You are on page 1of 3
Nirma University Institute of Technology ‘Semester End Examination (IR), May - 2014 M. Tech. in Computer Science and Engineering, Semester-II / M. Tech. in Computer Science and Engineering (NT), Semester-II / M. Tech. in Computer Science and Engineering (INS), Semester-IL S3CS1E13 Cloud Computing Roll/ Supervisor's Exam initial with No. date Tim ‘Max. Marks: 100 Instructions: 1. Attempt all questions. 2. Figures to right indicate full marks. 3. Section wise separate answer book to be used. 4, Draw neat sketches and assume suitable data wherever necessary. SECTION-I Qa Answer the following (A) What is the significance of walrus and node controller in Eucalyptus? (B) What is DDoS flooding attack? Devise a flow pattem of this attack. (©) What are the open challenges needed to be addressed in Cloud Architecture Development and Computing? Q2 Answer the following (A) What do you mean by cold migration? Explain its importance. (B) Discuss various challenges involved in live migration. (C) Draw an architecture of layered virtualization technology oR (C) What is the need of Data Coloring and Cloud watermarking? Discuss its techniques and features generating security clearance in Cloud a3 Answer the following (A) Compare and contrast Grid Vs Cluster computing OR (A) Compare and contrast NaaS and Has. (B) Illustrate the design considerations for Data center Interconnection Networks. Page | of 3 16] [06] [04] [06] [18] (04) {07} (07) (07) [16] [04] [04] [06] 4 (a) © (o) 3CS1E13-Cloud Computing Draw a layered diagram to relate the construction of IaaS, PaaS, [06] and SaaS clouds from bare machine hardware to the users applications. Briefly list the representative cloud service offerings at each cloud layer from the major cloud providers that you know of. SECTION- Answer the following Questions: 16] What are the web application breaches? What problems can be [5] caused because of these breaches? Discuss the ways to overcome on these problems Describe the process of Resource provisioning carried out by Aneaka [4] over Private and Public Cloud. Map the following 14 names or abbreviated terms on the left column [7] with the best-match definitions or descriptions on the right column. This is a 1-to-1 correspondence. Term |Description to be Mapped with the Terms on the Left Column GAE a) The agreement signed between users and providers in cloud computing _ ‘CRM b) A public cloud that must run from Windows 7 based host AWS, ¢)_A public cloud used mainly for PaaS applications SLA d) A public compute cloud used in scalable business computing application Azure ¢)_A cloud platform built by SalesFore.com EC2 ) A commercial cloud OS for transforming a data center to a cloud platform s3 8) One of the most frequently used SaaS applications used in the business world Force.c | h) A cloud platform build mainly for laaS applications om vSphere | i) A storage cloud service for distributed storage 4 applications EBS J] An open-source hypervisor developed at Cambridge I University | SQL ) The distributed file system used in Google search | engines and in App Engine Chubby | 1) An Amazon block lock interface for saving and restoring the VM instances XEN ‘m) An Azure service module for users to visit and use of relation database GFS n) A distributed block lock service module in Google App Engines Page 2 of 3 Qs (a) 8) (c) Q6 (A) ®) 8) © (D) 3CS1E13-Cloud Computing Answer the following Questions: [16] Consider an application scenario that utilize resource provisioning to [4] dynamically provision virtual machines from Amazon EC2 cloud. Provide the general steps of resource provisioning on demand satisfying the clients need in a given scenario. What are the driving forces that makes providers to offer SaaS? [4] To prevent from intruders indented to attack on crucial data and (8) Malware based attacks, suggest a security aware cloud architecture and identify the protection mechanism? OR Discuss the stages for collaborative Detection of DDoS Attacks Is} over Multiple Network Domain. Answer the following Questions: [13] Discuss the application case study by detailing the architecture and [4 how it can be leveraged various cloud technologies of any domain of your choice. Compare hardware and software power management techniques. (4) oR What is market-oriented cloud computing? Discuss in brief. (4 Discuss the architecture and applications of GAE. 4 Discuss how memory virtualization is achieved using two level (6) memory mapping procedure. Page 3 0f3

You might also like