Вы находитесь на странице: 1из 5

MUTHAYAMMAL ENGINEERING COLLEGE, RASIPURAM-637 408

DEPARTMENT OF COMPUTER SCIENCE A NAD ENGINEERING

DISTRIBUTED SYSTEMS

UNIT-1

Introduction to Distributed Systems

PART-A

1. What is Distributed Systems?[CO1,K1]


2. Measure the consequences faced by the designers in developing DS. [CO1,K5]
3. Show where the distributed system is applied. [CO1,K3]
4. Estimate how distributed system benefits resource sharing. [CO1,K2]
5. Compare Centralized and Distributed System. [CO1,K4]
6. Show how distributed System helps cloud computing. [CO1,K3]
7. Rank the advantages and disadvantages of HTML, URLs and HTTP as core technologies for information
browsing? [CO1,K5]
8. Define Inter process Communication. [CO1,K1]
9. Classify the issues in the design of RPC. CO1,K4]
10. Discuss the design issues of RMI. [CO1,K2]
11. Differentiate marshalling and unmarshalling. [CO1,K2]
12. Illustratethe two significant factors affecting interacting process in a distributed system. [CO1,K3]
13. List two main characteristics of Distributed event based system. [CO1,K1]
14. Draw a diagram to represent middleware layer. [CO1,K3]
15. What are the 3 alternative approaches to external data representation? [CO1,K1]
16. Distinguish broadcasting and multicasting. [CO1,K3]
17. Difference between datagram packet and virtual circuit packet delivery. [CO1,K3]
18. Compare IPv4 and IPv6. [CO1,K3]
19. Classify the security challenges faced by the distributed systems. [CO1,K4]
20. What is the need of openness in distributed system? [CO1,K1]

PART-B

1. Explain the challenges in developing a Distributed system. [CO1,K 4]


2. Explain the fundamental models considered in design of DS. [CO1,K 2]
3. Explain the Architectural models considered in design of DS. [CO1,K 2]
4. Describe how will you compare and contrast cloud computing with more traditional client-server
computing? [CO1,K 2]
5. Discuss the networking issues for Distributed systems. [CO1,K 2]
6. How to route the packet in WAN?Explain in detail. [CO1,K 2]
7. Describe about group communication. [CO1,K 2]
8. Designa communication system between Distributed Objects? [CO1,K 6]
9. DescribeWith a neat sketch explain remote procedure call. [CO1,K 2]
10. What is RMI? How it is implemented? Write notes on JAVARMI. [CO1,K 1]
UNIT-2

OPERATING SYSTEM SUPPORT AND DISTRIBUTED FILE SYSTEMS

PART-A
1. Express in diagram the file attributes record structure? ?[CO2,K2]
2. What are the advantages in using name caches in file systems?[CO2.K1]
3. Explain the working of Andrew file system?[CO2,K5]
4. What do you mean by cache consistency?[CO2,K1]
5. Give the different forms of transparency in file services. ?[CO2,K2]
6. What data must the NFS client module hold on behalf of each user-level process?[CO2,K1]
7. Develop How does AFS deal with the risk that callback messages may be lost? ?[CO2,K6]
8. Define naming and locality facility?[CO2,K1]
9. Apply how will you make use of name space and DNS? ?[CO2,K3]
10. Formulate how caching helps a name service’s availability? [CO2,K6]
11. Explain on LDAP? [CO2,K5]
12. Demonstrate the use of name cache? [CO2,K3]
13. List four types of eventthat the kernel notifies to the user-level scheduler. [CO2,K 3]
14. Compare monolithic kernel and Micor kernel. [CO2,K3]
15. What are the modules in File system? [CO2,K1]
16. List out the requirements of Distributed File system. [CO2,K3]
17. What is DNS? [CO2,K1]
18. What is attribute based naming service? [CO2,K1]
19. Why the name management is separated from other services?justify. [CO2,K2]
20. Demonstrate the use of name cache. [CO2,K3]

PART-B
1. Analyze in detail about distributed file system, its characteristics and requirements. [CO2,K4]
2. Examine about the function of file Service Architecture with neat diagram[CO2,K2]
3. Formulate the design and implementation of name services and Domain Name services. [CO2,K 6]
4. Explain about operating system architecture. [CO2,K2]
5. Write a short note on Threads. [CO2,K2]
6. Describe about Communication and invocation. [CO2,K2]
7. Describe the architecture and server operation of NFS in detail. [CO2,K2]
8. Analyze in detail about Global name services. [CO2,K4]
9. How to customize and combine name space? Explain. [CO2,K2]
10.Summarize in detail about naming in file systems. [CO2,K4]
UNIT-3

TIME AND GLOBAL STATES

PART-A
1. What are the main tasks of routing overlay? [CO3,K1]
2. Classify the Characteristics of Peer to Peer System?[CO3,K4]
3. Discuss how IP and Overlay routing for Peer- to-Peer applications differ from each other?[CO3,K2]
4. Classify the functional and non-functional requirements of peer to peer middle ware Systems.?[CO3,K4]
5. Illustrate what is the use of routing overlay? [CO3,K3]
6. Define pastry.[CO3,K1]
7. Definethe terms: clock screw and clock drift rate. [CO3,K1]
8. Describe How will you synchronize physical clock? [CO3,K2]
9. What is meant by “Happened Before relationship”? [CO3,K1]
10. Point out thereasonwhycomputer clock synchronization is necessary. [CO3,K4]
11. Define distributed mutual exclusion. [CO3,K1]
12. Differentiate physical clock and logical clock. [CO3,K2]
13. Howwillyou assess a consensus problem ? [CO3,K5]
14. Distinguish between IP and overlay routing for perer to peer applications. [CO3,K3]
15. What is peer to peer system? [CO3,K1]
16. List out features of NTP. [CO3,K3]
17. What is global state predicate? [CO3,K1]
18. List the criteria to evaluate the performance of algorithm for mutual exclusion. [CO3,K3]
19. Define election algorithm. [CO3,K1]
20. Write 2 different types of multicast. [CO3,K2]
PART-B
1. Give the functional and non-functional requirements of peer-to –peer middleware. [CO3,K1]
2. What is meant by Napster legacy? Explain. [CO3,K1]
3. Explain about file system access model and its sharing semantics. [CO3,K5]
4. Explain on Peer to Peer middleware systems. [CO3,K5]
5. Illustrate with a case study explain about the application of distributed algorithm routing
overlays.(Tapestry) [CO3,K3]
i) Describe in detail about cristian’s and Berkley algorithm for synchronizing clocks.(8)
ii) Examine Briefly about global states. (8) [CO3,K1]
6. Distinguish and examine the process of active and passive replication model.(13) [CO3,K4]
7. Summarize on i) Rickart and Agarwala’s Algorithm(8) ii) Maekawa’s Voting Algorithm(8) [CO3,K2]
8. i) What is the goal of an election algorithm? Explain any two election algorithml.(8)
ii) Examine how mutual exclusion is handled in distributed system.(8) [CO3,K1]
9. i) Summarize the internal and external synchronization of Physical clocks.(8)
ii) Give the Chandy and Lamports snapshot algorithm for determining the global states of distributed
systems. (8) [CO3,K2]
UNIT-4

DISTRIBUTED TRANSACTIONS

PART-A
1. What is transaction? [CO4,K1]
2. Give the use of nested transaction. [CO4,K2]
3. Formulate the ACID properties. [CO4,K6]
4. Illustrate what is concurrency control? Give its use. [CO4,K3]
5. Showhow will you make use of nested transaction? Point out its rules? [CO4,K4]
6. Mention some motivation for replication. [CO4,K1]
7. Discuss what are the advantages and drawbacks of multi version timestamp ordering in comparison with
ordinary timestamp ordering? [CO4,K2]
8. Define consistent cut. [CO4,K1]
9. Explain the rules to abort the nested transaction. [CO4,K3]
10. Formulate the techniques used to synchronize clock? [CO4,K6]
11. What read lock and writelock? [CO4,K1]
12. List avantages of Nested transactions. [CO4,K3]
13. Define dirty read and premature writes. [CO4,K1]
14. What is deadlock? [CO4,K1]
15. List the drawbacks of locking. [CO4,K3]
16. What are the phases of Transaction? [CO4,K1]
17. Differentiate Flat and Distributed Transactions. [CO4,K3]
18. What are the operations for two-phase commit protocol. [CO4,K2]
19. Write down the steps for Edge chasing algorithm. [CO4,K1]
20. What is recovery manager? List its role. [CO4,K1]

PART-B

1. Discuss in detail about one phase and two phase atomic commit protocol (flat and hierarchical).
[CO4,K2]
2. Examine replication in detail. [CO4,K1]
3. Examine Briefly about optimistic concurrency control. [CO4,K2]
4. Discuss about Time stamp ordering. [CO4,K2]
5. Describe the methods for increasing concurrency in locking schemes. [CO4,K2]
6. Illustrate the importance of nested transaction with an example. [CO4,K3]
7. Describe with case study, explain the concept of distributed dead locks. [CO4,K2]
8. Design Flat transaction and nested transaction with example. [CO4,K6]
9. Explain the recovery of two phase commit protocol. [CO4,K2]
10. Write a note on Fault tolerance services. [CO4,K2]
UNIT-5
SECURITY TECHNIQUES
PART-A

1. What is Cryptography? [CO5,K1]


2. Define Security Policies, Security Mechanisms. [CO5,K1]
3. Write the role of cryptography. [CO5,K2]
4. What are the three broad classes of security threats? [CO5,K1]
5. What is DOS? [CO5,K1]
6. List the requirement for securing web-purchase. [CO5,K1]
7. What is secure digest function? [CO5,K1]
8. Write X509 certificate format. [CO5,K1]
9. Distinguish MD5 and SHA-1. [CO5,K3]
10. List the applications of cryptography. [CO5,K2]
11. What are three main objects used in Kerberos? [CO5,K1]
12. Compare Message passing and DSM. [CO5,K2]
13. Draw a neat sketch for Distributed shared memory abstraction. [CO5,K3]
14. Differentiate Byte oriented and Object- oriented DSM. [CO5,K3]
15. What is write-update? [CO5,K1]
16. Give two important problems addressed by invalidation protocol. [CO5,K2]
17. What are the needs to Munin’s implementation of release consistency? [CO5,K1]
18. What is CORBA? [CO5,K1]
19. List some services provided by CORBA. [CO5,K2]
20. Show the diagram for CORBA event channels. [CO5,K1]

Part-B
1. Discuss about important techniques and mechanisms for securing distributed systems and
applications.[CO5,K2]
2. Explain Cryptographic algorithm with suitable example.[CO5,K2]
3. Compare symmetric and Asymmetric algorithm.[CO5,K3]
4. Describe the role of digital signature in Security.[CO5,K3]
5. How to compare the performance of the encryption and secure hash algorithms.[CO5,K3]
6. Elucidate system architecture of Kerberos.[CO5,K5]
7. Summarize in detail about Securing Electronic transactions with secure sockets.[CO5,K2]
8. Point out in detail Design and Implementation issues of DSM.[CO5,K4]
9. Write a note on Write invalidation and Invalidation protocol.[CO5,K2]
10. Analyze in detail about the services provided by CORBA.[CO5, K4]

Вам также может понравиться