0% found this document useful (0 votes)
17 views3 pages

Cia2 DC Questionbank

Uploaded by

naveenkumarv.edu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views3 pages

Cia2 DC Questionbank

Uploaded by

naveenkumarv.edu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

DISTRIBUTED COMPUTING QUESTION BANK

Explain about phantom deadlock.


 A phantom deadlock is a deadlock that is detected in a distributed system but no
longer exists at the time of detection. This happens due to internal delays in the
system.
1.  A deadlock that is detected but is not really a deadlock is called phantom
deadlock

State the use of rollback recovery.


 Restore the system back to consistent state after a failure.
 Achieve fault tolerance by periodically saving the state of process during the
2. failure-free execution.
 Treats a distributed system application as a collection of processes that
communicate over a network.

What are the performance aspects of agreement protocols?


 Time: No .of rounds needed to reach an agreement.
 Message traffic : Number of messages exchanged to reach an agreement.
3.
 Storage overhead : amount of information that needs to stored at processors
during execution of the protocol.

Explain two types of checkpoints.


 Tentative : A temporary checkpoint that is made a permenant checkpoint on the
4. successful termination of the checkpoint algorithm.
 Permanent : A local checkpoint at a process.

Differentiate between agreement and consensus problem.


The difference between the agreement problem and the consensus problem is that, in
5. agreement problem, a single process has the initial value, whereas in the consensus
problem , all processes have an initial value.

What do you mean by local checkpoints?


 A process may take a local check point anytime during the execution.
 The local checkpoints of different processes are not coordinated to form a global
6.
consistent checkpoint

What is deadlock detection?


Deadlock detection involves two basic tasks: maintenance of the state graph and search
of the state graph for the presence of cycles. Because in distributed systems a cycle may
7.
involve several sites, the search for cycles greatly depends on how the system state
graph is represented across the system.

Outline the Wait For Graph(WFG).


 The state of the system can be modeled by a directed graph , called a wait-for
graph(WFG).
8.
 In a WFG nodes are processes and there is an edge from node P1 to node P2 if
P1 is blocked and is waiting for P2 to release some resource .

Define Load Balancing.


 Load balancing can be defined as the process of task distribution among
multiple computers, processes, disk or other resources in order to get optimal
9.
resource utilization and to reduce the computation time.
 It is mainly responsible for resource sharing and utilization.

10. Recall about Scalability and Elasticity.


DISTRIBUTED COMPUTING QUESTION BANK

 Scalability and elasticity are both important factors to consider when building an
application on the cloud. They are related to how a system can handle load and
how quickly it can scale up or down based on demand.
 Scalability is the ability of a system to handle increased workloads, while
elasticity is the ability of a system to respond to changes in resource
requirements
What is Google Cloud Storage?
11. Google Cloud Storage is a service that allows users to store, access, and maintain data
in Google Cloud.
Explain characteristics of laas.
 Resources are provided as a service.
 Allows for dynamic scaling and elasticity.
 It has a variable cost , usage based pricing model.
12.
 It has multi-tenet architecture ,includes multiple usera on a single piece of
hardware.
 IaaS typically has enterprise grade infrastructure.

List the function of EC2.


 Load variety of operating system
 Install custom applications
13.
 Manage network access permission

Run image using as many/few systems as we desire.


Quote the relation of compute service with a storage service in a cloud environment.
Cloud storage
 Stores data and files on the internet. Cloud storage providers securely manage
the storage infrastructure, allowing users to access their data from anywhere
with an internet connection.
14.
Compute services
Allows users to perform processes on the data stored in cloud storage. For example,
Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides compute
capacity in the cloud. It allows users to scale their computing resources up and down as
needed

PART B
Explain in detail about the Byzantine Agreement Problem.(16)

 Byzantine agreement problem


1.  Consensus problem
 Interactive consistency problem
 Solution to Byzantine agreement problem

Describe the issues involved in a failure recovery with the help of a distributed
computation .
 Types of failures
2.
 Issues in failure

3. Describe in detail about checkpoint based recovery.

 Uncoordinated checkpointing
 Coordinated checkpointing
 Communication – induced check pointing
 Model based checkpointing
 Index-based checkpointing
DISTRIBUTED COMPUTING QUESTION BANK

Explain Cloud Deployment Models and Cloud Service Models.


Cloud Deployment Models
 Public cloud
 Private cloud
 Hybrid cloud
 Community cloud
4.
Cloud Service Models.
 SaaS(Software as a Service)
 PaaS(Platform as a Service)
 IaaS(Infrastructure as a Service)

Discuss in detail about Virtualization.


 Virtualization concepts
 Hypervisor
5.
 Para – virtualization
 Full - virtualization

A company like to have an advanced collaboration services like video, chat and web
conferences for their employees, but their system does not support any of the IT
resources due to insufficient infrastructure. If they could leverage cloud computing
technology in their systems, suggest a suitable cloud type with proper justification. List
the characteristics of cloud computing .
6.
 Justification for the suggested cloud type-public
 Charcteristics of cloud computing

Explain in detail about Chandy Misra Haas algorithm for OR model.


 Data structures
7.  The algorithm
 Performance analysis

Summarize deadlock handling strategies.


 Deadlock prevention
8.  Dead lock avoidance
 Deadlock detection

Explain in detail about Chandy Misra Haas algorithm for AND model.
 Data structures
9.
 The algorithm
 Performance analysis
Summarize the models of deadlocks.
 The single resource model
 The AND model
10.  The OR model
 The AND-OR model
 The P-out –of-Q model
 Unrestricted model

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy