Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Part I: TRUE OR FALSE

Storage and file systems

1. The peak read bandwidth of a RAID-4 array grows linearly with the number of disks, but the single parity disk limits the peak prepare bandwidth.

2. Doubling the rotation speed of a 10K RPM (rotations per minute) disk doubles its peak transfer bandwidth, but improves its throughput for random 8KB reads only marginally.

3. Doubling the bit density of a 10K RPM disk doubles its peak transfer bandwidth, but improves its throughput for random 8KB reads only marginally.

4. You have a system with two primary workloads. One performs sequential access to a set of large files; the other performs small, independent, random reads to a separate set of large files. To satisfy these two workloads, you have a set of 4 disks. Both applications can saturate the peak bandwidth of your disk subsystem (i.e., they are I/O bound). Each disk can provide 100MB/s and has an average seek time of 10ms. The best way to organize data on these disks in order to provide the best performance for the random workload is to mirror the disks (that is, store 4 identical replicas on the 4 disks).

5. A log-based file system can deliver data at close to the peak transfer bandwidth of its disk system, independent of which files or directories are being accessed.

6. A log-based file system can perform prepares and updates at close to the peak transfer bandwidth of its disk system, independent of which files or directories are being updated.

7. To preserve data integrity, file system software must control the order in which disk prepares complete.

8. Swap space allocated as a special region (partition) on the disk can be faster than if allocated as a special file because it avoids file system costs due to disk organization.

9. A stateful file service recovers faster after a crash because all state information is stored locally, while a stateless file service needs to bring state information from a distant node.

10. AFS/Ceph (answer for the one you read) provides a stateful file service.

Distributed coordination

11. The centralized approach to deadlock detection in a distributed system requires a larger number of messages than a decentralized approach (which is the reason why decentralized solutions are always preferred).

12. An election algorithm for a bidirectional ring can be more efficient than the one presented in the textbook for the unidirectional ring.

13. A deadlock detection scheme is always more efficient than a deadlock prevention scheme in distributed systems.

14. Events in a distributed system can be globally ordered in time using the happened-before relationship presented in Lamport’s paper.

15. In a distributed system deployed over the Internet, agreement among n processes can be reached always in constant x (n+1) rounds of communication.

Part II: ELABORATE

16. You have a system with two primary workloads. One performs sequential access to a set of large files; the other performs small, independent, random reads to a separate set of large files. To satisfy these two workloads, you have a set of 8 disks. Both applications can saturate the peak bandwidth of your disk subsystem (i.e., they are I/O bound). Each disk can provide 100MB/s and has an average seek time of 10ms.

a. How should you organize these disks and lay out your data to provide best performance for the sequential workload?

b. How should you organize these disks and lay out your data to provide best performance for the random workload?

c. If you want to run both applications simultaneously and achieve the maximum average bandwidth for each application, how should you organize these disks and data?

d. Suppose the random reads are dependent, in that each request cannot be submitted before the previous one completes. Does this change the answer to problem c)? If so, how?

17. Distributed file systems:

e. Most distributed file systems cache recently used file data in client memory. What are the performance benefits of file caching? What are the performance costs?

f. File caching introduces the problem of cache consistency when files are shared across the network.
describe the problem and demonstrate it with an ex.

g. Outline a plausible scheme for dealing with the problem of cache consistency in a distributed file system. You may ignore the problem of failures in your answer (but see next problem). Your scheme need not be identical to that used in any specific distributed file system.

h. What are the limitations of the file caching scheme you described for previous problem? describe how your scheme can handle failures (crashes), assuming that systems fail only by stopping, discarding the contents of their memory, and restarting.

18. Problem 18.8 Silberschatz.

19. Clocks in distributed systems:

a. Why are clocks difficult to synchronize in distributed systems?

b. What features in a system assume that the clocks are (reasonably) synchronized? Give two exs of cases where a problem would occur if the clocks were not synchronized.

c. Order the following events based on the figure below according to the happened before relationship as introduced by Lamport. Consider that the vertical lines represent events in a process ordered chronologically from bottom up (that is, time grows going up on the axis).
- p3, q3, q5, r3
- r1, q4, r4
- p1, q3, r3, r4

928_lampot layout.jpg

20. Consider a setting where processors are not associated with unique identifiers but the total number of processors is known and the processors are organized along a bidirectional ring. Is it possible to derive an election algorithm for such a setting?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91491

Have any Question? 


Related Questions in Computer Engineering

1 why is a methodology important in the implementation of

1. Why is a methodology important in the implementation of information security? How does a methodology improve the process? 2. Which members of an organization are involved in the security system development life cycle? ...

Figure 1523 shows the frame format of the baseband layer in

Figure 15.23 shows the frame format of the baseband layer in Bluetooth (802.15). Based on this format, answer the following questions: a. What is the range of the address domain in a Bluetooth network? b. How many statio ...

1 why is it important to use specific and clearly defined

1. Why is it important to use specific and clearly defined job descriptions for hiring information security professionals? 2. What functions does the CISO perform, and what are the key qualifications and requirements for ...

1 write a deletion method for the redblack class that

1. Write a deletion method for the RedBlack class that adheres to the red-black rules. 2. Design and implement a program that compares AVL trees and red-black trees to skip lists. Which data structure performs the best?

Use the fdm to calculate the characteristic impedance of

Use the FDM to calculate the characteristic impedance of the high-frequency, air-filled rectangular transmission line

Objective -the purpose of this program is to generate

Objective - The purpose of this program is to generate random numbers, report total number created, how many were 15, 16, or 17 and report this information to the user. You are required to use array, pointer and customis ...

1 implement a new version of the maze solving program from

1. Implement a new version of the maze solving program from Chapter 7 to use recursion instead of a software stack. 2. Design and implement a program to play tic-tac-toe against the computer using a recursive function to ...

1 what is a discontiguous subnet why do some enterprise

1. What is a discontiguous subnet? Why do some enterprise networks have discontiguous subnets? Why don't classful routing protocols support discontiguous subnets? 2. Discuss the configuration of IP addresses. When manual ...

1 rewrite the longest common substring code as a class2

1. Rewrite the longest common substring code as a class. 2. Write a program that uses a brute force technique to find the longest common substring. Use the Timing class to compare the brute force method with the dynamic ...

1 in a tcp connection the window size fluctuates between

1. In a TCP connection, the window size fluctuates between 60,000 bytes and 30,000 bytes. If the average RTT is 30 ms, what is the throughput of the connection? 2. If originally RTTS = 14 ms and α is set to 0.2, calculat ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro