SlideShare una empresa de Scribd logo
1 de 60
Universiti Utara Malaysia




Distributed Computing
Universiti Utara Malaysia

    Chapter 1: Characterization of Distributed
                    Systems

•   Introduction
•   Examples of distributed systems
•   Resource sharing and the web
•   Challenges
•   Summary
Universiti Utara Malaysia

                 Ubiquitous networks
•   Internet
•   Mobile phone networks
•   Corporation networks
•   Factory networks
•   Campus networks
•   Home networks
Universiti Utara Malaysia

      Distributed System Definition
• A distributed system is one in which
  hardware or software components
  located at networked computers
  communicate and coordinate their
  actions only by passing messages.
Universiti Utara Malaysia

   Characteristics of Distributed System
• Concurrency
  • concurrent programs execution – share
    resource
• No global clock
  • programs coordinate actions by exchanging
    messages
• Independent failures
  • when some systems fail, others may not know
Universiti Utara Malaysia
                     Share resources
• It characterizes the range of the things that can
  usefully be shared in a networked computer
• It extends from hardware components to
  software-defined entities.
• It includes the stream of video frames and
  the audio connection.
Universiti Utara Malaysia
    Chapter 1: Characterization of Distributed
                    Systems
•   Introduction
•   Examples of distributed systems
•   Resource sharing and the web
•   Challenges
•   Summary
Universiti Utara Malaysia


Familiar and widely used computer networks

• The Internet
• Intranet
• Mobile computing
Universiti Utara Malaysia

                           Internet
It is a very large distributed system that
 allows users throughout the world to make use
 of its services.
Internet protocols is a major technical
 achievement.
Universiti Utara Malaysia


                           The Internet

               intranet

ISP




                                            backbone




                           satellite link

      desktop computer:
                server:
           network link:
Universiti Utara Malaysia

                           Intranet
What is Intranet?
  A portion of the Internet that is separately
   administered and has a boundary that can
   be configured to enforce local security
   policies
  Composed of several LANs linked by
   backbone connections
  Be connected to the Internet via a router
Universiti Utara Malaysia


                                   A typical Intranet
                                                   email server       Desktop
                                                                      computers
print and other servers

                                    Local area
             Web server             network


                  email server
                                                                       print
                            File server
                                                                  other servers
   the rest of
   the Internet
                          router/firewall
Universiti Utara Malaysia
     Three main issues in the design of
     components for the use in intranet
File services
Firewall
The cost of software installation and
 support
Universiti Utara Malaysia

    Mobile and ubiquitous computing
Mobile devices
  Laptop computers
  Handheld devices
    • PDA, mobile phone, pager, video camera, digital
      camera
  Wearable devices
    • e.g. smart watches, digital glasses
  Network appliances
    • e.g. washing machines, hi-fi systems, cars and
      refrigerators
Universiti Utara Malaysia

Mobile and ubiquitous computing … continued
Mobile computing (nomadic computing)
  Access resources while on the move or in an
   unusual environment
  Location-aware computing: utilize resources
   that are conveniently nearby
Ubiquitous computing (pervasive
 computing)
  The harnessing of many small, cheap
   computational devices
Universiti Utara Malaysia
Portable and handheld devices in a distributed
                  system
                                Internet




Host intranet                                WAP
                Wireless LAN                 gateway   Home intranet



                                Mobile
                                phone
   Printer                     Laptop
                 Camera                    Host site
Universiti Utara Malaysia
  Issues in the design of components for the use in
          Mobile and ubiquitous computing

Discovery of resources
Eliminating the need for users to
 reconfigure their mobile devices
To cope with limited connectivity as
 they travel
Provide privacy and other security
 guarantees
Universiti Utara Malaysia
    Chapter 1: Characterization of Distributed
                    Systems

•   Introduction
•   Examples of distributed systems
•   Resource sharing and the web
•   Challenges
•   Summary
Universiti Utara Malaysia

                   Resource sharing
Is the primary motivation of distributed
 computing
Resources types
  Hardware, e.g. printer, scanner, camera
  Data, e.g. file, database, web page
  More specific functionality, e.g. search
   engine, file
Universiti Utara Malaysia

                       Some definitions
Service
   manage a collection of related resources and present their functionalities to
    users and applications

Server
   a process on networked computer that accepts requests from processes on
    other computers to perform a service and responds appropriately

Client
   the requesting process


Remote invocation
   A complete interaction between client and server, from the point when the
    client sends its request to when it receives the server’s response
Universiti Utara Malaysia


     Case study: the World Wide Web
• Motivation of WWW
  – Documents sharing between physicists of CERN

• Web is an open system: it can be extended
 and implemented in new ways without
 disturbing its existing functionality.
  – Its operation is based on communication standards
    and document standards
  – Respect to the types of ‘resource’ that can be
    published and shared on it.
Universiti Utara Malaysia

    Three main components of the Web
• HyperText Markup Language
  – A language for specifying the contents and layout
    of pages
• Uniform Resource Locators
  – Identify documents and other resources

• A client-server architecture with HTTP
  – By with browsers and other clients fetch
    documents and other resources from web
    servers
Universiti Utara Malaysia

                                    HTML
<IMG SRC = http://www.cdk3.net/WebExample/Images/earth.jpg>
<P>
Welcome to Earth! Visitors may also be interested in taking a look at the
<A HREF = “http://www.cdk3.net/WebExample/moon.html>Moon</A>.
<P>
(etcetera)

        HTML text is stored in a file of a web server.
    A browser retrieves the contents of this file from a web
                              server.
             -The browser interprets the HTML text
     -The server can infer the content type from the filename
                             extension.
Universiti Utara Malaysia

                                    URL
Scheme: scheme-specific-location
e.g:
     mailto:joe@anISP.net
     ftp://ftp.downloadIt.com/software/aProg.exe
     http://net.pku.cn/
     ….
   HTTP URLs are the most widely used
   An HTTP URL has two main jobs to do:
    - To identify which web server maintains the resource

    - To identify which of the resources at that server
Universiti Utara Malaysia

                 Web servers and web browsers

                  http://e.pku.cn/cgi-bin/allsearch?word=distributed+sys
          e.pku.cn


                 Web servers                               Browsers


  www.cdk3.net                       Internet
                                                         http://www.cdk3.net/

         www.w3c.org

File system of                        http://www.w3c.org/Protocols/Activity.html
www.w3c.org         Protocols

            Activity.html
Universiti Utara Malaysia

                                      HTTP URLs
•   http://servername[:port]//pathNameOnServer][?arguments]
•   e.g.

http://www.cdk3.net/
http://www.w3c.org/Protocols/Activity.html
http://e.pku.cn/cgi-bin/allsearch?word=distributed+system

----------------------------------------------------------------------------------------------------
Server DNS name                 Pathname on server                 Arguments
www.cdk3.net                    (default)               (none)
www.w3c.org                     Protocols/Activity.html (none)
e.pku.cn             cgi-bin/allsearch            word=distributed+system
-------------------------------------------------------------------------------------------------------

•   Publish a resource remains unwieldy
Universiti Utara Malaysia

                               HTTP
• Defines the ways in which browsers and
  any other types of client interact with web
  servers (RFC2616)

• Main features
  – Request-replay interaction
  – Content types. The strings that denote the type of
    content are called MIME (RFC2045,2046)
  – One resource per request. HTTP version 1.0
  – Simple access control
Universiti Utara Malaysia

 More features-services and dynamic pages

• Dynamic content
  – Common Gateway Interface: a program that
    web servers run to generate content for their
    clients

• Downloaded code
  – JavaScript
  – Applet
Universiti Utara Malaysia

               Discussion of Web

 Dangling: a resource is deleted or moved, but links
  to it may still remain
 Find information easily: e.g. Resource Description

  Framework which standardize the format of
  metadata about web resources
 Exchange information easily: e.g. XML – a self

  describing language
 Scalability: heavy load on popular web servers

 More applets or many images in pages increase in

  the download time
Universiti Utara Malaysia

    Chapter 1: Characterization of Distributed
                    Systems
•   Introduction
•   Examples of distributed systems
•   Resource sharing and the web
•   Challenges
•   Summary
Universiti Utara Malaysia

                       Heterogeneity

• Networks
  – Ethernet, token ring, etc
• Computer hardware
  – big endian / little endian
• Operating systems
  – different API of Unix and Windows
• Programming languages
  – different representations for data structures
• Implementations from different developers
  – no application standards
Universiti Utara Malaysia

              Heterogeneity… continued
Middleware
  applies to a software layer that provides a
   programming abstraction as well as masking the
   heterogeneity of the underlying networks,
   hardware, OSs and programming languages
Mobile code
  is used to refer to code that can be sent from
   one computer to another and run at the
   destination
Universiti Utara Malaysia

                           Openness
• Openness of a computer system
  -- is the characteristic that determines whether the system
       can be extended and re-implemented in various way.
       e.g. Unix
• Openness of distributed systems
  -- is determined by the degree to witch new resource
   sharing services can be added and be made available for
      use by A variety of client programs.
      e.g. Web
• How to deal with openness?
  -- key interfaces are published, e.g. RFC
Universiti Utara Malaysia

                           Security
• Confidentiality
  – protection against disclosure to
    unauthorized individuals,
    e.g. ACL in Unix File System
• Integrity
  – protection against alteration or corruption,
    e.g. checksum
• Availability
  – protection against interference with the
    means to access the resources,
    e.g. Denial of service
Universiti Utara Malaysia


                            Scalability
• A system is described as scalable
  –     if will remain effective when there is a significant increase
       in the number of resources and the number of users
• A scalable example system: the Internet
• design challenges
  – The cost of physical resources, e.g., servers support users at
    most O(n)
  – The performance loss, e.g., DNS no worse than O(logn)
  – Prevent software resources running out, e.g., IP address
  – Avoid performance bottlenecks, e.g., partitioning name table
    of DNS, cache and replication
Universiti Utara Malaysia


                             Scalability

   Date             Computers      Web servers     Percentage
1993, July            1,776,000              130          0.008
1995, July            6,642,000           23,500             0.4
1997, July           19,540,000       1,203,096                6
1999, July           56,218,000       6,598,697               12
Universiti Utara Malaysia

                    Failure handling
• Detecting
  – e.g. checksum for corrupted data
  – Sometimes impossible so suspect, e.g. a remote
    crashed server in the Internet
• Masking
  – e.g. Retransmit message, standby server
• Tolerating
  – e.g. a web browser cannot contact a web server
• Recovery
  – e.g. Roll back
• Redundancy
  – e.g. IP route, replicated name table of DNS
Universiti Utara Malaysia

                       Concurrency

• Correctness
  – ensure the operations on shared resource
    correct in a concurrent environment
    e.g. records bids for an auction
• Performance
  – Ensure the high performance of concurrent
    operations
Universiti Utara Malaysia

                         Transparency
• Access transparency
  –     using identical operations to access local and remote
        resources, e.g. a graphical user interface with folders
• Location transparency
  –     resources to be accessed without knowledge of their
        location, e.g. URL
• Concurrency transparency
  –     several processed operate concurrently using shared
        resources without interference with between them
Universiti Utara Malaysia

                     Transparency
• Replication transparency
  –   multiple instances of resources to be used to increase
      reliability and performance without knowledge of the replicas
      by users or application programmers,
      e.g. realcourse(http://vod.yf.pku.edu.cn/)
• Failure transparency
  –   users and applications to complete their tasks despite the
      failure of hardware and software components, e.g., email
• Mobility transparency
  –   movement of resources and clients within a system without
      affecting the operation of users and programs, e.g., mobile
      phone
Universiti Utara Malaysia

                 Transparency … continued
• Performance transparency
  –     allows the system to be reconfigured to improve
        performance as loads vary
• Scaling transparency
  –     allows the system and applications to expand in scale
        without change to the system structure or the application
        algorithms
Universiti Utara Malaysia
    Chapter 1: Characterization of Distributed
                    Systems
•   Introduction
•   Examples of distributed systems
•   Resource sharing and the web
•   Challenges
•   Summary
Universiti Utara Malaysia

                                 Summary
•   Distributed systems are pervasive
•   Resource sharing is the primary motivation for constructing
    distributed systems
•   Characterization of Distributed System
    –     Concurrency
    –     No global clock
    –     Independent failures
•   Challenges to construct distributed system
    –     Heterogeneity
    –     Openness
    –     Security
    –     Scalability
    –     Failure handling
    –     Concurrency
    –     Transparency
Backup
Universiti Utara Malaysia
Universiti Utara Malaysia

OceanStore overview
Universiti Utara Malaysia

The JXTA Search network architecture
Universiti Utara Malaysia




TUTORIAL QUESTION
Universiti Utara Malaysia




Exercise 1.1
Give five types of hardware resource and
five types of data or software resource
that can usefully be shared. Give
examples of their sharing as it occurs in
practice in distributed systems.
Universiti Utara Malaysia




Exercise 1.2
How might the clocks in two computers
that are linked by a local network be
synchronized without reference to an
external time source? What factors limit
the accuracy of the procedure you have
described? How could the clocks in a
large number of computers connected by
the Internet be synchronized? Discuss
the accuracy of that procedure.
Universiti Utara Malaysia




Exercise 1.3
A user arrives at a railway station that she
has never visited before, carrying a PDA
that is capable of wireless networking.
Suggest how the user could be provided
with information about the local services
and amenities at that station, without
entering the station’s name or attributes.
What technical challenges must be
overcome?
Universiti Utara Malaysia




Exercise 1.4
What are the advantages and
disadvantages of HTML, URLs and HTTP
as core technologies for information
browsing? Are any of these technologies
suitable as a basis for client-server
computing in general?
Universiti Utara Malaysia




Exercise 1.5
Use the World Wide Web as an example
to illustrate the concept of resource
sharing, client and server.
       Resources in the World Wide Web
and other services are named by URLs.
What do the initials URL denote? Give
examples of three different sorts of web
resources that can be named by URLs.
Universiti Utara Malaysia




Exercise 1.6
Give an example of a URL.
     List the three main components of a
URL, stating how their boundaries are
denoted and illustrating each one from
your example.
     To what extent is a URL location
transparent?
Universiti Utara Malaysia




Exercise 1.7
A server program written in one language (for
example C++) provides the implementation of a
BLOB object that is intended to be accessed by
clients that may be written in a different
language (for example Java). The client and
server computers may have different hardware,
but all of them are attached to an internet.
Describe the problems due to each of the five
aspects of heterogeneity that need to be solved
to make it possible for a client object to invoke a
method on the server object.
Universiti Utara Malaysia




Exercise 1.8
An open distributed system allows new
resource sharing services such as the
BLOB object in Exercise 1.7 to be added
and accessed by a variety of client
programs. Discuss in the context of this
example, to what extent the needs of
openness differ from those of
heterogeneity.
Universiti Utara Malaysia




Exercise 1.9
Suppose that the operations of the BLOB object
are separated into two categories – public
operations that are available to all users and
protected operations that are available only to
certain named users. State all of the problems
involved in ensuring that only the named users
can use a protected operation. Supposing that
access to a protected operation provides
information that should not be revealed to all
users, what further problems arise?
Universiti Utara Malaysia




Exercise 1.10
The INFO service manages a potentially very
large set of resources, each of which can be
accessed by users throughout the Internet by
means of a key (a string name). Discuss an
approach to the design of the names of the
resources that achieves the minimum loss of
performance as the number of resources in the
service increases. Suggest how the INFO service
can be implemented so as to avoid performance
bottlenecks when the number of users becomes
very large.
Universiti Utara Malaysia




Exercise 1.11
List the three main software components
that may fail when a client process
invokes a method in a server object,
giving an example of a failure in each
case. Suggest how the components can
be made to tolerate one another’s
failures.
Universiti Utara Malaysia




Exercise 1.12
A server process maintains a shared information
object such as the BLOB object of Exercise 1.7.
Give arguments for and against allowing the
client requests to be executed concurrently by
the server. In the case that they are executed
concurrently, give an example of possible
‘interference’ that can occur between the
operations of different clients. Suggest how
such interference may be prevented.
Universiti Utara Malaysia




Exercise 1.13
A service is implemented by several
servers. Explain why resources might be
transferred between them. Would it be
satisfactory for clients to multicast all
requests to the group of servers as a way
of achieving mobility transparency for
clients?

Más contenido relacionado

La actualidad más candente

Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network ArchitecturePawandeep Singh
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Localization &amp; calling
Localization  &amp; callingLocalization  &amp; calling
Localization &amp; callingRUpaliLohar
 
Application server
Application serverApplication server
Application servernava rathna
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6Ramesh Babu
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting Newtechbed
 
2.1 introduction to cellular architecture
2.1   introduction to cellular architecture2.1   introduction to cellular architecture
2.1 introduction to cellular architectureJAIGANESH SEKAR
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Network address translation
Network address translationNetwork address translation
Network address translationVarsha Honde
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 

La actualidad más candente (20)

Manet
ManetManet
Manet
 
Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network Architecture
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Unit 5
Unit 5Unit 5
Unit 5
 
Localization &amp; calling
Localization  &amp; callingLocalization  &amp; calling
Localization &amp; calling
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Application server
Application serverApplication server
Application server
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
X.25 and frame relay
X.25 and frame relayX.25 and frame relay
X.25 and frame relay
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
2.1 introduction to cellular architecture
2.1   introduction to cellular architecture2.1   introduction to cellular architecture
2.1 introduction to cellular architecture
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Virtualization
VirtualizationVirtualization
Virtualization
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 

Destacado

Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit INANDINI SHARMA
 
Jesus galindo astronomia maya
Jesus galindo astronomia mayaJesus galindo astronomia maya
Jesus galindo astronomia mayaEliandro Kienteca
 
Presentación manzana
Presentación manzanaPresentación manzana
Presentación manzanaMyGregorio
 
Chevrotronica iii
Chevrotronica iiiChevrotronica iii
Chevrotronica iiicesar_ar
 
Manual de prezi (octubre 2.014)
Manual de prezi (octubre 2.014)Manual de prezi (octubre 2.014)
Manual de prezi (octubre 2.014)eLMformacion
 
Unit 2 Communication
Unit 2 CommunicationUnit 2 Communication
Unit 2 Communicationnigelcollege
 
Slides of webinar: growing advisory businesses through alternative assets
Slides of webinar:   growing advisory businesses through alternative assetsSlides of webinar:   growing advisory businesses through alternative assets
Slides of webinar: growing advisory businesses through alternative assetsMichael Sakraida
 
Eiiiiiiiiiiii
EiiiiiiiiiiiiEiiiiiiiiiiii
Eiiiiiiiiiiiialexlur
 
Time saver project template
Time saver project templateTime saver project template
Time saver project templateKim Cao
 
Are you good at doing sports?
Are you good at doing sports?Are you good at doing sports?
Are you good at doing sports?onlychild21
 
English 10 unit 6 listening
English 10 unit 6  listeningEnglish 10 unit 6  listening
English 10 unit 6 listeningnganngoc84
 
E sky2u.com marketing plan v3.0
E sky2u.com marketing plan v3.0E sky2u.com marketing plan v3.0
E sky2u.com marketing plan v3.0e-sky, Inc
 
trigonomery of right triangles
trigonomery of right trianglestrigonomery of right triangles
trigonomery of right triangleskatleho phatoli
 

Destacado (20)

Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit I
 
Cartas y Menus
Cartas y MenusCartas y Menus
Cartas y Menus
 
Variables y arreglos en .Net
Variables y arreglos en .NetVariables y arreglos en .Net
Variables y arreglos en .Net
 
Jesus galindo astronomia maya
Jesus galindo astronomia mayaJesus galindo astronomia maya
Jesus galindo astronomia maya
 
Presentación manzana
Presentación manzanaPresentación manzana
Presentación manzana
 
Chevrotronica iii
Chevrotronica iiiChevrotronica iii
Chevrotronica iii
 
Manual de prezi (octubre 2.014)
Manual de prezi (octubre 2.014)Manual de prezi (octubre 2.014)
Manual de prezi (octubre 2.014)
 
Unit 2 Communication
Unit 2 CommunicationUnit 2 Communication
Unit 2 Communication
 
Tao tai khoan google play
Tao tai khoan google playTao tai khoan google play
Tao tai khoan google play
 
Slides of webinar: growing advisory businesses through alternative assets
Slides of webinar:   growing advisory businesses through alternative assetsSlides of webinar:   growing advisory businesses through alternative assets
Slides of webinar: growing advisory businesses through alternative assets
 
Eiiiiiiiiiiii
EiiiiiiiiiiiiEiiiiiiiiiiii
Eiiiiiiiiiiii
 
How To Promote Your Business On Pinterest
How To Promote Your Business On PinterestHow To Promote Your Business On Pinterest
How To Promote Your Business On Pinterest
 
Time saver project template
Time saver project templateTime saver project template
Time saver project template
 
Ngaputaw ppt
Ngaputaw pptNgaputaw ppt
Ngaputaw ppt
 
fdhgfd
fdhgfdfdhgfd
fdhgfd
 
Are you good at doing sports?
Are you good at doing sports?Are you good at doing sports?
Are you good at doing sports?
 
English 10 unit 6 listening
English 10 unit 6  listeningEnglish 10 unit 6  listening
English 10 unit 6 listening
 
zest_issue_2_Travel
zest_issue_2_Travelzest_issue_2_Travel
zest_issue_2_Travel
 
E sky2u.com marketing plan v3.0
E sky2u.com marketing plan v3.0E sky2u.com marketing plan v3.0
E sky2u.com marketing plan v3.0
 
trigonomery of right triangles
trigonomery of right trianglestrigonomery of right triangles
trigonomery of right triangles
 

Similar a Chapter 1-distribute Computing

Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networkingsaritasingh19866
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfshubhangisonawane6
 
Computer networking
Computer networkingComputer networking
Computer networkingTapan Khilar
 
Week 2 network configurartion
Week 2 network configurartionWeek 2 network configurartion
Week 2 network configurartionRobert Almazan
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxhishamousl
 
Chapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptChapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptssuser3acfba
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networkingabhinav2727
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfshubhangisonawane6
 
Computer communication network
Computer communication networkComputer communication network
Computer communication networkhimz676987
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzadkhurrak_shahzad
 
chapter one introduction to computer network maruf.pptx
chapter one  introduction to computer network maruf.pptxchapter one  introduction to computer network maruf.pptx
chapter one introduction to computer network maruf.pptxMohamedAbdi347025
 
L1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxL1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxMohamedFouardKanu
 
server-131210061249-phpapp02.pdf
server-131210061249-phpapp02.pdfserver-131210061249-phpapp02.pdf
server-131210061249-phpapp02.pdfKowsalyaJayakumar2
 

Similar a Chapter 1-distribute Computing (20)

Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networking
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Week 2 network configurartion
Week 2 network configurartionWeek 2 network configurartion
Week 2 network configurartion
 
Basic of Networking
Basic of NetworkingBasic of Networking
Basic of Networking
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
 
Isd&d networks
Isd&d networksIsd&d networks
Isd&d networks
 
Chapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptChapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.ppt
 
Types of Network
Types of NetworkTypes of Network
Types of Network
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking Concepts
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 
chapter one introduction to computer network maruf.pptx
chapter one  introduction to computer network maruf.pptxchapter one  introduction to computer network maruf.pptx
chapter one introduction to computer network maruf.pptx
 
L1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptxL1 - Computer Networks Review.pptx
L1 - Computer Networks Review.pptx
 
server-131210061249-phpapp02.pdf
server-131210061249-phpapp02.pdfserver-131210061249-phpapp02.pdf
server-131210061249-phpapp02.pdf
 

Más de nakomuri

Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpagenakomuri
 
Business entrepreneur presentation
Business entrepreneur presentationBusiness entrepreneur presentation
Business entrepreneur presentationnakomuri
 
C programming language notes (9)
C programming language notes (9)C programming language notes (9)
C programming language notes (9)nakomuri
 
C programming language notes (7)
C programming language notes (7)C programming language notes (7)
C programming language notes (7)nakomuri
 
C programming language notes (6)
C programming language notes (6)C programming language notes (6)
C programming language notes (6)nakomuri
 
C programming language notes (5)
C programming language notes (5)C programming language notes (5)
C programming language notes (5)nakomuri
 
C programming language notes (4)
C programming language notes (4)C programming language notes (4)
C programming language notes (4)nakomuri
 
C programming language notes (2)
C programming language notes (2)C programming language notes (2)
C programming language notes (2)nakomuri
 
C programming language notes (1)
C programming language notes (1)C programming language notes (1)
C programming language notes (1)nakomuri
 
C programming language notes (8)
C programming language notes (8)C programming language notes (8)
C programming language notes (8)nakomuri
 
Atm flowchart
Atm flowchartAtm flowchart
Atm flowchartnakomuri
 
Nikah khitbah
Nikah khitbahNikah khitbah
Nikah khitbahnakomuri
 
Senarai organisasi
Senarai organisasiSenarai organisasi
Senarai organisasinakomuri
 
Silibus stij3053 - Network Design
Silibus stij3053 - Network DesignSilibus stij3053 - Network Design
Silibus stij3053 - Network Designnakomuri
 
Chapter 4 high-speed_network_design - Network Design
Chapter 4 high-speed_network_design - Network DesignChapter 4 high-speed_network_design - Network Design
Chapter 4 high-speed_network_design - Network Designnakomuri
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Designnakomuri
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Designnakomuri
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Designnakomuri
 
Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Designnakomuri
 

Más de nakomuri (20)

Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
Business entrepreneur presentation
Business entrepreneur presentationBusiness entrepreneur presentation
Business entrepreneur presentation
 
C programming language notes (9)
C programming language notes (9)C programming language notes (9)
C programming language notes (9)
 
C programming language notes (7)
C programming language notes (7)C programming language notes (7)
C programming language notes (7)
 
C programming language notes (6)
C programming language notes (6)C programming language notes (6)
C programming language notes (6)
 
C programming language notes (5)
C programming language notes (5)C programming language notes (5)
C programming language notes (5)
 
C programming language notes (4)
C programming language notes (4)C programming language notes (4)
C programming language notes (4)
 
C programming language notes (2)
C programming language notes (2)C programming language notes (2)
C programming language notes (2)
 
C programming language notes (1)
C programming language notes (1)C programming language notes (1)
C programming language notes (1)
 
C programming language notes (8)
C programming language notes (8)C programming language notes (8)
C programming language notes (8)
 
Atm flowchart
Atm flowchartAtm flowchart
Atm flowchart
 
Nikah khitbah
Nikah khitbahNikah khitbah
Nikah khitbah
 
Twitter
TwitterTwitter
Twitter
 
Senarai organisasi
Senarai organisasiSenarai organisasi
Senarai organisasi
 
Silibus stij3053 - Network Design
Silibus stij3053 - Network DesignSilibus stij3053 - Network Design
Silibus stij3053 - Network Design
 
Chapter 4 high-speed_network_design - Network Design
Chapter 4 high-speed_network_design - Network DesignChapter 4 high-speed_network_design - Network Design
Chapter 4 high-speed_network_design - Network Design
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Design
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
 
Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Design
 

Último

Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713Sonam Pathan
 
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一lvtagr7
 
Aesthetic Design Inspiration by Slidesgo.pptx
Aesthetic Design Inspiration by Slidesgo.pptxAesthetic Design Inspiration by Slidesgo.pptx
Aesthetic Design Inspiration by Slidesgo.pptxsayemalkadripial4
 
Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170Sonam Pathan
 
Amil Baba in karachi Kala jadu Expert Amil baba Black magic Specialist in Isl...
Amil Baba in karachi Kala jadu Expert Amil baba Black magic Specialist in Isl...Amil Baba in karachi Kala jadu Expert Amil baba Black magic Specialist in Isl...
Amil Baba in karachi Kala jadu Expert Amil baba Black magic Specialist in Isl...Amil Baba Company
 
Statement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfileStatement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfilef4ssvxpz62
 
Call Girls Sabarmati 7397865700 Ridhima Hire Me Full Night
Call Girls Sabarmati 7397865700 Ridhima Hire Me Full NightCall Girls Sabarmati 7397865700 Ridhima Hire Me Full Night
Call Girls Sabarmati 7397865700 Ridhima Hire Me Full Nightssuser7cb4ff
 
Gripping Adult Web Series You Can't Afford to Miss
Gripping Adult Web Series You Can't Afford to MissGripping Adult Web Series You Can't Afford to Miss
Gripping Adult Web Series You Can't Afford to Missget joys
 
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Amil Baba Company
 
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].pp
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].ppGRADE 7 NEW PPT ENGLISH 1 [Autosaved].pp
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].ppJasmineLinogon
 
The Fine Line Between Honest and Evil Comics by Salty Vixen
The Fine Line Between Honest and Evil Comics by Salty VixenThe Fine Line Between Honest and Evil Comics by Salty Vixen
The Fine Line Between Honest and Evil Comics by Salty VixenSalty Vixen Stories & More
 
(伦敦大学毕业证学位证成绩单-PDF版)
(伦敦大学毕业证学位证成绩单-PDF版)(伦敦大学毕业证学位证成绩单-PDF版)
(伦敦大学毕业证学位证成绩单-PDF版)twfkn8xj
 
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...Amil Baba Company
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607dollysharma2066
 
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzers
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzersQUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzers
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzersSJU Quizzers
 
Taken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch DocumentTaken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch Documentf4ssvxpz62
 
Udaipur Call Girls 9602870969 Call Girl in Udaipur Rajasthan
Udaipur Call Girls 9602870969 Call Girl in Udaipur RajasthanUdaipur Call Girls 9602870969 Call Girl in Udaipur Rajasthan
Udaipur Call Girls 9602870969 Call Girl in Udaipur RajasthanApsara Of India
 
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证gwhohjj
 
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...Amil Baba Dawood bangali
 

Último (20)

Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713
 
young call girls in Hari Nagar,🔝 9953056974 🔝 escort Service
young call girls in Hari Nagar,🔝 9953056974 🔝 escort Serviceyoung call girls in Hari Nagar,🔝 9953056974 🔝 escort Service
young call girls in Hari Nagar,🔝 9953056974 🔝 escort Service
 
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
定制(UofT毕业证书)加拿大多伦多大学毕业证成绩单原版一比一
 
Aesthetic Design Inspiration by Slidesgo.pptx
Aesthetic Design Inspiration by Slidesgo.pptxAesthetic Design Inspiration by Slidesgo.pptx
Aesthetic Design Inspiration by Slidesgo.pptx
 
Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170Call Girls Near The Corus Hotel New Delhi 9873777170
Call Girls Near The Corus Hotel New Delhi 9873777170
 
Amil Baba in karachi Kala jadu Expert Amil baba Black magic Specialist in Isl...
Amil Baba in karachi Kala jadu Expert Amil baba Black magic Specialist in Isl...Amil Baba in karachi Kala jadu Expert Amil baba Black magic Specialist in Isl...
Amil Baba in karachi Kala jadu Expert Amil baba Black magic Specialist in Isl...
 
Statement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfileStatement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfile
 
Call Girls Sabarmati 7397865700 Ridhima Hire Me Full Night
Call Girls Sabarmati 7397865700 Ridhima Hire Me Full NightCall Girls Sabarmati 7397865700 Ridhima Hire Me Full Night
Call Girls Sabarmati 7397865700 Ridhima Hire Me Full Night
 
Gripping Adult Web Series You Can't Afford to Miss
Gripping Adult Web Series You Can't Afford to MissGripping Adult Web Series You Can't Afford to Miss
Gripping Adult Web Series You Can't Afford to Miss
 
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
 
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].pp
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].ppGRADE 7 NEW PPT ENGLISH 1 [Autosaved].pp
GRADE 7 NEW PPT ENGLISH 1 [Autosaved].pp
 
The Fine Line Between Honest and Evil Comics by Salty Vixen
The Fine Line Between Honest and Evil Comics by Salty VixenThe Fine Line Between Honest and Evil Comics by Salty Vixen
The Fine Line Between Honest and Evil Comics by Salty Vixen
 
(伦敦大学毕业证学位证成绩单-PDF版)
(伦敦大学毕业证学位证成绩单-PDF版)(伦敦大学毕业证学位证成绩单-PDF版)
(伦敦大学毕业证学位证成绩单-PDF版)
 
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
 
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzers
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzersQUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzers
QUIZ BOLLYWOOD ( weekly quiz ) - SJU quizzers
 
Taken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch DocumentTaken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch Document
 
Udaipur Call Girls 9602870969 Call Girl in Udaipur Rajasthan
Udaipur Call Girls 9602870969 Call Girl in Udaipur RajasthanUdaipur Call Girls 9602870969 Call Girl in Udaipur Rajasthan
Udaipur Call Girls 9602870969 Call Girl in Udaipur Rajasthan
 
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
原版1:1复刻卡尔加里大学毕业证UC毕业证留信学历认证
 
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...
 

Chapter 1-distribute Computing

  • 2. Universiti Utara Malaysia Chapter 1: Characterization of Distributed Systems • Introduction • Examples of distributed systems • Resource sharing and the web • Challenges • Summary
  • 3. Universiti Utara Malaysia Ubiquitous networks • Internet • Mobile phone networks • Corporation networks • Factory networks • Campus networks • Home networks
  • 4. Universiti Utara Malaysia Distributed System Definition • A distributed system is one in which hardware or software components located at networked computers communicate and coordinate their actions only by passing messages.
  • 5. Universiti Utara Malaysia Characteristics of Distributed System • Concurrency • concurrent programs execution – share resource • No global clock • programs coordinate actions by exchanging messages • Independent failures • when some systems fail, others may not know
  • 6. Universiti Utara Malaysia Share resources • It characterizes the range of the things that can usefully be shared in a networked computer • It extends from hardware components to software-defined entities. • It includes the stream of video frames and the audio connection.
  • 7. Universiti Utara Malaysia Chapter 1: Characterization of Distributed Systems • Introduction • Examples of distributed systems • Resource sharing and the web • Challenges • Summary
  • 8. Universiti Utara Malaysia Familiar and widely used computer networks • The Internet • Intranet • Mobile computing
  • 9. Universiti Utara Malaysia Internet It is a very large distributed system that allows users throughout the world to make use of its services. Internet protocols is a major technical achievement.
  • 10. Universiti Utara Malaysia The Internet intranet ISP backbone satellite link desktop computer: server: network link:
  • 11. Universiti Utara Malaysia Intranet What is Intranet? A portion of the Internet that is separately administered and has a boundary that can be configured to enforce local security policies Composed of several LANs linked by backbone connections Be connected to the Internet via a router
  • 12. Universiti Utara Malaysia A typical Intranet email server Desktop computers print and other servers Local area Web server network email server print File server other servers the rest of the Internet router/firewall
  • 13. Universiti Utara Malaysia Three main issues in the design of components for the use in intranet File services Firewall The cost of software installation and support
  • 14. Universiti Utara Malaysia Mobile and ubiquitous computing Mobile devices Laptop computers Handheld devices • PDA, mobile phone, pager, video camera, digital camera Wearable devices • e.g. smart watches, digital glasses Network appliances • e.g. washing machines, hi-fi systems, cars and refrigerators
  • 15. Universiti Utara Malaysia Mobile and ubiquitous computing … continued Mobile computing (nomadic computing) Access resources while on the move or in an unusual environment Location-aware computing: utilize resources that are conveniently nearby Ubiquitous computing (pervasive computing) The harnessing of many small, cheap computational devices
  • 16. Universiti Utara Malaysia Portable and handheld devices in a distributed system Internet Host intranet WAP Wireless LAN gateway Home intranet Mobile phone Printer Laptop Camera Host site
  • 17. Universiti Utara Malaysia Issues in the design of components for the use in Mobile and ubiquitous computing Discovery of resources Eliminating the need for users to reconfigure their mobile devices To cope with limited connectivity as they travel Provide privacy and other security guarantees
  • 18. Universiti Utara Malaysia Chapter 1: Characterization of Distributed Systems • Introduction • Examples of distributed systems • Resource sharing and the web • Challenges • Summary
  • 19. Universiti Utara Malaysia Resource sharing Is the primary motivation of distributed computing Resources types Hardware, e.g. printer, scanner, camera Data, e.g. file, database, web page More specific functionality, e.g. search engine, file
  • 20. Universiti Utara Malaysia Some definitions Service  manage a collection of related resources and present their functionalities to users and applications Server  a process on networked computer that accepts requests from processes on other computers to perform a service and responds appropriately Client  the requesting process Remote invocation  A complete interaction between client and server, from the point when the client sends its request to when it receives the server’s response
  • 21. Universiti Utara Malaysia Case study: the World Wide Web • Motivation of WWW – Documents sharing between physicists of CERN • Web is an open system: it can be extended and implemented in new ways without disturbing its existing functionality. – Its operation is based on communication standards and document standards – Respect to the types of ‘resource’ that can be published and shared on it.
  • 22. Universiti Utara Malaysia Three main components of the Web • HyperText Markup Language – A language for specifying the contents and layout of pages • Uniform Resource Locators – Identify documents and other resources • A client-server architecture with HTTP – By with browsers and other clients fetch documents and other resources from web servers
  • 23. Universiti Utara Malaysia HTML <IMG SRC = http://www.cdk3.net/WebExample/Images/earth.jpg> <P> Welcome to Earth! Visitors may also be interested in taking a look at the <A HREF = “http://www.cdk3.net/WebExample/moon.html>Moon</A>. <P> (etcetera) HTML text is stored in a file of a web server.  A browser retrieves the contents of this file from a web server. -The browser interprets the HTML text -The server can infer the content type from the filename extension.
  • 24. Universiti Utara Malaysia URL Scheme: scheme-specific-location e.g: mailto:joe@anISP.net ftp://ftp.downloadIt.com/software/aProg.exe http://net.pku.cn/ ….  HTTP URLs are the most widely used  An HTTP URL has two main jobs to do: - To identify which web server maintains the resource - To identify which of the resources at that server
  • 25. Universiti Utara Malaysia Web servers and web browsers http://e.pku.cn/cgi-bin/allsearch?word=distributed+sys e.pku.cn Web servers Browsers www.cdk3.net Internet http://www.cdk3.net/ www.w3c.org File system of http://www.w3c.org/Protocols/Activity.html www.w3c.org Protocols Activity.html
  • 26. Universiti Utara Malaysia HTTP URLs • http://servername[:port]//pathNameOnServer][?arguments] • e.g. http://www.cdk3.net/ http://www.w3c.org/Protocols/Activity.html http://e.pku.cn/cgi-bin/allsearch?word=distributed+system ---------------------------------------------------------------------------------------------------- Server DNS name Pathname on server Arguments www.cdk3.net (default) (none) www.w3c.org Protocols/Activity.html (none) e.pku.cn cgi-bin/allsearch word=distributed+system ------------------------------------------------------------------------------------------------------- • Publish a resource remains unwieldy
  • 27. Universiti Utara Malaysia HTTP • Defines the ways in which browsers and any other types of client interact with web servers (RFC2616) • Main features – Request-replay interaction – Content types. The strings that denote the type of content are called MIME (RFC2045,2046) – One resource per request. HTTP version 1.0 – Simple access control
  • 28. Universiti Utara Malaysia More features-services and dynamic pages • Dynamic content – Common Gateway Interface: a program that web servers run to generate content for their clients • Downloaded code – JavaScript – Applet
  • 29. Universiti Utara Malaysia Discussion of Web  Dangling: a resource is deleted or moved, but links to it may still remain  Find information easily: e.g. Resource Description Framework which standardize the format of metadata about web resources  Exchange information easily: e.g. XML – a self describing language  Scalability: heavy load on popular web servers  More applets or many images in pages increase in the download time
  • 30. Universiti Utara Malaysia Chapter 1: Characterization of Distributed Systems • Introduction • Examples of distributed systems • Resource sharing and the web • Challenges • Summary
  • 31. Universiti Utara Malaysia Heterogeneity • Networks – Ethernet, token ring, etc • Computer hardware – big endian / little endian • Operating systems – different API of Unix and Windows • Programming languages – different representations for data structures • Implementations from different developers – no application standards
  • 32. Universiti Utara Malaysia Heterogeneity… continued Middleware applies to a software layer that provides a programming abstraction as well as masking the heterogeneity of the underlying networks, hardware, OSs and programming languages Mobile code is used to refer to code that can be sent from one computer to another and run at the destination
  • 33. Universiti Utara Malaysia Openness • Openness of a computer system -- is the characteristic that determines whether the system can be extended and re-implemented in various way. e.g. Unix • Openness of distributed systems -- is determined by the degree to witch new resource sharing services can be added and be made available for use by A variety of client programs. e.g. Web • How to deal with openness? -- key interfaces are published, e.g. RFC
  • 34. Universiti Utara Malaysia Security • Confidentiality – protection against disclosure to unauthorized individuals, e.g. ACL in Unix File System • Integrity – protection against alteration or corruption, e.g. checksum • Availability – protection against interference with the means to access the resources, e.g. Denial of service
  • 35. Universiti Utara Malaysia Scalability • A system is described as scalable – if will remain effective when there is a significant increase in the number of resources and the number of users • A scalable example system: the Internet • design challenges – The cost of physical resources, e.g., servers support users at most O(n) – The performance loss, e.g., DNS no worse than O(logn) – Prevent software resources running out, e.g., IP address – Avoid performance bottlenecks, e.g., partitioning name table of DNS, cache and replication
  • 36. Universiti Utara Malaysia Scalability Date Computers Web servers Percentage 1993, July 1,776,000 130 0.008 1995, July 6,642,000 23,500 0.4 1997, July 19,540,000 1,203,096 6 1999, July 56,218,000 6,598,697 12
  • 37. Universiti Utara Malaysia Failure handling • Detecting – e.g. checksum for corrupted data – Sometimes impossible so suspect, e.g. a remote crashed server in the Internet • Masking – e.g. Retransmit message, standby server • Tolerating – e.g. a web browser cannot contact a web server • Recovery – e.g. Roll back • Redundancy – e.g. IP route, replicated name table of DNS
  • 38. Universiti Utara Malaysia Concurrency • Correctness – ensure the operations on shared resource correct in a concurrent environment e.g. records bids for an auction • Performance – Ensure the high performance of concurrent operations
  • 39. Universiti Utara Malaysia Transparency • Access transparency – using identical operations to access local and remote resources, e.g. a graphical user interface with folders • Location transparency – resources to be accessed without knowledge of their location, e.g. URL • Concurrency transparency – several processed operate concurrently using shared resources without interference with between them
  • 40. Universiti Utara Malaysia Transparency • Replication transparency – multiple instances of resources to be used to increase reliability and performance without knowledge of the replicas by users or application programmers, e.g. realcourse(http://vod.yf.pku.edu.cn/) • Failure transparency – users and applications to complete their tasks despite the failure of hardware and software components, e.g., email • Mobility transparency – movement of resources and clients within a system without affecting the operation of users and programs, e.g., mobile phone
  • 41. Universiti Utara Malaysia Transparency … continued • Performance transparency – allows the system to be reconfigured to improve performance as loads vary • Scaling transparency – allows the system and applications to expand in scale without change to the system structure or the application algorithms
  • 42. Universiti Utara Malaysia Chapter 1: Characterization of Distributed Systems • Introduction • Examples of distributed systems • Resource sharing and the web • Challenges • Summary
  • 43. Universiti Utara Malaysia Summary • Distributed systems are pervasive • Resource sharing is the primary motivation for constructing distributed systems • Characterization of Distributed System – Concurrency – No global clock – Independent failures • Challenges to construct distributed system – Heterogeneity – Openness – Security – Scalability – Failure handling – Concurrency – Transparency
  • 46. Universiti Utara Malaysia The JXTA Search network architecture
  • 48. Universiti Utara Malaysia Exercise 1.1 Give five types of hardware resource and five types of data or software resource that can usefully be shared. Give examples of their sharing as it occurs in practice in distributed systems.
  • 49. Universiti Utara Malaysia Exercise 1.2 How might the clocks in two computers that are linked by a local network be synchronized without reference to an external time source? What factors limit the accuracy of the procedure you have described? How could the clocks in a large number of computers connected by the Internet be synchronized? Discuss the accuracy of that procedure.
  • 50. Universiti Utara Malaysia Exercise 1.3 A user arrives at a railway station that she has never visited before, carrying a PDA that is capable of wireless networking. Suggest how the user could be provided with information about the local services and amenities at that station, without entering the station’s name or attributes. What technical challenges must be overcome?
  • 51. Universiti Utara Malaysia Exercise 1.4 What are the advantages and disadvantages of HTML, URLs and HTTP as core technologies for information browsing? Are any of these technologies suitable as a basis for client-server computing in general?
  • 52. Universiti Utara Malaysia Exercise 1.5 Use the World Wide Web as an example to illustrate the concept of resource sharing, client and server. Resources in the World Wide Web and other services are named by URLs. What do the initials URL denote? Give examples of three different sorts of web resources that can be named by URLs.
  • 53. Universiti Utara Malaysia Exercise 1.6 Give an example of a URL. List the three main components of a URL, stating how their boundaries are denoted and illustrating each one from your example. To what extent is a URL location transparent?
  • 54. Universiti Utara Malaysia Exercise 1.7 A server program written in one language (for example C++) provides the implementation of a BLOB object that is intended to be accessed by clients that may be written in a different language (for example Java). The client and server computers may have different hardware, but all of them are attached to an internet. Describe the problems due to each of the five aspects of heterogeneity that need to be solved to make it possible for a client object to invoke a method on the server object.
  • 55. Universiti Utara Malaysia Exercise 1.8 An open distributed system allows new resource sharing services such as the BLOB object in Exercise 1.7 to be added and accessed by a variety of client programs. Discuss in the context of this example, to what extent the needs of openness differ from those of heterogeneity.
  • 56. Universiti Utara Malaysia Exercise 1.9 Suppose that the operations of the BLOB object are separated into two categories – public operations that are available to all users and protected operations that are available only to certain named users. State all of the problems involved in ensuring that only the named users can use a protected operation. Supposing that access to a protected operation provides information that should not be revealed to all users, what further problems arise?
  • 57. Universiti Utara Malaysia Exercise 1.10 The INFO service manages a potentially very large set of resources, each of which can be accessed by users throughout the Internet by means of a key (a string name). Discuss an approach to the design of the names of the resources that achieves the minimum loss of performance as the number of resources in the service increases. Suggest how the INFO service can be implemented so as to avoid performance bottlenecks when the number of users becomes very large.
  • 58. Universiti Utara Malaysia Exercise 1.11 List the three main software components that may fail when a client process invokes a method in a server object, giving an example of a failure in each case. Suggest how the components can be made to tolerate one another’s failures.
  • 59. Universiti Utara Malaysia Exercise 1.12 A server process maintains a shared information object such as the BLOB object of Exercise 1.7. Give arguments for and against allowing the client requests to be executed concurrently by the server. In the case that they are executed concurrently, give an example of possible ‘interference’ that can occur between the operations of different clients. Suggest how such interference may be prevented.
  • 60. Universiti Utara Malaysia Exercise 1.13 A service is implemented by several servers. Explain why resources might be transferred between them. Would it be satisfactory for clients to multicast all requests to the group of servers as a way of achieving mobility transparency for clients?

Notas del editor

  1. copyright (c) 2008, CAS UUM
  2. An intranet is a part of the Internet that is separately administered and uses a firewall to enforce its own local security policies. Users in an intranet share data by means of file services.
  3. TCP/IP: connect different type computer networks A very large distributed system WWW, email, FTP, VOD, etc The Internet is a very large distributed system that allows users throughout the world to make use of its services.
  4. An intranet is a part of the Internet that is separately administered and uses a firewall to enforce its own local security policies. Users in an intranet share data by means of file services.
  5. An intranet is a part of the Internet that is separately administered and uses a firewall to enforce its own local security policies. Users in an intranet share data by means of file services.
  6. The World Wide Web Consortium (W3C) develops interoperable technologies (specifications, guidelines, software, and tools) to lead the Web to its full potential.