Distributed vs Decentralized Systems in Computer Networks

CourteousRocket avatar
CourteousRocket
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is an expansive view in the context of networked computer systems?

Extending an existing networked computer system with additional computers.

What is the primary difference between a decentralized and a distributed system?

In a decentralized system, processes and resources are necessarily spread across multiple computers, whereas in a distributed system, they are sufficiently spread across multiple computers.

What is an example of a system that is logically centralized but physically distributed?

The Domain Name System (DNS).

Why is the statement 'Centralized solutions do not scale' considered a misconception?

<p>Because some centralized solutions can be designed to scale, such as the root of the Domain Name System.</p> Signup and view all the answers

What is a common misconception about centralized solutions?

<p>That they always have a single point of failure.</p> Signup and view all the answers

What is the significance of the distinction between logically centralized and physically centralized systems?

<p>It highlights the importance of understanding the underlying architecture of a system, rather than just its surface-level characteristics.</p> Signup and view all the answers

What is one technique used to scale applications and hide communication latencies?

<p>Asynchronous communication with separate handlers for incoming responses.</p> Signup and view all the answers

How can computations be scaled across multiple machines?

<p>By partitioning data and computations across multiple machines.</p> Signup and view all the answers

What is one way to facilitate solution scalability by moving computations to clients?

<p>Using Java applets and scripts.</p> Signup and view all the answers

What is the definition of trust in the context of security mechanisms?

<p>One entity can be assured that another will perform particular actions according to a specific expectation.</p> Signup and view all the answers

What is the primary purpose of encryption and decryption in symmetric cryptosystems?

<p>To secure data using encryption and decryption keys.</p> Signup and view all the answers

What is the benefit of decentralized naming services like DNS?

<p>Scalability through partitioning of data and computations across multiple machines.</p> Signup and view all the answers

What is the main problem with replication and caching?

<p>Inconsistencies arise when modifying one copy of the data, making it different from the rest.</p> Signup and view all the answers

What is the relationship between the encryption key (EK) and decryption key (DK) in symmetric cryptosystems?

<p>EK = DK, and both keys must be kept secret.</p> Signup and view all the answers

What is the primary difference between symmetric and asymmetric cryptosystems?

<p>Asymmetric cryptosystems use a public key (PK) and a private (secret) key (SK), whereas symmetric cryptosystems use the same key for encryption and decryption.</p> Signup and view all the answers

What is one technique used to make data available at different machines?

<p>Replication and caching.</p> Signup and view all the answers

What is the benefit of using replicated file servers and databases?

<p>Scalability and availability of data through replication.</p> Signup and view all the answers

What is the purpose of secure hash functions in security mechanisms?

<p>To return a fixed-length string that cannot be reversed or tampered with.</p> Signup and view all the answers

What is the purpose of web caches in browsers and proxies?

<p>To reduce latency and improve performance by storing frequently accessed data locally.</p> Signup and view all the answers

What happens when data is modified and passed through a secure hash function?

<p>The resulting hash value will be completely different from the original hash value.</p> Signup and view all the answers

What is the primary goal of secure hashing in security mechanisms?

<p>To ensure data integrity and prevent tampering.</p> Signup and view all the answers

What is the computational complexity of finding the original data from a given hash value?

<p>It is computationally impossible to find the original data from a given hash value.</p> Signup and view all the answers

What is the primary difference between reliability and availability in the context of dependability?

<p>Reliability refers to the continuity of service delivery, while availability refers to the readiness for usage.</p> Signup and view all the answers

What is the mean time to repair (MTTR) in the context of dependability metrics?

<p>The average time needed to repair a component.</p> Signup and view all the answers

What is the relationship between fault, error, and failure in the context of dependability?

<p>A fault causes an error, which in turn causes a failure.</p> Signup and view all the answers

What is the primary focus of the safety requirement in the context of dependability?

<p>The very low probability of catastrophes.</p> Signup and view all the answers

What is the definition of reliability R(t) of a component C?

<p>The conditional probability that C has been functioning correctly during [0,t) given C was functioning correctly at the time T = 0.</p> Signup and view all the answers

What is the mean time between failures (MTBF) in the context of dependability metrics?

<p>MTTF + MTTR.</p> Signup and view all the answers

What is the characteristic that defines distributed pervasive systems?

<p>Small, mobile, and often embedded in a larger system, blending into the user's environment.</p> Signup and view all the answers

What is the primary difference between ubiquitous computing systems and mobile computing systems?

<p>The emphasis on continuous interaction between system and user in ubiquitous computing systems, versus the emphasis on the mobility of devices in mobile computing systems.</p> Signup and view all the answers

What is the main characteristic of sensor (and actuator) networks?

<p>Collaborative sensing and actuation of the environment.</p> Signup and view all the answers

How do distributed pervasive systems typically interact with users?

<p>There is a continuous interaction between the system and user.</p> Signup and view all the answers

What is the significance of the size of nodes in distributed pervasive systems?

<p>The nodes are small, which allows them to be embedded in a larger system.</p> Signup and view all the answers

What is the primary feature of mobile computing systems?

<p>Devices are inherently mobile.</p> Signup and view all the answers

How do distributed pervasive systems integrate with their environment?

<p>They naturally blend into the user's environment.</p> Signup and view all the answers

What is the relationship between the three subtypes of distributed pervasive systems?

<p>They are overlapping.</p> Signup and view all the answers

Study Notes

Distributed Systems Overview

  • Expansive view: a networked computer system is extended with additional computers
  • Decentralized system: processes and resources are necessarily spread across multiple computers
  • Distributed system: processes and resources are sufficiently spread across multiple computers

Common Misconceptions

  • Centralized solutions do not scale
  • Make distinction between logically and physically centralized systems
  • The root of the Domain Name System: logically centralized, physically distributed, and decentralized across several organizations
  • Centralized solutions have a single point of failure; generally not true (e.g., the root of DNS)

Dependability

  • Requirements related to dependability:
    • Availability: readiness for usage
    • Reliability: continuity of service delivery
    • Safety: very low probability of catastrophes
    • Maintainability: how easy can a failed system be repaired
  • Reliability versus availability
  • Traditional metrics:
    • Mean Time To Failure (MTTF): average time until a component fails
    • Mean Time To Repair (MTTR): average time needed to repair a component
    • Mean Time Between Failures (MTBF): MTTF + MTTR

Security

  • Trust: one entity can be assured that another will perform particular actions according to a specific expectation
  • Security mechanisms:
    • Symmetric cryptosystem: encryption and decryption keys are the same and should be kept secret
    • Asymmetric cryptosystem: public key and private (secret) key
    • Secure hashing: any change from data to data* will lead to a completely different string H(data*)

Scalability

  • Techniques for scaling:
    • Hide communication latencies: asynchronous communication and separate handlers for incoming responses
    • Facilitate solution by moving computations to clients
    • Partition data and computations across multiple machines
    • Replication and caching: make copies of data available at different machines
  • The problem with replication: modifying one copy makes that copy different from the rest, leading to inconsistencies

Pervasive Systems

  • Definitions:
    • Ubiquitous computing systems: pervasive and continuously present, with continuous interaction between system and user
    • Mobile computing systems: pervasive, but emphasis is on the fact that devices are inherently mobile
    • Sensor (and actuator) networks: pervasive, with emphasis on actual (collaborative) sensing and actuation of the environment

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Distributed Systems Quiz
12 questions
Distributed Systems
14 questions

Distributed Systems

IngenuousSteelDrums avatar
IngenuousSteelDrums
Distributed Computing System Fundamentals
15 questions
Use Quizgecko on...
Browser
Browser