Unit Ii Grid Computing Initiatives Part - A (2 MARKS)
Unit Ii Grid Computing Initiatives Part - A (2 MARKS)
Unit Ii Grid Computing Initiatives Part - A (2 MARKS)
1. Name the classification of grid computing organization based on their functional role.
2. What are the basic goals of GGF?
3. What are the high level services including in existing globus tool kit?
4. Mention the important characteristic of legion system
5. What are the core objects defined by legion system?
6. Compare and contrast condor and condor _G
7. Name the components available in Nimrod architecture?
8. What are the scheduling algorithms used in Nimrod_G?
9. What are the major objectives of Euro grid project?
10. What are the application specific work packages identified for the Euro grid?
11. Define dynamic accounting system.
12. Mention the characteristic of connectivity layer?
13. What are the two primary classes of resource layer protocols?
14. What are the collective services available in grid computing What are the basic principles of autonomous
computing?
15. What are the essential capabilities provided by on demand business?
6. What are the two most important technologies for building semantic webs?
PART –B
1 a) Explain about the organization developing grid standards and best practices guidelines (8)
b) Explain about the organization working to adopt grid concepts into commercial products.(8)
2. Discuss briefly about organization building and using grid based solution to solve their computing data
and network requirements. .(16)
3. Write notes on organizations developing grid computing toolkits frameworks and middleware solution.(16)
4. Explain the layered architecture of grid with a neat diagram. (16)
5. Describe about the relation of grid architecture with other distributed technologies. .(16)
6. Write notes on Autonomic computing (4),
BOD and infrastructure virtualization (4),
Service oriented architecture and grid (4), Semantic grids (4)
7. What are the third generation initiatives of grid computing? .(16)
Unit-II SOFTWARE QUALITY ASSURANCE
Part-A (2 Marks)
Part-B
1. Explain in detail the Quality tasks and responsibilities. (16)
2. Explain in detail about the Documentation. (16)
3. Explain the Procedural description template and Action items (16)
4. Explain in detail the CMM Compatibility of Reviews and audits. (16)
5. Explain the management review process. (16)
6. Explain the technical review process. (16)
7. Explain the types of reviews. (16)
8. Explain the software inspection process. (16)
9. a) Explain walkthrough process. (8)
b) Explain the Audit process. (8)
10. a) Explain the Document verification and validation. (8)
b) Explain the factors affecting the SQA effort. (8)
IT1402- MOBILE COMPUTING
(Regulation 2004)
10. How and why does I-TCP isolate problems on the wireless link?
PART B - (5 X 16 = 80 Marks)
11. (a) Consider three users and Barker code of six bits each for the users transmitting the
signals, introduce noise and near/far problem while transmitting and reconstruct the data in
the receiving side providing the proper countermeasures for the complications. (Note: Use
CDMA technologies) (Marks 16)
(Or)
(b) (i) Table the frequency bands useed for wireless applications with their ranges,
propagation models and applications. (Marks 6)
(ii) Represent diagrammatically the protocol machines for multiple access with collision
avoidance. (Marks 10)
12. (a) (i) Sketch the data network in your campus. How many hosts are there and how large
is the user population? What is the speed of the access link to the Internet? How so you gain
access to the Internet? How much does home access to the Internet costs? (Marks 10)
(ii) Why are so many different identifiers/addresses (e.g. MSISDN, TMSI, IMSI) needed in
GSM? Give reasons and distinguish between user- related and system related identifiers.
(Marks 6)
(Or)
(b) (i) Consider a mobile user who is migrating from a place to another place, provide him a
seamless service by satellite system, also sketch the architecture. (Marks 8)
13. (a) (i) Detail the time- bounded service on top of the standard DCF mechanism where ad
hoc networks cannot use the function. (Marks 8)
(ii) Discuss the PHY frame format of an IEEE 802.11 using the spread spectrum technique
which separates by code. (Marks 8)
(Or)
(b) (i) The channel access control sublayer of HIPERLAN offers a connectionless data transfer
service to the higher MAC layer. Justify the above statement with related references. (Marks
10)
14. (a) Discuss and detail the differences in topology reorganization in DSDV and DSR routing
protocols. (Marks 16)
(Or)
(b) (i) What are the general problems of mobile IP regarding security and support of quality of
service? (Marks 8)
(ii) Name the inefficiencies of mobile IP regarding data forwarding from a correspondent node
to a mobile node. What are optimizations and what additional problems do they cause? (Marks
8)
15. (a) What are the major difference between WAP 2.0 and WAP 1.x? What influenced the
WAP 2.0 development? (Marks 16)
(Or)
(b) Detail about UTMS Radio Interfaces in Frequency Division Duplex and Time Division Duplex
modes. (Marks 16)