Deck 18: Distributed Process Management

Full screen (f)
exit full mode
Question
One of the earliest proposed approaches to providing distributed mutual exclusion is based on the concept of a distributed queue.
Use Space or
up arrow
down arrow
to flip the card.
Question
The operating system knows the current state of all processes in the distributed system.
Question
Mutual exclusion, deadlock, and starvation are not issues that are faced in a distributed system.
Question
Algorithms for mutual exclusion and deadlock must depend on access to common memory.
Question
A __________ process transfer involves only processes that have not begun execution and hence do not require transferring the state of the process.

A) channel
B) global
C) nonpreemptive
D) preemptive
Question
A _________ exists between two processes if they exchange messages.

A) snapshot
B) state
C) global state
D) channel
Question
An advantage to nonpreemptive process migration is that it reacts well to sudden changes in load distribution.
Question
The negotiation mechanism makes sure that the destination system does not refuse to accept the migration of a process to itself.
Question
_________ is the combined state of all processes.

A) Channel
B) Global state
C) Snapshot
D) Distributed snapshot
Question
With the __________ strategy, the entire address space at the time of migration is transferred

A) precopy
B) flushing
C) eager (dirty)
D) eager (all)
Question
The decision to migrate must be reached jointly by two Starter processes, one on the source node and one on the destination node.
Question
Interest in the concept of process migration grew out of research into methods of load balancing across multiple networked systems.
Question
Caching is not permitted in the Sprite system.
Question
The __________ strategy transfers only those pages of the address space that are in main memory and have been modified.

A) eager (dirty)
B) precopy
C) copy-on-reference
D) eager (all)
Question
When a process is migrated, it is necessary to destroy the process on the source system and create it on the target system.
Question
It is the delay in communication, coupled with the lack of a common clock, which makes it much more difficult to develop mutual exclusion mechanisms in a distributed system compared to a centralized system.
Question
The aim of an algorithm that deals with deadlock is either to prevent the formation of a circular wait or to detect its actual or potential occurrence.
Question
Deadlock handling is not complicated in a distributed system because each node has accurate knowledge of the current state of the overall system and every message transfer between processes involves predictable delays.
Question
A distributed snapshot algorithm assumes that messages are delivered in the order that they are sent and that no messages are lost.
Question
A true global state cannot be determined because of the time lapse associated with message transfer.
Question
With __________ a deadlock exists if there is a closed loop, or cycle, in the graph that depicts process dependencies.

A) message deadlock
B) communications deadlock
C) phantom deadlocks
D) resource deadlock
Question
A __________ records the state of a process and includes a record of all messages sent and received on all channels.
Question
A __________ is a special control message used by an algorithm.
Question
In a fully ___________ one node is designated as the control node and controls access to all shared objects.

A) global state
B) distributed state
C) centralized algorithm
D) distributed algorithm
Question
"A closed chain of processes exists, such that each process holds at least one resource needed by the next process in the chain," is a description of a __________ .

A) no preemption
B) hold and wait
C) mutual exclusion
D) circular wait
Question
With __________ , all processes cooperate in the deadlock detection function.

A) hierarchical control
B) centralized control
C) deadlock control
D) distributed control
Question
__________ process migration involves transferring a partially executed process, or at least a process whose creation has been completed.
Question
__________ orders events in a distributed system without using physical clocks.
Question
In __________ , messages are the resources for which processes wait and deadlock occurs if each process in a set is waiting for a message from another process in the set and no process in the set ever sends a message.
Question
_________ is a technique in which a decision is made dynamically whether a given resource allocation request could, if granted, lead to a deadlock.

A) Circular wait
B) Nonpreemptive transfer
C) Deadlock avoidance
D) State
Question
When two or more processes compete for the use of system resources, there is a need for a mechanism to enforce __________ .

A) channeling
B) eviction
C) mutual exclusion
D) starvation
Question
The transfer of a sufficient amount of the state of a process from one computer to another for the process to execute on the target machine is __________ .
Question
The _________ of a process is the sequence of messages that have been sent and received along channels incident with the process.
Question
_________ is the permanent blocking of a set of processes that either compete for system resources or communicate with one another.
Question
The __________ algorithm can be used to provide a checkpoint of a distributed algorithm to allow rollback and recovery if a failure is detected.

A) channel
B) state
C) distributed snapshot
D) global state
Question
__________ means that no resource can be forcibly removed from a process holding it.

A) No preemption
B) Hold and wait
C) Circular wait
D) Mutual exclusion
Question
A ________ is the path or means by which the message is transferred.
Question
A property of a fully __________ algorithm is that all nodes expend equal effort, on average, in effecting a final decision.

A) eager
B) distributed
C) centralized
D) migrated
Question
In _________ , deadlocks occurs if each process in a set of processes requests a resource held by another process in the set.

A) resource deadlocks
B) communications deadlocks
C) allocation deadlocks
D) phantom deadlocks
Question
Algorithms for mutual exclusion may be either centralized or __________ .
Question
One site is responsible for deadlock detection with _________ control.
Question
_________ is when only one process may use a resource at a time and no process may access a resource unit that has been allocated to another process.
Question
An alternative approach to mutual exclusion involves the passing of a _________ among participating processes.
Question
The __________ method immediately grants the request of an older transaction by killing a younger transaction that is using the required resource.
Question
With _________ control, the sites are organized in a tree structure, with one site serving as the root of the tree.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 18: Distributed Process Management
1
One of the earliest proposed approaches to providing distributed mutual exclusion is based on the concept of a distributed queue.
True
2
The operating system knows the current state of all processes in the distributed system.
False
3
Mutual exclusion, deadlock, and starvation are not issues that are faced in a distributed system.
False
4
Algorithms for mutual exclusion and deadlock must depend on access to common memory.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
A __________ process transfer involves only processes that have not begun execution and hence do not require transferring the state of the process.

A) channel
B) global
C) nonpreemptive
D) preemptive
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
A _________ exists between two processes if they exchange messages.

A) snapshot
B) state
C) global state
D) channel
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
An advantage to nonpreemptive process migration is that it reacts well to sudden changes in load distribution.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The negotiation mechanism makes sure that the destination system does not refuse to accept the migration of a process to itself.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
_________ is the combined state of all processes.

A) Channel
B) Global state
C) Snapshot
D) Distributed snapshot
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
With the __________ strategy, the entire address space at the time of migration is transferred

A) precopy
B) flushing
C) eager (dirty)
D) eager (all)
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The decision to migrate must be reached jointly by two Starter processes, one on the source node and one on the destination node.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Interest in the concept of process migration grew out of research into methods of load balancing across multiple networked systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Caching is not permitted in the Sprite system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
The __________ strategy transfers only those pages of the address space that are in main memory and have been modified.

A) eager (dirty)
B) precopy
C) copy-on-reference
D) eager (all)
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
When a process is migrated, it is necessary to destroy the process on the source system and create it on the target system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
It is the delay in communication, coupled with the lack of a common clock, which makes it much more difficult to develop mutual exclusion mechanisms in a distributed system compared to a centralized system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The aim of an algorithm that deals with deadlock is either to prevent the formation of a circular wait or to detect its actual or potential occurrence.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Deadlock handling is not complicated in a distributed system because each node has accurate knowledge of the current state of the overall system and every message transfer between processes involves predictable delays.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
A distributed snapshot algorithm assumes that messages are delivered in the order that they are sent and that no messages are lost.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
A true global state cannot be determined because of the time lapse associated with message transfer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
With __________ a deadlock exists if there is a closed loop, or cycle, in the graph that depicts process dependencies.

A) message deadlock
B) communications deadlock
C) phantom deadlocks
D) resource deadlock
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A __________ records the state of a process and includes a record of all messages sent and received on all channels.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A __________ is a special control message used by an algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
In a fully ___________ one node is designated as the control node and controls access to all shared objects.

A) global state
B) distributed state
C) centralized algorithm
D) distributed algorithm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
"A closed chain of processes exists, such that each process holds at least one resource needed by the next process in the chain," is a description of a __________ .

A) no preemption
B) hold and wait
C) mutual exclusion
D) circular wait
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
With __________ , all processes cooperate in the deadlock detection function.

A) hierarchical control
B) centralized control
C) deadlock control
D) distributed control
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ process migration involves transferring a partially executed process, or at least a process whose creation has been completed.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
__________ orders events in a distributed system without using physical clocks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
In __________ , messages are the resources for which processes wait and deadlock occurs if each process in a set is waiting for a message from another process in the set and no process in the set ever sends a message.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
_________ is a technique in which a decision is made dynamically whether a given resource allocation request could, if granted, lead to a deadlock.

A) Circular wait
B) Nonpreemptive transfer
C) Deadlock avoidance
D) State
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
When two or more processes compete for the use of system resources, there is a need for a mechanism to enforce __________ .

A) channeling
B) eviction
C) mutual exclusion
D) starvation
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The transfer of a sufficient amount of the state of a process from one computer to another for the process to execute on the target machine is __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The _________ of a process is the sequence of messages that have been sent and received along channels incident with the process.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
_________ is the permanent blocking of a set of processes that either compete for system resources or communicate with one another.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
The __________ algorithm can be used to provide a checkpoint of a distributed algorithm to allow rollback and recovery if a failure is detected.

A) channel
B) state
C) distributed snapshot
D) global state
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
__________ means that no resource can be forcibly removed from a process holding it.

A) No preemption
B) Hold and wait
C) Circular wait
D) Mutual exclusion
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A ________ is the path or means by which the message is transferred.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
A property of a fully __________ algorithm is that all nodes expend equal effort, on average, in effecting a final decision.

A) eager
B) distributed
C) centralized
D) migrated
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
In _________ , deadlocks occurs if each process in a set of processes requests a resource held by another process in the set.

A) resource deadlocks
B) communications deadlocks
C) allocation deadlocks
D) phantom deadlocks
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
Algorithms for mutual exclusion may be either centralized or __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
One site is responsible for deadlock detection with _________ control.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
_________ is when only one process may use a resource at a time and no process may access a resource unit that has been allocated to another process.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
An alternative approach to mutual exclusion involves the passing of a _________ among participating processes.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The __________ method immediately grants the request of an older transaction by killing a younger transaction that is using the required resource.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
With _________ control, the sites are organized in a tree structure, with one site serving as the root of the tree.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.