SlideShare a Scribd company logo
1 of 99
UNIT-1
Distributed Systems
III-I
How to working Distributed Systems
• h/w,s/w architectures are used to maintain a distributed
systems
• Everything must be interconnected cpu via the communication
system
• Types of Distributed Systems
• i)client-server
• Client contact the server for data then format it and display it
to the end and user
• ii) 3-tier:
• Information about the client is stored in a middle tier rather
than on the client to simplify application deployment
iii)N-tier:
• Generally used when an application or server needs to forward
requests to additional enterprise services
• iv)peer to peer:
• There are no additional machines used to provide services or
manage resources
• Responsibility are uniformly distributed among machines
distributed system known as peers which can server
Advantages of distributed systems
• i)performance
• ii) distribution
• iii) Reliability(fault tolerance)
• iv) Incremental growth: are requirements on processing power
grow new machines can be added incrementally
• v) sharing of data/resources:
• Shared data is essential to many applications
• vi) communication
Disadvantages of distributed systems
• s/w
• Networking problems
• Security problems
• Performance
• Reliability and fault tolerance
Features of distributed systems:
• Concurrency
Concurrent program execution
• No global clock
Coordination of actions
• Independent failures
Failure in a machine would not known by other machines
Properties of distributed systems
• Heterogeneity
• Systems consist of heterogeneous h/w and s/w components
• Concurrency
• Multiple programs run together
• Shared data
• Data is accessed simultaneously by multiple entities
• No global clock
• No global clock is also one of the important properties and
inter dependencies are there
Distributed systems has the following significant consequences:
i)Concurrency:
• In a network of computers, concurrent program execution is
the norm.
• Components access and update shared resources (e.g.databases,
device drivers).
• Integrity of the system may be violated if concurrent updates
are not coordinated.
– Lost updates
– Inconsistent analysis
ii)No global clock:
• The only communication is by sending messages through a network
• Not possible to synchronize many computers on a network and guarantee
synchronization over time.
• Thus events are logically ordered not possible to have a process that can be
aware of a single global state.
• iii) Independent failures:
• The programs may not be able to detect whether the network has failed or
has become unusually slow
• Running processes may be unaware of other failure with context
• Failed processes may go undetected both are due to processes running in
isolation
Characterization of Distributed systems
• What are we trying to achieve when we construct a distributed
system?
• Certain common characteristics can be used to assess
distributed systems
i) Heterogeneity
ii)Openness
iii) Security
iv) Scalability
v)Failure Handling
vi)Concurrency
vii) Transparency
i)Heterogeneity
 The internet enables users to access services and run applications over a
heterogeneity(mixed)
 Variety and differences in
 Networks
 Computer hardware
 Operating systems
 Programming languages
 Implementations by different developers
 Middleware as software layers to provide a programming abstraction as
well as masking the heterogeneity of the underlying networks, hardware,
OS, and programming languages (e.g., CORBA).
 Mobile Code to refer to code that can be sent from one computer to another
and run at the destination (e.g., Java applets and Java virtual machine).
v) Failure Handling (Fault Tolerance)
• Hardware, software and networks fail!
• Distributed systems must maintain availability even at low
levels of hardware/software/network reliability.
• Fault tolerance is achieved by
– recovery
– redundancy
vi) Concurrency
• Components in distributed systems are executed in concurrent
processes.
• Components access and update shared resources (e.g. variables,
databases, device drivers).
• Integrity of the system may be violated if concurrent updates
are not coordinated.
– Lost updates
– Inconsistent analysis
vii)Transparency
• A system is transparent for a feature if the feature is
unobservable for the user
• Distributed systems should be perceived by users and
application programmers as a whole rather than as a collection
of cooperating components.
• Transparency has different aspects.
• These represent various properties that distributed systems
should have.
1)Access Transparency
• Enables local and remote information objects to be accessed
using identical operations.
• Example: File system operations in NFS, hyper link web page,
sql queries
2) Location Transparency
• Enables information objects to be accessed without knowledge
of their location.
• Example: URL ,Tables in distributed databases
3.Concurrency Transparency
• Enables several processes to operate concurrently using shared
information objects without interference between them.
• Example: Automatic teller machine network, Database
management system
4.Replication Transparency
• Enables multiple instances of information objects to be used to
increase reliability and performance without knowledge of the
replication by users or application programs
• Example: Web cache, Mirroring Web Pages.
5.Failure Transparency
• Enables the concealment of faults
• Allows users and applications to complete their tasks despite
the failure of h/w, s/w components.
• Example: email
6.Mobility Transparency
• Allows the movement of information objects within a system
without affecting the operations of users or application
programs
• Example: mobile phone
7.Performance Transparency
• Allows the system to be reconfigured to improve performance
as loads vary.
• Example: Distributed make.
8.Scaling Transparency
• Allows the system and applications to expand in scale without
change to the system structure or the application algorithms.
• Example: World-Wide-Web
• Example: Distributed Database
EXAMPLES OF DISTRIBUTED SYSTEMS
• Typical examples of Distributed systems 3 types are,
• i)The Internet
• ii) Intranets
• iii) Mobile and Ubiquitous computing.
i) The Internet:
• It is a very large distributed system that allows users
throughout the world to make use of its services.
• For example, World Wide Web, web search, online gaming,
email, social networks, ecommerce, etc. – WWW, email, FTP,
etc
• Internet protocols is a major technical achievement. - TCP/IP:
connect different type computer networks.
i) internet
• The figure illustrates a typical portion of the Internet.
Programs running on the computers connected to it interact by
passing messages in communication.
• the Internet protocols is a major technical achievement,
enabling a program running anywhere to address messages to
programs anywhere else.
• The figure shows a collection of intranets that sub networks
operated by compaines and other organizations.
internet
• Internet Service Providers (ISPs) are companies that provide
modem links and other types of connection to individual users
and small organizations, enabling them to access services
anywhere in the Intranets are linked together by backbones.
• A backbone is a network link with a high transmission
capacity, employing satellite connections, fiber optic cables
and other high-bandwidth circuits.
ii) Intranet
• An intranet is a portion of the internet that is separately
administered and has a boundary that can be configured to
enforce local security policies.
• It may be composed of several LANs linked by backbone
connections.
• The n/w configuration of a particular intranet is the
responsibility of the organization that administers it.
• An intranet is connected to the Internet via router, which
allows the users to use the services available in the Internet.
Intranet
• Firewall is used to protect intranet by preventing
unauthorized messages leaving or entering.
• The main issues arising in the design of components
for use in intranets are, File services are needed to
enable users to share data Firewalls should ensure
legitimate access to services.
• Cost of installation and support should be minimum.
the rest of
email server
Web server
Desktop
computers
File server
router/firewall
print and other servers
other servers
print
Local area
netw ork
email server
the Internet
Mobile and Ubiquitous computing:
• Due to the technological advances in device efficiency and
wireless networking have been increased to the integration of
small and portable computing into distributed systems.
These devices include:
• Laptop computers.
• Handheld devices, including mobile phones, smart phones,
GPS-enabled devices, pages, personal digital assistants
(PDAs), video cameras and digital cameras.
• Wearable devices, such as smart watches with functionality
similar to a PDA.
• Devices embedded in appliances such as washing machines,
hi-fi systems, cars and refrigerators.
Mobile and Ubiquitous computing:
• The user has access to three forms of wireless connection.
Their laptop has a means of connecting to the host’s wireless
LAN.
• This network provides coverage of a few hundred metres( a
floor of a building). It connects to the rest of the host intranet
via a gateway or access point.
• The user also has a mobile telephone, which is connected to
the internet.
• The phone gives access to the web and other internet services.
• Finally, the user carries a digital camera, which can
communicate over a personal area wireless network with a
device such as a printer.
Mobile and Ubiquitous computing:
• Mobile computing: moving computing devices in
and out intranets
– Transparent access to home intranet
– Access to local resources at remote site
 Location-aware computing
• Ubiquitous computing
– Small computing devices everywhere
– Communication between devices
Mobile computing:
• Mobile computing is the performance of computing tasks
while the user is on the move, or visiting places other than
their usual environment.
• In mobile computing, users who are away from their ‘home’
intranet are still provided with access to resources via the
devices they carry with them.
• The mobile computing increasing the service for users to
utilize resources such as printers or even sales points that are
conveniently nearby as they move around.
• This mobility service is also known as location-aware or
context-aware computing.
• Mobility introduces a number of challenges for distributed
systems including to maintain operation in the face of device
mobility.
Ubiquitous computing
• Ubiquitous computing is small, cheap computational device
that present in users’ physical environments, including the
home, office and even natural settings.
• The term ‘ubiquitous’ is intended to suggest that small
computing devices will eventually become so pervasive
(persistent) in everyday objects that they are hardly noticed.
• It means, its computational behavior will be transparently and
tied up with their physical function.
Ubiquitous computing:
• Ubiquitous computing is small, cheap computational device
that present in users’ physical environments, including the
home, office and even natural settings.
• The term ‘ubiquitous’ is intended to suggest that small
computing devices will eventually become so pervasive
(persistent) in everyday objects that they are hardly noticed.
• It means, its computational behavior will be transparently and
tied up with their physical function
Ubiquitous computing:
• The presence of computers everywhere only becomes useful
when they can communicate with one another.
• For example, it may be convenient for users to control their
washing machine or their entertainment system from their
phone or a ‘universal remote control’ device in the home.
• Equally, the washing machine could notify the user via a smart
badge or phone when the washing is done.
• The following figure shows a user who is visiting a host
organization.
• The figure shows the user’s home intranet and host intranet at
the site that the user is visiting. Both intranets are connected to
the rest of the Internet.
Ubiquitous computing:
• The user has access to three forms of wireless connection. Their
laptop has a means of connecting to the host’s wireless LAN.
• This network provides coverage of a few hundred metres( a floor of
a building).
• It connects to the rest of the host intranet via a gateway or access
point.
• The user also has a mobile telephone, which is connected to the
internet.
• The phone gives access to the web and other internet services.
Finally, the user carries a digital camera, which can communicate
over a personal area wireless network with a device such as a printer
Resource sharing and web
• The term “resource sharing” means the range of things that can
usefully be shared in a networked computer system
• Resource in a distributed systems are encapsulated within one
computer and can only be accessed from other computer by
communication
• Equipments are shared to reduce cost
• Types of resources
• i) h/w resource: hard disk, printer, camera, scanner
• ii) Data: File, database, web page
• iii)search engine: users need no contact between users
Resource sharing and web
Service – manage a collection of related resources and present
their functionalities to users and applications
Server – a process on networked computer that accepts requests
from processes on other computers to perform a service and
responds appropriately
• Client – the requesting process
• Remote invocation: is an interaction between client and server
from the point when the client sends its request to when it
receives the server response
Hardware and software resource sharing
• Example of h/w resource that can be usefully shared
• 1) cpu:
• a) computer server: it executes processor intensive applications
for clients
• b) remote object server: executes methods on behalf of clients
• c) worm program: it shares cpu capacity of desktop machine
with the local user
• 2)memory: cache server holds recently accessed web pages in
its RAM for faster access by other local computers
• 3)Disk: file server, virtual disk server, video on demand server
• 4) screen: Network window systems allow processes in remote
computers to update the content of windows
5.printer: Networked printers accept print jobs from many
computers and managing them with a queuing system
• s/w resources:
1.web page: web servers enable multiple clients to share read only page
content
2.file: file servers enable multiple clients to share read write files
3.database: database are intended to record the definitive state of some related
sets of data. multi user computers to manage concurrent updates
4.News group content: it makes read only copies of the recently posted news
items available to clients throughout the internet
5.video/audio stream: servers can store entire videos on disk and deliver them
at plat back speed to multiple clients simultaneously.
www(world wide web)
• www is an evolving the system for publishing and accessing
resources and services across the internet
• Web is an open system its operation are based on
communication standards and documents standards.
• www is collection of millions of files stored on thousands of
servers all over the world
• These files represent documents, pictures, video, sounds,
programs, interactive environments
• A web server is a computer connected to the internet that runs
a program that takes responsibility for storing the web files
• Web client is a computer that requests files from the web.
The Web is based on three main standard technological
components:
• i) Hyper Text Markup Language (HTML),
• ii) Uniform Resource Locators (URLs),
• iii) HTTP(The Hyper Text Transfer Protocol)
• i) Hyper Text Markup Language (HTML),
• Html is the universal language of the web html specifies the
contents and layout of web pages
• The content contains text, table, form, image,link, information
for search engine, etc
• The layout is in the form of text format, background and frame
• Html is also used to specify links and which resources are
associated with them
ii) Uniform Resource Locator(URL)
URLs : The purpose of a Uniform Resource Locator [www.w3.org III] is to
identify a resource. It means, the term used in web architecture documents
is Uniform Resource Identifier (URI)
The ‘scheme’, declares which type of URL this is. URLs are required to
identify a variety of resources.
For example,
mailto:joe@anISP.net identifies a user’s email address;
ftp://ftp.downloadIt.com/software/aProg.exe identifies a file that is to be
retrieved using the File Transfer Protocol (FTP) rather than the more
commonly used protocol HTTP.
HTTP URLs are the most widely used, for accessing resources using the
standard HTTP protocol. An HTTP URL has two main jobs: to identify
which web server maintains the resource, and to identify which of the
resources at that server is required.
HTTP URLs are of the following form:
http:// servername [:port] [/pathName] [?query] [ #fragment]
iii) HTTP:(HyperText Transfer Protocol)
• HTTP:The HyperText Transfer Protocol defines the ways in which browsers
and other types of client interact with web servers.
Main features
• –Request-replay interaction : HTTP is a ‘request-reply’ protocol. The client
sends a request message to the server containing the URL of the required
resource.
• The server looks up the path name and, if it exists, sends back the resource’s
content in a reply message to the client. Otherwise, it sends back an error
response such as the familiar ‘404 Not Found’.
• Content types : The strings that denote the type of content are called MIME
(RFC2045,2046)
• – One resource per request: Clients specify one resource per HTTP request.
If a web page contains nine images, say, then the browser will issue a total of
ten separate requests to obtain the entire contents of the page.
• – Simple access control: Any user with network connectivity to a web server
can access any of its published resources. for example, by typing in a password.
Challenges of Distributed systems
Design issues and challenges of distributed systems are as
follows
i) Heterogeneity
ii)Openness
iii) Security
iv) Scalability
v)Failure Handling
vi)Concurrency
vii) Transparency
Systems model
architectural model
• The architecture of a system is its structure in terms of separately specified
components and their interrelationships.
• The overall goal is to ensure that the structure will meet present and likely
future demands on it.
• Software Layers in DS
i) Platform:
• The bottom layers (i.e., operating system, computer and network hardware
layers) provide a platform for distributed applications.
• The services provided by these bottom layers are utilized by higher layers.
• In every computer, operating system layer and computer network layer are
implemented separately.
• This implementation facilitates communication and coordination b/w
processes by transferring the system’s programming interface to that level
• examples of platform are: Intel x86/Windows, Intel x86/Linux Intel
x86/Solaris , SPARC/SunOS, PowePC/MacOS
Architectural model
i)Software Layers
Applications, services
Computer and network hardw are
Platform
Operating system
Middlew are
ii. Middleware:
• A piece of software placed b/w the application and operating
system is called “middleware”.
• It is the middle most level which acts as mediator in between
the platform and application services it is used for
heterogeneity
2 .System Architecture:
The most evident aspect of distributed system design is the
• division of responsibilities between system components
(applications, servers, and other processes) and
• the placement of the components on computers in the
network.
• We have 9 basic architectural models in distributed systems.
i) Client server model
• The system is structured as a set of processes called server that
offer services to the users called clients
• The client server model is usually based on a simple request or
reply protocol, implemented with send/receive primitives or
using RPC or RMI
• The client send a request message to the server asking for
some service
• The server does the work and returns a result or an error code
if the work could not be performed
Client server model
ii)Peer to peer model
• All processes (object) play similar role do not require a server
process
• There is no distinction between clients and servers all are same
• The pattern of communication depends on the particular
application
iii) Multiple server model:
Services may be provided by multiple servers the server may be
partitions the set of objects on which the service is based and
distribute the work in between themselves
iv) Proxy server model
• A proxy server provides copies of resources which are
managed by other servers
• Proxy servers are typically used as caches for web resources
they maintain a cache of recently visited web pages or other
resources
• When a request is issued by a client the proxy server is first
checked if the requested object is available there
• Proxy servers can be located at each client or can be shared
several clients
• The purpose is to increase performance and availability by
avoiding frequent accesses to remote servers
Proxy server model
v) Mobile code
• A code that is sent from one computer to another computer and
run at the destination computer is called as mobile code
• Java applets are a well known and widely used example of
mobile code
Vi) mobile Agent
• A running program (code and data) that travels from one computer
to another in a network carrying out of a task, usually on behalf of
some other process.
• A complete program which carrier code plus data than can work
independently.
• Examples of the tasks that can be done by mobile agents are:
• To collecting information.
• To install and maintain software maintain on the computers within
an organization.
mobile Agent
• Fig:
code+data
Result
USERS
Web
server
vii)Network computers
• Network computer do not store os or application code locally
all code is loaded from the servers and run locally on the
network computer
• All files related to management of application is stored and
managed remotely
• As data and files are stored remotely so user can migrate from
one network computer to another network computer
Viii) thin client
• It is a software layer that supports a window-based user
interface on a computer that is local to the user while
executing application programs on a remote computer.
• This architecture has the same low management and hardware
costs as the network computer scheme.
• Instead of downloading the code of applications into the user’s
computer, it runs them on a compute server.
• Compute server is a powerful computer that has the capacity to
run large numbers of application simultaneously.
ix) Mobile devices
• Mobile devices are hardware computing components that
move between physical locations and thus networks, carrying
software component with them.
• Many of these devices are capable of wireless networking
ranges of hundreds of meters such as WiFi (IEEE 802.11), or
about 10 meters such as Bluetooth.
• Mobile devices include:
• Laptops
• Personal digital assistants (PDAs)
• Mobile phones
• Digital cameras
• Wearable computers such as smart watches
Fundamental model
• This models are based on some fundamental properties such as
characteristics, failures and security there are types of
fundamental models and they are
• 1) interaction model
• 2) failure model
• 3) security model
• 1) interaction model
this model, computation occurs within the processes
The processes interact by passing messages which result in
• a) Communication(information flow)
• b) Coordination (synchronizing and ordering of activities)
between processes.
c) Interaction model reflects the facts that communication takes
place with delay
• d) performance of communication channel depends on latency,
bandwidth,jitter
(which means flow between two systems order may get changed,
so jitter will put them in order and send to destination)
Two variance of the interaction model
• Synchronous distributed system
• Asynchronous distributed system
Clock drift rate
• The difference of clock rate is called clock drift no two clocks
would have the same clock rate of oscillations i.e, clock rate
would be different the drift rate varies from clock to clock.
2.Failure model
• This model defines and classifies the faults that occur and it is
important to understand the kinds of failures that may occur in
a system
• Types of failures we come across in distributed system are:
• a) Fail stop: a process stops and remains halted other processes
can detect that the processes has failed
• b) crash: A process stops and remains halted but other
processes may not be able to detect this state
• C) Omission:
• A message is inserted in an outgoing message buffer never
arrives at the other end i.e, incoming message buffer
d) Arbitrary:
• If a process/channels exhibits arbitrary behavior it may
send/transmit arbitrary messages at arbitrary times, commit
missions where a process may stop or take an incorrect step
• e) Timing failure :
• If clock drift gets exceeded than allowable bound we get this
kind of failure
3) security model:
• There are several potential threats a system designer need to be
aware of and they are
• i) threats to processes
• ii) threat to communication channels
• iii) Denial of service
i) threats to processes
• If an attacker send a request or response using false identify
• ii) threat to communication channels
• If an attacker may listen to message over communication
channel and save it to misuse
iii) Denial of service: if an attacker overload the server by making
excessive requests
• We use cryptography and authentication are often used to
provide security
Networking and Internetworking
• The networks used in distributed systems are
built from a variety of
• Transmission media(wire,cable,fiber and
wireless channel)
• Hardware devices(routers, switches,
bridges,hubs)
Some Terminology
• Communication subsystem:
• The collection of h/w and s/w components that
provide the communication facilities for a
distributed system.
• Host: computer or other device that use
network for communication purposes
• Node: any computer or switching device
attached to a network
Network Performance
Latency:
• the delay that occurs after a send operation is executed
before data starts to arrive at the destination computer
• Measured as the time required to transfer an empty
message
Data Transfer Rate
- speed of transfer of data between two machines
- measured in bits per second
• Message Transfer Time = latency + length/data transfer
rate
Total system bandwidth - volume of traffic on a network
Network performance
km
Types of network
• A computer network is mainly of four types:
• LAN(Local Area Network)
• PAN(Personal Area Network)
• MAN(Metropolitan Area Network)
• WAN(Wide Area Network)
LAN(Local Area Network)
• Local Area Network is a group of computers connected to each
other in a small area such as building, office.
• LAN is used for connecting two or more personal computers
through a communication medium such as twisted pair, coaxial
cable, etc.
• It is less costly as it is built with inexpensive hardware such as hubs,
network adapters, and Ethernet cables.
• The data is transferred at an extremely faster rate in Local Area
Network.
• Local Area Network provides higher security.
LAN
PAN(Personal Area Network)
• Personal Area Network is a network arranged within an
individual person, typically within a range of 10 meters.
• Personal Area Network is used for connecting the computer
devices of personal use is known as Personal Area Network.
• Thomas Zimmerman was the first research scientist to bring
the idea of the Personal Area Network.
• Personal Area Network covers an area of 30 feet.
• Personal computer devices that are used to develop the
personal area network are the laptop, mobile phones, media
player and play stations.
Example:
• Offline Network, Small Home Office:
PAN
There are two types of Personal Area Network:
i)Wireless Personal Area Network:
• Wireless Personal Area Network is developed by simply using
wireless technologies such as WiFi, Bluetooth. It is a low
range network.
ii) Wired Personal Area Network:
• Wired Personal Area Network is created by using the USB.
MAN(Metropolitan Area Network)
• A metropolitan area network is a network that covers a larger
geographic area by interconnecting a different LAN to form a
larger network.
• Government agencies use MAN to connect to the citizens and
private industries.
• In MAN, various LANs are connected to each other through a
telephone exchange line.
• The most widely used protocols in MAN are RS-232, Frame
Relay, ATM, etc.
• It has a higher range than Local Area Network(LAN).
Uses Of Metropolitan Area Network:
• MAN is used in communication between the banks in
a city.
• It can be used in an Airline Reservation.
• It can be used in a college within a city.
• It can also be used for communication in the military.
WAN(Wide Area Network)
• A Wide Area Network is a network that extends over a large
geographical area such as states or countries.
• A Wide Area Network is quite bigger network than the LAN.
• A Wide Area Network is not limited to a single location, but it
spans over a large geographical area through a telephone line,
fibre optic cable or satellite links.
• The internet is one of the biggest WAN in the world.
• A Wide Area Network is widely used in the field of Business,
government, and education.
Example of WAN
• Mobile Broadband: A 4G network is widely used across a
region or country.
• Private network: A bank provides a private network that
connects the 44 offices.
• This network is made by using the telephone leased line
provided by the telecom company.
Network principles
• Packet Transmission:
• A packet is a sequence of binary data with addressing
information to identify the so and destination computers.
• A network message with arbitary length is divided before
transmission into packets of restricted length.
• 4 types of switching are used in computer network:
• 1.Broadcast:
• In this type of switching all messages sent to all connected
computers.
• each computer is responsible of extracting messages addressed
to it. this approach is used in Ethernet and wireless networks
ii) Circuit switching
• This approach is used in the telephone system a physical link
is established between the sender and receiver
iii) packet switching:
• It is also known as store and forward, at each switching node a
computer manages the packets by reading each one into
memory, examining its destination and choosing an outgoing
circuit appropriately
iv) frame relay:
• Reading and storing the whole of each packet makes
performance overhead.
• so, instead of reading and storing overall packet it is better to
examine its header which contains the information stream of
bits
Protocol software/protocol suites
• Protocol is a well –known set of rules and format for
communication between processes to perform a given task
• It is implemented by a pair of software modules located in
sending and receiving computers
• Protocol software modules are arranged in a hierarchy of
layers
• Data is sent through different layers each layer of network
software communicates with the layers above and below it
• 7 layers reference model for open systems
interconnection(OSI) adopted by ISO to encourage the
development of protocol standards that would meet the
requirements for open systems
1.Physical layer:
this layer coordinates the functions required to transmit a bit stream
over a physical medium
2.Data link layer:
• this layer transforms the raw transmission facility to a reliable
link and is responsible for node to node delivery
3.network layer:
• This layer is responsible for the source –destination delivery of
a packet
4.transport layer:
• This layer is responsible for process to process delivery of
entire message.
5.session layer:
• It is a network dialog controllers it was designed to establish
,maintain and synchronize the interaction between
communicating devices
• 6.Presentation layer
• It was designed to handle the syntax and semantics of the
information exchanged between the two system
7.Application layer:
• It enables the user to access the network it provides user
interfaces and support for services such as electronic email,
remote file access, www etc

More Related Content

Similar to PPTS DS UNIT-1.pptx

Computer communication network
Computer communication networkComputer communication network
Computer communication networkhimz676987
 
20IT703_PDS_PPT_Unit_I.ppt
20IT703_PDS_PPT_Unit_I.ppt20IT703_PDS_PPT_Unit_I.ppt
20IT703_PDS_PPT_Unit_I.pptsuganthi66742
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system Sarvesh Meena
 
Grid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxGrid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxDrAdeelAkram2
 
introduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfintroduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfsnehan789
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdfNehaam3
 
introduction of network
introduction of networkintroduction of network
introduction of networkBishalWosti1
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkSudhriti Gupta
 
CCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptxCCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptxNiviV4
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating systemudaya khanal
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureNiviV4
 
Lect 2 Types of Distributed Systems.pptx
Lect 2 Types of Distributed Systems.pptxLect 2 Types of Distributed Systems.pptx
Lect 2 Types of Distributed Systems.pptxPardonSamson
 
Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing Hitesh Kumar Markam
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxLeahRachael
 
Chapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxChapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxMohdSyaifuadJasemi
 

Similar to PPTS DS UNIT-1.pptx (20)

Computer communication network
Computer communication networkComputer communication network
Computer communication network
 
20IT703_PDS_PPT_Unit_I.ppt
20IT703_PDS_PPT_Unit_I.ppt20IT703_PDS_PPT_Unit_I.ppt
20IT703_PDS_PPT_Unit_I.ppt
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
 
Grid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxGrid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptx
 
introduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfintroduction to cloud computing for college.pdf
introduction to cloud computing for college.pdf
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
introduction of network
introduction of networkintroduction of network
introduction of network
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
CCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptxCCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptx
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
CCUnit1.pdf
CCUnit1.pdfCCUnit1.pdf
CCUnit1.pdf
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
 
Lect 2 Types of Distributed Systems.pptx
Lect 2 Types of Distributed Systems.pptxLect 2 Types of Distributed Systems.pptx
Lect 2 Types of Distributed Systems.pptx
 
Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
lect02.pdf
lect02.pdflect02.pdf
lect02.pdf
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networks: The Big Picture
Networks: The Big PictureNetworks: The Big Picture
Networks: The Big Picture
 
Distributed Systems.pptx
Distributed Systems.pptxDistributed Systems.pptx
Distributed Systems.pptx
 
Chapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxChapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptx
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

PPTS DS UNIT-1.pptx

  • 2.
  • 3. How to working Distributed Systems • h/w,s/w architectures are used to maintain a distributed systems • Everything must be interconnected cpu via the communication system • Types of Distributed Systems • i)client-server • Client contact the server for data then format it and display it to the end and user • ii) 3-tier: • Information about the client is stored in a middle tier rather than on the client to simplify application deployment
  • 4. iii)N-tier: • Generally used when an application or server needs to forward requests to additional enterprise services • iv)peer to peer: • There are no additional machines used to provide services or manage resources • Responsibility are uniformly distributed among machines distributed system known as peers which can server
  • 5. Advantages of distributed systems • i)performance • ii) distribution • iii) Reliability(fault tolerance) • iv) Incremental growth: are requirements on processing power grow new machines can be added incrementally • v) sharing of data/resources: • Shared data is essential to many applications • vi) communication
  • 6. Disadvantages of distributed systems • s/w • Networking problems • Security problems • Performance • Reliability and fault tolerance
  • 7.
  • 8.
  • 9. Features of distributed systems: • Concurrency Concurrent program execution • No global clock Coordination of actions • Independent failures Failure in a machine would not known by other machines
  • 10. Properties of distributed systems • Heterogeneity • Systems consist of heterogeneous h/w and s/w components • Concurrency • Multiple programs run together • Shared data • Data is accessed simultaneously by multiple entities • No global clock • No global clock is also one of the important properties and inter dependencies are there
  • 11. Distributed systems has the following significant consequences: i)Concurrency: • In a network of computers, concurrent program execution is the norm. • Components access and update shared resources (e.g.databases, device drivers). • Integrity of the system may be violated if concurrent updates are not coordinated. – Lost updates – Inconsistent analysis
  • 12. ii)No global clock: • The only communication is by sending messages through a network • Not possible to synchronize many computers on a network and guarantee synchronization over time. • Thus events are logically ordered not possible to have a process that can be aware of a single global state. • iii) Independent failures: • The programs may not be able to detect whether the network has failed or has become unusually slow • Running processes may be unaware of other failure with context • Failed processes may go undetected both are due to processes running in isolation
  • 13. Characterization of Distributed systems • What are we trying to achieve when we construct a distributed system? • Certain common characteristics can be used to assess distributed systems i) Heterogeneity ii)Openness iii) Security iv) Scalability v)Failure Handling vi)Concurrency vii) Transparency
  • 14. i)Heterogeneity  The internet enables users to access services and run applications over a heterogeneity(mixed)  Variety and differences in  Networks  Computer hardware  Operating systems  Programming languages  Implementations by different developers  Middleware as software layers to provide a programming abstraction as well as masking the heterogeneity of the underlying networks, hardware, OS, and programming languages (e.g., CORBA).  Mobile Code to refer to code that can be sent from one computer to another and run at the destination (e.g., Java applets and Java virtual machine).
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. v) Failure Handling (Fault Tolerance) • Hardware, software and networks fail! • Distributed systems must maintain availability even at low levels of hardware/software/network reliability. • Fault tolerance is achieved by – recovery – redundancy
  • 20. vi) Concurrency • Components in distributed systems are executed in concurrent processes. • Components access and update shared resources (e.g. variables, databases, device drivers). • Integrity of the system may be violated if concurrent updates are not coordinated. – Lost updates – Inconsistent analysis
  • 21. vii)Transparency • A system is transparent for a feature if the feature is unobservable for the user • Distributed systems should be perceived by users and application programmers as a whole rather than as a collection of cooperating components. • Transparency has different aspects. • These represent various properties that distributed systems should have.
  • 22. 1)Access Transparency • Enables local and remote information objects to be accessed using identical operations. • Example: File system operations in NFS, hyper link web page, sql queries 2) Location Transparency • Enables information objects to be accessed without knowledge of their location. • Example: URL ,Tables in distributed databases
  • 23. 3.Concurrency Transparency • Enables several processes to operate concurrently using shared information objects without interference between them. • Example: Automatic teller machine network, Database management system 4.Replication Transparency • Enables multiple instances of information objects to be used to increase reliability and performance without knowledge of the replication by users or application programs • Example: Web cache, Mirroring Web Pages.
  • 24. 5.Failure Transparency • Enables the concealment of faults • Allows users and applications to complete their tasks despite the failure of h/w, s/w components. • Example: email 6.Mobility Transparency • Allows the movement of information objects within a system without affecting the operations of users or application programs • Example: mobile phone
  • 25. 7.Performance Transparency • Allows the system to be reconfigured to improve performance as loads vary. • Example: Distributed make. 8.Scaling Transparency • Allows the system and applications to expand in scale without change to the system structure or the application algorithms. • Example: World-Wide-Web • Example: Distributed Database
  • 26. EXAMPLES OF DISTRIBUTED SYSTEMS • Typical examples of Distributed systems 3 types are, • i)The Internet • ii) Intranets • iii) Mobile and Ubiquitous computing. i) The Internet: • It is a very large distributed system that allows users throughout the world to make use of its services. • For example, World Wide Web, web search, online gaming, email, social networks, ecommerce, etc. – WWW, email, FTP, etc • Internet protocols is a major technical achievement. - TCP/IP: connect different type computer networks.
  • 27.
  • 28. i) internet • The figure illustrates a typical portion of the Internet. Programs running on the computers connected to it interact by passing messages in communication. • the Internet protocols is a major technical achievement, enabling a program running anywhere to address messages to programs anywhere else. • The figure shows a collection of intranets that sub networks operated by compaines and other organizations.
  • 29. internet • Internet Service Providers (ISPs) are companies that provide modem links and other types of connection to individual users and small organizations, enabling them to access services anywhere in the Intranets are linked together by backbones. • A backbone is a network link with a high transmission capacity, employing satellite connections, fiber optic cables and other high-bandwidth circuits.
  • 30. ii) Intranet • An intranet is a portion of the internet that is separately administered and has a boundary that can be configured to enforce local security policies. • It may be composed of several LANs linked by backbone connections. • The n/w configuration of a particular intranet is the responsibility of the organization that administers it. • An intranet is connected to the Internet via router, which allows the users to use the services available in the Internet.
  • 31. Intranet • Firewall is used to protect intranet by preventing unauthorized messages leaving or entering. • The main issues arising in the design of components for use in intranets are, File services are needed to enable users to share data Firewalls should ensure legitimate access to services. • Cost of installation and support should be minimum.
  • 32. the rest of email server Web server Desktop computers File server router/firewall print and other servers other servers print Local area netw ork email server the Internet
  • 33. Mobile and Ubiquitous computing: • Due to the technological advances in device efficiency and wireless networking have been increased to the integration of small and portable computing into distributed systems. These devices include: • Laptop computers. • Handheld devices, including mobile phones, smart phones, GPS-enabled devices, pages, personal digital assistants (PDAs), video cameras and digital cameras. • Wearable devices, such as smart watches with functionality similar to a PDA. • Devices embedded in appliances such as washing machines, hi-fi systems, cars and refrigerators.
  • 34.
  • 35. Mobile and Ubiquitous computing: • The user has access to three forms of wireless connection. Their laptop has a means of connecting to the host’s wireless LAN. • This network provides coverage of a few hundred metres( a floor of a building). It connects to the rest of the host intranet via a gateway or access point. • The user also has a mobile telephone, which is connected to the internet. • The phone gives access to the web and other internet services. • Finally, the user carries a digital camera, which can communicate over a personal area wireless network with a device such as a printer.
  • 36. Mobile and Ubiquitous computing: • Mobile computing: moving computing devices in and out intranets – Transparent access to home intranet – Access to local resources at remote site  Location-aware computing • Ubiquitous computing – Small computing devices everywhere – Communication between devices
  • 37. Mobile computing: • Mobile computing is the performance of computing tasks while the user is on the move, or visiting places other than their usual environment. • In mobile computing, users who are away from their ‘home’ intranet are still provided with access to resources via the devices they carry with them. • The mobile computing increasing the service for users to utilize resources such as printers or even sales points that are conveniently nearby as they move around. • This mobility service is also known as location-aware or context-aware computing. • Mobility introduces a number of challenges for distributed systems including to maintain operation in the face of device mobility.
  • 38. Ubiquitous computing • Ubiquitous computing is small, cheap computational device that present in users’ physical environments, including the home, office and even natural settings. • The term ‘ubiquitous’ is intended to suggest that small computing devices will eventually become so pervasive (persistent) in everyday objects that they are hardly noticed. • It means, its computational behavior will be transparently and tied up with their physical function.
  • 39. Ubiquitous computing: • Ubiquitous computing is small, cheap computational device that present in users’ physical environments, including the home, office and even natural settings. • The term ‘ubiquitous’ is intended to suggest that small computing devices will eventually become so pervasive (persistent) in everyday objects that they are hardly noticed. • It means, its computational behavior will be transparently and tied up with their physical function
  • 40. Ubiquitous computing: • The presence of computers everywhere only becomes useful when they can communicate with one another. • For example, it may be convenient for users to control their washing machine or their entertainment system from their phone or a ‘universal remote control’ device in the home. • Equally, the washing machine could notify the user via a smart badge or phone when the washing is done. • The following figure shows a user who is visiting a host organization. • The figure shows the user’s home intranet and host intranet at the site that the user is visiting. Both intranets are connected to the rest of the Internet.
  • 41. Ubiquitous computing: • The user has access to three forms of wireless connection. Their laptop has a means of connecting to the host’s wireless LAN. • This network provides coverage of a few hundred metres( a floor of a building). • It connects to the rest of the host intranet via a gateway or access point. • The user also has a mobile telephone, which is connected to the internet. • The phone gives access to the web and other internet services. Finally, the user carries a digital camera, which can communicate over a personal area wireless network with a device such as a printer
  • 42. Resource sharing and web • The term “resource sharing” means the range of things that can usefully be shared in a networked computer system • Resource in a distributed systems are encapsulated within one computer and can only be accessed from other computer by communication • Equipments are shared to reduce cost • Types of resources • i) h/w resource: hard disk, printer, camera, scanner • ii) Data: File, database, web page • iii)search engine: users need no contact between users
  • 43. Resource sharing and web Service – manage a collection of related resources and present their functionalities to users and applications Server – a process on networked computer that accepts requests from processes on other computers to perform a service and responds appropriately • Client – the requesting process • Remote invocation: is an interaction between client and server from the point when the client sends its request to when it receives the server response
  • 44. Hardware and software resource sharing • Example of h/w resource that can be usefully shared • 1) cpu: • a) computer server: it executes processor intensive applications for clients • b) remote object server: executes methods on behalf of clients • c) worm program: it shares cpu capacity of desktop machine with the local user • 2)memory: cache server holds recently accessed web pages in its RAM for faster access by other local computers • 3)Disk: file server, virtual disk server, video on demand server • 4) screen: Network window systems allow processes in remote computers to update the content of windows
  • 45. 5.printer: Networked printers accept print jobs from many computers and managing them with a queuing system • s/w resources: 1.web page: web servers enable multiple clients to share read only page content 2.file: file servers enable multiple clients to share read write files 3.database: database are intended to record the definitive state of some related sets of data. multi user computers to manage concurrent updates 4.News group content: it makes read only copies of the recently posted news items available to clients throughout the internet 5.video/audio stream: servers can store entire videos on disk and deliver them at plat back speed to multiple clients simultaneously.
  • 46. www(world wide web) • www is an evolving the system for publishing and accessing resources and services across the internet • Web is an open system its operation are based on communication standards and documents standards. • www is collection of millions of files stored on thousands of servers all over the world • These files represent documents, pictures, video, sounds, programs, interactive environments • A web server is a computer connected to the internet that runs a program that takes responsibility for storing the web files • Web client is a computer that requests files from the web.
  • 47. The Web is based on three main standard technological components: • i) Hyper Text Markup Language (HTML), • ii) Uniform Resource Locators (URLs), • iii) HTTP(The Hyper Text Transfer Protocol) • i) Hyper Text Markup Language (HTML), • Html is the universal language of the web html specifies the contents and layout of web pages • The content contains text, table, form, image,link, information for search engine, etc • The layout is in the form of text format, background and frame • Html is also used to specify links and which resources are associated with them
  • 48. ii) Uniform Resource Locator(URL) URLs : The purpose of a Uniform Resource Locator [www.w3.org III] is to identify a resource. It means, the term used in web architecture documents is Uniform Resource Identifier (URI) The ‘scheme’, declares which type of URL this is. URLs are required to identify a variety of resources. For example, mailto:joe@anISP.net identifies a user’s email address; ftp://ftp.downloadIt.com/software/aProg.exe identifies a file that is to be retrieved using the File Transfer Protocol (FTP) rather than the more commonly used protocol HTTP. HTTP URLs are the most widely used, for accessing resources using the standard HTTP protocol. An HTTP URL has two main jobs: to identify which web server maintains the resource, and to identify which of the resources at that server is required. HTTP URLs are of the following form: http:// servername [:port] [/pathName] [?query] [ #fragment]
  • 49.
  • 50. iii) HTTP:(HyperText Transfer Protocol) • HTTP:The HyperText Transfer Protocol defines the ways in which browsers and other types of client interact with web servers. Main features • –Request-replay interaction : HTTP is a ‘request-reply’ protocol. The client sends a request message to the server containing the URL of the required resource. • The server looks up the path name and, if it exists, sends back the resource’s content in a reply message to the client. Otherwise, it sends back an error response such as the familiar ‘404 Not Found’. • Content types : The strings that denote the type of content are called MIME (RFC2045,2046) • – One resource per request: Clients specify one resource per HTTP request. If a web page contains nine images, say, then the browser will issue a total of ten separate requests to obtain the entire contents of the page. • – Simple access control: Any user with network connectivity to a web server can access any of its published resources. for example, by typing in a password.
  • 51. Challenges of Distributed systems Design issues and challenges of distributed systems are as follows i) Heterogeneity ii)Openness iii) Security iv) Scalability v)Failure Handling vi)Concurrency vii) Transparency
  • 53.
  • 54.
  • 55. architectural model • The architecture of a system is its structure in terms of separately specified components and their interrelationships. • The overall goal is to ensure that the structure will meet present and likely future demands on it. • Software Layers in DS i) Platform: • The bottom layers (i.e., operating system, computer and network hardware layers) provide a platform for distributed applications. • The services provided by these bottom layers are utilized by higher layers. • In every computer, operating system layer and computer network layer are implemented separately. • This implementation facilitates communication and coordination b/w processes by transferring the system’s programming interface to that level • examples of platform are: Intel x86/Windows, Intel x86/Linux Intel x86/Solaris , SPARC/SunOS, PowePC/MacOS
  • 56. Architectural model i)Software Layers Applications, services Computer and network hardw are Platform Operating system Middlew are
  • 57. ii. Middleware: • A piece of software placed b/w the application and operating system is called “middleware”. • It is the middle most level which acts as mediator in between the platform and application services it is used for heterogeneity 2 .System Architecture: The most evident aspect of distributed system design is the • division of responsibilities between system components (applications, servers, and other processes) and • the placement of the components on computers in the network. • We have 9 basic architectural models in distributed systems.
  • 58. i) Client server model • The system is structured as a set of processes called server that offer services to the users called clients • The client server model is usually based on a simple request or reply protocol, implemented with send/receive primitives or using RPC or RMI • The client send a request message to the server asking for some service • The server does the work and returns a result or an error code if the work could not be performed
  • 60. ii)Peer to peer model • All processes (object) play similar role do not require a server process • There is no distinction between clients and servers all are same • The pattern of communication depends on the particular application
  • 61. iii) Multiple server model: Services may be provided by multiple servers the server may be partitions the set of objects on which the service is based and distribute the work in between themselves
  • 62. iv) Proxy server model • A proxy server provides copies of resources which are managed by other servers • Proxy servers are typically used as caches for web resources they maintain a cache of recently visited web pages or other resources • When a request is issued by a client the proxy server is first checked if the requested object is available there • Proxy servers can be located at each client or can be shared several clients • The purpose is to increase performance and availability by avoiding frequent accesses to remote servers
  • 64. v) Mobile code • A code that is sent from one computer to another computer and run at the destination computer is called as mobile code • Java applets are a well known and widely used example of mobile code
  • 65. Vi) mobile Agent • A running program (code and data) that travels from one computer to another in a network carrying out of a task, usually on behalf of some other process. • A complete program which carrier code plus data than can work independently. • Examples of the tasks that can be done by mobile agents are: • To collecting information. • To install and maintain software maintain on the computers within an organization.
  • 67. vii)Network computers • Network computer do not store os or application code locally all code is loaded from the servers and run locally on the network computer • All files related to management of application is stored and managed remotely • As data and files are stored remotely so user can migrate from one network computer to another network computer
  • 68. Viii) thin client • It is a software layer that supports a window-based user interface on a computer that is local to the user while executing application programs on a remote computer. • This architecture has the same low management and hardware costs as the network computer scheme. • Instead of downloading the code of applications into the user’s computer, it runs them on a compute server. • Compute server is a powerful computer that has the capacity to run large numbers of application simultaneously.
  • 69. ix) Mobile devices • Mobile devices are hardware computing components that move between physical locations and thus networks, carrying software component with them. • Many of these devices are capable of wireless networking ranges of hundreds of meters such as WiFi (IEEE 802.11), or about 10 meters such as Bluetooth. • Mobile devices include: • Laptops • Personal digital assistants (PDAs) • Mobile phones • Digital cameras • Wearable computers such as smart watches
  • 70.
  • 71. Fundamental model • This models are based on some fundamental properties such as characteristics, failures and security there are types of fundamental models and they are • 1) interaction model • 2) failure model • 3) security model • 1) interaction model this model, computation occurs within the processes The processes interact by passing messages which result in • a) Communication(information flow) • b) Coordination (synchronizing and ordering of activities) between processes.
  • 72. c) Interaction model reflects the facts that communication takes place with delay • d) performance of communication channel depends on latency, bandwidth,jitter (which means flow between two systems order may get changed, so jitter will put them in order and send to destination) Two variance of the interaction model • Synchronous distributed system • Asynchronous distributed system
  • 73.
  • 74.
  • 75. Clock drift rate • The difference of clock rate is called clock drift no two clocks would have the same clock rate of oscillations i.e, clock rate would be different the drift rate varies from clock to clock.
  • 76. 2.Failure model • This model defines and classifies the faults that occur and it is important to understand the kinds of failures that may occur in a system • Types of failures we come across in distributed system are: • a) Fail stop: a process stops and remains halted other processes can detect that the processes has failed • b) crash: A process stops and remains halted but other processes may not be able to detect this state • C) Omission: • A message is inserted in an outgoing message buffer never arrives at the other end i.e, incoming message buffer
  • 77. d) Arbitrary: • If a process/channels exhibits arbitrary behavior it may send/transmit arbitrary messages at arbitrary times, commit missions where a process may stop or take an incorrect step • e) Timing failure : • If clock drift gets exceeded than allowable bound we get this kind of failure 3) security model: • There are several potential threats a system designer need to be aware of and they are • i) threats to processes • ii) threat to communication channels • iii) Denial of service
  • 78. i) threats to processes • If an attacker send a request or response using false identify • ii) threat to communication channels • If an attacker may listen to message over communication channel and save it to misuse iii) Denial of service: if an attacker overload the server by making excessive requests • We use cryptography and authentication are often used to provide security
  • 79. Networking and Internetworking • The networks used in distributed systems are built from a variety of • Transmission media(wire,cable,fiber and wireless channel) • Hardware devices(routers, switches, bridges,hubs)
  • 80. Some Terminology • Communication subsystem: • The collection of h/w and s/w components that provide the communication facilities for a distributed system. • Host: computer or other device that use network for communication purposes • Node: any computer or switching device attached to a network
  • 81. Network Performance Latency: • the delay that occurs after a send operation is executed before data starts to arrive at the destination computer • Measured as the time required to transfer an empty message Data Transfer Rate - speed of transfer of data between two machines - measured in bits per second • Message Transfer Time = latency + length/data transfer rate Total system bandwidth - volume of traffic on a network
  • 83. Types of network • A computer network is mainly of four types: • LAN(Local Area Network) • PAN(Personal Area Network) • MAN(Metropolitan Area Network) • WAN(Wide Area Network)
  • 84. LAN(Local Area Network) • Local Area Network is a group of computers connected to each other in a small area such as building, office. • LAN is used for connecting two or more personal computers through a communication medium such as twisted pair, coaxial cable, etc. • It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and Ethernet cables. • The data is transferred at an extremely faster rate in Local Area Network. • Local Area Network provides higher security.
  • 85. LAN
  • 86. PAN(Personal Area Network) • Personal Area Network is a network arranged within an individual person, typically within a range of 10 meters. • Personal Area Network is used for connecting the computer devices of personal use is known as Personal Area Network. • Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area Network. • Personal Area Network covers an area of 30 feet. • Personal computer devices that are used to develop the personal area network are the laptop, mobile phones, media player and play stations. Example: • Offline Network, Small Home Office:
  • 87. PAN
  • 88. There are two types of Personal Area Network: i)Wireless Personal Area Network: • Wireless Personal Area Network is developed by simply using wireless technologies such as WiFi, Bluetooth. It is a low range network. ii) Wired Personal Area Network: • Wired Personal Area Network is created by using the USB.
  • 89. MAN(Metropolitan Area Network) • A metropolitan area network is a network that covers a larger geographic area by interconnecting a different LAN to form a larger network. • Government agencies use MAN to connect to the citizens and private industries. • In MAN, various LANs are connected to each other through a telephone exchange line. • The most widely used protocols in MAN are RS-232, Frame Relay, ATM, etc. • It has a higher range than Local Area Network(LAN).
  • 90.
  • 91. Uses Of Metropolitan Area Network: • MAN is used in communication between the banks in a city. • It can be used in an Airline Reservation. • It can be used in a college within a city. • It can also be used for communication in the military.
  • 92. WAN(Wide Area Network) • A Wide Area Network is a network that extends over a large geographical area such as states or countries. • A Wide Area Network is quite bigger network than the LAN. • A Wide Area Network is not limited to a single location, but it spans over a large geographical area through a telephone line, fibre optic cable or satellite links. • The internet is one of the biggest WAN in the world. • A Wide Area Network is widely used in the field of Business, government, and education.
  • 93.
  • 94. Example of WAN • Mobile Broadband: A 4G network is widely used across a region or country. • Private network: A bank provides a private network that connects the 44 offices. • This network is made by using the telephone leased line provided by the telecom company.
  • 95. Network principles • Packet Transmission: • A packet is a sequence of binary data with addressing information to identify the so and destination computers. • A network message with arbitary length is divided before transmission into packets of restricted length. • 4 types of switching are used in computer network: • 1.Broadcast: • In this type of switching all messages sent to all connected computers. • each computer is responsible of extracting messages addressed to it. this approach is used in Ethernet and wireless networks
  • 96. ii) Circuit switching • This approach is used in the telephone system a physical link is established between the sender and receiver iii) packet switching: • It is also known as store and forward, at each switching node a computer manages the packets by reading each one into memory, examining its destination and choosing an outgoing circuit appropriately iv) frame relay: • Reading and storing the whole of each packet makes performance overhead. • so, instead of reading and storing overall packet it is better to examine its header which contains the information stream of bits
  • 97. Protocol software/protocol suites • Protocol is a well –known set of rules and format for communication between processes to perform a given task • It is implemented by a pair of software modules located in sending and receiving computers • Protocol software modules are arranged in a hierarchy of layers • Data is sent through different layers each layer of network software communicates with the layers above and below it • 7 layers reference model for open systems interconnection(OSI) adopted by ISO to encourage the development of protocol standards that would meet the requirements for open systems
  • 98. 1.Physical layer: this layer coordinates the functions required to transmit a bit stream over a physical medium 2.Data link layer: • this layer transforms the raw transmission facility to a reliable link and is responsible for node to node delivery 3.network layer: • This layer is responsible for the source –destination delivery of a packet 4.transport layer: • This layer is responsible for process to process delivery of entire message.
  • 99. 5.session layer: • It is a network dialog controllers it was designed to establish ,maintain and synchronize the interaction between communicating devices • 6.Presentation layer • It was designed to handle the syntax and semantics of the information exchanged between the two system 7.Application layer: • It enables the user to access the network it provides user interfaces and support for services such as electronic email, remote file access, www etc