PPT-CSE 486/586 Distributed Systems
Author : tawny-fly | Published Date : 2015-10-10
Security 2 Steve Ko Computer Sciences and Engineering University at Buffalo Recap Three types of functions Cryptographic hash symmetric key crypto asymmetric key
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "CSE 486/586 Distributed Systems" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
CSE 486/586 Distributed Systems: Transcript
Security 2 Steve Ko Computer Sciences and Engineering University at Buffalo Recap Three types of functions Cryptographic hash symmetric key crypto asymmetric key crypto Cryptographic hash. Google Chubby Lock Service. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Recap. Paxos. is a consensus algorithm.. Proposers?. Acceptors?. Learners?. A proposer always makes sure that,. Graph Processing. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Recap. Byzantine generals problem. They must decide on a common plan of action.. But. , . some of the generals can be traitors. New Trends in Distributed Storage. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Recap. Two important components in a distributed file service?. Directory service. Flat file service. Byzantine Fault Tolerance. Steve Ko. Computer Sciences and Engineering. University at Buffalo. CSE 486/586 . Administrivia. Project 3 out. Please, please start right away!. Deadline: 4/30 (Monday) @ 11:59PM. Gossiping. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Recall: Passive Replication. Request Communication. : the request is issued to the primary RM and carries a unique request id.. Case Study: . Facebook Haystack. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Recap. DNS. Hierarchical servers. Root servers, top-level domain servers, authoritative servers. CDN. Leader . Election --- 2. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Algorithm 2: Modified Ring Election . election . message tracks . all. IDs of nodes that forwarded it, not just the highest. Concurrency . Control --- 1. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Recap: Transactions. Transactions?. Abstraction for . grouping multiple operations into one. Transaction primitives?. Google Spanner. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Recap. Digital certificates. Binds a public key to its owner. Establishes a chain of trust. TLS. Provides an application-transparent way of secure communication. Paxos. --- 1. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Recap. NFS. Caching with write-through policy at close(). Stateless server. One power efficient design: FAWN. Embedded CPUs & Flash . Mutual Exclusion --- 2. & Leader Election --- 1. Steve Ko. Computer Sciences and Engineering. University at Buffalo. 4. . Maekawa’s. Algorithm. Observation: . no need to have all peers reply. Only need to have . Web Content Distribution-. --3. Case Study: Facebook f4. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Recap. Engineering principle. Make the common case fast, and rare cases correct. Paxos. --- 2. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Recap. Paxos. is a consensus algorithm.. It allows multiple acceptors accepting multiple proposals.. A proposer always makes sure that,. Global States. Steve Ko. Computer Sciences and Engineering. University at Buffalo. Last Time. Ordering of events. Many applications need it, e.g., collaborative editing, distributed storage, etc.. Logical time.
Download Document
Here is the link to download the presentation.
"CSE 486/586 Distributed Systems"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents