Part 2. Network and Distributed Systems

studied byStudied by 2 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 102

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

103 Terms

1

distributed system

is a collection of loosely coupled nodes interconnected by a communications network

New cards
2
  • processors

  • computers

  • machines

  • hosts

Nodes variously called

New cards
3

Site

is location of the machine

New cards
4

node

refers to specific system

New cards
5

server

has a resource a client node at a different site wants to use

New cards
6
  • client-server

  • peer-to-peer

  • hybrid configuration.

Nodes may exist in a

New cards
7

client-server configuration

server has a resource that a client would like to use

New cards
8

peer-to-peer configuration

each node shares equal responsibilities and can act as both clients and servers

New cards
9

message passing

Communication over a network occurs through ?

New cards
10

standalone system

All higher-level functions of a ______________ can be expanded to encompass a distributed system

New cards
11

Resource sharing

• Sharing files or printing at remote sites

• Processing information in a distributed database

• Using remote specialized hardware devices such as graphics processing units (GPUs)

New cards
12

Computation speedup

Distribute subcomputations among various sites to run concurrently

New cards
13

Load balancing

moving jobs to more lightly-loaded sites

New cards
14

Reliability

Detect and recover from site failure, function transfer, reintegrate failed site

New cards
15

Local-Area Network (LAN)

designed to cover small geographical area

New cards
16

Local-Area Network (LAN)

Consists of multiple computers (workstations, laptops, mobile devices), peripherals (printers, storage arrays), and routers providing access to other networks

New cards
17

Ethernet or Wireless (WiFi)

most common way to construct LANs

New cards
18

Wide-Area Network (WAN)

links geographically separated sites • Point-to-point connections via links

New cards
19

Wide-Area Network (WAN)

• Point-to-point connections via links

• Telephone lines, leased (dedicated data) lines, optical cable, microwave links, radio waves, and satellite channels

New cards
20

routers

Implemented via ______ to direct traffic from one network to another

New cards
21

Internet (World Wide Web) WAN

enables hosts world wide to communicate

New cards
22

40-100Gbps

Many backbone providers have speeds at

New cards
23

Local Internet Service Providers (ISPs)

may be slower

New cards
24

Cell phones

use radio waves to cell towers

New cards
25

Domain name system (DNS)

specifies the naming structure of the hosts, as well as name to address resolution (Internet)

New cards
26

Layer 1: Physical layer

Layer 2: Data-link layer

Layer 3: Network layer

Layer 4: Transport layer

Layer 5: Session layer

Layer 6: Presentation layer

Layer 7: Application layer

The communication network is partitioned into the following multiple layers:

New cards
27

Layer 1: Physical layer

handles the mechanical and electrical details of the physical transmission of a bit stream

New cards
28

Layer 2: Data-link layer

handles the frames, or fixed-length parts of packets, including any error detection and recovery that occurred in the physical layer

New cards
29

Layer 3: Network layer

provides connections and routes packets in the communication network, including handling the address of outgoing packets, decoding the address of incoming packets, and maintaining routing information for proper response to changing load levels

New cards
30

Layer 4: Transport layer

responsible for low-level network access and for message transfer between clients, including partitioning messages into packets, maintaining packet order, controlling flow, and generating physical addresses

New cards
31

Layer 5: Session layer

implements sessions, or process-toprocess communications protocols

New cards
32

Layer 6: Presentation layer

resolves the differences in formats among the various sites in the network, including character conversions, and half duplex/full duplex (echoing)

New cards
33

Layer 7: Application layer

interacts directly with the users, deals with file transfer, remote-login protocols and electronic mail, as well as schemas for distributed databases

New cards
34

OSI Network Model

Logical communication between two computers, with the three lowest level layers implemented in hardware

New cards
35

application layer

file transfer, access, and management; document and message interchange; job transfer and manipulation

New cards
36

presentation layer

transfer-syntax negotiation data-representation transformations

New cards
37

session layer

dialog and synchronization control for application entities

New cards
38

transport layer

end-to-end message transfer (connection management, error control, fragmentation, flow control)

New cards
39

OSI model

formalizes some of the earlier work done in network protocols but was developed in the late 1970s and is currently not in widespread use

New cards
40

TCP/IP model

The most widely adopted protocol stack is the ________, which has been adopted by virtually all Internet sites

New cards
41

TCP/IP protocol stack

has fewer layers than the OSI model. Theoretically, because it combines several functions in each layer, it is more difficult to implement but more efficient than OSI networking

New cards
42

Router

uses segmented network part of host-id to determine where to transfer packet

New cards
43

packet

may be complete message, or it may need to be reassembled into larger message spanning multiple packets

New cards
44

Media Access Control (MAC)

Every Ethernet/WiFi device has a

New cards
45

address resolution protocol (ARP)

If a system needs to send data to another system, it needs to discover the IP to MAC address mapping, uses __________________

New cards
46

broadcast

uses a special network address to signal that all hosts should receive and process the packet

New cards
47

true

true or false? Once a host with a specific IP address receives a packet, it must somehow pass it to the correct waiting process

New cards
48

port number

Transport protocols TCP and UDP identify receiving and sending processes through the use of a ?

New cards
49

protocols TCP and UDP

Allows host with single IP address to have multiple server/client processes sending/receiving packets

New cards
50
  • FTP – port and 21

  • ssh – port 22

  • SMTP – port 25

  • HTTP – port 80

Well-known port numbers are used for many services

New cards
51

Transport protocol

can be simple or can add reliability to network packet stream

New cards
52

UDP is unreliable

bare-bones extension to IP with addition of port number

• Since there are no guarantees of delivery in the lower network (IP) layer, packets may become lost

New cards
53

UDP is also connectionless

no connection setup at the beginning of the transmission to set up state • Also no connection tear-down at the end of transmission

New cards
54

datagrams

UDP packets are also called

New cards
55

reliable and connection-oriented

TCP is both ?

(opposite sila sa UDP)

New cards
56

TCP

provides abstraction to allow in-order, uninterrupted byte-stream across an unreliable network

New cards
57

acknowledgement packet (ACK)

Whenever host sends packet, the receiver must send an _______________. If not received before a timer expires, sender will resend.

New cards
58

Sequence numbers

____________ in TCP header allow receiver to put packets in order and notice missing packets

New cards
59

three-way handshake

Connections are initiated with series of control packets called a

New cards
60

cumulative ACK

Receiver can send a ____________ to acknowledge series of packets

New cards
61

flow control and congestion control

Flow of packets regulated through ?

New cards
62

Flow control

prevents sender from overrunning capacity of receiver

New cards
63

Congestion control

approximates congestion of the network to slow down or speed up packet sending rate

New cards
64
  • Network Operating Systems

  • Distributed Operating Systems

Two main types:

New cards
65

Network Operating Systems

Users are aware of multiplicity of machines

New cards
66

Distributed Operating Systems

Users not aware of multiplicity of machines

New cards
67

Data Migration

transfer data by transferring entire file, or transferring only those portions of the file necessary for the immediate task

New cards
68

Computation Migration

transfer the computation, rather than the data, across the system

• Via remote procedure calls (RPCs)

• Via messaging system

New cards
69

Process Migration

execute an entire process, or parts of it, at different sites

New cards
70

Load balancing

distribute processes across network to even the workload

New cards
71

Computation speedup

subprocesses can run concurrently on different sites

New cards
72

Hardware preference

process execution may require specialized processor

New cards
73

Software preference

required software may be available at only a particular site

New cards
74

Data access

run process remotely, rather than transfer all data locally

New cards
75

Robustness

Can the distributed system withstand failures?

New cards
76

Transparency

Can the distributed system be transparent to the user both in terms of where files are stored and user mobility?

New cards
77

Scalability

Can the distributed system be scalable to allow addition of more computation power, storage, or users?

New cards
78

Robustness

Hardware failures can include failure of a link, failure of a site, and loss of a message

New cards
79

fault-tolerant system

can tolerate a certain level of failure

• Degree of fault tolerance depends on design of system and the specific fault

• The more fault tolerance, the better!

• Involves failure detection, reconfiguration, and recovery

New cards
80

heartbeat protocol

To detect a link failure, a ___________ can be used

New cards
81

User mobility

allows users to log into any machine in the environment and see his/her environment

New cards
82

Scalability

As demands increase, the system should easily accept the addition of new resources to accommodate the increased demand

New cards
83

Data compression or deduplication

can cut down on storage and network resources used

New cards
84

Distributed file system (DFS)

a file system whose clients, servers, and storage devices are dispersed among the machines of a distributed system

• Should appear to its clients as a conventional, centralized file system

New cards
85

Service

software entity running on one or more machines and providing a particular type of function to a priori unknown clients

New cards
86

Server

service software running on a single machine

New cards
87

Client

process that can invoke a service using a set of operations that forms its client interface

New cards
88

create, delete, read, write

A client interface for a file service is formed by a set of primitive file operations

New cards
89

• Naming and transparency

• Remote file access

• Caching and cache consistency

Two widely-used architectural models include client-server model and cluster-based model Challenges include:

New cards
90

Naming

mapping between logical and physical objects

New cards
91

Multilevel mapping

abstraction of a file that hides the details of how and where on the disk the file is actually stored

New cards
92

transparent DFS

hides the location where in the network the file is stored

New cards
93

Location transparency

file name does not reveal the file’s physical storage location

New cards
94

Location independence

file name does not need to be changed when the file’s physical storage location changes

New cards
95

Remote-service mechanism

is one transfer approach.

• A requests for accesses are delivered to the server, the server machine performs the accesses, and their results are forwarded back to the user

New cards
96

Cache-consistency problem

keeping the cached copies consistent with the master file

New cards
97

network virtual memory

Cache-consistency problem could be called ?

New cards
98

• Permit workstations to be diskless

• Data can be accessed more quickly

• Performance speedup in bigger memories

• Server caches (used to speed up disk I/O) are in main memory

Advantages of main-memory caches:

New cards
99

Write-through

write data through to disk as soon as they are placed on any cache

New cards
100

Delayed-write (write-back)

modifications are written to the cache and then written through to the server later

New cards
robot