Jeppiaar Engineering College: Cs6703 - Grid and Cloud Computing
Jeppiaar Engineering College: Cs6703 - Grid and Cloud Computing
Jeppiaar Engineering College: Cs6703 - Grid and Cloud Computing
DEPARTMENT OF CSE
JEPPIAAR ENGINEERING COLLEGE
CS6703 – GRID AND CLOUD COMPUTING
2018
VISION
MISSION
● To excel in teaching and learning, research and innovation by promoting the principles of
scientific analysis and creative thinking
● To participate in the production, development and dissemination of knowledge and interact
with national and international communities
● To equip students with values, ethics and life skills needed to enrich their lives and enable
them to contribute for the progress of society
● To prepare students for higher studies and lifelong learning, enrich them with the practical
skills necessary to excel as future professionals and entrepreneurs for the benefit of Nation’s
economy
PROGRAM OUTCOMES
| DEPARTMENT OF CSE 2
CS6703 – GRID AND CLOUD COMPUTING
2018
write effective reports and design documentation, make effective presentations, and give and
receive clear instructions.
11. Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one's own work, as a member and
leader in a team, to manage projects and multidisciplinary environments.
12. Life-long learning: Recognize the need for, and have the preparation and ability to engage
in independent and life-long learning in the broadest context of technological change.
To educate and nurture the upcoming professionals through excellence in scientific and
knowledge based education to yield globally competitive and self-disciplined computer
engineers.
• To create computer professionals, capable of doing research, build innovative ideas and
creative solutions for betterment of industries.
• To stimulate and build academic team to cater the ever increasing demand of student
community, train them to take uphill challenges through interactions with globally renowned
organizations.
• To attain ethical and value added personality that would revamp students life to participate in
technology transfer.
• To ignite registrants towards the aptitude of learning every dynamic progress through higher
level studies, provide a platform for employment and self-employment to succeed and
support the nation.
PSO1-An ability to understand the basic concepts in computer science and engineering and to
apply them in various areas like Fundamentals of programming, Data structures ,computer
architecture, Theory of computing ,Database management system, computer networks, operating
system, ,Software engineering etc in the design and implementation of complex system.
| DEPARTMENT OF CSE 3
CS6703 – GRID AND CLOUD COMPUTING
2018
PSO2 - Ability to execute computer science and engineering problem using modern hardware
and software tools along with analytical skills to arrive cost effective and appropriate solution.
PSO3 - An understanding social awareness and environmental wisdom along with ethical
responsibility to have a successful carrier to sustain passion as an entrepreneur. Familiarity and
practical proficiency with a broad area of programming concepts and provide new ideas and
innovations towards research.
BTL6: Creating
BTL 5: Evaluating
BTL 4: Analyzing
BTL 3: Applying
BTL 2: Understanding
BTL 1: Remembering
| DEPARTMENT OF CSE 4
CS6703 – GRID AND CLOUD COMPUTING
2018
CS6703 - GRID AND CLOUD COMPUTING SYLLABUS
OBJECTIVES:
The student should be made to:
• Understand how Grid computing helps in solving large scale scientific problems.
• Gain knowledge on the concept of virtualization that is fundamental to cloud computing.
• Learn how to program the grid and the cloud.
• Understand the security issues in the grid and the cloud environment.
OUTCOMES:
At the end of the course, the student should be able to:
• Apply grid computing techniques to solve large scale scientific problems.
• Apply the concept of virtualization.
• Use the grid and cloud tool kits.
| DEPARTMENT OF CSE 5
CS6703 – GRID AND CLOUD COMPUTING
2018
• Apply the security models in the grid and the cloud environment.
TEXT BOOK
• Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed and Cloud Computing:
Clusters, Grids, Clouds and the Future of Internet”, First Edition, Morgan Kaufman
Publisher, an Imprint of Elsevier, 2012.
REFERENCES
1. Jason Venner, “Pro Hadoop- Build Scalable, Distributed Applications in the Cloud”, A
Press, 2009
2. Tom White, “Hadoop The Definitive Guide”, First Edition. O’Reilly, 2009
3. Bart Jacob (Editor), “Introduction to Grid Computing”, IBM Red Books, Vervante, 2005
4. Ian Foster, Carl Kesselman, “The Grid: Blueprint for a New Computing Infrastructure”,
2nd Edition, Morgan Kaufmann
5. Frederic Magoules and Jie Pan, “Introduction to Grid Computing” CRC Press, 2009
6. Daniel Minoli, “A Networking Approach to Grid Computing”, John Wiley Publication,
2005
7. Barry Wilkinson, “Grid Computing: Techniques and Applications”, Chapman and Hall,
CRC, Taylor and Francis Group, 2010
COURSE OUTCOME
C403.4 Utilize the Grid and Cloud Tool Kit to program on it.
C403.5 Apply the security model in Grid and Cloud Environment
| DEPARTMENT OF CSE 6
CS6703 – GRID AND CLOUD COMPUTING
2018
UNIT – I – INTRODUCTION
Evolution of Distributed computing: Scalable computing over the Internet – Technologies for
network based systems – clusters of cooperative computers - Grid computing Infrastructures –
cloud computing - service oriented architecture – Introduction to Grid Architecture and standards
– Elements of Grid – Overview of Grid Architecture
PART A
Blooms
S. Course
No.
Question Taxonomy
Outcome
Level
Bring out the difference between private cloud and public cloud.
(ND2016)
Public Cloud Private Cloud
Multiple Clients Single Clients
Hosted at providers location Hosted at providers /
1 organization location BTL 2
Shared infrastructure Private Infrastructure C403.1
Access over Internet Access over Internet / Private
network
Low cost High cost
Less Secure More Secure
Why is Cloud computing important? (ND2016)
| DEPARTMENT OF CSE 9
CS6703 – GRID AND CLOUD COMPUTING
2018
access to grid resources.
Eg: Grid portals provide capabilities for the GC resource authentication,
remote resource access, scheduling capabilities and monitoring status
information.
What is grid infrastructure?
Grid infrastructure forms the core foundation for successful grid
19 applications. This infrastructure is a complex combination of number of C403.1 BTL 1
capabilities and resources identified for the specific problem and
environment being addressed.
Give the example of software application ASP.
20 • Weather Predication C403.1 BTL 1
• Math Modeling Application
Give the examples of Hardware service provider.
• Computer Cluster
• Computer System
21 C403.1 BTL 1
• Linux on Demand
• Network Bandwidth
• Blades
List out any three Grid Applications.
• Schedulers
22 C403.1 BTL 1
• Resource Broker
• Load Balancing
Define Cloud computing with example.
Cloud computing is a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resources (e.g.,
23
networks, servers, storage, applications, and services) that can be rapidly C403.1 BTL 1
provisioned and released with minimal management effort or service
provider interaction. For example, Google hosts a cloud that consists of
both smallish PCs and larger servers. Google’s cloud is a private one (that
is, Google owns it) that is publicly accessible (by Google’s users).
What are the properties of Cloud Computing?
There are six key properties of cloud computing:
Cloud computing is
• User-centric
24 • Task-centric C403.1 BTL 1
• Powerful
• Accessible
• Intelligent
• Programmable
What is the working principle of Cloud Computing?
• The cloud is a collection of computers and servers that are publicly
25 accessible via the Internet.This hardware is typically owned and C403.1 BTL 1
operated by a third party on a consolidated basis in one or more
data center locations. The machines can run any combination of
| DEPARTMENT OF CSE 10
CS6703 – GRID AND CLOUD COMPUTING
2018
operating systems.
Draw the architecture of Cloud
26 C403.1 BTL 6
| DEPARTMENT OF CSE 11
CS6703 – GRID AND CLOUD COMPUTING
2018
• IBM
• Salesforce.com
What are the features of robust Cloud development? Who it offers?
• Dynamic web serving
• Full support for all common web technologies
35 • Persistent storage with queries, sorting, and transactions C403.1 BTL 1
• Automatic scaling and load balancing
• APIs for authenticating users and sending email using Google
Accounts
What are the other Cloud service development tools.
• 3tera
• 10gen
• Cohesive Flexible Technologies
36 • Joyent C403.1 BTL 1
• Mosso
• Nirvanix
• Skytap
• StrikeIron
Define the term web service with example.
A web service is an application that operates over a network typically,
over the Internet. Most typically, a web service is an API that can be
accessed over the Internet. The service is then executed on a remote
37 C403.1 BTL 1
system that hosts the requested services. A good example of web services
are the “mashups” created by users of the Google Maps API. With these
custom apps, the data that feeds the map is provided by the developer,
where the engine that creates the map itself is provided by Google.
What are the issues in web based applications?
• Technical issues
• Business model issues
38 • Internet issues C403.1 BTL 1
• Security issues
• Compatibility issues
• Social issues
Tabulate the difference between high performance computing and
high throughput computing (Apr/May 2017)
• High-Performance Computing
HPC systems emphasize the raw speed performance. The speed of HPC systems has C403.1
39 increased from Gflops in the early 1990s to now Pflops in 2010. This improvement was BTL 2
driven mainly by the demands from scientific, engineering, and manufacturing
communities. For example, the Top 500 most powerful computer systems in the world are
measured by floating-point speed in Linpack benchmark results. However, the number of
supercomputer users is limited to less than 10% of all computer users. Today, the majority
of computer users are using desktop computers or large servers when they conduct
| DEPARTMENT OF CSE 13
CS6703 – GRID AND CLOUD COMPUTING
2018
Internet searches and market-driven computing tasks.
• High-Throughput Computing
The development of market-oriented high-end computing systems is undergoing a
strategic change from an HPC paradigm to an HTC paradigm. This HTC paradigm pays
more attention to high-flux computing. The main application for high-flux computing is in
Internet searches and web services by millions or more users simultaneously. The
performance goal thus shifts to measure high throughput or the number of tasks completed
per unit of time. HTC technology needs to not only improve in terms of batch processing
speed, but also address the acute problems of cost, energy savings, security, and reliability
at many data and enterprise computing centers.
| DEPARTMENT OF CSE 14
CS6703 – GRID AND CLOUD COMPUTING
2018
PART B
Blooms
S. Course
No.
Question Taxonomy
Outcome
Level
Illustrate the architecture of Virtual Machine and brief out the
operations.(16) (ND2016)
1 Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed C403.1 BTL 2
and Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”,
Page No: 149-152
Explain in detail about distributed computing. (16)
Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed C403.1
2 BTL 2
and Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”,
Page No: 04-10
Discuss about virtualization (16)
Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed C403.1
3 BTL 6
and Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”,
Page No: 22-24
Explain in detail about clusters of cloud computing. (8) (ND2016)
Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed C403.1
4 BTL 2
and Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”,
Page No: 28-29
Discuss short notes on Service Oriented Architecture. (8) (ND2016)
Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed C403.1
5 BTL 6
and Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”,
Page No: 56-59
Explain briefly about grid infrastructure. (16)
C403.1
6 Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed BTL 2
and Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”,
| DEPARTMENT OF CSE 15
CS6703 – GRID AND CLOUD COMPUTING
2018
Page No: 29-31
What are the data and functional requirements of grid computing? (16)
Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed C403.1
7 BTL 1
and Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”,
Page No: 17-20
Explain the architecture of Cloud computing in detail.
Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed C403.1
8 BTL 2
and Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”,
Page No: 34-36
Explain the Cloud service development.
C403.1
9 Refer: Bart Jacob (Editor), “Introduction to Grid Computing”, IBM Red BTL 2
Books, Vervante, 2005, Page No: 45-50
Brief the interaction between GPU and CPU in performing parallel
execution of operations (Apr/May 2017) C403.1 BTL 2
10
Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed and
Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”,
Illustrate with the neat sketch, the grid computing infrastructure (Apr/May
2017)
C403.1 BTL 2
11 Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed and
Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”,
Page No: 29-31
i) Describe the infrastructure requirements for grid computing (ND2017)
ii) What are the issues in Cluster design? How can they be resolved?
C403.1 BTL 1
12 Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed and
Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”, Pg
no:29-31, 69-71
i) Describe layered grid architecture. How does it map onto internet
protocol architecture? (ND2017)
ii) Describe the architecture of clusters with suitable illustrations C403.1 BTL 2
13
Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed and
Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”, Pg
no: 36-44, 75-86
Explain in detail the layered architecture of grid environment and
functionalities of grid server (Apr/May 2018)
C403.1 BTL 2
14 Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed and
Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”, Pg
no: 36-44
Discuss the evolution path of cloud computing. Also, express the
difference between grid and distributed computing (Apr/May 2018)
C403.1 BTL 6
15 Refer: Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed and
Cloud Computing: Clusters, Grids, Clouds and the Future of Internet”,Pg
no:192-205
| DEPARTMENT OF CSE 16
CS6703 – GRID AND CLOUD COMPUTING
2018
UNIT – II – GRID SERVICES
Introduction to Open Grid Services Architecture (OGSA) – Motivation – Functionality
Requirements –Practical & Detailed view of OGSA/OGSI – Data intensive grid service models –
OGSA services.
PART A
Blooms
S. Course
No.
Question Taxonomy
Outcome
Level
What is QOS?
Grid computing system is the ability to provide the quality of service
1 requirements necessary for the end-user community. QOS provided by the C403.2 BTL 1
grid like performance, availability, management aspects, business value
and flexibility in pricing.
What are the derivatives of grid computing?
There are 8 derivatives of grid computing. They are as follows:
• Compute grid
• Data grid
• Science grid C403.2
2 BTL 1
• Access grid
• Knowledge grid
• Cluster grid
• Terra grid
• Commodity grid
What are the features of data grids?
• The ability to integrate multiple distributed, heterogeneous and
independently managed data sources.
C403.2
3 • The ability to provide data catching and/or replication mechanisms BTL 1
to minimize network traffic.
• The ability to provide necessary data discovery mechanisms, which
allow the user to find data based on characteristics of the data.
What are the features of computational grids?
• The ability to allow for independent management of computing C403.2
4 BTL 1
resources
• Failure detection and failover mechanisms
List the requirements of resource sharing in a grid. (ND 2016)
Grid computing is the concept of distributed computing technologies for
computing resource sharing among participants in a virtualized collection
of organization. Through resource sharing and cooperation among C403.2
5 BTL 1
participating organizations Computational grid or data grid provide
• Computing utility
• Data services
• Information services.
What are the security concerns associated with grid? (ND 2016) C403.2
6 BTL 1
The major security problems with grid computing include:
| DEPARTMENT OF CSE 17
CS6703 – GRID AND CLOUD COMPUTING
2018
| DEPARTMENT OF CSE 18
CS6703 – GRID AND CLOUD COMPUTING
2018
| DEPARTMENT OF CSE 19
CS6703 – GRID AND CLOUD COMPUTING
2018
Mention the important characteristic of legion system
• Everything is an object C403.2
19 BTL 1
• Classes manage their own instance, users can provide their own
classes
What are the core objects defined by legion system?
Host objects: Abstractions of processing resources which may represent
a single processor or multi host and processors.
C403.2
20 Value objects: Provide persistent storage for scalable persistence of the BTL 1
objects.
Binding objects: Maps the object ID’s to the physical addresses
Implementation objects: Allow objects to run as processes.
Name the components available in Nimrod architecture?
Nimrod-G clients: This can provide tools for creating parameter sweep
applications, steering and control monitors, and customized end-user
applications and GUI’s. C403.2
21 BTL 1
Nimrod-G resource broker: it consists of a Task Farming Engine (TFE),
a scheduler that performs resource discovery, trading and scheduling
features, a dispatcher and actuator, and agents for managing the jobs on the
resource.
What are the scheduling algorithms used in Nimrod G?
• Cost optimization- uses the cheapest resource.
• Time optimization- results in parallel execution of the job.
• Cost-time optimization-similar to cost optimization but if there are C403.2
22 multiple jobs with the same cost, then the time factor is taken into BTL 1
consideration.
• Conservative time strategy- similar to time optimization, but
guarantees that each unprocessed job has a minimum budget per
job.
What are the major objectives of Euro grid project?
• To establish a European GRID network of leading high
performance computing centers from different European
countries.
• To operate and support the EUROGRID software
infrastructure. C403.2
23 BTL 1
• To develop important GRID software components and to
integrate them into EUROGRID
• To demonstrate distributed simulated codes from different
application areas
• To contribute to the international GRID development and
work with the leading international GRID projects.
What is the application specific work packages identified for the
Euro grid?
C403.2
24 • Bio-Grid BTL 1
• Metro Grid
• Computer Aided Engineering (CAE) Grid
| DEPARTMENT OF CSE 20
CS6703 – GRID AND CLOUD COMPUTING
2018
| DEPARTMENT OF CSE 21
CS6703 – GRID AND CLOUD COMPUTING
2018
| DEPARTMENT OF CSE 22
CS6703 – GRID AND CLOUD COMPUTING
2018
Compare GSH with GSR (Nov/Dec 2017)
GSH & GSR
• GSH: Grid Service Handle (URI)
- Unique
C403.2
38 - Shows the location of the service BTL 2
• GSR: Grid Service Reference
- Describes how to communicate with the service
- As Web Service use SOAP, our GSR is a WSDL file
PART- B
Blooms
S. Course
No.
Question Taxonomy
Outcome
Level
Explain about Open Grid Services Architecture (OGSA). (TB Pg.422-425)
• Infrastructure services
1 C403.2 BTL 1
• Execution Management services
• Data services
| DEPARTMENT OF CSE 23
CS6703 – GRID AND CLOUD COMPUTING
2018
| DEPARTMENT OF CSE 24
CS6703 – GRID AND CLOUD COMPUTING
2018
(TB –Pg. 425-426)
What is OGSA? Explain open grid service architecture in detail with the
10 C403.2 BTL 1
functionalities of the components. (Nov/Dec 2017) (TB –Pg. 283-286)
Explain in detail the OGSA security architecture and security services.
11 C403.2 BTL 1
(Apr/May 2018) (TB –Pg. 283-286)
What is the purpose of OGSI? Describe the ports and interfaces defined in
12 OGSI along with its inheritance hierarchy (Apr/May 2018) (TB – Pg no: C403.2 BTL 1
283)
| DEPARTMENT OF CSE 25
CS6703 – GRID AND CLOUD COMPUTING
2018
UNIT – III – VIRTUALIZATION
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing:
Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing –
Implementation levels of virtualization – virtualization structure – virtualization of CPU,
Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data
center automation.
PART A
Blooms
S. Course
Question Taxonomy
No. Outcome
Level
What is meant by Service Level Agreement (SLA)?
A service-level agreement (SLA) is a part of a standardized service
1 contract where a service is formally defined. Particular aspects of the C403.3 BTL 1
service includes scope, quality, responsibilities which are agreed between
the service provider and the service user.
Define Public Cloud.
A public cloud is built over the Internet, which can be accessed by any user
2 who has paid for the service. Public clouds are owned by service providers. C403.3 BTL 1
They are accessed by subscription. Eg. Google App Engine GAE, Amazon
Web Services AWS, Microsoft Azure, IBM Blue Cloud etc.
Define Private Cloud.
The private cloud is built within the domain of an intranet owned by a
3 C403.3 BTL 1
single organization. Therefore, they are client owned and managed. Their
access is limited to the owning clients and their partners.
Define Hybrid Cloud. (ND 2016)
Hybrid cloud is a cloud computing environment which uses a mix of on-
premises, private cloud and third-party, public cloud services with
orchestration between the two platforms. For example, an enterprise can
4 C403.3 BTL 1
deploy an on-premises private cloud to host sensitive or critical workloads,
but use a third-party public cloud provider, such as Google Computer
Engine, to host less-critical resources, such as test and development
workloads.
List the design objectives of cloud computing?
• Shifting Computing from Desktops to Datacenters
• Service Provisioning and Cloud Economics
5 • Scalability in Performance C403.3 BTL 1
• Data Privacy Protection
• High Quality of Cloud Services
• New Standards and Interfaces
Compare traditional IT cost model and Cloud computing cost model.
In traditional IT computing, user must acquire their own computer and
6 peripheral equipment as capital expenses. In addition, they have to face C403.3 BTL 1
operational expenditure in operating and maintaining the computer
systems, including the human and service costs. The operational costs may
| DEPARTMENT OF CSE 26
CS6703 – GRID AND CLOUD COMPUTING
2018
increases sharply with larger number of users. Therefore, the total cost
escalates quickly with massive number of users. On the other hand, Cloud
computing applies a pay-per-use business model. User jobs are outsourced
to the datacenters. To use cloud, there is no out-front costs in acquiring
heavy machines. Only variable costs are experienced by cloud users.
Overall, cloud computing will reduce the computing costs significantly for
both small users and large enterprises.
| DEPARTMENT OF CSE 28
CS6703 – GRID AND CLOUD COMPUTING
2018
| DEPARTMENT OF CSE 30
CS6703 – GRID AND CLOUD COMPUTING
2018
memory and physical memory to machine memory.
What is meant by I/O Virtualization?
I/O virtualization involves managing the routing of I/O requests between
virtual devices and the shared physical hardware. I/O virtualization C403.3
28 BTL 1
technology allows a single physical adapter to be visualized as multiple
virtual network interface cards (vNICs) and virtual host bus adapters
(vHBAs).
Explain full device emulation method of I/O Virtualization?
C403.3
29 BTL 2
| DEPARTMENT OF CSE 31
CS6703 – GRID AND CLOUD COMPUTING
2018
devices, and others. The guest OS interacts with the VIFs via VIF device
drivers. Each VIF consists of two message queues. One is for outgoing
messages to the devices and the other is for incoming messages from the
devices. In addition, each VIF has a unique ID for identifying it in SV-IO
Define Virtual Hierarchy?
A virtual hierarchy is a cache hierarchy that can adapt to fit the workload
or mix of workloads. The hierarchy’s first level locates data blocks close to
the cores needing them for faster access, establishes a shared-cache
33 C403.3 BTL 1
domain, and establishes a point of coherence for faster communication.
When a miss leaves a tile, it first attempts to locate the block (or sharers)
within the first level. The first level can also provide isolation between
independent workloads. A miss at the L1 cache can invoke the L2 access.
Write short notes on virtual clusters?
Virtual clusters are built with virtual machines (VMs) installed at
34 distributed servers from one or more physical clusters. The VMs in a C403.3 BTL 1
virtual cluster are interconnected logically by a virtual network across
several physical networks.
List the steps to deploy a group of VMs onto a target cluster?
• Prepare the disk image.
35 • Configure the VMs . C403.3 BTL 1
• Choose destination nodes.
• Execute the VM deployment command on every host.
Define Data Center Automation?
Data-center automation means that huge volumes of hardware, software,
and database resources in these data centers can be allocated dynamically
36 C403.3 BTL 1
to millions of Internet users simultaneously, with guaranteed QoS and cost-
effectiveness. This automation process is triggered by the growth of
virtualization products and cloud computing services.
List the benefits of server virtualization?
• Consolidation enhances hardware utilization.
• This approach enables more agile provisioning and deployment of
37 C403.3 BTL 1
resources
• The total cost of ownership is reduced
• This approach improves availability and business continuity.
Write short notes on Virtualization-based intrusion detection?
Virtualization-based intrusion detection can isolate guest VMs on the same
hardware platform. Even some VMs can be invaded successfully; they
38 never influence other VMs, which is similar to the way in which a NIDS C403.3 BTL 1
operates. Furthermore, a VMM monitors and audits access requests for
hardware and system software. This can avoid fake actions and possess the
merit of a HIDS.
Mention the characteristic features of the cloud (Apr/May 2017)
39 C403.3 BTL 1
Summarize the difference between PaaS and SaaS (Apr/May 2017)
40 C403.3 BTL 1
41 List the requirements of VMM (Nov/Dec 2017) C403.3 BTL 1
| DEPARTMENT OF CSE 32
CS6703 – GRID AND CLOUD COMPUTING
2018
PART B
Blooms
S. Course
Question Taxonomy
No. Outcome
Level
List the Cloud deployment models and give a detail note about them.
(T1: pgs 192-196) (ND2016)
1 • Public C403.3 BTL 1
• Private
• Hybrid
Explain in detail about different type of service models in cloud
computing? (T1: pgs 200-205) (ND2016)
• IaaS
2 C403.3 BTL 2
• PaaS
• SaaS
3 Explain in detail about various levels of virtualization? (T1: pgs 130-133) C403.3 BTL 2
Explain in detail about binary translation with Full Virtualization? (T1: pgs
4 C403.3 BTL 2
141-143)
Explain in detail about Para-virtualization with compiler support? (T1: pgs
5 C403.3 BTL 2
143-144)
6 Explain in detail about CPU Virtualization? (T1: pgs 147-148) C403.3 BTL 2
Explain in detail about Virtual Cluster and Resource management? (T1:
7 C403.3 BTL 2
pgs 155-169)
Explain in detail about virtualization for Data-Center Automation? (T1:
8 C403.3 BTL 2
pgs 169-177)
Discuss how virtualization is implemented in different layers (Apr/May
9 C403.3 BTL 2
2017) (T1: pgs 130-133)
What do you mean by data center automation using virtualization
10 C403.3 BTL 1
(Apr/May 2017) (TB – Pg no: 169 -178)
Describe service and deployment models of cloud computing environment
11 with illustrations. How do they fit in NIST cloud architecture (Nov/Dec C403.3 BTL 2
2017) (TB – Pg no:192)
12 What is virtualization? Describe para and full virtualization. Compare and C403.3 BTL 2
| DEPARTMENT OF CSE 33
CS6703 – GRID AND CLOUD COMPUTING
2018
contrast them (Nov/Dec 2017) (TB – Pg no: 141 – 144)
With architecture, elaborate the various deployment models and reference
13 C403.3 BTL 2
models of cloud computing (Apr/May 2018) (TB – Pg no:192)
“Virtualization is the wave of the future”. Justify. Explicate the process of
14 CPU, memory and I/O device virtualization in data center. (Apr/May 2018) C403.3 BTL 2
(TB – Pg no:140)
| DEPARTMENT OF CSE 34
CS6703 – GRID AND CLOUD COMPUTING
2018
UNIT – IV - PROGRAMMING MODEL
Open source grid middleware packages – Globus Toolkit (GT4) Architecture , Configuration –
Usage of Globus – Main components and Programming model - Introduction to Hadoop
Framework - Mapreduce, Input splitting, map and reduce functions, specifying input and output
parameters, configuring and running a job – Design of Hadoop file system, HDFS concepts,
command line and java interface, dataflow of File read & File write.
PART A
Blooms
S. Course
Question Taxonomy
No. Outcome
Level
What are the functionalities of grid middleware?
Grid middleware is a specific software product, which enables the sharing
of heterogeneous resources, and Virtual Organizations. It is installed and
integrated into the existing infrastructure of the involved company or
1 companies, and provides a special layer placed among the heterogeneous C403.4 BTL 1
infrastructure and the specific user applications. Middleware glues the
allocated resources with specific user applications. Major grid middlewares
are Globus Toolkit, gLite, UNICORE, BONIC, CGSP, Condor-G and Sun
Grid Engine etc.
Define Utility Computing?
Utility computing is referred to as the provision of grid computing and
2 applications as service either as an open grid utility or as a hosting solution C403.4 BTL 1
for one organization or a VO(Virtual Organization). Major players in the
utility computing market are Sun Microsystems, IBM, and HP.
Write short notes on GT4?
The Globus Toolkit was initially motivated by a desire to remove obstacles
that prevent seamless collaboration, and thus sharing of resources and
3 C403.4 BTL 1
services, in scientific and engineering applications. The toolkit addresses
common problems and issues related to grid resource discovery,
management, communication, security, fault detection, and portability.
List the functional modules in Globus GT4 library? / Services offered
in GT4. (ND2016)
• GRAM (Global Resource Allocation Manager) – Grid resource
access and management.
• Nexus – used for unicast and multicast communication
• GSI (Grid Security Infrastructure) – Used for Authentication and
security.
4 C403.4 BTL 1
• MDS (Monitory and Discovery Service) – Distributed acces to
structure and state information.
• HBM (Heart Beat Monitor) – monitor heart beat of system
components.
• GASS (Global Access of Secondary Storage) – Grid access of data
in remote secondary storage.
• GridFTP (Grid File Transfer) – used for inter-node fast file
| DEPARTMENT OF CSE 35
CS6703 – GRID AND CLOUD COMPUTING
2018
transfer.
Define GridFTP?
• GridFTP is a high-performance, secure, reliable data transfer
protocol optimized for high-bandwidth wide-area networks.
5 • The GridFTP protocol is based on FTP, the highly-popular Internet C403.4 BTL 1
file transfer protocol.
• GridFTP adds additional features such as parallel data transfer,
third party data transfer and striped data transfer.
List the functional layers of GSI?
• Authorization
• Authentications
6 C403.4 BTL 1
• Delegation
• Message Protection
• Message Format
Explain the different types of GT4 Data management?
• Globus Toolkit 4 Data Management tools within the toolkit fall into
either of two categories data replication and data movement
7 C403.4 BTL 1
• Data Replication consists of Replica Location Service (RLS)
• Data Movement consists of GridFTP and Reliable File Transfer
(RFT)
Explain data replication in GT4?
Replica Location Service provides the capability to track and maintain
multiple locations of data across the grid. It is a distributed registry system
that allows users and applications to register the locations of data.
8 C403.4 BTL 1
| DEPARTMENT OF CSE 38
CS6703 – GRID AND CLOUD COMPUTING
2018
Write the syntax for deleting a file or directory in FileSystem?
Use the delete() method on FileSystem to permanently remove files or
directories:
24 public boolean delete(Path f, boolean recursive) throws IOException C403.4 BTL 1
If f is a file or an empty directory, then the value of recursive is ignored. A
nonempty directory is only deleted, along with its contents, if recursive is
true (otherwise an IOException is thrown).
Explain how a data can be made persistence and visible to all readers?
HDFS provides a method for forcing all buffers to be synchronized to the
datanodes via the sync() method on FSDataOutputStream. After a
successful return from sync(), HDFS guarantees that the data written up to
that point in the file is persisted and visible to all new readers.
25 Path p = new Path("p"); C403.4 BTL 1
FSDataOutputStream out = fs.create(p);
out.write("content".getBytes("UTF-8"));
out.flush();
out.sync();
assertThat(fs.getFileStatus(p).getLen(), is(((long) "content".length())));
Write short notes on MapReduce?
MapReduce model was introduced by Google as a method of solving a
class of petascale problems with large clusters of inexpensive machines.
The model is based on two distinct steps for an application:
26 C403.4 BTL 1
• Map: An initial ingestion and transformation step, in which
individual input records can be processed in parallel.
• Reduce: An aggregation or summarization step, in which all
associated records must be processed together by a single entity.
Write short notes on Hadoop?
Hadoop is the Apache Software Foundation top-level project that holds the
various Hadoop subprojects that graduated from the Apache Incubator. The
27 Hadoop project provides and supports the development of open source C403.4 BTL 1
software that supplies a framework for the development of highly scalable
distributed computing applications. The Hadoop framework handles the
processing details, leaving developers free to focus on application logic.
Explain Input Splitting in Mapreduce?
For the framework to be able to distribute pieces of the job to multiple
28 machines, it needs to fragment the input into individual pieces, which can C403.4 BTL 1
in turn be provided as input to the individual distributed tasks. Each
fragment of input is called an input split.
Write short notes on IdentityMapper?
It is used in jobs that only need to reduce the input, and not transform the
raw input.
public class IdentityMapper<K, V>extends MapReduceBase implements
29 C403.4 BTL 1
Mapper<K, V, K, V> {
public void map(K key, V val,
OutputCollector<K, V> output, Reporter reporter)throws IOException {
output.collect(key, val);
| DEPARTMENT OF CSE 39
CS6703 – GRID AND CLOUD COMPUTING
2018
}}
The line output.collect(key, val), which passes a key/value pair back to the
framework for further processing.
Write short notes on IdentityReducer?
The Hadoop framework calls the reduce function one time for each unique
key. The framework provides the key and the set of values that share that
key. IdentityReducer produces one output record for every value.
public class IdentityReducer<K, V>extends MapReduceBase implements
Reducer<K, V, K, V> {
30 public void reduce(K key, Iterator<V> values, C403.4 BTL 1
OutputCollector<K, V> output, Reporter reporter)
throws IOException {
while (values.hasNext()) {
output.collect(key, values.next());
}}
The line output.collect() writes all keys and values directly to output
List the available input formats in Hadoop framework?
• KeyValueTextInputFormat: Key/value pairs, one per line.
• TextInputFormant: The key is the line number, and the value is
the line.
• NLineInputFormat: Similar to KeyValueTextInputFormat, but the
31 splits are based on N lines of input rather than Y bytes of input. C403.4 BTL 1
• MultiFileInputFormat: An abstract class that lets the user
implement an input format that aggregates multiple files into one
split.
• SequenceFIleInputFormat: The input file is a Hadoop sequence
file, containing serialized key/value pairs.
Explain how to configuration the output of a MapReduce job?
FileOutputFormat.setOutputPath(conf,
MapReduceIntroConfig.getOutputDirectory());
conf.setOutputKeyClass(Text.class);
32 C403.4 BTL 1
conf.setOutputValueClass(Text.class);
The conf.setOutputKeyClass(Text.class) and
conf.setOutputValueClass(Text.class) settings inform the framework of the
types of the key/value pairs to expect for the reduce phase.
What are the information required to configure the reduce phase?
• The number of reduce tasks; if zero, no reduce phase is run
• The class supplying the reduce method
33 • The input key and value types for the reduce task; by default, the C403.4 BTL 1
same as the reduce output
• The output key and value types for the reduce task
• The output file type for the reduce task output
How to run a job in MapReduce?
logger .info("Launching the job.");
34 C403.4 BTL 1
final RunningJob job = JobClient.runJob(conf);
logger.info("The job has completed.");
| DEPARTMENT OF CSE 40
CS6703 – GRID AND CLOUD COMPUTING
2018
The method runJob() submits the configuration information to the
framework and waits for the framework to finish running the job. The
response is provided in the job object
Write the significant of GRAM (Apr/May 2017)
PART B
Blooms
S. Course
No.
Question Taxonomy
Outcome
Level
1 Explain in detail about Globus Toolkit GT4? (T1: Pgs 446-450) (ND2016) C403.4 BTL 1
2 Give a detailed note on Hadoop Framework. (Ref. Notes) (ND2016) C403.4 BTL 1
3 Explain in detail about parts of Hadoop MapReduce job? (R1: Pgs 27-31) C403.4 BTL 1
4 Explain in detail about map and reduce functions? (R1: Pgs 31-35) C403.4 BTL 1
5 How to configure and run a job in Hadoop MapReduce? (R1: Pgs 36-55) C403.4 BTL 1
Explain in detail about command line interface and java interface in
6 C403.4 BTL 1
HDFS? (R2: Pgs 45-46,51-62)
7 Explain the anatomy of File Read and File Write? (R2: Pgs 62-69) C403.4 BTL 1
Discuss Map reduce with suitable diagrams (Apr/May 2017) (R1: Pgs 31-
8 C403.4 BTL 1
35)
9 Elaborate HDFS concepts with suitable illustrations (Apr/May 2017) C403.4 BTL 1
Illustrate data flow in HDFS with file read/write operations with suitable
10 C403.4 BTL 1
diagrams (Nov/Dec 2017)
What is GT4? Describe in detail the components of GT4 with a suitable
11 C403.4 BTL 1
diagram (Nov/Dec 2017) (T1: Pgs 446-450)
12 List the characteristics of globus toolkit. With neat sketch describe the C403.4 BTL 1
| DEPARTMENT OF CSE 42
CS6703 – GRID AND CLOUD COMPUTING
2018
architecture of globus GT4 and the services offered (Apr/May 2018) (T1:
Pgs 446-450)
With an illustration, Emphasize the significance of map reduce paradigm
in Hadoop framework. List out the assumptions and goal sets in HDFS
13 C403.4 BTL 1
architecture for processing the data based on divide and conquer strategy
(Apr/May 2018) (R1: Pgs 31-35)
| DEPARTMENT OF CSE 43
CS6703 – GRID AND CLOUD COMPUTING
2018
UNIT – V – SECURITY
Trust models for Grid security environment – Authentication and Authorization methods – Grid
security infrastructure – Cloud Infrastructure security: network, host and application level –
aspects of data security, provider data and its security, Identity and access management
architecture, IAM practices in the cloud, SaaS, PaaS, IaaS availability in the cloud, Key privacy
issues in the cloud.
PART A
Blooms
S. Course
Question Taxonomy
No. Outcome
Level
Discuss on the application and use of identity and access management.
(ND2016)
Identity management, also known as identity and access
management (IAM) is, in computer security,
1 the security and business discipline that "enables the right individuals to C403.5 BTL 6
access the right resources at the right times and for the right reasons". It
addresses the need to ensure appropriate access to resources across
increasingly heterogeneous technology environments and to meet
increasingly rigorous compliance requirements.
| DEPARTMENT OF CSE 44
CS6703 – GRID AND CLOUD COMPUTING
2018
Assurance: Being confident that the security system functions correctly
Non-repudiation: Ensuring that a user cannot deny an action;
Auditability: Tracking what a user did to data or a service.
Define ACL
Access Control Lists (ACL) associated with files or directories. ACLs are
6 files listing individuals authorized to login to an account (e.g. the UNIX C403.5 BTL 1
.rhosts file), configuration files naming authorized users of a node and
sometimes files read over the network.
Define delegation
Delegation is a means by which a user or process authorized to perform an
7 C403.5 BTL 1
operation can grant the authority to perform that operation to another
process. Delegation can be used to implement distributed authorization
List out the use of Assurance mechanism
Assurance mechanisms allow the requester of a service to decide whether a
8 candidate service provider meets the requesters’ requirements for security, C403.5 BTL 1
trustworthiness, reliability or other characteristics. Assurance mechanisms
can be implemented through certificates
Define Nonrepudiation and Audiability
Nonrepudiation means that it can be verified that the sender and the
recipient were, in fact, the parties who claimed to send or receive the
9 message, respectively. Auditability is about keeping track of what is C403.5 BTL 1
happening on a system. The idea is that if there is an intrusion, then the
system operator can find out exactly what has been done and in whose
name.
| DEPARTMENT OF CSE 45
CS6703 – GRID AND CLOUD COMPUTING
2018
Define Data Encryption Standard and its two components
Data Encryption Standard (DES) DES consists of two components – an
algorithm and a key. The DES algorithm involves a number of iterations of
13 a simple transformation which uses both transposition and substitution C403.5 BTL 1
techniques applied alternately. DES is a so-called private-key cipher; here
data is encrypted and decrypted with the same key. Both sender and
receiver must keep the key a secret from others.
What are the challenges of grid sites
• The first challenge is integration with existing systems and
technologies.
14 • The second challenge is interoperability with different hosting C403.5 BTL 1
environments.
• The third challenge is to construct trust relationships among
interacting hosting environments.
Define Reputation-Based Trust Model
In a reputation-based model, jobs are sent to a resource site only when the
15 site is trustworthy to meet users’ demands. The site trustworthiness is C403.5 BTL 1
usually calculated from the following information: the defense capability,
direct reputation, and recommendation trust.
Define direct reputation
Direct reputation is based on experiences of prior jobs previously
submitted to the site. The reputation is measured by many factors such as
16 prior job execution success rate, cumulative site utilization, job turnaround C403.5 BTL 1
time, job slowdown ratio, and so on. A positive experience associated with
a site will improve its reputation. On the contrary, a negative experience
with a site will decrease its reputation.
What are the major authentication methods in the grid?
The major authentication methods in the grid include passwords, PKI, and
17 Kerberos. The password is the simplest method to identify users, but the C403.5 BTL 1
most vulnerable one to use. The PKI is the most popular method supported
by GSI.
List the types of authority in grid
The authority can be classified into three categories: attribute authorities,
policy authorities, and identity authorities. Attribute authorities issue
18 C403.5 BTL 1
attribute assertions; policy authorities issue authorization policies; identity
authorities issue certificates. The authorization server makes the final
authorization decision.
Define grid security infrastructure
The Grid Security Infrastructure (GSI), formerly called the Globus
Security Infrastructure, is a specification for secret, tamper-proof,
19 C403.5 BTL 1
delegatable communication between software in a grid computing
environment. Secure, authenticatable communication is enabled using
asymmetric encryption.
What are the functions present in GSI
20 GSI may be thought of as being composed of four distinct functions: C403.5 BTL 1
message protection, authentication, delegation, and authorization.
| DEPARTMENT OF CSE 46
CS6703 – GRID AND CLOUD COMPUTING
2018
List the protection mechanisms in GSI
GSI allows three additional protection mechanisms. The first is integrity
protection, by which a receiver can verify that messages were not altered in
21 C403.5 BTL 1
transit from the sender. The second is encryption, by which messages can
be protected to provide confidentiality. The third is replay prevention, by
which a receiver can verify that it has not.
What is the primary information of GSI
GSI authentication, a certificate includes four primary pieces of
information:
• A subject name, which identifies the person or object that the
22 certificate represents; C403.5 BTL 1
• The public key belonging to the subject;
• The identity of a CA that has signed the certificate to certify that
the public key and the identity both belong to the subject;
• The digital signature of the named CA.
Define blue pill
The blue pill is malware that executes as a hypervisor to gain control of
23 computer resources. The hypervisor installs without requiring a restart and C403.5 BTL 1
the computer functions normally, without degradation of speed or services,
which makes detection difficult.
What are the host security threats in public IaaS
• Stealing keys used to access and manage hosts (e.g., SSH private
keys)
• Attacking unpatched, vulnerable services listening on standard
ports (e.g., FTP, SSH)
24 C403.5 BTL 1
• Hijacking accounts that are not properly secured (i.e., no passwords
for standard accounts)
• Attacking systems that are not properly secured by host firewalls
• Deploying Trojans embedded in the software component in the VM
or within the VM image (the OS) itself
List the Public Cloud Security Limitations
There are limitations to the public cloud when it comes to support for
custom security features. Security requirements such as an application
firewall, SSL accelerator, cryptography, or rights management using a
25 C403.5 BTL 1
device that supports PKCS 12 are not supported in a public SaaS, PaaS, or
IaaS cloud. Any mitigation controls that require deploymentof an appliance
or locally attached peripheral devices in the public IaaS/PaaS cloud are not
feasible.
Define Data lineage
Data lineage is defined as a data life cycle that includes the data's origins
26 and where it moves over time. It describes what happens to data as it goes C403.5 BTL 1
through diverse processes. It helps provide visibility into the analytics
pipeline and simplifies tracing errors back to their sources.
Define Data remanence
27 C403.5 BTL 1
Data remanence is the residual representation of data that has been in some
| DEPARTMENT OF CSE 47
CS6703 – GRID AND CLOUD COMPUTING
2018
way nominally erased or removed.
What are the IAM processes operational activities.
• Provisioning
• Credential and attribute management
28 C403.5 BTL 1
• Entitlement management
• Compliance management
• Identity federation management
What are the functions of Cloud identity administrative
Cloud identity administrative functions should focus on life cycle
management of user identities in the cloud—provisioning, deprovisioning,
29 identity federation, SSO, password or credentials management, profile C403.5 BTL 1
management, and administrative management. Organizations that are not
capable of supporting federation should explore cloud-based identity
management services.
List the factors to manage the IaaS virtual infrastructure in the cloud
• Availability of a CSP network, host, storage, and support
application infrastructure.
• Availability of your virtual servers and the attached storage
(persistent and ephemeral) for compute services
30 C403.5 BTL 1
• Availability of virtual storage that your users and virtual server
depend on for storage Service
• Availability of your network connectivity to the Internet or virtual
network connectivity to IaaS services.
• Availability of network services
What is meant by the terms data-in-transit
It is the process of the transfer of the data between all of the versions of the
31 C403.5 BTL 1
original file, especially when data may be in transit on the Internet. It is
data that is exiting the network via email, web, or other Internet protocols.
List the IAM process business category
• User management
• Authentication management
32 • Authorization management C403.5 BTL 1
• Access management
• Data management and provisioning
• Monitoring and auditing
What are the key components of IAM automation process?
• User Management, New Users
33 • User Management, User Modifications C403.5 BTL 1
• Authentication Management
• Authorization Management
List out the key policy issues
Data security involves encrypting the data as well as ensuring that
34 appropriate policies are enforced for data sharing. In addition, resource C403.5 BTL 1
allocation and memory management algorithm s have to be secure. Finally,
data mining techniques may be applicable for malware detection in the
| DEPARTMENT OF CSE 48
CS6703 – GRID AND CLOUD COMPUTING
2018
clouds – an approach which is usually adopted in intrusion detection
systems (IDSs)
List out the six specific areas of the cloud computing environment
There are six specific areas of the cloud computing environment where
equipment and software require substantial security attention These six
35 areas are: (1) security of data at rest, (2) security of data in transit, (3) C403.5 BTL 1
authentication of users/applications/ processes, (4) robust separation n
between data belonging to different customers, (5 ) cloud legal and
regulatory issues, and (6) incident response
Mention the issues in security of cloud computing
• The types of attackers and their capability of attacking the cloud.
36 • The security risks associated with the cloud, and where relevant C403.5 BTL 1
considerations of attacks and countermeasures.
• Emerging cloud security risks
Define Network Level Security.
All data on the network need to be secured. Strong network traffic
encryption techniques such as Secure Socket Layer (SSL) and the
Transport Layer Security (TLS) can be used to prevent leakage of sensitive
37 information. Several key security elements such as data security, data C403.5 BTL 1
integrity, authentication and authorization, data confidentiality, web
application security, virtualization vulnerability, availability, backup, and
data breaches should be carefully considered to keep the cloud up and
running continuously.
| DEPARTMENT OF CSE 49
CS6703 – GRID AND CLOUD COMPUTING
2018
● Programmatic management through API of Web services
● Increased mobility - information is accessed from any location
Mention the foundational infrastructure requirements for cloud
computing security
The foundational infrastructure for a cloud must be inherently secure
whether it is a private or public cloud or whether the service is SAAS,
41 PAAS or IAAS. It will require C403.5 BTL 1
• Inherent component-level security
• Stronger interface security
• Resource lifecycle management
46 List any four host security threads in public IaaS (ND2017) C403.5 BTL 1
| DEPARTMENT OF CSE 50
CS6703 – GRID AND CLOUD COMPUTING
2018
PART-B
Blooms
S. Course
No.
Question Taxonomy
Outcome
Level
Explain in detail about Trust models for Grid security environment. (TB –
1 C403.5 BTL 1
Pg no: 461 – 463) (ND2016)
Briefly write a note on Authentication and Authorization methods Refer
2 C403.5 BTL 1
Notes
Draw the neat architecture of Grid security infrastructure (TB – Pg no:
3 C403.5 BTL 6
466 – 470) (ND2016)
Explain the different level of Cloud Infrastructure security: network, host
4 C403.5 BTL 1
and application level Refer Notes
Briefly discuss on Identity and access management architecture with neat
5 architecture C403.5 BTL 6
SaaS, PaaS, IaaS availability in the cloud, Refer Notes
Illustrate the Key privacy issues in the cloud computing environment.
6 C403.5 BTL 2
Refer Notes
Explain trust model for grid security environment (Nov/Dec 2016) (TB –
7 C403.5 BTL 1
Pg no: 461 – 463)
8 Write in detail about cloud security infrastructures (Nov/Dec 2016) C403.5 BTL 2
Write a detailed note on identity and access management architecture
9 C403.5 BTL 2
(Apr/May 2017) Refer Notes
Explain grid security infrastructure (Apr/May 2017) (TB – Pg no: 466 –
10 C403.5 BTL 1
470)
What is the purpose of GSI? Describe the functionality of various layers in
11 C403.5 BTL 1
GSI. (ND2017) (TB – Pg no: 466 – 470)
What is the purpose of IAM? Describe its functional architecture with an
12 C403.5 BTL 1
illustration. (ND2017) Refer Notes
| DEPARTMENT OF CSE 51