Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

Week 01: Assignment 01

The due date for submitting this assignment has passed.


Due on 2024-02-07, 23:59 IST.

Assignment submitted on 2024-02-06, 12:45 IST


1 point
1. Which if the following is an example of IaaS?
Google App Engine
Google Docs
Gmail
Eucalyptus

2. ______ computing is a model where service provider makes computing resources available to the
customer as needed.
Ubiquitous
Utility
Online
Virtual
3. In live migration a running virtual machine or application can be moved between different physical
machines ______.
by disconnecting the client or application
without disconnecting the client or application
by moving application data to the cloud
without updating the client or application
True or False ?

4. Cloud computing is a distributed computing model.


True
False
5. Gilder’s law indicates that network bandwidth has ____ each year in the past.
doubled
tripled
remained unchanged
changed unpredictably
6. The goals of a hypervisor are,
Fidelity
Performance
Safety & isolation
Low Latency

7. Infrastructure as a Service (IaaS) delivery model is an example of a cloud computing environment that
provides users access to ______
Physical Machines
Virtual Machines
Storage Space
Virtual Memory
8. The figure depicts a Bare-Metal Hypervisor. The statement is,

True
False
9. In Sandpiper architecture, the Nucleus is responsible for,
Monitoring Resources
Allocating Resources
Migrating Resources
Detecting hotspots

10. Microsoft’s Hyper-V uses full virtualization, the statement is


True
False

Week 02: Assignment 02


The due date for submitting this assignment has passed.
Due on 2024-02-07, 23:59 IST.
As per our records you have not submitted this assignment.

1. Select the design goals for Open vSwitch


Scalability
Isolation
Reliability
Partitioning

2. Consider the following statements related to Software-defined networking (SDN) technology:

Statement 1: SDN is an approach to network management that enables dynamic, programmatically


efficient network configuration in order to improve network performance and monitoring making it more
like cloud computing than traditional network management.

Statement 2: SDN attempts to centralize network intelligence in one network component by


disassociating the forwarding process of network packets (data plane) from the routing process (control
plane).
Only statement 1 is true
Only statement 2 is true
Both statements are false
Both statements are true
3. MPLS stands for,
Machine-Protocol Label Switching
Multi-Protocol Label Switching
Multi-Partition Label Switching
Machine-Partition Label Switching
4. Docker is user for ________ management.
Hypervisor
Virtual Machine
Container
Storage
5. Mininet is a _____ emulator.
network
storage
processor
hardware
6. VLB and ECMP is used by _____ to offer hot-spot free performance for arbitrary traffic matrices.
VL2
EQMP
Load balancer
Virtual Machine
7. Select the key challenges of a Multi-Tenant Data Center:
Scalability
Agility
Location independent addressing
Performance uniformity
8. In Single-root I/O Virtualization (SR-IOV), the live VM migration becomes trickier, because,
the virtual machine is tied to internal datacenter network
the virtual machine is tied to physical resources of the machine
the virtual machine is very large in size
the virtual machine presents security risk

9. NOX is a ________
Routing Control Platform
4D architecture
OpenFlow Controller
Virtual Switch
10. Google’s B4 architecture comprises a hierarchy of controllers in which at the top level we have
the ______ responsible for which is talking to an SDN gateway.
Global controller
Data center controller
Local controller
Cloud controller

Week 03: Assignment 03


The due date for submitting this assignment has passed.
Due on 2024-02-14, 23:59 IST.

Assignment submitted on 2024-02-13, 11:13 IST


The message complexity for a Classical Algorithm of Ring Election with N labelled processes is (xN - 1)
messages, where x is,
1
2
3
4
A run of leader election algorithm must guarantee which properties,
Safety
Recovery
Liveness
No Faulty Process
Zookeeper uses ZAB, a variant of _______ algorithm.
Paxos
Bully
Chubby
Ring based
In the LCR algorithm for leader election, the message complexity is,

O(n2)�(�2)
O(nlogn)�(�����)
O(n3)�(�3)
O(n)�(�)
The lower bound on message complexity for an leader election algorithm for asynchronous rings whose
size is not known a priori is,

Ω(nlogn)Ω(�����)
Ω(n2)Ω(�2)
Ω(n)Ω(�)
Ω(2n)Ω(2�)
Select the time complexity of below algorithm:

1. send value of own id (i) to the left


2. when received an id (j) (from the right):
2.1 if j > i then forward j to the left (this processor has lost)
2.2 if j = i then select self (this processor has won)
2.3 if j < i then do nothing

O(n)�(�)
O(logn)�(����)
O(n2)�(�2)
O(1)�(1)
In the O(nlogn) messages leader election algorithm, the probe distance in phase k is _______ and the
Number of messages initiated by a processor in phase k is at most ______________including probes and
replies in both directions.

2k−1,4k2�−1,4�
2k,4∗2k2�,4∗2�
k,2k�,2�
2k,4∗2k2�,4∗2�
____________ occurs when two processes are competing with each other potentially causing data
corruption.
Deadlock
Race Condition
Exclusion
Locking
In Zookeeper coordination activity, Sequential Consistency implies that,
Successful update will be persisted and cannot be undone.
Update from clients either succeed or fail
Update from clients are applied in order
Nothing
____________ occurs when two processes are waiting for each other directly or indirectly.
Overflow
Race Condition
Deadlock
Synchronization

Week 04: Assignment 04


The due date for submitting this assignment has passed.
Due on 2024-02-21, 23:59 IST.

Assignment submitted on 2024-02-21, 18:56 IST


1. Which layer of the network devices is used by the Datacenter Time Protocol to implement a
decentralized clock synchronization protocol?
transport layer
application layer
physical layer
session layer
2. The sets {1,2,3}, {2,5,7} and {5,7,9} cannot be quorums in a coterie, because the intersection property
does not hold. This statement is,
True
False
3. The sets {1,2,3} and {1,3} cannot be quorums in a coterie because the first set is a superset of the
second. Which property does this statement reflect?
Intersection property
Minimality property
Total ordered set property
None of the above
4. Which event is concurrent with the vector clock (3, 8, 4)?
(6, 8, 4)
(5, 10, 5)
(2, 8, 5)
(2, 6, 2)
5. According to the safety property of mutual exclusion in distributed system, how many processes can
execute in critical section at any time?
All running processes
At most one
At most two
Cannot be determined
6. Fairness is an essential property for mutual exclusion in a distributed system. This statement is,
True
False
7. A client's clock reads 3:20:00. The server's clock reads 3:10:00 when they synchronize using the
Berkeley algorithm. Assume message delays are negligible. What is the time at the client after
synchronization?
3:15:00
3:20:00
6:20:00
6:30:00
8. Consider the following statements related to the Ricart-Agrawala algorithm:

Statement 1: The Ricart-Agrawala algorithm assumes the communication channels are FIFO. The
algorithm uses two types of messages: REQUEST and REPLY.

Statement 2: A process sends a REQUEST message to all other processes to request their
permission to enter the critical section. A process sends a REPLY message to a process to give its
permission to that process.
Only statement 1 is true
Only statement 2 is true
Both statements are true
Both statements are false
9. The Chandy-Lamport algorithm uses a control message, called a marker whose role in a FIFO system
is to separate messages in the channels. This statement is,
True
False
10. For the given event diagram, identify the correct events with vector clocks. Assume that the vector
elements are all set to zero at the beginning.

a: (2, 2, 4), b: (0, 0, 3), c: (3, 0, 3), d: (0, 0, 2), e: (2, 3, 2), f: (1, 0, 0), g: (2, 0, 0), h: (2, 1, 0), i: (2, 2, 0), k:
(0, 0, 1)
a: (2, 2, 0), b: (0, 0, 1), c: (2, 2, 4), d: (1, 0, 0), e: (2, 0, 0), f: (2, 1, 0), g: (0, 0, 3), h: (3, 0, 3), i: (0, 0, 2), k:
(2, 3, 2)
a: (1, 0, 0), b: (2, 0, 0), c: (2, 1, 0), d: (2, 2, 0), e: (0, 0, 1), f: (2, 2, 4), g: (0, 0, 3), h: (3, 0, 3), i: (0, 0, 2), k:
(2, 3, 2)
a: (2, 1, 0), b: (2, 2, 0), c: (0, 0, 1), d: (2, 2, 4), e: (0, 0, 3), f: (1, 0, 0), g: (2, 0, 0), h: (3, 0, 3), i: (0, 0, 2), k:
(2, 3, 2)
Week 05: Assignment 05
The due date for submitting this assignment has passed.
Due on 2024-02-28, 23:59 IST.

Assignment submitted on 2024-02-28, 23:47 IST


1. Which of the following statements are correct?
Statement 1: A protocol for an synchronous system will also work for an asynchronous system.
Statement 2: Paxos doesn’t provide safety and eventual liveness.
Statement 1 only
Statement 2 only
Both
None
2. Select the properties of an Asynchronous Distributed System.
No bounds on process execution
The drift rate of a clock is arbitrary
Each message is received within bounded time
No bounds on message transmission delays
3. In a crash model for process failure, if a process fails other processes can know about the failure. The
statement is,
True
False
4. In the ________, Single source has an initial value and All non-faulty processes must agree on the
same value.
Byzantine Agreement Problem
Consensus problem
Interactive Consistency problem
Learder-election problem

5. In the ________, all processes have an initial value, whereas in the ___________, a single process
has the initial value.
agreement problem, consensus problem
consensus problem, agreement problem
agreement problem, learder-election problem
consensus problem, learder-election problem
6. Find out the correct problem for the following problem specification:

Agreement: All non-faulty processes must agree on the same (single) value.
Validity: If all the non-faulty processes have the same initial value, then the agreed upon value by all
the non-faulty processes must be that same value.
Termination: Each non-faulty process must eventually decide on a value
Byzantine Agreement Problem
Consensus Problem
Interactive Consistency Problem
Consistency Problem
7. In ______________________, process coordinate their checkpoints in order to save a system-wide
consistent state. This consistent set of checkpoints can be used to bound the rollback.
Uncoordinated Checkpointing
Coordinated Checkpointing
Communication-induced Checkpointing
Livelock Checkpointing
8. ____________________ is a cascaded rollback which causes the system to roll back to too far in the
computation (even to the beginning), in spite of all the checkpoints.
Rollback
Phantom Effect
Domino Effect
Livelock problem
9. ______ is widely used implementation of a safe, _______ consensus protocol for ______ systems.
Paxos protocol, consistent, synchronous
Leader election, eventually-live, synchronous
Apache Zookeeper, consistent, asynchronous
Paxos protocol, eventually-live, asynchronous
10. Messages whose ‘send’ is done but ‘receive’ is undone due to rollback are called_________________.
In-transit message
Lost messages
Orphan messages
Duplicate messages

Week06: Assignment 06
The due date for submitting this assignment has passed.
Due on 2024-03-06, 23:59 IST.

Assignment submitted on 2024-03-06, 20:46 IST


1 point
1. Cassandra uses ________ to discover location and state information.
Snitch
Gossip protocol
Patition Manager
Distributed Hash tables
2. Match the following

List 1:
1. Consistency
2. Availability
3. Partition-tolerance

List 2:
A. All nodes see same data at any time, or reads return latest written value by any client.
B. The system continues to work in spite of network partitions
C. The system allows operations all the time, and operations return quickly.
1-A, 2-C, 3-B
1-A, 2-B, 3-C
1-C, 2-A, 3-B
1-C, 2-B, 3-A
3. Choose the correct items for X, Y, and Z.
X is a free and open-source, distributed, wide column store, Y database management system designed
to handle large amounts of data across many commodity servers, providing high availability with no Z.
X- Apache Cassandra, Y- SQL, Z- single point of failure
X- Hbase, Y- NoSQL, Z- failure
X- Zookeeper, Y- NoSQL, Z- multiple failure
X- Apache Cassandra, Y- NoSQL, Z- single point of failure
4. A small chunk of data residing in one machine which is part of a cluster of machines holding one
Hbase table is known as _____.
Rowarea
Tablearea
Split
Region
5. Choose the correct items for X, Y, and Z.
X in HBase Table is a combination of row, Y, Z and contains a value and a timestamp.
X- Row, Y- row family, Z- row qualifier
X- Cell, Y- column family, Z- column qualifier
X- Row, Y- rowkey, Z- column qualifier
X- Rowkey, Y- column family, Z- column qualifier
6. In Cassandra, ____ maps IPs to racks and data centers configured in cassandra.yaml config file.
Client requests
Partitioner
Snitch
Distributed Hash tables
7. Cell in HBase Table is a combination of ____ .
Row and column family
Row, column family and column qualifier
Row, column family, column qualifier and row keys
Row, column family, column qualifier and contains a value and a timestamp
8. ______ is a memory cache to store the in memory copy of the data. It accumulates writes and provides
read for data which are not yet stored to disk.
Distributed Hash tables
Collection
SSTable
Memtable
9. Consider the following statements:
Statement 1: Scale out means grow your cluster capacity by replacing with more powerful machines.
Statement 2: Scale up means incrementally grow your cluster capacity by adding more COTS
machines (Components Off the Shelf).
Only statement 2 is true
Only statement 1 is true
Both statements are true
Both statements are false
10. HBase is a distributed ________ database built on top of the Hadoop file system.
Row-oriented
Tuple-oriented
Column-oriented
None of the mentioned

Week 07: Assignment 07


The due date for submitting this assignment has passed.
Due on 2024-03-13, 23:59 IST.
Assignment submitted on 2024-03-11, 11:53 IST
1. Select the disadvantages of the Napster peer to peer network.
Centralized server is a source of congestion
Distributed storage
Centralized server is a single point of failure
No security

2. In Chord a supernode stores a directory listing a subset of nearby (<filename,peer pointer>), similar to
Napster servers. The statement is,
True
False
3. _____ systems use _____ organization of the _____ for flexibly sharing resources (e.g., files and
multimedia documents) stored across network-wide computers.
Chord, Network-level, local network
DHT, Physical-level, network overlay
Peer-to-peer (P2P) network, Transport-level, network overlay
Peer-to-peer (P2P) network, Application-level, network overlay
4. In a Gnutella P2P network with N nodes, how many number of messages would a lookup operation
require?
N
N/2
log(N)
log(logN)
5. Users specify a ___________function that processes a key/value pair to generate a set of intermediate
key/value pairs, and a ____________ function that merges all intermediate values associated with the
same intermediate key.
Reduce, Map
Map, Reduce
Chunk, Grep
None of the mentioned
6. The Map phase is subdivided into M pieces and the reduce phase into R pieces. There are practical
bounds on how large M and R can be, since the master must make X scheduling decisions and keeps
Y state in memory.
X: O(M*R), Y: O(M * R)
X: O(M + R), Y: O(M + R)
X: O(M + R), Y: O(M * R)
X: O(M * R), Y: O(M + R)
7. Select the characteristic of P2P network.
Fault Tolerance
Dealing with instability
Low Latency
Self-Adaptation
8. Peer-to-peer (P2P) network systems use ___________________organization of the network overlay
for flexibly sharing resources (e.g., files and multimedia documents) stored across network-wide
computers.
Physical-level
Network-level
Transport-level
Application-level
9. Which of these P2P system uses a 1 hop Lookup DHT (Distributed Hash Table)?
CAN
Kelips
CHORD
Gnutella
10. Select the correct statement with regard to BitTorrent.
Prefer early download of blocks that are least replicated among neighbors
Centralized serve
Some peers designated as super nodes
Clients act as servers too, called servents

Week 08: Assignment 08


The due date for submitting this assignment has passed.
Due on 2024-03-20, 23:59 IST.

Assignment submitted on 2024-03-20, 11:43 IST


1. Identify the correct Kafka commands for the following:
P: These are the commands of your Unix pipelines. Use it to transform data stored in Kafka.
Q: It is the I/O redirection in your Unix pipelines. Use it to get your data into and out of Kafka.
R: It is the distributed, durable equivalent of Unix pipes. Use it to connect and compose your large -
scale data applications.
P: Kafka Streams, Q: Kafka Connect, R: Kafka Core
P: Kafka Core, Q: Kafka Connect, R: Kafka Stream
P: Kafka Streams, Q: Kafka Core, R: Kafka Connect
P: Kafka Core, Q: Kafka Streams, R: Kafka Connect
2. Choose the correct items for X, Y, and Z.
X can create a Y by sharing information between each other directly or indirectly using Zookeeper.
A Y has exactly one broker that acts as the Z.
X- Kafka cluster, Y- Kafka broker , Z- Master
X- Zookeeper, Y- Kafka cluster , Z- Slave
X- Zookeeper, Y- Kafka broker , Z- Controller
X- Kafka broker, Y- Kafka cluster , Z- Controller
3. A topic is a category or feed name to which messages are published. For each topic, the Kafka cluster
maintains a partitioned log the statement is,
True
False
4. Each Kafka partition has one server which acts as the _________.
Leader
Follower
Stater
None of the mentioned
5. Which type of processing Apache Spark can handle?
Stream Processing
Batch Processing
Graph Processing
All of the Mentioned
6. Which is not a component on the top of Spark Core ?
Spark Streaming
Spark RDD
MLlib
None of the mentioned
7. _________________________ is a fundamental data structure of Spark. It is an immutable distributed
collection of objects.
Spark Streaming
Resilient Distributed Dataset (RDD)
FlatMap
Driver
8. ______________is a distributed machine learning framework on top of Spark. Its goal is to make
practical machine learning scalable and easy.
MLlib
Spark Streaming
GraphX
RDDs
9. Kafka is run as a cluster comprised of one or more servers each of which is called_____________ .
cTakes
Chunks
Broker
None of the mentioned
10. Kafka maintains feeds of messages in categories called______________
Chunks
Domains
Messages
Topics

You might also like