Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Cisy 432:Distributed Systems Question Paper

Cisy 432:Distributed Systems 

Course:Computer Science

Institution: Kenya Methodist University question papers

Exam Year:2012



KENYA METHODIST UNIVERSITY

END OF 3''RD ''TRIMESTER 2012 (EVENING) EXAMINATIONS
FACULTY : COMPUTING AND INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS
INFORMATION
UNIT CODE : BBIT 448/CISY 432
UNIT TITLE : DISTRIBUTED SYSTEMS
TIME : 2 HOURS




Instructions:

Answer all questions in section A and any other two in section B.

Question One
1. Define the following terms. (8 marks)

RMI
Distributed Methods
Socket
System Reliability

2. The RPC is an integral part of inter process communication. List the main steps of this case. (4 marks)
3. State any four challenges in the design of scalable distributed systems. (4 marks)
4. State the functions of middleware and its three components. (4 marks)
5. With example describe the synchronous and asynchronous interaction model. (4 marks)
6. Assume you have been tasked to propose architectural model for IEBC, explain the factors to consider in choosing ideal architectural model.
(6 marks)

SECTION B

Question Two

Briefly explain inter process communication and include a diagram in your explanation showing parts and sockets.

(4 marks)

The remote method invocation has a software architecture that includes three principal constituents. List and explain the three constituents of RMI software architecture.

(6 marks)

Transparency (clients are unware of the distributed nature of system) is a requirement of distributed file systems. Explain any three forms of transparency in DFS (Distributed File System).

(6 marks)

What are the two naming concepts used in distributed systems? Give examples

(2 marks)

Based on your understanding of naming concepts in distributed systems explain the concept of a name space and naming context.

(2 marks)

Question Three

Describe distributed transaction and concurrency control mechanisms that are adapted.

(10 marks)

Describe various security Cryptographic Algorithm that are deployed to counter the threats of Distributed Systems.

(10 marks)

Question Four

With clear examples describe major threats of distribute systems.

(10 marks)

Describe the following clock synchronization algorithms: Christian Algorithms, Bakery Algorithm and Network Time Protocol.

(10 marks)






More Question Papers


Popular Exams



Return to Question Papers