Tiffany Layton
Wyatt Cavall
Hadi Rabih
Definition
A distributed system is a collection of
computers connected through a network, but
allows the user to use it as a single
computer.
Topics
Kinds of systems
Networking operating systems
Issues
Kinds of systems
Distributed Network operating
operating system: system:
◦ A distributes ◦ This is a system that
operating system is a has an echelon of
system that looks like protocols in order for
its is running on one the computer to
system, but in reality perform tasks
it is running on correctly
multiple systems.
Networking Operating
Systems
This is also known as “NOS”. This consists of
two components:
◦ Intranet
Is a private network commonly used by businesses to
communicate through out the company. This is usually
protected by firewalls.
◦ Internet
The internet is a communication system between
computer networks, also known as a network of
networks.
Transparency
In order for a distributed system to run correctly it
must not look like it is running from multiple
computers.
A distributed system should be invisible to the user.
The user should not know where their computer is
running from. This is called transparency.
From the user’s view point the system and programs
should appear as one and not as multitude of
different computers.
Issues
Scalability is the ability of editing a system without having to
delete or create an entirely new one.
◦ Getting a bigger server, or multiple servers is an example.
Software Interface is the display of the software to a user,
the easier to use is generally more popular.
Security is the means to provide safe and legal use of the
data used in the system.
◦ Examples are Firewalls, Encryptions, mechanisms, and using the source
code.
Software Interfaces
RPC ( Remote
Procedure Call)
◦ A technique used to allow
client and server software to
communicate.
◦ Consists of a Sender and a
receiver, such as Outlook.
Middleware
◦ Is used as a sort of link
between already existing
programs. Also known as the
“Virtual Glue”
Connections
Packets: Is a collection of data sent through specific programs
using the internet.
◦ Call black holing- where the attacker will drop packets to cause a
loading or receiving error.
◦ This is also how some trojans, or interceptors are placed into the
packets to steal information.
Pedro Robles