SlideShare a Scribd company logo
1 of 9
Download to read offline
Distributed Computing Concepts for Artificial Intelligence
MODULE: IT 5306
Group Assignment

Distributed Semantic Search System (DSSS) - Project Report

Distributed Computing Concepts for Artificial Intelligence
Team Members
01. A.M. Tharindu B. Adhikari

MSCAI/12/04

02. I.P.V. Vithana Pathirage

MSCAI/12/09

03. Nimesh Tharuka Kaluarachchi

MSCAI/12/10

04. Pahan Sri Madusanka Rodrigo

MSCAI/12/15

Distributed Computing Concepts for Artificial Intelligence
Challenge (Identified problem)
Today there is a large explosion of cloud-based systems on internet. One representative is
our project, world‟s number one sharing software application, which enables users in cloud
systems to search for and download music, documents, images, play lists, software and videos.
One of the existing problems is how to manage secure access and bill the engaging parties.
For example: Any node (client 1) using XXXX system can search and find the requested file
(music, document), that exist at another client 2. Now user A can establish direct link for
downloading the requested file from user B, but what XXX does not offer is billing of
downloading a file, user 1 is not charged. Therefore, the challenge is to make cloud system,
where billing can be accomplished. In addition, while downloading the file, XXX does not offer
any confidentiality, protecting the content from eavesdropping. Therefore the second challenge
of the new cloud system will be to provide confidentiality (need for access control and
encryption mechanisms), only user 1 that paid for the downloaded file can be able to see its
contexts, nobody else, even if the file during the downloading process is eavesdropped

Client 02

Client 03

Client 01

Server 01

Server 02

Server 03

Distributed Computing Concepts for Artificial Intelligence
Detected Problems Description in System
1. Searching Information
Cloud networks as communication model connect together a large number of different
computers, pooling their resources. They provide an efficient way of storing and accessing large
amounts of data, as demonstrated by the popularity of music file sharing networks such as KaZaa
Proposed solution:
Our distributed systems will use middleware, specific dedicated nodes of the network
will play role as storage facilities for keeping index of content of each node (user) that are
sharing/selling general information.
2. High Availability




This system provides failure transparency.
Designated client would monitor the server liveness.
This system assumes that all servers have access to a highly available file system at the
back-end and do not replicate the repository.

Services such as sharing/ billing/selling must be available during the whole day, in order
to preserve the customers of any distributed selling. If one point of service is available, its failure
will be the death of the entire system. Therefore, some kind of mechanism must be provided in
order to ensure high availability.
Proposed solution:
Providing high availability can be achieved by data replication. Our distributed system
will have subsystem called “Replication Control”, which will expect dedicated node failures and
deal with it by making multiple copies of the data, ensuring that end user will not see any node
failures and will continue to use the system like nothing happened. Failure of one or more
dedicated nodes will be transparent to the end user. Initially we are considering using active
replication protocol. Type of database is Oracle, and the update will be made manually by the
„Replication control‟, not automatically by the database system.
The problem of interrupted downloading of information is solved by segmented
downloading. When the user will connect again, the downloading will proceed.

Distributed Computing Concepts for Artificial Intelligence
3. Reliability
 Upon a server crash, the client would notify all pending requests about the failure.
 Exception mechanism would be implemented to catch exceptional conditions.
 Client failures would be detected by the server and would not block server resources.
4. Concurrency and Consistency:
 Synchronization would be designed to ensure the safety.
 The users would not get mixed versions of documents.
5. Performance:
 The system design would exploit multi threading in order to enhance response time and
system throughput.
6. Caching and Coherency:
 Client caching for documents would be allowed to improve retrieval performance.
 Cache coherency mechanism would be employed.

7. Security
The distributed systems for sharing information raises the prospect of it being very easy
to publish information anonymously, for example, pirated music and video. networks can also
allow an user to download and use copyrighted material in a way that violates intellectual
property laws, and to share files in a manner that violates an organizations security policies. The
notion of authentication, authorization, ownership arises. In addition, there are other threats that
exist, such as viruses, worms, malicious programs, that spread very easily on file-sharing
distributed systems and can cause malfunctioning of end user system, when they download some
document.
Proposed Solution:
Our distributed system will provide authentication, meaning that the user who will
download the file, will be assured that he is downloading from the right person, and the user who
is giving the information, is assured that he allows copying of document to authenticated person.
Initially we are planning to use MAC.
In addition, encryption mechanism through authenticated channel will be used while the
document is transported over the network, therefore protection against eavesdropping is ensured.
Nobody else but the downloading person can be able to decrypt the document.

Distributed Computing Concepts for Artificial Intelligence
9. Management and Maintenance
Distributed Systems by definition are harder to maintain, since they are consisted of more
than one node. There is a need to do diagnose and locate problems very easily.

Proposed Solution:
Special kind of users, Administrators will be responsible for managing the distributed
systems. The subsystems, „Replication control‟ , and „Fail-safe control‟, will be responsible for
detecting failures, and reporting to the Administrators, the type of failure occurred and the
measures taken, the failures was fixed, or human interaction is required. For the administrators,
specific software module will be implemented.
10. Scalability
Architecture would be scales up to large number of users and documents.
By default one of the requirements of every distributed system is to be scalable. The
performance of the system should not drop, if the number of the users increases and
geographically the system will expand its distribution.
Proposed Solution:
The system design is scalable. As number of the users‟ increases, the subsystem
„Replication control‟ will take care for load-balancing, replication copies, caching if necessary,
pre-fetching.

6. Priority
Since there will be many users in the distributed system, the Internet will be loaded with
heavy traffic, not only by downloading, but also with control messaging. Should the distributed
system support priority among users, in case where one user makes a lot of transactions/spends a
lot of money, therefore downloading more documents, than the users that download only one
document? Does the user with higher downloads have higher priority then other users?

Distributed Computing Concepts for Artificial Intelligence
What did we do?

Distributed Computing Concepts for Artificial Intelligence
Distributed System and Services (Cloud Computing)

The programme in Distributed Systems and Services focuses on a broad range of applications
like cloud computing, mobile services, online social networks, peer-to-peer systems and Web
services. What is common to all of these applications is that information sources and control are
decentralised over the network and multiple data centres and their underlying systems become
distributed, reconfigurable and adaptive. All this makes the process of developing distributed
software systems significantly more complex than for centralised systems.
This programme will provide students with a system of knowledge both in formal foundations,
technological platforms and practical skills in implementing distributed software applications.
The programme will also provide an insight into current and future directions of the distributed
software development. After completion of the programme, students should not only understand
and be able to use large distributed systems, but they should be capable of designing and
constructing such systems and services deployed on such infrastructures.
The programme will offer five specialisations:
(1) Mobile Services,
(2) Cloud Operation,
(3) Cloud Infrastructures,
(4) Data Intensive Computing,
(5) Distributed Information Management.

Distributed Computing Concepts for Artificial Intelligence
Cloud Base Server Configuration

Distributed Computing Concepts for Artificial Intelligence

More Related Content

What's hot

A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
1crore projects
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Shruthi Suresh
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
Avinash K S
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Kamal Spring
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
prjpublications
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
Editor IJARCET
 

What's hot (18)

64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountability
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
Shared aythority ppt design [autosaved]
Shared  aythority  ppt design [autosaved]Shared  aythority  ppt design [autosaved]
Shared aythority ppt design [autosaved]
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 

Viewers also liked

Media A2 Evaluation - Short Film
Media A2 Evaluation - Short Film Media A2 Evaluation - Short Film
Media A2 Evaluation - Short Film
upsidedownwhat
 
Uh Sales career fair
Uh Sales career fairUh Sales career fair
Uh Sales career fair
Toan Tran
 
Tv news broadcast analysis
Tv news broadcast analysisTv news broadcast analysis
Tv news broadcast analysis
shannonandlauren
 
Analisis pembanding laporan keuangan
Analisis pembanding laporan keuanganAnalisis pembanding laporan keuangan
Analisis pembanding laporan keuangan
fitria mellysusanti
 
Ppt fitria melly analisis kebangkrutan
Ppt fitria melly analisis kebangkrutanPpt fitria melly analisis kebangkrutan
Ppt fitria melly analisis kebangkrutan
fitria mellysusanti
 
Orion Golf Black Hawk & Black Swan Putters
Orion Golf Black Hawk & Black Swan PuttersOrion Golf Black Hawk & Black Swan Putters
Orion Golf Black Hawk & Black Swan Putters
David Kargetta
 
Fitria melly s.alk bab 7 (break event point)
Fitria melly s.alk bab 7 (break event point)Fitria melly s.alk bab 7 (break event point)
Fitria melly s.alk bab 7 (break event point)
fitria mellysusanti
 
Distributed semantic search system (dsss)
Distributed semantic search system (dsss)  Distributed semantic search system (dsss)
Distributed semantic search system (dsss)
Isuru Vincent
 
Akl 2 masalah khusus laporan konsolidasi
Akl 2 masalah khusus laporan konsolidasiAkl 2 masalah khusus laporan konsolidasi
Akl 2 masalah khusus laporan konsolidasi
fitria mellysusanti
 

Viewers also liked (16)

ELEMENTOS MOTIVADORES EN EL SALÓN DE CLASES
ELEMENTOS MOTIVADORES EN EL SALÓN DE CLASES ELEMENTOS MOTIVADORES EN EL SALÓN DE CLASES
ELEMENTOS MOTIVADORES EN EL SALÓN DE CLASES
 
Media A2 Evaluation - Short Film
Media A2 Evaluation - Short Film Media A2 Evaluation - Short Film
Media A2 Evaluation - Short Film
 
Laser Know How Company Profile
Laser Know How Company ProfileLaser Know How Company Profile
Laser Know How Company Profile
 
Designs
DesignsDesigns
Designs
 
Uh Sales career fair
Uh Sales career fairUh Sales career fair
Uh Sales career fair
 
Laser Know How Company Profile
Laser Know How Company ProfileLaser Know How Company Profile
Laser Know How Company Profile
 
Tv news broadcast analysis
Tv news broadcast analysisTv news broadcast analysis
Tv news broadcast analysis
 
Analisis pembanding laporan keuangan
Analisis pembanding laporan keuanganAnalisis pembanding laporan keuangan
Analisis pembanding laporan keuangan
 
草案
草案草案
草案
 
Ppt fitria melly analisis kebangkrutan
Ppt fitria melly analisis kebangkrutanPpt fitria melly analisis kebangkrutan
Ppt fitria melly analisis kebangkrutan
 
Orion Golf Black Hawk & Black Swan Putters
Orion Golf Black Hawk & Black Swan PuttersOrion Golf Black Hawk & Black Swan Putters
Orion Golf Black Hawk & Black Swan Putters
 
1996年-2013年 清唱會戲單
1996年-2013年 清唱會戲單1996年-2013年 清唱會戲單
1996年-2013年 清唱會戲單
 
Fitria melly s.alk bab 7 (break event point)
Fitria melly s.alk bab 7 (break event point)Fitria melly s.alk bab 7 (break event point)
Fitria melly s.alk bab 7 (break event point)
 
Distributed semantic search system (dsss)
Distributed semantic search system (dsss)  Distributed semantic search system (dsss)
Distributed semantic search system (dsss)
 
Akl 2 masalah khusus laporan konsolidasi
Akl 2 masalah khusus laporan konsolidasiAkl 2 masalah khusus laporan konsolidasi
Akl 2 masalah khusus laporan konsolidasi
 
Presentation on stamp collecting
Presentation on stamp collectingPresentation on stamp collecting
Presentation on stamp collecting
 

Similar to Distributed Semantic Search System (DSSS)

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
Amber Wheeler
 

Similar to Distributed Semantic Search System (DSSS) (20)

Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Distributed system
Distributed systemDistributed system
Distributed system
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
DISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docxDISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docx
 
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT JaipurDistributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes
 
1.intro. to distributed system
1.intro. to distributed system1.intro. to distributed system
1.intro. to distributed system
 
Desktop support qua
Desktop support quaDesktop support qua
Desktop support qua
 
Desktop support qua
Desktop support quaDesktop support qua
Desktop support qua
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
Lecture03.pptx
Lecture03.pptxLecture03.pptx
Lecture03.pptx
 
Download
DownloadDownload
Download
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Distributed Semantic Search System (DSSS)

  • 1. Distributed Computing Concepts for Artificial Intelligence MODULE: IT 5306 Group Assignment Distributed Semantic Search System (DSSS) - Project Report Distributed Computing Concepts for Artificial Intelligence
  • 2. Team Members 01. A.M. Tharindu B. Adhikari MSCAI/12/04 02. I.P.V. Vithana Pathirage MSCAI/12/09 03. Nimesh Tharuka Kaluarachchi MSCAI/12/10 04. Pahan Sri Madusanka Rodrigo MSCAI/12/15 Distributed Computing Concepts for Artificial Intelligence
  • 3. Challenge (Identified problem) Today there is a large explosion of cloud-based systems on internet. One representative is our project, world‟s number one sharing software application, which enables users in cloud systems to search for and download music, documents, images, play lists, software and videos. One of the existing problems is how to manage secure access and bill the engaging parties. For example: Any node (client 1) using XXXX system can search and find the requested file (music, document), that exist at another client 2. Now user A can establish direct link for downloading the requested file from user B, but what XXX does not offer is billing of downloading a file, user 1 is not charged. Therefore, the challenge is to make cloud system, where billing can be accomplished. In addition, while downloading the file, XXX does not offer any confidentiality, protecting the content from eavesdropping. Therefore the second challenge of the new cloud system will be to provide confidentiality (need for access control and encryption mechanisms), only user 1 that paid for the downloaded file can be able to see its contexts, nobody else, even if the file during the downloading process is eavesdropped Client 02 Client 03 Client 01 Server 01 Server 02 Server 03 Distributed Computing Concepts for Artificial Intelligence
  • 4. Detected Problems Description in System 1. Searching Information Cloud networks as communication model connect together a large number of different computers, pooling their resources. They provide an efficient way of storing and accessing large amounts of data, as demonstrated by the popularity of music file sharing networks such as KaZaa Proposed solution: Our distributed systems will use middleware, specific dedicated nodes of the network will play role as storage facilities for keeping index of content of each node (user) that are sharing/selling general information. 2. High Availability    This system provides failure transparency. Designated client would monitor the server liveness. This system assumes that all servers have access to a highly available file system at the back-end and do not replicate the repository. Services such as sharing/ billing/selling must be available during the whole day, in order to preserve the customers of any distributed selling. If one point of service is available, its failure will be the death of the entire system. Therefore, some kind of mechanism must be provided in order to ensure high availability. Proposed solution: Providing high availability can be achieved by data replication. Our distributed system will have subsystem called “Replication Control”, which will expect dedicated node failures and deal with it by making multiple copies of the data, ensuring that end user will not see any node failures and will continue to use the system like nothing happened. Failure of one or more dedicated nodes will be transparent to the end user. Initially we are considering using active replication protocol. Type of database is Oracle, and the update will be made manually by the „Replication control‟, not automatically by the database system. The problem of interrupted downloading of information is solved by segmented downloading. When the user will connect again, the downloading will proceed. Distributed Computing Concepts for Artificial Intelligence
  • 5. 3. Reliability  Upon a server crash, the client would notify all pending requests about the failure.  Exception mechanism would be implemented to catch exceptional conditions.  Client failures would be detected by the server and would not block server resources. 4. Concurrency and Consistency:  Synchronization would be designed to ensure the safety.  The users would not get mixed versions of documents. 5. Performance:  The system design would exploit multi threading in order to enhance response time and system throughput. 6. Caching and Coherency:  Client caching for documents would be allowed to improve retrieval performance.  Cache coherency mechanism would be employed. 7. Security The distributed systems for sharing information raises the prospect of it being very easy to publish information anonymously, for example, pirated music and video. networks can also allow an user to download and use copyrighted material in a way that violates intellectual property laws, and to share files in a manner that violates an organizations security policies. The notion of authentication, authorization, ownership arises. In addition, there are other threats that exist, such as viruses, worms, malicious programs, that spread very easily on file-sharing distributed systems and can cause malfunctioning of end user system, when they download some document. Proposed Solution: Our distributed system will provide authentication, meaning that the user who will download the file, will be assured that he is downloading from the right person, and the user who is giving the information, is assured that he allows copying of document to authenticated person. Initially we are planning to use MAC. In addition, encryption mechanism through authenticated channel will be used while the document is transported over the network, therefore protection against eavesdropping is ensured. Nobody else but the downloading person can be able to decrypt the document. Distributed Computing Concepts for Artificial Intelligence
  • 6. 9. Management and Maintenance Distributed Systems by definition are harder to maintain, since they are consisted of more than one node. There is a need to do diagnose and locate problems very easily. Proposed Solution: Special kind of users, Administrators will be responsible for managing the distributed systems. The subsystems, „Replication control‟ , and „Fail-safe control‟, will be responsible for detecting failures, and reporting to the Administrators, the type of failure occurred and the measures taken, the failures was fixed, or human interaction is required. For the administrators, specific software module will be implemented. 10. Scalability Architecture would be scales up to large number of users and documents. By default one of the requirements of every distributed system is to be scalable. The performance of the system should not drop, if the number of the users increases and geographically the system will expand its distribution. Proposed Solution: The system design is scalable. As number of the users‟ increases, the subsystem „Replication control‟ will take care for load-balancing, replication copies, caching if necessary, pre-fetching. 6. Priority Since there will be many users in the distributed system, the Internet will be loaded with heavy traffic, not only by downloading, but also with control messaging. Should the distributed system support priority among users, in case where one user makes a lot of transactions/spends a lot of money, therefore downloading more documents, than the users that download only one document? Does the user with higher downloads have higher priority then other users? Distributed Computing Concepts for Artificial Intelligence
  • 7. What did we do? Distributed Computing Concepts for Artificial Intelligence
  • 8. Distributed System and Services (Cloud Computing) The programme in Distributed Systems and Services focuses on a broad range of applications like cloud computing, mobile services, online social networks, peer-to-peer systems and Web services. What is common to all of these applications is that information sources and control are decentralised over the network and multiple data centres and their underlying systems become distributed, reconfigurable and adaptive. All this makes the process of developing distributed software systems significantly more complex than for centralised systems. This programme will provide students with a system of knowledge both in formal foundations, technological platforms and practical skills in implementing distributed software applications. The programme will also provide an insight into current and future directions of the distributed software development. After completion of the programme, students should not only understand and be able to use large distributed systems, but they should be capable of designing and constructing such systems and services deployed on such infrastructures. The programme will offer five specialisations: (1) Mobile Services, (2) Cloud Operation, (3) Cloud Infrastructures, (4) Data Intensive Computing, (5) Distributed Information Management. Distributed Computing Concepts for Artificial Intelligence
  • 9. Cloud Base Server Configuration Distributed Computing Concepts for Artificial Intelligence