Week 02: Assignment 02
1. What are the three major components that make up a virtualized environment?
Guest Layer
Virtualization Layer
Host Layer
Data Layer
Explanation:
As per the virtualization reference model,
a virtualized environment has 3 layers - Guest layer, Virtualization layer and Host layer.
2. In SDN, The control and data planes are _______, and the network controller is _________.
coupled, decentralized
decoupled, decentralized
decoupled, centralized
coupled, centralized
Explanation:
In Software Defined Networking (SDN), the architecture is designed to decouple the control plane
and the data plane of traditional networking devices such as routers and switches.
Control Plane: This is responsible for making decisions about where traffic should be sent.
It manages the routing and forwarding tables, determines the best path for data traffic,
and handles network configuration and management.
Data Plane: Also known as the forwarding plane, it is responsible for the actual forwarding
of data packets based on the decisions made by the control plane. The data plane performs the
packet switching and forwarding functions.
SDN enables centralized control and management of the network through the SDN controller,
making it easier to implement network-wide policies and configurations.
3. Select the mechanisms through which virtual machines can interact with physical hardware.
System Calls
Inter-process communication
Interrupts
Control Bus
Explanation:
The two primary mechanisms through which virtual machines can interact with physical hardware
are Interrupts and System Calls.
System Calls
Applications make requests for services from the operating system through system calls.
These services may include file operations, network communication, or hardware-related operations.
For e.g., An application might use a system call to open a file, request input from a keyboard
UNIX system calls e.g., - open, read, write, close, wait, exec, fork, exit, kill
Interrupts and Traps:
A trap is a computer-generated occurrence that results from an error or exception
in the program(user process) that is running at the time.
For e.g., Division by zero, invalid memory access.
An interrupt is generated by the hardware
For e.g., When a hardware device, such as a network interface card, has data ready
to be processed, it may trigger an interrupt, prompting the operating system to
handle the incoming data.
4. Equivalence principle in VMM states that,
VMM should be in complete control of virtualized resources
guest should have same behavior when executed directly on the physical host and when it is running under control of VMM
a statistically dominant fraction of the machine instructions should be executed without intervention from the VMM
sensetive information should be hidden from guest
Explanation:
The Equivalence Criteria of VMMS states that
guest should have same behavior when executed directly on the physical host and when it is running under control of VMM
5. In the context of managed execution in virtualized environments, _______ refers to running multiple guests on the same host
without the guests interfering with each other.
Sharing
Aggregation
Emulation
Isolation
Explanation:
In the Managed Execution Characteristic of virtualized environments,
Isolation refers to the propertly that
allows multiple guests to run on the same host without interfering with each other,
it also provides Separation between the host and the guest.
6. In execution virtualization, ______ separates the OS layer from application and libraries.
Application Programming Interface
Instruction Set Architecture
Execution Environment
Application Binary Interface
Explanation:
Application Binary Interface (ABI) seperates OS layer from application and libraries which are managed by the OS,
System Calls defined, allows portability of applications and libraries across OS
7. Security rings are designed to,
protect the system from malicious interference by user-level programs
protect the system from physical damage
provide encryption to system files
protect user data residing on persistent storage
Explanation:
The idea behind security rings is to create a hierarchy of privilege levels, ensuring that
critical system components operate with the highest privilege (Ring 0)
while user applications operate at a lower privilege level (Ring 3).
This helps protect the system from accidental or malicious interference by user-level programs.
8. ________ is a popular containerization platform.
Microsoft Hyper-V
Docker
OpenFlow
Intel VT
Explanation: Docker is a popular containerization platform used for building containers.
9. A Type-I hypervisor runs on top of the host operating system. The statement is,
True
False
Explanation:
Type-1 hypervisor also called bare-metal hypervisor does not require an host operating system.
Type-2 or hosted hypervisor requires a host operating system.
10. What is a Dockerfile?
a file in which data generated by docker containers can be stored
a command-line interface to control docker volumes
a running instance of a Docker image
a script that contains instructions for building docker images
Explanation:
A Dockerfile is a script that contains a set of instructions
that are executed in order to build a Docker image.
Once the image is built, it can be used to run containers,
each isolated and containing the specified dependencies and configurations.