subject

A client is the only reader and writer of a data item X. Client moves between locations L1 and L2. A server at each location has a replica of the item X which also stores X's local version number (generation). The client reads and writes are always performed locally. A read operation R also returns the local version number of the item X. The initial version number of each copy is equal to 0. A write W increments the (local) version number by 1. PW is an update operation to the remote copy (e. g. after a local W). PW carries the version number of X and stores it with the update. The "" is the time line and the time grows from left to right. For each sub-problem below write the version number next to each R, W, and PW operation and answers the questions
1) Does the sequence of operations below provide monotonic-read consistency?
Explain why it does or does not. If your answer is no, can you add an operation to the sequence so that it does provide monotonic-read consistency (and explain why it does) Use this definition: the monotonic-read consistency guarantees that if a process accessed later time. version of at time t, it will never see an older version of x at
L1 W R P
L2 PW W R.
2) Does the sequence of operations below provide monotonic-write consistency?
Explain why it does or does not. If your answer is no, can you add operations to the sequence so that it does provide monotonic-write consistency (and explain why it does). Use this definition: monotonic-write consistency guarantees that a write is executed on the value of a variable that is the result of all the previous write operations.
L1 W R P
L2 P W R W

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 08:30
Today is the anniversary of me being on yet, i don't need it anymore! here's a picture of my dog wearing a bowtie! my question is, how do i delete my account?
Answers: 1
question
Computers and Technology, 22.06.2019 12:50
You have just been hired as an information security engineer for a large, multi-international corporation. unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. the other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks.requirementswrite a brief description of the case study. it requires two to three pages, based upon the apa style of writing. use transition words; a thesis statement; an introduction, body, and conclusion; and a reference page with at least two references. use a double-spaced, arial font, size 12.
Answers: 1
question
Computers and Technology, 23.06.2019 08:00
What is a scenario where records stored in a computer frequently need to be checked
Answers: 2
question
Computers and Technology, 23.06.2019 13:30
Drag the tiles to the correct boxes to complete the pairs. match the errors with their definitions. #name #value #ref when a formula produces output that is too lengthy to fit in the spreadsheet cell arrowright when you enter an invalid cell reference in a formula arrowright when you type text in cells that accept numeric data arrowright when you type in a cell reference that doesn’t exist arrowright reset next
Answers: 1
You know the right answer?
A client is the only reader and writer of a data item X. Client moves between locations L1 and L2. A...
Questions
Questions on the website: 13722361