Module Name | Download |
---|---|
noc20_cs48_assigment_1 | noc20_cs48_assigment_1 |
noc20_cs48_assigment_2 | noc20_cs48_assigment_2 |
noc20_cs48_assigment_3 | noc20_cs48_assigment_3 |
noc20_cs48_assigment_4 | noc20_cs48_assigment_4 |
noc20_cs48_assigment_5 | noc20_cs48_assigment_5 |
noc20_cs48_assigment_6 | noc20_cs48_assigment_6 |
noc20_cs48_assigment_7 | noc20_cs48_assigment_7 |
noc20_cs48_assigment_8 | noc20_cs48_assigment_8 |
noc20_cs48_assigment_9 | noc20_cs48_assigment_9 |
Sl.No | Chapter Name | MP4 Download |
---|---|---|
1 | Introduction to Cloud Computing | Download |
2 | Virtualization | Download |
3 | Hotspot Mitigation for Virtual Machine Migration | Download |
4 | Server Virtualization | Download |
5 | Software Defined Network | Download |
6 | Geo-distributed Cloud Data Centers | Download |
7 | Leader Election in Rings (Classical Distributed Algorithms) | Download |
8 | Leader Election (Ring LE & Bully LE Algorithm) | Download |
9 | Design of Zookeeper | Download |
10 | Time and Clock Synchronization in Cloud Data Centers | Download |
11 | Global State and Snapshot Recording Algorithms | Download |
12 | Distributed Mutual Exclusion | Download |
13 | Consensus in Cloud Computing and Paxos | Download |
14 | Byzantine Agreement | Download |
15 | Failures & Recovery Approaches in Distributed Systems | Download |
16 | Design of Key-Value Stores | Download |
17 | Design of HBase | Download |
18 | Peer to Peer Systems in Cloud Computing | Download |
19 | MapReduce | Download |
20 | Introduction to Spark | Download |
21 | Introduction to Kafka | Download |
Sl.No | Chapter Name | English |
---|---|---|
1 | Introduction to Cloud Computing | Download Verified |
2 | Virtualization | Download Verified |
3 | Hotspot Mitigation for Virtual Machine Migration | Download Verified |
4 | Server Virtualization | Download Verified |
5 | Software Defined Network | Download Verified |
6 | Geo-distributed Cloud Data Centers | Download Verified |
7 | Leader Election in Rings (Classical Distributed Algorithms) | Download Verified |
8 | Leader Election (Ring LE & Bully LE Algorithm) | Download Verified |
9 | Design of Zookeeper | Download Verified |
10 | Time and Clock Synchronization in Cloud Data Centers | Download Verified |
11 | Global State and Snapshot Recording Algorithms | Download Verified |
12 | Distributed Mutual Exclusion | Download Verified |
13 | Consensus in Cloud Computing and Paxos | Download Verified |
14 | Byzantine Agreement | Download Verified |
15 | Failures & Recovery Approaches in Distributed Systems | Download Verified |
16 | Design of Key-Value Stores | Download Verified |
17 | Design of HBase | Download Verified |
18 | Peer to Peer Systems in Cloud Computing | Download Verified |
19 | MapReduce | Download Verified |
20 | Introduction to Spark | Download Verified |
21 | Introduction to Kafka | Download Verified |
Sl.No | Language | Book link |
---|---|---|
1 | English | Download |
2 | Bengali | Not Available |
3 | Gujarati | Not Available |
4 | Hindi | Not Available |
5 | Kannada | Not Available |
6 | Malayalam | Not Available |
7 | Marathi | Not Available |
8 | Tamil | Not Available |
9 | Telugu | Not Available |