Code No: RR410502

Set No. 1

IV B.Tech I Semester Supplementary Examinations, February 2007 DISTRIBUTED SYTEMS ( Common to Computer Science & Engineering and Electronics & Computer Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. Discuss suitable design goals for a file service such as Sun NFS with respect to each of the following: performance, reliability, scalability, consistency, security. [3+3+3+3+4] 2. (a) What are three protocols involved in RPC Exchange Protocols? Explain. (b) Explain about the following: i. an Idempotent Operation ii. Multipacket messages. [2+6+4+4]

3. Why should UFIDs be unique across all possible file systems? How is uniqueness for UFIDs ensured? [8+8] 4. Explain about logical time and logical clocks. [8+8]

5. Explain ACID properties and how the transaction are failure and how they are recovered ? [16] 6. Explain about virtual partition algorithm. [16]

7. What are the approaches proposed by Cristian for masking failure. Explain in detail [4+12] 8. Summarize the abstractions provided by the Mach Kernel in detail. ⋆⋆⋆⋆⋆ [16]

1 of 1

Code No: RR410502

Set No. 2

IV B.Tech I Semester Supplementary Examinations, February 2007 DISTRIBUTED SYTEMS ( Common to Computer Science & Engineering and Electronics & Computer Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. . Explain about various network technologies. [16]

2. In the Implementation of RPC’s, explain about the stub procedures with the help of the relevant diagrams. [16] 3. (a) Can a server invoked by light weight procedure calls control the degree of concurrency within it? Explain. (b) Explain why and how a client is prevented from calling arbitrary code within a server under lightweight RPC. [8+8] 4. (a) Discuss the different modes that NTP servers synchronize with each other. (b) How are messages exchanged between a pair of NTP peers? [8+8]

5. Explain how the conversation takes place between a client and a server in detail. [16] 6. How the virtual partitions are implemented ? [16]

7. What are the approaches proposed by Cristian for masking failure. Explain in detail [4+12] 8. Summarize the abstractions provided by the Mach Kernel in detail. ⋆⋆⋆⋆⋆ [16]

1 of 1

Code No: RR410502

Set No. 3

IV B.Tech I Semester Supplementary Examinations, February 2007 DISTRIBUTED SYTEMS ( Common to Computer Science & Engineering and Electronics & Computer Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. (a) Why are distributed systems intrinsically less secure than centralized computer systems? Explain. (b) In some NFS implementations, the relevant user and group identifier is included in every request to a UNIX-based NFS server. Is this secure? [6+10] 2. Explain about various software components of client-server programs that enable remote procedure calling. [16] 3. Why should UFIDs be unique across all possible file systems? How is uniqueness for UFIDs ensured? [8+8] 4. Explain Cristian’s method for Synchronising clocks. [16]

5. Explain how the conversation takes place between a client and a server in detail. [16] 6. How the virtual partitions are implemented ? 7. Explain about closely synchronized group and loosely synchronized group. 8. Summarize the abstractions provided by the Mach Kernel in detail. ⋆⋆⋆⋆⋆ [16] [16] [16]

1 of 1

Code No: RR410502

Set No. 4

IV B.Tech I Semester Supplementary Examinations, February 2007 DISTRIBUTED SYTEMS ( Common to Computer Science & Engineering and Electronics & Computer Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ⋆⋆⋆⋆⋆ 1. Define a Distributed System. What are the key characteristics? Discuss in detail. [2+7+7] 2. Distinguish Data gram communication and stream communication of Inter process communication in UNIX. [8+8] 3. (a) Can a server invoked by light weight procedure calls control the degree of concurrency within it? Explain. (b) Explain why and how a client is prevented from calling arbitrary code within a server under lightweight RPC. [8+8] 4. Explain the following. (a) Clock drift (b) Coordinated Universal Time. [8+8]

5. Explain how the conversation takes place between a client and a server in detail. [16] 6. (a) Explain the two phases in the two-phase commit protocol with the help of a diagram. (b) Discuss the performance of the two phase commit protocol. 7. What are various characteristics of faults. 8. (a) Explain about the creation of Tasks and Threads in MACH. (b) Write in Detail about the Communication model of MACH. ⋆⋆⋆⋆⋆ [8+ 8] [6+4+6] [16]

1 of 1