DC Assignment 1 (Disturbed Computing) Engg
DC Assignment 1 (Disturbed Computing) Engg
1.7.2.1 Heterogeneity
"(Modern distributed systems are highly heterogerneous in many dimensions
including available bandwidth, processor speed, disk capacity, security, failure
rate, and pattern of failures. It applies to all the following :
1. Computer networks : LAN, wireless network, satellite link
2. Computer hardware devices : Laptop, computer, mobiles phones, tablets
3. Operating systems : Linux, UNIX, Windows
4. Programming languages: C/Ct+, Java, PHP
5. Different roles of software developers, designers, system managers)
There may be many different representations of data in the system. This mig
include different representations for integers, byte streams, floating point numbes
and character sets.
Most of the data can be marshaled from one system to another without losi
significance. Attempts to provide a universal canonical form of information
lagging
The integration of heterogeneous components implies the construction
distributed systems. In a distributed system, heterogeneity is almost urnavoidab
as different components may require different implementation technologes.
Middleware
Middleware is a software layer that provides a programming abstraction as W
as masking the heterogeneity of the underlying platform) E.g., cORBA, D
DCON
Java RMI, etc.
1.722 Openness
Openness means that the system can be easily extended and modified. Openness
refers to the ability to plug and playYou can, in theory, have two equivalent
services that follow the same interface contract, and interchange one with the
other.
have to be able to
The integration of new components means that they
communicate with some of the components that already exist in the system.
(Openness and distribution are related. Distributed system components achieve
interfaces.
openness by communicating using well-defined
" If the well-defined interfaces for a system are published, it is easier for developers
to add new features or replace sub-systems in the future.
"(Open systems can easily be extended and modified. New components can be
integrated with existing components. )
systems.OpennesDeta
concerned with extensions and improvements of distributed
interfaces of comnponents need to be published. New
integrated with existing components. components haave to
The system needs to have a stable architecture so that new
easily integrated while preserving previous investments. components Can
-(An open distributed system offers services according to standard
describe the syntax and semantics of those services. rules th.
1.7.2.3 Security
Security becomes even more important in a distributed system.
Authenieak
authorization, digital signatures, non-rpudiation, encryption, and privacy
becon
major issues in the distributed system.
The four basic goals of a security system are to protect
information, to detect a
intrusion, to confine the security breach, and to repair the damage and return h
system to a known stable and secure state.
Security for information resources has three components
Confidentiality : Protection against disclosure to unauthorized individuals, e
ACL in unix file system.
2. Integrity : Protection against alteration or corruption, e.g. checksum.
3. Availability : Protection against interference with the means to access the
resources, e.g. Denial of service.
Encryption provides protection of shared resources, keeps sensitive informatie
secret when transmitted. Security challenges that are not yet fully met :
1. Denial of service attacks
different bandwidths.
Mobile code systems address a wide range of needs and requirements, such as
service customization, dynamic extension of application functionality, autonomy,
fault tolerance and support for disconnected operations.
1.7.24 Sçalability
ASystem is said to be scalable if it can handle the addition of users and resources
without suffering a noticeable loss of performance or increase in administrative
complexity
or not.
The ability to accommodate any growth in the future be it expected
more than
Distributed system architectures achieve scalability through employing
one host. Distributed systems can be scalable because additional computers can be
added in order to host additional components.
1. In size : Dealing with large numbers of machines, users, tasks.
2. In location : Dealing with geometric distribution and mobility.
3. In administration : Addressing data passing through different regions of
ownership.
The design of scalable distributed systems presents the following challenges :
1. Controlling the cost of resources.
2. Controlling the performance loss.
3. Preventing software resources from running out.
4. Avoiding performance bottlenecks. )
Controlling the cost of physical resources i.e. servers and users.
Controlling the performance loss: DNS hierarchic structures scale better than
Iinear structures and save time for access structured data.
Preventing software resources running out : Internet 32 bits addresses run out
Soon. 128 bits one gives extra space in messages.
Avoiding performance bottlenecks : DNS name table was kept in a single master
file partitioning between servers.
Example : File system scalability is defined as the ability to support very large file
systens, large files, large directories and large numbers of iles while still
providing 1/O performance. Google file system aims at efficiently and reliably
managing many extremely large files tor many clients, using commodity hardware.
Various techniques such as replication, caching and cache memory management
and asynchronous processing help to achieve scalability.
TECHNICAL PUBLICATIONS
an up-thrust for knowledge
Distributed C o m p u t i n g
1-17 Introduction
1.7.2.6 Concurrency
Componernts in distributed systems are executed
Time
in concurrent processes) Fig. 1.7.2 shows concept
of concurrency.
There is a possibility that several clients will
attempt to access a shared resource at the same
time. Multiple users make requests on same
resource for read, write and update operation.
Each resource must be safe in a concurrent
environment. )
1.72.7 Transparency
"(Distributed systems should be perceived by users and application programmers as
a whole rather than as a collection of cooperating components. Transparency is a
key issue within distributed system.
the ultimate
Concept : (Hide different aspects of distribution from the client. It is
goal of many distributed systems.
these services
" It can be achieved by providing lower-level services. The client uses
instead of hard coding the information. The service layer provides a service with a
Certain Quality of Service.
TECHNICAL PUBLICATIONs
- an up-thrust for knowiedge
Distributed Computing
1- 19 Introduction
.(The portability of the devices, such as laptop computers, PDA, mobile phone,
refrigerators, together with their ability to connect conveniently to networks in
different places, makes mobile computing possible.)
Ubiquitous computing is the harnessing of many small cheap computational
devices that are present in user's physical environments, including the home, office
and elsewhere. )
Mobile devices are
1. Laptop computers.
2. Handheld devices, including PDAs, cell phones, pagers, video cameras and
digital cameras.
3. Wearable devices, such as smart watches.
4. Devices embedded in appliances such as washing machines,)hi-fi systems, cars.
Mobile computing (nomadic comnputing)
| 1. People can still access resources while he is on the move or visiting places
other than their usual environment.
2. Location-aware computing : Utilize resources that are conveniently nearby
Ubiquitous computing,(pervasive computing)
1. The harnessing of marny small, cheap computational devices those are present
in user's physical environments, including the home, office and elsewhere.
2. It benefits users while they remain in a single environment such as home.
" Fig. 1.7.3 shows the portable and handheld devices in a distributed system.
(See Fig. 1.7.3 on next page)
Mobile and ubiquitous computing raise significant system issues presents an
architecture for mobile computing.
User has access to three forms of wireless connection :
I. A laptop is connected to host's wireless LAN.
2. Amobile phone is connected to internet using WAP via a gateway.
3. A digital camera is connected to a printer over an infra-red link.
Intr.
Internet
Home
Internet
Host Internet
Printer
WAP
Gateway
Camera
Mobile
phone
Internet
ISP
LAN
Backbone
Satellite
link Backbone
LAN
LAN
LAN
Router
LAN
3. Multimedia system
Digital multimedia :tComputer-controlled integration of text, graphics, still images,
moving pictures, animation, sound, and any other medium. All these data types
are represented, stored, transmitted, and processed digitally.)
Acontinuous media type has an implicit time dimension, while a discrete type
does not. Referring to video and audio data as continuous and time based.
Continuous refers to the user's view of data. Internally, continuous media are
represented as sequences of discrete values that replace each other over time.
Multimedia streams are said to be time-based because timed data elements in
audio and video streams define the content of the stream. The systems that
support multimedia applications need to preserve the timing when they handle
continuous data.
" A distributed multimedia system should be able to perform the same functions for
continuous media types such as audio and video. It should be able to store
and
locate audio or video files, to transmit them across the network, to support the
presentation of the media types to the 'user and optionally also to
share the media
types aCross a group of users.
Distributed multimedia applications typically handle two different types of
information as well as
communication : Request/Reply interaction for control
real-time straming data.
Web casting
technology. It broadcast
Web casting is an application of distributed multimedia
technology to
continuous media over the internet. A webcast uses streaming media
to many simultaneous
take a single content SOurce and distribute it
listeners /viewers.
:
Web casting support following distributed multimedia application
example : MP3 standard,
I. It supports for encoding and encryption formats. For
MPEG-1, HDTV.
2. It supports quality of service.
schedulng
3. It uses resources management strategies, including appropriate
policies to support the desired quality of service.
(Webcgsting is also called push technology. It is amethod of obtaining intormation
in which aserver automatically downloads content to your computer at regular
intervals or whenever updates are made to the site.)
TECHNICAL PUBLICATIONS - an up-thrust for knowledge