Distributed Systems Flashcards

1
Q

What are the two ways a hard drive disk is split up?

A

Into:
- Sectors (like pizza slices)
- Tracks (concentric rings)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does ‘block’ describe in terms of a hard drive disk?

A

The areas between sector boundaries and track boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a cylinder in relation to hard disk drives?

A

A collection of tracks with the same index number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When does fragmentation occur in hard disk storage?

A

When storage is lost due to a block being underused and files are fit into leftover spaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens when a hard disk is more fragmented?

A

The disk head spends more time moving back and forth and the read/write efficiency decreases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What memory does a solid state drive use?

A

Flash memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a solid state drive differ from a hard disk?

A

Solid state drive has no moving parts so no read/write head and no platter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a solid state drive made of?

A

Transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the advantages of a solid state drive over a hard disk?

A

-Faster than hard drive
- Quieter, uses less power
- More tolerant to being moved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is partitioning?

A

The traditional method where disks are divided and each partition is used for a specific purpose and can’t overflow into other sections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do we use now instead of disk partitioning?

A

Volume management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the features of a logical volume?

A
  • can span more than one physical hard drive
  • several physical hard drives are seen as one big disk
  • LVs can be resized easily
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does RAID mean?

A

Multiple physical disk drives forming a logical unit of storage
(redundant array of independent disks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are four benefits of RAID?

A

Reliability, performance, capacity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are index nodes (inodes)?

A

Structures that store information about each unix file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does an inode store for regular files, directory files, and special files?

A

regular, directory: location of disk blocks
special file: identifies peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How many inodes can a file have?

A

Always 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do inodes store for all file types?

A
  • file type
  • file permissions
  • owner
  • hard link count
  • last modification time and last access time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a boot block?

A

The first logical block disk that contains executable code for when UNIX is first activated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a superblock?

A

Second logical block of a disk that contains info about the disk including bitmap of free blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the first two logical blocks of a disk?

A

1 bootblock
2 superblock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is mounting?

A

File systems from other devices can be attached to the original directory hierarchy - can be done automatically when booting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does mounting allow?

A

Allows users to access files seamlessly even when they’re on other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How are large unix systems usually stored?

A

Over many devices with each device holding a subtree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are some features of NFS (network files system)?

A
  • widely available
  • clients mount partitions of a server as though the partitions were physically connected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does NFS allow low cost computers to do?

A

Share the same high capacity disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the two ways mounting can be set up for workstations using NFS?

A
  • mounting at boot time
  • mounting when referenced
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How are files represented on NFS mounted filesystems?

A

file handles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does it mean when an NFS file handle is opaque?

A

A client can’t interpret it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does it mean for an NFS file handle to have meaning?

A

A server can interpret the contents of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the three key parts of a UNIX file handle?

A
  • file identifier
  • file system identifier
  • generation count (incremented each time a file is unlinked and recreated)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What do NFS file handles not include? and why?

A

A pathname, this can change while a file is being accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What two protocols is NFS based on?

A

MOUNT
NFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the MOUNT protocol used for in NFS?

A

initial negotiation between NFS client and server
- allowing the client to know which file systems are available and what their file handles are
And used to mount remote directories to the client’s local file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the NFS protocol used for in NFS?

A
  • allows users to perform file and directory operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What does SAMBA do?

A

Allows UNIX filesystems to be shared to windows and makes the UNIX file systems look like windows filesystems
- and can allow UNIX systems to access windows filesystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Describe the client-server model in simple terms.

A

The client (application on your machine) contacts the server which accepts instructions and returns data

38
Q

What two pieces of software are involved in email

A
  • email interface program
  • mail transfer program
39
Q

What are the 3 main categories of protocols used within email?

A

Transfer, access, representation

40
Q

What does a transfer protocol do within email?

A

Protocol used to move a copy of an email message from one computer to another

41
Q

What does an access protocol do within email?

A

Allows a user access to their mailbox and to send and receive messages

42
Q

What does a representation protocol do within email?

A

Specifies the format of an email message when stored on disk

43
Q

What does SMTP stand for? What is it?

A

Simple Mail Transfer Protocol, it’s the standard protocol used by mail transfer programs

44
Q

What does SMTP do?

A

Transfers text, allows sender to specify recipients name and check them, sends only one copy of a given message

45
Q

What actions are possible as part of mail access?

A

A user can view their mailbox, view headers, download, delete or send messages

46
Q

Why do ISPs offer email services?

A

Because most users do not leave their computer running all the time and don’t know how to configure email

47
Q

When ISPs run email services, what do they provide users with?

A

a mailbox for each user and an interface for them to view it with, with special purpose interface applications for mobile devices

48
Q

What does POP stand for? What is it?

A

Post Office Protocol, a mail access protocol

49
Q

What does IMAP stand for?

A

Internet Mail Access protocol

50
Q

What basic services are offered by both POP and IMAP?

A
  • users can access mailbox
  • users can view headers, download, delete, send
  • Email client runs on user’s personal computer
  • server runs on computer where the mailbox is stored
51
Q

What are the two ways of representing email messages?

A

RFC2822 mail message format
- MIME (multi-purpose internet mail extensions)

52
Q

What does MIME stand for?

A

Multi-purpose Internet Mail Extensions

53
Q

How are emails represented using RFC2822?

A
  • Mail message represented as a text file consisting of:
    header, blank line, body
54
Q

How are email messages represented using MIME?

A
  • extends SMTP so images and binary data can be represented
  • users can divide messages into several parts so image attachment can be encoded differently from a spreadsheet
  • emails are displayed as more than plain text
55
Q

What does FTP stand for?

A

File transfer protocol

56
Q

What are some characteristics of FTP?

A
  • arbitrary file contents
  • bidirectional transfer
  • support for authentication and ownership
  • ability to browse folders’
  • textual control messages
57
Q

What common action is FTP the common protocol for?

A

Users requesting a download from a browser

58
Q

What are the two types of connection made by FTP?

A

Control connection AND data connection

59
Q

What does DNS stand for?

A

Domain Name System

60
Q

What is DNS for?

A

Translating between symbolic names and IP addresses

61
Q

Who uses DNS?

A

Applications (which then becomes a client to the DNS server)

62
Q

How are domain names
structured?

A

Hierarchically, most important on the right
e.g. marian.cs.nott.ac.uk

63
Q

DNS database is a ____ system

A

distributed

64
Q

When an application acts as a client, what resolution does it request?

65
Q

When a server acts a client what resolution does it request?

66
Q

What are the three main aspects of computer security?

A

Confidentiality
Integrity
Availability

67
Q

What are the three things we are trying to achieve with computer security?

A
  • Authentication
  • Authorisation
  • Non-repudiation
68
Q

What does confidentiality mean? And what can it encompass?

A

Means keeping information secret from those who should not know it
encompasses: privacy and secrecy

69
Q

What does integrity mean in computer security?

A

Ensuring things are not altered without permission

70
Q

What does maintaining integrity require?

A

Only authorised users perform authorised actions on resources they are authorised to use

71
Q

What does availability mean in computer security?

A

Ensuring that legitimate users of a system have reasonable and reliable access to their systems

72
Q

What is cryptography?

A

The use of a key to encode/decode a message

73
Q

What are the two types of key encryption?

A

Secret key encryption and public key encryption

74
Q

What are three methods for maintaining data security?

A
  • hash functions
  • cryptography
  • digital signatures and digital certificates
75
Q

What is the purpose of digital signatures and certificates?

A

Verify integrity of data and identity of sender

76
Q

What is a hash function?

A

An algorithm that transforms a message into a fixed length hash key (hash)

77
Q

How does public key encryption work?

A

Messages are encrypted using public key
- messages are decoded with secret key

78
Q

What is a common use of public key encryption?

A

Secure web purchases

79
Q

What is a drawback of secret key encryption?

A

You need to keep the secret key secret and also send it to the other party for decoding

80
Q

What is the purpose of a digital signature?

A

For the receiver to be certain that the message is from a particular sender

81
Q

Summarise digital certificates.

A
  • Used to authenticate a user, device, or server
  • Issued by trusted third party, CA
  • Contains: certified public keys, information about certificate holder
82
Q

What is proven when digital signatures are used together with digital certificates?

A
  • Sender is authentic, message has not been tampered with
83
Q

What does VPN stand for?

A

Virtual Private Network

84
Q

What are two methods of network security?

A

-VPNs
- Firewalls

85
Q

What does a VPN do?

A

It’s a connection which makes a remote network appear as if its directly connected with encrypted traffic

86
Q

What must VPNs ensure happens to packets on their path?

A

That once packets are encrypted by Ipsec they are not fragmented along the path

87
Q

What does a firewall do?

A

Allow partial connected to the internet while retaining some isolation

88
Q

Where are firewalls placed?

A

Between an organisation internal network and the external network

89
Q

What do firewalls control and limit?

A
  • control amount of traffic passing between internal and external network
  • limits amount of damage
90
Q

What can firewalls filter?

A
  • filter packets from a particular source
  • filter traffic for a particular service
  • filter traffic from a particular source or port number
91
Q

What are 2 types of firewalls?

A

Packet filters (chokes)
Proxies (gates)

92
Q

What is a demilitarised zone in the context of a network firewall?

A

A section of devices offered limited protection