Assignment: IronFleet

Due: Tue, 26 Apr 2016 09:00:00 -0700

Question

The paper uses a lock service as a running example.
How would you build another service atop the lock service? In other words, what steps would be needed to take advantage of the mutual exclusion the lock is supposed to be providing?

Question

IronFleet assumes addresses in packet headers are trustworthy. How could you remove this assumption, and how would this affect the verification process (e.g., what new assumptions might you need to add)?

Question

In Figure 14, IronKV’s performance relative to Redis decays faster for Set than for Get. Why might this happen?

Question

Provide a list of questions you would like to discuss in class.

Submit a plain text file answers.txt with your answers to the questions.