SlideShare a Scribd company logo
CS9222 Advanced Operating
System
Unit – II
Dr.A.Kathirvel
Professor & Head/IT - VCEW
Unit - II
Introduction – Issues – Communication Primitives –
Inherent Limitations - Lamport’s Logical Clock; Vector
Clock; Causal Ordering; Global State; Cuts;
Termination Detection. Distributed Mutual Exclusion
– Non-Token Based Algorithms – Lamport’s
Algorithm - Token-Based Algorithms – Suzuki-
Kasami’s Broadcast Algorithm – Distributed Deadlock
Detection – Issues – Centralized Deadlock-Detection
Algorithms - Distributed Deadlock-Detection
Algorithms. Agreement Protocols – Classification -
Solutions –Applications.
What is Distributed Systems?
Distributed System is used to describe a
system with the following characteristics:
Consists of several computers that do not
share a memory or a clock;
The computers communicate with each other
by exchanging messages over a
communication network; and
Each computer has its own memory and runs
its own operating system.
Architecture of Distributed OS
What is Distributed Operating Systems?
It extends the concepts of resource management and
user friendly interface for shared memory computers a
step further, encompassing a distributed computing
system consisting of several autonomous computers
connected by a communicating network.
A distributed OS is one that looks to its users like an
centralized OS but runs on multiple, independent CPUs.
The key concept is transparency. In other words, the use
of multiple processors should be invisible to the user
Issues in Distributed OS
Global Knowledge
Naming
Scalability
Compatibility
Process Synchronization
Resource Management
Security
Structuring
Global Knowledge
No Global Memory
No Global Clock
Unpredictable Message Delays
Naming
Name refers to objects [ Files, Computers etc]
Name Service Maps logical name to physical
address
Techniques
LookUp Tables [Directories]
Algorithmic
Combination of above two
Scalability
Grow with time
Scaling Dimensions – Size, Geographically &
Administratively
Techniques – Hiding Communication
Latencies, Distribution & Caching
Scaling Techniques (1)
Hide Communication Latencies
1.4
The difference between letting:
a) a server or
b) a client check forms as they are being filled Scalability cont….
Scaling Techniques (2)
Distribution
1.5
An example of dividing the DNS name space into zones.
Scalability cont….
Scaling Techniques (3)
Replication
Replicate components across the distributed
system
Replication increases availability , balancing
load distribution
Consistency problem has to be handled
Compatibility
Interoperability among resources in system
Levels of Compatibility – Binary Level,
Execution Level & Protocol Level
Process Synchronization
Difficult because of unavailability of shared
memory
Mutual Exclusion Problem
Resource Management
Make both local and remote resources
available
Specific Location of resource should be hidden
from user
Techniques
Data Migration [DFS, DSM]
Computation Migration [RPC]
Distributed Scheduling [ Load Balancing]
Security
Authentication – a entity is what it claims to
be
Authorization – what privileges an entity has
and making only those privileges available
Structuring
Techniques
Monolithic Kernel
Collective Kernel [Microkernel based , Mach, V-
Kernel, Chorus and Galaxy]
Object Oriented OS [Services are implemented as
objects, Eden, Choices, x-kernel, Medusa, Clouds,
Amoeba & Muse]
Client-Server Computing Model [Processes are
categorized as servers and clients]
Communication Primitives
High level constructs [Helps the program in
using underlying communication network]
Two Types of Communication Models
Message passing
Remote Procedure Calls
Message Passing
Two basic communication primitives
SEND(a,b) , a Message , b Destination
RECEIVE(c,d), c Source , d Buffer for storing the
message
Client-Server Computation Model
Client sends Message to server and waits
Server replies after computation
Message Passing cont..
Design Issues
 Blocking vs Non blocking primitives
 Nonblocking
 SEND primitive return the control to the user process as soon as the
message is copied from user buffer to kernel buffer
 Advantage : Programs have maximum flexibility in performing
computation and communication in any order
 Drawback  Programming becomes tricky and difficult
 Blocking
 SEND primitive does not return the control to the user process until
message has been sent or acknowledgement has been received
 Advantage : Program’s behavior is predictable
 Drawback  Lack of flexibility in programming
Message Passing cont..
Design Issues cont..
 Synchronous vs Asynchronous Primitives
 Synchronous
 SEND primitive is blocked until corresponding RECEIVE primitive
is executed at the target computer
 Asynchronous
 Messages are buffered
 SEND primitive does not block even if there is no corresponding
execution of the RECEIVE primitive
 The corresponding RECEIVE primitive can be either blocking or
non-blocking
Details to be handled in Message Passing
Pairing of Response with Requests
Data Representation
Sender should know the address of Remote
machine
Communication and System failures
Remote Procedure Call (RPC)
RPC is an interaction between a client and a
server
Client invokes procedure on sever
Server executes the procedure and pass the
result back to client
Calling process is suspended and proceeds
only after getting the result from server
RPC Design issues
Structure
Binding
Parameter and Result Passing
Error handling, semantics and Correctness
Structure
RPC mechanism is based upon stub procedures.
Unpack
Execute
Procedure
Stub
Procedure
Remote
Procedure
Return
Pack
result
Local
Procedure
Call
Local
Procedure
Call
User
Program
Stub
Procedure
Pack
parameters
& Transmit
wait
Unpack
Result
Return
from local
call
Client Machine
Server Machine
Binding
Determines remote procedure and machine
on which it will be executed
Check compatibility of the parameters passed
Use Binding Server
Binding
Binding Server
Receive
Query
Return
Server
Address Unpack
Stub
Procedure
Remote
Procedure
Return
Pack
result
Local
Procedure
Call
Local
Procedure
Call
Binding
Server
User
Program
Stub
Procedure
Pack
parameters
& Transmit
wait
Unpack
Result
Return
from local
call
Client Machine
Server Machine
Registering
Services
1
2
3
4
5
6
7
8
Parameter and Result Passing
 Stub Procedures Convert Parameters & Result to appropriate
form
 Pack parameters into a buffer
 Receiver Stub Unpacks the parameters
 Expensive if done on every call
 Send Parameters along with code that helps to identify format
so that receiver can do conversion
 Alternatively Each data type may have a standard format.
Sender will convert data to standard format and receiver will
convert from standard format to its local representation
 Passing Parameters by Reference
Error handling, Semantics and Correctness
 RPC may fail either due to computer or communication failure
 If the remote server is slow the program invoking remote
procedure may call it twice.
 If client crashes after sending RPC message
 If client recovers quickly after crash and reissues RPC
 Orphan Execution of Remote procedures
 RPC Semantics
 At least once semantics
 Exactly Once
 At most once
Correctness Condition
Given by Panzieri & Srivastava
Let Ci denote call made by machine & Wi
represents corresponding computation
If C2 happened after C1 ( C1  C2) &
Computations W2 & W1 share the same data,
then to be correct in the presence of failures
RPC should satisfy
 C1  C2 implies W1  W2

More Related Content

What's hot

Distributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithmDistributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithm
pinki soni
 
Naming in Distributed Systems
Naming in Distributed SystemsNaming in Distributed Systems
Naming in Distributed Systems
Nandakumar P
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memoryAshish Kumar
 
11. dfs
11. dfs11. dfs
Coda file system
Coda file systemCoda file system
Coda file system
Sneh Pahilwani
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
Sunita Sahu
 
File replication
File replicationFile replication
File replication
Klawal13
 
Synchronization in distributed computing
Synchronization in distributed computingSynchronization in distributed computing
Synchronization in distributed computing
SVijaylakshmi
 
Aggrement protocols
Aggrement protocolsAggrement protocols
Aggrement protocolsMayank Jain
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
Distributed Mutual exclusion algorithms
Distributed Mutual exclusion algorithmsDistributed Mutual exclusion algorithms
Distributed Mutual exclusion algorithms
MNM Jain Engineering College
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
SHIKHA GAUTAM
 
Resource management
Resource managementResource management
Resource management
Dr Sandeep Kumar Poonia
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactionsNilu Desai
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Ravindra Raju Kolahalam
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
MNM Jain Engineering College
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
Dilum Bandara
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed Systems
Pritom Saha Akash
 

What's hot (20)

Distributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithmDistributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithm
 
Naming in Distributed Systems
Naming in Distributed SystemsNaming in Distributed Systems
Naming in Distributed Systems
 
Distributed deadlock
Distributed deadlockDistributed deadlock
Distributed deadlock
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
11. dfs
11. dfs11. dfs
11. dfs
 
Coda file system
Coda file systemCoda file system
Coda file system
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
File replication
File replicationFile replication
File replication
 
Synchronization in distributed computing
Synchronization in distributed computingSynchronization in distributed computing
Synchronization in distributed computing
 
Aggrement protocols
Aggrement protocolsAggrement protocols
Aggrement protocols
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
4. system models
4. system models4. system models
4. system models
 
Distributed Mutual exclusion algorithms
Distributed Mutual exclusion algorithmsDistributed Mutual exclusion algorithms
Distributed Mutual exclusion algorithms
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
 
Resource management
Resource managementResource management
Resource management
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactions
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed Systems
 

Viewers also liked

CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
Kathirvel Ayyaswamy
 
Os Question Bank
Os Question BankOs Question Bank
Os Question Bank
Sonali Chauhan
 
Final Exam OS fall 2012-2013 with answers
Final Exam OS fall 2012-2013 with answersFinal Exam OS fall 2012-2013 with answers
Final Exam OS fall 2012-2013 with answers
Arab Open University and Cairo University
 
Advanced Operating System- Introduction
Advanced Operating System- IntroductionAdvanced Operating System- Introduction
Advanced Operating System- Introduction
Debasis Das
 
Complete Operating System notes
Complete Operating System notesComplete Operating System notes
Complete Operating System notes
Lakshmi Sarvani Videla
 
Advanced Operating System Lecture Notes
Advanced Operating System Lecture NotesAdvanced Operating System Lecture Notes
Advanced Operating System Lecture NotesAnirudhan Guru
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
Jasleen Kaur (Chandigarh University)
 
Operating system notes
Operating system notesOperating system notes
Operating system notesSANTOSH RATH
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
vtunotesbysree
 

Viewers also liked (9)

CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
Os Question Bank
Os Question BankOs Question Bank
Os Question Bank
 
Final Exam OS fall 2012-2013 with answers
Final Exam OS fall 2012-2013 with answersFinal Exam OS fall 2012-2013 with answers
Final Exam OS fall 2012-2013 with answers
 
Advanced Operating System- Introduction
Advanced Operating System- IntroductionAdvanced Operating System- Introduction
Advanced Operating System- Introduction
 
Complete Operating System notes
Complete Operating System notesComplete Operating System notes
Complete Operating System notes
 
Advanced Operating System Lecture Notes
Advanced Operating System Lecture NotesAdvanced Operating System Lecture Notes
Advanced Operating System Lecture Notes
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
 
Operating system notes
Operating system notesOperating system notes
Operating system notes
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
 

Similar to CS9222 ADVANCED OPERATING SYSTEMS

Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
Abhishek Jaisingh
 
Distributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGY
Distributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGYDistributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGY
Distributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGY
reginamutio48
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptx
FamiDan
 
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
Sehrish Asif
 
Task communication
Task communicationTask communication
Task communication
1jayanti
 
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.pptcharacteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
RamkumardevendiranDe
 
Chapter 3-Processes.ppt
Chapter 3-Processes.pptChapter 3-Processes.ppt
Chapter 3-Processes.ppt
sirajmohammed35
 
Presentation of ditributed system
Presentation of ditributed systemPresentation of ditributed system
Presentation of ditributed system
google
 
Middleware in Distributed System-RPC,RMI
Middleware in Distributed System-RPC,RMIMiddleware in Distributed System-RPC,RMI
Middleware in Distributed System-RPC,RMI
Prajakta Rane
 
Distributed Objects and Remote Invocation
Distributed Objects and Remote InvocationDistributed Objects and Remote Invocation
Distributed Objects and Remote Invocation
Medicaps University
 
Dos(rpc)avishek130650107020
Dos(rpc)avishek130650107020Dos(rpc)avishek130650107020
Dos(rpc)avishek130650107020
Avishek Sarkar
 
2.communcation in distributed system
2.communcation in distributed system2.communcation in distributed system
2.communcation in distributed system
Gd Goenka University
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure callsAshish Kumar
 
Topic 5- Communications v1.pptx
Topic 5- Communications v1.pptxTopic 5- Communications v1.pptx
Topic 5- Communications v1.pptx
DanishMahmood23
 
02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf
RobeliaJoyVillaruz
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environment
Maulik Patel
 
End to-end arguments in system design
End to-end arguments in system designEnd to-end arguments in system design
End to-end arguments in system designnody111
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2webhostingguy
 
High volume real time contiguous etl and audit
High volume real time contiguous etl and auditHigh volume real time contiguous etl and audit
High volume real time contiguous etl and audit
Remus Rusanu
 

Similar to CS9222 ADVANCED OPERATING SYSTEMS (20)

Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
 
Distributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGY
Distributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGYDistributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGY
Distributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGY
 
Chapter16 new
Chapter16 newChapter16 new
Chapter16 new
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptx
 
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
 
Task communication
Task communicationTask communication
Task communication
 
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.pptcharacteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
 
Chapter 3-Processes.ppt
Chapter 3-Processes.pptChapter 3-Processes.ppt
Chapter 3-Processes.ppt
 
Presentation of ditributed system
Presentation of ditributed systemPresentation of ditributed system
Presentation of ditributed system
 
Middleware in Distributed System-RPC,RMI
Middleware in Distributed System-RPC,RMIMiddleware in Distributed System-RPC,RMI
Middleware in Distributed System-RPC,RMI
 
Distributed Objects and Remote Invocation
Distributed Objects and Remote InvocationDistributed Objects and Remote Invocation
Distributed Objects and Remote Invocation
 
Dos(rpc)avishek130650107020
Dos(rpc)avishek130650107020Dos(rpc)avishek130650107020
Dos(rpc)avishek130650107020
 
2.communcation in distributed system
2.communcation in distributed system2.communcation in distributed system
2.communcation in distributed system
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
 
Topic 5- Communications v1.pptx
Topic 5- Communications v1.pptxTopic 5- Communications v1.pptx
Topic 5- Communications v1.pptx
 
02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environment
 
End to-end arguments in system design
End to-end arguments in system designEnd to-end arguments in system design
End to-end arguments in system design
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
 
High volume real time contiguous etl and audit
High volume real time contiguous etl and auditHigh volume real time contiguous etl and audit
High volume real time contiguous etl and audit
 

More from Kathirvel Ayyaswamy

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
Kathirvel Ayyaswamy
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
Kathirvel Ayyaswamy
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
Kathirvel Ayyaswamy
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
Kathirvel Ayyaswamy
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
Kathirvel Ayyaswamy
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
Kathirvel Ayyaswamy
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
Kathirvel Ayyaswamy
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
Kathirvel Ayyaswamy
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
Kathirvel Ayyaswamy
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
Kathirvel Ayyaswamy
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
Kathirvel Ayyaswamy
 

More from Kathirvel Ayyaswamy (20)

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 

Recently uploaded

Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 

Recently uploaded (20)

Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 

CS9222 ADVANCED OPERATING SYSTEMS

  • 1. CS9222 Advanced Operating System Unit – II Dr.A.Kathirvel Professor & Head/IT - VCEW
  • 2. Unit - II Introduction – Issues – Communication Primitives – Inherent Limitations - Lamport’s Logical Clock; Vector Clock; Causal Ordering; Global State; Cuts; Termination Detection. Distributed Mutual Exclusion – Non-Token Based Algorithms – Lamport’s Algorithm - Token-Based Algorithms – Suzuki- Kasami’s Broadcast Algorithm – Distributed Deadlock Detection – Issues – Centralized Deadlock-Detection Algorithms - Distributed Deadlock-Detection Algorithms. Agreement Protocols – Classification - Solutions –Applications.
  • 3. What is Distributed Systems? Distributed System is used to describe a system with the following characteristics: Consists of several computers that do not share a memory or a clock; The computers communicate with each other by exchanging messages over a communication network; and Each computer has its own memory and runs its own operating system.
  • 5. What is Distributed Operating Systems? It extends the concepts of resource management and user friendly interface for shared memory computers a step further, encompassing a distributed computing system consisting of several autonomous computers connected by a communicating network. A distributed OS is one that looks to its users like an centralized OS but runs on multiple, independent CPUs. The key concept is transparency. In other words, the use of multiple processors should be invisible to the user
  • 6. Issues in Distributed OS Global Knowledge Naming Scalability Compatibility Process Synchronization Resource Management Security Structuring
  • 7. Global Knowledge No Global Memory No Global Clock Unpredictable Message Delays
  • 8. Naming Name refers to objects [ Files, Computers etc] Name Service Maps logical name to physical address Techniques LookUp Tables [Directories] Algorithmic Combination of above two
  • 9. Scalability Grow with time Scaling Dimensions – Size, Geographically & Administratively Techniques – Hiding Communication Latencies, Distribution & Caching
  • 10. Scaling Techniques (1) Hide Communication Latencies 1.4 The difference between letting: a) a server or b) a client check forms as they are being filled Scalability cont….
  • 11. Scaling Techniques (2) Distribution 1.5 An example of dividing the DNS name space into zones. Scalability cont….
  • 12. Scaling Techniques (3) Replication Replicate components across the distributed system Replication increases availability , balancing load distribution Consistency problem has to be handled
  • 13. Compatibility Interoperability among resources in system Levels of Compatibility – Binary Level, Execution Level & Protocol Level
  • 14. Process Synchronization Difficult because of unavailability of shared memory Mutual Exclusion Problem
  • 15. Resource Management Make both local and remote resources available Specific Location of resource should be hidden from user Techniques Data Migration [DFS, DSM] Computation Migration [RPC] Distributed Scheduling [ Load Balancing]
  • 16. Security Authentication – a entity is what it claims to be Authorization – what privileges an entity has and making only those privileges available
  • 17. Structuring Techniques Monolithic Kernel Collective Kernel [Microkernel based , Mach, V- Kernel, Chorus and Galaxy] Object Oriented OS [Services are implemented as objects, Eden, Choices, x-kernel, Medusa, Clouds, Amoeba & Muse] Client-Server Computing Model [Processes are categorized as servers and clients]
  • 18. Communication Primitives High level constructs [Helps the program in using underlying communication network] Two Types of Communication Models Message passing Remote Procedure Calls
  • 19. Message Passing Two basic communication primitives SEND(a,b) , a Message , b Destination RECEIVE(c,d), c Source , d Buffer for storing the message Client-Server Computation Model Client sends Message to server and waits Server replies after computation Message Passing cont..
  • 20. Design Issues  Blocking vs Non blocking primitives  Nonblocking  SEND primitive return the control to the user process as soon as the message is copied from user buffer to kernel buffer  Advantage : Programs have maximum flexibility in performing computation and communication in any order  Drawback  Programming becomes tricky and difficult  Blocking  SEND primitive does not return the control to the user process until message has been sent or acknowledgement has been received  Advantage : Program’s behavior is predictable  Drawback  Lack of flexibility in programming Message Passing cont..
  • 21. Design Issues cont..  Synchronous vs Asynchronous Primitives  Synchronous  SEND primitive is blocked until corresponding RECEIVE primitive is executed at the target computer  Asynchronous  Messages are buffered  SEND primitive does not block even if there is no corresponding execution of the RECEIVE primitive  The corresponding RECEIVE primitive can be either blocking or non-blocking
  • 22. Details to be handled in Message Passing Pairing of Response with Requests Data Representation Sender should know the address of Remote machine Communication and System failures
  • 23. Remote Procedure Call (RPC) RPC is an interaction between a client and a server Client invokes procedure on sever Server executes the procedure and pass the result back to client Calling process is suspended and proceeds only after getting the result from server
  • 24. RPC Design issues Structure Binding Parameter and Result Passing Error handling, semantics and Correctness
  • 25. Structure RPC mechanism is based upon stub procedures. Unpack Execute Procedure Stub Procedure Remote Procedure Return Pack result Local Procedure Call Local Procedure Call User Program Stub Procedure Pack parameters & Transmit wait Unpack Result Return from local call Client Machine Server Machine
  • 26. Binding Determines remote procedure and machine on which it will be executed Check compatibility of the parameters passed Use Binding Server
  • 28. Parameter and Result Passing  Stub Procedures Convert Parameters & Result to appropriate form  Pack parameters into a buffer  Receiver Stub Unpacks the parameters  Expensive if done on every call  Send Parameters along with code that helps to identify format so that receiver can do conversion  Alternatively Each data type may have a standard format. Sender will convert data to standard format and receiver will convert from standard format to its local representation  Passing Parameters by Reference
  • 29. Error handling, Semantics and Correctness  RPC may fail either due to computer or communication failure  If the remote server is slow the program invoking remote procedure may call it twice.  If client crashes after sending RPC message  If client recovers quickly after crash and reissues RPC  Orphan Execution of Remote procedures  RPC Semantics  At least once semantics  Exactly Once  At most once
  • 30. Correctness Condition Given by Panzieri & Srivastava Let Ci denote call made by machine & Wi represents corresponding computation If C2 happened after C1 ( C1  C2) & Computations W2 & W1 share the same data, then to be correct in the presence of failures RPC should satisfy  C1  C2 implies W1  W2