SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
CS9222 Advanced Operating
System
Unit – II
Dr.A.Kathirvel
Professor & Head/IT - VCEW
Unit - II
Introduction – Issues – Communication Primitives –
Inherent Limitations - Lamport’s Logical Clock; Vector
Clock; Causal Ordering; Global State; Cuts;
Termination Detection. Distributed Mutual Exclusion
– Non-Token Based Algorithms – Lamport’s
Algorithm - Token-Based Algorithms – Suzuki-
Kasami’s Broadcast Algorithm – Distributed Deadlock
Detection – Issues – Centralized Deadlock-Detection
Algorithms - Distributed Deadlock-Detection
Algorithms. Agreement Protocols – Classification -
Solutions –Applications.
What is Distributed Systems?
Distributed System is used to describe a
system with the following characteristics:
Consists of several computers that do not
share a memory or a clock;
The computers communicate with each other
by exchanging messages over a
communication network; and
Each computer has its own memory and runs
its own operating system.
Architecture of Distributed OS
What is Distributed Operating Systems?
It extends the concepts of resource management and
user friendly interface for shared memory computers a
step further, encompassing a distributed computing
system consisting of several autonomous computers
connected by a communicating network.
A distributed OS is one that looks to its users like an
centralized OS but runs on multiple, independent CPUs.
The key concept is transparency. In other words, the use
of multiple processors should be invisible to the user
Issues in Distributed OS
Global Knowledge
Naming
Scalability
Compatibility
Process Synchronization
Resource Management
Security
Structuring
Global Knowledge
No Global Memory
No Global Clock
Unpredictable Message Delays
Naming
Name refers to objects [ Files, Computers etc]
Name Service Maps logical name to physical
address
Techniques
LookUp Tables [Directories]
Algorithmic
Combination of above two
Scalability
Grow with time
Scaling Dimensions – Size, Geographically &
Administratively
Techniques – Hiding Communication
Latencies, Distribution & Caching
Scaling Techniques (1)
Hide Communication Latencies
1.4
The difference between letting:
a) a server or
b) a client check forms as they are being filled Scalability cont….
Scaling Techniques (2)
Distribution
1.5
An example of dividing the DNS name space into zones.
Scalability cont….
Scaling Techniques (3)
Replication
Replicate components across the distributed
system
Replication increases availability , balancing
load distribution
Consistency problem has to be handled
Compatibility
Interoperability among resources in system
Levels of Compatibility – Binary Level,
Execution Level & Protocol Level
Process Synchronization
Difficult because of unavailability of shared
memory
Mutual Exclusion Problem
Resource Management
Make both local and remote resources
available
Specific Location of resource should be hidden
from user
Techniques
Data Migration [DFS, DSM]
Computation Migration [RPC]
Distributed Scheduling [ Load Balancing]
Security
Authentication – a entity is what it claims to
be
Authorization – what privileges an entity has
and making only those privileges available
Structuring
Techniques
Monolithic Kernel
Collective Kernel [Microkernel based , Mach, V-
Kernel, Chorus and Galaxy]
Object Oriented OS [Services are implemented as
objects, Eden, Choices, x-kernel, Medusa, Clouds,
Amoeba & Muse]
Client-Server Computing Model [Processes are
categorized as servers and clients]
Communication Primitives
High level constructs [Helps the program in
using underlying communication network]
Two Types of Communication Models
Message passing
Remote Procedure Calls
Message Passing
Two basic communication primitives
SEND(a,b) , a Message , b Destination
RECEIVE(c,d), c Source , d Buffer for storing the
message
Client-Server Computation Model
Client sends Message to server and waits
Server replies after computation
Message Passing cont..
Design Issues
 Blocking vs Non blocking primitives
 Nonblocking
 SEND primitive return the control to the user process as soon as the
message is copied from user buffer to kernel buffer
 Advantage : Programs have maximum flexibility in performing
computation and communication in any order
 Drawback  Programming becomes tricky and difficult
 Blocking
 SEND primitive does not return the control to the user process until
message has been sent or acknowledgement has been received
 Advantage : Program’s behavior is predictable
 Drawback  Lack of flexibility in programming
Message Passing cont..
Design Issues cont..
 Synchronous vs Asynchronous Primitives
 Synchronous
 SEND primitive is blocked until corresponding RECEIVE primitive
is executed at the target computer
 Asynchronous
 Messages are buffered
 SEND primitive does not block even if there is no corresponding
execution of the RECEIVE primitive
 The corresponding RECEIVE primitive can be either blocking or
non-blocking
Details to be handled in Message Passing
Pairing of Response with Requests
Data Representation
Sender should know the address of Remote
machine
Communication and System failures
Remote Procedure Call (RPC)
RPC is an interaction between a client and a
server
Client invokes procedure on sever
Server executes the procedure and pass the
result back to client
Calling process is suspended and proceeds
only after getting the result from server
RPC Design issues
Structure
Binding
Parameter and Result Passing
Error handling, semantics and Correctness
Structure
RPC mechanism is based upon stub procedures.
Unpack
Execute
Procedure
Stub
Procedure
Remote
Procedure
Return
Pack
result
Local
Procedure
Call
Local
Procedure
Call
User
Program
Stub
Procedure
Pack
parameters
& Transmit
wait
Unpack
Result
Return
from local
call
Client Machine
Server Machine
Binding
Determines remote procedure and machine
on which it will be executed
Check compatibility of the parameters passed
Use Binding Server
Binding
Binding Server
Receive
Query
Return
Server
Address Unpack
Stub
Procedure
Remote
Procedure
Return
Pack
result
Local
Procedure
Call
Local
Procedure
Call
Binding
Server
User
Program
Stub
Procedure
Pack
parameters
& Transmit
wait
Unpack
Result
Return
from local
call
Client Machine
Server Machine
Registering
Services
1
2
3
4
5
6
7
8
Parameter and Result Passing
 Stub Procedures Convert Parameters & Result to appropriate
form
 Pack parameters into a buffer
 Receiver Stub Unpacks the parameters
 Expensive if done on every call
 Send Parameters along with code that helps to identify format
so that receiver can do conversion
 Alternatively Each data type may have a standard format.
Sender will convert data to standard format and receiver will
convert from standard format to its local representation
 Passing Parameters by Reference
Error handling, Semantics and Correctness
 RPC may fail either due to computer or communication failure
 If the remote server is slow the program invoking remote
procedure may call it twice.
 If client crashes after sending RPC message
 If client recovers quickly after crash and reissues RPC
 Orphan Execution of Remote procedures
 RPC Semantics
 At least once semantics
 Exactly Once
 At most once
Correctness Condition
Given by Panzieri & Srivastava
Let Ci denote call made by machine & Wi
represents corresponding computation
If C2 happened after C1 ( C1  C2) &
Computations W2 & W1 share the same data,
then to be correct in the presence of failures
RPC should satisfy
 C1  C2 implies W1  W2

Weitere ähnliche Inhalte

Was ist angesagt?

Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
sumitjain2013
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
AbDul ThaYyal
 
Advanced Operating System Lecture Notes
Advanced Operating System Lecture NotesAdvanced Operating System Lecture Notes
Advanced Operating System Lecture Notes
Anirudhan Guru
 

Was ist angesagt? (20)

Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing models
 
Distributed shared memory shyam soni
Distributed shared memory shyam soniDistributed shared memory shyam soni
Distributed shared memory shyam soni
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Processor allocation in Distributed Systems
Processor allocation in Distributed SystemsProcessor allocation in Distributed Systems
Processor allocation in Distributed Systems
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed Systems
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
 
Distributed deadlock
Distributed deadlockDistributed deadlock
Distributed deadlock
 
Advanced Operating System Lecture Notes
Advanced Operating System Lecture NotesAdvanced Operating System Lecture Notes
Advanced Operating System Lecture Notes
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
 
Microkernel
MicrokernelMicrokernel
Microkernel
 
And or graph
And or graphAnd or graph
And or graph
 
5.distributed file systems
5.distributed file systems5.distributed file systems
5.distributed file systems
 
file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 

Andere mochten auch

Operating system notes
Operating system notesOperating system notes
Operating system notes
SANTOSH RATH
 

Andere mochten auch (7)

Os Question Bank
Os Question BankOs Question Bank
Os Question Bank
 
Final Exam OS fall 2012-2013 with answers
Final Exam OS fall 2012-2013 with answersFinal Exam OS fall 2012-2013 with answers
Final Exam OS fall 2012-2013 with answers
 
Advanced Operating System- Introduction
Advanced Operating System- IntroductionAdvanced Operating System- Introduction
Advanced Operating System- Introduction
 
Complete Operating System notes
Complete Operating System notesComplete Operating System notes
Complete Operating System notes
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
 
Operating system notes
Operating system notesOperating system notes
Operating system notes
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
 

Ähnlich wie CS9222 ADVANCED OPERATING SYSTEMS

remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
Ashish Kumar
 
End to-end arguments in system design
End to-end arguments in system designEnd to-end arguments in system design
End to-end arguments in system design
nody111
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
webhostingguy
 

Ähnlich wie CS9222 ADVANCED OPERATING SYSTEMS (20)

Client Server Model and Distributed Computing
Client Server Model and Distributed ComputingClient Server Model and Distributed Computing
Client Server Model and Distributed Computing
 
Distributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGY
Distributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGYDistributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGY
Distributed OPERATING SYSTEM FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGY
 
Chapter16 new
Chapter16 newChapter16 new
Chapter16 new
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptx
 
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...Message Passing, Remote Procedure Calls and  Distributed Shared Memory as Com...
Message Passing, Remote Procedure Calls and Distributed Shared Memory as Com...
 
Task communication
Task communicationTask communication
Task communication
 
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.pptcharacteristicsofdistributedsystem-121004123308-phpapp02.ppt
characteristicsofdistributedsystem-121004123308-phpapp02.ppt
 
Chapter 3-Processes.ppt
Chapter 3-Processes.pptChapter 3-Processes.ppt
Chapter 3-Processes.ppt
 
Presentation of ditributed system
Presentation of ditributed systemPresentation of ditributed system
Presentation of ditributed system
 
Middleware in Distributed System-RPC,RMI
Middleware in Distributed System-RPC,RMIMiddleware in Distributed System-RPC,RMI
Middleware in Distributed System-RPC,RMI
 
Distributed Objects and Remote Invocation
Distributed Objects and Remote InvocationDistributed Objects and Remote Invocation
Distributed Objects and Remote Invocation
 
Dos(rpc)avishek130650107020
Dos(rpc)avishek130650107020Dos(rpc)avishek130650107020
Dos(rpc)avishek130650107020
 
2.communcation in distributed system
2.communcation in distributed system2.communcation in distributed system
2.communcation in distributed system
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
 
Topic 5- Communications v1.pptx
Topic 5- Communications v1.pptxTopic 5- Communications v1.pptx
Topic 5- Communications v1.pptx
 
02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf02 Models of Distribution Systems.pdf
02 Models of Distribution Systems.pdf
 
Designing Application over mobile environment
Designing Application over mobile environmentDesigning Application over mobile environment
Designing Application over mobile environment
 
End to-end arguments in system design
End to-end arguments in system designEnd to-end arguments in system design
End to-end arguments in system design
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
 
High volume real time contiguous etl and audit
High volume real time contiguous etl and auditHigh volume real time contiguous etl and audit
High volume real time contiguous etl and audit
 

Mehr von Kathirvel Ayyaswamy

Mehr von Kathirvel Ayyaswamy (20)

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 

Kürzlich hochgeladen

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Kürzlich hochgeladen (20)

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 

CS9222 ADVANCED OPERATING SYSTEMS

  • 1. CS9222 Advanced Operating System Unit – II Dr.A.Kathirvel Professor & Head/IT - VCEW
  • 2. Unit - II Introduction – Issues – Communication Primitives – Inherent Limitations - Lamport’s Logical Clock; Vector Clock; Causal Ordering; Global State; Cuts; Termination Detection. Distributed Mutual Exclusion – Non-Token Based Algorithms – Lamport’s Algorithm - Token-Based Algorithms – Suzuki- Kasami’s Broadcast Algorithm – Distributed Deadlock Detection – Issues – Centralized Deadlock-Detection Algorithms - Distributed Deadlock-Detection Algorithms. Agreement Protocols – Classification - Solutions –Applications.
  • 3. What is Distributed Systems? Distributed System is used to describe a system with the following characteristics: Consists of several computers that do not share a memory or a clock; The computers communicate with each other by exchanging messages over a communication network; and Each computer has its own memory and runs its own operating system.
  • 5. What is Distributed Operating Systems? It extends the concepts of resource management and user friendly interface for shared memory computers a step further, encompassing a distributed computing system consisting of several autonomous computers connected by a communicating network. A distributed OS is one that looks to its users like an centralized OS but runs on multiple, independent CPUs. The key concept is transparency. In other words, the use of multiple processors should be invisible to the user
  • 6. Issues in Distributed OS Global Knowledge Naming Scalability Compatibility Process Synchronization Resource Management Security Structuring
  • 7. Global Knowledge No Global Memory No Global Clock Unpredictable Message Delays
  • 8. Naming Name refers to objects [ Files, Computers etc] Name Service Maps logical name to physical address Techniques LookUp Tables [Directories] Algorithmic Combination of above two
  • 9. Scalability Grow with time Scaling Dimensions – Size, Geographically & Administratively Techniques – Hiding Communication Latencies, Distribution & Caching
  • 10. Scaling Techniques (1) Hide Communication Latencies 1.4 The difference between letting: a) a server or b) a client check forms as they are being filled Scalability cont….
  • 11. Scaling Techniques (2) Distribution 1.5 An example of dividing the DNS name space into zones. Scalability cont….
  • 12. Scaling Techniques (3) Replication Replicate components across the distributed system Replication increases availability , balancing load distribution Consistency problem has to be handled
  • 13. Compatibility Interoperability among resources in system Levels of Compatibility – Binary Level, Execution Level & Protocol Level
  • 14. Process Synchronization Difficult because of unavailability of shared memory Mutual Exclusion Problem
  • 15. Resource Management Make both local and remote resources available Specific Location of resource should be hidden from user Techniques Data Migration [DFS, DSM] Computation Migration [RPC] Distributed Scheduling [ Load Balancing]
  • 16. Security Authentication – a entity is what it claims to be Authorization – what privileges an entity has and making only those privileges available
  • 17. Structuring Techniques Monolithic Kernel Collective Kernel [Microkernel based , Mach, V- Kernel, Chorus and Galaxy] Object Oriented OS [Services are implemented as objects, Eden, Choices, x-kernel, Medusa, Clouds, Amoeba & Muse] Client-Server Computing Model [Processes are categorized as servers and clients]
  • 18. Communication Primitives High level constructs [Helps the program in using underlying communication network] Two Types of Communication Models Message passing Remote Procedure Calls
  • 19. Message Passing Two basic communication primitives SEND(a,b) , a Message , b Destination RECEIVE(c,d), c Source , d Buffer for storing the message Client-Server Computation Model Client sends Message to server and waits Server replies after computation Message Passing cont..
  • 20. Design Issues  Blocking vs Non blocking primitives  Nonblocking  SEND primitive return the control to the user process as soon as the message is copied from user buffer to kernel buffer  Advantage : Programs have maximum flexibility in performing computation and communication in any order  Drawback  Programming becomes tricky and difficult  Blocking  SEND primitive does not return the control to the user process until message has been sent or acknowledgement has been received  Advantage : Program’s behavior is predictable  Drawback  Lack of flexibility in programming Message Passing cont..
  • 21. Design Issues cont..  Synchronous vs Asynchronous Primitives  Synchronous  SEND primitive is blocked until corresponding RECEIVE primitive is executed at the target computer  Asynchronous  Messages are buffered  SEND primitive does not block even if there is no corresponding execution of the RECEIVE primitive  The corresponding RECEIVE primitive can be either blocking or non-blocking
  • 22. Details to be handled in Message Passing Pairing of Response with Requests Data Representation Sender should know the address of Remote machine Communication and System failures
  • 23. Remote Procedure Call (RPC) RPC is an interaction between a client and a server Client invokes procedure on sever Server executes the procedure and pass the result back to client Calling process is suspended and proceeds only after getting the result from server
  • 24. RPC Design issues Structure Binding Parameter and Result Passing Error handling, semantics and Correctness
  • 25. Structure RPC mechanism is based upon stub procedures. Unpack Execute Procedure Stub Procedure Remote Procedure Return Pack result Local Procedure Call Local Procedure Call User Program Stub Procedure Pack parameters & Transmit wait Unpack Result Return from local call Client Machine Server Machine
  • 26. Binding Determines remote procedure and machine on which it will be executed Check compatibility of the parameters passed Use Binding Server
  • 28. Parameter and Result Passing  Stub Procedures Convert Parameters & Result to appropriate form  Pack parameters into a buffer  Receiver Stub Unpacks the parameters  Expensive if done on every call  Send Parameters along with code that helps to identify format so that receiver can do conversion  Alternatively Each data type may have a standard format. Sender will convert data to standard format and receiver will convert from standard format to its local representation  Passing Parameters by Reference
  • 29. Error handling, Semantics and Correctness  RPC may fail either due to computer or communication failure  If the remote server is slow the program invoking remote procedure may call it twice.  If client crashes after sending RPC message  If client recovers quickly after crash and reissues RPC  Orphan Execution of Remote procedures  RPC Semantics  At least once semantics  Exactly Once  At most once
  • 30. Correctness Condition Given by Panzieri & Srivastava Let Ci denote call made by machine & Wi represents corresponding computation If C2 happened after C1 ( C1  C2) & Computations W2 & W1 share the same data, then to be correct in the presence of failures RPC should satisfy  C1  C2 implies W1  W2