Distributed Systems. Distributed Systems



Similar documents
Middleware Lou Somers

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS

Distributed Systems Lecture 1 1

Virtual machine interface. Operating system. Physical machine interface

Introduction CORBA Distributed COM. Sections 9.1 & 9.2. Corba & DCOM. John P. Daigle. Department of Computer Science Georgia State University

Introduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur

Middleware: Past and Present a Comparison

Distributed Systems LEEC (2005/06 2º Sem.)

Introduction to Cyber Security / Information Security

Chapter 2: Remote Procedure Call (RPC)

Client/Server Computing Distributed Processing, Client/Server, and Clusters

Chapter 6. CORBA-based Architecture. 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications

CORBA and object oriented middleware. Introduction

Lesson 4 Web Service Interface Definition (Part I)

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

Principles and characteristics of distributed systems and environments

Distributed Systems. REK s adaptation of Prof. Claypool s adaptation of Tanenbaum s Distributed Systems Chapter 1

Client-Server Applications

Accelerating PCI Compliance

2.1 What are distributed systems? What are systems? Different kind of systems How to distribute systems? 2.2 Communication concepts

Infrastructure that supports (distributed) componentbased application development

JavaPolis 2004 Middleware and Web Services Security

Architecture of the CORBA Component Model CORBA 3.0

How To Understand The Concept Of A Distributed System

Network Attached Storage. Jinfeng Yang Oct/19/2015

B) Using Processor-Cache Affinity Information in Shared Memory Multiprocessor Scheduling

Computer Science 4302 Operating Systems. Student Learning Outcomes

WebService Security. A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol

COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters

Master of Science in Computer Science

Distributed System: Definition

SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems

Cryptography and network security CNET4523

Chapter 8 A secure virtual web database environment

Distributed Computing

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation

COSC 472 Network Security

WJEC GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

Distributed Systems Architectures

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Modeling and verification of security protocols

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland

System types. Distributed systems

3F6 - Software Engineering and Design. Handout 10 Distributed Systems I With Markup. Steve Young

CS550. Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun

Windows Server 2003 migration: Your three-phase action plan to reach the finish line

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Architectural Patterns. Layers: Pattern. Architectural Pattern Examples. Layer 3. Component 3.1. Layer 2. Component 2.1 Component 2.2.

Web Services. Copyright 2011 Srdjan Komazec

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Andrew McRae Megadata Pty Ltd.

Doctor of Philosophy in Computer Science

STREAM FRBC

MEng, BSc Computer Science with Artificial Intelligence

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

iseries TCP/IP routing and workload balancing

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

CS6204 Advanced Topics in Networking

CORBA, DCOP and DBUS. A performance comparison.

How To Write A Network Operating System For A Network (Networking) System (Netware)

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Invocación remota (based on M. L. Liu Distributed Computing -- Concepts and Application

IOActive Security Advisory

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Middleware. Chapter 8: Middleware

VPN. Date: 4/15/2004 By: Heena Patel

M.S. Computer Science Program

Chapter 14: Distributed Operating Systems

Protocol Security Where?

Measurement and Analysis Introduction of ISO7816 (Smart Card)

Communication. Layered Protocols. Topics to be covered. PART 1 Layered Protocols Remote Procedure Call (RPC) Remote Method Invocation (RMI)

XII. Distributed Systems and Middleware. Laurea Triennale in Informatica Corso di Ingegneria del Software I A.A. 2006/2007 Andrea Polini

IT Networking and Security

Lecture VII : Public Key Infrastructure (PKI)

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

Service-Oriented Architecture and Software Engineering

Overview of CORBA 11.1 I NTRODUCTION TO CORBA Object services 11.5 New features in CORBA Summary

LinuxWorld Conference & Expo Server Farms and XML Web Services

Cyber Security. Global solutions for energy automation. Benefit from certified products, system solutions.

Computer Information Systems (CIS)

Base One's Rich Client Architecture

PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE

MSc Information Technology - E521

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Transcription:

Distributed Systems Prof. Steve Wilbur Department of Computer Science University College London 1 Distributed Systems... use of more than one computer connected by communications links to carry out a computational task... includes parallel computing... most contemporary professional systems 2 10/06/98 1

Course Objectives to identify special characteristics of distributed systems to identify ways user/programmer view can be simplified to identify protocols, techniques and algorithms which address DS issues 3 Why Distribute? resource sharing physical separation robustness performance cost-effective system evolution 4 10/06/98 2

Examples file server, print server, etc. networked management directory and naming services desktop (multimedia) conferences large-scale computation etc. 5 Why are DSs Different? non-zero (and variable) message transmission time probability of partial failure of collaborating components large scale environment is not totally secure 6 10/06/98 3

Message Transmission Time processors executing in parallel multi-path links between them same message may arrive at different times at different processors possibility of race situations, i.e. nondeterminism in algorithm execution (or bugs) consistency of data at different sites 7 Partial Failures - 1 not a concept found in single processor programs recovery from failures use of alternative processor migration of services update and propagation of naming/routing information 8 10/06/98 4

Partial Failures - 2 Fault tolerant algorithms leadership elections distributed synchronisation 9 Scaling Abstraction Inheritance/object orientation 10 10/06/98 5

Security computer hosts may be protectable via architecture and OS etc.... but link is very vulnerable to tapping/message reply hosts faking addresses... and hosts vulnerable to deliberate message overload faked services 11 Distributed Programming Can we arrange for programmer s view of DS to be identical to that for singleprocessor system? Simple answer is no, but we can do quite a lot 12 10/06/98 6

Remote Procedure Call - 1 common approach client-server model caller s arguments are marshalled by stubs, put in a packet and sent to remote proc. problems with memory addresses - need args to be sent by value 13 Remote Procedure Call - 2 execution semantics when failure at-least-once (cheap and easy but...) at-most-once (relatively easy) exactly once (expensive protocol) how is server located? name server based on type matching trader includes other attributes e.g. location of device, options, etc. version management too 14 10/06/98 7

Remote Procedure Call - 3 parameter security may need to pass encryption keys or other security tokens as parameters Interface Definition Language (IDL) indicates type and order of parameters signature for matching in name server possibly security indication for stubs 15 Real World often termed Middleware support by environments such as DCE, CORBA etc. 16 10/06/98 8

Transparency... is desirable, but may not be achievable: distribution - effects of distribution (delays etc.) should be invisible to user location - location of components should be irrelevant migration - remote objects may relocate during use failure - recovery from faults 17 Security Use of cryptographic techniques to deal with: secrecy authentication of individuals and messages replay and faking attacks can also provide access control to object methods 18 10/06/98 9