Define - Distributed System
Define - Distributed System
com
www.rejinpaul.com
UNIT – I: Introduction
PART – A (2 marks)
d) Scalability,
e) Failure handling,
f) Concurrency and
g) Transparency.
16. What is the role of Proxy server and mobile code? (M – 16)
A proxy server provides copies of resources which are managed by other servers. They are typically used as
caches for web resources. They maintain a cache of recently visited web pages or other resources.
Mobile code is the codes that are sent from one computer to another and run at the destination. Applets are a well-
known and widely used example of mobile code.
Recipients elect to receive messages sent to a group by joining the group. Senders then send messages to the group via
the group identifier, and hence do not need to know the recipients of the message. Groups typically also maintain group
membership and include mechanisms to deal with failure of group members.
A Distributed File System is a file system with distributed storage and users. DFS provides transparency of location,
access, and migration of files. DFS systems use cache replies for efficiency and fault tolerance.
4. What is transparency?
Transparency: Following are the desirable transparency:
a. Structure transparency: DFS normally uses multiple file servers for performance, scalability and reliability
reasons. Each file server is normally user process or sometimes a kernel process that is responsible for
controlling a set of secondary storage devices of the node on which it runs.
b. Access transparency: Both local and remote files should be accessible in the same way.
c. Naming transparency: The name of file should give no lint as to where the file is located.
d. Replication transparency: The clients do not need to know the existence or locations of multiple file copies.
5. Define – Mounting
It is one way merge different name space. The mount mechanism binds together several filename spaces into a
single hierarchical structured name space.
7. What is URL?
Uniform Resource Locater is a standard for specifying any kind of information on the internet.
a) Flat name spaces can’t generalize to large sets of machines because of the single set of identifiers,
b) Single central name authority was overloaded and
c) Frequently name address binding changes were costly and cumbersome.
Advantages:
It is simple and easy implement.
It is only method used for generating unstructured global unique identifier.
Disadvantages:
Suffers from poor efficiency and poor reliability.
Single global unique identifier generator may become a bottleneck for larger name space.
A lone lifetime
High availability
Fault isolation
Tolerance of mistrust
22. Give the advantages in using name caches in file systems. (N – 16)
The advantages of using name caches in file systems are
a) can be used in diskless workstation and
b) accessing a cache in memory is much faster.
Napster used a unified index of all available music files. For the application in question, the requirement for
consistency between the replicas was not strong, so this did not hamper performance, but for many applications it would
constitute a limitation. Unless the access path to the data objects is distributed, object discovery and addressing are likely to
become a bottleneck.
16. What are differences between the two-version locking scheme and an ordinary read-write locking scheme?
Read operations in the two-version locking scheme are delayed only while the transactions are being
committed, rather than during the entire execution of transactions – in most cases, the commit protocol takes only a
small fraction of the time required to perform an entire transaction.
Read operations of one transaction can cause delays in committing other transactions.
12. What are the techniques used for scheduling processes of a distributed system?
1. Task assignment approach,
2. Load-balancing approach and
3. Load-sharing approach.
16. What is the difference between centralized and distributed scheduling algorithm?
In a centralized dynamic scheduling algorithm the responsibility of scheduling physically resides on a single
node.
In a distributed dynamic scheduling algorithm, the work involved in making process assignment decisions is
physically distributed among the various nodes of the system.
19. What are the methods used for determining the threshold value?
Two methods are used to determine the threshold value
1. State policy: In this method, each node has a predefined threshold value depending on its processing
capability.
2. Dynamic policy: In this method, the threshold value of a node is calculated as a product of the average work
load of all the nodes and a predefined constant.
22. Name any four state information exchange policies in load balancing algorithm.
i) Periodic broadcast
ii) Broadcast when state changes
iii) On-demand exchange
iv) Exchange by polling
24. What are the two commonly used state information exchange in load sharing approach?
i) Broadcast when state changes.
ii) Poll when state changes.
25. What are the two location policies in load sharing approach?
i) Sender initiated location policy and
ii) Receiver initiated location policy.