Computers and Technology
Computers and Technology, 13.12.2021 02:10, dondre54

1. What properties should the entity identifiers/names in distributed systems have? What are the differences between names and addresses? 2. Compare the differences between name servers deployed at the global layer, the administrational layer, and the managerial layer of a large-scale name space.

3. Discuss the advantages and disadvantages of iterative and recursive name resolution, respectively.

4. Explain the working of the network time protocol (NTP) and the Berkeley Algorithm, respectively. Discuss the differences between the two algorithms.

5. Identify all the causally related events and concurrent events in the following figure

6. When use Lamport’s logical clocks to derive a total order of events in distributed systems, why each message needs to be acknowledged?

7. What are the limitations of Lamport’s logical clocks, and how does the vector clock algorithm solve the problems?
8. Explain why mutual exclusion is needed when machines in a distributed system concurrently access shared resources. Compare the advantages and disadvantages of token- and permission-based approaches for mutual exclusion.

9. Discuss the tradeoff between large and small consistency units (conit) in keeping data consistent.

10. Discuss the differences of sequential, causal consistency and their relation to the eventual consistency.

11. Compared the advantages and disadvantages of busy-waiting, blocking synchronizations and monitor-based synchronization.

12. Explain the working of the MESI cache coherence protocol.

13. Compare the differences of the four eventual consistency models: monotonic-read, monotonic-write, read-your-write, and write-follow-read.

14. What are the requirements for building a dependable system?

15. Discuss the advantages and disadvantages of the flat and hierarchical structures in a process group, respectively.

16. Explain why it is much more difficult to realize fault tolerance in distributed systems with arbitrary node failures (e. g., node exhibiting byzantine behaviors) than systems with other types of failures, e. g., crash, omission, and timing failures.

17. Describe the requirements for atomic multicast

18. Discuss how the two-phase distributed commit protocol handles coordinator and participant failures and what the limitation of the two-phase commit is.

19. Discuss the different types of security threats and the objectives of a secure system.

20. Compare secret key and public key based cryptography and explain how the two schemes work.

21. Quantitatively compare the cost of three different distributed locking protocols. i. e., decentralized, distributed, and token ring, in a distributed system with 2000 nodes. Assume that sending and receiving a message in the distributed system takes 2ms. The frequency of accessing the critical section is one access per second and on average there are three concurrent access requests at a time. Calculate the average cost of accessing the critical section (i. e., the time cost) in the three protocols. You can assume that the time spent in the critical section is zero and all cost comes from messaging.

22. Consider the following situation, in which machine A sends a clock synchronization request to time server B. The request has a timestamp of T1 = 1:52:19.200 (reads as one o’clock, fifty-two minutes, nineteen seconds and 200 milliseconds). Time server B receives the request at T2 and sends a response with its local timestamp at T3 = 1:52:19.500. The response is received at A at time T4 = 1:52:19.600. The network time protocol (NTP) is used for synchronization. Assume that the latency of the time server to respond to a clock synchronization request is 100 milliseconds, what is the offset of A’s clock relative to that of the time server and what timestamp should A set its clock to? Show your work and explain the practical meaning of the formula you use.

23. Consider the following communications between processes P0, P1, P2. Answer the questions below.

What are the vector timestamps of the six remaining events?

24. Give examples (using diagrams) of the following client-centric consistency models: monotonic reads, monotonic writes, read-your-writes, and writes-follow-reads.

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 22:00, littleprinces
Your task this week is to write a very simple spam classifier in python. it will classify messages as either spam (unwanted) or ham (wanted). the program will have a set of spam_words, words that are known to appear in spam messages. that set is included in the template file spam. pypreview the document. you will also define a spam threshold which reflects the allowed percentage of spam words in the message. you'll compute a 'spam indicator', which is the ratio of spam words to the total number of unique words in the message. if the spam indicator exceeds the spam threshold, the message is classified as spam. otherwise it is classified as ham. we'll assume that the spam threshold is a constant and has a value of 0.10. your program will prompt the user for a message and then will print the corresponding spam indicator with two decimal digits and the corresponding classification (spam or ham). the program will be case insensitive. the spam words are detected whether they are in lower case or upper case or mixed case. each word, spam or not, is counted once (even if it appears multiple times in the message.) the program will remove punctuation from the message before identifying the words and computing the spam indicator. for example '! ' must be identified as the spam word 'now'.
Answers: 3
image
Computers and Technology, 22.06.2019 03:10, brylove603
Write a program that begins by reading in a series of positive integers on a single line of input and then computes and prints the product of those integers. integers are accepted and multiplied until the user enters an integer less than 1. this final number is not part of the product. then, the program prints the product. if the first entered number is negative or 0, the program must print “bad input.” and terminate immediately. next, the program determines and prints the prime factorization of the product, listing the factors in increasing order. if a prime number is not a factor of the product, then it must not appear in the factorization. sample runs are given below. note that if the power of a prime is 1, then that 1 must appear in t
Answers: 3
image
Computers and Technology, 22.06.2019 10:00, danthehero56
Which of the following is true of operations within a spreadsheet program’s built-in functions? a. operations within parentheses, then multiplication and division, and then addition and subtraction are computed. b. operations within parentheses, then addition and subtraction, and then multiplication and division are computed. c. multiplication and division, then addition and subtraction, and then operations within parentheses are computed. d. addition and subtraction, then multiplication and division, and then operations within parentheses are computed
Answers: 2
image
Computers and Technology, 22.06.2019 12:40, Courtneymorris19
The most complicated four letter word
Answers: 1
Do you know the correct answer?
1. What properties should the entity identifiers/names in distributed systems have? What are the dif...

Questions in other subjects: