Module 1
Module 1
UNIT I 8L
Centralized systems are systems that use client/server architecture where one or more client nodes
are directly connected to a central server.
1.Resource sharing
2.Openess
3.Concurrency
4.Scalability
5.Fault Tolerance
6.Transparency
Resource sharing
Resource:
hardware - disks and printers
software - files, windows, and data objects
Openness is concerned with extensions and improvements of distributed systems. The distributed system must be open in
terms of Hardware and Softwares. In order to make a distributed system open,
Mostly we scale the distributed system by adding more computers in the network.
Fault Tolerance
In a distributed system hardware, software, network anything can fail. The system must be designed in such a way
that it is available all the time even after something has failed.
• recovery
• redundancy
Transparency
Transparency ensures that the distributes system should be perceived as the single entity by the users or
the application programmers rather than the collection of autonomous systems, which is cooperating.
The user should be unaware of where the services are located and the transferring from a local machine
to a remote one should be transparent.
Access Transparency
Enables local and remote information objects to be accessed using identical operations.
• Example: File system operations in NFS.
• Example: Navigation in the Web.
• Example: SQL Queries
Location Transparency
Enables information objects to be accessed without knowledge of their location.
• Example: File system operations in NFS
• Example: Pages in the Web
• Example: Tables in distributed databases
Concurrency Transparency
Enables several processes to operate concurrently using shared information objects without
interference between them.
• Example: NFS
• Example: Automatic teller machine network
• Example: Database management system
Failure Transparency
• Enables the concealment of faults
• Allows users and applications to complete their tasks despite
the failure of other
components.
• Example: Database Management System
Migration Transparency
Allows the movement of information objects within a system
without affecting the operations of
users or application programs
• Example: NFS
• Example: Web Pages
Performance Transparency
Allows the system to be reconfigured to improve performance
as loads vary.
• High performance
• Reliability
• Scalability
• Consistency
• Security
• Identify the real time examples of distributing systems?
• Identify the real time examples of centralised systems?
• Centralised vs decentralised vs distributed
• Uni processorsystem
• Multiprocessor
• Multi programming
• Instruction stream
• datastream
Hardware concepts
• Even though all the distributed systems consists of multiple CPU’s
there are several different ways the hardware can be organised,
especially in terms of how they are interconnected and how they
are communicated.
1) SISD (Single Instruction Single Data Stream)
A SISD computing system is a uniprocessor machine that is capable of executing a single instruction
operating on a single data stream.
SIMD (Single Instruction Multiple Data Stream)
A SIMD system is a multiprocessor machine, capable of executing the same instruction on all the CPUs but
operating on the different data stream.
MISD (Multiple Instruction Single Data stream)
The operating system is the interaction between user and the hardware.
In distributed OS, a common set of services is shared among multiple processors in such a way that they are meant to
execute a distributed application effectively and also provide services to separate independent computers connected in
a network
Network Operating System runs on a server and gives the server the capability to manage data, users,
groups, security, applications, and other networking functions.
It follows the loosely coupled architecture pattern which allow user to use services
provided by the local machine itself as shown in fig below.
Middle ware operating system:
It has a common set of services is provided for the local applications and independent set of services for the
remote applications.
It support heterogeneity that is it supports multiple languages and operating system where user gets
freedom to write the application using the any of the supported language under any platform.
It provide the services such as locating the objects or interfaces by their names, finding the location of objects,
maintaining the quality of services, handling the protocol information, synchronization, concurrency and
security of the objects etc.
Middleware in the context of
distributed applications is
software that provides services
beyond those provided by the
operating system to enable the
various components of a
distributed system to
communicate and manage
data. Middleware supports and
simplifies complex
distributed applications.
Distributed Computing system models
• Minicomputer model
• Workstation model
• Workstation - server model
• Processor - pool model
• Hybrid model
.Minicomputer Model
• The minicomputer model is a simple extension of the centralized
time-sharing system.
• A distributed computing system based on this model consists of a few
minicomputers interconnected by a communication network were each
minicomputer usually has multiple users simultaneously logged on to
it.
• Several interactive terminals are connected to each
minicomputer.Each user logged on to one specific minicomputer has
remote access to other minicomputers.
• The network allows a user to access remote resources that are
available on some machine other than the one on to which the user is
currently logged.
Types of minicomputer
The types of minicomputer are- tablet PC, Desktop minicomputers, cell phones, notebooks,
high-end mP3 players, etc.
The minicomputer model may be used when resource sharing (such as sharing of
information databases of different types, with each type of database located on a
different machine) with remote users is desired.
How does Mini Computer model look like?
WORKSTATION MODEL
• A distributed computing system based on the workstation model
consists of several workstations interconnected by a communication
network.
• An organization may have several workstations located throughout a
building or campus, each workstation equipped with its own disk
and serving as a single-user computer.
•In such an environment,at any one
time a significant proportion of the
workstations are idle which results
in the waste of large amounts of
CPU time.
WORKSTATION – SERVER MODEL
• One or more of the minicomputers are used for implementing the file system.
In this model, a user logs onto a workstation
called his or her home workstation. Normal
computation activities required by the user's
processes are performed at the user's home
workstation, but requests for services provided by
special servers (such as a file server or a database
server) are sent to a server providing that type of
service that performs the user's requested activity
and returns the result of request processing to the
user's workstation. Therefore, in this model, the
user's processes need not migrated to the server
machines for getting the work done by those
machines.
PROCESSOR – POOL MODEL
Jitter
• Variation in the time taken to deliver a series of messages.
Fault Model
• The failure model defines ways in which failure may occur in order to
provide an understanding of the effects of failure.
Networking tasks often require more than one protocol to perform a task, such as file transfer.
OSI (Open System Interconnection)
1. Physical Layer (Layer 1) :
The lowest layer of the OSI reference model is the physical layer.
this layer will get the signal received and convert it into 0s and 1s and send them
to the Data Link layer, which will put the frame back together.
Physical addressing: After creating frames, Data link layer adds physical addresses (MAC
address) of sender and/or receiver in the header of each frame.
Error control: Data link layer provides the mechanism of error control in which it detects and
retransmits damaged or lost frames.
Flow Control: The data rate must be constant on both sides else the data may get corrupted
thus , flow control coordinates that amount of data that can be sent before receiving
acknowledgement.
Access control: When a single communication channel is shared by multiple devices, MAC
sub-layer of data link layer helps to determine which device has control over the channel at a
given time.
3. Network Layer (Layer 3) :
Network layer works for the transmission of data from one host to the other located in different
networks. It also takes care of packet routing i.e. selection of the shortest path to transmit the packet,
from the number of routes available. The sender & receiver’s IP address are placed in the header by the
network layer.
Routing: The network layer protocols determine which route is suitable from source to destination. This
function of network layer is known as routing.
Logical Addressing: In order to identify each device on internetwork uniquely, network layer defines an
addressing scheme. The sender & receiver’s IP address are placed in the header by network layer. Such
an address distinguishes each device uniquely and universally.