Welcome to my blog

Wednesday, 27 April 2016

Semester S6 CS6303



CS6303 – COMPUTER ARCHITECTURE - Anna University Question Paper


Question Paper Code : 80289
B.E / B.Tech Degree Examination , November / December 2016
Sixth Semester
Electronics and Communication Engineering
CS6303 – COMPUTER ARCHITECTURE
(Regulation 2013)
Time : Three hours                                                                                          Maximum: 100 marks
Answer ALL Questions
PART A – (10 * 2 =20 marks)
1.      What is an instruction register?
2.      Give the formula for CPU execution time for a program.
3.      What is a guard bit and what are the ways to truncate the guard bits?
4.      What is arithmetic overflow?
5.      What is meant by pipeline bubble?
6.      What is a data path?
7.      What is instruction level parallelism?
8.      What is multithreading?
9.      What is meant by address mapping?
10.  What is cache memory?

PART B – (5 * 13 = 65 marks)
11.       (a) Explain in detail the various components of computer system with neat diagram.
OR
            (b) Explain the different types of Addressing modes with suitable examples.

12.       (a) Explain Booths Algorithm for the multiplication of signed two’s complement numbers.
OR
            (b) Discuss in detail about division algorithm in detail with diagram and examples.

13.       (a) Why is branch prediction algorithm needed? Differentiate between the static and dynamic techniques.
OR
            (b) Explain how the instruction pipeline works. What are the various situations where an instruction pipeline can stall?

14.       (a) Explain in detail about Flynns classification of parallel hardware.
OR
            (b) Discuss Shared memory multiprocessor with a neat diagram.

15.       (a) Discuss DMA controller with block diagram.
OR
(b) Discuss the steps involved in the address translation of virtual memory with necessary block diagram.

PART C – (1* 15 = 15 marks)
16.       (a) What is the disadvantage of Ripple carry addition and how it is overcome in carry look ahead adder and draw the logic circuit CLA.
OR

            (b) Design and explain a parallel priority interrupt hardware for a system with eight interrupt sources.


---------------------------------------------------------------------------------------------
Question Paper Code : 57241
B.E / B.Tech Degree Examination , May / June 2016
Sixth Semester
Electronics and Communication Engineering
CS6303 – COMPUTER ARCHITECTURE
(Regulation 2013)
Time : Three hours                                                                                          Maximum: 100 marks

Answer ALL Questions
PART A – (10 * 2 =20 marks)
  1. How to represent Instruction in a Computer System?
  2. Distinguish between auto increment and auto decrement addressing mode.
  3. Define ALU.
  4. What is Subword Parallelism?
  5. What are the advantages of pipelining?
  6. What is Exception?
  7. State the need for Instruction Level parallelism.
  8. What is Fine grained Multithreading?
  9. Define Memory hirerachy.
  10. State the advantages of virtual memory.

PART B – (5 * 16 = 80 marks)
11.       (a) Discuss about the various components of a computer system. (16)
OR
            (b) Elaborate the different types of addressing modes with a suitable example.(16)

12.       (a) Explain briefly about floating point addition and Subtraction algorithms.(16)
OR
            (b) Define Booth Multiplication algorithm with suitable example. (16)

13.       (a) What is pipelining? Discuss about pipelined data path and control. (16)
OR
            (b) Briefly explain about various categories of hazards with examples. (16)

14.       (a) Explain in detail about Flynn’s classification. (16)
OR
            (b) Write short notes on: (16)
                        (i) Hardware multithreading
                        (ii) Multicore processors

15.       (a) Define Cache Memory? Explain the various Mapping Techniques associated with    cache memories. (16)
OR
            (b) Explain about DMA controller with the help of a block diagram. (16)




-------------------------------------------------------------------------------------------------------------------






Thursday, 21 April 2016

Software Architecture two marks



SOFTWARE ARCHITECTURE

TWO Marks




UNIT I

1. What is Software Architecture?
The software architecture of a program or computing system is the structure or structures of the system, which comprise software elements, the externally visible properties of those elements, and the relationships among them.

2. Define Architectural pattern.
An architectural pattern is a description of element and relation types together with a set of constraints on how they may be used. For ex: client-server is a common architectural pattern. Client and server are two element types, and their coordination is described in terms of the protocol that the server uses to communicate with each of its clients.

3. Why is Software Architecture more important?
v  For Communication among stakeholders
v  For Early design decisions
v  For Transferable abstraction of a system

4. What are the common software architecture structures?

  • Module structures
  • Component and Connector structures
  • Allocation Structures

5. Write about allocation structures.
Allocation structures show the relationship between the software elements and the elements in one or more external environments in which the software is created and executed.

6. What is meant by Architecture Business Cycle?
The existence of architecture in turn affects the technical, business and social environments that subsequently influence future architectures. We call this cycle of influences, from environment to the architecture and back to the environment, the Architecture Business Cycle (ABC).

7. What are the major parts of ABC?
ü  How organizational goals influence requirements and development strategy
ü  How requirements lead to architecture
ü  How architectures are analyzed.
ü  How architectures yield systems that suggest new organizational capabilities and requirements

8. List out the activities in ABC
ü  Creating the business case for the system
ü  Understanding the requirements
ü  Creating or selecting the architecture
ü  Documenting and communicating the architecture
ü  Analyzing or evaluating the architecture
ü  Implementing the system based on the architecture
ü  Ensuring that the implementation conforms to the architecture

9. Define Functional requirements
Functional requirements may be calculations, technical details, data manipulation and processing and other specific functionality that define what a system is supposed to accomplish.

10. What is meant by Non-Functional requirements?
Non-functional requirement is a requirement that specifies criteria that can be used to judge the operation of a system, rather than specific behaviours. This should be contrasted with functional requirements that define specific behaviour or functions.

11. Define Quality attributes.
Quality attributes are the overall factors that affect run-time behaviour, system design, and user experience. They represent areas of concern that have the potential for application wide impact across layers and tiers. Some of these attributes are related to the overall system design, while others are specific to run time, design time, or user centric issues.

12. State Testability.
Testability is a measure of how easy it is to create test criteria for the system and its components, and to execute these tests in order to determine if the criteria are met. Good testability makes it more likely that faults in a system can be isolated in a timely and effective manner.

UNIT II
1. Define QAW.
The QAW is a facilitated method that engages system stakeholders early in the lifecycle to discover the driving quality attribute requirements of a software-intensive system.

2. Mention the steps involved in QAW.
·         Introductions and QAW presentation
·         Business/ Programmatic Presentation
·         Architecture Plan presentation
·         Identification of architectural Drivers
·         Scenario Brainstorming
·         Scenario Consolidation
·         Scenario Prioritization
·         Scenario Refinement

3. Write the benefits of QAW.

  •           QAW provides for a wide variety of stake holders to gather in one room at one time very early in the development process.
  •           It is often the first time such a meeting takes place and generally leads to the identification of the conflicting assumptions about system requirements.
  •                     In addition to clarifying quality attribute requirements, the QAW provides increased stakeholder communication, an informed basis for architectural decisions, improved architectural documentation and support for analysis and testing throughout the life of the system.

4. Write the problems with system quality attributes.
The problems with system quality attributes are:

  •  The definitions provided for an attribute are not operational.
  •  A focus of discussion is often on which quality a particular aspect belongs to.
  •  Each attribute community has developed its own vocabulary.

5. Mention the need of documenting quality attributes.
The QAW provides an opportunity to gather stakeholders together to provide input about their needs and expectations with respect to key quality attributes that are of particular concern to them.

6. What are the six parts in a quality attribute scenario?
Source – an entity that generates a stimulus
stimulus – a condition that affects the system
artifact – the part of the system that was stimulated by the stimulus.
environment – the condition under which the stimulus occurred
response – the activity that results because of the stimulus
response measure -  the measure by which the systems response will be evaluated.

7. How usability scenario can be divided?
  • Learning system features
  • Using the system efficiently
  • Minimizing the impact of errors
  • Adapting the system to the users needs
  • Increasing confidence and satisfaction

8. How security scenario can be categorized?
Non repudiation, confidentiality, Integrity, Assurance, Availability, Auditing

9. List out the Quality attributes.
  • Availability
  • Modifiability
  • Performance
  • Security
  • Testability
  • Usability

10. What is meant by tactics?
A tactic is a design decision that influences the control of a quality attribute response.

UNIT III
1. What is architectural description?
An Architectural description is a set of artifacts that documents an architecture in a way its stakeholders can understand and demonstrates that the architectures has met their concerns.

2. Define View.
A view is a representation of one or more structural aspects of an architecture that illustrates how the architecture addresses one or more concerns held by one or more of its stakeholders.

3. Mention the differences between a View and a viewpoint.
  • A view is what you see. A viewpoint is where you are looking from – the vantage point or perspective that determines what you see.
  • A view is always specific to the architecture for which it is created. Viewpoints are generic, and can be stored in libraries for reuse.
  • Every view has an associated viewpoint that describes it, at least implicitly.

4. Write the view types.
  • Module viewtype
  • Component and Connector viewtype
  • Allocation viewtype

5. What is meant by module?
A module is a code unit that implements a set of responsibilities. A module can be a class, a collection of classes, or any decomposition of the code unit.

6. What are three major styles in module view type?
  • decomposition style
  • generalization style
  • layered style

7. Write the elements and relations in component & connector view type
In component and connector view type, elements are components(boxes) and connectors (lines). And relations are attachment of component to connectors.

8. Mention the approaches to choose views
v  Produce a candidate view list
v  Combine views
v  Prioritize

9. Define view point.
A viewpoint is a collection of patterns, templates, and conventions for constructing one type of view.

10. How will you represent the views?
ü  Informal notations
ü  Semiformal notations
ü  Formal notations

11. What are the four phases available in 4+1 view of RUP?
RUP organizes the development of software into four phases:
v  Inception
v  Elaboration
v  Construction
v  Transition

12. What are the two strategies available to analyze the level of concurrency in 4+1 view model?
Inside-out: Starting from Logical Structure
Outside-in: Starting from Physical structure

13. How will you represent views?
ü  Informal notations
ü  Semiformal notations
ü  Formal notations

14. List the types of viewpoints
  • Functional viewpoint
  • Information viewpoint
  • Concurrency viewpoint
  • Development viewpoint
  • Deployment viewpoint
  • Operational viewpoint

15. List some architectural perspective
  • Accessibility
  • Availability
  • Development Resource
  • Evolution
  • Internationalization
  • Location
  • Performance and Scalability
  • Regulation
  • Security
  • Usability


UNIT IV
1. What is meant by architectural pattern?
An architectural pattern is a named collection of architectural design decisions that are applicable in a given development context. It constrain architectural design decisions that are specific to a particular system within that context. It is often documented as software design patterns.

2. Differentiate Architectural style vs Architectural Pattern
Architectural Style
Architectural Pattern
Tells about what components are to be used. (What?)
Tells how the components and connectors are to be implemented. (How?)
Less domain specific
More domain specific

3. What is meant by dataflow Style?
Dataflow Style focus on how data moves between processing elements. The data-flow style is characterized by viewing the system as a series of transformations on successive pieces of input data.

4. What are the two styles of Dataflow style?
Batch- Sequential Style
Pipe & Filter Style

5. Write two examples for Batch Sequential style.
  • Payroll computations
  • Tax reports

6. What is meant by Pipe-and Filter Style?
This style provides a single type of component, the filter and a single type of connector, the pipe. A filter is a data transformer that reads streams of data through one or more input ports and writes streams of data to one or more output ports. A pipe is a binary connector that conveys streams of data from the output port of one filter to the input port of another filter.

7. What are called Layered Systems?
Layered Style is an ordered sequence of layers, each layer offer services that can be used by programs residing with the layers above it.

8. What are the three major parts of Blackboard style?
  • Knowledge Sources
  • Blackboard data Structure
  • Control

9. Mention some of the properties of Object oriented architecture.
  • Data hiding
  • It can decompose problems into a sets of interacting agents.
  • It can be multi-threaded or single thread

10. What are the two forms of message filtering in Publish-Subscribe Style?
  • Topic based system
  • Content based system

11. What are the merits and demerits of publish-subscribe style?
Merit:
Subscribers are independent from each other
Very efficient one-way information dissemination
Demerit:
When a number of subscribers is very high, special protocols are needed.

12. What do you mean by match-resolve-act in a rule based system?
Match: The left hand sides of all productions are matched against the contents of working memory.
Conflict-Resolution: One of the production instantiations in the conflict set is chosen for execution. If no productions are satisfied, the interpreter halts.
Act: The actions of the production selected in the conflict-resolution phase are executed.

13. Mention the properties of pipes and filters.
Pure data-driven interaction
Each component has a set of inputs and a set of outputs
Data transmitted as a whole between filters
Filters are independent programs that can be recombined freely to build family of systems.
Each transformation step is completed before the next step starts
Filter ignore identity of other filters

14.  What is meant by KWIC? List the architectural designs for KWIC system.
KWIC (Keyword In Context) index system accepts an ordered set of lines. Each line is an ordered set of words and each word is an ordered set of characters. Any line may be circularly shifted by repeated removing the first word and appending it at the end of  the line. It outputs a listing of all circular shifts of all lines in alphabetical order.
Architectural designs include:
ü  Main program / Subroutine with shared data
ü  Abstract Data types
ü  Implicit Invocation
ü  Pipes and Filters

15. What are the uses of rule-based systems?
Rule-based systems are used as a way to store and manipulate knowledge to interpret information in a useful way. They are often used in artificial intelligence applications and research. It also used to perform lexical analysis to compile or interpret computer programs, or in natural processing.

UNIT V

1. What is the need for documenting architecture?
Architecture documentation is both prescriptive and descriptive. The architecture serves as the blueprint for both the system and the project developing it. It defines work assignments that must be carried out by design and implementation teams. It is the primary carrier of system qualities such as performance, modifiability and security.

2. What is meant by documenting across views?
Cross-view documentation consists of three major aspects




How the documentation is organized:
            View catalog
View template

What the architecture is:
            System Overview
            Mapping between views
            List of elements and where they appear
            Project glossary

Why the architecture is the way it is:

Rationale


3. What is meant by UML?
Unified Modeling Language (UML) is a common language for business analysts, software architects and developers used to describe, specify, design and document existing or new business processes, structure and behaviour of artifacts of software system.

4. What are the three classifications of UML diagrams?
Behavior diagrams
Interaction diagrams
Strucutre diagrams

5. What are the advantages and disadvantages of UML?
Adv:
Capture business process
Enhance communication and ensures the right communication
Enables reuse of design
Disadv:
UML only partially deals with unique identifiers.
Comparing diagram files with each other
UML is just syntax. IT says nothing about how to create a model

6. What is meant by visual language?
A visual language is a system of communication using visual elements. IT manipulates visual information or supports visual interaction, or allows programming with visual expressions.

7. What are the objectives of formal methods?
Formal methods clarify customers requirements. It reveals ambiguity, inconsistency, incompleteness. It decompose structural and behavioural specifications of component relations.

8. Define formal specification.
A formal specification defines
Syntax – signature of the mapping
Semantics – meaning of the mapping
exceptions – Undefined / errorneous mappings

9. What are the challenges in Formalizing architecture?
  • Models must be scalable
  • Multiple formal methods must be supported
  • Incremental formalization must be supported.
  • Analysis results must be transferable to design and implementation.
  • Key challenge is to combine formal, semiformal, and informal specifications

10. Mention some of the benefits and drawbacks of ADL.
Benefits:
Provide flexibility
Provide high level of abstraction
Provide testing and verification ability
Drawbacks:
Limited operability
Lack of automatic extensibility
Do not handle periodic tasks

11. How do ADL differ from programming languages?
ADL differ from programming languages in that programming languages aim to bind specific solutions with the architectural abstractions while ADLs deliberately suppress such binding.

12. What are the requirements for managing self-adaptive software?
Managing self-adaptive software requires a variety of agents such as observers, planners, and deployers.

13. What is meant by Service Oriented Architecture (SOA)?
Service Oriented architecture is essentially collection of services. It is an architectural approach  that aims at developing modular applications consisting of independent services, which fulfil a specific task and communicate with each other in concordance approach.

14. Define service.
A service is a function that is well-defined, self-contained, and does not depend on the context or state of other services.

15. Define cloud computing.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. (eg. networks, servers, storage, applications, and services) which can be rapidly provisioned and released with minimal management effort.

16. What are the service models of cloud computing?
Infrastructure as a Service
Platform as a Service
Software as a Service

17. Write the deployments models of cloud.
Public cloud
Private cloud
Community cloud
Hybrid cloud

18. What are the advantages and disadvantages of cloud?
Advantages
Can be less expensive compared to buying software and hardware
Can be used from any computer or device with an internet connection
Compatible with most computers and operating systems
Updates occur across the service
Disadvantages
Control  and reliability
Security and compliance
Unpredicted costs

19. Write about ACME.
ACME is a simple, generic software architecture description language (ADL) that can be used as a common interchange format for architecture design tools and/or as a foundation for developing new architectural design and analysis tools.

20. Write the available ADLs.
Aesop supports the use of architectural styles
Rapide allows architectural designs to be simulated, and has tools for analyzing the results of those simulations
UniCon has a high-level compiler for architectural designs
Wright supports the formal specification and analysis of interactions between architectural components

Thursday, 31 March 2016

DS Two marks


UNIT I
1. What do you mean by Distributed Systems?
A distributed System is a collection of independent computers that appears to its users as a single coherent system.
Distributed system is one in which the hardware and software components located at networked computers can communicate and coordinate their actions only by passing messages.

2. Write the examples of Distributed Systems
Three examples:
  • The Internet
  • An Intranet
  • Mobile and Ubiquitous computing

3. Define Backbone
A backbone is a network link with a high transmission capacity, employing satellite connections, fiber optic cables and other high-bandwidth circuits.

4. Write about the role of firewall in intranet.
The role of firewall is to protect an intranet by preventing unauthorized messages leaving or entering. A firewall is implemented by filtering incoming and outgoing messages, for example according to their source or destination.

5.What is meant by mobile computing?
Mobile computing is the performance of computing tasks while the user is on the move, or visiting places other than their usual environment.

6. What is meant by ubiquitous computing?
Ubiquitous computing is connecting many small, cheap computational devices that are present in users’ physical environments, including the home, office and even natural settings. The term ‘ubiquitous’ is intended to suggest that small computing devices will eventually become so pervasive in everyday objects that they are scarcely noticed.

7. Define mobile code.
The term mobile code is used to refer to program code that can be transferred from one computer to another and run at the destination – Java applets are an example

8. Write about Middleware.
The term Middleware applies to a software layer that provides a programming abstraction as well as masking the heterogeneity of the underlying networks, hardware, operating systems and  programming languages.
Example : Common Object Request Broker Architecture (CORBA).

9. Write about the challenges in the design of scalable distributed systems.
The design of scalable distributed system have the following challenges:
Ø  Controlling the cost of physical resources
Ø  Controlling the performance loss
Ø  Preventing software resources running out
Ø  Avoiding performance bottle necks

10. How the failures get tolerated in distributed systems?
It is not possible to detect and hide all the failures that might occur in large network. Their clients can be designed to tolerate failures, which generally involve the users tolerating them as well. Services can be made to tolerate failures by the use of redundant components.

11.  Define network transparency.
There are two important transparencies available. They are access and location transparency; their presence or absence most strongly affects the utilization of distributed resources. They are referred together as network transparency.

12. What are the limitations of spontaneous networking?
v  Internet addressing and routing algorithms are difficult to implement
v  Limited connectivity - users are not always connected as they more around (eg. through tunnels)
v  Security and Privacy


13. Define Marshalling.
Marshalling is the process of taking a collection of data items and assembling them into a form suitable for transmission in a message.

14. Define UnMarshalling.
Unmarshalling is the process of disassembling them on arrival to produce an equivalent collection of data items at the destination.

15. What are communication primitives in request reply protocol?
The request – reply protocol is based on a communication primitives, doOperation, getRequest and  sendReply.


UNIT II
1. What is meant by  remote object reference?
A remote object reference is an identifier that can be used throughout a distributed system to refer to a particular unique remote object.

2. What is the role of communication module?
The communication modules are responsible for providing specified invocation semantics, e.g., at-most-once. The communication module in the server selects the dispatcher for the class of the object to be invoked, passing on its local reference, which it gets from the remote reference module.

3. What is the role of Proxy?
The role of a proxy is to make remote method invocation transparent to clients by behaving like a local object to the invoker: but instead executing an invocation, it forwards it in a message to a remote object.

4. What is the role of stub?
The role of a stub procedure is similar to that of a proxy. It marshals procedure identifier and the arguments into a request message, which it sends via communication module to the server. When the reply message arrives, it unmarshals the results.


5. Define publish-subscribe paradigm.
In publish-subscribe paradigm, an object that generates events publishes the type of events that it will make available for observation by other objects. Objects that want to receive notifications from an object that has published its events subscribe to the types of events that are of interest to them.

6. What are the two main characteristics of Distributed event based system?
Heterogeneous
Asynchronous

7. Write about callback object.
The client creates a remote object that implements an interface that contains a method for the server to call. We refer to this as a callback object.

8. Mention the core OS components.
Ø  Process manager
Ø  Thread manager
Ø  Communication manager
Ø  Memory manager
Ø  Supervisor

9. Write about supervisor mode and user mode.
A kernel process executes with the processor in supervisor (privileged) mode; the kernel arranges that other processor execute in user (unprivileged) mode.

10. Differentiate between process and threads.
A process consists of an execution environment together with one or more threads. A thread is the operating system abstraction of an activity

11. What are the disadvantages of work pool architecture?
Ø  Inflexibility in the number of worker threads
Ø  High level of switching between the I/O and worker threads as they manipulate the shared queue.

12. Write about preemptive scheduling and non-preemptive scheduling.
ü  In preemptive scheduling, a thread may be suspended at any point to make way for another thread.
ü  In non-preemptive scheduling, a thread runs until it makes a call to the threading system, when the system may de-schedule it and schedules another thread to run


UNIT III
1. What is meant by Distributed File system?
Distributed file system support the sharing of information in the form of files and hardware resources in the form of persistent storage throughout an intranet. Distributed File systems allow sharing of data over a long period in a secure and reliable way.

2. What is meant by metadata?
Meta data refers to all of the extra information stored by a file system that is needed for the management of files.

3. What are the file system modules?
Directory module:                 relates file mines to file IDs
File module :                         relates file ID to particular files
Access Control Module:       Checks permission for file requested
File access module :              reads or writes file data
Block module :                     accesses and allocates disk blocked
Device module :                   disk I/O and buffering

4. What are the three components of file service?
The file service can be structured as three components: a flat file service, a directory service and a client module.

5. What is meant by binding?
A name is resolved when it is translated into data about the named resource or object, often in order to invoke an action upon it . The association between a name and an object is c a l l e d binding.

6. What is meant by URN and URC?
The other main type of URI is Uniform Resource Name (URN). URNs are intended to sole the dangling link problem and to provide richer model of finding resources on the web. Uniform Resource Characteristics (URC) is a subset of URNs. A URC is a description of a web resource consisting of attributes of the resource. URCs are for describing web resources and for looking up web resources that match their attribute specification

7. What are the goals of Global name service?
ü  To handle an essentially arbitrary number of names and to serve an arbitrary number of administrative organizations.
ü  a long lifetime
ü  high availability
ü  fault isolation
ü  tolerance of mistrust

8. Define navigation.
The process of locating naming data from among more than one name server in order to resolve a name is called navigation.

9. Write about iterative and multicast navigation.
Iterative navigation: To resolve a name, a client presents the name to the local name server, which attempts to resolve it. If the local name server has the name, it returns the result immediately.
multicast navigation: client multicasts the name to be resolved and the required object type to the group of name servers. Only the server that holds the named attributes responds to the request.

10. What are the advantages of GNS?
*      GNS addresses the needs for scalability and re-configurability.
*      The solution adopted for merging & moving directory trees has a lot of overload.

11. What is an alias? What is the role of alias in DNS?
An alias allows a convenient name to be substituted for a more complicated one. The DNS allows aliases in which one domain name is defined to stand for another. The reason for having aliases is to provide for transparency.
12. Write about GNS.
A Global Name Service (GNS) was designed and implemented by Lampson and  colleagues at the DEC Systems Research Center to provide facilities  for resource location, mail addressing and authentication.
The GNS manages a naming database that is composed of a tree of directories holding names and values.


UNIT IV

1. Define clock.
Each computer contains their own physical clock. These clocks are electronic devices that counts oscillations occurring in a crystal al a definite frequency, and that typically divide this count and store the result in a counter register. 

2. Define clock skew.
The instantaneous difference between the readings of any two clocks is called clock skew.

3. Define clock drift.
The crystal-based clocks may be subject to clock drift, which means that they count time at different rates, and so diverge. The underlying oscillators are subject to physical variations with the consequence that their frequencies of oscillation differ.

4. What is meant by clock drift rate?
A clock's drift rate is the range in the offset between the clock and a nominal perfect reference clock per unit of time measured by the reference clock.

5. Define UTC.
It means Coordinated Universal Time. It is an international standard for timekeeping. It is based on atomic time. UTC signals are synchronized and broadcast regularly from land based radio stations and satellites covering many parts of the world.

6. Write about Logical clock.
Lamport invented a simple mechanism, by which the happened-before ordering can be captured numerically, called a logical clock. A lamport logical clock is a monotonically increasing software counter.

7. What is meant by failure detector?
A failure detector is a service that processes queries about whether a particular process has failed. It is often implemented by an object local to each process (on the same computer) that runs a failure-detection algorithm in conjunction with its counterparts at other processes.

8. Write the essential requirements for mutual exclusion.
Our essential requirements for mutual exclusion are as follows.
ME 1: (safety) - At most one process may execute in the Critical Section (CS) at a    time
ME 2: (liveness) - Requests to enter and exit the CS eventually succeed.
ME 3: (ordering) - If one request to enter the CS happened-before another, then entry to the CS is granted in that order.

9. What are the three messages occur in bully algorithm?
There are three types of message in this algorithm:
Ø  an election message is sent to announce an election;
Ø  an answer message is sent in response to an election message
Ø  and a coordinator message is sent to announce the identity of the elected process – the new ‘coordinator’.

10. Compare Virtual ring and Bully algorithm.
Election
algorithm
Number of messages
Problems
Virtual ring
2N to 3N-1
Don’t tolerate faults
Bully
N-2 to O(N2)
System must be synchronous

11. What  is meant by negative acknowledgement?
Processes send a separate response message only when they detect that they have missed a message. A response indicating the absence of an expected message is known as a negative acknowledgement.

12. What are the requirements for interactive consistency?
The requirements for interactive consistency are:
Termination: Eventually each correct process sets its decision variable.
Agreement: The decision vector of all correct processes is the same.
Integrity: If pi is correct, then all correct processes decide on vi as the ith component of their vector.

13. Define Election.
In general, all processes in the distributed system are equally suitable for the role. Election algorithms are designed to choose a coordinator. Afterwards, if the process that plays the role of server wishes to retire then another election is required to choose a replacement.