SEATstatic-238
Total No. of Questions :
8] 49.248.216.238 11/05/2024 13:30:53 No. :
[Total No. of Pages : 2
PB2505 [6263]-391
B.E.(AI&DS)
DISTRIBUTED COMPUTING
CEGP013091
(2019 Pattern)(Semester - VIII)(417531)
Time : 2½ Hours] [Max. Marks :70
Instructions to the candidates:
1) Answer Q1or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8.
2) Neat diagrams must be drawn Wherever necessary.
3) Figures to the right indicate full marks.
4) Use electronic pocket calculator is allowed.
49.248.216.238 11/05/2024 13:30:53 static-238
Q1) a) List and explain any one variant of Paxos in detail. [6]
b) Explain Fault Tolerance and Recovery in context of Distributed systems.
[6]
c) CEGP013091
Explain reinforcement Learning for Dynamic Load Balancing. [6]
OR
Q2) a) What is consensus algorithms? Explain any one algorithm. [6]
b) Explain Genetic Algorithms for Task Scheduling. [6]
c) 49.248.216.238
Compare Centralized Load Balancing
11/05/2024 13:30:5
& Distributed Load Balancing
Techniques. [6]
Q3) a) Explain Systems and Architectures for Distributed Machine Learning.
CEGP013091 [9]
b) Write note on [8]
i) Federated Learning,
ii) Hogwild
iii) Elastic Averaging SGD
OR
Q4) a) What is Apache Spark? Explain working of Apache Spark. [9]
b) Explain how integration of AI algorithms in distributed systems can
help in Intelligent Resource Management, Anomaly Detection. [8]
[6263]-391 1 P.T.O.
Explain the Big data11/05/2024
Q5) a)49.248.216.238 13:30:53
processing frameworks static-238
in distributed computing.
[6]
b) Differentiate between SIMD and MIMD. [6]
c) Elaborate various scalable data ingestion methods used in distributed
computing environments. [6]
CEGP013091 OR
Q6) a) Explain how AI and data science can be applied for large-scale data
processing and analytics. [6]
b) Compare SISD and MISD [6]
c) Discuss about various types of real-time analytics used in distributed
computing systems. [6]
49.248.216.238 11/05/2024 13:30:53 static-238
Q7) a) Explain Anomaly as well as Behavior AI-based Intrusion
Detection&Threat Mitigation Techniques [9]
b) Explain how can Secure Multi-Party Computation(SMPC)be
effectively implemented to ensure confidentiality and privacy
preservation. CEGP013091 [8]
OR
Q8) a) Enlist the various security challenges in distributed systems?
Elaborate any three challenges in detail? [9]
b) Write a Short Note a Threat Hunting and Visualization. [8]
🙦🙤 🙦🙤49.248.216.238
🙦🙤 11/05/2024 13:30:5
CEGP013091
[6263]-391 2