0% found this document useful (0 votes)
74 views

Cloud Computing Mid Sem Makeup AKs

This document is a mid-semester test for a cloud computing course. It contains 4 multiple choice questions about cloud computing concepts like cloud service models, virtualization, and Docker. It also contains 4 long answer questions about cloud computing topics such as the differences between IaaS, PaaS and SaaS, considerations for adopting IaaS, and designing a private cloud using orchestration software.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views

Cloud Computing Mid Sem Makeup AKs

This document is a mid-semester test for a cloud computing course. It contains 4 multiple choice questions about cloud computing concepts like cloud service models, virtualization, and Docker. It also contains 4 long answer questions about cloud computing topics such as the differences between IaaS, PaaS and SaaS, considerations for adopting IaaS, and designing a private cloud using orchestration software.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Birla Institute of Technology & Science, Pilani

Work Integrated Learning Programmes Division


M. Tech. Software Engineering at Wipro Technologies (WASE)
First Semester 2020 - 2021
Mid-Semester Test (Makeup)
Course Number : SEWP ZC444
Course Title : Cloud Computing
Type of Exam : Closed Book No. of Pages : 2
Weightage : 30 % No. of Questions :
Duration : 90 minutes
Date of Exam : Session : AN

Q.1 Answer the following questions in short: [4 * 2 marks each = 8]

(A) A company interested in cloud computing is looking for a provider who offers a set of basic
services such as virtual server provisioning and on-demand storage that can be combined into a
platform for deploying and running customized applications. Explain, what type of cloud
computing model fits these requirements?
Answer:
IaaS

(B) What is difference between process level virtualization and system level virtualization?
Answer:
 In process virtualization, the virtualiztaion software runs above the OS & hardware
combination and only pprovides user-level instructions or OS library compatibility. e.g.
JVM
 In system virtualization, virtualization software is in between the host hardware machine &
guest software and its primary role is to provide virtualized hardware resources. It enables
elasticity in hardware without affecting the guest software - a primary requirement for
cloud computing.

(C ) What is multi-tenancy?
Answer:
Multi-tenancy is an architecture in which a single instance of a software application serves
multiple customers. Each customer is called a tenant. Tenants may be given the ability to
customize some parts of the application, such as color of the user interface (UI) or business rules,
but they cannot customize the application's code.

(D) What is difference between Docker image and container?


Answer:
Images are frozen immutable snapshots of live containers. Containers are running (or stopped)
instances of some image.

Q.2 Answer the following questions: [4 * 3 marks each = 12]

(A) With suitable examples, describe in brief, the three types of cloud computing services.

Page 1 of 3
Answer:
 IaaS
 PaaS
 SaaS

(B) Explain three important issues that one needs to aware about the Virtualization technology.
Answer:
 Software licensing
One of the most significant virtualization-related issues to be aware of is software licensing.
Virtualization makes it easy to create new servers, but each VM requires its own separate software
license. Organizations using expensive licensed applications could end up paying large amounts in
license fees if they do not control their server sprawl.
 IT training
IT staff used to dealing with physical systems will need a certain amount of training in
virtualization. Such training is essential to enable the staff to debug and troubleshoot issues in the
virtual environment, to secure and manage VMs, and to effectively plan for capacity.
 Hardware investment
Server virtualization is most effective when powerful physical machines are used to host several
VMs. This means that organizations that have existing not-so-powerful hardware might still need
to make upfront investments in acquiring new physical servers to harvest the benefits of
virtualization

(C ) Explain in brief, what IT departments of Enterprises has to consider before opting for the IaaS?
Answer:
 Developing for a specific vendors proprietary IaaS
 The complexity of well-written resource allocation software
 Data sensitivity, what data will be shared in public cloud infrastructure
 Dangers of shipping off the critical business processes

(D) List down the Docker commands used for


- listing down number of containers
- fetch an image named "myDockerImage" from Docker repository
- stop a docker container
Answer:
- listing down number of containers
docker info
- fetch an image named "myDockerImage" from Docker repository
docker pull myDockerImage
- stop a docker container
docker stop <container_id>

Q.3
(A) If the guest OS is running in non-privileged mode and hypervisor is running in privileged mode,
explain how execution of sensitive instruction will be handled? [5]
Answer:

Page 2 of 3
In virtualizable CPU based virtualization architecture, all of sensitive instructions are privilege
instructions. If hypervisor is in privilege mode and Guest OS in non-privilege mode, when Guest
OS wants to execute sensitive instructions, the execution will be trapped to hypervisor which is
running on privilege mode automatically. By this way, we can make sure that there is no chance
for Guest OS to change any important hardware resource directly. All important hardware
resource is under management by hypervisor.

In non virtualizable CPU based virtualization architecture, some of sensitive instructions are
privilege instructions. But some of sensitive instructions are non-privilege instructions. If you put
hypervisor in privilege mode and Guest OS in non-privilege mode, when Guest OS wants to
execute sensitive instructions, for those privilege and sensitive instructions, they (which is) will be
trapped into hypervisor which is running on privilege mode automatically. For those critical
instructions, they will NOT be trapped into hypervisor automatically.

Q.4 As a cloud specialist for an Insurance company, what are the various measures you would undertake
to establish a secure private cloudusing Cloud orchestration/management software namely
openstack or cloudstack? Design a Private Cloud and list various requirements for different services.
[5M]
Answer
Any 6 components of Openstack.

Page 3 of 3

You might also like