CS3551 Distributed-Systems 2marks and Partb
CS3551 Distributed-Systems 2marks and Partb
UNIT-I
S.No.
PART-A
17 List any two resources of hardware and software, which can be shared in
distributed systems with example. (NOV 2017)
Hardware – Printer, Disks, Fax machine, Router, Modem.
Software – Application Programs, Shared Files, Shared Databases, Documents, Services.
For a synchronization bound D>0, and for a source S of UTC time,|S(t) –Ci(t)|<T, for
i=1,2,…N and for all real times t in I. Internal synchronization:
If the clocks Ci are synchronized with one another to a Known degree of accuracy, then we
can measure the interval between two events occurring at different computers by appealing
to their local clocks, even though they are not
necessarily synchronized to an external source of time. This is internal synchronization. For
a synchronization bound D>0,|Ci(t)-Cj(t)|<D,
for i,j=1,2,…N. and for all real times t in I.
Logical time
Lamport proposed a model of logical time that can be used to provide an ordering among
the events at processes running in different computers in a distributed system.Logical time
allows the order in which the messages are presented to be inferred without recourse to
clocks.
Logical clocks • Lamport invented a simple mechanism by which the happenedbefore
ordering can be captured numerically, called a logical clock. A Lamport logical clock is a
monotonically increasing software counter, whose value need bear no particular
relationship to any physical clock. Each process pi Keeps its own logical clock, Li , which it
uses to apply so- called Lamport timestamps to events. We denote the timestamp of event e
at pi by Li(e) , and by L(e) we denote the timestamp of event e at
whatever process it occurred at.
Vector clocks • Mattern and Fidge developed vector clocks to overcome the shortcoming
of Lamport’s clocks: the fact that from L(e)<L(e’)we cannot conclude that e ->e’
A vector clock for a system of N processes is an array of Nintegers. Each process Keeps its
own vector clock, Vi , which it uses to timestamp local events. Like Lamport timestamps,
processes piggybacK vector timestamps on the messages they send to one another, and there
are simple rules for updating the clocks:
TaKing the componentwise maximum of two vector timestamps in this way is Known as a
merge operation.
27 Explain global states and consistent cuts with example.
1 Explain the characteristics of distributed systems and List the features of distributed systems.
2 Summarize the distributed computer system components.
3 Illustrate the difference between message passing systems versus shared memory systems.
4 Discuss the primitives for distributed communication.
5 Write brief notes on the design issues and challenges in the distributed computing.
6 Explain in details about trends in distributed systems.
7 Why global state are essential in distributed computing systems?Elaborate with an example.
UNIT-II
PART-A
6. What are the two optimization techniques are provided to the Chandy-Lamport
algorithm?
The first optimization combines snap-shots concurrently initiated by multiple
processes into a single snapshot.
This optimization is linked with the second optimization,which deals with the
efficient distribution of the global snapshot.
7. How a FIFO execution is implemented?
To implement a FIFO logical channel over a non-FIFO channel,a separate
numbering scheme is used to sequence the messages.
The sender assigns a sequence number and appends connection_id to each message
and then transimmted then the receiver arranges the incoming messages according
to the sender’s sequence numbers and accepts “next” message s per
sequence.
8. What is Guard?
A Guard Gi is a Boolean expression.If a Guard Gi evaluates to true then CLi is said to be
enabled otherwise it is diabled.
1 What is distributed deadlock? Explain with example. With deadlock detection schemes, a
transaction is aborted only when it is involved in a deadlock. Most deadlock detection schemes
operate by finding cycles in the transaction wait- for graph. In a distributedsystem involving
multiple servers being accessed by multiple transactions, a global wait-for graph can in theory
be constructed from the local ones. There can be a cycle in the global wait-for graph that is
not in any single local one – that is, there can be a distributed deadlock
A deadlock that is 'detected' but is not really a deadlock is called phantom deadlock. In
distributed deadlock detection, information about wait-for relationships between transactions
is transmitted from on server to another. If there is a deadlock, the necessary information will
eventually be collected in one place and a cycle will be detected. Ja this procedure will take
some time, there is a chance that one of the transactions
that Holds a lock will meanwhile have released it, in which case the deadlock will no longer
exist.
A distributed approach to deadlock detection uses a technique called edge chasing or path
pushing. In this approach, the global wait-for graph is not constructed, but each of the servers
involved has Knowledge about some of its edges.
The servers attempt to find cycles by forwarding messages called probes, which follow the
edges of the graph throughout the distributed system. A probe message consists of transaction
wait-for relationships representing a path in the global
wait-for graph.
PART-B
1. Discuss in detail the requirements that mutual exclusion algorithms should satisfy and discuss
what metric we use to measure the performance of mutual exclusion algorithms.
2. Explain the concept of Lamport algorithm.
3. Explain the concept of ricart agrawala algorithm
4. Explain the concept of token based algorithm
5. Explain the concept of Suzuki kasami broadcast algorithm
6. How we can achieve deadlock detection in distributed systems? Provide various models to
carry out the same.List out the four classes of distributed deadlock detection algorithms and
explain any two of them.
7. Explain the concept of chandy misra hass AND model.
8. Explain the concept of chandy misra hass OR model.
S. UNIT-IV
No
.
PART-A
S. UNIT-V
No
.
PART-A
1 What is Cloud Computing?
“Cloud is a parallel and distributed computing system consisting of a collection of inter-
connected and virtualized computers that are dynamically provisioned and presented as one or
more unified computing resources based on service-level agreements (SLA) established through
negotiation between the service provider and consumers.”
2 List down the characteristics of cloud
Virtualization Support.
Self-Service, On-Demand Resource Provisioning
Multiple Backend Hypervisors.
Storage Virtualization.
Interface to Public Clouds.
Virtual Networking.
3 What is virtualization in cloud computing?
Virtualization is a software that creates virtual (rather than actual) version of something,
such as an operating system, a server, a storage device or network resource . It is the
fundamental technology that powers cloud computing.
4 Define Cloud.
● Cloud refers to software, platform, and Infrastructure that are sold as a service. The
services accessed remotely through the Internet
● The cloud users can simply log on to the network without installing anything. They
do not pay for hardware and maintenance. But the service providers pay for physical
equipment and maintenance.
5 list the types of cloud
Types of Cloud
1. Public cloud
2. Private cloud
3. Hybrid cloud
4. Community cloud
5. Multicloud
10 What is Azure?
Microsoft Azure provides a consistent cloud experience for customers, backed by
enterprise-class technologies, excellent security, and customizable configuration
options to meet diverse customer requirements.
o
11 What is AMS?
Amazon Web Services is a cloud computing platform that offers on-demand computing services such
as virtual servers and storage that can be used to build and run applications and websites.
PART-B
1.explain the cloud components,application ,characteristics , advantage and disadvantage in details.
2. explain the cloud deployment model and service model in detail
3. explain the virtualization in detail.
4.explain cloud services and platform
5.explain the cloud storages in details