Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Part I: TRUE OR FALSE

Storage and file systems

1. The peak read bandwidth of a RAID-4 array grows linearly with the number of disks, but the single parity disk limits the peak prepare bandwidth.

2. Doubling the rotation speed of a 10K RPM (rotations per minute) disk doubles its peak transfer bandwidth, but improves its throughput for random 8KB reads only marginally.

3. Doubling the bit density of a 10K RPM disk doubles its peak transfer bandwidth, but improves its throughput for random 8KB reads only marginally.

4. You have a system with two primary workloads. One performs sequential access to a set of large files; the other performs small, independent, random reads to a separate set of large files. To satisfy these two workloads, you have a set of 4 disks. Both applications can saturate the peak bandwidth of your disk subsystem (i.e., they are I/O bound). Each disk can provide 100MB/s and has an average seek time of 10ms. The best way to organize data on these disks in order to provide the best performance for the random workload is to mirror the disks (that is, store 4 identical replicas on the 4 disks).

5. A log-based file system can deliver data at close to the peak transfer bandwidth of its disk system, independent of which files or directories are being accessed.

6. A log-based file system can perform prepares and updates at close to the peak transfer bandwidth of its disk system, independent of which files or directories are being updated.

7. To preserve data integrity, file system software must control the order in which disk prepares complete.

8. Swap space allocated as a special region (partition) on the disk can be faster than if allocated as a special file because it avoids file system costs due to disk organization.

9. A stateful file service recovers faster after a crash because all state information is stored locally, while a stateless file service needs to bring state information from a distant node.

10. AFS/Ceph (answer for the one you read) provides a stateful file service.

Distributed coordination

11. The centralized approach to deadlock detection in a distributed system requires a larger number of messages than a decentralized approach (which is the reason why decentralized solutions are always preferred).

12. An election algorithm for a bidirectional ring can be more efficient than the one presented in the textbook for the unidirectional ring.

13. A deadlock detection scheme is always more efficient than a deadlock prevention scheme in distributed systems.

14. Events in a distributed system can be globally ordered in time using the happened-before relationship presented in Lamport’s paper.

15. In a distributed system deployed over the Internet, agreement among n processes can be reached always in constant x (n+1) rounds of communication.

Part II: ELABORATE

16. You have a system with two primary workloads. One performs sequential access to a set of large files; the other performs small, independent, random reads to a separate set of large files. To satisfy these two workloads, you have a set of 8 disks. Both applications can saturate the peak bandwidth of your disk subsystem (i.e., they are I/O bound). Each disk can provide 100MB/s and has an average seek time of 10ms.

a. How should you organize these disks and lay out your data to provide best performance for the sequential workload?

b. How should you organize these disks and lay out your data to provide best performance for the random workload?

c. If you want to run both applications simultaneously and achieve the maximum average bandwidth for each application, how should you organize these disks and data?

d. Suppose the random reads are dependent, in that each request cannot be submitted before the previous one completes. Does this change the answer to problem c)? If so, how?

17. Distributed file systems:

e. Most distributed file systems cache recently used file data in client memory. What are the performance benefits of file caching? What are the performance costs?

f. File caching introduces the problem of cache consistency when files are shared across the network.
describe the problem and demonstrate it with an ex.

g. Outline a plausible scheme for dealing with the problem of cache consistency in a distributed file system. You may ignore the problem of failures in your answer (but see next problem). Your scheme need not be identical to that used in any specific distributed file system.

h. What are the limitations of the file caching scheme you described for previous problem? describe how your scheme can handle failures (crashes), assuming that systems fail only by stopping, discarding the contents of their memory, and restarting.

18. Problem 18.8 Silberschatz.

19. Clocks in distributed systems:

a. Why are clocks difficult to synchronize in distributed systems?

b. What features in a system assume that the clocks are (reasonably) synchronized? Give two exs of cases where a problem would occur if the clocks were not synchronized.

c. Order the following events based on the figure below according to the happened before relationship as introduced by Lamport. Consider that the vertical lines represent events in a process ordered chronologically from bottom up (that is, time grows going up on the axis).
- p3, q3, q5, r3
- r1, q4, r4
- p1, q3, r3, r4

928_lampot layout.jpg

20. Consider a setting where processors are not associated with unique identifiers but the total number of processors is known and the processors are organized along a bidirectional ring. Is it possible to derive an election algorithm for such a setting?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91491

Have any Question? 


Related Questions in Computer Engineering

1 it is said that unix uses access control lists does the

1. It is said that UNIX uses access control lists. Does the UNIX model include capabilities as well as access control lists? 2. Suppose a user wishes to edit the file xyzzy in a capability-based system. How can he be sur ...

Write a program that checks the spelling of all words in a

Write a program that checks the spelling of all words in a file. It should read each word of a file and check whether it is contained in a word list. A word list is available on most UNIX systems in the file /usr/dict/wo ...

Add a feature to the cashregister class for computing sales

Add a feature to the CashRegister class for computing sales tax. The tax rate should be supplied when constructing a CashRegister object. Add recordTaxablePurchase and getTotalTax methods. (Amounts added with recordPurch ...

1 how does technological obsolescence constitute a threat

1. How does technological obsolescence constitute a threat to information security? How can an organization protect against it? 2. Does the intellectual property owned by an organization usually have value? If so, how ca ...

1 using the resources available in your library find out

1. Using the resources available in your library, find out what laws your state has passed to prosecute computer crime. 2. Using a Web browser go to www.eff.org. What are the current top concerns of this organization?

Consider an ltid system specified by the equation yn 1 -

Consider an LTID system specified by the equation y[n + 1] - 0.5y[n] = x[n + 1] + 0.8x[n]. (a) Determine and sketch the magnitude and the phase responses. (b) Find the system response y[n] to the input x[n] = cos(0.5n - ...

Your manager has tasked you with creating a remote employee

Your manager has tasked you with creating a Remote Employee Connection guide for IT. This guide will assist IT in setting up remote (work-from-home) employees to access the company's Intranet. These employees will use a ...

1 the maximum window size of the tcp was originally

1. The maximum window size of the TCP was originally designed to be 64 KB (which means 64 × 1024 = 65,536 or actually 65,535). Can you think of a reason for this? 2. What is the maximum size of the TCP header? What is th ...

1 explain why you think your design meets the needs of

1. Explain why you think your design meets the needs of ElectroMyCycle. 2. List the major user communities for your design. 3. List the major data stores and the user communities for each data store. 4. Identify major ne ...

Suppose you have a hdd that with an average seek time of 12

Suppose you have a HDD that with an average seek time of 12 msec and a rotational speed of 3000 RPM. How long would it take to transfer 102400 bytes. Assume 500 sectors on a track, and each sector contains 512 bytes.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen