Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: August 11th, 2022

Distributed computing uses distributed systems

Computer Sciences and Information Technology
You just need to answer the ”explain some roots shared between cloud computing and traditional distributed systems.” within a hundred word I upload below. Then you should answer:

Question 3: (30 points) Virtual machine provision and migration services are key research issues in cloud computing. Identify one of the directions that research in this area is taking, and carry out extended discussion on what the research problems are, what the challenges are, and how the research could be conducted from various perspectives.

Question 4: (20 points) Review and discuss the existing and potential distributed system applications that have been or can be developed using P2P computing, grid computing, or cloud computing.

You need write at least 600 words for question 3 and at least 400 words for question 4 using the document I upload.

The grading criterion:
comprehensive coverage of the topics (60%)
organization (10%)
readability (10%)
student’s own argument and discussion (15%)
grammar and spelling (5%)

And the most important thing is: this requirement doesn’t use the common style, such as Help write my thesis – APA, … etc., but instead use the ACM Word Template (see attachment below). Please follow ACM requirement and this assignment requires 10 references as well as the in-text references respectively, all of them must come from the given site: https://scis.lms.athabascau.ca/course/index.php?categoryid=251
Question 2
Distributed computing uses distributed systems in solving single large problems through the distribution of tasks to single computers in the distributing systems. In contrast, cloud computing uses network hosted servers in doing tasks like process, storage, and data management (Huang, Tang, Liu, Qiu, Zhou, Yuan & Peng, 2020). The distributed systems are also regarded as distributed computing. Therefore, distributed computing and cloud computing use the same concept whose primary goal is connecting users with resources or, rather, the users can store and access data (Velte, Velte & Elsenpeter, 2009). The two also have distinct things, but a user can improve the business to get higher profits. Examples of distributed computing are ATM, Facebook, and the World Wide Web, and those of cloud computing include Picasa, YouTube, and Google Docs.
Question 3
The virtual machine migration happens to be a management technique that provides the ability to adapt the placement of virtual machine to satisfy better performance objectives. It also can mitigate performance hotspots, improve resource communication locality and utilization, achieve the tolerant of faults, and facilitate the maintenance facilities. It can reduce energy consumption and facilitate the maintenance activities of the systems. There are new requirements posed by virtual machine migration on the underlying communication infrastructure design, like the bandwidth requirement in supporting the mobility of virtual machines (Flores, Tran & Tang, 2020). Another challenging issue is devising efficient virtual migration schemes since it requires weighing the virtual machines’ benefits and migration costs like management, communication, and service disruption.
Virtual provisioning is a virtual storage network-based technology where the storage space is allocated on demand to devices. The virtualized environment controls the management and allocation of the physical disk storage. It is usually connected to virtual machines (Raj, Mangal, Savitha & Salvi, 2020). The virtual machine provisioning is a critical issue that is very common in cloud computing. There are a massive number of virtual machines provisioned in a day in industrial cloud platforms. There is a need to carefully optimize it to make cloud platforms to utilize the resources effectively due to the complexity and resource constraints. It requires a very long period in provisioning a virtual machine from scratch. That would degrade the experience of customers.
Future research directions are taken in solving the cloud computing issues related to virtual machine provisioning and migration (Mansouri, Ghafari & Zade, 2020). The regular virtual machine migration is being done within the same location in the form of a physical site, for example, in data centers, campuses, and laboratories, among others. The migrating virtual machines done in different locations is a feature that is invaluable when added to the tools of virtualization management. Several security vulnerabilities exist in virtual machine migration, making it an area of significant consideration for research. Live migration facilitates online system maintenance, workload balancing, consolidation of virtual machines, and fault tolerance. However, it is still in its implementation in the early stages, and its security is not yet implemented.
Any security failure during the process of migration may cause data centers to be exposed to attackers. In the virtual machine virtualization, there are various vulnerabilities involves. Attackers could compromise virtual machines infrastructures, giving room for them to access other virtual machines on the same system and the host (Liao, Wu, Young, Chang, Huang, Hsu & Liang, 2012). The other research areas in virtualization include the taxonomy of cloud-based attacks on the virtualized system and other existing defense mechanisms that assist in various areas. There are security measures and requirements to achieve secure virtualized implementations and defense mechanisms on cloud security in general. Some of the threats that are associated with virtual machines are such as the denial of service. Attackers can also take advantage of resources that are poorly monitored.
There are ways to mitigate these risks, which involve accurately characterizing all deployed virtualization, and the active security measures passed the hyper vision control built-in on virtual machines (Weisenburger, Köhler & Salvaneschi, 2018). In determining gaps, it is necessary to compare security controls against industry standards. Coverage needs to incorporate intrusion detection, active vulnerability scanning, and anti-virus. The other steps include virtual machine traffic monitoring, administrative control since secure access can be easily compromised due to virtual machine sprawl and other issues. It is done by ensuring identity management, authentication procedures, and logging are ironclad. Customer security is the next step that ensures customer-facing interfaces like websites is in place. Then there is the virtual segregation step that strengthens virtual security through functional segregation.
Question 4
Distributed computing is done on several systems in solving large scale issues. Data centers and supercomputer sites changed from giving high-performance floating-point capabilities of computing to servicing large numbers of requests from users. Distributed computing focuses on large scale resource sharing. Distributed applications are either software or applications that run on various computers within a single network and can be stored with cloud computing or on servers (Lin, Liu & Wu, 2011). The traditional applications typically run on a single system, but the distributed applications run on several systems in performing a single task simultaneously. These applications’ nature refers to data that is spread out over several computer s in a network.
The P2P or the peer-to-peer networking or computing can be described as a distributed application architecture that does various tasks between peers (Domingo-Ferrer, Blanco-Justicia, Sánchez & Jebreel, 2020). Examples of peer-to-peer applications include digital cryptocurrencies like bitcoin, ether, nxt, and peercoin, among others, the Dalesa, a peer-to-peer web cache for LANs. Dat, which is a platform for the distributed version-controlled for publishing, Jami, a peer-to-peer chat, and the open garden, which is an application that shares connections like the internet access with devices through Bluetooth or WiFi. Grid computing is the use of computer resources that are widely distributed in reaching a common goal.
The sizes of grids vary from small to confined network of computer workstations within a corporation (Grandinetti, 2006). Some examples of grid computing applications are like google, which uses google cloud, Amazon, and Microsoft, with Azure’s incorporation. They provide grid computing capabilities that none of the companies can rent in hosting their offerings. The advantages of grid computing include the ability to solve complex issues quickly. It can be combined with other organizations, making fair use of the existing hardware. Cloud computing is the process of accessing services from third party data centers through the internet. The information is accessed remotely and from any location.
The network of cloud computing accesses data to a shared pool of configured servers, service, storage, applications, and other necessary computing resources. Examples of cloud computing applications include Adobe Creative Cloud, a set of applications and services from Adobe Systems. The box is an application that manages cloud content and the sharing of files provided to various businesses. Nerds Support Cloud computing application helps businesses with the services based on IT by providing software like SaaS, upgrading of hardware, and their maintenance. Salesforce contains the cloud-based software-as-a-service or SaaS, which serves as a solution to both businesses to consumer and business-to-business commerce solutions.

References
Mansouri, N., Ghafari, R., & Zade, B. M. H. (2020). Cloud computing simulators: A comprehensive review. Simulation Modelling Practice and Theory, 104, 102144.
Velte, T., Velte, A., & Elsenpeter, R. (2009). Cloud computing, a practical approach. McGraw- Hill, Inc.
Weisenburger, P., Köhler, M., & Salvaneschi, G. (2018). Distributed system development with ScalaLoci. Proc. ACM Program. Lang., 2(OOPSLA), 129-1.
Lin, C. C., Liu, P., & Wu, J. J. (2011, December). Energy-efficient virtual machine provision algorithms for cloud systems. In 2011 Fourth IEEE International Conference on Utility and Cloud Computing (pp. 81-88). IEEE.
Liao, C. H., Wu, C. S., Young, H. C., Chang, K. H., Huang, H. H., Hsu, C. C., & Liang, K. H. (2012, April). A novel mechanism for rapid provisioning virtual machines of cloud services. In 2012 IEEE Network Operations and Management Symposium (pp. 721-735). IEEE.
Flores, H., Tran, V., & Tang, B. (2020, July). PAM & PAL: Policy-Aware Virtual Machine Migration and Placement in Dynamic Cloud Data Centers. In IEEE INFOCOM 2020- IEEE Conference on Computer Communications (pp. 2549-2558). IEEE.
Raj, S., Mangal, N., Savitha, S., & Salvi, S. (2020, July). Virtual Machine Migration in Heterogeneous Clouds-A Practical Approach. In 2020 IEEE International Conference on Electronics, Computing, and Communication Technologies (CONNECT) (pp. 1-6). IEEE.
Huang, Z., Tang, M., Liu, F., Qiu, J., Zhou, H., Yuan, Y., … & Peng, Y. (2020, August). A Distributed Computing Framework Based on Variance Reduction Method to Accelerate Training Machine Learning Models. In 2020 IEEE International Conference on Joint Cloud Computing (pp. 30-37). IEEE.
Domingo-Ferrer, J., Blanco-Justicia, A., Sánchez, D., & Jebreel, N. (2020, May). Co-Utile Peer- to-Peer Decentralized Computing. In 2020 20th IEEE/ACM International Symposium on Cluster, Cloud, and Internet Computing (CCGRID) (pp. 31-40). IEEE.
Grandinetti, L. (2006). Grid Computing: The New Frontier of High-Performance Computing (Volume 14).

Order | Check Discount

Tags: Distributed computing uses distributed systems

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.