Discuss the applicability to mobile and ubiquitous systems of techniques drawn from the areas of

(a) peer-to-peer systems

(b) coordination and agreement protocols

(c) replication


This is mainly a question for class discussion but some key observations are:

(a) peer-to-peer systems are volatile but they are not necessarily physically integrated, e.g. devices involved might be conventional PCs and typically there is no need to apply the boundary principle. Some of the p2p algorithms assume there is a connected infrastructure.

(b) the coordination and agreement protocols are in general designed on the assumption that failure is the exception (e.g. election algorithms) whereas in volatile systems it is the rule. Many of these techniques are too
expensive in communication or too slow to converge to be run frequently. Notions such as consensus are too strong to implement and have to be replaced by more pragmatic, weaker abstractions such as soft state. However, multicast provides a good level of indirection as long as relatively cheap-to-implement semantics suffice.
(c) Deals with disconnected operation. However, in general the techniques considered in this chapter tend to assume a redundancy of resources whereas in ubiquitous and mobile systems the opposite is generally true.

Computer Science & Information Technology

You might also like to view...

Which of the following overloadings will be invoked by this call? g(1.0,2.0);

a. int g(int count, double value); b. void g(double value, int count); c. void g(int value, int count); d. Neither, the compiler cannot decide which of these to use.

Computer Science & Information Technology

The __________ writes a pattern of sectors on the disk surface, may record a copy of the boot routine on the first sector, and initializes control information.

a. formatting process b. boot process c. open command d. The premise of this question is fales.

Computer Science & Information Technology

Give a typedef statement that hides the pointer operator *. Call the new type identifier NodePtr.

Given the type definitions: ``` const int STRING_SIZE = 20; struct ListNode { char item[STRING_SIZE]; int count; ListNode *link; }; ListNode *head = new ListNode; ```

Computer Science & Information Technology

One recent focus for _________ is ensuring that they can handle new and emerging needs, such as having the computational power to process data from smart meters and having the ability to run mobile and social networking applications. A. minicomputers B. mainframe computers C. portable computers D. desktop computers

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology