SlideShare uma empresa Scribd logo
1 de 35
Introduction to Distributed Systems
Chapter Five
Models of Distributed Systems
By Mezgebu A.
Topics
Models of Distributed System
Physical model
Architectural model
Fundamental model
Interaction, failure, security
2/5/2023 2
Distributed System Models
 Difficulties and threats for DS
 Widely varying mode of use
 Wide range of system environment
 Internal problems
 External threats
 Properties and design issues of DS can be captured using descriptive
models
 DS models provide an abstract, simplified but consistent description of a relevant
aspect of DS design.
 Physical model
 Architectural model
 Fundamental model
2/5/2023 3
Physical Models
 Representation of the underlying hardware elements
• “A system in which (HW and SW) components located at networked computers
communicate and coordinate their action only by message passing”.
Minimal physical model
• Extensible set of computer nodes interconnected by a computer network for the
required passing of messages.
 Early DS
• 10 to 100 nodes interconnected by a LAN
• Small range of service
• Largely homogeneous systems
Openness was not a primary concern
• Effort was to improve quality of service
2/5/2023 4
Physical Models …
 Internet-scale DS
• Drive was growth of the internet
• Physical infrastructure: network of networks
• High heterogeneity
• Emphasis on
 Open standards
 Middleware technologies
 Web services
• Characteristics of nodes
• Relatively static
• Discrete
• Autonomous
2/5/2023 5
Physical Models …
 Contemporary DS
 Emergence of mobile computing
• Need for added capability such as service discovery and support for spontaneous
interoperation
 Emergence of ubiquitous computing
• Move from discrete nodes to architectures where computers are embedded
• E.g., smart homes
 Emergence of cloud computing
• Move from autonomous nodes performing a given role to pools of nodes that together
provide a given service
• E.g., google search
Increase in heterogeneity
2/5/2023 6
Physical Models …
 Challenges
2/5/2023 7
Architectural Models
 Architecture
 Structure specified in terms of components and their interrelationships
 Goal
• Meet the present and likely future demands
 Concerns
• Reliability
• Manageability
• Adaptability
• Cost-effectiveness
 Architectural design provide a consistent frame of reference for the
design
2/5/2023 8
Architectural Models …
 Architectural elements
 Questions to understand fundamental building blocks
• What are the entities that are communicating in the DS?
• How do they communicate? or more specifically, what communication
paradigm is used?
• What (potentially changing) roles and responsibilities do they have in the
overall architecture?
• How are they mapped in to the physical distributed infrastructure (what is
their placement)
2/5/2023 9
Architectural Models …
 Communicating entities
 System perspective
 Processes
 Caveats
 In systems that do not support process abstraction, entities are nodes (e.g., sensor
network)
 Threads (when supplementing processes)
 Problem perspective
 Objects
 Components
 Specify interface + assumption
 Contractual approach
2/5/2023 10
Architectural Models …
 Communicating entities …
 Problem perspective …
 Web services
Encapsulate behavior and access through interfaces
Integrated into the WWW
Partially defined by web-based technologies
Decoupled complete services that can be combined to achieve value-
added services
Cross organizational boundaries
2/5/2023 11
Architectural Models …
 Communication paradigm
 Inter-process communication
 Low level support for communication between processes
 Message-passing primitives
 Socket programming (direct access to the APIs offered by Internet Protocols)
 Multicast communication
 Remote invocation
• Covers a range of techniques based on a two-way exchange
• Request-reply protocol
 Involve pair wise exchange of messages from client to server and back
 Primitive
 Used in embedded systems when performance is paramount
 E.g., used in HTTP protocol
2/5/2023 12
Architectural Models …
 Communication paradigm …
 Remote invocation …
 Remote procedure calls
 Procedures in processes on remote computers can be called as if they are
procedures in the local address space
 Hides distribution, encoding, and decoding of parameters and results, passing
of messages, ...
 Supports client server applications
 Offer access and location transparency
 Remote method invocation
 Used with distributed objects
 Calling object invokes a method in a remote object
 Hides underlying details
2/5/2023 13
Architectural Models …
 Communication paradigm …
 Remote invocation …
 Common characteristics
 Communication represents a two-way relationship
 Receivers are generally aware of the identity of senders
 Mostly, both parties must exist at the same time
 Indirect communication
 Allow strong degree of decoupling between senders and receivers
o Space decoupled
o Time decoupled
2/5/2023 14
Architectural Models …
 Communication paradigm …
 Indirect communication
 Group communication
 One-to-many communication
 Relies on the abstraction of a group => group identifier
 Recipients elect to receive messages sent to a group by joining the group
 Senders send messages to the group via the group identifier
 Senders do not need to know the recipients of the message
 Publish-subscribe systems (Distributed event-based systems)
 Message queues
 Offer point to point service
 Consumer processes could be notified of the arrival of a new message in the
queue
2/5/2023 15
Architectural Models …
 Communication paradigm …
 Indirect communication
 Tuple spaces
 Write, read, or remove structured data (tuples) to/from
persistent tuple space
 Also called generative communication
 Distributed shared memory
 Provide an abstraction for sharing data between
processes that do not share physical memory
2/5/2023 16
Architectural Models …
 Role and responsibilities
 Architectural styles based on roles
 Client-server
 Direct and simple
 Limitation
 Scalability
 Placement of services
 Suggested solutions
 Placement strategies
 Peer-to-peer
 All processes involved in a task play similar roles
 No distinction between client and server processes/computers
2/5/2023 17
Architectural Models …
 Placement strategies
 Placement strategies
 Mapping of services to multiple servers
 E.g., web, DNS
 Caching
At client or proxy
 Mobile code
E.g., Applet
Security
Mobile agent
 Program travels from one computer to another in a network carrying out a
task on someone's behalf
 Security
2/5/2023 18
Fundamental Models
 Models based on fundamental properties
 Allows to be specific about their characteristics and failures and
security risks they might exhibit
 Contains only essential ingredients that helps to understand
some aspects of a system's behavior
 Purpose
 To make explicit all the relevant assumptions about the system we are
modelling
 To make generalization concerning what is possible and impossible
2/5/2023 19
Fundamental Models …
 Aspects of DS captured in the fundamental models
 Interaction
• Processes interact by passing messages
• Communication and coordination
• Limited level of accuracy with which independent processes can be coordinated
Delays
Difficulty to maintain the same notion of time across all machines
 Failure
• Define and classify faults
• Analyze potential effects and design systems that are able to tolerate faults
 Security
• Define and classify attacks
• Provide basis for the analysis of threats to a system and design of systems that
resist them
2/5/2023 20
Fundamental Models …
 Interaction model
 Factors affecting interaction of processes in a DS
 Communication performance
 Difficulty to maintain a single global notion of time
 Performance of communication channels
 Performance characteristics
 Latency
 Time between a start of a message's transmission from one process and
beginning of its receipt by another
• Time for the first of transmitted string bits to reach its destination
• Delay in accessing a network
• Time taken by OS communication services
 Bandwidth of a network
• Total amount of information that can be transmitted over a network at a given time
 Jitter
• Variation in the time taken to deliver a series of messages
2/5/2023 21
Fundamental Models …
 Interaction models...
 Computer clocks and timing events
 Two processes reading their clocks at the same time could read
different time values
 Computer clocks drift from perfect time
 Drift rates could be different
 Clock drift rate
 Rate at which a computer clock deviates from a perfect reference clock
 Correcting time on computer clocks
 Use radio receivers to get time readings from GPS
 1 microsecond accuracy
 GPS receivers do not work inside buildings + expensive
2/5/2023 22
Fundamental Models …
 Interaction models...
 Two variants of interaction model
 With and without strong assumption of time
 1. Synchronous DS
 The following bounds are defined
 Time to execute each step of a process has known lower and upper
bound
 Each message transmitted over a channel is received within a known
bounded time
 Each process has a local clock whose drift rate from real time has a
known bound
 Difficult to arrive at realistic values and provide guarantee
 If no guarantee, any design will be unreliable
 Example
 Timeout to detect the failure of a process
2/5/2023 23
Fundamental Models …
 Interaction models...
 2. Asynchronous DS
 No bounds on
 Process execution time
 Message transmission delays
 Clock drift rates
 Some design problems can be solved with these assumptions
 E.g., web cannot always provide a particular response time, a browser is
designed to allow users to do other things while waiting
 Any solution that is valid for an asynchronous DS is also valid for a
synchronous DS
2/5/2023 24
Fundamental Models …
 Interaction models...
 Event ordering
 Event at one process occurred before, after, or concurrently with another event
at another process
 Execution of a system can be described in terms of events and their ordering
 Example: email message
• independent delays in delivery
 Logical time
 Provides an ordering among the events at processes running in different computers
in DS
 Example: Email ordering for X and Y
• X sends ml before Y receives ml; Y sends m2 before X receives m2
• Y receives ml before sending m2
 Assign a number to each event corresponding to its logical ordering
2/5/2023 25
Fundamental Models …
 Failure model
 Defines the ways in which failure may occur in order to provide
an understanding of the effects of failures
 Failure
• Processes and communication channels may depart from what is
considered to be correct or desirable behavior
 Taxonomy
 Omission failures
 Arbitrary failures
 Timing failures
 Masking failure
2/5/2023 26
Fundamental Models …
 Failure model …
 Omission failures
 Refer to cases when a process or communication channel fails to perform
actions that it is supposed to do
 Process omission failures
 Mainly caused by a crash
 Design of service that can survive the presence of faults can be simplified if
it can be assumed that the services on which they depend crash cleanly
 Detection: failure to respond
 Timeout
 Fail-stop process crash
 Other processes can certainly detect that the process has crashed
2/5/2023 27
Fundamental Models …
 Failure model …
 Omission failures …
 Communication omission failures
 A message inserted in an outgoing message buffer never arrives at the other end's
incoming message buffer
 Dropping messages
 Caused by
 Lack of buffer space at the receiver or intervening gateway
 Network transmission error, detected by a checksum
 Send omission failure
 Receive omission failure
 Channel omission failure
2/5/2023 28
Fundamental Models …
 Failure model …
 Arbitrary (Byzantine) failures
 Worst possible failure — any type of error may occur
• E.g., a process may set or return wrong values
 Can’t be detected by seeing whether the process responds to
invocations
• Processes may arbitrarily omit intended processing steps
 Communication channels can suffer from arbitrary failures
 Examples
 Message contents could get corrupted
 Non-existent messages may be delivered
 Duplicated real messages
 Rare b/c they are recognized by the communication software
2/5/2023 29
Fundamental Models …
 Failure model …
 Timing failure
 Applicable in synchronous DS
 Limits are set on execution time, message delivery time and clock drift
rate
 Timing is relevant to multimedia computers with audio and video
channels
2/5/2023 30
Class of failure Affects Description
Clock Process Process's local clock exceeds the bounds on its rate of
drift from real time.
Performance Process Process exceeds the bounds on the interval between
two steps.
Performance Channel A message's transmission takes longer than the stated
bound.
Fundamental Models …
 Failure model …
 Masking failures
 Construct reliable services from components that exhibit failures
• Knowledge of the failure characteristics of a component
 Can be achieved by
• Hide the failure
• Convert the failure to a more acceptable type of failure
 Example
• Checksums
 Converts an arbitrary failure into an omission failure
 Request for re-transmission of omission failure
• Replication
2/5/2023 31
Fundamental Models …
 Failure model …
 Reliable communication
 Defined in terms of
 Validity
• Any message in the outgoing message buffer is eventually delivered to the incoming
message buffer
 Integrity
• The message received is identical to one sent, and no messages are delivered twice
 Threats to integrity
 Protocol that retransmits messages but doesn't reject a message that arrives
twice
 Malicious users that may inject spurious messages, replay old messages, or
tamper with messages
2/5/2023 32
Fundamental Models …
 Security model
 The security of a DS can be achieved by securing the processes and the
channels used for their interactions and by protecting the objects that they
encapsulate against unauthorized access
 Protecting objects
• Objects are intended to be used in different ways by different users
Access rights
 Securing processes and their interaction
• Processes interact by sending messages
• Why are processes and their interactions exposed to attacks?
 Network and communication services used are open
 Process interfaces are exposed
2/5/2023 33
Fundamental Models …
 Security model …
Securing processes and their interaction …
 Enemy (adversary)
• Capable of sending any message to any process and reading or copying
any message sent between a pair of processes
 Threats to processes
• A process that is designed to handle incoming requests may receive a
message from any other process in the DS, and it cannot necessarily
determine the identity of the sender
 Threats to communication channels
• Copy, alter, or inject messages as they travel across the network and its
intervening gateways
2/5/2023 34
Fundamental Models …
 Security model …
 Securing processes and their interaction …
 Defeating security threats
• Shared secrets
 Message exchanged includes information that proves the sender's
knowledge of the shared secret
• Cryptography
 Keeps messages secure using encryption techniques
• Authentication
 Uses shared secrets and encryption to authenticate messages
• Secure channel
 Uses encryption and authentication to connect a pair of processes
2/5/2023 35

Mais conteúdo relacionado

Semelhante a chapter 5.pptx

Micro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part IMicro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part IAngelo Corsaro
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system Sarvesh Meena
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxDrAdeelAkram2
 
Models of Distributed System
Models of Distributed SystemModels of Distributed System
Models of Distributed SystemAshish KC
 
Chapter 1 -_characterization_of_distributed_systems
Chapter 1 -_characterization_of_distributed_systemsChapter 1 -_characterization_of_distributed_systems
Chapter 1 -_characterization_of_distributed_systemsFrancelyno Murela
 
Chapter 1-Introduction.ppt
Chapter 1-Introduction.pptChapter 1-Introduction.ppt
Chapter 1-Introduction.pptbalewayalew
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Engr. Md. Jamal Uddin Rayhan
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architectureWen Zhu
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxLeahRachael
 
Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing Hitesh Kumar Markam
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1thilaganga
 
- Introduction - Distributed - System -
- Introduction - Distributed - System  -- Introduction - Distributed - System  -
- Introduction - Distributed - System -ssuser7c150a
 
01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems01 - Introduction to Distributed Systems
01 - Introduction to Distributed SystemsDilum Bandara
 
Cloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and ApplicationsCloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and ApplicationsEmiliano Reynares
 

Semelhante a chapter 5.pptx (20)

Micro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part IMicro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part I
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
 
Distributed Systems.pptx
Distributed Systems.pptxDistributed Systems.pptx
Distributed Systems.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptx
 
Models of Distributed System
Models of Distributed SystemModels of Distributed System
Models of Distributed System
 
Networks
NetworksNetworks
Networks
 
Chapter 1 -_characterization_of_distributed_systems
Chapter 1 -_characterization_of_distributed_systemsChapter 1 -_characterization_of_distributed_systems
Chapter 1 -_characterization_of_distributed_systems
 
Chapter 1-Introduction.ppt
Chapter 1-Introduction.pptChapter 1-Introduction.ppt
Chapter 1-Introduction.ppt
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architecture
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
cloud
cloudcloud
cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing Concepts of Distributed Computing & Cloud Computing
Concepts of Distributed Computing & Cloud Computing
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
slides15-1.pdf
slides15-1.pdfslides15-1.pdf
slides15-1.pdf
 
- Introduction - Distributed - System -
- Introduction - Distributed - System  -- Introduction - Distributed - System  -
- Introduction - Distributed - System -
 
01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems
 
Cloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and ApplicationsCloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and Applications
 

Último

(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶delhimunirka444
 
RAK Call Girls Service # 971559085003 # Call Girl Service In RAK
RAK Call Girls Service # 971559085003 # Call Girl Service In RAKRAK Call Girls Service # 971559085003 # Call Girl Service In RAK
RAK Call Girls Service # 971559085003 # Call Girl Service In RAKedwardsara83
 
Admirable # 00971529501107 # Call Girls at dubai by Dubai Call Girl
Admirable # 00971529501107 # Call Girls at dubai by Dubai Call GirlAdmirable # 00971529501107 # Call Girls at dubai by Dubai Call Girl
Admirable # 00971529501107 # Call Girls at dubai by Dubai Call Girlhome
 
Lucknow 💋 Call Girls in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 892311...
Lucknow 💋 Call Girls in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 892311...Lucknow 💋 Call Girls in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 892311...
Lucknow 💋 Call Girls in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 892311...anilsa9823
 
exhuma plot and synopsis from the exhuma movie.pptx
exhuma plot and synopsis from the exhuma movie.pptxexhuma plot and synopsis from the exhuma movie.pptx
exhuma plot and synopsis from the exhuma movie.pptxKurikulumPenilaian
 
FULL ENJOY - 8264348440 Call Girls in Rohini Sector 22 | Delhi
FULL ENJOY - 8264348440 Call Girls in Rohini Sector 22 | DelhiFULL ENJOY - 8264348440 Call Girls in Rohini Sector 22 | Delhi
FULL ENJOY - 8264348440 Call Girls in Rohini Sector 22 | Delhisoniya singh
 
Jeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel ThrowingJeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel ThrowingJeremy Casson
 
The First Date by Daniel Johnson (Inspired By True Events)
The First Date by Daniel Johnson (Inspired By True Events)The First Date by Daniel Johnson (Inspired By True Events)
The First Date by Daniel Johnson (Inspired By True Events)thephillipta
 
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112Nitya salvi
 
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Servicesonnydelhi1992
 
Charbagh ! (Call Girls) in Lucknow Finest Escorts Service 🥗 8923113531 🏊 Avai...
Charbagh ! (Call Girls) in Lucknow Finest Escorts Service 🥗 8923113531 🏊 Avai...Charbagh ! (Call Girls) in Lucknow Finest Escorts Service 🥗 8923113531 🏊 Avai...
Charbagh ! (Call Girls) in Lucknow Finest Escorts Service 🥗 8923113531 🏊 Avai...gurkirankumar98700
 
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...anilsa9823
 
Lucknow 💋 best call girls in Lucknow (Adult Only) 8923113531 Escort Service ...
Lucknow 💋 best call girls in Lucknow  (Adult Only) 8923113531 Escort Service ...Lucknow 💋 best call girls in Lucknow  (Adult Only) 8923113531 Escort Service ...
Lucknow 💋 best call girls in Lucknow (Adult Only) 8923113531 Escort Service ...anilsa9823
 
Bobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdfBobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdfMARIBEL442158
 
Lucknow 💋 Call Girls Service Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Call Girls Service Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Call Girls Service Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Call Girls Service Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...anilsa9823
 
Lucknow 💋 Escorts Service Lucknow Phone No 8923113531 Elite Escort Service Av...
Lucknow 💋 Escorts Service Lucknow Phone No 8923113531 Elite Escort Service Av...Lucknow 💋 Escorts Service Lucknow Phone No 8923113531 Elite Escort Service Av...
Lucknow 💋 Escorts Service Lucknow Phone No 8923113531 Elite Escort Service Av...anilsa9823
 
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...akbard9823
 
Editorial sephora annual report design project
Editorial sephora annual report design projectEditorial sephora annual report design project
Editorial sephora annual report design projecttbatkhuu1
 
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Servicesonnydelhi1992
 
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...hanshkumar9870
 

Último (20)

(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
 
RAK Call Girls Service # 971559085003 # Call Girl Service In RAK
RAK Call Girls Service # 971559085003 # Call Girl Service In RAKRAK Call Girls Service # 971559085003 # Call Girl Service In RAK
RAK Call Girls Service # 971559085003 # Call Girl Service In RAK
 
Admirable # 00971529501107 # Call Girls at dubai by Dubai Call Girl
Admirable # 00971529501107 # Call Girls at dubai by Dubai Call GirlAdmirable # 00971529501107 # Call Girls at dubai by Dubai Call Girl
Admirable # 00971529501107 # Call Girls at dubai by Dubai Call Girl
 
Lucknow 💋 Call Girls in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 892311...
Lucknow 💋 Call Girls in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 892311...Lucknow 💋 Call Girls in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 892311...
Lucknow 💋 Call Girls in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 892311...
 
exhuma plot and synopsis from the exhuma movie.pptx
exhuma plot and synopsis from the exhuma movie.pptxexhuma plot and synopsis from the exhuma movie.pptx
exhuma plot and synopsis from the exhuma movie.pptx
 
FULL ENJOY - 8264348440 Call Girls in Rohini Sector 22 | Delhi
FULL ENJOY - 8264348440 Call Girls in Rohini Sector 22 | DelhiFULL ENJOY - 8264348440 Call Girls in Rohini Sector 22 | Delhi
FULL ENJOY - 8264348440 Call Girls in Rohini Sector 22 | Delhi
 
Jeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel ThrowingJeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel Throwing
 
The First Date by Daniel Johnson (Inspired By True Events)
The First Date by Daniel Johnson (Inspired By True Events)The First Date by Daniel Johnson (Inspired By True Events)
The First Date by Daniel Johnson (Inspired By True Events)
 
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
 
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
 
Charbagh ! (Call Girls) in Lucknow Finest Escorts Service 🥗 8923113531 🏊 Avai...
Charbagh ! (Call Girls) in Lucknow Finest Escorts Service 🥗 8923113531 🏊 Avai...Charbagh ! (Call Girls) in Lucknow Finest Escorts Service 🥗 8923113531 🏊 Avai...
Charbagh ! (Call Girls) in Lucknow Finest Escorts Service 🥗 8923113531 🏊 Avai...
 
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...
 
Lucknow 💋 best call girls in Lucknow (Adult Only) 8923113531 Escort Service ...
Lucknow 💋 best call girls in Lucknow  (Adult Only) 8923113531 Escort Service ...Lucknow 💋 best call girls in Lucknow  (Adult Only) 8923113531 Escort Service ...
Lucknow 💋 best call girls in Lucknow (Adult Only) 8923113531 Escort Service ...
 
Bobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdfBobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdf
 
Lucknow 💋 Call Girls Service Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Call Girls Service Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Call Girls Service Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Call Girls Service Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Lucknow 💋 Escorts Service Lucknow Phone No 8923113531 Elite Escort Service Av...
Lucknow 💋 Escorts Service Lucknow Phone No 8923113531 Elite Escort Service Av...Lucknow 💋 Escorts Service Lucknow Phone No 8923113531 Elite Escort Service Av...
Lucknow 💋 Escorts Service Lucknow Phone No 8923113531 Elite Escort Service Av...
 
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...
 
Editorial sephora annual report design project
Editorial sephora annual report design projectEditorial sephora annual report design project
Editorial sephora annual report design project
 
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
 
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...
 

chapter 5.pptx

  • 1. Introduction to Distributed Systems Chapter Five Models of Distributed Systems By Mezgebu A.
  • 2. Topics Models of Distributed System Physical model Architectural model Fundamental model Interaction, failure, security 2/5/2023 2
  • 3. Distributed System Models  Difficulties and threats for DS  Widely varying mode of use  Wide range of system environment  Internal problems  External threats  Properties and design issues of DS can be captured using descriptive models  DS models provide an abstract, simplified but consistent description of a relevant aspect of DS design.  Physical model  Architectural model  Fundamental model 2/5/2023 3
  • 4. Physical Models  Representation of the underlying hardware elements • “A system in which (HW and SW) components located at networked computers communicate and coordinate their action only by message passing”. Minimal physical model • Extensible set of computer nodes interconnected by a computer network for the required passing of messages.  Early DS • 10 to 100 nodes interconnected by a LAN • Small range of service • Largely homogeneous systems Openness was not a primary concern • Effort was to improve quality of service 2/5/2023 4
  • 5. Physical Models …  Internet-scale DS • Drive was growth of the internet • Physical infrastructure: network of networks • High heterogeneity • Emphasis on  Open standards  Middleware technologies  Web services • Characteristics of nodes • Relatively static • Discrete • Autonomous 2/5/2023 5
  • 6. Physical Models …  Contemporary DS  Emergence of mobile computing • Need for added capability such as service discovery and support for spontaneous interoperation  Emergence of ubiquitous computing • Move from discrete nodes to architectures where computers are embedded • E.g., smart homes  Emergence of cloud computing • Move from autonomous nodes performing a given role to pools of nodes that together provide a given service • E.g., google search Increase in heterogeneity 2/5/2023 6
  • 7. Physical Models …  Challenges 2/5/2023 7
  • 8. Architectural Models  Architecture  Structure specified in terms of components and their interrelationships  Goal • Meet the present and likely future demands  Concerns • Reliability • Manageability • Adaptability • Cost-effectiveness  Architectural design provide a consistent frame of reference for the design 2/5/2023 8
  • 9. Architectural Models …  Architectural elements  Questions to understand fundamental building blocks • What are the entities that are communicating in the DS? • How do they communicate? or more specifically, what communication paradigm is used? • What (potentially changing) roles and responsibilities do they have in the overall architecture? • How are they mapped in to the physical distributed infrastructure (what is their placement) 2/5/2023 9
  • 10. Architectural Models …  Communicating entities  System perspective  Processes  Caveats  In systems that do not support process abstraction, entities are nodes (e.g., sensor network)  Threads (when supplementing processes)  Problem perspective  Objects  Components  Specify interface + assumption  Contractual approach 2/5/2023 10
  • 11. Architectural Models …  Communicating entities …  Problem perspective …  Web services Encapsulate behavior and access through interfaces Integrated into the WWW Partially defined by web-based technologies Decoupled complete services that can be combined to achieve value- added services Cross organizational boundaries 2/5/2023 11
  • 12. Architectural Models …  Communication paradigm  Inter-process communication  Low level support for communication between processes  Message-passing primitives  Socket programming (direct access to the APIs offered by Internet Protocols)  Multicast communication  Remote invocation • Covers a range of techniques based on a two-way exchange • Request-reply protocol  Involve pair wise exchange of messages from client to server and back  Primitive  Used in embedded systems when performance is paramount  E.g., used in HTTP protocol 2/5/2023 12
  • 13. Architectural Models …  Communication paradigm …  Remote invocation …  Remote procedure calls  Procedures in processes on remote computers can be called as if they are procedures in the local address space  Hides distribution, encoding, and decoding of parameters and results, passing of messages, ...  Supports client server applications  Offer access and location transparency  Remote method invocation  Used with distributed objects  Calling object invokes a method in a remote object  Hides underlying details 2/5/2023 13
  • 14. Architectural Models …  Communication paradigm …  Remote invocation …  Common characteristics  Communication represents a two-way relationship  Receivers are generally aware of the identity of senders  Mostly, both parties must exist at the same time  Indirect communication  Allow strong degree of decoupling between senders and receivers o Space decoupled o Time decoupled 2/5/2023 14
  • 15. Architectural Models …  Communication paradigm …  Indirect communication  Group communication  One-to-many communication  Relies on the abstraction of a group => group identifier  Recipients elect to receive messages sent to a group by joining the group  Senders send messages to the group via the group identifier  Senders do not need to know the recipients of the message  Publish-subscribe systems (Distributed event-based systems)  Message queues  Offer point to point service  Consumer processes could be notified of the arrival of a new message in the queue 2/5/2023 15
  • 16. Architectural Models …  Communication paradigm …  Indirect communication  Tuple spaces  Write, read, or remove structured data (tuples) to/from persistent tuple space  Also called generative communication  Distributed shared memory  Provide an abstraction for sharing data between processes that do not share physical memory 2/5/2023 16
  • 17. Architectural Models …  Role and responsibilities  Architectural styles based on roles  Client-server  Direct and simple  Limitation  Scalability  Placement of services  Suggested solutions  Placement strategies  Peer-to-peer  All processes involved in a task play similar roles  No distinction between client and server processes/computers 2/5/2023 17
  • 18. Architectural Models …  Placement strategies  Placement strategies  Mapping of services to multiple servers  E.g., web, DNS  Caching At client or proxy  Mobile code E.g., Applet Security Mobile agent  Program travels from one computer to another in a network carrying out a task on someone's behalf  Security 2/5/2023 18
  • 19. Fundamental Models  Models based on fundamental properties  Allows to be specific about their characteristics and failures and security risks they might exhibit  Contains only essential ingredients that helps to understand some aspects of a system's behavior  Purpose  To make explicit all the relevant assumptions about the system we are modelling  To make generalization concerning what is possible and impossible 2/5/2023 19
  • 20. Fundamental Models …  Aspects of DS captured in the fundamental models  Interaction • Processes interact by passing messages • Communication and coordination • Limited level of accuracy with which independent processes can be coordinated Delays Difficulty to maintain the same notion of time across all machines  Failure • Define and classify faults • Analyze potential effects and design systems that are able to tolerate faults  Security • Define and classify attacks • Provide basis for the analysis of threats to a system and design of systems that resist them 2/5/2023 20
  • 21. Fundamental Models …  Interaction model  Factors affecting interaction of processes in a DS  Communication performance  Difficulty to maintain a single global notion of time  Performance of communication channels  Performance characteristics  Latency  Time between a start of a message's transmission from one process and beginning of its receipt by another • Time for the first of transmitted string bits to reach its destination • Delay in accessing a network • Time taken by OS communication services  Bandwidth of a network • Total amount of information that can be transmitted over a network at a given time  Jitter • Variation in the time taken to deliver a series of messages 2/5/2023 21
  • 22. Fundamental Models …  Interaction models...  Computer clocks and timing events  Two processes reading their clocks at the same time could read different time values  Computer clocks drift from perfect time  Drift rates could be different  Clock drift rate  Rate at which a computer clock deviates from a perfect reference clock  Correcting time on computer clocks  Use radio receivers to get time readings from GPS  1 microsecond accuracy  GPS receivers do not work inside buildings + expensive 2/5/2023 22
  • 23. Fundamental Models …  Interaction models...  Two variants of interaction model  With and without strong assumption of time  1. Synchronous DS  The following bounds are defined  Time to execute each step of a process has known lower and upper bound  Each message transmitted over a channel is received within a known bounded time  Each process has a local clock whose drift rate from real time has a known bound  Difficult to arrive at realistic values and provide guarantee  If no guarantee, any design will be unreliable  Example  Timeout to detect the failure of a process 2/5/2023 23
  • 24. Fundamental Models …  Interaction models...  2. Asynchronous DS  No bounds on  Process execution time  Message transmission delays  Clock drift rates  Some design problems can be solved with these assumptions  E.g., web cannot always provide a particular response time, a browser is designed to allow users to do other things while waiting  Any solution that is valid for an asynchronous DS is also valid for a synchronous DS 2/5/2023 24
  • 25. Fundamental Models …  Interaction models...  Event ordering  Event at one process occurred before, after, or concurrently with another event at another process  Execution of a system can be described in terms of events and their ordering  Example: email message • independent delays in delivery  Logical time  Provides an ordering among the events at processes running in different computers in DS  Example: Email ordering for X and Y • X sends ml before Y receives ml; Y sends m2 before X receives m2 • Y receives ml before sending m2  Assign a number to each event corresponding to its logical ordering 2/5/2023 25
  • 26. Fundamental Models …  Failure model  Defines the ways in which failure may occur in order to provide an understanding of the effects of failures  Failure • Processes and communication channels may depart from what is considered to be correct or desirable behavior  Taxonomy  Omission failures  Arbitrary failures  Timing failures  Masking failure 2/5/2023 26
  • 27. Fundamental Models …  Failure model …  Omission failures  Refer to cases when a process or communication channel fails to perform actions that it is supposed to do  Process omission failures  Mainly caused by a crash  Design of service that can survive the presence of faults can be simplified if it can be assumed that the services on which they depend crash cleanly  Detection: failure to respond  Timeout  Fail-stop process crash  Other processes can certainly detect that the process has crashed 2/5/2023 27
  • 28. Fundamental Models …  Failure model …  Omission failures …  Communication omission failures  A message inserted in an outgoing message buffer never arrives at the other end's incoming message buffer  Dropping messages  Caused by  Lack of buffer space at the receiver or intervening gateway  Network transmission error, detected by a checksum  Send omission failure  Receive omission failure  Channel omission failure 2/5/2023 28
  • 29. Fundamental Models …  Failure model …  Arbitrary (Byzantine) failures  Worst possible failure — any type of error may occur • E.g., a process may set or return wrong values  Can’t be detected by seeing whether the process responds to invocations • Processes may arbitrarily omit intended processing steps  Communication channels can suffer from arbitrary failures  Examples  Message contents could get corrupted  Non-existent messages may be delivered  Duplicated real messages  Rare b/c they are recognized by the communication software 2/5/2023 29
  • 30. Fundamental Models …  Failure model …  Timing failure  Applicable in synchronous DS  Limits are set on execution time, message delivery time and clock drift rate  Timing is relevant to multimedia computers with audio and video channels 2/5/2023 30 Class of failure Affects Description Clock Process Process's local clock exceeds the bounds on its rate of drift from real time. Performance Process Process exceeds the bounds on the interval between two steps. Performance Channel A message's transmission takes longer than the stated bound.
  • 31. Fundamental Models …  Failure model …  Masking failures  Construct reliable services from components that exhibit failures • Knowledge of the failure characteristics of a component  Can be achieved by • Hide the failure • Convert the failure to a more acceptable type of failure  Example • Checksums  Converts an arbitrary failure into an omission failure  Request for re-transmission of omission failure • Replication 2/5/2023 31
  • 32. Fundamental Models …  Failure model …  Reliable communication  Defined in terms of  Validity • Any message in the outgoing message buffer is eventually delivered to the incoming message buffer  Integrity • The message received is identical to one sent, and no messages are delivered twice  Threats to integrity  Protocol that retransmits messages but doesn't reject a message that arrives twice  Malicious users that may inject spurious messages, replay old messages, or tamper with messages 2/5/2023 32
  • 33. Fundamental Models …  Security model  The security of a DS can be achieved by securing the processes and the channels used for their interactions and by protecting the objects that they encapsulate against unauthorized access  Protecting objects • Objects are intended to be used in different ways by different users Access rights  Securing processes and their interaction • Processes interact by sending messages • Why are processes and their interactions exposed to attacks?  Network and communication services used are open  Process interfaces are exposed 2/5/2023 33
  • 34. Fundamental Models …  Security model … Securing processes and their interaction …  Enemy (adversary) • Capable of sending any message to any process and reading or copying any message sent between a pair of processes  Threats to processes • A process that is designed to handle incoming requests may receive a message from any other process in the DS, and it cannot necessarily determine the identity of the sender  Threats to communication channels • Copy, alter, or inject messages as they travel across the network and its intervening gateways 2/5/2023 34
  • 35. Fundamental Models …  Security model …  Securing processes and their interaction …  Defeating security threats • Shared secrets  Message exchanged includes information that proves the sender's knowledge of the shared secret • Cryptography  Keeps messages secure using encryption techniques • Authentication  Uses shared secrets and encryption to authenticate messages • Secure channel  Uses encryption and authentication to connect a pair of processes 2/5/2023 35