SlideShare a Scribd company logo
Introduction to Block Chain
Technology
Definition of a Distributed System
A distributed system is a collection of independent
computers that appears to its users as a single
coherent system
.... or ...
as a single system.
Resource Sharing and the Web
• Hardware resources (reduce costs)
• Data resources (shared usage of information)
• Service resources
• search engines
• computer-supported cooperative working
• Service vs. server (node or process )
Distributed application
• one single “system”
• one or several autonomous subsystems
• a collection of processors
• parallel processing
• Increased performance, reliability, fault tolerance
• partitioned or replicated data
• increased performance, reliability, fault tolerance
• Dependable systems, grid systems, enterprise systems
Why Distribution?
• Sharing of information and services
• Possibility to add components improves
• Availability
• Reliability
• fault tolerance
• performance
• scalability
Goals of DS
• Making resources accessible
• Distribution transparency
• Openness
• Scalability
• Security
• System design requirements
Challenges for Making Resources Accessible
• Naming
• Access control
• Security
• Availability
• Performance
• Mutual exclusion of users, fairness
• Consistency in some cases
Transparencies
• Access : Hide differences in data representation and how a
resource is accessed
• Location: Hide where a resource is located
• Migration : Hide that a resource may move to another
location
• Relocation : Hide that a resource may be moved to another
locationwhile in use (the others don’t notice)
• Replication :Hide that a resource is replicated
• Concurrency :Hide that a resource may be shared by
severalcompetitive users
• Failure :Hide the failure and recovery of a resource
• Persistence: Hide whether a (software) resource is in memory
or ondisk
Omission and arbitrary failures
• Fail-stop:Process halts and remains halted. Other processes may
detect this state.
• Crash:Process halts and remains halted. Other processes may not
be able to detect thisstate.
• Omission:A message inserted in an outgoing message buffer
never arrives at the otherend’s incoming message buffer.
• Send-omission:A process completes send, but the message is not
put in its outgoingmessage buffer.
• Receive-omission : A message is put in a process’s
incoming message buffer, but that process does not receive it.
• Arbitrary(Byzantine) :Process/channel exhibits arbitrary
behaviour: it maysend/transmit arbitrary messages at arbitrary
times, commit omissions; a process maystop or take an incorrect
step
Timing failures
• Clock: Process’s local clock exceeds the bounds
on its rate of drift from real time.
• Performance : Process exceeds the bounds on
the interval between two steps.
• Performance: A message’s transmission takes
longer than the stated bound.
Failure Handling
• More components
• increased fault rate
• Increased possibilities
•more redundancy => more possibilities for fault tolerance
• no centralized control => no fatal failure
• Issues
• Detecting failures
• Masking failures
• Recovery from failures
• Tolerating failures
• Redundancy
• partial failures
Concurrency
• Concurrency:
• Several simultaneous users => integrity of data
• mutual exclusion
• synchronization
• transaction processing in data bases
• Replicated data: consistency of information?
• Partitioned data: how to determine the state of
the system?
• Order of messages?
• There is no global clock!
Challenges for Scalability
• The system will remain effective when there is
a significant increase in
• number of resources
• number of users
• The architecture and the implementation
must allow it
• The algorithms must be efficient under the
circumstances to be expected
Challenges for Security
• Security: confidentiality, integrity, availability
• Vulnerable components
• channels (links <–> end-to-end paths)
• processes (clients, servers, outsiders)
• Threats
• information leakage
• integrity violation
• denial of service
• illegitimate usage
• Current issues:
• Denial-of-service attacks, security of mobile code,
information flow;
• open wireless ad-hoc environments
Security Model
• Threats to channels
• eavesdropping (data, traffic)
• tampering, replaying
• masquerading
• denial of service
• Threats to processes
• server: client’s identity;
• client: server’s identity
• unauthorized access (insecure access model)
• unauthorized information flow (insecure flow model)
Defeating Security Threats
• Techniques
• Cryptography
• authentication
• access control techniques
• intranet: firewalls
• services, objects: access control lists, capabilities
• Policies
• access control models
• lattice models
• information flow models
• Leads to: secure channels, secure processes, controlled
access,controlled flows
Distributed systems
• Distributed systems are a computing paradigm whereby two or
more nodes work with each other in a coordinated fashion in
order to achieve a common outcome
• DS modeled in such a way that end users see it as a single logical
platform
• Node can be defined as an individual player in a distributed
system and have their own memory and processor.
• All nodes are capable of sending and receiving messages to and
from each other.
• Nodes can be honest, faulty, or malicious
• A node that can exhibit arbitrary behavior is also known as a
Byzantine node.
• This arbitrary behavior can be intentionally malicious, which
is detrimental to the operation of the network.
• Generally, any unexpected behavior of a node on the network
can be categorized as Byzantine.
Challenge in distributed system Design
• Coordination between nodes
• Fault tolerance
• Even if some of the nodes become faulty or network
links break, the distributed system should tolerate
• D S should continue to work flawlessly in order to
achieve the desired result.
• Several algorithms and mechanisms has been proposed
to overcome these issues.
• Distributed systems are so challenging to design that a theorem
known as the CAP theorem has been proved and states that a
distributed system cannot have all much desired properties
simultaneously.

More Related Content

Similar to Introduction to Distributed Systems

Building data intensive applications
Building data intensive applicationsBuilding data intensive applications
Building data intensive applicationsAmit Kejriwal
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationSam Bowne
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing SecurityDevyani Vaidya
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating systemudaya khanal
 
Patterns of Distributed Application Design
Patterns of Distributed Application DesignPatterns of Distributed Application Design
Patterns of Distributed Application DesignGlobalLogic Ukraine
 
Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)Abdullah Ozturk
 
Final Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptxFinal Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptxHasibAhmadKhaliqi1
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITDeepraj Bhujel
 
Cis017 6 revision-2015_distributed
Cis017 6 revision-2015_distributedCis017 6 revision-2015_distributed
Cis017 6 revision-2015_distributedabdullah al-Thani
 
Applications of Distributed Systems
Applications of Distributed SystemsApplications of Distributed Systems
Applications of Distributed Systemssandra sukarieh
 
Patterns of Distributed Application Design
Patterns of Distributed Application DesignPatterns of Distributed Application Design
Patterns of Distributed Application DesignOrkhan Gasimov
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptMuhammadAbdullah311866
 
Csld phan tan va song song
Csld phan tan va song songCsld phan tan va song song
Csld phan tan va song songLê Anh Trung
 

Similar to Introduction to Distributed Systems (20)

Building data intensive applications
Building data intensive applicationsBuilding data intensive applications
Building data intensive applications
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Lecture 9.pptx
Lecture 9.pptxLecture 9.pptx
Lecture 9.pptx
 
3. challenges
3. challenges3. challenges
3. challenges
 
Unit 1
Unit 1Unit 1
Unit 1
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
Unit 1
Unit 1Unit 1
Unit 1
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident Preparation
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Patterns of Distributed Application Design
Patterns of Distributed Application DesignPatterns of Distributed Application Design
Patterns of Distributed Application Design
 
Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)Reactive Systems with Data Distribution Service (DDS)
Reactive Systems with Data Distribution Service (DDS)
 
Final Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptxFinal Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptx
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - IT
 
Cis017 6 revision-2015_distributed
Cis017 6 revision-2015_distributedCis017 6 revision-2015_distributed
Cis017 6 revision-2015_distributed
 
Applications of Distributed Systems
Applications of Distributed SystemsApplications of Distributed Systems
Applications of Distributed Systems
 
Patterns of Distributed Application Design
Patterns of Distributed Application DesignPatterns of Distributed Application Design
Patterns of Distributed Application Design
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.ppt
 
Csld phan tan va song song
Csld phan tan va song songCsld phan tan va song song
Csld phan tan va song song
 

More from KGSCSEPSGCT

Unit4_Managing Contracts.ppt
Unit4_Managing Contracts.pptUnit4_Managing Contracts.ppt
Unit4_Managing Contracts.pptKGSCSEPSGCT
 
REST Introduction.ppt
REST Introduction.pptREST Introduction.ppt
REST Introduction.pptKGSCSEPSGCT
 
3-SchemaExamples.pdf
3-SchemaExamples.pdf3-SchemaExamples.pdf
3-SchemaExamples.pdfKGSCSEPSGCT
 
Converting DTDs to XML Schemas.pdf
Converting DTDs to XML Schemas.pdfConverting DTDs to XML Schemas.pdf
Converting DTDs to XML Schemas.pdfKGSCSEPSGCT
 
XML-INTRODUCTION.pdf
XML-INTRODUCTION.pdfXML-INTRODUCTION.pdf
XML-INTRODUCTION.pdfKGSCSEPSGCT
 

More from KGSCSEPSGCT (12)

Unit4_Managing Contracts.ppt
Unit4_Managing Contracts.pptUnit4_Managing Contracts.ppt
Unit4_Managing Contracts.ppt
 
WSstandards.ppt
WSstandards.pptWSstandards.ppt
WSstandards.ppt
 
UDDI.ppt
UDDI.pptUDDI.ppt
UDDI.ppt
 
ROA.ppt
ROA.pptROA.ppt
ROA.ppt
 
REST Introduction.ppt
REST Introduction.pptREST Introduction.ppt
REST Introduction.ppt
 
3-SchemaExamples.pdf
3-SchemaExamples.pdf3-SchemaExamples.pdf
3-SchemaExamples.pdf
 
Converting DTDs to XML Schemas.pdf
Converting DTDs to XML Schemas.pdfConverting DTDs to XML Schemas.pdf
Converting DTDs to XML Schemas.pdf
 
XSL- XSLT.pdf
XSL- XSLT.pdfXSL- XSLT.pdf
XSL- XSLT.pdf
 
XML-INTRODUCTION.pdf
XML-INTRODUCTION.pdfXML-INTRODUCTION.pdf
XML-INTRODUCTION.pdf
 
XSLT.ppt
XSLT.pptXSLT.ppt
XSLT.ppt
 
2-DTD.ppt
2-DTD.ppt2-DTD.ppt
2-DTD.ppt
 
XML Schema.pdf
XML Schema.pdfXML Schema.pdf
XML Schema.pdf
 

Recently uploaded

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdfKamal Acharya
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxMd. Shahidul Islam Prodhan
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdfKamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdfAhmedHussein950959
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdfKamal Acharya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptssuser9bd3ba
 
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerapareshmondalnita
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...Amil baba
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfAbrahamGadissa
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionjeevanprasad8
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234AafreenAbuthahir2
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf884710SadaqatAli
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdfKamal Acharya
 
Danfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdfDanfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdfNurvisNavarroSanchez
 

Recently uploaded (20)

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
Danfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdfDanfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdf
 

Introduction to Distributed Systems

  • 1. Introduction to Block Chain Technology
  • 2. Definition of a Distributed System A distributed system is a collection of independent computers that appears to its users as a single coherent system .... or ... as a single system.
  • 3. Resource Sharing and the Web • Hardware resources (reduce costs) • Data resources (shared usage of information) • Service resources • search engines • computer-supported cooperative working • Service vs. server (node or process )
  • 4. Distributed application • one single “system” • one or several autonomous subsystems • a collection of processors • parallel processing • Increased performance, reliability, fault tolerance • partitioned or replicated data • increased performance, reliability, fault tolerance • Dependable systems, grid systems, enterprise systems
  • 5. Why Distribution? • Sharing of information and services • Possibility to add components improves • Availability • Reliability • fault tolerance • performance • scalability
  • 6. Goals of DS • Making resources accessible • Distribution transparency • Openness • Scalability • Security • System design requirements
  • 7. Challenges for Making Resources Accessible • Naming • Access control • Security • Availability • Performance • Mutual exclusion of users, fairness • Consistency in some cases
  • 8. Transparencies • Access : Hide differences in data representation and how a resource is accessed • Location: Hide where a resource is located • Migration : Hide that a resource may move to another location • Relocation : Hide that a resource may be moved to another locationwhile in use (the others don’t notice) • Replication :Hide that a resource is replicated • Concurrency :Hide that a resource may be shared by severalcompetitive users • Failure :Hide the failure and recovery of a resource • Persistence: Hide whether a (software) resource is in memory or ondisk
  • 9. Omission and arbitrary failures • Fail-stop:Process halts and remains halted. Other processes may detect this state. • Crash:Process halts and remains halted. Other processes may not be able to detect thisstate. • Omission:A message inserted in an outgoing message buffer never arrives at the otherend’s incoming message buffer. • Send-omission:A process completes send, but the message is not put in its outgoingmessage buffer. • Receive-omission : A message is put in a process’s incoming message buffer, but that process does not receive it. • Arbitrary(Byzantine) :Process/channel exhibits arbitrary behaviour: it maysend/transmit arbitrary messages at arbitrary times, commit omissions; a process maystop or take an incorrect step
  • 10. Timing failures • Clock: Process’s local clock exceeds the bounds on its rate of drift from real time. • Performance : Process exceeds the bounds on the interval between two steps. • Performance: A message’s transmission takes longer than the stated bound.
  • 11. Failure Handling • More components • increased fault rate • Increased possibilities •more redundancy => more possibilities for fault tolerance • no centralized control => no fatal failure • Issues • Detecting failures • Masking failures • Recovery from failures • Tolerating failures • Redundancy • partial failures
  • 12. Concurrency • Concurrency: • Several simultaneous users => integrity of data • mutual exclusion • synchronization • transaction processing in data bases • Replicated data: consistency of information? • Partitioned data: how to determine the state of the system? • Order of messages? • There is no global clock!
  • 13. Challenges for Scalability • The system will remain effective when there is a significant increase in • number of resources • number of users • The architecture and the implementation must allow it • The algorithms must be efficient under the circumstances to be expected
  • 14. Challenges for Security • Security: confidentiality, integrity, availability • Vulnerable components • channels (links <–> end-to-end paths) • processes (clients, servers, outsiders) • Threats • information leakage • integrity violation • denial of service • illegitimate usage • Current issues: • Denial-of-service attacks, security of mobile code, information flow; • open wireless ad-hoc environments
  • 16. • Threats to channels • eavesdropping (data, traffic) • tampering, replaying • masquerading • denial of service • Threats to processes • server: client’s identity; • client: server’s identity • unauthorized access (insecure access model) • unauthorized information flow (insecure flow model)
  • 17.
  • 18. Defeating Security Threats • Techniques • Cryptography • authentication • access control techniques • intranet: firewalls • services, objects: access control lists, capabilities • Policies • access control models • lattice models • information flow models • Leads to: secure channels, secure processes, controlled access,controlled flows
  • 19. Distributed systems • Distributed systems are a computing paradigm whereby two or more nodes work with each other in a coordinated fashion in order to achieve a common outcome • DS modeled in such a way that end users see it as a single logical platform • Node can be defined as an individual player in a distributed system and have their own memory and processor. • All nodes are capable of sending and receiving messages to and from each other. • Nodes can be honest, faulty, or malicious
  • 20. • A node that can exhibit arbitrary behavior is also known as a Byzantine node. • This arbitrary behavior can be intentionally malicious, which is detrimental to the operation of the network. • Generally, any unexpected behavior of a node on the network can be categorized as Byzantine.
  • 21. Challenge in distributed system Design • Coordination between nodes • Fault tolerance • Even if some of the nodes become faulty or network links break, the distributed system should tolerate • D S should continue to work flawlessly in order to achieve the desired result. • Several algorithms and mechanisms has been proposed to overcome these issues. • Distributed systems are so challenging to design that a theorem known as the CAP theorem has been proved and states that a distributed system cannot have all much desired properties simultaneously.