Dear students get fully solved
assignments
Send your semester &
Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
[ FALL, 2015 ] ASSIGNMENT
PROGRAM
|
Master of Science in Information
Technology(MSc IT)Revised Fall 2011
|
SEMESTER
|
3
|
SUBJECT CODE & NAME
|
MIT3032– Distributed Operating System
|
CREDITS
|
4
|
BK ID
|
B0967
|
MARKS
|
60
|
Answer all Questions
Question.1. Explain (a) tightly coupled
systems (b) loosely coupled systems.
Answer:
(a) tightly coupled systems
Multiprocessing is the use of two or more
central processing units (CPUs) within a single computer system. The term also
refers to the ability of a system to support more than one processor and/or the
ability to allocate tasks between them. There are many variations on this basic
theme, and the definition of multiprocessing can vary with context, mostly as a
function of how CPUs are defined (multiple cores on one die, multiple dies in
one package, multiple packages in one system unit, etc.).
According to some on-line
(b) loosely coupled systems.
Loosely coupled multiprocessor systems (often
referred to as clusters) are based on multiple standalone single or dual
processor commodity computers interconnected via a high speed communication
system (Gigabit Ethernet is common). A Linux Beowulf cluster is an example of a
loosely coupled system.
Question.2. Write a note on Distributed
Algorithms.
Answer:A distributed algorithm is an algorithm designed to run on computer
hardware constructed from interconnected processors. Distributed algorithms are
used in many varied application areas of distributed computing, such as
telecommunications, scientific computing, distributed information processing,
and real-time process control. Standard problems solved by distributed
algorithms include leader election, consensus, distributed search
Question.3. Explain the communication
protocols of RPCs.
Answer:In computer science, a remote procedure call (RPC) is client/server
system in which a computer program causes a subroutine or procedure to execute
in another address space (commonly on another computer on a shared network)
without the programmer explicitly coding the details for this remote
interaction. That is, the programmer writes essentially the same code whether
the subroutine is local to the executing program, or remote. When the software
in question uses object-oriented principles, RPC might be called remote invocation
or remote method invocation (RMI). Many different (often incompatible)
Question.4. What are the important issues
involved in the design and implementation of DSM systems? Explain any two.
Answer:Object-based or structured DSM may use more efficient consistency because
it is easier to specify what is going to be shared. Users can identify points
in the program where the data is consistent. They only share designated objects
or variables. If shared data accesses happen only inside critical sections,
while a process enters into a critical section, the DSM only needs to ensure
that variables are consistent.
Question.5. (a) Explain any two replication
approaches in a DFS
Answer:The UNIX semantics is implemented in file systems for single CPU systems
because it is the most desirable semantics and because it is easy to serialize
all read/write requests. Implementing UNIX semantics in a distributed file
system is not easy. One may think that this can be achieved in a distributed
system by disallowing files to be cached at client nodes and allowing a shared
file to be managed by only one file server that
(b) What is Ceph? Explain.
Answer:In computing, Ceph is a free software storage platform that stores data
on a single distributed computer cluster, and provides interfaces for object-,
block- and file-level storage. Ceph aims primarily to be completely distributed
without a single point of failure, scalable to the exabyte level, and freely
available. Ceph replicates
Question.6. (a) What is key management in
cryptography? Explain.
Answer:Key management is the management of cryptographic keys in a cryptosystem.
This includes dealing with the generation, exchange, storage, use, and
replacement of keys. It includes cryptographic protocol design, key servers,
user procedures, and other relevant protocols.
Key management concerns keys at the user level, either between users or
systems. This is in contrast to key scheduling; key scheduling typically refers
Dear students get fully solved
assignments
Send your semester &
Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.