Fundamental Interaction Model - Computer Networks and Telematics

Fundamental Interaction Model
♦ Synchronous distributed system
8 time to execute each step of computation within a process has known lower
and upper bounds
8 message delivery times are bounded to a known value
8 each process has a clock whose drift rate from real time is bounded by a
known value
♦ Asynchronous distributed system: no bounds on
8 process execution times
8 message delivery times
8 clock drift rate
♦ Note
8 synchronous distributed systems are easier to handle, but determining
realistic bounds can be hard or impossible
8 asynchronous systems are more abstract and general: a distributed algorithm
executing on one system is likely to also work on another one
Distributed Systems - Fall 2001
II - 25
© Stefan Leue 2001
tele
Fundamental Interaction Model
© Pearson Education 2001
♦ Event ordering
8 as we will see later, in a distributed system it is impossible for any process to
have a view on the current global state of the system
8 possible to record timing information locally, and abstract from real time
(logical clocks)
8 event ordering rules
– if e1 and e2 happen in the same process, and e2 happens after e1, then
e1 → e2
– if e1 is the sending of a message m and e2 is the receiving of the same
message m, then e1 → e2
hence, → describes a partial ordering relation on the set of events in the
distributed system
Distributed Systems - Fall 2001
II - 26
© Stefan Leue 2001
tele
Fundamental Interaction Model
♦ Event ordering
8 as we will see later, in a distributed system it is impossible for any process to
have a view on the current global state of the system
8 possible to record timing information locally, and abstract from real time
(logical clocks)
8 event ordering rules
– if e1 and e2 happen in the same process, and e2 happens after e1, then
e1 → e2
– if e1 is the sending of a message m and e2 is the receiving of the same
message m, then e1 → e2
hence, → describes a partial ordering relation on the set of events in the
distributed system
Distributed Systems - Fall 2001
II - 27
© Stefan Leue 2001
tele
Failures
© Pearson Education 2001
♦ Omission Failures
8 process omission failures: process crashes
– detection with timeouts
– crash is fail-stop if other processes can detect with certainty that process
has crashed
8 communication omission failures: message is not being delivered (dropping
of messages)
– possible causes:
inetwork transmission error
ireceiver incomming message buffer overflow
♦ Arbitrary failures
8 process: omit intended processing steps or carry out unwanted ones
8 communication channel: e.g., non-delivery, corruption or duplication
Distributed Systems - Fall 2001
II - 28
© Stefan Leue 2001
tele
Failures
© Pearson Education 2001
© Pearson Education 2001
Distributed Systems - Fall 2001
II - 29
© Stefan Leue 2001
tele
Security
© Pearson Education 2001
♦ Protecting access to objects
8 access rights
8 in client server systems: involves authentication of clients
♦ Protecting processes and interactions
8 threats to processes: problem of unauthenticated requests / replies
– e.g., "man in the middle"
8 threats to communication channels: enemy may copy, alter or inject
messages as they travel across network
– use of “secure” channels, based on cryptographic methods
♦ Denial of service
8 e.g., “pings” to selected web sites
8 generating debilitating network or server load so that network services
become de facto unavailable
♦ Mobile code
8 requires executability privileges on target machine
8 code may be malicious (e.g., mail worms)
Distributed Systems - Fall 2001
II - 30
© Stefan Leue 2001
tele
Computer Networks
♦ Computer Networks
"interconnected collection of autonomous computers" [Tanenbaum 1996]
♦ Types of Networks
8 Local Area Networks (LANs)
– high-speed communication on proprietary grounds (on-campus)
– most typical solution: Ethernet with 100 Mbps
8 Metropolitan Area Networks
– high-speed communication for nodes distributed over medium-range
distances, usually belonging to one organization
– providing "back-bone" to interconnect LAN's
– technology often based on ATM, FDDI or DSL
– typical example: the University-network:
iATM based
i155 Mbit/s
iTransports data and voice (telephony)
Distributed Systems - Fall 2001
II - 31
© Stefan Leue 2001
tele
Computer Networks
♦ Types of Networks
8 Wide Area Networks
– communication over long distances
– covers computers of different organizations
– high degree of heterogeneity of underlying computing infrastructure
– involves routers
– speeds up to a few Mbps possible, but around 50-100 Kbps more typical
– most prominent example: the Internet
8 Wireless Networks
– end user equipment accesses network through short or mid range radioor infrared signal transmission
– Wireless WANs
iGSM (up to about 20 Kbps)
iUMTS (up to Mbps)
iPCS
– Wireless LANs/MANs
iWaveLAN (2-11 Mbps, radio up to 150 metres)
– Wireless Personal Area Networks
ibluetooth (up to 2 Mbps on low power radio signal, < 10 m distance)
Distributed Systems - Fall 2001
II - 32
© Stefan Leue 2001
tele
Computer Networks
♦ Network Type Performance Characteristics
© Pearson Education 2001
Distributed Systems - Fall 2001
II - 33
© Stefan Leue 2001
tele
Computer Networks
♦ Network topologies for point-to-point networking
© Prentice-Hall 1996
Star
• short paths (always
2 hops)
• robust against leaf
node failure
• but: whole network
down if central node
fails
• sometimes physical
star used to
implement logical
ring
Distributed Systems - Fall 2001
Ring
• varying path
lengths
• robust against
node failure
• basis for Token
Ring and FDDI
LANs
II - 34
Tree
• varying, relatively long
path lengths
• robust against leaf node
failure
• sensitive to internal node
failure
• suitable topology for
multicast / broadcast
applications
© Stefan Leue 2001
tele
Computer Networks
♦ Network topologies for point-to-point networking
© Prentice-Hall 1996
Mesh
• completely connected
graph
• short paths (always 1
hop)
• robust against node
failure
• expensive point-to-point
wireline implementaion
• inexpensive shared ether
implementation
Distributed Systems - Fall 2001
Intersecting Rings
• internetworking for token
ring networks
• sensitive to bridge node
failure
II - 35
Irregular
• most commonly found
Wide Area Network
topology
© Stefan Leue 2001
tele