lOMoARcPSD|47062552
CS3551 DISTRIBUTED COMPUTING QUESTION BANK
UNIT – I
PART-A
1. Define distributed system.
A distributed system is a collection of independent computers that appears to its users as a
single coherent system. A distributed system is one in which components located at
networked communicate and coordinate their actions only by passing message.
2. List the characteristics of distributed system?
Programs are executed concurrently
There is no global time
Components can fail independently (isolation, crash)
3. Mention the examples of distributed system.
The Internet
Intranets
Mobile and ubiquitous computing
4. What is mobile and ubiquitous computing?
Mobile: computing devices are being carried around.
Ubiquitous: little computing devices are all over the place.
5. Mention the challenges in distributed system.
1. Heterogeneity
2. Openness
3. Security
4. Scalability
5. Failure handling
6. Concurrency
7. Transparency
6. What are the Advantages of Distributed Systems?
Performance
Distribution
Reliability (fault tolerance)
Incremental growth
Sharing of data/resources
Communication
7. What are the Disadvantages of Disadvantages of Distributed Systems? Difficulties
of developing distributed software
lOMoARcPSD|47062552
Networking problems
Security problems
8. Write the difference between mobile and ubiquitous computing.
Ubiquitous computing used in single environment such as home or hospital.
Mobile computing has advantage when using different devices such as laptops and printers.
9. Why we need openness?
The degree to which a computer system can be extended and re-implemented.
IEEE = Institute of Electrical and Electronic Engineers e.g., IEEE 802.11
WLAN, IEEE 802.3 Ethernet W3C = World Wide Web Consortium e.g.,
HTML Recommendations
10. What are the security mechanisms used in distributed computing?
Encryption
E.g. Blowfish, RSA
Authentication
E.g. password, public key authentication
Authorization
E.g. access control lists
11. How we provide a security?
Confidentiality
Protection against disclosure to unauthorized individual.
E.g. ACLs (access control lists) to provide authorized access to information.
Integrity
Protection against alternation or corruption.
E.g. changing the account number or amount value in a money order
Availability
Protection against interference targeting access to the resources.
E.g. denial of service (DoS, DDoS) attacks
Non-repudiation
Proof of sending / receiving an information E.g. digital signature
12. Define Scalability.
System should work efficiently at many different scales, ranging from a small Intranet to the
Internet.
Challenges of designing scalable distributed systems:
Cost of physical resources
Cost should linearly increase with system size
Performance Loss
lOMoARcPSD|47062552
For example, in hierarchically structure data, search performance loss due to data growth
should not be beyond O(log n), where n is the size of data.
Preventing software resources running out
Numbers used to represent Internet address (32 bit->64bit),Y2K like problem. Avoiding
performance bottlenecks
Use decentralized algorithms (centralized DNS to decentralized)
13. What are the different types of system model?
-Architecture model
-Fundamental model
Interaction model
Failure model
Security model
14. What is the use of middleware?
Middleware a layer of software whose purpose is to mask heterogeneity and to provide
a convenient programming model to application programmers. Middleware is
represented by processes or objects in a set of computers that interact with each other
to implement communication and resource sharing support for distributed
applications.
15. Define protocol.
The term protocol is used to refer to a well-known set of rules and formats to be used for
communication between processes in order to perform a given task. The definition of a
protocol has two important parts to it:
A specification of the sequence of messages that must be exchanged;
A specification of the format of the data in the messages.
16. What is meant by internet protocol?
The IP protocol transmits datagram from one host to another, if necessary via intermediate
routers. There are several header fields that are used by the transmission and routing
algorithms.
17. Define mobile IP.
Mobile IP is an Internet Engineering Task Force (IETF) standard communications
protocol that is designed to allow mobile device users to move from one network to another
while maintaining their permanent IP address. Defined in Request for Comments (RFC)
2002, Mobile IP is an enhancement of the Internet Protocol (IP) that adds mechanisms for
forwarding Internet traffic to mobile devices (known as mobile nodes) when they are
connecting through other than their home network.
18. What is the architectural model?
lOMoARcPSD|47062552
An architectural model defines the way in which the components of system interact with one
another and the way in which they are mapped onto an underlying network of computers.
19. What is the fundamental model?
Fundamental models that help to reveal key problems for the designers of distributed
systems. Their purpose is to specify the design issues, difficulties and threats that must be
resolved in order to develop distribute systems that fulfill their tasks correctly, reliably and
securely. The fundamental mode provides abstract views of just those characteristics of
distributed systems that affect the dependability characteristics - correctness, reliability and
security.
20. Write about the parts available in routing algorithm?
routing algorithm has two parts:
1. It must make decisions that determine the route taken by each packet as it travels
through the network. In circuit-switched network layers such as X.25 and frame relay
networks such as ATM the route is determined whenever a virtual circuit or connection is
established
In packet-switched network layers such as IP it is determined separately for each packet, and
the algorithm must be particularly simple and efficient if it is not to degrade network
performance.
2. It must dynamically update its knowledge of the network based on traffic monitoring
and the detection of configuration changes or failures. This activity is less time-critical;
slower and more computation-intensive techniques can be used.
PART-B
1. Explain distributed system with examples.
2. Briefly discuss bout resource sharing.
3. Mention the challenges in distributed system. Explain.
4. With neat diagram explain about the architectural model.
5. What is the purpose of fundamental model? Explain briefly.
6. Write short note on IPv6.
7. What is the function of firewall? Explain.
8. Explain the various types of networks.
9. Explain about the internet protocols.
lOMoARcPSD|47062552
10. Case study on Ethernet.
11. Explain about IP addressing, IP protocol and IP routing.
12. Briefly discuss about the network principles.
13. What are the networking issues for distributed System?
UNIT II -LOGICAL TIME AND GLOBAL STATE
1. What is meant by interprocess Communication?
Inter process communication is concerned with the communication between processes in a
distributed system, both in its own right and as support for communication between
distributed objects. The Java API for inter process communication in the internet provides
both datagram and stream communication.
2. What is the difference between RMI and RPC?
Remote Procedure Call or the RPC and the Remote Method Invocation or RMI are both
message passing techniques in the Inter Process Communication(IPC). But there are two
basic differences between the two methods:
1. RPC supports procedural programming. i.e.only remote procedures can be invoked.
Whereas RMI is object-based. As the name suggests, it is invoked on remote objects.
2. In RPC, the parameters that are passed are ordinary data structures. Whereas in RMI,
objects can be passed as parameters.
3. Define Datagram.
A datagram is, to quote the Internet's Request for Comments 1594, "a self-contained,
independent entity of data carrying sufficient information to be routed from the source to the
destination computer without reliance on earlier exchanges between this source and
destination computer and the transporting network." The term is used in several well-known
communication protocols, including the User Datagram Protocol and AppleTalk.
4. What is the use of UDP?
The Domain Name Service (DNS), which looks up DNS names in the Internet, is
implemented over UDP. UDP datagram’s are sometimes an attractive choice because they do
not suffer from overheads associated with guaranteed message delivery.
5. What is meant by client server communication?
The client–server model of computing is a distributed application structure that partitions
tasks or workloads between the providers of a resource or service, called servers, and service
requesters, called clients.
6. What is meant by group communication?
Group communication is a multicast operation is more appropriate- this is an operation
that sends a single message from one process to each of the members of a group of process,
usually in such a way that the membership of the group is transparent to the sender. 7.
What is the use of RMI registry?
lOMoARcPSD|47062552
The RMI registry is used to store a list of available services. A client uses the registry to
make it's proxy object, and the Registry is responsible for giving appropriate information to
the client so that it can hook up with the server that implements the service.
8. Difference between synchronous and asynchronous communication?
In synchronous form of communication, the sending and receiving processes synchronize at
every message. In this case, both send and receive are blocking operations. Whenever a send
is issued the sending process is blocked until the corresponding receive is issued. Whenever
receive is issued, the process blocks until a message arrives.
In asynchronous form of communication, the use of the send operation is non-blocking in
that the sending process is allowed to proceed as soon as the message has been copied to a
local buffer and the transmission of the message proceeds in parallel with the sending
process. The receive operation can have blocking and non-blocking variants.
9. What is marshalling and unmarshalling?
Marshalling is the process of taking a collection of data items and assembling them into a
form suitable for transmission in a message. Unmarshalling is the process of disassembling
them on arrival to produce an equivalent collection of data items at the destination.
10. What is CDR?
CORBA CDR is the external data representation defined with CORBA 2.0. CDR can
represent all of the data types that can be used as arguments and return values in remote
invocations in CORBA. It consists of 15 primitive types that include short (16-bit), long
(32bit), unsigned short, unsigned long, float (32-bit), double(64-bit), char, Boolean (TRUE
or FALSE), octet (8-bit) and any constructed types.
11. Define XML.
XML stands for EXtensible Markup Language
XML is a markup language much like HTML
XML was designed to carry data, not to display data
XML tags are not predefined. You must define your own tags
XML is designed to be self-descriptive
XML is a W3C Recommendation
PART-B
1. Explain the Communication between distributed objects.
2. Explain in detail about Events and Notifications.
3. Explain in detail about Remote Procedure call with a case study.
4. Describe java RMI.
5. Explain about the group communication.
6. Describe about the client server communication.
7. Explain characteristics of interprocess communication.
8. Explain UDP datagram communication.
9. Explain the various type communications.
lOMoARcPSD|47062552
10. Explain about external data representation and marshalling concepts in detail.
lOMoARcPSD|47062552
UNIT III-LOGICAL TIME AND GLOBAL STATE
1 Define operating system.
An Operating System is the layer between the hardware and software.
An Operating System is responsible for the following functions
• Device management using device drivers
• Process management using processes and threads
• Inter-process communication
• Memory management
• File systems.
2 List the core OS components with diagram?
Process manager: Handles the creation of and operations upon processes. A process is a unit
of resource management, including an address space and one or more threads.
Thread manager: Thread creation, synchronization and scheduling. Threads are schedulable
activities attached to processes .
Communication manager: Communication between threads attached to different processes on
the same computer. Some kernels also support communication between threads in remote
processes. Other kernels have no notion of other computers built into them, and an additional
service is required for external communication.
Memory manager: Management of physical and virtual memory
Supervisor: Dispatching of interrupts, system call traps and other exceptions: control of
memory management unit and hardware caches; processor and floating point unit register
manipulations. This is known as the Hardware Abstraction Layer in Windows NT.
3 How kernel uses the address space?
Often the kernel code and data are mapped into every address space at the same location.
When a process makes a system call or an exception occurs, there is no need to switch to a
new set of address mappings.
4 What is system call trap? How it is implemented?
The invocation mechanism for resources manage dby the kernel A system call trap is
implemented by a machine-level TRAP instructions, which puts the processor into supervisor
mode and switches to the kernel address space.
5 What is execution environment? What it contains?
An execution environment is the unit of resource management: a collection of local
kernelmanaged resources to which its threads have access. An execution environment
primarily consists of:
• an address space;
• thread synchronization and communication resources such as semaphores and
communication interfaces (for example sockets);
• Higher-level resources such as open files and windows.
lOMoARcPSD|47062552
6 Illustrate the architectures for multi-threaded
server?
7 List the two types of thread scheduling?
Explain? There are two types of thread
scheduling. They are • Preemptive scheduling:
A thread may be suspended at any point to make way for another thread, even when the
preempted thread would otherwise continue running.
• Non-preemptive scheduling:
A thread runs until it make a call to the threading system, when the system may descheduled
it and schedule another thread to run.
8 List the types of event that the kernel notifies to the user level scheduler?
There are four types of event that the kernel notifies to the user level scheduler are:
• Virtual processor allocated.
• Scheduler Activation blocked
• Scheduler Activation unblocked
• Scheduler Activation preempted.
9 Difference between monolithic and micro kernel?
• The microkernel based OS can provide ability to enforce modularity behind memory
protection boundaries.
• Microkernel-based OS, the number of bugs is less than the monolithic based system.
• The monolithis-based OS can provide more efficiency with which operations can be
invoked.
10 Write a note on LRPC with diagram?
An invocation of two process on the same machine is called as light weight Remote
Procedure Call.
Shared memory regions are efficient for client server communication with a different region
between the server and each of its local clients.
The same stack is used by client and server stub.
11 What is the goal of security? List the three broad classes of security threats?
The main goal of security is to restrict access to information and resources to just
those principles that are authorized to have success.
Security threads fall into three broad classes:
• Leakage
• Tampering
• Vandalism
12 What are the two measures taken by JVM to protect the local environment?
The two measures taken by JVM to protect the local environment are:
• The downloaded classes are stored separately from local classes ,preventing them from
replacing local classes with spurious versions .
lOMoARcPSD|47062552
• The byte codes are checked for validity. Valid java byte code is composed of java
virtual machine instructions from a specified set. The instructions are also checked to ensure
that they will not produce certain errors when the program runs such as accessing illegal
memory addresses.
13 What is cryptography? What is the use of it?
Cryptography is the art of encoding information in a format that only the intended
recipients can access.
Uses:
• Secrecy and integrity
• Authentication
• Digital signatures.
14 Write a note on digital signature?
Requirement:
– To authenticate stored document files as well as messages
– To protect against forgery
– To prevent the signer from repudiating a signed document (denying their responsibility)
Encryption of a document in a secret key constitutes a signature
- impossible for others to perform without knowledge of the key
- strong authentication of document
- strong protection against forgery
- weak against repudiation (signer could claim key was compromised).
15 What are credentials?
Credientials are a set of evidence provided by a principal when requesting access to a
resource.
It is convienient to require users to interact with the system and authenticate themselves each
time their authority is required to perform an operation on a protected resources. 16 With
diagram explain cipher block chaining?
17 What are stream ciphers?
A collection of files that can be located on any server or moved between servers while
maintaining the same names.
Simillar to a UNIX filesystem
Helps with distributing the load of file serving between several servers.
File groups have identifiers which are unique throughout the system.
lOMoARcPSD|47062552
Used to refer file groups and files.
18 Draw the diagram for file attribute record structure?
19 What is a file group?
A collection of files that can be located on any server or moved between servers while
maintaining the same names.
Simillar to a UNIX filesystem
Helps with distributing the load of file serving between several servers.
File groups have identifiers which are unique throughout the system.
Used to refer file groups and files.
20 Draw the diagram for file service architecture?
21 What are the major goals of Sun NFS?
An industry standard for file sharing on local networks since the 1980s
An open standard with clear and simple interfaces
Closely follows the abstract file service model defined above
Supports many of the design requirements already mentioned:
– transparency
– heterogeneity
– efficiency
– fault tolerance
Limited achievement of:
– concurrency
– replication
– consistency
– security
22 What is flat file service interface?
It is RPC interface used by client modules. It is not normally used directly by user level
programs. A field is invalid if the file that it refers to is not present in the server processing
the request or if its access permissions are inappropriate for the operation requested.
23 Write a note on Andrew file system?
lOMoARcPSD|47062552
AFS provides transparent access to remote shared files for unix programs running on
workstations. Access to AFS files is via the normal unix file primitives, enabling existing
unix programs to access AFS file swithout modification or recompilation.
PART-B
1 Briefly explain about thread concept?
2 With suitable diagram explain the OS architecture?
3 Discuss about the different cryptographic algorithms?
4 Explain digital signature?
5 Write a case study on Sun network file system?
6 Briefly explain about the case study on Andrew file system?
UNIT IV-LOGICAL TIME AND GLOBAL STATE
1 Write a note on X.500 directory service?
It is a directory service. It can be in the same way as a conventional name service But it is
primarily used to satisfy descriptive queries, designed to discover the names and attributes of
other users or system resources.
2 What is name space?
It is a collection of all valid names recognized by a particular service. For a name to be valid
means that the service will attempt to look it up even though that name may prove not to
correspond to any object-to be unbound.
Example: The name “Two” could not possibly be the name of unix process, whereas the
integer “2’ might be.
3 What is the use of iterative navigation?
DNS supports the model known as iterative navigation. To resolve a name, a client presents
the name to the local name server, which attempts to resolve it. If the local name server has
the name, it returns the result immediately.
4 Define multicast navigation?
A client multicast the name to be resolved and the required object type to the group of
name servers. Only the server that holds the named attributes respond to the request.
5 Write short notes on directory services?
A service that stores that stores collection of binding between names and attributes and that
looks up entries that match attribute based specification is called directory service.
Example: Microsofts active Directory services,X.500 and its cousin LDAP, Univers.
6 What is clock skew and clock drift?
The instantaneous difference between the readings of any two clocks is called their skew.
Clock drift means that they count time at different rates, and so diverge.
lOMoARcPSD|47062552
7 What are the two modes of synchronization? Write their format?
The two modes are:
1. External synchronization:
For a synchronization bound D>0, and for a source S of UTC time,|S(t) –Ci(t)|<T, for i=1,2,
…N and for all real times t in I.
2. Internal synchronization:
For a synchronization bound D>0,|Ci(t)-Cj(t)|<D, for i,j=1,2,…N. and for all real times t in I.
8 How the clock synchronization done in Christian’s method?
A single time server might fail, so they suggest the use of a group of synchronized servers .
It does not deal with faulty servers
9 List the design aims and features of NTP?
• To provide a service enabling client across the internet to be synchronized accurately to
UTC.
• To provide a reliable service that can be survive lengthy losses of connectivity.
• To enable clients to resynchronize sufficiently frequently to offset the rates of drift found
in most computers.
• To provide protection against interference with the time service whether malicious or
accidental.
10 With example explain about happened-before relation?
The happened-before relation is a partial order on events that reflects a flow of information
between them.
11 Write the rules for updating the clocks?
The rules for updating the clocks are;
1. Initially, Vi[j]=0, for i,j=1,2..N
2. Just before pi timestamps an event, it sets Vi[i]:=Vi[i]+1.
3. Pi includes the value t=Vi in every message it sends.
4. When pi receives a timestamp t in a message, it sets Vi[j] ;=max(Vi[j],t[j]),for j=1,2..N.
12 What are the issues resolved by Berkley’s algorithm?
The collection of computers whose clocks are to be synchronized are categorized as
masters and slaves. The averaging of the clock values cancels out the individuals clocks
tendencies to run fast or slow.
This overcomes the uncertainty due to message transmission time introduced in the
synchronized clock values returned by the master.
13 What is network partition?
The network partition can be used to separate a group of replica managers into two or
more sub groups.
The members of same subgroup communicate with one another but members of different
subgroup cannot communicate with one another
14 Difference between reliable and unreliable failure detector?
lOMoARcPSD|47062552
Reliable failure detector is one that is always accurate n detecting a process failure. It
answers processes queries with either a response of unsuspected-which, as before can only be
a hint-or failed.
U Reliable failure detector may produce one of two values when given the identity of a
process: Unsuspected or suspected. Both of these results are hints, which may or may not
accurately reflect whether the process has actually failed.
15 Define election algorithm? Mention the different algorithm?
An algorithm for choosing a unique process to play a particular role is called an election
algorithm.
Ex: In a variant of central server algorithm for mutual exclusion, the server is choosen from
among the process .
The different algorithms are •
Ring based election algorithm
• Bully algorithm.
16 Define multicast communication?
It is the implementation of group communication. Multicast communication requires
coordination and agreement. The aim is for members of a group to receive copies of
messages sent to the group . Many different delivery guarantees are possible Example:.
agree on the set of messages received or on delivery ordering .
17 List the requirements of consensus algorithm to hold for execution?
The requirements of consensus algorithm to hold for execution are:
• Terminatio
n
• Agreement
•
Integrity.
18 Write a note on bully algorithm?
This algorithm allows process to crash during an election. Although it assumes that
message delivery between process is reliable. It assume sthat the system is synchronous – it
uses timeouts to detect a process failure.
19 What is distributed debugging?
Distributed debugging is nothing but to check whether a transitory state, instead of a stable
state has occurred in an actual execution .
This is done by recording a system global state.
PART-B
1 Write a case study on X.500 directory service?
2 Write a short notes on directory services?
3 Briefly explain about name services and domain name system?
4 Give a brief description about logical time and logical clocks?
lOMoARcPSD|47062552
5 What is global state? Explain in detail?
6 How to synchronize the physical clock? Explain the different methods in it?
7 Explain in detail about multicast communication?
8 Describe the Byzantine problem in synchronous system?
9 Write a short note on distributed mutual exclusion?
10 What is election algorithm? Explain briefly?
UNIT V - CLOUD COMPUTING
PART - A
1. What are the computing Paradigm Distinctions? [R]
Centralized computing
Parallel Computing
Distributed Computing
Cloud Computing
2. What are the differences between Grid computing and cloud computing?
(Nov/Dev2017) [AZ]
3. What is meant by Centralized Computing? [U]
This is a computing paradigm by which all computer resources are centralized in one
physical system.
All resources (processors, memory, and storage) are fully shared and tightly coupled
within one integrated OS.
4. What is meant by Parallel Computing? [U]
In parallel computing, all processors are either tightly coupled with centralized shared
memory or loosely coupled with distributed memory.
Interprocessor communication is accomplished through shared memory or via message
passing.
lOMoARcPSD|47062552
A computer system capable of parallel computing is commonly known as a
parallelcomputer.
Programs running in a parallel computer are called parallel programs. The process of
writing parallel programs is often referred to as parallel programming.
5. What is meant by Distributed computing? [R]
A distributed system is a network of autonomous computers that communicate with
each other in order to achieve a goal.
The computers in a distributed system are independent and do not physically
sharememory or processors. They communicate with each other using messages, pieces of
information transferred from one computer to another over a network.
6. What is Cloud Computing[U]
“Cloud is a parallel and distributed computing system consisting of a collection of inter-
connected and virtualized computers that are dynamically provisioned and presented as one
or
more unified computing resources based on service-level agreements (SLA) established
through negotiation between the service provider and consumers.”
7. What are the Convergence of various advances leading to the advent of
cloudcomputing. [U]
8. What is Service Oriented Architecture (SOA)? (Nov/Dec 2018) [R]
A service-oriented architecture is essentially a collection of services. These services
communicate with each other. The communication can involve either simple data passing or
it could involve two or more services coordinating some activity.
9. Highlight the importance of the term “cloud computing” (Nov/Dec 2016) [U]
lOMoARcPSD|47062552
Elasticity Demand
Cost Savings
Speed
Flexibility
Integration
DataSecurity & Recovery
Workforce Efficiency
10. What is a Virtual Machine (VM) ? [R]
A virtual machine (VM) is a software program or operating system that not only exhibits the
behavior of a separate computer, but is also capable of performing tasks such as running
applications and programs like a separate computer. A virtual machine, usually known as a
guest is created within another computing environment referred as a "host." Multiple virtual
machines can exist within a single host at one time. A virtual machine is also known as a
guest.
11. What is a grid system? [U]
Interconnected computer systems where the machines utilize the same resources
collectively. Grid computing usually consists of one main computer that distributes
information and tasks to a group of networked computers to accomplish a common goal.
Grid computing is often used to complete complicated or tedious mathematical or scientific
calculations.
12. What is a hypervisor? [R]
A hypervisor, also called a virtual machine manager, is a program that allows multiple
operating systems to share a single hardware host. Each operating system appears to have the
host's processor, memory, and other resources all to itself.
13. List down the different types of VMM. [R]
• VMWare ESXi
lOMoARcPSD|47062552
• Xen.
• KVM
14. What are the types of hypervisor? [R]
Type 1 hypervisors run directly on the system hardware. They are often referred to as a
"native" or "bare metal" or "embedded" hypervisors in vendor literature.
Type 2 hypervisors run on a host operating system.
15. What are the desirable features of Cloud[U]
• self-service
• per-usage metering and biling
• elasticity
• customizable
16. List down the types of clouds based on deployment models. [R]
• Public/Internet Clouds
• Private / Enterprise Cloud
• Hybrid /Mixed Cloud
• Community
17. Bring out the difference between private and public cloud (Nov/Dec 2016) [AZ]
• Public Cloud
These are based on shared physical hardware which is owned and operated by a thirdparty
provider. Public clouds are ideal for small and medium sized businesses or
businesses that have fluctuating demands.
• Private Cloud
A private cloud is infrastructure dedicated entirely to our business that’s hosted either on-
site or in a service provider’s data center
18. What is a community cloud [U]
lOMoARcPSD|47062552
A community cloud is “shared by several organizations and supports a specific
community that has shared concerns (e.g., mission, security requirements, policy, and
compliance considerations)”.
19. What is a hybrid [U]
A hybrid cloud takes shape when a private cloud is supplemented with computing
capacity from public clouds.
20. What is cloud-bursting. [U]
The approach of temporarily renting capacity to handle spikes in load is known as
“cloudbursting”.
21. What is cloud orchestration? [U]
Cloud computing handles a prodigious amount of data and processes across multiple
systems. This heterogeneity makes manageability and coherence a major challenge in
cloud computing. The solution to this challenge lies in implementing a tool or a product
that can manage these interconnections and interactions among cloud connected units.
This solution is called as cloud orchestration. The software toolkit responsible for this
orchestration is called a virtual infrastructure manager
22. What is Virtualized Infrastructure Manager (VIM). [U]
The virtualized infrastructure manager (VIM) in a Network Functions
Virtualization (NFV) implementation manages the hardware and software resources that the
service provider uses to create service chains and deliver network services to customers.
23. List down the characteristics of cloud [R]
Virtualization Support.
Self-Service, On-Demand Resource Provisioning
Multiple Backend Hypervisors.
Storage Virtualization.
Interface to Public Clouds.
Virtual Networking.
lOMoARcPSD|47062552
Dynamic Resource Allocation.
Reservation and Negotiation Mechanism.
High Availability and Data Recovery.
24. What is OGSA in grid computing? /Define OGSA [R]
Open Grid Services Architecture (OGSA) is a set of standards that extends Web
services and service-oriented architecture to the grid computing environment.
OGSA definitions and criteria describe how information is shared and distributed
among the components of large, heterogeneous grid systems; they apply to
hardware, platforms and software.
It was developed within the Open Grid Forum, which was called the Global Grid
Forum (GGF)
25. What is virtualization in cloud computing? [R]
Virtualization is a software that creates virtual (rather than actual) version of something, such
as an operating system, a server, a storage device or network resource . It is the fundamental
technology that powers cloud computing.
PART –B
1. Discuss in detail about Roots of Cloud computing technology
2. Explain about various features of Cloud computing with an example
3. Discuss about advantage and disadvantages of Cloud computing
4. Explain about Layers and Types of Cloud [R]
5. Elaborate on Cloud Infrastructure Management [U]
PART –C
1. Explain about Challenges and Risks faced by Cloud[AZ]
2. Explain in detail about Roots of Cloud Computing[AZ]
ASSIGNMENT QUESTIONS
1. Explain in detail, pros and cons of cloud. (8) [U]
lOMoARcPSD|47062552
2. Write short notes on OS level virtualization. List the pros and cons of OS
levelvirtualization.[R]