Fundamental Interaction Model

Similar documents
Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

BROADBAND AND HIGH SPEED NETWORKS

TYPES OF COMPUTER NETWORKS

Lenuţa Alboaie Computer Networks

Introduction to LAN Protocols

Introduction. Computer Networks: Introduction 1

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

What is the fundamental purpose of a communication system? Discuss the communication model s elements.

Computer Networks and Internet

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Dr./ Ahmed Mohamed Rabie Sayed

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation

ECE 333: Introduction to Communication Networks Fall Lecture 1: Introduction

Introduction to LAN Protocols

CHAPTER -1. Introduction to Computer Networks

CS 420/520 Data Communication Systems. Syllabus and Scope of Course

Chapter 9 Introduction to Networks

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

CSE 486/586 Distributed Systems

C 1. Recap. CSE 486/586 Distributed Systems Failure Detectors. Today s Question. Two Different System Models. Why, What, and How.

Communication Networks - 3 general areas: data communications, networking, protocols

What is a Network? A connection of two or more computers so that they can share resources.

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Introduction. Computer Networks Term B10

Bridging and Switching Basics

Networking interview questions

Chapter 2 System Models

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Distributed Systems (5DV147)

CS4514 Computer Networks

Computers Are Your Future

System Models. 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models. Nicola Dragoni Embedded Systems Engineering DTU Informatics

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Information Systems Infrastructure. Learning Objectives. Telecommunications Deregulation

Gigabit Networks, VLANs & Wireless LANs

2. System Models Page 1. University of Freiburg, Germany Department of Computer Science. Distributed Systems. Chapter 2 System Models

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Introduction to Computer Science (I1100) Networks. Chapter 6

CARRIER SENSE MULTIPLE ACCESS (CSMA):

C 1. Today s Question. CSE 486/586 Distributed Systems Failure Detectors. Two Different System Models. Failure Model. Why, What, and How

Layer 2 functionality bridging and switching

UNIT 5 MANAGING COMPUTER NETWORKS LEVEL 3 NETWORK TOPOLOGIES AND LAYOUT

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions?

Local Area Network(LAN)

Data Communication & Computer Networks INFO

Multicast can be implemented here

Computer Networks (Introduction to TCP/IP Protocols)

EEC-484/584 Computer Networks

2. LAN Topologies Gilbert Ndjatou Page 1

Network Topologies & LAN,MAN and WAN. By: Mr. Binesh Kr. Singh. What is Topology

You have to remember that

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Computer Networks

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

Introduction to Networking

Chapter 4 The Internet

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

ECE 333: Introduction to Communication Networks Fall 2001

networks List various types of networks and their

Chapter 5 Local Area Networks. Computer Concepts 2013

Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Data Communication. Introduction

Data Transport Networks

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Computer Communication Networks Lecture No. 1

06/02/2006. Local & Metropolitan Area Networks 1. INTRODUCTION. Why Study Local and Metropolitan Area Networks? ACOE322. Lecture 1 Introduction

The History and the layers of the OSI Model 30 - October

CS610- Computer Network Solved Subjective From Midterm Papers

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Review of Network Technologies

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Computer-to-Computer Networks (cont.)

Computer Networks. Andrew S. Tanenbaum


Digital Communication Networks

Chapter 16 Networking

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

1: Review Of Semester Provide an overview of encapsulation.

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Introduction. The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs.

Transfer of data from one device to another via some form of transmission medium.

Computer Networks. 9/29/2017 Vasile Dadarlat --Computer Networks 1

Full file at

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

LAN, MAN and WAN. Basics and Comparison. University of Damascus. Computer Engineering Dept. Digital Communications. By Abdulrahman Idlbi

System Models for Distributed Systems

EECS 122 Communications Networks

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Transcription:

Fundamental Interaction Model Synchronous distributed system 8 time to execute each step of computation within a process has known lower and upper bounds 8 message delivery times are bounded to a known value 8 each process has a clock whose drift rate from real time is bounded by a known value Asynchronous distributed system: no bounds on 8 process execution times 8 message delivery times 8 clock drift rate Note 8 synchronous distributed systems are easier to handle, but determining realistic bounds can be hard or impossible 8 asynchronous systems are more abstract and general: a distributed algorithm executing on one system is likely to also work on another one Distributed Systems - Fall 2001 II - 25 Stefan Leue 2001

Fundamental Interaction Model Event ordering 8 as we will see later, in a distributed system it is impossible for any process to have a view on the current global state of the system 8 possible to record timing information locally, and abstract from real time (logical clocks) 8 event ordering rules if e1 and e2 happen in the same process, and e2 happens after e1, then e1 e2 if e1 is the sending of a message m and e2 is the receiving of the same message m, then e1 e2 hence, describes a partial ordering relation on the set of events in the distributed system Distributed Systems - Fall 2001 II - 26 Stefan Leue 2001

Fundamental Interaction Model Event ordering 8 as we will see later, in a distributed system it is impossible for any process to have a view on the current global state of the system 8 possible to record timing information locally, and abstract from real time (logical clocks) 8 event ordering rules if e1 and e2 happen in the same process, and e2 happens after e1, then e1 e2 if e1 is the sending of a message m and e2 is the receiving of the same message m, then e1 e2 hence, describes a partial ordering relation on the set of events in the distributed system Distributed Systems - Fall 2001 II - 27 Stefan Leue 2001

Failures Omission Failures 8 process omission failures: process crashes detection with timeouts crash is fail-stop if other processes can detect with certainty that process has crashed 8 communication omission failures: message is not being delivered (dropping of messages) possible causes: inetwork transmission error ireceiver incomming message buffer overflow Arbitrary failures 8 process: omit intended processing steps or carry out unwanted ones 8 communication channel: e.g., non-delivery, corruption or duplication Distributed Systems - Fall 2001 II - 28 Stefan Leue 2001

Failures Distributed Systems - Fall 2001 II - 29 Stefan Leue 2001

Security Protecting access to objects 8 access rights 8 in client server systems: involves authentication of clients Protecting processes and interactions 8 threats to processes: problem of unauthenticated requests / replies e.g., "man in the middle" 8 threats to communication channels: enemy may copy, alter or inject messages as they travel across network use of secure channels, based on cryptographic methods Denial of service 8 e.g., pings to selected web sites 8 generating debilitating network or server load so that network services become de facto unavailable Mobile code 8 requires executability privileges on target machine 8 code may be malicious (e.g., mail worms) Distributed Systems - Fall 2001 II - 30 Stefan Leue 2001

Computer Networks Computer Networks "interconnected collection of autonomous computers" [Tanenbaum 1996] Types of Networks 8 Local Area Networks (LANs) high-speed communication on proprietary grounds (on-campus) most typical solution: Ethernet with 100 Mbps 8 Metropolitan Area Networks high-speed communication for nodes distributed over medium-range distances, usually belonging to one organization providing "back-bone" to interconnect LAN's technology often based on ATM, FDDI or DSL typical example: the University-network: iatm based i155 Mbit/s itransports data and voice (phony) Distributed Systems - Fall 2001 II - 31 Stefan Leue 2001

Computer Networks Types of Networks 8 Wide Area Networks communication over long distances covers computers of different organizations high degree of heterogeneity of underlying computing infrastructure involves routers speeds up to a few Mbps possible, but around 50-100 Kbps more typical most prominent example: the Internet 8 Wireless Networks end user equipment accesses network through short or mid range radioor infrared signal transmission Wireless WANs igsm (up to about 20 Kbps) iumts (up to Mbps) ipcs Wireless LANs/MANs iwavelan (2-11 Mbps, radio up to 150 metres) Wireless Personal Area Networks ibluetooth (up to 2 Mbps on low power radio signal, < 10 m distance) Distributed Systems - Fall 2001 II - 32 Stefan Leue 2001

Computer Networks Network Type Performance Characteristics Distributed Systems - Fall 2001 II - 33 Stefan Leue 2001

Computer Networks Network topologies for point-to-point networking Star short paths (always 2 hops) robust against leaf node failure but: whole network down if central node fails sometimes physical star used to implement logical ring Prentice-Hall 1996 Ring varying path lengths robust against node failure basis for Token Ring and FDDI LANs Tree varying, relatively long path lengths robust against leaf node failure sensitive to internal node failure suitable topology for multicast / broadcast applications Distributed Systems - Fall 2001 II - 34 Stefan Leue 2001

Computer Networks Network topologies for point-to-point networking Prentice-Hall 1996 Mesh completely connected graph short paths (always 1 hop) robust against node failure expensive point-to-point wireline implementaion inexpensive shared ether implementation Intersecting Rings internetworking for token ring networks sensitive to bridge node failure Irregular most commonly found Wide Area Network topology Distributed Systems - Fall 2001 II - 35 Stefan Leue 2001