2 Marks With Answer
2 Marks With Answer
2. What is QOS?
Grid computing system is the ability to provide the quality of service requirements necessary
for the end-user community. QOS provided by the grid like performance, availability,
management aspects, business value and flexibility in pricing.
The formation of virtual task forces, or groups, to solve specific problems associated
with the virtual organization.
The dynamic provisioning and management capabilities of the resource required
meeting the SLA’s.
Resource broker provides pairing services between the service requester and
the service provider. This pairing enables the selection of best available resources from
the service provider for the execution of a specific task.
1. Define – OSGI.
Open Grid Services Architecture (OGSA) is a set of standards defining the way in which
information is shared among diverse components of large, heterogeneous grid systems. In
this context, a grid system is a scalable wide area network (WAN) that supports resource
sharing and distribution. OGSA is a trademark of the Open Grid Forum.
2. Define – OSGA.
The Open Grid Services Infrastructure (OGSI) was published by the Global Grid Forum
(GGF) as a proposed recommendation in June 2003.[1] It was intended to provide an
infrastructure layer for the Open Grid Services Architecture (OGSA). OGSI takes the
statelessness issues (along with others) into account by essentially extending Web
services to accommodate grid computing resources that are both transient and stateful.
Peer to Peer computing is a relatively new computing discipline in the realm of distributed
computing. P2P system defines collaboration among a larger number of individuals and/or
organizations, with a limited set of security requirements and a less complex resource-
sharing topology.
DAS provides the following enhanced categories of accounting functionality to the IPG
community:
Allows a grid user to request access to a local resource via the presentation of
grid credentials
Determines and grants the appropriate authorizations for a user to access a local
resource without requiring a preexisting account on the resource to govern local
authorizations.
5. Define – SOA.
Identify the use cases that can drive the OGSA platform components.
Identify and define the core OGSA platform components.
Define hosting and platform specific bindings.
Define resource models and resource profiles with interoperable solutions.
SOAP is a simple and lightweight XML-based mechanism for creating structured data
packages that can be exchanged between network applications. SOAP provides a simple
enveloping mechanism and is proven in being able to work with existing networking
services technologies such as HHTP.SOAP is also flexible and extensible. SOAP is based
on the fact that it builds upon the XML info set.
WSDL is an XML Info set based document, which provides a model and XML format for
describe web services. This enables services to be described and enables the client to
consume these services in a standard way without knowing much on the lower level
protocol exchange binding including SOAP and HTTP. This high level abstraction on the
service limits human interaction and enables the automatic generation of proxies for web
services, and these proxies can be static or dynamic. It allows both document and RPC -
oriented messages.
The cloud is a collection of computers and servers that are publicly accessible via the
This hardware is typically owned and operated by a third party on a consolidated basis
in one or more data center locations. The machines can run any combination of
operating systems.
2. What is Virtualization?
Software as a Service
Platform as a Service
Infrastructure as a Service
Cloud Provider: Is a company that offers some component of cloud computing typically
infrastructure as a service, software as a Service or Platform as a Service. It is something
referred as CSP.
Cloud Broker: It is a third party individual or business that act as an intermediary between
the purchase of cloud computing service and sellers of that service.
The private cloud is built within the domain of an intranet owned by a single organization.
Therefore, they are client owned and managed. Their access is limited to the owning clients
and their partners. Their deployment was not meant to sell capacity over the Internet
through publicly accessible interfaces. Private clouds give local users a flexible and agile
private infrastructure to run service workloads within their administrative domains.
A public cloud is built over the Internet, which can be accessed by any user who has paid
for the service. Public clouds are owned by service providers. They are accessed by
subscription. Many companies have built public clouds, namely Google App Engine,
Amazon AWS, Microsoft Azure, IBM Blue Cloud, and Salesforce Force.com. These are
commercial providers that offer a publicly accessible remote interface for creating and
managing VM instances within their proprietary infrastructure.
8. Define - Hybrid Cloud.
A hybrid cloud is built with both public and private clouds; Private clouds can also support
a hybrid cloud model by supplementing local infrastructure with computing capacity from
an external public cloud. For example, the research compute cloud (RC2) is a private cloud
built by IBM.
9. Define anything-as-a-service?
Providing services to the client on the basis on meeting their demands at some pay per use cost
such as data storage as a service, network as a service, communication as a service etc. It is
generally denoted as anything as a service (XaaS).
Type 1 (bare-metal)
Type 2 (hosted)
Type 1 hypervisors run directly on the system hardware. They are often referred to as a
"native" or "bare metal" or "embedded" hypervisors in vendor literature.
Type 2 hypervisors run on a host operating system. When the virtualization movement first
began to take off, Type 2 hypervisors were most popular. Administrators could buy the
software and install it on a server they already had.
Reduce Phase:
Combines all intermediate values for a given key
Produces a set of merged output values
reduce(out_key, list(interm_value)) -> list(out_value)
7. Define- HDFS.
Hadoop File System was developed using distributed file system design. It is run on
commodity hardware. Unlike other distributed systems, HDFS is highly fault tolerant and
designed using low-cost hardware. HDFS holds very large amount of data and provides
easier access. To store such huge data, the files are stored across multiple machines.
The built-in servers of name-node and data-node help users to easily check the
status of cluster.
The most-used instant messaging program is AOL Instant Messenger (www.aim.com), also
known as AIM. AIM supports all manner of special features in addition to basic text
messaging. The users get file sharing, RSS feeds, group chats, ability to text message to and
from mobile phones, voice chat, video chat, and even a mobile client and can also enhance
the basic AIM experience with a variety of official and user-created plug-ins.
UNIT V - SECURITY
1. What are the functions in Grid Security Model?
Multiple security mechanisms
Dynamic creation of services
Dynamic establishment of trust domains
5. Define- GSI.
The Grid Security Infrastructure (GSI), formerly called the Globus Security
Infrastructure, is a specification for secret, tamper-proof, delegatable communication
between software in a grid computing environment. Secure, authenticatable
communication is enabled using asymmetric encryption.
Reliability
Security
User error
Access problems
Data Loss Prevention (DLP) is defined as: Products that, based on central policies, identify,
monitor, and protect data at rest, in motion, and in use, through deep content analysis.
DLP is typically used for content discovery and to monitor data in motion using the
following options:
Since PaaS is so diverse, the following list may not cover all potential options:
The two commonly understood SOA architecture are web and web services.
2. Define SOA.
A unique name used to identify the feature and its properties. This
enables us to identify whether a SOAP node supports a specific feature.
A set of properties associated with the feature that can be used to
control, constrain, or identify a feature.
Policy
expression
Policy subject
Policy assertion
Policy
attachment
Grid
Administrator IT
system integrator
IT business
activity
Identify the use cases that can drive the OGSA platform
components. Identify and define the core OGSA platform
components.
Define hosting and platform specific bindings.
Define resource models and resource profiles with interoperable solutions.
20. What are the main purposes of use case defined by OGSA?
To define the high level requirements on those core components and identify
their interrelationship.
21. Name some representational use cases from OGSA architecture working
group?
Grid
Administrator IT
system integrator
IT business
activity
Scientists
They are the customers of the fusion code provided by the fusion service
provider.
A remote client can run code on a remote site within a time frame.
A monitoring agent starts and watches the submitted job for service-level
agreement (SLA) validation.
Integrate with external applications and resources for data and/or code
execution and flexible delegation of rights.
A consumer, for example a game player, accesses the game portal and
authenticates with the game server and starts the game.
There are several providers that are working in concert to provide the
required service for the consumer.
The content provider or media studio provides the content for the customer
experience.
30. What are the functional requirements of Online Media and Environment?
Discovering the
resources. Instantiating
new service.
Monitoring resource usage and
availability. Servicing lifecycle and
change management.
33. What are the two dimensions of stateful nature of web service?
UNIT - V
35. What are the two kinds of lifecycle model associated with state data recovery?
Persistent lifecycle
model. Transient
lifecycle model.
GT3 core.
Base services
User- defined services.
38. What are the major components of default server side framework?
The Globus container model is derived from the J2EE managed container
model, where the components are free from complex resource
manageability.
Lightweight service introspection and discovery.
Dynamic deployment and soft-state management of stateful grid services.
41. What are the treatments to the operation involved in service activation?
44. What are the two different message-level authentication mechanisms provided
by GT3 framework?
45. What are the three ways available to create and add service data to service
dataset?
Gets the service data wrapper class from the service data set using the
QName of the service data element as defined in WSDL.
Create the value for that service data element.
Update the service data set with service data wrapper and the new value.
Create a new SDE by calling the create method of the service instance’s
service data set with a unique name or QName.
Set a value for the SDE. The value of the SDE of type My Service Data
type. Set the initial value of My Service Data Type.
Add the SDE to the service data set.
Authentication Service
Handler WS security Handler
Security Policy
Handler Authorization
Handler X509sign
Handler
GSS Handler
X509SignHandler
SecContextHandl
er GSSHandler
WSSecurityClientHandler
49. What are the requirements to be fulfilled for information service in the context
of GT3?