Introduction In this lab you will replicate your lock server using the replicated state machine (RSM) approach (see Schneider's RSM paper for a good, but non-required, reference. We have also discussed an example replicated state machine in the Lecture.) In the replicated state machine approach, one machine is the master and the others are slaves. The master is in charge of receiving requests from