Professional Documents
Culture Documents
Sco 410 Cat 2 LMS
Sco 410 Cat 2 LMS
Sco 410 Cat 2 LMS
Encryption
It is a key component of computer security. Data is changed via encryption so that an attacker
cannot read it. In other words, data confidentiality can be implemented by the use of encryption.
Encryption also enables us to determine whether data has been altered. It also offers assistance
with integrity checks.
Authentication
Refers to verifying the identities of the parties involved in a communication as well as the
legitimacy of the data's source and integrity. It is crucial for a number of reasons. Electronic mail
systems can have more trust in the authenticity of messages by verifying the identity of the
message's source. It also serves as a foundation for accounting and auditing. It is necessary for
access control systems that depend on the users' identities. The detection of message integrity
issues is made possible by the authentication of message contents. Most commonly used method
used for authentication is the use of passwords.
Authorization
Process by which a client or user is determined if he has permission to use a resource or access a
file. Authentication and authorization are usually combined so that the server can identify the
client making the access request. Different types of authentication may be required for
authorization e.g, passwords in some cases. A typical example is having access to medical
databases' records. Whoever accessing the database may be given permission to read records,
edit certain fields in a record, or add or remove records.
Auditing tools
are used to trace which clients accessed what, and which way. Although auditing does not really
provide any protection against security threats, audit logs can be extremely useful for the
analysis of a security breach, and subsequently taking measures against intruders. Because of
this, attackers are usually careful to leave no evidence that could ultimately lead to revealing
their identify. In this regard, tracking accesses makes attackers occasionally riskier.
b) Explain TWO election algorithms (how they work) as used in coordination in Distributed
systems. (8
Marks)
If, during gossiping, nodes exchange membership information, every node will eventually get to
know about all other nodes in the system. Each time it discovers a new node, it can be evaluated
with respect to its semantic proximity, for example, by counting the number of files in common.
The semantically nearest nodes are then selected for submitting a search query.
The Gossip protocol, which is a sort of communication where a piece of information, or gossip in
this case, is conveyed from one or more nodes to a group of other nodes in a network, is used to
fix the issues produced by multicasting. When several network clients need the same data at the
same time, this is helpful. However, multicasting has a number of drawbacks. For example, if
there are numerous nodes at the recipient end, latency—the average amount of time it takes for a
receiver to receive a multicast—increases.
The gossip protocol periodically broadcasts the gossip to random nodes in the network in order
to reach the desired targets in the group. Once a random node receives the gossip, it is considered
to have become infected as a result of the gossip. Now the random node that receives the rumor
performs the same action as the sender and distributes the rumor to numerous random recipients.
This procedure keeps on till the multicast reaches the target nodes. After spreading the rumors to
random nodes, this mechanism transforms the infected nodes into uninfected nodes.
d) Giving relevant examples explain TWO reasons for replication in distributed system.
(6
Marks)
References
Priyanka Gupta, R. G. (2012). Comparison of Various Election Algorithms in Distributed System.
International Journal of Computer Applications , 4.
https://www.geeksforgeeks.org/the-gossip-protocol-in-cloud-computing/
Class notes