1 / 14

Chapter 6

Chapter 6. Distributed systems Building secure distributed systems. Fault Tolerance and Failure recovery. The five 9’s are as much a part of security as other issues MTBF mean-time-between-failure MTTR Mean-time-to-repair Fault tolerance Fail-stop machines Redundancy. Tools.

haruki
Download Presentation

Chapter 6

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 6 Distributed systems Building secure distributed systems

  2. Fault Tolerance and Failure recovery • The five 9’s are as much a part of security as other issues • MTBF mean-time-between-failure • MTTR Mean-time-to-repair • Fault tolerance • Fail-stop machines • Redundancy

  3. Tools • Hardware redundancy • Group redundancy • Backup • Fallback • These are all different things that do different stuff for you

  4. Concurrency • 2 systems running at same time • Old data • Inconsistent updates • Order of updates • Deadlock • Data never converges to consistent values • Timing issues • Replay attacks

  5. Service Denial Attacks • Very easy to perform • Can be devastating and difficult to stop • We will discuss zombies later and how they are used to mount DOS attacks • Type of network flooding attack

  6. Naming • Facilitate sharing • Naming information is distributed • The name space keeps growing • Global names can still be issues • Keeping naming flexible • Names are used for access also • It is nice when invalid names are easy to distinguish • Consistency is issue • KISS • Bind early or late

  7. Naming and identity • The author brings up many naming issues that can create problems • We must consider international issues also as discussed • We get assigned new “names” all the time and then people try to tie them together • Interesting IPv6 discussion • Names in context

  8. Discussion • NTP, current uses and hacks • Current state of IP addresses and IPv6 • Different perspective of use of IPv6 • Government request for Google search data

  9. List of resources • five 9’s • http://www.businesscertainty.net/2006/04/revisiting_the_nines_1.html • MTBF MTTR • http://en.wikipedia.org/wiki/MTBF • http://en.wikipedia.org/wiki/Mean_time_to_repair

  10. List of resources • Hardware redundancy • http://www.eventhelix.com/RealtimeMantra/HardwareFaultTolerance.htm • http://www.microsoft.com/technet/prodtechnol/exchange/guides/E2k3HighAvGuide/ebda97ad-574a-421d-8d1b-1bb1ab70cf5f.mspx?mfr=true

  11. List of resources • Clusters • http://en.wikipedia.org/wiki/Computer_cluster#Clustering_software_.28open_source.29 • Fallback • http://www.teradata.com/t/page/115417/index.html

  12. List of resources • Concurrency • http://en.wikipedia.org/wiki/Parallel_programming • http://en.wikipedia.org/wiki/Concurrency_(computer_science) • Data • http://publib.boulder.ibm.com/infocenter/db2luw/v8/index.jsp?topic=/com.ibm.db2.udb.doc/admin/c0005267.htm • http://www.microsoft.com/technet/itsolutions/cits/iwp/ibf/soldev/moibf1_sdg_apd.mspx

  13. List of Resources • Denial of Service attacks • http://en.wikipedia.org/wiki/Denial_of_service • Naming • http://www.base.com/gordoni/web/naming.html • UMTS Universal Mobile Telecommunications System • http://www.umts-forum.org/servlet/dycon/ztumts/umts/Live/en/umts/Resources_Reports_12_es

  14. List of Resources • IPv6 • http://www.ipv6.org/ • http://en.wikipedia.org/wiki/IPv6

More Related