Distributed Systems Quiz
45 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a significant drawback of single processor systems in terms of scalability?

  • They allow for seamless machine transitions.
  • They reduce maintenance requirements.
  • They can easily handle increased processing volume.
  • They struggle with increasing processing volume. (correct)
  • In 2-tier architecture, what is a key advantage regarding the database?

  • It operates on the same machine as the client.
  • It can easily be swapped for a different database. (correct)
  • It is closely integrated with the client.
  • It requires no network communication.
  • How do the layers of a 3-tier architecture differ from those in a 2-tier architecture?

  • In 3-tier architecture, the database is directly tied to the presentation layer.
  • 3-tier architecture does not separate logic and data layers.
  • In 3-tier architecture, the layers are tightly coupled.
  • 3-tier architecture allows for running each layer on a different machine. (correct)
  • What is one major consequence of tightly connected presentation and business logic layers?

    <p>It leads to potential congestion on the network.</p> Signup and view all the answers

    What defines a distributed system?

    <p>Components located at networked computers pass messages to coordinate actions.</p> Signup and view all the answers

    What primary principle underlies Net-Centric Computing?

    <p>A distributed environment with coordinated components</p> Signup and view all the answers

    Which of the following is NOT a sub-specialty of Net-Centric Computing?

    <p>Quantum computing</p> Signup and view all the answers

    Which network architecture facilitates the sharing of resources through client/server models?

    <p>Computer network</p> Signup and view all the answers

    What was ARPANET's significance in network history?

    <p>It was the first to implement TCP/IP and the progenitor of the Internet.</p> Signup and view all the answers

    How are connections in a computer network primarily made?

    <p>Via physical wires or cables primarily</p> Signup and view all the answers

    What type of network utilizes message passing to create a coherent system for users?

    <p>Distributed network</p> Signup and view all the answers

    Which field is directly associated with developments in Net-Centric Computing?

    <p>Web standards and technologies</p> Signup and view all the answers

    Which of the following best describes the purpose of network security in Net-Centric Computing?

    <p>To protect data integrity and user privacy</p> Signup and view all the answers

    What type of network connects two or more local-area networks over a large geographic distance?

    <p>Wide-area network (WAN)</p> Signup and view all the answers

    Which of the following is NOT a type of WAN topology?

    <p>Daisy chain WANs</p> Signup and view all the answers

    What is the primary function of an Internet service provider (ISP)?

    <p>Supply access to the Internet</p> Signup and view all the answers

    Which term describes a private net accessible to internal users only?

    <p>Intranet</p> Signup and view all the answers

    What do transport layer addresses compose of?

    <p>Network address and port number</p> Signup and view all the answers

    What is the main purpose of protocols in network communication?

    <p>To specify rules and formats for communication tasks</p> Signup and view all the answers

    Which of the following statements about a virtual private network (VPN) is true?

    <p>It uses public networks as if they were private.</p> Signup and view all the answers

    Which of the following is a characteristic of Metropolitan-area networks (MAN)?

    <p>Serves large cities and surrounding areas</p> Signup and view all the answers

    What forms the backbone of how the Internet works?

    <p>Packet switching and TCP/IP</p> Signup and view all the answers

    Which statement best describes the Internet?

    <p>It is a collection of independent networks connected globally.</p> Signup and view all the answers

    What is the popular term used for the Internet?

    <p>Information Superhighway</p> Signup and view all the answers

    What is a defining characteristic of the World Wide Web?

    <p>It organizes information into linked Web pages.</p> Signup and view all the answers

    Which of the following best describes network architecture?

    <p>It guides the technical design of a network.</p> Signup and view all the answers

    What does the term 'node' refer to in network architecture?

    <p>Any device on a network.</p> Signup and view all the answers

    In terms of geographical coverage, how would a local-area network (LAN) be defined?

    <p>Connecting a small number of machines in a limited area.</p> Signup and view all the answers

    Why is no single person or company said to own or control the Internet?

    <p>Due to its decentralized nature and many smaller networks.</p> Signup and view all the answers

    What characterizes passive attacks in network security?

    <p>Eavesdropping on or monitoring transmissions</p> Signup and view all the answers

    Which of the following best describes a multimedia system?

    <p>A computer capable of transmitting and accepting multiple media types</p> Signup and view all the answers

    Which of the following is NOT a cause of network security threats?

    <p>Hardware advancements</p> Signup and view all the answers

    Which of the following features are crucial for a multimedia system's file system?

    <p>Capability to handle streams of data like audio and video</p> Signup and view all the answers

    What type of attack involves masquerading as another entity?

    <p>Active attack</p> Signup and view all the answers

    Which feature enhances the processing capability of a multimedia system?

    <p>High processing power</p> Signup and view all the answers

    Which of the following file formats is relevant for multimedia systems?

    <p>Formats allowing easy handling of various media types</p> Signup and view all the answers

    What type of weaknesses can lead to network security threats?

    <p>Configuration weaknesses and technology weaknesses</p> Signup and view all the answers

    What is a key aspect of device portability in mobile computing?

    <p>Usage across different geographical locations</p> Signup and view all the answers

    In the context of mobile computing, what does user mobility primarily involve?

    <p>Moving between different communication devices</p> Signup and view all the answers

    Which application is NOT mentioned as an example of mobile computing?

    <p>Telecommuting from a fixed location</p> Signup and view all the answers

    What is one of the main challenges faced in mobile computing?

    <p>Higher loss-rates and higher delays</p> Signup and view all the answers

    Which of the following is a function of access points in a wireless network?

    <p>Amplify Wi-Fi signals to extend connectivity range</p> Signup and view all the answers

    What does higher bandwidth variability in mobile computing indicate?

    <p>Fluctuations between low and high bandwidth</p> Signup and view all the answers

    In terms of location awareness, what is a primary requirement?

    <p>To adapt to local geographical conditions</p> Signup and view all the answers

    What introduces security risks in mobile computing?

    <p>Device vulnerabilities and challenges in endpoint authentication</p> Signup and view all the answers

    Study Notes

    Netcentric Fundamentals (ITT501) - Chapter 1 Introduction

    • Netcentric Computing (NCC) encompasses traditional networking, web development, and network security
    • NCC sub-specialities include computer communication network concepts, protocols, multimedia systems, Web standards and technologies, network security, wireless and mobile computing, and distributed systems
    • Net-Centric Computing (NCC) is based on a distributed environment where multiple components communicate and coordinate their actions through message passing. An outside observer sees this as a single coherent system
    • Example: The internet
    • A computer network is a collection of interconnected computing devices, allowing communication and resource sharing
    • Connections in networks are typically physical wires or cables, but can also be wireless (radio waves or infrared signals)
    • Computer networks have expanded computing through the client/server model
    • The ARPANET (Advanced Research Projects Agency Network) was a pioneering packet-switching network, the foundation for TCP/IP, and a precursor to the modern internet. Supported by the US Department of Defense for university and research laboratory use. TCP/IP network protocol and architecture became the backbone of the internet
    • The internet is the largest network globally, connecting numerous individual networks
    • The internet is often referred to as the "information highway"
    • Internet ownership is distributed; no single entity owns or controls the entire internet. Networks are typically owned and managed by individuals or organizations and their connections between these networks define the internet.
    • The World Wide Web (WWW) consists of information organized into web pages, with text and graphic images linked through hypertext links or highlighted keywords.

    Network Architecture and Protocols

    • Understanding the relationships between architectural components in a network
    • Network architecture guides network design using high-level design principles
    • A network node or host is any device on a network
    • Different types of networks include: LAN (Local Area Network), WAN (Wide Area Network), MAN (Metropolitan Area Network), and wireless networks.
    • LAN topologies include bus, star, ring, switched, daisy chains, and hierarchies
    • WAN topologies include peer-to-peer, ring, star, full-mesh, partial-mesh, two-tiered, three-tiered, and hybrid

    Connections

    • Internet backbone: High-speed networks carrying internet traffic
    • Internet Service Provider (ISP): Companies offering internet access to other entities

    Internet, Intranet, Extranet, and VPN

    • Internet: Global network of interconnected networks
    • Intranet: Private corporate network accessible only to internal users
    • Extranet: Extended intranet for access by select external users
    • VPN (Virtual Private Network): Uses a public network to create a secure private connection.

    Ports and Addresses

    • Ports are destination points within a host computer where processes communicate.
    • Transport layer addresses comprise a host's network address and a port number.
    • Every host on the internet has a unique IP address used in routing
    • In an Ethernet network, each host recognizes messages destined for it.

    Protocols

    • Protocols are well-defined rules and formats for tasks like process communication
    • Parts include a message sequence and data format specifications
    • Well-known protocols enable independent development of components on different platforms and languages

    OSI Layers

    • Application, Presentation, Session, Transport, Network, Data Link, and Physical layers
    • Example protocols for each layer are detailed

    Client/Server Paradigms

    • Servers are continuously running software providing services to clients (often specialize)
    • Clients request services from servers; servers then respond with results
    • Client/server architectures have variations based on tiers, separating components into different tiers or layers (physical or logical separation)
    • Example applications include basic web functions

    Layers

    • Presentation layer (front-end): Renders static or dynamic content generated by browser applications
    • Example technologies used in the front-end
    • Logic layer (middleware): Handles dynamic content processing and generation. Example technologies are Java EE, ASP.NET, PHP, and other platform middleware.
    • Data layer (back-end): Manages databases, with data sets and database management systems (DBMS) like SQL Server, Oracle, or DB2.

    1-Tier, 2-Tier, and 3-Tier Architectures

    • 1-Tier: All layers exist on a single machine - Often simple and easily maintained, but limited scalability
    • 2-Tier: Separate presentation and logic layers from the database layer, stored on the server side. - Easier to switch databases, but can experience congestion and high server load
    • 3-Tier: Separates the presentation, logic, and data layers across different machines. Offers higher performance and scalability, however often complicated to implement. Allows for independent upgrade/change of each layer without affecting the other layers.

    Client/Server Technologies

    • Technologies for the layers of client/server architectures (e.g. HTML, JavaScript, and related application server technologies)

    Types of Servers

    • A list of server types (application servers, mail servers, etc.)

    Distributed Computing

    • A field in computer science that studies distributed systems.
    • A distributed system uses networked computers, where components communicate through message passing.

    Distributed Systems vs. Centralized Systems

    • Distributed systems use many components and computers communicating via passed messages.
    • Centralized systems have a single point of control and rely on homogeneous components, often used for resource sharing and simultaneous activities by lots of users.

    Middleware (Technologies That Connect Components)

    • Middleware technologies enable different application components to communicate and coordinate activities.

    Advantages and Disadvantages of Distributed Systems

    • Distributed system advantages: collaborative, expandability, improved performance, reliability and cost reduction
    • Distributed system disadvantages: network reliance, complexity, and security risks

    Mobile and Wireless Computing

    • Mobile computing describes technologies allowing anytime, anywhere access to network services, use of portable/wireless devices
    • Aspects of mobility include user and device portability, movement between different geographical areas and networks.
    • Mobile computing applications include transmission of information to/from vehicles, emergencies (hospital transfer of patient information), other real-world aspects based on current information

    Wireless Networks

    • Wireless networks allow devices to connect without physical wires.
    • Wireless components include access points that amplify Wi-Fi signals and base stations that connect wired and wireless networks, and mobile devices that access wireless networks
    • Wireless ad-hoc networks (MANETs) are peer-to-peer networks without a central infrastructure
    • Wireless ad hoc sensor networks use many geographically spread sensors with limited resources

    Network Security

    • Key elements: Confidentiality (protecting information from unauthorized access), Integrity (protecting from modification/destruction), and Availability (reliable access to information)
    • Security threats/attacks: passive (monitoring) and active (modifications, denial of service)
    • Causes of network security threats: Technology weaknesses, Configuration weaknesses, Policy weaknesses, and Human weaknesses
    • Protection of network security

    Networked Multimedia Systems

    • A networked multimedia system transmits to a computer (machine) multiple formats from external sources, including integrated media types
    • Multimedia systems need high processing power, file systems for handling multimedia data efficiently, high I/O rates, storage solutions, and strong network support, for successful functioning.

    Multimedia Applications and its classes

    • Networked multimedia applications transmit audio/video.
    • QoS (Quality of Service) is crucial for maintaining acceptable performance across networked multimedia applications (e.g., guaranteeing bandwidth levels, or minimizing packet delays).
    • Classes include streaming stored audio/video, streaming live audio/video, and interactive real-time audio/video.
    • Challenges in multimedia include: differences in network bandwidth, packet delays, and limited processing power

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on the characteristics and architectures of distributed systems. This quiz covers important concepts such as scalability, advantages of 2-tier architecture, and the differences between 2-tier and 3-tier systems. Explore how tightly connected layers influence system design and operation.

    More Like This

    Use Quizgecko on...
    Browser
    Browser