Professional Documents
Culture Documents
Unit 2 - Week 1: Introduction To Clouds, Virtualization and Virtual Machine
Unit 2 - Week 1: Introduction To Clouds, Virtualization and Virtual Machine
in ▼
Courses » Cloud Computing and Distributed Systems
Announcements
Course
Ask a Question
Progress
Mentor
FAQ
Virtualization
Quiz : Assignment-01
WEEK-1 FEEDBACK
Assignment-01: Solution
Assignment-01
The due date for submitting this assignment has passed.
Due on 2018-09-12, 23:59 IST.
1 point
Which of these statements are correct?
Statement-1: Moore’s law indicates that network bandwidth doubles every 18 months.
Statement-2: Gilder’s law indicates that processor speed has doubled each year in the past.
Accepted Answers:
Accepted Answers:
Software-as-a-Service (SaaS)
1 point
Amazon Web Services (AWS) is an example of______________________
Accepted Answers:
Utility computing focuses on a business model in which customers receive computing resources
from a paid service provider.
True
False
Accepted Answers:
True
1 point
Which type of Hypervisor is shown in the following figure ?
Type 1
Type 2
Type 3
None of the mentioned
Accepted Answers:
Type 2
1 point
Which of the following figure is the example of Passthrough Model:
Figure 1
Figure 2
Figure 3
Accepted Answers:
Figure 1
1 point
______________are accessible only to company employees
Accepted Answers:
Accepted Answers:
Live Migration
1 point
Consider the following regarding the Sandpiper architecture:
Accepted Answers:
Accepted Answers:
Black-box, Gray-Box
Previous Page
End
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of
In association with
Funded by
Powered by
phani.n@svcolleges.edu.in ▼
Courses » Cloud Computing and Distributed Systems
Announcements
Course
Ask a Question
Progress
Mentor
FAQ
Server Virtualization
Software Defined Network
Quiz : Assignment-02
Assignment-02: Solution
WEEK-2 FEEDBACK
Assignment-02
The due date for submitting this assignment has passed.
Due on 2018-09-12, 23:59 IST.
1 point
Match the correct pairs:
P: IV, Q: I, R: III, S: II
P: III, Q: I, R: II, S: IV
P: IV, Q: II, R: III, S: I
P: III, Q: IV, R: II, S: I
Accepted Answers:
Accepted Answers:
Server consolidation
1 point
To offer hotspot free performance for arbitrary traffic matrices, VL2 uses two related
mechanisms:
Flows and out-of-order delivery
Clos network and EQMP
VLB and ECMP
Agility and Load balancing
Accepted Answers:
A. Agility
B. Location independent addressing
C. Performance uniformity
D. Scalability
A, B, C
A, B, D
B, C, D
A, C, D
Accepted Answers:
A, B, C
1 point
With the use of Traffic Engineering (TE) in Google’s WAN B4, it can:
i) Leverage control at network edge to adjudicate among competing demands during resource
constraint
iii) Dynamically reallocate bandwidth in the face of link/switch failures or shifting application
demands
Only (i) and (ii) are true
Only (iii) is true
Only (i) and (iii) are true
All are true
Accepted Answers:
Accepted Answers:
Docker
1 point
Consider the following statements:
Statement 1: In Single-root I/O Virtualization (SR-IOV), the live VM migration becomes
trickier, because the virtual machine is tied to physical resources of the machine.
Statement 2: In Single-root I/O Virtualization (SR-IOV), forwarding is no longer as flexible
because it relies on a layer two switch that is built into the hardware of the NIC.
Only statement 1 is true
Only statement 2 is true
Both statements are true
Both statements are false
Yes, the answer is correct.
Score: 1
Accepted Answers:
Statement 1: Low-level interface and programmatic interface for the data plane
Statement 2: Logically centralized controller that allows us to build software abstractions on top
of it.
Only statement 1 is true
Only statement 2 is true
Both statements are true
Both statements are false
Accepted Answers:
A project of
In association with
Funded by
Powered by
phani.n@svcolleges.edu.in ▼
Courses » Cloud Computing and Distributed Systems
Announcements
Course
Ask a Question
Progress
Mentor
FAQ
Quiz : Assignment-03
Assignment-03: Solution
WEEK-3 FEEDBACK
Assignment-03
The due date for submitting this assignment has passed.
Due on 2018-09-19, 23:59 IST.
1 point
In a Classical Algorithm of Ring Election, what will be the message complexity for N labelled
processes ?
(N-1) messages
(2N-1) messages
(3N-1) messages
(4N-1) messages
1 point
True or False ?
There is no leader election algorithm for anonymous rings, even if algorithm knows the ring size
(non-uniform) and synchronous model.
True
False
1 point
ZooKeeper itself is intended to be replicated over a sets of hosts called ______________
Chunks
Ensemble
Subdomains
None of the mentioned
1 point
Find the message and time complexity of below algorithm:
phani.n@svcolleges.edu.in ▼
Courses » Cloud Computing and Distributed Systems
Announcements
Course
Ask a Question
Progress
Mentor
FAQ
Unit 4 - Week 3: Leader Election in Cloud,
Distributed Systems and Industry Systems
Course outline
How to access the portal
Week 1: Introduction to Clouds, Virtualization and Virtual Machine
Week 2: Network Virtualization and Geo-distributed Clouds
Week 3: Leader Election in Cloud, Distributed Systems and Industry Systems
Design of Zookeeper
Quiz : Assignment-03
Assignment-03: Solution
WEEK-3 FEEDBACK
Assignment-03
The due date for submitting this assignment has passed.
Due on 2018-09-19, 23:59 IST.
1 point
In a Classical Algorithm of Ring Election, what will be the message complexity for N labelled
processes ?
(N-1) messages
(2N-1) messages
(3N-1) messages
(4N-1) messages
Accepted Answers:
(3N-1) messages
1 point
True or False ?
There is no leader election algorithm for anonymous rings, even if algorithm knows the ring size
(non-uniform) and synchronous model.
True
False
Accepted Answers:
True
1 point
ZooKeeper itself is intended to be replicated over a sets of hosts called ______________
Chunks
Ensemble
Subdomains
None of the mentioned
Accepted Answers:
Ensemble
1 point
Find the message and time complexity of below algorithm:
Accepted Answers:
Statement 1: When two processes are competing with each other causing data corruption, it is
called deadlock.
Statement 2: When two processes are waiting for each other directly or indirectly, it is called
race condition.
Accepted Answers:
Accepted Answers:
True
1 point
True or False ?
Accepted Answers:
False
1 point
In the [Math Processing Error] messages leader election algorithm, the probe distance in phase k
is _______ and the number of messages initiated by a processor in phase k is at most
______________including probes and replies in both directions.
Accepted Answers:
A project of
In association with
Funded by
Powered by
phani.n@svcolleges.edu.in ▼
Courses » Cloud Computing and Distributed Systems
Announcements
Course
Ask a Question
Progress
Mentor
FAQ
Quiz : Assignment-04
Assignment-04
The due date for submitting this assignment has passed.
Due on 2018-09-26, 23:59 IST.
1 point
Assign Lamport timestamps to the events (a, b, c, d, e, f) as shown in the figure:
a: 6, b: 2, c: 6, d: 7, e: 7, f: 8
a: 1, b: 2, c: 2, d: 3, e: 4, f: 2
a: 6, b: 7, c: 6, d: 7, e: 7, f: 8
a: 6, b: 7, c: 6, d: 7, e: 8, f: 9
Yes, the answer is correct.
Score: 1
Accepted Answers:
a: 6, b: 7, c: 6, d: 7, e: 8, f: 9
1 point
The properties hold for quorums in a coterie are:
Intersection property
Minimality property
Total ordered set property
Both Intersection and Minimality property
Accepted Answers:
Accepted Answers:
(1, 7, 4)
1 point
A client gets a timestamp of 3:12:30.500 from a time server. The elapsed time between the
request and response was 20 msec (0.020 sec). The current time on the client is 3:12:30.510.
Using Cristian’s algorithm i.e. server time + ½(elapsed time), what is the time set on the client?
3:12:30.480
3:12:30.490
3:12:30.510
3:12:30.520
Accepted Answers:
3:12:30.510
1 point
A client's clock reads 3:20:00. The server's clock reads 3:10:00 when they synchronize using the
Berkeley algorithm. Assume message delays are negligible. What is the time at the client after
synchronization?
3:20:00
3:10:00
6:30:00
3:15:00
Accepted Answers:
3:15:00
1 point
True or False ?
DTP (Datacenter Time Protocol) uses the physical layer of network devices to implement a
decentralized clock synchronization protocol.
True
False
Accepted Answers:
True
1 point
True or False ?
The Chandy-Lamport global snapshot algorithm works correctly for non-FIFO channels.
True
False
Accepted Answers:
False
1 point
Find out the correct property to solve mutual exclusion in distributed system:
Accepted Answers:
Accepted Answers:
Accepted Answers:
Google’s Chubby
Previous Page
End
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of
In association with
Funded by
Powered by
phani.n@svcolleges.edu.in ▼
Courses » Cloud Computing and Distributed Systems
Announcements
Course
Ask a Question
Progress
Mentor
FAQ
Byzantine Agreement
Assignment-05: Solution
Assignment-05
The due date for submitting this assignment has passed.
Due on 2018-10-03, 23:59 IST.
As per our records you have not submitted this assignment.
1 point
Find out the correct model for the given assumptions of a system:
Assumption 3: Each step in a process takes lb < time < ub , where lb represents lower bound and
ub represents an upper bound.
Asynchronous distributed system
Synchronous distributed system
On demand computing system
Parallel processing system
Accepted Answers:
Accepted Answers:
(P): (i), (Q): (ii), (R): (iii)
(P): (iii), (Q): (ii), (R): (i)
(P): (iii), (Q): (i), (R): (ii)
(P): (ii), (Q): (iii), (R): (i)
No, the answer is incorrect.
Score: 0
Accepted Answers:
“Byzantine agreement cannot be reached among three processors if one processor is faulty”
True
False
Accepted Answers:
True
1 point
True or False ?
“Pease showed that in a fully connected network, it is possible to reach an agreement if number
of faulty processors ‘ f ’ exceeds (n-1)/3 where n = number of processors”
True
False
Accepted Answers:
False
1 point
Consider the following statement:
True or False ?
“Koo-Toueg algorithm is a uncoordinated checkpointing and recovery technique that takes a
consistent set of checkpointing and avoids domino effect and livelock problems during the
recovery”
True
False
Accepted Answers:
False
1 point
Messages whose ‘send’ is done but ‘receive’ is undone due to rollback are called____________
In-transit messages
Lost messages
Orphan messages
Duplicate messages
Accepted Answers:
Lost messages
1 point
Cascaded rollback which causes the system to roll back to too far in the computation (even to the
beginning), in spite of all the checkpoints is known as_______________________
Rollback
Phantom Effect
Domino Effect
Livelock
Accepted Answers:
Domino Effect
1 point
Messages with ‘receive’ recorded but message ‘send’ not recorded and do not arise if processes
roll back to a consistent global state are called______________________
In-transit messages
Lost messages
Orphan messages
Duplicate messages
Accepted Answers:
Orphan messages
1 point
The ____________________may arise when a process rolls back to its checkpoint after a failure
and requests all the other affected processes also to roll back.
Rollback
Phantom Effect
Domino Effect
Livelock problem
Accepted Answers:
Livelock problem
Previous Page
End
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of
In association with
Funded by
Powered by
phani.n@svcolleges.edu.in ▼
Courses » Cloud Computing and Distributed Systems
Announcements
Course
Ask a Question
Progress
Mentor
FAQ
Quiz : Assignment-06
Assignment-06: Solution
Week 7: P2P Systems and their use in Industry Systems, Cloud Applications: MapReduce
Week 8: Cloud Applications: Spark and Apache Kafka
Assignment-06
The due date for submitting this assignment has passed.
Due on 2018-10-10, 23:59 IST.
1 point
Consider the following statements:
Statement 1: Scale out means grow your cluster capacity by replacing with more powerful
machines.
Statement 2: Scale up means incrementally grow your cluster capacity by adding more COTS
machines (Components Off the Shelf).
Only statement 1 is true
Only statement 2 is true
Both statements are true
Both statements are false
Accepted Answers:
Gossip
1 point
Fill the correct choices for the given scenarios:
Accepted Answers:
Accepted Answers:
Column-oriented
1 point
A small chunk of data residing in one machine which is part of a cluster of machines holding one
Hbase table is known as______________________
Rowarea
Tablearea
Region
Split
Accepted Answers:
Region
1 point
Cell in HBase Table is a combination of _________________________
Row and column family
Row, column family and column qualifier
Row, column family, column qualifier and row keys
Row, column family, column qualifier and contains a value and a timestamp
Accepted Answers:
Row, column family, column qualifier and contains a value and a timestamp
1 point
A bloom filter is a bit vector V with m entries and k (ideally-independent) hash functions. To
insert a new element i, we set V[hj(i)] =1 for each of the k hash functions hj. To check whether
an element i is in the set, we AND together each value V[hj(i)] for all k hash functions.
The optimal number of hash functions is k=mnln2. For that number of hash functions, and
given a choice of false positive rate, the ratio mn=−lnp(ln2)2 , where n is the number of keys
in the table and p is the false positive rate.
Compute the approximate number of bits per entry and the number of hash functions needed for
a false positive rate of 1%.
9.6 bits per key and 7 hash functions
6.6 bits per key and 6 hash functions
12.6 bits per key and12 hash functions
9.6 bits per key and 6 hash functions
Accepted Answers:
Accepted Answers:
Snitch
Previous Page
End
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of
In association with
Funded by
Powered by
phani.n@svcolleges.edu.in ▼
Courses » Cloud Computing and Distributed Systems
Announcements
Course
Ask a Question
Progress
Mentor
FAQ
MapReduce
Quiz : Assignment-07
Assignment-07: Solution
Assignment-07
The due date for submitting this assignment has passed.
Due on 2018-10-17, 23:59 IST.
1 point
Peer-to-peer (P2P) network systems use ___________________organization of the network
overlay for flexibly sharing resources (e.g., files and multimedia documents) stored across
network-wide computers.
Physical-level
Network-level
Transport-level
Application-level
No, the answer is incorrect.
Score: 0
Accepted Answers:
Application-level
1 point
What is the characteristic of P2P network?
Fault Tolerance
Self-Adaptation
Dealing with instability
All of the mentioned
Accepted Answers:
(P): (i), (Q): (ii), (R): (iii), (S): (iv)
(P): (iii), (Q): (iv), (R): (i), (S): (ii)
(P): (iii), (Q): (i), (R): (ii), (S): (iv)
(P): (iv), (Q): (iii), (R): (i), (S): (ii)
Accepted Answers:
Accepted Answers:
Kelips
1 point
In a Chord structured DHT (Distributed Hash Table) with N nodes, how many hops would a
lookup operation require?
N
N/2
log(logN)
log(N)
Accepted Answers:
log(N)
1 point
If the Map phase is subdivided into M pieces and the reduce phase into R pieces then since the
master must make ____________ scheduling decisions and keeps __________ state in memory.
O(M + R), O(M * R)
O(M*R), O(M * R)
O(M + R), O(M + R)
O(M * R), O(M + R)
Accepted Answers:
Accepted Answers:
Reduce
1 point
_______________function processes a key/value pair to generate a set of intermediate key/value
pairs.
Map
Reduce
Both Map and Reduce
None of the mentioned
Map
Previous Page
End
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of
In association with
Funded by
Powered by
phani.n@svcolleges.edu.in ▼
Courses » Cloud Computing and Distributed Systems
Announcements
Course
Ask a Question
Progress
Mentor
FAQ
Unit 9 - Week 8: Cloud Applications: Spark
and Apache Kafka
Course outline
How to access the portal
Week 1: Introduction to Clouds, Virtualization and Virtual Machine
Week 2: Network Virtualization and Geo-distributed Clouds
Week 3: Leader Election in Cloud, Distributed Systems and Industry Systems
Week 4: Classical Distributed Algorithms and the Industry Systems
Week 5: Consensus, Paxos and Recovery in Clouds
Week 6: Cloud Storage: Key-value stores/NoSQL
Week 7: P2P Systems and their use in Industry Systems, Cloud Applications: MapReduce
Week 8: Cloud Applications: Spark and Apache Kafka
Introduction to Spark
Introduction to Kafka
Quiz : Assignment-08
Assignment-08: Solution
Assignment-08
The due date for submitting this assignment has passed.
Due on 2018-10-24, 23:59 IST.
Assignment submitted on 2018-10-23, 15:13 IST
1 point
Identify the correct kafka commands for the following:
P: It is the distributed, durable equivalent of Unix pipes. Use it to connect and compose your
large-scale data applications.
Q: These are the commands of your Unix pipelines. Use it to transform data stored in Kafka.
R: It is the I/O redirection in your Unix pipelines. Use it to get your data into and out of Kafka.
P: Kafka Streams, Q: Kafka Connect, R: Kafka Core
P: Kafka Core, Q: Kafka Connect, R: Kafka Stream
P: Kafka Streams, Q: Kafka Core, R: Kafka Connect
P: Kafka Core, Q: Kafka Streams, R: Kafka Connect
Accepted Answers:
Accepted Answers:
Broker
1 point
Kafka maintains feeds of messages in categories called ____________________
Topics
Chunks
Domains
Messages
Accepted Answers:
Topics
1 point
Each kafka partition has one server which acts as the ______________________
Leader
Follower
Stater
None of the mentioned
Accepted Answers:
Leader
1 point
Which type of processing Apache Spark can handle
Batch Processing
Stream Processing
Graph Processing
All of the Mentioned
Accepted Answers:
Accepted Answers:
Accepted Answers:
GraphX
1 point
_____________________ is a distributed machine learning framework on top of Spark.
MLlib
Spark Streaming
GraphX
RDDs
Accepted Answers:
MLlib
Previous Page
End
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
A project of
In association with
Funded by
Powered by