Part 2. Network and Distributed Systems

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/102

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

103 Terms

1
New cards

distributed system

is a collection of loosely coupled nodes interconnected by a communications network

2
New cards
  • processors

  • computers

  • machines

  • hosts

Nodes variously called

3
New cards

Site

is location of the machine

4
New cards

node

refers to specific system

5
New cards

server

has a resource a client node at a different site wants to use

6
New cards
  • client-server

  • peer-to-peer

  • hybrid configuration.

Nodes may exist in a

7
New cards

client-server configuration

server has a resource that a client would like to use

8
New cards

peer-to-peer configuration

each node shares equal responsibilities and can act as both clients and servers

9
New cards

message passing

Communication over a network occurs through ?

10
New cards

standalone system

All higher-level functions of a ______________ can be expanded to encompass a distributed system

11
New cards

Resource sharing

• Sharing files or printing at remote sites

• Processing information in a distributed database

• Using remote specialized hardware devices such as graphics processing units (GPUs)

12
New cards

Computation speedup

Distribute subcomputations among various sites to run concurrently

13
New cards

Load balancing

moving jobs to more lightly-loaded sites

14
New cards

Reliability

Detect and recover from site failure, function transfer, reintegrate failed site

15
New cards

Local-Area Network (LAN)

designed to cover small geographical area

16
New cards

Local-Area Network (LAN)

Consists of multiple computers (workstations, laptops, mobile devices), peripherals (printers, storage arrays), and routers providing access to other networks

17
New cards

Ethernet or Wireless (WiFi)

most common way to construct LANs

18
New cards

Wide-Area Network (WAN)

links geographically separated sites • Point-to-point connections via links

19
New cards

Wide-Area Network (WAN)

• Point-to-point connections via links

• Telephone lines, leased (dedicated data) lines, optical cable, microwave links, radio waves, and satellite channels

20
New cards

routers

Implemented via ______ to direct traffic from one network to another

21
New cards

Internet (World Wide Web) WAN

enables hosts world wide to communicate

22
New cards

40-100Gbps

Many backbone providers have speeds at

23
New cards

Local Internet Service Providers (ISPs)

may be slower

24
New cards

Cell phones

use radio waves to cell towers

25
New cards

Domain name system (DNS)

specifies the naming structure of the hosts, as well as name to address resolution (Internet)

26
New cards

Layer 1: Physical layer

Layer 2: Data-link layer

Layer 3: Network layer

Layer 4: Transport layer

Layer 5: Session layer

Layer 6: Presentation layer

Layer 7: Application layer

The communication network is partitioned into the following multiple layers:

27
New cards

Layer 1: Physical layer

handles the mechanical and electrical details of the physical transmission of a bit stream

28
New cards

Layer 2: Data-link layer

handles the frames, or fixed-length parts of packets, including any error detection and recovery that occurred in the physical layer

29
New cards

Layer 3: Network layer

provides connections and routes packets in the communication network, including handling the address of outgoing packets, decoding the address of incoming packets, and maintaining routing information for proper response to changing load levels

30
New cards

Layer 4: Transport layer

responsible for low-level network access and for message transfer between clients, including partitioning messages into packets, maintaining packet order, controlling flow, and generating physical addresses

31
New cards

Layer 5: Session layer

implements sessions, or process-toprocess communications protocols

32
New cards

Layer 6: Presentation layer

resolves the differences in formats among the various sites in the network, including character conversions, and half duplex/full duplex (echoing)

33
New cards

Layer 7: Application layer

interacts directly with the users, deals with file transfer, remote-login protocols and electronic mail, as well as schemas for distributed databases

34
New cards

OSI Network Model

Logical communication between two computers, with the three lowest level layers implemented in hardware

35
New cards

application layer

file transfer, access, and management; document and message interchange; job transfer and manipulation

36
New cards

presentation layer

transfer-syntax negotiation data-representation transformations

37
New cards

session layer

dialog and synchronization control for application entities

38
New cards

transport layer

end-to-end message transfer (connection management, error control, fragmentation, flow control)

39
New cards

OSI model

formalizes some of the earlier work done in network protocols but was developed in the late 1970s and is currently not in widespread use

40
New cards

TCP/IP model

The most widely adopted protocol stack is the ________, which has been adopted by virtually all Internet sites

41
New cards

TCP/IP protocol stack

has fewer layers than the OSI model. Theoretically, because it combines several functions in each layer, it is more difficult to implement but more efficient than OSI networking

42
New cards

Router

uses segmented network part of host-id to determine where to transfer packet

43
New cards

packet

may be complete message, or it may need to be reassembled into larger message spanning multiple packets

44
New cards

Media Access Control (MAC)

Every Ethernet/WiFi device has a

45
New cards

address resolution protocol (ARP)

If a system needs to send data to another system, it needs to discover the IP to MAC address mapping, uses __________________

46
New cards

broadcast

uses a special network address to signal that all hosts should receive and process the packet

47
New cards

true

true or false? Once a host with a specific IP address receives a packet, it must somehow pass it to the correct waiting process

48
New cards

port number

Transport protocols TCP and UDP identify receiving and sending processes through the use of a ?

49
New cards

protocols TCP and UDP

Allows host with single IP address to have multiple server/client processes sending/receiving packets

50
New cards
  • FTP – port and 21

  • ssh – port 22

  • SMTP – port 25

  • HTTP – port 80

Well-known port numbers are used for many services

51
New cards

Transport protocol

can be simple or can add reliability to network packet stream

52
New cards

UDP is unreliable

bare-bones extension to IP with addition of port number

• Since there are no guarantees of delivery in the lower network (IP) layer, packets may become lost

53
New cards

UDP is also connectionless

no connection setup at the beginning of the transmission to set up state • Also no connection tear-down at the end of transmission

54
New cards

datagrams

UDP packets are also called

55
New cards

reliable and connection-oriented

TCP is both ?

(opposite sila sa UDP)

56
New cards

TCP

provides abstraction to allow in-order, uninterrupted byte-stream across an unreliable network

57
New cards

acknowledgement packet (ACK)

Whenever host sends packet, the receiver must send an _______________. If not received before a timer expires, sender will resend.

58
New cards

Sequence numbers

____________ in TCP header allow receiver to put packets in order and notice missing packets

59
New cards

three-way handshake

Connections are initiated with series of control packets called a

60
New cards

cumulative ACK

Receiver can send a ____________ to acknowledge series of packets

61
New cards

flow control and congestion control

Flow of packets regulated through ?

62
New cards

Flow control

prevents sender from overrunning capacity of receiver

63
New cards

Congestion control

approximates congestion of the network to slow down or speed up packet sending rate

64
New cards
  • Network Operating Systems

  • Distributed Operating Systems

Two main types:

65
New cards

Network Operating Systems

Users are aware of multiplicity of machines

66
New cards

Distributed Operating Systems

Users not aware of multiplicity of machines

67
New cards

Data Migration

transfer data by transferring entire file, or transferring only those portions of the file necessary for the immediate task

68
New cards

Computation Migration

transfer the computation, rather than the data, across the system

• Via remote procedure calls (RPCs)

• Via messaging system

69
New cards

Process Migration

execute an entire process, or parts of it, at different sites

70
New cards

Load balancing

distribute processes across network to even the workload

71
New cards

Computation speedup

subprocesses can run concurrently on different sites

72
New cards

Hardware preference

process execution may require specialized processor

73
New cards

Software preference

required software may be available at only a particular site

74
New cards

Data access

run process remotely, rather than transfer all data locally

75
New cards

Robustness

Can the distributed system withstand failures?

76
New cards

Transparency

Can the distributed system be transparent to the user both in terms of where files are stored and user mobility?

77
New cards

Scalability

Can the distributed system be scalable to allow addition of more computation power, storage, or users?

78
New cards

Robustness

Hardware failures can include failure of a link, failure of a site, and loss of a message

79
New cards

fault-tolerant system

can tolerate a certain level of failure

• Degree of fault tolerance depends on design of system and the specific fault

• The more fault tolerance, the better!

• Involves failure detection, reconfiguration, and recovery

80
New cards

heartbeat protocol

To detect a link failure, a ___________ can be used

81
New cards

User mobility

allows users to log into any machine in the environment and see his/her environment

82
New cards

Scalability

As demands increase, the system should easily accept the addition of new resources to accommodate the increased demand

83
New cards

Data compression or deduplication

can cut down on storage and network resources used

84
New cards

Distributed file system (DFS)

a file system whose clients, servers, and storage devices are dispersed among the machines of a distributed system

• Should appear to its clients as a conventional, centralized file system

85
New cards

Service

software entity running on one or more machines and providing a particular type of function to a priori unknown clients

86
New cards

Server

service software running on a single machine

87
New cards

Client

process that can invoke a service using a set of operations that forms its client interface

88
New cards

create, delete, read, write

A client interface for a file service is formed by a set of primitive file operations

89
New cards

• Naming and transparency

• Remote file access

• Caching and cache consistency

Two widely-used architectural models include client-server model and cluster-based model Challenges include:

90
New cards

Naming

mapping between logical and physical objects

91
New cards

Multilevel mapping

abstraction of a file that hides the details of how and where on the disk the file is actually stored

92
New cards

transparent DFS

hides the location where in the network the file is stored

93
New cards

Location transparency

file name does not reveal the file’s physical storage location

94
New cards

Location independence

file name does not need to be changed when the file’s physical storage location changes

95
New cards

Remote-service mechanism

is one transfer approach.

• A requests for accesses are delivered to the server, the server machine performs the accesses, and their results are forwarded back to the user

96
New cards

Cache-consistency problem

keeping the cached copies consistent with the master file

97
New cards

network virtual memory

Cache-consistency problem could be called ?

98
New cards

• Permit workstations to be diskless

• Data can be accessed more quickly

• Performance speedup in bigger memories

• Server caches (used to speed up disk I/O) are in main memory

Advantages of main-memory caches:

99
New cards

Write-through

write data through to disk as soon as they are placed on any cache

100
New cards

Delayed-write (write-back)

modifications are written to the cache and then written through to the server later