distributed system
- How does the Byzantine generals problem relate to concurrency in distributed systems? 14
- How is mutual exclusion implemented in NFS?
- What is the job of the recovery manager in distributed transaction models?
- Name three challenges of mobile computing in today’s highly connected network
- Describe atomicity in transactions and how it is important?
- In what ways has network transparency and the evolution of the modern day internetwork directly conflicted with security models and the protection of computing assets?
- Explain the concept of mutual exclusion as it applies to distributed systems
- Explain what techniques have enabled multimedia services to deliver high density content on small form wireless devices?
- Name three negative effects of the atomic transaction model
- Explain the challenges (2) of maintaining time in a distributed system
- Discuss the differences between a logical and regular clocks and under what conditions might you implement a logical clock?
- What value does a unified naming service bring to distributed systems?
- Explain what three features of DNS have sustained the massive growth of the internet (efficiency aspects)?
- How can the IAAS (Infrastructure as a Service) implementations of compute resources in AWS benefit distributed systems with respect to process invocation, file access and relational database access? What are some points of contention about deployment in AWS?
- Explain the steps required to implement the mousetrap extra credit problem “Connect the Chain” beyond the 4 leg mousetrap basic setup (I am looking for what resources would be required, where and what things must change in the mousetrap to accomplish this)
- Explain the differences between symmetric and asymmetric keys
Secret Key (Symmetric) Algorithms-method for encrypted transmissions where the same key Is used on both ends of the transmission – while effective does not lend itself well to general use due to the distance between endpoints and the method to acquire the keys
Public Key (Asymmetric) Algorithms – method for encrypted transmissions where different (Public/Private) keys are used at the endpoints – key sizes allow for stronger (not guessable by reason of number of possible values) at a slight cost of performant
- What are the primary differences between standby and active replication models as it applies to distributed systems?
- What is the purpose of the replication agent in both standby and active high availability strategies?
- What are the main differences between singular and two phase atomic commit protocols?
- What is the virtual filesystem
Order from us and get better grades. We are the service you have been looking for.