Sie sind auf Seite 1von 11


SRM Nagar, Kattankulathur – 603 203



CP5092 – Cloud Computing Technologies
Regulation – 2017
Academic Year 2018 – 19

Prepared by
Dr. V. Dhanakoti, Associate Professor/CSE


SRM Nagar, Kattankulathur – 603203.


Year & Semester : II

Section : CSE
Subject Code : CP5092
Subject Name : Cloud Computing Technologies
Degree & Branch : M.E & CSE
Staff in charge : Dr.V.Dhanakoti


Basics of Virtual Machines - Process Virtual Machines – System Virtual Machines –Emulation – Interpretation – Binary
Translation - Taxonomy of Virtual Machines. Virtualization –Management Virtualization –– Hardware Maximization –
Architectures – Virtualization Management – Storage Virtualization – Network Virtualization

1 What is the role of Host OS and Guest OS in cloud computing? BTL1 Remember
2 Define high performance virtual storage. BTL1 Remember
3 Can you point out the requirements of VMM? BTL4 Analyze
4 Give your interpret virtualization at operating system level? BTL2 Understand
5 What are the disadvantages of OS extension? BTL1 Remember
6 Plan what information you use to support the view of full and para- BTL6 Create
7 Classify the levels of virtualization. BTL4 Analyze
8 Generalize the general functions of VMM? BTL6 Create
9 Can you assess the importance of trust management in cloud computing? BTL5 Evaluate
10 How would you decide category of the resource managers? BTL5 Evaluate
11 Can you list the relative merits of virtualization at various levels? BTL1 Remember
12 Describe the main idea of file system migration and network migration? BTL2 Understand
13 How do you partition a single physical cluster into multiple virtual BTL1 Remember
14 Examine what approach would you use for live VM migration? BTL3 Apply
15 How would you show your understanding of virtual machine monitor? BTL3 Apply
16 Can you differentiate physical cluster and virtual cluster? BTL4 Analyze
17 How would you organize the hardware to show virtualization? BTL3 Apply
18 Discuss about CPU, memory and I/O virtualization. BTL2 Understand
19 How is virtualization implemented at user level? BTL1 Remember
20 Describe host based virtualization? BTL2 Understand
1 i). Discuss the architecture of a computer system before and after BTL1 Remember
virtualization. (7)
ii). How would you describe virtualization implemented at the different
levels? (6)

2 i). Demonstrate Hypervisor and Xen architecture. (7) BTL3 Applying
ii). Illustrate the binary translation with full virtualization. (6)
i i). Analyze what is Para-virtualization with compiler support. (7) BTL4 Analyze
ii). Explain VMware ESX server for Para-virtualization. (6)
4 What is the main idea of including trust management in virtual clusters? BTL2 Understand
5 i). Analyze the features of virtualization supported in multi core BTL4 Analyze
processor? (7)
ii). Point out some of the pitfalls that come with virtualization. (6)
6 i). Define virtualization at O.S level. List the pros and cons of OS level BTL1 Remember
virtualization. (7)
ii). Describe middleware support for virtualization (6)
7 i). Demonstrate how extended page table can be used by Intel for BTL3 Apply
memory virtualization. (7)
ii). Demonstrate VMware workstation for I/O virtualization in sending
and receiving network packets. (6)
8 Evaluate why dynamic deployment of virtual clusters is relevant in BTL5 Evaluate
today’s computing environment? (13)
9 i). Can you explain the different tools and mechanisms needed for BTL4 Analyze
virtualization? (7)
ii). What steps can you find to explain live VM migration and its
performance effects? (6)
10 How would you formulate the ideas of virtualization for the following: BTL6 Create
i). CPU and Memory virtualization (7)
ii). I/O virtualization and multi-core processors. (6)
11 i). Can you describe physical versus virtual clusters? (7) BTL1 Remember
ii). List the migration steps of VM and describe performance effects of
VM (6)
12 i). Summarize the server consolidation in data centers. (7) BTL2 Understand
ii). Describe virtual storage management. (6)
13 i). Describe Cloud OS for virtualized data centers. (7) BTL1 Remember
ii). Describe VMware cSphere 4 as a commercial cloud OS. (6)
14 i). Analyze trust management in virtualized data centers. (7) BTL2 Analyze
ii). Explain with example of trusted zones for protection of virtual
clusters provided to multiple tenants. (6)
1 Explain the differences between hypervisor and para-virtualization and BTL6 Create
give one example VMM (virtual machine monitor), that was developed
in each of the two categories?
2 The Cluster-on-Demand (COD) Project developed by researchers at BTL4 Analyze
Duke University, is a virtual cluster management system for dynamic
allocation of servers from a computing pool to multiple virtual clusters.
Analyze the COD for advance resource management and virtualization.
3 For cloud computing service providers, consider: BTL5 Evaluate
i) Is the virtualization platform readily able to accept existing virtual
machines from enterprise customers migrating existing resources to our
cloud environments? (8)

ii) How do we help customers meet zoning and segregation requirements
on resources in cloud environments, while maintaining lowest total cost
of ownership by maximizing the benefits of fully-shared virtual
resources? (7)
4 Integrate the enabling technologies for building the cloud platforms BTL6 Create
from virtualized and automated data centers to provide services. Identify
hardware, software, and networking mechanisms or business models that
enable multitenant services
Comprehensive Analysis – Resource Pool – Testing Environment –Server Virtualization – Virtual Workloads – Provision
Virtual Machines – Desktop Virtualization – Application Virtualization - Implementation levels of virtualization –
virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management –
Virtualization for data center automation.
1 What is self service provisioning? BTL1 Remember
2 Differentiate centralized and distributed computing. BTL2 Understand
3 Define storage level of virtualization? BTL1 Remember
4 Define hardware virtualization. BTL1 Remember
5 Generalize what would be the result if cloning is done at VM level? BTL6 Create
6 Show the levels of virtualization implementation. BTL3 Apply
7 Discuss the design requirements of VMM. BTL2 Understand
8 Analyze the advantages and disadvantages of OS extensions. BTL4 Analyze
9 How does the virtualization Support the Linux platform? BTL5 Evaluate
10 Compare binary translation with full virtualization. BTL4 Analyze
11 Demonstrate the need of virtualization need of multi-core processor. BTL3 Apply
12 Discuss the design issues of virtual clusters. BTL2 Understand
13 List the properties of Virtual clusters when virtual machines are
BTL1 Remember
dynamically allocated.
14 Define ISR. BTL1 Remember
15 Give the role of a VM. BTL2 Understand
16 How the data storage is classified in virtual environment? BTL3 Apply
17 Formulate the side effects of server virtualization. BTL6 Create
18 Where OS level virtualization is needed? BTL1 Remember
19 Discuss on the support of middleware for virtualization. BTL5 Evaluate
20 Why do we need a hybrid cloud? BTL4 Analyze
1 i)Examine in detail about Resource Pool (7)
BTL1 Remember
ii)Examine in detail about Testing Environment (7)
2 Analyze the uses of i) Server Virtualization (7)
BTL4 Analyze
ii) Virtual Workloads (6)
3 i) Discuss the various levels of virtualization implementation(7)
BTL2 Understand
ii) Summarize the design requirements and providers of VMM. (6)
4 i) List the advantages and disadvantages of OS extension in
virtualization. (7) BTL1 Remember
ii) Identify the support of virtualization Linux platform. (6)
5 i) Summarize the support of middleware and library for BTL2 Understand

virtualization. (7)
ii) Describe the vCUDA architecture for virtualization of
general purpose GPUs (6)
6 i) Compose in detail about Provision Virtual Machine. (7)
ii) Design the implementation technology of Desktop Virtualization (6) BTL6 Create

7 i) Illustrate in detail about the compiler support for para

virtualization architecture. (7)
BTL3 Apply
ii) Examine in detail about hardware support for virtualization and
CPU virtualization. (6)
8 i) Point out the importance of memory virtualization. (7)
BTL4 Analyze
ii) Explain in detail about the need of IO virtualization. (6)
9 Examine the need of virtualization in multi core processor. (13) BTL1 Remember
10 i) Give the importance of cloud computing and elaborate the
different types of services offered by it. (7)
BTL2 Understand
ii) Discuss fast deployment, effective scheduling and high
performance virtual storage in detail. (6)
11 Illustrate the migration steps and performance effects involved in
BTL3 Apply
live VM. (13)
12 i) Explain the migration of memory, files and network
resources in detail. (7) BTL4 Analyze
ii) Analyze the dynamic deployment of virtual clusters in detail. (6)
13 i) How server consolidation is supported in data center? (7)
ii) How will you explain the need of virtual storage BTL5 Evaluate
management in data center? (6)
14 i) Define the need of need of cloud OS in virtualized data
centres. (7)
BTL1 Remember
ii) List the cloud deployment models and give a detailed note about
them. (6)
1 Formulate through various examples, identify three basic computing BTL6 Create
models, which are widely exploited in distributed environments:
i) Highly parallel applications (bag of tags) (5)
ii). Tightly coupled applications (5)
iii). Scientific workflows (5)
2 Compare the similarities and differences between traditional computing BTL5 Evaluate
clusters/grids and the computing clouds launched in recent years.
Consider all technical and economic aspects as listed below.
Answer the following questions against real example systems or platforms
built in recent years. Also discuss the possible convergence of the two
computing paradigms in the future.
Hardware, software, and networking support , Resource allocation and
provisioning methods, Infrastructure management and protection,
Support of utility computing services and Operational and cost models
3 Research Amoeba, DCE, and MOSIX recent developments and their BTL6 Create
impact on applications in clusters, grids, and clouds. Generalize the

suitability of each system in its commercial or experimental distributed
applications. Also discuss each system’s limitations and explain why
they were not successful as commercial systems?
4 Identify two cloud providers by company name in each service category. BTL4 Analyze
Briefly explain each of the following cloud computing services.
Application cloud services, Platform cloud services, Compute and
storage services, Collocation cloud services & Network cloud services
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service:
Infrastructure, platform, software- A Generic Cloud Architecture Design – Layered cloud Architectural Development –
Virtualization Support and Disaster Recovery – Architectural Design Challenges - Public Cloud Platforms : GAE,AWS –
Inter-cloud Resource Management.
1 What information would you use to generalize the view of cloud over BTL6 Create
traditional data centers?
2 Analyze is provisioning important in compute resources? BTL4 Analyze
3 List the main characteristics of a generic cloud. BTL1 Remember
4 List the QoS factors applicable in cloud? BTL1 Remember
5 Define public private and hybrid clouds. BTL1 Remember
6 Describe software stack? BTL2 Understand
7 How would you classify the cloud enabling technologies? BTL4 Analyze
8 Express platforms which are used for large scale cloud computing? BTL2 Understand
9 Relate the approach would you use to deploy models in cloud BTL3 Apply
10 Define IaaS. BTL1 Remember
11 Illustrate on PaaS and SaaS. BTL3 Apply
12 Define the services provided in cloud during runtime. BTL1 Remember
13 Describe dynamic resource deployment? BTL2 Understand
14 Show the examples you find for large cloud providers and databases? BTL3 Apply
15 Analyze the relationship between “EUCALYPTUS” and cloud BTL4 Analyze
16 Describe the design objective of cloud. BTL2 Understand
17 Which of the open source cloud computing platform databases are BTL1 Remember
popular today?
18 Can you assess different layers which define cloud architecture? BTL5 Evaluate
19 How would you plan the use of resources in IaaS? BTL6 Create
20 Assess the function of resource management in cloud? BTL5 Evaluate
1 i). Formulate a generic cloud architecture design for compute and BTL6 Create
storage clouds (7)
ii). Design a layered cloud architectural development. (6)
2 i). Summarize the requirements and benefits of cloud enabling BTL2 Understand
technologies in hardware, software and networking. (7)
ii). Describe about market oriented cloud architecture. (6)
3 i). Explain virtualization support and disaster recovery for compute and BTL4 Analyze
storage clouds (7)

ii). Analyze architectural design challenges of compute and storage
clouds. (6)
4 i). Can you assess the importance of quality of service (QoS) monitoring BTL5 Evaluate
in a cloud computing? (7)
ii). Summarize the different issues in inter-cloud environments. (6)
5 i). Analyze various resource provisioning methods (7) BTL4 Analyze
ii). Explain what is virtual machine creation and management. (6)
6 i). Illustrate extended cloud computing services in inter-cloud resource BTL3 Apply
management. (7)
ii). Demonstrate Global exchange of cloud resources. (6)
7 Summarize the following terms in cloud computing environment. BTL2 Understand
i). Service availability and data lock-in problem. (2)
ii). Data privacy and security concerns. (2)
iii). Unpredictable performance and bottlenecks. (2)
iv). Distributed storage and widespread software bugs. (2)
v). Cloud scalability, interoperability and standardization. (3)
vi). Software licensing and reputation sharing. (2)
8 Describe how the inter-cloud resource management in cloud BTL1 Remember
environment? (13)
9 i). Demonstrate what approaches you would use to store resources in BTL3 Apply
cloud. (7)
ii). Demonstrate the function of provisioning in cloud storage
10 i). Discuss about the service tasks and trends in cloud. (7) BTL2 Understand
ii). Discuss about provisioning of computer resources (VMs). (6)
11 i). Examine how would you show the layered cloud architectural BTL1 Remember
development? (7)
ii). Describe quality of service factors of layered cloud architectural
development. (6)
12 i). Describe how global exchange of cloud resources implemented in BTL1 Remember
cloud. (7)
ii). Sketch and label the high-level components of inter cloud exchange
of cloud resources through brokering. (6)
13 Explain in detail about cloud resource deployment using an IGG to BTL4 Analyze
allocate the VMs from a local cluster to interact with the IGG of a public
cloud provider. (13)
14 How would you describe the cloud architecture with suitable block BTL1 Remember
diagram? (13)
1 Consider there are three different cloud services that are offered by BTL6 Create
different vendors. Assume there is a need to coordinate the activity of
the clouds. Plan how the cloud resources are managed between them
and how resilient they are to the failures?
2 Suggest two hardware mechanisms and software schemes to secure the BTL4 Analyze
application cloud, the infrastructure cloud and platform cloud. Explain
their specific requirements and limitations that may be encountered.

3 Generalize the major advantages of using virtualized resources in cloud BTL6 Create
computing applications. Consider resource management issues from the
provider’s perspective and the application flexibility, cost-effectiveness,
and dependability concerns by cloud users.
4 Case Study: Cloud as Infrastructure for an Internet Data Center. BTL5 Evaluate
Evaluate the Value Comparison on Co-Location, Physical Server
Renting, and IaaS for Providers.
Introduction to Hadoop Framework - Mapreduce, Input splitting, map and reduce functions, specifying input and output
parameters, configuring and running a job –Developing Map Reduce Applications - Design of Hadoop file system –Setting
up Hadoop Cluster - Cloud Software Environments -Eucalyptus, Open Nebula, Open Stack, Nimbus.
1 Analyze on grid software support and middleware packages. BTL4 Analyze
2 Define condor. BTL1 Remember
3 Examine the sequences of events of SGE workflow. BTL3 Apply
4 Summarize on Globus toolkit architecture. BTL2 Understand
5 List the functional modules in GT4 library. BTL1 Remember
6 Formulate how data’s are managed using GT4? BTL6 Create
7 Define Globus container. BTL1 Remember
8 Analyze the need of MDS services in distributed system. BTL4 Analyze
9 Illustrate the building blocks in CGSP library BTL3 Apply
10 List the security measures in grid. BTL1 Remember
11 Evaluate why is a Block in HDFS So Large? BTL5 Evaluate
12 Differentiate name node with data node in hadoop file system. BTL2 Understand
13 Interpret how file permission is achieved in HDFS? BTL2 Understand
14 Generalize how a name node is not able to serve a request. BTL6 Create
15 Analyze how a standby takes over when a active name node is
BTL4 Analyze
16 What are the advantages of using Hadoop? BTL1 Remember
17 Explain as to how as FUSE interface is done. BTL5 Evaluate
18 Discuss how a data is read from hadoop URL. BTL2 Understand
19 Name any four services offered in GT4. BTL1 Remember
20 Demonstrate how does the namenode choose which datanodes
BTL3 Apply
to store replicas on?
1 Describe the relative strength and limitation of open source
BTL1 Remember
grid middleware packages (13)
2 i) List the features in condor kernel and condor G for grid
computing(7) BTL1 Remember
ii) Describe sun grid engine middleware package in detail. (6)
3 i) Summarize the grid standards and APIs. (7)
BTL2 Understand
ii) Discuss on grid software support and middleware package.(6)
4 i) Illustrate Globus tool kit architecture in detail. (7)
BTL3 Apply
ii) Classify the functional modules in GT4 library. (6)
5 i) Explain the concepts involved in resource management
BTL4 Analyze
using GRAM. (7)

ii) Classify the GT4 tools used by data management (6)
6 i) Evaluate the interaction in the functional module client
globus job work flow. (7) BTL5 Evaluate
ii) Summarize the functional components in CGSP library. (6)
7 i) Generalize the functional components of china grid support
platform library. (7)
BTL6 Create
ii) Design the functional building blocks in the CGSP library
that represents the job executional flow. (6)
8 i) Describe the usage of Open Nebula tool kit. (7)
BTL1 Remember
ii) Define hadoop and examine the features of it. (6)
9 i) Discuss in detail about mapreduce functionalities. (7)
BTL2 Understand
ii) Express in detail about the phases of map and reduce. (6)
10 i) Classify the various ways in input splitting of map reduce.(7)
BTL3 Apply
ii) Show how will you prevent input splitting in map reduce (6)
11 i) Explain the design hadoop file system. (7)
BTL4 Analyze
ii) Draw and explain the global toolkit architecture. (6)
12 i) Examine the basic file system operation in hadoop. (7)
BTL1 Remember
ii) Tabulate the hadoop file system in detail. (6)
13 Give a detailed note on Hadoop framework (13) BTL2 Understand
14 Explain in detail about the anatomy of file read and file write.(13) BTL4 Analyze
1 Compare and analyze which one of the following cloud solutions BTL4 Analyze
best suited for research purpose.
i) Eucalyptus (5)
ii) Open Nebula (5)
iii) Aneka Justify your answers (5)
2 Using a thread programming model supported in Aneka, develop BTL6 Create
a program for parallel multiplication of two very large square
3 Case Study—Cloud Computing for Software Parks. Summarize BTL5 Evaluate
with a schematic diagram the relationship between the cloud
computing platform and software outsourcing ecosystems.
4 Using the iterative MapReduce programming model, design the BTL6 Create
K-means algorithm with Twister
Cloud Infrastructure security: network, host and application level – aspects of data security, provider data and its security,
Identity and access management architecture, IAM practices in the cloud, SaaS, PaaS, IaaS availability in the cloud - Key
privacy issues in the cloud –Cloud Security and Trust Management.
1 Give the challenges to establish trust among Cloud sites. BTL2 Understand
2 Define IDS. BTL1 Remember
3 Summarize on reputation trust model. BTL2 Understand
4 List the steps to accomplish fuzzy interference. BTL1 Remember
5 Relate authentication and authorization methods in Cloud
BTL3 Apply
6 Evaluate the authorization model of Cloud security BTL5 Evaluate

7 Define trust delegation chain BTL1 Remember
8 Formulate the categories of authorization for access control. BTL6 Create
9 Discuss on GSI. BTL2 Understand
10 Differentiate transport level security and message level
BTL4 Analyze
11 Compose the primary pieces of information of a certificate in
BTL6 Create
Cloud authentication.
12 How will you measure the mutual authentication between two
BTL5 Evaluate
13 Illustrate the sequence of trust delegation. BTL3 Apply
14 Discuss on the application and use of identity and access
BTL2 Understand
15 Tabulate the security levels at the network level. BTL1 Remember
16 Compare SaaS and PaaS host security. BTL4 Analyze
17 Show how will you categorize host security in IaaS? BTL3 Apply
18 Mention the importance of transport Level Security. BTL1 Remember
19 List out the categories in PaaS application security. BTL1 Remember
20 Point out privacy key issues in cloud. BTL4 Analyze
1 Examine in detail about trust model for grid security
BTL3 Apply
enforcement (13)
2 i) Define Authentication and Summarize on three authorization
models of Cloud Security Infrastructure. (7)
BTL1 Remember
ii)Discuss on the trust delegation operations using proxy
credentials in Cloud Security Infrastructure (6)
3 i) Define GSI and describe in detail about Cloud Security
Infrastructure functional layers. (7)
BTL1 Remember
ii) Examine in detail about multiple handshaking in mutual
authentication scheme. (6)
4 i) Demonstrate the infrastructure security: Network level in
cloud. (7) BTL3 Apply
ii) Classify the Key privacy issues in the cloud. (6)
5 i) Analyze the infrastructure security of cloud at host level(7)
BTL4 Analyze
ii) Explain in detail about virtual server security of cloud (6)
6 Explain in detail about application level security in
i) SaaS(5)
BTL4 Analyze
ii) PaaS(5)
7 i) Compose in detail about the aspects of data security. (7)
BTL6 Create
ii) Generalize on data security mitigation. (6)
8 Evaluate the concepts involved in provider data and its security BTL5 Evaluate
9 i) Express in detail about the need of IAM(7)
BTL2 Understand
ii)Give the challenges in IAM (6)
10 i) Summarize on the basic concepts and definitions of IAM.(7)
BTL2 Understand
ii) Evaluate and explain the practices of IAM Architecture. (6)

11 Write in detail about cloud security infrastructure (13) BTL1 Remember
12 i)Analyze in detail about the IAM Standards, Protocols, and BTL4 Analyze
Specifications for Consumers(7)
ii)Explain trust models for Cloud Security environment. (6)
13 i)Tabulate in detail about the Comparison of SPI maturity BTL1 Remember
models in the context of IAM(7)
ii) Tabulate the Comparison of maturity levels for IAM
components in detail. (6)
14 i)Discuss in detail about cloud identity management. (7) BTL2 Understand
ii)Summarize on the Cloud Service Provider IAM Practice. (6)
1 Explain the security architecture design of a cloud environment and BTL4 Analyze
relate how it can be made possible to include such measures in a
typical banking scenario.
2 Consider two cloud service systems: Google File System and BTL6 Create
Amazon S3. Formulate how they achieve their design goals to
secure data integrity and to maintain data consistency while facing
problems of hardware failures and concurrent hardware failures?
3 Assume a cloud service provider and illustrate the following BTL6 Create
considerations to integrate new cloud:
a. What virtualization platform does the chosen cloud computing
service provider offer? Does it enable the enterprise to move
resources securely and freely, to and from the cloud?
b. Which security software can be used to provide sufficient
protection to begin moving virtual machines to cloud
environments? While providing some baseline security for their
environment, cloud service providers typically place the
responsibility for data and application security with their customers.
Software tools such as VM Protection allow enterprises to quickly
provide a line of defense for cloud computing resources.
4 As an enterprise investigating cloud computing, review the cloud BTL5 Evaluate
computing security challenges and consider the following:
Is cloud computing currently in use in any organization you know?
Are those deployed applications or data, critical to business
continuity? Are they meeting or breaching existing corporate
security policy? Are they causing undue exposure to existing
enterprise resources?
What security mechanisms currently in place on the enterprise
network will not migrate to the cloud, and what exposure does this