Parcial 1 Flashcards

Examen

1
Q

It is a main motivation for constructing distributed systems

A

The sharing of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When all computer systems can fail and the responsability of system designers is to plan for the consequences of it, is called:

A

Independent failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is one in which components located at networked computers communicate and coordinate their actions only by passing messages

A

A distributed systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

They are three examples of distributed systems

A

Internet, Intranet and Ubiquitous computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is the capacity of the system to handle shares resources can be increased by adding more resources to the network

A

Concurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Its role is to protect an intranet by preventing unauthorized messages leaving or entering

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The portability of many of these devices, together with their ability to connect conveniently to networks in different places, make this type of computing possible

A

Mobile computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is the harnessing of many small, cheap computational devices that are present in user physical environments, including the home, office and elsewhere

A

Ubiquitous computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is a portion of the internet that is separately administered and has a boundary that can be configures to enforce local security polices

A

An intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a vast interconnected collection of computer networks of many different types, programs running on the computers connected to it interact by passing messages, employing a common means of communication

A

The internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

They are three of the challenges in distributed systems that must be meet by designers to be aware of them are

A

Heterogeneity, Openness and Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Web is based on three main standard technological components:

A

HTML, URL and the Client-Server System Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

They are transparencies that must meet the distributed systems

A

Location, failure and performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This challenge is defined as the concealment from the user and the application programmer of the separation of components in a distributed system, so that the system is perceived as a whole rather than as a collection of independent components.

A

Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In this challenge both services and applications provide resources that can be shared by clients in a distributed systems

A

Concurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is the lowest-layer which bring the system’s programming interface up to a level that facilities communication and coordination between processes

A

System Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is concerned with the placement of a distributed system parts and the relationships between them

A

The architectural model of DS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is a layer of software whose purpose is to mask heterogeneity and provide a convenient programming model to application programmers

A

Middleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In this architecture model, a cache is stored of recently used data objects that is closer than the objects themselves

A

Proxy servers and caches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This term referrers to the structuring of software as layers or modules in a single computer and in terms of services offered and requested between processes located in the same or different computers

A

Software architecture design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It is a running program that travels from one computer to another in a network carrying out a task on someone’s behalf, such as collecting information, eventually returning the results

A

A mobile agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This is the architecture model that is most cited when distributed systems are discussed

A

Client-Server Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It is the form of distribution that integrates mobile devices and other devices into a given network with easy connection, easy integration, limited connectivity, etc.

A

Spontaneous networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Performance issues arising from the limited processing and communication capacities of computers and networks are considered under the following subheadings

A

Responsiveness, throughput and balancing computational loads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In this architecture all of the processes play similar roles, interacting cooperatively as peers to perform a distributed activity or computation without any distinction between clients and servers

A

Peer processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Dependability issues is a requirement in most application domains. We defined the dependability of computer systems as:

A

Correctness, security and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This is performed when in many cases, we are interested in knowing whether an event (sending or receiving a message) at one process occurred before, after concurrently with another event at another process.

A

Event ordering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In this type of Distributed System, the time to execute each step of a process has know lower and upper bounds

A

Synchronous Distributed Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Each computer in a distributed system has its own internal clock, which can be used by local processes to obtain the value of the current time. This concept refers to the relative amount that a computer clock differs from a perfect reference clock.

A

Clock drift rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In this type of Distributed System, process execution speed, this is that each step may take an arbitrarily long time.

A

Asynchronous Distributed Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When it does not transport a message from p’s outgoing message buffer to q’s incoming message buffer which is known as ‘dropping message’ we are talking about:

A

Communication omission failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

To model security threats, we postulate that this element is capable of sending any message to any process and reading or copying any message between a pair of processes

A

The enemy in the security model

33
Q

In this, we talk about the secutity of a distributed system that can be achieved by securing the processes and the channels used for their interactions and by protecting the objects that they encapsulate against unauthorized access

A

The security model

34
Q

Encryption, authentication and Identification some times are used to build ———— as a service layer on top of existing communication services

A

Secure channels

35
Q

In this form of communication, the sending and receiving processes synchronize at every message. In this case, both send and receive are blocking operations

A

The synchronous communication

36
Q

In this form of communication, the use of the send operation is non-blocking, the receive operation can have blocking and non-blocking variants

A

The asynchronous communication

37
Q

We can describe this as the guarantee to deliver the message despite a reasonable number of packets being dropped or lost.

A

Reliability

38
Q

This consist of transmitting a message between a socket in one process and a socket in another process.

A

Inter-process communication

39
Q

Any process may make use of multiple of these elements to receive messages, but a process cannot share them with other processes on the same computer

A

Ports

40
Q

The internet protocols and the local port pairs define the:

A

The message destination

41
Q

Both forms of communications (UDP and TCP) use ________ which provides and endpoint for communication between processes

A

The socket abstraction

42
Q

This is sent by UDP is transmitted from a sending process to a receive process without acknowledgement or retries

A

A datagram

43
Q

Message passing between a pair of processes can be supported by two message communication operations

A

Send and receive operations

44
Q

Messages may be dropped occasionally, either because of a checksum error or because no buffer space is available at the source or destination, it’s called:

A

Omission failures

45
Q

This assume that when a pair of processes are stablishing a connection, one of them plays the client role and another plays the server role, but thereafter they could be peers.

A

The API for stream communication

46
Q

The TCP protocol uses an acknowledgement sheme. If the sender does not receive and acknowledgement with a time out, it retransmits the message and this is performed when:

A

There is lost messages

47
Q

This defines reliable communication for channels in terms of two properties: integrity and validity

A

A failure model

48
Q

They are three alternatives approaches to external data representation.

A

XML, CORBA and Java’s object serialization.

49
Q

This was originated from BSD 4.x UNIX and provides the abstraction of a stream of bytes to which data may be written and from which data may be read

A

The API to the TCP protocol.

50
Q

This is the process of taking a collection of data items and assembling or disassembling (respectively) into a form suitable for transmission in a message

A

Marshalling and un-marshalling

51
Q

The TCP protocol attempts to match the speeds of the processes that read from and write to a stream, this is called:

A

Flow control

52
Q

These items transmitted in messages can be data values of many different types, and not all computers store primitive values such as integers in the same order

A

The individual primitive data

53
Q

This is a markup language that was defined by the World Wide Web Consortium (W3C) for general use on the Web

A

XML

54
Q

This is the speed at which data can be transferred between two computers in the network once transmission has begun

A

Data transfer rate

55
Q

This is a single communication subsystem providing communication between all of the hosts that are connected to it, where the Internet is constructed from many subnets

A

The Internet

56
Q

They carry messages at lower speeds between nodes that are often in different organizations and may be separated by large distances

A

WANs

57
Q

Protocol layering, packet switching, Routing and data streaming are the principles on which:

A

Computer networks are based

58
Q

This term is used to refer to any computer or switching device attached to a network

A

Node

59
Q

This is a sequence of binary data (an array of bits and bytes) of restricted length, together with addressing information sufficient to identify the source and destination computers.

A

The simplest form of packet

60
Q

The end-to-end communication must provide totally error-free; the detection of communication errors and their correction is that we call:

A

Reliability

61
Q

This is the delay that occurs after a send operation is executed before data starts to arrive at the destination computer in network performance

A

Latency

62
Q

The computers and other devices that use the network for communication purposes are referred to as:

A

Host

63
Q

This is a communication subsystem in which several networks are linked together to provide common data communication facilities that overlay the technologies and protocols of the individual component networks and the methods used for their interconnection

A

An internetwork

64
Q

This is why many network technologies support the simultaneous transmission of messaged to several recipients

A

Multicasting

65
Q

This is a unit of routing (delivering data from one part of the internet to another)

A

A subnet

66
Q

They are generally used to hold the video frames, but because the flow is continous as opposited to the intermittent traffic generated by typical client-server interactions and are handled somewhat differently

A

UDP internet packets

67
Q

This is defined as the ability to meet deadlines when transmitting and processing streams of real-time multimedia data

A

Quality of service

68
Q

This type of network is based on the high bandwidth copper and fiber optic cabling recently installed in some towns and cities for the transmission of video, voice and other data over distances of up to 50 kilometers

A

MAN’s

69
Q

They are composed of number of personal devices such as movile phones, tablets, digital cameras, music players and so on that are now carried by many people

A

WPAN’s

70
Q

This is referred to as the transmission and display of audio and video in real time. It requires much higher bandwidths than most other forms of communication in distributed systems

A

Streaming

71
Q

The IEEE 802.16 WiMAX standard is targeted at this class of network. It aims to provide an alternative to wired connections to home and office buildings

A

WMAN’s

72
Q

In this type of switching, each packet arriving at a node is first stored in memory at the node and then processed by a program that transmits it on an outgoing circuit, which transfers the packet to another node that is closer to its ultimate destination

A

Packet switching

73
Q

This is used to refer to a well-known set of rules and formats to be used for communication between processes in order to perform a given task

A

The term protocol

74
Q

Their operation was simple to understand, when a caller dialed a number, the pair of wires from her phone to the local exchange was connected by an automaticswitch at the exchange to the pair of wires connected to the other party’s phone

A

Circuit Switching

75
Q

They are specifically designed to provide high
bandwidth and low latencies and to support quality of
service by the reservation of network resources.

A

ATM Networks

76
Q

Most mobile phone networks are based on digital wireless network technologies such as the GSM (Global System for Mobile communication) standard, which is used in most countries of the world.

A

WWANs

77
Q

This is a transmission technique that involves no switching, everything is transmitted to every node, and it is up to potential receivers to notice transmissions addressed to them.

A

Broadcast

78
Q

The task of dividing messages into packets before transmission and reassembling them at the receiving computer is usually performed in the transport layer.

A

Packet assembly

79
Q

When we say that a process has crashed we mean that it has halted and will no execute any further steps of it’s program ever, this is a type of:

A

Process Omission Failure