Dos CT2 - Set A - Ak

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 5

SRM Institute of Science and Technology

Mode of Exam
College of Engineering and Technology
OFFLINE
School of Computing
DEPARTMENT OF COMPUTING TECHNOLOGIES
SRM Nagar, Kattankulathur – 603203, Chengalpattu District,
Academic Year:2023 (ODD) SET - A

Test: CLAT- 2 Date:


Course Code & Title: 18CSE356T Distributed Operating Systems
Duration: 1:30 Hours
Year & Sem: III & 5 Max. Marks: 50

Course Articulation Matrix:


S.No. COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3

1 CO1 3 - - 3 - - - - - - - - - - -

2 CO2 3 3 - 2 - - - - - - - - - - -

3 CO3 3 2 2 3 - - - - - - - - - 2 -

4 CO4 3 3 - 3 - - - - - - - - - 2 -

5 CO5 3 3 - 2 - - - - - - - - - - -

Part - A
(1*10 = 10 Marks)
Instructions: Answer all
Q. Question Marks BL CO PO PI
No Code
1 If one site fails in distributed system then ___________ 1 1 2 1 1.6.1
a) the remaining sites can continue operating
b) all the sites will stop working
c) directly connected sites will stop working
d) none of the mentioned

2 Network operating system runs on ___________ 1 1 2 1 1.6.1


a) server
b) every system in the network
c) both server and every system in the network
d) none of the mentioned
3 Processes on the remote systems are identified by ___________ 1 1 2 1 1.6.1
a) host ID
b) host name and identifier
c) identifier
d) process ID
4 The capability of a system to adapt the increased service load is 1 1 2 1 1.6.1
called ___________
a) scalability
b) tolerance
c) capacity
d) none of the mentioned
5 Internet provides _______ for remote login. 1 1 2 1 1.6.1
a) telnet
b) http
c) ftp
d) rpc
6 What are characteristic of Network Operating Systems? 1 1 3 1 1.6.1
a) Users are aware of multiplicity of machines
b) They are transparent
c) They are simple to use
d) All of the mentioned
7 How is access to resources of various machines is done? 1 2 3 1 1.6.1
a) Remote logging using ssh or telnet
b) Zone are configured for automatic access
c) FTP is not used
d) All of the mentioned
8 What is a valid network topology? 1 1 3 1 1.6.1
a) Multiaccess bus
b) Ring
c) Star
d) All of the mentioned
9 Which design features of a communication network are 1 1 3 1 1.6.1
important?
a) Naming and name resolution
b) Routing strategies
c) Connection strategies
d) All of the mentioned
10 What are the connection strategies not used in distributed 1 1 3 1 1.6.1
systems?
a) Circuit switching
b) Message switching
c) Token switching
d) Packet switching
Part – B
(5*2=10 Marks)
Answer all 5 questions
11 Describe the purpose of OSI. 2 2 2 1 1.6.1
The purpose of the OSI reference model is to guide technology
vendors and developers so the digital communications products
and software programs they create can interoperate and to
promote a clear framework that describes the functions of a
networking or telecommunications system that's in use.
12 Differentiate between Connectionless vs Connection 2 3 2 2 2.5.2
Oriented with example.
In a connection-oriented service, the Handshake method is used
to establish the connection between sender and receiver.

Connection-less service is related to the postal system. It does


not include any connection establishment and connection
termination.
13 Infer the characteristics of ATM. 2 3 2 2 2.5.2
ATM operates on layers one to three of the OSI layer model
and is characterized by very short lag, good scalability, and
time transparency. A key characteristic of asynchronous
transfer mode transmission protocol is the fixed length of ATM
cells.
14 Define Clock synchronization. 2 1 3 1 1.6.1
Clock synchronization is a method of synchronizing clock
values of any two nodes in a distributed system with the use of
external reference clock or internal clock value of the node.
15 Explain the concepts of Mutual Exclusion. 2 2 3 1 1.6.1

Mutual exclusion is also known as Mutex. The critical section


can be defined as a period for which the thread of execution
accesses the shared resource. Mutual exclusion is designed so
that if a process is performing any write operation, then no
other process or thread is allowed to access or alter the same
object.
Part – C
(4*5=20 Marks)
Answer any 4 out of 6 questions
16 Explain in detail about TCP and UDP protocol with real 5 3 2 2 2.6.2
time scenario.
TCP:

If we send a text message to someone, it shows “message


delivered” when it is delivered successfully or it shows
“message failed, Try again” when it is failed.

it is the simple example of TCP protocol which means get


acknowledgement

UDP:

Video streaming is the good example of UDP protocol if we


watch videos by online. we don’t know whether frame
receiving order is right or not..!!

There is no acknowledgement in this method


17 With SONET, multiple digital data streams are transferred 5 4 2 2 2.6.2
at the same time over the optical fiber. Prove with example.

SONET is a communication protocol, developed by Bellcore –


that is used to transmit a large amount of data over relatively
large distances using optical fibre. With SONET, multiple
digital data streams are transferred at the same time over the
optical fiber.
Path layer
Line layer
Section layer
Photonic layer
18 Describe in detail about the concept of ATM switching. 5 3 2 2 2.5.2

ATM:
ATM standard uses two types of connections. i.e., Virtual path
connections (VPCs) which consist of Virtual channel
connections (VCCs) bundled together which is a basic unit
carrying a single stream of cells from user to user. A virtual
path can be created end-to-end across an ATM network, as it
does not rout the cells to a particular virtual circuit. In case of
major failure, all cells belonging to a particular virtual path are
routed the same way through the ATM network, thus helping in
faster recovery.

Switches connected to subscribers use both VPIs and VCIs to


switch the cells which are Virtual Path and Virtual Connection
switches that can have different virtual channel connections
between them, serving the purpose of creating a virtual trunk
between the switches which can be handled as a single entity.
Its basic operation is straightforward by looking up the
connection value in the local translation table determining the
outgoing port of the connection and the new VPI/VCI value of
connection on that link.
19 Infer the synchronization mechanisms that are suitable for 5 4 3 2 2.6.2
distributed systems.

Synchronization in distributed systems is achieved via clocks.


The physical clocks are used to adjust the time of nodes. Each
node in the system can share its local time with other nodes in
the system. The time is set based on UTC (Universal Time
Coordination). UTC is used as a reference time clock for the
nodes in the system. Clock synchronization can be achieved by
2 ways: External and Internal Clock Synchronization.

External clock synchronization is the one in which an external


reference clock is present. It is used as a reference and the
nodes in the system can set and adjust their time accordingly.
Internal clock synchronization is the one in which each node
shares its time with other nodes and all the nodes set and adjust
their times accordingly.

20 Assume the program that need exclusive access to shared 5 4 3 2 2.6.2


resources are referred to as critical sections. Prove with
example

Although there are some properties that should be followed if


any code in the critical section

Mutual Exclusion: If process Pi is executing in its critical


section, then no other processes can be executing in their
critical sections.
Progress: If no process is executing in its critical section and
some processes wish to enter their critical sections, then only
those processes that are not executing in their remainder
sections can participate in deciding which will enter its critical
section next, and this selection cannot be postponed
indefinitely.
Bounded Waiting: There exists a bound, or limit, on the number
of times that other processes are allowed to enter their critical
sections after a process has made a request to enter its critical
section and before that request is granted.
21 Explain in detail about the Transaction Processing Systems 5 3 3 2 2.5.2
with real time scenario.

Part – D
(1*10=10 Marks)
Answer any 1 question
22 Discuss in detail about the original objective of the OSI 10 4 2 2 2.6.2
model which provides the set of design standards for
equipment manufacturers to support system-to-
system communication.
Or
23 Explain in detail about the various concepts of Deadlock in 10 3 3 2 2.5.2
distributed environment.
A Distributed System is a Network of Machines that can
exchange information with each other through Message-
passing. It can be very useful as it helps in resource sharing. In
such an environment, if the sequence of resource allocation to
processes is not controlled, a deadlock may occur. In principle,
deadlocks in distributed systems are similar to deadlocks in
centralized systems. Therefore, the description of deadlocks
presented above holds good both for centralized and distributed
systems. However, handling of deadlocks in distributed systems
is more complex than in centralized systems because the
resources, the processes, and other relevant information are
scattered on different nodes of the system.

Three commonly used strategies to handle deadlocks are as


follows:

Avoidance: Resources are carefully allocated to avoid


deadlocks.
Prevention: Constraints are imposed on the ways in which
processes request resources in order to prevent deadlocks.
Detection and recovery: Deadlocks are allowed to occur and a
detection algorithm is used to detect them. After a deadlock is
detected, it is resolved by certain means.

*Performance Indicators are available separately for Computer Science and Engineering in AICTE
examination reforms policy.

Course Outcome (CO) and Bloom’s level (BL) Coverage in Questions

Approved by the Audit Professor/Course Coordinator

You might also like