Distributed Sysyems Flashcards

(30 cards)

1
Q

What is a distributed system according to the chapter?

A

A collection of independent computers that appears to the user as a single coherent system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the five key benefits/characteristics of distributed systems mentioned.

A

Resource sharing, Openness, Concurrency, Scalability, Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the benefit of ‘Resource Sharing’ in distributed systems.

A

Sharing of hardware and software resources across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does ‘Openness’ mean in the context of distributed systems?

A

The ability to use equipment and software from different vendors, built according to standard protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does ‘Concurrency’ enhance a distributed system?

A

It allows concurrent processing on multiple computers to enhance overall system performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ‘Scalability’ in a distributed system?

A

The ability to increase system throughput by adding new resources (scaling out or up).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define ‘Fault Tolerance’.

A

The ability of the system to continue operating correctly after a component or network has failed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are distributed systems more complex than single-processor systems?

A

Complexity arises because different parts are independently managed, and there is no single authority for top-down control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List the six key design issues for distributed systems engineering.

A

Transparency, Openness, Scalability, Security, Quality of service, Failure management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the ideal goal of ‘Transparency’ in a distributed system?

A

To make the distributed system appear as a single, coherent system, hiding the fact that its parts are separate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is achieving full transparency often impossible in practice?

A

Because parts of the system are independently managed and network delays are unavoidable, sometimes it’s better to make users aware of the distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does middleware help achieve transparency?

A

Middleware maps logical resource addresses to the physical resources where they are located.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What defines an ‘Open’ distributed system?

A

A system built according to generally accepted standards, allowing components from different suppliers to interoperate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three dimensions of Scalability mentioned?

A

Size (adding more users/resources), Distribution (geographic dispersion), and Manageability (ease of management as it grows).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between scaling-up and scaling-out?

A

Scaling-up means upgrading to a more powerful system, while scaling-out means adding more instances of the same system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is security more challenging in distributed systems compared to centralized ones?

A

There are more potential attack paths (e.g., network interception), and a breach in one part can be a ‘back door’ to others. Different organizations may also have incompatible security policies.

17
Q

Name the four general types of attacks that distributed systems must defend against.

A

Interception, Interruption, Modification, Fabrication

18
Q

Describe an ‘Interception’ attack.

A

Communications between parts of the system are intercepted by an attacker, leading to a loss of confidentiality.

19
Q

Describe an ‘Interruption’ attack.

A

System services are attacked and become unavailable, preventing them from being delivered as expected.

20
Q

Describe a ‘Modification’ attack.

A

An attacker intercepts and alters data or services within the system.

21
Q

Describe a ‘Fabrication’ attack.

A

An attacker generates false information that should not exist to gain privileges or disrupt the system.

22
Q

What does ‘Quality of Service’ (QoS) reflect in a distributed system?

A

The system’s ability to deliver services dependably with an acceptable response time and throughput, especially critical for time-sensitive data like video.

23
Q

What are the three key aspects of Failure Management in a distributed system?

A

Mechanisms for discovering a failure, continuing to deliver as many services as possible despite the failure, and automatically recovering from it.

24
Q

Name the two primary types of interaction between components in a distributed system.

A

Procedural interaction and Message-based interaction.

25
Describe 'Procedural Interaction' (e.g., RPC).
A synchronous interaction where one component calls a service on another and waits for a response. It is tightly coupled.
26
Describe 'Message-Based Interaction'.
An asynchronous interaction where one component sends a message detailing a request to another and does not have to wait for an immediate response. It is loosely coupled.
27
What is a Remote Procedure Call (RPC)?
A form of procedural interaction where one component calls a function or method on a remote component as if it were a local call. The middleware handles the network communication.
28
What is the main challenge with RPCs regarding component availability?
Both the caller and the callee need to be available at the same time for the communication to succeed.
29
What is Middleware in a distributed system?
Software that acts as an intermediary to manage diverse hardware, operating systems, and programming languages, ensuring that different components can communicate and exchange data.
30
In a typical client-server system, where are the presentation and data management layers usually located?
The presentation layer is implemented on the client, while data management, application processing, and database layers are on the server(s).