SlideShare a Scribd company logo
Tiered Architecture
• Technique to organize functionality of a given
layer and place this functionality into
appropriate servers.
• The functional decomposition is as
- Presentation Logic : Concerned with user
handling
- Application Logic: Detailed application –
specific processing
- Data Logic: persistent storage of application
Isha Padhy, Department of CSE 1
2 tier Architecture
• Server provides processing and data management; client provides simple graphical
display (thin-client)
• At the other extreme, all application processing and some data resides at the client
(fat-client approach)
Isha Padhy, Department of CSE 2
Two- tier architecture
• Advantages:
1.Because of tight coupling the application runs
faster.
2.Low latency in terms of interaction.
• Disadvantage:
Invoking a part of process from other part
across the process boundary is difficult.
• Example- Railway reservation: User is using
railway reservation software, gives input and
then sends request to server. 3Isha Padhy, Department of CSE
3 Tier Architecture
An example of a server acting as client.
-In some applications servers may also need to be clients, leading to a three level
architecture. Ex. Web servers that interact with database servers
-Presentation logic: UI part of application, allows user to input data.
-Application Logic: All business logic is written like data insertion, validation etc
-Data Logic: Contains method to interact with database.
Isha Padhy, Department of CSE 4
De-centralized Architecture
• Vertical distribution: Logically different components are
placed on different machines.
• Horizontal Distribution/ Peer to peer: All nodes are
independent and work on its share of data set.
- Why it was developed?
Network and computing resources owned by the users of a
service could also be utilized to support that service.
- Two types depending on how to organize the processes in a
n/w.
1. Structured
2. Unstructured
5Isha Padhy, Department of CSE
Structured
• N/w constructed using a procedure where
processes are organized using distributed hash
table(DHT).
• DHT provides a look- up service where (key,
value) pairs are stored. Data are assigned a
random key from identifier space, nodes are
assigned values from the same space.
• Responsibility for mapping from keys to
values is distributed among nodes.
• Ex Chord system 6Isha Padhy, Department of CSE
What is Chord?
• Steps in chord:
1. Find a value:
- Nodes are organized in a ring s.t. data item with key ‘k’ is mapped to node
with smallest identifier id~k. This node is called successor of key ‘k’,
Succ(k).
- A function is called to lookup for ‘k’ i.e LOOKUP(k) which returns n/w
address of succ(k)
2. Node joins a system: process starts with generating a random identifier
‘id’. Node that joins get ‘id’. Node does lookup(id) and gets n/w address of
succ(id). Then it inserts itself into ring.
3. Leaving: Node informs its departure to its predecessor and successor and
transfers its data to successor of node.
7Isha Padhy, Department of CSE
8
6
1
2
6
0
4
26
5
1
3
7
2
identifier
circle
identifier
node
X key
The Chord algorithm
successor(1) = 1
successor(2) = 3successor(6) = 0
Solves problem of locating a data item in a
collection of distributed nodes,
considering frequent node arrivals and
departures
Isha Padhy, Department of CSE
9
Node Joins and Departures
6
1
2
0
4
26
5
1
3
7
successor(6) = 7
6
1
successor(1) = 3
Isha Padhy, Department of CSE
Unstructured PTP
• Pure P2P: All nodes are of equal ability i.e no nodes have any
infrastructure, ex Gnutella n/w.
• Hybrid P2P: Infrastructure nodes are allowed to exist and are a
type of servers, all clients connected to the n/w must connect
to one of the servers. ex Napster n/w.
• Centralized P2P: Super-nodes are present in n/w which
dynamically service a small subpart of the peer n/w, ex Kazaa
n/w.
Requestor
node
3
2
1
4
10Isha Padhy, Department of CSE
Placement of objects and services
• Mapping of services to multiple servers: Servers may –
1. Partition of set of objects on which service is based
2. Replicate copies of them on several hosts
• Caching- Cache can be present in client side or proxy servers
that stores the recentlt used data objects
• Mobile code- applet code is stored in web server which can be
downloaded to a browser and run.
• Mobile agents- Composition of software and data that can
migrate from one system to other.
11Isha Padhy, Department of CSE
Hybrid Architectures
• Edge –Server Systems:
- Servers are placed “at the edge” of the network.
- Purpose is to serve content after filtering and transcoding
functions to data.
12Isha Padhy, Department of CSE
Hybrid Arch.
• Collaborative DS
13Isha Padhy, Department of CSE
Fundamental Model
• The purpose is
- All relevant assumptions about the DS can be made
- With the assumptions what are the possibilities
• Aspects to be considered are:
- Interaction: Considers the delay time taken by the
message from one process to other.
- Failure: Defines and classifies fault so design a system
to tolerate fault.
- Security: Analysis of threats to a system is done so that
system resists them.
14Isha Padhy, Department of CSE
Interaction Model
• Two factors affecting interaction of processes in DS
are:
- Performance of communication channels
- -Latency
- -Bandwidth
- -Jitter : Variation of time within two set of strings
transferred.
- Computer clocks and timing events : Two processes
running on different machines have different local
time and timestamps. So a global time standard is
used.
Time taken by first string of bits to reach
destination.
Congestion in network
Time taken by OS services in sending and
receiving side.
15Isha Padhy, Department of CSE
Interaction Model
• Two variants of IM
- Synchronous DS
--Strong assumption of time
--Bounds are defined for
1. Time to execute each step of a process which has known
lower and upper bounds
2. Each message transmitted over a channel is received within
a known bounded time
3. Each process has a local clock whose drift rate from real
time has a known bound.
- Asynchronous DS:
--Makes no assumption of time
16Isha Padhy, Department of CSE
Failure Model
• Defines the way in which failures may occur and
the effects of failures
• Types of failures
- Failures of processes
- Failures of communication channel
• Categories of failures
- Omission Failures
- Arbitrary Failures:
- Timing Failures
Process OF
Channel OF
17Isha Padhy, Department of CSE
Process has crashed i.e halted and will not
execute further.
Services execute properly if:
1.Processes either execute correctly or stop.
2.Follow time- outs i.e. a process allows a fixed
period of time for something to occur.
Process Omission Failures
18Isha Padhy, Department of CSE
Communication OF
Process p Process q
Communication channel
send
Outgoing message buffer Incoming message buffer
receivem
Failure occurs when a message is not transported from process ‘p’ outgoing
buffer to process ‘q’ incoming buffer due to lack of buffer space or n/w
transmission error.
19Isha Padhy, Department of CSE
Arbitrary Failures
• Arbitrarily omits intended processing steps or
takes unintended steps.
• Ex , A process may set wrong values in its data
items or may return a wrong value in
response.
• AF are uncommon in channels.
20Isha Padhy, Department of CSE
Timing Failures
• Synchronous DS:
- Failure of clock on process : Process local
clock exceeds the bound on its rate of drift
from real time.
- Failure of performance on process: Process
exceeds the interval between two steps
- Failure of performance on channel: A
message’s transmission takes longer time
• Asynchronous DS: Overloaded server may
respond late. 21Isha Padhy, Department of CSE
Security model
• Security model - Secure processes and channels
and protect objects encapsulated against unauthorized
access.
– Protecting access to objects - Access rights,
authentication of clients
– Protecting processes and interactions
– Protecting communication channel.
22Isha Padhy, Department of CSE
Security model
Network
invocation
result
Client
Server
Principal (user) Principal (server)
ObjectAccess rights
Communication channel
Copy of m
Process p Process qm
The enemy
m’
Protecting objects
Protecting process
23Isha Padhy, Department of CSE
Protecting channel
• Client and server knows the identity of each
other( Authentication Process)
• Secure channel ensures privacy and integrity
of data( cryptography process)
• Each message includes a logical timestamp to
prevent messages from being reordered.
24Isha Padhy, Department of CSE

More Related Content

What's hot

key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
babak danyal
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
Acad
 
Admission control
Admission controlAdmission control
Admission control
Vishal Waghmare
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communicationAbDul ThaYyal
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
Sunita Sahu
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
ChAwais15
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
Kathirvel Ayyaswamy
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
Mahesh Kumar Chelimilla
 
Run time storage
Run time storageRun time storage
Run time storage
Rasineni Madhan Mohan Naidu
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
Abdullaziz Tagawy
 
transport layer
transport layertransport layer
transport layer
priyadharshini murugan
 
Multi threading model
Multi threading modelMulti threading model
Multi threading model
annalakshmir2
 
Types of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemTypes of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed System
DHIVYADEVAKI
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
Haitham Ahmed
 
Distributed Operating System_4
Distributed Operating System_4Distributed Operating System_4
Distributed Operating System_4
Dr Sandeep Kumar Poonia
 

What's hot (20)

key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
4. system models
4. system models4. system models
4. system models
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Admission control
Admission controlAdmission control
Admission control
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
 
Gsm radio-interface
Gsm radio-interfaceGsm radio-interface
Gsm radio-interface
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Run time storage
Run time storageRun time storage
Run time storage
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
transport layer
transport layertransport layer
transport layer
 
Multi threading model
Multi threading modelMulti threading model
Multi threading model
 
Types of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemTypes of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed System
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Distributed Operating System_4
Distributed Operating System_4Distributed Operating System_4
Distributed Operating System_4
 

Viewers also liked

Cs556 section2
Cs556 section2Cs556 section2
Cs556 section2
farshad33
 
Introduction to distributed system
Introduction to distributed systemIntroduction to distributed system
Introduction to distributed system
ishapadhy
 
Domain name service
Domain name serviceDomain name service
Domain name service
ishapadhy
 
Operating system support in distributed system
Operating system support in distributed systemOperating system support in distributed system
Operating system support in distributed system
ishapadhy
 
Computer arithmetic in computer architecture
Computer arithmetic in computer architectureComputer arithmetic in computer architecture
Computer arithmetic in computer architecture
ishapadhy
 
Computer organization
Computer organizationComputer organization
Computer organization
ishapadhy
 

Viewers also liked (6)

Cs556 section2
Cs556 section2Cs556 section2
Cs556 section2
 
Introduction to distributed system
Introduction to distributed systemIntroduction to distributed system
Introduction to distributed system
 
Domain name service
Domain name serviceDomain name service
Domain name service
 
Operating system support in distributed system
Operating system support in distributed systemOperating system support in distributed system
Operating system support in distributed system
 
Computer arithmetic in computer architecture
Computer arithmetic in computer architectureComputer arithmetic in computer architecture
Computer arithmetic in computer architecture
 
Computer organization
Computer organizationComputer organization
Computer organization
 

Similar to System models 2 in distributed system

Tv and video on the Internet
Tv and video on the InternetTv and video on the Internet
Tv and video on the Internet
Divante
 
02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf
RobeliaJoyVillaruz
 
ERTOS UNIT6.ppt
ERTOS UNIT6.pptERTOS UNIT6.ppt
ERTOS UNIT6.ppt
MangeshVitekar3
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...
IOSR Journals
 
H017113842
H017113842H017113842
H017113842
IOSR Journals
 
Osi model
Osi modelOsi model
Osi model
sayyed sabir
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning project
Rishu Seth
 
Csc concepts
Csc conceptsCsc concepts
Debugging Microservices - key challenges and techniques - Microservices Odesa...
Debugging Microservices - key challenges and techniques - Microservices Odesa...Debugging Microservices - key challenges and techniques - Microservices Odesa...
Debugging Microservices - key challenges and techniques - Microservices Odesa...
Lohika_Odessa_TechTalks
 
Tech talk microservices debugging
Tech talk microservices debuggingTech talk microservices debugging
Tech talk microservices debugging
Andrey Kolodnitsky
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project Report
Hasibul Islam Nirob
 
Network security
Network securityNetwork security
Network security
Nandini Raj
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
APNIC
 
Opal: Simple Web Services Wrappers for Scientific Applications
Opal: Simple Web Services Wrappers for Scientific ApplicationsOpal: Simple Web Services Wrappers for Scientific Applications
Opal: Simple Web Services Wrappers for Scientific Applications
Sriram Krishnan
 
Architecting for the cloud elasticity security
Architecting for the cloud elasticity securityArchitecting for the cloud elasticity security
Architecting for the cloud elasticity security
Len Bass
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Abdelkhalik Mosa
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
Abhishek Sagar
 
UNIT II DIS.pptx
UNIT II DIS.pptxUNIT II DIS.pptx
UNIT II DIS.pptx
SamPrem3
 
Software Architecture for Cloud Infrastructure
Software Architecture for Cloud InfrastructureSoftware Architecture for Cloud Infrastructure
Software Architecture for Cloud Infrastructure
Tapio Rautonen
 

Similar to System models 2 in distributed system (20)

Tv and video on the Internet
Tv and video on the InternetTv and video on the Internet
Tv and video on the Internet
 
02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf
 
ERTOS UNIT6.ppt
ERTOS UNIT6.pptERTOS UNIT6.ppt
ERTOS UNIT6.ppt
 
An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...An in-building multi-server cloud system based on shortest Path algorithm dep...
An in-building multi-server cloud system based on shortest Path algorithm dep...
 
H017113842
H017113842H017113842
H017113842
 
Osi model
Osi modelOsi model
Osi model
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning project
 
Csc concepts
Csc conceptsCsc concepts
Csc concepts
 
Debugging Microservices - key challenges and techniques - Microservices Odesa...
Debugging Microservices - key challenges and techniques - Microservices Odesa...Debugging Microservices - key challenges and techniques - Microservices Odesa...
Debugging Microservices - key challenges and techniques - Microservices Odesa...
 
Tech talk microservices debugging
Tech talk microservices debuggingTech talk microservices debugging
Tech talk microservices debugging
 
Database System Architectures
Database System ArchitecturesDatabase System Architectures
Database System Architectures
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project Report
 
Network security
Network securityNetwork security
Network security
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
Opal: Simple Web Services Wrappers for Scientific Applications
Opal: Simple Web Services Wrappers for Scientific ApplicationsOpal: Simple Web Services Wrappers for Scientific Applications
Opal: Simple Web Services Wrappers for Scientific Applications
 
Architecting for the cloud elasticity security
Architecting for the cloud elasticity securityArchitecting for the cloud elasticity security
Architecting for the cloud elasticity security
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
 
UNIT II DIS.pptx
UNIT II DIS.pptxUNIT II DIS.pptx
UNIT II DIS.pptx
 
Software Architecture for Cloud Infrastructure
Software Architecture for Cloud InfrastructureSoftware Architecture for Cloud Infrastructure
Software Architecture for Cloud Infrastructure
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

System models 2 in distributed system

  • 1. Tiered Architecture • Technique to organize functionality of a given layer and place this functionality into appropriate servers. • The functional decomposition is as - Presentation Logic : Concerned with user handling - Application Logic: Detailed application – specific processing - Data Logic: persistent storage of application Isha Padhy, Department of CSE 1
  • 2. 2 tier Architecture • Server provides processing and data management; client provides simple graphical display (thin-client) • At the other extreme, all application processing and some data resides at the client (fat-client approach) Isha Padhy, Department of CSE 2
  • 3. Two- tier architecture • Advantages: 1.Because of tight coupling the application runs faster. 2.Low latency in terms of interaction. • Disadvantage: Invoking a part of process from other part across the process boundary is difficult. • Example- Railway reservation: User is using railway reservation software, gives input and then sends request to server. 3Isha Padhy, Department of CSE
  • 4. 3 Tier Architecture An example of a server acting as client. -In some applications servers may also need to be clients, leading to a three level architecture. Ex. Web servers that interact with database servers -Presentation logic: UI part of application, allows user to input data. -Application Logic: All business logic is written like data insertion, validation etc -Data Logic: Contains method to interact with database. Isha Padhy, Department of CSE 4
  • 5. De-centralized Architecture • Vertical distribution: Logically different components are placed on different machines. • Horizontal Distribution/ Peer to peer: All nodes are independent and work on its share of data set. - Why it was developed? Network and computing resources owned by the users of a service could also be utilized to support that service. - Two types depending on how to organize the processes in a n/w. 1. Structured 2. Unstructured 5Isha Padhy, Department of CSE
  • 6. Structured • N/w constructed using a procedure where processes are organized using distributed hash table(DHT). • DHT provides a look- up service where (key, value) pairs are stored. Data are assigned a random key from identifier space, nodes are assigned values from the same space. • Responsibility for mapping from keys to values is distributed among nodes. • Ex Chord system 6Isha Padhy, Department of CSE
  • 7. What is Chord? • Steps in chord: 1. Find a value: - Nodes are organized in a ring s.t. data item with key ‘k’ is mapped to node with smallest identifier id~k. This node is called successor of key ‘k’, Succ(k). - A function is called to lookup for ‘k’ i.e LOOKUP(k) which returns n/w address of succ(k) 2. Node joins a system: process starts with generating a random identifier ‘id’. Node that joins get ‘id’. Node does lookup(id) and gets n/w address of succ(id). Then it inserts itself into ring. 3. Leaving: Node informs its departure to its predecessor and successor and transfers its data to successor of node. 7Isha Padhy, Department of CSE
  • 8. 8 6 1 2 6 0 4 26 5 1 3 7 2 identifier circle identifier node X key The Chord algorithm successor(1) = 1 successor(2) = 3successor(6) = 0 Solves problem of locating a data item in a collection of distributed nodes, considering frequent node arrivals and departures Isha Padhy, Department of CSE
  • 9. 9 Node Joins and Departures 6 1 2 0 4 26 5 1 3 7 successor(6) = 7 6 1 successor(1) = 3 Isha Padhy, Department of CSE
  • 10. Unstructured PTP • Pure P2P: All nodes are of equal ability i.e no nodes have any infrastructure, ex Gnutella n/w. • Hybrid P2P: Infrastructure nodes are allowed to exist and are a type of servers, all clients connected to the n/w must connect to one of the servers. ex Napster n/w. • Centralized P2P: Super-nodes are present in n/w which dynamically service a small subpart of the peer n/w, ex Kazaa n/w. Requestor node 3 2 1 4 10Isha Padhy, Department of CSE
  • 11. Placement of objects and services • Mapping of services to multiple servers: Servers may – 1. Partition of set of objects on which service is based 2. Replicate copies of them on several hosts • Caching- Cache can be present in client side or proxy servers that stores the recentlt used data objects • Mobile code- applet code is stored in web server which can be downloaded to a browser and run. • Mobile agents- Composition of software and data that can migrate from one system to other. 11Isha Padhy, Department of CSE
  • 12. Hybrid Architectures • Edge –Server Systems: - Servers are placed “at the edge” of the network. - Purpose is to serve content after filtering and transcoding functions to data. 12Isha Padhy, Department of CSE
  • 13. Hybrid Arch. • Collaborative DS 13Isha Padhy, Department of CSE
  • 14. Fundamental Model • The purpose is - All relevant assumptions about the DS can be made - With the assumptions what are the possibilities • Aspects to be considered are: - Interaction: Considers the delay time taken by the message from one process to other. - Failure: Defines and classifies fault so design a system to tolerate fault. - Security: Analysis of threats to a system is done so that system resists them. 14Isha Padhy, Department of CSE
  • 15. Interaction Model • Two factors affecting interaction of processes in DS are: - Performance of communication channels - -Latency - -Bandwidth - -Jitter : Variation of time within two set of strings transferred. - Computer clocks and timing events : Two processes running on different machines have different local time and timestamps. So a global time standard is used. Time taken by first string of bits to reach destination. Congestion in network Time taken by OS services in sending and receiving side. 15Isha Padhy, Department of CSE
  • 16. Interaction Model • Two variants of IM - Synchronous DS --Strong assumption of time --Bounds are defined for 1. Time to execute each step of a process which has known lower and upper bounds 2. Each message transmitted over a channel is received within a known bounded time 3. Each process has a local clock whose drift rate from real time has a known bound. - Asynchronous DS: --Makes no assumption of time 16Isha Padhy, Department of CSE
  • 17. Failure Model • Defines the way in which failures may occur and the effects of failures • Types of failures - Failures of processes - Failures of communication channel • Categories of failures - Omission Failures - Arbitrary Failures: - Timing Failures Process OF Channel OF 17Isha Padhy, Department of CSE
  • 18. Process has crashed i.e halted and will not execute further. Services execute properly if: 1.Processes either execute correctly or stop. 2.Follow time- outs i.e. a process allows a fixed period of time for something to occur. Process Omission Failures 18Isha Padhy, Department of CSE
  • 19. Communication OF Process p Process q Communication channel send Outgoing message buffer Incoming message buffer receivem Failure occurs when a message is not transported from process ‘p’ outgoing buffer to process ‘q’ incoming buffer due to lack of buffer space or n/w transmission error. 19Isha Padhy, Department of CSE
  • 20. Arbitrary Failures • Arbitrarily omits intended processing steps or takes unintended steps. • Ex , A process may set wrong values in its data items or may return a wrong value in response. • AF are uncommon in channels. 20Isha Padhy, Department of CSE
  • 21. Timing Failures • Synchronous DS: - Failure of clock on process : Process local clock exceeds the bound on its rate of drift from real time. - Failure of performance on process: Process exceeds the interval between two steps - Failure of performance on channel: A message’s transmission takes longer time • Asynchronous DS: Overloaded server may respond late. 21Isha Padhy, Department of CSE
  • 22. Security model • Security model - Secure processes and channels and protect objects encapsulated against unauthorized access. – Protecting access to objects - Access rights, authentication of clients – Protecting processes and interactions – Protecting communication channel. 22Isha Padhy, Department of CSE
  • 23. Security model Network invocation result Client Server Principal (user) Principal (server) ObjectAccess rights Communication channel Copy of m Process p Process qm The enemy m’ Protecting objects Protecting process 23Isha Padhy, Department of CSE
  • 24. Protecting channel • Client and server knows the identity of each other( Authentication Process) • Secure channel ensures privacy and integrity of data( cryptography process) • Each message includes a logical timestamp to prevent messages from being reordered. 24Isha Padhy, Department of CSE