ImageVerifierCode 换一换
格式:DOCX , 页数:64 ,大小:68.23KB ,
资源ID:21839442      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/21839442.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(分布式操作系统第二版答案Word格式文档下载.docx)为本站会员(b****6)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

分布式操作系统第二版答案Word格式文档下载.docx

1、A: What immediately comes to mind is parallel computing. If one coulddesign programs that run without any serious modi.cations on distributed systemsthat appear to be the same as nondistributed systems, life would be somuch easier. Achieving a single-system view is by now considered virtuallyimpossi

2、ble when performance is in play.2. Q: What is the role of middleware in a distributed system? To enhance the distribution transparency that is missing in network operatingsystems. In other words, middleware aims at improving the single-systemview that a distributed system should have.3. Q: Many netw

3、orked systems are organized in terms of a back of.ce and afront of.ce. How does organizations match with the coherent view we demandfor a distributed system? A mistake easily made is to assume that a distributed system as operatingin an organization, should be spread across the entire organization.

4、In practice,we see distributed systems being installed along the way that an organizationis split up. In this sense, we could have a distributed system supporting backof.ce procedures and processes, as well as a separate front-of.ce system. Ofcourse, the two may be coupled, but there is no reason fo

5、r letting this couplingbe fully transparent.4. Q: Explain what is meant by (distribution) transparency, and give examples ofdifferent types of transparency. Distribution transparency is the phenomenon by which distribution aspectsin a system are hidden from users and applications. Examples include a

6、ccesstransparency, location transparency, migration transparency, relocation transparency,replication transparency, concurrency transparency, failure transparency,and persistence transparency.5. Q: Why is it sometimes so hard to hide the occurrence and recovery from failuresin a distributed system?

7、It is generally impossible to detect whether a server is actually down, orthat it is simply slow in responding. Consequently, a system may have toreport that a service is not available, although, in fact, the server is just slow.2 PROBLEM SOLUTIONS FOR CHAPTER 16. Q: Why is it not always a good idea

8、 to aim at implementing the highest degreeof transparency possible? Aiming at the highest degree of transparency may lead to a considerableloss of performance that users are not willing to accept.7. Q: What is an open distributed system and what bene.ts does openness provide? An open distributed sys

9、tem offers services according to clearly de.nedrules. An open system is capable of easily interoperating with other open systemsbut also allows applications to be easily ported between different implementationsof the same system.8. Q: Describe precisely what is meant by a scalable system. A system i

10、s scalable with respect to either its number of components, geographicalsize, or number and size of administrative domains, if it can grow inone or more of these dimensions without an unacceptable loss of performance.9. Q: Scalability can be achieved by applying different techniques. What arethese t

11、echniques? Scaling can be achieved through distribution, replication, and caching.10. Q: Explain what is meant by a virtual organization and give a hint on howsuch organizations could be implemented. A virtual organization (VO) de.nes a group of users/applications that haveaccess to a speci.ed group

12、 of resources, which may be distributed across manydifferent computers, owned by many different organizations. In effect, a VOde.nes who has access to what. This also suggests that the resources shouldkeep an account of foreign users along with their access rights. This can oftenbe done using standa

13、rd access control mechanisms (like the rwx bits in UNIX),although foreign users may need to have a special account. The latter complicatesmatters considerably.11. Q: When a transaction is aborted, we have said that the world is restored to itsprevious state, as though the transaction had never happe

14、ned. We lied. Give anexample where resetting the world is impossible. Any situation in which physical I/O has occurred cannot be reset. Forexample, if the process has printed some output, the ink cannot be removedfrom the paper. Also, in a system that controls any kind of industrial process, itis us

15、ually impossible to undo work that has been done.12. Q: Executing nested transactions requires some form of coordination. Explainwhat a coordinator should actually do. A coordinator need simply ensure that if one of the nested transactionsaborts, that all other subtransactions abort as well. Likewis

16、e, it shouldPROBLEM SOLUTIONS FOR CHAPTER 1 3coordinate that all of them commit when each of them can. To this end, anested transaction should wait to commit until it is told to do so by the coordinator.13. Q: We argued that distribution transparancy may not be in place for pervasicesystems. This st

17、atement is not true for all types of transparencies. Give anexample. Think of migration transparency. In mnay pervasive systems, componentsare mobile and will need to re-establish connections when moving from oneaccess point to another. Preferably, such handovers should be completelytransparent to t

18、he user. Likewise, it can be argued that many other types oftransparencies should be supported as well. However, what should not be hiddenis a user is possibly accessing resources that are directly coupled to theusers current environment.14. Q: We already gave some examples of distributed pervasive

19、systems: homesystems, electronic health-care systems, and sensor networks. Extend this listwith more examples. There are quite a few other examples of pervasive systems. Think of largescalewireless mesh networks in cities or neighborhoods that provide servicessuch as Internet access, but also form t

20、he basis for other services like a newssystem. There are systems for habitat monitoring (as in wildlife resorts), electronicjails by which offenders are continuously monitored, large-scale integratedsports systems, of.ce systems deploying active badges to know aboutthe whereabouts of their employees

21、, and so on.15. Q: Sketch a design for a home system consisting of a separate media serverthat will allow for the attachment of a wireless client. The latter is connectedto (analog) audio/video equipment and transforms the digital media streams toanalog output. The server runs on a separate machine,

22、 possibly connected tothe Internet, but has no keyboard and/or monitor connected.SOLUTIONS TO CHAPTER 2 PROBLEMS If a client and a server are placed far apart, we may see network latencydominating overall performance. How can we tackle this problem? It really depends on how the client is organized.

23、It may be possible todivide the client-side code into smaller parts that can run separately. In thatcase, when one part is waiting for the server to respond, we can scheduleanother part. Alternatively, we may be able to rearrange the client so that it cando other work after having sent a request to

24、the server. This last solution effectivelyreplaces the synchronous client-server communication with asynchronousone-way communication.4 PROBLEM SOLUTIONS FOR CHAPTER 2 What is a three-tiered client-server architecture? A three-tiered client-server architecture consists of three logical layers,where

25、each layer is, in principle, implemented at a separate machine. Thehighest layer consists of a client user interface, the middle layer contains theactual application, and the lowest layer implements the data that are beingused. What is the difference between a vertical distribution and a horizontal

26、distribution? Vertical distribution refers to the distribution of the different layers in amultitiered architectures across multiple machines. In principle, each layer isimplemented on a different machine. Horizontal distribution deals with thedistribution of a single layer across multiple machines,

27、 such as distributing asingle database. Consider a chain of processes P1, P2, ., Pn implementing a multitieredclient-server architecture. Process Pi is client of process Pi+1, and Pi willreturn a reply to Pi-1 only after receiving a reply from Pi+1. What are the mainproblems with this organization w

28、hen taking a look at the request-reply performanceat process P1? Performance can be expected to be bad for large n. The problem is thateach communication between two successive layers is, in principle, betweentwo different machines. Consequently, the performance between P1 and P2may also be determin

29、ed by n - 2 request-reply interactions between the otherlayers. Another problem is that if one machine in the chain performs badly oris even temporarily unreachable, then this will immediately degrade the performanceat the highest level. In a structured overlay network, messages are routed according

30、 to thetopology of the overlay. What is an important disadvantage of this approach? The problem is that we are dealing only with logical paths. It may verywell be the case that two nodes A and B which are neighbors in the overlaynetwork are physically placed far apart. As a consequence, the logically shortpath between A and B may require routing a message along a very long pathin the underlying physical network.6

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1