0% found this document useful (0 votes)
39 views

QB Cloud

Uploaded by

nradd707
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

QB Cloud

Uploaded by

nradd707
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

CS8791-Cloud Computing Department of IT 2022-2023

UNIT I INTRODUCTION
Introduction to Cloud Computing – Definition of Cloud – Evolution of Cloud Computing –
Underlying Principles of Parallel and Distributed Computing – Cloud Characteristics –
Elasticity in Cloud – On-demand Provisioning.
UNIT I PART-A
1 What is Distributed computing?
This is a field of computer science/engineering that studies distributed systems. A
distributed system consists of multiple autonomous computers, each having its own
private memory, communicating through a computer network. Information exchange
in a distributed system is accomplished through message passing. A computer
program that runs in a distributed system is known as a distributed program. The
process of writing distributed programs is referred to as distributed programming.
2 What is High Performance Computing?
Supercomputer sites and large data centers must provide high-performance
computing services to huge numbers of Internet users concurrently. Because of this
high demand, the Linpack Benchmark for high-performance computing (HPC)
applications is no longer optimal for measuring system performance.
3 What is Utility computing?
It is a service provisioning model in which a service provider makes computing
resources and infrastructure management available to the customer as needed, and
charges them for specific usage rather than a flat rate.
4 Difference between distributed and parallel computing.
Distributed Parallel
Each processor has its own private All processors may have access to a
memory (distributed memory). shared memory to exchange information
Information is exchanged by passing between processors.
messages between the processors.
It is loosely coupled. It is tightly coupled.
An important goal and challenge of Large problems can often be divided into
distributed systems is location smaller ones, which are then solved
transparency. concurrently ("in parallel").
5 Define cloud computing
Cloud computing is the delivery of computing as a service rather than a product,
hereby shared resources, software, and information are provided to computers and
other devices as a utility.
6 What are the properties of Cloud Computing?
There are six key properties of cloud computing:
 user-centric
 task-centric
 powerful
 accessible
 intelligent
 programmable
KCG College of Technology Page 1 of 22
CS8791-Cloud Computing Department of IT 2022-2023
7 Bring out the difference between private cloud and public cloud (Dec’16)(Nov/Dec
2020)
Public Cloud: Multiple Clients, Hosted at providers location, Shared infrastructure,
Access over Internet, Low Cost, Less Security
Private Cloud: Single Client, Hosted at providers/organization location, Shared only
within organization, Access over Internet/private network, High Cost, High Security
8 Outline any two advantages of distributed computing.(Nov/Dec 2018).
The goal of distributed computing is to make such a network work as a single
computer.
Distributed systems offer many benefits over centralized systems, including
Scalability.
9 Difference between HPC and HTC.
HPC:
 HPC systems emphasize the raw speed performance.
 The speed of HPC systems has increased from Gflops.
 The applications for HPC are scientific, engineering, and manufacturing
communities.
 HPC measured by floating-point speed.
HTC:
 HTC paradigm pays more attention to high-flux computing.
 The main application for high-flux computing is in Internet searches and web
services by millions or more users simultaneously.
 The performance goal measure high throughput or the number of tasks
completed per unit of time.
10 What are the Three New Computing Paradigms
 Radio-frequency identification (RFID)
 Global Positioning System (GPS)
 Internet of Things (IoT).
11 Define Centralized computing.
Centralized computing is a type of computing architecture where all or most of the
processing/computing is performed on a central server. Centralized computing is
which all computer resources are centralized in one physical system. All resources
(processors, memory, and storage) are fully shared and tightly coupled within one
integrated OS.
12 What is high-throughput computing (HTC)?
The emergence of computing clouds instead demands high-throughput computing
(HTC) systems built with parallel and distributed computing technologies. We have to
upgrade data centers using fast servers, storage systems, and high-bandwidth
networks. The purpose is to advance network-based computing and web services with
the emerging new technologies.
13 What is mean by parallel computing?
Parallel computing In parallel computing, all processors are either tightly coupled with
centralized shared memory or loosely coupled with distributed memory. Inter
processor communication is accomplished through shared memory or via message
passing. A computer system capable of parallel computing is commonly known as a
KCG College of Technology Page 2 of 22
CS8791-Cloud Computing Department of IT 2022-2023
parallel computer.
14 What are the properties of Cloud Computing?
There are six key properties of cloud computing:
 Cloud computing is user-centric
 task-centric
 powerful
 accessible
 intelligent
 programmable
15 List the characteristics of cloud computing.(Nov/Dec 2020)
 On-Demand self service
 Broad network access
 Location independent resource pooling
 Rapid elasticity
 Measured services
16 Sketch the architecture of Cloud.

17 What are the benefits of cloud computing?


 Simplicity
 Scalability
 Vendors
 Security
18 What is Google app engine?
Google app engine is a SaaS provider which was introduced in 2008. It was quite
unique cloud system compared to other systems. It provides platform to create
applications. It provides infrastructure for hosting. Many high level services which
needs to be build are available when using an App Engine.
19 List the services provided by a cloud.(April/May 2021) or What is SPI?
The acronym for SPI stands for three major services provided through the cloud. They
are as follows,
1. Software as a Service ( SaaS )
2. Platform as a Service ( PaaS )
3. Infrastructure as a Service ( IaaS )
4. Anything as a service (XaaS)

KCG College of Technology Page 3 of 22


CS8791-Cloud Computing Department of IT 2022-2023

20 What is business on demand?


Business On Demand is not just about utility computing as it has a much broader set
of ideas about the transformation of business practices, process transformation, and
technology implementations. The essential characteristics of on-demand businesses
are responsiveness to the dynamics of business, adapting to variable cost structures,
focusing on core business competency, and resiliency for consistent availability.
21 What are the three communication patterns?
There are three communication patterns:
1.Human to Human (H to H), 2. Human to Thing (H to T), 3.Thing to Thing (T to T)
22 Define Clusters of Cooperative Computers.
A computing cluster consists of interconnected stand-alone computers which work
cooperatively as a single integrated computing resource. A computer cluster is a set of
loosely or tightly connected computers that work together so that, they can be viewed
as a single system.
23 What is autonomic computing?
Autonomic computing refers to the self managing characteristics of distributed
computing resources, adapting to unpredictable changes. It controls the functioning
computer applications and systems without input from the user. This computing
model has systems that run themselves, capable of doing high level functions.
24 List the design objectives of cloud computing.
 Shifting Computing from Desktops to Datacenters
 Service Provisioning and Cloud Economics
 Scalability in Performance
 Data Privacy Protection.
 High Quality of Cloud Services.
25 Highlight the important of the term “cloud computing”. (Dec’16)&(Apr/May 2017)
On-demand capabilities
Broad network access
Resource pooling
Rapid elasticity
Measured service
26 Mention the importance of grid computing and cloud computing.(April/May 2021)
Importance of Grid Computing: Grid computing is flexible, secure, coordinated
resource sharing among dynamic collections of individuals, institutions, and resources.
Grid computing enables the virtualization of distributed computing resources such as
processing, network bandwidth, and storage capacity to create a single system image,
granting users and applications seamless access to vast IT capabilities.
Importance of Cloud Computing: Accessibility; Cloud computing facilitates the access
of applications and data from any location worldwide and from any device with an
internet connection. Cost savings; Cloud computing offers businesses with scalable
computing resources hence saving them on the cost of acquiring and maintaining
them.
27 Illustrate the virtual appliances in cloud computing.(Nov/Dec 2020)
A virtual appliance is a pre-configured virtual machine image, ready to run on a
KCG College of Technology Page 4 of 22
CS8791-Cloud Computing Department of IT 2022-2023
hypervisor; virtual appliances are a subset of the broader class of software appliances.
A virtual appliance is usually built to host a single application; it therefore represents a
new way to deploy applications on a network.
28 Summarize the benefits and drawbacks of using “Platform as a Service”.(Nov/Dec
2020)
Advantages of PaaS:
Cost Saving. Availability & Mobility. Facilitates Scalability. Boosts Productivity.
Disadvantages of PaaS:
Dependency on the Vendor. Data Security.
PART - B
1 Write Short Notes On Origins Of Cloud Computing.
2 Explain Briefly The Security Concerns Of Cloud Computing.
3 Outline The Similarities And Differences Between Distributed Computing, Parallel
Computing And Cloud Computing.(Nov/Dec 2018)
4 List And Explain In Brief The Three New Computing Paradigms.
5 Illustrate The Evolutionary Trend Towards Parallel Distributed And Cloud
Computing.
6 i) State the benefits of cloud computing.
ii) ) Discuss issues of cloud computing and the government policies.
7 i) Explain in detail about computing paradigms.
ii) Explain in detail, categories of cloud.
8 Explain in detail, pros and cons of cloud computing.
9 Draw the diagram and explain about Parallel and Distributed programming models.
10 Discuss the Cloud – On-demand Provisioning.
11 Explain in detail about clusters of cooperative computers (Dec’16)(April/May 2021)
12 Explain the following challenges in cloud.(Nov/Dec 2020)
i) Security.
ii) Data lock-in and Standardization.
iii) Fault tolerance and Disaster recovery.
13 Outline the computing platforms and technologies for the development of cloud
computing applications.(Nov/Dec 2020)
14 Compare and Contrast the Key privacy issues in Cloud and explain the steps to
overcome the issues with necessary examples.(Nov/Dec 2020)
UNIT- II Cloud Enabling Technologies
Service Oriented Architecture – REST and Systems of Systems – Web Services – Publish-
Subscribe Model – Basics of Virtualization – Types of Virtualization – Implementation Levels
of Virtualization – Virtualization Structures – Tools and Mechanisms – Virtualization of CPU
-Memory – I/O Devices -Virtualization Support and Disaster Recovery..
UNIT-II PART - A
1 What is mean by service oriented architecture?(Nov/ Dec 2018)
In grids/web services, Java, and CORBA, an entity is, respectively, a service, a Java
object, and a CORBA distributed object in a variety of languages. These architectures
build on the traditional seven Open Systems Interconnection (OSI) layers that provide
the base networking abstractions. On top of this we have a base software environment,

KCG College of Technology Page 5 of 22


CS8791-Cloud Computing Department of IT 2022-2023
which would be .NET or Apache Axis for web services, the Java Virtual Machine for
Java, and a broker network for CORBA.
2 Define the term web service (Nov/Dec 2018).
 A web service is any piece of software that makes itself available over
the internet and uses a standardized XML messaging system. XML is used to
encode all communications to a web service. For example, a client invokes a web
service by sending an XML message, then waits for a corresponding XML
response.
 The OGSA uses Web services technologies like WSDL, SOAP, and WSIL to
abstract platform and implementation differences, giving transparent access
to grid services. It describes a system that normally consists of a few persistent
and potentially many transient services
3 What are the objectives of OGSA?
 Manage resources across distributed heterogeneous platforms
 Support QoS-oriented Service Level Agreements (SLAs).
 Provide a common base for autonomic management
 Define open, published interfaces and protocols for the interoperability of diverse
resources.
4 Define “OGSA” ?(Apr/May 2017)
Open Grid Services Architecture (OGSA) is a set of standards defining the way in
which information is shared among diverse components of large, heterogeneous grid
systems. In this context, a grid system is a scalable wide area network (WAN) that
supports resource sharing and distribution.
5 Give the basic operations of VM(Apr/May 2017)
1. Multiplexing
2.Suspension
3. Provision
4. Migration
6 Justify that Web and Web architecture are SOA based.(May/June 2018)
Modern IT and web applications are much more complex than the client-server
model. Distributed web services, which are set up as service-oriented architectures
(SOA), offer many functions and modular functional units, which can be
supplemented. With SOAs, business processes can be automated by the involved
systems communicating with one another - partly without human intervention - and
performing certain tasks.
Web Architecture (WA) is a software architecture style that extends service-oriented
architecture (SOA) to web-based applications. WA was originally created by many web
applications and sites.
7 What is mean by Virtualization?
Virtualization is a computer architecture technology by which multiple virtual
machines (VMs) are multiplexed in the same hardware machine. The purpose of a VM
is to enhance resource sharing by many users and improve computer performance in
terms of resource utilization and application flexibility.

KCG College of Technology Page 6 of 22


CS8791-Cloud Computing Department of IT 2022-2023

8 Define virtual machine monitor.


A traditional computer runs with a host operating system specially tailored for its
hardware architecture, After virtualization, different user applications managed by
their own operating systems (guest OS) can run on the same hardware, independent of
the host OS. This is often done by adding additional software, called a virtualization
layer. This virtualization layer is known as hypervisor or virtual machine monitor
(VMM).
9 Define Host OS and Guest OS.
The guest OS, which has control ability, is called Domain 0, and the others are called
Domain U. Domain 0 is a privileged guest OS of Xen. It is first loaded when Xen boots
without any file system drivers being available. Domain 0 is designed to access
hardware directly and manage devices.
10 List the requirements of VMM.(Dec 2017)
 VMM should provide an environment for programs which is essentially identical
to the original machine.
 Programs run in this environment should show, at worst, only minor decreases in
speed.
 VMM should be in complete control of the system resources. Any program run
under a VMM should exhibit a function identical to that which it runs on the
original machine directly.
11 What are the responsibilities of VMM?
 The VMM is responsible for allocating hardware resources for programs.
 Not possible for a program to access any resource not explicitly allocated to it.
 It is possible under certain circumstances for a VMM to regain control of resources
already allocated.
12 Define CPU virtualization.
CPU architecture is virtualizable if it supports the ability to run the VM’s privileged
and unprivileged instructions in the CPU’s user mode while the VMM runs in
supervisor mode. When the privileged instructions including control- and behavior-
sensitive instructions of a VM are executed, they are trapped in the VMM. In this case,
the VMM acts as a unified mediator for hardware access from different VMs to
guarantee the correctness and stability of the whole system.
13 Define memory virtualization.
Virtual memory virtualization is similar to the virtual memory support provided by
modern operating systems. In a traditional execution environment, the operating
system maintains mappings of virtual memory to machine memory using page tables,
which is a one-stage mapping from virtual memory to machine memory. All modern
x86 CPUs include a memory management unit (MMU) and a translation look aside
buffer (TLB) to optimize virtual memory performance.
14 What is mean by I/O virtualization?
I/O virtualization involves managing the routing of I/O requests between virtual
devices and the shared physical hardware. Three ways to implement:
Full device emulation, Full device emulation is the first approach for I/O
virtualization, para-virtualization, direct I/O.
15 What are the types of hypervisor?
There are two types of hypervisors: Type 1 (bare-metal), Type 2 (hosted)

KCG College of Technology Page 7 of 22


CS8791-Cloud Computing Department of IT 2022-2023
16 Distinguish the physical and virtual cluster.(Dec 2017) / Define the term virual
cluster (Nov/Dec 2018) (April/May 2021)
A physical cluster is a collection of servers (physical machines) connected by a physical
network such as a LAN. Virtual clusters have different properties and potential
applications. There are three critical design issues of virtual clusters: live migration of
VMs, memory and file migrations, and dynamic deployment of virtual clusters.
17 What is memory migration?
Moving the memory instance of a VM from one physical host to another can be
approached in any number of ways. Memory migration can be in a range of hundreds
of megabytes to a few gigabytes in a typical system today, and it needs to be done in an
efficient manner. The Internet Suspend-Resume (ISR) technique exploits temporal
locality as memory states are likely to have considerable overlap in the suspended and
the resumed instances of a VM.
18 What is mean by host based virtualization?
An alternative VM architecture is to install a virtualization layer on top of the host OS.
This host OS is still responsible for managing the hardware. The guest OSes are
installed and run on top of the virtualization layer. Dedicated applications may run on
the VMs. Certainly, some other applications can also run with the host OS directly.
19 Define KVM.
Kernel-Based VM:- This is a Linux para-virtualization system—a part of the Linux
version 2.6.20 kernel. Memory management and scheduling activities are carried out by
the existing Linux kernel. The KVM does the rest, which makes it simpler than the
hypervisor that controls the entire machine. KVM is a hardware-assisted para-
virtualization tool, which improves performance and supports unmodified guest OSes
such as Windows, Linux, Solaris, and other UNIX variants.
20 Give the role of a VM. (Dec’16)
It is a management solution for the VM, that enables the configuration and
management of virtualization host, networking and storage resources in order to create
and deploy virtual machines.
21 How performance does enhance by virtualizing the data center?(May/June 2018)
Virtualization can help to make the data center more efficient. Most data centers are not
as efficient as it should be because of low utilization of the data center assets. To ensure
maximum efficiency, we must go for virtualization - be it for servers, storage, and other
infrastructure.
21 “Although virtualization is widely accepted today, it does have its limits”. Comment
on the statement.(May/June 2018)
Yes, because not every application or server is going to work within an environment of
virtualization. That means an individual or corporation may require a hybrid system to
function properly. This still saves time and money in the long run, but since not every
vendor supports virtualization and some may stop supporting it after initially starting
it, there is always a level of uncertainty when fully implementing this type of system.
22 Differentiate full virtualization and para-virtualization.(Nov/Dec 2020)
Full Virtualization Para virtualization
In Full virtualization, virtual machine In paravirtualization, virtual machine
permit the execution of the instructions does not implement full isolation of OS
with running of unmodified OS in an but rather provides a different API which
KCG College of Technology Page 8 of 22
CS8791-Cloud Computing Department of IT 2022-2023
entire isolated way. is utilized when OS is subjected to
alteration.
Full Virtualization is less secure. While the Paravirtualization is more
secure than the Full Virtualization.
Full Virtualization uses binary While Paravirtualization uses hypercalls
translation and direct approach as a at compile time for operations.
technique for operations.
Examples of full virtualization are Examples of paravirtualization are
Microsoft and Parallels systems. VMware and Xen.
23 Point out the layers in security architecture design.(Nov/Dec 2020)
The temporal layer, the distribution layer and the data layer
UNIT-II PART-B
1 a) Explain the trust management in virtual clusters.
b) Discuss how virtualization is implemented in different layers. (Apr/May 2017)
2 Explain implementation levels of virtualization in details.
3 Explain the virtualization for data center automation. (Apr/May 2017) / What is data
center? Outline the issues to be addressed with respect to virtualization for data center
automation. (Nov/Dec 2018)
4 Explain the virtualization of CPU, Memory and I/O devices (Nov/Dec 2018)
5 Short notes on
a. Para-Virtualization with Compiler Support
b. Binary Translation with Full Virtualization(Dec 2017)
6 Explain the characteristics and types of virtualization in cloud computing.
7 Explain detail about Service oriented Architecture.
8 Discuss the REST Full web services.
9 Write short notes on OS level virtualization. List the pros and cons of OS level
virtualization.
10 i) Write short notes on virtual clusters. ii) Explain Publish Subscribe Model
11 Explain in detail about service oriented architecture(Dec’16)(April/May 2021)
12 Explain in detail with the functionalities of OGSA components.' (April/May 2021)
13 What is virtualisation ? Describe para and full virtualisation architectures.
Compare and contrast them.(April/May 2021)
14 Explain the different phenomenon that has gained an interest towards virtualization
technologies.(Nov/Dec 2020)
15 Explain about Virtualization for Linux and Windows and NT Platform. Design the
process of Live Migration of VM from one host to another. (Nov/Dec 2020)
UNIT III Cloud Architecture, Services and Storage
Layered Cloud Architecture Design – NIST Cloud Computing Reference Architecture –
Public, Private and Hybrid Clouds – laaS – PaaS – SaaS – Architectural Design Challenges –
Cloud Storage – Storage-as-a-Service – Advantages of Cloud Storage – Cloud Storage
Providers – S3.
UNIT- III PART- A
1 What is the working principle of Cloud Computing?
The cloud is a collection of computers and servers that are publicly accessible via the
This hardware is typically owned and operated by a third party on a consolidated basis
in one or more data center locations. The machines can run any combination of
operating systems.
KCG College of Technology Page 9 of 22
CS8791-Cloud Computing Department of IT 2022-2023
2 Define private cloud.
The private cloud is built within the domain of an intranet owned by a single
organization. Therefore, they are client owned and managed. Their access is limited to
the owning clients and their partners. Their deployment was not meant to sell capacity
over the Internet through publicly accessible interfaces. Private clouds give local users
a flexible and agile private infrastructure to run service workloads within their
administrative domains.
3 Define public cloud.
A public cloud is built over the Internet, which can be accessed by any user who has
paid for the service. Public clouds are owned by service providers. They are accessed
by subscription. Many companies have built public clouds, namely Google App
Engine, Amazon AWS, Microsoft Azure, IBM Blue Cloud, and Salesforce Force.com.
These are commercial providers that offer a publicly accessible remote interface for
creating and managing VM instances within their proprietary infrastructure.
4 Define hybrid cloud.
A hybrid cloud is built with both public and private clouds, Private clouds can also
support a hybrid cloud model by supplementing local infrastructure with computing
capacity from an external public cloud. For example, the research compute cloud (RC2)
is a private cloud built by IBM.
5 What are the types of Cloud service development?
Software as a Service, Platform as a Service, Infrastructure as a Service
6 Define anything-as-a-service.
Providing services to the client on the basis on meeting their demands at some pay per
use cost such as data storage as a service, network as a service, communication as a
service etc. it is generally denoted as anything as a service (XaaS).
7 What is mean by IaaS?
The Infrastructure as a Service model puts together the infrastructure demanded by the
user namely servers, storage, network and the data center fabric. The user can deploy
and run on multiple VM’s running guest OS on specific application.
8 What is PaaS?
The Platform as a Service model enables the user to deploy user built applications onto
a virtualized cloud platform. It includes middleware, database, development tools and
some runtime support such as web2.0 and java. It includes both hardware and software
integrated with specific programming interface.
9 Difference between SaaS and PaaS(Apr/May’17)
Saas
 Here you don’t have to worry about anything. A pre-installed, pre-configured
package as per your requirement is given and you only need to pay accordingly.
 It is like a complete package of services
 Most popular among normal consumers or companies who reply on software’s
such as email, file sharing and social networking as they don’t have to worry
about the technicalities.
PaaS
 Here you get what you demand. Software, hardware, OS, web environment.
You get the platform to use & pay accordingly.

KCG College of Technology Page 10 of 22


CS8791-Cloud Computing Department of IT 2022-2023
10 Define Cloud services with example.
Any web-based application or service offered via cloud computing is called a cloud
Cloud services can include anything from calendar and contact applications to word
processing and presentations.
11 Define cloud provider.
Cloud Provider: Is a company that offers some component of cloud computing
typically infrastructure as a service, software as a Service or Platform as a Service. It is
something referred as CSP.
12 What is mean by cloud broker?
Cloud Broker: It is a third party individual or business that act as an intermediary
between the purchase of cloud computing service and sellers of that service.
13 What is storage networking?
Storage networking is the practice of linking together storage devices and connecting
them to other IT networks. Storage networks provide a centralized repository for
digital data that can be accessed by many users, and they use high speed connections to
provide fast performance. The phrase "storage networking" is commonly used in
reference to storage area networks (SANs).
14 State any two service provider of SaaS.
Some of the service providers are
1. Amazon Web services
2. Google Apps
3. icloud
4. Oracle
5. Salesforce.com
6. Windows Azure
15 What is cloud storage?
Cloud storage is a cloud computing model that stores data on the Internet through a
cloud computing provider who manages and operates data storage as a service. It’s
delivered on demand with just-in-time capacity and costs, and eliminates buying and
managing your own data storage infrastructure. This gives you agility, global scale and
durability, with ―anytime, anywhere‖ data access.
16 How Does Cloud Storage Work?
Cloud storage is purchased from a third party cloud vendor who owns and operates
data storage capacity and delivers it over the Internet in a pay-as-you-go model. These
cloud storage vendors manage capacity, security and durability to make data accessible
to your applications all around the world.
Applications access cloud storage through traditional storage protocols or directly via
an API. Many vendors offer complementary services designed to help collect, manage,
secure and analyze data at massive scale.
17 List the cloud enabling technologies.
 Fast platform deployment Virtual clusters on demand
 Multitenant techniques,Massive data processing
 Web scale communication
 Distributed storage
 Licensing and billing services
18 Give the significance of Amazon’s AWS.
Amazon Web Services (AWS) is a comprehensive, evolving cloud computing
platform provided by Amazon.com. Web services are sometimes called cloud
KCG College of Technology Page 11 of 22
CS8791-Cloud Computing Department of IT 2022-2023
services or remote computing services.
The growing AWS collection offers over three dozen diverse services including:
1. CloudDrive 2. CloudSearch
3. Dynamo Database 4. Elastic Compute Cloud
19 List some of the more popular cloud storage services.(Jan 14)
Google Drive,iCloud,Dropbox,OneDrive,Box
20 What is mean by S3?
Simple Storage Service (Amazon S3) is an object storage service that offers industry-
leading scalability, data availability, security, and performance. This means customers
of all sizes and industries can use it to store and protect any amount of data for a range
of use cases, such as websites, mobile applications, backup and restore, archive,
enterprise applications, IoT devices, and big data analytics.
21 What is NIST model in cloud computing?
NIST defined cloud computing as a model for enabling ubiquitous, convenient, on-
demand network access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly provisioned
and released with minimal management effort or service
22 Is AWS s3 IaaS or PAAS?
The most famous Amazon Web Service (AWS) offering in Iaas is EC2 (Elastic
computing 2), S3 (Simple Storage Service), and RDS (Relational Database Service). Each
of these products are charged by the hour. Paas stands for Platform as a service.
23 What is the advantages of cloud storage?
Advantages of Cloud Storage
Cost Purchasing physical storage can be expensive. Without the need for
hardware cloud storage is exceptionally cheaper per GB than using external drives.
Using the cloud for storage gives you access to your files from anywhere that has an
internet connection.
24 Compare Public, hybrid and private cloud
Public cloud Hybrid cloud Private cloud
Services are owned and Often called as the best of Dedicated to a single
Operated by a third both worlds it combines organization
provider booth public and private
cloud
The maintenance is bared Greater flexibility and more Higher security as the
by the service provider deployment options resources are not shared
Pay-as-you-go model. Thus Cloud bursting is also Greater flexibility to
the setting and operating possible control the cloud
cost is less environment
Lesser security as the Network complexities and Purchase and maintenance
platform is shared compliance issues has to be bared by the
organization
Lesser flexibility and Can be extremely Expensive than public
control over the cloud expensive cloud
environment
25 Why do we need a hybrid cloud? (Dec’16).(April/May 2021)
The hybrid cloud infrastructure is a composition of two or more clouds that remains
unique entities but is bound together by standardized or proprietary technology that
enables data and application portability.
KCG College of Technology Page 12 of 22
CS8791-Cloud Computing Department of IT 2022-2023
26 Outline the main services that are offered by AWS. (Nov/Dec 2020)
 Amazon Elastic Cloud Compute (EC2) The Amazon EC2 service comes under
the compute domain and it provides services that help to compute workloads
 Amazon S3 (Simple Storage Service)
 Amazon Virtual Private Cloud (VPC)
 Amazon CloudFront.
 Amazon Relational Database Services (RDS)
PART-B
1 Explain the cloud architecture with suitable block diagram.
2 Explain the various Layered Cloud Architectural Development design for effective
cloud computing environment.(Nov/Dec 2020)
3 Write short notes on cloud deployment model.
4 Explain in detail NIST cloud architecture?
5 Compare public cloud with private cloud.
6 Explain the provisioning of storage resources in detail.
7 Explain in detail, the categories of cloud.
8 Discuss about the various challenges during architectural design.
9 Describe Infrastructure-as-a-Service(IaaS), Platform-as-a-Service(PaaS) , Software-as-a-
Service(SaaS) with an example.( Nov / Dec 2018 )
10 Explain cloud storage providers in detail and also state the advantages of cloud
storage.
11 Demonstrate the architectural design of compute and storage clouds. .(Nov/Dec 2020)
UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD
Inter Cloud Resource Management – Resource Provisioning and Resource Provisioning
Methods – Global Exchange of Cloud Resources – Security Overview – Cloud Security
Challenges –Software-as-a-Service Security – Security Governance – Virtual Machine
Security – IAM –Security Standards.
UNIT-IV PART-A
1 What are challenges and risk of cloud security?
Cloud computing security challenges fall into three broad categories:
Data Protection: Securing your data both at rest and in transit
User Authentication: Limiting access to data and monitoring who accesses the data.
Disaster and Data Breach: Contingency Planning
2 List the security issues in cloud.
 Secure data transfer
 Secure software interfaces
 Secure stored data
 User access control
 Data separation
3 Define security governance.
Cloud services governance is a general term for applying specific policies or
principles to the use of cloud computing services. The goal of cloud services
governance is to secure applications and data when they are located remotely.
4 Define security awareness in cloud.

KCG College of Technology Page 13 of 22


CS8791-Cloud Computing Department of IT 2022-2023
Cloud computing is similar to the Bring Your Own Device (BYOD) syndrome. You
can fight it all you want, but sooner or later your organization will most likely have
to accept it. A common failure with securing the Cloud is that most organizations
focus on only the technical controls, such as where is the data stored or when and
how is the data encrypted. However, you must also train and educate the very
people using this technology or you can expose your organization to tremendous
risk.
5 What are the layers in security architecture design?
 User security and monitoring
 Information security – data
 Application level security
 Platform and infrastructure security
6 What are the roles of security governance?
A Security steering committee should be developed whose objective is to focus on
providing guidance about security initiatives and alignment with business and IT
strategies. In addition, lack of attention to security governance can result in key needs
of the business not being met, risk management, security monitoring, application
security and sales support.
7 What is IAM?
Identity Access Management (IAM) is a critical function for every organization a
fundamental expectation n of SaaS customers is that the principle of least privilege is
granted to their data, where the principle states that only the minimum
access necessary to perform an operation should be granted, and that access should
be of minimum amount of time necessary. In cloud, services are offered on
demand, aspects of current models such as trust, privacy, authentication and
authorizations are challenged. Meeting these challenges will require a balancing act
for SaaS providers as they evaluate new models and management process for IAM
to provide end to end trust and identity throughout the cloud and enterprise.
8 List out the various VM threat levels.
1. Abnormally terminated, 2. Partially compromised, 3. Totally compromised
9 Define Globus Resource Allocation Manager
Globus Resource Allocation Manager (GRAM) provides resource allocation, process
creation, monitoring, and management services. GRAM implementations map requests
expressed in a resource specification language (RSL) into commands to local schedulers
and computers.
10 “Data security is of major concern in the cloud”. What are key mechanisms for
protecting data.
The key mechanisms for protecting data are:
 Access Control
 Auditing
 Authentication
 Authorization

KCG College of Technology Page 14 of 22


CS8791-Cloud Computing Department of IT 2022-2023
11 List the threats for cloud computing.
 Abuse and Nefarious Use of Cloud Computing
 Insecure Application Programming Interfaces
 Malicious Insiders
 Shared Technology Vulnerabilities
 Data Loss/Leakage
 Account, Service, and Traffic Hijacking
 Unknown Risk Profile
12 Define blue pill
The blue pill is malware that executes as a hypervisor to gain control of computer
resources. The hypervisor installs without requiring a restart and the computer
functions normally, without degradation of speed or services, which makes detection
difficult.
13 What are the host security threats in public IaaS (Dec 2017)
 Stealing keys used to access and manage hosts (e.g., SSH private keys)
 Attacking unpatched, vulnerable services listening on standard ports (e.g., FTP,
SSH)
 Hijacking accounts that are not properly secured (i.e., no passwords for standard
accounts)
 Attacking systems that are not properly secured by host firewalls
 Deploying Trojans embedded in the software component in the VM or within the
VM image (the OS) itself
14 List the Public Cloud Security Limitations
 There are limitations to the public cloud when it comes to support for custom
security features. Security requirements such as an application firewall, SSL
accelerator, cryptography, or rights management using a device that supports PKCS
12 are not supported in a public SaaS, PaaS, or IaaS cloud.
 Any mitigation controls that require deployment of an appliance or locally attached
peripheral devices in the public IaaS/PaaS cloud are not feasible.
15 Define Data lineage
Data lineage is defined as a data life cycle that includes the data's origins and where it
moves over time. It describes what happens to data as it goes through diverse
processes. It helps provide visibility into the analytics pipeline and simplifies tracing
errors back to their sources.
16 Discuss on the application and use of identity and access management. (Dec’16)
Identity and Access Management (IAM) is used to manage access to resources by
assuring that the identity of an entity is verified, then granting the correct level of
access based on the protected resources.
17 Mention the importance of Transport Level Security (Dec’16)
Transport Level Security (TLS) entails SOAP messages conveyed over a network
connection protected by TLS. TLS provides for both integrity protection and piracy.

KCG College of Technology Page 15 of 22


CS8791-Cloud Computing Department of IT 2022-2023
Transport Level Security is supported today as a higher performance alternative to the
more standard driven, message level security.
18 What are the various Challenges in building the trust environment?(Apr/May 2017)
 Identification
 Privacy
 Personalization
 Integration
 Security
 Scalability
19 Identify the trust model based on site’s trust worthiness.(Dec 2017)
 A user job demands the resource site to provide security assurance by issuing a
security demand (SD).
 On the other hand, the site needs to reveal its trustworthiness, called its trust
index (TI).
 These two parameters must satisfy a security-assurance condition: TI ≥ SD
during the job mapping process.
 When determining its security demand, users usually care about some
typical attributes.
20 State how CIA Triad plays a vital role in managing cloud security. (May/June 2018)
Confidentiality, integrity and availability, also known as the CIA triad, is a model
designed to guide policies for information security within an organization. The model
is also sometimes referred to as the AIC triad (availability, integrity and confidentiality)
to avoid confusion with the Central Intelligence Agency. The elements of the triad are
considered the three most crucial components of security.
21 What is identity and access management in a cloud environment? .(Nov/Dec 2018)
 Identity and Access Management (IAM) is the security discipline that enables
the right individuals to access the right resources at the right times for the right
reasons. IAM addresses the mission-critical need to ensure appropriate access to
resources across increasingly heterogeneous technology environments.
 Enterprises traditionally used on-premises IAM software to manage identity and
access policies, but nowadays, as companies add more cloud services to their
environments, the process of managing identities is getting more complex.
Therefore, adopting cloud-based Identity-as-a-Service (IDaaS) and cloud IAM
solutions becomes a logical step.
22 What is virtual machine security in cloud computing?
A common approach in Infrastructure-as-a-Service Clouds or virtualized
Grid computing is to provide virtual machines to customers to execute their software
on remote resources. Giving full super user permissions to customers eases the
installation and use of user software, but it may lead to security issues.
23 Define trust, reliability and privacy
Trust: People can justifiably rely on computer-based systems to perform critical
functions securely, and on systems to process, store and communicate sensitive
information securely
KCG College of Technology Page 16 of 22
CS8791-Cloud Computing Department of IT 2022-2023
Reliability: The system does what you want, when you want it to
Privacy: Within certain limits, no one should know who you are or what you do
24 What is meant by the terms data-in-transit
It is the process of the transfer of the data between all of the versions of the original file,
especially when data may be in transit on the Internet. It is data that is exiting the
network via email, web, or other Internet protocols.
25 List out the six specific areas of the cloud computing environment
There are six specific areas of the cloud computing environment where equipment and
software require substantial security attention These six areas are:
(1) security of data at rest,
(2) security of data in transit,
(3) authentication of users/applications/ processes,
(4) robust separation n between data belonging to different customers,
(5 ) cloud legal and regulatory issues, and
(6) incident response
26 Define Network Level Security.
All data on the network need to be secured. Strong network traffic encryption
techniques such as Secure Socket Layer (SSL) and the Transport Layer Security (TLS)
can be used to prevent leakage of sensitive information. Several key security elements
such as data security, data integrity, authentication and authorization, data
confidentiality, web application security, virtualization vulnerability, availability,
backup, and data breaches should be carefully considered to keep the cloud up and
running continuously.
27 Define Application level security
Studies indicate that most websites are secured at the network level while there may be
security loopholes at the application level which may allow information access to
unauthorized users. Software and hardware resources can be used to provide security
to applications.
28 Mention the foundational infrastructure requirements for cloud computing security
The foundational infrastructure for a cloud must be inherently secure whether it is a
private or public cloud or whether the service is SAAS, PAAS or IAAS. It will require
• Inherent component-level security
• Stronger interface security
• Resource lifecycle management
29 Outline the requirements of VMM.(Nov/Dec 2020)
The three elements to consider when selecting virtualization hardware include the
CPU, memory, and network I/O capacity.
30 Identify the uses of application security. (Nov/Dec 2020)
Application security describes security measures at the application level that aim to
prevent data or code within the app from being stolen or hijacked. Application security
may include hardware, software, and procedures that identify or minimize security
vulnerabilities.

KCG College of Technology Page 17 of 22


CS8791-Cloud Computing Department of IT 2022-2023
UNIT IV - PART B
1 Explain the Security challenges in cloud computing in detail.
2 Explain the security architecture in detail.
3 Explain the following (i) Security governance (ii) Application security
4 Explain in detail about Software-as-a-Service security.
5 Discuss about the virtual machine security.
6 With a neat sketch describe IAM function architecture and the challenges in
implementing it for cloud computing. (April/May 2021)
7 Briefly write a note on Authentication and Authorization methods
8 Write in detail about cloud security infrastructures (Nov/Dec 2016)
9 Explain the different level of Cloud Infrastructure security: network, host and
application level
10 Briefly discuss on Identity and access management architecture with neat architecture
SaaS, PaaS, IaaS availability in the cloud.
11 Write a detailed note on identity and access management architecture (Apr/May 2017)
12 In todays world, infrastructure security and data security is highly challenging at
network, host and application levels‖. Justify and explain the several ways of
protecting the data at transit and at rest.(May/June 2018)(April/May 2021)
13 Describe the Secure Software Development Life Cycle with neat diagram.(Nov/Dec
2020)
14 Analyze the methods for providing data security and virtual machine security in
cloud.(Nov/Dec 2020)
15 Combine the role of a distributed file system in a job execution environment such as
MapReduce in a large-scale cloud system and explain in detail with suitable
illustrations.(Nov/Dec 2020)
Unit-V Cloud Technologies and Advancements
Hadoop – MapReduce – Virtual Box — Google App Engine – Programming Environment for
Google App Engine — Open Stack – Federation in the Cloud – Four Levels of Federation -
Federated Services and Applications – Future of Federation.
PART-A
1 Define Map Reduce.
The Map Reduce software framework provides an abstraction layer with the data flow
and flow of control of users and hides implementation of all data flow steps such as
data partitioning mapping, synchronization, communication and scheduling. The data
flow is such framework is predefined the abstraction layer provides two well defined
interface in the form of two functions map and reduce.
2 What is the role of Map function?
 Each Map function receives the input data split as a set of (key, value) pairs to
process and produce the intermediated (key, value) pairs.
 Maps can also be used as a metaphor, and as such function as an index to other
Information.
3 What is the role of Reduce function?
The reduce worker iterates over the grouped (key, value) pairs, and for each unique

KCG College of Technology Page 18 of 22


CS8791-Cloud Computing Department of IT 2022-2023
key, it sends the key and corresponding values to the Reduce function. Then this
function processes its input data and stores the output results in predetermined files in
the user’s program.
4 What are the features of HDFS?
HDFS is not a general-purpose file system, as it only executes specific types of
applications, it does not need all the requirements of a general distributed file system.
For example, security has never been supported for HDFS systems.
5 List out the Hadoop core fundamental layers
The Hadoop core is divided into two fundamental layers: the Map Reduce engine and
HDFS. The Map Reduce engine is the computation engine running on top of HDFS as
its data storage manager. HDFS is a distributed file system inspired by GFS that
organizes files and stores their data on a distributed computing system.
6 How to delete file or directory in hadoop file system?
Use the delete() method on File System to permanently remove files or directories:
public boolean delete(Path f, boolean recursive) throws IO Exception
If f is a file or an empty directory, then the value of recursive is ignored. A nonempty
directory is only deleted, along with its contents, if recursive is true (otherwise an IO
Exception is thrown).
7 How to process globs in hadoop file system?
Hadoop provides two File System methods for processing globs:
public File Status()glob Status(Path pathPattern) throws IO Exception
public File Status() glob Status(Path pathPattern, Path Filter filter) throws IO Exception
The glob Status() methods returns an array of File Status objects whose paths match
the supplied pattern, sorted by path. An optional Path Filter can be specified to restrict
the matches further.
8 Define iterative Map Reduce.
It is important to understand the performance of different runtime and in particular to
compare MPI and map reduce. The two major sources of parallel overhead are load
imbalance and communication. The communication overhead in Map reduce can be
high for two reasons.1.Map reduce read and writes files whereas MPI transfer
information directly between nodes over the network.2. MPI does not transfer all data
from node to node.
9 What are the advantages of using Hadoop (Dec’16) (April/May 2021)
1. Hadoop is an Apache open source framework written in java
2. Allows distributed processing of large datasets across cluster of computers
3. Simple programming models
10 Define block replication.
The reliably store data in HDFS is the file blocks, it is replicated in this system. HDFS
store a file as a set of blocks and each block is replicated and distributed across the
whole cluster.
11 Define heart beat in Hadoop. What are the advantages of heart beat?(Dec 2017)
The heart beat are periodic messages sent to the name node by each data node in the
cluster. Receipt of a heartbeat implies that data mode is functioning properly while
each block report contains list of all blocks in a data mode. The name node receives

KCG College of Technology Page 19 of 22


CS8791-Cloud Computing Department of IT 2022-2023
such messages because it is the sole decision maker of all replicas in the system.
12 Name the different modules in Hadoop framework. (Apr/May 2017)
 Hadoop Common – contains libraries and utilities needed by other Hadoop
modules;
 Hadoop Distributed File System (HDFS) – a distributed file-system that stores data
on commodity machines, providing very high aggregate bandwidth across the
cluster;
 Hadoop YARN – a platform responsible for managing computing resources in
clusters and using them for scheduling users' applications;
 Hadoop Map Reduce – an implementation of the Map Reduce programming
model for large-scale data processing.
 The Hadoop framework mostly written in the Java programming language, with
some native code in C and command line utilities written as shell scripts.
 The HDFS is a distributed, scalable, and portable file system written in Java for the
Hadoop framework.
13 ”HDFS is fault tolerant “.Is it true? Justify your answer.(Dec 2017)
Yes, HDFS is fault tolerant because when the system functions properly without any
data loss even if some hardware components of the system has failed. It is very hard to
reach cent percent fault tolerance but faults can be tolerated up to some extent. It is one
of the characteristics of HDFS.
14 How does divide-and-conquer strategy relates to Map Reduce paradigm?(May/June
2018)
Map Reduce architecture, then it is very much just a divide and conquer technique.
However, any useful Map Reduce architecture will have mountains of other
infrastructure in place to efficiently "divide", "conquer", and finally "reduce" the
problem set. With a large Map Reduce deployment these steps to partition the work,
compute something, and then finally collect all results is non-trivial.
15 Brief out the main components of Globus toolkit.(May/June 2018)
 Computing / Processing Power (GRAM)
 Data Management (Grid FTP, DAI, RLS)
 Monitoring/Discovery (MDS)
 Authorization/Security (CAS)
 In development: Tele control (NTCP/GTCP), Metadata (MCS), Virtual
Data (Chimera, Pegasus)
16 What is distributed system?(Nov/Dec 2018)
Distributed computing is a field of computer science that studiesdistributed systems.
A distributed system is a system whose components are located on different
networked computers, which communicate and coordinate their actions by passing
messages to one another.

KCG College of Technology Page 20 of 22


CS8791-Cloud Computing Department of IT 2022-2023
17 How MapReduce framework executes user jobs?(Nov/Dec 2018)
 To begin, a user runs a MapReduce program on the client node which
instantiates a Job client object.
 Next, the Job client submits the job to the JobTracker.
 Then the job tracker creates a set of map and reduce tasks which get sent
to the appropriate task trackers.
 The task tracker launches a child process which in turns runs the map or
reduce task.
 Finally the task continuously updates the task tracker with status and
counters and writes its output to its context.
18 What is Google App?
Google Apps are a suite of web-based messaging and collaboration applications
that Google hosts on their own servers. Google provides these applications as a
"service," rather than as software to download and install.
19 What is Google App used for?
Play Store is Google's official pre-installed app store on Android-certified devices. It
provides access to content on the Google Play Store, including apps, books, magazines,
music, movies, and television programs.
20 Define Cloud Federation
Cloud federation refers to the unionization of software infrastructure and platform
services from desperate networks that can be accessed by a client we are the internet.
The federation of cloud resources is facilitated through network gate ways that connect
public or external clouds like private or internal clouds owned by a single entity
and/or community clouds owned by several co-operating entities.
21 State the basic types of federation.
There are four basic types of federation: 1)Permissive 2)Verified 3)Encrpted 4)Trusted
22 What are the benefits of Cloud federation?
 The federation of cloud resources allows client to optimize enterprise IT service
delivery.
 The federation of cloud resources allows a client to choose. The best cloud
service providers in terms of flexibility cost and availability of services to neat a
particular business or technological need within their organization.
 Federation across different cloud resources pools allows applications to run in
the most appropriate infrastructure environments.
23 What is VirtualBox in cloud computing?
VirtualBox is open-source software for virtualizing the x86 computing architecture. It
acts as a hypervisor, creating a VM (virtual machine) in which the user can run another
OS . The operating system in which VirtualBox runs is called the "host" OS.
24 Which is better VMWare or VirtualBox?
VirtualBox truly has a lot of support because it's open-source and free. VMWare Player
is seen as having a better drag-and-drop between host and VM, yet VirtualBox offers
you an unlimited number of snapshots .
25 Outline the map and reduce functions.(April/May 2021)
Map Function

KCG College of Technology Page 21 of 22


CS8791-Cloud Computing Department of IT 2022-2023
 Each Map function receives the input data split as a set of (key, value) pairs to
process and produce the intermediated (key, value) pairs.
 Maps can also be used as a metaphor, and as such function as an index to other
Information.
Reduce function
The reduce worker iterates over the grouped (key, value) pairs, and for each unique
key, it sends the key and corresponding values to the Reduce function. Then this
function processes its input data and stores the output results in predetermined files in
the user’s program.
26 Identify the development technologies currently supported by AppEngine.(Nov/Dec
2020)
Google App Engine primarily supports Go, PHP, Java, Python, Node. js, . NET, and
Ruby applications, although it can also support other languages via "custom runtimes".
UNIT-V PART-B
1 Give a detailed note on Hadoop framework. (Dec’16)& (Apr/May 2017)(Nov / Dec 18)
(April/May 2021)
2 Explain the architecture of Map Reduce in Hadoop?
3 Explain the dataflow and control flow of Map Reduce
4 Describe in detail about dataflow of file read in HDFS.(Dec 2017)
5 Explain Reading Data from a Hadoop URL and Deleting Data
6 Short notes on a) File pattern in HDFS b) Path filter
7 a) Explain in detail about command line interface in HDFS
b) Discuss MAPREDUCE with suitable diagarams. (Apr/May 2017)
8 With an illustration, emphasize the significance of Map Reduce paradigm in Hadoop
frame work. List out the assumptions and goals set in HDFS architecture for
processing the data based on divide-and-conquer strategy. (May/June 2018)
(April/May 2021)
9 What is Google App explain the architecture of Google App Engine in detail?
10 i) Explain cloud federation and Implementation.
ii) How cloud federation addresses the limitations in cloud computing
11 Explain the main components of Globus Toolkit (GT4) architecture. With a neat sketch,
explain the different types of services offered by GT4 architecture.(Nov/Dec
2018)(April/May 2021)
12 ii. Illustrate the functional Modules of GAE (Nov/Dec 2020)
ii. Discuss in detail about GAE Applications
13 List the four levels of cloud federation and explain in detail about the four levels of
federation levels. (Nov/Dec 2020)

KCG College of Technology Page 22 of 22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy