0% found this document useful (0 votes)
64 views

DS Part1

This is B.Tech Distributed systems part 1 document

Uploaded by

IbmWasuser
Copyright
© Public Domain
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
64 views

DS Part1

This is B.Tech Distributed systems part 1 document

Uploaded by

IbmWasuser
Copyright
© Public Domain
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 68
SYLLABUS Distributed Systems - (CS812PE) UNIT-1 Characterization of Distributed Systems - Introduction, Examples of Distributed systems, Resource sharing and web, challenges, System models Introduction, Architectural and Fundamental models, Networking and Internetworking, Interprocess Communication, Distibuted objects and Remote Invocation - Introduction. Communication between distributed objects, RPC, Events and notifications, Case study ~ Java RMI. (Chapter - 1) UNIT- II ‘Operating System Support - Introduction, OS layer, Protection, Processes end Threads, Communication and Invocation, Operating system architecture, Distributed File Systems- Introduction, File Service architecture. (Chapter-2) UNIT - IF Peer to Peer Systems - Introduction, Napster and its legacy, Peer to Peer middleware. Routing overlays, Overlay case stucies - Pastry, Tapestry, Application case studies - Squirrel, OceanStore. Time and Global States Introduction, Clocks, events and Process states, Synchronizing physical clocks, logical time and Togical clocks, global states, dstributed debugging. Coordination and Agreement - Introduction, Distributed ‘mutual exclusion, Elections, Multicast communicatlon, consensus and related problems. (Chapter - 3) UNIT-IV ‘Transactions and Concurreney Control Introduction, Transactions, Nested Transactions, Locks. Optimistic concurrency control, Timestamp ordering, Distributed Transactions - Introduction, Flat and Nested Distributed Transactions, Atomic commit protocols, Concurrency control in distributed transactions, Distributed deadlocks, Transaction recovery. (Chapter 4) UNIT-V Replication - Introduction, System model and group communication, Fault tolerant services, Transactions ‘with replicated data, Distributed shared memory, Design and Implementation isues, Consistency models. (Chapter 5) w TABLE OF CONTENT: Punt 24 Operating System Architecture aes 25 ed File dew Characterization of Distributed ; ‘Systems (t=4)to(t-39) | 26 File Service Architecture ....... 224i Chapter = 1 del Fill in the Blanks with Answers for Mid Term Exam . LA Introduction ....+.+ 1.2. Examples of Distributed System | Multiple Choice Questions with Answers LS ByHsGi Model Hakosiesiog mu Chapter -3 Peer to Peer Systems 1.6 Architectural Models .........2e0eece00 D215 (3-1) to (3-31) 1.7 Fundamental Model ..........--+++ 1-17 3.1 _ Introduction 3-1 1.8 Networking and Internetworking... 1-19 3.2 Napster and its Legacy. 1.9 Inter - Process Communication. mawan on 1 il | ‘3.3. Peer to Peer Middleware ..... . 3-3 35 Overlay Case Studies-Pastry, Tapestry | 1.11 Distributed Objects and Remote Invocation 1-25 | 36 Applionton Case Sides : Squire, Oceania : : 5 112 RPC. | 3:7 Indroduetion, Clocks, Events and Process States 1.13 Events and Notifications . 1-35 " oa Ae ORES 3-7 1.14. Case Study -JavaRMI....... 3.8 Synchronizing Physical Clocks ...... 3-8 Fill in the Blanks with Answers 3.9 Logical Time and Logical Clocks ..... 2 for Mid Term Exam | 3.40 Global States and Distributed Debugging ... 3-14 ‘Multiple Choice Questions with Answers for Mid Term Exam 3.11 Coordination and Agreement. Lie 3,12. Distributed Mutual Exclusion ...........- 3-18 3.13 Election Algorithm. Chapter-2 Operating System Support (2-1)to(2-14) | 3.14 Multicast Communication 2A OS Layer and Protection .................2+1 3.45 Consensus and Related Problems. 22, Processes and Threads .....5...00.c00062-2 | 23 Communication and Invocation... 2-6 co) _— yall in the Blanks with Answers for Mid Term Exarn Maitiple Choice Questions with Answers Chapter-5 Replication (5-1) to (5-18) fd Term Exam « ana SA Introduction ...2.00se0000e00 Sel Post es chapter-4 Transactions and Concurrency 53 Fault Tolerant Services Control (4-1) to (4-18) (4-1)t0 (4-45) 5.4 istrbuted Shared Memory. 5-6 44 Introduction to Transaction and Nested Transactions cae e ace neeseee dal | $$ Design and Implementation lsues.....-+-+- 3-9 BE LOBE craze tenor enee 4-2 | $6 Consistency Models ....-+++0++++- 3-10 43° Optimistic Concurrency Control .. 4-3. | Fillin the Blanks with Answers | for Mid Term Exam . eee Se1T 44° Distributed Transactions. .....26.see-e000 4-4 Multiple Choice Questions with Answers 48° Flatand Nested Distributed Transactions for Mid Term Exam ...-.++0+20++ wSeIT Solved Model Question Paper (M-1) 46 Atomic Commit Protocols .... 4.7 Concurrency Control in Distributed Transactions : saorineeneveveslb ee 48 Distributed Deadlocks .....-24-.0.220006 4-11 49° Transaction Recovery..-+.0eeeere0e0+ Fill in the Blanks with Answers for Mid Term Exam ...- ‘Multiple Choice Questions with Answers for Mid Term Exam . seeded ——— ii e—e—oooooavm' TEGHVIGAL PUBLICATIONS. yp thu! ow (unit Characterization of Distributed Systems 1.1 : Introduction QA Define and explain about the distributed systems. SPDINTU : Aprl-18, Marks 2] Ans: A distributed system is a collection of autonomous hosts that are connected through a computer network. A distributed system is a collection of independent computers that appears to its users as a single coherent system. Q2 Distinguish between buffering and caching. ESP[DNTU : May-17, Marks 3] ‘Ans. : Cache is made from static ram which is faster than the slower dynamic ram used for a buffer. A cache transparently stores data so that future requests for that data can be served faster. A buffer temporarily stores data while the data is the process of moving from one place to another, ie. the input device to the output device. The buffer is mostly uused for input/output processes while the cache is used during reading and writing processes from the disk. Q3 Define the goals of distributed system. Ans.: Goal of a distributed system is to connect users and resources in a transparent, open and sealable way. 4 List an example of distributed system, ‘Ans. : Distributed system examples: Internet, an intranet which is a portion of the internet managed by an organization, Mobile and ubiquitous computing. Q.5 What are the significant consequences of distributed systems ? Ans. : a. No global clock : The only communication is by sending messages through a network. b, Independent failures : The programs may not be able to detect whether the network has failed or has become unusually slow. & Concurrency: The capacity of the system to handle shared resources can be increased by adding more resources to the network. Q6 List three properties of distributed systems. Ans. : « Properties of distributed systems are resource sharing, epenness, concurrency, scalability, fault tolerance and transparency. Q7 With the help of neat diagram, explain the software and hardware service layers in distributed ‘system: PONT : Dec-18, Marke 5) ‘Ans. : # The concept of layering is a familiar one and. is closely related to abstraction. sin a layered approach, a complex system is partitioned into a number of layers, with a given layer making use of the services offered by the layer below. +A given layer therefore offers a software abstraction, with higher layers being unaware of implementation details, or indeed of any other layers beneath them. +n terms of distributed systems, this equates to vertical organization of services into service layers A distributed service ean be provided by one oF more server processes, interacting with each other and with client processes in order to maintain a consistent system-wide view of the service's resources, + Fig. Q7.1 shows software and hardware service layers in distributed systems, a » (rr istrited Systems ——— User applietion and services Midcloware (Operating systems Hardware (Computer and network) Platform Fig. Q.7.4 Software and hardware service layers ‘+A platform for distributed systems and applications consists of the lowest-level hardware and software layers. «These low-level layers provide services to the layers above them, which are implemented independently in each computer, bringing the system's programming interface up to a level that facilitates communication and coordination between processes. «Middleware as a layer of software whose purpose is to mask heterogeneity and to provide a convenient programming model to application programmers. «Middleware is represented by processes or objects in a set of computers that interact with each other to implement communication and resource-sharing support for distributed applications. It is concemed with providing useful building blocks for the construction of software components that can work with one another in a distributed system, on characteristics of US {INTU ¢ Aprl-18, Marks 5] 8 Write short distributed systems. Ans.: Characteristics of distributed systems are as follows : 1, Concurrency : The components of a distributed compuitation may run at the same time, Independent failure modes ; The components of a distributed computation and the network connecting them may fail independently of each other. No global time : We assume that each component of the system has a local clock but the clocks might not record the same time, The hardware on which the clocks are based is not iuaranteed to run at precisely the same rate on note 2 Characterization of Distributed Systems all components of the system, a feature called clock drift. 4, Distributed systems should also be relatively easy to expand or scale, 5. A. distributed system will normally be continuously available. 6 Software runs in concurrent processes on. different processors. Q.9 Describe the distributed computing as utility. BB [INTU ¢ Deco=17, Marks 5) ‘Ans. The growing popularity of the internet and the availability of powerful computers and | high-speed networks as low-cost commodity | components are changing the way we do computing. | Utility computing involves the renting of computing resources such as hardware, software and network bandwidth on an as-required, on-demand basis. ‘eIn ihe business world, cluster architecture-based large-deale computing systems, called data centers, coffering\, high-performance and _ high-available | hosting services are, widely used. The reliable and low-cost availability of data center services has | encouraged: many businesses to outsource their | computing Yeeds; thus heralding a new utility computing médel. «Technological Yevelopments have led to the possibility of using networks of computers as a single, unified computing resource, known as luster computing. \ Clusters appear in various forms: High-performance clusters, high-availability clusters, dedicated clusters, non-dedicated clusters, and s0 on. stip mtg aiomed to be te ant generation of information technology evolution that depicts how computing neds of users can be fulfilled in the future IT industry. Its analogy is derived from the real world where service providers maintain and supply utility services, such as electrical power, gas, and water to consumers. * Consumers in tum pay service providers based on their usage. Therefore, the underlying design of utility computing is based on a service provisioning model, where users pay providers for using ‘computing power only when they need to, TECHNICAL PUBLICATIONS® + an upatst er nowge Pe Diatrtted Suateme cept ot utility computing, Ie slonphe 5 Realtor Inhoune, organtzationn eternal ily tng, men v Uwe Haratavare and “Th than subscribe a provider and pay only software resources they tne, UUIlly computing, relies heavily on the principle of connalldatian, where physical resourees are shared byw number of applications and users, The prinelpal reson offered include virtual computing env storage capaci mnawent and * Cloud computing allows renting, nfrantracture, runtime environments, and services on pay-per-tiwe basis. End users leveraging cloud computing services can access their documents and data at anytime, anywhere and from any eview coniweted to the internet, * Cloud computing (ums IV services into utilisies, Web 20 technologies play a central role iv making cloud computing an attractive opportunity for building computing systems. * Definition of cloud computing : Clouc! computing refers to both the applications delivered as services over the Internet, and the hardware and system software in the datacenters that provide those services. © A cloud is a type of parallel and distritiuted system consisting of a collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources base on service-level agreements established throt igh negotiation between the service provider and ce msumers + Cloud computing simp'yifies the time-consuming processes of hardware provisioning, hardware purchasing and softy sare deployment, Fig. Q9.1 shows cloud computi.ng * Clouds are essentiraly Jarge distributed computing facilites that make a’vailable their services to third Parties on demand., Cloud computing is often Considered as thie su.ccessor of grid computing, Grid competing "is a distributed computing Paradigm that coc srdinates networked resources to achieve a commor 1 comput al objective, Tora teratnof Inated Sytey | CJ Vee ne Cimon ae DP Tobit emia saver y a Mola aaows Fig, 9.4 Cloud computing # Benefits of ullllty computing ‘The utility computing model offers a number of benefits 10 both service providers and users. 1. Service providers a, Service providers can reallocate resources easily and quickly to users that have the highest demands, b, fficient usage of resources minimizes ‘operational costs for providers. 2. To user a. Reduction of [T-related operational costs and complexities. 'b. Users no longer need to invest heavily or encounter difficulties in building and maintaining IT infrastructures Q.10 Discuss how distributed systems are more scalable than the centrallzed systems ? UGE NTU + May-16, Dec.-17, Marks §] ‘Ans, : # Scalability refers to the capability of a system to adapt 10 increased service load. Distributed operating system should be designed to easily cope with the growth of nodes and users in the system. * The system should remain efficient even with a significant increase in the number of users and resources connected : 1. Cost of adding resources should be reasonable; 2, Performance loss with increased number of users and resources should be controlled; 3. Software resources should not run out (number Of bits allocated to addresses, number of evtries in tables, ete), a TECHIICAL PUBLICATIONS® «an vpn! fr keoniodyo piste Systems asome guiding principles for designing scalable teat systems are as follows + 1. Avoid centralized entities 2. Avoid centralized algorithms, 4. Perform most operations on client workstations. «The design of scalable distributed systems presents the following challenges : 1. Controlling the cost of resources oF money: 2. Controlling the performance loss. 4. Preventing softiware resourees from running out 4. Avoiding preformance bottlenecks. + Controlling the cost of physical resources ie, servers and users. # Controlling the performance loss : DNS hierarchic structures scale better than linear structures and save time for access structured data, «+ Preventing software resources running out: Internet 32-bit addresses run out soon. 128-bit one gives extra space in messages. + Avoiding periormance bottlenecks : DNS name table was Kept in a single master file partitioning, between servers. Qt Explain advantages and disadvantages of distributed system. ‘Ans. + Advantages of Distributed System 1. Economics : A collection of microprocessors offer a better price/performance than mainframes. Low price /performance ratio is the cost effective way to increase computing power. 2 Speed : A distributed system may have more total computing power than a mainframe. 3. Distributed systems can be extended through the addition of components, thereby providing better scalability compared to centralized systems. 4. Inherent distribution : Some applications are inherently distributed e.g. a supermarket chain, Reliability : If one machine crashes, the system as a whole can still survive It gives higher availability and improved reliability. Incremental growth : Computing power can be Added in small increments. Clarcterdention af Date tel Systems of Distributed System qucatlon, lowey tranvennion AL Absence of global clock. 1.2 : Examples of Distributed System Q.12 Give an example of a URL. UUBr[INTU ¢ May-47, Marks 2] Ans: «Fig. Q121 shows steucture of a URL. ‘titra technicnipubication orghome.himl itp Protocol we Subdomain Tecinicalpubicalion | Domain name om ‘ep oval domain tome htt fo path Fig. Q.42.1 URL structure “HTTP uses default port number 80, but other port numbers can also be used; the alternative HTTP port 8080 is common. HTTP works on top of the Internet Protocol (IP). Q.43 List an example of distributed system. ‘Ans. ; Distributed system examples : Internet, an intranet which is a portion of the intemet managed by an organization, Mobile and ubiquitous computing, .14 What Is an Intranet ? ‘Ans. An intranet is a private network that is contained within an enterprise, It may consist of many interlinked local area networks and also use leased lines in the Wide Area Network .15 What Is web browser ? ‘Ans. A client interacts with Web servers through a special application known as a browser. A browser is responsible for properly displaying a document. —— 1-5 Distrtated Systems ais Discuss the mobile and ubiquitous comp uns 1G EINTU : Dec.-18, Marks 5) +: Mobile and Ubiquitous Computing Ans. a The portability of the devices, such as laptop computers, PDA, mobile phone, refrigerators, together with their ability to connect conveniently to networks in different places, makes mobile computing possible. « Ubiquitous computing is the hamessing small cheap computational devices that are present in user’s physical environments, including the home, office and elsewhere. ig of many '* Mobile devices are 1. Laptop computers. 2, Handheld devices, including PDAs, cell phones, pagers, video cameras and digital cameras. 3, Wearable devices, such as smart watches. Mobile phone __ Characterization of Distributed Systems 4, Devices embedded in appliances such as washing machines, hi-fi systems, cars. « Mobile computing (nomadic computing) 1. People can stil access resources while he is on the move or visiting places other than their ‘usual environment. 2. Location-aware computing : Utilize resources that are conveniently nearby. ‘+ Ubiquitous computing (pervasive computing) 1. The hamessing of many small, cheap computational devices those are present in user's physical environments, including the home, office and elsewhere, 2. It benefits users while they remain in a single environment such as home. «Fig. Q16.1 shows the portable and handheld devices in a distributed system. ‘« Mobile and ubiquitous computing raise significant system issues presents an architecture for mobile computing, Fig. Q.46.4 Teojavek puRLeATONE® en uptn oare isributed Systems 16 (Characterization of Distributed Systems «+ User has access to three forms of wireless connection 1. A laptop is connected to host's wireless LAN. 2. A mobile phone is connected to internet using WAP via a gateway. 3, A digital camera is connected to a printer over an infra-red link. 247 Describe about distributed multimedia systems. ns. Digital multimedia : Computer-controlled integration of text, graphics, still images, moving pictures, animation. sound, and any other medium. All these data types are represented, stored, transmitted and processed. digitally. +A continuous media type has an implicit time dimension, while a discrete type does not. Referring to video ad audio data as continuous and time based. Continuous refers to the user's view of data Internally, continuous media are represented as sequences of discrete values that replace each other over time. ‘+ Multimedia streams are said to be time-based because timed data elements in audio and video streams define the content of the stream. The systems that support multimedia applications need to preserve the timing when they handle continuous data +A distributed multimedia system should be able to perform the same functions for continuous media types such as audio and video. It should be able to store and locate audio or video files, to transmit them across the network, to support the presentation of the media types to the user and optionally also to share the media types across a group of users, Q.48 Illustrate the client server architecture of one or more major internet applications. ESP[INTU : May-17, Marks 5] «Browsers are clients of Domain Name Servers (DNS) and web servers (HTTP), Some intranets are configured to interpose a Proxy server. «Proxy servers fulfil several purposes, when they are located atthe same site as the client, they reduce network delays and network traffic. «When they are at the same site as the server, they form a security checkpoint and they can reduce load on the server. 19 Witte short note on : a) Web search b) Financial trading ‘Ans. a) Web search : «Web search services are among the most heavily used applications on the world wide web. Web search engines have come and gone over the years, and many that are still in operation have a rich history. Search engines are becoming the primary entry point for discovering web pages. TECHNICAL PUBLICATIONS® «an ups for hnowladyo Distributed Systems - search is among the most important activities that web users engage in. beyond the web, search is a central activity for users of corporate intranets, specialized databases and increasingly for personal archives of documents and email. «Search engine is a computer program that searches for particular keywords and retums a list of documents in which they were found, especially a commercial service that scans documents on the internet. * Types of search engines : 1. Search by keywords (eg. AltaVista, Excite, Google and Northern Light) 2. Search by categories (eg. Yahoo!) 3. Specialize in other languages (eg. Yahoo! and Yahoo! Japan) 4. Interview simulation (eg. Ask Jeeves!) ‘*Google is the market leader in web search technology. Google search engine put significant effort into the design of a sophisticated distributed system infrastructure to support earch, This represents one of the largest and most complex distributed systems installations in the history of computing and hence demands close examination. + Highlights of Google infrastructure : 1, Physical infrastructure consisting of very large numbers of networked computers located at data centres all around the world, 2 Google uses distributed file system. It support very large files and heavily optimized for the style of usage required by search and_ other Google applications. 3. An associated structured distributed storage system that offers fast access to very large datasets, 4 Programming model that supports the management of very large paraKel and distributed computations across the underlying physical infrastructure. Selected! application domains and networked application are as follows : Chinese associated Characterization of Distributed Systems Remarks | 1. Finance and eCommerce eg. Amazon and and MySpace commerce eBay, PayPal cnlne banking | i and wading | | The Web information and search | i information | enginen ebooks Wikia | soaey social networking: Facebook [ Web information and search 3 The information engines, ebooks, Wikipedia; social networking : Facebook and MySpace. | ed I 4 Creative Online gaming, music and film industries and | in the home, user-generated entertainment | content, eg. YouTube, Flickr Healthcare . patient records, monitoring patients Health informatics, on online i | _— | | elearning, virtual leaming =| ‘environments; distance learning | Transport and. | GPS in route finding eystems, logisis map services: Google maps, Google earth | b) Financial trading : "Typical examples of distributed coniputing and information systems are systems that automate the operations of commercial enterprises such as banking and financial transaction processing systems, warehousing systems and automated factories. * The basic components of 'a transaction processing system can be found in single user systems. The evolution of these systems provides a convenient framework for introducing their various features. Decreased cost of hardware and communication make it possible to distribute components of transaction processing system. Client-server organization generally used, * A. transaction manager allows the application Programmer to group the set of actions, requests, messages, and computations into a single operation that is “all or nothing" it either happens or is automatically aborted by the system. The Programmer is provided with COMMIT and TECHNICAL PUBLICATIONS® - en upatnust for knowiedga Pr istrited Sustems ABORT verbs that declare the outcome of the transaction. ‘Transactions provide the ACID property. ACID characteristic properties of transactions : 1. Atomic : To the outside world, the transaction happens indivisibly. Consistent : The transaction does not violate system invariants. 3, Isolated: Concurrent interfere with each other. 4. Durable : Once a transaction commits, the changes are permanent. transactions do not 14.3 : Resource Sharing and the Web | 0.20 What is meant by resource sharing? Explain ESPDNTU : April-t8, Marks 3] ‘Ans.: Share resource is main motivation ‘of the distributed systems. Sharing of resource extends from hardware components such as disks and printers to software defined entities such as files, databases and data objects of all kinds. «Scalability refers to the capability of a system to adapt to increased service load. DS should. be designed to easily cope with the growth of nodes and users in the system, ‘ Reliability: If one machine crashes, the system as whole can still survive. Higher availability and improved reliability. Q21 List five types of hardware resource and software resource that can usefully be shared, Ans, : Hardware xesources : CPU, Memory, screen, disk, network capacity and printer. Software resources : Web page, file , object, database, audio/video stream. 22 List the three main software components that ‘may fail when a client process invokes a method In a server object, giving an example of a failure in each case. USF [NTU : Dec.-28, Marks 3] AAns.: The three main software components that may fall are 1. The cient process e.g it may crash, 2 The server process e.g, the process may crash. (Cheracterization of Distributed Systems 3. The communication software eg. a message may fail to arrive. «The failures are generally caused independently of one another. Examples of dependent failures 1. If the loss of @ message causes the client or server process to crash. The crashing of a server would cause a client to perceive that a reply message is missing and might indirectly cause it to fail 2. If clients crashing cause servers problems. 3. If the crash of a process causes a failures in the ‘communication software. * Both processes should be able to tolerate missing ‘messages. The client must tolerate a missing reply message after it has sent an invocation request message. Instead of making the user wait forever for the reply, a client process could use a timeout and then tell the user it has not been able to contact the +A simple server just waits for request messages, executes’ invocations and sends replies. It should be absolutely immune to lost messages. But if a server stores information about its dlients it might eventually fil if clients crash without informing the server. ‘The communication software should be designed to tolerate crashes in the communicating processes. For example, the failure of one process should not cause problems in the communication between the surviving processes. @.23 What are the advantages and disadvantages of HTML, URLs and HTTP as core technologies for information browsing ? SE [ONTU + May-16, Dec-18, Marks 5] ‘Ans.:* HTML is a relatively straightforward language to parse and render but it confuses presentation with the underlying data that is being presented, ‘ © URLs are efficient resource locators but they are not sufficiently rich as resource links. For example, they may point at a resource that has been relocated or destroyed; their granularity is too coarse grained for many purposes. EEE TECHNICAL PUBLICATIONS® - an upthrst for Knowledge Freee ems Pl Distributed Systems + HTTP is a simple protocol that can be implemented with a small footprint, and which can be put to use jin many types of content transfer and other types of service. Its verbosity makes it inefficient for passing small amounts of data. * HTTP and URLs are acceptable as a basis for client-server computing except that 1a) There is no strong type checking , by There isthe inefficiency that mentioned. we have Q.24 Give five types of hardware resource and five types of data or software resource that can usefully be shared. Give examples of thelr sharing 1s it occurs In practice in distributed systems. TBP INTU + Dec.-18, Marks 5] ‘Ans. : Hardware and software resource sharing * Examples of hardware resources that can be usefully be shared and examples of their sharing. Hardware resource . 1. CPU: a. Computing Server : It executes processor - intensive applications for clients. . Remote object server : It executes methods on behalf of clients. & Worm program : It shares CPU capacity of desktop machine with the local user. 2. Memory : Cache server holds recently-accessed ‘web pages in its RAM, for faster access by other local computers. 3. Disk : File server, virtual disk server, video on demand server. 4, Screen : Network window systems, such as X-11, allow processes in remote computers to update the content of windows, 5. Printer : Networked printers accept print jobs from many computers and managing them with a queuing system. Software resources: 1. Web page : Web servers exiable multiple clients to share read-only page content. 2. File : File servers enable multiple clients to share read-write files 1 Distrtuted Sustemse Object : Possibilities tor software limitless, Shared whiteboard, room booking system are ey, objets ace shart liaty” ant ples of this type: 4. Database : Databases are intended t© record the def state of some related sets of «lata, They have been shared ever since multisner computers appeared, They’ ine manage concurrent updates, e twehnigues to 5. Newsgroup content : The netnews system makes read-only copies of the recently-posted news items available to clients throughout the Internet 6 Videolaudio stream : Servers can store entire videos on disk and deliver them at playback speed to multiple clients simultaneously. Q.25 What are the different benefits of resource sharing? Explain about ite significance ? (CaP [INTU : Dec 7, Marks 5) Ans. : Different benefits of resource sharing are as follows : ‘= Computing power is increases. ‘Scalability can be increases. ‘© Consistency of replicated data, It gives higher availability and improved reliability © Users are concerned with sharing data in the form of a shared database or a set of web pages, not the disks and processors. on which they are implemented. © For example, we access shared files through a file service; we send documents to printers through a printing service; we buy goods through an electronic payment service. * The only access we have to the service is via the set of operations that it exports. For example, a file service provides read, write and delete operations on files. 26 List the types of local resources that are vulnerable to an attack by an un-trusted program that Is downloaded from a remote alte and run om a local computer. USP (ONTU : May-47, Marks 5) Ans. i + Objects inthe file system eg, file, directories can be read/written/created/deleted using the rights of the local user who rans the program. = TECHNICAL PUBLICATIONS® - on up-trust for Knowedge k

You might also like