Unit-2 1
Unit-2 1
Group Communication The pairwise exchange of messages is not the best model for communication
from one process to a group of other processes, which may be necessary, for example, when a
service is implemented as a number of different processes in different computers, perhaps to
provide fault tolerance or to enhance availability. A multicast operation is more appropriate – this is
an operation that sends a single message from one process to each of the members of a group of
processes, usually in such a way that the membership of the group is transparent to the sender.
There is a range of possibilities in the desired Behaviour of a multicast. The simplest multicast
protocol provides no guarantees about message delivery or ordering
Group communication is critically important in distributed systems due to several key reasons:
o Distributed systems often involve multiple nodes or entities that need to collaborate
and synchronize their activities.
o This ensures that all parts of the system are aware of the latest updates and can act
in a coordinated manner.
o In distributed systems, different nodes may generate or process data that needs to
be shared among multiple recipients.
o This enhances the overall reliability and availability of the distributed system.
Scalability:
o As distributed systems grow in size and complexity, the ability to scale effectively
becomes crucial.
o They enable the system to maintain its responsiveness and efficiency as it scales up.
Types of Group Communication in a Distributed System
1. Unicast Communication
Unicast Communication
Unicast communication refers to the point-to-point transmission of data between two nodes in a
network. In the context of distributed systems:
Characteristics:
Use Cases:
Advantages:
o Low latency since messages are sent directly to the intended recipient.
Disadvantages:
o Not scalable for broadcasting to multiple recipients without sending separate
messages.
2. Multicast Communication
Multicast Communication
Multicast communication involves sending a single message from one sender to multiple receivers
simultaneously within a network. It is particularly useful in distributed systems where broadcasting
information to a group of nodes is necessary:
Characteristics:
Use Cases:
Advantages:
Disadvantages:
3. Broadcast Communication
Broadcast communication involves sending a message from one sender to all nodes in the network,
ensuring that every node receives the message:
Broadcast Communication
Definition: A sender transmits a message to all nodes within the network without the need
for specific recipients.
Characteristics:
Use Cases:
o Ensures that every node receives the message without requiring explicit recipient
lists.
Disadvantages:
o Requires careful network design and management to control the scope and impact
of broadcast messages.
Overlay Network
An overlay network is a virtual or logical network that is created on top of an existing physical
network. The internet, which connects many nodes via circuit switching, is an example of an overlay
network.
An overlay network is any virtual layer on top of physical network infrastructure. This may be as
simple as a virtual local area network (VLAN) but typically refers to more complex virtual layers
from software-defined networking (SDN) or a software-defined wide area network (SD-WAN).
The overlay creates a new layer where traffic can be programmatically directed through new virtual
network routes or paths instead of requiring physical links. Overlays enable administrators to define
and manage traffic flows, irrespective of the underlying physical infrastructure.
Network overlays provide some key benefits to networking, including the following:
Despite the advantages of overlay networks, organizations should heed the potential
challenges or disadvantages as well, including the following:
Extra layers of management. IT would have to manage two different network layers
daily. Most importantly, the layers must be managed in unison as the topology that the
overlay expects needs to be accurately represented in the underlay.
Troubleshooting. Again, this must occur for both the underlay and overlay.
Potential security exposure. The negative effects of misconfiguration can be
amplified across a wider set of devices or users.
Some examples of overlay network deployments include virtual private networks, peer-to-
peer networks, content delivery networks, voice over IP services and non-native software-
defined networks.