Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
45 views
Cloud Computing - Rotated
Uploaded by
alok
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save cloud computing_rotated For Later
Download
Save
Save cloud computing_rotated For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
45 views
Cloud Computing - Rotated
Uploaded by
alok
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save cloud computing_rotated For Later
Carousel Previous
Carousel Next
Save
Save cloud computing_rotated For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 88
Search
Fullscreen
(syzeW 2) suonsany uous . UG gqu0s P00 = SX 3008 “WHO JBMSUY-UoNsaND uy snqe|iAs aurjua Jo afiexano9 asim-oidoy . sas Woiss?>.IPG MAN M peqeyzeyp "G11 ‘LAd 39vd WnINVNO — ofbg — wnqushe Vy/ WL eueyg eqraey sg Suyynduog pnoja (Aussoaup peoruysay, ysopesg sep syaun04) MOUYIN'T ‘Ysopesg 1”Q, ‘Aysaoaquy yearaypay, wepey py “f-d-V Ud 0} payer sa8o][0D SuLsoUsUg [Ty JO vax ypNO, Jo sjuepnig yal dO TEL ROTTS Santas WALNVAOpy: ApramSingh PUBLISHED | Quantum Publications® (A Unit of Quantum Page Pvt, Lta,) Plot No, 59/2/7, Site - 4, Industrial Arey Sahibabad, Ghaziabad-201 010 RCS 075 loud Comp. Phone : 0120-4160479 . UNIT-1 : INTRODUCTION (1-1 Eto 1-26 E) Email: pagequantum@gmailcom Website: www.quantumpage.coin Introduction to Cloud Computing ~ Definition of Cloud - Evolution Debi Once: 0 Fat Rabin Naar, Shah, Debitionsg | Sara pg“ Chas Phy Cloud On-demand Provisioning, (© Au Ricurs Resenven No part ofthis pubhsation may be reproduced or transmitted, UNIT: in any form or by any sans, scithout permission CLOUD ENABLING TECHNOLOGIES (2-1 Et02-33E) ‘Service Oriented Architecture ~ REST and Systems of Systems ~ ‘Web Services - PublishSubscribe Model - Basics of Virtualization = Types of Virtualization ~ Implementation Levels of Virtualization Virtualization Structures - Tools and Mechanisms ~ Information contained inthis work is derived from sources Virtualization of CPU ~ Memory ~ 1/0 Devices -Vistualization believed tobe reliable. Every efforthas been made to ensure Suppo ane Disasit Rewovery. accuracy, however neither the publisher nor the authors UNIT : CLOUD ARCHITECTURE, SERVICES & STORAGE ‘guarantee the accuracy or completeness of any information (G1 Et03-32E) published herein, and neither the publisher nor the authors Layered Cloud Architecture Design - NIST Cloud Computing Reference Architecture ~ Public, Private and Hybrid Clouds ~laaS arising out of use of thi i. = Pax SaaS ~ Architectural Design Challenges ~ Cloud Storage 15 out of use of this information. = Storage-as-aService ~ Advantages of Cloud Storage ~ Cloud Storage Providers ~ $3. shall be responsible for any errors, omissions, or damages Cloud Computing (CST : Sem-7) UNIT-# : RESOURCE MANAGEMENT (+1 E10 4-258) 1* Edition : 2011-12 Inter Cloud Resource Merapenet inser Provisioning and i Resouree Provisioning Methods ~ Global Exchange of Clow 2% Edition : 2019-20 (Thoroughly Revised Edition) Rese Pe eB erviow ~ Cloud Security Crallenges ~ 3” Edition : 2020-21 Software-as-aService Security ~ Security Governance ~ Vistual Machine Security = JAM™= Security Standards. LUNIT:S : CLOUD TECHNOLOGIES & ADVANCEMENTS (5-1 Eto 5-21 E) Hadoop - MapRestce ~ Virtual Box — Google App Engine Progranuning Environment for Google App Engine ~ Open Stsck— Federation in the Cloud ~ Four Levels of Federation ~ Federated Services and Applications ~ Future of Federation. SHORT QUESTIONS (GQ-LE 10 SQ-20E) SOLVED PAPERS (2019-20) (9P-1 Eto SPAZE)Introduction ee * 1-2E(CSIT-Som-7) Introduetion f ‘ PART-1 Introduction to Cloud Computing, Definit i of Cloud Computing “Long Answer Type and Medium Answer Type Quesiions CONTENTS Part-1 Introduction to Cloud. Computing, Definition of Cloud, Evolution of Cloud Computing -2E to 1-17E Underlying Principles of.. Parallel and Distributed Computing, Cloud Characteristics, Elasticity in Cloud, On-Demand Provisioning weweueI-ATE 80 1-268, 1-1E(CSAT-Sem-7) Que 1:1. | What do you mean by cloud computing ? Also, give its Properties. ‘Answer 1. Cloud computing is the means of delivering all IT from computer applications software, business processes, messoging, and collaboration to.end users asa service wherever and whenever they need i 2.” Cloud computing is a paradigm for delivering IT where ropid provisioning isan important characteristic for eomputing resources, data applications and IT. 3. Cloud computing helps us to face the challenges such as i. Decreasing the capex and opex cost. i Enhancing the service quality. iii, Maintaining the desired and right level of security, compliances, regulations, and policies across the different functions of enterprise. jv. Rapid provisioning, agility, and business transparency for consistent self-service delivery. 4. Thus, cloud computingis the service and deployment model using large resource pool based provisioning of virtual or physical resources in a service model using the internet (public cloud) or intranet private cloud). Properties of cloud computing are: 1. User centric : This means once a user is connected to cloud any’ data, such as images, videos, applications, becomes his property. Not only the data but the devices connected to it and the user can share itwith other users. 2 Task centric : Cloud computing focus on what one need and how pplication can do it. Here documents are given more priority than the applications which create them.Cloud Computing EF (CST Som.7) again setfhedling, bickups are available for every documg +s ate, tone document crashes there will be its duptignt reve Multis f tenaney and intelligence : Multi-tenancy refers to shar sine eancraeeet ata and ost 2ross alae PS data os og and analjsi are necessary fOr accessing informatien inanintelligent manner. Many processes in cloud computing shall be automate . Pl crahed data withits duplicate, Hence, p ‘Saewoeiated withcloud computing OfTamming Flexible: Flexibleas the users may be of different vari ithas tomatch with theirneeds. ‘Que 12. | What are the advantages and disadvantages of cloud computing ? Answer — Advantages of cloud computing : Cost saving: It helps us to save substantial capital cost as it does not need any physical hardware investments, 2 Strategic edge : Cloud computing helps us to access the latest applications any time without spending our time end moncy on installations High speed : Cloud computing allows us to deploy our service quickly in fewer clicks. This faster deployment allows us to get the resources required for our system within fewer minutes. 4 Reliability : Through cloud computing we can always get instantl updated about the changes. a " & Mobility : Employees who are working on the premises or at the remote locations can easily access all the cloud services All they need is internet connectivity Unlimited storage capacity: Cloud computing offer limites storage Disadvantages of cloud computin, 1 Performance can vary: When we are working in acloud environment, % j7plstonis running on the server which simultaneously provides fue oot *r businesses that can affect the performance of oUF 2 Technic 2 ren sical Jere Cloud technology is always prone to an outage and ‘and heneo AE (CSAT-Sem-7) Introduction 3. Security threat in the cloud : Before adopting cloud technology, we should be well aware ofthe fact that we will be sharing all our company’s sensitive information to third-party cloud computing service provider. Hackers might access this information. 4. Internet connectivity : Good internet connectivity is must in cloud ‘computing. We eannot aecess cloud without an internet connection. 5 Lack of support : Cloud computing companies fail to provide proper support to the customers. Moreover, they want their user to depend on FAQsor online help, which ean be a tedious ob for non-technical persons. Que 13. | Explain vision of cloud computing. “Answer 1. Cloud computing provides the facility to provision virtual hardware, runtime environment and services to a person having money. ‘These all things can be used as long as they are needed by the user. 3. The whole collection of computing system is transformed into collection of utilities, which can be provisioned and composed together to deploy systems in hours rather than days, with no maintenance costs. 4. The long term vision of acloud computing is that IT services are traded ‘as utilities in an open market without technological and legal barriers. 5. Inthe future, we can imagine that it will be possible to find the solution that matches with our requirements by simply entering out request ina ‘plobal digital market that trades with cloud computing services: 6. The existence of such market will enable the automation of discovery process and its integration into its existing software systems. 7. Ductotheexistence ofa global platform for trading cloud services will, also help service providers to potentially increase their revenue. 8." Acloud provider ean also become a consumer of a competition service in order to fulfill ts promises to customers. ‘Que 1.42] List the major categories of parallel computing systems. Categories of parallel computing systems: i. Bit level parallelism : It is a form of parallelism which {s based on increasing processors word size. It shortens the number of instructions that the system must run in order to perform a task on variables which are greater in size. i, Instruction level parallelism : It isa form of parallel computing in ‘which we can caleulate the amount of operation carried out by an operating system at same time. For exampleCloud Computing {Instruction pipelii 2 Out of order execution 3 Register renaming 4L_ Speculative execution 5 Branch predietion oe FE] Discuss the issues related to cloud computing anower | ‘Several issues related to cloud computing are : Issues in clouds ‘Security issues Security issues : Some of th ro i osdeanpating are asfolowes. Problem which are faced bythe L Data integrity : When a data is on. cloud, be ison a cloud, anyone from any loa Steeenn a yur the cloud. Cloud does not diferentiate ‘2.8 sensitive data from a common data thus enabliny ‘Bocess those sensi integrity in loud copa ensi ‘ive data. Thus there is a lack of data integrity in eloud 2 : Data theft : Most of the, ‘cloud vendors instead. of acquiring a server try lo lease a server from other service providers. b other service pr etn ad ee are Broviders because they ae cost 2 Securit ei {Y on vendor level : Vendor should make sure that the server aswell ised only otal the external threat it may come across, A cloud ent "tes good security provided by the vendor tothe 4 Security senunty oer ae a ; Even though the vendor has provided good Because of its pan es cestomer, the customer should make sure # lamperig of dota recom there should not be any loss of data oF rather users who are using the same cloud. Information, betwen dierent hast ty related to the information exchanged ‘or between hosts and user, This issues pertaining & 1GE(CSITSem-7) Introduction, tosecure communication, authentication, iasues concerning single sign ‘on and delegation. Data issues : Various data issues in cloud computing are as follows 1. Data loas: Ifthe vendor clases due to financial or legal problems there ‘will boa loss of data for the customers. The customers will not be able to access those data because data is no more availabe for thecustomer as the vendor shut down, 2 Data location : When it comes to location of the data nothing is transparent even the customers do not know where his own data are located. The vendor does not reveal where all the data are stored. The data will not even be in the same country ofthe customer, it might be located anywhere in the world. 3 Datalock-in : Software stacks have improved interoperability among platforms, but the APIs for cloud computing itself are still essentially proprietary, orat least have not been the subject of active standardisation. ‘Thus, customers cannot casily extract their data and programs from ‘one site to run on another. 4. Data segregation : Data in the cloud is typically stored in a shared cavironment whereby one customer's data is stored aloogside another customer's data, hence itis dificult to assure data segregation. 5 Data confidentiality and auditability : Current cloud offerings are casentially public (rather than private) notworks, exposing the system tomore attacks. Auditabilty could be added asan additional saver beyond the reach ofthe virtualized guest OS providing facilities arguably more secure than those built nto the applications themselves and centralizing the software responsibilities related toconfidentiality and auditability to ‘single logical layer. 6 Dataintegrity : One of the biggest concerns with loud data storage is the verification of data integrity at untrusted servers, and how to deal with sensitive data. It is not an easy task to maintain customer's most sensitive cloud data securely, which is needed in many applications for lients. 7. Deletion of data: Data that has to be deleted by the user because he or ‘she no longer needs it or many no longer process it for another reason is also deleted by the provider and no more copies of data are available. ‘This can lead to problems, particular in connection with backups. & Service level agreements : According to the purpose for which the data is processed, it is important to agree on binding service levels for availability and data recovery andif necessary, safe guarded by supporting fixed penalties in the event of non-compliance with the agreed service levelsCloud Computing ‘esos prtomancisusin ld computing ar : "cor application performance or application hang. . Fr aaton iestarved for RAM or CPU cycles, and faster or more RAMis added. 2 Slow access to applientions and data : Bandwidth is fave, and the most common solution is t0 add fast connections. Horizontal and vertical scalability : i. Vertical sealing : Vertical scaling (up) entails resources tothe same computing pool. ii Horizontal sealing : Horizontal scaling (out) ‘Toor mahins vies tbe omputingplatersa eet increased demand Sustained inereasesin demand, however sae horizontal scaling and load balancing to restore and maintain en performance Peak Energy related issues: Various enengy related issues are as follows 1 Cloud computingis rapidly growing in importance as incre of enterprises and individuals are shifting their workload providers ‘The electricity eostsinvelved in opera ‘bultiple data centres can be enormous. often must pay forthe peak power they consume, 3. Lowering these high ope cloud service providers [Rouliient or malfunctioning cooling systom can lead te overheating of ie missed system reliability and devices lifetime. ie Oa tan the iafasructure eds to substan earton etn cntbtingto the geese cl Fault tolerance ; nares 1 Usually the er networy adding tore asing numbers to cloud service ga large cloud infrastructure of Infact, cloud service providers ‘draw, as well as the energy they rating costs is one of the challenges facing Fault tolerance is one of the key is ult ‘one of the key issues of cloud computing. Fa ‘one 7 f cloud computing. Fault rom teen thal te techniques neesay ta eae a 2 These software faulte . Prveatspiem alu cea oechanian ofthe eoftware ays Fault tolerance techni i te aperte eeniqus ate employed during th tor ae 1 the procurement, Drove mechan fare When a fault occur, these tecaaues from occurring" (the Software system to prevent system failur0 Que 1.6, | What are the hurdles in cloud computing ? ‘Answer Hurdles in cloud computing: 1. Security: i. Asthe services are opened and delivered over the network between the cloud service provider and the consumer, the security in this ‘model is perceived at higher levels. i. Other inhibitors can be location-independent resource pooling ‘where consumer does not know where his services are running or where his datais stored. fii, Limited service management and monitoring capabilities in the public cloud model also added to the complexities. 2 Regulation and compliances : i. There is anced of data governance models to be established in the ‘enterprises and federating data privacy. ii In large organizations, IT delivery is taken with the concerns of reliability; performance, and availabibty. iil, There are different levels of maturities for organizations seeking different levels of Service Level Agreements (SLA) butcloud service providers are not equipped to deliver the services. iv. Thore is a need of stringent Recovery Point Objective (RPO) and the Recovery Time Objective (RTO) with the agreed number of ‘minshours down-time. A Cloud migration : i. Thisrequires the property of powerful interoperability of platforms that should identify the appropriate application that can be migrated. tothe cloud, it is important to identify tho interdependencies and integration points with standards and interfaces that are lacking among service providers. iii, Cloud migration becomes more complexif the service bundles are integrated from multiple cloud secvice providers. This can also ‘become the deal breaker or the reason for downgraded performance. 4 Workload suitability for cloud : i. Notall the applications are suitable candidates for the cloud. Wi It depends on the function of the business, enterprise policies, application architecture, sealability, suitability, usage patterns according to pay-per-use-model o infrastructure requirements in the service model.1-9E (C811 Sem ” arr Joint ern Toewer | swith some level of i rrredisanestensinofeinteret ith some lew] inherent dx, andothics sean be thought of waitin of Information Lechnoloy yg psi iateligenee verges virtualization, grid functionalities and web stand 3 Tan ley model which is delivered to the customers overt Anat prea the busines intelligence defines the best cost schemes sate win situation fr both the cloud service provider as meq asthe cloud service consumer. 4k Clood brokers negotiate the best deals and relationships between th, ‘doud consumers and cloud providers. ° They can use specialized tools t identify the most appropriate clo etseeand map the requirements ofthe application toi. ‘Cloud broker services are mainly categorized into three group Service intermediation broker provides a service to a consumer ‘bat echanoesa given service by adding some valueon top to increase some specifi capability. Service aggregation brokerage service combines and integrates {nto cae or more services and ensures that data are modelled acrese all component services and movement, security of data be y tween ‘the service consumer and multiple providers. € Service arbitrage is similar to cloud service aggregation b loud ser ut services being agaregated are not fixed. In addition, these services provide Aexibiity and opportunity forthe service aggregator. Que 18. | What are the components of cloud ? ‘Answer Components of cloud : 1 Ons service consumer (or end user) i Chndeerr interact mas uusuBers are the end usersknovin asclients, which requirement,” 28m and demand for services as per their i Theelent le Mobinen, categorized into the following three eategories = laptops, Poss ea etile clients run the application from demands for highe ‘Smart phones. This category of clients * speed and high level of security. 6 Introduetion 1-10 (C8IT-Sem-7) tk Thin clients: Thin clients neither have hard drives nor have DVD ROM drives, and largely depend on the server. Thick client ick clients are self-sufficient in terms of accessories, Cloud service provider. Cloud service providers are the agents which host the servers in the cloud and deliver service to the end users. ‘The major cloud providers ure Google, Amazon, Sales Force, IBM, Microsoft and Rackspace. Internet medium : Internet medium is the communication channel between the consumer and provider where services are redirected. Datacentre: Datacentre is the collection of servers where the applications subscribed are housed Ie consists of storage, network, and server. @19:_,] Give the characteristics of cloud. 4 Characteristics of cloud are: L Self-service on-demand: As acloud consumer, users are privileged to request and provision computing capabilities bundled with services with ‘or without approval process powered by automation and workflows. Ubiquitous network access: Thisis the characteristic by which end user and server computing devices ean be accessed over the network. even using the next generation heterogeneous devices such a3 smartphone, tablets, thin and thick clients. Resource pooling: i. This characteristic vofers tothe pooling of resources across multiple datacenters. ‘These pooled virtual datacenters are then divided into multiple pools to provide their services to various consumers in a mult tenant model. ‘These pools can have both physical and virtual resources, iv, The devices provided by this pool give the notion of location- independent compute (storage, servers, processing, network bandwidth, virtual machines, etc.), where the consumer does not have control or visibility about the service location and its geography. iit, Rapid clasticity : i. This characteristic makes the provisioning rapid and elastic.Cloud Computing 1-11E (CSAT-Sem.7) T_ This provisioning ean be automatic and can flarup and Mex-down on the basis of spikes of utilization. fi Theconsumer can view the infinite capacity available as a service, which can be bought at any point of time. Que L10] What are the challenges in cloud ? ‘Answer Challenges in cloud : 1. Lack of control : In case of lack of control, by delegating the IT oanagement toa third party, the service consumer loses the ability to rectly control and monitor the execution ofthe submitted workload, 2 Security : For security, trusting a third party to store enterprises Confidential data is a source of potential concern and necds to be ellectively addressed by the cloud service provider. Interoperability among multiple service providers: This leads to avoid vendor lock-in, itis desirable to be able torun the same virtualized con clouds provided by multiple vendors. Appropriate standards ‘need to be in place for addressing this concern. 4 Resource management : The management of computing, storage and other resources in a distributed system is recognized as a ‘hard’ problem. Que fi. | Explain cloud services. ‘Answer On the basis of user requirements, the cloud infrastructure has given various servicing schemes in order to deliver the utility to the consumers or clients or end users a Infrastructure-as-a-Service (IaaS) : i. Infrastructure-as-a-Service (LaeS) model allows the eustomer to provision processing storage, network and other important software ‘such as operating system and applications, ii The consumer does not have control aver the underlying infrastructure but has control over the operating systems, storage and deployed applications. b. Platform-as-a-Service (PaaS) : i. Platform-as-a-Service (PaaS) model provi ‘customer to deploy the customer-created app infrastructure using the programming language or tools supported by the cloud provider. 1-12 E (CSAT-Sem-7) Introduction ‘Tho consumer docs not manage the underlying cloud infrastructure such as network, storage, ete, but han control over the deployed applications iii, It also provides solutions for integrating cloud computing into ‘existing application, services, and infrastructure with a market- oriented approach. ce. Software-as-a-Service (SaaS): i. Software-as-a-Service (SaaS) model enables the customer to use the provided application hosted on the cloud infrastructure. ii In this model, the customer does not have any control over the cloud infrastructure but has a litle control over the application configuration settings. ii ‘The applications are accessible from the client devices such as thin client or web browser interface. Cloud SaaS 1.11.1. Cloud services, ‘Que 112 | List the benefits of cloud. ‘Answer Benefits of cloud : 1. Increased agility on the IT datacenter resources and innovation. 2. Enablingof self-service portal and thus ensure Virtual Machines (VMs) in less lead-times. 4. Adherence of SLAsas the VM lead times and down times are sgnicanty reducedCloud Computing 10. n 2 1. 1-13E(CSIT-Sem-7) “rial and error configuration tests can bedone atease, Complete control over eloud usage for administrators is possible Sealaiity and silty allw'the Ina cloud to almost deliver the promise ofunlimited IT services on demand. Ucage-based payment and not getting billed when the utilization decreases Sigaifieant reduction in the costs for IT datacenter. ame sharing of the resource available in IT datacenter through area sauna dcmandscan bm cost eetvly. “s Considerable inerease inthe wlization of resources ofTT datacenter. Increase in the operational efficiency of the resources in the IT datacenter. Achiove a greener datacenter. ‘Support fr heterogeneous hardware vendors, Avoids vendor locking ‘Que 143. | Explain the evolution of cloud computing. ae] Eve L 2 lution of cloud computing : Grid computing = Grid computing appeared in the early 1990s as an evolution of cluster computing. & Grid computing proposed a new approach to access large computational power, buge storage facilities, and a variety of services. Users can consume resources in the same way as they use other utilities such as power, gas, and water. Grids initially developed as aggregation of geographically dispersed cluster by means of internet connection. ‘These clusters belonged to different organizations and ‘srrangemeotswere made amng them to sharethe computational eran ee en eckaged and offered on a pay-use basis 1-14 E(CSAT-Sem-7) Introduction ii Thebusiness model introduced with utility computing brought new requirements and led to an improvement of mainframe technology, additional features such as operating systems, process control and user metering facilites. iii, The idea of computing as utility remained and extended from the business domain to the acodemia with the advent of cluster computing. 3 Software-ns-a-Service : Refer Q. 1.11, Page 1-11E, Unite. 4. Cloud computing : Refer Q. 1.1, Page 1-2E, Unit-1. (Que 1:14] Discuss the architecture of cloud computing. ‘Aaawer Gent ingerbi rita ha compan ponents caaica ined compatng These xmpocnt costo Fron end platform «na comping secietrecostsffront ead platforms called enter dou Siente Thee cleat comprise server, f(r tients tha ent, cee nr ta ctieamee fi Thee cen plafons inter withthe cloud data sarge though reopen eonddonrn ugha ebtrawnee ont ae ioe i The int defers tothe clea prt ofudeamputiog sytem Imounefimcrcesand petra hae ede ‘Reena computing latores ke ned ronser 2 Backend platform: i. Thehack end refers to the loud itself It consists of all the resources required to provide cloud computing services It comprises of huge data storage, virtual machines, security mechanism, services, deployment models, servers, et. iii, Itis online network storage where data is stored and accessible to multiple clients. & Cloud based delivery : These include the following: i. Software-us-u-Service (San8): Refer Q.1.11, Page 1-11E, Unit- ii, Development-as-a-Service (DaaS) : Development asa service is web-based, community shared development tools. Thisis equivalent tolocaly installed development tools in the traditional (non-cloud ‘computing delivery of development tools,rid Sng 1-18E (CSTT-Sem.7) Tih Platform-asa-Service PaaS): Refer Q.1.11, Pogo 1-1E, Unit. nfrastructure-as-a-Servico (Lon) Refer 1.11, Page 1-118, Unit-l. Network: The cloud network layer offers: i. High bandwidth (low latency) : Allowing users to have ‘uninterrupted access totheir data and applications. [Agile network: On-demand access to resources requires the ability texpove quickly and efficiently between servers and possibly even, ouds. [Network security ‘Security isalways important, but when dealing ‘with multi-tenaney, it becomes much more important because we fare dealing with segregating multiple customers. q] Frontend iv. ib Chient infrastructure ‘Application Tene i 2 Z 5 | lcusdnaine E}* | pockena i i 2 Siorge Tafastrasure (ig: 144.1 Cloud computing architectore, ‘Que L15.] Write some applications of cloud computing. = Applications of cloud computing : 1. Bigdata analytics: From fraud recognition to statistical investigation, big data exis universally Analyse how Haloop and great presentation computing elusters ean be st-apin both publi and private clouds Develop and test : Build and test applications in ‘on-requirement Platforms using constantly configured resources, lower expenditure, and decreased release cycles, : ve 2 | 1-468 (CSIT-Sem-7) Introduction 3. Disaster recovery : Public and private clouds facilitate commercial solutions to maintain highly accessible applications with flexible multiple datacentres and provider architectures, and reduce downtime and data loss Gaming applications : Distribute flexible cagacity toassemble random traffic actions and to lower expenditure for the ongoing life cycle | management by publie and private clouds. ‘Web and mobile applications : Deploy motile applications and web applications that areextremely sealable and accessible across arangeof verified architectures, technologies and clouds, ‘Que 165] Give limitations of cloud computing. | Limitations of cloud computing: stamens eu scunty incrvaeboment hat waranty. integra ore eucant to buy an arurance of busines deta cosy on renion, They tae rng ata tocompotion andthe data conde of aes Inmany instances, the actual storage location is not disclosed, adding tu tesanigyeaceral clempoase In the existing models, firewalls across datacentres (owned by enterprises) protect this sensitive information. vi Inthe coud model, service providers are responsible for maintaining data security and enterprises would have to rely on them. Data recovery and availability : i. All business applications have service level agreements that are stringently followed. Operational teams play a key role in management of service level aagreoments and runtime governance of applications. In production environments, operational teams support: Appropriate clustering and failover | b, Data replieation | System monitoring (transactions monitoring, logs monitoring ' tad others) k Maintenance (runtime governance) ©. Disaster recovery £. Capacity and performance management,LATE (CSIT So, Cloud Computing W118 E (CSIT-Sem-7) a reduction Management capabilities Despite there being multiple cloud providers, the management y platform and infrastructure i still in its infancy. For example, features like Auto-sealing are a crucial requiremen, for many enterprises. There is huge potential to improve on the scalability balancing features provided today. Regulatory and compliance restrictions : i In some of the European countries, government regulations do no allow customer's personal information and other sensitive information tobe physically located outside the state or country. Inorder to mect such requirements, cioud providers need to setip a and loag a datacentre or a storage site exclusively within the country ¢ comply with regulations. J fii, Having such an infrastructure may not always be feasible and is, big challenge for cloud providers. ii “Underlying Principles of Parallel and Distributed Computing, , Cloud Characteristics, Elasticity in Cloud, On-Demand Provisioning. Questions-Answers Long Answer Type and Medium Answer Type Questions 1 Que 1.17.| Write a short note on parallel computing. Write the advantages of parallel computing over serial computing. | 1. Parallel computing is a computation type in which multiple processort 2 execute multiple tasks simultaneously. | Problems are broken down into instructions and are solved concurrently, The main reason for parallel programming i to execute code efficiently, since parallel programming saves time, allowing the execution o applications in a shorter time, | 4 Advantages of parallel computing over serial computing are: | i. Itsaves time and money as many resources working together will reduce the time and cut potential costs. It can be impractical to solve larger probloms on serial computing. It can take advantage of non-local resources when the local resources are finite. Scrial computing wastes the potential computing power, thus parallel computing makes better work of hardware. | Que 1.18.] Describe briefly the components of parallel computing. ‘Answer -] Components of parallel computing : a Comparing | ABE Prolene Computations Trcne anit] algorithms | Mapping Hardware and data architecture struc Fy ming Dependency \Crosramming caine : PST ghee [Binding \ appiation sto Taageges_| ome, Perforinace vanation a8) Computing problems : Numerical computing : Science and engineering numerical problems demand intensive integer and floating point computations, Logical reasoning : Artificial Intelligence (AL) demands logic inferences and symbolic manipulations and large space searches. Parallel algorithms and data structures : Special algorithms and data structures are needed to specify the ‘computations and communication present in computing problems (from dependency analysis). ii, Most riumerical algorithms are deterministic using regular data structures.IVE CSITSemp| Ti Symbolic processing may use heuristics or non-determsniqt| searches. Cloud Computing iv. Parallel algorithm development requires interdisciptinan interaction | 8 Hardware resources : | i. Processors, memory, and peripheral devices (processing nodes) form| the hardware core of a computer system, ii Processor connectivity (system interconnects, network), me organization, influence the system architecture. 4. Operating systems: mea \ ‘Manages the allocation of resources to running processes, Mapping to match algorithmic structures with hardware architecture! and vice-versa, processor scheduling, memory:mappi interprocessor communication (Que 1:19] What are the properties of distributed computing ? | ie] | Properties of distributed computing: 1 Fault tolerance : 4. Whenane on some nodes fails, the whole system can still work fine! except performance. ii. Need to check the status of each node. | Each node play partial role : | i Each computer has only a ited, incomplete view ofthe: ona ii, Bach computer may know only one part of the input. Resource sharing : Each user can share the computing power and ‘Storage resource in the system with other users, Lond sharing : Dispatching several tasks to each bode cain Kelp share loading to the whole system Easy to expand : We expect to use few time when adding nodes. Hope to spend no time if possible. Performance : Parallel computing can be co! a subset of ioe puting can be considered a subset 120,,| Write a short note on distributed computing. 1-20 (CSTT-Sem-7) istributed computing is a model in which components of a software system are shared among multiple computers to improve efficiency and performance. Introduction 2, Indistributed computing, each processor has its own private memory (distributed memory). Information is exchanged by passing messages between the processors. A distributed system allows resouree sharing, including software by systems connected to the network. 4, The goal of distributed comps computer. 5, | Examplesof distributed systems applications of distributed computing are : Intranets, Internet, WWW, email. gis to make network as a single Que 121, | Differentiate between parallel computing and distributed. computing. ‘Answer. [S.No.| Parallel computing Distributed computing 1. | Iisa type of computation in which many calculations or the execution of processes are carried out ‘A system whose components are located on different networked computers, which communicate and cbordinate their actions by simultaneously. passing messages to one another. 2 | Ttoccursina single It involves multiple computers, computer. 3. | Multiple processors execute | Multiple computers perform tasks multiple tasks at the same | at the same time. time. 4. | Computer can have shared | Bach computer has its own memory or distributed ‘memory. ‘memory. 5. | Processors communicate | Computers communicate with with each other using a | each other through the network. bus. 6 Inerease the performance Allows scalability sharing of the system, resources and helps to perform computation tasks efficiently.Clot Computing 1-21 E (CST Sem) GeeTH] Keplain briefly the architecture of diatributeg computing. “Answer [Architecture of distributed computing: L._ Datacentered architecture: These architectures identify thedata as the fundamental clement of the software system and access to shared data is the core characteristic ofthe data-centered architectures, ii Therefore, especialy within the context of distributed and parallel computing system, itegeity of data is the overall goal for such systems. iii The repository architectural style isthe most relevant reference ‘model in thiseategory. in. It is characterized by two main components; the central data structure, which represents the current state ofthe system, anda Collection of independent components, which operate on the central ata, ¥. The ways in which the independent components interact with the central data structure ean be very heterogeneous. 2 Dataflow architecture : i Inthe case of dataflow architectures, iis the availability of data that coatrol the computation. ii With respect tothe data-centered styles, where the access todatais the core feature, dataflow styles explicitly incorporate the pattern ‘of dataflow, since their desigais determined by an orderly motion of data from component to component, which is the form of communication between them, ii Daterlow architectures ae optimal when the system tobe designed ‘mbodies a multi atage process, which can be clearly identified into a collection of separate components that need to be orchestrated together. Virtual machine architecture : i Thisclassof architectural tylesis characterized by the presence of sn abstract exceution environment that simulates features that are not available inthe hardware of software Applications and system are implemented and become portabh over dierent hardware ad lwarenvironment tong ere iam implementation fh vital machin they ene ‘constitutes its execution. ane they ts “ 1-22 (CSIT-Sem-) Introduction 4 Call and return architecture : i. This category identifies all the systems that are composed by components mostly connected together by method calls. ii. The activity of eystems modeled in this way is characterized by a chain of method ealls whose overall execution and composition ‘denify the execution of ong or more operations. ii, The internal organization of components and their connections may vary “Architectural styles based on independent components i. This class of architectural styles model aystems in term of independent components having heir own lifecycle, which interact taeach other in order to perform their activities. ii Therearetwo major categorie withi this class, which differentiate inthe way the Interaction among components is managed a. Communicating processes : In this architectural style components are represented by independent processes that teverage Inter-Process Communication (IPC! facilities for coordinate management. 1b. Event systems In this architectural style, tbe components ofthe system are loosely coupled and connected In addition to fexposing operation for data and state manipulation, each component alo publishes (or announces) acoletion of events that other components ean register with. Que 123,] What do you mean by dynamic cloud infrastructure ? rer Cloud computing clients an access standardized IT resources to deploy ‘new applications, services, or eomputing resources rapidly without re- fengincering their entire infrastructure, thus making it dynamic. ‘Cloud dynamic infrastructure is based onan architecture that combines the following initiatives ‘a. Service management : Offers business transparency and ‘automation across the pillars of business for consistent delivery. by Asset management : Maximizes the value of critical business and IT assets over their life eyele with industry-tailored asset ‘management solutions. & Virtualization and consolidation : Reduce operating costs, mprove responsiveness, and fully utilize the resources. | Information infrastructure : Helps businesses achieve information compliance, availability, retention, and securityCloud Computing 1-29 (CSIT-Sem, objectives. Energy efficiency : Offers grocn and sustainable energy eolutions for business. Security : Provides end-to-end industry customized governance, risk management, and compliance for businesses. Elasticity: Maintains continuous business and Toperations while ropidly adapting and responding to risks and opportunities. Que 124 | Explain technologies used for distributed computing, ieswer_] Technologies used for distributed computing are : 1. Remote procedure call: Remote Procedure Call (RPC) is the fundamental abstraction enabling the execution of procedures on client's request. It allows extending the concept of procedure call beyond the boundaries ofa processor and asingle memory address space, ‘The called procedure and calling procedure may be on the same system, or they mey be on different systems in a network. ‘The system is based on a client server model. ‘The server process maintains a registry ofall the available procedures, that can be remote invoked, and listens for requests from clients that specify which procedure to invoke together with the values of the parameters required by the procedure. vi. RPC maintains the synchronous pattern thatis natural in process procedure and function calls. 2 Distributed object frameworks: Distributed object frameworks extend the object-oriented ‘programming systems by allowing objects to be distributed across a hheterogencous network and provide facilities so that they can coherently act as ifthey were in the same address space. Distributed object frameworks leverage the basic. mechanism {introduced with RPC, and extend it woenable the remote invocation of object methods and to keep track of references to object made ‘vailable through a network connection, Distributed objects frameworks give the illusion of inte 8 local instance while invoking remote ‘mechanism called proxy.skeleton. Proxy and skeleton always constitute a a constitute a pair, the server process ‘maintain the skeleton component, which is in charge of executing. action with ‘methods, This is done by a 1-24 (CSAT-Sem-1) Itreduction the method remotely invoked, while thecients maintain the proxy component allowing its hosting environment to remotely invoke methods through the proxy interface. Qué 1.25:] What are the characteristics of cloud computing ? mz] Characteristics of cloud computing are: 1. Ondemandself-service: Resources ean automatically be provisioned without the need of human interaction as and when needed. 2 Compatibility :Cloud services allow access to the data from any location, and on any device. Employees can work from anywhere, 3. Elasticity : Cloud services are sealable. Consumers can add resources they need and diseard resources they do not want. Reliability : Cloud runs on multiple servers and is automated to run even ifone server fails. Resources are drawn from the other servers to censure continuity without any interruption. Disaster recovery : With replication and storing across multiple servers, cloud allows easy cost-effoctive solutions at times of data loss due to ‘some theft or ealamity. Updates : Consumers need not worry about software updates and ‘echnical issues. The cloud servers are loeated indifferent places away fromour business premises. The providers do all the updates and patches. ‘Security : Cloud services offers enhanced security. We can access our data from any system even if we lose our personal device. (Que 1.26. | Write a short note on elasticity in cloud. cy Incloud computing, elasticity is defined aa“the degree to whicha system {sable toadapt to workload changes by provisioning and de-proviioning resources in an autonomic manner, sueh that at each point in time the ‘available resources match the current demand as closely as possible”. Elasticity isa defining characteristic that differentiates cloud computing from previously proposcd computing paradigms such as grid computing 8.” ‘Tho dynamic adaptation of capacity, by altering the use of computing resvurces, to meet a varying workload is called elaste computing. 4. Elasticity am at matching the amountof resource allocated toa service with the amount of resource it actually requires, avoiding over- provisioning or under- provisioning. 11-25E (CSAT-Sem.7) 1g more resources than required, should jer gewisioning i¢.allcating fewer resourees than required, must «Takes. al re ch service, GuctST] What are the advantages of elastic cloud computing ? ‘Answer ‘Advantages of elastic cloud computing: 1. Costefficiency: i Cloudisavailabe at much cheaper rates than traditional approaches and an significant lower the overall IT expenses. i _ Byusing cloud solution companies can save licensing fees as well as climinate overhead charges such as the cost of data storage, software updates, management etc 2 Convenience and continuous availability : Cloud makes easier access of shared documents and files with view and modify choice. Public clouds also offer services that are available wherever the end user right be looted Moreover it guaranteed continuous availability of resources and in use of system failure, alternative instances are sastomatically spawned on other machines 2 Backup and recovery The processof backing up and recovering data is easy asinformation is residing on loud and not ona physical device. The varius ud providers reliable and lenbebckuplresovery 4 Cloudis environment friendly : The cloud is more efficient than the typical IT infrastructure and it takes fewer resources o compute, thus saving energy. 6 Kad pattirsennce 7eailiGiN0'7: Sealab and performance: Sei ia hin fentar aymenta. Cloud instances are deployed aulomatically only vbeo needed and asa result enhance per Pewee and ax arevut enhance performance with excelent peed Que 1.28. | What are the. disadvantages of elastic cloud computing ? Disadvantages of clastic cloud computing 1. Security and privs Shoud sand Privacy in the loud Security isthe biggest concern in ‘nara ean Companies easentially hide their private data and format ‘remote based cloud infrastructure i used, it it 1-26 (CSITSem-7) Introduction thon up tothe cloud service provider tomanage, protect and retain data confidential 2 Limited control: Since the applications and services are running vamotely companies, users and third party virtual environments have rcmited control over the function and execution of the hardware and 4 Dependency and vendor lock-in : One of the major drawbacks of avd computing is the implicit dependency on the provider. It is also cited “vendor lock-in’, Asit becomes dificult to migrate vast data from Sid provider to now. So, itis advisable to scleet vendor very carefully: 4. Increased vulnerability : Cloud based solutions are exposed on the public internet therefore are more vulnerable target for malicious users and hackers. OooCloud Enabling Technologies CONTENTS Part-l_: Service Oriented Architecture. w- 2-2E to 2-68, | * Seta, Web Serves ee | | Publish-Subseribe Model Part-3 : Basies of Virtualizatios ‘Types of Virtualization, Levels 2-18E to 2-235 Implement of Virtualization Part-4 : Virtualization Structure, Tools ‘and Mechanism, Virtualization of CPU, Memory, VO Devices, Virtualization Support and Disaster Recovery 21 E(CSIT-Sem.7) | | 225 (CST-Sem-7) Cloud Enabling Technologies PART- Service Oriented Architecture. Questions-Answers Long Answer Type and Medium Answer Type Questions (Que2A. | Briefly describe the Service Oriented Architecture (SOA). ‘aewer 1. Service Oriented Architecture (SOA) is an architectural approach in which applications make use of services available in the network. 2 Service Oriented Architecture (SOA) isa style of software design where services nre provided tothe other components by application eomponents through a communication protocol over a network 3. SOAallows users to combine a large numberof facilities from existing services to form applications, SOA encompasses a set of design principles that structures the system development and provide means for integrating components into a coherent and decentralized system. 5, SOAbased computing packages functionalities into a set of interoperable services, which ean be integrated into different software systems belonging to separate business domains. 6. SOA provides a translation and management layer within the cloud architecture that removes thebarricr fr loud clients obtaining desired (Que 2.2.)|] Explain the major roles of Service Oriented Architecture (soa). Tanewer] ‘There are two major roles of Service Oriented Architecture (SOA) 1. Service provider: 1a, The'service provider is the maintainer of the service and the ‘organization that makes available one or more services for others touse. b, To advertise services, the provider can publish them in a registry, together with a service contract that specifies the nature of the service, how to use it, the requirements for the service, and the fees charged.Cloud Computing 2 ZIE(CHT Sem.) | Service consumer: a Theservice consumer can locate the service metadatain the rogi and develop the required client components to bind and use thy Services aggregate information and data retrieved from othe, services or steate workflows of services to satisty the request of given service consumer. | Que 23. | Describe the guiding principles of SOA. ‘Answer | Guiding principles of SOA: | L Que 24, Standardized service contract : Services adhere to a given ‘communication agreement which isspecified through one or moreservice | description documents. Loose coupling :Scrvices are designed as solfcontained components, | ‘maintain relationshipthat minimizes dependencies on other services, | Abstraction : Aservice is eompletely defined by service contracts and
1. | Anopplication that provides ‘An arplication that snot bang interoperability between | the principle of REST. - computer systems on the | internet 2 | Use REST. Use SOAP, 3. | Support various data format | Support XML formar } such as HTML, JSON, ete. 4 | Pee URLtocxpose business | Use tho service intercom 1 Togic. business logie = 5. |Easierand Nexibie. Not easy and flexible, 6. | Inherits security measures | Defines itsown security layer and’) from the underlying is more secure. transport protools, 7 | Consume lessbandidthand | Consume more bandwidth and Tesources, resources. Que 2.44)] What are the advantages of REST? lAaewer The advantages of REST are 1, Separation between the elt & The REST protocol total server and the data storage Fer cxample it improves the portability ofthe intedface to other Mee rttfrme, increases the scalability othe pecs vel allows the die developments tobe evalved| lent and the server ; 'y Separates the user interface from the Tent componentsof the independently, 2. Visibility, reliability and Scalability: and server has one evident "team can seale the product ‘without problem, fim can scale the pr The eat irate to other servers cr make all kinds oe esi these cr make all kinds of changes is rovided that the data from each re se it data ta from each request is seat s10E (CSAT-Sem-7) Cloud Enabling Technolog The separation makes it easicr to have the font andthe back on different servers, and this makes the a »PPS more flexible to work, with. 3 The REST API is always independent ofthe type of platform or languages : a. The REST API always adapts to the type of being used, which gives considerable fr testing new environments within the des ‘syntax or platforms feedom when changing or velopment. With a REST API we can have PHP, Java, Python Servers, Que 2.18.] Write a short note on web services. howe b 1 Aweb service is a software package that is used for communicating between two devices or web entities lying on the network. 2 They involve a service provider along with a service requester, iz, the client, Since web services are advantagoous as they ae language transparent, so there inno lane whether We lundemega system is providing the service developed in Java, PHP or any other language while the client application is written in Python, Ruby, Perl or JavaSeript 4, Task performed by web services i. Webservices are searched for over ‘the network as well ascall upon accordingly. il Asawebservice is called, it would| be capable of providing operation for the client that has invoked t the web service. Que 2:16.] What are types of web services ? ‘Tue abbreviation of SOAP is Service Oriented Architecture Protec tis an XML based protocol having the main benef of implementing the SOAP webservice as its security vice based messages SOAP offers a wrapper for sending a web service over the Internet by thehelp of HTTP protocol All its messages are ‘usually inXML format.oy caning PALE (CST Sen,4 ix. The SOAP message consists of: SOAP document has a root clement termed as the «Bn, Jement. Tis clement isthe initial element used ie aa , document Teen next the “Envelope” which is categorized into two ‘The former isthe header, and the later is the body” € The header includes the routing data that is essentially information telling the XML document to whom or for. ‘Whiet| the client needs tobe sent to, ‘4 Lastly, the body ineludes the actual message, 2 REST (Representational State Transfer) web services: i. REST service isnot a collection of paradigm or specifi rules ii instead the style architecture for software. my ji Those apps that are designed using this architecture are collect termed as RESTYul web services. a 1 establishes the resources through the use of URL as well a depends on the nature ofthe transport protocol (like HTTP: GE, PUT, POST, DELETE, ete.) used to perform the resources, | iv. Allocation of resources in REST depends on the URL. Itis: li conventions based application. a fe Que 2.17. Explain architectural constraints of web services, > | Architectural constraints of web service are: 1. Uniform interface : i Itisakey constraint that differ Non-REST APL suggests that there should be a uniform: it eau sho ‘uniform way of interacting with mae eanetivespetive of device or type of aplication (web rentintes between a REST API and There are four guidelines principle of uniform interface : | Resource-based : Indivi Feeeeuee-based : Individual resources are identified it Manipulation of resoures through representations: eee representation of resource and it contains enough tion to modify or delete the resource on the Provided that it has ‘Permission todo go, = b 2A2E(CSIT-Sem-7) Cloud Enabling Technologies ce. Self-descriptive messages: Each message includes enough information to describe how to process the message 20 that server can easily analyse the request. @ Hypermedia As The Engine of Application State (HATEOAS) : It need to include links for each response so that client can discover other resources easily. 2 Stateles: i. Tt moans that the necessary state used t» handle the request is contained within the request itself and server would not store ‘anything related to the session. ji In REST, the client must include all information for the server to fulfill the request whether as a part of headers or URI. 3, Cacheable: i Bvery response should include whether the response is cacheable ‘or not and for how much duration responses can be cached at the client side. ii. Client will return the data from its eache or any subsequent request ‘and there would be no need to send the request again to the server. 4, Client Server : i REST application should have client-server architecture. ii A client is someone who is requesting resources and are not concerned with data storage, which remairs internal tocach server, ‘and server is someone who holds the resources and are not concerned with the user interface or user state. 5. Layered system: i. Anapplication architecture needs to be composed of multiple layers, i. Bach layer does not know anything about any layer other than that ‘of immediate layer and there can be lot of intermediate servers between client and the end server. iii Intermediary servers may improve system availability by enabling load-balancing and by providing shared exches. 6 Code on demand: i. Itisan optional feature. According to this servers ean also provide executable code to the client. (Que2.18. | Differentiate between REST and SOAP. | i |out Computing 213 (CSIT-Sem, ‘Answer SNol REST ; ‘SOAP 1. | REST is Representational | SOAP’ is Service Orienteg State Transfer. Architecture Protocol 2 [Iisanarchitecturestyle. | It isa protocol. ‘3 | Husessimple HTTP protocol. | It uses SOAP envelop and then HTTPto transfer the data. 4 [It supports many different | Tt supports only XML format, data format like JSON, XML, YaMLete. ‘8 | Performance, scalability,and | Slower performance and caching is high, sealability is bit eemplex, caching not possible, 6 [It is used widely and | It is used where REST is not frequently, possible. (Que218:] Explain briefly publish-subscribe model. ess 1. Tnsoftware architecture, publish-subscribe pattern is amessage pattern, ‘8 network oriented architectural pattern, which describes how two different parts of a message passing system connect and communicate with each other. 2 Inmodern cloud architecture, applications are decoupled into smaller, independent building blocks that are easier to develop, deploy and maintain. 3. Publish/Subscribe (Pub/Sub) messaging provides instant event notifications for these distributed applications, ‘The publish-subscribe made! allows messages tobe broadcast to different parts ofa system. 5. Publish-subseribe isa sibling of the message queue paradigm, and is one part of a larger message-oriented middleware system. 6. Messaging systems support both the pub/suband message queue models in their API. For example, Java Message Service (JMS). 2 ‘This pattern provides greater network scalability and adynamie network: ‘topology, with a resulting decreased flexibility to modify the publisher tnd the structure ofthe published data, ASE (CSAT-Som-7) Cloud Enabling Technologies ‘Quo 220, | Explain how publish-subscribe model works, Working of publish-subscribe model ; Message Mesuage [ se |e see Ld sutsenber eta 1. Publisher Publishes messages tothe communication ingrastructre. 2 Subscriber : Subseribes toa category of messages. Communication infrastructure (channel, classes) : Receives ‘pessages from publishers and maintains subscriber subseription. 44. Tho publisher wil categorize published messages into classes where subscribers wil receive the message. 5. A publisher has one input channel that splits into multiple output channels, one for each subseriber. 6. Subscribers ean express interest in one or more classes and only reeive interested message. og in pubveub mode! the publisher and subscriber are unaware of ea: 7 ee tne puaber anda manages to suber, wiiot haowiss about subscriber. ceriber receives messages, without having knowledge of the Suter thee arooouerrs cron oreete ped information, the message is dropped. asi] What are the benefits of publish-subseribe model? [Answor Following are the benefits of | ‘publish-st 1 Tedecouples subsystems that need to ; ‘managed independently, and messages can be properly Menebr more ether a ges Te inereases salabitty and improves reeponsie scar Te eat ta quickly sed singe ems to eit ibseribo model: smmunicate, Subsystems —Ha 2 The virtualization PASE (CSI Son. “n rama wo itv core processing responsibilities. Tho: megg retary Mecure is responsible for ensuring Messages deliverga™e interested subseribers ete a teimproves reliability. Asynchronous messaging helps applica Kcinprvsely run smoothly under increased loads and he {neermittent failures more effectively. “4 Itallows scheduled processing, Subscribers can wait to pick up mes, Tea ent hour, oF messes canbe routed or processed arse toaspocife sehedule. ing 5. Ieenables simpler integration between systems using different plato programming languages, or communication protocols, as well as betwee on-premises systems and applications running in the cloud, - 6 Ie facilitates asynchronous workflows across an enterprise, Itimproves testability. Channels canbe monitored and messay 8 inspected or logged as part of en overall integration Lost strategy. Cloud Computing nde PARTS ie Basics of Virtualization, Types of Virtualization, Im ic ; 5 Implementati Levels of Virtualization. aie Long Answer Type aiid Medium Answer Type Quiestions Que 2.22. | Define virtualization. Why it is needed ? ‘Answer Mitzilisetden te ‘rtualization is an abstraction layer (hypervisor) that decouples the physical hardware from the Oper i wh myer from the Op ating ‘System (OS) to deliver greater platform provides the isolation of platform and allows multiple! ile businesses to run multiple virtual machines on the game physical machine, Following are the ben efits iat i Money sae provided by virtualization : With virtualization t can be reduced. b. Therefore, the on going pr i ‘ongoing operational eae viele rey uintenanee, and technology, the number of physical servers 2-16 (C8IT-Sem-7) Cloud Enabling Technologies jc increase in control : 1. Drom 9... Virtualization provides flexible foundation to provide ea according to the demand for an organization. mew bb, Newserversean be quiekly deployed. Therefore, services ean be provided within minutes, e _Itin also easy to ship the infrastructure when itis deployed ‘sing virtualization techniques. iti, Simplified disaster recovery: ‘a. More efficient and cost effective disaster recovery solutions can be realized with virtualization technologies. b. Servers and online business can be transferred to an alternate site within minutes with the help of virtualization. iv. Business readiness assessment = Virtualization introduces a shared computing model to an enterprise and it is easy to understand infrastructure requirements in a virtualized environment. Virtualization can help to: 1.“ Reduce the cost ofthe existing infrastructure by reducing operational find aystems management cost while maintaining the needed capacity. 2, Reduce the complexity of adding to the infrastructure, 3, Gather information und collaboration across the organization to increase both the utilization of information and its effective use. 4. Deliver on-Service Level Agreement (SLA) response time during spikes in production and test scenarios. 5. Build a heterogeneous infrastructure’across the organization that is more responsive to the organization's needs. @ue223:| Explain various current virtualization initiatives. Answer Various current virtualization initiatives are = 1. Virtual CPU and memory: i Physical CPUsand RAM can be: dedicated or dynamically allocated to virtual machines. ii’ As there is no OS dependency on the physical hardware, with the CPU checking off, virtual machines can ‘be migrated to different hosts, with background changes to the physical CPU and jmemory resourees being transparent to the guest OSs running en virtual machines., LATE CSIT Sen, Grout Compein6 _______'w 2. Virtual networking . virtual network in a bo’ olution that allows ee error to manage virtual machine network trafic through 8 hypervisor to manage : ah the Heal Network Interface Controle (NIC) and allows achat al machines to havea unique entity onthe network he psi host & Vistual disk: {Storage Area Network SAN based stongeis presented as sorags tants tothe physical host, which in tar used to ost vita rmathine' dks vrtal dss). 4 Consolidated management: i The performance and health of virtual machines and gueit Se an be monitored and console access ta all ofthe servers can be Obtained viasnge console Virtual machine : i Active virtual machines eon be transparently transferred across yrical hosts with ao downtime and ne los of service avalbiy fr performance. ‘The virtual machin's execution state, active memory, network identity, and active network eonectiors are preserved acosa he source and destination hosts so thatthe guest OS and running applications are unaware ofthe migration. & Storage virtual machine : i Vdisks of active virtual machines can be seamtessly and transparently transferred arose data sors, while the exceution state active memory, and ative netwerk connections remain on {he name pial hoa. 1. Dynamic load balancin i Dynamically load blancs virtual machines acros the most optimal physical bots to ensure that pre-defined performance levels are et Virtual machinescan be automatically and seamlesely transferred {oa ess tn ost if particular ost na resource pools ina high tation state, Dereot resource pools can defined fr diferent busines needs, For instance production pols canbe defined with ore demanding ‘service level requirements, while development pools ean be used with more relaxed service level requirements. 8 Logical Partitions (LPARs): . i LPARs result in hardware layer logical partitioning to create two oF ‘more isolated computing domains, each with its own CPU, memory ‘address space and UO interface, with each domain capable of housing ‘#8 separate OS environment on single physical server, ® z s18E(CHT-Gem- Cloud Eoabling Technologies LLPARs can share CPUs or have dedicated physical CP, Likewise, an LPAR canbe a dedicated physical memory addres ‘ace or merry addresses canbe dynamically alloced sae LPARs as needed. = ‘9, Logical Domains (LDOMs) + i. Operating systems running ach logical domain can be independently managed, that is, stopped, started, and rebose) without impacting other LDOMs running on the host ii A Type 1 bare-metal hypervisor isolates computing environments from physical resourees, iii Forexample, domains across distinct threads can be eeparated the mallithreading techoology, Because the Hrposiae dynamically managing and encapsulating the allocation of physica resources. 10, Zones: (Que224,| What are the advantages and disadv: i. Zone isan O3-level virtualization solution rather than a hardware- level hypervisor solution. i, Each zone is an eneapsulated virtual server environment running within a single OS instance. iii, As such, zones share @ common kernel, through a global zone, ‘although ‘non-native’ zones ean emulate an OSenvironmest othe? than that ofthe host's native OS, virtualization 7 ‘Answer Advantages 1 2 a 4 8 Virtualization sofware reduces VMI complexity Improves functionality. Increase performance. Provides server consolidation, testing and development, the provision of ‘dynamic load balancing and the disaster recovery and also improves the system reliability and security Conservation of energy, maintenance of legacy appli Supporting acress-platform office Disadvantages : L 2 3 igh risk inthe physical fault, tis alsonot easy, quite complicated. Not supported by all applications.Cloud Computing 4 5% Ic has single point of failure, ray lead to lower performances 7 ‘Applicaton identified tobe awaysnot possible, LIVE (CST Sem.7, —————" demnands power machines, visualization 208 (CSIT-Som-7) Cloud Enabling Technologies Or ‘realization technologien: Two major types of echnologie are vpiyed inserver virtualization cme. Hardware virtualization : GoaSE | Weite a short note on server virtualization. ‘Answer : Server virtualization works as a sasking of the server computer that the count and identity of resourees with Servers, storage, processors and OS from the end user. 2 Administrators divide the physical server into multiple isolated Vij talking to same resource pals \ Virtualization of servers provides an abstraction ofthe physical server SF pmantaining resource pool for server users (Fig. 2.25.1), “applstion ‘Application Operating stem CPU, Memes, Disk ‘Virwaliationiypervcor ‘oPU Wenery Disk Fig. 225.1. Server virtualization. | Virtual machine : 1 Virtual machine can be termed as a virtual environment, partition, or container, In a server environment, a server that does not physically exist but is created on a different server is called guest’ ‘The instance where a virtual machine runs is termed as ‘host’ ‘These hosts ean have multiple VMs running on the physical server. ‘Lassie oa pool of esorcevcanbedjnmieallasigned to Pool-based available resourees. years pee ‘When user talks to this VM, he/she is privileged to use his/her VM as a physical server with all functionalities such as accessing the"OSS, CPU, memory, and hard disk from the common pool. ‘The hypervisor virtualize oe multiple virtual servers based on supported achvirtual machines bundled with an OS,CPU, hard disk, and memory. i. Hardware virtualization is also known as hypeevisor-hased virtualization, bare-metal hypervisor type Ivirtvalization, or simply hypervisor, ii, This virtualization technology hasa virtualization layer running immediately onthe hardware which divides the server machine into several , virtual machines or partitions, with 3 guest OS running in each of these machines iii Thebinary transparency is provided by aviriualized approach and products enable the transparency for OSs, middleware, and applications. 08 virtualization : This type of server virtualization is also krown as OS-based virtualization, OS-level virtualization, or type 2 virtualization, i, OS virtualization ereates virtualization environments within @ single instance of an OS. iid Vietual environments created by OS virtudlization are often called ‘containers. ‘Because all virtualization environsients must share resources ‘ofasingle OS while having a private virtual OS environment, 4 particular implementation ofthe technology may alter the filesystem orientation and often introduce aceess restrictions toglabal system configuration or settings. [Anplication]} | [Application Guest OS]| | [Guest 08) Apleaton ] [__ Fapeniior Hest OS, Harlware (ig 228.2, Que 2.26, | What are the types of ‘newer Types of virtuali 1. 08 virtualization iL Virtuidizing an opctating system enviroamentis the most commen form of virtualizationCloud Computing pn EICSIT Sem ek ee —___ Cloud Enabling Techclogies involves potting a second Co instances operating system, like Windows, on asingle machine, This empowers businesses to reduce the AMOUR of yyy hardware required torun their sofware by cutting down them : ‘of actual machines. nme | Instruction Set Arhitecture(ISA eve: ix. It saves companies cash on energy, cabling, hardware, rack iL Atthe ISA level, virtualization i performed by emulating a aod mare, wl til allowing them to run the same quant ia etea eon 7 = applications. i Thebasicemulation metho is through code interpretation 2 Application-server virtualization : iii Aninterprotor programinterprets the: i Application-server virtualization is instructions one by one. yarious implementation level of virtualizatio source instructions to target so referred {0 9 ‘advaney load balancing, ’as it spreads applications across servers and: iw, One source instruction may require tens or hundreds of nati ‘across applications, = target instructions to ‘perform its function. This proces is relat ay ii This enables IT departments to balance the workload of spec slow. software in an agile way that doesnot overload a specif servers, ¥. Forbetter performance, dyramie binary translation is desired, ‘underload a specific application in the event of a large project vi. ‘Thsapproach translates base blocks of dymaic sure natura change. totarget instructions. Bi Italo allows for easier management of servers and application, vi. Tho basic blocks ean also be extended to program traces or super since we can manage them asa single instance. blocks to increase translation efficiency. & Application virtualization : vill, A Virtual Instruction Set Architceture(V-I8A) thus requires i. Application virtualization operates application on computersasit ‘a processor-specifie softwar: translation layer to the compiler. they reside naturally on the hard drive, but instead are runningog | 2 Hardware abstraction level : aserver. i. Wisperformed right on topof the bare harcvare and generates a & Theabilty touse RAM and CPU torrun the programs while storing vistaal hardware cevironument for 8 VBL them on a server, like through Microsoft terminal services and ii, The idea is to virtualize 1 computer's resources, such as its cloud-based software, improves how software security updates ae processors, memory, and LO devices so'as hardware utilization pushed, and how software is rolled out. Fate by multiple users concurrently may be upgraded. ‘Administrative virtualization : Operating system level : i Administrative virtualization is one of the least-known forms of i 0S-level virtualization ercates isolated containers on a single Virtualization, likely due to the fact that its primarily used in data physical server and the OS instances to utilize the hardware and bison software in data centers. The concept of administration, or ‘management,’ virtualization The containers behave likereal servers. OS-level virtualization is ‘means segmented admin roles through group and user policies. ‘commonly used in creating virtual hosting environments to alloate Network virtualization : Network virtualization involves virtually hardware resources amonga large number of mutually distrusting ‘managing IPs, and is accomplished through tools ike routing tables, users. NICs, switches, and VLAN tags, iii Library Support Level Virtualization with ibcary interfaces is Hardware virtualization : Refer Q. 2.25, Page 2-198, Unit-2. possible by controlling the ecmmunicatio link between applications Storage virtualization + and the rest of eystem through API books. 4 Storage virtualizationis an array of servers that are managed by virtual storage system, iL The servers an not aware of exactly where their data is stored. ‘02.27, | Exptain the implementation level of virtualization. Library support level: 4 Virtualization with library interfaces is possible by contrlling the communication link between applications and the rest ofa system through API hooks. {i The software tool WINE bas implemented this appreach to support Windows applications ontop of UNIX hosts.2-2DE (CST Sem Cloud Enabling Technologies Clovd Computing & User-application level : =~ «L_ Virtuatization at the application level virtualizes an application VM. a i Onatraditional OS, an application often runs a8 a process Gi. Therefore, application-level virtualization is also known process-level virtualization. The most popular approach isto degy High Level Language (HLL). | “Application level SVMUNET Library (user-level API) level WINEWVisual BainWin ‘Operating eystem level Virtual Environmen/FVM Hardware abstractioa layer (HAL) level VMwareVirtunl PCKen! User mode Linux/Cooperative Linux Tastruciion set architecture (ISA) level Bochs/BIRD/Dynamo Virtualization Structure, Tools and Mechanism, Virtualization of | CPU, Memory, 1/0 Devices, Vi i 8 Icwalenie apres ] quota] Describe virtualization structure. iowwer | aon valizatonstrctre the opening astm manag the kara nvituatiation lajeris inserted between the hardware andthe operating Aton The virenlizaton layers esposibl for cemvering portions of 2 Sparen! hardware into virtual hardware, ‘Therefore diferent operating systems such as Linsx and Windows can Toot the nme physical machine, simultaneously. |. Dependingon the position ofthe virtualization ayer there are several classes of VM architectures : c Hypervisor (Virtual Machine Monitor) architecture i Para-virtualization fii Host-based virtualization Guess: Describe hypervisor architecture and Xen architecture ere Hypervisor architecture : ' 1 The hypervisor supports hardware-level virtualization on bare-etal devices ike CPU, memory, disk and network interfaces, 2 The hypervisor software sits directly between the physical bardware and its OS. 4 Thisvirtualization layeris referred to ascither the VMM or the bypennsor. ‘The hypervisor provides hypercalls forthe guest OSand applications 4 Depending onthe functionality, a hypervisor ean assume a mcrokere} architecture like the Microsoft Hyper-V, ort can assume a manaisic hypervisor architecture like the VMware ESX forservervirtualizaen, 4 A microkernel hypervisor includes only the busie and unchaneiog functions (auch es physical memory management end proce scheduling) The device drivers and other changeable components °° outside the hypervisor & A monolithic hypervisor implements all the meationed fanstons+ including those of the device drivers.FO” Cloud Computing 2-25E (CST Sem, ‘The Xen architecture : 1. Xen isa microkernel hypervisor, whieh separates the policy From ‘mechanism, 2 The Xenhypervisor implements all the mechanisms, leavin, tobe handled by Domain 0. 3. Xen does not include any device drivers natively. ‘mechanism by which a guest OS ean, 4. Xen provides a virtual environment located between the he the OS. 5. The core components of a Xen system are the hyper applications. 6 Like other virtualization systems, many bypervisor. 8 the poly 11 just provides ardware ang visor, kernel, and guest OS can runon topotthe The guest OS, which has control ability, is ealled Domain 0, and the others are called Domain U. 8 Domain 0is a privileged guest OS of Xen. Domain 0s designed to acces hardware directly and manage devices 9. The responsibilities of Domain 0 is to allocate and map hardware esourees for the guest domains (the Domain U domains) Contrl, vO Domine doit Guest domain 2212) FEE ASR | 13) (S) 13] |8] fe) FSI IS 2) |) 12 #) 18] || 5) 13) [8 2] [3] [3 KenoLinux] [XonoWindows XEN Gypeniaar Qu02.30.] Write u short note on binary transl virtualization, or Describe host-based virtualization, .gAT-Sem-7) pas Cloud Enabling Technologies sroary translation with full Virtualization ” With fll virtualization, non-critical instructions run on dircetly while critical instructions are discovered and, ee traps into the VMM to be emulated by software. Both the hypervisor and VMM approaches are considered fal virtualization. Critical instructions are trapped into the VMM because bin translation can incur a large performance overhead, jv. Non-critical instructions do not control hardware or threaten the security ofthe system, but eritical instructions do, +. Therefore, running non-critical instructions on hardware not only ‘ean promote efficiency, but also can ensure system security, 2 Binary translation of guest OS requests using a VMM ; i. VMware puts the VMM at Ring 0 and the guest OS at Ring 1 i The VMM scans the instruction stream and identifies the privileged, control and behaviour sensitive instructions. ii, When these instructions are identified, they are trapped into the MM, which emulates the behaviour of these instractions. The method used in this emulations called binary translation, jv, Full virtualization combines binary translation and direct execution. ‘The guest OS is completely decoupled from the underlying hardware. Consequently, the guest OS is unaware that itis being virtualized. Direct Ring 3 User apps execution of ser Ring 2 requests Ring 1 Guest OS Binary translation Ring 0 MN oon requests ‘Host computer system hardware neyCloud Computing 227 ECSIT Sem, | Most-based virtualization = donnie VM architetare isons a virtualization aaa the hot OS. This host OS iil responsible for anny the hardware " ‘The quest OS ae installed and run on top ofthe vrtuatzag, ler Dadeatedaplintions may runon the Ws. Certainly, ome oth pslications ean also run with the host OS diretly. ‘a. Advantages of hostased architecture ‘The usercan install the VM architecture without modify the host OS The virtualizing software can relyon the hose ¢f toprovde dovice drivers and other low-level services. This wi, Stplify the VM design and aso its deployment. ‘The host-based approach appeals to many host machine configuration, Compared othe hypervisor/VMM architects the performance ofthe host-based architecture may alto low. Application | “Application Paravirwalized Para-virtualized guest operating quest operating system system Hypervison/VMIM Hardware Para-virtualization needs to modify the guest operating systems. ‘A para-virtualized VM provides special API requiring substantial 0S modifications in user applications wae, ‘Toe virtualization layer can be inserted at differe sina sofware stack. Seen vas aaa Paravirtaliation attempts to reduce the virtualization overhead 94 thus improve performance by modifying only the guest OS kernel. ‘The guest operating aystems are para-virtuaized, They are assisted 6 anintelligent compiler to replace the non-virtualizable OS instructions — a ‘non-virtualizable OS instructio 9-28 (CSIT-Sem-7) Cloud Eaabling ‘The traditional X86 processor offers four instruct = Rings 0,1, 2,and 3. Uctionexteution rings ‘Tho lower the ring number, the higher the privilege ofistructig 7 ceecuted brivlegeofinstructon being ‘The OS is responsible for managing the hardware 8 etruetions to execute at Ring, while user-level apo be Peet Ring. ations ron a Ring 3 User Apps ca ET on te = = Ring 0 Guest OS Hypercalls to the virtualization layer replace non-vrtualizable 08 instructions ‘Virtualization layer Host computer system hardware 231.1) Que282,| What are the various tools of virtualization ? (Anewer Various tools of virtualization are : 1. Ganeti: i. Ganeti isa cluster server management oo] developed by Google. ii Teis built on existing virtualization technologies like KYA, Xen nd ‘other open-source software. ii, Ganeti was initially started us a VMware alternative for managing networks, storage, and virtual machines and notas cloud ‘meaning it lacks several of the features that come with anger ope cloud projects iv. Twas designed to handle cluster mi and offer quick and easy resovery ‘commodity software. 2 KVM (Kornel-based Virtual Machine): i. KVM is an open-source virtualization tol for Linux and ening virtualization extensions (AMD-V o Intel VT). anagenset of virtual servers ‘ahr physical failures osingCloud Computing 2-29 (CST Se) ii Iteancither be operated in emulation or hardware mode, without tho CPU extensions, the ov iii Iwas designed for command line. iv. KVM has a decent management interface that enable users to perform actions like launching and stopping virtual machines or taking screen shots with ease. However, ‘erall performance will bo poor, oVirt is a virtualization solution used to manage/ereate virtual data centers, oVirt manages storage options, virtualized networks, and virtual machines using interactive an easy to use web-based administration and user portal. oVirt supports several advanced virtualization features like li storage migration, high availability, and the ability to control and schedule the deployment of virtual machines. 4 Packer: i Packer can be used by system admins to build and subsequently ‘manage the operations of virtual machine images. ii ‘The same commands and files can be used to build an image on Digital Ocean, AWS or for vagrant and VirtualBor. iii, This enables us to use the same system for development which we then create in production. 5 Vagrant : i Vagrant is a command-line tool that provides a framework and configuration format for creating, managing and distributing virtualized development environments. ii, Vagrant enables usersto share their running vagrant environment via the internet. 6 Xen: i. Xenis. best Linux hypervisors, i The Xen hypervisor isinserted between the server's hardware and the operating system. ‘This creates an abstraction layer that allows multiple guest operating systems to be concurrently exceuted on axingle physical server. iv. Xenis included with most popular Linux distributions like Fedora, RHEL, CentOS, Ubuntu, and Debian, Que2.83.| Write a short note on CPU virtualization, [Answer 1. CPU virtualization is a hardware: feature t! toact as ifit was multiple individual crus a ‘single processor 3-308 (C9IT-Sem-7) Cloud Enabling Technologies ‘This allows an operating system to effectivel 2 GPU power inthe computer. 3. CPU virtualization goes by different names depending on the CPU manufacturer. For Intel CPUs, this feature is called Intel Virtualization Te Intel VI, and with AMD CPUs it is called AMD-V. Regardless ofweeen ig called, each virtualization technology provides generally the a features and benefits to the operating system, 5. CPU virtualization is disabled by default in the BIOS and needs to be * qnabled in order for an operating system to take advantage of it, 6 CPU virtualization involves a single CPU acting asi it were multile separate CPUs. The most common reason for doing thsis oun multe different operating systems on one machine. 7. CPU virtualization emphasizes performance and runs directly on the available CPUs whenever possible. 8. The underlying physical resources are used whenever posible and the virtualization layer runs instructions only as needed to make virtual ‘machines operate as ifthey were running directly on a physical machine (Que 2.34:] Describe memory virtualization in cloud computing. (ewer |. Memory virtualization decouples volatile Random Access Memory (RAD resources from individual systems in the data center, and then aggregates, those resources into.a virtualized memory pool available to any computer inthe cluster. ly & efficiently utilize the ‘The memory pool is accessed by the operating system or applications running on top of the operating system. ‘The distributed memory pool can then be utilized as a high-speed cache, ‘a messaging layer, or a large shared memory resource for a CPU. Memory virtualization allows networked and distributed, servers to share pool of memory to overcome physical memory limitations, acommon bottleneek in software performance. With this eapability integrated into the network, applications can take advantage of a very large amount of memory to improve overall performance, system utilization, increase memory usage eficiency, and enable new use cases. ‘Memory virtualization implementations are distinguished from shared memory systems. ‘Shared memory systems do not permit abstraction of memory resources, ‘thus requiring implementation with a single operating system instance Ge., not within a clustered application environment).Cloud Computing 2-31E CSIT-Sem2, & Memory virtualization is different from storage based on Nash memory such as Solid-State Drives (SSDs)- SSDs and othersinilar technologcg replace hard-drives (networked or otherwise), while memory virtualization replaces or complements traditional RAM. Que 235. | Write a short note on VO virtualization, ‘Answer, 1, UO Virtualization (JOV), oF inpuoutput virtualization, is technology that uses software to abstract upper-layer protocols from physical conneetions or physical transports, 2 This technique takes a single physical component and presents it to devices as multiple components, 3. Because it separates logical resouree from physical resources. IOV is ‘considered an enabling data center technology that aggregates IT infrastructure as a shared pool, including computing, networking and storage. 4. Recent Peripheral Component Interconncet express (PCle) virtualization standards include single root V0 virtualization (SR-IOV) and mult-coot VO virtualization (MR-IOV). 5, SR1OVconverts a hardware component into multiple logical partitions that can simultaneously share access to a PCIe device. 6. MR-IOV devices reside externally from the host andare shared across ‘multiple hardware domains. (Que 236) | How VO virtualization works. ‘Answer | in UO virtualization, a virtual device is substtited for its physical ‘equivalent, such as a Network Interface Card (NIC)or Host Bus Adapter (HBA), 2. Aside from simplifying server configurations, VO virtualization setup ‘has cost implications by reducing the electriepower drawn by VO devices. 3. Virtualizatin and blade server technologies cram dense computing power {nto a mall form factor. With the advent of virtualization, data centers started using commodity hardware to support functions such as burst ‘computing, oad belancing and multi-tenant networked storage. 44. WO virtualization is based ona one-to-many approach. ‘The path between ‘physical server and nearby peripherals is virtualized, allowing a single resource to be shared among Virtual Machines (VMs). 5. The virtualized devices interoperate with commonly used applications, 2 DRdefines the age (CSTTSem-7) Cloud Enabling Technologies ie technique can be applied to any server om Toe RAID controlers,Ethernet NICs, Fibre Chanset aoe ‘esfeand internally nounted Sold State Drives SS0n Freee ere physical NIC ispresented asa seriesofmuliglevirtea gn GueF3T | Describe virtualization support ~~ With the help of VM technology, a new computing mode known, 1 cpg nening Coed comput tt eer cape by sharing! re and costs of managing sap ed pres, ike bat ee 2, Cloud computing has atleast two challenges: [The ability totse a variable number of physical machines and Vat jastances depending on the needs of problem. For example atark tay need only a single CPU during some phases of exeeutin but tnay need hundreds of CPUs ot other times? ii The slow operation ofinstantiating new VMs, Currently, new VMs driginate either as fresh boots or as replicates of a template VM, unaware of the current application state. Therefore, to support, cloud computing, a large amount of research and development isto be done. Que238 | Explain Disaster Recovery (DR) in cloud computing. 1. Disaster Recovery (DR) is one of the important factors for eloud deployments 6 1 to ensure service availability and trust, and belp to develop credibility for the cloud vendar. 3. DR has been treated as separate disciplines that focused on planning and recovering business operations having following catastrophie disruptions 1 Sitefuciity destruction, hurricanes, torados, foods and fire. i Often long duration (days to weeks). iii. ORen involves shifting work (and people) to alternate facilities for some period of time sins 4. The objective lan is to provide critical IT service wi Tote oftime owing the carina ster es the following activities {Protect and maintain currency of vital records ii Select site or vendor that is capable af supporting the requirements ‘of the critical application workload.Cloud Computing 293 E (CSIT-Sem-7) —__—$$ $e) iii, Provide a provision for the restoration of all IT’ services when possible. ADR plan includes procedures that will ensure the optimum availability of the eritical business function and the protection of vital records necessary to restore all services to normal. ‘When DR plans fail, the failures primarily result from lack of HA (High Availability) planning, preparation, and maintenance prior to the occurrence of the disaster. An infrastructure supporting high availability (HA) is essential for a rapid DR. The system and application designs must be built to support. HA and rapid DR. ‘To prevent gaps in DR plans, recovery procedures, technology platforms, and DR vendors, contracts must be updated concurrently with changes. 8 QO@ |: Architectural Design .. Cloud Architecture, Services and Storage © Design, NIST Cloud” Reference Architecture “Public, Private and ~ Hybrid Clouds JaaS, PaaS, SaaS... Challenges, Cloud Storage, Storage-as-a-Service; ‘Advantages of Cloud Storage, Cloud Storage Providers-S3S-2E(CSIT-Sem-7) Cloud Architecture, Services & Storage PART-1 Layered Cloud Architecture Design, NIST Cloud Computing Reference Architecture. ie ‘Long Answer Type and Medium Answer Type Questions. | (Que8.1. | Explain the layered architecture of a cloud. ‘Answer Layered architecture of a cloud: ‘4. Datacenter laye b SSE (CHIT Sem: Tafrastructure layer ‘eiva virtualization layer where physic! resources Min aet af virtual resources through different we inte sologes such as Xen, KVM and VMware ‘inlay i thecore ofthe cloud environment wher clo Thisdyoomically provisioned using different vintages techoaoges. re partitioned irwalization ‘This layer is countable for managing physical resources such as eevers, switches, outers, power supply, and cong system {nthe datacenter ofthe cloud environment —— il the resources are available and managed in datacenters ta provide services to the end user. The datacenter consists of physical server, connected tro high speed devices such as router and switches, aa Application layer (Web services, multimedia, business applications) ft Platforms layer (SoRware frameworl) t Infrastructure layer (torages, virtual machine) t Datacenter layer (CPU, memory, disk, bandwidth) 1. Application layer: This layer oni of dierent lod series which ae used by cloud users b. These applications provide sorvices to the end user as per their requirements. ‘2 Platform layer: 4 This ayer consists of application software and operating system. b. The objective of this layer is to deploy applications di onthe virtual machines. —— GasBR: | Describe briefly NIST cloud computing reference itecture. ‘Taswer_ | NIST cloud computing architecture: 1. Cloud consumer Cloud (Cloud provider | Coug Cloud broker ‘auditor Cloud earrier ‘A cloud consumer is the end user who browses or utiles the services provided by Cloud Service Providers (CSP), sets upservise contracts with the eloud provider. In this, set of organizations having mutual regulatory performs a security and risk assessiment for cach usecase of cloud migrations and deployments. Cloud consumers use Service-Level Agreement (SLAs to specify the technical performance requirements tobe fulfilled bya cloud provider. SLAs can cover terms concerning the quality of service, secur. and remedies for performance failure.S4E(CSIT-Sem.7) Cloud Architects 3 hitecture, Services Morage 2 Cloud auditor: i Cloud auditoris an entity that can conduct independ lent aa of cloud services, seeurity, performance and Informatie operations of the cloud implementations. Site, ‘The services that are provided by Cloud Service Provider can be evahunted by service auditor in term of privics ye) sccurty contreluns pertemsivee ne a, Cloud Auditor ean make assessment ofthe security controls inthe information system to determine the extent to which the contig, axe implemented correctly, operating as planed and consrtg desired outcome with respect to meeting the security neces for the system, — _ 4 iv. ‘There are three major roles af cloud auditor a. Security audit b. Privacyimpact audit Performance audit & Cloud service providers i Ieisagroup or object that dalivers cloud services to cloud consumer or end users. ii. _Itoffers consumers to purchase a growing variety of loud service from cloud service providers. There are various categories of cloud -based services: 2 TaaS providers : In this model, the cloud service providen offer infrastructure components that would exist in an en premises datacenter, These components consist of servem, petworking and storage as well as the virtualization layer. 'b._ SaaS providers: In Software-as-a‘Service (SaaS), vendor provide a wide sequence of business technologies, such a Human Resources Management (HRM) software, Customer Relationship Management (CRM) software, all of which the SeaS vendor hosts and provide services through internet € PanS providers: In Platform-as-a-Service (PaaS), vendor offer loud infrastructure and services that can access perform many functions, In PaaS, services and préducts are mostly utilized in software development. PaaS providers et tmore services than laaS providers. PaaS providers provide operating system and middleware along with aplication stack to the underlying infrastructure 4. Cloud broker: i, An organization or a unit that manages the performance, use a=4 delivery ofeloud services by enhancing specific capability and fle the value-added services to eloud consumers, ii Iecombines and integrates various services into one or ore services vt computing FECT Sem-p sy provide service arbitrage which allows fexibiy fin etic sya ie are maj theee services offered bya cloud broker iv: Service intermediation Service aggregation e. Serview arbitrage \d carrier: | Cone mediator who offer connectivity and transport of tout services 1 Te Mh cloud service providers and eloud consumers. “lows access to the services of eloud through Internet network, i Ke Mommunication, and other access devices, telecor GAIT] Diseue the scope between provider and consume ef aera computiog reference architecture. eel {The elovd provider and cloud consumer share the contol of resources inacloud system. ‘This analysis of description of controls over the application stack helps to understand the responsibilities of parties involved in managing the cloud application. | Application layer Middleware layer] (Operating syster] layer Wig. Scope of controls btwn provider and BSRiner ‘The application layer includes software applications targeted at end mrt peograme ‘The applications are used by SaaS consumers, or installed/managed! thinned by Pha consumers TaaS consumers, and SaaS provides ‘The middleware layer provides software building blocks (for example, libraries, database, and Java Virtual Machine)! for developing application software in the cloud. The middleware is used by PaaS oder installed/managed/maintained by IaaS consumers oF ‘PaaS providers, and hidden from SaaS consumers.S-6E(CSITSem-7) Cloud Architecture, Services & & The OSimerincammemincenee ng ths 6. The OS layer includes operating system and drivers, and ishi 1. & Generally, consumers have broad freedom to choose which 9, SaaS consumers and PaaS consumers "ee tng An aa clout allows one or multiple guest OSs to run virtual single physical host ay os hosted amongall the OS's that could be supported by the cloud pre se The Tau consumers should assume fll responsibilty for the uy OS's, while the IaaS provider controls the host OS. # -LPART-2, Public, Private and Hybrid Clouds. © er (Que 84. | Write a short note on pul ‘Questions-Answers oi) ‘Long Answer Typo and Medium Answer Type Questions _| cloud. 1 2 Public cloud is a cloud in which the cloud infrastructure and comput resources are made available to the general public over a public netwa| Public cloud offers resource pooling, self-service, service accountsg elasticity, multi-tenancy to manage the solutions, deployment, en securing the resources and applications. Public cloud Fig. 34.1/Pablie'toud, eaconestins STE (CIT Sem7) are able to offload commodity eater tidors hosters. serefprm public’ does not mean : The atts fee even though it ean be free oily inexpensive to polications to third-party use. i user's data is publicly visible - public cloud vendor movide fan access control mechanism for their users, rowingare the examples of public cloud aplication: Publie facing web pages |. Publie Wiki’s and blogs ‘Jobs resembling batch processing with lower security constraints, ta intensive workloads + typically 4 Fal the wis consumed from a public cloud are as fellows Security and data privacy Base of access i Discovery of services jx, REST{ul interface support vy. Lower cost vi. Speed and availability Qed. | Discuss security in a public cloud. Ihnewer, Security in a public cloud: 1 Multi-tenaney : i. Aslongas the cloud provider buildsits security to meet the higher. k client requirements, all of the lower-risk elints get better security than they would have normally. A bandoge manufacturer may have a low risk of being a direct target of malfeasance, but a musiclabel that is currently using le sharers could have a high risk of being targeted by malfeasance. ii, When both the bandage manufacturer and the musi label use the same cloud (mult-tenancy), itis possible that attacks directed at the music label could affeet the bandage manufacturer's infrastructure as wel So, the cloud provider must design the security to meet the needs ofthe music label and the bandage manufacturer gets the benefits. © Sceurity review : {As thotime passes, organizations become lenient with their security Policies,
You might also like
Cloud-Computing-Sandeep-Bhowmik-Edisi-1-2017
PDF
No ratings yet
Cloud-Computing-Sandeep-Bhowmik-Edisi-1-2017
15 pages
Unit 2 CC (R20)
PDF
No ratings yet
Unit 2 CC (R20)
30 pages
Cloud Computing Notes 1
PDF
No ratings yet
Cloud Computing Notes 1
12 pages
B. Discuss Key Enabling Technologies in Cloud Computing Systems
PDF
No ratings yet
B. Discuss Key Enabling Technologies in Cloud Computing Systems
3 pages
L0Phtcrack: Made By:-Surabhi Varma
PDF
No ratings yet
L0Phtcrack: Made By:-Surabhi Varma
21 pages
A1595386437 - 11266 - 21 - 2020 - Google Cloud Computing Foundations M1 PDF
PDF
No ratings yet
A1595386437 - 11266 - 21 - 2020 - Google Cloud Computing Foundations M1 PDF
35 pages
Module1 PDF
PDF
No ratings yet
Module1 PDF
1 page
Cloud Computing
PDF
100% (5)
Cloud Computing
25 pages
Final - Unit 1.1
PDF
No ratings yet
Final - Unit 1.1
23 pages
Dashrath Nandan CC (Unit2) Notes
PDF
100% (1)
Dashrath Nandan CC (Unit2) Notes
13 pages
Cloud Computing Fundamentals
PDF
No ratings yet
Cloud Computing Fundamentals
38 pages
Unit 2: Cloud Computing Architecture
PDF
No ratings yet
Unit 2: Cloud Computing Architecture
46 pages
Cloud Computing Introduction PDF
PDF
No ratings yet
Cloud Computing Introduction PDF
28 pages
Technology Used in Cloud Computing
PDF
No ratings yet
Technology Used in Cloud Computing
3 pages
Course Handout CC
PDF
No ratings yet
Course Handout CC
2 pages
Get Elements of Cloud Computing Security A Survey of Key Practicalities 1st Edition Mohammed M. Alani (Auth.) Free All Chapters
PDF
100% (4)
Get Elements of Cloud Computing Security A Survey of Key Practicalities 1st Edition Mohammed M. Alani (Auth.) Free All Chapters
52 pages
Unit-2 Cloud Computing
PDF
No ratings yet
Unit-2 Cloud Computing
23 pages
Cloud Security
PDF
No ratings yet
Cloud Security
16 pages
GCP Fund Module 6 Applications in The Cloud
PDF
No ratings yet
GCP Fund Module 6 Applications in The Cloud
26 pages
CSM PPT Unit 1
PDF
No ratings yet
CSM PPT Unit 1
83 pages
Cloud Computing MCQ (Multi Choice Questions) - Javatpoint
PDF
No ratings yet
Cloud Computing MCQ (Multi Choice Questions) - Javatpoint
60 pages
Cloud Computing 1
PDF
No ratings yet
Cloud Computing 1
214 pages
Cloudcomputing
PDF
No ratings yet
Cloudcomputing
31 pages
Cloud Computing
PDF
No ratings yet
Cloud Computing
25 pages
2023 Updated Huawei H12-711_V40-ENU Exam Dumps - PDF Room
PDF
No ratings yet
2023 Updated Huawei H12-711_V40-ENU Exam Dumps - PDF Room
27 pages
Case Study On Microsoft Azure
PDF
No ratings yet
Case Study On Microsoft Azure
3 pages
GCP Tutorial Slides
PDF
No ratings yet
GCP Tutorial Slides
41 pages
CSM - Unit Iv
PDF
No ratings yet
CSM - Unit Iv
38 pages
SRM Valliammai Engineering College (An Autonomous Institution)
PDF
No ratings yet
SRM Valliammai Engineering College (An Autonomous Institution)
9 pages
Unit 4 Hadoop
PDF
No ratings yet
Unit 4 Hadoop
86 pages
Case Study Based On: Cloud Deployment and Service Delivery Models
PDF
No ratings yet
Case Study Based On: Cloud Deployment and Service Delivery Models
10 pages
CC Unit-V
PDF
No ratings yet
CC Unit-V
101 pages
Cloud Computing Questions & Answers
PDF
No ratings yet
Cloud Computing Questions & Answers
14 pages
UNIT-3 Cloud Application Design
PDF
100% (1)
UNIT-3 Cloud Application Design
53 pages
AWS Cloud Practioner Certification Preparation Guide
PDF
100% (1)
AWS Cloud Practioner Certification Preparation Guide
12 pages
Introduction To Cloud Coumpting
PDF
No ratings yet
Introduction To Cloud Coumpting
21 pages
Cloud Computing: Sreenidhi Institute of Science and Technology (An Autonomous Institution)
PDF
No ratings yet
Cloud Computing: Sreenidhi Institute of Science and Technology (An Autonomous Institution)
8 pages
Cloud Computing: Sharad Singh Abhishek Sinha Austin Rodrigues Arun Gupta
PDF
100% (1)
Cloud Computing: Sharad Singh Abhishek Sinha Austin Rodrigues Arun Gupta
26 pages
Cloud Computin G: Sanjay Gandhi Institute of Engineering & Technology
PDF
No ratings yet
Cloud Computin G: Sanjay Gandhi Institute of Engineering & Technology
27 pages
Ccs335 Cloud Computing-Unit - I Notes
PDF
No ratings yet
Ccs335 Cloud Computing-Unit - I Notes
37 pages
R18 B.Tech. CSE Syllabus Jntu Hyderabad
PDF
50% (2)
R18 B.Tech. CSE Syllabus Jntu Hyderabad
2 pages
Cloud Services Management
PDF
No ratings yet
Cloud Services Management
118 pages
Unit 4
PDF
No ratings yet
Unit 4
90 pages
Cloud Computing UNIT-I PPT - PPSX
PDF
No ratings yet
Cloud Computing UNIT-I PPT - PPSX
61 pages
1.3,1.4 - Architecture of Cloud Computing
PDF
No ratings yet
1.3,1.4 - Architecture of Cloud Computing
12 pages
CC - Ques Paper
PDF
100% (1)
CC - Ques Paper
2 pages
DATA SCIENCE
PDF
No ratings yet
DATA SCIENCE
8 pages
Computer Networking: Submitted by Submitted To
PDF
No ratings yet
Computer Networking: Submitted by Submitted To
21 pages
CSM - Unit Iii
PDF
No ratings yet
CSM - Unit Iii
30 pages
Cloud Computing Unit-5
PDF
No ratings yet
Cloud Computing Unit-5
11 pages
Unit 2
PDF
No ratings yet
Unit 2
35 pages
Cloud Computing by Matin
PDF
No ratings yet
Cloud Computing by Matin
184 pages
Unit - 4-Cloud
PDF
No ratings yet
Unit - 4-Cloud
122 pages
Map Reduce
PDF
No ratings yet
Map Reduce
40 pages
Cloud Applications
PDF
No ratings yet
Cloud Applications
73 pages
Introduction To Cloud Computing
PDF
No ratings yet
Introduction To Cloud Computing
59 pages
Cloud Computing
PDF
No ratings yet
Cloud Computing
88 pages
Quantum - Cloud Computing
PDF
100% (4)
Quantum - Cloud Computing
89 pages
Cloudcomputing
PDF
No ratings yet
Cloudcomputing
70 pages
Cloud Computing
PDF
No ratings yet
Cloud Computing
137 pages
Related titles
Click to expand Related Titles
Carousel Previous
Carousel Next
Cloud-Computing-Sandeep-Bhowmik-Edisi-1-2017
PDF
Cloud-Computing-Sandeep-Bhowmik-Edisi-1-2017
Unit 2 CC (R20)
PDF
Unit 2 CC (R20)
Cloud Computing Notes 1
PDF
Cloud Computing Notes 1
B. Discuss Key Enabling Technologies in Cloud Computing Systems
PDF
B. Discuss Key Enabling Technologies in Cloud Computing Systems
L0Phtcrack: Made By:-Surabhi Varma
PDF
L0Phtcrack: Made By:-Surabhi Varma
A1595386437 - 11266 - 21 - 2020 - Google Cloud Computing Foundations M1 PDF
PDF
A1595386437 - 11266 - 21 - 2020 - Google Cloud Computing Foundations M1 PDF
Module1 PDF
PDF
Module1 PDF
Cloud Computing
PDF
Cloud Computing
Final - Unit 1.1
PDF
Final - Unit 1.1
Dashrath Nandan CC (Unit2) Notes
PDF
Dashrath Nandan CC (Unit2) Notes
Cloud Computing Fundamentals
PDF
Cloud Computing Fundamentals
Unit 2: Cloud Computing Architecture
PDF
Unit 2: Cloud Computing Architecture
Cloud Computing Introduction PDF
PDF
Cloud Computing Introduction PDF
Technology Used in Cloud Computing
PDF
Technology Used in Cloud Computing
Course Handout CC
PDF
Course Handout CC
Get Elements of Cloud Computing Security A Survey of Key Practicalities 1st Edition Mohammed M. Alani (Auth.) Free All Chapters
PDF
Get Elements of Cloud Computing Security A Survey of Key Practicalities 1st Edition Mohammed M. Alani (Auth.) Free All Chapters
Unit-2 Cloud Computing
PDF
Unit-2 Cloud Computing
Cloud Security
PDF
Cloud Security
GCP Fund Module 6 Applications in The Cloud
PDF
GCP Fund Module 6 Applications in The Cloud
CSM PPT Unit 1
PDF
CSM PPT Unit 1
Cloud Computing MCQ (Multi Choice Questions) - Javatpoint
PDF
Cloud Computing MCQ (Multi Choice Questions) - Javatpoint
Cloud Computing 1
PDF
Cloud Computing 1
Cloudcomputing
PDF
Cloudcomputing
Cloud Computing
PDF
Cloud Computing
2023 Updated Huawei H12-711_V40-ENU Exam Dumps - PDF Room
PDF
2023 Updated Huawei H12-711_V40-ENU Exam Dumps - PDF Room
Case Study On Microsoft Azure
PDF
Case Study On Microsoft Azure
GCP Tutorial Slides
PDF
GCP Tutorial Slides
CSM - Unit Iv
PDF
CSM - Unit Iv
SRM Valliammai Engineering College (An Autonomous Institution)
PDF
SRM Valliammai Engineering College (An Autonomous Institution)
Unit 4 Hadoop
PDF
Unit 4 Hadoop
Case Study Based On: Cloud Deployment and Service Delivery Models
PDF
Case Study Based On: Cloud Deployment and Service Delivery Models
CC Unit-V
PDF
CC Unit-V
Cloud Computing Questions & Answers
PDF
Cloud Computing Questions & Answers
UNIT-3 Cloud Application Design
PDF
UNIT-3 Cloud Application Design
AWS Cloud Practioner Certification Preparation Guide
PDF
AWS Cloud Practioner Certification Preparation Guide
Introduction To Cloud Coumpting
PDF
Introduction To Cloud Coumpting
Cloud Computing: Sreenidhi Institute of Science and Technology (An Autonomous Institution)
PDF
Cloud Computing: Sreenidhi Institute of Science and Technology (An Autonomous Institution)
Cloud Computing: Sharad Singh Abhishek Sinha Austin Rodrigues Arun Gupta
PDF
Cloud Computing: Sharad Singh Abhishek Sinha Austin Rodrigues Arun Gupta
Cloud Computin G: Sanjay Gandhi Institute of Engineering & Technology
PDF
Cloud Computin G: Sanjay Gandhi Institute of Engineering & Technology
Ccs335 Cloud Computing-Unit - I Notes
PDF
Ccs335 Cloud Computing-Unit - I Notes
R18 B.Tech. CSE Syllabus Jntu Hyderabad
PDF
R18 B.Tech. CSE Syllabus Jntu Hyderabad
Cloud Services Management
PDF
Cloud Services Management
Unit 4
PDF
Unit 4
Cloud Computing UNIT-I PPT - PPSX
PDF
Cloud Computing UNIT-I PPT - PPSX
1.3,1.4 - Architecture of Cloud Computing
PDF
1.3,1.4 - Architecture of Cloud Computing
CC - Ques Paper
PDF
CC - Ques Paper
DATA SCIENCE
PDF
DATA SCIENCE
Computer Networking: Submitted by Submitted To
PDF
Computer Networking: Submitted by Submitted To
CSM - Unit Iii
PDF
CSM - Unit Iii
Cloud Computing Unit-5
PDF
Cloud Computing Unit-5
Unit 2
PDF
Unit 2
Cloud Computing by Matin
PDF
Cloud Computing by Matin
Unit - 4-Cloud
PDF
Unit - 4-Cloud
Map Reduce
PDF
Map Reduce
Cloud Applications
PDF
Cloud Applications
Introduction To Cloud Computing
PDF
Introduction To Cloud Computing
Cloud Computing
PDF
Cloud Computing
Quantum - Cloud Computing
PDF
Quantum - Cloud Computing
Cloudcomputing
PDF
Cloudcomputing
Cloud Computing
PDF
Cloud Computing