Csi ZG527 Ec-3r First Sem 2023-2024
Csi ZG527 Ec-3r First Sem 2023-2024
Csi ZG527 Ec-3r First Sem 2023-2024
Comprehensive Examination
(EC-3 Regular)
a. What is the role of the dockerd and how is it different from a docker engine?
b. How is a docker different from a VM. Justify from a maintainability perspective.
c. Refer to toe dockerfile below and answer.
a. What is the purpose of using the FROM keyword?
b. Why do I need to use the Label keyword?
c. What does the copy statement do?
a. State the purpose of having a private docker hub? If I’m connected to a private hub, can I
connect to the public repository of docker? Justify your answer briefly.
b. JVM helps in the portability of java applications and Docker provides containerization. Are
these two similar?
c. Create a docker file to create a container using the latest version of ubuntu. Add commands
to install a small script called myscript.py.
Q.2 Set. (A) You have been asked to design an “Open File System” which is derived from HDFS
architecture with following variances – chunk size of 100 MB, block size of 1 MB. A file
of size 1 TB needs to be stored on this file system Marks:1*5+2=7
a. How many chunks will be required to store the file?
b. How many blocks will be required to store the file?
c. How many chunk servers will be needed if each server hosts 1000 blocks?
d. How many chunk servers will be needed if each server hosts 100 GB of file?
e. How many chunk servers will be needed if the replication factor is 6 and the capacity of
the chunk server is 200 GB?
f. Using Amdahl’s law, what is the maximum speed up that can be achieved with 14
processors with a program for which 27 % of code can be executed in parallel?
Q.2 Set. (B) You have been asked to design an “Open File System” which is derived from HDFS
architecture with following variances – chunk size of 50 MB, block size of 1 MB. A file of
size 500GB needs to be stored on this file system: Marks: 1*5+2=7
a. How many chunks will be required to store the file?
b. How many blocks will be required to store the file?
c. How many chunk servers will be needed if each server hosts 1000 blocks?
d. How many chunk servers will be needed if each server hosts 100 GB of file?
e. How many chunk servers will be needed if the replication factor is 6 and the capacity of
the chunk server is 200 GB?
f. Using Amdahl’s law, what is the maximum speed up that can be achieved with 12
processors with a program for which 42 % of code can be executed in parallel?
Q.2 Set. (C) You have been asked to design an “Open File System” which is derived from HDFS
architecture with following variances – chunk size of 200 MB, block size of 1 MB. A file
of size 2 TB needs to be stored on this file system: Marks:1*5+2=7
a. How many chunks will be required to store the file?
b. How many blocks will be required to store the file?
c. How many chunk servers will be needed if each server hosts 1000 blocks?
d. How many chunk servers will be needed if each server hosts 100 GB of file?
e. How many chunk servers will be needed if the replication factor is 6 and the capacity of
the chunk server is 200 GB?
f. Using Amdahl’s law, what is the maximum speed up that can be achieved with 12
processors with a program for which 34 % of code can be executed in parallel?
Q.3 Set. (A)The telephone companies are storing their customers’ call details in different
formats as shown below. Each of the companies wants to leverage the cloud services
offered by XYZ service provider for the customers’ call-detail management. How
XYZ can support these varying data formats with its cloud service maintaining data
privacy and security? 10 Marks
AT&T customers call details:
CustomerID Calling Called Duration Type of Type of Call
Number Number of Call Call Customer Charg
(min) e
(US$)
1 415 555 405 555 4.00 Local Privileged 3
2 405 555 091 335 3.00 Long Normal 12
Distance
Verizon Communications customers’ call details:
CustomerID From To Number Call Type of Call Billing Type Eligible for
Number Length discount
(min)
100 815 555 215 555 12.00 Local Postpaid Y
200 605 555 091 445 1.00 ISD Prepaid N
Deutsche Telekom customers’ call details:
CustomerID Originating Destination Talk Type of Type of Paymen
Number Number Time Call Scheme t
(min) History
101 605 545 205 355 14.00 Local Voice & Very
Date Good
301 815 554 091 115 23.00 Long Voice Fair
Distance
Q.3 Set. (B) The airline companies are storing the flight schedules in different formats as
shown below. Each of the company wants to leverage the cloud services offered by
ABC service provider for the air fleet management. How ABC can support these
varying data formats with its cloud service maintaining the data privacy and security?
(10 Marks)
Q.3 Set. (C)The telephone companies are storing their customers’ call details in different
formats as shown below. Each of the company wants to leverage the cloud services
offered by XYZ service provider for the customers’ call-detail management. How
XYZ can support these varying data formats with its cloud service maintaining the
data privacy and security? 10 Marks
AT&T customers call details:
CustomerID Calling Called Duration Type of Type of Call
Number Number of Call Call Customer Charg
(min) e
(US$)
1 415 555 405 555 4.00 Local Privileged 3
2 405 555 091 335 3.00 Long Normal 12
Distance
Verizon Communications customers’ call details:
CustomerID From To Number Call Type of Call Billing Type Eligible for
Number Length discount
(min)
100 815 555 215 555 12.00 Local Postpaid Y
200 605 555 091 445 1.00 ISD Prepaid N
Deutsche Telekom customers’ call details:
CustomerID Originating Destination Talk Type of Type of Paymen
Number Number Time Call Scheme t
(min) History
101 605 545 205 355 14.00 Local Voice & Very
Date Good
301 815 554 091 115 23.00 Long Voice Fair
Distance
Q.4 Set. (A) Read the below and state if the leases can be accommodated or not 5 Marks
A cloud provider has a 4-node cluster to accept workloads. The service provider wants
to lease the parts of that cluster over the time. Lease is described with start time,
duration and whether its pre-emptable.
The current leases on the Service providers cluster are as given below:
Q.4 Set. (B) Read the below and state if the leases can be accommodated or not 5 Marks
A cloud provider has a 4-node cluster to accept workloads. The service provider wants
to lease the parts of that cluster over the time. Lease is described with start time,
duration and whether its pre-emptable.
The current leases on the Service providers cluster are as given below:
a. How does a cloud service provider employ fault tolerance in their services, provide
an example in conjunction with any service model (IaaS, PaaS or SaaS)
b. What do you understand by isolated user space? Between Server virtualization & OS
virtualization, which do you thing is more apt to use an isolated user space?
c. The table below lists the vulnerabilities in a cloud enabled application by a third
party auditing firm. Applying the CIA triad rules, Identify to which category each of
the breach mentioned falls under
Vulnerability Security
Triad Type
Insecure Backend using weak protocols
Open source logging tool not using the recommended security
patches
Third party software logging at a rapid rate by sending several
gbps of requests per second
Password string found unencrypted embedded in the code
a. How does a cloud service provider employ fault tolerance in their services, provide an
example in conjunction with any service model (IaaS, PaaS or SaaS)
b. What do you understand by isolated user space? Between Server virtualization & OS
virtualization, which do you think is more apt to use an isolated user space?
c. The table below lists the vulnerabilities in a cloud enabled application by a third-
party auditing firm. Applying the CIA triad rules, Identify to which category each
of the breach mentioned falls under
Vulnerability Security
Triad Type
Insecure Backend using weak protocols
Open-source logging tool not using the recommended security
patches
Third party software logging at a rapid rate by sending several
gbps of requests per second
Password string found unencrypted embedded in the code
******