Vous êtes sur la page 1sur 2

,""w-+

G 5035 (Pages:2) Reg. No...


Name.......

M.C.^& DEGREE D(AIVTTNATION, APRIL 2OL6


Fifth Semester
Elective II-DISTRIBUTED COMPUTING
-
(2013 Admissions Rqsular/2011 and 2012 Admissions -
Supplementary and Lateral Entry-
\ 2014 Admissions -
Regular/2013 Admissions Supplementary) -
Time : Three Hours Maximum: 75 Marks
PartA
. a--,-.-^- any
Answer -
t'en questinns.
Each question carcies 3 marks.

1. What is the role of middleware in distributed system ?

2. Dbscribe preciselylwhat is meant by a scalable system.


3. What are Superpeers ?

4. Cdmment on diffeFent types of communication.


5. Wht" a note on the three types of replicas.
I
6. Write sbp* ngtqqig4Iephgqlg4{E@-pfqtocof
7. What is GPS ?

8. What is a fault and what are its types ?

9. Etplain secret-key distribution.


10. Comment on the side effects of Coda's BPC2 system.
11. How mounting is Sone in NFS ?

t2. Draw the general organization of a JavaSpace in Jini.


(10x3=30marks)
t
Psrt B
I Answer all questinns.
Each questian carrics g marhs.
f
13. (d Errylain about the different types of distributed system.
1

Or
(b)
ll

Discuss the role of threads in distributed system.


14. (a) Discuss the i$sues concerned viith parameter passing in RPC system.
Or
(b) Discuss any tiwo approaches used for locating an entity when its identifier only given.

. T\rrn over
a
FF _r;{qF ;_r*:iw1+ :?eFAiB .Fr'' :r:'5::_.,!i .Swin*ryf.r'{iir'j@

2 c5035
15. (a) Briefly discuss about Data-Centric consistency models.
Or
(b) What are the iBsues involved in reliably delivering message to a process groups ?
16. (a) Explain how delegation of access right technique used to implementing protection in
distribution syistem.
Or
(b) What are the v4ays in which a message could be protected against unauthorized modification ?

L7. (a) Explain how security is achieved in NFS.


Or
(b) Explain TlB/Rendezvous.
' (5x9=45marks)

Vous aimerez peut-être aussi