Harsh Jain - Assignment
Harsh Jain - Assignment
Harsh Jain - Assignment
Harsh JAIN
TCA1609045
Sec B
Ques3) Draw the architecture of remote method invocation and discuss its working.
The remote reference layer - remote reference behavior (such as invocation to a single
object or to a replicated object)
The transport layer - connection set up and management and remote object tracking
The application layer sits on top of the RMI system. The relationship between the layers is
shown in the following figure.
A remote method invocation from a client to a remote server object travels down through the
layers of the RMI system to the client-side transport, then up through the server-side
transport to the server.A client invoking a method on a remote server object actually makes
use of a stub or proxy for the remote object as a conduit to the remote object. A client- held
reference to a remote object is a reference to a local stub. This stub is an implementation of
the remote interfaces of the remote object and forwards invocation requests to that server
object via the remote reference layer. Stubs are generated using the rmic compiler.
The remote reference layer is responsible for carrying out the semantics of the
invocation.The transport layer is responsible for connection setup, connection
management, and keeping track of and dispatching to remote objects (the targets of remote
calls) residing in the transport's address space.The skeleton for a remote object makes an
up call to the remote object implementation which carries out the actual method call.
Ans4) Digital signature is used to verify authenticity, integrity, non-repudiation ,i.e. it is assuring
that the message is sent by the known user and not modified.a digital signature is a technique
that binds a person/entity to the digital data. This binding can be independently verified by
receiver as well as any third party.In real world, the receiver of message needs assurance that
the message belongs to the sender and he should not be able to repudiate the origination of
that message. This requirement is very crucial in business applications, since likelihood of a
dispute over exchanged data is very high. That is why digital signature is needed in distributed
system.
Ans5) Edge chasing algorithm to detect deadlock in distributed systems.In edge chasing
algorithm, a special message called probe is used in deadlock detection. A probe is a triplet (i,
j,k) which denotes that process Pi has initiated the deadlock detection and the message is
being sent by the home site of process Pj to the home site of process Pk. Uses of edge
chasing algorithm are:-
-There is no need for special data structure. A probe message, which is very small and
involves only 3 integers and a two dimensional boolean array dependent is used in the
deadlock detection process.
-At each site, only a little computation is required and overhead is also low
-Unlike other deadlock detection algorithm, there is no need to construct any graph or pass
nor to pass graph information to other sites in this algoirthm.
-Algorithm does not report any false deadlock (also called phantom deadlock).
Ques6) What is key distribution centre and discuss its significance in distributed
transaction.
Ans6) Key distribution system is an important issue in wireless sensor network (WSN) design.
There are many key distribution schemes in the literature that are designed to maintain an
easy and at the same time secure communication among sensor nodes. The most accepted
method of key distribution in WSNs is key predistribution, where secret keys are placed in
sensor nodes before deployment. When the nodes are deployed over the target area, the
secret keys are used to create the network. Significance of key distribution system are:-
- A malicious user would have to obtain the private key of a legitimate user before being
able to mount a brute-force or dictionary attack to discover the user's passphrase.
Ques7) What are nested transaction? How can we maintain timestamp ordering in
distributed transaction?
Ans7) A nested transaction is a database transaction that is started by an instruction within
the scope of an already started transaction.An older transaction should commit before a
younger transaction, since the older transaction enters the system before the younger
one.Timestamp- based concurrency control techniques generate serializable schedules
such that the equivalent serial schedule is arranged in order of the age of the participating
transactions.
Ans8)There are mainly two limitations of the distributed system which are as following:
1. Absence of a Global Clock:
In a distributed system there are a lot of systems and each system has its own clock. Each
clock on each system is running at a different rate or granularity leading to them
asynchronous. In starting the clocks are regulated to keep them consistent, but only after
one local clock cycle they are out of the synchronization and no clock has the exact time.
Distributed systems have not any physically shared memory, all computers in the distributed
system have their own specific physical memory. As computer in the distributed system do
not share the common memory, it is impossible for any one system to know the global state
of the full distributed system. Process in the distributed system obtains coherent view of the
system but in actual that view is partial view of the system.
Ans10) Kerberos is a network authentication protocol that works by using secret key
cryptography.The main components of Kerberos are:
1. Authentication Server (AS):
The Authentication Server performs the initial authentication and ticket for Ticket Granting
Service.
2. Database:
database.
The Ticket Granting Server issues the ticket for the Server