CS3551 Distributed Computing
CS3551 Distributed Computing
TWO MARKS
1. What is a distributed system?
A distributed system is one in which components located at networked computers
communicate and coordinate their actions only by passing messages. The
components interact with each other in order to achieve a common goal.
12. List any two resources of hardware and software, which can be shared in
distributed systems with examples
Five types of hardware resource and five types of data or software resource that
can usually be shared are printer,plotter,storage space,cd drive,dvd
drive,processing power. For example printer which takes graphics and texts from
the computer and later it gets transferred into a paper which is of standard size.
PART -B
1. Explain how a parallel system differs from a distributed system (May
2022,Mark-13)
2. Illustrate the difference between message passing and shared memory
processcommunication model (Dec 2022, Mark-13)
3. Discuss the design issuses and challenges in distributed system from a
systemperspective. (May 2022, Mark-13)
UNIT -2
TWO MARKS
1. What are the issues in distributed system?
There is no global time in a distributed system, so the clocks on different
computers do not necessarily give the same time as one another.
All communication between processes is achieved by means of messages.
Message communication over a computer network can be affected by delays, can
suffer from a variety of failures and is vulnerable to security attacks.
TWO MARKS
1. What is clock synchronization?
Nodes in distributed system to keep track of current time for various purposes such
as calculating the time spent by a process in CPU utilization ,disk I/O etc so that
the corresponding user can be charged. Clock synchronization means the time
difference between two nodes should be very small.
3. What is deadlock?
A Deadlock is a situation where a set of processes are blocked because each
process is holding a resource and waiting for another resource occupied by some
other process. When this situation arises, it is known as Deadlock. Deadlock.
Token-based approach.
Non-token-based approach.
Quorum-based approach.
UNIT - 4
TWO MARKS
Two phase commit protocol is designed to allow any participant to abort its part of
a transaction. In the first phase of the protocol, each participant votes for the
transaction to be committed or aborted. In the second phase of the protocol, every
participant in the transaction carries out the joint decision
PART - B
1. List the agreement statement that should be followed in synchronous system
with failure?
2. Illustrate briefly the two kinds of checkpoints for checkpoint algorithm?
3.Discuss the issues of failure recovery with an example?
4.Illustrate the different types of failure in distributed systems?
UNIT V
PART A
1. Define Cloud Computing.
2. List out the essential characteristics of cloud computing.
3. Define On-demand self service
4. Define Resource pooling
5. What is Rapid elasticity.
6. What is multi-tenancy.
7. List and define the services provided by the cloud models.
8. Define IaaS.
9. Define PaaS.
10. Define SaaS.
11. List and explain the cloud deployment models.
12. List out the Benefits, characteristics, adoption and examples of IaaS.
13. List out the Benefits, characteristics, adoption and examples of PaaS.
14. List out the Benefits, characteristics, adoption and examples of SaaS.
15. Explain Google App Engine.
16. Explain Sales force.
17. Explain Amazon EC2.
18. What is S3
19. List out the cloud based services and applications.
20. Define Virtualization.
21. What is Hypervisor.
22. Explain Full Virtualization, Para-Virtualization and Hardware Virtualization.
23. What is Guest OS.
24. What is scalability.
25. What is Load balancing.
26. What is the goal of load balancing techniques.
27. List out the popular hypervisors.
28. List out the algorithms used for load balancing .
29. What is Round Robin.
30. Weighted Round robin.
31. Explain about low latency in load balancing.
32. What is overflow in load balancing.
33. List and explain the persistence approaches used in load balancing.
34. What is sticky sessions.
35. Explain Session Database.
36. Explain cookies.
37. Explain re-writing.
38. Explain Scalability & Elasticity.
39. What is Capacity planning.
40. List out the examples of popular load balancers.
41. What is scaling in and scaling out.
42. What is over-provisioning and under provisioning.
43. Define Replication and its types.
44. Define Array-based Replication and its merits and demerits.
45. Define Network-based Replication and its benefits.
46. Define Host-based Replication.
47. What is Block-based replication and File-based replication.
48. Define Monitoring.
49. Define Compute services and list out its features.
50. Define Storage services and its features.
51. List out the providers of compute services.
52. List out the providers of storage services
53. Define Application services and list out its providers.
54. List out the providers of database services.
55. Explain Queuing services and its providers.
56. Explain Email services and its providers.
57. Explain Notification services and its providers.
58. Explain Media services and its providers.
PART B & C
1. Explain in detail about service models with neat diagram.
2. Discuss about deployment models with neat diagram.
3. Briefly explain about cloud services-IaaS,PaaS, SaaS.
4. Explain in detail about virtualization with neat diagrams.
5. Briefly explain about Load balancing.
6. Detaily explain about scalability and elasticity.
7. Explain in detail about Replication.
8. Briefly explain about Monitoring.
9. Explain in detail about compute services.
10. Explain in detail about storage services.
11. Explain in detail about Application services.