NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT-1 1. Explain any six benefits of Software as Service in Cloud computing? 2. List the different cloud applications available in the market? Briefly explain the scenarios/situations of when to not use clouds. 3 a) Explain the tasks performed by Google applications engine? b) Write a short note on IBM offerings towards Cloud computing? 4.Explain the different operational and economical benefits of using clouds? 5 a) Describe any six design principles of Amazon S3 Cloud computing model? b) What is REST in Web services? List the different benefits of REST. 6 a) What is SaaS in Cloud computing? Explain different categories of SaaS? b) List the prevalent companies and their offerings towards software plus services via Cloud computing? 7. What is the need of virtualization? Define Server virtualization, Application virtualization, Presentation Virtualization. 8. Discuss the various migration issues of the organization towards Clouds? CLOUD COMPUTING ASSIGNMENT-II 1. Explain Cloud computing and Cloud computing delivery models and
services 2. Explain, Cloud storage diversity and vendor lock-in. 3. Give a review on Service level agreements, User experience and software licensing. 4. What are the Challenges of cloud computing?explain Architectural styles of cloud computing. 5. Write a note on Virtualization,. 6. Explain Hardware support for virtualization with example. 7. Explain Optimization of network virtualization 8. What are the strategies of The dark side of virtualization 9. Write a note on Policies and mechanisms for resource management,. 10.Write the methods of Resource management and dynamic scaling. NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE INFORMATION &NETWORKS SECURITY ASSIGNMENT-I 1. Write about any two classical crypto systems
2. Convert the text New Horizon College of Engineering using Playfair cipher. 3. Explain DES in detail 4. Explain RSA with an example with p=11, q=5, e=3 and PT =9. 5. Explain SHA 6. Explain digital signaturing with ElGmal public Key Crypto system 7. Write notes on web security and SSL 8. Explain Deffie Hellman Key Exchange algorithm with one suitable example 9. Create a program that assists in a basic form of cryptography, a substitution cypher. Write a program that will accept a phrase and convert it into code by substituting letters according to a key. 10.Implement RSA algorithm 11.Suppose you are told that the one time pad encryption of the message attack at dawn is 09e1c5f70a65ac51626bc3d25f28 (the plaintext letters are encoded as 8-bit ASCII and the given ciphertext is written in hex). What would be the one time pad encryption of the message attack at dusk under the same OTP
key? 12.Suppose Alice shares a secret block cipher key, kab with Bob, and a different secret block cipher key, kac with Charlie. Describe a method for Alice to encrypt an m-block message such that it can only be decrypted with the cooperation of both Bob and Charlie. The ciphertext should only be a constant size greater than m blocks. You may assume that Bob and Charlie have a preestablished secret channel on which to communicate. Your method should work even if Alice encrypts multiple such messages using these keys. NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE ADVANCED COMPUTER NETWORKS ASSIGNMENT-1 1.What is IPv6? what are its main features. 2.For the network given below show how the distance vector routing algorithm works for the node A 1)obtain the initial distance stored at each node 2)initial routing table at node A 3)Final routing table at node A 4)final distance stored at each node 3.Expain the open shortest path first algorithm (OSPF) in detail. 4.Briefly explain about the BGP characteristics
NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE SERVICE ORIENTED ARCHITECTURE ASSIGNMENT 1. Explain the evolution of SOA. 2. What are the perspectives of SOA in various industries considering various companies case studies NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE BIG DATA ANALYTICS ASSIGNMENT-1 1. What is big data.discuss in detail why big data is more important with real time examples. 2. Discuss Bigdata in terms of three dimensions. 3. Discuss the difference between old data analytic tools with modern big data analytic tools. 4. Give the benefit and advantages of Big data. 5. Explain the sources of data stream in detail. 6. Explain sampling data in a stream.