Class Notes
Class Notes
Class Notes
1.Resources Sharing
Distributed system enable efficient sharing of resources such as
processing power, storage and data among the different nodes in that
distributed network.
2.Transparancy
Distributed system hide the distribution of resources and processes,
provides a unified and transparent view of the system.
3.Concurrency
distributed systems support concurrent execution of multiple tasks or
processs across the different nodes.
4.Scalability
Distributed system facilitate the easy expansion of system by adding
more nodes to handle increased workload.
5.Performance optimization
Distributed system optimize the overall system performance by
distributing the computation and data preprocessing.
1.7 Comparison Between Centralized System and Distributed
System
Type of transparency
a. Access transparency: enables local and remote resources to be
accessed using identical operations.
b. Location transparency: enables resources to be accessed without
knowledge of their location.
c. Concurrency transparency: enables several processes to operate
concurrently using shared resources without interference between
them.
d. Replication transparency: enables multiple instances of resources to
be used to increase reliability and performance without knowledge of
the replicas by users or application programmers. `
e. Failure transparency: enables the concealment of faults, allowing
users and application programs to complete their tasks despite the
failure of hardware or software components.
f. Mobility transparency: allows the movement of resources and clients
within asystem without affecting the operation of users or programs.
g. Performance transparency: allows the system to be reconfigures to
implement performance as loads vary.
h. Scaling transparency: allows the system and applications to expand
in scale without change to the system structure or the application
algorithms.
i. Access and location transparency together provide network
transparency
2. Grid Computing
Grid computing is a distributed architecture of multiple computers
connected by networks to accomplish a joint task. These tasks are
compute-intensive and difficult for a single machine to handle. Several
machines on a network collaborate under a common protocol and work
as a single virtual supercomputer to get complex tasks done. This offers
powerful virtualization by creating a single system image that grants
users and applications seamless access to IT capabilities.
1.13 Basic of Operating System
2.Memory Management
• The OS manages the computer's memory, including RAM and
cache.
• Allocation and Deallocation: It allocates memory to processes
when they need it and deallocates it when it's no longer required.
• Virtual Memory: The OS uses techniques like paging and
segmentation to extend the available memory by using disk space,
making it appear as if there is more memory than physically
available.
3.File System Management
• The OS provides a way to store, retrieve, and organize data on
storage devices (e.g., hard drives, SSDs).
• File Organization: It organizes data in files and directories,
providing a structured way to manage information.
• Access Control: The OS controls who can access or modify files,
ensuring data security.
4.Device Management
• The OS manages input and output devices, such as keyboards,
mice, printers, and storage devices.
• Device Drivers: The OS uses device drivers to communicate with
hardware devices, ensuring they operate correctly.
• I/O Operations: It manages all input/output
Process Program
Process is active entity. Program is passive entity.
Process is a sequence of instruction Program contains the instructions.
executions.
Process is a dynamic entity. Program is a static entity.
Specific task oriented. Execution instance of a program.
Single Entity Multiple entities working together.
Lifespan longer Lifespan Limited
1.15 Process State Diagram
A process is a program in execution and it is more than a program code called as
text section and this concept works under all the operating system because all the
task perform by the operating system needs a process to perform the task
The process executes when it changes the state. The state of a process is defined
by the current activity of the process.
It is important to know that only one process can be running on any processor at
any instant. Many processes may be ready and waiting.
The ISO-OSI model is a seven layer architecture. It defines seven layers or levels
in a complete communication system. They are:
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Datalink Layer
7. Physical Layer
Fig. OSI seven-layer network architecture
1. Physical Layer
Purpose: Deals with the physical connection between devices and the
transmission and reception of raw binary data over a physical medium (like
cables, radio frequencies).
Functions: Bit transmission, signaling, interfacing, hardware (cables, switches,
NICs).
2. Data Link Layer
Purpose: Responsible for node-to-node data transfer and error
detection/correction from the Physical layer.
Functions: Frame creation, MAC addressing, error detection/correction, flow
control, switches.
3. Network Layer
Purpose: Manages data routing, forwarding, and addressing in the network.
Functions: Logical addressing (IP addresses), packet forwarding, routing, error
handling, congestion control, routers.
4. Transport Layer
Purpose: Ensures complete data transfer between host systems.
Functions: End-to-end communication, error recovery, flow control, data
segmentation, reliability (TCP, UDP).
5. Session Layer
Purpose: Manages sessions or connections between applications.
Functions: Session establishment, maintenance, and termination,
synchronization, dialog control.
6. Presentation Layer
Purpose: Translates data between the application layer and the network format.
Ensures that data is readable by the receiving system.
Functions: Data encryption/decryption, data compression, data translation
(syntax and semantics).
7. Application Layer
Purpose: Closest to the end-user, it interacts with software applications that
implement a communicating component.
Functions: Provides network services to end-users, such as email, file transfer,
and remote desktop.
1.Peer-To-Peer network
➢ Peer-To-Peer network is a network in which all the computers are linked
together with equal privilege and responsibilities for processing the data.
➢ Peer-To-Peer network is useful for small environments, usually up to 10
computers.
➢ Peer-To-Peer network has no dedicated server.
➢ Special permissions are assigned to each computer for sharing the
resources, but this can lead to a problem if the computer with the resource
is down.
Advantages Of Peer-To-Peer Network:
o It is less costly as it does not contain any dedicated server.
o If one computer stops working but, other computers will not stop working.
o It is easy to set up and maintain as each computer manages itself.
Disadvantages Of Peer-To-Peer Network:
o In the case of Peer-To-Peer network, it does not contain the centralized
system . Therefore, it cannot back up the data as the data is different in
different locations.
o It has a security issue as the device is managed itself.
2.Client/Server Network
➢ Client/Server network is a network model designed for the end users called
clients, to access the resources such as songs, video, etc. from a central
computer known as Server.
➢ The central controller is known as a server while all other computers in the
network are called clients.
➢ A server performs all the major operations such as security and network
management.
➢ A server is responsible for managing all the resources such as files,
directories, printer, etc.
➢ All the clients communicate with each other through a server. For example,
if client1 wants to send some data to client 2, then it first sends the request
to the server for the permission. The server sends the response to the client
1 to initiate its communication with the client 2.
1.Minicomputer Model
2.Workstation Model
3.Workstation-Server Model
4.Processor-Pool Model
➢ The processor-pool model is based on the observation that most of the time
a user does not need any computing power but once in a while the user may
need a very large amount of computing power for a short time.
➢ Therefore, unlike the workstation-server model in which a processor is
allocated to each user, in processor-pool model the processors are pooled
together to be shared by the users as needed.
➢ The pool of processors consists of a large number of microcomputers &
minicomputers attached to the network.
➢ Each processor in the pool has its own memory to load & run a system
program or an application program of the distributed computing system.
➢ In this model no home machine is present & the user does not log onto any
machine.
➢ This model has better utilization of processing power & greater flexibility.
➢ Example: Amoeba & the Cambridge Distributed Computing System.
5.Hybrid Model:
OSI TCP/IP
OSI stands for Open Systems TCP/IP stands for Transmission
Interconnection Control Protocol/Internet Protocol
It has 7 layers It has 4 layers
It is low in usage It is mostly used
It is vertically approached It is horizontally approached
Delivery of the package is guaranteed Delivery of the package is not
in OSI Model guaranteed in TCP/IP Model
It is less reliable than TCP/IP Model It is more reliable than OSI Model
Error Handling Built into Data Link Error Handling Built into protocols
and Transport layers like TCP
1.21 Compare Network operating system and Distributed system.