Provide 2 examples of a distributed system?
The internet
Telecommunications networks
Cloud computing
TOR networks
Name the layers which the OSI model has which the TCP/IP model does not have
Session
Presentation
Explain how IaaS works
The cloud provider supplies a technical infrastructure which users can access via public or private networks.
What is a process
A process a program in execution
What is a thread
A thread is the basic unit to which the operating system allocates processor time
Another name for symmetric cryptosystems
Symmetric cryptosystems are also referred to as secret-key or shared-key systems
Explain what the letters in the CIA Triad stand for
•Confidentiality deals with keeping resources and data hidden from, or inaccessible to, unauthorized individuals.
•Integrity deals with the trustworthiness of the data or the resources.
•Availability is about having access to the data or computing services.
There are two primary reasons for replicating data, name them
Reliability
performance
Define what a distributed system is
A distributed system is a computing environment in which various components are spread across multiple computers (or other computing devices) on a network.
Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
media access control sublayer
All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity.
latency
Transmission data rate is decided by which layer
physical layer
Scaling transparency hides
system expansion
the load of data processing and transformation is put on the server side, and the client has a light implementation that is mostly concerned with retrieving and returning the data it is being asked for, with no considerable further processing
What is this
Thin client
Define the term fault tolerance
Ability of a system to continue functioning in the event of a partial failure.
Mention two features of a DFS
HA
Security
High reliability
Data integrity
Scalability
Performance
Ease of use
Give an example of a layered architecture
OSI
What is a Remote Procedural Call?
a communication technology that is used by one program to make a request to another program for utilizing its service on a network without even knowing the network's details
What function does the session layer provide
It provides dialog control, to keep track of which party is currently talking, and it provides synchronization facilities.
Define what an absolute path is
An absolute path is defined as specifying the location of a file or directory from the root directory(/).
List 3 services which digital signatures provide
Message authentication
Data integrity
non repudiation
Which layer is responsible for process to process delivery in a general network model?
Transport layer
Explain how a client server architecture works
The server is where all the work processes are, while the client is where the user interacts with the service and other resources (remote server).
The client can then request from the server, and the server will respond accordingly
The benefits of a multi-threaded programming can be broken down into 4 categories, name them
Responsiveness
Resource sharing
Economy
Scalability
Define Portability
the extent an application developed for a distributed system A can be executed, without modification, on a different distributed system B that implements the same interfaces as A
Define extensibility
the extent an open distributed system should be easily configured out of different components
In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is
Application layer
According to (Kopetz and Verissimo, 1993) dependability is a term that covers a number of useful requirements for distributed systems, list them?
•1. Availability
•2. Reliability
•3. Safety
•4. Maintainability
List the major components of the Unix operating System architecture
Kernel
Shell
Commands and Utilities
User Applications
Explain the deference between user level threads and kernal level threads
•User Level Threads − User managed threads. Supported above the kernel and managed without kernel support
•Kernel Level Threads − Operating System managed threads acting on kernel. Supported and managed directly by the operating system.
Explain how the no leader architecture works
Every server in this architecture can receive writes and function as a replica model.
Explain how the single leader architecture works
one server accepts client writes and replicas pull data from it
Scalability is generally considered concerning hardware and software.
Explain what hardware scalability refers to
In hardware, scalability refers to the ability to change workloads by altering hardware resources such as processors, memory, and hard disc space.
Define what an intermittent fault is
faults that occur, then vanishes of its own accord, then reappears.
Explain how semi synchronous replication works
•In Semi-synchronous Replication, once the Master node updates its own copy of the data, it synchronously replicates the data to a subset of Replicas and asynchronously to others.
Fault Tolerance is needed in order to provide 3 main feature to distributed systems, name them
Reliability
Availability
Security
List the phases of fault tolerance
•1)Fault Detection
•2)Fault Diagnosis
•3)Evidence Generation
•4)Assessment
•5)Recovery
Give an example of a hard fault and a soft fault
Hard fault - failed component, power fail, fire, flood, design error (usually software), sabotage
Soft fault- specification error, design error, coding error, e.g. use on un-initialized variables, integration error
explain how one way functions work
it is computationally infeasible to find the input that corresponds to a known output
Provide 4 benefits of multi-threaded processes
multitasking
Explain vertical scalability with an example
Upgrading a server
Explain how Raid 1 works
Data are stored twice by writing them to both the data drive (or set of data drives) and a mirror drive (or set of drives). If a drive fails, the controller uses either the data drive or the mirror drive for data recovery and continuous operation
Explain how RAID 0 works
RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple storage devices, such as hard disks or solid-state drives (SSDs), in a redundant array of independent disks (RAID) group.
Explain the difference between grid computing and cluster computing
Cluster computing: In cluster computing you have a collection of connected computers that work together as a unit to perform operations together, functioning in a single system.
•Grid computing: In grid computing, the subgroup consists of distributed systems, which are often set up as a network of computer systems, each system can belong to a different administrative domain and can differ greatly in terms of hardware, software, and implementation network technology.
Mention the false assumptions that everyone makes when developing a distributed application for the first time
•1. The network is reliable.
•2. The network is secure.
•3. The network is homogeneous.
•4. The topology does not change
•5. Latency is zero.
•6. Bandwidth is infinite.
•7. Transport cost is zero.
•8. There is one administrator.
Explain how asymmetric cryptosystems work
•In an asymmetric cryptosystem, the keys for encryption and decryption are different, but together form a unique pair.
•One of the keys in an asymmetric cryptosystem is kept private; the other is made public.
"Shinobi are human too. Maybe it’s impossible to become an emotionless tool. I’ve lost."
Zabuza (Naruto)
A good cryptography algorithm (cryptosystem) has three properties, what are they
Ciphertext should look random
There is no way to extract the original plaintext or key from the ciphertext
Keys should be long enough to make a brute-force attack not feasible.