0% found this document useful (0 votes)
74 views4 pages

Cloud

In cloud computing, scalability is achieved by transparently adding or removing servers, and elasticity is achieved by providing resources only when demanded. Elastic IP addresses are static IP addresses associated with an account, not an instance. A service-level agreement between a provider and client specifies aspects of service quality, availability, responsibilities, problem management details, penalties for non-performance, security capabilities, and performance metrics.

Uploaded by

Farhan Gondal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views4 pages

Cloud

In cloud computing, scalability is achieved by transparently adding or removing servers, and elasticity is achieved by providing resources only when demanded. Elastic IP addresses are static IP addresses associated with an account, not an instance. A service-level agreement between a provider and client specifies aspects of service quality, availability, responsibilities, problem management details, penalties for non-performance, security capabilities, and performance metrics.

Uploaded by

Farhan Gondal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

In cloud computing, how can we achieve scalability and elasticity?

In cloud computing, scalability of a system is achieved by transparently adding or removing servers (often
referred to as nodes) in the cluster and elasticity can be achieved by doing agreement with cloud services
providers to provide resources only at demanded situation.
What is Elastic IP addressing?
Elastic IP addresses are static IP addresses designed for dynamic cloud computing. An Elastic IP address is
associated with your account and not with a particular instance, and you control that address until you
choose explicitly to release it.
What is SLA? Also write its contents?
A service-level agreement (SLA) is a commitment between a service provider and a client. Particular aspects
of the service – quality, availability, responsibilities – are agreed between the service provider and the
service user. SLA contents are:
A) Problem management detail B) Penalties for non-performance
C) Documented security capabilities D) Performance graduate metrics
When permissive federation occurs?
Permissive federation occurs when a server accepts a connection from a peer network server without
verifying its identity using DNS lookups or certificate checking.
Define the term Monolithic Computing?
In software engineering, a monolithic computing or application describes a single-tiered software
application, in which whole computing is performed on a single computer and the output is shown on that
computer that is not connected to a network.
Describe Federated Identity Management?
Federated identity management refers to standards-based approaches for handling authentication, single
sign-on, role-based access control and session management across diverse organizations, security domains
and application platforms.
What is Dom0 and DomU in Xen hypervisor?
Dom0 is the initial domain started by the Xen hypervisor on boot. Dom0 is an abbreviation of "Domain
zero". Dom0 is a privileged domain that starts first and manages the DomU unprivileged domains.
DomU is the unprivileged domains with no direct access to the hardware or device drivers.
What is the fundamental difference between the hosted and hypervisor virtual machine?
A hypervisor is a program that would enable you to host several different virtual machines on a single
hardware.
A host virtual machine is the server component of a virtual machine, the underlying hardware that provides
computing resources to support a particular guest virtual machine.
Differentiate between replication transparency and failure transparency?
Replication transparency is the term used to describe the fact that the user should be unaware that data
is replicated.
Failure transparency refers to the extent to which errors and subsequent recoveries of hosts and services
within the system are invisible to users and applications.
What is the meaning of term “lack of global clock” in distributed computing?
In “lack of global clock”, due to absence of any system-wide clock that is equally accessible to all processes,
the notation of common time does not emit in a distributed system, different process may have different
notations of time. As a whole, it is not always possible.
What is SAML?
SAML is an XML-based standard for communicating authentication, authorization, and attribute
information among online partners. It allows businesses to securely send assertions between partner
organizations regarding the identity and entitlements of a principal.
What is meant by PaaS? List some examples?
Platform as a Service (PaaS) is a category of cloud computing services that provides a platform allowing
customers to develop, run, and manage applications without the complexity of building and maintaining
the infrastructure. Examples are Microsoft Azure, Apache Stratos, Google App Engine and Heroku.
What is Para-Virtualization?
In computing, para-virtualization is a virtualization technique that presents a software interface to
the virtual machine which is similar, yet not identical to the underlying hardware–software interface.
Differentiate between Cluster Computing and Grid Computing?
Grid computing is the use of widely distributed computer resources to reach a common goal. In grid
computing, the computers on the network can work on a task together, thus functioning as a
supercomputer.
Computers were clustered together to form a single larger computer in order to simulate a supercomputer
and harness greater processing power known as cluster computing.
Define DMTF?
The Distributed Management Task Force (DMTF) is a computer software trade group which works to
simplify the manageability of network-accessible technologies.
Define Open Virtualization Format?
Open Virtualization Format is an open standard for packaging and distributing virtual appliances or, more
generally, software to be run in virtual machines.
Write down three characteristics of distributed computing?
1. Concurrency of components 2. Lack of global clock 3. Independent failure of components
Define MSP model?
A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure
and/or end-user systems, typically on a proactive basis and under a subscription model.
Explain in brief how TLB helps MMU?
A translation lookaside buffer (TLB) is a memory cache that is used to reduce the time taken to access a
user memory location. It is a part of the chip's memory-management unit (MMU). The TLB helps MMU
to stores the recent translations of virtual memory to physical memory and can be called an address-
translation cache.
Define Risk Awareness?
Risk awareness is the acknowledgement of risks and the active process of reducing or eliminating those
risks.
What are the characteristics of Fault Tolerance System?
The characteristics of fault tolerance system are:
A) No single point of failure B) Fault isolation or identification C) Fault Containment
D) No single point of repair E) Robustness or Variability Control
Differentiate between Zimbra and Zoho?
Zimbra Collaboration Suite is a collaborative software suite that includes an email server and a web client.
Zoho is a web-based online office suite containing word processing, spreadsheets, presentations,
databases, note-taking, wikis, web conferencing, customer relationship management, project
management, invoicing and other applications developed by Zoho Corporation, a California-based
company.
What is cloud computing?
Cloud Computing is the practice of using a network of remote servers hosted on the Internet to store,
manage, and process data, rather than a local server or a personal computer.
Define SMTP?
The Simple Mail Transfer Protocol is a communication protocol for electronic mail transmission.
Define Resilience?
Resilience is the ability to provide and maintain an acceptable level of service in the face of faults and
challenges to normal operation.
Define QoS?
Quality of Service (QoS) is a set of technologies for managing network traffic in a cost-effective manner to
enhance user experiences for home and enterprise environments.
What is meant by FDI?
FDI stand for Fault Detection and Isolation (FDI). A subfield of control engineering which concerns itself
with monitoring a system, identifying when a fault has occurred and pinpoint the type of fault and its
location.
How distributed management task force enables more effective management of IT systems worldwide?
Distributed Management Task Force enables more effective management of millions of IT systems
worldwide by bringing the IT industry together to collaborate on the development, validation and
promotion of systems management standards.
Define Distributed Computing?
Distributed computing is a model in which components of a software system are shared among
multiple computers to improve efficiency and performance.
Define Server Virtualization?
Server virtualization is a virtualization technique that involves partitioning a physical server into a number
of small, virtual servers with the help of virtualization software. In server virtualization, each virtual server
runs multiple operating system instances at the same time.
Discuss briefly key challenges that one needs to address in the design and development of distributed
application?
Communication Processes Naming Synchronization Data storage and access Security
Consistency and replication Fault tolerance Scalability and Modularity
Application Programming Interface (API) and transparency
What techniques are used for handling sensitive and privileged instructions to virtualize the CPU on the x86
architecture?
Para-Virtualization Modify guest OS to skip the critical instructions Binary Translation
Implement some hyper-calls to trap guest OS to VMM Hardware assistance
Reduce the complexity of VMM implementation
Use emulation Techniques to make hardware virtualizable
Skip the critical instructions by means of these translations
Modify or enhance ISA of hardware to provide virtualizable architecture
List security standards used by cloud vendors in cloud computing?
Security Assertion Markup Language (SAML). Open Authentication (OAuth). OpenID. SSL/TLS Secure Socket
Layer
What is Federation?
A Federation cloud is the deployment and management of multiple external and internal cloud computing
services to match business needs. A Federation is the union of several smaller parts that perform common
actions. Levels of Federation are:
Permissive federation Verified federation Encrypted federation Trusted Federation
Security issues with cloud computing vendor discussed by technology analyst and consulting firm Gartner
Privileged user access. Regulatory compliance. Data location. Data Segregation. Recovery.
Investigative support Long-term viability

You might also like