Distributed Computing Pyq
Distributed Computing Pyq
1
Q2 A Explain the following terms:
1. External data representation and marshalling.
2. Remote Procedure calling.
3. rmi callback.
OR
play their role in remote 7
B Draw and describe the various components that
method invocation.
C Draw the table representing 'Rmi invocation semantics' and describe the 7
same.
OR
D Write down a Java based calculator application which uses the concept of 7
rmi.
,
C Draw and explain the 'Sun Network Filesystem Architecture'.
OR
D Write short note on:
1. Andrew file system (AFS).
2. Mount service.
3. Discovery service.
: - - - - -
(a)i What are distributed systems? what are significant advantages and limitations of 4
distributed systems?
ii Explain with the example what could be the impact of absence of global clock and shared 3
memory.
OR
biDraw and explain two main types of architectural model. 4
ii Explain important types of transparencies in distributed system 3
Explain Interaction model and also describe two variants of interaction model. 5
ii Define integrity property of reliable communication. How to overcome security threats? 2
OR
(d)i State the techniques for failure handling in distributed system. 4
ii Explain process control block(PCB) in detail. 3
(a) Consider a simple application where client sends two integer values to a server, which 7
sums the values and returns the sum to the client.
Describe how you would implement the application using Remote method
invocation(RMI). Describe interfaces ,the remote methods, and remote method
invocations in client program.
OR
(biExplain the concept of Remote procedure cal(RPC) with a suitable example. How the 4
stubs help in making an RPC mechanism transparent ?
What do you mean by distributed objects? 3
Provide a block diagram to illustrate the CORBA architecture and also explain CORBA 7
services.
OR
(di Explain an architecture for distributed event notification. 3
Compare and contrast cORBA with remote method invocation(RMI) 4
OR
(b)i Give the architecture of Sun Network File
System (NFS).
1. What are different versions of NFS
Server?
2. What are different used
options in letc/exports file? 4
3. How will
you mount any file system on client machine
4. I am 2
unable to mount a NFS share. How
will you trace out the reason?
(c)i Explain X.500 Directory services.
ii Draw and Explain File Service Architecture. 4
OR
(d) Explain following:
Andrew File System(AFS) 7
Which two software
design characteristics.
component used in AFS implementation.
III. File name space seen
by clients of AFS
IV. Draw System call interception in AFS
Q.4 (a)i What is Election Aigorithms? Suppose that two process detect the faiiure of coordinator 3
simultaneously and both decide to hold an election using bully algorithm. What happens?
(b) i "Let us suppose that there is a coordinator process (Pc) and thrcc other prnccacs P,, P, P, 3
in the system. Also assume that requests are granted in first-come, first served order for
which conrdinator maintains the request queue. Suppose Pi sends request for entering in
critical section after that P2 asks for permission to enter in same critical section. Suppose
that while Pi is still in the critical section Pa also sends a request to enter same critical
section. After some time P1 exits the critical section".
Ilustrae the centralized approach for mutual exclusion with suitable diagram and
status of request
queue.
"Let us suppose that there are four processes P, Pa, Pa and Pa. While Pa is in a critical 4
ii
section, P and Pa wants to enter in same critical section. Processes P and P?'s timestamps
6 and 4 respectively."
Illustrate the distributed approach for mutual exclusion:
1. Status when processes Pi and Pa send request messages while Pa is already in
critical section;
2. Status while process P is still in critical section;
3. Status after process P4 exits critical section;
4. Status after process Pz exits critical section.
(c) Consider the following space time diagram for two processes P and P2.
page2
ei6
es
e23
ei2
eio e20
PROCESsP PRoceSs 2
1. List all pairs of events that are related by happened-before relation.
2. "Suppose each processes P: and P2 have a
counter Ci and C2,
logical clocks". Give the implementation ofrespectively.clocks
The
counters acts as a
using counters. logical
Write the conditions of
logical clocks for ordering an events based the
relation. on
happened-before 3
OR
(d)i What phantom deadlocks ? lustrate the centralized approach for deadlock detection
are
which could detect the 4
ii
phantom deadlocks?
Let us consider WFG- Based
distributed
sites S and S2, and the local WFGs of eachalgorithm
for deadlock detection, there are two 3
site are shown in figure
below.
Site $1 SiteS
page3
suitable example.
concurrency" by taking
Explain
"problems of
Q.5 t a i Transaction Model.
Distributed
OR
ii Explain
schedule and Non
Recoverable witn2-PC(Two-
schedule
vith
Two-Phase
the heln.
with
Commie),
exampl
p amp e
Explain
Recoverable
locking) integrate
(b)i and how
2-PL(Two-Phase
What is 2-PL
the help of diagram.
explain with
rdinators)
and coordinators) in two phas
different cases of failures(
participants commt
the
diWrite
protocol Justity
with
the statements wjith ite
its
protocol.
"Three-Phase Commit is non-blocking Working 4
transactions and
three
Consider the following
serializable?
write(x)
T1 Read(x)
Read(x) Write(x)
T2 Read(y) write(y)
write(x)
Readly
T3
MAY JUNE 2014 EXAMINATION
u YEAR BE (4YNC) INFORMATION TECHNOLOGY
IT3851: DSTRIBUTED COMPUTING
[Max. Marks 70
3Hrs.
Min. Marks 22
or((d).
Discuss the terms heterogeneity, openness, scalability and failure handling with respect to(7
distributedsystems. 1, 19
OR
b) Elaborate on the architectural models employed in distributed systems. 1
HP,
Describe the three main standard technological
OR
Discuss the interaction model and failure model.
components on which the web is based.
, 11
y17 7
Define 'external data representatiop', Interface definition language', temote interface' and
Actions g2 1to, OR
Explain in detail the steps involved to enable the invocalion of a remote methodioperaiion
in JAVA RMI. Also write down the steps of howonecanimplement callback. * /t3
Discuss the problems associated with aborting transactions which can occur even in the
presence of serially equivalent executions of transactions. duw uads
OR
g125
Discuss the terms deadlock, deadlock prevention, deadlock detection and the concept of
timeouts. Pau1s1, 1t
USing lock compatibility tauies discuss the conceptI of two version locking and hieiarchic
locks. 4 , S°0
OR
Draw and discuss the states of the coordinator and participantIs in the tiwo phase commit
protocol. a 9a0sas,56
- ---A~---- - X------
HD2. 30 521
APRIL-MAY 2013 E AMINATION
II B.E. (4YD(:) EXAM
IT-3851: DISTRIBUTTsD COMPUTING
State ihe varioJs tile system modules and their usage. [02)
inte:face' (operations) and idi
ie i3
S t a t e the differences between 'unix file system
seice interface' (opeiations). 02]
EldD orate on the use of 'directory servicc' in the 'Filc servicCe archartre".
OR
im
context to caching in client and he
server computer l03
befine the following tens iri
case of NFS implementation:
Read-ahead
delayed-write
write-through caching 02]
Discss file hand'es' in NFS 02]
translaion?
Vna t do you urderstard by 'path
name
07)
Deir e the following terins
Name resciution
Navigalion
Discovry sevices
OR
Differentiate between 'hard mounted' and 'soft
Draw the following mounted 'remote file system.
File service architecture 06
NFS architecture
Distribution of processes in AFS
Q.4 (a)
.With appropYiate cliagran discuss the central server algorithm for mutual exclusion. [04]
State any three
difference between central server aDd ring based mutual exclusion 03
algorithm.
OR
) What do you mean by the term 'election' w.r.t. Distributted systems? 02]
Discuss the ring based election
algcrith1n. [05]
Elaborate 'Bully aigorithm' used ifor Election. (07)
OR
Discuss about 'Multicast communication'. O7
.5 JA) Discuss the following associated with concurrently.executing transactions 06
The lost update problem' and The inconsistent retrievals problem.
Define the 'serialy equivalent interleaving'. 101]
OR
(U) Discuss the problems and solutions associated with aborting of.concurrently j07]
executing transactions.
) Draw the lock compatibility table for hierachie: Incks 04]
State three drawbacks of "locking'. 03
OR
(d Discuss.."optimistic concurrency ccrro appro&ch to the serialization of [07)
transactidns.
*y***********
APRIL-2012 EXAMINATION 213
III B.E. (4YDC) EXAAM
IT-3851: DISTRIBUTED COMPUTING
pt all the questions. Attempt.any two parts out of given three parts in each Question.
Write a program which uses Java RMI to display a message at the Serve. 8
What do you mean by RMI Cellback? 2
Invocation".
Draw the table represening "Fauk Toierance Measures" and "Invocation
Senantics" in RMI
4
Using diagramis represent the folowing:
Role of Proxy and Skelet on in RMi
Role of Clien: and Sever Stub Procedures in RPC
L.
Define the followi g for "Network File System":
Path Name Translation
Mount Sei v ice
Server and Client Caching
Draw the diagram representing different Navigation Techniques.
(i) Write in brief about Domain Name System. 3 3
Cii) Discuss in short, Directory and Discovery services.
(b) Using diagram discues "Central Server Algorithm" for Mutual Exclusion.
Elaborate "Ring based algorithm".
State what do you mean by the tern "Election"? 2
Deadlock prevention
Deadlock Detection
Hierarchic locks 3
i ) Draw the lock compatibility table for "Two version lockinB"
DEPARTMENT OF INFORMATION TECHNOLOGY
Mid TermI(January 2018)
IT 38501-Distributed Computing
Total Marks: 20
Time: 1 Hr
Q1 Write about
the
following incontext to distributed system.
1. Heterogeneity & Middleware
2. Openness (give example)
differences between:
Q2 State the
1. Synchronous and Asynchronous distributed system
2. Flat and Nested Transaction
TECHNOLOGY
DEPARTMENT OF INFORMÁTION