Distributed Computing Systems Revision Sheet 2025
Distributed Computing Systems Revision Sheet 2025
1

fi
4. Define DCS computing resources and draw and explain example of resources sharing.
System resources include: CPU power, CPU working memory, System software,
Applications software, databases, printing, backup, and network
The motivation for distributed systems stems
from the need to share resources, both
hardware (disks, laser printers etc.), software
(programs), and data ( les, databases and
other data objects). It is the ability to use any
hardware, software or data anywhere in the
system.
Resource manager controls access, provides
naming scheme and controls concurrency. Resource sharing model (e.g. client/server or
object-based) describing how resources are provided, they are used and provider and user
interact with each other.
Resources in a distributed system are physically encapsulated within computers and can only
be accessed from other computers by means of communication. For effective sharing, each
resource must be managed by a program that offers a communication interface enabling the
resource to be accessed and updated reliably and consistently.
• Easy to physically
secure.
• Smooth and elegant • Highly dependent on the
personal experience. network connectivity.
• Dedicated resources. • No graceful degradation
• More cost-ef cient for of the system.
Centralized
small systems up to a • Less possibility of data
certain limit. backup.
• Quick updates are • Dif cult server
possible. maintenance.
• Easy detachment of a
node from the system.
2

fi
fi
fi
System Advantages Disadvantages Drawing
• Minimal problem of
• Dif cult to achieve global
performance
big tasks.
bottlenecks occurring.
• Dif cult to know which
Decentralized • High availability.
node failed.
• More autonomy and
• Dif cult to know which
control over
node responded.
resources.
3

fi
fi
fi
fi
fi
Middleware services:
• Facilities for inter application communication.
• Security services.
• Accounting services.
• Masking of and recovery from failures.
•
8. Draw and explain Enslow model for distributed processing systems
10. Differentiate between thin using the PC as diskless PC, Thin client, normal PC
Workstation, and Thick client?
4

fi
fi
11. Define the meaning of A4 (authentication, Authorization, Accounting, and Auditing?
1. Authentication: Veri es the identity of a user or system using methods like passwords,
biometrics, or tokens.
2. Authorization: Determines the permissions and access levels of an authenticated user to
resources and actions.
3. Accounting: Tracks and logs user activities and system operations for monitoring and
compliance.
4. Auditing: Reviews and analyzes logs to ensure policy adherence, detect breaches, and
enhance security.
12. Use Drawing and explain the functions of the BOOT Server (Boot Strap BOOTP)
protocol for booting diskless PC?
The Bootstrap Protocol (BOOTP) is a client/server protocol that con gures a diskless computer
or a computer that is booted for the rst time. BOOTP provides: IP address, net mask, the
address of a default router, and the address of a name server.
The BOOTP server can be on the same
network as the BOOTP client or on different
networks.
The BOOTP protocol allows a diskless PC to
receive an IP address and boot con guration
from a BOOTP server. It encapsulates requests
within UDP packets, enabling a diskless
machine to boot over the network.
13. Use Drawing and explain the functions of the KDC (Key Distribution Center)
authentication Server
5

fi
fi
fi
fi
14. Use Drawing and explain the functions of the DYNAMIC HOST protocol?
17. Draw and explain the Sensors networking Organizing a sensor network database,
while storing and processing data a) only at the operator’s site or b) only at the sensors
6

fi
fi
fi
fi
fi
18. Utilize the bank of America as an example of fully redundant distributed system.
19. Define virtualization, its importance, and explain its main types?
Virtualization is the ability to run multiple OSs on a physical system and virtually share the
hardware, software, storage, backup, printing, and network resources
Virtualization is a technique of how to separate a service from the underlying physical delivery
of that service. It is the process of creating a virtual version of something like computer
hardware.
With the help of Virtualization, multiple operating systems and applications can run on same
machine and its same hardware at the same time, increasing the utilization and exibility of
hardware.
One of the main cost effective, hardware reducing, and energy saving techniques used by
cloud providers is virtualization
Main Types of Virtualization:
1. Application Virtualization: Enables remote access to applications stored on a server,
allowing them to run on a local device via the internet without installation.
2. Network Virtualization: Creates multiple virtual networks over a physical network,
enabling isolated, exible, and ef cient network management.
3. Desktop Virtualization: Stores user OS remotely on a server, allowing virtual desktop
access from any device, enhancing mobility and management.
4. Storage Virtualization: Pools physical storage from multiple devices into a single virtual
storage system managed centrally for ef cient use.
5. Server Virtualization: Divides a physical server into multiple virtual servers, each
running independently, to enhance performance and reduce costs.
6. Data Virtualization: Integrates data from various sources into a uni ed virtual view,
enabling remote access through cloud services without concern for technical details.
7

fl
fi
fi
fi
fi
fl
20. Explain the difference between horizontal, vertical, and functional data processing
systems?
Vertical Topology:
There are three levels of processing at the host, at the remote site, and in intelligent
terminals.
1. Transactions enter and leave at the lowest levels.
2. Processing not possible at the intelligent terminal
is passed to the remote-site processor.
3. Processing not possible at the remote site is
passed to the host or primary site.
4. Each level may support its own database, which
may or may not be shared with other levels.
Horizontal Topology:
Horizontal topology is characterized by peer (equal)
relationships among nodes.
Every node in the network can communicate with
every other node without having to consult a central
node.
Functional Topology:
This topology involves the separation of processing
functions into separate nodes.
Typical functional separations are:
1. Database processing,
2. Backup processing,
3. Application processing,
4. Communication processing, and transaction
processing.
21. Draw and explain the basic components of distributed system architecture?
8

fi
fi
22. Compare between centralized, Partitioned, and replicated database processing
systems, mention the main problem that faces the development of distributed data
processing systems?
The main problem that faces the development of distributed data processing systems:
1) Data Recovery : Solution – Transaction management must track transaction to ensure
the correct termination of the transaction.
2) Concurrency Control : Solution – Control access of several transactions on the same
data
3) Deadlock /Lockup Handling : Solution –To prevent transactions from waiting each
other!s
23. What are the different tiers in 3-tiers architecture? Discuss the
functions of these tiers?
To improve performance, the three-tier architecture adds another
server layer either by a middleware server or an application server.
Three-Tier Layers are :
"# PC clients
%# backend database server
&# either a middleware or an application server.
Although the three-tier architecture addresses performance degradations of the two-tier
architecture, it does not address division-of-processing concerns.
The additional server software can reside on a separate computer.
Alternatively, the additional server software can be distributed between the database
server and PC clients.
9

24. Define a data center and mention its Key characteristics?
A data center: is a “hardened” facility that is dedicated to provide uninterrupted service to
business-critical data processing operations.
A data center (sometimes called a server farm): is a centralized repository for the storage,
management, and dissemination of data and information.
Key characteristics of a data center include:
1. Power and Cooling Systems: Redundant power sources, backup generators, and
advanced cooling systems to prevent overheating.
2. Security: Physical and cyber security measures to protect data and systems from
unauthorized access.
3. Redundancy and Reliability: Built-in redundancy for high availability and minimal
downtime.
4. Scalability: Ability to expand capacity as data and computing needs grow.
5. Network Connectivity: High-speed networking for fast data transfer within the data
center and to external networks.
Data centers consist of several essential components that support their functionality,
security, and ef ciency. Key examples include:
1. Servers: The core computing units, where data processing and applications are
hosted.
2. Storage Systems: Devices such as hard drives, SSDs, or storage arrays used to store
large volumes of data securely.
3. Networking Equipment: Routers, switches, rewalls, and load balancers that enable
connectivity and secure data ow.
10

fi
fl
fi
4. Power Systems: Includes uninterruptible power supplies (UPS), backup generators,
power distribution units (PDUs), and power cables, ensuring continuous power supply.
5. Cooling and HVAC Systems: Air conditioning, fans, and other cooling mechanisms to
maintain optimal temperatures and prevent equipment from overheating.
6. Racks and Cabinets: Physical frameworks for mounting and organizing servers and
other hardware.
7. Cabling: Fiber optic and Ethernet cables for internal and external data transfer.
8. Monitoring and Management Tools: Software and hardware to monitor system
performance, energy usage, and physical conditions (e.g., temperature, humidity).
9. Security Systems: Physical security elements like surveillance cameras, access control
(biometric scanners, key cards), and re suppression systems.
10.Environmental Controls: Systems that monitor and adjust environmental factors like
temperature, humidity, and air ow.
These components work together to ensure data center performance, scalability, and security
11

fl
fi
fi
28. Define cloud computing systems, their basic layered architecture, and their basic
service models?
Virtualization: refers to the act of creating a virtual (rather than actual) version of
something, including (but not limited to) a virtual computer hardware platform, operating
system (OS), storage device, or computer network resources.
1. Hypervisor/Virtual Machine Monitor
2. Host Operating System
3. Guest Operating System
4. Every Virtual Machine is given a set of virtual hardware.
5. Involves many software and hardware architectural modi cations. (Memory
Management, CPU Management)
30. Define computer clusters and mention its advantages and basic types?
A computer cluster is a group of linked computers, working together closely thus in many
respects forming a single computer.
A cluster is: a type of parallel and distributed computing system which consists of a collection
of interconnected computing resources working together as a single integrated computing
resources (CPU Power, CPU working memory, systems software, applications software,
database, backup, printing, and printing)
Advantages of cluster computing:
1. High Performance: Enhances computational power for complex tasks.
2. Scalability: Easily adds nodes to handle growing workloads.
3. Fault Tolerance: Ensures system reliability and minimizes downtime.
4. Cost-Effective: Uses commodity hardware to achieve powerful performance.
5. Resource Sharing: Allows ef cient utilization of computing resources.
12

fi
fi
fi
Types of Clustered computers:
1. High Availability Cluster
2. Load Balancing Cluster
3. High Performance Computing (HPC) Cluster
4. Fault Tolerant Clusters
A cluster typically has one or two head nodes and more computing nodes. The head node is
where users log in, compile code, assign tasks, coordinate jobs, and monitor traf c across all
nodes.
The computing nodes handle performance computing. They execute tasks, follow
instructions, and function collectively as a powerful single system.
Tasks automatically move from the head system to the computing nodes, and excellent tools
can help with workload scheduling.
13

fi
fi
fi
fi
fi
fi
fi
34. Explain Load-balancing clusters
36. What are the functions of the Presentation Tier, Application Tier, and Data and
Database Tier?
1. Presentation Logic PM/PL Tier : responsible for formatting and presenting data on the
user’s screen (or other output device) and managing user input from keyboard (or other input
device)
2. (Application) Business Logic BL Tier: handles data processing logic (validation and
identi cation of processing errors), business rules logic, and data management logic (identi es
the data necessary for processing the transaction or query)
3. Data Management/Storage DM Tier: responsible for data storage and retrieval from the
physical storage devices – DBMS activities occur here.
14

fl
fi
fi
fi
fi
fi
37. Explain the 2 tiers and 3 tiers architectures for data centers and compare between
them?
15

fi
fi
fi
fi
40. Write a short account on DAS (Direct Attached Storage), NAS Network Associated
Storage, and Storage Area Network SAN?
16
fi

fi
fi
fi
42. What Are the Advantages of Raid?
1. Large Storage: RAID arrays combine multiple disks, providing more storage space than a
single drive. Additional drives can be added for convenient scalability.
2. Fault Tolerance: Most RAID levels offer data redundancy through parity, ensuring system
resilience against drive failures. While not a complete substitute for backups, RAID
enhances reliability.
3. Continuous System Running: RAID allows systems to keep running even if a drive fails,
providing users time to replace the faulty disk without immediate downtime.
4. Parity Check: Modern RAID systems include parity checks to detect potential issues,
helping prevent system crashes and allowing proactive maintenance.
5. Fast Speed: RAID enhances performance by enabling simultaneous data read/write
operations, signi cantly improving data transmission rates compared to single drives.
43. Draw a diagram of RAID 10 (stripping and mirroring) and explain its applications?
17

fi
fi
fi
fi
fi
44. Draw a diagram of RAID 5 and explain its applications?
45. Explain the components of Intelligent storage system and mention its advantage?
Fault Tolerance: is de ned as the ability of the system to function properly even in the
presence of any failure.
Fault tolerance in DCS is the capability to continue operating smoothly despite failures or
errors in one or more of its components.
Fault tolerance is crucial for maintaining system reliability, availability, and consistency.
Additional bene ts of improving fault tolerance across your organization may include:
• Increased reliability: By reducing the likelihood and potential impact of system failures, fault
tolerance boosts the reliability of your assets.
• Reduced downtime: Automated fault detection and recovery systems ensure that backup
resources can be used to reduce unexpected downtime and minimize its direct and indirect
costs.
• More secure data: Fault-tolerant systems can eliminate the risk of critical data loss or
corruption by storing crucial information in backup locations and responding in the event of
data breaches or hardware failures.
• Enhanced performance: Ensuring workloads are distributed for maximum ef ciency, fault-
tolerant systems can reduce bottlenecks to improve overall system performance.
• Fault-tolerant systems contribute to a more resilient organization and play an important role
in business continuity as a whole.
18

fi
fi
fi
47. Define: Failure, Error, and Fault?
48. Define: Reliability (T), availability, Mean time between failure (MTBF), and Mean
Time to Repair (MTTR)?
Reliability: Reliability is de ned as the property where the system can work continuously
without any failure for the duration (0, T) under normal operating conditions.
Availability: Availability of the module is the percentage of time when system is operational.
Availability of a hardware/software module can be obtained by the formula given below.
MTTR: Mean Time to Repair (MTTR), is the time taken to repair a failed hardware module.
In an operational system, repair generally means replacing the hardware module.
MTBF: Mean Time Between Failures (MTBF), as the name suggests, is the average time
between failure of hardware modules. It is the average time a manufacturer estimates before a
failure occurs in a hardware module.
49. Consider a static webpage during an observation window of 24 hours, the service
sustains 3 periods of downtime. The first outage takes 15 minutes to repair, the second
lasts 30 min, the third 1hrs. calculate the MTTR, MTBF, and the availability of the
site.
Observation Period = 24h = 1440 min
DownTimes: D1= 15min, D2 = 30min, D3 = 1h = 60min
Total Down Time = 15 + 30 + 60 = 105 min
19

fl
fi
50. Calculate the resultant probability of failure (F) and
failure-free operation (R) for a combined series-
parallel system. Assume that the components are
independent. The failure probabilities of individual
elements are: F1 = 0.08, F2 = 0.30, F3 = 0.20, and F4 =
0.10.
51. Explain why distributed systems are not secured? What are the effects of insecurity in
distributed systems?
Main reasons for distributed systems insecurity:
1. Networks (especially WAN/Internet networks) are not secured. Packets can be intercepted
and modi ed at network layer
2. Servers and Clients components are not secured.
3. Clients (IP destination) components may not be as claimed to be. (IP spoo ng)
4. Calling (IP Source) components may not be as claimed to be. (IP spoo ng)
Effects of Insecurity:
1. Con dential Data may be stolen
2. Data may be altered
3. Loss of con dence in information systems information: above effects may reduce con dence
in computerized systems.
4. Claims for damages or loss of data: legal developments may allow someone to request if
data on computer has not been guarded according to best practice.
5. Loss of data privacy: data legally stored on a computer may well be private to the person
concerned record.
20

fi
fi
fi
fi
fi
fi
52. Define Cyber space and the different effects of cyber threats?
Cyberspace: is a domain characterized by human use of device with electronics and the
electromagnetic spectrum to store, modify, and exchange data via networked systems and
associated physical infrastructures.
Effects of Cyber Threats:
• Personal Impact: Cyber Security issues now impact every individual who uses a
computer. millions of people worldwide are the victims of cyber-crimes.
• Business Vulnerability: Every business today is dependent on information and
vulnerable to one or more type of Cyber attacks (even those w/o online sites).
• National and Military Implications: The next Cold War. Cyber operations are also
becoming increasing integrated into active con icts.
• Cyber Espionage: The government itself is involved in cyber trespassing to keep eye on
other person/network/country for politically, economically, socially motivated.
21

fi
fi
fi
fl
fi
fi
fi
55. Define Defense in Depth security strategy and mention some of the system security
techniques?
22