IDENTIFYING DATA 2019_20
Subject (*) SAFE DISTRIBUTED SYSTEM ARCHITECTURES Code 17685201
Study programme
Computer Security Engineering and Artificial Intelligence (2016)
Cycle 2nd
Descriptors Credits Type Year Period
3 Optional 1Q
Language
Anglès
Department Computer Engineering and Mathematics
Coordinator
SANCHEZ ARTIGAS, MARC
E-mail marc.sanchez@urv.cat
Lecturers
SANCHEZ ARTIGAS, MARC
Web http://http://moodle.urv.cat
General description and relevant information Design of secure distributed systems

Competences
Type A Code Competences Specific
 A1 Integrate the fundamental technology, applications, services and systems of Computer Security and Artificial Intelligence,in a broader, multidisciplinary context.
 A3 Understand and know how to apply the functioning and organisation of the Internet, the technology and protocols of new-generation networks, the models of components, intermediate software and services.
 A6 Design and evaluate measures to protect the safety and privacy of operating systems and servers, and applications and systems based on distributed computing.
 G2 Perform mathematical modelling, calculation and simulation in company technology and engineering centres, particularly in tasks of research, development and innovation in the areas of Computer Security and Artificial Intelligence
Type B Code Competences Transversal
  CT1 Become sufficiently independent to work on research projects and scientific or technological collaborations within their thematic area.
 CT2 Forming opinions on the basis of the efficient management and use of information
 CT4 Work in multidisciplinary teams and in complex contexts.
 CT5 Communicate complex ideas effectively to all sorts of audiences
Type C Code Competences Nuclear

Learning outcomes
Type A Code Learning outcomes
 A1 Dissenya i implementa un projecte d'integració de sistemes d'informació heterogenis.
Dissenya i resol d'un problema obert de sistemes distribuïts que implica tecnologies no estudiades en l'assignatura.
 A3 Design a distributed application based on component software technology.
Design a distributed architecture based on middleware services and architectures oriented at services.
 A6 Dissenya, implementa i avalua un sistema de computació distribuïda basat en tecnologies de Cloud Computing.
 G2 Formally model a distributed system using stochastic processes.
Simulate and evaluate distributed algorithms to verify they function correctly when faced with errors and their tolerance to faults.
Type B Code Learning outcomes
  CT1 Manage and communicate complex information in foreign language.
 CT2 Manage information and knowledge by making efficient use of the information technologies.
 CT4 Participate in the group in a good working environment and help to solve problems.
 CT5 Produce a persuasive, consistent and precise discourse that can explain complex ideas and effectively interact with the audience.
Type C Code Learning outcomes

Contents
Topic Sub-topic
1. Fundamentals of distributed architectures
1.1 Basics of distributed systems: scalability, consistency, basic abstractions and algorithms.

1.2 Examples of architectures used by large Internet companies for building distributed systems.
2. Formal methods and algorithms for secure distributed systems 2.1. Architecture models of distributed systems.

2.2. Interaction models, fault tolerance and security.
3. Simulation, testing and validation of distributed systems 3.1. Design and implementation of real distributed systems.

3.2. Assessment of security problems in distributed systems through actual case studies.
4. Design and development of adaptive secure middleware 4.1. Challenges and tasks in the design of middleware for distributed applications.

4.2. Common problems and safety requirements for middleware.
5. Large-scale systems (Cloud, P2P) 5.1. Introduction to P2P.

5.2. Cloud computing.

5.3. Cloud storage.

Planning
Methodologies  ::  Tests
  Competences (*) Class hours
Hours outside the classroom
(**) Total hours
Introductory activities
1 1.5 2.5
Lecture
A1
A3
CT1
14 22.5 36.5
IT-based practicals in computer rooms
A1
A6
G2
CT4
CT5
6 9 15
Problem solving, exercises in the classroom
A1
A3
G2
CT2
3 4.5 7.5
Presentations / oral communications
CT5
1 1.5 2.5
Personal attention
1 0 1
 
Extended-answer tests
A1
A3
G2
CT1
CT2
4 6 10
 
(*) On e-learning, hours of virtual attendance of the teacher.
(**) The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies
  Description
Introductory activities Presentation of the topic, describing the contents, biblography, work mehodology, evaluation mechanism.
Lecture Theoretical exposition by the lecturer of the contents of the course.
IT-based practicals in computer rooms Development of practical exercises using ICT, guided by the teacher.
Problem solving, exercises in the classroom Presentation and solution to several theoretical problems related to exams.
Presentations / oral communications Presentation of the practical exercise at the end of the term or of some research paper.
Personal attention Personalised support to clarify the doubts on the theoretical concepts and to solve practical exercises with distributed systems technology.

Personalized attention
Description
Personalised support to clarify the doubts on the theoretical concepts and to solve practical exercises with distributed systems technology.

Assessment
Methodologies Competences Description Weight        
IT-based practicals in computer rooms
A1
A6
G2
CT4
CT5
Development of team practical exercises using ICT. 40%
Extended-answer tests
A1
A3
G2
CT1
CT2
Questions and exercises on the theoretical contents of the course. 60%
Others  
 
Other comments and second exam session

The evaluation on the second call will have the same components than in the first one.


Sources of information

Basic George Colouris, Distributed Systems: Concepts and Design, 5th Revised edition, 2011, Addison-Wesley Educational Publishers Inc;
Nancy Lynch, Distributed Algorithms, 1996, Morgan Kaufmann
Ralf Steinmetz, Klaus Wehrle, Peer-to-Peer Systems and Applications, 2005, Springer
Thomas Erl, Cloud computing design patterns, 2015, Prentice Hall
William Stallings, Computer security: principles and practice, 2015, Pearson Education

Complementary

Recommendations


(*)The teaching guide is the document in which the URV publishes the information about all its courses. It is a public document and cannot be modified. Only in exceptional cases can it be revised by the competent agent or duly revised so that it is in line with current legislation.