subject

1. What properties should the entity identifiers/names in distributed systems have? What are the differences between names and addresses? 2. Compare the differences between name servers deployed at the global layer, the administrational layer, and the managerial layer of a large-scale name space.

3. Discuss the advantages and disadvantages of iterative and recursive name resolution, respectively.

4. Explain the working of the network time protocol (NTP) and the Berkeley Algorithm, respectively. Discuss the differences between the two algorithms.

5. Identify all the causally related events and concurrent events in the following figure

6. When use Lamport’s logical clocks to derive a total order of events in distributed systems, why each message needs to be acknowledged?

7. What are the limitations of Lamport’s logical clocks, and how does the vector clock algorithm solve the problems?
8. Explain why mutual exclusion is needed when machines in a distributed system concurrently access shared resources. Compare the advantages and disadvantages of token- and permission-based approaches for mutual exclusion.

9. Discuss the tradeoff between large and small consistency units (conit) in keeping data consistent.

10. Discuss the differences of sequential, causal consistency and their relation to the eventual consistency.

11. Compared the advantages and disadvantages of busy-waiting, blocking synchronizations and monitor-based synchronization.

12. Explain the working of the MESI cache coherence protocol.

13. Compare the differences of the four eventual consistency models: monotonic-read, monotonic-write, read-your-write, and write-follow-read.

14. What are the requirements for building a dependable system?

15. Discuss the advantages and disadvantages of the flat and hierarchical structures in a process group, respectively.

16. Explain why it is much more difficult to realize fault tolerance in distributed systems with arbitrary node failures (e. g., node exhibiting byzantine behaviors) than systems with other types of failures, e. g., crash, omission, and timing failures.

17. Describe the requirements for atomic multicast

18. Discuss how the two-phase distributed commit protocol handles coordinator and participant failures and what the limitation of the two-phase commit is.

19. Discuss the different types of security threats and the objectives of a secure system.

20. Compare secret key and public key based cryptography and explain how the two schemes work.

21. Quantitatively compare the cost of three different distributed locking protocols. i. e., decentralized, distributed, and token ring, in a distributed system with 2000 nodes. Assume that sending and receiving a message in the distributed system takes 2ms. The frequency of accessing the critical section is one access per second and on average there are three concurrent access requests at a time. Calculate the average cost of accessing the critical section (i. e., the time cost) in the three protocols. You can assume that the time spent in the critical section is zero and all cost comes from messaging.

22. Consider the following situation, in which machine A sends a clock synchronization request to time server B. The request has a timestamp of T1 = 1:52:19.200 (reads as one o’clock, fifty-two minutes, nineteen seconds and 200 milliseconds). Time server B receives the request at T2 and sends a response with its local timestamp at T3 = 1:52:19.500. The response is received at A at time T4 = 1:52:19.600. The network time protocol (NTP) is used for synchronization. Assume that the latency of the time server to respond to a clock synchronization request is 100 milliseconds, what is the offset of A’s clock relative to that of the time server and what timestamp should A set its clock to? Show your work and explain the practical meaning of the formula you use.

23. Consider the following communications between processes P0, P1, P2. Answer the questions below.

What are the vector timestamps of the six remaining events?

24. Give examples (using diagrams) of the following client-centric consistency models: monotonic reads, monotonic writes, read-your-writes, and writes-follow-reads.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 17:30
Working on this program in python 3.7: a year in the modern gregorian calendar consists of 365 days. in reality, the earth takes longer to rotate around the sun. to account for the difference in time, every 4 years, a leap year takes place. a leap year is when a year has 366 days: an extra day, february 29th. the requirements for a given year to be a leap year are: 1) the year must be divisible by 42) if the year is a century year (1700, 1800, the year must be evenly divisible by 400some example leap years are 1600, 1712, and 2016.write a program that takes in a year and determines whether that year is a leap year.ex: if the input is 1712, the output is: 1712 is a leap year. ex: if the input is 1913, the output is: 1913 is not a leap year. your program must define and call the function isleapyear(useryear). the function should return true if the input year is a leap year and false otherwise.
Answers: 1
question
Computers and Technology, 23.06.2019 09:30
[java] create an application called registrar that has the following classes: a. a student class that minimally stores the following data fields for a student: - name - student id number - number of credits - total grade points earned and this class should also be provides the following methods: - a constructor that initializes the name and id fields - a method that returns the student name field - a method that returns the student id field - methods to set and retrieve the total number of credits - methods to set and retrieve the total number of grade points earned. - a method that returns the gpa (grade points divided by credits) b. an instructor class that minimally stores the following data fields for an instructor: - name - faculty id number - department the following methods should be provided: - a constructor that initializes the name and id fields - methods to set and retrieve the instructor’s department. c. a course class that minimally stores the following data for a course: - name of the course- course registration code- maximum number of 35 students- instructor- number of students- students registered in the course (an array)the following methods should also be provided: - a constructor that initializes the name, registration code, and maximum number of students- methods to set and retrieve the instructor- a method to search for a student in the course; the search should be based on an id number.- a method to add a student to the course. if the course is hill, then an exception with an appropriate message should be raised (try creating your own exception class for this). also, be sure that the student is not already registered in the course. the list of students should be in the order that they registered.- a method to remove a student from the course. if the student is not found, then an exception with an appropriate message should be raised (use the same exception class mentioned a method that will allow course objects to be output to a file using object serialization- a method that will allow course objects to be read in from a file created with object serializationyou will note that the student and instructor classes described above have some commonality. create aperson class that captures this commonality and uses it as a base class for student and instructor. this class should be responsible for the name and id fields and also provide atostring method that returns a string of the form name, id. this will be the inheritedtostring method for the student and instructor classes.1. draw a uml diagram for diss application.2. implement the previous classes in java. write a main program that can serve as a test class that tests all of the methods created and demonstrates that they are working
Answers: 2
question
Computers and Technology, 23.06.2019 15:30
1. ask the user how many questions are in the quiz. 2. ask the user to enter the key (that is, the correct answers). there should be one answer for each question in the quiz, and each answer should be an integer. e.g., 34 7 13 100 81 3 9 10 321 12 might be the key for a 10-question quiz. you will need to store the key in an array. 3. ask the user to enter the answers for the quiz to be graded. there needs to be one answer for each question. note that these answers do not need to be stored; each answer can simply be compared to the key as it is entered. 4. when the user has entered all of the answers to be graded, print the number correct and the percent correct. 5. add a loop so that the user can grade any number of quizzes with a single key. after the results have been printed for each quiz, ask "grade another quiz? (y/n)." note: you only have one array (the key). you are not creating a new key for each set of quiz answers.
Answers: 3
question
Computers and Technology, 23.06.2019 21:30
Write a fragment of code that reads in strings from standard input, until end-of-file and prints to standard output the largest value. you may assume there is at least one value. (cascading/streaming logic, basic string processing)
Answers: 3
You know the right answer?
1. What properties should the entity identifiers/names in distributed systems have? What are the dif...
Questions
question
Mathematics, 10.04.2020 02:27
question
Mathematics, 10.04.2020 02:27
question
Social Studies, 10.04.2020 02:27
question
Mathematics, 10.04.2020 02:27
question
Mathematics, 10.04.2020 02:27
question
Mathematics, 10.04.2020 02:27
question
Biology, 10.04.2020 02:27
Questions on the website: 13722363