Professional Documents
Culture Documents
Cloud Computing, ID 13838
Cloud Computing, ID 13838
Id : 13838
Course: Cloud Computing
Program: BS (SE)
Instructor: Muhammad Abrar Khan
Examination: Final Paper
Total Marks: 50
Date: June. 23, 2021
Note: Attempt all questions. Use examples and diagrams where necessary.
Q.1 Explain the concept of Storage Virtualization. Describe different approaches where to virtualize.
Answer 1 :
Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a
single storage device -- or pool of available storage capacity -- that is managed from a central console. The
technology relies on software to identify available storage capacity from physical devices and to then aggregate
that capacity as a pool of storage that can be used by traditional architecture servers or in a virtual environment
by virtual machines (VMs).
Different Approaches:
These are:
•Grid Approach: where the processing workloads are distributed among different physical servers, and their
results are then collected as one.
•OS -Level Virtualization: Here, multiple instances of an application can run in an isolated form on a single
OS.
•Hypervisor-based Virtualization: which is currently the most widely used technique.
1 of 1
A data accessor or a collection of independent components that operate on the central data store, perform
computations, and might put back the results.
Interactions or communication between the data accessors is only through the data store. The data is the only
means of communication among clients.
Q.3 Explain the concept of Virtual Machine (VM), communications between VM and traffic flow between VM.
Answer:
A virtual machine, commonly shortened to just VM, is no different than any other physical computer like a
laptop, smart phone, or server. It has a CPU, memory, disks to store your files, and can connect to the internet if
needed. While the parts that make up your computer (called hardware) are physical and tangible, VMs are often
thought of as virtual computers or software-defined computers within physical servers, existing only as code.
Virtual networks allow the virtual machine to communicate with the rest of your network, the host machine, and
other virtual machines. With the Virtual Network Manager, you can create the following types of virtual
networks:
Private network—allows a virtual machine to communicate only with another virtual machine on the host.
Internal network—sets up communication between the host system and the virtual machines on it.
External network—connects virtual machines and the host physical network. This allows the virtual
machine to communicate on the same network as the host, operating as any other node on the network.
2 of 1
Q.4 Describe difference between Cloud computing architecture and Fog computing architecture. Why Fog
computing is needed when we have already cloud computing in market.
Answer(4):
Both fog computing and edge computing involve pushing intelligence and processing capabilities down
closer to where the data originates—at the network edge. The key difference between the two
architectures is exactly where that intelligence and computing power is placed.
•Fog computing pushes intelligence down to the local area network (LAN) level of network architecture,
processing data in a fog node or IoT gateway.
•Edge computing pushes the intelligence, processing power, and communication capabilities of an edge
gateway or appliance directly into devices like PACs (programmable automation controllers).
In both architectures data is generated from the same source—physical assets such as pumps, motors,
relays, sensors, and so on. These devices perform a task in the physical world such as pumping water,
switching electrical circuits, or sensing the world around them. These are the “things” that make up the
Internet of Things.
3 of 1