Nt1310 Unit 2 Cloud Computing Case Solution

Improved Essays
Mid-Term Exam

1) Tom and Jerry are two friends with 10 and 2 toys each. If more friends come to visit Jerry, he may have to buy more toys, while Tom is not using his toys. So, Children keep all their toys in one big box and use them. This common big box is cloud computing.

2) I believe that “Maintenance Costs will be lower with cloud computing”. While moving from a private network to a cloud based network, the initial setup costs will be high. The cost required for setting up IT can never be reduced. But once the setup is completed, the cloud based company will be responsible for providing computational capabilities along with infrastructure which will helps in maximum resource availability like backup, resource availability, etc. The company purchasing a cloud based service can
…show more content…
Each of the OS will be able to access the hardware independent of the other.
The only drawback would be the unavailability of a UI to manage these OSs. 4)
a) Consensus is the process of getting all the systems in the network to agree on a single value and this value must be proposed by one of the systems in the network. Any algorithm that requires multiple systems to agree on one solution will have to resolve the problem of consensus. An increase in the number open source distributed processing and storage systems have led to an increase in the need for consensus algorithms. A consensus may not be achieved due to number of issues like:
• Faulty communication lines.
• Faulty systems in the network.
• Inconsistencies in System time shared in the network.

b) Paxos algorithm is a consensus algorithm. It helps to ensure that multiple systems in a cluster agree upon a single value for the log. Any system in the cluster can act as a Proposer: sends a request to all the other systems in the cluster, Leader: Updates the log based on the most widely accepted value or Acceptor: Accepts the highest value for the

Related Documents

  • Improved Essays

    Part B Q1. The normal dose of paracetamol is very safe to use and it is not over 4g per 24 hours; however, when the patient take more than 6g per 24 hours of paracetamol, the liver necrosis will happen within 10 to 12 hours and liver damage may occur within 24 to 48 hours. For the metabolism, most of the paracetamol is converted to nontoxic metabolites by the phase II conjugation of glucuronide and sulfate and a small amount of paracetamol is oxidized by the Cytochrome P450 (CYP) enzymes in the phase I metabolism. In this phase, CYP1A2 and CYP2E1 enzymes convert paracetamol to N-acetyl-p-benzoquinoneimine (NAPBQI) which is highly toxic substances.…

    • 885 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Case Study

    • 424 Words
    • 2 Pages

    Utilizing the information from the table above the mean, median and standard deviation will be calculated. The mean equals the average of the sample by adding all the values of the samples and then dividing by the total number of items. The mean for the samples collected is 14.87 ounces which rounded up 14.9 ounces.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Hi Marcos, That's no problem; I'm always happy to help! You can access and download the required files using the credential's below. Once you access the FTP server, you will find a “FreeFlyer_Releases” folder that contains the most recent version of FreeFlyer, FreeFlyer 7.1.1. Within that subfolder you can select the bitness version installed on your system and access the "Extras" folder. Once you're in the folder then you will find a "Network Licensing" folder that will contain an lmadmin folder from which you can download and save freeflyr.exe to your system.…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /***************************…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics. Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 6 Assignment

    • 276 Words
    • 2 Pages

    At the end of the day, we are both talking about the same thing, but with very different expectations. I agree that we can move many systems to the cloud… What I am saying is that to do it right, it will take time (1-3 years); it is going to cost money (setup $5 to $20K+); and in the end, we will not have the level of customization we have today. Total TCO is probably going to be the same. Why? Because I am one of the most frugal IT pros in the market.…

    • 276 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    1. Ethernet Ethernet is a combination of computer networking technologies most commonly used in local, metropolitan, and wide area networks. 2. Server A computer or computer program that manages access and distributes information through a centralized service in a network.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    In OSI stack, presentation layer converts data transferred by the application layer of the transport node. The functions of presentation layer are : 1. Data transcription 2. Data reconstruction 3.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 7 Exercise 1

    • 756 Words
    • 4 Pages

    6 8. The following parameters are calculated for each of the node in each of the server wings: Voltage, Temperature, Fan Speed, CPU Utilization. After we calculate the theoretical values of the parameters we calculate the threshold value using the above, if the calculated value exceeds the threshold value there is a chances of the node to fail, and hence we take the previously mentioned migration policies to tackle the situation.…

    • 756 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    In T8.1, services and their corresponding user communicate with each other by passing data in a well-defined, shared format, or by coordinating an activity between two or more services. The services are located in a central service pool and can use a so-called Service Bus (often Enterprise Service Bus or ESB), should be shared in parallel by different application systems and beyond, combined by a service composition to arbitrarily complex complete systems. This, also called orchestration combination of various distributed services from many different administrative domains is an essential feature of a service-oriented architecture. A Service bus is used to provide communication between all services and any user, User sends request to the service…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    repository or central database and trusted third party Central authority(CA) are used to revoke, issue and store the keys. There is always a risk that these centralized infrastructure can be violated. Hence, Blochcain can be use to to reduce the risks of storing PKI on centralized infrastructure. Here the Data(Keys) will be distributed across the blochchain network[3] In the 2nd section we will go through the introduction of blockchain,…

    • 625 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Queuing schemes provide predictable network service by providing dedicated bandwidth, controlled jitter and latency, and improved packet loss characteristics. The basic idea is to pre-allocate resources (processor and buffer space) for sensitive data. Each of the following schemes require customized configuration of output interface queues [8]. • First In First Out (FIFO): the simplest form, which also known as first-come, first-served (FCFS) queuing, involves buffering and forwarding of packets in the order of arrival.…

    • 493 Words
    • 2 Pages
    Improved Essays