DS IMP Questions

Preview:

Citation preview

  • 8/9/2019 DS IMP Questions

    1/4

    UNIT I

    1. Desc ribe the various challenges in the design of distributed system.(16)

    2. What is Distributed system? State the advantages & disadvantages of Distributed systemover centralized system. (16)

    3. What does transparency mean? What are the different kinds of transparencies in adistributedsystem?Explain. (16)

    4. Describe the possible occurences of each of the main types of security threat that mightoccur in internet.

    5. Beirfly discuss architectural model.(16)

    6. Describe the types of fundfamental model.(16)7. Explain the 2 different approches to external data representation & marshalling. (16)

    8. Explain in detail the client - server communication using request reply protocol . (16)

    9. Explain in detail the group communication using request reply protocol . (16)10. Case study of IPC in UNIX. (16)

    UNIT II

    With a neat sketch describe the Distributed Object Model. (8)

    Discuss the invocation semantics for RMI (8)

    Discuss the architecture & design issues of RMI (16)Case study of Java RMI ------------16

    Explain the architecture of Sun NFS. (16)

    Discuss in detail the File Service Architecture. (16)What is name space? Explain (8)

    Discuss Name resolution in detail (8)

    Why do DNS root servers hold entries for 2 level names such as yahoo.com & purdue.edu

    rather than one level names such as edu & com? Explain .What are directory services? Explain.

    UNIT III

    1. Explain the operating system layer & explain Core OS functionality components

    2. Describe the design issues for thread package.

    3. Discuss Copy on write scheme

    4. Explain LRPC & also explain how to improve the performance of RPC

    5. What are threads? Explain the various types of multi Threaded architectures with neat sketch.

    6. Explain the architecture of a kernel suitable for a distributed system.

    7. Differentiate between the monolithic kernel and micro kernel approaches for designing &

    distributed operating systems .Discuss the relative advantages and disadvantages .

  • 8/9/2019 DS IMP Questions

    2/4

    8. Describe the internal and external synchronization of physical clocks.

    9. Explain the chandy and Lamports snapshot algorithm for determining the global states of

    distributed systems.

    10. Explain Berkeley algorithm.

    11. Explain Vector Clocks algorithm.

    12. Explain the Requirements of global states.

    13. Explain Lamport timestamps algorithm.

    14. What do you mean by distributed debugging? Discuss.

    15. What are the designs aims of Network Time Protocol? Explain.

    16. Describe any one algorithm for distributed mutual exclusions

    17. Define the distributed mutual exclusion problem

    UNIT IV

    1. Explain the architecture of distributed transaction with an example.

    2. Explain the Different two- phase commit protocol.

    3. Explain the two phases commit protocol with neat sketch.

    4. Explain Concurrency control in distributed transactions

    5. What is transaction recovery? Explain.

    6. Explain distributed deadlock detection algorithm with suitable example.

    7. Using the Lost Update problem explains about concurrency control.

    8. Discuss about nested transactions with their rules for commitment and its advantages

    9. How to ensure serial equivalence of any two transactions? Discuss 2 phase Locking with

    locking rules & implementation

    10.What is Deadlock? Explain.

    11. Discuss Two Version Locking

    12. What is time stamp? How it is used to implement concurrency control?

    13. Discuss about the various methods for recover ability from aborts.

  • 8/9/2019 DS IMP Questions

    3/4

    14. Explain Locking rules for nested transactions.

    15. Explain logging.

    16. Explain edge chasing algorithm & phantom deadlocks.

    17. Discuss timestamp ordering in detail.

    18. Briefly discuss optimistic concurrency control.

    19. How to increase concurrency in locking schemes? Explain.

    20. Explain the use of locks in strict two phase locking & Explain lock implementation.

    UNIT V

    1. Discuss in detail the transactions with replicated data.

    2. With a neat sketch, describe the Gossip architecture.

    3. Describe the issues in design group communication

    4. Explain the architectural model for management of replicated data & also explain the

    motivations for replication

    5. Discuss about the implementation of fault tolerance systems in detail

    6. Explain the techniques for securing distributed systems in detail

    7. Explain the techniques for securing distributed systems & applications in details

    8. Explain Cryptographic Algorithm in detail

    9. Write short notes

    a. Symmetric encryption algorithms

    b. Hybrid Cryptographic protocols

    10. Discuss Digital Signature in detail

    11. Explain i) Secure digest function, ii)Uses of cryptography

    12. What are the 2 basis types of operation a gossip service provides?

    13. Explain the phases involved in the performance of a single request upon the replicated

    objects.

  • 8/9/2019 DS IMP Questions

    4/4

    14. Explain fault tolerance systems in detail.

    15. Explain linearizability & sequential consistency.

    16. Discuss Backup & active replication .

    17. Explain virtual partition algorithm.

    18. Give an overview of security techniques.

    19. Write short notes on

    Credentials

    Firewalls

    Security & integrity