Security_1 AFS 1. [5 points] Consider the login process in…
Security_1 AFS 1. [5 points] Consider the login process in AFS. You are a user of the system and you are assigned a username “user1” and password “pwd123”. You are using the system to make changes to a file right before the assignment deadline and, in a rush, you try to login to the system using the password “pwd1234”. List in detail the steps (the login phase and the potential steps in the bind phase) that will occur when you enter this password till the point you are denied access to the system.
Read DetailsPotpourri_6 QuickSilver 6. [2 points] The number of Transa…
Potpourri_6 QuickSilver 6. [2 points] The number of Transaction Managers (TMs) in Quicksilver (choose one of the following): One per node in the distributed system One per transaction tree created in the system One per application running on Quicksilver One for the entire distributed system
Read DetailsFailures_and_Recovery_3c RioVista The context for this que…
Failures_and_Recovery_3c RioVista The context for this question is the same as the previous question. 3. Consider RioVista, which implements LRVM semantics on top of Rio file cache. (c) [2 points] Compare the log truncation code of RioVista to that of Satya’s LRVM.
Read DetailsFailures_and_Recovery_5 QuickSilver 5. [2 points] List one…
Failures_and_Recovery_5 QuickSilver 5. [2 points] List one pro and one con of the location transparency and server independence of QuickSilver’s IPC protocol, specifically related to performance (not implementation complexity).
Read Details