0% found this document useful (0 votes)
154 views5 pages

Cloud Computing Assignment Overview

The document outlines a comprehensive assignment for a cloud computing course, divided into five units covering cloud architecture, virtualization basics, Docker, cloud deployment environments, and cloud security. Each unit contains various case studies, scenarios, problems, and design challenges that require students to propose solutions, design architectures, and analyze different cloud models and technologies. The tasks emphasize practical applications and critical thinking in cloud computing concepts.

Uploaded by

953623243025
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
154 views5 pages

Cloud Computing Assignment Overview

The document outlines a comprehensive assignment for a cloud computing course, divided into five units covering cloud architecture, virtualization basics, Docker, cloud deployment environments, and cloud security. Each unit contains various case studies, scenarios, problems, and design challenges that require students to propose solutions, design architectures, and analyze different cloud models and technologies. The tasks emphasize practical applications and critical thinking in cloud computing concepts.

Uploaded by

953623243025
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CCS335 – Cloud Computing

Assignment

UNIT I: Cloud Architecture Models and Infrastructure

1. Case: A startup plans to host a food delivery app and wants to scale quickly with limited
initial investment.
Propose a suitable cloud service and deployment model. Justify with cost, scalability,
and availability factors.

2. Scenario: An e-commerce company wants to adopt hybrid cloud architecture.


Design a system architecture using the NIST reference model and explain the role of
each component.
3. Problem: A university is struggling with traditional client-server ERP systems.
Re-architect the ERP system to run in a cloud environment using SaaS and PaaS.
Discuss benefits and challenges.

4. Task: Given the need for a disaster recovery plan for a retail chain’s customer data,
Design a multi-region compute cloud architecture with failover and backup using
public cloud solutions.

5. Challenge: A company is deciding between IaaS and PaaS for launching its internal HR
platform.
Compare both models with performance, cost, and maintenance analysis and suggest
a recommendation.

6. Problem: Design a secure compute and storage cloud for a fintech startup.
Highlight architecture components and address compute resource allocation and
security.
7. Scenario: A company with global branches wants data consistency in all locations.
Propose a cloud storage architecture to maintain data integrity and low-latency
access.

8. Case: You’re hired as a cloud consultant for a logistics company migrating legacy
systems.
Draw and explain a cloud migration architecture including all NIST layers.

9. Task: Create a high-level deployment diagram for a media streaming platform handling 1
million+ users.
Highlight cloud components and load balancing strategy.
10. Design Challenge: Propose a cloud solution for a smart city project integrating sensors,
analytics, and citizen dashboards.
Explain cloud services, deployment model, and infrastructure components.

UNIT II: Virtualization Basics

1. Case: Your company wants to use VMs for testing software across multiple OS
platforms.
Propose a virtualization structure with justified hypervisor selection and resource
allocation strategy.

2. Scenario: A university plans to deliver OS labs remotely.


Design a VM-based infrastructure supporting para and full virtualization. Discuss
student access and VM cloning.

3. Task: Evaluate a use case where a data center needs CPU and memory virtualization.
Present a solution including virtualization techniques and monitoring tools.

4. Design Problem: A company wants to use virtualization for running legacy applications
on modern hardware.
Propose a virtualization type and explain compatibility, performance, and fault
tolerance.

5. Case: Design an architecture that uses hardware virtualization to host 50 Linux VMs on
one physical server.
Justify hypervisor, memory sharing, and CPU virtualization method.

6. Scenario: Your client needs a scalable virtual infrastructure for automated software
testing pipelines.
Provide an architectural solution with full and partial virtualization methods.

7. Problem Statement: Virtualization has introduced performance bottlenecks in I/O


devices.
Suggest a solution using hardware-assisted I/O virtualization and explain
implementation.

8. Use Case: Create a virtualization layer to support cross-platform development in an IT


firm.
Identify challenges in memory and storage sharing and propose solutions.

9. Challenge: Redesign a VM infrastructure to reduce boot time and improve isolation.


Recommend changes in virtualization type and implementation level.
10. Task: Simulate a virtual lab setup for students with controlled CPU, memory, and I/O
virtualization policies.
Design the system and explain security and isolation.

UNIT III: Virtualization Infrastructure and Docker

Moderate to Hard Case-Based Questions

1. Case: A company wants to switch from VMs to Docker containers for a microservices
app.
Migrate and compare performance, resource efficiency, and networking.

2. Problem Statement: Design a virtual cluster with Docker containers for a machine
learning project needing GPU access.
Show container orchestration, resource management, and scaling approach.

3. Task: You are to implement application virtualization for a cross-platform desktop app.
Discuss containerization strategy and portability challenges.

4. Scenario: A development team wants to reduce deployment time and dependencies in a


project.
Propose a container-based CI/CD pipeline using Docker and describe all steps.

5. Design Problem: Set up Docker containers to simulate a multi-tier web app (frontend,
backend, database).
Provide the architecture and Docker Compose configuration.

6. Challenge: A company faces version conflicts during app updates.


Explain how Docker images and registries solve this and build a version-controlled
repository structure.

7. Use Case: Compare container vs. VM infrastructure for a fintech application with high
security requirements.
Justify your architecture with performance and isolation metrics.

8. Problem: A team needs a portable development environment that mirrors production.


Design a Dockerized dev environment and describe container reuse and networking.

9. Scenario: A logistics firm wants to manage resource sharing among containers in a


cluster.
Propose a resource control plan using Docker and virtual clustering tools.
10. Case: Explain how network virtualization using containers can simulate a testbed for
cyberattack scenarios.
Provide design and traffic isolation techniques.

UNIT IV: Cloud Deployment Environment

Moderate to Hard Case-Based Questions

1. Case Study: Deploy a blog application on AWS using EC2, RDS, and S3.
Document steps, architecture, and auto-scaling configuration.

2. Scenario: Compare a deployment of a Python web app on Azure App Services vs.
Google App Engine.
Evaluate based on latency, cost, and platform features.

3. Problem: Build a private cloud using OpenStack for a small company.


Outline setup steps, components, and configuration for compute and storage.

4. Task: A research group needs isolated compute environments for experiments.


Propose a solution using Eucalyptus or OpenStack with VM provisioning strategy.

5. Design Challenge: Migrate a legacy monolithic application to AWS Lambda and S3


using serverless computing.
Explain architecture and service configuration.

6. Case: A multinational company needs region-specific deployments to comply with data


laws.
Design a cloud deployment across AWS and Azure with compliance strategies.

7. Scenario: Build a scalable cloud architecture for a mobile application backend using
Google Cloud.
Show resource planning and autoscaling mechanisms.

8. Problem: Set up a high-availability web app using Azure Load Balancer and VMs.
Describe VM configuration, health checks, and load distribution.

9. Challenge: Compare container-based deployment vs. VM-based for a microservices-


based e-commerce site.
Provide architecture and performance metrics.

10. Task: You need to build a hybrid cloud model connecting OpenStack and AWS for a
banking firm.
Explain integration steps, security policies, and benefits.
UNIT V: Cloud Security

Moderate to Hard Case-Based Questions

1. Case: A government agency experienced a VM migration attack.


Investigate and propose a solution using secure hypervisor configurations and
monitoring.

2. Problem Statement: Implement an IAM system for an enterprise with 5 departments and
3 roles per department.
Design policies, roles, and explain least privilege enforcement.

3. Scenario: A fintech firm must ensure data security on public cloud while remaining
compliant with RBI norms.
Suggest encryption strategies and key management best practices.

4. Task: Identify and mitigate risks of “guest hopping” in a multi-tenant virtualized


environment.
Suggest isolation and access control techniques.

5. Challenge: Design a security architecture for Docker containers running critical


workloads.
Include scanning, firewall, IAM, and runtime protection strategies.

6. Use Case: A startup wants to enable SSO and MFA in its cloud IAM.
Design the IAM architecture with components and policy enforcement mechanisms.

7. Case Study: Conduct a threat model for an educational app hosted on a public cloud.
Identify vulnerabilities and propose a defense-in-depth strategy.

8. Problem: Propose secure VM migration and backup strategy in a cloud DR (Disaster


Recovery) setup.
Address network security, integrity, and rollback procedures.

9. Scenario: Create a cloud security compliance checklist for hosting health records
(HIPAA-like standards).
Focus on IAM, encryption, audit logging, and VM security.

10. Design Task: Architect an intrusion detection system for virtualized cloud infrastructure.
Suggest placement, data flow, and alerting strategy.

Common questions

Powered by AI

A company should opt for Infrastructure-as-a-Service (IaaS) over Platform-as-a-Service (PaaS) when there is a need for greater control over the underlying infrastructure, which impacts performance customization and optimization. IaaS allows businesses to choose their own OS, development environment, and specific hardware configurations, beneficial for demanding applications. However, it requires more maintenance responsibilities and IT expertise, potentially increasing operational costs. In contrast, PaaS abstracts most of the infrastructure management, offering lower maintenance costs and faster deployment, but at the expense of limited customization, which might not suit complex HR platforms .

Re-architecting a university's ERP system to use SaaS and PaaS offers significant benefits, including reduced IT overhead, as the cloud provider manages infrastructure maintenance, software updates, and security. SaaS applications provide scalability and anywhere-access, crucial for universities with diverse user needs. However, challenges include data migration complexities, potential loss of customizations available in traditional ERP systems, and ensuring data privacy and compliance. A hybrid approach can be used where sensitive data is stored on-premises while leveraging SaaS and PaaS for other operations .

Migrating legacy systems to a cloud environment requires a comprehensive approach that addresses all NIST cloud layers: Cloud Infrastructure, Cloud Application, Cloud Service, and Cloud Management layers. The Infrastructure layer involves moving workloads to compatible VMs or containers supported by cloud providers. The Application layer may require refactoring or re-platforming applications to align with cloud architecture principles. The Service layer ensures services are modular and deployable across cloud environments. For Cloud Management, it’s essential to implement tools for orchestration, monitoring, and automation to manage service levels efficiently. This holistic approach ensures scalability, efficiency, and operational control .

A startup planning to host a food delivery app should choose a public cloud service with a Platform-as-a-Service (PaaS) model. This approach minimizes initial investment costs by allowing the startup to avoid purchasing and maintaining physical hardware. PaaS also offers scalability features that enable the application to handle variable workloads efficiently and provides high availability ensured by the cloud provider's infrastructure. Additionally, public clouds typically offer pay-as-you-go pricing models, which align with the need for cost flexibility and scaling .

A cloud solution for a smart city project must consider the integration of IoT sensors, scalable data analytics, and user-friendly citizen dashboards. Sensors should securely transmit data to cloud platforms via IoT gateways, with edge computing utilized to preprocess data and reduce network loads. Cloud analytics platforms should use big data tools for real-time processing and insight generation. Ensuring data privacy and interoperability standards is crucial due to the varied data sources and the sensitive nature of citizen data. The deployment model could be hybrid, leveraging both public and private clouds to balance cost, control, and compliance. Infrastructure components must support extensive data collection, high throughput processing, and intuitive dashboard interfaces for decision-makers and public users .

Designing a disaster recovery plan using multi-region public cloud architecture involves several key considerations: selecting geographically distributed data centers to ensure data and application availability in case of regional failures, implementing automated failover processes to minimize downtime, and designing data replication strategies to ensure data consistency across regions. Additionally, cost optimization is crucial, which involves evaluating the trade-offs between continuous replication and periodic backups. Security measures like data encryption and network isolation must also be implemented to protect sensitive customer data during transit and at rest .

A secure compute and storage cloud architecture for a fintech startup must include components such as a secure network perimeter using advanced firewalls and Intrusion Detection Systems (IDS), data encryption both in transit and at rest, and robust identity and access management (IAM) to control user permissions. Compute resources should be dynamically allocated using virtual private clouds (VPC) to ensure operational efficiency. Additionally, consistent monitoring and logging mechanisms are crucial for compliance and threat detection. Security considerations should integrate compliance with financial regulations (e.g., PCI-DSS) to safeguard sensitive financial information .

For global operations, data consistency ensures that users access the same information across all locations, which is critical for maintaining data integrity and operational efficiency. Low-latency access improves user experience by reducing the time needed to retrieve and update information. Achieving this requires a distributed cloud storage architecture with data replication across multiple regions. Technologies such as Content Delivery Networks (CDNs), edge computing, and geographically distributed databases help localize data access, thus minimizing latency. Consistency can be ensured using distributed database systems that use consensus algorithms or transaction models that support atomicity and consistency across distributed nodes .

To design a hybrid cloud architecture for an e-commerce company using the NIST reference model, first identify which services are best suited for private and public clouds. Core transactional services can be hosted on a private cloud to ensure data security and compliance, while front-end services and non-sensitive data processing can leverage a public cloud. The architecture includes components such as cloud infrastructure (compute, storage, networking), cloud services (applications and databases), and cloud management (security and monitoring). Integration between public and private components is crucial and can be achieved using APIs and secure VPN connections. Role of each component is to ensure seamless integration, high availability, and optimized performance across environments .

Deploying a media streaming platform for over 1 million users requires a robust load balancing strategy that may include a combination of DNS-based load balancing for geographic distribution and application-level load balancing for efficient resource allocation. Cloud components should consist of scalable compute instances for processing requests, a content delivery network (CDN) to reduce latency by caching content closer to users, and scalable storage solutions like object storage for large media files. Autoscaling groups in the compute layer can dynamically adjust resource provisioning based on demand, ensuring high availability and performance under variable loads .

You might also like