SlideShare a Scribd company logo
1 of 4
V V COLLEGE OF ENGINEERING
V V Nagar, Arasoor, Tisaiyanvilai
INTERNAL ASSESSMENT TEST – II
III CSE – VI SEMESTER (BATCH 2020-2024)
Department of Computer Science and Engineering
Sub Code /Name: CP4071/ BIO INFORMATICS Date: -03-2023 ( )
Sem/Branch : III/ CSE Duration: 1:30 hrs.
Max. Marks: 100
PART - A (5 x 4 = 20 Marks)
1. Compare centralized and distribued
2. Illustrate coupling
Coupling refers to the degree to which two or more processes are interdependent.
3. Identify consistent snapshot
A snapshot algorithm is used to create a consistent snapshot of the global state of a distributed system.
Due to the lack of globally shared memory and a global clock, this is not trivially possible.
4. State crown criterion theorem
The crown criterion states that an A-computation is RSC, i.e., it can be realized on a system with
synchronous communication, if and only if it contains no crown. - For an A-execution, A is RSC if and
only if A is an S-execution.
5. What is deadlock resolution
Deadlock resolution involves breaking existing wait-for dependencies between the processes to resolve
the deadlock. It involves rolling back one or more deadlocked processes and assigning their resources to
blocked processes so that they can resume execution.
PART-B(2x26=52)
11. (a)(i).Enlighten the examples of distributed systems.
System Components in a Distributed System
● primary system controller.
● system data store.
● database.
(ii).Summarize the significant issues and challenges of the distributed system.
Key characteristics of distributed systems
● Resource sharing.
● Openess.
● Concurrency.
● Scalability.
● Fault Tolerance.
● Transparency.
(b)(i)Summarize NTP for synchronizing system of physical clocks in distributed systems
NTP is an internet protocol used to synchronize with computer clock time sources in a network. NTP
leverages UDP protocol over port 123, to synchronize clocks within a few seconds of the UTC time.
Each computer(OS) comes with the NTP Package
There are two types of NTP servers that you can use to provide UTC time to your network: public servers
and local servers. A public time server is owned and operated by a third party who makes it available for
use over the internet
(ii).Explain logical time and logical clocks.
Logical Clocks refer to implementing a protocol on all machines within your distributed system, so that
the machines are able to maintain consistent ordering of events within some virtual timespan.
12. (a)(i)How causal order and total order is implemented in synchronous
Reasons that may lead to violation of causal ordering of messages
1. It may happen due to a transmission delay.
2. Congestion in the network.
3. Failure of a system.
Distributed program logic greatly depends on the order of delivery of messages. Several orderings on
messages have been defined: (i) non-FIFO, (ii) FIFO, (iii) causal order, and (iv) synchronous order.
(ii).Point out the key areas of applications of group communication
Group communication has many benefits in the workplace, including:
● Providing a way for group members to generate ideas and solutions to achieve their common
goal.
● Encouraging members to make decisions as a group.
● Creating a way for the team to build rapport with one another.
b)(i).Illustrate realizable with synchronous communication(RSC) execution
Realizable Synchronous Communication (RSC)
An execution can be modeled to give a total order that extends the partial order (E, ≺). a linear extension
of the execution, such that each send event is immediately followed by its corresponding receive event
in this linear extension.
(ii).Analyze the channels to simulate an execution using synchronous primitives on an
asynchronous systems
Synchronous execution means the first task in a program must finish processing before moving on to
executing the next task whereas asynchronous execution means a second task can begin executing in
parallel, without waiting for an earlier task to finish
PART- C (1x28=28)
16.a. A user arrives at a railway station that she has never visited before, carrying a PDA that is
capable of wireless networking. Suggest how the user could be provided with information about the
local services and amenities at that station, without entering the station’s name or attributes. What
technical challenges must be overcome? Discuss in detail.
The user must be able to acquire the address of locally relevant information as automatically as possible.
One method is for the local wireless network to provide the URL of web pages about the locality over a local
wireless network. For this to work:
(1) the user must run a program on her device that listens for these URLs, and which gives the user sufficient
control that she is not swamped by unwanted URLs of the places she passes through; and
(2) the means of propagating the URL (e.g. infrared or an 802.11 wireless LAN) should have a reach that
corresponds to the physical spread of the place itself.
b. Consider a distributed system where every node has its physical clock and all physical clocks are
perfectly synchronized. Develop an algorithm to record global state assuming the communication
network is reliable.

More Related Content

Similar to Ds2_ans.docx

VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...IJCSIS Research Publications
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfPreliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfYAAKOVSOLOMON1
 
Uw as ns design challenges in transport layer
Uw as ns design challenges in transport layerUw as ns design challenges in transport layer
Uw as ns design challenges in transport layereSAT Publishing House
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layerDeepak John
 
Services interfaces for interoperability of signaling computerinterlocking on...
Services interfaces for interoperability of signaling computerinterlocking on...Services interfaces for interoperability of signaling computerinterlocking on...
Services interfaces for interoperability of signaling computerinterlocking on...IJECEIAES
 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Damir Delija
 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Damir Delija
 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Damir Delija
 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingIRJET Journal
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksEditor IJCATR
 
Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...TELKOMNIKA JOURNAL
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfGandhibabu8
 
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...IJCNCJournal
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
 

Similar to Ds2_ans.docx (20)

VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
 
Ig3514391443
Ig3514391443Ig3514391443
Ig3514391443
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfPreliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
 
Uw as ns design challenges in transport layer
Uw as ns design challenges in transport layerUw as ns design challenges in transport layer
Uw as ns design challenges in transport layer
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layer
 
Services interfaces for interoperability of signaling computerinterlocking on...
Services interfaces for interoperability of signaling computerinterlocking on...Services interfaces for interoperability of signaling computerinterlocking on...
Services interfaces for interoperability of signaling computerinterlocking on...
 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...
 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...
 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...
 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
 
Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
 
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 

Recently uploaded

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

Ds2_ans.docx

  • 1. V V COLLEGE OF ENGINEERING V V Nagar, Arasoor, Tisaiyanvilai INTERNAL ASSESSMENT TEST – II III CSE – VI SEMESTER (BATCH 2020-2024) Department of Computer Science and Engineering Sub Code /Name: CP4071/ BIO INFORMATICS Date: -03-2023 ( ) Sem/Branch : III/ CSE Duration: 1:30 hrs. Max. Marks: 100 PART - A (5 x 4 = 20 Marks) 1. Compare centralized and distribued 2. Illustrate coupling Coupling refers to the degree to which two or more processes are interdependent. 3. Identify consistent snapshot A snapshot algorithm is used to create a consistent snapshot of the global state of a distributed system. Due to the lack of globally shared memory and a global clock, this is not trivially possible. 4. State crown criterion theorem The crown criterion states that an A-computation is RSC, i.e., it can be realized on a system with synchronous communication, if and only if it contains no crown. - For an A-execution, A is RSC if and only if A is an S-execution. 5. What is deadlock resolution
  • 2. Deadlock resolution involves breaking existing wait-for dependencies between the processes to resolve the deadlock. It involves rolling back one or more deadlocked processes and assigning their resources to blocked processes so that they can resume execution. PART-B(2x26=52) 11. (a)(i).Enlighten the examples of distributed systems. System Components in a Distributed System ● primary system controller. ● system data store. ● database. (ii).Summarize the significant issues and challenges of the distributed system. Key characteristics of distributed systems ● Resource sharing. ● Openess. ● Concurrency. ● Scalability. ● Fault Tolerance. ● Transparency. (b)(i)Summarize NTP for synchronizing system of physical clocks in distributed systems NTP is an internet protocol used to synchronize with computer clock time sources in a network. NTP leverages UDP protocol over port 123, to synchronize clocks within a few seconds of the UTC time. Each computer(OS) comes with the NTP Package There are two types of NTP servers that you can use to provide UTC time to your network: public servers and local servers. A public time server is owned and operated by a third party who makes it available for use over the internet (ii).Explain logical time and logical clocks. Logical Clocks refer to implementing a protocol on all machines within your distributed system, so that the machines are able to maintain consistent ordering of events within some virtual timespan.
  • 3. 12. (a)(i)How causal order and total order is implemented in synchronous Reasons that may lead to violation of causal ordering of messages 1. It may happen due to a transmission delay. 2. Congestion in the network. 3. Failure of a system. Distributed program logic greatly depends on the order of delivery of messages. Several orderings on messages have been defined: (i) non-FIFO, (ii) FIFO, (iii) causal order, and (iv) synchronous order. (ii).Point out the key areas of applications of group communication Group communication has many benefits in the workplace, including: ● Providing a way for group members to generate ideas and solutions to achieve their common goal. ● Encouraging members to make decisions as a group. ● Creating a way for the team to build rapport with one another. b)(i).Illustrate realizable with synchronous communication(RSC) execution Realizable Synchronous Communication (RSC) An execution can be modeled to give a total order that extends the partial order (E, ≺). a linear extension of the execution, such that each send event is immediately followed by its corresponding receive event in this linear extension. (ii).Analyze the channels to simulate an execution using synchronous primitives on an asynchronous systems Synchronous execution means the first task in a program must finish processing before moving on to
  • 4. executing the next task whereas asynchronous execution means a second task can begin executing in parallel, without waiting for an earlier task to finish PART- C (1x28=28) 16.a. A user arrives at a railway station that she has never visited before, carrying a PDA that is capable of wireless networking. Suggest how the user could be provided with information about the local services and amenities at that station, without entering the station’s name or attributes. What technical challenges must be overcome? Discuss in detail. The user must be able to acquire the address of locally relevant information as automatically as possible. One method is for the local wireless network to provide the URL of web pages about the locality over a local wireless network. For this to work: (1) the user must run a program on her device that listens for these URLs, and which gives the user sufficient control that she is not swamped by unwanted URLs of the places she passes through; and (2) the means of propagating the URL (e.g. infrared or an 802.11 wireless LAN) should have a reach that corresponds to the physical spread of the place itself. b. Consider a distributed system where every node has its physical clock and all physical clocks are perfectly synchronized. Develop an algorithm to record global state assuming the communication network is reliable.