GTU Computer Engineering (Semester 8)
Distributed Systems
December 2015
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1(a) What are the fundamental issues in resource management in distributed system?
7 M
1(b) Why is scalability an important feature in the design of a distributed system? Discuss some of the guiding principles for designing a scalable distributed system.
7 M

2(a) What are the different types of failures and how are they dealt in distributed system?
7 M
Solve any one question from Q.2(b) & Q.2(c)
2(b) What is datagram? Explain the mechanism of handling multiple datagrams in IPC.
7 M
2(c) Network system protocols are unsuitable for distributed systems. Explain.
7 M

Solve any one question from Q.3 & Q.4
3(a) Enumerate the various issues in clock synchronization. Classify the clock synchronization algorithms and explain Berkeley algorithm with an example.
7 M
3(b) What is remote method invocation? What are the commonalities and differences between RPC and RMI?
7 M

4(a) Compare message passing And distributed shared memory approaches.
7 M
4(b) Define thrashing in DSM. Also explain methods for solving thrashing problem in DSM
7 M

Solve any one question from Q.5 & Q.6
5(a) What is process migration? List the steps for it. What is the advantage of process migration?
7 M
5(b) What are threads? Enumerate the major differences between threads and processes. Discuss thread synchronization.
7 M

6(a) What is object location? How is it carried out in a distributed system? Discuss various object-locating mechanisms.
7 M
6(b) Explain an algorithm using multicast and logical clocks for mutual exclusion.
7 M

Solve any one question from Q.7 & Q.8
7(a) How does DFS differ from a file system used for a centralized time-sharing system?
7 M
7(b) Explain the DNS name service and bind implementation of DNS.
7 M

8(a) Explain the DSM system architecture. How does granularity affect DSM system Performance?
7 M
8(b) Explain the common approaches to user authentication. What problems are associated with these approaches?
7 M



More question papers from Distributed Systems
SPONSORED ADVERTISEMENTS