The Assignment 3 Specification and Marking CriteriaSome Theoretical Issues in Distributed SystemsIn the assignment, you are to address some theoretical issues in the area of distributed systems or distributed computing. You will need to demonstrate your understanding of these theoretical issues or competence to apply these theoretical issues. These theoretical issues have been introduced by this unit through the textbook, weekly lectures or tutorials/labs. You will need to review these learning materials to address the following questions and prepare to do personal research if necessary.Please note: copying from the unit learning materials or internet resources cannot show your understanding of the following issues, but may incur plagiarism or loss of marks. Thus you will need to address the following issues in your own word with proper in-text citations and references.Question 1Address the following issues that are related to replication and fault tolerance.1. Explain the difference between the passive replication model and active replication model.2. Explain the difference between the crash of a server and the Byzantine failure of a server.Assume the active replication and passive replication models are available for fault tolerance.3. If s of s+1 servers crash, explain whether the passive or active model is still fault-tolerant.4. If s of 2s+1 servers have byzantine faults, explain whether the passive or active model is still fault-tolerant.Question 2Recall the internet Domain Name System (DNS), which is detailed in the Week 7 unit contents and practised by Week 8 and Week 9 lab tasks, and answer the following questions.1. Explain the hierarchical structure/arrangement of the DNS servers.2. If the Recursive Server-Controlled Navigation is used, explain the workflow when a client sends a name resolution request.3. If you program/implement a DNS server in Java, what multi-threading strategy will you use? Justify your answer.Question 3Address the following issues that are related to security in distributed systems.1. What is a public key and a private key? Given a public key, is it possible to derive/calculate its private key?2. Assume that Alice’s public key is available on a web site, describe the simplest way that Bob sends a secrete message to Alice by using Alice’s public key.3. There is a potential problem caused by the simple use of public key in step (2), describe the problem.4. Describe why digital certificate can solve the problem in step (2).Question 4Read the following scenario and address the following issues that are related to transaction and concurrency control.Assume that objects a1, a2, and a3 are managed by a server, which provides two operations to operate the objects.read(a): returns the value of object awrite(a, v): assigns the value v to object aAssume that the following two concurrent transactions T and U are performed on these objects.T: read(a2); read(a1); write(a2, a2-25); read(a3); write(a1, a1+52)U: read(a3); read(a2); write(a2, a2+33); write(a3, a3-26)Assume that the original values of a1, a2, and a3 are 111, 106 and 125 respectively. Answer the following questions based on the above scenario.1. If there is no concurrency control, transactions T and U may perform the following interleaving operations on objects a1, a2 and a3. What problem can be caused by the operations? Justify your answer.T: read(a2); U: read(a3); U: read(a2); T: read(a1); T: write(a2, a2-25); T: read (a3); U: write(a2, a2+33); T: write(a1, a1+52); U: write(a3, a3-26)2. What requirement must be satisfied in order to avoid the problem?3. When the above requirement in question (1) is satisfied, what would be the correct values of a1, a2 and a3 after T and U commit?4. Give an example of possible interleaving operations that can produce the correct values of a1, a2 and a3. Note: no marks is given to this question if the operations are not interleaved.5. The following is an example to use exclusive locks to solve the problem in question (1). Give your explanation why it can solve the problem.6. We rearrange T’s operations as follows and keep U’s operations unchanged.T: read(a2); read(a1); read (a3); write(a2, a2-25); write(a1, a1+52)If we use the locks as below, what problem would happen?7. What will be the solution to the problem in question (6)? Give at least two different methods.SubmissionYou will need to address the above issues in a Microsoft Word document. You must submit your assignment via the online submission system from the unit Moodle site. Any hardcopy or email submission will not be accepted. After the marked assignments are returned, any late submissions will not be accepted.The Marking CriteriaMarking CriteriaAvailable MarksQuestion 1: Replication and Fault Tolerance81. Difference between passive model and active model22. Difference between server crash and the byzantine failure23. Whether passive or active model tolerates server crash24. Whether passive or active model tolerates byzantine failure2Question 2: Domain Name System (DNS)61. Explanation of DNS hierarchical structure22. Explanation of sever-controlled navigation23. Explanation of DNS multi-threading strategy2Question 3: Security in Distributed System71. Explanation of public and private key22. Encryption by using a public key13. The potential problem of using public key24. How digital certificate solves the problem2Question 4: Transaction and Concurrency Control141. Explanation of the problem caused by no concurrency control22. Explanation how to avoid the problem23. The correct values produced by the transactions24. The interleaving operations that can produce the correct values25. Explanation of the given interleaving operations26. Explanation of the problem caused by the locks27. The solutions to the problem in question (6)2Sub Total for Assignment 335Late Penalty-1.75 (5% each calendar day, either full or part)Plagiarism Related PenaltyTotal for Assignment 3



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *