Distributed Systems Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is a significant drawback of single processor systems in terms of scalability?

  • They allow for seamless machine transitions.
  • They reduce maintenance requirements.
  • They can easily handle increased processing volume.
  • They struggle with increasing processing volume. (correct)

In 2-tier architecture, what is a key advantage regarding the database?

  • It operates on the same machine as the client.
  • It can easily be swapped for a different database. (correct)
  • It is closely integrated with the client.
  • It requires no network communication.

How do the layers of a 3-tier architecture differ from those in a 2-tier architecture?

  • In 3-tier architecture, the database is directly tied to the presentation layer.
  • 3-tier architecture does not separate logic and data layers.
  • In 3-tier architecture, the layers are tightly coupled.
  • 3-tier architecture allows for running each layer on a different machine. (correct)

What is one major consequence of tightly connected presentation and business logic layers?

<p>It leads to potential congestion on the network. (A)</p> Signup and view all the answers

What defines a distributed system?

<p>Components located at networked computers pass messages to coordinate actions. (C)</p> Signup and view all the answers

What primary principle underlies Net-Centric Computing?

<p>A distributed environment with coordinated components (B)</p> Signup and view all the answers

Which of the following is NOT a sub-specialty of Net-Centric Computing?

<p>Quantum computing (C)</p> Signup and view all the answers

Which network architecture facilitates the sharing of resources through client/server models?

<p>Computer network (D)</p> Signup and view all the answers

What was ARPANET's significance in network history?

<p>It was the first to implement TCP/IP and the progenitor of the Internet. (D)</p> Signup and view all the answers

How are connections in a computer network primarily made?

<p>Via physical wires or cables primarily (A)</p> Signup and view all the answers

What type of network utilizes message passing to create a coherent system for users?

<p>Distributed network (A)</p> Signup and view all the answers

Which field is directly associated with developments in Net-Centric Computing?

<p>Web standards and technologies (B)</p> Signup and view all the answers

Which of the following best describes the purpose of network security in Net-Centric Computing?

<p>To protect data integrity and user privacy (D)</p> Signup and view all the answers

What type of network connects two or more local-area networks over a large geographic distance?

<p>Wide-area network (WAN) (A)</p> Signup and view all the answers

Which of the following is NOT a type of WAN topology?

<p>Daisy chain WANs (A)</p> Signup and view all the answers

What is the primary function of an Internet service provider (ISP)?

<p>Supply access to the Internet (B)</p> Signup and view all the answers

Which term describes a private net accessible to internal users only?

<p>Intranet (C)</p> Signup and view all the answers

What do transport layer addresses compose of?

<p>Network address and port number (C)</p> Signup and view all the answers

What is the main purpose of protocols in network communication?

<p>To specify rules and formats for communication tasks (C)</p> Signup and view all the answers

Which of the following statements about a virtual private network (VPN) is true?

<p>It uses public networks as if they were private. (D)</p> Signup and view all the answers

Which of the following is a characteristic of Metropolitan-area networks (MAN)?

<p>Serves large cities and surrounding areas (C)</p> Signup and view all the answers

What forms the backbone of how the Internet works?

<p>Packet switching and TCP/IP (C)</p> Signup and view all the answers

Which statement best describes the Internet?

<p>It is a collection of independent networks connected globally. (B)</p> Signup and view all the answers

What is the popular term used for the Internet?

<p>Information Superhighway (C)</p> Signup and view all the answers

What is a defining characteristic of the World Wide Web?

<p>It organizes information into linked Web pages. (C)</p> Signup and view all the answers

Which of the following best describes network architecture?

<p>It guides the technical design of a network. (A)</p> Signup and view all the answers

What does the term 'node' refer to in network architecture?

<p>Any device on a network. (D)</p> Signup and view all the answers

In terms of geographical coverage, how would a local-area network (LAN) be defined?

<p>Connecting a small number of machines in a limited area. (C)</p> Signup and view all the answers

Why is no single person or company said to own or control the Internet?

<p>Due to its decentralized nature and many smaller networks. (D)</p> Signup and view all the answers

What characterizes passive attacks in network security?

<p>Eavesdropping on or monitoring transmissions (A)</p> Signup and view all the answers

Which of the following best describes a multimedia system?

<p>A computer capable of transmitting and accepting multiple media types (A)</p> Signup and view all the answers

Which of the following is NOT a cause of network security threats?

<p>Hardware advancements (D)</p> Signup and view all the answers

Which of the following features are crucial for a multimedia system's file system?

<p>Capability to handle streams of data like audio and video (C)</p> Signup and view all the answers

What type of attack involves masquerading as another entity?

<p>Active attack (B)</p> Signup and view all the answers

Which feature enhances the processing capability of a multimedia system?

<p>High processing power (C)</p> Signup and view all the answers

Which of the following file formats is relevant for multimedia systems?

<p>Formats allowing easy handling of various media types (A)</p> Signup and view all the answers

What type of weaknesses can lead to network security threats?

<p>Configuration weaknesses and technology weaknesses (B)</p> Signup and view all the answers

What is a key aspect of device portability in mobile computing?

<p>Usage across different geographical locations (D)</p> Signup and view all the answers

In the context of mobile computing, what does user mobility primarily involve?

<p>Moving between different communication devices (A)</p> Signup and view all the answers

Which application is NOT mentioned as an example of mobile computing?

<p>Telecommuting from a fixed location (A)</p> Signup and view all the answers

What is one of the main challenges faced in mobile computing?

<p>Higher loss-rates and higher delays (B)</p> Signup and view all the answers

Which of the following is a function of access points in a wireless network?

<p>Amplify Wi-Fi signals to extend connectivity range (D)</p> Signup and view all the answers

What does higher bandwidth variability in mobile computing indicate?

<p>Fluctuations between low and high bandwidth (A)</p> Signup and view all the answers

In terms of location awareness, what is a primary requirement?

<p>To adapt to local geographical conditions (C)</p> Signup and view all the answers

What introduces security risks in mobile computing?

<p>Device vulnerabilities and challenges in endpoint authentication (A)</p> Signup and view all the answers

Flashcards

Computer Network

A collection of computing devices connected to share resources and communicate.

Client/Server Model

A model where a central server provides services to multiple client computers.

Packet Switching Network

A network where data is broken down into packets that are routed individually and reassembled at the destination.

TCP/IP

A protocol suite used for communication on the Internet, enabling devices to connect and exchange data.

Signup and view all the flashcards

ARPANET

A project funded by the US Department of Defense to create a network for research institutions.

Signup and view all the flashcards

Net-Centric Computing (NCC)

A distributed environment where components communicate and coordinate actions through message passing.

Signup and view all the flashcards

NCC Principle

A principle that enables multiple components to operate as a single coherent system.

Signup and view all the flashcards

The Internet

A global network connecting millions of computers and users, allowing access to information and resources.

Signup and view all the flashcards

Local Area Network (LAN)

A network that connects devices within a limited area, like a home or office.

Signup and view all the flashcards

Internet

The network of interconnected networks that spans the globe, enabling communication and sharing information.

Signup and view all the flashcards

World Wide Web (WWW)

A system of interconnected text and images that allows users to navigate between pages using links.

Signup and view all the flashcards

Network Protocols

A set of rules and standards that govern how devices on a network communicate with each other.

Signup and view all the flashcards

Web Site

A collection of linked web pages with a shared theme or focus.

Signup and view all the flashcards

Network Architecture

The structure and arrangement of components within a network.

Signup and view all the flashcards

Packet Switching

Packet switching is a method of transmitting data by breaking it into small packets that are sent independently over different paths and then reassembled at the destination.

Signup and view all the flashcards

Host or Node

Refers to any device connected to a network, like a computer, smartphone, or printer.

Signup and view all the flashcards

Wide-area network (WAN)

A network that connects two or more local area networks over a potentially large geographical distance.

Signup and view all the flashcards

Metropolitan-area network (MAN)

The communication infrastructures developed in and around large cities.

Signup and view all the flashcards

Internet backbone

A set of high-speed networks that carry Internet traffic.

Signup and view all the flashcards

Internet service provider (ISP)

A company that provides access to the Internet for other companies or individuals.

Signup and view all the flashcards

Extranet

An intranet extended to include some external users, like business partners.

Signup and view all the flashcards

Virtual private network (VPN)

A technology that uses a public network to create a secure, private connection, making it seem like a private network.

Signup and view all the flashcards

Protocol

A well-defined set of rules and formats used for communication between processes.

Signup and view all the flashcards

Single-tier Architecture

A type of computer system where components, like presentation, logic, and data, are tightly interconnected and work together on a single processor.

Signup and view all the flashcards

Two-tier Architecture

A system with interconnected components and data stored in a central server, offering advantages like easier database changes but still having coupled presentation and logic layers.

Signup and view all the flashcards

Distributed Computing

A system that uses network connections to share resources across multiple machines, enabling the development of more complex and flexible applications.

Signup and view all the flashcards

Three-tier Architecture

A type of computer system where components, such as presentation, logic, and data, are separate and can run on different machines, making it flexible and scalable.

Signup and view all the flashcards

What is mobile computing?

Mobile computing allows using devices independently of fixed locations allowing users to access resources and services from various locations, networks, and communication devices.

Signup and view all the flashcards

User mobility

User mobility encompasses the flexibility to connect devices to different networks and applications, providing a seamless experience across different platforms.

Signup and view all the flashcards

Device portability

Device portability refers to the ability to transport a device between different locations, networks, and communication devices, allowing for use in diverse environments.

Signup and view all the flashcards

How is mobile computing useful?

Mobile computing applications enhance various sectors by enabling data collection, communication, and accessibility remotely. Examples include using GPS in vehicles or transmitting patient data in healthcare.

Signup and view all the flashcards

Challenges in mobile computing

Mobile computing challenges involve adjusting to the changing nature of mobile environments, such as resource limitations, security risks, and diverse networks.

Signup and view all the flashcards

What is a wireless network?

Wireless networks use radio waves to connect devices without cables, enabling mobility and user accessibility.

Signup and view all the flashcards

What is an access point?

Access points amplify Wi-Fi signals, extending the reach of a network and allowing devices to connect further away from the router.

Signup and view all the flashcards

What is the main security concern of mobile computing?

Mobile Computing allows access to the internet, resources & services from various locations, networks, and communication devices. One major challenge is maintaining security with increased vulnerabilities.

Signup and view all the flashcards

Passive Attacks

Attacks that focus on observing and gathering information from data transmissions, like listening in on conversations.

Signup and view all the flashcards

Active Attacks

Attacks that involve actively altering or interfering with data transmissions, like impersonating someone or changing the message content.

Signup and view all the flashcards

Man-in-the-Middle Attack

A security threat or attack that involves an attacker pretending to be someone else, usually to intercept or modify data exchanged between legitimate users.

Signup and view all the flashcards

Replay Attacks

Attacks that involve copying and retransmitting previously captured data to deceive the recipient.

Signup and view all the flashcards

Denial of Service (DoS)

Attacks aimed at preventing legitimate users from accessing a service or resource by overwhelming it with requests.

Signup and view all the flashcards

Multimedia System

A system designed to handle and process various types of media, such as text, images, audio, and video, allowing integration and seamless interactions.

Signup and view all the flashcards

Multimedia File Formats

Data representations that are used to store and manipulate multimedia components. Examples include JPEG for images, MP3 for audio, and AVI for video.

Signup and view all the flashcards

High I/O Rate

The ability of a multimedia system to efficiently handle the storage, access, and manipulation of large multimedia files.

Signup and view all the flashcards

Study Notes

Netcentric Fundamentals (ITT501) - Chapter 1 Introduction

  • Netcentric Computing (NCC) encompasses traditional networking, web development, and network security
  • NCC sub-specialities include computer communication network concepts, protocols, multimedia systems, Web standards and technologies, network security, wireless and mobile computing, and distributed systems
  • Net-Centric Computing (NCC) is based on a distributed environment where multiple components communicate and coordinate their actions through message passing. An outside observer sees this as a single coherent system
  • Example: The internet
  • A computer network is a collection of interconnected computing devices, allowing communication and resource sharing
  • Connections in networks are typically physical wires or cables, but can also be wireless (radio waves or infrared signals)
  • Computer networks have expanded computing through the client/server model
  • The ARPANET (Advanced Research Projects Agency Network) was a pioneering packet-switching network, the foundation for TCP/IP, and a precursor to the modern internet. Supported by the US Department of Defense for university and research laboratory use. TCP/IP network protocol and architecture became the backbone of the internet
  • The internet is the largest network globally, connecting numerous individual networks
  • The internet is often referred to as the "information highway"
  • Internet ownership is distributed; no single entity owns or controls the entire internet. Networks are typically owned and managed by individuals or organizations and their connections between these networks define the internet.
  • The World Wide Web (WWW) consists of information organized into web pages, with text and graphic images linked through hypertext links or highlighted keywords.

Network Architecture and Protocols

  • Understanding the relationships between architectural components in a network
  • Network architecture guides network design using high-level design principles
  • A network node or host is any device on a network
  • Different types of networks include: LAN (Local Area Network), WAN (Wide Area Network), MAN (Metropolitan Area Network), and wireless networks.
  • LAN topologies include bus, star, ring, switched, daisy chains, and hierarchies
  • WAN topologies include peer-to-peer, ring, star, full-mesh, partial-mesh, two-tiered, three-tiered, and hybrid

Connections

  • Internet backbone: High-speed networks carrying internet traffic
  • Internet Service Provider (ISP): Companies offering internet access to other entities

Internet, Intranet, Extranet, and VPN

  • Internet: Global network of interconnected networks
  • Intranet: Private corporate network accessible only to internal users
  • Extranet: Extended intranet for access by select external users
  • VPN (Virtual Private Network): Uses a public network to create a secure private connection.

Ports and Addresses

  • Ports are destination points within a host computer where processes communicate.
  • Transport layer addresses comprise a host's network address and a port number.
  • Every host on the internet has a unique IP address used in routing
  • In an Ethernet network, each host recognizes messages destined for it.

Protocols

  • Protocols are well-defined rules and formats for tasks like process communication
  • Parts include a message sequence and data format specifications
  • Well-known protocols enable independent development of components on different platforms and languages

OSI Layers

  • Application, Presentation, Session, Transport, Network, Data Link, and Physical layers
  • Example protocols for each layer are detailed

Client/Server Paradigms

  • Servers are continuously running software providing services to clients (often specialize)
  • Clients request services from servers; servers then respond with results
  • Client/server architectures have variations based on tiers, separating components into different tiers or layers (physical or logical separation)
  • Example applications include basic web functions

Layers

  • Presentation layer (front-end): Renders static or dynamic content generated by browser applications
  • Example technologies used in the front-end
  • Logic layer (middleware): Handles dynamic content processing and generation. Example technologies are Java EE, ASP.NET, PHP, and other platform middleware.
  • Data layer (back-end): Manages databases, with data sets and database management systems (DBMS) like SQL Server, Oracle, or DB2.

1-Tier, 2-Tier, and 3-Tier Architectures

  • 1-Tier: All layers exist on a single machine - Often simple and easily maintained, but limited scalability
  • 2-Tier: Separate presentation and logic layers from the database layer, stored on the server side. - Easier to switch databases, but can experience congestion and high server load
  • 3-Tier: Separates the presentation, logic, and data layers across different machines. Offers higher performance and scalability, however often complicated to implement. Allows for independent upgrade/change of each layer without affecting the other layers.

Client/Server Technologies

  • Technologies for the layers of client/server architectures (e.g. HTML, JavaScript, and related application server technologies)

Types of Servers

  • A list of server types (application servers, mail servers, etc.)

Distributed Computing

  • A field in computer science that studies distributed systems.
  • A distributed system uses networked computers, where components communicate through message passing.

Distributed Systems vs. Centralized Systems

  • Distributed systems use many components and computers communicating via passed messages.
  • Centralized systems have a single point of control and rely on homogeneous components, often used for resource sharing and simultaneous activities by lots of users.

Middleware (Technologies That Connect Components)

  • Middleware technologies enable different application components to communicate and coordinate activities.

Advantages and Disadvantages of Distributed Systems

  • Distributed system advantages: collaborative, expandability, improved performance, reliability and cost reduction
  • Distributed system disadvantages: network reliance, complexity, and security risks

Mobile and Wireless Computing

  • Mobile computing describes technologies allowing anytime, anywhere access to network services, use of portable/wireless devices
  • Aspects of mobility include user and device portability, movement between different geographical areas and networks.
  • Mobile computing applications include transmission of information to/from vehicles, emergencies (hospital transfer of patient information), other real-world aspects based on current information

Wireless Networks

  • Wireless networks allow devices to connect without physical wires.
  • Wireless components include access points that amplify Wi-Fi signals and base stations that connect wired and wireless networks, and mobile devices that access wireless networks
  • Wireless ad-hoc networks (MANETs) are peer-to-peer networks without a central infrastructure
  • Wireless ad hoc sensor networks use many geographically spread sensors with limited resources

Network Security

  • Key elements: Confidentiality (protecting information from unauthorized access), Integrity (protecting from modification/destruction), and Availability (reliable access to information)
  • Security threats/attacks: passive (monitoring) and active (modifications, denial of service)
  • Causes of network security threats: Technology weaknesses, Configuration weaknesses, Policy weaknesses, and Human weaknesses
  • Protection of network security

Networked Multimedia Systems

  • A networked multimedia system transmits to a computer (machine) multiple formats from external sources, including integrated media types
  • Multimedia systems need high processing power, file systems for handling multimedia data efficiently, high I/O rates, storage solutions, and strong network support, for successful functioning.

Multimedia Applications and its classes

  • Networked multimedia applications transmit audio/video.
  • QoS (Quality of Service) is crucial for maintaining acceptable performance across networked multimedia applications (e.g., guaranteeing bandwidth levels, or minimizing packet delays).
  • Classes include streaming stored audio/video, streaming live audio/video, and interactive real-time audio/video.
  • Challenges in multimedia include: differences in network bandwidth, packet delays, and limited processing power

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser