Parcial 1 Flashcards

Examen (79 cards)

1
Q

It is a main motivation for constructing distributed systems

A

The sharing of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When all computer systems can fail and the responsability of system designers is to plan for the consequences of it, is called:

A

Independent failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is one in which components located at networked computers communicate and coordinate their actions only by passing messages

A

A distributed systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

They are three examples of distributed systems

A

Internet, Intranet and Ubiquitous computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is the capacity of the system to handle shares resources can be increased by adding more resources to the network

A

Concurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Its role is to protect an intranet by preventing unauthorized messages leaving or entering

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The portability of many of these devices, together with their ability to connect conveniently to networks in different places, make this type of computing possible

A

Mobile computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is the harnessing of many small, cheap computational devices that are present in user physical environments, including the home, office and elsewhere

A

Ubiquitous computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is a portion of the internet that is separately administered and has a boundary that can be configures to enforce local security polices

A

An intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a vast interconnected collection of computer networks of many different types, programs running on the computers connected to it interact by passing messages, employing a common means of communication

A

The internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

They are three of the challenges in distributed systems that must be meet by designers to be aware of them are

A

Heterogeneity, Openness and Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Web is based on three main standard technological components:

A

HTML, URL and the Client-Server System Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

They are transparencies that must meet the distributed systems

A

Location, failure and performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This challenge is defined as the concealment from the user and the application programmer of the separation of components in a distributed system, so that the system is perceived as a whole rather than as a collection of independent components.

A

Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In this challenge both services and applications provide resources that can be shared by clients in a distributed systems

A

Concurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is the lowest-layer which bring the system’s programming interface up to a level that facilities communication and coordination between processes

A

System Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is concerned with the placement of a distributed system parts and the relationships between them

A

The architectural model of DS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is a layer of software whose purpose is to mask heterogeneity and provide a convenient programming model to application programmers

A

Middleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In this architecture model, a cache is stored of recently used data objects that is closer than the objects themselves

A

Proxy servers and caches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This term referrers to the structuring of software as layers or modules in a single computer and in terms of services offered and requested between processes located in the same or different computers

A

Software architecture design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It is a running program that travels from one computer to another in a network carrying out a task on someone’s behalf, such as collecting information, eventually returning the results

A

A mobile agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This is the architecture model that is most cited when distributed systems are discussed

A

Client-Server Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It is the form of distribution that integrates mobile devices and other devices into a given network with easy connection, easy integration, limited connectivity, etc.

A

Spontaneous networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Performance issues arising from the limited processing and communication capacities of computers and networks are considered under the following subheadings

A

Responsiveness, throughput and balancing computational loads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In this architecture all of the processes play similar roles, interacting cooperatively as peers to perform a distributed activity or computation without any distinction between clients and servers
Peer processes
26
Dependability issues is a requirement in most application domains. We defined the dependability of computer systems as:
Correctness, security and fault tolerance.
27
This is performed when in many cases, we are interested in knowing whether an event (sending or receiving a message) at one process occurred before, after concurrently with another event at another process.
Event ordering
28
In this type of Distributed System, the time to execute each step of a process has know lower and upper bounds
Synchronous Distributed Systems
29
Each computer in a distributed system has its own internal clock, which can be used by local processes to obtain the value of the current time. This concept refers to the relative amount that a computer clock differs from a perfect reference clock.
Clock drift rate
30
In this type of Distributed System, process execution speed, this is that each step may take an arbitrarily long time.
Asynchronous Distributed Systems
31
When it does not transport a message from p's outgoing message buffer to q's incoming message buffer which is known as 'dropping message' we are talking about:
Communication omission failure.
32
To model security threats, we postulate that this element is capable of sending any message to any process and reading or copying any message between a pair of processes
The enemy in the security model
33
In this, we talk about the secutity of a distributed system that can be achieved by securing the processes and the channels used for their interactions and by protecting the objects that they encapsulate against unauthorized access
The security model
34
Encryption, authentication and Identification some times are used to build ------------ as a service layer on top of existing communication services
Secure channels
35
In this form of communication, the sending and receiving processes synchronize at every message. In this case, both send and receive are blocking operations
The synchronous communication
36
In this form of communication, the use of the send operation is non-blocking, the receive operation can have blocking and non-blocking variants
The asynchronous communication
37
We can describe this as the guarantee to deliver the message despite a reasonable number of packets being dropped or lost.
Reliability
38
This consist of transmitting a message between a socket in one process and a socket in another process.
Inter-process communication
39
Any process may make use of multiple of these elements to receive messages, but a process cannot share them with other processes on the same computer
Ports
40
The internet protocols and the local port pairs define the:
The message destination
41
Both forms of communications (UDP and TCP) use ________ which provides and endpoint for communication between processes
The socket abstraction
42
This is sent by UDP is transmitted from a sending process to a receive process without acknowledgement or retries
A datagram
43
Message passing between a pair of processes can be supported by two message communication operations
Send and receive operations
44
Messages may be dropped occasionally, either because of a checksum error or because no buffer space is available at the source or destination, it's called:
Omission failures
45
This assume that when a pair of processes are stablishing a connection, one of them plays the client role and another plays the server role, but thereafter they could be peers.
The API for stream communication
46
The TCP protocol uses an acknowledgement sheme. If the sender does not receive and acknowledgement with a time out, it retransmits the message and this is performed when:
There is lost messages
47
This defines reliable communication for channels in terms of two properties: integrity and validity
A failure model
48
They are three alternatives approaches to external data representation.
XML, CORBA and Java's object serialization.
49
This was originated from BSD 4.x UNIX and provides the abstraction of a stream of bytes to which data may be written and from which data may be read
The API to the TCP protocol.
50
This is the process of taking a collection of data items and assembling or disassembling (respectively) into a form suitable for transmission in a message
Marshalling and un-marshalling
51
The TCP protocol attempts to match the speeds of the processes that read from and write to a stream, this is called:
Flow control
52
These items transmitted in messages can be data values of many different types, and not all computers store primitive values such as integers in the same order
The individual primitive data
53
This is a markup language that was defined by the World Wide Web Consortium (W3C) for general use on the Web
XML
54
This is the speed at which data can be transferred between two computers in the network once transmission has begun
Data transfer rate
55
This is a single communication subsystem providing communication between all of the hosts that are connected to it, where the Internet is constructed from many subnets
The Internet
56
They carry messages at lower speeds between nodes that are often in different organizations and may be separated by large distances
WANs
57
Protocol layering, packet switching, Routing and data streaming are the principles on which:
Computer networks are based
58
This term is used to refer to any computer or switching device attached to a network
Node
59
This is a sequence of binary data (an array of bits and bytes) of restricted length, together with addressing information sufficient to identify the source and destination computers.
The simplest form of packet
60
The end-to-end communication must provide totally error-free; the detection of communication errors and their correction is that we call:
Reliability
61
This is the delay that occurs after a send operation is executed before data starts to arrive at the destination computer in network performance
Latency
62
The computers and other devices that use the network for communication purposes are referred to as:
Host
63
This is a communication subsystem in which several networks are linked together to provide common data communication facilities that overlay the technologies and protocols of the individual component networks and the methods used for their interconnection
An internetwork
64
This is why many network technologies support the simultaneous transmission of messaged to several recipients
Multicasting
65
This is a unit of routing (delivering data from one part of the internet to another)
A subnet
66
They are generally used to hold the video frames, but because the flow is continous as opposited to the intermittent traffic generated by typical client-server interactions and are handled somewhat differently
UDP internet packets
67
This is defined as the ability to meet deadlines when transmitting and processing streams of real-time multimedia data
Quality of service
68
This type of network is based on the high bandwidth copper and fiber optic cabling recently installed in some towns and cities for the transmission of video, voice and other data over distances of up to 50 kilometers
MAN's
69
They are composed of number of personal devices such as movile phones, tablets, digital cameras, music players and so on that are now carried by many people
WPAN's
70
This is referred to as the transmission and display of audio and video in real time. It requires much higher bandwidths than most other forms of communication in distributed systems
Streaming
71
The IEEE 802.16 WiMAX standard is targeted at this class of network. It aims to provide an alternative to wired connections to home and office buildings
WMAN's
72
In this type of switching, each packet arriving at a node is first stored in memory at the node and then processed by a program that transmits it on an outgoing circuit, which transfers the packet to another node that is closer to its ultimate destination
Packet switching
73
This is used to refer to a well-known set of rules and formats to be used for communication between processes in order to perform a given task
The term protocol
74
Their operation was simple to understand, when a caller dialed a number, the pair of wires from her phone to the local exchange was connected by an automaticswitch at the exchange to the pair of wires connected to the other party's phone
Circuit Switching
75
They are specifically designed to provide high bandwidth and low latencies and to support quality of service by the reservation of network resources.
ATM Networks
76
Most mobile phone networks are based on digital wireless network technologies such as the GSM (Global System for Mobile communication) standard, which is used in most countries of the world.
WWANs
77
This is a transmission technique that involves no switching, everything is transmitted to every node, and it is up to potential receivers to notice transmissions addressed to them.
Broadcast
78
The task of dividing messages into packets before transmission and reassembling them at the receiving computer is usually performed in the transport layer.
Packet assembly
79
When we say that a process has crashed we mean that it has halted and will no execute any further steps of it's program ever, this is a type of:
Process Omission Failure