Documente Academic
Documente Profesional
Documente Cultură
UNIT-II 2 Marks
1. What is a mailbox?
A simple way of dealing with the buffer management is to define a new data structure
called mailbox. A mailbox is created by the kernel in buffer to receive messages and address is
specified to look for it in network places.
When a process calls send it specifies a destination and a buffer to send to that
destination. While the message is being sent, the sending process is blocked (i.e., suspended).
The instruction following the call to send is not executed until the message has been completely
sent. Such primitives are called as blocking or synchronous primitives.
When a process calls send it specifies a destination and a buffer to send to that
destination. If send is non-blocking, it returns control to the caller immediately, before the
message is being sent. So that sending process can continue computing in parallel with the
message transmission. Such primitives are called as non-blocking or asynchronous primitives.
In the client server model, the client sends a request message to the server asking for
some service. The server does the work and returns the data requested or an error code indicating
why the work could not be performed. This is known as request/reply protocol.
When the server begins executing, the call to initialize outside the main loop
exports the server interface. (i.e.,) the server sends a message to a program called the binder, to
make its existence known. This process is referred to as registering the server.
8. What is an orphan?
A condition in which client sends a request to a server to do some work and crashes
before the server replies. At this point a computation is active and no parent is waiting for the
result is called an orphan.
9. What is reincarnation?
When an epoch broadcast comes in, each machine checks to see if it has any
remote computations, and if so, tries to locate their owner. Only if the owner cannot be found the
computation is killed.
In closed group systems, the members of the group alone can send to the group.
Outsiders cannot send messages to the group as a whole, but can send messages to individual
members. The systems which do not have this property come under open group systems.
• If hardware supports broadcast but not multicast, the message can be broadcast. Every
kernel will then get it and extract from the group address.
• If neither broadcast nor multi cast is supported, the kernel of the sending machine will
have to have a list of machines that have processes of that group.
A loosely synchronous system is one in which all events take a finite amount of
time but all events appear in the same order to all parties. (i.e.,) all processes receive all
messages in the same order.
A virtually synchronous system one in which the ordering constraint has been
relaxed, but in such a way that under carefully selected circumstances, it does not matter.
When a system has n computers, all n crystals (timer) will run at slightly different
rates, causing the (software) clocks gradually to get out of sync and give different values when
read out. This difference in time values is called clock skew.
Atomicity ensures that each transaction either happens completely, or not at all,
and if happens in a single indivisible, instantaneous action. While a transaction is in progress,
other processes cannot see any intermediate states.
In this algorithm the time server is active, polling every machine periodically to
ask what time is there. Based on the answers, it computes an average time and tells all the other
machines to advance their clocks to the new time or slow their clocks down until some specified
reduction has been achieved. This method is suitable for a system in which no machine has a
WWV receiver.
The length of the day is computed by measuring a large number of days and taking
the average before dividing by 86,400. The resulting quantity is called mean solar second.
The election algorithms attempt to locate the process with the highest number
and designate it as coordinator. The algorithms differ in the way they do the location. The two
example election algorithms are Bully algorithm and Ring algorithm.
In two-phase locking, the process first acquires all the locks it needs during the
growing phase, and then releases them during the shrinking phase. If the process refrains from
updating any files until it reaches the shrinking phase, failure to acquire some lock can be dealt
by releasing all locks, waiting a little while, and starting all over.
iii) If one of the higher-up answers, it takes over. P’s job is done.
It is an approach to handle multiple transactions at the same time. It fits best with
the implementation based on private workspaces. That way, each transaction changes its files
privately without interference from the others. At the end, the new files are either committed or
released.