Sunday 27 September 2015

mit3032 smu msc it summer 2015 IIIrd sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412

PROGRAM
Master of Science in Information Technology (MSc IT)Revised Fall 2011
SEMESTER
3
SUBJECT CODE & NAME
MIT3032– Distributed Operating System

Qus:1 Explain (a) tightly coupled systems (b) loosely coupled systems.
Ans:
(a) Tightly coupled systems:
In tightly coupled systems, there is a single system wide primary memory (address space) that is shared by all the processors. If any processor writes, for example, the value 100 to the memory location x, any other


Qus:2 Write a note on Distributed Algorithms.
Ans:
Distributed Algorithms:
We know that externally synchronized clocks are also internally synchronized. That is, if each node’s clock is independently synchronized with real time, all the clocks of the system remain mutually

Qus: 3 List and explain the desirable features of a good message passing system.
Ans:
The desirable features of a good message passing system:
Desirable features of a good message passing system are:

·         Simplicity
·         Efficiency
·         Reliability
·         Correctness
·         Flexibility
·         Security


Qus:4 Explain the object locating mechanisms.
Ans:
The object locating mechanisms:
Object locating is mapping the system oriented names of objects to the location of the object. Some object locating mechanisms are listed below:
I)                   Broadcasting: Object’s location is found by broadcasting a request from the client node. Expanding ring broadcast: This approach is employed in an internetwork consisting of LANs connected

Qus:5 (a) Explain any two approaches to replication in a DFS.
(b) What is Ceph? Explain.
Ans:
(a) Explain any two approaches to replication in a DFS:
1. Explicit replication: The client explicitly writes files to multiple servers. This approach requires explicit support from the


Qus:6 (a) What is key management in cryptography? Explain.
(b) Explain the means of authentication
Ans:
(a) What is key management in cryptography? Explain.
Key management is the set of techniques and procedures supporting the establishment and maintenance of keying relationships between authorized parties.

Key management encompasses techniques and procedures supporting:
1.      Initialization


Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject and rs 625/semester only.
if urgent then call us on 08791490301, 08273413412


No comments:

Post a Comment