0% found this document useful (0 votes)
24 views

It1701 - Distributed Systems and Cloud Computing

Uploaded by

Divya Devarajan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

It1701 - Distributed Systems and Cloud Computing

Uploaded by

Divya Devarajan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 18

S.A.

ENGINEERING COLLEGE
QUESTION BANK
ODD SEMESTER, 2024 - 2025

UNIT I
SYLLABUS:
Introduction to Distributed Systems – Characteristics – Issues in Distributed Systems -Distributed System
Model – Request/Reply Protocols – RPC – RMI – Logical Clocks and Casual Ordering of Events –
Election Algorithm – Distributed Mutual Exclusion -Distributed Deadlock Detection Algorithms
PART-A
S.NO QUESTIONS CO K COMPETEN
LEVEL CE
What is meant by distributed system? CO1 BTL-1 Remember

1.

What is meant by hardware and software clock? CO1 BTL-1 Remember

2.

Why do you need distributed system? CO1 BTL-2 Understand

3.

List the examples of distributed system? CO1 BTL-2 Understand

4.

CO1 BTL-1 Remember

5. What is distributed deadlock? Explain with example.


CO1 BTL-2 Understand

6. Explain phantom deadlocks.

List the distributed systems challenges? CO1 BTL-1 Remember

7.

Define RMI, RPC CO1 BTL-1 Remember

8.

Outline the famous mutual exclusion algorithms CO1 BTL-2 Understand

9.

What is meant by election? CO1 BTL-1 Remember

10.

What is the significance of logical clocks in achieving CO1 BTL-1 Remember


causal ordering of events in distributed systems?
11.

Explain the purpose of RPC in distributed systems. CO1 BTL-2 Understand

12.

PART B & C
Examine the need of Distributed systems its 13 CO1 BTL-3 Apply
characteristics with example
1.

Analyse how the complexities in designing and 13 CO1 BTL-4 Analyze


maintaining distributed systems can be effectively
2. managed to ensure their seamless operation amidst
rapid technological advancements.

Categorize the foundational elements of the 13 CO1 BTL-4 Analyze


architectural model in a distributed system, and
3. explain how these elements incorporate structures like
client-server and peer-to-peer.

Apply advanced strategies and algorithms used in 13 CO1 BTL-3 Apply


constructing distributed deadlock detection
4. mechanisms, and explain how they address the
intricacies of identifying and resolving deadlocks in
complex networked environments.

Analyze the key functional components of the RPC 13 CO1 BTL-4 Analyze
mechanism, and explain how they operate in this
5. communication model.

Distinguish the classification of CORBA, RMI and 13 CO1 BTL-4 Analyze


their associated services, highlighting their distinct
6. features and roles within distributed systems, and how
they contribute to the interoperability of heterogeneous
components?
Apply the election algorithms used in distributed 13 CO1 BTL-3 Apply
systems and provide an overview of the various types
7. of election algorithms, detailing their specific
characteristics, advantages, and use cases in the
context of achieving leader selection and coordination.
Analyze the concept of logical clocks in distributed 13 CO1 BTL-4 Analyze
systems. How do logical clocks contribute to
8. achieving causal ordering of events? Compare and
contrast Lamport's logical clocks and vector clocks,
discussing their respective advantages, limitations, and
scenarios where each is preferred. Provide examples to
illustrate their application in real-world distributed
systems.

Compare centralized and distributed deadlock 13 CO1 BTL-4 Analyze


detection algorithms in distributed systems, evaluating
9. their effectiveness, overhead, and scalability.
Highlight real-world examples and discuss trade-offs
in choosing detection strategies.

UNIT II
SYLLABUS:

Threads, system model, processor allocation, scheduling in distributed systems: Load balancing and
sharing approach, fault tolerance, Real time distributed systems, Process migration and related issues

PART-A
S.NO QUESTIONS CO K COMPETEN
LEVEL CE
List the architecture of multi-threaded server. CO2 BTL-1 Remember

1.
Compare process and threads. CO2 BTL-2 Remember

2.

Show the file attributes and record structure. CO2 BTL-2 Understand

3.

Outline the properties of storage system? CO2 BTL-2 Understand

4.

What is process migration? CO2 BTL-2 Understand

5.

CO2 BTL-1 Remember

6. List desirable features of good process migration


mechanism.

List the challenges of process migration. CO2 BTL-1 Remember

7.

Identify the types of process scheduling techniques. CO2 BTL-1 Remember

8.
CO2 BTL-2 Understand

9. What is task assignment approach write some sample


Algorithms.

CO2 BTL-1 Remember

10. What is Load balancing?

CO2 BTL-1 Remember

11. Name two approaches used for load balancing in


distributed systems.

What does processor allocation refer to in distributed CO2 BTL-1 Remember


systems?
12.

PART-B & C
Analyze threads and thread models, elucidating their 13 CO2 BTL-4 Analyze
role in concurrent programming, the nuances of
13. multi-threading, and the various thread models.
Discuss the trade-offs and implications of choosing
between user-level and kernel-level threads in
modern software development.
Apply the concept of process migration with a 13 CO2 BTL-3 Apply
suitable example.
14.

Distinguish the techniques and methodologies for 13 CO2 BTL-4 Analyze


scheduling process of a distributed systems.
15.
Examine a brief account on desired features of 13 CO2 BTL-4 Analyze
scheduling algorithms.
16.

Analyze the load-balancing approach briefly. 13 CO2 BTL-4 Analyze

17.

Analyze process migration by describing a scenario 13 CO2 BTL-4 Analyze


where a user's running application seamlessly shifts
18. from one server to another while preserving its state.
This is typically done to optimize resource
utilization, load balancing, or hardware maintenance
without disrupting user access.
Analyze processor allocation in distributed systems 13 CO2 BTL-4 Analyze
as the process of assigning computing resources to
19. various tasks or processes across multiple
interconnected machines. This allocation aims to
optimize performance, ensure efficient task
execution, and manage workload distribution in a
networked computing environment.
Compare centralized and decentralized load 13 CO2 BTL-4 Analyze
balancing algorithms in distributed systems,
20. analyzing their effectiveness, scalability, fault
tolerance mechanisms, suitable real-world examples,
and trade-offs in choosing between them.
Analyze challenges in designing real-time distributed 13 CO2 BTL-4 Analyze
systems, comparing hard and soft real-time systems.
21. Evaluate requirements, trade-offs, and application
domains, with examples of critical real-time
applications and implications on performance,
predictability, and reliability.

UNIT III
SYLLABUS:

Introduction to Cloud Computing – Evolution of Cloud Computing – Cloud Characteristics –


Elasticity in Cloud – On-demand Provisioning – NIST Cloud Computing Reference Architecture–
Architectural Design Challenges – Deployment Models: Public, Private and Hybrid Clouds – Service
Models: IaaS – PaaS – SaaS – Benefits of Cloud Computing.

PART-A
S.NO QUESTIONS CO K COMPETEN
LEVEL CE
Outline the importance of on demand provisioning in e- CO3 BTL-2 Understand
commerce applications
1.

Difference between public and private cloud. CO3 BTL-2 Understand

2.

What are the categories of cloud computing? CO3 BTL-1 Remember

3.

List few drawbacks of grid computing and cloud CO3 BTL-1 Remember
computing
4.

Name the essential characteristics of cloud computing. CO3 BTL-1 Remember

5.
Outline the importance of the term “cloud computing.” CO3 BTL-2 Understand

6.

Define Parallel Computing and Centralized computing CO3 BTL-1 Remember

7.

Explain the cloud reference model and their applications. CO3 BTL-2 Understand

8.

Compare and contrast elasticity and scalability in cloud CO3 BTL-2 Understand
computing?
9.

Define a dynamic infrastructure platform CO3 BTL-1 Remember

10.

Define SaaS in cloud computing. Provide an example of CO3 BTL-1 Remember


a SaaS application.
11.

List two benefits that organizations can derive from CO3 BTL-1 Remember
adopting cloud computing.
12.

PART B & C
Categorize and also analyze the various cloud 13 CO3 BTL-4 Analyze
deployment models.
13.

Analyze the primary components and 13 CO3 BTL-4 Analyze


underlying concepts within the NIST Cloud
14. Computing Reference Architecture. Explain
how these elements play a pivotal role in
enhancing comprehension and facilitating the
design of cloud computing systems.
Develop the architecture of cloud computing 13 CO3 BTL-3 Apply
over the Internet?
15.

Identify the similarities and differences 13 CO3 BTL-3 Apply


between distributed computing, grid computing
16. and cloud computing.

Apply the architecture of a cluster and Peer-to- 13 CO3 BTL-3 Apply


Peer network families with suitable
17. illustrations.

Examine cloud computing's evolution from 13 CO3 BTL-4 Analyze


inception through infrastructure development,
18. platform expansion, and specialized service
emergence. Highlight key milestones and
innovations shaping its journey into a
foundational element of modern IT
infrastructure.
Emphasize the significance of cloud computing, 13 CO3 BTL-4 Analyze
stressing its role in revolutionizing IT
19. infrastructure and operations. Then, elucidate
the primary service models and outlining how
each contributes to enhanced scalability,
accessibility, and cost-efficiency in technology
solutions.
Compare cloud computing deployment models 13 CO3 BTL-4 Analyze
and service models, analyzing their advantages,
20. challenges, and typical use cases. Provide
industry examples of successful
implementations for each model combination,
and evaluate adoption factors influencing
decision-making.
Analyze architectural challenges in cloud 13 CO3 BTL-4 Analyze
computing, focusing on scalability, reliability,
21. and security across public, private, and hybrid
clouds. Illustrate their impacts on system
performance and effectiveness, and propose
mitigation strategies for enhanced cloud
deployment success.

UNIT IV
SYLLABUS:

Introduction to Web Service and Service Oriented Architecture – SOAP – REST – Basics of
Virtualization – Full and Para Virtualization– Implementation Levels of Virtualization – Tools and
Mechanisms – Virtualization of CPU – Memory – I/O Devices – Desktop Virtualization – Server
Virtualization.

PART-A
S.NO QUESTIONS CO K COMPETENC
LEVEL E
What are the states of a VM CO4 BTL-1 Remember

1.

What is hardware assisted virtualization CO4 BTL-1 Remember

2.
What is memory migration and postcopy CO4 BTL-1 Remember

3.

Classify binary translated virtualization and dynamic CO4 BTL-2 Understand


binary translation
4.

What is the role of VMM CO4 BTL-1 Remember

5.

What is hypervisor and type 2 hypervisor CO4 BTL-1 Remember

6.

Explain the different levels of virtualization. CO4 BTL-2 Understand

7.

What is virtual server clusters and I/O virtualization CO4 BTL-1 Remember

8.

Classify supervisor mode and user mode CO4 BTL-2 Understand

9.

List the advantages and disadvantages of OS level CO4 BTL-1 Remember


virtualization
10.
Differences between virtualization and cloud CO4 BTL-2 Understand
computing
11.

Name three implementation levels of virtualization CO4 BTL-1 Remember


commonly used in modern computing environments.
12.

Define what REST stands for and briefly describe its CO4 BTL-1 Remember
key principles.
13.

PART B & C
Analyze virtualization in modern IT 13 CO4 BTL-4 Analyze
environments, focusing on para-virtualization
14. and full virtualization. Compare their
methodologies and elucidate the unique
characteristics that distinguish them, while
also highlighting any common advantages
they might offer.
Examine how virtualization techniques for 13 CO4 BTL-4 Analyze
CPU, memory, and I/O devices enhance
15. resource utilization, scalability, and system
efficiency in modern computing
environments

Analyze SOAP (Simple Object Access 13 CO4 BTL-4 Analyze


Protocol) meticulously, focusing on its
16. protocol structure and outlining its
significance in enabling platform-agnostic
data exchange in web services.

Discuss how REST principles contribute to 13 CO4 BTL-4 Analyze


scalability and statelessness in cloud-based
17. architectures. Analyze the benefits and
challenges of implementing REST in this
context, emphasizing its influence on
architecture design and optimization of
performance.
Examine the open source grid middleware 13 CO4 BTL-3 Apply
packages
18.

Examine Virtualization Structure in detail 13 CO4 BTL-3 Apply

19.

Investigate Virtualization Implementation 13 CO4 BTL-4 Analyze


Levels, assessing their effects on resource
20. efficiency and system performance across
software and hardware paradigms in
contemporary IT infrastructures.
Compare desktop and server virtualization, 13 CO4 BTL-4 Analyze
outlining their benefits, challenges, and
21. implementation factors in enterprises. Offer
examples of successful deployments and
analyze adoption drivers.
Examine the interplay between Service- 13 CO4 BTL-4 Analyze
Oriented Architecture (SOA) and web
22. services, focusing on SOAP and REST as
contrasting styles. Evaluate their merits,
drawbacks, and suitability in contemporary
application development and integration
contexts.

UNIT V
SYLLABUS:

Resource Provisioning and Methods – Cloud Management Products – Cloud Storage – Provisioning
Cloud Storage – Managed and Unmanaged Cloud Storage – Cloud Security Overview – Cloud
Security Challenges –Security Architecture. Case Studies: Open stack, Amazon EC2, AWS, Microsoft
Azure, Google Compute Engine.

PART-A
S.NO QUESTIONS CO K COMPETENC
LEVEL E
Outline the different cloud security services CO5 BTL-2 Understand

1.

How security policies are implemented on cloud CO5 BTL-2 Understand


computing
2.

Explain about host level cloud security. CO5 BTL-2 Understand

3.

What is network level and application level cloud CO5 BTL-1 Remember
security?
4.

What do you understand by virtualization security CO5 BTL-1 Remember


management
5.

What is multitenancy issue in cloud computing CO5 BTL-1 Remember

6.

What is AWS identity and access management CO5 BTL-1 Remember

7.
What is the difference between identity management CO5 BTL-2 Understand
and access management
8.

9. What is AWS ecosystem CO5 BTL-1 Remember


10. What is azure queues CO5 BTL-1 Remember
What is IAM CO5 BTL-1 Remember

11.

What is Eucalyptus CO5 BTL-1 Remember

12.

List the major features of Google app engine. Which CO5 BTL-1 Remember
kind of problems can be solved using Google app
13. engine

What is Open stack used for in cloud computing? CO5 BTL-1 Remember

14.

Name one cloud service provided by Microsoft Azure. CO5 BTL-1 Remember

15.

PART B & C
Analyze cloud storage, contrasting managed 13 CO5 BTL-4 Analyze
and unmanaged environments, and exploring
16. their complexities. Delve into object, block,
file, cold, and hybrid storage types,
highlighting use cases and advantages in the
cloud computing landscape.
Examine the complexities of cloud 13 CO5 BTL-4 Analyze
management, detailing resource and workload
17. oversight, and provide an overview of cloud
management tools and products. Explore their
capabilities, use cases, and the challenges they
address in the evolving cloud computing
landscape.
Examine cloud resource provisioning, 13 CO5 BTL-4 Analyze
analyzing dynamic allocation methods.
18 Explore manual provisioning, auto-scaling,
IaC, container orchestration, and serverless
computing, highlighting applications and
decision factors.
Develop a comprehensive exploration of 13 CO5 BTL-3 Apply
cloud security, highlighting the challenges
19 and risks faced by businesses and individuals
in a cloud-reliant era.

Develop an explanation of cloud security 13 CO5 BTL-3 Apply


architecture, detailing components like
20 identity and access management, data
encryption, and network security. Emphasize
their roles in ensuring data and application
security in cloud environments.
Construct a breakdown of cloud security 13 CO5 BTL-3 Apply
threats with real time examples.
21

Analyze cloud security challenges and 13 CO5 BTL-4 Analyze


architectural considerations. Select two case
22 studies from OpenStack, Amazon EC2, AWS,
Microsoft Azure, or Google Compute Engine,
and evaluate their security architectures,
measures implemented, challenges faced, and
risk mitigation strategies.
Compare and contrast managed and 13 CO5 BTL-4 Analyze
unmanaged cloud storage services. Discuss
23 the advantages, limitations, and typical use
cases for each approach. Analyze the factors
influencing organizations' decisions in
choosing between managed and unmanaged
cloud storage solutions, considering
scalability, data security, and cost-
effectiveness.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy