The document discusses different architectural models for distributed systems including tiered, two-tier, three-tier, decentralized, structured (Chord), and hybrid architectures. It covers concepts like interaction models, failure models, and security models that are important for designing distributed systems. The interaction model accounts for latency, bandwidth, and clock synchronization issues. The failure model defines process and communication channel omission, arbitrary, and timing failures. The security model aims to protect objects, processes, and communication channels against unauthorized access.
Distributed Mutual Exclusion and Distributed Deadlock DetectionSHIKHA GAUTAM
Distributed Mutual Exclusion: Classification of distributed mutual exclusion, requirement of mutual exclusion theorem, Token based and non token based algorithms. Distributed Deadlock Detection: system model, resource Vs communication deadlocks, deadlock prevention, avoidance, detection & resolution, centralized dead lock detection
Distributed Mutual Exclusion and Distributed Deadlock DetectionSHIKHA GAUTAM
Distributed Mutual Exclusion: Classification of distributed mutual exclusion, requirement of mutual exclusion theorem, Token based and non token based algorithms. Distributed Deadlock Detection: system model, resource Vs communication deadlocks, deadlock prevention, avoidance, detection & resolution, centralized dead lock detection
In this we discuss about DATA RATE LIMITS
Two theoretical formulas were developed to calculate the data rate:
Nyquist bit rate for a noiseless channel
BitRate = 2 * bandwidth * log 2 L
2: Shannon Capacity for a noisy channel
Capacity = bandwidth * log 2 (1 + SNR)
...............
PERFORMANCE (Network PERFORMANCE) :
Bandwidth: ( Bandwidth in Hertz and Bandwidth in Bits per Seconds) :
Throughput:
These above topics covered in this slide
Thanks You!
The TCP/IP protocol suite does not define any protocol in the data-link layer or
physical layer. These two layers are territories of networks that when connected
make up the Internet. These networks, wired or wireless, provide services to the upper
three layers of the TCP/IP suite. This may give us a clue that there are several standard
protocols in the market today. For this reason, we discuss the data-link layer in several
chapters. This chapter is an introduction that gives the general idea and common issues
in the data-link layer that relate to all networks.
❑ The first section introduces the data-link layer. It starts with defining the concept
of links and nodes. The section then lists and briefly describes the services provided
by the data-link layer. It next defines two categories of links: point-to-point
and broadcast links. The section finally defines two sublayers at the data-link layer
that will be elaborated on in the next few chapters.
❑ The second section discusses link-layer addressing. It first explains the rationale
behind the existence of an addressing mechanism at the data-link layer. It then
describes three types of link-layer addresses to be found in some link-layer protocols.
The section discusses the Address Resolution Protocol (ARP), which maps
the addresses at the network layer to addresses at the data-link layer. This protocol
helps a packet at the network layer find the link-layer address of the next node for
delivery of the frame that encapsulates the packet. To show how the network layer
helps us to find the data-link-layer addresses, a long example is included in this
section that shows what happens at each node when a packet is travelling through
the Internet.
4.1Introduction
- Potential Threats and Attacks on Computer System
- Confinement Problems
- Design Issues in Building Secure Distributed Systems
4.2 Cryptography
- Symmetric Cryptosystem Algorithm: DES
- Asymmetric Cryptosystem
4.3 Secure Channels
- Authentication
- Message Integrity and Confidentiality
- Secure Group Communication
4.4 Access Control
- General Issues
- Firewalls
- Secure Mobile Code
4.5 Security Management
- Key Management
- Issues in Key Distribution
- Secure Group Management
- Authorization Management
In this we discuss about DATA RATE LIMITS
Two theoretical formulas were developed to calculate the data rate:
Nyquist bit rate for a noiseless channel
BitRate = 2 * bandwidth * log 2 L
2: Shannon Capacity for a noisy channel
Capacity = bandwidth * log 2 (1 + SNR)
...............
PERFORMANCE (Network PERFORMANCE) :
Bandwidth: ( Bandwidth in Hertz and Bandwidth in Bits per Seconds) :
Throughput:
These above topics covered in this slide
Thanks You!
The TCP/IP protocol suite does not define any protocol in the data-link layer or
physical layer. These two layers are territories of networks that when connected
make up the Internet. These networks, wired or wireless, provide services to the upper
three layers of the TCP/IP suite. This may give us a clue that there are several standard
protocols in the market today. For this reason, we discuss the data-link layer in several
chapters. This chapter is an introduction that gives the general idea and common issues
in the data-link layer that relate to all networks.
❑ The first section introduces the data-link layer. It starts with defining the concept
of links and nodes. The section then lists and briefly describes the services provided
by the data-link layer. It next defines two categories of links: point-to-point
and broadcast links. The section finally defines two sublayers at the data-link layer
that will be elaborated on in the next few chapters.
❑ The second section discusses link-layer addressing. It first explains the rationale
behind the existence of an addressing mechanism at the data-link layer. It then
describes three types of link-layer addresses to be found in some link-layer protocols.
The section discusses the Address Resolution Protocol (ARP), which maps
the addresses at the network layer to addresses at the data-link layer. This protocol
helps a packet at the network layer find the link-layer address of the next node for
delivery of the frame that encapsulates the packet. To show how the network layer
helps us to find the data-link-layer addresses, a long example is included in this
section that shows what happens at each node when a packet is travelling through
the Internet.
4.1Introduction
- Potential Threats and Attacks on Computer System
- Confinement Problems
- Design Issues in Building Secure Distributed Systems
4.2 Cryptography
- Symmetric Cryptosystem Algorithm: DES
- Asymmetric Cryptosystem
4.3 Secure Channels
- Authentication
- Message Integrity and Confidentiality
- Secure Group Communication
4.4 Access Control
- General Issues
- Firewalls
- Secure Mobile Code
4.5 Security Management
- Key Management
- Issues in Key Distribution
- Secure Group Management
- Authorization Management
Debugging Microservices - key challenges and techniques - Microservices Odesa...Lohika_Odessa_TechTalks
Microservice architecture is widespread our days. It comes with a lot of benefits and challenges to solve. Main goal of this talk is to go through troubleshooting and debugging in the distributed micro-service world. Topic would cover:
main aspects of the logging,
monitoring,
distributed tracing,
debugging services on the cluster.
About speaker:
Andrеy Kolodnitskiy is Staff engineer in the Lohika and his primary focus is around distributed systems, microservices and JVM based languages.
Majority of time engineers spend debugging and fixing the issues. This talk will be dedicated to best practicies and tools Andrеys team uses on its project which do help to find issues more efficiently.
APNIC Chief Scientist Geoff Huston presents on the increasing adoption of privacy-related mechanisms that obscure how the network can observe user traffic at AINTEC 2023, held in Bangkok, Thailand from 12 to 14 December 2023.
Opal: Simple Web Services Wrappers for Scientific ApplicationsSriram Krishnan
The grid-based infrastructure enables large-scale scientific applications to be run on distributed resources and coupled in innovative ways. However, in practice, grid resources are not very easy to use for the end-users who have to learn how to generate security credentials, stage inputs and outputs, access grid-based schedulers, and install complex client software. There is an imminent need to provide transparent access to these resources so that the end-users are shielded from the complicated details, and free to concentrate on their domain science. Scientific applications wrapped as Web services alleviate some of these problems by hiding the complexities of the back-end security and computational infrastructure, only exposing a simple SOAP API that can be accessed programmatically by application-specific user interfaces. However, writing the application services that access grid resources can be quite complicated, especially if it has to be replicated for every application. In this presentation, we present Opal which is a toolkit for wrapping scientific applications as Web services in a matter of hours, providing features such as scheduling, standards-based grid security and data management in an easy-to-use and configurable manner
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsAbdelkhalik Mosa
OSI: is a layered, abstract representation created as a guideline for network protocol design. Application Layer, provides human interface to the network.
Differnces between the function of OSI application, presentation and session layers.
The two forms of software programs that provide access to the network which are network-aware applications and application layer services.
The difference between applications, services and protocols.
Client Server Model.
Peer-to-Peer (P2P) Networking and Applications.
Application layer Protocols and Port numbers, ex. DNS - TCP/UDP Port 53, FTP - TCP Ports 20 and 21 and SMTP - TCP Port 25.
Root DNS Servers and TLD Servers.
Different Application layer protocols such as HTTP, HTTPS, FTP, Telnet, SSH, DHCP, DNS, SMTP, POP3, SMB and Gnutella Protocol
his Course is about learning How Linux Processes Talk to each Other. This is a sub-domain of Linux System Programming. We shall explore various popular mechanism used in the industry through which Linux processes to exchange data with each other. We will go through the concepts in detail behind each IPC mechanism, discuss the implementation, and design and analyze the situation where the given IPC is preferred over others.
Software Architecture for Cloud InfrastructureTapio Rautonen
Distributed systems are hard to build. Software architecture must be carefully crafted to suit cloud infrastructure.
Design for failure. Learn from failure. Adopt new cloud compatible design patterns and follow the guidelines during the journey of building cloud native applications.
Similar to System models 2 in distributed system (20)
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Instructions for Submissions thorugh G- Classroom.pptx
System models 2 in distributed system
1. Tiered Architecture
• Technique to organize functionality of a given
layer and place this functionality into
appropriate servers.
• The functional decomposition is as
- Presentation Logic : Concerned with user
handling
- Application Logic: Detailed application –
specific processing
- Data Logic: persistent storage of application
Isha Padhy, Department of CSE 1
2. 2 tier Architecture
• Server provides processing and data management; client provides simple graphical
display (thin-client)
• At the other extreme, all application processing and some data resides at the client
(fat-client approach)
Isha Padhy, Department of CSE 2
3. Two- tier architecture
• Advantages:
1.Because of tight coupling the application runs
faster.
2.Low latency in terms of interaction.
• Disadvantage:
Invoking a part of process from other part
across the process boundary is difficult.
• Example- Railway reservation: User is using
railway reservation software, gives input and
then sends request to server. 3Isha Padhy, Department of CSE
4. 3 Tier Architecture
An example of a server acting as client.
-In some applications servers may also need to be clients, leading to a three level
architecture. Ex. Web servers that interact with database servers
-Presentation logic: UI part of application, allows user to input data.
-Application Logic: All business logic is written like data insertion, validation etc
-Data Logic: Contains method to interact with database.
Isha Padhy, Department of CSE 4
5. De-centralized Architecture
• Vertical distribution: Logically different components are
placed on different machines.
• Horizontal Distribution/ Peer to peer: All nodes are
independent and work on its share of data set.
- Why it was developed?
Network and computing resources owned by the users of a
service could also be utilized to support that service.
- Two types depending on how to organize the processes in a
n/w.
1. Structured
2. Unstructured
5Isha Padhy, Department of CSE
6. Structured
• N/w constructed using a procedure where
processes are organized using distributed hash
table(DHT).
• DHT provides a look- up service where (key,
value) pairs are stored. Data are assigned a
random key from identifier space, nodes are
assigned values from the same space.
• Responsibility for mapping from keys to
values is distributed among nodes.
• Ex Chord system 6Isha Padhy, Department of CSE
7. What is Chord?
• Steps in chord:
1. Find a value:
- Nodes are organized in a ring s.t. data item with key ‘k’ is mapped to node
with smallest identifier id~k. This node is called successor of key ‘k’,
Succ(k).
- A function is called to lookup for ‘k’ i.e LOOKUP(k) which returns n/w
address of succ(k)
2. Node joins a system: process starts with generating a random identifier
‘id’. Node that joins get ‘id’. Node does lookup(id) and gets n/w address of
succ(id). Then it inserts itself into ring.
3. Leaving: Node informs its departure to its predecessor and successor and
transfers its data to successor of node.
7Isha Padhy, Department of CSE
9. 9
Node Joins and Departures
6
1
2
0
4
26
5
1
3
7
successor(6) = 7
6
1
successor(1) = 3
Isha Padhy, Department of CSE
10. Unstructured PTP
• Pure P2P: All nodes are of equal ability i.e no nodes have any
infrastructure, ex Gnutella n/w.
• Hybrid P2P: Infrastructure nodes are allowed to exist and are a
type of servers, all clients connected to the n/w must connect
to one of the servers. ex Napster n/w.
• Centralized P2P: Super-nodes are present in n/w which
dynamically service a small subpart of the peer n/w, ex Kazaa
n/w.
Requestor
node
3
2
1
4
10Isha Padhy, Department of CSE
11. Placement of objects and services
• Mapping of services to multiple servers: Servers may –
1. Partition of set of objects on which service is based
2. Replicate copies of them on several hosts
• Caching- Cache can be present in client side or proxy servers
that stores the recentlt used data objects
• Mobile code- applet code is stored in web server which can be
downloaded to a browser and run.
• Mobile agents- Composition of software and data that can
migrate from one system to other.
11Isha Padhy, Department of CSE
12. Hybrid Architectures
• Edge –Server Systems:
- Servers are placed “at the edge” of the network.
- Purpose is to serve content after filtering and transcoding
functions to data.
12Isha Padhy, Department of CSE
14. Fundamental Model
• The purpose is
- All relevant assumptions about the DS can be made
- With the assumptions what are the possibilities
• Aspects to be considered are:
- Interaction: Considers the delay time taken by the
message from one process to other.
- Failure: Defines and classifies fault so design a system
to tolerate fault.
- Security: Analysis of threats to a system is done so that
system resists them.
14Isha Padhy, Department of CSE
15. Interaction Model
• Two factors affecting interaction of processes in DS
are:
- Performance of communication channels
- -Latency
- -Bandwidth
- -Jitter : Variation of time within two set of strings
transferred.
- Computer clocks and timing events : Two processes
running on different machines have different local
time and timestamps. So a global time standard is
used.
Time taken by first string of bits to reach
destination.
Congestion in network
Time taken by OS services in sending and
receiving side.
15Isha Padhy, Department of CSE
16. Interaction Model
• Two variants of IM
- Synchronous DS
--Strong assumption of time
--Bounds are defined for
1. Time to execute each step of a process which has known
lower and upper bounds
2. Each message transmitted over a channel is received within
a known bounded time
3. Each process has a local clock whose drift rate from real
time has a known bound.
- Asynchronous DS:
--Makes no assumption of time
16Isha Padhy, Department of CSE
17. Failure Model
• Defines the way in which failures may occur and
the effects of failures
• Types of failures
- Failures of processes
- Failures of communication channel
• Categories of failures
- Omission Failures
- Arbitrary Failures:
- Timing Failures
Process OF
Channel OF
17Isha Padhy, Department of CSE
18. Process has crashed i.e halted and will not
execute further.
Services execute properly if:
1.Processes either execute correctly or stop.
2.Follow time- outs i.e. a process allows a fixed
period of time for something to occur.
Process Omission Failures
18Isha Padhy, Department of CSE
19. Communication OF
Process p Process q
Communication channel
send
Outgoing message buffer Incoming message buffer
receivem
Failure occurs when a message is not transported from process ‘p’ outgoing
buffer to process ‘q’ incoming buffer due to lack of buffer space or n/w
transmission error.
19Isha Padhy, Department of CSE
20. Arbitrary Failures
• Arbitrarily omits intended processing steps or
takes unintended steps.
• Ex , A process may set wrong values in its data
items or may return a wrong value in
response.
• AF are uncommon in channels.
20Isha Padhy, Department of CSE
21. Timing Failures
• Synchronous DS:
- Failure of clock on process : Process local
clock exceeds the bound on its rate of drift
from real time.
- Failure of performance on process: Process
exceeds the interval between two steps
- Failure of performance on channel: A
message’s transmission takes longer time
• Asynchronous DS: Overloaded server may
respond late. 21Isha Padhy, Department of CSE
22. Security model
• Security model - Secure processes and channels
and protect objects encapsulated against unauthorized
access.
– Protecting access to objects - Access rights,
authentication of clients
– Protecting processes and interactions
– Protecting communication channel.
22Isha Padhy, Department of CSE
24. Protecting channel
• Client and server knows the identity of each
other( Authentication Process)
• Secure channel ensures privacy and integrity
of data( cryptography process)
• Each message includes a logical timestamp to
prevent messages from being reordered.
24Isha Padhy, Department of CSE