Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412
PROGRAM
Master
of Science in Information Technology (MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT
CODE & NAME
MIT3032–
Distributed Operating System
Qus:1
Explain (a) tightly coupled systems (b) loosely coupled systems.
Ans:
(a)
Tightly coupled systems:
In tightly
coupled systems, there is a single system wide primary memory (address
space) that is shared by all the processors. If any processor writes, for example,
the value 100 to the memory location x, any other
Qus:2
Write a note on Distributed Algorithms.
Ans:
Distributed
Algorithms:
We know that externally
synchronized clocks are also internally synchronized. That is, if each node’s
clock is independently synchronized with real time, all the clocks of the
system remain mutually
Qus:
3 List and explain the desirable features of a good message passing system.
Ans:
The
desirable features of a good message passing system:
Desirable
features of a good message passing system are:
·
Simplicity
·
Efficiency
·
Reliability
·
Correctness
·
Flexibility
·
Security
Qus:4
Explain the object locating mechanisms.
Ans:
The
object locating mechanisms:
Object locating is
mapping the system oriented names of objects to the location of the object.
Some object locating mechanisms are listed below:
I)
Broadcasting:
Object’s location is found by broadcasting a request from the client node.
Expanding ring broadcast: This approach is employed in an internetwork
consisting of LANs connected
Qus:5
(a) Explain any two approaches to replication in a DFS.
(b)
What is Ceph? Explain.
Ans:
(a)
Explain any two approaches to replication in a DFS:
1. Explicit replication: The client
explicitly writes files to multiple servers. This approach requires explicit
support from the
Qus:6
(a) What is key management in cryptography? Explain.
(b)
Explain the means of authentication
Ans:
(a)
What is key management in cryptography? Explain.
Key management is
the set of techniques and procedures supporting the establishment and
maintenance of keying relationships between authorized parties.
Key management
encompasses techniques and procedures supporting:
1.
Initialization
Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs
125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412
No comments:
Post a Comment