Anna University Previous Years Question Papers
Question paper code: 71365
B.E.,B.TECH DEGREE EXAMINATION,APRIL/MAY-2015
Eighth semester
Computer science and Engineering
CS 2056/CS 804/10144 CSE 53-DISTRIBUTED SYSTEM
(Common to information technology)
(Regulation 2008/2010)
Time- Three hour
Maximum mark-100
Answer all questions
PART A-10X2=20
1. List the importance of middleware?
2. Distinguish between buffering and caching.
3. Define remote interface?
4. What is meant by scheduler activation?
5. List the function of automounter in UNIX.
6. Define directory services.
7. Why clock synchronization is necessary?
8. Give a formula for the maximum throughput of a mutual exclusion system in terms of synchronization delay.
9. What is false sharing?
10. Why is thrashing an important issues in DSM system?
PART B-5X16=80 MARKS
11.(a) (i) Explain the challenges involved in building distributed system.
(ii) What factors affect the responsiveness of an application that accesses shared data managed by a server? Describe the remedies that are available and discuss the usefulness.
(or)
(b)(i) List the types of local resources that are vulnerable to an attack by an untrusted program that is downloaded from a remote site and run in a local computer. Explain it.
(ii)Explain IPv6.
12.(a)(i) Explain how a forwarded observer may be used to enhance the reliability and performances of object interest in an event services.
(ii)Explain the remote procedure call (RPC) mechanism with with various functional of components.
(or)
(b)(i)Explain the factors that motivate the hybrid scheduling approach of the scheduling activations design.
(ii)Explain how a shared region could be used for a process to read the data written by the kernel.
13.(a)(i) Explain sun NFS.
(ii) Compare the undate semantics of UNIX when accessing local files with those of NFS and AFS. Under what circumstances might client become aware of the differences?
(or)
(b)(i) What security issues are liable to be relevant to a directory service such as X.500 operating within an organization.
(ii) Explain DNS.
14.(a)(i) Explain snapshot algorithm with example.
(ii)Discuss about NTP.
(or)
(b)(i) Explain Ricart and Agrawala’s algorithm.
(ii) Show that Byzantine agreement can be reached for three generals, with one of them faulty, it the generals digitally sign their massage.
15.(a)(i) Discuss about design and implementation issues of DSM.
(ii)Describe sequential consistency DSM.
(or)
(b) Describe CORBA RIM and its services.
Question paper code: 71365
B.E.,B.TECH DEGREE EXAMINATION,APRIL/MAY-2015
Eighth semester
Computer science and Engineering
CS 2056/CS 804/10144 CSE 53-DISTRIBUTED SYSTEM
(Common to information technology)
(Regulation 2008/2010)
Time- Three hour
Maximum mark-100
Answer all questions
PART A-10X2=20
1. List the importance of middleware?
2. Distinguish between buffering and caching.
3. Define remote interface?
4. What is meant by scheduler activation?
5. List the function of automounter in UNIX.
6. Define directory services.
7. Why clock synchronization is necessary?
8. Give a formula for the maximum throughput of a mutual exclusion system in terms of synchronization delay.
9. What is false sharing?
10. Why is thrashing an important issues in DSM system?
PART B-5X16=80 MARKS
11.(a) (i) Explain the challenges involved in building distributed system.
(ii) What factors affect the responsiveness of an application that accesses shared data managed by a server? Describe the remedies that are available and discuss the usefulness.
(or)
(b)(i) List the types of local resources that are vulnerable to an attack by an untrusted program that is downloaded from a remote site and run in a local computer. Explain it.
(ii)Explain IPv6.
12.(a)(i) Explain how a forwarded observer may be used to enhance the reliability and performances of object interest in an event services.
(ii)Explain the remote procedure call (RPC) mechanism with with various functional of components.
(or)
(b)(i)Explain the factors that motivate the hybrid scheduling approach of the scheduling activations design.
(ii)Explain how a shared region could be used for a process to read the data written by the kernel.
13.(a)(i) Explain sun NFS.
(ii) Compare the undate semantics of UNIX when accessing local files with those of NFS and AFS. Under what circumstances might client become aware of the differences?
(or)
(b)(i) What security issues are liable to be relevant to a directory service such as X.500 operating within an organization.
(ii) Explain DNS.
14.(a)(i) Explain snapshot algorithm with example.
(ii)Discuss about NTP.
(or)
(b)(i) Explain Ricart and Agrawala’s algorithm.
(ii) Show that Byzantine agreement can be reached for three generals, with one of them faulty, it the generals digitally sign their massage.
15.(a)(i) Discuss about design and implementation issues of DSM.
(ii)Describe sequential consistency DSM.
(or)
(b) Describe CORBA RIM and its services.
0 comments:
Pen down your valuable important comments below