CC QB
CC QB
UNIT ‐ I
UNIT I INTRODUCTION
Introduction to Cloud Computing – Definition of Cloud – Evolution of Cloud Computing –
Underlying Principles of Parallel and Distributed Computing – Cloud Characteristics –
Elasticity in Cloud – On-demand Provisioning.
UNIT I PART-A
1 What is Distributed computing?
This is a field of computer science/engineering that studies distributed systems. A
distributed system consists of multiple autonomous computers, each having its own
private memory, communicating through a computer network. Information exchange in
a distributed system is accomplished through message passing. A computer program
that runs in a distributed system is known as a distributed program. The
process of writing distributed programs is referred to as distributed programming.
Each processor has its own private All processors may have access to a shared
memory (distributed memory). memory to exchange information between
Information is exchanged by passing processors.
messages between the processors.
Page | 2
An important goal and Large problems can often be divided into
challenge of distributed smaller ones, which are then solved
systems is location concurrently ("in parallel").
transparency.
5 Define cloud computing
Cloud computing is the delivery of computing as a service rather than a product, hereby
shared resources, software, and information are provided to computers and
other devices as a utility.
6 What are the properties of Cloud Computing?
There are six key properties of cloud computing:
• user-centric
• task-centric
• powerful
• accessible
• intelligent
• programmable
7 Bring out the difference between private cloud and public cloud
(Dec’16)
Public Cloud: Multiple Clients, Hosted at providers location,
Shared infrastructure, Access over Internet, Low Cost, Less
Security
Private Cloud: Single Client, Hosted at providers/organization
location, Shared only
within organization, Access over Internet/private network, High
Cost, High Security
8 Outline any two advantages of distributed computing.(Nov/Dec
2018).
The goal of distributed computing is to make such a network
work as a single computer.
Distributed systems offer many benefits over centralized systems,
including
Scalability.
Page | 3
9 Difference
between HPC
and HTC. HPC:
• HPC systems emphasize the raw speed performance.
• The speed of HPC systems has increased from Gflops.
• The applications for HPC are scientific, engineering,
and manufacturing communities.
• HPC measured by floating-point speed.
HTC:
• HTC paradigm pays more attention to high-flux computing.
• The main application for high-flux computing is in
Internet searches and web services by millions or more
users simultaneously.
• The performance goal measure high throughput or the
number of tasks
completed per unit of time.
10 What are the Three New Computing Paradigms
• Radio-frequency identification (RFID)
• Global Positioning System (GPS)
• Internet of Things (IoT).
Page | 4
13 What is mean by parallel computing?
Parallel computing In parallel computing, all processors are either
tightly coupled with centralized shared memory or loosely
coupled with distributed memory. Inter processor communication
is accomplished through shared memory or via message passing.
A computer system capable of parallel computing is commonly
known as a
parallel computer.
Page | 5
18 What are the benefits of cloud computing?
• Simplicity
• Scalability
• Vendors
• Security
20 What is SPI?
The acronym for SPI stands for three major services provided through the cloud. They
are as follows,
1. Software as a Service ( SaaS )
2. Platform as a Service ( PaaS )
3. Infrastructure as a Service ( IaaS )
Page | 6
24 What is autonomic computing?
Autonomic computing refers to the self managing characteristics of distributed
computing resources, adapting to unpredictable changes. It controls the functioning
computer applications and systems without input from the user. This computing
model has systems that run themselves, capable of doing high level functions.
PART - B
1 Write Short Notes On Origins Of Cloud Computing.
2 Explain Briefly the evolution of cloud computing.
3 Outline The Similarities And Differences Between Distributed Computing, Parallel
Computing And Cloud Computing.(Nov/Dec 2018)
4 List and Explain In Brief The Three New Computing Paradigms.
5 Illustrate The Evolutionary Trend Towards Parallel Distributed And
Cloud
Computing.
6 i. State the benefits of cloud computing.
ii. ) Discuss issues of cloud computing and the government policies.
7 Explain in detail about computing paradigms.
Explain Parallel processing in detail
8 Explain in detail, pros and cons of cloud computing.
9 Draw the diagram and explain about Parallel and Distributed programming models.
10 Discuss the Cloud – On-demand Provisioning.
Page | 7
UNIT- II Cloud Enabling Technologies
Service Oriented Architecture – REST and Systems of Systems – Web Services – Publish-
Subscribe Model – Basics of Virtualization – Types of Virtualization – Implementation
Levels of Virtualization – Virtualization Structures – Tools and Mechanisms – Virtualization
of CPU
-Memory – I/O Devices -Virtualization Support and Disaster Recovery..
UNIT-II PART - A
1 What is mean by service oriented architecture?(Nov/ Dec 2018)
In grids/web services, Java, and CORBA, an entity is, respectively, a service, a Java
object, and a CORBA distributed object in a variety of languages. These architectures
build on the traditional seven Open Systems Interconnection (OSI) layers that provide
the base networking abstractions. On top of this we have a base software environment,
which would be .NET or Apache Axis for web services, the Java Virtual Machine for
Java, and a broker network for CORBA.
Page | 8
5 Give the basic operations of VM(Apr/May 2017)
1. Multiplexing
2. Suspension
3.Provision
4.Migration
6 Justify that Web and Web architecture are SOA based.(May/June 2018)
Modern IT and web applications are much more complex than the client-server
model. Distributed web services, which are set up as service-oriented architectures
(SOA), offer many functions and modular functional units, which can be
supplemented. With SOAs, business processes can be automated by the involved
systems communicating with one another - partly without human intervention - and
performing certain tasks.
Web Architecture (WA) is a software architecture style that extends service-oriented
architecture (SOA) to web-based applications. WA was originally created by many web
applications and sites.
Page | 9
11 List the requirements of VMM.(Dec 2017)
• VMM should provide an environment for programs which is essentially identical
to the original machine.
• Programs run in this environment should show, at worst, only minor decreases in
speed.
• VMM should be in complete control of the system resources. Any program run
under a VMM should exhibit a function identical to that which it runs on the
original machine directly.
12 What are the responsibilities of VMM?
• The VMM is responsible for allocating hardware resources for programs.
• Not possible for a program to access any resource not explicitly allocated to it.
• It is possible under certain circumstances for a VMM to regain control of resources
already allocated.
13 Define CPU virtualization.
CPU architecture is virtualizable if it supports the ability to run the VM’s privileged
and unprivileged instructions in the CPU’s user mode while the VMM runs in
supervisor mode. When the privileged instructions including control- and behavior-
sensitive instructions of a VM are executed, they are trapped in the VMM. In this case,
the VMM acts as a unified mediator for hardware access from different VMs to
guarantee the correctness and stability of the whole system.
14 Define memory virtualization.
Virtual memory virtualization is similar to the virtual memory support provided by
modern operating systems. In a traditional execution environment, the operating
system maintains mappings of virtual memory to machine memory using page tables,
which is a one-stage mapping from virtual memory to machine memory. All modern
x86 CPUs include a memory management unit (MMU) and a translation look aside
buffer (TLB) to optimize virtual memory performance.
Page | 10
17 What is memory migration?
Moving the memory instance of a VM from one physical host to another can be
approached in any number of ways. Memory migration can be in a range of hundreds
of megabytes to a few gigabytes in a typical system today, and it needs to be done in an
efficient manner. The Internet Suspend-Resume (ISR) technique exploits temporal
locality as memory states are likely to have considerable overlap in the suspended and
the resumed instances of a VM.
19 Define KVM.
Kernel-Based VM:- This is a Linux para-virtualization system—a part of the Linux
version 2.6.20 kernel. Memory management and scheduling activities are carried out by
the existing Linux kernel. The KVM does the rest, which makes it simpler than the
hypervisor that controls the entire machine. KVM is a hardware-assisted para-
virtualization tool, which improves performance and supports unmodified guest OSes
such as Windows, Linux, Solaris, and other UNIX variants.
20 Give the role of a VM. (Dec’16)
It is a management solution for the VM, that enables the configuration and
management of virtualization host, networking and storage resources in order to create
and deploy virtual machines.
21 How performance does enhance by virtualizing the data center?(May/June 2018)
Virtualization can help to make the data center more efficient. Most data centers are not
as efficient as it should be because of low utilization of the data center assets. To ensure
maximum efficiency, we must go for virtualization - be it for servers, storage, and other
infrastructure.
22 “Although virtualization is widely accepted today, it does have its limits”. Comment
on the statement.(May/June 2018)
Yes, because not every application or server is going to work within an environment of
virtualization. That means an individual or corporation may require a hybrid system to
function properly. This still saves time and money in the long run, but since not every
vendor supports virtualization and some may stop supporting it after initially starting
it, there is always a level of uncertainty when fully implementing this type of system.
Page | 11
23 What are the types of hypervisor?
There are two types of hypervisors:
Type 1 (bare-metal)
Type 2 (hosted)
UNIT-II PART-B
1 a. Explain the trust management in virtual clusters.
b. Discuss how virtualization is implemented in different layers. (Apr/May 2017)
2 Explain implementation levels of virtualization in details.
3 Explain the virtualization for data center automation. (Apr/May 2017) / What is data
center? Outline the issues to be addressed with respect to virtualization for data center
automation. (Nov/Dec 2018)
4 Explain the virtualization of CPU, Memory and I/O devices (Nov/Dec 2018)
5 Short notes on
a. Para-Virtualization with Compiler Support
b. Binary Translation with Full Virtualization(Dec 2017)
6 Explain the characteristics and types of virtualization in cloud computing.
7 Explain detail about Service oriented Architecture.
8 Discuss the REST Ful web services.
9 Write short notes on OS level virtualization. List the pros and cons of OS level
virtualization.
10 i. Write short notes on virtual clusters.
ii. Explain Publish Subscribe Model
UNIT III Cloud Architecture, Services and Storage
Layered Cloud Architecture Design – NIST Cloud Computing Reference Architecture –
Public, Private and Hybrid Clouds – laaS – PaaS – SaaS – Architectural Design Challenges –
Cloud Storage – Storage-as-a-Service – Advantages of Cloud Storage – Cloud Storage
Providers – S3.
UNIT- III PART-A
Page | 12
2 Define private cloud.
The private cloud is built within the domain of an intranet owned by a single
organization. Therefore, they are client owned and managed. Their access is limited to
the owning clients and their partners. Their deployment was not meant to sell capacity
over the Internet through publicly accessible interfaces. Private clouds give local users a
flexible and agile private infrastructure to run service workloads within their
administrative domains.
3 Define public cloud.
A public cloud is built over the Internet, which can be accessed by any user who has
paid for the service. Public clouds are owned by service providers. They are accessed
by subscription. Many companies have built public clouds, namely Google App
Engine, Amazon AWS, Microsoft Azure, IBM Blue Cloud, and Salesforce Force.com.
These are commercial providers that offer a publicly accessible remote interface for
creating and managing VM instances within their proprietary infrastructure.
6 Define anything-as-a-service.
Providing services to the client on the basis on meeting their demands at some pay per
use cost such as data storage as a service, network as a service, communication as a
service etc. it is generally denoted as anything as a service (XaaS).
8 What is mean by IaaS?
The Infrastructure as a Service model puts together the infrastructure demanded by the
user namely servers, storage, network and the data center fabric. The user can deploy
and run on multiple VM’s running guest OS on specific application.
9 What is PaaS?
The Platform as a Service model enables the user to deploy user built applications onto
a virtualized cloud platform. It includes middleware, database, development tools and
some runtime support such as web2.0 and java. It includes both hardware and software
integrated with specific programming interface.
Page | 13
10 Difference between SaaS and PaaS(Apr/May’17)
Saas
• Here you don’t have to worry about anything. A pre-installed, pre-configured
package as per your requirement is given and you only need to pay accordingly.
• It is like a complete package of services
• Most popular among normal consumers or companies who reply on software’s
such as email, file sharing and social networking as they don’t have to worry
about the technicalities.
PaaS
• Here you get what you demand. Software, hardware, OS, web environment. You
get the platform to use & pay accordingly.
11 Define Cloud services with example.
Any web-based application or service offered via cloud computing is called a cloud
Cloud services can include anything from calendar and contact applications to word
processing and presentations.
Page | 14
16 What is cloud storage?
Cloud storage is a cloud computing model that stores data on the Internet through a
cloud computing provider who manages and operates data storage as a service. It’s
delivered on demand with just-in-time capacity and costs, and eliminates buying and
managing your own data storage infrastructure. This gives you agility, global scale and
durability, with ―anytime, anywhere‖ data access.
17 How Does Cloud Storage Work?
Cloud storage is purchased from a third party cloud vendor who owns and operates
data storage capacity and delivers it over the Internet in a pay-as-you-go model. These
cloud storage vendors manage capacity, security and durability to make data accessible
to your applications all around the world.
Applications access cloud storage through traditional storage protocols or directly via
an API. Many vendors offer complementary services designed to help collect, manage,
secure and analyze data at massive scale.
18 List the cloud enabling technologies.
• Fast platform deployment Virtual clusters on demand
• Multitenant techniques,Massive data processing
• Web scale communication
• Distributed storage
• Licensing and billing services
19 Give the significance of Amazon’s AWS.
Amazon Web Services (AWS) is a comprehensive, evolving cloud computing
platform provided by Amazon.com. Web services are sometimes called cloud
services or remote computing services.
The growing AWS collection offers over three dozen diverse services including:
1. CloudDrive 2. CloudSearch
3. Dynamo Database 4. Elastic Compute Cloud
Page | 15
21 What is mean by S3?
Simple Storage Service (Amazon S3) is an object storage service that offers industry-
leading scalability, data availability, security, and performance. This means customers
of all sizes and industries can use it to store and protect any amount of data for a range
of use cases, such as websites, mobile applications, backup and restore, archive,
enterprise applications, IoT devices, and big data analytics.
Page | 16
Lesser Can be extremely Expensive than public
flexibility expensive cloud
and control over
the cloud
environment
PART-B
UNIT-IV PART-A
1 What are challenges and risk of cloud security?
Cloud computing security challenges fall into three broad categories:
Data Protection: Securing your data both at rest and in transit
User Authentication: Limiting access to data and monitoring who accesses the data.
Disaster and Data Breach: Contingency Planning
2 List the security issues in cloud.
• Secure data transfer
• Secure software interfaces
• Secure stored data
• User access control
• Data separation
Page | 17
3 Define security governance.
Cloud services governance is a general term for applying specific policies or principles to
the use of cloud computing services. The goal of cloud services
governance is to secure applications and data when they are located remotely.
4 Define security awareness in cloud.
Cloud computing is similar to the Bring Your Own Device (BYOD) syndrome. You can
fight it all you want, but sooner or later your organization will most likely have to accept
it. A common failure with securing the Cloud is that most organizations focus on only
the technical controls, such as where is the data stored or when and how is the data
encrypted. However, you must also train and educate the very people using this
technology or you can expose your organization to tremendous
risk.
5 What are the layers in security architecture design?
• User security and monitoring
• Information security – data
• Application level security
• Platform and infrastructure security
6 What are the roles of security governance?
A Security steering committee should be developed whose objective is to focus on
providing guidance about security initiatives and alignment with business and IT
strategies. In addition, lack of attention to security governance can result in key needs of
the business not being met, risk management, security monitoring, application
security and sales support.
7 What is IAM?
Identity Access Management (IAM) is a critical function for every organization a
fundamental expectation n of SaaS customers is that the principle of least privilege is
granted to their data, where the principle states that only the minimum access
necessary to perform an operation should be granted, and that access should be of
minimum amount of time necessary. In cloud, services are offered on demand, aspects
of current models such as trust, privacy, authentication and authorizations are
challenged. Meeting these challenges will require a balancing act for SaaS providers as
they evaluate new models and management process for IAM
to provide end to end trust and identity throughout the cloud and enterprise.
Page | 18
8 List out the various VM threat levels.
Abnormally terminated Partially
compromised
Totally compromised
9 Define Globus Resource Allocation Manager
Globus Resource Allocation Manager (GRAM) provides resource allocation, process
creation, monitoring, and management services. GRAM implementations map requests
expressed in a resource specification language (RSL) into commands to local schedulers
and computers.
10 “Data security is of major concern in the cloud”. What are key mechanisms for
protecting data.
The key mechanisms for protecting data are:
• Access Control
• Auditing
• Authentication
• Authorization
Page | 19
13 What are the host security threats in public IaaS (Dec 2017)
• Stealing keys used to access and manage hosts (e.g., SSH private keys)
• Attacking unpatched, vulnerable services listening on standard ports (e.g., FTP,
SSH)
• Hijacking accounts that are not properly secured (i.e., no passwords for standard
accounts)
• Attacking systems that are not properly secured by host firewalls
• Deploying Trojans embedded in the software component in the VM or within the
VM image (the OS) itself
16 Discuss on the application and use of identity and access management. (Dec’16)
Identity and Access Management (IAM) is used to manage access to resources by
assuring that the identity of an entity is verified, then granting the correct level of
access based on the protected resources.
Page | 20
18 What are the various Challenges in building the trust environment?(Apr/May 2017)
• Identification
• Privacy
• Personalization
• Integration
• Security
• Scalability
20 State how CIA Triad plays a vital role in managing cloud security. (May/June 2018)
Confidentiality, integrity and availability, also known as the CIA triad, is a model
designed to guide policies for information security within an organization. The model
is also sometimes referred to as the AIC triad (availability, integrity and confidentiality)
to avoid confusion with the Central Intelligence Agency. The elements of the triad are
considered the three most crucial components of security.
Page | 21
22 What is virtual machine security in cloud computing?
A common approach in Infrastructure-as-a-Service Clouds or virtualized
Grid computing is to provide virtual machines to customers to execute their software
on remote resources. Giving full super user permissions to customers eases the
installation and use of user software, but it may lead to security issues.
25 List out the six specific areas of the cloud computing environment
There are six specific areas of the cloud computing environment where equipment and
software require substantial security attention These six areas are:
1. security of data at rest,
2. security of data in transit,
3. authentication of users/applications/ processes,
4. robust separation n between data belonging to different
customers, (5 ) cloud legal and regulatory issues, and (6)
incident response
Page | 22
26 Define Network Level Security.
All data on the network need to be secured. Strong network traffic encryption
techniques such as Secure Socket Layer (SSL) and the Transport Layer Security (TLS)
can be used to prevent leakage of sensitive information. Several key security elements
such as data security, data integrity, authentication and authorization, data
confidentiality, web application security, virtualization vulnerability, availability,
backup, and data breaches should be carefully considered to keep the cloud up and
running continuously.
UNIT IV - PART B
1 Explain the Security challenges in cloud computing in detail.
2 Explain the security architecture in detail.
3 Explain the following (i) Security governance (ii) Application security
4 Explain in detail about Software-as-a-Service security.
5 Discuss about the virtual machine security.
6 With a neat sketch describe IAM function architecture and the challenges in
implementing it for cloud computing.
7 Briefly write a note on Authentication and Authorization methods
8 Write in detail about cloud security infrastructures (Nov/Dec 2016)
9 Explain the different level of Cloud Infrastructure security: network, host and
application level
10 Briefly discuss on Identity and access management architecture with neat architecture
SaaS, PaaS, IaaS availability in the cloud.
11 Write a detailed note on identity and access management architecture (Apr/May 2017)
Page | 23
Unit-V Cloud Technologies and Advancements
Hadoop – MapReduce – Virtual Box — Google App Engine – Programming Environment
for
Google App Engine — Open Stack – Federation in the Cloud – Four Levels of Federation -
Federated Services and Applications – Future of Federation.
PART-A
1 Define Map Reduce.
The Map Reduce software framework provides an abstraction layer with the data flow
and flow of control of users and hides implementation of all data flow steps such as
data partitioning mapping, synchronization, communication and scheduling. The data
flow is such framework is predefined the abstraction layer provides two well defined
interface in the form of two functions map and reduce.
Page | 24
7 How to process globs in hadoop file system?
Hadoop provides two File System methods for processing globs:
public File Status()glob Status(Path pathPattern) throws IO Exception
public File Status() glob Status(Path pathPattern, Path Filter filter) throws IO Exception
The glob Status() methods returns an array of File Status objects whose paths match
the supplied pattern, sorted by path. An optional Path Filter can be specified to restrict
the matches further.
Page | 25
12 Name the different modules in Hadoop framework. (Apr/May 2017)
• Hadoop Common – contains libraries and utilities needed by other Hadoop
modules;
• Hadoop Distributed File System (HDFS) – a distributed file-system that stores
data on commodity machines, providing very high aggregate bandwidth across the
cluster;
• Hadoop YARN – a platform responsible for managing computing resources in
clusters and using them for scheduling users' applications;
• Hadoop Map Reduce – an implementation of the Map Reduce programming
model for large-scale data processing.
• The Hadoop framework mostly written in the Java programming language, with
some native code in C and command line utilities written as shell scripts.
• The HDFS is a distributed, scalable, and portable file system written in Java for the
Hadoop framework.
13 ”HDFS is fault tolerant “.Is it true? Justify your answer.(Dec 2017)
Yes, HDFS is fault tolerant because when the system functions properly without any
data loss even if some hardware components of the system has failed. It is very hard to
reach cent percent fault tolerance but faults can be tolerated up to some extent. It is one
of the characteristics of HDFS.
14 How does divide-and-conquer strategy relates to Map Reduce paradigm?(May/June
2018)
Map Reduce architecture, then it is very much just a divide and conquer technique.
However, any useful Map Reduce architecture will have mountains of other
infrastructure in place to efficiently "divide", "conquer", and finally "reduce" the
problem set. With a large Map Reduce deployment these steps to partition the work,
compute something, and then finally collect all results is non-trivial.
Page | 26
16 What is distributed system?(Nov/Dec 2018)
Distributed computing is a field of computer science that studiesdistributed systems.
A distributed system is a system whose components are located on different
networked computers, which communicate and coordinate their actions by passing
messages to one another.
Page | 27
20 Define Cloud Federation
Cloud federation refers to the unionization of software infrastructure and platform
services from desperate networks that can be accessed by a client we are the internet.
The federation of cloud resources is facilitated through network gate ways that connect
public or external clouds like private or internal clouds owned by a single entity and/or
community clouds owned by several co-operating entities.
UNIT-V PART-B
1 Give a detailed note on Hadoop framework. (Dec’16)& (Apr/May 2017)(Nov / Dec 18)
2 Explain the architecture of Map Reduce in Hadoop?
3 Explain the dataflow and control flow of Map Reduce
4 Describe in detail about dataflow of file read in HDFS.(Dec 2017)
5 Explain Reading Data from a Hadoop URL and Deleting Data
6 Short notes on a) File pattern in HDFS b) Path filter
Page | 28
7 a. Explain in detail about command line interface in HDFS
b. Discuss MAPREDUCE with suitable diagarams. (Apr/May 2017)
8 With an illustration, emphasize the significance of Map Reduce paradigm in Hadoop
frame work. List out the assumptions and goals set in HDFS architecture for
processing the data based on divide-and-conquer strategy. (May/June 2018)
9 What is Google App explain the architecture of Google App Engine in detail?
10 Explain cloud federation and Implementation.
How cloud federation addresses the limitations in cloud computing
Page | 29
Page | 30
Page | 31