You are on page 1of 2
Nirma University Institute of Technology Semester End Examination (IR), May - 2015 ‘M. Tech. in Computer Science and Engineering, Semester II / M. Tech. in Computer Science and Engineering (INS), Semester - II / M. Tech. in Computer Science and Engineering (NT), Semester — IT SCS1E13 Cloud Computing Roll/ Supervisor’s Exam initial with No. date a ‘Time: 3 Hours ‘Max. Marks: 100 Instructions: 1. Attempt all questions. 2. Figures to right indicate full marks. 3. Section wise separate answer book to be used. 4. Draw neat sketches and assume suitable data wherever necessary, SECTION-I Q.1 Answer the following [16] (A) Show how elasticity and isolation plays a vital role in cloud [06] computing to allow virtual application to freely migrate, grow and shrink. (B) What is DDoS flooding attack? Devise a flow pattern of this [04] attack, (©) Suggest your own ideas for implementing privacy in cloud when [06] user access to its data. Q.2 Answer the following fg] (4) Consider a Vehicular Adhoc Network (VANET) in which lots of [10] vehicles on a road generates their information as a vector VeVehicle_id, location id, density> where density refers to the congestion i.e, number of vehicles in that location. These massive information is supposed to be published on cloud in which mining is to be done for traffic pattern analysis. Design you own cloud architecture for the vehicular ad hoc network and suggest your own ideas that how we can accomplish this goal. (B) Discuss the role of green resource manager in detail for energy [08] efficient and green cloud computing architecture in detail. OR (B) Discuss the challenges observed in the design of robust cloud [08] architecture. Q.3 Answer the following [16] (A) What is the need of multicasting in Cloud? Propose your design model for implementation of multicasting in Cloud. [04] OR (4) Explain the differences between hypervisor and para- [04] virtualization and give one example VMM (virtual machine monitor), that was built in each of the two categories, Page 1 of (B) (©) 5 B) (c) (c) 6 (a) (B) B) (C) @) 3CS1E13-Cloud Computing Illustrate the design considerations for Data center Interconnection Networks. Discuss how does migration of VM’s takes place in XEN? What is its effect on Running webserver? SECTION-IL Answer the following Questions: Which types of services are hosted inside the Aneka container? Briefly discuss the service model of Aneka. Describe the process of Resource provisioning carried out by Aneka over Private and Public Cloud. Discuss MapReduce Computational workflow by taking suitable example. Answer the following Questions: Describe the role of standards in a federated environment, What is Data Lock-in problem? Discuss the solutions for the same, What is energy-efficient computing, and why it is fundamental to cloud computing? Suggest possible solutions to achieve this. To prevent from intruders indented to attack on crucial data and Malware based attacks, suggest a security aware cloud architecture and identify the protection mechanism VM level and Migration level? OR Design and elaborate a model for Market oriented Cloud computing. Answer the following Questions: Investigate the differences among encryption, watermarking, and coloring for protecting data sets and software in cloud environments. Discuss their relative strengths and limitations. ‘What is the need of virtualization at Instruction set architecture (ISA) level? Ilustrate with prototype. oR Design and analyse Hardware abstraction layer (HAL) level virtualization in cloud environment. Analyze the need of Trust Overlay Networks in Cloud environment. Also discuss design options for reputation-Guided Protection of Data Centers Briefly define the following basic techniques and technologies that represent recent related advances in computer architecture, parallel processing, distributed computing, Internet technology, and information services. * High-performance computing (HPC) system * Internet of Things (IoT} * Public cloud versus private cloud Page 2 of 2 {06} (06] [16] [5] (41 (71 [14] (41 [4] (6) (6 [20] (4] [6] (6) (4) [6]

You might also like