Question Bank 1
Question Bank 1
QUESTION BANK
UNIT I
Part- A
A deadlock that is 'detected' but is not really a deadlock is called phantom deadlock. In
distributed deadlock detection, information about wait-for relationships between
transactions is transmitted from on server to another. If there is a deadlock, the necessary
information will eventually be collected in one place and a cycle will be detected. Ja this
procedure will take some time, there is a chance that one of the transactions
that Holds a lock will meanwhile have released it, in which case the deadlock will no longer
exist.
Part- B
Part – A
1. Define thread.
A thread is the operating system abstraction of an activity (the term derives from the
phrase ‘thread of execution’). An execution environment is the unit of resource
management: a collection of local kernel managed resources to which its threads have
access.
2. List the architecture of multi threaded server.
Working pool Architecture
Thread-per-request Architecture;
Thread-per-connection Architecture
Thread-per-object Architecture:
3. Compare process and threads.
a. Creation a new thread within an existing process is cheaper than creating a process.
b. More importantly switching to a different thread within the same process is cheaper
than switching between threads belonging to different processes.
c. Threads within a process may share data and other resources conveniently and
efficiently compared with separate processes.
d. But by the same token threads within processes are not protected from one another.
4. Explain thread lifetime.
A new thread is created on the same Java Virtual machine (JVM) as its creator in the
SUSPENDED state. After it is made RUNNABLE with the start() method, it execute in
the run() method of an object designated in its constructor, The JVM and the threads on
top of it all execute in a process on top of the underlying operating system. Threads can
be assigned a priority so that a java implementation that supports priorities will run a
particular threads in preference to any thread with lower priority
5. Enumerate the properties of storage system?
File Length
Creation Time stamp
Read Timestamp
Write time stamp
Attribute time stamp
Reference count
Owner
File Type
Access control List
8. What is process?
Process means a program in execution. Process execution must progress sequential
order.
9. What is process migration?
The phenomenon of shifting a process from one machine to another one which is
called process migration.
10. What is Load?
Load may be define as number of tasks are running in queue, CPU utilization,
load average, I/O utilization, amount of free CPU time/memory, etc.
11. List desirable features of good process migration mechanism.
Transparency
Efficiency
Minimal interference
Minimize freezing time
Minimal residual dependencies.
12. List any three challenges of process migration.
Process state capturing and transfer
Scheduling
System call
13. What are strategies for the migration of files?
If the file is locked by the migrating process and resides on the same system,
then transfer file with the process
If the process is moved temporarily, transfer the file only after an access request was made
by the migrated process.
Part- B
Private cloud is a type of cloud computing that delivers similar advantages to public
cloud, including scalability and self-service, but through a proprietary architecture.
Unlike public clouds, which deliver services to multiple organizations, a private cloud
is dedicated to a single organization.
3) What are the categories of cloud computing?
IaaS allows users to rent the infrastructure itself: servers, data center space, and
software. The biggest advantage of renting, as opposed to owning, infrastructure is
that users can scale up the amount of space needed at any time.
PaaSallows developers to create applications, collaborate on projects, and test
application functionality without having to purchase or maintain infrastructure.
Software as a service (SaaS; pronounced /sæs/) is a software licensing and delivery
model in which software is licensed on a subscription basis and is centrally hosted. It
is sometimes referred to as "on-demand software".
4) Define IaaS.
IaaS allows users to rent the infrastructure itself: servers, data center space, and
software. The biggest advantage of renting, as opposed to owning, infrastructure is
that users can scale up the amount of space needed at any time.
5) Define PaaS.
PaaS allows developers to create applications, collaborate on projects, and test
application functionality without having to purchase or maintain infrastructure.
6) Define SaaS.
Software as a service (SaaS; pronounced /sæs/) is a software licensing and delivery
model in which software is licensed on a subscription basis and is centrally hosted. It
is sometimes referred to as "on-demand software".
7) Mention the advantages of cloud computing.
Flexibility.
Disaster recovery. ...
Automatic software updates. ...
Capital-expenditure Free. ...
Increased collaboration. ...
Work from anywhere. ...
Document control. ...
8) Mention the disadvantages of cloud computing.
Down time
Security
Privacy
Vulnerable to attack
Limited control and flexibility
9) Explain the different levels of virtualization.
Hardware Virtualization
Virtual Machine
Storage Virtualization
Desktop Virtualization
Network Virtualization
10) What is Virtualization?
Virtualization is the creation of a virtual (rather than actual) version of something,
such as an operating system, a server, a storage device or network resources.
11) What are virtual clusters?
Micro, Small and Medium Enterprises are the backbone of an economy. They are the
most prolific job creators and pioneers in developing new ideas. That is why the
MSME Ministry of Government of India wants to help these businesses in every
possible way to facilitate the industry.
12) Explain about management of resources.
Resource management is the efficient and effective deployment and allocation of an
organization's resources when and where they are needed. Such resources may include
financial resources, inventory, human skills, production resources, or information
technology.
13) How virtualization happens in data center?
A Virtual Datacenter is a pool of cloud infrastructure resources designed specifically
for enterprise business needs. Those resources include compute, memory, storage and
bandwidth. Bluelock Virtual Datacenters are hosted in the public cloud and are based
on VMware vCloud technology, which provides full compatibility with any VMware
environment.
Part-B
1) Explain the various cloud deployment models.
2) Explain the different categories of cloud computing.
3) Explain the advantages and disadvantages of cloud computing.
4) Explain the implementation levels of virtualization.
5) Explain Virtualization Structure in detail.
6) Explain Virtualization of CPU, Memory and I/O devices.
7) Explain about virtual clusters and resource management
8) Write in detail about Virtualization for data centre automation
UNIT IV
Part-A
1)List some of the open source grid middleware packages.
GridGain
Hadoop
Rio
JPPF
The Globus Toolkit is an open source toolkit for grid computing developed and provided by
the Globus Alliance.
Extremely large data sets that may be analysed computationally to reveal patterns, trends, and
associations, especially relating to human behaviour and interactions.
5) What is Hadoop.
Hadoop is an open-source framework that allows to store and process big data in a distributed
environment across clusters of computers using simple programming models. It is designed
to scale up from single servers to thousands of machines, each offering local computation and
storage.
8) What is HDFS?
The Hadoop Distributed File System (HDFS) is a sub-project of the Apache Hadoop
project. This Apache Software Foundation project is designed to provide a fault-tolerant file
system designed to run on commodity hardware.
namenode -format
secondarynamenode
namenode
datanode
dfsadmin
mradmin
fsck
fs
$ java–version
An application adds data to HDFS by creating a new file and writing the data to it. After the
file is closed, the bytes written cannot be altered or removed except that new data can be
added to the file by reopening the file for append. HDFS implements a single-writer,
multiple-reader model.
PART-B
1) Explain in detail about GT4 Architecture.
2) What are the usage of globus?
3) Explain in detail about Hadoop.
4) What is HDFS? Explain in detail.
5) What are the open source grid middleware packages?
UNIT-V
Part- A
Grid computing is the collection of computer resources from multiple locations to reach a
common goal. The grid can be thought of as a distributed system with non-interactive
workloads that involve a large number of files.
The Grid Security Infrastructure (GSI), formerly called the Globus Security Infrastructure, is
a specification for secret, tamper-proof, delegable communication between software in
a grid computing environment. Secure, authenticable communication is enabled using
asymmetric encryption.
Majority of cloud service providers store customers’ data on large data centres. Although
cloud service providers say that data stored is secure and safe in the cloud, customers’ data
may be damaged during transition operations from or to the cloud storage provider.
All data on the network need to be secured. Strong network traffic encryption techniques
such as Secure Socket Layer (SSL) and the Transport Layer Security (TLS) can be used to
prevent leakage of sensitive information. Several key security elements such as data security,
data integrity, authentication and authorization, data confidentiality, web application security,
virtualization vulnerability, availability, backup, and data breaches should be carefully
considered to keep the cloud up and running continuously.
Studies indicate that most websites are secured at the network level while there may be
security loopholes at the application level which may allow information access to
unauthorized users. Software and hardware resources can be used to provide security to
applications.
Majority of cloud service providers store customers’ data on large data centres. Although
cloud service providers say that data stored is secure and safe in the cloud, customers’ data
may be damaged during transition operations from or to the cloud storage provider.
7) What is IAM?
Identity and access management (IAM) is the security and business discipline that "enables
the right individuals to access the right resources at the right times and for the right reasons."
It addresses the need to ensure appropriate access to resources across increasingly
heterogeneous technology environments and to meet increasingly rigorous compliance
requirements.
8) How is IaaS availability in cloud measured?
Downtime
Security
Privacy
Vulnerability to attack
The Grid Security Infrastructure (GSI), formerly called the Globus Security Infrastructure, is
a specification for secret, tamper-proof, delegable communication between software in
a grid computing environment. Secure, authenticable communication is enabled using
asymmetric encryption
PART-B