UNIT - V (Distributed System) Class1
UNIT - V (Distributed System) Class1
P2P &
DISTRIBUTED
SHARED MEMORY
Peer-to-peer computing
Introduction
• Peer-to-peer (P2P) computing is a
distributed application architecture
that partitions tasks or workloads
between peers.
• Peers are equally
privileged, equipotent participants
in the network.
• They are said to form a peer-to-peer
network of nodes.
• A peer-to-peer system is a computer
network which enables peers to
share the network resources,
computational power and data
storage, without relying on a central
authority.
Overlay graphs: Introduction
• An overlay network is a communication network constructed on top of
• CAN support basic hash table operations on key-value pairs (K,V): insert,
search , delete.
wrap-around.
• The (k, v) pair is stored at the node that is presently assigned the
region that contains the point p. This means the (k, v) pair is
applications.
• Routing and overlay are the terms coined for looking objects and nodes in
prefix routing.
•Replicated resources also use the same publish primitive with same GUID.
•This offers an advantage that the replica of objects is close to the frequent
users to avoid latency, network load, improve tolerance and host failures.
Distributed shared memory: Abstraction
and advantages
• Distributed Shared Memory is a resource management component of a
• The shared memory model provides a virtual address space that is shared
• The memory consistency model defines the set of allowable memory access
orderings.
Sequential Consistency:
system.
Casual Consistency:
•According to casual consistency model, only that Writes that are causally related
must be seen in that same order by all processors, whereas concurrent Writes may
be seen by different processors in different orders.
•All other accesses may be seen in different order on different processes (or nodes ,
processors).
•The set of both read and write operations in between different synchronization
operations is the same in each process.
ii) Release Consistency:
• The drawbacks of weak consistency are overcome by: 1. Ensuring that all locally
initiated Writes have been completed, i.e., propagated to all other processes.
• 2. Ensuring that all Writes from other machines have been locally reflected to
differentiate the entering and leaving of CS, release consistency provides acquire and
release operations.