SlideShare a Scribd company logo
1 of 4
V V COLLEGE OF ENGINEERING
V V Nagar, Arasoor, Tisaiyanvilai
INTERNAL ASSESSMENT TEST โ€“ II
III CSE โ€“ VI SEMESTER (BATCH 2020-2024)
Department of Computer Science and Engineering
Sub Code /Name: CP4071/ BIO INFORMATICS Date: -03-2023 ( )
Sem/Branch : III/ CSE Duration: 1:30 hrs.
Max. Marks: 100
PART - A (5 x 4 = 20 Marks)
1. Compare centralized and distribued
2. Illustrate coupling
Coupling refers to the degree to which two or more processes are interdependent.
3. Identify consistent snapshot
A snapshot algorithm is used to create a consistent snapshot of the global state of a distributed system.
Due to the lack of globally shared memory and a global clock, this is not trivially possible.
4. State crown criterion theorem
The crown criterion states that an A-computation is RSC, i.e., it can be realized on a system with
synchronous communication, if and only if it contains no crown. - For an A-execution, A is RSC if and
only if A is an S-execution.
5. What is deadlock resolution
Deadlock resolution involves breaking existing wait-for dependencies between the processes to resolve
the deadlock. It involves rolling back one or more deadlocked processes and assigning their resources to
blocked processes so that they can resume execution.
PART-B(2x26=52)
11. (a)(i).Enlighten the examples of distributed systems.
System Components in a Distributed System
โ— primary system controller.
โ— system data store.
โ— database.
(ii).Summarize the significant issues and challenges of the distributed system.
Key characteristics of distributed systems
โ— Resource sharing.
โ— Openess.
โ— Concurrency.
โ— Scalability.
โ— Fault Tolerance.
โ— Transparency.
(b)(i)Summarize NTP for synchronizing system of physical clocks in distributed systems
NTP is an internet protocol used to synchronize with computer clock time sources in a network. NTP
leverages UDP protocol over port 123, to synchronize clocks within a few seconds of the UTC time.
Each computer(OS) comes with the NTP Package
There are two types of NTP servers that you can use to provide UTC time to your network: public servers
and local servers. A public time server is owned and operated by a third party who makes it available for
use over the internet
(ii).Explain logical time and logical clocks.
Logical Clocks refer to implementing a protocol on all machines within your distributed system, so that
the machines are able to maintain consistent ordering of events within some virtual timespan.
12. (a)(i)How causal order and total order is implemented in synchronous
Reasons that may lead to violation of causal ordering of messages
1. It may happen due to a transmission delay.
2. Congestion in the network.
3. Failure of a system.
Distributed program logic greatly depends on the order of delivery of messages. Several orderings on
messages have been defined: (i) non-FIFO, (ii) FIFO, (iii) causal order, and (iv) synchronous order.
(ii).Point out the key areas of applications of group communication
Group communication has many benefits in the workplace, including:
โ— Providing a way for group members to generate ideas and solutions to achieve their common
goal.
โ— Encouraging members to make decisions as a group.
โ— Creating a way for the team to build rapport with one another.
b)(i).Illustrate realizable with synchronous communication(RSC) execution
Realizable Synchronous Communication (RSC)
An execution can be modeled to give a total order that extends the partial order (E, โ‰บ). a linear extension
of the execution, such that each send event is immediately followed by its corresponding receive event
in this linear extension.
(ii).Analyze the channels to simulate an execution using synchronous primitives on an
asynchronous systems
Synchronous execution means the first task in a program must finish processing before moving on to
executing the next task whereas asynchronous execution means a second task can begin executing in
parallel, without waiting for an earlier task to finish
PART- C (1x28=28)
16.a. A user arrives at a railway station that she has never visited before, carrying a PDA that is
capable of wireless networking. Suggest how the user could be provided with information about the
local services and amenities at that station, without entering the stationโ€™s name or attributes. What
technical challenges must be overcome? Discuss in detail.
The user must be able to acquire the address of locally relevant information as automatically as possible.
One method is for the local wireless network to provide the URL of web pages about the locality over a local
wireless network. For this to work:
(1) the user must run a program on her device that listens for these URLs, and which gives the user sufficient
control that she is not swamped by unwanted URLs of the places she passes through; and
(2) the means of propagating the URL (e.g. infrared or an 802.11 wireless LAN) should have a reach that
corresponds to the physical spread of the place itself.
b. Consider a distributed system where every node has its physical clock and all physical clocks are
perfectly synchronized. Develop an algorithm to record global state assuming the communication
network is reliable.

More Related Content

Similar to Ds2_ans.docx

Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfPreliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
YAAKOVSOLOMON1
ย 
Services interfaces for interoperability of signaling computerinterlocking on...
Services interfaces for interoperability of signaling computerinterlocking on...Services interfaces for interoperability of signaling computerinterlocking on...
Services interfaces for interoperability of signaling computerinterlocking on...
IJECEIAES
ย 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...
Damir Delija
ย 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...
Damir Delija
ย 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...
Damir Delija
ย 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
IJERA Editor
ย 

Similar to Ds2_ans.docx (20)

VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
ย 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
ย 
Ig3514391443
Ig3514391443Ig3514391443
Ig3514391443
ย 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ย 
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfPreliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
ย 
Uw as ns design challenges in transport layer
Uw as ns design challenges in transport layerUw as ns design challenges in transport layer
Uw as ns design challenges in transport layer
ย 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layer
ย 
Services interfaces for interoperability of signaling computerinterlocking on...
Services interfaces for interoperability of signaling computerinterlocking on...Services interfaces for interoperability of signaling computerinterlocking on...
Services interfaces for interoperability of signaling computerinterlocking on...
ย 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...
ย 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...
ย 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...
ย 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
ย 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
ย 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
ย 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
ย 
Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...Implementation model architecture software defined network using raspberry Pi...
Implementation model architecture software defined network using raspberry Pi...
ย 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
ย 
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...
MACHINE LEARNING ALGORITHM OF DETECTION OF DOS ATTACKS ON AN AUTOMOTIVE TELEM...
ย 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
ย 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
ย 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
ย 

Recently uploaded (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
ย 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
ย 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 

Ds2_ans.docx

  • 1. V V COLLEGE OF ENGINEERING V V Nagar, Arasoor, Tisaiyanvilai INTERNAL ASSESSMENT TEST โ€“ II III CSE โ€“ VI SEMESTER (BATCH 2020-2024) Department of Computer Science and Engineering Sub Code /Name: CP4071/ BIO INFORMATICS Date: -03-2023 ( ) Sem/Branch : III/ CSE Duration: 1:30 hrs. Max. Marks: 100 PART - A (5 x 4 = 20 Marks) 1. Compare centralized and distribued 2. Illustrate coupling Coupling refers to the degree to which two or more processes are interdependent. 3. Identify consistent snapshot A snapshot algorithm is used to create a consistent snapshot of the global state of a distributed system. Due to the lack of globally shared memory and a global clock, this is not trivially possible. 4. State crown criterion theorem The crown criterion states that an A-computation is RSC, i.e., it can be realized on a system with synchronous communication, if and only if it contains no crown. - For an A-execution, A is RSC if and only if A is an S-execution. 5. What is deadlock resolution
  • 2. Deadlock resolution involves breaking existing wait-for dependencies between the processes to resolve the deadlock. It involves rolling back one or more deadlocked processes and assigning their resources to blocked processes so that they can resume execution. PART-B(2x26=52) 11. (a)(i).Enlighten the examples of distributed systems. System Components in a Distributed System โ— primary system controller. โ— system data store. โ— database. (ii).Summarize the significant issues and challenges of the distributed system. Key characteristics of distributed systems โ— Resource sharing. โ— Openess. โ— Concurrency. โ— Scalability. โ— Fault Tolerance. โ— Transparency. (b)(i)Summarize NTP for synchronizing system of physical clocks in distributed systems NTP is an internet protocol used to synchronize with computer clock time sources in a network. NTP leverages UDP protocol over port 123, to synchronize clocks within a few seconds of the UTC time. Each computer(OS) comes with the NTP Package There are two types of NTP servers that you can use to provide UTC time to your network: public servers and local servers. A public time server is owned and operated by a third party who makes it available for use over the internet (ii).Explain logical time and logical clocks. Logical Clocks refer to implementing a protocol on all machines within your distributed system, so that the machines are able to maintain consistent ordering of events within some virtual timespan.
  • 3. 12. (a)(i)How causal order and total order is implemented in synchronous Reasons that may lead to violation of causal ordering of messages 1. It may happen due to a transmission delay. 2. Congestion in the network. 3. Failure of a system. Distributed program logic greatly depends on the order of delivery of messages. Several orderings on messages have been defined: (i) non-FIFO, (ii) FIFO, (iii) causal order, and (iv) synchronous order. (ii).Point out the key areas of applications of group communication Group communication has many benefits in the workplace, including: โ— Providing a way for group members to generate ideas and solutions to achieve their common goal. โ— Encouraging members to make decisions as a group. โ— Creating a way for the team to build rapport with one another. b)(i).Illustrate realizable with synchronous communication(RSC) execution Realizable Synchronous Communication (RSC) An execution can be modeled to give a total order that extends the partial order (E, โ‰บ). a linear extension of the execution, such that each send event is immediately followed by its corresponding receive event in this linear extension. (ii).Analyze the channels to simulate an execution using synchronous primitives on an asynchronous systems Synchronous execution means the first task in a program must finish processing before moving on to
  • 4. executing the next task whereas asynchronous execution means a second task can begin executing in parallel, without waiting for an earlier task to finish PART- C (1x28=28) 16.a. A user arrives at a railway station that she has never visited before, carrying a PDA that is capable of wireless networking. Suggest how the user could be provided with information about the local services and amenities at that station, without entering the stationโ€™s name or attributes. What technical challenges must be overcome? Discuss in detail. The user must be able to acquire the address of locally relevant information as automatically as possible. One method is for the local wireless network to provide the URL of web pages about the locality over a local wireless network. For this to work: (1) the user must run a program on her device that listens for these URLs, and which gives the user sufficient control that she is not swamped by unwanted URLs of the places she passes through; and (2) the means of propagating the URL (e.g. infrared or an 802.11 wireless LAN) should have a reach that corresponds to the physical spread of the place itself. b. Consider a distributed system where every node has its physical clock and all physical clocks are perfectly synchronized. Develop an algorithm to record global state assuming the communication network is reliable.