Due: Tue, 26 Apr 2016 09:00:00 -0700
The paper uses a lock service as a running example.
How would you build another service atop the lock service?
In other words, what steps would be needed to take advantage
of the mutual exclusion the lock is supposed to be providing?
IronFleet assumes addresses in packet headers are trustworthy. How could you remove this assumption, and how would this affect the verification process (e.g., what new assumptions might you need to add)?
In Figure 14, IronKV’s performance relative to Redis decays faster for Set than for Get. Why might this happen?
Provide a list of questions you would like to discuss in class.
Submit a plain text file answers.txt
with your answers to the questions.