Failure Detection The ping-ack failure detector in a synchronous system satisfies – A: completeness – B: accuracy – C: neither – D: both.

Slides:



Advertisements
Similar presentations
CS542 Topics in Distributed Systems Diganta Goswami.
Advertisements

CS 542: Topics in Distributed Systems Diganta Goswami.
CS425 /CSE424/ECE428 – Distributed Systems – Fall 2011 Material derived from slides by I. Gupta, M. Harandi, J. Hou, S. Mitra, K. Nahrstedt, N. Vaidya.
NETWORK ALGORITHMS Presenter- Kurchi Subhra Hazra.
Teaser - Introduction to Distributed Computing
Distributed Systems Overview Ali Ghodsi
Synchronization Chapter clock synchronization * 5.2 logical clocks * 5.3 global state * 5.4 election algorithm * 5.5 mutual exclusion * 5.6 distributed.
Consensus Algorithms Willem Visser RW334. Why do we need consensus? Distributed Databases – Need to know others committed/aborted a transaction to avoid.
Distributed Systems Fall 2010 Replication Fall 20105DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
CMPT 401 Summer 2007 Dr. Alexandra Fedorova Lecture IX: Coordination And Agreement.
LEADER ELECTION CS Election Algorithms Many distributed algorithms need one process to act as coordinator – Doesn’t matter which process does the.
CS 582 / CMPE 481 Distributed Systems
Asynchronous Consensus (Some Slides borrowed from ppt on Web.(by Ken Birman) )
Distributed Systems Fall 2009 Coordination and agreement, Multicast, and Message ordering.
Distributed Systems Fall 2009 Replication Fall 20095DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 2 – Distributed Systems.
CS 425 / ECE 428 Distributed Systems Fall 2014 Indranil Gupta (Indy) Lecture 12: Mutual Exclusion All slides © IG.
CS 425 / ECE 428 Distributed Systems Fall 2014 Indranil Gupta (Indy) Lecture 19: Paxos All slides © IG.
CS 425 / ECE 428 Distributed Systems Fall 2014 Indranil Gupta (Indy) Lecture 18: Replication Control All slides © IG.
Paxos Made Simple Jinghe Zhang. Introduction Lock is the easiest way to manage concurrency Mutex and semaphore. Read and write locks. In distributed system:
1 A Modular Approach to Fault-Tolerant Broadcasts and Related Problems Author: Vassos Hadzilacos and Sam Toueg Distributed Systems: 526 U1580 Professor:
Coordination and Agreement, Multicast, and Message Ordering.
CSE 486/586, Spring 2013 CSE 486/586 Distributed Systems Mutual Exclusion Steve Ko Computer Sciences and Engineering University at Buffalo.
Bringing Paxos Consensus in Multi-agent Systems Andrei Mocanu Costin Bădică University of Craiova.
Chapter 19 Recovery and Fault Tolerance Copyright © 2008.
CSE 486/586, Spring 2013 CSE 486/586 Distributed Systems Replication with View Synchronous Group Communication Steve Ko Computer Sciences and Engineering.
Review for Exam 2. Topics included Deadlock detection Resource and communication deadlock Graph algorithms: Routing, spanning tree, MST, leader election.
CS425 /CSE424/ECE428 – Distributed Systems – Fall 2011 Material derived from slides by I. Gupta, M. Harandi, J. Hou, S. Mitra, K. Nahrstedt, N. Vaidya.
CSE 486/586, Spring 2013 CSE 486/586 Distributed Systems Wrap-up Steve Ko Computer Sciences and Engineering University at Buffalo.
Coordination and Agreement. Topics Distributed Mutual Exclusion Leader Election.
CS542: Topics in Distributed Systems Replication.
Physical clock synchronization Question 1. Why is physical clock synchronization important? Question 2. With the price of atomic clocks or GPS coming down,
Exercises for Chapter 15: COORDINATION AND AGREEMENT From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 3, © Addison-Wesley.
Hwajung Lee.  Improves reliability  Improves availability ( What good is a reliable system if it is not available?)  Replication must be transparent.
Page 1 Mutual Exclusion & Election Algorithms Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Replication Steve Ko Computer Sciences and Engineering University at Buffalo.
Lecture 12-1 Computer Science 425 Distributed Systems CS 425 / CSE 424 / ECE 428 Fall 2012 Indranil Gupta (Indy) October 4, 2012 Lecture 12 Mutual Exclusion.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 15: Coordination.
Highly Available Services and Transactions with Replicated Data Jason Lenthe.
CSE 486/586 CSE 486/586 Distributed Systems Leader Election Steve Ko Computer Sciences and Engineering University at Buffalo.
Distributed Systems Lecture 9 Leader election 1. Previous lecture Middleware RPC and RMI – Marshalling 2.
Fundamentals of Fault-Tolerant Distributed Computing In Asynchronous Environments Paper by Felix C. Gartner Graeme Coakley COEN 317 November 23, 2003.
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Oct 1, 2015 Lecture 12: Mutual Exclusion All slides © IG.
Slides for Chapter 11: Coordination and Agreement From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 3, © Addison-Wesley.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Reliable multicast Tolerates process crashes. The additional requirements are: Only correct processes will receive multicasts from all correct processes.
Lecture 18: Mutual Exclusion
Exercises for Chapter 11: COORDINATION AND AGREEMENT
Coordination and Agreement
CSE 486/586 Distributed Systems Wrap-up
Introduction Many distributed systems require that participants agree on something On changes to important data On the status of a computation On what.
Distributed Systems – Paxos
CSE 486/586 Distributed Systems Wrap-up
Lecture 17: Leader Election
Implementing Consistency -- Paxos
EECS 498 Introduction to Distributed Systems Fall 2017
Distributed Systems, Consensus and Replicated State Machines
Active replication for fault tolerance
EEC 688/788 Secure and Dependable Computing
Distributed Transactions
Lecture 21: Replication Control
CSE 486/586 Distributed Systems Mutual Exclusion
Physical clock synchronization
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Distributed Systems (15-440)
Lecture 21: Replication Control
Implementing Consistency -- Paxos
CSE 486/586 Distributed Systems Mutual Exclusion
CSE 486/586 Distributed Systems Leader Election
Presentation transcript:

Failure Detection The ping-ack failure detector in a synchronous system satisfies – A: completeness – B: accuracy – C: neither – D: both

Failure Detection The ping-ack failure detector in an asynchronous system satisfies – A: completeness – B: accuracy – C: neither – D: both

Vector timestamps Which of these timestamps is concurrent with (1,2,3) – A: (1,3,3) – B: (1,2,1) – C: (4,5,6) – D: (2,3,2)

Consistent Cut Which of these cuts is consistent? – A: cut1 – B: cut2 P1 P2 e1 e2 e3 e4

Reliable Multicast In reliable multicast, what is the definition of “Integrity”? – A: A correct process p delivers a message m at most once. – B: If a correct process delivers message m, then all the other correct processes in group(m) will eventually deliver m. – C: If a correct process multicasts (sends) message m, then it will eventually deliver m itself.

Multicast State true or false: Any multicast that is both FIFO-ordered and totally ordered is thereby causally ordered. – A: True – B: False

Consensus For which of the following situations, consensus is possible: – A: synchronous system, failures possible – B: asynchronous system, failures impossible – C: both – D: neither

Mutual Exclusion What properties does Token Ring mutual exclusion algorithm satisfy – A: Safety only – B: Safety & liveness – C: Safety & ordering – D: Safety, liveness, and ordering – E: none of the above

Mutual Exclusion What properties does Ricart & Agrawala mutual exclusion algorithm satisfy – A: Safety only – B: Safety & liveness – C: Safety & ordering – D: Safety, liveness, and ordering – E: none of the above

Leader Election Leader election in asynchronous systems is – A: possible – B: impossible

Leader Election Bully algorithm guarantees: – A: Safety – B: Liveness – C: Both – D: Neither

Byzantine Generals Algorithm What is the minimum number of nodes required to achieve agreement in Byzantine generals algorithm with f Byzantine faulty nodes? – A: f+1 – B: 2f+1 – C: 3f+1

Routing Algorithms In which routing algorithm each node talks only to its directly connected neighbors, but it tells them everything it has learned? – A: Link State routing algorithm – B: Distance Vector routing algorithm

Chord How much state does a Chord peer maintain? – A: O(1) – B: O(log N / log log N) – C: O(log N) – D: O(√N) – E: O(N)

Idempotence Idempotent algorithms are needed when using – A: at most once invocation semantics – B: at least once invocation semantics

RMI To facilitate RMI, a stub object is maintained – A: on the client – B: on the server

2PL Two-phase locking ensures that: – A: Transactions maintain serial equivalence – B: Deadlocks do not occur – C: Distributed transactions can commit atomically

Quorum In a system of 6 nodes, which of these is an invalid quorum configuration? – A: w=4, r=3 – B: w=6, r=3 – C: w=5, r=1 – D: w=6, r=1 – E: w=4, r=5

Available Copies Replication Available copies replication captures which two properties from the CAP theorem? – A: Consistency and Availability – B: Consistency and Partition-tolerance – C: Availability and Partition-tolerance

Gossip protocols What is the worst-case latency for distributing a message among N nodes through a gossip protocol – A: O(log N) – B: O(N 0.5 ) – C: O(N) – D: unbounded

Gossip protocols What is the expected latency for distributing a message among N nodes through a gossip protocol – A: O(log N) – B: O(N 0.5 ) – C: O(N) – D: unbounded

Two-phase commit If a participant has responded yes to a canCommit call and has not heard from the coordinator for a long time, it should: – A: abort – B: commit – C: call getDecision on the coordinator – D: keep waiting

Routing Algorithms Count-to-infinity is a problem of – A: Link State routing algorithm – B: Distance Vector routing algorithm

Distributed Shared Memory False sharing leads to: – A: Excessive page transfers – B: Violations of sequential consistency – C: Deadlock

CODA Which of the CAP “vertices” does CODA sacrifice? – A: Consistency – B: Availability – C: Partition-tolerance

Paxos In Paxos, a distinguished proposer is used to: – A: ensure safety – B: ensure liveness – C: optimize performance

Paxos In Paxos, a distinguished listener is used to: – A: ensure safety – B: ensure liveness – C: optimize performance