Management
- Authorization Management
Client-Centric Consistency
Provide guarantees about ordering of operations only for a single client, i.e.
Effects of an operations depend on the client performing it
Effects also depend on the history of client’s operations
Applied only when requested by the client
No guarantees concerning concurrent accesses by different clients
Assumption:
Clients can access different replicas, e.g. mobile users
Synchronization in distributed computingSVijaylakshmi
Synchronization in distributed systems is achieved via clocks. The physical clocks are used to adjust the time of nodes. Each node in the system can share its local time with other nodes in the system. The time is set based on UTC (Universal Time Coordination).
Replication in computing involves sharing information so as to ensure consistency between redundant resources, such as software or hardware components, to improve reliability, fault-tolerance, or accessibility.
Agreement Protocols, Distributed Resource Management: Issues in distributed File Systems, Mechanism for building distributed file systems, Design issues in Distributed Shared Memory, Algorithm for Implementation of Distributed Shared Memory.
Optimistic concurrency control in Distributed Systemsmridul mishra
What is Optimistic concurrency control, how and why it is applied to distributed systems, the Kung Robinson algorithm overview and the advantages-disadvantages have been covered
Peer-to-peer Systems – Introduction – Napster and its legacy – Peer-to-peer – Middleware – Routing overlays. Overlay case studies: Pastry, Tapestry- Distributed File Systems –Introduction – File service architecture – Andrew File system. File System: Features-File model -File accessing models – File sharing semantics Naming: Identifiers, Addresses, Name Resolution – Name Space Implementation – Name Caches – LDAP.
Distributed Mutual Exclusion and Distributed Deadlock DetectionSHIKHA GAUTAM
Distributed Mutual Exclusion: Classification of distributed mutual exclusion, requirement of mutual exclusion theorem, Token based and non token based algorithms. Distributed Deadlock Detection: system model, resource Vs communication deadlocks, deadlock prevention, avoidance, detection & resolution, centralized dead lock detection
Distributed database system is collection of loosely coupled sites that are independeant of each other.
Distributed transaction model
Concurrency control
2 phase commit protocol
Replication in computing involves sharing information so as to ensure consistency between redundant resources, such as software or hardware components, to improve reliability, fault-tolerance, or accessibility.
Agreement Protocols, Distributed Resource Management: Issues in distributed File Systems, Mechanism for building distributed file systems, Design issues in Distributed Shared Memory, Algorithm for Implementation of Distributed Shared Memory.
Optimistic concurrency control in Distributed Systemsmridul mishra
What is Optimistic concurrency control, how and why it is applied to distributed systems, the Kung Robinson algorithm overview and the advantages-disadvantages have been covered
Peer-to-peer Systems – Introduction – Napster and its legacy – Peer-to-peer – Middleware – Routing overlays. Overlay case studies: Pastry, Tapestry- Distributed File Systems –Introduction – File service architecture – Andrew File system. File System: Features-File model -File accessing models – File sharing semantics Naming: Identifiers, Addresses, Name Resolution – Name Space Implementation – Name Caches – LDAP.
Distributed Mutual Exclusion and Distributed Deadlock DetectionSHIKHA GAUTAM
Distributed Mutual Exclusion: Classification of distributed mutual exclusion, requirement of mutual exclusion theorem, Token based and non token based algorithms. Distributed Deadlock Detection: system model, resource Vs communication deadlocks, deadlock prevention, avoidance, detection & resolution, centralized dead lock detection
Distributed database system is collection of loosely coupled sites that are independeant of each other.
Distributed transaction model
Concurrency control
2 phase commit protocol
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...Sehrish Asif
Message Passing, Remote Procedure Calls and
Distributed Shared Memory as Communication Paradigms for Distributed Systems & Remote Procedure Call Implementation Using Distributed Algorithms
A brief report on Client Server Model and Distributed Computing. Problems and Applications are also discussed and Client Server Model in Distributed Systems is also discussed.
This session is all about Reactive Messaging Patterns. Such messaging patterns are used to build message-driven systems. These systems are those that communicate primarily through asynchronous and non-blocking messages. Messages enable us to build systems that are both resilient, and elastic, and therefore responsive under a variety of situations.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
2. Basic Concepts
• Availability
The system is ready to work immediately
• Reliability
The system can run continuously
• Safety
When the system fails, nothing catastrophic happens
• Maintainability
A failed system can be easily repaired.
Fault types: transient, intermittent, permanent
3. Failure Models
Type of failure Description
Crash failure A server halts, but is working correctly until it halts
Omission failure
Different types of failures.
Receive omission
Send omission
A server fails to respond to requests
A server fails to receive incoming messages
A server fails to send messages
Timing failure A server's response lies outside the specified time interval
Response failure
Value failure
State transition failure
The server's response is incorrect
The value of the response is wrong
The server deviates from the correct flow of control
Arbitrary failure A server may produce arbitrary responses at arbitrary times
4. Failure Masking by Redundancy
•Information redundancy (extra bits)
•Time redundancy (extra operations)
• Physical redundancy (extra equipment or processes)
5. Failure Masking by Redundancy
Triple modular redundancy (TMR).
An electronic circuit example
6. Process failures
To tolerate a faulty process, identical processes organized into a
group
When one process of the group fails, some other process in the group
takes care of the work
Process groups may be dynamic
Mechanisms are needed for managing groups membership
•Group server maintains information on membership (centralized)
•Distributed management (less simple and time consuming)
7. Flat Groups versus Hierarchical Groups
a) Communication in a flat group (voting mechanism, slow decision)
Replicated write protocols
b) Communication in a simple hierarchical group (single point of failure)
Primary based protocols
8. Client-server communication failures
Using a reliable transport protocol (TCP) masks omission failures,
but many failures are not masked.
Classes of failure
• The client is unable to locate the server – exception is a solution, but we loose
in transparency
•The request message from the client to the server is lost – retransmission
•The server crashes after receiving a request
•The reply message from the server to the client is lost – retransmission, but…
•The client crashes after sending a request – orphan is generated.
(extermination, reincarnation with epoch #, gentle reincarnation, expiration…)
9. Server Crashes (1)
A server in client-server communication
a) Normal case
b) Crash after execution
c) Crash before execution
At least once semantic: after server reboot, to try until a request is obtained
At most once semantic: immediate failure report
Exactly once semantic: no way
10. Server Crashes (2)
Example: a client send a message to a server for printing (P) it, having a completion
message back (M). The server can crash (C)
Client Server
Strategy M -> P Strategy P -> M
Reissue strategy MPC MC(P) C(MP) PMC PC(M) C(PM)
Always DUP OK OK DUP DUP OK
Never OK ZERO ZERO OK OK ZERO
Only when ACKed DUP OK ZERO DUP OK ZERO
Only when not ACKed OK ZERO OK OK DUP OK
Different combinations of client and server strategies in the presence of server crashes.
11. Group Communication
Basic Reliable-Multicasting Schemes
Important for messaging in process group
A simple solution to reliable multicasting when all receivers are known and are
assumed not to fail
a) Message transmission b) Reporting feedback
Efficient only for little # of receivers ( only nack, timer etc..)
12. Nonhierarchical Feedback Control
To scale, we need to reduce the number of messages,
with feedback suppression
Several receivers have scheduled a request for retransmission, but the
first retransmission request leads to the suppression of others (Scalable
Reliable Multicasting protocol).
It leads to timing problems, useless retransmissions or a complicated
organization of the group membership
13. Hierarchical Feedback Control
The essence of hierarchical reliable multicasting. A tree of receivers partitions is
formed
• Each local coordinator forwards the message to its children.
• A local coordinator handles retransmission requests.
Acknowledge between coordinators
14. Atomic Multicast
In presence of process failures, the guarantee that a message is delivered to all or none
of the receivers is needed. This lead to the atomic multicast problem
Atomic multicasting ensures that group members maintain consistency
The logical organization of a distributed system to distinguish between message receipt
and message delivery
In atomic multicasting a multicast message is uniquely associated to a list of receiving
processes ( Group view )
A view change takes place when a process joins or leaves the group
15. Virtual Synchrony
We need an ordered reliable multicasting.
Virtual Synchrony guarantees that a message sent to a group view is delivered to each
non-faulty member of the group.
If the sender crashes, the message may be either delivered to all the other processes or
ignored by each of them.
The principle of virtual synchronous multicast (view change similar to
synchronization variable)
16. Message Ordering
Four different type of ordering of multicasts:
• Reliable, unordered multicast
no guarantees is given on the order in which messages are delivered
• FIFO ordered multicast
messages from the same process are delivered in the order as they are sent
• Causally ordered multicast
causality between messages is preserved
• Totally-ordered multicast
messages are delivered in the same order to all members of the group
17. Message Ordering
Process P1 Process P2 Process P3
sends m1 receives m1 receives m2
sends m2 receives m2 receives m1
Unordered multicast:
Three communicating processes in the same group. The ordering of events per process is shown
along the vertical axis.
Process P1 Process P2 Process P3 Process P4
sends m1 receives m1 receives m3 sends m3
sends m2 receives m3 receives m1 sends m4
receives m2 receives m2
receives m4 receives m4
Four processes in the same group with two different senders, and a possible delivery order of
messages under FIFO-ordered multicasting
18. Message Ordering
Virtually synchronous reliable multicasting offering totally ordered delivery
is called atomic multicasting
Multicast Basic Message Ordering Total-ordered Delivery?
Reliable multicast None No
FIFO multicast FIFO-ordered delivery No
Causal multicast Causal-ordered delivery No
Atomic multicast None Yes
FIFO atomic multicast FIFO-ordered delivery Yes
Causal atomic multicast Causal-ordered delivery Yes
Six different versions of virtually synchronous reliable multicasting.
19. Distributed Commit
Distributed commit means that an operation has to be performed by
each member of a group or none at all
One phase distributed commit is performed using a coordinator ( if a participant
cannot perform the operation, no means to advise the coordinator)
a) The finite state machine for the coordinator in two phase commit.
b) The finite state machine for a participant.
The first phase is the vote phase, the second is the decision phase
Timeout mechanisms are necessary, coordinator can crash
20. Two Phase Commit
• The coordinator send a vote_request to all participants
• A participant returns a vote-commit (it is ready to commit its
part of transaction) or a vote-abort
• The coordinator collects the votes and send a global_commit or a
global_abort (if one of the participants has sent a vote_abort)
• A participant receive a global_commit and locally commits the
transaction, or receive a global_abort and locally aborts the
transaction
1 – voting phase
2 – decision phase
1
2
21. Three-Phase Commit
It avoids blocking processes in case of coordinator crash
• There is no state from which it is possible to make a transition directly to
COMMIT or ABORT
• There is no state in which it is not possible to make a final decision and
from which a transition to a COMMIT can be made
22. Recovery
• Backward recovery brings the system to the previous correct
state. It is necessary to record the state (check-pointing)
• Forward recovery attempt to bring the system in a correct new
state to continue the execution.