You are on page 1of 3

Name : Danyal Ahmad

Id : 13838
Course: Cloud Computing
Program: BS (SE)
Instructor: Muhammad Abrar Khan
Examination: Final Paper
Total Marks: 50
Date: June. 23, 2021

Note: Attempt all questions. Use examples and diagrams where necessary.

Q.1 Explain the concept of Storage Virtualization. Describe different approaches where to virtualize.
Answer 1 :
Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a
single storage device -- or pool of available storage capacity -- that is managed from a central console. The
technology relies on software to identify available storage capacity from physical devices and to then aggregate
that capacity as a pool of storage that can be used by traditional architecture servers or in a virtual environment
by virtual machines (VMs).
Different Approaches:
These are:
•Grid Approach: where the processing workloads are distributed among different physical servers, and their
results are then collected as one.
•OS -Level Virtualization: Here, multiple instances of an application can run in an isolated form on a single
OS.
•Hypervisor-based Virtualization: which is currently the most widely used technique.

Q.2 a) Explain Data center architecture in detail.


Answer(a):
Data center architecture is the physical and logical layout of the resources and equipment within a data
center facility.
It serves as a blueprint for designing and deploying a data center facility. It is a layered process which
provides architectural guidelines in data center development.
The most well-known examples of the data-centered architecture is a database architecture, in which the
common database schema is created with data definition protocol – for example, a set of related tables with
fields and data types in an RDBMS.
Types of Components
There are two types of components −
A central data structure or data store or data repository, which is responsible for providing permanent data
storage. It represents the current state.

1 of 1
A data accessor or a collection of independent components that operate on the central data store, perform
computations, and might put back the results.
Interactions or communication between the data accessors is only through the data store. The data is the only
means of communication among clients.

b) Write down different properties of data center network in detail.


Answer(b):
Properties of data center network

• Flow control (load balance)


• Fast failover
• Scalability
• Backward compatibility
• Easy for virtualization

Q.3 Explain the concept of Virtual Machine (VM), communications between VM and traffic flow between VM.
Answer:
A virtual machine, commonly shortened to just VM, is no different than any other physical computer like a
laptop, smart phone, or server. It has a CPU, memory, disks to store your files, and can connect to the internet if
needed. While the parts that make up your computer (called hardware) are physical and tangible, VMs are often
thought of as virtual computers or software-defined computers within physical servers, existing only as code.

Virtual networks allow the virtual machine to communicate with the rest of your network, the host machine, and
other virtual machines. With the Virtual Network Manager, you can create the following types of virtual
networks:

Private network—allows a virtual machine to communicate only with another virtual machine on the host.

Internal network—sets up communication between the host system and the virtual machines on it.

External network—connects virtual machines and the host physical network. This allows the virtual
machine to communicate on the same network as the host, operating as any other node on the network.

2 of 1
Q.4 Describe difference between Cloud computing architecture and Fog computing architecture. Why Fog
computing is needed when we have already cloud computing in market.
Answer(4):
Both fog computing and edge computing involve pushing intelligence and processing capabilities down
closer to where the data originates—at the network edge. The key difference between the two
architectures is exactly where that intelligence and computing power is placed.
•Fog computing pushes intelligence down to the local area network (LAN) level of network architecture,
processing data in a fog node or IoT gateway.
•Edge computing pushes the intelligence, processing power, and communication capabilities of an edge
gateway or appliance directly into devices like PACs (programmable automation controllers).
In both architectures data is generated from the same source—physical assets such as pumps, motors,
relays, sensors, and so on. These devices perform a task in the physical world such as pumping water,
switching electrical circuits, or sensing the world around them. These are the “things” that make up the
Internet of Things.

Cloud Computing vs Fog Computing:


Because cloud computing is not viable for many internet of things (IoT) applications, fog computing is
often used. Its distributed approach addresses the needs of IoT and industrial IoT (IIoT), as well as the
immense amount of data smart sensors and IoT devices generate, which would be costly and time-
consuming to send to the cloud for processing and analysis. Fog computing reduces the bandwidth
needed and reduces the back-and-forth communication between sensors and the cloud, which can
negatively affect IoT performance.

3 of 1

You might also like