0% found this document useful (0 votes)
7 views5 pages

CC Assignment 1 (Arham)

This document outlines the assignment details for CSE-421 Cloud Computing for Spring 2025, specifying that students must attempt any five out of seven questions. It emphasizes the importance of originality in submissions, proper referencing, and the use of specific formatting guidelines. The assignment covers various topics related to cloud computing, including virtualization, scalability, elasticity, information security, and cloud deployment models.

Uploaded by

shaheerali20000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views5 pages

CC Assignment 1 (Arham)

This document outlines the assignment details for CSE-421 Cloud Computing for Spring 2025, specifying that students must attempt any five out of seven questions. It emphasizes the importance of originality in submissions, proper referencing, and the use of specific formatting guidelines. The assignment covers various topics related to cloud computing, including virtualization, scalability, elasticity, information security, and cloud deployment models.

Uploaded by

shaheerali20000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

ASSIGNMENT # 01

SPRING 2025
(CSE-421)- Cloud Computing (Theory)

Department Instructor Issue Date Due Date


Faculty Total
Program Semester Course Title
/ Faculty Signature Marks

CSE-421
Cloud Computing
FCIT BS SE/CS 6th/8th (3+0) Miss
12/03/2025 19/03/2025 05
Durraiyah

Instructions
1. This ASSIGNMENT contains 7 Question. Attempt ANY(5) questions.
2. Students of particular course will download assignment exam and submit solution which will
only be accepted through CMS portal.
3. Please ensure that no part of your assignment should be copied from any other source without
acknowledgement of the source and proper referencing. (IEEE)
4. Please note that copy-paste is a serious nature of academic dishonesty, it is called “Plagiarism”
and the penalties are attached to being found guilty of committing such offences.
5. It is allow using lecture notes, books and other sources, however needing to refer/cite properly,
Reference list must be given at end of the assignment.
6. This assignment should be submitted in PDF file for this purpose first take image of all hand
written pages and then merge using Smartphone app (from PC/Laptop put all images in word file
and save as PDF) including assignment paper in the start of submission.
7. Assignment can be compressed or break in two parts if file size is larger than uploading limit.
8. The font size should 12 and Times New Roman should be used. All figures and illustrations
should be properly titled or numbered on the left side, below.
9. Also ensure that no part of your assignment has been written by any other person, except to the
extent of collaboration and /or group work.
10. Preferably neat and clean hand-written form, if a marker can’t read what you’ve written, your
answer might as well be wrong.

This table is for official use; do not write anything on it.

CLOs CLO_1 Total

Question 1 2 05
Number
Student’s Score

Maximum Score 05

This paper has a total of 2 pages including this title page


ASSIGNMENT # 01
SPRING 2025
(CSE-421)
Cloud Computing (Theory)
(3+0)

CLO-1: Describe the Importance of cloud computing technology and core issue in cloud computing

✓ Note: - Supplement your answer with a neat and clean diagram where necessary.

This ASSIGNMENT contains 7 Question. Attempt ANY (5) questions.

Q1. Explain the concept of virtualization and its role in Cloud Computing.

Q2. Describe the difference between scalability and elasticity in Cloud Computing with examples.

Q3. Summarize the advantages of Cloud Computing for organizations.

Q4. Differentiate between Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a

Service (SaaS) and Unified Communication as a Service (UCaaS) with examples.

Q5. Classify the different cloud deployment models and illustrate Public and Private Cloud with examples.

Q6. Identify two common issues in Cloud Computing and explain them briefly.

Q7. Discuss the importance of Information Security in Cloud Computing environments.

⬛ Note: Focus on clear explanations and understanding of concepts.



✓ Submitted by:
⬛ syed m arham

✓ Roll Number: 1762-2021

✓ Date: 19-03-2025
ASSIGNMENT # 01
SPRING 2025

Q1. Explain the concept of virtualization and its role in Cloud Computing.

Virtualization is a technology that allows the creation of virtual instances of resources, such as servers,
storage devices, or networks, from a physical resource. It enables multiple virtual machines (VMs) or
containers to run on a single physical machine, which gives the illusion of having separate physical resources.
This is achieved by using a hypervisor, which manages the hardware resources and allocates them to each
VM.

Two types of virtualization:

 Hardware Virtualization: This involves using a hypervisor (either Type 1 or Type 2) to create multiple VMs
on a physical machine. Type 1 hypervisors run directly on the hardware, while Type 2 hypervisors run on top of
an operating system.
 Software Virtualization: This refers to virtualization at the software level, where applications and services run
in isolated environments called containers, using technologies like Docker and Kubernetes.

In Cloud Computing, virtualization plays a fundamental role in resource management, isolation, and
scalability:

1. Resource Utilization: Virtualization allows cloud providers to run multiple workloads on a single physical
machine, ensuring that hardware resources like CPU, RAM, and storage are used efficiently. This makes the
system more cost-effective.
2. Dynamic Allocation: Cloud users can request specific resources (e.g., a certain amount of CPU power or
storage) as needed, and virtualization allows the cloud provider to allocate the right amount of resources from
the pool of available physical machines.
3. Isolation: Each virtual machine or container runs independently from others, providing strong isolation between
workloads. This ensures that one user’s activity does not affect another user’s resources.
4. Scalability and Flexibility: Virtualization allows rapid scaling. When demand increases, new VMs or
containers can be spun up quickly, enabling the cloud infrastructure to scale up or down dynamically.

Example: Amazon EC2 instances are based on virtualization. AWS allows users to create virtual servers
(EC2 instances) and scale resources based on their requirements, without worrying about the underlying
physical hardware.

Q2. Describe the difference between scalability and elasticity in Cloud Computing with examples.

Scalability refers to the capability of a system to handle increased load by adding resources in a predictable
and planned manner. It can be achieved either by vertical scaling (scaling up), which involves adding more
power to existing machines, or horizontal scaling (scaling out), which involves adding more machines to a
system.
ASSIGNMENT # 01
SPRING 2025
 Example of Vertical Scaling: Upgrading a server by adding more CPU, RAM, or storage to handle more
workload.
 Example of Horizontal Scaling: Adding more servers to a pool to distribute the load (e.g., a web server farm).

Elasticity, on the other hand, refers to the ability of a system to automatically scale resources in response to
changing demand, and scale back down when the demand decreases. It’s a more dynamic and automatic
process, often achieved through cloud automation tools and monitoring.

 Example of Elasticity: In AWS, an application running on EC2 instances might automatically scale out by
adding more instances during peak traffic times, and scale back in when traffic subsides. This is done with
services like Auto Scaling.

Key Differences:

 Scalability: Typically a long-term, pre-planned process to handle growth over time (manual or automatic, but
not necessarily dynamic).
 Elasticity: A dynamic and automated process where resources are adjusted based on real-time demand,
providing cost efficiency by scaling up and down as needed.

Q3. Discuss the importance of Information Security in Cloud Computing environments.

Information Security in cloud computing is of paramount importance due to the nature of cloud
environments, where data is stored and processed by third-party providers. Businesses need to ensure the
security, integrity, and confidentiality of their data when using cloud services.

1. Data Encryption: Cloud providers use strong encryption methods to protect data at rest and in transit.
Data encryption ensures that even if unauthorized users access the data, it will be unreadable.
o Example: AWS provides server-side encryption for data stored in Amazon S3.
2. Access Control: Implementing strict access controls, such as multi-factor authentication (MFA) and
role-based access control (RBAC), ensures that only authorized users can access sensitive data.
o Example: Google Cloud Identity and Access Management (IAM) allows organizations to set fine-
grained permissions.
3. Compliance: Many cloud providers help organizations meet compliance requirements (e.g., GDPR,
HIPAA, SOC 2), ensuring that data handling practices align with legal regulations.
o Example: AWS and Microsoft Azure offer compliance certifications that adhere to standards like
GDPR.
4. Continuous Monitoring: Cloud environments need to be continuously monitored for security
vulnerabilities and threats. Cloud service providers typically offer security monitoring tools that track
suspicious activities and send alerts.
o Example: AWS CloudTrail enables users to monitor all account activity and API requests for auditing
purposes.
ASSIGNMENT # 01
SPRING 2025
Q4. Identify two common issues in Cloud Computing and explain them briefly.

1. Security and Privacy:


o Cloud computing involves storing data and running applications on third-party servers, raising concerns
about data breaches, unauthorized access, and data loss. Cloud service providers have strong security
protocols, but users must ensure proper configuration and understand the shared responsibility model.
o Example: A data breach at a cloud provider could expose sensitive customer information, affecting
both the provider and its clients.

2. Downtime and Service Reliability:


o Despite the high reliability promised by cloud providers, cloud services can still face outages due to
system failures, natural disasters, or cyber-attacks. Downtime can disrupt business operations, causing
loss of revenue and customer trust.
o Example: A major cloud provider like AWS or Azure may experience an outage that impacts multiple
businesses, causing their services to become temporarily unavailable.

Q5. Classify the different cloud deployment models and illustrate Public and Private Cloud with
examples.

1. Public Cloud:
o The public cloud is owned and operated by a third-party provider, and resources are made available to
the general public. These resources (e.g., storage, computing power) are shared among multiple tenants.
o Example: AWS, Microsoft Azure, Google Cloud.
o Example Scenario: A startup uses AWS EC2 for hosting its website, leveraging shared infrastructure
and only paying for what it uses.
2. Private Cloud:
o A private cloud is used exclusively by a single organization. It can be hosted either on-premises or by a
third-party provider. Private clouds offer higher levels of security and control, which is often required
by businesses with sensitive data.
o Example: VMware Private Cloud, OpenStack.
o Example Scenario: A large bank uses a private cloud to host its critical financial applications and
customer data, ensuring that it complies with strict regulations and maintains control over its
infrastructure.
3. Hybrid Cloud:
o A hybrid cloud is a combination of private and public clouds that are interconnected, allowing data and
applications to move between the two environments based on business needs.
o Example: A business may use a public cloud for less-sensitive operations (e.g., hosting a website) and a
private cloud for sensitive data (e.g., financial records).
4. Community Cloud:
o A community cloud is shared by organizations with common concerns or needs, such as compliance
requirements. It’s typically used by groups of businesses or government agencies.
o Example: A group of healthcare providers sharing a community cloud to meet regulatory requirements
and collaborate on patient care.

You might also like