SlideShare a Scribd company logo
1 of 27
Characteristics of Distributed
System
 Concurrency
 No global clock
 Independent failures
Challenges in distributed system
 heterogeneity
The internet enable users to access services
and run application over a heterogenious
collection of computers and networks.
Heterogeneity applies to each of the following
1. Networks
2. computer hardware
3. operating system
4. programming Languages
5. implementation by different developer
Openness
The openness of a computer system is the
characteristics that determines whether the
system can be extended and re-implemented
in verious ways.
Security
 Many of the information resources that are made
available and maintain in distributed system have a
high intrinsic value to there users. Security for
information resourcs has three components.
1. confidentially (protection again disclosure to
unautherized individuals)
2.integrity(protection against modification)
3.availability
Scalability
A system is describesd as scalable if remains
effective when there significant increase in the
number of resources and the numbers of users
Concurrency
there is a possibility that several clients will
attempt to access a shared resource at the
same time.therefor concurrency is another
challenges
Transparency
System is perceived as a whole rather than a collection
of independent computers.
1.Access transparency
2.Location transparency
3.Concurrency transparency
4.Replication transparency
 Architectural models: (as client-server and peer process
models)
 Define the way in which the components of systems are:
 Interact with one another, and
 Mapped onto an underlying network of computers.
 Describe the layered structure of distributed system software.
 Fundamental models:
 Concerned with properties that are common in all of the
architectural models.
 Addressed by three models:
 The interaction model: deals with the difficulty of setting time
limits.
 The failure model: attempts to give a specification of the
exhibited faults by processes and communication channels.
 The security model: discusses possible threats to processes
and communication channels.
Distributed System Models
Software Layers
 In the layered view of a system each layer
offers its services to the level above and
builds its own service on the services of the
layer below.
Applications
Computer and network hardware
Platform
Operating system
Middleware
Software Layers
 Platform:
 Lowest-level layers that provide services to other higher layers.
 bring a system’s programming interface for communication and
coordination between processes .
 Middleware:
 Layer of software to mask heterogeneity and provide a unified
distributed programming interface to application programmers.
 Provide services, infrastructure services, for use by application
programs.
 Examples:
 Object Management Group’s Common Object Request Broker
Architecture (CORBA).
 Java Remote Object Invocation (RMI).
 Microsoft’s Distributed Common Object Model (DCOM).
 Limitation: require application level involvement in some tasks.
System Architectures
 The architecture include:
 The division of responsibilities between system components.
 The placement of the components on computers in the
network.
 Client-server model:
 Most important and most widely distributed system
architecture.
 Client and server roles are assigned and changeable.
 Servers may in turn be clients of other servers.
 Services may be implemented as several interacting processes
in different host computers to provide a service to client
processes:
 Servers partition the set of objects on which the service is
based and distribute them among themselves (e.g. Web data
and web servers)
 Servers maintain replicated copies of the service objects on
several hosts for reliability and performance (e.g. AltaVista)
System Architectures
 `
Server
Client
Client
invocation
result
Server
invocation
result
Process:
Key:
Computer:
Clients invoke individual servers
12
System Architectures
`
Server
Server
Server
Service
Client
Client
A service provided by multiple servers
System Architectures
 Caches and proxy servers:
 Cache:
 A store of recently used data objects that is closer to
the client process than those remote objects.
 When an object is needed by a client process the
caching service checks the cache and supplies the
object from there in case of an up-to-date copy is
available.
 Proxy server:
 Provides a shared cache of web resources for client
machines at a site or across several sites.
 Increase availability and performance of a service by
reducing load on the WAN and web servers.
 May be used to access remote web servers through a
firewall.
System Architectures
 `
Client
Proxy
Web
server
Web
server
server
Client
Web proxy server
15
System Architectures
 Peer processes:
 All processes play similar roles without destination as a
client or a server.
 Interacting cooperatively to perform a distributed
activity.
 Communications pattern will depend on application
requirements.
Application
Coordination
code
Application
Coordination
code
Application
Coordination
code
A distributed application
based on peer processes
Fundamental Models
(Interaction Model)
 Distributed systems consists of multiple interacting
processes .
 Distributed processes behavior is described by
distributed algorithms.
 Distributed algorithms define the steps to be taken by
each process in the system including the transmission
of messages between them.
 Transmitted messages transfer information between
these processes and coordinate their ordering and
synchronization activities.
Fundamental Models
(Interaction Model)
 Interacting processes in a distributed system are
affected by two significant factors:
1. Performance of communication channels: is
characterized by:
 Latency: delay between sending and receipt of a
message including
 Throughput: number of units (e.g., packets) delivered
per time unit.
 Bandwidth: total amount of information transmitted
per time unit.
 Jitter: variation in the time taken to deliver multiple
messages of the same type (relevant to multimedia
data).
Fundamental Models
(Interaction Model)
2. Computer clocks:
 Each computer in a distributed system has its own internal
clock to supply the value of the current time to local
processes.
 Therefore, two processes running on different computers read
their clocks at the same time may take different time values.
 Clock drift rate refers to the relative amount a computer clock
differs from a perfect reference clock.
 Several approaches to correcting the times on computer clocks
are proposed.
 Clock corrections can be made by sending messages, from a
computer has an accurate time to other computers, which will
still be affected by network delays.
Fundamental Models
(Interaction Model)
 Setting time limits for process execution, .Two
opposing extreme positions provide a pair of
simple interaction models:
 Synchronous distributed systems:
 A system in which the following bounds are
defined:
 Time to execute each step of a process has known
lower and upper bounds.
 Each message transmitted over a channel is
received within a known bounded time.
 Each process has a local clock whose drift rate from
perfect time has a known bound.
Fundamental Models
(Interaction Model)
 Asynchronous distributed systems:
 A system in which there are no bounds
on:
 process execution times.
 message delivery times.
 clock drift rate.
 More abstract and general:
 A distributed algorithm executing on one
system is likely to also work on another one.
Fundamental Models
(Failure Model)
 Defines the ways in which failure may occur in order
to provide an understanding of its effects.
 A taxonomy of failures which distinguish between the
failures of processes and communication channels is
provided:
 Omission failures
 Process or channel failed to do something.
 Arbitrary failures
 Any type of error can occur in processes or channels
(worst).
 Timing failures
 Applicable only to synchronous distributed systems
where time limits may not be met.
Fundamental Models
(Failure Model)
 `Process p Process q
Communication channel
send
Outgoing message buffer Incoming message buffer
receive
m
Processes and channels
23
Fundamental Models
(Security Model)
 Secure processes and channels and protect objects
encapsulated against unauthorized access.
 Protecting access to objects
 Access rights
 In client server systems: involves authentication of clients.
 Protecting processes and interactions
 Threats to processes: problem of unauthenticated requests /
replies.
 e.g., "man in the middle"
 Threats to communication channels: enemy may copy, alter or
inject messages as they travel across network.
 Use of “secure” channels, based on cryptographic methods.
Fundamental Models
(Security Model)
 `
Network
invocation
result
Client
Server
Principal (user) Principal (server)
Ob
Access rights
Objects and principals
Fundamental Models
(Security Model)
 `
The enemy
Communication channel
Copy of m
Process p Process q
m
The enemy
m’
2
Limitation of Distributed System
 Absence of a global clock
 Absence of a shared memory

More Related Content

Similar to characteristicsofdistributedsystem-121004123308-phpapp02.ppt

Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT JaipurDistributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT JaipurDrNilam Choudhary
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Computing notes
Computing notesComputing notes
Computing notesthenraju24
 
Chapter 1 introduction
Chapter 1 introductionChapter 1 introduction
Chapter 1 introductionTamrat Amare
 
distributed-systemsfghjjjijoijioj-chap3.pptx
distributed-systemsfghjjjijoijioj-chap3.pptxdistributed-systemsfghjjjijoijioj-chap3.pptx
distributed-systemsfghjjjijoijioj-chap3.pptxlencho3d
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed ComputingAbhishek Jaisingh
 
Chapter 1 -_characterization_of_distributed_systems
Chapter 1 -_characterization_of_distributed_systemsChapter 1 -_characterization_of_distributed_systems
Chapter 1 -_characterization_of_distributed_systemsFrancelyno Murela
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes SAhammedShakil
 
Lec+3-Introduction-to-Distributed-Systems.pdf
Lec+3-Introduction-to-Distributed-Systems.pdfLec+3-Introduction-to-Distributed-Systems.pdf
Lec+3-Introduction-to-Distributed-Systems.pdfsamaghorab
 
20IT703_PDS_PPT_Unit_I.ppt
20IT703_PDS_PPT_Unit_I.ppt20IT703_PDS_PPT_Unit_I.ppt
20IT703_PDS_PPT_Unit_I.pptsuganthi66742
 
Chapter 1-Introduction.ppt
Chapter 1-Introduction.pptChapter 1-Introduction.ppt
Chapter 1-Introduction.pptsirajmohammed35
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environmentMaulik Patel
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference ModelVishnu Vardhan
 

Similar to characteristicsofdistributedsystem-121004123308-phpapp02.ppt (20)

Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT JaipurDistributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Computing notes
Computing notesComputing notes
Computing notes
 
Chapter 1 introduction
Chapter 1 introductionChapter 1 introduction
Chapter 1 introduction
 
istributed system
istributed systemistributed system
istributed system
 
distributed-systemsfghjjjijoijioj-chap3.pptx
distributed-systemsfghjjjijoijioj-chap3.pptxdistributed-systemsfghjjjijoijioj-chap3.pptx
distributed-systemsfghjjjijoijioj-chap3.pptx
 
Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Chapter 1 -_characterization_of_distributed_systems
Chapter 1 -_characterization_of_distributed_systemsChapter 1 -_characterization_of_distributed_systems
Chapter 1 -_characterization_of_distributed_systems
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes
 
DISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docxDISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docx
 
Chapter One.ppt
Chapter One.pptChapter One.ppt
Chapter One.ppt
 
Lec+3-Introduction-to-Distributed-Systems.pdf
Lec+3-Introduction-to-Distributed-Systems.pdfLec+3-Introduction-to-Distributed-Systems.pdf
Lec+3-Introduction-to-Distributed-Systems.pdf
 
20IT703_PDS_PPT_Unit_I.ppt
20IT703_PDS_PPT_Unit_I.ppt20IT703_PDS_PPT_Unit_I.ppt
20IT703_PDS_PPT_Unit_I.ppt
 
Chapter 1-Introduction.ppt
Chapter 1-Introduction.pptChapter 1-Introduction.ppt
Chapter 1-Introduction.ppt
 
Chapter 3-Processes.ppt
Chapter 3-Processes.pptChapter 3-Processes.ppt
Chapter 3-Processes.ppt
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environment
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
 
Ch 2 network
Ch 2 networkCh 2 network
Ch 2 network
 

Recently uploaded

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

characteristicsofdistributedsystem-121004123308-phpapp02.ppt

  • 1. Characteristics of Distributed System  Concurrency  No global clock  Independent failures
  • 2. Challenges in distributed system  heterogeneity The internet enable users to access services and run application over a heterogenious collection of computers and networks. Heterogeneity applies to each of the following 1. Networks 2. computer hardware 3. operating system 4. programming Languages 5. implementation by different developer
  • 3. Openness The openness of a computer system is the characteristics that determines whether the system can be extended and re-implemented in verious ways.
  • 4. Security  Many of the information resources that are made available and maintain in distributed system have a high intrinsic value to there users. Security for information resourcs has three components. 1. confidentially (protection again disclosure to unautherized individuals) 2.integrity(protection against modification) 3.availability
  • 5. Scalability A system is describesd as scalable if remains effective when there significant increase in the number of resources and the numbers of users
  • 6. Concurrency there is a possibility that several clients will attempt to access a shared resource at the same time.therefor concurrency is another challenges
  • 7. Transparency System is perceived as a whole rather than a collection of independent computers. 1.Access transparency 2.Location transparency 3.Concurrency transparency 4.Replication transparency
  • 8.  Architectural models: (as client-server and peer process models)  Define the way in which the components of systems are:  Interact with one another, and  Mapped onto an underlying network of computers.  Describe the layered structure of distributed system software.  Fundamental models:  Concerned with properties that are common in all of the architectural models.  Addressed by three models:  The interaction model: deals with the difficulty of setting time limits.  The failure model: attempts to give a specification of the exhibited faults by processes and communication channels.  The security model: discusses possible threats to processes and communication channels. Distributed System Models
  • 9. Software Layers  In the layered view of a system each layer offers its services to the level above and builds its own service on the services of the layer below. Applications Computer and network hardware Platform Operating system Middleware
  • 10. Software Layers  Platform:  Lowest-level layers that provide services to other higher layers.  bring a system’s programming interface for communication and coordination between processes .  Middleware:  Layer of software to mask heterogeneity and provide a unified distributed programming interface to application programmers.  Provide services, infrastructure services, for use by application programs.  Examples:  Object Management Group’s Common Object Request Broker Architecture (CORBA).  Java Remote Object Invocation (RMI).  Microsoft’s Distributed Common Object Model (DCOM).  Limitation: require application level involvement in some tasks.
  • 11. System Architectures  The architecture include:  The division of responsibilities between system components.  The placement of the components on computers in the network.  Client-server model:  Most important and most widely distributed system architecture.  Client and server roles are assigned and changeable.  Servers may in turn be clients of other servers.  Services may be implemented as several interacting processes in different host computers to provide a service to client processes:  Servers partition the set of objects on which the service is based and distribute them among themselves (e.g. Web data and web servers)  Servers maintain replicated copies of the service objects on several hosts for reliability and performance (e.g. AltaVista)
  • 14. System Architectures  Caches and proxy servers:  Cache:  A store of recently used data objects that is closer to the client process than those remote objects.  When an object is needed by a client process the caching service checks the cache and supplies the object from there in case of an up-to-date copy is available.  Proxy server:  Provides a shared cache of web resources for client machines at a site or across several sites.  Increase availability and performance of a service by reducing load on the WAN and web servers.  May be used to access remote web servers through a firewall.
  • 16. System Architectures  Peer processes:  All processes play similar roles without destination as a client or a server.  Interacting cooperatively to perform a distributed activity.  Communications pattern will depend on application requirements. Application Coordination code Application Coordination code Application Coordination code A distributed application based on peer processes
  • 17. Fundamental Models (Interaction Model)  Distributed systems consists of multiple interacting processes .  Distributed processes behavior is described by distributed algorithms.  Distributed algorithms define the steps to be taken by each process in the system including the transmission of messages between them.  Transmitted messages transfer information between these processes and coordinate their ordering and synchronization activities.
  • 18. Fundamental Models (Interaction Model)  Interacting processes in a distributed system are affected by two significant factors: 1. Performance of communication channels: is characterized by:  Latency: delay between sending and receipt of a message including  Throughput: number of units (e.g., packets) delivered per time unit.  Bandwidth: total amount of information transmitted per time unit.  Jitter: variation in the time taken to deliver multiple messages of the same type (relevant to multimedia data).
  • 19. Fundamental Models (Interaction Model) 2. Computer clocks:  Each computer in a distributed system has its own internal clock to supply the value of the current time to local processes.  Therefore, two processes running on different computers read their clocks at the same time may take different time values.  Clock drift rate refers to the relative amount a computer clock differs from a perfect reference clock.  Several approaches to correcting the times on computer clocks are proposed.  Clock corrections can be made by sending messages, from a computer has an accurate time to other computers, which will still be affected by network delays.
  • 20. Fundamental Models (Interaction Model)  Setting time limits for process execution, .Two opposing extreme positions provide a pair of simple interaction models:  Synchronous distributed systems:  A system in which the following bounds are defined:  Time to execute each step of a process has known lower and upper bounds.  Each message transmitted over a channel is received within a known bounded time.  Each process has a local clock whose drift rate from perfect time has a known bound.
  • 21. Fundamental Models (Interaction Model)  Asynchronous distributed systems:  A system in which there are no bounds on:  process execution times.  message delivery times.  clock drift rate.  More abstract and general:  A distributed algorithm executing on one system is likely to also work on another one.
  • 22. Fundamental Models (Failure Model)  Defines the ways in which failure may occur in order to provide an understanding of its effects.  A taxonomy of failures which distinguish between the failures of processes and communication channels is provided:  Omission failures  Process or channel failed to do something.  Arbitrary failures  Any type of error can occur in processes or channels (worst).  Timing failures  Applicable only to synchronous distributed systems where time limits may not be met.
  • 23. Fundamental Models (Failure Model)  `Process p Process q Communication channel send Outgoing message buffer Incoming message buffer receive m Processes and channels 23
  • 24. Fundamental Models (Security Model)  Secure processes and channels and protect objects encapsulated against unauthorized access.  Protecting access to objects  Access rights  In client server systems: involves authentication of clients.  Protecting processes and interactions  Threats to processes: problem of unauthenticated requests / replies.  e.g., "man in the middle"  Threats to communication channels: enemy may copy, alter or inject messages as they travel across network.  Use of “secure” channels, based on cryptographic methods.
  • 25. Fundamental Models (Security Model)  ` Network invocation result Client Server Principal (user) Principal (server) Ob Access rights Objects and principals
  • 26. Fundamental Models (Security Model)  ` The enemy Communication channel Copy of m Process p Process q m The enemy m’ 2
  • 27. Limitation of Distributed System  Absence of a global clock  Absence of a shared memory