Professional Documents
Culture Documents
Submitted to Mr.Admas
1. List The Characteristics Of Distributed System?
Programs are executed concurrently
There is no global time
Heterogeneity
Openness
Components can fail independently (isolation, crash)
Fault tolerance
Difference between the various computers and the way in which they communicate are
mostly hidden from the user
User and application can interact with a distributed system in a consistent and uniform
way
Transparency
Distributed system should also be relatively easy to expand or scale
A distributed system will normally be continuously available
User and application should not notice that parts are being replaced or fixed
2. Mention The Examples Of Distributed System?
The Internet
Mobile and ubiquitous computing
Network of workstations PCs: a group of networked personal workstations or PCs
connected to one or more server machines.
Distributed computing using mobile agents
An intranet: a network of computers and workstations within an organizations,
segregated from the internet via a protective device.
Java remote method invocation
Telecommunication networks
Peep-to-peer networks
Airline reservation systems
Distributed databases
Scientific computing
Distributed rendering
Performance
Distribution
Reliability (fault tolerance): Failure of one node does not lead to the failure of the entire
distributed system. Other nodes can still communicate with each other.
Incremental growth
Sharing of data: All the nodes in the distributed system are connected to each other. So
nodes can easily share data with other nodes.
Communication: Enhance human-to-human communication
Scalability: More nodes can easily be added to the distributed system i.e. it can be scaled
as required.
Sharing of resource: Resources like printers can be shared with multiple nodes rather than
being restricted to just one.
4. What Are The Disadvantages Of Disadvantages Of Distributed Systems?
Ubiquitous computing:-
Ubiquitous computing used in single environment such as home or hospital.
Ubiquitous computing is the harnessing of many small, cheap computational devices
that are present in users’ physical environments, including the home, office and even
natural settings.
The term ‘ubiquitous’ is intended to suggest that small computing devices will
eventually become so pervasive in everyday objects that they are scarcely noticed.
Mobile computing:-
Mobile computing has advantage when using different devices such as laptops and
printers.
Mobile computing is the performance of computing tasks while the user is on the
move, or visiting places other than their usual environment. In mobile computing,
users who are away from their ‘home’ intranet (the intranet at work, or their
residence) are still provided with access to resources via the devices they carry with
them.
They can continue to access the Internet; they can continue to access resources in
their home intranet; and there is increasing provision for users to utilize resources
such as printers or even sales points that are conveniently nearby as they move
around. The latter is also known as location-aware or context-aware computing.
6. How We Provide A Security?
Confidentiality: Protection against disclosure to unauthorized individual. E.g. ACLs
(access control lists) to provide authorized access to information.
Integrity: Protection against alternation or corruption. E.g. changing the account number
or amount value in a money order
Availability: Protection against interference targeting access to the resources. E.g. denial
of service (DoS, DDoS) attacks
Non-repudiation: Proof of sending / receiving information. E.g. digital signature
7. Define Scalability?
System should work efficiently at many different scales, ranging from a small Intranet to the
Internet.
Challenges of designing scalable distributed systems:
Cost of physical resources
Cost should linearly increase with system size
Performance Loss
For example, in hierarchically structured data, search performance loss due to data growth
should not be beyond O (log n), where n is the size of data.
Preventing software resources running out.
Numbers used to represent Internet address (32 bit->64bit), Y2K like problem. Avoiding
performance bottlenecks.
Use decentralized algorithms (centralized DNS to decentralize).
8. Define Protocol?
The term protocol is used to refer to a well-known set of rules and formats to be used for
communication between processes in order to perform a given task.
Define the rules that govern the communications between two computers connected to
the network.
Roles: addressing and routing of messages, error detection and recovery, sequence and
flow controls etc.
A protocol specification consists of the syntax, which defines the kinds and formats of
the messages exchanged, and the semantic, which specifies the action taken by each
entity when specific events occur.
The definition of a protocol has two important parts to it:
1. A specification of the sequence of messages that must be exchanged.
2. A specification of the format of the data in the message.
Remote Procedure Call or the RPC and the Remote Method Invocation or RMI are both
message passing techniques in the Inter Process Communication (IPC).
But there are two basic differences between the two methods:
RPC supports procedural programming. I.e. only remote procedures can be invoked.
Whereas RMI is object-based. As the name suggests, it is invoked on remote objects.
In RPC, the parameters that are passed are ordinary data structures. Whereas in RMI,
objects can be passed as parameters.
Synchronous
In Synchronous transmission, Data is sent in form of blocks or frames.
Synchronous transmission is fast.
Synchronous transmission is costly.
In Synchronous transmission, time interval of transmission is constant.
In Synchronous transmission, there is no gap present between data.
Efficient use of transmission line is done in synchronous transmission.
Synchronous transmission needs precisely synchronized clocks for the information of
new bytes.
Asynchronous
In asynchronous form of communication, the use of the send operation is non-
blocking in that the sending process is allowed to proceed as soon as the message
has been copied to a local buffer and the transmission of the message proceeds in
parallel with the sending process. The receive operation can have blocking and
non-blocking variants.
In asynchronous transmission, Data is sent in form of byte or character.
Asynchronous transmission is slow.
Asynchronous transmission is economical.
In asynchronous transmission, time interval of transmission is not constant, it is
random.
In asynchronous transmission, there is present gap between data.
While in asynchronous transmission, transmission line remains empty during gap in
character transmission.
Asynchronous transmissions have no need of synchronized clocks as parity bit is used in
this transmission for information of new bytes.