0% found this document useful (0 votes)
21 views25 pages

Cloud Computing Important Questions From Pyp and MQP

The document provides an overview of cloud, grid, and cluster computing, highlighting their differences and key characteristics. It discusses various system models, virtualization, and the importance of virtualization in cloud computing, as well as different computing environments used in cloud technology. Additionally, it explains cluster computing architecture and its types, emphasizing the benefits of using clusters for enhanced performance and resource management.

Uploaded by

sara22aiml
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views25 pages

Cloud Computing Important Questions From Pyp and MQP

The document provides an overview of cloud, grid, and cluster computing, highlighting their differences and key characteristics. It discusses various system models, virtualization, and the importance of virtualization in cloud computing, as well as different computing environments used in cloud technology. Additionally, it explains cluster computing architecture and its types, emphasizing the benefits of using clusters for enhanced performance and resource management.

Uploaded by

sara22aiml
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

Module 1: Introduction to Cloud & Distributed Computing

1. Differentiate between cluster, grid, and cloud computing. Discuss the key enabling
technologies used in network-based systems.

A cloud is a network of servers hosted or managed by an external company. In order


to access a cloud service, we typically utilize a website or application. Additionally, the
website or application connects us to the information or services not present in the local
system.
Data centers run a cloud service that is shared among many users. Hence, we don’t need to
purchase hardware or software when using a cloud service. Furthermore, data is stored in a
central location accessible from any device. We primarily access cloud services through the
Internet, but a virtual private network can also be used.
The most common cloud service is cloud computing. Using could computing, a company
rents out server space, bandwidth, and other resources from a third-party vendor to fulfill the
business requirement. Furthermore, cloud computing includes servers, storage,
databases, and software available over the Internet. Additionally, it enhances efficiency,
reduces operational cost, and accelerate execution speed.
Let’s take a look at the cloud computing architecture:

Several clients can simultaneously access different services, storage, and applications via
the Internet.

3. Grid

A grid is a distributed computing architecture that connects a network of computers


to form an on-demand robust network. A network of computers utilizes grid computing to
solve complex problems. Furthermore, it makes sure a business or organization runs
smoothly. Additionally, it uses many computers in different locations. These computers are
connected to complete a specific task or process.
The computers in a grid work together to perform a task. Additionally, each computer
performs a part of the task. When a computer finishes a part of the task, it passes the rest of
the work on to another computer. Further, grid computing contains a large number of servers
and computers. Moreover, each of them executes independently. Let’s take a look at the grid
computing architecture:

The significant difference between cloud and grid computing is that grid computing solves
complicated tasks, but cloud computing provides users access to some particular
services at a low cost.

4. Cluster

A cluster is a network topology containing two or more computers connected to each


other. Furthermore, a local network connects the computers or nodes on the cluster.
Generally, we place all the nodes in the same location in a cluster. Additionally, it
follows centralized architecture.
The cluster can work with any operating system or architecture. Additionally, the nodes on
the cluster can be synchronous or asynchronous. Synchronous nodes share data at the
same time. Asynchronous nodes send data out at different times.
The nodes in a cluster can be both synchronous and asynchronous, but it depends on the
type of cluster. Clusters differ from clouds as clusters contain two or more computer systems
connected to the cluster head node, acting like a single system. On the other hand, a cloud
includes servers, storage, and databases ready to use over the Internet:
5. Differences

Now let’s take a look at the core differences between grid, cloud, and cluster:

Cloud Grid Cluster

Consolidation of
Segregation of resources Aggregation of resources
resources

Single system made up Collection of systems that act Group of nodes that are
of many systems together like a single system connected to each other

All the connected systems


Works with different Works with different hardware
should have same OS and
hardware and OS and OS
hardware

Follows centralized
Follows distributed architecture Follows centralized architecture
architecture

All the nodes work


Suffers from a single Suffers from a single point of
independently, hence no single
point of failure failure
point of failure

The owners have less The owners have full control


Have no owners, and each
control over the and management over the
node works independently
systems on the cloud grid’s systems

Job execution is self- Scalability of execution allows The scheduling of jobs affects
managed for the transfer of a job’s execution. Jobs, therefore, wait
Cloud Grid Cluster

execution to an available
until their designated runtime
processor

Used in Dropbox, Used in simulations, Used in web servers, search


Gmail automations engines

2. Describe the software environments used for distributed systems and cloud platforms.
3. Describe the different system models for distributed and cloud computing.

System Models for Distributed and Cloud Computing

System models describe how computing systems are organized, structured, and interact. In the
context of distributed and cloud computing, the primary models include:

1. Architectural Models

These define how system components are structured and interact.

a) Client-Server Model
 Description: A central server provides resources/services to multiple client machines.
 Example: Web browsers (clients) interacting with a web server.
 Use Case: Traditional web applications, file servers.

b) Peer-to-Peer (P2P) Model

 Description: Each node acts as both a client and a server. Resources are shared among peers.
 Example: BitTorrent, blockchain networks.
 Use Case: File sharing, decentralized applications.

c) Multitier Model (N-tier)

 Description: Functions are separated into layers: presentation, application logic, and data
storage.
 Example: A 3-tier web application with front-end, business logic, and database layers.
 Use Case: Enterprise applications, web-based systems.

d) Service-Oriented Architecture (SOA)

 Description: Services are loosely coupled and communicate via standard protocols (e.g.,
HTTP, SOAP).
 Example: Microservices architecture in cloud apps.
 Use Case: Scalable, flexible cloud applications.

2. Computing Models

These focus on how computing resources are accessed and managed.

a) Cluster Computing

 Description: A group of tightly coupled computers working together as a single system.


 Use Case: High-performance computing (HPC), scientific simulations.

b) Grid Computing

 Description: Distributed computing over a large geographical area, integrating diverse


resources.
 Use Case: Resource-intensive tasks like protein folding simulations.

c) Cloud Computing

 Description: On-demand access to shared computing resources (IaaS, PaaS, SaaS) over the
internet.
 Use Case: Web hosting, storage services, AI model deployment.

3. Virtualization Models

Used extensively in cloud computing for resource abstraction.


a) Full Virtualization

 Entire hardware is emulated, allowing multiple OSes to run independently (e.g., VMware).

b) Paravirtualization

 Guest OS is aware of virtualization and interacts with the hypervisor directly (e.g., Xen).

c) Containerization

 Lightweight, OS-level virtualization where containers share the host OS kernel (e.g., Docker).

4. Business Models (specific to Cloud)

These describe how services are delivered.

a) Infrastructure as a Service (IaaS)

 Raw computing resources like servers and storage (e.g., AWS EC2).

b) Platform as a Service (PaaS)

 Platform for application development and deployment (e.g., Google App Engine).

c) Software as a Service (SaaS)

 Fully functional software delivered over the internet (e.g., Gmail, Microsoft 365).

4. Explain virtualization and its importance in cloud computing.

What is Virtualization?

Virtualization is the process of creating a virtual representation of hardware such as server,


storage, network or other physical machines. It Supports multiple copies of virtual
machines(VMs) to execute on one physical machine each with their own operating system
and programs. This optimizes hardware efficiency and flexibility and enables resources to be
shared between multiple customers or organizations.
Virtualization is a key to providing Infrastructure as a Service (IaaS) solutions for cloud
computing, whereby the user has access to remote computing resources.

Why is Virtualization Important?

Virtualization is important because it let's you get the most out of your computer or server
resources. Consider it like being able to use one physical box as many smaller, independent
"virtual" boxes. There are multiple virtual boxes, each having its own program to run and
data to store, but they use the same physical box.

1. Better use of Resources

Instead of allowing for numerous unused machines, virtualization enables you to host
multiple programs or systems on one computer, which is more effective.

2. Cost Utilization

Companies can save their money on hardware, power, and maintenance by using less
physical equipment.

3. Flexibility

Virtual machines can be easily installed, relocated and resized to suit changing
requirements. If a virtual machine requires more power, it can obtain it rapidly without
requiring new hardware.

4. Security

Virtualization isolates various applications or systems from each other, so if one of them has
an issue, it won't affect others.

5. Simple Recovery

In case something goes wrong, it's simple to back up or restore virtual machines, allowing
companies to return to work quickly after an issue.

5. Discuss any two software environments used in cloud computing.

Computing environments refer to the technology infrastructure and software platforms that
are used to develop, test, deploy, and run software applications. There are several types of
computing environments, including:
1. Mainframe: A large and powerful computer system used for critical applications
and large-scale data processing.
2. Client-Server: A computing environment in which client devices access
resources and services from a central server.
3. Cloud Computing: A computing environment in which resources and services
are provided over the Internet and accessed through a web browser or client
software.
4. Mobile Computing: A computing environment in which users access information
and applications using handheld devices such as smartphones and tablets.
5. Grid Computing: A computing environment in which resources and services are
shared across multiple computers to perform large-scale computations.
6. Embedded Systems: A computing environment in which software is integrated
into devices and products, often with limited processing power and memory.
Each type of computing environment has its own advantages and disadvantages, and the
choice of environment depends on the specific requirements of the software application
and the resources available.
In the world of technology where every tasks are performed with help of computers, these
computers have become one part of human life. Computing is nothing but process of
completing a task by using this computer technology and it may involve computer
hardware and/or software. But computing uses some form of computer system to manage,
process, and communicate information. After getting some idea about computing now lets
understand about computing environments.
Computing Environments : When a problem is solved by the computer, during that
computer uses many devices, arranged in different ways and which work together to solve
problems. This constitutes a computing environment where various number of computer
devices arranged in different ways to solve different types of problems in different ways. In
different computing environments computer devices are arranged in different ways and
they exchange information in between them to process and solve problem. One computing
environment consists of many computers other computational devices, software and
networks that to support processing and sharing information and solving task. Based on
the organization of different computer devices and communication processes there exists
multiple types of computing environments.
Now lets know about different types of computing environments.
Types of Computing Environments : There are the various types of computing
environments. They are :

Computing Environments Types


1. Personal Computing Environment : In personal computing environment there
is a stand-alone machine. Complete program resides on computer and
executed there. Different stand-alone machines that constitute a personal
computing environment are laptops, mobiles, printers, computer systems,
scanners etc. That we use at our homes and offices.
2. Time-Sharing Computing Environment : In Time Sharing Computing
Environment multiple users share system simultaneously. Different users
(different processes) are allotted different time slice and processor switches
rapidly among users according to it. For example, student listening to music
while coding something in an IDE. Windows 95 and later versions, Unix, IOS,
Linux operating systems are the examples of this time sharing computing
environment.
3. Client Server Computing Environment : In client server computing
environment two machines are involved i.e., client machine and server
machine, sometime same machine also serve as client and server. In this
computing environment client requests resource/service and server provides
that respective resource/service. A server can provide service to multiple clients
at a time and here mainly communication happens through computer network.
4. Distributed Computing Environment : In a distributed computing environment
multiple nodes are connected together using network but physically they are
separated. A single task is performed by different functional units of different
nodes of distributed unit. Here different programs of an application run
simultaneously on different nodes, and communication happens in between
different nodes of this system over network to solve task.
5. Grid Computing Environment : In grid computing environment, multiple
computers from different locations works on single problem. In this system set
of computer nodes running in cluster jointly perform a given task by applying
resources of multiple computers/nodes. It is network of computing environment
where several scattered resources provide running environment for single task.
1. Cloud Computing Environment : In cloud computing
environment on demand availability of computer system
resources like processing and storage are availed. Here
computing is not done in individual technology or computer
rather it is computed in cloud of computers where all required
resources are provided by cloud vendor. This environment
primarily comprised of three services i.e software-as-a-
service (SaaS), infrastructure-as-a-service (IaaS), and
platform-as-a-service (PaaS) .
6. Cluster Computing Environment : In cluster computing environment cluster
performs task where cluster is a set of loosely or tightly connected computers
that work together. It is viewed as single system and performs task parallelly
that's why also it is similar to parallel computing environment. Cluster aware
applications are especially used in cluster computing environment.

Advantages of different computing environments:

1. Mainframe: High reliability, security, and scalability, making it suitable for


mission-critical applications.
2. Client-Server: Easy to deploy, manage and maintain, and provides a centralized
point of control.
3. Cloud Computing: Cost-effective and scalable, with easy access to a wide
range of resources and services.
4. Mobile Computing: Allows users to access information and applications from
anywhere, at any time.
5. Grid Computing: Provides a way to harness the power of multiple computers for
large-scale computations.
6. Embedded Systems: Enable the integration of software into devices and
products, making them smarter and more functional.
Disadvantages of different computing environments:

1. Mainframe: High cost and complexity, with a significant learning curve for
developers.
2. Client-Server: Dependence on network connectivity, and potential security risks
from centralized data storage.
3. Cloud Computing: Dependence on network connectivity, and potential security
and privacy concerns.
4. Mobile Computing: Limited processing power and memory compared to other
computing environments, and potential security risks.
5. Grid Computing: Complexity in setting up and managing the grid infrastructure.
6. Embedded Systems: Limited processing power and memory, and the need for
specialized skills for software development

6. Explain the basic cluster architecture with a neat diagram.

Cluster computing is a collection of tightly or loosely connected computers that work


together so that they act as a single entity. The connected computers execute operations
all together thus creating the idea of a single system. The clusters are generally connected
through fast local area networks (LANs)

Cluster Computing

Why is Cluster Computing important?


1. Cluster computing gives a relatively inexpensive, unconventional to the large
server or mainframe computer solutions.
2. It resolves the demand for content criticality and process services in a faster
way.
3. Many organizations and IT companies are implementing cluster computing to
augment their scalability, availability, processing speed and resource
management at economic prices.
4. It ensures that computational power is always available.
5. It provides a single general strategy for the implementation and application of
parallel high-performance systems independent of certain hardware vendors
and their product decisions.
A Simple Cluster Computing Layout

Types of Cluster computing :

1. High performance (HP) clusters :


HP clusters use computer clusters and supercomputers to solve advance computational
problems. They are used to performing functions that need nodes to communicate as they
perform their jobs. They are designed to take benefit of the parallel processing power of
several nodes.
2. Load-balancing clusters :
Incoming requests are distributed for resources among several nodes running similar
programs or having similar content. This prevents any single node from receiving a
disproportionate amount of task. This type of distribution is generally used in a web-hosting
environment.
3. High Availability (HA) Clusters :
HA clusters are designed to maintain redundant nodes that can act as backup systems in
case any failure occurs. Consistent computing services like business activities,
complicated databases, customer services like e-websites and network file distribution are
provided. They are designed to give uninterrupted data availability to the customers.

Classification of Cluster :

1. Open Cluster :
IPs are needed by every node and those are accessed only through the internet or web.
This type of cluster causes enhanced security concerns.
2. Close Cluster :
The nodes are hidden behind the gateway node, and they provide increased protection.
They need fewer IP addresses and are good for computational tasks.

Cluster Computing Architecture :


 It is designed with an array of interconnected individual computers and the
computer systems operating collectively as a single standalone system.
 It is a group of workstations or computers working together as a single,
integrated computing resource connected via high speed interconnects.
 A node – Either a single or a multiprocessor network having memory, input and
output functions and an operating system.
 Two or more nodes are connected on a single line or every node might be
connected individually through a LAN connection.
Cluster Computing Architecture

Components of a Cluster Computer :


1. Cluster Nodes
2. Cluster Operating System
3. The switch or node interconnect
4. Network switching hardware

Cluster Components

Advantages of Cluster Computing :

1. High Performance :
The systems offer better and enhanced performance than that of mainframe computer
networks.
2. Easy to manage :
Cluster Computing is manageable and easy to implement.
3. Scalable :
Resources can be added to the clusters accordingly.
4. Expandability :
Computer clusters can be expanded easily by adding additional computers to the network.
Cluster computing is capable of combining several additional resources or the networks to
the existing computer system.
5. Availability :
The other nodes will be active when one node gets failed and will function as a proxy for
the failed node. This makes sure for enhanced availability.
6. Flexibility :
It can be upgraded to the superior specification or additional nodes can be added.

Disadvantages of Cluster Computing :


1. High cost :
It is not so much cost-effective due to its high hardware and its design.
2. Problem in finding fault :
It is difficult to find which component has a fault.
3. More space is needed :
Infrastructure may increase as more servers are needed to manage and monitor.

Applications of Cluster Computing :


 Various complex computational problems can be solved.
 It can be used in the applications of aerodynamics, astrophysics and in data
mining.
 Weather forecasting.
 Image Rendering.
 Various e-commerce applications.
 Earthquake Simulation.
 Petroleum reservoir simulation.

7. Write short notes on peer-to-peer network families and their relevance to cloud systems.

The P2P process deals with a network structure where any participant in the network
known as a node acts as both a client and a server. This means that, rather than relying on
a basis server to supply resources or services, everybody from the network of nodes can
trade resources and services with one another. In a P2P system, every node has an equal
role to play and the same functionalities, which means that the loads are well shared.

What Is a Peer-to-Peer (P2P) Service?

A peer-to-peer network is a simple network of computers. It first came into existence in the
late 1970s. Here each computer acts as a node for file sharing within the formed network.
Here each node acts as a server and thus there is no central server in the network. This
allows the sharing of a huge amount of data. The tasks are equally divided amongst the
nodes. Each node connected in the network shares an equal workload. For the network to
stop working, all the nodes need to individually stop working. This is because each node
works independently.

Types of P2P Networks

 Unstructured P2P Networks: In this type of P2P network, each device is able to
make an equal contribution. This network is easy to build as devices can be
connected randomly in the network. But being unstructured, it becomes difficult to
find content. For example, Napster, Gnutella, etc.

 Structured P2P Networks: It is designed using software that creates a virtual layer
in order to put the nodes in a specific structure. These are not easy to set up but
can give easy access to users to the content. For example, P-Grid, Kademlia, etc.
 Hybrid P2P Networks: It combines the features of both P2P networks and client-
server architecture. An example of such a network is to find a node using the
central server.

Features of P2P Network

 These networks do not involve a large number of nodes, usually less than 12. All
the computers in the network store their own data but this data is accessible by the
group.

 Unlike client-server networks, P2P uses resources and also provides them. This
results in additional resources if the number of nodes increases. It requires
specialized software. It allows resource sharing among the network.

 Since the nodes act as clients and servers, there is a constant threat of attack.

 Almost all OS today support P2P networks.

P2P Network Architecture

In the P2P network architecture, the computers connect with each other in a workgroup to
share files, and access to internet and printers.

 Each computer in the network has the same set of responsibilities and capabilities.

 Each device in the network serves as both a client and server.

 The architecture is useful in residential areas, small offices, or small companies


where each computer act as an independent workstation and stores the data on its
hard drive.

 Each computer in the network has the ability to share data with other computers in
the network.

 The architecture is usually composed of workgroups of 12 or more computers.

P2P Architecture

How Does P2P Network Work?

Let's understand the working of the Peer-to-Peer network through an example. Suppose,
the user wants to download a file through the peer-to-peer network then the download will
be handled in this way:

 If the peer-to-peer software is not already installed, then the user first has to install
the peer-to-peer software on his computer.

 This creates a virtual network of peer-to-peer application users.


 The user then downloads the file, which is received in bits that come from multiple
computers in the network that have already that file.

 The data is also sent from the user's computer to other computers in the network
that ask for the data that exist on the user's computer.

Thus, it can be said that in the peer-to-peer network the file transfer load is distributed
among the peer computers.

How to Use a P2P Network Efficiently?

Firstly secure your network via privacy solutions. Below are some of the measures to keep
the P2P network secure:

 Share and Download Legal Files: Double-check the files that are being downloaded before
sharing them with other employees. It is very important to make sure that only legal files are
downloaded.

 Design Strategy for Sharing: Design a strategy that suits the underlying architecture in order
to manage applications and underlying data.

 Keep Security Practices Up-to-Date: Keep a check on the cyber security threats which might
prevail in the network. Invest in good quality software that can sustain attacks and prevent
the network from being exploited. Update your software regularly.

 Scan All Downloads: This is used to constantly check and scan all the files for viruses before
downloading them. This helps to ensure that safe files are being downloaded and in case,
any file with potential threat is detected then report to the IT Staff.

 Proper Shutdown of P2P Networking After Use: It is very important to correctly shut down
the software to avoid unnecessary access to third persons to the files in the network. Even if
the windows are closed after file sharing but the software is still active then the
unauthorized user can still gain access to the network which can be a major security breach
in the network.

Why Are P2P Services Popular?

P2P services have gained widespread popularity due to their decentralized nature, which eliminates
the need for a central authority or server. It allows users to directly interact with each other, reducing
costs by sharing resources like bandwidth and storage. P2P networks also offers better performance
for certain tasks, such as file sharing, where data can be retrieved from multiple sources.

Applications of P2P Network

Below are some of the common uses of P2P network:

 File Sharing: P2P network is the most convenient, cost-efficient method for file sharing for
businesses. Using this type of network there is no need for intermediate servers to transfer
the file.

 Blockchain: The P2P architecture is based on the concept of decentralization. When a peer-
to-peer network is enabled on the blockchain it helps in the maintenance of a complete
replica of the records ensuring the accuracy of the data at the same time. At the same time,
peer-to-peer networks ensure security also.

 Direct Messaging: P2P network provides a secure, quick, and efficient way to communicate.
This is possible due to the use of encryption at both the peers and access to easy messaging
tools.

 Collaboration: The easy file sharing also helps to build collaboration among other peers in
the network.

 File Sharing Networks: Many P2P file sharing networks like G2, and eDonkey have
popularized peer-to-peer technologies.

 Content Distribution: In a P2P network, unline the client-server system so the clients can
both provide and use resources. Thus, the content serving capacity of the P2P networks can
actually increase as more users begin to access the content.

 IP Telephony: Skype is one good example of a P2P application in VoIP.

Examples of P2P Networks

P2P networks can be basically categorized into three levels.

 The first level is the basic level which uses a USB to create a P2P network between two
systems.

 The second is the intermediate level which involves the usage of copper wires in order to
connect more than two systems.

 The third is the advanced level which uses software to establish protocols in order to manage
numerous devices across the internet.

Some of the popular P2P networks are Gnutella, BitTorrent, eDonkey, Kazaa, Napster, and Skype.

Advantages of P2P Network

 Easy to Maintain: The network is easy to maintain because each node is independent of the
other.

 Less Costly: Since each node acts as a server, therefore the cost of the central server is saved.
Thus, there is no need to buy an expensive server.

 No Network Manager: In a P2P network since each node manages his or her own computer,
thus there is no need for a network manager.

 Adding Nodes is Easy: Adding, deleting, and repairing nodes in this network is easy.

 Less Network Traffic: In a P2P network, there is less network traffic than in a client/ server
network.

Disadvantages of P2P Network

 Data is Vulnerable: Because of no central server, data is always vulnerable to getting lost
because of no backup.
 Less Secure: It becomes difficult to secure the complete network because each node is
independent.

 Slow Performance: In a P2P network, each computer is accessed by other computers in the
network which slows down the performance of the user.

 Files Hard to Locate: In a P2P network, the files are not centrally stored, rather they are
stored on individual computers which makes it difficult to locate the files.

8. Explain Multicore CPU with a neat diagram.

9. Write a note on various computing paradigms.

10. List the applications of HPC and HTC systems.

11. Write a note on overlay networks.

12. Explain the architecture of three virtual machine configurations.

13. Discuss system attacks and threats to cyberspace resulting in different types of losses.

14. Explain the Platform Evolution of different computer technologies with a neat diagram.

15. Outline eight reasons to adopt the cloud for upgraded Internet applications and web
services.

16. Briefly explain Message Passing Interface (MPI).

17. Summarize VM Primitive Operations with relevant diagram.

18. Illustrate various system attacks and network threats to cyberspace, resulting in four types of
losses with a neat diagram.

Module 2: Virtualization and VM Management

1. Explain in detail about implementation levels of virtualization. Also, briefly discuss how
virtualization helps in automating data center operations.

2. Explain how migration of memory, files, and network resources happen in cloud computing.

3. Demonstrate the architecture of a computer system before and after virtualization.

4. Compare Physical versus Virtual Clusters.

5. Construct the live migration process of a VM from one host to another.

6. Develop an architecture of Livewire for intrusion detection using a dedicated VM.

7. Explain VM-based intrusion detection system.

8. Discuss the requirement of OS-level virtualization. Also state the advantages and
disadvantages of OS extensions.
9. Explain Full Virtualization and Para Virtualization.

10. Describe CPU virtualization and memory virtualization.

11. Write steps for creating a virtual machine: configure and deploy a virtual machine with
specific CPU and memory requirements in Google Cloud OR write 5 commands and explore
AWS Cloud Shell.

12. Describe the concept of virtual clusters and resource management in data centers.

13. Explain the virtualization of I/O devices and its importance in cloud computing.

14. List and explain any four virtualization tools (e.g., VMware, Xen, KVM, Hyper-V, VirtualBox).

15. Describe the role of a hypervisor. Compare Type-1 and Type-2 Hypervisors.

Module 3: Cloud Architecture and Deployment Models

1. Discuss IaaS, PaaS, and SaaS cloud service models at different service levels.

2. Explain Private, Public, and Hybrid cloud deployment models.

3. Write a short note on the global exchange of cloud resources.

4. Explain the design objectives of cloud computing.

5. Explain different types of cloud computing models.

6. Write a note on the basic requirements for managing resources of a data center.

7. Explain layered cloud architecture with a diagram.

8. Discuss the challenges in cloud architecture development.

9. Discuss a set of cloud services provided by Microsoft Azure.

10. Compare the cloud services offered by Google App Engine (GAE), AWS, and Azure.

11. Explain the concept of inter-cloud resource management and its challenges.

12. Explain the architectural design of compute and storage clouds with a neat diagram.

13. Describe the data center network topologies and their significance.

14. With a neat diagram, build a cloud ecosystem with a private cloud.

15. Organize Functional Modules of GAE.

16. Summarize six open challenges in cloud architecture development.

17. Write a note on AWS.

Module 4: Security in Cloud Computing


1. Discuss security of database services.

2. Demonstrate surfaces of attacks in a cloud computing environment with a neat diagram.

3. List out the top cloud security threats of CSA2016.

4. Select four widely accepted fair information practices that consumer-oriented commercial
websites collecting personal data must comply with.

5. Summarize the design goals of Xoar.

6. Explain mobile devices and cloud security.

7. Model an overview of reputation system design options.

8. Explain the security risks faced by cloud users and cloud service providers.

9. Discuss privacy and the importance of privacy.

10. Write a note on operating system security.

11. Write a note on virtual machine security.

12. Explain security risks posed by shared images and management OS.

13. Discuss how virtual machines are secured.

14. What is Xoar? Discuss its role in providing trusted hypervisor support in cloud security.

15. Describe the process and significance of a privacy impact assessment in cloud computing.

16. Discuss various encryption techniques used for securing data in the cloud.

Module 5: Cloud Frameworks & Programming Models

1. What are the various system issues for running a typical parallel program in either a
distributed or parallel manner?

2. With a neat diagram, explain the data flow in running a MapReduce job at various task
trackers using Hadoop Library.

3. Write a note on Amazon Simple Storage Service.

4. Write a note on emerging cloud software environments.

5. Outline important cloud platform capabilities.

6. Organize the steps involved in MapReduce.

7. Explain Data mutation sequence in GFS with diagram.

8. Describe the Manjrasoft Aneka cloud platform.

9. Discuss programming the Google App Engine.

10. With a neat diagram, explain OpenStack Nova system architecture.


11. Explain the different parallel and distributed models used in cloud computing.

12. Explain the steps involved in deploying a web application on App Engine with automatic
scaling.

13. Explain the key features of cloud and grid computing platforms and compare them.

You might also like