Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
PART-A
Q.No
Question
1
Illustrate the evolutionary trend towards parallel distributed and cloud
computing?
2
List and explain in brief the three new computing paradigms?
Competence
APPLYING
Level
BTL3
REMEMBERING
BTL1
REMEMBERING
BTL1
REMEMBERING
BTL1
5
6
7
8
ANALYZING
APPLYING
REMEMBERING
ANALYZING
BTL4
BTL3
BTL1
BTL4
APPLYING
BTL3
10
Examine the reasons to adapt the cloud for upgraded internet applications and
web services.
Discuss on SOA.
UNDERSTANDING
BTL2
11
UNDERSTANDING
BTL2
12
CREATING
BTL6
13
14
15
16
17
18
19
20
EVALUATING
UNDERSTANDING
REMEMBERING
ANALYZING
REMEMBERING
UNDERSTANDING
EVALUATING
CREATING
BTL5
BTL2
BTL1
BTL4
BTL1
BTL2
BTL5
BTL6
PART-B
SR & SN/ IT
Page 1 of 8
IT6713-GCC
Q.No
Question
1
i) Identify and explain in detail about evolutionary trend of computer
technology. (8)
ii) Explain the three paradigms in detail.(8)
2
i)Summarize in detail about the degrees of parallelism. (8)
ii) Discuss the application of high performance and high throughput
System. (8)
3
(i)Demonstrate in detail about internet of things and cyber physical
Competence
REMEMBERING
Level
BTL1
UNDERSTANDI
NG
BTL2
APPLYING
BTL3
Define and examine in detail about the multi core CPUs and multithreading
technologies. (16)
Analyze in detail about the GPU programming model.(16)
REMEMBERING
BTL1
ANALYZING
BTL4
EVALUATING
BTL5
CREATING
BTL6
UNDERSTANDI
NG
BTL2
systems.(8)
(ii)Examine the memory, storage and wide area networking technology
in network based system. (8)
4
5
6
7
8
9
ANALYZING
i)Explain the layered architecture of SOA for web services.(8)
ii) Compare the features of grid versus cloud. (8)
REMEMBERING
i) Demonstrate in detail about trends towards distributed systems.(8)
ii) Illustrate in detail about parallel and distributed programming models.
(8)
BTL4
11
REMEMBERING
BTL1
12
APPLYING
BTL3
13
ANALYZING
BTL4
14
UNDERSTANDI
NG
BTL2
10
BTL1
UNIT II
PART-A
Q.No
Question
1
Define OGSA.
2
Illustrate the relationship between resources and service.
3
List the major goals of OGSA.
Competence
REMEMBERING
APPLYING
REMEMBERING
Level
BTL1
BTL3
BTL1
UNDERSTANDING
BTL2
5
6
7
8
9
10
APPLYING
CREATING
EVALUATING
ANALYZING
UNDERSTANDING
REMEMBERING
BTL3
BTL6
BTL5
BTL4
BTL2
BTL1
SR & SN/ IT
Page 2 of 8
IT6713-GCC
11
12
13
14
15
16
17
18
19
20
UNDERSTANDING
UNDERSTANDING
REMEMBERING
ANALYZING
EVALUATING
BTL2
BTL2
BTL1
BTL4
BTL5
REMEMBERING
REMEMBERING
APPLYING
BTL1
BTL1
BTL3
ANALYZING
CREATING
BTL4
BTL6
PART-B
Q.No
Question
1
i) Define OGSA and describe the grid service architecture in detail. (8)
ii) Examine the grid service migration using GSH and GSR(8).
2
i) Summarize the OGSA security model implemented at various
Competence
REMEMBERING
Level
BTL1
UNDERSTANDI
NG
BTL2
APPLYING
BTL3
ANALYZING
BTL4
REMEMBERING
BTL1
BTL3
APPLYING
i) Examine the client side programming patterns for grid services. (8)
ii) Demonstrate in detail about the conceptual hosting environment for
grid service. (8)
i) Discriminate how the Client Uses the Grid Service Handles and EVALUATING
References. (8)
ii) Evaluate the relationship of grid service to Distributed Object
Systems. (8)
CREATING
BTL6
REMEMBERING
BTL1
10
ANALYZING
BTL4
11
i) Tabulate the web service resource frame work and its related specifications.
(8)
ii) Examine the reasons involved in adopting OGSA as a grid architecture by
number of projects. (8)
i) Express in detail about the replication strategies in grid environment. (8)
ii) Distinguish the data transfer methods involved in grid services. (8)
REMEMBERING
BTL1
UNDERSTANDI
NG
BTL2
i) Explain the OGSA grid service interfaces developed by the OGSA ANALYZING
working group. (8)
ii) Analyze the difference between service oriented architecture and
OGSA. (8)
UNDERSTANDI
Discuss in detail about the grid service instances and the component
model of OGSI. (16)
BTL4
12
13
14
SR & SN/ IT
Page 3 of 8
IT6713-GCC
BTL5
BTL2
NG
UNIT III
PART-A
Q.No
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Question
Define public private and hybrid clouds.
Differentiate centralized and distributed computing.
List the design objective of cloud.
Define IaaS.
Generalize on PaaS and SaaS.
Show the levels of virtualization implementation.
Discuss the design requirements of VMM.
Analyze the advantages and disadvantages of OS extensions.
How does the virtualization Support the Linux platform?
Compare binary translation with full virtualization.
Demonstrate the need of virtualization need of multi-core processor.
Discuss the design issues of virtual clusters.
List the properties of Virtual clusters when virtual machines are dynamically
allocated.
Define ISR
Describe the resource managers of eucalyptus for virtual network.
How the data storage is classified in virtual environment?
Formulate the side effects of server virtualization.
Where OS level virtualization is needed?
Discuss on the support of middleware for virtualization.
Compare host based virtualization and para virtualization.
Competence
REMEMBERING
UNDERSTANDING
REMEMBERING
REMEMBERING
CREATING
APPLYING
UNDERSTANDING
ANALYZING
EVALUATING
ANALYZING
APPLYING
UNDERSTANDING
REMEMBERING
Level
BTL1
BTL2
BTL1
BTL1
BTL6
BTL3
BTL2
BTL4
BTL5
BTL4
BTL3
BTL2
BTL1
REMEMBERING
UNDERSTANDING
APPLYING
CREATING
REMEMBERING
EVALUATING
ANALYZING
BTL1
BTL2
BTL3
BTL6
BTL1
BTL5
BTL4
PART-B
Q.No
Question
Competenc
e
REMEMBERING
Level
BTL1
ANALYZING
BTL4
UNDERSTANDI
NG
BTL2
REMEMBERING
BTL1
UNDERSTANDI
NG
BTL2
CREATING
BTL6
APPLYING
BTL3
SR & SN/ IT
Page 4 of 8
IT6713-GCC
8
9
10
11
12
13
14
virtualization. (8)
i)Point out the importance of memory virtualization.(8)
ii) Explain in detail about the need of IO virtualization. (8)
Examine the need of virtualization in multi core processor.(16)
ANALYZING
BTL4
REMEMBERING
BTL1
UNDERSTANDI
NG
BTL2
APPLYING
BTL3
i)Explain the migration of memory ,files and network resources in detail. (8)
ii) Analyze the dynamic deployment of virtual clusters in detail. (8)
i)How server consolidation is supported in data center? (8)
ii) How will you explain the need of virtual storage management in data
center?. (8)
ANALYZING
BTL4
EVALUATING
BTL5
REMEMBERING
BTL1
Q.N
o
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Question
Competence
ANALYZING
REMEMBERING
APPLYING
UNDERSTANDING
REMEMBERING
CREATING
REMEMBERING
ANALYZING
APPLYING
REMEMBERING
EVALUATING
UNDERSTANDING
UNDERSTANDING
CREATING
ANALYZING
BTL4
BTL1
BTL3
BTL2
BTL1
BTL6
BTL1
BTL4
BTL3
BTL1
BTL5
BTL2
BTL2
BTL6
BTL4
REMEMBERING
CREATING
UNDERSTANDING
REMEMBERING
APPLYING
BTL1
BTL6
BTL2
BTL1
BTL3
Q.No
Question
1
Describe the relative strength and limitation of open source grid middleware
packages.(16)
2
i)List the features in condor kernel and condor G for grid computing. (8)
3
SR & SN/ IT
Page 5 of 8
IT6713-GCC
Level
Competence
REMEMBERING
Level
BTL1
REMEMBERING
BTL1
UNDERSTANDI
NG
BTL2
4
5
APPLYING
BTL3
ANALYZING
BTL4
EVALUATING
BTL5
i) Evaluate the interaction in the functional module client globus job work
flow. (8)
ii) Summarize the functional components in CGSP library. (8)
BTL6
REMEMBERING
BTL1
UNDERSTANDI
NG
BTL2
APPLYING
BTL3
ANALYZING
BTL4
REMEMBERING
BTL1
13
BTL2
14
Explain in detail about the anatomy of file read and file write.(16)
UNDERSTANDI
NG
ANALYZING
9
10
11
12
BTL4
UNIT V
PART-A
Q.No
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Question
Give the challenges to establish trust among grid sites.
Define IDS.
Summarize on reputation trust model.
List the steps to accomplish fuzzy interference.
Relate authentication and authorization methods in grid environment.
Evaluate the authorization model of grid security
Define trust delegation chain
Formulate the categories of authorization for access control.
Discuss on GSI.
Differentiate transport level security and message level security
Compose the primary pieces of information of a certificate in GSI
authentication.
How will you measure the mutual authentication between two parties?
Illustrate the sequence of trust delegation.
Discuss the risk factors of network level of cloud infrastructure.
Tabulate the security levels at the network level.
Compare SaaS and PaaS host security.
Show how you will categorize host security in IaaS.
Identify the host security threats in public IaaS.
List out the categories in PaaS application security.
Point out privacy key issues in cloud.
SR & SN/ IT
Page 6 of 8
IT6713-GCC
Competence
UNDERSTANDING
REMEMBERING
UNDERSTANDING
REMEMBERING
APPLYING
EVALUATING
REMEMBERING
CREATING
UNDERSTANDING
ANALYZING
CREATING
Level
BTL2
BTL1
BTL2
BTL1
BTL3
BTL5
BTL1
BTL6
BTL2
BTL4
BTL6
EVALUATING
APPLYING
UNDERSTANDING
REMEMBERING
ANALYZING
APPLYING
REMEMBERING
REMEMBERING
ANALYZING
BTL5
BTL3
BTL2
BTL1
BTL4
BTL3
BTL1
BTL1
BTL4
PART-B
Q.No
Question
1
Examine in detail about trust model for grid security enforcement.(16)
2
Competence
APPLYING
Level
BTL3
BTL1
ANALYZING
BTL4
ANALYZING
BTL4
CREATING
BTL6
EVALUATING
BTL5
UNDERSTANDING
BTL2
10
UNDERSTANDING
BTL2
REMEMBERING
BTL1
ANALYZING
BTL4
REMEMBERING
BTL1
UNDERSTANDING
BTL2
4
5
6
7
8
11
12
13
14
Verified by
: 1.
2.
[S.RAVIKUMAR]
[ S.NARAYANAN ]
3.
4.
[
Forwarded by Year Coordinator
SR & SN/ IT
Page 7 of 8
:
IT6713-GCC
BTL1
BTL-3
Approved by HOD
:
***************
SR & SN/ IT
Page 8 of 8
IT6713-GCC