Csi ZG527 Ec-3r First Sem 2023-2024

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 6

Birla Institute of Technology & Science, Pilani

Work Integrated Learning Programmes Division


First Semester 2023-2024

Comprehensive Examination
(EC-3 Regular)

Course No. : CSI ZG527


Course Title : Cloud Computing
Nature of Exam : Open Book
Pattern of Exam : Typed Only
Weightage : 40% No. of Pages = 6
Duration : 2 Hours No. of Questions = 5
Date of Exam : 26/11/2023 (AN)
Note to Students:
1. Please follow all the Instructions to Candidates given on the cover page of the answer book.
2. All parts of a question should be answered consecutively. Each answer should start from a fresh page.
3. Assumptions made, if any, should be stated clearly at the beginning of your answer.

Q.1 Set. (A) Answer the questions Marks:3+3+4 =10


a. Why does docker spin-up use a copy on write process? List the advantages.
b. How is a docker different from a VM. Justify from a maintainability perspective.
c. Create a docker file to create a container using the latest version of ubuntu. Add commands to
install a small script called myscript.py.

Q.1 Set. (B) Answer the questions Marks: 3+3+4 =10

a. What is the role of the dockerd and how is it different from a docker engine?
b. How is a docker different from a VM. Justify from a maintainability perspective.
c. Refer to toe dockerfile below and answer.
a. What is the purpose of using the FROM keyword?
b. Why do I need to use the Label keyword?
c. What does the copy statement do?

Q.1 Set. (C) Answer the questions Marks: 3+3+4 =10

a. State the purpose of having a private docker hub? If I’m connected to a private hub, can I
connect to the public repository of docker? Justify your answer briefly.
b. JVM helps in the portability of java applications and Docker provides containerization. Are
these two similar?
c. Create a docker file to create a container using the latest version of ubuntu. Add commands
to install a small script called myscript.py.
Q.2 Set. (A) You have been asked to design an “Open File System” which is derived from HDFS
architecture with following variances – chunk size of 100 MB, block size of 1 MB. A file
of size 1 TB needs to be stored on this file system Marks:1*5+2=7
a. How many chunks will be required to store the file?
b. How many blocks will be required to store the file?
c. How many chunk servers will be needed if each server hosts 1000 blocks?
d. How many chunk servers will be needed if each server hosts 100 GB of file?
e. How many chunk servers will be needed if the replication factor is 6 and the capacity of
the chunk server is 200 GB?
f. Using Amdahl’s law, what is the maximum speed up that can be achieved with 14
processors with a program for which 27 % of code can be executed in parallel?
Q.2 Set. (B) You have been asked to design an “Open File System” which is derived from HDFS
architecture with following variances – chunk size of 50 MB, block size of 1 MB. A file of
size 500GB needs to be stored on this file system: Marks: 1*5+2=7
a. How many chunks will be required to store the file?
b. How many blocks will be required to store the file?
c. How many chunk servers will be needed if each server hosts 1000 blocks?
d. How many chunk servers will be needed if each server hosts 100 GB of file?
e. How many chunk servers will be needed if the replication factor is 6 and the capacity of
the chunk server is 200 GB?
f. Using Amdahl’s law, what is the maximum speed up that can be achieved with 12
processors with a program for which 42 % of code can be executed in parallel?
Q.2 Set. (C) You have been asked to design an “Open File System” which is derived from HDFS
architecture with following variances – chunk size of 200 MB, block size of 1 MB. A file
of size 2 TB needs to be stored on this file system: Marks:1*5+2=7
a. How many chunks will be required to store the file?
b. How many blocks will be required to store the file?
c. How many chunk servers will be needed if each server hosts 1000 blocks?
d. How many chunk servers will be needed if each server hosts 100 GB of file?
e. How many chunk servers will be needed if the replication factor is 6 and the capacity of
the chunk server is 200 GB?
f. Using Amdahl’s law, what is the maximum speed up that can be achieved with 12
processors with a program for which 34 % of code can be executed in parallel?

Q.3 Set. (A)The telephone companies are storing their customers’ call details in different
formats as shown below. Each of the companies wants to leverage the cloud services
offered by XYZ service provider for the customers’ call-detail management. How
XYZ can support these varying data formats with its cloud service maintaining data
privacy and security? 10 Marks
AT&T customers call details:
CustomerID Calling Called Duration Type of Type of Call
Number Number of Call Call Customer Charg
(min) e
(US$)
1 415 555 405 555 4.00 Local Privileged 3
2 405 555 091 335 3.00 Long Normal 12
Distance
Verizon Communications customers’ call details:
CustomerID From To Number Call Type of Call Billing Type Eligible for
Number Length discount
(min)
100 815 555 215 555 12.00 Local Postpaid Y
200 605 555 091 445 1.00 ISD Prepaid N
Deutsche Telekom customers’ call details:
CustomerID Originating Destination Talk Type of Type of Paymen
Number Number Time Call Scheme t
(min) History
101 605 545 205 355 14.00 Local Voice & Very
Date Good
301 815 554 091 115 23.00 Long Voice Fair
Distance

Q.3 Set. (B) The airline companies are storing the flight schedules in different formats as
shown below. Each of the company wants to leverage the cloud services offered by
ABC service provider for the air fleet management. How ABC can support these
varying data formats with its cloud service maintaining the data privacy and security?
(10 Marks)

NewBreeze Flight Schedule

FligtID From To Departur Arrival CarrierType Capacity


e
1 Pune Delhi 9.00 12.30 Boeing 180
2 Mumbai Delhi 8.00 12.00 Boeing 320

GoNow Filght Schedule

FligtID From To Starttime Reachtime Domestic WebCheckin


11 Pune Kochi 9.00 12.30 Y N
22 Jaipur Delhi 8.00 9.00 Y Y

EasyGo Flight Schedule


<FlightSchedule>
<Flight ID=”111”>
<Source>Pune</Source>
<Destination>Bangalore</Destination>
<Start> 8 AM </Start>
<End> 10.30 AM </End>
</Flight>
<FlightSchedule>

Q.3 Set. (C)The telephone companies are storing their customers’ call details in different
formats as shown below. Each of the company wants to leverage the cloud services
offered by XYZ service provider for the customers’ call-detail management. How
XYZ can support these varying data formats with its cloud service maintaining the
data privacy and security? 10 Marks
AT&T customers call details:
CustomerID Calling Called Duration Type of Type of Call
Number Number of Call Call Customer Charg
(min) e
(US$)
1 415 555 405 555 4.00 Local Privileged 3
2 405 555 091 335 3.00 Long Normal 12
Distance
Verizon Communications customers’ call details:
CustomerID From To Number Call Type of Call Billing Type Eligible for
Number Length discount
(min)
100 815 555 215 555 12.00 Local Postpaid Y
200 605 555 091 445 1.00 ISD Prepaid N
Deutsche Telekom customers’ call details:
CustomerID Originating Destination Talk Type of Type of Paymen
Number Number Time Call Scheme t
(min) History
101 605 545 205 355 14.00 Local Voice & Very
Date Good
301 815 554 091 115 23.00 Long Voice Fair
Distance

Q.4 Set. (A) Read the below and state if the leases can be accommodated or not 5 Marks
A cloud provider has a 4-node cluster to accept workloads. The service provider wants
to lease the parts of that cluster over the time. Lease is described with start time,
duration and whether its pre-emptable.
The current leases on the Service providers cluster are as given below:

Node 1 - L1 (1 pm, 1 hr, yes),


Node 2 - L2 (1.30 pm, 1 hr, No),
Node 3 - L3 (1 pm, 3 hr, No),
Node 4 - L4(now, 2 hr, No).

Now if two new Workload arrives in the form of lease l5 & L6


L5 ( now, 1 hr, No) and
L6 ( 1.30 pm, 2hr , Yes)

Identify what type of lease L5 & L6 are. Briefly state why


Test & evaluate the leases for the BEL preemptive condition

Q.4 Set. (B) Read the below and state if the leases can be accommodated or not 5 Marks
A cloud provider has a 4-node cluster to accept workloads. The service provider wants
to lease the parts of that cluster over the time. Lease is described with start time,
duration and whether its pre-emptable.
The current leases on the Service providers cluster are as given below:

Node 1 - L1 (1 pm, 1 hr, yes),


Node 2 - L2 (1.30 pm, 1 hr, No),
Node 3 - L3 (1 pm, 3 hr, No),
Node 4 - L4(now, 2 hr, No).

Now if two new Workload arrives in the form of lease l5 & L6


L5 ( now, 1 hr, No) and
L6 ( 1.30 pm, 2hr , Yes)

Identify what type of lease L5 & L6 are. Briefly state why


Test & evaluate the leases for the BEL preemptive condition
Q.4 Set. (C) Read the below and state if the leases can be accommodated or not 5 Marks
A cloud provider has a 4-node cluster to accept workloads. The service provider wants
to lease the parts of that cluster over the time. Lease is described with start time,
duration and whether its pre-emptable.
The current leases on the Service providers cluster are as given below:

Node 1 - L1 (1 pm, 1 hr, yes),


Node 2 - L2 (1.30 pm, 1 hr, No),
Node 3 - L3 (1 pm, 3 hr, No),
Node 4 - L4(now, 2 hr, No).

Now if two new Workload arrives in the form of lease l5 & L6


L5 ( now, 1 hr, No) and
L6 ( 1.30 pm, 2hr , Yes)

Identify what type of lease L5 & L6 are. Briefly state why


Test & evaluate the leases for the BEL preemptive condition

Q.5 Set. (A) Answer the questions briefly 2+2+4 = 8 Marks


a. A company has peak customer demand for its IT services in the month of
April. It has enough IT resources to handle off peak demand but not peak
load. What is the best approach to handle this situation?
b. Differentiate between SLO & SLI. What is more important?
c. The table below lists the vulnerabilities in a cloud enabled application by a
third party auditing firm. Applying the CIA triad rules, Identify to which
category each of the breach mentioned falls under
Vulnerability Security
Triad Type
Insecure Backend using weak protocols
Open source logging tool not using the recommended security
patches
Third party software logging at a rapid rate by sending several
gbps of requests per second
Password string found unencrypted embedded in the code

Q.5 Set. (B) Answer the questions briefly 2+2+4 = 8 Marks

a. How does a cloud service provider employ fault tolerance in their services, provide
an example in conjunction with any service model (IaaS, PaaS or SaaS)
b. What do you understand by isolated user space? Between Server virtualization & OS
virtualization, which do you thing is more apt to use an isolated user space?
c. The table below lists the vulnerabilities in a cloud enabled application by a third
party auditing firm. Applying the CIA triad rules, Identify to which category each of
the breach mentioned falls under
Vulnerability Security
Triad Type
Insecure Backend using weak protocols
Open source logging tool not using the recommended security
patches
Third party software logging at a rapid rate by sending several
gbps of requests per second
Password string found unencrypted embedded in the code

Q.5 Set. (C) Answer the questions briefly 2+2+4 = 8 Marks

a. How does a cloud service provider employ fault tolerance in their services, provide an
example in conjunction with any service model (IaaS, PaaS or SaaS)
b. What do you understand by isolated user space? Between Server virtualization & OS
virtualization, which do you think is more apt to use an isolated user space?
c. The table below lists the vulnerabilities in a cloud enabled application by a third-
party auditing firm. Applying the CIA triad rules, Identify to which category each
of the breach mentioned falls under
Vulnerability Security
Triad Type
Insecure Backend using weak protocols
Open-source logging tool not using the recommended security
patches
Third party software logging at a rapid rate by sending several
gbps of requests per second
Password string found unencrypted embedded in the code

******

You might also like