Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Part I: TRUE OR FALSE

Storage and file systems

1. The peak read bandwidth of a RAID-4 array grows linearly with the number of disks, but the single parity disk limits the peak prepare bandwidth.

2. Doubling the rotation speed of a 10K RPM (rotations per minute) disk doubles its peak transfer bandwidth, but improves its throughput for random 8KB reads only marginally.

3. Doubling the bit density of a 10K RPM disk doubles its peak transfer bandwidth, but improves its throughput for random 8KB reads only marginally.

4. You have a system with two primary workloads. One performs sequential access to a set of large files; the other performs small, independent, random reads to a separate set of large files. To satisfy these two workloads, you have a set of 4 disks. Both applications can saturate the peak bandwidth of your disk subsystem (i.e., they are I/O bound). Each disk can provide 100MB/s and has an average seek time of 10ms. The best way to organize data on these disks in order to provide the best performance for the random workload is to mirror the disks (that is, store 4 identical replicas on the 4 disks).

5. A log-based file system can deliver data at close to the peak transfer bandwidth of its disk system, independent of which files or directories are being accessed.

6. A log-based file system can perform prepares and updates at close to the peak transfer bandwidth of its disk system, independent of which files or directories are being updated.

7. To preserve data integrity, file system software must control the order in which disk prepares complete.

8. Swap space allocated as a special region (partition) on the disk can be faster than if allocated as a special file because it avoids file system costs due to disk organization.

9. A stateful file service recovers faster after a crash because all state information is stored locally, while a stateless file service needs to bring state information from a distant node.

10. AFS/Ceph (answer for the one you read) provides a stateful file service.

Distributed coordination

11. The centralized approach to deadlock detection in a distributed system requires a larger number of messages than a decentralized approach (which is the reason why decentralized solutions are always preferred).

12. An election algorithm for a bidirectional ring can be more efficient than the one presented in the textbook for the unidirectional ring.

13. A deadlock detection scheme is always more efficient than a deadlock prevention scheme in distributed systems.

14. Events in a distributed system can be globally ordered in time using the happened-before relationship presented in Lamport’s paper.

15. In a distributed system deployed over the Internet, agreement among n processes can be reached always in constant x (n+1) rounds of communication.

Part II: ELABORATE

16. You have a system with two primary workloads. One performs sequential access to a set of large files; the other performs small, independent, random reads to a separate set of large files. To satisfy these two workloads, you have a set of 8 disks. Both applications can saturate the peak bandwidth of your disk subsystem (i.e., they are I/O bound). Each disk can provide 100MB/s and has an average seek time of 10ms.

a. How should you organize these disks and lay out your data to provide best performance for the sequential workload?

b. How should you organize these disks and lay out your data to provide best performance for the random workload?

c. If you want to run both applications simultaneously and achieve the maximum average bandwidth for each application, how should you organize these disks and data?

d. Suppose the random reads are dependent, in that each request cannot be submitted before the previous one completes. Does this change the answer to problem c)? If so, how?

17. Distributed file systems:

e. Most distributed file systems cache recently used file data in client memory. What are the performance benefits of file caching? What are the performance costs?

f. File caching introduces the problem of cache consistency when files are shared across the network.
describe the problem and demonstrate it with an ex.

g. Outline a plausible scheme for dealing with the problem of cache consistency in a distributed file system. You may ignore the problem of failures in your answer (but see next problem). Your scheme need not be identical to that used in any specific distributed file system.

h. What are the limitations of the file caching scheme you described for previous problem? describe how your scheme can handle failures (crashes), assuming that systems fail only by stopping, discarding the contents of their memory, and restarting.

18. Problem 18.8 Silberschatz.

19. Clocks in distributed systems:

a. Why are clocks difficult to synchronize in distributed systems?

b. What features in a system assume that the clocks are (reasonably) synchronized? Give two exs of cases where a problem would occur if the clocks were not synchronized.

c. Order the following events based on the figure below according to the happened before relationship as introduced by Lamport. Consider that the vertical lines represent events in a process ordered chronologically from bottom up (that is, time grows going up on the axis).
- p3, q3, q5, r3
- r1, q4, r4
- p1, q3, r3, r4

928_lampot layout.jpg

20. Consider a setting where processors are not associated with unique identifiers but the total number of processors is known and the processors are organized along a bidirectional ring. Is it possible to derive an election algorithm for such a setting?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91491

Have any Question? 


Related Questions in Computer Engineering

1 although there has been tremendous growth in the

1. Although there has been tremendous growth in the virtualization of computing resources, there are still many skeptics of the technology. List their concerns. Suggest ways to overcome those concerns. 2. Discuss the dif ...

After expansion the factory will have a production capacity

After expansion, the factory will have a production capacity of 4 comma 5004,500machine hours per month. The plant can manufacture either 6565standard electric toothbrushes or 2424 deluxe electric toothbrushes per machin ...

Would you recommend using the routing table that has a

Would you recommend using the routing table that has a default route or hasn't? Please explain the advantage and disadvantages.

The data in below table lists country code and the order to

The data in below table lists country code and the order to remittance (OTR) time for hardware / software installations for the last 76 installations (from first to last). OTR is the time it takes from an order being pla ...

Remember from the beginning of this book how amys day

Remember from the beginning of this book how Amy's day started? Now imagine how it could have been: For Amy, the day began like any other at the Sequential Label and Supply Company (SLS) help desk. Taking calls and helpi ...

A postfix expression evaluator works on arithmetic

A postfix expression evaluator works on arithmetic statements that take the following form: op1 op2 operator... Using two stacks, one for the operands and one for the operators, design and implement a Calculator class th ...

1 find the greatest common divisor of 234 and 1242 find r

1. Find the greatest common divisor of 234 and 124. 2: Find r and s such that 8,092r + 1,111s = 1. 3: Find a counterexample to the claim that if the greatest common divisor of a and b is not 1, there exists a unique r an ...

1 what is the difference between half-duplex and

1. What is the difference between half-duplex and full-duplex transmission modes? 2. Name the four basic network topologies, and cite an advantage of each type. 3. For n devices in a network, what is the number of cable ...

1 analyze the quick sort algorithm to show the worst case

1. Analyze the quick sort algorithm to show the worst case time is O(n 2 ). 2. Analyze the mergeVirtualSeq() function and show that it is a linear time operation in the worst case. 3. Analyze the linked list version of t ...

1 list and define the factors that are likely to shift in

1. List and define the factors that are likely to shift in an organization's information security environment. 2. Who decides if the information security program can adapt to change adequately? 3. List and briefly descri ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro