.

Friday, March 29, 2019

Nested transactions

Nested proceedingsQ1.Executing nested transactions requires some form of coordination. Explain what a coordinator should actually do?In parliamentary procedure to have hold of the answer to this disbelief more than solid and adopt let me start wit a brief explanation on what actually is a nested transaction.Anested transaction is a new transaction begun in spite of appearance the range of other transaction. Several transactions hind end begin from the scope of one transaction thus the transaction that starts the nested transaction is called thep bentof the nested transaction.The features of nested transactions as to why they exist argon listed below.Nested transactions enable an application to discriminate errors in certain operations.Nested transactions allow an application to treat some(prenominal) related operations as a single operation.Nested transactions whoremaster function concurrently. right away coming on to answer the exact question the function of a coordina tor is that it should take the primary beg automatically in the order in which it receives. It should check the unique identifier in case it has already received and executed the request and if it identifies, it should resend the response backServers which perform requests in distrisolelyed transaction unavoidably to beam with distributively other to coordinate their actions, and so in that respect ar a few put to work that involves when the coordinator is in ferment and they argonIn order to keep track of the participants and their randomness the coordinator keeps a list of references whenever they are involved as this is testament be face-saving at the time of aborting it.When the leaf node sends a request it first reaches the coordinator which then(prenominal) resends a unique ID to the client which ensures that the coordinator is now responsible for the exchange of transactions.At some instance if there is a new participant who joins the transaction, the coordinat or should be informed and it is then the coordinator updates its list of participants and this is where the joint method in the coordinator interface is used.We argued that distribution enhancer may not be in situate for distributive governances. This statement is not true for all types of transparencies. Explain what you scan by pervasive organization. Give an ex healthy?In general permeating clays which is also well known as Ubiquitous computing, can be easily derived by the term ubiquitous which means being everywhere at the uniform time, When applying this logic to technology, the term ubiquitous implies that technology is everywhere and we can use it irrespective of the location and time.It is im airant to note that pervasive systems are built by a number of contrasting distributed components unified and tagged together that can be in tangible and also visible at times which in general monetary value is known as transparency.The following points will retain it cl ear to why pervasive systems are important in the current context.Pervasive systems are changing our solar mean solar day to day activities in a various ways. When it comes to apply todays digitalized equipments substance abusers tend to channel in different waysbe more active suppose and use geographical spaces differentlyIn addition, pervasive systems are globular and local practically everywheresocial and personal public and buck privateinvisible and visibleFrom my understanding, reading and gathering its is true that Distribution transparency may not be in place for pervasive systems but arguably there are rare instances which it can be, because the backend of pervasive system is can be do invisible as the actual user need not know how the surgical operation takes place behind the scene.hither is a typical example on how a pervasive system can involve in a humans day to day life. model a lecturer is preparing himself for a lecture presentation. The lecture fashion is in a different campus which is a 15 minute head from his campus. Its time to leave and he is not quiet ready. He takes his HTC palmtop with him which is a Wi-Fi enabled handheld equipment and walks out. The pervasive system transfers his undone work from his Laptop to his HTC Palmtop, so that he can make his editings during his walk through voice commands. The system knows where the lecturer is heading towards by the campus location tracker. It downloads the presentation to the projection computing machine in which he is going to present and keeps it prepared for the lecture to begin. instanter by the time the lecturer reaches his class he has done the last-place changes. As the presentation proceeds, he is about to display a cut with a diagram with numerical information regard to forecasts and budgets. The system at a time realises that there might be a mistake in this and warns the lecturer, he realizing this at the right time skips the slide and moves on to other topics to make the presentation smooth leaving the students impressed by his quality presentation.Q2. go out a range of buttes P1, P2 Pn implementing a multitiered client- legion architecture. Process Pi is client of service P i+1, and P i will return a state to Pi-1 only after receiving a answerfrom P i+1. What are the main problems with this organization when takinga look at the request-reply performance at process P1?From my understanding a Multitiered client- host Architecture basically refers to where more components in terms of hardware and more significantly softwares are added and tied up to go on or in other words construct a everlasting(a) architecture which facilitates the process of presentation, application processing, and data management to be logically processed separately.In relation to the question the limitations and the problems this organization would face is that if the processes are too large that is referring to Pn according to the example there will be bottle neck kind of situation arising and this can make the unhurt process slow and there will be a chain of processes un processed.A Multitier architecture does not run on its own there are other hardware and software components involved in it and if both of these components drop in performance the whole architecture will calculate a drop in performance.Another problem is that it would more elusive to curriculum and test than in normal architectures because more devices have to communicate in order to complete a clients request.Q3. Strong mobility in UNIX Systems could be supported by allowing a process to fork a barbarian on a remote machine. Explain how this would work?It is easy to get the initial understanding if the logic behind the term forking a churl is made clear. Forking in UNIX refers to the process which the parents image is tout ensemble copied to the child. This start when UNIX starts a new process.Basically, how it works is that the main parent process which already exis ts forks a child process which is the new process relieve oneselfd. consequently as the next trample the newly created child process gets a duplicate copy of the parents data., and now it has 2 processes with the same data and the child process can now be activatedTo create a child process there are 2 basic steps to be followed.The System creates an exact copy of parent process by the process of forkingThe process in UNIX are built with different scratchs therefore the code of the parent process should be substituted within the code of the child process.We must also have the system reserved with ample resources to create the child process and memory map for it.As a result of this it can also be said that the child process inherits all the system variables of the parent process.The only issue in this would that using the forking process consumes more time and memory to duplicate the parents environment, and to create a unique structure for the child.Q4. Describe how Connectionle ss Communications between a client and a waiter proceeds when using sockets?Let me step into answering the question straightaway where the following paragraph will explicate how the inter-group communicationless communication is taking place between the client and a server using the help of programmed sockets.It is clear that the joining uses UDP to connect and program where the server receives linkupless datagrams from m any clients and prints them.Initially, a socket is constructed while it is in un machine-accessible state, which means the socket is in its own and is not associated with any other destination beyond its boundary. The subroutines that needs to be connected binds a destinations i.e. the IP foretell of the server and the port number to which it listens the requests which is a permanent one to the socket and now puts it in connected state. Once this process is completed behind the scene an application program will call the subroutine to establish a connection f orward it prepares it self to transfer data through a socket. More importantly all sockets that are used with connectionless datagram i.e. UDP services does not need be connected before they are used but connecting them makes a more efficient and exerciseive way to transfer data between the client and the sever without specifying the destination each an every time.Note The processes cannot share ports during any time of the process as it is specified permanently to the desired connection itself having said that UDP multicast has the ability to share port numbers which uses a roughly different concept which will not be discussed in this answer.The diagram below illustrates the example in a clear viewQ5. The pass-Reply communications communications protocol is underlying most implementations of remote procedure calls and remote method invocations. In the Request-Reply Protocol, the request messages carry a request ID so that the vector can match answer messages to the requests it sent out.Task Describe a scenario in which a client could receive a reply from an earlier request. in front stepping into answering the questions straightaway let me first briefly explain what the Request-Reply protocol is and why it is used for. The Request-reply protocol is an effective special-purpose protocol for distributed systems based on UDP datagramsThe functions of the RRP are listed belowWhen the RRP is in play the reply message from the server forms an credit for the message requested by the client = avoiding overhead in that location is no guarantee that if a requested message is sent that it will result in a method being executedRe-transmission and acknowledgement of messages can increase reliabilityRRP helps to keep history of messages to avoid re-execution and repeating in the method during a request when transmitting reply messages.Now coming onto answer the question, assume that a client requests the server and is postponement for a reply message, accordingly t he client should get the requested reply within a certain period of time if it doesnt the client sends another request which in other words is known as unchanged operations i.e. operations that can be performed repeatedly with the same effect as if it had been performed exactly once re-execute the operation. If the server receives the second request it then provides a conditional acknowledgement message this depicts that the server guarantees a reply for the client without letting the client to make any more requests for the same message which it has already made.The diagram below has also explained the same as said above.The Request-Reply- observe (RRA) protocol is a variant of the Request-Reply (RR) protocol, where the client has to acknowledge the servers reply. Assume that the operations requested by the client are not idempotent, that is, their end point is different if they are executed a second time.Task For each of the two protocols, RR and RRA, describe which information the server has to store in order to reliably execute the requests of the client and return information about the outcome. address as well when the server can delete which piece of information under the two protocolsBasically the main difference between Request-Reply (RR) and Request-Reply take (RRA) is that In the Request-Reply Protocol, the requested messages carry a request ID so that the sender can match answer messages to the requests it sent out but where as this is not the case in Request-Reply-Acknowledgement (RRA) protocol, here the client acknowledges the servers reply messages, and the acknowledgement message contains the ID in the reply message being acknowledged.If we are specifically talking about transmitting requests in the transport layer the Request-Reply protocol is the most effective one to be used becauseNo acknowledgments are necessary at the transport layer.Since it is often built by UDP datagrams connection establishment overheads can be avoided.There is no necessity for descend control as there are only small hail of data being transferred.In order to reliably execute the requests made by the clients the server has to importantly store the information that is in the request ID so that it makes the server identify the client and respond to its request immediately.The Request ID contains the following information which the server has to store.Sending process identifierIP address of the clientPort number through which the request has comewhole number sequence number incremented by sender with every requestarguably this can also be the most efficient protocol compared with the Request-Reply Acknowledge protocol because this provides Non-idempotent operations i.e. re-send result stored from previous request but the censure here is that it requires maintenance of a history of replies so that it can make use whenever it receive a request.It is clearly said that the non-idempotent operations do have their limitations therefore to limit the size of history and make the connection more reliable and efficient we use Request-Reply Acknowledge protocol.REFERENCESDistributed Systems Concepts and Design, 3rd Ed. G Coulouris, Jean Dollimore, Tim Kindberg BooksDistributed Systems Principles and Paradigms by Andrew S. Tanenbaum (Author), Maarten van Steen (Author)Other Internet sources Websites and ForumsLecture slides and notes

No comments:

Post a Comment