QB Distributed Systems
QB Distributed Systems
QUESTION BANK
DISTRIBUTED SYSTEMS
UNIT - 1
Q1.) What are the web challenges involved in a distributed system. [2018-2019][ODD SEM]
Q2.) What are Lamport Logical clocks? List the important conditions to be satisfied by
Lamport’s Logical clocks. Discuss the limitations of Lamport logical clocks.
[2018-2019][ODD SEM]
Q3.) Why would you design a system as a distributed system? List some advantages of the
distributed systems. [2017-2018][ODD SEM]
Q4.) List out the main challenges of distributed systems. [2016-2017][ODD SEM]
Q5.) What are logical clocks? Why does a logical clock need to be implemented in distributed
systems? [2016-2017][ODD SEM]
Q6.) List the goals of distributed systems? [2015-2016][ODD SEM]
Q7.) Why there is no Global clock in distributed system? Give reason.
[2016-2017][EVEN SEM]
Q8.) Discuss the inherent limitations of distributed system.
[(2013-2014) / (2016-2017)][EVEN SEM]
Q9.) What is Lamport’s Logical clock? For Lamport’s clock system, prove that for any two
events ‘a’ and ‘b’ if a→b, then, C (a) < C (b), but vice versa is not true.
[2016-2017][EVEN SEM]
Q10.) Define distributed systems with its examples. [2015-2016][EVEN SEM]
Q11.) How resource sharing is done in distributed systems? [2014-2015][EVEN SEM]
Q12.) How does Vector clock overcome the disadvantages of Lamport’s clock? Explain with an
example. [2014-2015][EVEN SEM]
Q13.) What do you mean by casual ordering of messages? If process P sends two messages m1
& m2 to another process Q, what problems may arise if the two messages are not received by
PREPARED BY: AYUSH SINGHAL
DEPARTMENT: CSE 1
the recipient Q, in the order they were sent by the process P. Develop an algorithm which
guarantees the casual ordering of the message in distributed system.
[2015-2016][ODD SEM],[2014-2015][EVEN SEM]
Q14.) Define the term transparency. Explain the important types of transparencies in distributed
system. [2013-2014][ODD SEM],[2015-2016][EVEN SEM]
Q15.) How the distributed computing system is better than parallel processing system? Explain
Q16.) What is termination detection in distributed system? Explain any algorithm for termination
detection. [2013-2014][EVEN SEM],[2015-2016][ODD SEM]
Q17.) Calculate the time stamp for each event in given scenario using Lamport’s Logical Clock
& Vector clock.
P1 has 5 events (e11, e12, e13, e14, e15), P2 has 3 events (e21, e22, e23) and P3 has 3 events
(e31, e32, e33) and the dependencies between the events are as follows:-
“e12 -> e32”, “e22-> e14”, “e23-> e33”
Q18.) What do you mean by global state? Differentiate between consistent and strongly
consistent global state? Also write the Chandy Lamport’s global state recording algorithm.
[2014-2015][EVEN SEM],[2015-2016][ODD SEM]
Q19.) Discuss the following with the help of suitable example:- (i) Total order (ii) Casual order
[2012-2013][EVEN SEM]
Q20.) Explain the following distributed computing models:- [2013-2014][ODD SEM]
(i) Mini Computer Model
(ii) Work Station Model
(iii) Work Station Server Model
Q21.) Why would you design a system as a distributed system? List some advantages of
distributed systems. List three properties of distributed systems. [2017-2018][ODD SEM]
Q22.) Explain desirable features of a good message passing system. [2015-2016][ODD SEM]
Q23.) Discuss the architectural, fundamental and security models of distributed systems in detail.
Q24.) Differentiate between a local call and a remote call.
UNIT – 3
Q1.) What do you understand by agreement protocols? List all the agreement protocols and the
differences between them.
Q2.) (i) Show that Byzantine agreement cannot be reached among four processors when two
are faulty.
(ii) Show how a solution to the consensus problem can be used to solve the interactive
consistency problem.
Q3.) Explain Lamport Shostak Pease algorithm. Solve it for when the number of processors is
five and the number of faulty processors is one.
Q4.) Discuss impossibility results for Byzantine agreement.
Q5.) Discuss the general system model used for agreement protocols. Give the applications of
agreement problem.
Q6.) Caching is one of the techniques used to improve access to naming data. What are the
benefits of caching and what assumptions must hold for it to be useful?
Q7.) In the context of distributed file system, explain the following:-
(i) Mounting (ii) Caching (iii) Bulk Data Transfer (iv) Hints
Q8.) Explain the Read Replication and Full Replication algorithm for implementing distributed
shared memory.
PREPARED BY: AYUSH SINGHAL
DEPARTMENT: CSE 4
Q9.) Discuss how the efficiency of distributed shared memory system depends on the size of
granularity and protocol used for page replacement.
Q10.) Discuss the architecture, design and implementation issues of distributed shared memory
and its advantages.
Q11.) Write short notes on the following:-
(i) Atomic commit in Distributed DBMS (ii) Memory Coherence
Q12.) Explain the typical architecture and mechanism of distributed file system. Explain data
access actions in distributed file system.
Q13.) What is Cache? Discuss read operation with cache and write operation with cache.
Q14.) Explain the concept of naming in distributed system. What is flat naming and structured
naming?
Q15.) Describe memory coherence. Briefly explain the write invalidate and write update
protocols.
UNIT – 4
Q1.) With reference to the backward error recovery, explain the operation-based approach and state
based approach.
Q2.) What do you mean by Atomic committing Distributed Database system? Also explain the two
phases commit protocol used for realizing atomicity in distributed system.
Q3.) Write short notes on the following:-
a) Dynamic voting Protocols
b) Method to obtain consistent set of checkpoint
c) Backward and Forward Recovery
Q4.) Fault Tolerance can be achieved by Error Processing? Explain.
Q5.) Differentiate between:-
(a) Fault and Failure (b) Orphan Messages and Lost Messages
(c) Consistent set of checkpoints and Strongly consistent set of checkpoints
(d) Livelock and Deadlock
Q6.) How check pointing is used in fault tolerance in distributed systems? Explain independent check
pointing and coordinated check pointing?
UNIT – 5