Ds16marks (1,2)
Ds16marks (1,2)
INTRODUCTION
1. lllustrate the difference between message passing and shared memory process
communication model.
[Nov/Dec 2022]
In this model, data is shared by sending and receiving messages between co-operating
processes, using system calls . Message Passing is particularly useful in a distributed environment
where the communicating processes may reside on different, network connected, systems. The
major challenges in distributed systems
Heterogeneity: The Internet enables users to access services and run applications over a
heterogeneous collection of computers and networks.
Transparency
Openness.
Concurrency.
Security.
Scalability.
Shared memory system is the fundamental model of inter process communication. In a
shared memory system, in the address space region the cooperating communicate with each
other by establishing the shared memory region. Shared memory concept works on fastest inter
process communication
2. Explain the types of group communication used in distributed system. [Nov/Dec 2022]
Systems hardware and software can be categorized under the following:
Communication between two processes in a distributed system is required to exchange
various data, such as code or a file, between the processes. When one source process tries to
communicate with multiple processes at once, it is called Group Communication
Operating system: Harnesses communication between hardware, system programs, and
other applications.
Device driver: Enables device communication with the OS and other programs.
Firmware: Enables device control and identification.
Translator: Translates high-level languages to low-level machine codes.
Utility: Ensures optimum functionality of devices and applications.
3. Why global states are essential in distributed computing systems? Elaborate with an
example. [Nov/Dec 2021]
The global state of a distributed system is the set of local states of each individual
processes involved in the system plus the state of the communication channels. At any point in
computation there is at most one event that can happen next.
Spontaneous networking is referenced here as the integration of services and devices into
network environments with the objective of an instantaneous service availability without
any manual intervention.
There are two areas of spontaneous networking, a device concerned one and a service
concerned one. The first area includes all tasks required for integrating a node into the
communication infrastructure like negotiation of transmissions protocols and speeds,
configuration of addresses, routing information, and other resources.
Automatic device integration into network environments handles all tasks making the device
able to communicate with others. That includes the configuration of physical and logical
parameters
In Ethernet and IP based networks there exists a variety of protocols that provide
mechanisms for automatic parameter configuration [Ste96]. Table 2 gives a short
description of some of them
4. Elaborate any two logical dock categories in distributed systems with an example.
[Nov/Dec 2021]
A logical clock is a mechanism for capturing chronological and causal relationships in
a distributed system. Distributed systems may have no physically synchronous global clock, so a
logical clock allows global ordering on events from different processes in such systems
(1) the user must run a program on her device that listens for these URLs, and which gives the user
sufficient control that she is not swamped by unwanted URLs of the places she passes through; and
(2) the means of propagating the URL (e.g. infrared or an 802.11 wireless LAN) should have a
reach that corresponds to the physical spread of the place itself.
5. Consider a distributed system environment of the prevailing WWW and discuss the
challenges meeting out sharing of resources. [April/May 2018]
HTTP (short for Hypertext Transfer Protocol) is the message protocol that supports the
World Wide Web. It specifies the format of messages exchanged between a web browser and a web
server. All web browsers use the HTTP format to request pages from a web server, and all web
servers use the HTTP format to send back their responses.
Client/Server model Clients are active and servers are passive ˆ Caching technique vs.
buffering ˆ The WWW (World Wide Web) the "hypertext" structure among the documents. Open
system Standard technological components:
• HTML (HyperText Markup Language)
• URL (Uniform Resource Locators)
• HTTP (HyperText Transfer Protocol). ˆ
URL scheme:scheme-specific-identifier ˆ HTTP A request-reply protocol Specify content types
in request One resource per request Dynamic pages, Downloaded code (mobile code)
6. List the various challenges in distributed in distributed systems and explain them.
(Nov/Dec 2017) (Nov/Dec 2016)
Challenges of distributed systems
Heterogeneity
Openness
Security
Scalability
Failure Handling
Concurrency
Transparency
7. Elaborate on the recent trends in distributed systems.
(Nov/Dec 2017), (Nov/Dec 2016)
(Or)
Explain in detail about trends in distributed systems. (May/June 2016)
Pervasive networking and the modern internet
Mobile and ubiquitous computing
Distributed multimedia systems
Distributed computing as a utility
8. How resource sharing is done in distributed systems. (Nov/Dec 2016)
The term resource is a rather abstract one, but it best characteristics the range of things that
can usefully be shared in a networking system.
Resources in a distributed system are encapsulated within one computer and can only be
accessed from other computers by communication.
For effective sharing, each resource must be managed by a program that offers a
communication interface enabling the resources to be accessed
9. Enlighten the examples of distributed systems. (May/June 2016)
The internet
An intranet which is a portion of the internet managed by an organization
Mobile and ubiquitous computing
Air traffic control
Modern data centers
10. Write a short note on WWW (May/June 2016)
WWW is an evolving system for publishing and accessing resources and services across the
internet
It is a collection of million s of files stored on thousands of servers and communication
standards over the world.
It uses client server interaction
The browser acts as a client that uses the internet to contract a remote server.
11. Explain the goals of distributed systems.
Making resource available
Distribution transparency
Openness
Scalability
12. Describe in detail about types of transparency.
Location transparency: User using resources need not know the location of the resource
Access transparency: Using identical operations
Concurrency transparency: Several processed operate concurrently
Replication transparency: Multiple instances of resources to be used
Failure transparency: User and application to complete their tasks
Mobility transparency: Movement of resources
Performance transparency: Allows the system to be reconfigured
Scaling transparency: Allows the system and application to expand the scale.
13. List the advantages and disadvantages of transparency.
Advantages transparency
Easier for the user
Doesn’t have to better with system topology
Doesn’t has to know about changes
Easier to understand
Disadvantages transparency:
Optimization cannot be done by programmer or user
Strange behavior when the underlying system fails
Underlying system can be very complete
14. Discuss the techniques for dealing with failure.
Detecting failures: not all failures are detected but some of the failure can be detected
Masking failure: failure are hidden or made less server.
Tolerating failures: in the internet, client can be designed
Recovery from failures: recovery involves the design of software
Redundancy: services can be made to tolerate failures.
15. Explain the example of hardware resource sharing.
Computing server: It executes processor intensive applications
Remote object server: It executes methods on behalf of clients.
Worm program: It shares CPU capacity of desktops
Memory: cache server holds recently accessed web pages
Disk: file server, virtual disk serer
Screen: network windows systems
Printer: networked printers accept print jobs from many computers.
Tolerating failures: Most of the services in the Internet do exhibit failures – it would not
be practical for them to attempt to detect and hide all of the failures that might occur in
such a large network with so many components..
Recovery from failures: Recovery involves the design of software so that the state of
permanent data can be recovered or ‘rolled back’ after a server has crashed.
27. Explain the goals of distributed systems.
Resources types
Hardware, e.g. printer, scanner, camera
Data, e.g. file, database, web page
More specific functionality, e.g. search engine, file
Service
Manage a collection of related resources and present their functionalities to users and
applications
Server
A process on networked computer that accepts requests from processes on other computers
to perform a service and responds appropriately
Client
The requesting process
Remote invocation
A complete interaction between client and server, from the point when the client sends its
request to when it receives the server’s response
28 . Explain about resource sharing in distributed systems.
The term resource is a rather abstract one, but it best characteristics the range of things that
can usefully be shared in a networking system.
UNIT II
1.What are the four different types of ordering the messages?Explain. [Nov/Dec 2022]
Message ordering normally means that each subscriber receives messages from a
particular queue manager, on a particular topic, from a particular publisher in the order that they
are published by that publisher
4. Describe the snapshot algorithms which could be applied for FIFO channels with
diagrammatic representation.
[Nov/Dec 2021]
The Chandy-Lamport algorithm uses a control message, called a marker whose role in a
FIFO system is to separate messages in the channels. After a site has recorded its snapshot, it sends
a marker, along all of its outgoing channels before sending out any more messages
Failure modes for distributed systems as perceived for the user of those systems
Crash failures
Timing failures
Omission failures
Byzantine failures
Byzantine or arbitrary failures
Authentification detectable byzantine failures
Performance failures
Fail-stop failures
5. Compare the various types of system models in distributed environment.
[April/May 2018]
An architectural model of a distributed system defines the way in which the components of the
system interact with each other and the way in which they are mapped onto an underlying network
of computers. E.gs. include the client-server model and the peer process model.
The client-server model can be modified by:
The partition of data or replication at cooperating servers
The caching of data by proxy servers and clients
The use of mobile code and mobile agents. E.g. applets and object serialization
1. Life cycle : Creation, migration and deletion of distributed objects is different from local
objects
2. Reference : Remote references to distributed objects are more complex than simple pointers
to memory addresses
3. Request Latency : A distributed object request is orders of magnitude slower than local
method invocation
4. Object Activation : Distributed objects may not always be available to serve an object
request at any point in time
5. Parallelism : Distributed objects may be executed in parallel.
6. Communication : There are different communication primitives available for distributed
objects requests
7. Failure : Distributed objects have far more points of failure than typical local objects.
8. Security : Distribution makes them vulnerable to attack.
16. Explain with diagrammatic illustration the working of remote procedure call.
Working of Remote Procedure Call
The client calls a local procedure called client stub
These network messages are sent to the remote system
The network messages are transferred to the remote system
A server stub procedure is waiting on the remote system
The server stub executes a local procedures call
When the server procedures is finished
17. Explain the Remote procedure call (RPC) mechanism with various functional
components.
Push arguments onto stack
Trap to kernel
Kernel memory map of clients
Client thread executes procedures
Thread traps to kernel
Kernel changes the address
18. Describe CORBA RMI and its services.
Methods Remarks
GET It retrieves information identified by the URI
POST It sends information to a URI and retrieves result.
HEAD It retrieves meta information
PUT Store information in location
DELETE It remove entity