Dist - Model Paper

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Model-QP-JAN-2011/ITE308

Reg. No. :
Name :

Campus: Vellore

Term End –Model Question Paper


B.Tech – Information Technology – VI Semester
Course : ITE308 – Distributed Systems
Time: Three Hours Max.Marks:100

PART – A (8 X 5 = 40 Marks)
Answer ALL the Questions

1. (a) List the characteristics of distributed systems. [2]


(b) Differentiate flat file service from directory service. [3]

2. (a) State main purpose of proxy server in internetworking. [2]


(b) How network time service is implemented in a WAN? [3]

3. (a) State any two variants of client-server model. [2]


(b) List the main operations on files in UNIX systems. [3]

4. (a) Exemplify the purpose of using web crawlers along with the search engines? [2]
(b) With suitable sketch define the functionality of middleware layer. [3]

5. (a) When do we need for a Push-Model support? [2]


(b) What is the significance of navigation in DNS? [3]

6. (a) What is meant by conflicting operations? [2]


(b) Differentiate distance vector and link state routing algorithm. [3]

7. (a) Differentiate URL from URI with suitable example. [2]


(b) State the main purpose of routing overlays in distributed computing. [3]

8. (a) With neat sketch define clock synchronization using time server. [2]
(b) What is meant by totally ordered logical clock? [3]
Model-QP-JAN-2011/ITE308

PART – B (6 X 10 = 60 Marks)
Answer any SIX Questions

9. (a) State the significance of RIP in finding the route information. [3]
(b) Illustrate the variants of client server models with suitable examples. [7]

10. (a) List the essential design requirements of distributed architecture. [3]
(b) Explain two variants of the interaction model. [7]

11. (a) Typify the essential network transmission principles. [3]


(b) How are unused remote objects handled by java garbage handling? [7]

12. (a) Depict the necessity of UFIDs in flat file service with suitable example. [3]
(b) List out the pitfalls of christian’s algorithm and explain how Berkley’s algorithm [7]
tries to resolve the issue.

13. (a) Is two-phase locking restricted only to centralized methods of transaction? Justify. [3]
(b) Explicate the possibilities of transaction conflicts happening during a read and [7]
write operation.

14. (a) State the key issue in the design of peer-to-peer applications. [3]
(b) How does CORBA’s concurrency control help in avoiding deadlock? [7]

15. (a) Define hierarchic lock. [3]


(b) Explicate how the time stamp approach helps in overcoming the lost-update [7]
problem.

16. (a) State Ivy’s dynamic distributed manager algorithm. [3]


(b) Identify the consequence when sequential consistency may fail, if a read-update or [7]
write-update fails and the re-update process has to take place. Discuss the delay in
time incurred.

You might also like