0% found this document useful (0 votes)
83 views5 pages

Distributed QB

This document contains questions for students about the key concepts in distributed systems. It covers topics like distributed system models and architectures, operating system support for distributed systems including distributed file systems, synchronization of time and global states, distributed transactions, and security techniques for distributed systems. The questions range from basic definitions to explanations and discussions of the various approaches and issues involved in each topic area.

Uploaded by

Papitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views5 pages

Distributed QB

This document contains questions for students about the key concepts in distributed systems. It covers topics like distributed system models and architectures, operating system support for distributed systems including distributed file systems, synchronization of time and global states, distributed transactions, and security techniques for distributed systems. The questions range from basic definitions to explanations and discussions of the various approaches and issues involved in each topic area.

Uploaded by

Papitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

MUTHAYAMMAL ENGINEERING COLLEGE, RASIPURAM-637 408

DEPARTMENT OF COMPUTER SCIENCE A NAD ENGINEERING

DISTRIBUTED SYSTEMS

UNIT-1

Introduction to Distributed Systems

PART-A

1. What is Distributed Systems?[CO1,K1]


2. Measure the consequences faced by the designers in developing DS. [CO1,K5]
3. Show where the distributed system is applied. [CO1,K3]
4. Estimate how distributed system benefits resource sharing. [CO1,K2]
5. Compare Centralized and Distributed System. [CO1,K4]
6. Show how distributed System helps cloud computing. [CO1,K3]
7. Rank the advantages and disadvantages of HTML, URLs and HTTP as core technologies for information
browsing? [CO1,K5]
8. Define Inter process Communication. [CO1,K1]
9. Classify the issues in the design of RPC. CO1,K4]
10. Discuss the design issues of RMI. [CO1,K2]
11. Differentiate marshalling and unmarshalling. [CO1,K2]
12. Illustratethe two significant factors affecting interacting process in a distributed system. [CO1,K3]
13. List two main characteristics of Distributed event based system. [CO1,K1]
14. Draw a diagram to represent middleware layer. [CO1,K3]
15. What are the 3 alternative approaches to external data representation? [CO1,K1]
16. Distinguish broadcasting and multicasting. [CO1,K3]
17. Difference between datagram packet and virtual circuit packet delivery. [CO1,K3]
18. Compare IPv4 and IPv6. [CO1,K3]
19. Classify the security challenges faced by the distributed systems. [CO1,K4]
20. What is the need of openness in distributed system? [CO1,K1]

PART-B

1. Explain the challenges in developing a Distributed system. [CO1,K 4]


2. Explain the fundamental models considered in design of DS. [CO1,K 2]
3. Explain the Architectural models considered in design of DS. [CO1,K 2]
4. Describe how will you compare and contrast cloud computing with more traditional client-server
computing? [CO1,K 2]
5. Discuss the networking issues for Distributed systems. [CO1,K 2]
6. How to route the packet in WAN?Explain in detail. [CO1,K 2]
7. Describe about group communication. [CO1,K 2]
8. Designa communication system between Distributed Objects? [CO1,K 6]
9. DescribeWith a neat sketch explain remote procedure call. [CO1,K 2]
10. What is RMI? How it is implemented? Write notes on JAVARMI. [CO1,K 1]
UNIT-2

OPERATING SYSTEM SUPPORT AND DISTRIBUTED FILE SYSTEMS

PART-A
1. Express in diagram the file attributes record structure? ?[CO2,K2]
2. What are the advantages in using name caches in file systems?[CO2.K1]
3. Explain the working of Andrew file system?[CO2,K5]
4. What do you mean by cache consistency?[CO2,K1]
5. Give the different forms of transparency in file services. ?[CO2,K2]
6. What data must the NFS client module hold on behalf of each user-level process?[CO2,K1]
7. Develop How does AFS deal with the risk that callback messages may be lost? ?[CO2,K6]
8. Define naming and locality facility?[CO2,K1]
9. Apply how will you make use of name space and DNS? ?[CO2,K3]
10. Formulate how caching helps a name service’s availability? [CO2,K6]
11. Explain on LDAP? [CO2,K5]
12. Demonstrate the use of name cache? [CO2,K3]
13. List four types of eventthat the kernel notifies to the user-level scheduler. [CO2,K 3]
14. Compare monolithic kernel and Micor kernel. [CO2,K3]
15. What are the modules in File system? [CO2,K1]
16. List out the requirements of Distributed File system. [CO2,K3]
17. What is DNS? [CO2,K1]
18. What is attribute based naming service? [CO2,K1]
19. Why the name management is separated from other services?justify. [CO2,K2]
20. Demonstrate the use of name cache. [CO2,K3]

PART-B
1. Analyze in detail about distributed file system, its characteristics and requirements. [CO2,K4]
2. Examine about the function of file Service Architecture with neat diagram[CO2,K2]
3. Formulate the design and implementation of name services and Domain Name services. [CO2,K 6]
4. Explain about operating system architecture. [CO2,K2]
5. Write a short note on Threads. [CO2,K2]
6. Describe about Communication and invocation. [CO2,K2]
7. Describe the architecture and server operation of NFS in detail. [CO2,K2]
8. Analyze in detail about Global name services. [CO2,K4]
9. How to customize and combine name space? Explain. [CO2,K2]
10.Summarize in detail about naming in file systems. [CO2,K4]
UNIT-3

TIME AND GLOBAL STATES

PART-A
1. What are the main tasks of routing overlay? [CO3,K1]
2. Classify the Characteristics of Peer to Peer System?[CO3,K4]
3. Discuss how IP and Overlay routing for Peer- to-Peer applications differ from each other?[CO3,K2]
4. Classify the functional and non-functional requirements of peer to peer middle ware Systems.?[CO3,K4]
5. Illustrate what is the use of routing overlay? [CO3,K3]
6. Define pastry.[CO3,K1]
7. Definethe terms: clock screw and clock drift rate. [CO3,K1]
8. Describe How will you synchronize physical clock? [CO3,K2]
9. What is meant by “Happened Before relationship”? [CO3,K1]
10. Point out thereasonwhycomputer clock synchronization is necessary. [CO3,K4]
11. Define distributed mutual exclusion. [CO3,K1]
12. Differentiate physical clock and logical clock. [CO3,K2]
13. Howwillyou assess a consensus problem ? [CO3,K5]
14. Distinguish between IP and overlay routing for perer to peer applications. [CO3,K3]
15. What is peer to peer system? [CO3,K1]
16. List out features of NTP. [CO3,K3]
17. What is global state predicate? [CO3,K1]
18. List the criteria to evaluate the performance of algorithm for mutual exclusion. [CO3,K3]
19. Define election algorithm. [CO3,K1]
20. Write 2 different types of multicast. [CO3,K2]
PART-B
1. Give the functional and non-functional requirements of peer-to –peer middleware. [CO3,K1]
2. What is meant by Napster legacy? Explain. [CO3,K1]
3. Explain about file system access model and its sharing semantics. [CO3,K5]
4. Explain on Peer to Peer middleware systems. [CO3,K5]
5. Illustrate with a case study explain about the application of distributed algorithm routing
overlays.(Tapestry) [CO3,K3]
i) Describe in detail about cristian’s and Berkley algorithm for synchronizing clocks.(8)
ii) Examine Briefly about global states. (8) [CO3,K1]
6. Distinguish and examine the process of active and passive replication model.(13) [CO3,K4]
7. Summarize on i) Rickart and Agarwala’s Algorithm(8) ii) Maekawa’s Voting Algorithm(8) [CO3,K2]
8. i) What is the goal of an election algorithm? Explain any two election algorithml.(8)
ii) Examine how mutual exclusion is handled in distributed system.(8) [CO3,K1]
9. i) Summarize the internal and external synchronization of Physical clocks.(8)
ii) Give the Chandy and Lamports snapshot algorithm for determining the global states of distributed
systems. (8) [CO3,K2]
UNIT-4

DISTRIBUTED TRANSACTIONS

PART-A
1. What is transaction? [CO4,K1]
2. Give the use of nested transaction. [CO4,K2]
3. Formulate the ACID properties. [CO4,K6]
4. Illustrate what is concurrency control? Give its use. [CO4,K3]
5. Showhow will you make use of nested transaction? Point out its rules? [CO4,K4]
6. Mention some motivation for replication. [CO4,K1]
7. Discuss what are the advantages and drawbacks of multi version timestamp ordering in comparison with
ordinary timestamp ordering? [CO4,K2]
8. Define consistent cut. [CO4,K1]
9. Explain the rules to abort the nested transaction. [CO4,K3]
10. Formulate the techniques used to synchronize clock? [CO4,K6]
11. What read lock and writelock? [CO4,K1]
12. List avantages of Nested transactions. [CO4,K3]
13. Define dirty read and premature writes. [CO4,K1]
14. What is deadlock? [CO4,K1]
15. List the drawbacks of locking. [CO4,K3]
16. What are the phases of Transaction? [CO4,K1]
17. Differentiate Flat and Distributed Transactions. [CO4,K3]
18. What are the operations for two-phase commit protocol. [CO4,K2]
19. Write down the steps for Edge chasing algorithm. [CO4,K1]
20. What is recovery manager? List its role. [CO4,K1]

PART-B

1. Discuss in detail about one phase and two phase atomic commit protocol (flat and hierarchical).
[CO4,K2]
2. Examine replication in detail. [CO4,K1]
3. Examine Briefly about optimistic concurrency control. [CO4,K2]
4. Discuss about Time stamp ordering. [CO4,K2]
5. Describe the methods for increasing concurrency in locking schemes. [CO4,K2]
6. Illustrate the importance of nested transaction with an example. [CO4,K3]
7. Describe with case study, explain the concept of distributed dead locks. [CO4,K2]
8. Design Flat transaction and nested transaction with example. [CO4,K6]
9. Explain the recovery of two phase commit protocol. [CO4,K2]
10. Write a note on Fault tolerance services. [CO4,K2]
UNIT-5
SECURITY TECHNIQUES
PART-A

1. What is Cryptography? [CO5,K1]


2. Define Security Policies, Security Mechanisms. [CO5,K1]
3. Write the role of cryptography. [CO5,K2]
4. What are the three broad classes of security threats? [CO5,K1]
5. What is DOS? [CO5,K1]
6. List the requirement for securing web-purchase. [CO5,K1]
7. What is secure digest function? [CO5,K1]
8. Write X509 certificate format. [CO5,K1]
9. Distinguish MD5 and SHA-1. [CO5,K3]
10. List the applications of cryptography. [CO5,K2]
11. What are three main objects used in Kerberos? [CO5,K1]
12. Compare Message passing and DSM. [CO5,K2]
13. Draw a neat sketch for Distributed shared memory abstraction. [CO5,K3]
14. Differentiate Byte oriented and Object- oriented DSM. [CO5,K3]
15. What is write-update? [CO5,K1]
16. Give two important problems addressed by invalidation protocol. [CO5,K2]
17. What are the needs to Munin’s implementation of release consistency? [CO5,K1]
18. What is CORBA? [CO5,K1]
19. List some services provided by CORBA. [CO5,K2]
20. Show the diagram for CORBA event channels. [CO5,K1]

Part-B
1. Discuss about important techniques and mechanisms for securing distributed systems and
applications.[CO5,K2]
2. Explain Cryptographic algorithm with suitable example.[CO5,K2]
3. Compare symmetric and Asymmetric algorithm.[CO5,K3]
4. Describe the role of digital signature in Security.[CO5,K3]
5. How to compare the performance of the encryption and secure hash algorithms.[CO5,K3]
6. Elucidate system architecture of Kerberos.[CO5,K5]
7. Summarize in detail about Securing Electronic transactions with secure sockets.[CO5,K2]
8. Point out in detail Design and Implementation issues of DSM.[CO5,K4]
9. Write a note on Write invalidation and Invalidation protocol.[CO5,K2]
10. Analyze in detail about the services provided by CORBA.[CO5, K4]

You might also like