It4128 Abordo

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Assessment Task

MODULE 1:

1. Give five types of hardware resource and five types of data or software resource that can
usefully be shared. Give examples of their sharing as it occurs in practice in distributed
systems.

Five Types of Hardware Resource


 Printer: A printer which is placed on a network can be used by any one present on the network
node. If multiple nodes tries to use or access the common printer, they will be places in a printing
queue and printing job is done.
 Memory: A memory can be anything from storage to cache memory, which is used by different
local computers. Storage can be a hard disk drive or solid state drive which holds the data of
different clients on the network. A cache memory on server holds recently accessed pages for
faster access by local computers.
 Screen network windows system: This allows processes in remote computers to update the
content of local windows.
 Disk: Video on demand server, File server, Virtual disk server etc. which is the data stored in the
server that can be accessed as per the user request.
 CPU: Most CPU servers do some computation for their clients. Hence this is also a shared
resource.

Five Types of Data or Software Resource


 Web page: web servers enable multiple clients to share read-only page content (usually stored in
a file, but sometimes generated on-the-fly.)
 File: filer servers enable multiple clients to share read-write files. Conflict updates may result in
Inconsistent results. Most useful for files that change infrequently, such as software Binaries.
 Object: possibilities for software objects are limitless. E.g. shared whiteboard, shared diary,
room Booking system, etc.
 Database: database is intended to record the definitive state of some related sets of data. They
have been shared ever since multi-user computers appeared. They include techniques to manage
concurrent updates.
 Newsgroup content: the Netnews system make read-only copies of the recently-posted news
items available to clients throughout the Internet. A copy of newsgroup content is maintained at
each Netnews server that is an approximate replica of those at other servers. Each server makes
its data available to multiple clients.
2. Compare and contrast cloud computing with more traditional client-server computing?
What is novel about cloud computing as a concept?

Cloud computing is defined in terms of: Supporting Internet-based service (whether


application, storage or other computing-based services), where everything is a service; and
dispensing with local data storage or application software is completely consistent with
client-server computing and indeed client-server concepts support the implementation of
cloud computing. Highlights one of the key elements of cloud computing in moving to a
world where you can dispense with local services. This level of ambition may or may not be
there in client-server computing. As a final comment, cloud computing promotes a view of
computing as a utility and this is linked to often novel business models whereby services can
be rented rather than being owned, leading to a more flexible and elastic approach to service
provision and acquisition. This is a key distinction in cloud computing and represents the key
novelty in cloud computing? cloud computing is partially a technical innovation in terms of
the level of ambition, but largely a business innovation in terms of viewing computing
services as a utility.

3. A service is implemented by several servers. Explain why resources might be transferred


between them. Would it be satisfactory for clients to multicast all requests to the group of
servers as a way of achieving mobility transparency for clients?

When they needed to request responses from back end servers the web server would use a
message queue to place the request on the appropriate queue to reduce communication delays The
back end servers would monitor their queue and pull a request for processing. The response
would be put on a queue for the web server to be able to finish and post a response back to the
original requester.

MODULE 2:

Answer the following questions below

1. A search engine is a web server that responds to client requests to search in its stored
indexes and (concurrently) runs several web crawler tasks to build and update the indexes.
What are the requirements for synchronization between these concurrent activities?
The crawler tasks could build partial indexes to new pages incrementally, then merge them with
the active index (including deleting invalid references). This merging operation could be done on
an off-line copy. Finally, the environment for processing client requests is changed to access the
new index. The latter might need some concurrency control, but in principle it is just a change to
one reference to the index which should be atomic.

2. Describe possible occurrences of each of the main types of security threat (threats to
processes, threats to communication channels, denial of service) that might occur in the
Internet.

Threats to processes: without authentication of principals and servers, many threats exist. An
enemy could access other user’s files or mailboxes, or set up ‘spoof’ servers. E.g. a server could
be set up to ‘spoof’ a bank’s service and receive details of user’s financial transactions. Threats to
communication channels: IP spoofing - sending requests to servers with a false source address,
man-in-the-middle attacks. Denial of service: flooding a publicly-available service with irrelevant
messages.

3. List the types of local resource that are vulnerable to an attack by an untrusted program that is
downloaded from a remote site and run in a local computer.

 Objects in the file system e.g. files, directories can be read/written/created/deleted using
the rights of the local user who runs the program
 Network communication - the program might attempt to create sockets, connect to them,
send messages etc.
 Access to printers.
 It may also impersonate the user in various ways, for example, sending/receiving email.

MODULE 3:

Answer the following questions below

a) The Internet is far too large for any router to hold routing information for all destinations. How
does the Internet routing scheme deal with this issue?

If a router does not find the network id portion of a destination address in its routing table, it
dispatches the packet to a default address an adjacent gateway or router that is designated as
responsible for routing packets for which there is no routing information available. Each router’s
default address carries such packets towards a router than has more complete routing information,
until one is encountered that has a specific entry for the relevant network id.
b) Describe how you would configure a firewall to protect the local network at your institution or
company. What incoming and outgoing requests should it intercept?

If an attacker is able to gain administrative access to your firewall it is “game over” for your network
security. Therefore, securing your firewall is the first and most important step of this process. Never
put a firewall into production that is not properly secured by at least the following configuration
actions:

 Update your firewall to the latest firmware.


 Delete, disable, or rename any default user accounts and change all default passwords. Make
sure to use only complex and secure passwords.
 If multiple administrators will manage the firewall, create additional administrator accounts
with limited privileges based on responsibilities. Never use shared user accounts.
 Disable simple network management protocol (SNMP) or configure it to use a secure
community string.

c) What are the disadvantages of using network-level broadcasting to locate resources:

a) in a single Ethernet?
The single internet is a simple which uses the transmission medium to pass the singles even
though all the message in broadcasting are handled by the operating system or by standard
process.
An Ethernet connection is known as 'wired' and is quicker and more secure than Wi-Fi. A
disadvantage is that the Ethernet cable connecting the computer and router needs to be in
place at all times.

b) in an intranet?
Broadcasting is hardly feasible in a large-scale network such as the Internet. It might just be
possible in an intranet, but ought to be avoided for the reasons given above.
Ethernet multicast addresses are matched in the Ethernet controller. Multicast message are
passed up to the OS only for addresses that match multicast groups the local host is
subscribing to. If there are several such, the address can be used to discriminate between
several daemon processes to choose one to handle each message.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy