Cloud Model Paper
Cloud Model Paper
Note: 01. Answer any FIVE full questions, choosing at least ONE question from each MODULE.
Module – 1
(a) With a neat diagram explain the Cloud computing delivery models and services and 10M
Q.1 list out the major challenges faced by cloud computing
(b) Write a note on 10M
i) Ethical issues in cloud computing
ii) Cloud vulnerabilities
iii) Cloud storage diversity and vendor lock-in
OR
Q.2 (a) With a neat Sketch, discuss the applications of Cloud computing at Amazon 10M
(b) Explain Open-source software platforms for clouds 10M
Module – 2
Q.3 (a) Explain the life cycle of workflow and a computer program with a neat diagram 10M
Explain the basic workflow patterns in cloud computing.
(b) Illustrate the MapReduce programming model along with its features. 10M
OR
Q.4 (a) With a neat sketch show how the applications of GrepTheWeb is used in cloud 10M
computing
(b) Discuss the methods to implement High-performance computing on a cloud? 10M
Module – 3
Q.5 (a) Contrast the features of Full virtualization with paravirtualization. 8M
(b) Explain Virtual machine monitors with a neat diagram. 8M
(c) List out the features of Layering and virtualization? 4M
OR
Q.6 (a) Explain CaseStudy: Xen a VMM based paravirtualization 8M
(b) Summarize the techniques to compare Performance of virtual machines? 4M
(c) Discuss the ways to optimize network virtualization? 8M
Module – 4
Q.7 (a) Explain the Policies and mechanisms for resource management. 6M
(b) Outline the features of utility-based model for cloud-based Web services. 6M
(c) Determine the Stability of a two-level resource allocation architecture. 8M
OR
Q.8 (a) Write a note on Resourcing bundling: Combinatorial auctions for cloud resources. 6M
(b) Discuss the methods to implement Scheduling algorithms for computing clouds. 7M
(c) Explain Scheduling Map Reduce applications subject to deadlines, Resource 7M
management and dynamic scaling?
Module – 5
18AI734
(a) Write a note on Privacy and privacy impact assessment, Trust, Operating system 10M
Q.9 security.
(b) Discuss Virtual machine Security, Security of virtualization, Security risks posed by 10M
shared images
OR
(a) Explain the techniques required to launch an EC2 Linux instance and connect to it. 10M
Q.10
(b) Demonstrate the use of S3 in java and Cloud-based simulation of a distributed trust 10M
algorithm.
18AI734
Table showing the Bloom’s Taxonomy Level, Course Outcome and Programme
Outcome