Podcast
Questions and Answers
What is an expansive view in the context of networked computer systems?
What is an expansive view in the context of networked computer systems?
Extending an existing networked computer system with additional computers.
What is the primary difference between a decentralized and a distributed system?
What is the primary difference between a decentralized and a distributed system?
In a decentralized system, processes and resources are necessarily spread across multiple computers, whereas in a distributed system, they are sufficiently spread across multiple computers.
What is an example of a system that is logically centralized but physically distributed?
What is an example of a system that is logically centralized but physically distributed?
The Domain Name System (DNS).
Why is the statement 'Centralized solutions do not scale' considered a misconception?
Why is the statement 'Centralized solutions do not scale' considered a misconception?
Signup and view all the answers
What is a common misconception about centralized solutions?
What is a common misconception about centralized solutions?
Signup and view all the answers
What is the significance of the distinction between logically centralized and physically centralized systems?
What is the significance of the distinction between logically centralized and physically centralized systems?
Signup and view all the answers
What is one technique used to scale applications and hide communication latencies?
What is one technique used to scale applications and hide communication latencies?
Signup and view all the answers
How can computations be scaled across multiple machines?
How can computations be scaled across multiple machines?
Signup and view all the answers
What is one way to facilitate solution scalability by moving computations to clients?
What is one way to facilitate solution scalability by moving computations to clients?
Signup and view all the answers
What is the definition of trust in the context of security mechanisms?
What is the definition of trust in the context of security mechanisms?
Signup and view all the answers
What is the primary purpose of encryption and decryption in symmetric cryptosystems?
What is the primary purpose of encryption and decryption in symmetric cryptosystems?
Signup and view all the answers
What is the benefit of decentralized naming services like DNS?
What is the benefit of decentralized naming services like DNS?
Signup and view all the answers
What is the main problem with replication and caching?
What is the main problem with replication and caching?
Signup and view all the answers
What is the relationship between the encryption key (EK) and decryption key (DK) in symmetric cryptosystems?
What is the relationship between the encryption key (EK) and decryption key (DK) in symmetric cryptosystems?
Signup and view all the answers
What is the primary difference between symmetric and asymmetric cryptosystems?
What is the primary difference between symmetric and asymmetric cryptosystems?
Signup and view all the answers
What is one technique used to make data available at different machines?
What is one technique used to make data available at different machines?
Signup and view all the answers
What is the benefit of using replicated file servers and databases?
What is the benefit of using replicated file servers and databases?
Signup and view all the answers
What is the purpose of secure hash functions in security mechanisms?
What is the purpose of secure hash functions in security mechanisms?
Signup and view all the answers
What is the purpose of web caches in browsers and proxies?
What is the purpose of web caches in browsers and proxies?
Signup and view all the answers
What happens when data is modified and passed through a secure hash function?
What happens when data is modified and passed through a secure hash function?
Signup and view all the answers
What is the primary goal of secure hashing in security mechanisms?
What is the primary goal of secure hashing in security mechanisms?
Signup and view all the answers
What is the computational complexity of finding the original data from a given hash value?
What is the computational complexity of finding the original data from a given hash value?
Signup and view all the answers
What is the primary difference between reliability and availability in the context of dependability?
What is the primary difference between reliability and availability in the context of dependability?
Signup and view all the answers
What is the mean time to repair (MTTR) in the context of dependability metrics?
What is the mean time to repair (MTTR) in the context of dependability metrics?
Signup and view all the answers
What is the relationship between fault, error, and failure in the context of dependability?
What is the relationship between fault, error, and failure in the context of dependability?
Signup and view all the answers
What is the primary focus of the safety requirement in the context of dependability?
What is the primary focus of the safety requirement in the context of dependability?
Signup and view all the answers
What is the definition of reliability R(t) of a component C?
What is the definition of reliability R(t) of a component C?
Signup and view all the answers
What is the mean time between failures (MTBF) in the context of dependability metrics?
What is the mean time between failures (MTBF) in the context of dependability metrics?
Signup and view all the answers
What is the characteristic that defines distributed pervasive systems?
What is the characteristic that defines distributed pervasive systems?
Signup and view all the answers
What is the primary difference between ubiquitous computing systems and mobile computing systems?
What is the primary difference between ubiquitous computing systems and mobile computing systems?
Signup and view all the answers
What is the main characteristic of sensor (and actuator) networks?
What is the main characteristic of sensor (and actuator) networks?
Signup and view all the answers
How do distributed pervasive systems typically interact with users?
How do distributed pervasive systems typically interact with users?
Signup and view all the answers
What is the significance of the size of nodes in distributed pervasive systems?
What is the significance of the size of nodes in distributed pervasive systems?
Signup and view all the answers
What is the primary feature of mobile computing systems?
What is the primary feature of mobile computing systems?
Signup and view all the answers
How do distributed pervasive systems integrate with their environment?
How do distributed pervasive systems integrate with their environment?
Signup and view all the answers
What is the relationship between the three subtypes of distributed pervasive systems?
What is the relationship between the three subtypes of distributed pervasive systems?
Signup and view all the answers
Study Notes
Distributed Systems Overview
- Expansive view: a networked computer system is extended with additional computers
- Decentralized system: processes and resources are necessarily spread across multiple computers
- Distributed system: processes and resources are sufficiently spread across multiple computers
Common Misconceptions
- Centralized solutions do not scale
- Make distinction between logically and physically centralized systems
- The root of the Domain Name System: logically centralized, physically distributed, and decentralized across several organizations
- Centralized solutions have a single point of failure; generally not true (e.g., the root of DNS)
Dependability
- Requirements related to dependability:
- Availability: readiness for usage
- Reliability: continuity of service delivery
- Safety: very low probability of catastrophes
- Maintainability: how easy can a failed system be repaired
- Reliability versus availability
- Traditional metrics:
- Mean Time To Failure (MTTF): average time until a component fails
- Mean Time To Repair (MTTR): average time needed to repair a component
- Mean Time Between Failures (MTBF): MTTF + MTTR
Security
- Trust: one entity can be assured that another will perform particular actions according to a specific expectation
- Security mechanisms:
- Symmetric cryptosystem: encryption and decryption keys are the same and should be kept secret
- Asymmetric cryptosystem: public key and private (secret) key
- Secure hashing: any change from data to data* will lead to a completely different string H(data*)
Scalability
- Techniques for scaling:
- Hide communication latencies: asynchronous communication and separate handlers for incoming responses
- Facilitate solution by moving computations to clients
- Partition data and computations across multiple machines
- Replication and caching: make copies of data available at different machines
- The problem with replication: modifying one copy makes that copy different from the rest, leading to inconsistencies
Pervasive Systems
- Definitions:
- Ubiquitous computing systems: pervasive and continuously present, with continuous interaction between system and user
- Mobile computing systems: pervasive, but emphasis is on the fact that devices are inherently mobile
- Sensor (and actuator) networks: pervasive, with emphasis on actual (collaborative) sensing and actuation of the environment
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn about the differences between distributed and decentralized systems in computer networks. Understand how they are structured and how resources are allocated.