0% found this document useful (0 votes)
64 views

Cloud Computing

This document contains an introduction to cloud computing including definitions, evolution, and key concepts. It discusses cloud computing properties, advantages, and disadvantages. It also addresses parallel computing systems categories and issues related to cloud computing such as security, data, performance, energy, and fault tolerance.

Uploaded by

Vishal Mishra
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views

Cloud Computing

This document contains an introduction to cloud computing including definitions, evolution, and key concepts. It discusses cloud computing properties, advantages, and disadvantages. It also addresses parallel computing systems categories and issues related to cloud computing such as security, data, performance, energy, and fault tolerance.

Uploaded by

Vishal Mishra
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 137

UNIT

1 Introduction

CONTENTS
Part-1 : Introduction to Cloud 1-2E to 1-17E
Computing, Definition
of Cloud, Evolution of
Cloud Computing :
Part-2 : Underlying Principles of. .1-17E to 1-26E
Parallel and Distributed
Computing, Cloud
Characteristics, Elasticity
in Cloud, On-Demand
Provisioning

1-1E (CSIT-Sem-7)
1-2E(CSTT-Sem-7) Introduction

PART- 1
Introduction to Cloud Computing, Definition of Cloud, Evolution
of Cloud Computing.

Questions-Answers
Long Answer Type and Medium Answer Type Questions

Que 1.1. What do you mean by cloud computing ? Als0, give its
properties.

Answer
1 Cloud computing is the mears of delivering all IT from computer
applications, software, business processes, messaging, and collaboration
to end users as a service wherever and whenever they need it.
2 Cloud computing is a paradigm for delivering IT where rapid provisioning
is an important characteristic for computing resources, data applications
and IT.
3 Cloud computing helps us to face the challenges such as :
Decreasing the capex and opex cost.
Enhancing the service quality.
ii. Maintaining the desired and right level of security, compliances,
regulations, and policies across the different functions of enterprise.
iv. Rapid provisioning, agility, and business transparency for consistent
self-service delivery.
4 Thus, cloud computing is the service and deployment model using large
resource pool based provisioning of virtual or physical resources in a
service model using the intermet (public cloud) or intranet (private cloud).
Properties of cloud computing are :
1. User centric: This means once a user isconnected to cloud any data,
such as images, videos, applications, becomes his property. Not only the
data but the devices connected to it and the user can share it with other
users.

2. Task centric : Cloud computing focus on what one need and how
application can do it. Here documents are given more priority than the
applications which create them.
1-3E (CSTT-Sem-7)
Cloud Computing
3. Self healing: In selfhealing, backups are available for every document
in the cloud. Hence, if one document crashes there will be its duplicate
ready to run.
4. Multi-tenancy and intelligence: Multi-tenancy refers to sharing of
data and costs across a large pool of users. As various data are stored in
cloud, data mining and analysis are necessary for accessing information
in an intelligent manner.
5. Programmable: Many processes in cloud computing shall be automate
such as backing up crashed data with its duplicate, Hence, programming
is associated with cloud computing.
6 Flexible: Flexible as the users may be of different varieties and hence
has to match with their needs.

Que 1.2. What are the advantages and disadvantages of cloud


computing ?
Answer
Advantages of cloud computing :
as it does not
1. Cost saving: It helps us to save substantial capital cost
need any physical hardware investments.
latest
2. Strategic edge : Cloud computing helps us to access the
applications any time without spending our time and money on
installations.
3
quickly in
High speed : Cloud computing allows us to deploy our service resources
fewer clicks. This faster deployment allows us to get the
required for our system within fewer minutes.
4
Reliability :Through cloud computing we can always get instantly
updated about the changes.
5 Mobility: Employees who are working on the premises or at the remote
internet
locations can easily access all the cloud services. All they need is
connectivity.
6. Unlimited storage capacity:Cloud computing offers limitless storage
capacity.
Disadvantages of cloud computing :
1 Performance can vary: When we are workingin a cloud environment,
provides
our application is running on the server which simultaneously
resources to other businesses that can affect the performance of our
shared resource.
2 Technical issues : Cloud technology is always prone to an outage and
other technical issues.
14E (CSTT-Sem-7) Introduction

3. Security threat in the cloud: Before adopting cloud technology, we


should be well aware of the fact that we will be sharing all our company's
sensitive information to a third-party cloud computing service provider.
Hackers might access this information.
4. Internet connectivity : Good internet connectivity is must in cloud
computing. We cannot access cloud without an internet connection.
5. Lack of support : Cloud computing companies fail to provide proper
support to the customers. Moreover, they want their user to depend on
FAQs or online help, which can be a tedious job for non-technical persons.
Que 1.3.Explain vision of cloudcomputing.
Answer
1 Cloud computing provides the facility to provision virtual hardware,
runtime environment and services to a person having money.
2 These all things can be used as long as they are needed by the user.
3 The whole collection of computing system is transformed into collection
of utilities, which can be provisioned and composed together todeploy
systems in hours rather than days, with no maintenance costs.
4 The long term vision of a cloud computing is that IT services are traded
as utilities in an open market without technological and legal barriers.
5. In the future, we can imagine that it will be possible to find the solution
that matches with our requirements by simply entering out request in a
global digital market that trades with cloud computing services.
6 The existence of such market will enable the automation of discovery
process and its integration into its existing software systems.
7. Due tothe existence of a global platform for trading cloud services will
also help service providers to potentially increase their revenue.
8 cloud provider can also become a consumer of a competition
A
in order to fulfill its promises to service
customers.
Que 1.4. List the major categories of parallel
computing systems.
Answer
Categories of parallel computing systems :
i. Bit level parallelism : It is a form of
parallelism which is based on
increasing processors word size. It shortens
that the system must run in order to
the number of instructions
are greater in size.
perform a task on variables which
i. Instruction level parallelism : It is a form of parallel
which we can calculate the amount of operation carried computing in
out by an
operating system at same time. For example :
1-5E (CSIT-Sem-7)
Cloud Computing
1 Instruction pipelining
2 Out of order execution
3. Register renaming
4. Speculative execution
5. Branch prediction
Que 1.5. Discuss the issues related to cloud computing.

Answer
Several issues related tocloud computing are :
Issues in clouds

Security issues
Data issues
Performance issues
Energy related issues

Fault tolerance

Fig. 1.5.1.
Security issues : Some of the security problems which are faced by the
cloud computing are as follows:
1. Data integrity: When a data is on a cloud, anyone from any location
differentiate
can access those data from the cloud. Cloud does not
between asensitive data from a common data thus enabling anyone to
access those sensitive data. Thus there is a lack of data integrity in cloud
computing.
2. Data theft: Most of the cloud vendors instead of acquiring a server try
to lease a server from other service providers because they are cost
effective and flexible for operation.
3. Security on vendor level: Vendor should make sure that the server
is well secured from allthe external threats it may come across. Acloud
is good only when there is good security provided by the vendor to the
customers.
4. Security on user level: Even tho ugh the vendor has provided good
security layer for the customer, the customer should make sure that
because of its own action, there should not be any loss of data or
tampering of data for other users who are using the same cloud.
5. Information security : Security related to the information exchanged
between different hosts or between hosts and user. This issues pertaining
1-6 E (CSIT-Sem-7)
Introduction
to secure communication,
on and delegation. authentication, issues concerning single sign
Data issues:Various data issues in cloud
1. Data loss:
computing are as follows :
Ifthe vendor closes due to financial or legal
will be a loss of data for the customers. The problems there
access those data customers will not be able to
because data is nomore available for the customer as
the vendor shut down.
2 Data location : When it comes to location of the
data
transparent even the customers do not know where his ownnothing is
data are
located. The vendor does not reveal where all the data are
stored. The
data will not even be in the same country of the
located anywhere in the world. customer, it might be
3. Data lock-in: Software stacks have improved
platforms, but the APls for cloud computing itself interoperability among
are still essentially
proprietary. or at least have not been the subject of active standardisation.
Thus, customers cannot easily extract their data and programs from
one site to run on another.
4Data segregation : Data in the cloud is typically stored in a shared
environment whereby one customer's data is stored alongside another
customer's data, hence it is difficult to assure data segregation.
5. Dataconfidentiality and auditability : Current cloud offerings are
essentially public (rather than private) networks, exposing the system
tomore attacks. Auditability could be added as an additional saver
beyond
the reach of the virtualized guest OS providing facilities
secure than those built into the applications themselves andarguably more
the software responsibilities related to confidentiality and centralizing
a single logical layer. auditability to
6. Data integrity : One of the biggest concerns with cloud
data storage is
the verification of data integrity at untrusted servers, and how to deal
with sensitive data. It is not an easy task to maintain customer's most
sensitive cloud data securely, which is needed in many applications for
clients.
7. Deletion of data: Data that has to be deleted by the user because he or
she no longer needs it or many no longer process it for another
is also deleted by the provider and no more copies of reason
data are available.
This can lead toproblems, particular in connection with backups.
8. Service level agreements : According to the purpose for which
data is processed, it is important to agree on binding service levels the
for
availability and data recovery and if necessary, safe guarded by supporting
fixed penalties in the event of non-compliance with the agreed service
levels.
Cloud Computing 1-7E (CSTT-Sem-7)

Various performance issues in cloud computing are:


1. Poor application performance or application hang-ups:Usually
the applicationis starved for RAMor CPU cycles, and faster processors
or more RAM is added.
2 Slow access to applications and data : Bandwidth is usually the
cause, and the most common solution is to add faster network
connections.
3. Horizontal and vertical scalability :
i. Vertical scaling : Vertical scaling (up) entails adding more
resources to the same computing p0ol.
ii Horizontal scaling: Horizontal scaling (out)requires the addition
handle the
of more machines devices to the computing platform to
increased demand. Sustained increases in demand, however, require
horizontal scaling and load balancing to restore and maintain peak
performance.
are as follows :
Energy related issues: Various energy related issues
1 Cloud computing is rapidly growing in importance as increasing numbers
workload to cloud service
of enterprises and individuals are shifting their
providers.
infrastructure of
2. The electricity costs involved in operating a large cloudservice providers
multiple data centres can be enormous. In fact, cloud
the energy they
often must pay for the peak power they draw, as well as
consume.
challenges facing
3. Lowering these high operating costs is one of the
cloud service providers.
overheating of
4. Insufficient or malfunctioning cooling system can lead to
and devices lifetime.
the resources reducing system reliability
leads to substantial carbon
5. High power consumption by the infrastructure greenhouse effect.
dioxide (CO,)emission contributing to the
Fault tolerance :
cloud computing. Fault
1 Fault tolerance is one of the key issues of necessary to enable a
tolerance is concerned with all the techniques
system to tolerate software faults.
themselves during
2 These software faults may or may not manifest techniques
software fault tolerant
systems operations, but when they do, the software system to
should provide the necessary mechanisms of
prevent system failure occurrences.
Fault tolerance techniques are employed during the procurement, or
3. these techniques
occurs,
development, of the software. When a fault
system failure
provide mechanisms to the software system to prevent
from occurring.
1-8E (CSIT-Sem-7)
Introduction

Que 1.6. What are the hurdles in cloud computing ?


Answer
Hurdles in cloud computing:
1. Securty:
i As the services are opened and delivered over
the network between
the cloud service provider and the
consumer, the security in this
model is perceived at higher levels.
Other inhibitors can be
where consumer does not location-independent resource pooling
know where his services are running or
where his data is stored.
iü. Limited service management and monitoring capabilities in the
public cloud model also added to the complexities.
2. Regulation and compliances :
i. There is a need of data governance models to be
established in the
enterprises and federating data privacy.
ii In large organizations, IT delivery is taken
with the concerns of
reliability, performance, and availability.
ii. There are different levels of maturities for organizations seeking
different levels of Service Level Agreements (SLA) but cloud service
providers are not equipped to deliver the services.
iv. There is a need of stringent Recovery Point
Objective (RPO) and
the Recovery Time Objective (RTO) with the agreed number of
mins/hours down-time.
3. Cloud migration :
This requires the property of powerful interoperability of platforms
that should identify the appropriate application that can be migrated
to the cloud.
It is important to identify the
interdependencies and integration
points with standards and interfaces that are lacking among
provider:s. service
iii. Cloud migration becomes more complex if the
service bundles are
integrated from multiple cloud service providers. This can also
become the deal breaker or the reason for downgraded
performance.
4. Workload suitability for cloud :
Not all the applications are suitable candidates for the cloud.
It depends on the function of the business, enterprise policies,
application architecture, scalability, suitability, usage patternsin
according to pay-per-use-model, or infrastructure requirements
the service model.
Cloud Computing 1-9 E (CSIT-Sem-7)

Que 1.7. Explain briefly the term cloud.

Answer
1 Cloud is an extension ofthe internet with some level of inherent discipline
and ethics.
2 Cloud can be thought of unification of information technology with
business intelligence.
3 Technology merges virtualization, grid functionalities and web standards
as a single utility model which is delivered to the custumers over the
internet, whereas the business intelligence defines the best cost schemes
leading to win-win situation for both the cloud service provider as well
as the cloud service consumer.
4 Cloud brokers negotiate the best deals and relationships between the
cloud consumers and cloud providers.
5. They can use specialized tools to identify the most appropriate cloud
resource and map the requirements of the application to it.
6
Cloud broker services are mainly categorized into three group:
Service intermediation broker provides a service to a consumer
that enhances a given service by adding some value on top to increase
some specific capability.
integrates
b Service aggregation brokerage service combines and
are modelled across
into one or more services and ensures that data
of data between
all component services and movement, security
the service consumer and multiple providers,
C Service arbitrage is similar to cloud service aggregation but services
services provide
being aggregated are not fixed. In addition, these
flexibility and opportunity for the service aggregator.
Que 1.8. What are the components of cloud ?

Answer
Components of cloud :
1. Cloud service consumer (or end user):
clients, which
i. Cloud service consumers are the end users known as
interact with the system and demand for services as per their
requirement.
ii The client can be categorized into the following three categories:
a Mobile clients : Mobile clients run the application from
laptops, PDAs and smart phones. This category of clients
demands for higher speed and high level of security.
1-10 E (CSIT-Sem-7)
Introduction
b. Thinclients :Thin clients neither have hard
DVD ROM drives, and largely depend on the drives nor have
server.
C. Thick clients : Thick clients are self-sufficient in terms of
accessories.
2. Cloud service provider :
Cloud service providers are the agents which host the
the cloud and deliver service to the servers in
end users.
ii. The major cloud providers are Google, Amazon, Sales Force, IBM,
Microsoft and Rackspace.
3. Internet medium: Internet medium is the communication channel
between the consumer and provider where services are redirected.
4. Datacentre:
Datacentre is the collection of servers where the applications
subscribed are housed.
ii. It consists of storage, network, and server.
Que 1.9. Give the characteristics of cloud.

Answer
Characteristics of cloud are :
1 Self-service on-demand: As acloud consumer, users are privileged to
request and provision computing capabilities bundled with services with
or without approval process powered by automation and workflows.
2. Ubiquitous network access: This is the characteristic by which end
user and server computing devices can be accessed over the network
even using the next generation heterogeneous devices such as
smartphone, tablets, thin and thick chents.
3 Resource pooling:
This characteristic refers to the poolingof resources across
datacenters. multiple
These pooled virtual datacenters are then divided into multiple
pools to provide their services to various consumers in a multi
tenant model.
i. These pools can have both physical and virtual resources.
iv. The devices provided by this pool give the notion of
location
independent compute (storage, servers, processing, network
bandwidth, virtual machines, etc.), where the consumer does not
have control or visibility about the service location and its
geography.
4. Rapid elasticity :
This characteristic makes the provisioning rapid and elastic.
Cloud Computing 1-11 E (CSIT-Sem-7)

This provisioning can be automatic and can flex-up and flex-down


on the basis of spikes of utilization.
iii. The consumer can view the infinite capacity available as a service,
which can be bought at any point of time.
Que 1.10. What are the challenges in cloud ?
Answer
Challenges in cloud:
1. Lack of control : In case of lack of control, by delegating the IT
management to a third party, the service consumer loses the ability to
workload.
directly control and monitor the execution of the submitted
2 Securityy : For security, trusting a third party to store enterprises
confidential data is asource of potential concern and needs to be
effectively addressed by the cloud service provider.
3. Interoperability among multiple service providers :This leads to
avoid vendor lock-in, it is desirable to be able to run the same virtualized
application on clouds provided by multiple vendors. Appropriate standards
need to be in place for addressing this concern.
4 Resource management: The management of computing, storage
a hard'
and other resources in a distributed system is recognized as
problem.

Que 1.11. Explain cloud services.


Answer
has given various
On the basis of user requirements, the cloud infrastructure or clients or
servicing schemes in order to deliver the utility to the consumers
end users :
Infrastructure-as-a-Service (IaaS) :
a.
Infrastructure-as-a-Service (laaS) model allows the customer to
provision processing, storage, network and other important software
such as operating system and applications.
:
The consumer does not have control over the underlying
infrastructure but has control over the operating systems, storage
and deployed applications.
b. Platform-as-a-Service (PaaS) :
i. Platform-as-a-Service (PaaS) model provides capacity to the
customer to deploy the customer-created applications into the cloud
infrastructure using the programming language or tools supported
by the cloud provider.
1-12 E (CSIT-Sem-7)
Introduction
The consumer does not manage the
such as network, storage, etc., butunderlying cloud infrastructure
has control over the deployed
applications.
iü. It also provides solutions for
integrating cloud computing into
existing application, services, and
oriented approach. infrastructure with a market
C.

i
Software-as-a-Service (SaaS):
Software-as-a-Service
the
(SaaS) model enables the customer to use
provided application hosted on the cloud
i. In this model, the customer does not infrastructure.
have any control over the
cloud infrastructure but has a little control
over the application
configuration settings.
iii. The applications are accessible from the
client devices such as thin
client or web browser interface.

Cloud

SaaS

PaaS

laaS

Fig. 1.11.1. Cloud services.

Que 1.12. List the benefits of cloud.


Answer
Benefits of cloud:
1 Increased agility on the IT datacenter resources and innovation.
2 Enabling of
self-service portal and thus ensure Virtual Machines (VMs)
in less lead-times.
3. Adherence of SLAs as the VM lead-times and down-times are
reduced. significantly
Cloud Computing 1-13 E (CSSIT-Sem-7)

4. Trial and error configuration tests can be done at ease.


5. Complete control over cloud usage for administrators is p0ssible.
Scalability and flexibility allow the laaS cloud to almost deliver the promise
of unlimited IT services on demand.
7. Usage-based payment and not getting billed when the utilization
decreases.
8. Significant reduction in the costs for IT datacenter.
Dynamic sharing of the resources available in IT datacenter
through
9.
private cloud so that demands can be met cost effectively.
of IT datacenter.
10. Considerable increase in the utilization of resources
resources in the IT
11. Increase in the operational efficiency of the
datacenter.
12. Achieve a greener datacenter.
Avoids vendor locking.
13. Support for heterogeneous hardware vendors.
Que 1.13. Explain the evolution of cloud computing.

Answer
Evolution of cloud computing:
1. Grid computing :
evolution of
Grid computing appeared in the early 1990s as an
cluster computing.
. Grid computing proposed a new approach to access large
computational power, huge storage facilities, and a variety of
services. Users can consume resources in the same way as they
use other utilities such as power, gas, and water.
iüi. Grids initially developed as aggregation of geographically dispersed
cluster by means of internet connection.
and
iv. These clusters belonged to different organizations
computational
arrangements were made among them to share the
power.
Different from a large cluster, a computing grid was a dynamic
was
aggregation of heterogeneous computing nodes, and its scale
nationwide or even worldwide.

2. Utility computing :
Utility computing is a vision of computing, defining a service
such
provisioning model for computing services in which resources
infrastructure are
as storage, compute power, applications, and
packaged and offered on a pay-use basis.
1-14 E (CS/IT-Sem-7)
Introduction
The business model introduced with utility computing
requirements and led to an improvement of mainframebrought new
technology,
additional features such as operating systems, process controland
user metering facilities.
i. The idea of computing as utility remained and extended from
business domain to the academia with the advent of cluster the
computing.
3. Software-as-a-Service: Refer Q. 1.11, Page 1-11E, Unit-1.
4. Cloud computing : Refer Q. 1.1, Page 1-2E, Unit-1.
Que 1.14. Discuss the architecture of cloud
computing.
Answer
Cloud computing architecture refers to the components and
required for cloud computing. These components consist of:subcomponents
1 Front end platform :
Cloud computing architecture consists of front end platforms called
clients or cloud clients.
These clients comprise servers, fat (or thick) clients, thin clients,
zero clients, tablets and mobile devices.
i. These client platforms interact with the cloud data
storage through
an application (middleware), through a web browser, or
virtual session.
through a
iv. The front end refers to the client part of cloud
computing
consists of interfaces and applications that are requiredsystem. It
to access
the cloud computing platforms like web browser.
2 Back end platform:
Theback end refers to the cloud itself. It consists of all the
required to provide cloud computing services. resources
It comprises of huge data storage, virtual
mechanism, services, deployment models, servers, machines, security
etc.
ii. It is online network storage wheredata is
stored and accessible to
multiple cients.
3 Cloud based delivery: These include the following:
i
Software-as-a-Service (SaaS): Refer Q. 1.11, Page 1-11E, Unit-1.
ii.
Development-as-a-Service
web-based, community shared
(DaaS) : Development as a service is
development tools. This is equivalent
to locally installed development tools in the
traditional (non-cloud
computing) delivery of development tools.
Cloud Computing 1-15 E (CSIT-Sem-7)

iii. Platform-as-a-Service (PaaS) : Refer Q. 1.11, Page l-11E, Unit-1.


iv. Infrastructure-as-a-Service (IaaS) : Refer Q. 1.11, Page 1-11E,
Unit-1.
4. Network : The cloud network layer offers :
i. High bandwidth (low latency) : Allowing users to have
uninterrupted access to their data and applications.
i. Agile network :On-demand access to resources requires the ability
to move quickly and efficiently between servers and possibly even
clouds.
iii. Network security : Security is always important, but when dealing
with multi-tenancy, it becomes much more important because we
are dealing with segregating multiple customers.

Client infrastructure Front end

Internet

Application

Management Service
Security

Cloud runtime Back end

Storage

Infrastructure

Fig. 1.14.1. Cloud computing architecture.


Que 1.15. Write some applications of cloud computing.

Answer
Applications of cloud computing:
1. Big data analytics : From fraud recognition to statistical investigation,
big data exist universally. Analyse how Hadoop and great presentation
computing clusters can be set-up in both public and private clouds.
2.
Develop and test : Build and test applications in on-requirement
platforms using constantly configured resources, lower expenditure,
and decreased release cycles.
1-16 E (CSIT-Sem-7) Introduction

3. Disaster recovery : Public and private clouds facilitate commercial


solutions to maintain highly accessible applications with flexible multiple
datacentres and provider architectures, and reduce down-time and data
loss.
4 Gaming applications :Distribute flexible capacity to assemble random
traffic actions and to lower expenditure for the ongoing life cycle
management by public and private clouds.
5. Web and mobile applications : Deploy mobile applications and web
applications that are extremely scalable and accessible across a range of
verified architectures, technologies and clouds.
Que 1.16.Give limitations of cloudcomputing.
Answer
Limitations of cloud computing :
1. Data protection:
i. Data security is a crucial element that warrants scrutiny.
Enterprises are reluctant to buy an assurance of business data
security from vendors.
ii. They fear losing data to competition and the data confidentiality of
consumers.

iv In many instances, the actual storage location is not disclosed, adding


onto the security concerns of enterprises.
V
In the existing models, firewalls across datacentres (owned by
enterprises) protect this sensitive information.
vi. In the cloud model, service providers are responsible for maintaining
data security and enterprises would have to rely on them.
2 Data recovery and availability :
i. All business applications have service level agreements that are
stringently followed.
i. Operational teams play a key role in management of service level
agreementsand runtime governance of applications.
ii. In production environments, operational teams support:
Appropriate clustering and fail over
b Data replication
C. System monitoring (transactions monitoring, logs mnonitoring
and others)
Maintenance (runtime governance)
e. Disaster recovery
f. Capacity and performance management.
1-17E (CSIT-Sem-7)
Cloud Computing

3. Management capabilities :
the management of
Despite there being multiple cloud providers,
infancy.
platform and infrastructure is still in its
ii. For example, features like
Auto-scaling are a crucial requirement
for many enterprises.
scalability and load
There is huge potential to improve on the
balancing features provided today.
restrictions :
4. Regulatory and compliance
government regulations do not
i In some of the European countries,
information and other sensitive
allow customer's personal the state or country.
informatipn to be physically located outside
cloud providers need to set-up
In order to meet such requirements,
exclusively within the country to
a datacentre or a storage site
comply with regulations.
may not always be feasible and is a
iii. Having such an infrastructure
big challenge for cloud providers.

PART-2

and Distributed Computing,


Underlying Principles of ParallelElasticity
Cloud Characteristics, in Cloud,
On-Demand Provisioning.

Questions-Answers

Questions
Long Answer Type and Medium Answer Type

Que 1.17. Write a short note on parallel computing. Write the


zdvantages of parallel computing over serial computing.

Answer
1. Parallel computing is a computation type in which multiple processors
execute multiple tasks simultaneously.
2. Problems are broken down into instructions and are solved concurrently.
3. The main reason for parallel programming is to execute code efficiently,
since parallel programming saves time, allowing the execution of
applications in a shorter time.
4. Advantages of parallel computing over serial computing are :
1-18 E (CSIT-Sem-7) Introduction

i
lt saves time and money as many resources working together will
E:
F: reduce the time and cut potential costs.
It can be impractical to solve larger problems on serial computing.
i. It can take advantage of non-local resources when the local
resources are finite.
iv. Serial computing wastes the potential computing power, thus
parallel computing makes better work of hardware.
Que 1.18. Describe briefly the components of parallel computing.
Answer
Components of parallel computing :
Assign
Computing parallel
problems
computation s
to processors

Parallel
algorithms Mapping Hardware
and data architecture
,structures

Dependency Programming Qperating system


analysis High-level Binding Application software
languages (compile,
load)
Performance
evaluation
Fig. 1.18,1.
1. Computing problems :
i. Numerical computing : Science and engineering numerical
problems demand intensive integer and floating point computations.
ii. Logical reasoning : Artificial Intelligence (AI) demands logic
inferences and symbolic manipulations and large space searches.
2 Parallel algorithms and data structures :
Special algorithms and data struetures are needed to specify the
computations and communication present in computing problenms
(from dependency analysis).
ii Most numerical algorithms are deterministic using regular data
structures.
Cloud Computing 1-19 E (CSIT-Sem-7)

ii. Symbolic processing may use heuristics or non-deterministic


searches.

iv. Parallel algorithm development requires interdisciplinary


interaction.
3. Hardware resources :
Processors, memory, and peripheral devices (processing nodes) form
the hardware core of a computer system.
Processor connectivity (system interconnects, network), memory
organization, influence the system architecture.
4. Operating systems :
i. Manages the allocation of resources to running processes.
ii. Mapping tomatch algorithmic structures with hardware architecture
and vice-versa, processor scheduling, memory mapping.
interprocessor communication.

Que 1.19. What are the properties of distributed computing ?


Answer
Properties of distributed computing:
1. Fault tolerance :
When one on some nodes fails, the whole system can still work fine
except performance.
ii. Need to check the status of each node.

2 Each node play partial role:


Each computer has only a limited, incomplete view of the system.
i. Each computer may know only one part of the input.
3.
Resource sharing: Each user can share the computing power and
storage resource in the system with other users.
4 Load sharing: Dispatching several tasks toeach node can help share
loading to the whole system.
5. Easy to expand: We expect to use few time when adding nodes. Hope
to spend no time if possible.
6 Performance : Parallel computing can be considered a subset of
distributed computing.
Que 1.20. Write ashort note on distributed computing.
1-20 E (CSTT-Sem-7)
Introduction

Answer
1. Distributed computing is a model in which components of a software
system are shared among multiple computers to improve
performance. efficiency and
2 In distributed computing, each processor has its
own private memory
(distributed memory). Information is exchanged by passing messages
between the processors.
3 A distributed system allows resource sharing,
systems connected to the network.
including software by
4 The goal of distributed computing is to make network as a
computer.
single
5. Examples of distributed systems /applications of distributed computing
are :Intranets, Internet, WWW, email.
Que 1.21. Differentiate between parallel computing and distributed
computing.
Answer
S.No. Parallel computing Distributed computing
1 It is a type of computation A system whose components are
in which many calculations located on different networked
or the execution of computers, which communicate
processes are carried out and coordinate their actions by
simultaneously. passing messages to one another.
2 It occurs in a single It involves multiple
computer.
computers.
3. Multiple processors execute Multiple computers perform tasks
multiple tasks at the same at the same time.
time.

4. Computer can have shared Each computer has its own


memory or distributed memory.
memory.
5. Processors communicate Computers communicate with
with each other using a each other through the network.
bus.
6. Increase the performance Allows scalability sharing
of the system. resources and helps to perform
computation tasks efficiently.
Cloud Computing 1-21 E (CSTT-Semn-7)

Que 1.22. Explain briefly the architecture of distributed


computing.
Answer
Architecture of distributed computing:
1. Data-centered architecture :
i These architectures identify the data as the fundamental element
of the software system and access to shared data is the core
characteristic of the data-centered architectures.
Therefore, especially within the context of distributed and parallel
computing system, integrity of data is the overall goal for such
systems.
ii. The repository architectural style is the most relevant reference
model in this category.
iv. It is characterized by two main components; the central data
structure, which represents the current state of the system, and a
collection of independent components, which operate on the central
data.
V. The ways in which the independent components interact with the
central data structure can be very heterogeneous.
2 Data-flow architecture :
In the case of data-flow architectures, it is the availability of data
that controls the computation.
With respect to the data-centered styles, where the access to data is
the core feature, data-flow styles explicitly incorporate the pattern
of data flow, since their design is determined by an orderly motion
of data from component to component, which is the form of
communication between them.
ii. Data-flow architectures are optimal when the system to be designed
embodies a multi-stage process, which can be clearly identified into
collection of separate components that need to be orchestrated
together.
3. Virtual machine architecture:
This class of architectural styles is characterized by the presence of
an abstract execution environment that simulates features that
are not available in the hardware of software.
Applications and system are implemented and become portable
over different hardware and software environment as long as there
is an implementation of the virtual machine they interface with
constitutes its execution.
1-22 E (CSIT-Sem-7)
Introduction
4. Call and return architecture:
i. This category identifies all the
systems that are composed by
components mostly connected together by method calls.
The activity of systems modeled in this way is
chain of method calls whose overall executioncharacterized
by a
and composition
identify the execution of one or more operations.
iii. The internal organization of components and their
may vary.
connections
5. Architectural styles based on independent components :
This class of architectural styles model systems in term of
independent components having their own life cycle, which interact
to each other in order to perform their activities.
ii. There are two major categories within this class, which differentiate
in the way the interaction among components is
managed:
a.
Communicating processes : In this architectural style,
components are represented by independent processes that
leverage Inter-Process Communication (IPC) facilities for
coordinate management.
b. Event systems :In this architectural style, the components
ofthe system are loosely coupled and connected. In addition to
exposing operation for data and state manipulation, each
component also publishes (or announces) a collection of events
that other components can register with.

Que 1.23. What do you mean by dynamiccloud infrastructure ?

Answer
1. Cloud computing clients can access standardizedIT resources to deploy
new applications, services, or computing resources rapidly without re
engineering their entire infrastructure, thus making it dynamic.
2. Cloud dynamic infrastructure is based on an architecture that combines
the following initiatives :
a. Service management : Offers business transparency and
automation across the pillars of business for consistent delivery.
b. Asset management: Maximizes the value of critical business and
IT assets over their life cycle with industry-tailored asset
management solutions.
C. Virtualization and consolidation : Reduce operating costs,
improve responsiveness, and fully utilize the resources.
d. Information infrastructure : Helps businesses achieve
information compliance, availability, retention, and security
Cloud Computing 1-23 E (CSIT-Sem-7)

objectives.
e. Energy efficiency : Offers green and sustainable energy solutions
for business.
£. Security :Provides end-to-end industry customized governance,
risk management, and compliance for businesses.
g. Elasticity : Maintains continuous business and IT operations while
rapidly adapting and responding to risks and opportunities.
Que 1.24. Explain technologies used for distributed computing.

Answer
Technologies used for distributed computing are :
1. Remote procedure call :
i. Remote Procedure Call (RPC) is the fundamental abstraction
enabling the execution of procedures on client's request.
beyond the
It allows extending the concept of procedure call
boundaries of a processor and a single memory address space.
be on the same
ii. The called procedure and calling procedure may network.
system, or they may be on different systems in a

iv. The system is based on a client server model.


available procedures
V The server process maintains a registry of all the clients
that can be remote invoked, and listens for requests fromvalues of
with the
that specify which procedure to invoke together
the parameters required by the procedure.
is natural in process
vi. RPCmaintains the synchronous pattern that
procedure and function calls.
2 Distributed object frameworks:
object-oriented
Distributed object frameworks extend the
across a
programming systems by allowing objects to be distributed can
heterogeneous network and provide facilities so that they
coherently act as if they were in the same address space.
ii Distributed object frameworks leverage the basic mechanism
introduced with RPC, and extend it to enable the remote invocation
made
of object methods and to keep track of references to object
available through a network connection.
with
ii. Distributed objects frameworks give the illusion ofinteraction
a local instance while invoking remote methods. This is done by a
mechanism called proxy-skeleton.
iv. Proxy and skeleton always constitute a pair, the server process
maintain the skeleton component, which is in charge of executing
1-24 E (CSIT-Sem-7)
Introduction
the method remotely invoked, while the
clients
component allowing its hosting environment tomaintain the proxy
remotely invoke
methods through the proxy interface.
Que 1.25. What are the
characteristics of cloud computing?
Answer
Characteristics of cloud computing are :
1. On
demand self-service:
without the need of human Resources
can automatically be
interaction as and when needed.provisioned
2.
Compatibility :Cloud services allow access to the data from any location
and on any device. Employees can work from anywhere.
3.
Elasticity:Cloud services are
they need and discard resourcesscalable. Consumers can add resources
they do not want.
4. Reliability : Cloud runs on multiple servers and is automated to run
even if one server fails. Resources are drawn from the other
ensure continuity without any interruption. servers to
5. Disaster recovery:With replication and storing across
cloud allows easy cost-effective solutions at times of multiple servers,
some theft or calamity. data loss due to
6. Updates : Consumers need not
technical issues. The cloud serversworry about software updates and
are located in different places
from our business premises. The away
7.
providers do all the updates and patches.
Security:Cloud services offers enhanced security. We can
data from any system even if we lose our personal device. access our
Que 1.26. Write a short note on
elasticity in cloud.
Answer
1 In cloud computing, elasticity is
is able to adapt to defined as "the degree to whicha system
workload changes by provisioning and
resources in an autonomic manner, de-provisioning
such that at each point in time the
available resources match the current demand as closely as possible".
2
Elasticity is a defining characteristic that
from previously proposed differentiates cloud computing
computing paradigms,
The dynamic adaptation of such as grid computing.
resources, to meet a varyingcapacity, by altering the use of
computing
workload is called elasticcomputing.
4.
Elasticity aims at
with the amountmatching the amount of resource allocated to a
of resource it actually service
provisioning or under-provisioning. requires, avoiding over
Cloud Computing 1-25 E (CSIT-Sem-7)

5. Over-provisioning, ie., allocating more resources than required, should


be avoided as the service provider often has to pay for the resources that
are allocated to the service.
6. Under-provisioning, i.e., allocating fewer resources than required, must
be avoided, otherwise the service cannot serve its users with a good
service.

Que 1.27. What are the advantages of elastic cloud computing ?

Answer
Advantages of elastic cloud computing:
1 Cost efficiency :
approaches
Cloud is available at much cheaper rates than traditional
and can significantly lower the overall IT expenses.
licensing fees as well as
ii By using cloud solution companies can save storage,
eliminate overhead charges such as the cost of data
software updates, management etc.
makes easier
2. Convenience and continuous availability : Cloud
and modify choice. Public
access ofshared documents and files with view
available wherever the end user
clouds also offer services that are
continuous availability of
might be looted Moreover it guaranteed alternative instances are
resources and in use of system failure,
automatically spawned on other machines
up and recovering data
3. Backup and recovery : The process of backingnot on a physical device.
cloud and
is easy as information is residing on flexible backup/recovery
The various cloud providers offer reliable and
solutions.
cloud is more efficient than the
4. Cloud is environment friendly:The resources to compute, thus
typical IT infrastructure and it takes fewer
saving energy.
a built-in feature for
5. Scalability and performance : Scalability is automatically only
are deployed
cloud deployments. Cloud instances performance with excellent speed
when needed and as a result enhance
of computations.

Que 1.28. What are the disadvantages of


elastic cloud computing?

Answer
Disadvantages of elastic cloud computing:
biggest concern in
1. Security and privacy in the cloud: Security is the private data and
their
cloud computing. Companies essentially hide
infrastructure is used, it is
information over cloud as remote based cloud
1-26 E (CSIT-Sem-7) Introduction

then up to the cloud service provider to manage, protect and retain data
confidential.
2. Limited control : Since the applications and services are running
remotely companies, users and third party virtual environments have
limited control over the function and execution of the hardware and
software.
3. Dependency and vendor lock-in : One of the major drawbacks of
cloud computing is the implicit dependency on the provider. It is also
called "vendor lock-in". As it becomes difficult to migrate vast data from
old provider to new. So, it is advisable to select vendor very carefully.
4. Increased vulnerability :Cloud based solutions are exposed on the
public internet therefore are more vulnerable target for malicious users
and hackers.
2 UNIT

2 Cloud Enabling
Technologies

CONTENTS
Part-1 : Service Oriented Architecture 2-2E to 2-6E

Part-2 : REST and Systems of 2-7E to 2-15E


Systems, Web Services,
Publish-Subscribe Model

Part-3 : Basics of Virtualization, .2-15E to 2-23E


Types of Virtualization,
Implementation Levels
of Virtualization

.2-23E to 2-33E
Part-4 : Virtualization Structure, Tools .......,. ....

and Mechanism, Virtualization


of CPU, Memory, IVO Devices,
Virtualization Support and
Disaster Recovery

2-1 E (CSIT-Sem-7)
2-2 E (CSIT-Sem-7)
Cloud Enabling Technologies

PART-1
Service Oriented Architecture.

Questions-Answers
Long Answer Type and Medium Answer Type Questions

Que 2.1. Briefly describe the Service Oriented Architecture(SOA).


Answer
1 Service Oriented Architecture (SOA) is an architectural approach in
which applications make use of services available in the network.
2. Service Oriented Architecture (SOA) is a style of software design where
services are provided to the other components by application components
through a communication protocol over a network.
3 SOAallows users to combine a large number of facilities from existing
services to form applications.
4 SOAencompasses a set of design principles that structures the system
development and provide means for integrating components into a
coherent and decentralized system.
5. SOA based computing packages functionalities intoa set of interoperable
services, which can be integrated into different software systems
belonging to separate business domains.
6. SOA provides a translation and management layer within the cloud
architecture that removes the barrier for cloud clients obtaining desired
services.

Que 2.2. Explain the major roles of Service Oriented Architecture


(SOA).

Answer
There are two major roles of Service Oriented Architecture (SOA):
1. Service provider:
a The service provider is the maintainer of the service and the
organization that makes available one or more services for others
to use.
b To advertise services, the provider can
publish them in a
together with a service contract that specifies the natureregistry,
of the
service, how to use it, the requirements for the service, and the
fees chargcd.
Cloud Computing 2-3E (CSIT-Sem-7)

2. Service consumer :
a. The service consumer can locate the service metadata in the registry
and develop the required client components to bind and use the
service.

b. Services aggregate information and data retrieved from other


services or create workflows of services to satisfy the request of a
given service consumer.

Que 2.3. Describe the guiding principles of SOA.


Answer
Guiding principles of S0A :
to a given
1. Standardized service contract : Services adhere more service
communication agreement which is specified through one or
description documents.
components,
2. Loose coupling: Services are designed as self-contained services.
maintain relationship that minimizes dependencies on other
3. Abstraction: Aservice is completely defined by service contracts and
encapsulated
description documents. They hide their logic, which is
within their implementation.
be reused
4. Reusability : Being designed as components, services can associated
and the
more effectively, thus reducing the development time effective system
costs. It allows for a more agile design and cost
implementation and deployment.
pattern, service
5 Lack of state : By providing a stateless interaction especially in a
increase the chance of being reused and aggregated,
consumers belonging
scenario where a single service is used by multiple
domains.
todifferent administrative and business
documents that
6. Discoverability : Services are defined by description
they can be effectively
constitute supplemental metadata through which means for utilizing
discovered. Service discovery provides an effective
third-party resources.
as building blocks, sophisticated
7. Composability : By using servicesimplemented. Service orchestration and
and complex operations can be services and
choreography provide a solid support for composing
achieving the business goals.

Que 2.4. What are the advantages and


disadvantages of SOA ?

Answer
Advantages of SOA:
1 Service reusability : In SOA,
applications are made from existing
applications.
services. Thus, services can be reused to make many
24E (CSTT-Sem-7) Cloud Enabling Technologies
Easy maintenance: As services are independent of each other they
can be updated and modified easily without affecting other services.
3. Platform independent: SOA allows making a complex application by
combining services picked from different sources and are independent
of the platform.
4. Availability: SOA facilities are easily available to anyone on request.
5. Reliability :SOA applications are more reliable because it is easy to
debug small codes rather than huge codes.
6. Scalability : Services can run on different servers within an
environment, this increases scalability.
Disadvantages of SOA:
1. High overhead: A validation of input parameters of services is done
whenever services interact, which decreases performance as it increases
load and response time.
2. High investment :A huge initial investment is required for SOA.
3. Complex service management : When services interact they
exchange messages to tasks. The number of messages may go in millions.
It becomes a cumbersome task to handle a large number of messages.

Que 2.5.Explain the application areas of SOA.


Answer

Application areas of SOA are:


1 SOA infrastructure is used by many armies and airforce to deploy
situational awareness systems.
2. SOA is used to improve the healthcare delivery.
3. SOAis used in mobile solutions apps such as games and they use inbuilt
functions to run.
4 SOA helps to maintain museums a virtualized storage pool for their
information and content.

Que 2.6. What are the benefits of using SOA ?

Answer

Benefits of usingSOA:
1. Language neutral integration : Regardless of the develoving
language used, the svstem offers and invoke services through a coror
mechanism. Programming language neutralization is one o! the key
benefits of SOA's integration approach.
Cloud Computing 2-5 E (CSIT-Sem-7)

2. Component reuse : Once an organization built an application


component, and offered it asa service, the rest of the organization can
utilize that service.
3. Organizational agility : SOA defines building blocks of capabilities
provided by software and it offers some services that meet some
organizational requirement which can be recombined and integrated
rapidly.
4 Leveraging existing system : This is one of the major use of SOA
which is to classify elements or functions of existing applications and
make them availableto the organizations or enterprise.
Que 2.7. Explain horizontal layer of SOA architecture.

Answer
sOA architecture is viewed as five horizontal layers:
1. Consumer interface layer : These are GUI based apps for end users
accessing the applications.
2. Business process layer : These are business-use cases in terms of
application.
3. Services layer: These are whole-enterprise, in service inventory.
4. Service component layer : They are used to build the services, such
as functional and technical libraries.
5. Operational systems layer: It contains the data model.

Que 2.8. Explain vertical layers of SOA architecture.

Answer
Vertical layers of SOA architecture:
1. Integration layer :Starts with pltform integration (protocols support),
data integration, service integration, application integration, leading to
enterprise application integration supporting B2B and B2C.
2 Quality of service layer : Security, availability, performance ete.,
constitute the quality of service parameters which are configured based
on required SLAs, OLAs.
3 Informational layer :Provide business information.
4 Governance layer : IT strategy is governed to each horizontal layer to
achieve required operating and capability model.
Que 2.9.Explain the elements of SOA.
2-6E (CSIT-Sem-7) Cloud Enabling Technologies

Answer
Elements of Service Oriented Architecture (SOA):

SOA

Application Service
Service Service Bus
frontend repository

Contract Implementation Interface

Business logic Data

1. Application frontend :
a.
Application frontends are active elements of the SOA, delivering
the value of SOA to the end users.
b They initiate and control all activity of the enterprise system.
2. Service: It is a software component that encapsulates a high level
business concept.
3 Contract : It provides a specification of the purpose, functionality,
constraints, and usage of services.
4 Interface : Functionality of the service exposed by the service to the
clients that are connected to the service.
5. Implementation :The service implementation provides the required
business logic and appropriate data. It contains one or more of the
artifacts :programs, configuration, data and databases.
6. Business logic : Business process represented by the service.
7 Data: Data represented in the service used by the service.
8. Service repository :It registers the services and their attributes to
facilitate the discovery of services, operation, access rights,
qualities, etc. owner,
9. Service bus: Aflexible infrastructure for integrating
applications and
services by :routing messages, transforming protocols between
and service, handling business events and requestor
QoS,security, and managing the delivering them, providing
interaction among services.
2-7 E (CSIT-Sem-7)
Cloud Computing

PART-2
Publish-Subscribe
Systems, Web Services,
REST and Systems of Model.

Questions-Answers

Medium Answer Type Questions


Long Answer Type and

note on REST.
Que 2.10. Write a short

Answer information
State Transfer (REST) is a way of getting contains
Representational which
1
from a website by reading a designated webpagecontent.
content includes thedesired
describes and
an XML file that
cloud provider to provide updated subscription
2 REST is used by
information.
includes content and XML
provider could prepare a web page that
3 The code.
described in the
statements that are (URL)
need to know the Uniform Resource Locator
Subscribers only witha web browser.
4
page where the XML file is located, read it display it
for the using XML information, and
understand the content
appropriately. sites use with RDF
same publishing approach that many
5 REST uses the
(RSS). RSS uses the Resource Description Framework
Site Summary way to describe a website.
(RDF), which is a standard
benefits :
REST offers the following support
response time and reduced server load due to its
1. It gives better representations.
for the caching of maintain session
scalability is improved by reducing the need to
2. Server
state. resource, so less
single browser can access any application and any
3 A be written.
client-side software needs to the use
resource discovery mechanism is not needed, due to
4 separate
A
of hyperlinks in representations.
compatibility and evolvability characteristics.
5. It has better long-term
2.11. What are HTTP methods used by REST architecture ?
Que
2-8 E (CSTT-Sem-7)
Cloud Enabling Technologies

Answ er
The REST architecture makes use of four HTTP methods. These are :
1 GET method : This method helps in offering read-only access for the
resources.
2. POST mnethod:This method is implemented for creating a new resource.
3. DELETE method:This method is implemented for removing a resource.
4. PUT: This method is implemented for updating an existing resource or
creating a new one.

Que 2.12. Write a short note on RESTful API.

Answer
1 ARESTful API is an Application Program Interface (API) that uses
HTTP requests to GET, PUT, POST and DELETE data.
2. A RESTful API is referred to as a RESTful web service that is based on
Representational State Transfer (REST) technology, an architectural
style and approach to communications often used in web services
development.
3. REST technology is generally preferred to the more robust Simple Object
Access Protocol (SOAP) technology because REST leverages less
bandwidth, making it more suitable for internet usage.
4 An API for website is a code that allows two software programs to
communicate with each other.
5 REST is a logical choice for building APIs that allow users to connect and
interact with cloud services.
6. RESTful APIs are used by sites such as Amazon, Google, LinkedÉn and
Twitter.
7 A RESTful API breaks down a transaction to create a series of small
modules. Each module addresses a particular underlying part of the
transaction. This modularity provides developers with a lot of flexibility.
Que 2.13. Differentiate between RESTful web service and RESTless
web service.
Cloud Computing 2-9 E (CSIT-Sem-7)

Answer

S. No. RESTful web service RESTless web service

1. An application that provides An application that is not based on


interoperability between the principle of REST.
computer systems on the
internet.

2, Use REST. Use SOAP.

3. Support various data format Support XML format.


such as HTML, JSON, etc.
4 Use ÜRL to expose business Use the service interface to expose
logic. business logic.
5 Easier and flexible. Not easy and flexible.

6 Inherits security measures Defines its own security layer and


from the underlying is more secure.
transport protocols.
7 Consume less bandwidth and Consume more bandwidth and
resources. resources.

Que 2.14. What are the advantages of REST?

Answer
The advantages of REST are :
the server:
1. Separation between the client and
interface from the
a The REST protocol totally separates the user
server and the data storage.
interface to other
b For example, it improves the portability of the the projects, and
types of platforms, it increases the scalability of
be evolved
allows the different components of the developments to
independently.
2. Visibility, reliability and scalability :
has one evident
The separation between client and server
product
advantage, that each development team can scale the
without problem.
of changes in
b They can migrate to other servers or make all kinds is sent
the database, provided that the data from each request
correctly.
2-10 E (CSIT-Sem-7)
Cloud Enabling Technologies
The separation makes it easier to have the front and the back on
different servers, and this makes the apps more flexible to work
with.
3. The REST APIis always independent of the type of platform or
languages :
a. The REST API always adapts to the type of syntax or platforms
being used, which gives considerable freedom when changing or
testing new environments within the development.
b. With a REST API we can have PHP, Java, Python Servers.
Que 2.15. Write a short note on web services.

Answer
1 A web service is a software package that is used for communicating
between two devices or web entities lying on the network.
2 They involve a service provider along with a service requester, i.e., the
client.
3. Since web services are advantageous as they are language transparent,
so there is no issue whether the fundamental system is providing the
service developed in Java, PHP or any other language while the client
application is written in Python, Ruby, Perlor JavaScript.
4. Task performed by web services :
Web services are searched for over the network as well as call upon
accordingly.
As a web service is called, it would be capable of providing operation
for the client that has invoked the web service.

Que 2.16. What are types of web services ?

Answèr
Two types of web services:
1 SOAP web services:
i The abbreviation ofSOAP is Service Oriented Architecture Protocol.
ii It is an XML based protocol having the main benefit of
the SOAP web service as its security. implementing
iüi. SOAP offersa wrapper for sending a web service based
messages
over the Internet by the help of HTTP protocol. AIl its messages are
usually in XML format.
Cloud Computing 2-11 E (CSIT-Sem-7)

iv. The SOAP message consists of:


SOAP document has a root element termed as the <Envelope>
element. This element is the initial element used in an XML
document.
b. Then next the Envelope" which is categorized into two parts.
The former is the header,' and the later is the body.'
C.
The header includes the routing data that is essentially the
information telling the XML document to whom or for which
the client needs to be sent to.
Lastly, the body includes the actual message.
2. REST (Representational State Transfer) web services:
REST service is not a collection of paradigm or specific rules, it is
instead the style architecture for software.
iü. Those apps that are designed using this architecture are collectively
termed as RESTful web services.
as
ii. It establishes the resources through the use of URL as well
depends on the nature of the transport protocol (like HTTP's: GET,
PUT, POST, DELETE, etc.) used to perform the resources.
iv. Allocation of resources in REST depends on the URL. It is more like
conventions based application.

Que 2.17. Explain architectural constraints of web services.

Answer

Architectural constraints of web service are:


1. Uniform interface:
a REST API and
i. It is a key constraint that differentiates between
Non-REST API.
interacting with
It suggests that there should be a uniform way of
application (website,
a given server irrespective of device or type of
mobile app).
interface:
iüi. There are four guidelines principle of uniforn1
Resource-based : Individual resources are identified in
a.

requests.
b. Manipulation of resources through representations :
Client has representation of resource and it contains enough
information to modify or delete the resource on the server,
provided that it has permission to do so.
2-12 E (CSIT-Sem-7)
Cloud Enabling Technologies
C.
Self-descriptive messages: Each message includes enough
information to describe how to process the message so that
server can easily analyse the request.
d. Hypermedia As The Engine of Application State
(HATEOAS): It need to include links for each response so
that client can discover other resources easily.
2. Stateless:
i. It means that the necessary state used to handle the
request is
contained within the request itself and server would not store
anything related to the session.
i. In REST, the client must include all information for the server to
fulfill the request whether as a part of headers or URI.
3. Cacheable:
Every response should include whether the response is cacheable
or not and for how much duration responses can be cached at the
client side.
ii. Client will return the data from its cache for any subsequent
and there would be no need to send the request again to the request
server.
4 Client-Server:
i REST application should have client-server architecture.
. A client is someone who is requesting
resources and are not
concerned with data storage, which remains internal to each server,
and server is someone who holds the
resources and are not
concerned with the user interface or user state.
5. Layered system :
An application architecture needs to be composedof
multiple layers.
Each layer does not know anything about any layer other than that
of immediate layer and there can be lot of
between client and the end server.
intermediate servers
ii. Intermediary servers may improve system
availability by enabling
load-balancing and by providing shared caches.
6. Code on demand:
It is an optional feature. According to this, servers can
executable code to the client.
also provide

Que 2.18. Differentiate between REST and SOAP.


Cloud Computing 2-13 E (CSIT-Sem-7)

Answer

S. No. REST -SOAP


1. REST is Representational SOAP is Service Oriented
State Transfer. Architecture Protocol.

2. It is an architecture style. It is a protocol.


3. It usessimple HTTP protocol. It uses SOAP envelop and then
HTTP to transfer the data.
4. It supports many different It supports only XML format.
data format like JSON, XML,
YAML etc.
5 Performance, scalability, and Slower performance and
caching is high. scalability is bit complex, caching
not possible.
6. It is used widely and It is used where REST is not
frequently. possible.

Que 2.19. Explain briefly publish-subscribe model.


Answer
1 In software architecture, publish-subscribe pattern is a message pattern,
a network oriented architectural pattern, which describes how two
different parts ofa message passing system connect and communicate
with each other.
2 In modern cloud architecture, applications are decoupled into smaller,
independent building blocks that are easier to develop, deploy and
maintain.
3 Publish/Subscribe (Pub/Sub) messaging provides instant event
notifications for these distributed applications.
4 The publish-subscribe model allows messages to be broadcast to different
parts of a system.
5 Publish-subscribe is a sibling of the message queue paradigm, and is one
part of a larger message-oriented middleware system.
6. Messaging systems support both the pub/sub and message queue models
in their API. For example, Java Message Service (JMS).
7. This pattern provides greater network scalability and a dynamic network
topology, with a resulting decreased flexibility to modify the publisher
and the structure of the published data.
2-14 E (CSIT-Sem-7)
Cloud Enabling Technologies
Que 2.20. Explain how
publish-subscribe model works.
Answer
Working of publish-subscribe model :

Subscriber
Message
Message
Publisher Publish/subscribe channel Subscriber

Subscriber

Fig. 2.20.1.
1. Publisher: Publishes messages to the communication infrastructure.
2. Subscriber: Subscribes to a category of messages.
3.
Communication infrastructure (channel, classes) : Receives
messages from publishers and maintains subscriber subscription.
4. The publisher will categorize published messages into classes where
subscribers will receive the message.
5 A publisher has one input channel that splits into
channels, one for each subscriber. multiple output
6 Subscribers can express interest in one or more classes and only receive
interested message.
7 In pub/sub model the publisher and subscriber are
unaware of each
other. The publisher sends messages to subscribers, without knowing
about subscriber.
8. Subscriber receives messages, without having knowledge of the
publishers. If there are no subscribers around to receive the topic-based
information, the message is dropped.
Que 2.21. What are the benefits of publish-subscribe model ?
Answer
Following are the benefits of publish-subscribe model:
1. It decouples subsystems that need to
communicate. Subsystems can be
managed independently, and messages can be properly managed even
if one or more receivers are offline.
2. It increases scalability and improves
responsiveness of the sender. The
sender can quickly send a single message to the input channel, then
2-15 E (CSIT-Sem-7)
Cloud Computing
messaging
return to its core processing responsibilities. The delivered to
infrastructure is responsible for ensuring messages
interested subscribers.
helps applications to
3. It improves reliability. Asynchronous messaging
increased loads and handle
continuously run smoothly under
intermittent failures more effectively.
to pick up messages
4. It allows scheduled processing. Subscribers can waitprocessed according
untiloff-peak hours, or messages can be routed or
to a specific schedule.
5 It enables simpler integration between systems using different platforms,
protocols, as well as between
programming languages, or communication
the cloud.
on-premises systems and applications running in
enterprise.
6 It facilitates asynchronous workflows across an
monitored and messages can be
7 It improves testability. Channels can be strategy.
inspected or logged as part of an overall integration test
PART-3
Implementation
Basics of Virtualization, Types of Virtualization,
Levels of Virtualization.

Questions-Answers

Type Questions
Long Answer Type and Medium Answer

Why it is needed ?
Que 2.22. Define virtualization.

Answer
decouples the
1. Virtualization is an abstraction layer (hypervisor) thatdeliver greater
(0S) to
physical hardware from the Operating System
IT resource utilization and flexibility.
of platform and allows
2. The virtualization platform provides the isolation same physical
multiple businesses to run multiple virtual machines on the
machine.
3. Following are the benefits provided by virtualization:
i. Money saving :
With virtualization technology, the number of physical servers
can be reduced.
Therefore, the ongoing pro curement, maintenance, and
b.
ongoing operational costs will also be reduced.
2-16 E (CSTT-Sem-7)
Cloud Enabling Technologies
ii. Dramatic increase in control:
a.
Virtualization provides aflexible foundation to provide capacity
according to the demand for an organization.
b. New servers can be quickly deployed. Therefore, services can
be provided within minutes.
C. It is also easy to ship the infrastructure when it is deployed
using virtualization techniques.
iüi. Simplified disaster recovery :
More efficient and cost effective disaster recovery solutions
a.
can be realized with virtualization technologies.
b. Servers and online business can be transferred to an alternate
site within minutes with the help of virtualization.
iv. Business readiness assessment :
Virtualization introduces a shared computing model to an
enterprise and it is easy to understand infrastructure
requirements in a virtualized environment.
Virtualization can help to :
1 Reduce the cost of the existing infrastructure by reducing operational
and systems management cost while maintaining the needed capacity.
2 Reduce the complexity of adding to the infrastructure.
3. Gather information and collaboration across the organization to increase
both the utilization of information and its effective use.
4. Deliver on-Service Level Agreement (SLA) response time during spikes
in production and test scenarios.
5. Build a heterogeneous infrastructure across the organization that is
more responsive to the organization's needs.
Que 2.23. Explain various current virtualization initiatives.

Answer
Various current virtualization initiatives are:
1. Virtual CPU and memory:
i. Physical CPUs and RAM can be dedicated or dynamically allocated
to virtual machines.
As there is no OS dependency on the physical hardware, with the
CPUchecking off, virtual machines can be migrated to different
hosts, with background changes to the physical CPUand memory
resources being transparent to the guest OSs running on virtual
machines.
Cloud Computing 2-17 E (CSIT-Sem-7)

2. Virtual networking :
This creates a virtual 'network in a box' solution that allows the
hypervisor to manage virtual machine network traffic through the
physical Network Interface Controller (NIC) and allows each of the
virtual machines to have a unique identity on the network from
the physical host.
3. Virtual disk :
i Storage Area Network (SAN) based storage is presented as storage
targets to the physical host, which in turn used to host virtual
machine's vdisks (virtual disks).
4 Consolidated management :
i. The performance and health of virtual machines and guest OSs
can be monitored and console access to all of the servers can be
obtained via single console.
5. Virtual machine :
Active virtual machines can be transparently transferred across
physical hosts with no down-time and no loss of service availability
or performance.
The virtual machine's execution state, active memory, network
identity,and active network connections are preserved across the
source and destination hosts so that the guest OS and running
applications are unaware of the migration.
6. Storage virtual machine :
i Vdisks of active virtual machines can be seamlessly and
transparently transferred across data stores, while the execution
state, active memory, and active network connections remain on
the same physical host.
7. Dynamic load balancing :
Dynamically load balances virtual machines across the most optimal
physical hosts to ensure that pre-defined performance levels are
met.
Virtual machines can be automatically and seamlessly transferred
to a less busy hostif a particular host in a resource pool is in a high
utilization state.
iüi. Different resource pools can be defined for different business needs.
iv. For instance, production pools can be defined with more demanding
service level requirements, while development pools can be used
with more relaxed service level requirements.
8. Logical Partitions (LPARs) :
i LPARs result in hardware layer logical partitioning tocreate two or
more isolated computing domains, each with its own CPU, memory
address space and VO interface, with each domain capable of housing
a separate OS environment on single physical server.
2-18E(CNTT Sem
ii LPARs canshare OPUacbave dedcated plyatsal
ii Likewise, an LAR can be a dudeatud jlyanal ydan
space or memory addeeaaea Can lw dyaancally ulbocaud nnE
LPARs as needed
9. Logical Donains (DOMs) :
Operating ayatums unng in each logal dama
independently managed, lati, alpd, utatud, nd nled
without inpucling other LOMa rnig n hat
AType I 'bare etal hypervioog lalate plg v
from physical resources.
For exanple,domains aross diatc Wueada n la paHl
the multithveading lechnologY, hecam lhe hypVan
dynamically managing andencapaulating the allnathd hyaal
resouCe8.

10. Zones :

Zone is an O8level vitualization solulionvallherthan hulwa.


level hypervisor solution.
Each zone is an encapsulated virtual arver envin nng
within a single Oinstance
As such, zones slare a commn kornel, hmgh a tlhhal nns,
although'hon-native' zones can emulale an Oenvivmmet oher
than that of the hosl's native O8
Que 2.24. What are the advantagea nnd diaadvantagsa t
virtualization ?

Answer
Advantages i
Virtualization software reduces VMM comdexily
2. Improves hunctionality.
Increase ertormance
4 Provides server consolidation, tuetingad develpnent, epviaot
dynamic load balancing and the daalerrevery and alan pnvea th
Byslen reliability and security
5.
Connervalion af enorgY, maintenanve of logny apptatnt
Bupporting a erosa platorm ofiee
Disadvantages
1. High risk in the pthyaical fault
2. It in alo not eany, quite eomplieated
3 Not supported by allapleationa
2-19 E (CSTT-Sem-7)
Cloud Computing
point of failure, demands power machines, visualization
4 It has single
may lead to lower performance.
possible.
5. Application is identified to be always not
note on server
virtualization.
Que 2.25. Write a short

Answer computer that


virtualization works as amasking of the server
1. Server
of resourceswith servers, storage,
comprises the count and identityuser.
end
processors and OS from the VMs
server into multiple isolated
2 Administrators divide the physical
talking to same resource p0ols. server
an abstraction of the physical
Virtualization of servers provides server
3
pools for users(Fig.2.25.1).
by maintaining resource

Application Application

Operating system
Operating system

CPU, Memory, Disk


CPU, Memory, Disk

Virtualization/Hypervisor

Memory Disk
CPU

virtualization.
Fig. 2.25.1. Server
Virtual machine: partition, or
termed as a virtual environment,
1 Virtual machine can be
container. physically exist but is
environment, a server that does not
2 Ina server server is called 'guest'.
created on a different termed as 'host'.
instance where a virtual machine runs is
3. The physical server.
can have multiple VMs running on the
4. These hosts
resources can be dynamically assigned to
toa pool of
5. AllVMs assigned
pool-based available resources.
VM, he/she is privileged to use his/her VM as
6. When auser talks to this functionalities such as accessing the OSs,
with all
a physical server hard disk from the common pool.
CPU, memory, and servers based on supported
multiple virtual
7. The hypervisor virtualizes
architecture. and memory.
bundled with an OS, CPU, hard disk,
8 Each virtual machine is
2-20 E (CSTT-Sem-7) Cloud Enabling Technologies
Virtualization technologies : Two major types of technologies are
employed in server virtualization:
a. Hardware virtualization :
i. Hardware virtualization is also known as hypervisor-based
virtualization, bare-metal hypervisor, type 1virtualization, or
simply hypervisor.
This virtualization technology has a virtualization layer running
immediately on the hardware which divides the server machine
into several , virtual machines or partitions, with a guest OS
running in each of these machines.
i. The binary transparency is provided by avirtualized approach
and products enable the transparency for OSs, middleware,
and applications.
b. OS virtualization:
This type of server virtualization is also known as OS-based
virtualization, OS-level virtualization, or type 2virtualization.
OS virtualization creates virtualization environments within a
single instance of an 0S.
üi. Virtual environments created by OS virtualization are often
called 'containers'.
iv. Because all virtualization environmentS must share resources
of a single OS while having a private virtual OS environment,
a particular implementation of the technology may alter the
file system orientation and often introduce access restrictions
to global system configuration or settings.

|Application |Application
Guest OS Guest OS

Application Hypervisor

Host OS

Hardware

Fig. 2.25.2. OS virtualization.

Que 2.26. What are the types of virtualization?

Answer
Types of virtualization :
1. OS virtualization :
i Virtualizing an operating system environment is the most common
form of virtualization.
2-21 E (CSTT-Sem-7)
Cloud Computing
instances of an
ii. It involves putting a second instance or multiple
operating system, like Windows, on a single machine.
of physical
li. This empowers businesses to reduce the amount the number
hardware required to run their software by cutting down
of actual machines.
rack space,
ivIt saves companies cash on energy, cabling, hardware,
and more, while still allowing them to run the same quantity of
applications.
2. Application-server virtualization :
Application-server virtualization is also referred to as 'advanced
servers
load balancing,'as it spreads applications across servers and
across applications.
specific
This enables IT departments to balance the workload of
.

ii
software in an agile way that does not overload a specific server or
underload a specific application in the event of a large project or
change.
ii. It also allows for easier management of
servers and applications,
since we can manage them as a single instance.
3 Application virtualization :
Application virtualization operates application on computers as if
on
they reside naturally on the hard drive, but instead are running
a server.
storing
The ability to use RAM and CPUto run the programs while
terminal services and
them on a server, like through Microsoft are
cloud-based software, improves how software security updates
pushed, and how software is rolled out.
Administrative virtualization :
4.
least-known forms of
1. Administrative virtualization is one of the
used in data
virtualization, likely due to the fact that its primarily
centers.
'management,' virtualization
The concept of administration, or policies.
means segmented admin roles through group and user
involves virtually
5. Network virtualization : Network virtualizationlike routing tables,
managing IPs, and is accomplished through tools
NICs, switches, and VLAN tags.
Page 2-19E, Unit-2.
6 Hardware virtualization : Refer Q. 2.25,
7. Storage virtualization:
are managed by a
Storage virtualization isan array of servers that
virtual storage system.
where their data is stored.
The servers are not aware of exactly
level of virtualization.
Que 2.27. Explain the implementation
2-22 E (CSIT-Sem-7)
Cloud Enabling Technologies

Answer
Various implementation level of virtualization :
1. Instruction Set
Architecture (ISA) level:
i. At the ISA level, virtualization is performed by
ISAby the ISAof the host machine. emulating a given
The basic emulation method is through code
üi. An interpreter program interprets the source interpretation.
instructions one by one. instructions to target
iv. One source instruction may require tens or hundreds of
target instructions to perform its function. This process is native
slow. relatively
V For better performance, dynamic binary translation is
Vi. This approach translates basic blocks of dynamic
desired.
to target instructions. source instructions
Vi. The basic blocks can also be
extended to program traces or super
blocks to increase translationefficiency.
vi. AVirtual Instruction Set
Architecture (V-ISA) thus requires adding
a processor-specific software
translation layer to the compiler.
2. Hardware abstraction level:
It is performed right on top of the
bare hardware and generates a
virtual hardware environment for a VM.
The idea is to virtualize a
computer's resources, such as its
processors, memory, and VO devices so as hardware utilization
rate by multiple users concurrently may be
3. Operating system level :
upgraded.
OS-level virtualization creates isolated containers on a
physical server and the OS instances to utilize the hardwaresingle
and
software in data centers.
The containers behave like real servers.
OS-level virtualization is
commonly used in creating virtual hosting environments to allocate
hardware resources among a large number of mutually distrusting
users.

ii. Library Support Level


Virtualization with library
possible by controlling the communication link betweeninterfaces is
and the rest of a system through API hooks. applications
4. Library support level:
Virtualization with library interfaces is possible by controlling the
communication link between applications and the rest of a system
through API hooks.
ii. The software tool WINE has
Windows applications on topimplemented this approach to support
of UNIX hosts.
Cloud Computing 2-23 E (CSIT-Sem-7)

5. User-application level :
Virtualization at the application level virtualizes an application as a
VM.
On a traditional OS, an application often runs as a process.
iüi. Therefore, application-level virtualization is also known as
process-level virtualization. The most popular approach is to deploy
High Level Language (HLL).

Application level

JVM/.NET

Library (user-level API) level

WINEVisual MainWin

Operating system level

Virtual Environment/FVM

Hardware abstraction layer (HAL) level


VMware/Virtual PC/Xen/
User mode Linux/Cooperative Linux

Instruction set architecture (ISA) level

Bochs/BIRD/Dyn amo

Fig. 2.27.1.

PART-4

Virtualization Structure, Tools and Mechanism, Virtualization of


CPU, Memory, I/O Devices, Virtualization Support and
Disaster Recovery.
2-24 E (CSIT-Sem-7)
Cloud Enabling Technologies

Questions-Answers
Long Answer Type and Medium Answer Type Questions

Que 2.28. Describe virtualization structure.


Answer
1. In virtualization structure, the
operating system manages the hardware.
2. Avirtualization layer is inserted between the
hardware and the operating
system. The virtualization layer is responsible for converting portions of
the real hardware intovirtual hardware.
3. Therefore, different operating systems such as Linux and Windows can
run on the same physical machine, simultaneously.
4 Depending on the position of the virtualization layer, there are several
classes of VM architectures:
i Hypervisor (Virtual Machine Monitor) architecture
i. Para-virtualization
Host-based virtualization

Que 2.29. Deseribe hypervisor architecture and Xen architecture.


Answer
Hypervisor architecture :
1. The hypervisor supports hardware-level virtualization on bare-metal
devices like CPU, memory, disk and netwÍrk interfaces.
2. The hypervisor software sits directly between the physical hardware
and its OS.
3 This virtualization layer is referred to as either the VMM or the hypervisor.
The hypervisor provides hypercalls for the guest OS and applications.
4. Depending on the functionality,a hypervisor can assume a microkernel
architecture like the Microsoft Hyper-V, or it can assume a monolithic
hypervisor architecture like the VMware ESX for server virtualization.
5. A microkernel hypervisor includes only the basic and unchanging
functions (such as physical memory management and processor
scheduling). The device drivers and other changeable components are
outside the hypervisor.
6. Amonolithie hypervisor implements all the mentioned functions,
including those of the device drivers.
Cloud Computing 2-25 E (CSTT-Sem-7)

The Xen architecture :


1 Xen is a microkernel hypervisor, which separates the policy from the
mechanism.
2. The Xen hypervisor implements all the mechanisms, leaving the policy
to be handled by Domain 0.
3 Xen does not include any device drivers natively. It just provides a
mechanism by which a guest OS can
4. Xen provides a virtual environment located between the hardware and
the OS.
5. The core components of a Xen system are the hypervisor, kernel, and
applications.
6 Like other virtualization systems, many guest OS can run on top of the
hypervisor.
and the
7. The guest OS, which has control ability, is called Domain 0,
others are called Domain U.

8 Domain 0 is a privileged guest OS of Xen. Domain 0 is designed to access


hardware directly and manage devices.
map hardware
9 The responsibilities of Domain 0 is to allocate and
domains).
resources for the guest domains (the Domain U

Control, JO Guest domain


(Domain 0) Guest domain

XonoLinux XonoWindows
Domain 0

XEN (Hypervisor)
Hardware devices

Fig. 2.29.1.

with fll
Que 2.30. Write a short note on binary translation
virtualization.
OR
Describe host-based virtualization.
2-26 E (CSIT-Sem-7) Cloud Enabling Technologies

Answer
Binary translation with full virtualization :
1. Full virtualization:
i. With fullvirtualization, non-critical instructions run on the hardware
directly while critical instructions are discovered and replaced with
traps intothe VMM tobe emulated by software.
Both the hypervisor and VMM approaches are considered full
virtualization.
ii. Critical instructions are trapped into the VMM because binary
translation can incur a large performance overhead.
iv. Non-critical instructions do not control hardware or threaten the
security of the system, but critical instructions do.
V.
Therefore, running non-critical instructions on hardware not only
can promote efficiency, but also can ensure system security.
2. Binary translation of guest OS requests using a VMM:
i. VMware puts the VMM at Ring 0 and the guest OS at Ring 1.
: The VMM scans the instruction stream and identifies the
privileged,
control and behaviour sensitive instructions.
üi. When these instructions are identified, they are trapped into the
VMM, which emulates the behaviour of these instructions. The
method used in this emulation is called binary translation.
iv. Full virtualization combines binary translation and direct
execution.
The guest OS is completely decoupled from the underlying
hardware. Consequently, the guest OS is unaware that it is being
virtualized.

User apps Direct


Ring 3 execution
of user
Ring 2 requests
Ring 1 Guest OS
Binary
Ring 0 VMM translation
of OS
request
Host computer
system hardware

Fig. 2.30.1.
Cloud Computing 2-27 E (CSIT-Sem-7)

Host-based virtualization:
An alternative VM architecture is to install a virtualization layer on
top of the host OS. This host OS is still responsible for managing
the hardware.
ii. The guest OS are installed and run on top of the virtualization
layer.
ii. Dedicated applications may run on the VMs. Certainly,some other
applications can also run with the host OS directly.
iv. Advantages of host- based architecture:
a.
The user can install the VM architecture without modifying
the host OS. The virtualizing software can rely on the host OS
services. This will
to provide device drivers and other low-level
simplify the VM design and ease its deployment.
b The host-based approach appeals to many host machine
configurations. Compared to the hypervisor/VMM architecture,
the performance of the host-based architecture may also be
low.

Que 2.31. Describe para-virtualization.


Answer
Para-virtualization :

Application Application

Para-virtualized Para-virtualized
guest operating guest operating
system system

Hypervisor/VMM
Hardware

Fig. 2.31,1.
1
Para-virtualization needs to modify the guest operating systems.
substantial OS
2 Apara-virtualized VM provides special API requiring
modifications in user applications.
machine
3 The virtualization layer can be inserted at different positions in a
software stack.
4 Para-virtualization attempts toreduce the virtualization overhead, and
kernel.
thus improve performance by modifying only the guest OS
5 The guest operating systems are para-virtualized. They are assisted by
non-virtualizable OS instructions
an intelligent compiler to replace the
by hypercalls.
2-28 E (CSIT-Sem-7)
Cloud Enabling Technologies
6 The traditional X86 processor offers four instruction execution rings:
Rings 0, 1, 2, and 3.
7. The lower the ring number, the higher the privilege of instruction being
executed.
8. The OS is responsible for managing the hardware and the privileged
instructions to execute at Ring 0, while user-level applications run at
Ring 3.
Ring 3 User Apps

Ring 2 Direct
execution
of user
Ring 1
requests
Paravirtualized
Ring 0 Guest OS
Hypercalls to the
Virtualization layer virtualization
layer replace
non-virtualizable
Host computer OS instructions
system hardware

Fig. 2.31.1.

Que 2.32. What are the various tools of virtualization ?


Answer
Various tools of virtualization are :
1. Ganeti :
Ganetiis a cluster server management tool developed by Google.
It is built on existing virtualization technologies like KVM, Xen and
other open-source software.
. Ganeti was initially started as a VMware alternative for managing
networks, storage, and virtual machines and not as acloud platform,
meaning it lacks several of the features that come with larger open
cloud projects.
iv. It was designed to handle cluster management of virtual servers
and offer quick and easy recovery after physical failures using
commodity software.
2. KVM (Kernel-based Virtual Machine):
KVM isan open-source virtualization tool for Linux and contains
virtualization extensions (AMD-V or Intel VT).
Cloud Computing 2-29 E (CSIT-Sem-7)

ii It can either be operated in emulation or hardware mode. However,


without the CPUextensions, the overall performance will be poor.
ii. It was designed for command line.
iv. KVM has a decent management interface that enable users to
perform actions like launching and stopping virtual machines or
taking screen shots with ease.
3. oVirt:
oVirt is a virtualization solution used to manage/create virtual data
centers. oVirt manages storage options, virtualized networks, and
virtual machines using interactive an easy to use web-based
administration and user portal.
oVirt supports several advanced virtualization features like live
storage migration, high availability, and the ability to control and
schedule the deployment of virtual machines.
4. Packer:
i. Packer can be used by system admins to build and subsequently
manage the operations of virtual machine images.
ii
The same commands and files can be used to build an image on
Digital Ocean, AWS or for vagrant and VirtualBox.
ii. This enables us to use the same system for development which we
then create in production.
5. Vagrant :
i.
Vagrant is a command-line tool that provides a framework and
configuration format for creating, managing and distributing
virtualized development environments.
ii Vagrant enables users to share their running vagrant environment
via the internet.

6. Xen :
i Xen is a best Linux hypervisors.
i.
The Xen hypervisor is inserted between the server's hardware and
the operating system.
iü. This creates an abstraction layer that allows multiple guest operating
systems to be concurrently executed on a single physical server.
iv. Xen is included with most popular Linux distributions like Fedora,
RHEL,CentOS, Ubuntu, and Debian.

Que 2.33. Write a short note on CPU virtualization,

Answer
1 CPUvirtualization is a hardware feature that allows a single processor
to act as ifit was multiple individual CPUs.
2-30 E (CSIT-Sem-7)
Cloud Enabling Technologies
2 This allows an operating system to effectively &efficiently utilize the
CPU power in the computer.
3 CPUvirtualization goes by different names depending on the CPU
manufacturer.
4 For Intel CPUs, this feature is called Intel Virtualization
Intel VT, and with AMD CPUs it is called AMD-V. Regardless Technology, or
of what it
is called, each virtualization technology provides generally the
features and benefits to the operating system. same
5 CPUvirtualization is disabled by default in the BIOS and needs to be
enabled in order for an operating system to take advantage of it.
6 CPU virtualization involves a single CPUacting as if it were multiple
separate CPUs. The most common reason for doing this is to run multiple
different operating systems on one machine.
7. CPUvirtualization emphasizes performance and runs directly on the
dvailable CPUs whenever possible.
8 The underlying physical resources are used whenever possible and the
virtualization layer runs instructions only as needed to make virtual
machines operate as ifthey were running directly on a physical machine.
Que 2.34. Describe memory virtualization in cloud computing.

Answer
1. Memory virtualization decouples volatile Random Access Memory (RAM)
resources from individual systems in the data center, and then aggregates
those resources into a virtualized memory pool available to any computer
in the cluster.
2 The memory pool is accessed by the operating system or applications
running on top of the operating system.
3 The distributed memory pool can then be utilized as a high-speed cache,
a messaging layer, or a large shared memory resource for a CPU.
4 Memory virtualization allows networked and distributed, servers to share
a pool of memory to overcome physical memory limitations, a common
bottleneck in software performance.
5 With this capability integrated into the network, applications can take
advantage of a very large amount of memory to improve overall
performance, system utilization, increase memory usage eficiency, and
enable new use cases.
6 Memory virtualization implementations are distinguished from shared
memory systems.
7 Shared memory systems do not permit abstraction of memory resources,
thus requiring implementation with a single operating system instance
(i.e., not within a clustered application environment).
Cloud Computing 2-31 E (CSIT-Sem-7)

8 Memory virtualization is different from storage based on flash memory


such as Solid-State Drives (SSDs) -SSDs and other similar technologies
replace hard-drives (networked or otherwise), while memory
virtualization replaces or complements traditional RAM.
Que 2.35.Write a short note on VO virtualization.
Answer
1. JO Virtualization (10V), or input/output virtualization, is technology
that uses software to abstract upper-layer protocols from physical
connections or physical transports.
2 This technique takes a single physical component and presents it to
devices as multiple components.
3
Because it separates logical resource from physical resources. IOV is
considered an enabling data center technology that aggregates IT
infrastructure as a shared pool, including computing, networking and
storage.
4 Recent Peripheral Component Interconnect express (PCle) virtualization
standards include single root VO virtualization (SR-IOV) and multi-root
VOvirtualization (MR-IOV).
5.
SR-IOV converts a hardware component into multiple logical partitions
that can simultaneously share access toa PCle device.
MR-IOV devices reside externally from the host and are shared across
6.
multiple hardware domains.

Que 2.36 How LVO virtualization works.

Answer
1 In VO virtualization, a virtual device is substituted for its physical
equivalent, such as a Network Interface Card (NIC) or Host Bus Adapter
(HBA).
setup
2 Aside from simplifying server configurations, /O virtualizationdevices.
has cost implications by reducing the electric power drawn by I/O
3
Virtualization and blade server technologies cram dense computing power
centers
into a small form factor. With the advent of virtualization, dataas burst
started using commodity hardware to support functions such
computing, load balancing and multi-tenant networked storage.
4
JOvirtualization is based on a one-to-many approach. The path between
a physical server and nearby peripherals is virtualized,
allowing a single
IT resource tobe shared among Virtual Machines (VMs).
5 The virtualized devices interoperate with commonly used applications,
operating systems and hypervisors.
2-32 E (CSIT-Sem-7) Cloud Enabling Technologies
6 This technique can be applied to any server component, including disk
based RAID controllers, Ethernet NICs, Fibre Channel HBAs, graphics
cards and internally znounted Solid-State Drives (SSDs). For example, a
single physical NIC is presented as a series of multiple virtual NICs.
Que 2.37 Describe virtualization support.
Answer
1 With the help of VM technology, a new computing mode known as cloud
computing is emerging. Cloud computing is transforming the computing
landscape by sharing the hardware and costs of managing a computational
center to third parties, just like bankS.
2 Cloud computing has atleast two challenges :
The ability to use a variable number of physical machines and VM
instances depending on the needs of a problem. For example, a task
may need only a single CPU during some phases of execution but
may need hundreds of CPUs at other times ?
The slow operation of instantiating new VMs. Currently, new VMs
originate either as fresh boots or as replicates of a template VM,
unaware of the current application state. Therefore, to support
cloud computing, a large amount of research and development is to
be done.

Que 2.38 Explain Disaster Recovery (DR) in cloud computing.


Answer
1 Disaster Recovery (DR) is one of the important factors for cloud
deployments.
2 DR defines the factors to ensure service availability and trust,
and help
todevelop credibility for the cloud vendor.
3 DR has been treated as separate disciplines that focused on
and recovering business operations having following planning
disruptions : catastrophic
Site/facility destruction, hurricanes, tornados, floods and fire.
Often long duration (days to weeks).
iüi. Often involves shifting work (and people) to alternate
facilities for
some period of time.
4. The objective of the DR plan is to provide critical IT service within a
stated period of time following the declaration of a disaster and perform
the following activities :
i Protect and maintain currency of vital records.
ii. Select a site or vendor that is capable of supporting the
of the critical application workload. requirements
Cloud Computing 2-33 E (CSIT-Sem-7)

ii. Provide a provision for the restoration of all IT services when


possible.
5. ADR plan includes procedures that will ensure the optimum availability
of the critical business function and the protection of vital records
necessary to restore all services to normal.
6. When DR plans fail, the failures primarily result from lack of HA (High
Availability) planning, preparation, and maintenance prior to the
occurrence of the disaster.
7 An infrastructure supporting high availability (HA) is essential for a
rapid DR. The system and application designs must be built to support
HAand rapid DR.
8 To prevent gaps in DR plans, recovery procedures, technology platforms,
and DR vendors, contracts must be updated concurrently with changes.
3
UNIT
Cloud Architecture,
Services and Storage

CONTENTS
Part-1 : Layered Cloud Architecture ........... 3-2E to 3-6E
Design, NIST Cloud Computing
Reference Architecture

Part-2 : Public, Private and ......... 3-6E to 3-14E


Hybrid Clouds
Part-3: laaS, PaaS, SaaS .3-14E to 3-26E
Part-4 : Architectural Design .3-26E to 3-32E
Challenges, Cloud Storage,
Storage-as-a-Service,
Advantages of Cloud
Storage, Cloud Storage
Providers-S3

31E(CNIT-Sem-7)
3-2E (CSIT-Sem-7)
Cloud Architecture, Services &Storage

PART- 1

Layered Cloud Architecture Design, NIST Cloud Computing


Reference Architecture.

Questions-Answers
Questions
Long Answer Type and Medium Answer Type

Que 3.1. Explain the layered architecture ofa cloud.

Answer
Layered architecture of acloud:
Application layer

(Web services, multimedia, business application s)

Platforms layer
(Software framework)

Infrastructure layer

(Storages, virtual machine)

Datacenter layer

(CPU, memory, disk, bandwidth)

1. Application layer :
used by
a. This layer consists of different cloud services which are
cloud users.
b These applications provide services to the end user as per their
requirements.
2. Platform layer :
a. This layer consists of application software and operating system.
b. The objective of this layer is to deploy applications directly on the
virtual machines.
Cloud Computing 3-3E(CNIT-Sem-7)
3. Infrastrueture layer :
It in avirtualization layer where physical resources are
into set of virtual resources through different partitioned
technologiessuch as Xen, KVM andVMware. virtualization
This layer is the core of the cloud environment where cloud resources
nre dynamically provisioned using different
technologies. virtualization
4. Datacenter layer :
This layer is accountable for managing physical resources such as
Nervers, Nwitches, routers, power supply, and
in the datacenter of the cloud environment. cooling system et.,
b All the resources are available and managed in
datacenters to
provide Nervices to the end user.
The dataconter consists of physical servers, connected through
high speed deviceN such as router and gwitches.
Que 3.2. Describe briefly NIST cloud computing reference
architecture.

Answer
NIST cloud computing architecture :

Cloud
consumer

Cloud provider Cloud


Cloud broker
auditor

Cloud carrier
1. Cloud consumer :
Acloud consumer is the end user who browses or
utilizes the
services provided by Cloud Service Providers (CSP), sets up service
contracts with the cloud provider.
In this, set of organizations having mutual
performs a security and risk assessment forregulatory constraints
cach use case of cloud
migrations and deployments.
i. Cloudconsumers use Service-LevelAgreement (SLAs) to
the technical performance specify
provider.
requirements to be fulfilled by a cloud
iv. SLAs can cover terms concerning the
and remedies for performance failures.quality service, security,
of
34E (CSIT-Sem-7) Cloud Architecture, Services &Storage

2. Cloud auditor :
Cloud auditor is an entity that can conduct independent assessment
of cloud services, security, performance and information system
operations of the cloud implementations.
i. The services that are provided by Cloud Service Providers (CSP)
can be evaluated by service auditors in terms of privacy impact,
security control and performance, etc.
iü. Cloud Auditor can make assessment of the security controls in the
information system to determine the extent to which the controls
are implemented correctly, operating as planned and constructing
necessities
the desired outcome with respect to meeting the security
for the system.
auditor :
iv. There are three major roles of cloud
a. Security audit
b Privacy impact audit
C.
Performance audit
3. Cloud service providers :
services to cloud consumers
i It is a group or object that delivers cloud
or end users.
variety of cloud services
.H
It offers consumers to purchase a growing
from cloud service providers.
cloud-based services:
ii. There are various categories of
providers
a. laaS providers : In this model, the cloud service
in an on
offer infrastructure components that would exist servers,
premises datacenter. These compcnents consist of
networking and storage as well as the virtualization layer.
Software-as-a-Service (SaaS), vendors
b. SaaS providers : In technologies, such as
provide a wide sequence of business Customer
Human Resources Management (HRM) software, which the
all
Relationship Management (CRM) software, internet.of
SaaS vendor hosts and provide services through
(PaaS), vend
C. PaaS providers : In Platform-as-a-Service
that can access to
offer cloud infrastructure and services
products are
perform many functions. In PaaS, services andproviders offer
mostly utilized in software development. PaaS
providers provide
more services than laaS providers. PaaS application stack,
operating system and middleware along with
tothe underlying infrastructure.
4. Cloud broker: performance, use and
An organization or a unit that manages the offers
delivery of cloud services by enhancing specific capability and
the value-added services to cloud consumers.
into one or more new
It combines and integrates various services
services.
Cloud Computing 3-5 E (CSIT-Sem-7)

ii They provide service arbitrage which allows flexibility and


opportunistic choices.
iv There are major three services offered by a cloud broker :
a. Service intermediation
b. Service aggregation
C. Service arbitrage
5. Cloud carrier:
i The mediator who offer connectivity and transport of cloud services
within cloud service providers and cloud consumers.
It allows access to the services of cloud through Internet network,
telecommunication, and other access devices.
Que 3.3. Discuss the scope between provider and consumer of
NIST cloud computing reference architecture.
Answer
1 The cloud provider and cloud consumer share the control of resources
in a cloud system.
2. This analysis of description of controls over the application stack helps
to understand the responsibilities of parties involved in managing the
cloud application.
Cloud consumer
Paas
|Application layer IaaS

SaaS
Paas Middleware layer
Operating system
layer

Cloud provider
Fig. 3.3.1. Scope of controls between provider and consumer.
3. The application layer includes software applications targeted at end
users or programs.
4 The applications are used by SaaS consumers, or installed/managed/
maintained by PaaS consumers, IaaS consumers, and SaaS providers.
5. The middleware layer provides software building blocks (for example,
ibraries, database, and Java Virtual Machine) for
software in the cloud. The middleware is used develcping application
by PaaS consumers,
installed/managed/maintained by laaS consumers or PaaS providers,
and hidden fromn SaaS consumers.
3-6E (CSIT-Sem-7) Cloud Architecture, Services &Storage

6. The OS layer includes operating system and drivers, and is hidden from
SaaS consumers and PaaS consumers.
7 An laaS cloud allows one or multiple guest OS's to run virtualized on a
single physical host.
8 Generally, consumers have broad freedom to choose which OS to be
hosted among all the OS's that could be supported by the cloud provider.
The laaS consumers should assume full responsibility for the guest
OS's, while the laaS provider controls the host OS.

PART-2

Public, Private and Hybrid Clouds.

Questions-Answers

Long Answer Type and Medium Answer Type Questions

Que 3.4. Write a short note on public cloud.

Answer
Public cloud is a cloud in which the cloud infrastructure and computing
1
network.
resources are made available to the general public over a public
Public cloud offers resource pooling, self-service, service accounting,
2
elasticity, multi-tenancy to manage the solutions, deployment, and
securing the resources and applications.
Public cloud

Cloud

Fig. 3.4.1. Public cloud.


Cloud Computing 3-7 E (CSIT-Sem-7)
4
Eiiterprises are able tooffload commodity applications to third-party
service providers (hosters).
5. The term 'public' does not mean:
a.
That it is free, even though it can be free or fairly
use. inexpensive to
b. That a user's data is
publicly visible - public cloud vendors typically
provide an access control mechanism for their users.
6. Following are the examples of publiccloud
application :
Public facing web pages
b Public Wiki's and blogs
C. Jobs resembling batch processing with lower
d
security constraints.
Data intensive workloads
7. The services consumed from a public cloud are as
follows :
i. Security and data privacy
ii Ease of access
iii. Discovery of services
iv. RESTful interface support
V. Lower cost
vi. Speed and availability
Que 3.5. Discuss security in a public cloud.
Answer
Security in a public cloud :
1. Multi-tenancy :
i As long as the cloud provider builds its security to
risk client requirements, all of the meet the higher
lower-risk clients get better
security than they would have normally.
A bandage manufacturer may have a low
risk of being a direct
target of malfeasance, but a music label that is
sharers could have a high risk of being targetedcurrently using file
by malfeasance.
ii. When both the bandage
manufacturer
same cloud (multi-tenancy),
and the musiclabel use the
it is possible that attacks directed at
the music label could affect the
infrastructure as well. bandage manufacturer's
iv. So, the cloud provider must design the
of the music label and the security to meet the needs
bandage manufacturer gets the benefits.
2 Security review :
As the time passes, organizations become
policies. lenient with their security
3-8 E (CSTT-Sem-7) Cloud Architecture, Services &Storage

i. In order to tackle security review, cloud service provider should


conduct regular audits, review, and assessments for the security.
üi. This should be done by security specialists who are able to identify
the issues and fix them.
immediately after the
iv. The report should be provided to each clientknow the current state
assessment is performed so that the clients
of the overall cloud's security.
Mutual risk :
i There can be a situation where the cloud service provider may not
be the cloud operator, but providing a value-added service on top of
another cloud provider's service.
is good to
Like somebody wants to offer the SaaS-based services, itthe SaaS
offer
lease the infrastructure of an laaS provider and
infrastructure from the
based services instead of building the
scratch.
each
ii. Inthis way, the tiers of IaaS and SaaS are developed on top of
other.
operator and service
iv. In this setup,there is a risk associated to each
provider and it is shared among them.
They share the security risks at different levels.
should be devised to suit
vi. Therefore, a holistic risk mitigation plan
the architecture of the cloud provider.
4 Employee physical screening:
organizations to hire
i. In this outsourcing world, it is common for the
for the cloud service
the contract services. Same thing works
providers.
background verification
i. Like regular employees, contract employeeservice provider.
should be done by a third party for cloud
all type of employees
ii. Service provider should publish its policy to employees once the
and report should be generated for the
background verification is accomplished.
between the user and the service
iv. This screening establishes the trust
provider.
5. Multi-geographical datacenters:
i. Disasters, whether man-made or natural, are part of life.
practice, the
They can be storm, earthquakes, fire, or cable cuts. In
cloud is areliable modelas it is not based on single or one location
hence,
based datacenter. Cloud datacenters are distributed and
less prone to disasters.
services for
ii. But sometimes organizations sign up the public cloud
one location only.
Cloud Computing 3-9 E (CSIT-Sem-7)

iv. In this case, it is more important for the providers to test their
disaster recovery option as they are heavily tied with SLAB and
penalties.
V At the same time, organization as a consumer should als0 check
and test the disaster recovery options with mock drills of fail over.
6. Physical security:Physical threats are also important to be analyzed
when opting for cloud services from a provider. There are various points
tobe analyzed:
i. Whether allthe facilities of the cloud provider have the same level
of security ?
ii Is it possible that only one site is secured and there is no information
available for the data residency ?
iüi. Whether datacenter is having all the necessary physical security
components such as biometric access, surveillance cameras, logbook,
escorts, and automatic alarms ?
7. Regulations :
i If any of the service provider says that they never had a security
issue, it means they are either misleading or not aware of the
consequences of the incidents.
i. So, all cloud service providers should have a special task force for
any incident response based on the policies and regulations.
ii. These policies should be shared with the end customers also.
8. Programming conventions :
1. Whether it is IaaS, SaaS, or PaaS, cloud providers still use their
own software that may be prone to security threats and bugs.
It is recommended to the cloud providers to use the secure coding
and programming practices. It should be based on standards that
are well documented, reviewed, accepted, and adhered.
9. Data control :
Today in the security domain, an organization's greatest risk is daa
and information control.
All governments and corporate organizations have laid down
compliances and regulations to handle the situation.
i. Therefore, the cloud service provider should be able to adhere to
the guidelines laid by the region or agency.
iv. The cloud provider should own the policies to meet the regulation
and compliances.
V. There should be strong encryption mechanism for the in-flight
data.

Que 3.6. Write down the advantages and disadvantages of public


cloud.
3-10 E (CSIT-Sem-7) Cloud Architecture, Services &Storage

Answer
Advantages of public cloud:
1. Flexible
2 Reliable
3 High scalable
4 Low cost
5. Place independence
Disadvantages of public cloud:
1 Less secured
2 Poor customizable

Que 3.7. What do youmean by private cloud ?

Answer
1 Private clouds are deployments made inside the company's firewall (on
premise datacenters) and traditionally run by on-site servers.
2. Private clouds offer some of the benefits of a public cloud computing
environment, such as elastic on-demand capacity, self-service
provisioning, and service-based access.
3 Private cloud is suitable when the traditional requirements, such as
control, security, and resiliency, are more emphasized by an organization
with the restricted and designated user access and authorization.
Services in private cloud:
1. Virtualization
2 Government and management
3. Multi-tenancy
4 Consistent deployment
5. Chargeback and pricing
6 Security and access control
Benefits of using private clouds :
1. Eliminating capital expenses and operating costs :
Ownership of the hardware or software eliminates the pay-per
use potential, as these must be upfront purchases.
The full cost of operations must be shouldered as there is no
elasticity.
iüi. If the private cloud hardware is sized for peak loads, there will be
inefficient excess capacity.
iv. Otherwise, the owner will face complex procurement cycles.
Cloud Computing 3-11 E (CSIT-Sem-7)
2. Removing undifferentiated heavy lifting by offloading data
center operations :
i Utility pricing (for lower capital expenses and
operating expenses)
usually implies an outside vendor offering on-demand
. It relies on the economies of services.
of resources. multiple tenants sharing a larger pool
ii. These higher costs might be justified if the
easier self-service provisioning and benefits of quicker and
service-oriented access are large.
Que 3.8. What are the types of
private cloud ?
Answer
Types of private cloud :
1. Shared private cloud:
a. This is a shared compute capacity with variable
to business units that are based on usage-based pricing
service offerings, accounts data
centers.
b. It requires an internal profit center to take over or buy
made available through account consolidations. infrastructure
2 Dedicated private cloud:
a
Dedicated private cloud has IT service catalog with dynamic
provisioning.
b. It depends on standardized
Service-Oriented Architecture (SOA)
assets that can be broadly deployed into new and existing accounts
and is a lower-cost model.
3. Dynamic private cloud:
a Dynamic private cloud allows client workloads to dynamically
migrate from and to the compute cloud as needed.
b This model can be shared and dedicated.
C It delivers the ultimate value of clouds.
d This is a very low-management model with reliable SLAs and
scalability.
Que 3.9. Write down the advantages and disadvantages of private
cloud.

Answer
Advantages of private cloud :
1. Highly privateand secured: Private cloud resource
secured.
sharing is highly
3-12 E (CSIT-Sem-7) Cloud Architecture, Services &Storage

2 Control oriented : Private clouds provide more control over its


resources than public cloud as it can be accessed within the organization's
boundary.
Disadvantages of private cloud :
1. Poor scalability :Private type of clouds is scaled within internal limited
hosted resources.
2 Costly: It provides secured and more features, so it's more expensive
than a public cloud.
3. Pricing: It is inflexible i.e., purchasing newhardware for up-gradation
is more costly.
4. Restriction : It can be accessed locally within an organization and is
difficult to expose globally.
Que 3.10.Explain hybrid cloud.

Answer
1. Ahybrid cloud is a combination of an interoperating public and private
cloud.

2
This is the model where consumer takes the non-critical application or
information and compute requirements to the public cloud while keeping
all the critical information and application data in control.
3 The hybrid model is used by both public and private clouds
simultaneously.
4.
It is an intermediate step in the evolution process, providing businesses
on-ramp from their current IT environment into the cloud.
5. It offers the best of both cloud worlds - the scale and convenience of a
public cloud and the control and reliability of on-premises software and
infrastructure - and let them move fluidly between the two on the basis
of their needs.
6 This model allows the following :
a Elasticity is the ability to scale capacity up or down within minutes,
without owning the capital expense of the hardware or datacenter.
b. Pay-as-you-go pricing.
C.
Network isolation and secure connectivity as if all the resources
were ina privately owned datacenter.
d. Gradually move to the public cloud configuration, replicate an entire
datacenter, or move anywhere in between.
Cloud Computing 3-13 E (CSIT-Sem-7)

'Community
cloud
Private cloud

Public cloud

Fig. 3.10.1. Hybrid cloud.

Que 3.11. How can we manage hybrid cloud ? Explain.


Answer
1. A management strategy for hybrid cloud should define what we need to
manage and how best to do that.
2. Hybrid cloud consists of an internal private cloud and contracts with one
or more public cloud providers.
3 Hybrid cloud administrators are responsible for managing computing,
networking and storage resources in multiple domains.
4. Over the time, combination of domains will change, but our management
strategy and tools should remain the same.
5. In a hybrid cloud, the management system should provide the means
for the user tomake submissions without the need to choose or indicate
the localization of the computational resources to be used.
6 The hybrid cloud management system must implement means to deploy
interfaces with each public cloud to be used, as well as with the private
cloud resources.
7. The workload management system is tightly coupled to the resource
management system. Besides the submission interface, which interacts
with users, two other main actors appear to manage the workload
execution in hybrid cloud:the dispatcher/scheduler and the application.
8 Configuration and installIment management policies should specify rules
governing the creation, deployment, patching and rebuilding of images.
a. Access control policies should be in place when sensitive data and
restricted applications, such as programs containing high-value
intellectual property, are being used in the private or apublic cloud.
b
Budget management and reporting policies should specify how cloud
users willreceive information regarding costs and use.
Que 3.12. Write down the advantages and disadvantages of hybrid
cloud.
3-14 E (CSIT-Sem-7) Cloud Architecture, Services &Storage

Answer
Advantages of hybridcloud:
1. Flexible 2. Secure
3 Cost effective 4. Scalable
Disadvantages of hybrid cloud:
1 Complex networking problem
2. Organization's security compliance
Que 3.13. Differentiate between public, private, hybrid cloud.
Answer

S. No. Public cloud Private cloud Hybrid cloud


1 A deployment Adeployment model| Acomposition of
model that renders that operates for a private and public
services over a single organization. cloud that offer
network for public benefits of multiple
use. deployment models.
2 It is less secure. It offers more Itis more secure than
security. public cloud.
3. It offers services to It offers services to It offers services of
the general public. an organization. both private and
public cloud as it is a
combination of both.

4. Itis highly scalable Not very scalable| It provides scalability


as it can be scaled because it can be according to the
downscaled only with the publiccloud scalability
depending on the capacity of internal and private cloud
|requirement. hosted resources. scalability in it.
5. Requires aminimum More expensive. Cost effective than
cost. private cloud.

PART-3

laaS, PaaS, SaaS.

Questions-Answers
Long Answer Type and Medium Answer Type Questions
Cloud Computing 3-15 E (CS/IT-Sem-7)

Que 3.14. Explain Infrastructure-as-a-Service (IaaS).


Answer
1. In Infrastructure-as-a-Service (laaS), an organization outsources the
infrastructure related to the storage, hardware, servers and networking
components to the service provider.
2. laaS is also referred to as
Hardware-as-a-Service (HaaS).
of applications requires huge initial investment for setting upDeployment
hardware,
storage devices and networking components in addition to the
maintenance of the hardware and storage devices, a large amount of
electricity is also needed to power the servers as well as to keep the data
center cool.
3. In case of laaS, the client typically pays on a per-use
basis to the
provider. Common characteristics and components of laaS includeservice
utility
computing service, billing model, automation of administrative tasks,
dynamic scaling, virtualization, policy-based services and network
connectivity.
4 The billing is usually on an hourly, daily or monthly basis based on the
actual consumption of the resources.
5. It is not like the conventional services in which we
pay a fixed amount
whether we use the resources or not.

Load balancer

VM VM VM VM VM VM
laaS

Virtualization Layer

Processor |Memory Storage Network3


Physical shared infrastructure
Fig, 3.14.1. IaaS.
6 Use of laaS is quite rational as it is cost
huge investment on hardware. effective and makes us free from
3-16 E (CSIT-Sem-7) Cloud Architecture, Services &Storage

7. With laaS, one can configure the required resources as per the
requirement and the user can increase or decrease capacity within
minutes.
8 We can ask for one, hundreds or even thousands of server instances
simultaneously as per our computing need. Good service provider ensures
99.99% availability of the service wthin aregion over atrailing 365 day
period.
9 The laaS service provider ensures that the infrastructural needs of the
virtual machine are continuously met. With the quick availability of
laaS and infrastructure delivered as a service, it frees the organization
to focus their time and resources in bringing innovations in applications
and solutions.
10. However, it is the responsibility of the user to invest on the operating
system and application software.
Que 3.15. What are the advantages and disadvantages of IaaS ?

Answer
Advantages of IaaS:
1. Allows IT to shift focus: With the quick availability of laaSservices,
infrastructure delivered as a service (ready to consume), it frees an
organization to leverage and focus their time and resources in bringing
innovations in applications and solutions.
2 Hassle free service:
i Each infrastructure component is provided as a service.
For example, hardware as a service, server as a service, computing
as a service, storage as a service.
iüü. This adds lot offlexibility to anyone looking for only specific services.
iv. Some require more computing power and others more storage.
3 Utility service:
laaS follows a utility service model - pay per-use/pay per-go
subscription based model.
i. Availability of ready to go laaS offerings with limited time for
implementation and customization (if provided).
iüi. This is hallmark of cloud services.
4. Dynamie scaling:
Scales up and down of infrastructure services based on the
application usage, best for the applications where there are
significant spikes and troughs on the usage of infrastructures.
This again is one of the pillars of cloud computing services.
Cloud Computing 3-17 E (CSIT-Sem-7)

5. Multiple tenants : Service provisioning includes multiple users


accessing same piece of infrastructure.
6 Investment cap:
More beneficial for companies with limited capital to invest in
hardware and infrastructure.
ii. Most small and medium businesses cannot afford the upfront cost
of their IT infrastructure as they want to focus more on their
product offering/core business.
Disadvantages of laaS :
1. Security :The enterprise does not have any control over cloud security
in an laaS environment. They need to review the cloud service provider's
Service Level Agreement (SLA) to help them understand its security
obligations and thereby identifying gaps in their security coverage.
2. Lack of flexibility : Service providers maintain the software, but they
do not upgrade the software for some of the businesses.
3. Technical problems : Organizations faces some down-time with laaS,
and it will restrict their access to applications and data.
4. Over dependency : Having IaaS in our organization means have a full
dependency on the provider or third party for our data.
5. Upgrade and maintenance : The organization is solely responsible
for any upgrades of software and maintenance of tools or data system.
6. Virtualization services and user-privacy : laaS depends on
virtualization services. Also, restricts user-privacy and customization.
Que 3.16. Discuss the vendors of laaS cloud computing platform.
Answer
Vendors providing IaaS cloud computing platform :
1. Amazon web services:
i Its solution are Elastic, Elastic Compute Cloud (EC2), MapReduce,
Route S3, Virtual Private Cloud, etc.
The cloud computing platform pioneer, Amazon offers auto scaling,
cloud monitoring, and load balancing features as part ofits portfolio.
2. Reliance communications :
i. Its solution is Reliance Internet Data Center (RIDC).
ii RIDC supports both traditional hosting and cloud services, with
datacenters in Mumbai, Bangalore, Hyderabad, and Chennai. The
cloud services offered by RIDC include laaS and SaaS.
3. Sify technologies :
i Its solution is Sify IaaS.
Sify's cloud computing platform is powered by HP's converged
infrastructure. The vendor offers all three types of cloud services:
laaS, PaaS, and SaaS.
3-18 E (CSIT-Sem-7) Cloud Architecture, Services &Storage

4. Tata communications :
Its solution is InstaCompute.
InstaCompute is Tata Communications laaS offering. InstaCompute
datacenters are located in Hyderabad and Singapore, with
operations in both countries.

Que 3.17.Explain Platform-as-a-Service(PaaS) in brief.


Answer
1 Platform-as-a-Service (PaaS) is a category of cloud computing services
that provides a platform allowing customers to develop, run, and manage
applications without the complexity of building and maintaining the
infrastructure typically associated with developing and launching an
app.
2 PaaS can be delivered in two ways :
As a public cloud service from a provider, where the consumer
controls software deployment with minimal configuration options,
and the provider provides the networks, servers, storage, OS,
'middleware' (i.e., java runtime, .net runtime, integration, etc.),
database andother services to host the consumer's application.
As a private service (software) inside the firewall, or as software
deployed on a public infrastructure as a service.
Application developers

Load balancer

Application runtime Database


instance instances

PaaS

Virtualization layer

Application runtimes Database

Development platform
Fig. 3.17.1. PaaS.
Cloud Computing -19 E(CNIT-Sem-7)
3. Peatures of PaaS:
Operating system
ii. Server-side scripting environment
ii. Database management system
iv. Server software
v. Support
vi. Storage
vii. INetwork access
vii. Tools for design and development
ix. Hosting

Que 3.18. What are the advantages and disadvantages of PaaS ?


Answer
Advantages of PaaS:
1. Simple and convenient for users : It provides much of the
infrastructure and other IT services, which users can access anywhere
through a web browser.
2. Cost effective: It charges for the services provided on a per-use basis
thus eliminating the expenses one may have for on-premises hardware
and software.
3. Eficiently managing the lifecycle : It is designed to support the
complete web application lifecycle: building, testing, deploying, managing
and updating.
4 Efficiency : It allows for higher-level programming with reduced
complexity thus, the overall development of the application can be more
effective

Disadvantages of PaaS:
1 Developers may not be able to use a full range of conventional tools (for
example, relational databases witn unrestricted joins).
2 It locked into a certain platform. However, most PaaS are relatively
lock-in free.

Que 3.19.Give characteristics of PaaS.


Answer
The main characteristies of PaaS are :
1. Runtime framework:
a. This is the "software stack" aspect of PaaS, and perhaps the aspect
that comes first to mind for most people.
3-20 E (CSIT-Sem-7) Cloud Architecture, Services & Storage

b. The PaaS runtime framework executes end user code according to


policies set by the application owner and cloud provider.
C. PaaS runtime frameworks come in many flavours, some based on
traditional application runtimes, others based on 4GL and visual
programming concepts, and some with pluggable support for multiple
application runtimes.
2 Abstraction:
Platform-oriented cloud platforms are distinguished by the hgher
level of abstraction they provide.
b With laaS, the focus is on delivering to user raw access to physical
or virtual infrastructure.
C In contrast with PaaS, the focus is on the applications that the cloud
must support.
d Whereas an laaS cloud gives the user a bunch of virtual machines
that must be configured and to which application components must
be deployed, a PaaS cloud provides the user a way to deploy the
applications into a seemingly limitless pol of computing resources,
eliminating the complexity of deployment and infrastructure
configuration.
3. Automation : PaaS environments automate the process of deploying
applications to infrastructure, configuring application components,
provisioning and configuring supporting technology like load balancers
and databases, and managing system change based on policies set by the
user.

4. Cloud services :
a PaaS provide developers and architects with services and APls that
help to simplify the job of delivering elastically scalable, highly
available cloud applications.
b These cloud services provide a wide variety of capabilities key
differentiators among competing PaaS oferings.
Que 3.20. Write down the vendors of PaaS cloud computing
platform.
Answer
Vendors providing PaaS cloud computing platform :
1 Google Apps Engine (GAE)
2 SalesForce.com
3 Windows Azure
4. AppFog
5. Openshift
6. Cloud foundry from VMware
Cloud Computing 3-21 E (CSIT-Sem-7)

Que 3.21.What do you mean by cloud platform?


-Answer
1 Cloud platform lets developers to write applications that run in the
cloud, or use services provided from the cloud, or both. Cloud platform is
also known as on-demand platform and
2
Platform-as-a-Service (PaaS).
When a development team creates an on-premises application (i.e., one
that will run within an organization), much of what that application
needs already exists.
3 An operating system provides basic support for executing the application,
interacting with storage, and more, while other computers in the
environment offer services such as remote storage.
4. If the creators of every on-premises application first had to build all of
these basics,we have many fewer applications today.
5. Similarly, if every development team that wishes to create a cloud
application must first build its own cloud platform, we would not see
many cloud applications.
6 Vendors are rising to this challenge, and a number of cloud platform
technologies are available today.
7. The goal is to categorize and briefly describe those technologies as they
are seen by someone who creates enterprise applications.
8 To get a grip on cloud platforms, it is useful to start by looking at cloud
services in general.
9 Three broad categories of services in cloud:
a.
Software-as-a-Service (SaaS):
i A SaaS application runs entirely in the cloud (i.e., on servers at
an internet-accessible service provider).
The on-premises client is typically a browser or some other
simple client. For example, salesforce.com.
b. Attached services:
i. Every on-premises application provides useful functions on its
own. An application can sometimes enhance application-specific
services provided in the cloud.
Because these services are usable only by this particular
application, they can be thought of as attached to it. For example,
Apple's iTunes.
iüi. The desktop application is useful for playing music and more,
while an attached service allows buying new audio and video
content.
iv. Microsoft's exchange hosted services provides an enterprise
example, adding cloud-based spam filtering, archiving, and
other services to an on-premises exchange server.
3-22 E (CSIT-Sem-7) Cloud Architecture, Services &Storage
C. Cloud platforms :
i. A cloud platform provides cloud-based services for creating
applications. Rather than building their own custom foundation,
for example, the creators of a new SaaS application could
instead build on a cloud platform.
ii. In Fig. 3.21.1, the direct users of acloud platform are developers,
not end users.
Software-as-a-Service Attached Cloud
(SaaS) services platforms
Extra (Application)
Cloud (Application) functions,
Platform

Browser (Application (Application)


client

Users Users Developers


Fig. 3.21.1.
Que 3.22. Explain Software-as-a-Service (SaaS) in brief.

Answer
1.
SaaS (Software-as-a-Service) is an application hosted on a remote server
and accessed through the internet.
2.
SaaS is the web-based e-mail service offered by companies such as
Microsoft (Hotmail), Coogle (Gmail), and Yahoo! (Yahoo Mail).
3.
Each mail service meets the basic criteria, the vendor (Microsoft, Yahoo,
and so on) hosts all of the programs and data in a central location,
is
providing end users with access to the data and software, which
accessed across the World Wide Web.
SaaS application delivered to client

World Wide Web

Client Vendor offering SaaS


application
Fig. 3.22.1.
Cloud Computing 3-23 E (CSIT-Sem-7)

5. Two major categories of SaaS:


a. Line of business services :
These are business solutions offered to companies and
enterprises.
iü. They are sold through a subscription service.
ii. Applications covered under this category include business
processes, like supply chain management applications,
customer relations applications, and similar business-oriented
tools.
b. Customer-oriented services :
i These services are offered to the general public on a
E:
F:
subscription basis.
They are offered for free and supported by advertising.
ili. For example, web mail services, online
gaming, and consumer
banking, among others.

World Wide Web

Client Online e-mail service


Fig. 3.22.2. E-mail is stored by the vendor, and accessed by the client.

Que 3.23. What are the advantages of SaaS?


Answer
Advantages of SaaS :
1 There is a faster time to value and
improved productivity, when compared
to the long implementation cycles and failure rate of enterprise
software.
2 SaaS offerings feature the biggest cost savings over installed software
byeliminating the need for enterprises to install and maintain hardware,
pay labour costs, and maintain the applications.
3 SaaS can be used to avoid the custom development cycles to get
applications to the organizationquickly.
4 SaaS vendors typically have very accurate security audits.
Que 3.24. Explain software considerations in SaaS.
Answer
1 Using the existing software paradigm, the user purchases a software
package and license by paying a one time fee. The software then becomes
the property of the user who bought it.
2. Support and updates are provided by the vendor under the terms of the
license agreement. This can be costly ifwe are
on hundreds or thousands of computers. installing new application
a
3-24 E (CTT-Sem-7) Cloud Architecture, Services &Storage

3 SaaS, has no licensing. Rather than buying the application,we pay for it
through the use of a subscription, and we only pay for what we use. If
we stop using the application, we stop paying.

World Wide Web

Client Cloud vendor


Fig. 3.24.1.

Que 3.25. Give vendor advantages and limitations of SaaS.

Answer
Vendor advantages of SaaS:
1. SaaS not only does the end user benefit, but so does the vendor.
(They are in the business to make money, so there is at least that
benefit. )
2. Financial benefit is vendors get a constant stream of income, often what
is more than the traditional software licensing setup.
3
Vendors can fond off piracy concerns and unlicensed use of software.
4.
Vendors also benefit more as more subscribers come online.
5 They have a huge investment in physical space, hardware, technology
staff, and process development.
provider can
6 The more resources are used to capacity, the more the
clear as margin.
Limitations of SaaS:
1
Technical obstacles to SaaS have included an effective, multi-tenant
architecture. This has become less and less of a problem due to
virtualization, but designing an application to efficiently deliver it to
thousands of customers via the internet is hard work.
2 Software companies are being asked to become service companies, and
the two do not necessarily mesh well.
3 They tend to have a corporate culture that is dominated by engineering
innovation and a license-sales mindset. These are fine traits to have if
we are writing programs and applications, but it is not the best when we
are called upon for customer service.
4 Further, a business model that is built on selling licensed software does
not easily transform into a subscription model very cleanly. Not only
does the vendor face challenges, but so does the customer.
5 While some applications are ideal for SaaS, others are not good to use
employing an SaaS model.
Que 3.26. Write a short note on driving forces of SaaS.

A
Cloud Computing 3-25 E (CSIT-Sem-7)

Answe:
Driving forces of SaaS are:
1. Popularity :
1. SaaS has become big buzz in the already buzzy issue of cloud
computing.
SaaS is becoming trendy, because of its a number of factors. But
there are solid reasons other than type that make it so popular.
2. Plenty of SaaS platforms :
i. There are many SaaS platforms which grow each rapidly.
ii For example, Oracle is developing its own SaaS platform while
Microsoft is working tomake their own applications SaaS ready.
ii. As SaaS becomes more and more popular, more vendors are going
to be forced to make their platforms SaaS-friendly for SaaS-based
applications.
iv. Another reason SaaS platforms will continue to grow is because of
the interest in Green IT and the efforts to move toward virtualized
infrastructure.
V That means clients are likely to move toward SaaS platforms so
they can reduce the number of servers.
3. Virtualization benefits:
Virtualization makes it easy to move to a SaaS system.
It is easier for Independent Software Vendors (ISVs) to adopt SaaS
is the growth of virtualization.
ii. The growing popularity of some SaaS vendors using Amazon's EC2
cloud platform and the overall popularity of virtualized platforms
help with the development of SaaS.
4. SaaS and SOA:
AService-Oriented Architecture (SOA) is one in which IT supports
the business processes that cover current and emerging
requirements to run the business end-to-end.
This ranges from Electronic Data Interchange (EDI) to online
auctions. By updating older technologies like Internet-enabling EDI
based systems companies can make their IT systems available to
internal or external customers.
iii. SOA unifies business processes by structuring large applications as
a collection of smaller modules known as services.
iv. SOA presents a design framework for realizing rapid and low-cost
system development and improving total system quality. SaaS and
SOA are quite similar; what they have in common is that they use
a service model.
5. Economic impact :
i. Many industry observers think conventional ISVs will have a
tougher time than SaaS vendors.
3-26 E (CSIT-Senm-7) Cloud Architecture, Services &Storage

The subscription-based payment model of SaaS makes it more


appealing in these tough times.
ii. The ability to quickly and easily turn on new applications with a
significantly lower initial cost of ownership makes SaaS an attractive
offering for small and mid-sized businesses, significantly expanding
the market for software applications.
iv. The benefits are likely to be key in a slower economic environment
where purchasers of software may be increasingly skeptical of
significant upfront investments which we anticipate to characterize.

Que 3.27. Differentiate between laaS, PaaS, SaaS.


Answer

S. No. IaaS PaaS SaaS


1 Infrastructure-as- Platform-as-a-Service. Software-as-a
a-Service. Service.

2. Aservice model inA cloud computing A service model in


cloud computingmodel that delivers cloud computing that
that provides tools necessary for hosts software and
virtualized application makes them available
computing development over the for clients over the
resources. internet. internet.

3. It provides access It provides runtime It provides software


to resources such environments as services to the end
a virtual development and users.

machines, virtual deployment tools for


storage etc. applications.
4 It is used by It is used by It is used by end users.
network developers.
architects.

PART-4

Architectural Design Challenges, Cloud Storage,


Storage-as-a-Service, Advantages of Cloud Storage, Cloud Storage
Providers-S3.

Questions-Answers
Long Answer Type and Medium Answer Type Questions
Cloud Computing 3-27 E (CSIT-Sem-7)

Que 3.28. Write short note on the architectural design challenges


in cloud.

Answer
Cloud architectural design challenges:
1. Service availability and data lock-in problem.
2. Data privacy and security concerns.
3. Unpredictable performance and bottlenecks.
4. Distributed storage and widespread software bugs.
5 Cloud scalability, interoperability, and standardization
6 Software licensing and reputation sharing.
Que 3.29. Write a short note on storage.
Answer
1. The necessary storage is provided and configured in much the same
way as the computing resources. IP-based storage systems are deployed.
2. To reduce hardware configuration effort, the computing systems use
direct-attached storage. Using Fiber-Channel (FC) cards in the servers
and deploying an FC network increases overall system complexity
substantially. The IP storage systems are linked via Giga-bit Ethernet.

Backup
integrate
Data storage Application OS Archive

Backup
DC 1 DC2
DWDM

Mirror
Fig. 3.29.1. Storage resource : backup-integrated,
read-only and archive storage.
3 Storage is automatically allocated to the server systems that require it.
Storage resources are located in different fire zones as well as in
different datacenters, preventing data loss in the event of a disaster.
3-28 E (CSIT-Sem-7) Cloud Architecture, Services & Storage

4 The storage system handles replication of data between datacenters


and fire zones. So, computing resources are not needed for this purpose.
5. In addition to storage resources, backups are necessary to safeguard
against data loss. For this reason, and in the interests of automation,
the Dynamic Data Center model directly couples backup to storage; in
other words, Backup-Integrated Storage (BIS) is provided, along with
full management functionality.
6 To accelerate backup and reduce the volume of data transferred, data
are backed up on hard disks within the storage system by means of snap
shooting.
7 This simplifies the structure of the computing systems and minimizes
the potential for temporal bottlenecks. Storage systems normaly provide
on
for 35-day storage period. Usually, the last three days are accessible
line, with the rest being accessible from a remote site.
8. Archive and other storage :
Archive systems are also available for long term data storage. Like
BIS, these are hard disk-based and linked via IP to the respective
systems. Data for archiving is replicated within the archive system
datacenter.
and in a separate fire zone, as well as ata remote
b Replication is handled by the archive system itself.
C Archiving can be initiated either from the applications themselves,
which then handle administration of all data, or via a document
cache.
management system. Some systems require a hard disk
This is not worth backing up via BIS, since data in a cache change
rapidly, and the original data are stored and backed up elsewhere
in the system.
Que 3.30. Describe cloud storage. What are the types of cloud
storage ?

Answer
the cloud,
1 Cloud storage is defined as the storage of data online in multiple
wherein a company's data is stored in and accessible from
distributed and connected resources that comprise a cloud.
2 Cloud storage can provide the benefits of greater accessibility and
backup,archival
reliability,rapid deployment, strong protection for datastorage costs as a
and disaster recovery purposes, and lower overall
result of not having to purchase, manage and maintain expensive
hardware.
3
Cloud storage does have the potential for security and compliance
concerns that are not associated with traditional storage systems.
Cloud Computing 3-29 E (CSTT-Sem-7)

Types of cloud storage :


1. Personal cloud storage :
It is also known as mobile cloud storage. Personal cloud
storage is a
subset ofpublic cloud storage that applies to storing an individual's
data in the cloud and providing the individual with access to the
data from anywhere.
ii. It provides data syncing and sharing capabilities across multiple
devices. Apple's iCloud is an example of personal cloud storage.
2. Public cloud storage :
Public cloud storage is where the enterprise and storage service
provider are separate and there aren't any cloud resources stored
in the enterprise's datacenter.
i. The cloud storage provider fully manages the enterprise's public
cloud storage.
3. Private cloud storage :
1 A form of cloud storage where the
enterprise and cloud storage
provider are integrated in the enterprise's datacenter.
In private cloud storage, the storage provider has
infrastructure in
the enterprise's datacenter that is typically managed by the
provider.
storage
ili. Private cloud storage helps to resolve the potential for security and
performance concerns while still offering the advantages of cloud
storage.
4. Hybrid cloud storage :Hybrid cloud storage is a combination of public
and private cloud storage where some critical data resides in the
enterprise's private cloud while other data is stored and accessible from
a public cloud storage provider.
Que 3.31. Write short note on Storage-as-a Service (SaaS).

Answer
1 Storage-as-a Service (SaaS) is abusiness model in which alarge company
rents space in their storage infrastructure to a smaller company or
individual.
2 In the enterprise, SaaS vendors are targeting
applications by promoting SaaS as a convenient way secondary storage
to manage backups.
3 The key advantage to SaaS in the enterprise is in cost
savings, in
personnel, in hardware and in physical storage space.
4 Storage-as-a-Service is generally seen as a good alternative for a small
or mid-sized business that lacks the capital budget
personnel to implement and maintain their own storageand/or technical
infrastructure.
3-30 E (CSIT-Sem-7) Cloud Architecture, Services &Storage

5. SaaS is also being promoted as a way for all businesses to mitigate risks
enhance
in disaster recovery, provide long-term retention for records and
both business continuity and availability.

Que 3.32. What are the advantages and disadvantages of cloud


storage ?
Answer
Advantages of cloud storage :
folders for Mac's and
1. Usability : All cloud storage services have desktop
PCs. This allows users to drag and drop files between the cloud storage
and their local storage.
2. Bandwidth:Avoid emailing files to people and send an internet link to
recipients through email.
3. Accessibility: Stored files can be retrieved from anywhere via Internet
connection.
have an
4 Disaster recovery : It is highly suggested that businesses
used as a
emergency backup plan ready in the case of a crisis. It can be
backup plan by companies by providing a second backup of important
and may be obtained
files. These records are saved at a remote location
through an online connection.
lower
5. Price savings : Businesses and organizations may frequently
observe extra
may
annual operating costs by using cloud storage. Users ability to store
cost savings because it does not require internal
information remotely.
Disadvantages of cloud storage :
a file to the
1. Usability : Be careful when using drag/drop to transfer from its
cloud storage folder. This may permanently move our record instead
original folder to the cloud storage place. Do a backup and paste
location in addition
of drag/drop if we want to retain the record's unique
totransferring a backup on the folder.
bandwidth
2 Bandwidth : Many storage services have a particular
allowance, further
allowance. When an organization exceeds the specified
unlimited
charges could be important. But some suppliers allow
bandwidth. This is a factor that firms should consider when looking at a
cloud storage supplier.
to our
3. Access : If we have no internet connection, we have no access
information.
4 Data security: There are concerns with the security and privacy of all
important data stored remotely. The possibilityof personal information
commingling with other businesses makes some companies
uncomfortable.
Cloud Computing 331E (CSIT-Sem-7)

Que 3.33. Explain cloud storage providers.


Answer
1. A cloud storage provider, also known as a Managed Service Provider
(MSP), is a company that offers organizations and individuals the ability
to place and retain data in an off-site storage system.
Customers can
lease cloud storage capacity per month or on demand.
2. A cloud storage provider hosts a customer's data in its own
datacenter,
providing fee-based computing, networking and storage infrastructure.
3 Both individual and corporate customers can get unlimited storage
capacity on a provider's servers at a low per-gigabyte price.
4 Rather than store data on local storage devices, such as a hard disk
drive, flash storage or tape, customers choose a cloud storage provider
to host data on a system in a remote datacenter. Users can then
access
those files using an internet connection.
5 The delivery of IT services via the internet is broadly defined as cloud
computing or utility computing. This business model first hit mainstream
enterprises with the rise of application service providers.
6 A
cloud storage provider also sells non-storage services for a fee.
7. Enterprises purchase compute, software, storage and related IT
components as discrete cloud services with a pay-as-you-go license.
8 For example, customers can opt to lease
infrastructure-as-a-service,
platform-as-a-service, or security, software and storage-as-a-service.
Que 3.34. What are the challenges faced by cloud service
providers?

Answer
Challenges faced by thecloud service providers :
1. Data corruption : Cloud services which host consumer data are usually
burdened with the responsibility of ensuring the integrity and availability
of these data, depending on the subscribed service level.
2. Logical security : In terms of information security, an appropriate
control of logical security should be adopted by the producer to ensure
adequate confidentiality (i.e., data and transactions are open only to
those who are authorized to view or access them).
3. Data interoperability :Producer should follow the interoperability
standards in order for the consumers to be able to combine any of the
cloud services into their solutions.
4. Software vulnerability and breaches : There are occasions when
the public community discovers vulnerabilities of specific software,
middleware, web services, or other network services components in the
3-32 E (CIT-Sem-7) Cloud Architecture, Services &Storage

software components. The producer should ensure that a proper strategy


and processes are in placed to address such vulnerabilities and fixed to
prevent breaches.

Que 3.35. Describe the two charging models of cloud service


provider.
Answer
Two charging models of cloud service provider are:
1. Utility model:
i.
Pay-per-use model where consumer is charged on the quantity of
similar to
cloud services usage and utilization. This model is
traditional electricity charges.
private
i. For example, a consumer uses secured storage to support its
work documentation. The consumer is charged yearly fee for every
a lower
10gigabytes of storage that is used. ThËs model provides
to actual
startup cost option for a customer in translating TCO
utilization.
2. Subscription model:
cloud services
Here the consumer is charged based on time-based
usage.

ii. For example, the consumer is charged yearly fee


for a dedicated
website. This model
storage of 10 gigabytes to host the company of
provides predictable cost outlay and provides a steady stream
revenue for the services provider.
4 UNIT Resource Management
and Security in Cloud

CONTENTS
Part-1 : Inter Cloud Resource 4-2E to 4-6E
Management
Part-2 : Resource Provisioning and 4-6E to 4-9E
Resource Provisioning Methods
Part-3 : Global Exchange of ...4-9E to 4-10E
Cloud Resources

Part-4: Security Overview, ... 4-11E to 4-15E


Cloud Security Challenges
Part-5 : Software-as-a-Service 4-15E to 4-25E
Security, Security
Governance, Virtual
Machine Security, IAM,
Security Standards

4-1 E (CSIT-Sem-7)
4-2 E (CSIT-Sem-7) Resource Management & Security in Cloud

PART- 1

Inter Cloud Resource Management.

Questions-Answers
Questions
Long Answer Type and Medium Answer Type

Que 4.1. Write a short note on inter cloud.

Answer
networks, including public,
1 Inter cloud is the concept of connected cloud
private, and hybrid clouds.
2 It incorporates a number of technology efforts that are put together to
networks.
improve interoperability and portability among cloud terms
cloud networks. The
3 The goal was to improve interoperability of
this concept.
inter cloud computing and intercloud were used to address
platforms and
Inter cloud is used to connect different cloud computingdatacenters
4. or
allows the data and applications to be ported between
cloud services.
service
5. The main focus is on direct interoperability between public cloud
providers.
interconnected clouds
6 To provide cloud services as utility successfully,
are required and interoperability and portability are important factors
in inter cloud.
resource.
7. The limitations of cloud are that they have limited physical
Explain the types of inter cloud resource management.
Que 4.2.

Answer
Types of inter cloud resource management are:
1. Federation clouds :
providers
i A federation cloud is an inter cloud where a set of cloud
willingly interconnect their cloud infrastructures in order to share
resources among each other.
i.
The cloud providers in the federation voluntarily collaborate to
exchange resources.
ii. This type of inter cloud is suitable for collaboration of governmental
clouds (Clouds owned and utilized by non-profit institution or
government) or private cloud portfolios (Cloud is a part of aportfolio
of clouds where the clouds belong to the same organization).
Cloud Computing 43E (CIT-Sem-7)

iv. This types of federation clouds are Peer-to-Peer and Centralized


clouds.
2. Multi-Cloud :
i. In a multi-cloud, a client or service uses multiple independent clouds.
A multi-cloud environment has no volunteer interconnection and
sharing of the cloud service provider infrastructures.
ii. Managing resource provisioning and scheduling is the responsibility
of client or their representatives.
iv. This approach is used toutilize resources from both governmental
clouds and private cloud portfolios.
V. This types of multi-cloud are services and libraries.

Que 4.3. Deseribe the challenges faced in federation of cloud


infrastructure.
Answer
The following are the challenges faced in federation of cloud
infrastructures:
1. Application service behaviour prediction :
It is important that the system should be able to predict the demands
and the behaviour of the services.
ii. Only when it can predict, it can take decisions intelligently to
dynamically scale up and down.
i. Prediction and forecasting models must be built.
iv. The challenge is to build such models that accurately learn and fit
statistical functions suitable to different behaviours. It is more
challenging to correlate between different behaviours of a service.
2 Flexible mapping of services to resources :
i It is important to maximize the efficiency, cost-effectiveness and
utilization because ofhigh operating costs and energy requirements.
The system has to compute the best software and hardware
configurations which result in acomplex process of mapping services
to cloud resources.
iii. Mapping of services must guarantee that QoS targets are satisfied
along with maximum system efficiency and utilization.
3. Economie models driven optimization techniques :
Combinatorial optimization problem is a market driven decision
making strategy which searches the optimal combinations of services
and deployment plans.
Optimization models must be developed which optimize both
resource-centric and user-centric QoS targets.
44E (CSTT-Sem-7) Resource Management &Security in Cloud

4. Integration and interoperability :


i. Sensitive data in an enterprise also may not be migrated to the
cloud for security reasons and privacy.
Aneed related to integration and interoperability arises between
identity
assets on premises and the cloud services. Issues related to
management, data management, and business process
orchestration need to be resolved.
5. Scalable monitoring of system components :
distributed but the
The components in a federated system are
techniques employed for system monitoring and managing use
centralized approaches.
arising
Due to concerns of scalability, performance and reliability
volume
from the management of multiple service queues and large and
of service requests, centralized approaches are not suitable
architectures using service monitoring and management services
based on decentralized messaging and indexing models are needed.
Que 4.4. Describe the topologies used in inter cloud architecture.

Answer
Topologies used in inter cloud architectures:
1. Peer-to-peer inter cloud federation :
i. Clouds collaborate directly with each other but may use distributed
entities for directories or brokering.
ii Clouds communicate with each other and negotiate directly without
mediators.
iüi. The inter cloud projects that use Peer-to-Peer federation are
RESERVOIR (Resources and Services Virtualization without
Barriers Project).
Centralized inter cloud federation:
Clouds use a central entity to perform or faciitate resource sharing.
The centralentity acts as a storehouse where the available cloud
resources are registered.
iüi. The inter cloud projects that use centralized inter cloud federation
are inter cloud, Dynamic Cloud Collaboration (DCC) and federated
cloud management.
3. Multi-cloud service :
i Clients access multiple clouds througha service.
Aservice is hosted by the cloud client either externally or in-house.
ii. The services contain broker components.
45E (CSIT-Sem-7)
Cloud Computing
services are OPTIMIS,
iv. The inter cloud projects that use multi-cloud cloud management
contrail, MOSAIC, STRATOS and commercial
systems.
4. Multi-cloud libraries :
as a
1 Clients develop their own brokers by using a unified cloud API
library. in a
i. Inter clouds that use libraries facilitate the usage of clouds
uniform way.
ii. Examples of Several Multi-cloud Libraries are Java library
J-clouds,
Python library Apache Lib-Clouds, Ruby library Apache Delta
Cloud.
Que 4.5. Explain the extended cloud computing services.

Answer
1 Fig. 4.5.1 shows six layers of cloud services ranging from hardware,
network, and collocation to infrastructure, platform, and software
applications.

Cloud application (SaaS)

Cloud software environment (PaaS)


Cloud software infrastructure
Computational Storage Communications
resources (IaaS) (DaaS) (CaaS)

Collocation cloud services (Laas)

Network cloud services (NaaS)

Hardware/Virtualization cloud services (HaaS)


Fig. 4.5.1. A stack of six layers of cloud services and their providers.
2 The top three service layers are SaaS, PaaS, and laaS.
3 The cloud platform provides PaaS, Which sits on top of the IaaS
infrastructure.
4 The top layer offers SaaS. These must be implemented on the cloud
platforms provided. Although the three basic models are dissimilar in
usage, they are built one on top of another.
5 The implication is that one cannot launch Sass applications with a cloud
platform. The cloud platform cannot be built if compute and storage
infrastructures are not there.
46E (CSTT-Sem-7) Resource Management &Security in Cloud

6 The bottom three layers are more related to physical requirements. The
bottom most layer provides Hardware-as-a-Service (HaaS).
7. The next layer is for interconnecting all the hardware components, and
is simply called Network-as-a-Service (NaaS). Virtual LANs fall within
the scope of NaaS.
The next layer up offers Location-as-a-Service (LaaS), which provides a
collocation service to house, power, and secure all the physical hardware
and network resources.
9 The cloud infrastructure layer can be further subdivided as Data-as-a
Service (DaaS) and Communication-as-a-Service (CaaS).

Que 4.6. Give the cloud difference in perspectives of providers,


vendors and users.
Answer
1 Table 4.6.1,shows that cloud players are divided into three classes :
a Cloud service providers and IT administrators.
b. Software developers or vendors.
C End users or business users.
and SaaS
2 These cloud players vary in their roles under the IaaS, PaaS
models.
viewed by
3 The table entries distinguish the three cloud models as
different players.
4 From the software vendors perspective, application performance on a
given cloud platform is most important.
performance is the
5 From the provider perspective, cloud infrastructure
primary concern.
security,
6 From the end users perspective, the quality of services,including
is the most important.
vendors and
Table 4.6.1. Cloud difference in perspectives of providers,
users.

PaaS SaaS
Cloud Players IaaS
Monitor SLAs and enable Monitor SLAs and
IT administration/ Monitor SLAs
service platforms deploy software
cloud providers
To deploy and store Enabling platforms via Develop and deploy
Software developers configurators and APls software
(vendors) data

To develop and test web Use business software


End users or business To deploy and store
data software
users

PART-2

Resource Provisioning and Resource Provisioning Methods.


Cloud Computing 4-7E (CTT-Sem-7)

Questions-Answers
Long Answer Type and Medium Answer Type Questions

Que 4.7. Explain resource provisioning.


Answer
1 Resource provisioning means the selection, deployment, and run-time
management of software (for example, database management servers,
load balancers) and hardware resources (for example, CPU,
and network) for ensuring guaranteed performance for
storage,
applications.
2 This resource provisioning takes Service Level Agreement (SLA) into
consideration for providing service to the cloud users.
3 This is an initial agreement between the cloud users and cloud service
providers which ensures Quality of Service (QoS) parameters like
performance, availability, reliability, response time etc.
4 Based on the application needs static provisioning dynamic
and static/dynamic allocation of resources have to be madeprovisioning
in order to
efficiently make use of the resources without violating SLA and meeting
these QoS parameters.
5 Over provisioning and under provisioning of resources must be avoided.

Que 4.8. What are the types of resource provisioning ?

Answer
Types of resource provisioning :
1. Static provisioning:
For applications that have predictable and generaly unchanging
demands workloads we use static provisioning effectively.
ii. With advance provisioning, the customer contracts with the provider
for services and the provider prepares the appropriate resources in
advance of start of service.
ii. The customer is charged a flat fee or is billed on a monthly basis.
2. Dynamic provisioning :
i. In cases where demand by applications may change
orvary, dynamic
provisioning techniques have been suggested whereby VTls may
be migrated on-the-fly to new compute nodes within the cloud.
ii With dynamic provisioning, the provider allocates more
as they are needed and removes them when they resources
are not. The
customer is billed on a pay-per-use basis. When dynamic
4-8E (CSIT-Semn-7) Resource Management &Security in Cloud

provisioning is used to create ahybrid cloud, it is sometimes referred


to as cloud bursting.
User self-provisioning :
1.
With user self-provisioning (also known as cloud self-service), the
customer purchases resources from the cloud provider through a
web form, creating a customer account and paying for resources
with a credit card.

Que 4.9. Describe briefly parameters used for resource


provisioning.

Answer
Parameters used for resource provisioning are :
i. Response time :The resource provisioning algorithm designed must
take minimal time to respond when executing the task.
be
ii. Minimize cost : From the cloud user point of view cost should
minimized.
cloud service
iii. Revenue maximization: This is to be achieved from the
provider's view.
provide service in
iv. Fault tolerance: The algorithmn should continue to
spite of failure of nodes.
V. Reduced SLA violation : The algorithm designed must be able to
reduce SILA violation.
migration
vi. Reduced power consumption : VM placement and
techniques must have lower power consumption.
Que 4.10. Describe the resource provisioning methods.
Answer

Resource provisioning methods are:


1. Demand-driven resource provisioning :
This method adds or removes computing instances based on the
current utilization level of the allocated resources.
: The demand-driven method automatically allocates two Xeon
processors for the user application, when the user was using one
extended
Xeon processor more than (A) percent of the time for an
period.
certain
iii. In general, when a resource has surpassed a threshold for a
amount of time, the scheme increases that resource based on
demand.
time.
iv. When a resource is below a threshold for a certain amount of
that resource could be decreased accordingly.
Cloud Computing 4-9 E (CSIT-Sem-7)
V.
Amazon implements such an auto-scale feature in its EC2 platform.
vi. This method is easy to implement. The scheme does not work out
right if the workload changes abruptly.
2. Event-driven resource provisioning :
This scheme adds or removes machine instances based on a specific
time event.
The scheme works better for seasonal or predicted events.
iii. During events, the number of users grows before the event period
and then decreases during the event period.
iv. This scheme anticipates peak traffic before it happens.
V. The method results in a minimal loss of QoS if the event is predicted
correctly.
vi. Otherwise, wasted resources are even greater due to events that
do not follow a fixed pattern.
3. Popularity-driven resource provisioning :
i. In this method the Internet searches for popularity of certain
applications and creates the instances by popularity demand.
The scheme anticipates increased traffic with porularity.
ii. The scheme has a minimal loss of QoS, if the predicted popularity is
correct. Resources may be wasted if traffic does not occur as
expected.

PART-3

Global Exchange of Cloud Resources.

Questions-Answers

Long Answer Type and Medium Answer Type Questions

Que 4.11. |Write ashort note on global exchange of cloudresources.


Answer
1 Enterprises employ cloud services in order to improve the scalability of
their services and to deal with bursts in resource demands.
2 However, at present, service providers have inflexible pricing, generally
limited to flat rates or tariffs based on usage thresholds, and consumers
are restricted to offerings from a single provider at a time.
3 For cloud computing to mature, it is required that the services follow
standard interfaces.
4-10 E (CSIT-Sem-7) Resource Management &Security in Cloud

4. This would enable services to be commoditised and thus, would pave the
way for the creation of a market infrastructure for trading in services.
5. The market directory allows participants to locate providers or consumers
with the right offers.
6. The banking system ensures that financial transactions pertaining to
agreements between participants are carried out.
Que 4.12. What are the market-oriented techniques ?

Answer
Various market-oriented techniques are:
1. Aneka:
i. Aneka is implied in Platform-as-a-Service type and offers platform
in cloud computing to its users making it convenient for them to
create and deploy applications.
Its unique feature is its flexible design and customization capability
that allows it to target different application scenarios.
2. Workflow engine :
in
i. The Workflow Management System (WMS) assists users
representing their applications as a workflow.
from higher
i. It then executes these workflows on the cloud platform
level of abstraction.
editor that allows for
ii. The WMS provisions an easy to use workflow
application composition.
3. MetaCDN:
low cost
i MetaCDN creates an integrated overlay network at a verymultiple
offered by
by exploiting storage cloud resources being
laaS vendors.
with multiple storage
It eradicates the difficulty arose due to dealing
providers.
4. CloudSim :
to the users that enable
i The CloudSim toolkit offers an environment
clouds.
extensible
them to model and simulate
applications executed.
iü. They offers platform where user can get theirallows extension and
customizable tool that
iii. It is a complete
description of policies in the software stack.
5. Resource management :
is considered as an
Resource management in cloud computing utilization of available
important aspect as it leads to proper optimum computing
resources for making a cloud as an
environment.
management falls under various
ii. The taxonomy of resource SLA-aware, market-oriented,
categories such as energy-aware,
cloud computing.
load balanced, hybrid cloud and mobile
Cloud Computing 4-11 E(CIT-Sem-7)

PART-4
Security Overview, Cloud Security Challenges.

Questions-Answers
Long Answer Type and Medium Answer Type Questions

Que 4.13. Give a schematic diagram of various cloud


security
challenges ?
Answer
1 Fig. 4.13.1 represents the schematic diagram showing the hierarchy of
the cloud computing, with security challenges on both the
cloud
computing models, deployment and service models and also the issues
related to networks.

Cloud computing
Security challenges

Deployment models Service model


Network issues

Private Public| Hybrid SaaS


Browser security
PaaS laaS
SQL injection attack

Cloning and Data leakage Flooding attack


resource pooling problems
XML signature
Motility of data and
Malicious attacks element wrapping
data residuals
Incomplete data
Elastic perimeter Backup and storage deletion

Shared multi-tenant Locks-in


Shared technological
environment issues

Unencrypted data Service hijacking


Authentication and Virtual machine
identity management
hopping
Fig. 4.13.1. Classification of security
challenge.
4-12 E (CNT-Sem-7) Resource Management &Security in Cloud

2.
The classification shown in Fig.4.13.1 reveals various common challenges
under cloud computing. The deployment model is classified further as
private, public and hybrid cloud and the security issues of the samehave
been exposed in common.
its
3 The service model is classified into the SaaS, PaaS and laaS briefing
respect to
security challenges in common. Thesecurity challenges withNetwork
network are also known as for any internet based service. is
considered as the backbone for cloud computing.

Que 4.14. Explain various security challenges related to


deployment models.
Answer
Various security challenges related to deployment model :
1. Cloning and resource pooling :
i. Cloning deals with replicating or duplicating the data.
Cloning leads to data leakage problems revealing the machine's
authenticity.
2. Motility of data and data residuals:
For the best use of resources, data is moved to cloud infrastructure.
location where
ii. As a result, the enterprise would be devoid of the
data is put on the cloud.
iüi. This is true with public cloud.
behind which
iv. With this data movement, the residuals of data is left
may be accessed by unauthorized users.
3. Elastic perimeter :
A
cloud infrastructure, particularly comprising of private cloud,
creates an elastic perimeter.
ii.
Various departments and users throughout the organization allow
sharing of different resources to increase facility of access but
unfortunately lead to data breach problem.
4. Shared multi-tenant environment :
i Multi-tenancy is one of the vital attribute of cloud computing, which
allows multiple users to run their distinct applications concurrently
on the same physical infrastructure hiding user data from each
other.
ii. But the shared multi-tenant character of public cloud adds security
risks such as illegal access of data by other renter using the same
hardware.
5. Unencrypted data:
i. Data encryption is a process that helps to address various external
and malicious threats.
CloudE:Computing 4-13 E (CSIT-Sem-7)

Unencrypted data is vulnerable for susceptible data, as it does not


provide any security mechanism.
ii These unencrypted data can easily be accessed by unauthorized
users.
6. Authentication and identity management :
With the help of cloud, a user is facilitated to access its private data
and make it available to various services across the network.
Identity management helps in authenticating the users through
their credentials.

Que 4.15. Discuss security challenges related with the service


models.

Answer
Various security challenges related with the service models :
1. Data leakage and consequent problem :
i Data deletion or alteration without backup leads to certain drastic
data related problems like security, integrity, locality, segregation
and breaches.
This would lead to sensitive data being accessed by the unauthorized
users.

2 Malicious attacks:
i The threat of malicious attackers is augmented for customers of
cloud services by the use of various IT services which lacks the
intelligibility between the procedure and process relating to service
providers.
Malicious users may gain access to certain confidential data and
thus leading to data breaches.
3. Backup and storage :
The cloud vendor must ensure that regular backup of data is
implemented with all measures.
But this backup data is generally found in unencrypted form leading
to misuse of the data by unauthorized parties.
ii. Thus, data backups lead to various security threats.
4. Shared technological issues:
i laaS vendors transport their services in a scalable way by
contributing infrastructure.
But this structure does not offer strong isolation properties for a
multi-tenant architecture.
ii. Hence, in order to address this gap, a virtualization hypervisor
intercede the access between guest operating systems and the
physical compute resources.
4-14 E (CS/IT-Sem-7) Resource Management &Security in Cloud
5. Service hijacking :
i. Service hijacking is associated with gaining an illegal control on
certain authorized services by various unauthorized users.
It accounts for various techniques like phishing, éxploitation of
software and fraud.
ii. This is considered as one of top most threats.
6. VM hopping :
i With VMhopping, an attacker on one VM gains rights to use another
victim VM's.
The attacker can check the victim VM's resource procedure, alter
its configurations and can even delete stored data, thus, putting it
in danger the VM's confidentiality, integrity and availability.
ii. Arequirement for this attack is that the two VM's must be operating
on the same host, and the attacker must recognize the victim VM's
IP address.
7. VM mobility :
i The contents of VMs virtual disks are saved as files such that VMs
can be copied from one host to another over the system or via
moveable storage devices with no physically stealing a hard drive.
i. VM mobility might offer quick use but could show the way to security
problems likewise, the rapid spread of susceptible configurations
that an attacker could make use of, to endanger the security of a
novel host.
8. VM denial of service:
Virtualization lets numerous VM's split physical resources like CPU,
network bandwidth and memory or disk.
ADenial-of-Service (DoS) attack in virtualization takes place when
one VM occupies all the obtainable physical resources such that the
hypervisor cannot hold-up more VM's and accessibility is endangered.
iii The most excellent move towards preventing aDoS attack is to
bound resource allocation using correct configurations.
Que 4.16. What are cloud security controls ?

Answer
Cloud security controls are::
1. Detective control : This type of control is used to detect and react
instantly and appropriately to any incident.
2. Preventive control :It strengthen the system against any incident or
attack by actually eliminating the vulnerabilities.
Cloud Computing 4-15 E (CSIT-Sem-7)

3. Deterrent control:This type of control is used is meant to reduce


attack on cloud system. It reduces the threat level by giving a warning
sign.
4 Corrective control : It reduces the consequences of an incident by
controlling the damage. Restoring system backup is an example of such
type.

PART-5

Software-as-a-Service Security, Security Governance, Virtual


Machine Security, IAM, Security Standards.

Questions-Answers

Long Answer Type and Medium Answer Type Questions

Que 4.17. What is cloud security governance ? Describe its


challenges.
Answer
i. Cloud security governance refers to the management model that
facilitates effective and efficient security management and operations
in the cloud environment so that an enterprise's business targets are
achieved.
This model incorporates a hierarchy of executive mandates,performance
expectations, operational practices, structures, and metrics that when
implemented, result in the optimization of business value for an
enterprise.
Cloud securitv governance challenges :
1. Lack of senior management participation and buy-in :
1. The lack of a senior management influenced and initial security
policy is one of the common challenges faced by cloud customers.
An enterprise security policy is intended to set the executive tone,
principles and expectations for security management and operations
in the cloud.
üi. The result of this situation is the ineffective definition and
communication of executive tone and expectations for security in
the cloud.
iv. T resolve this challenge, it is essential to
executives in the discussion and definition of toneengage enterprise
and expectations
for security that will feed a formal enterprise security
policy.
4-16 E(CSTT-Sem-7) Resource Management &Security in Cloud
controls :
2. Lack of embedded management operational
repackaged as
Controls are interpreted as an auditor's checklist orembedded into
procedures, and as a result, are not effectively
should be,
security operational processes and procedures as theyday-to-day
for purposes of optimizing value and reducing
operational risks.
that
This lack of embedded controls may result in operational risks
may not be apparent to the enterprise.
3 Lack of operating model, roles, and responsibilities :
tend to lack
i Many enterprises moving into the cloud environment
strategic and
a formal operating model for security,or do not havedefined
tactical roles and responsibilities properly and
operationalized.
i. This situation stifles the effectiveness of a security management
and operational function/organization to support security in the
cloud.
ii. Establishing a hierarchy help an enterprise to better manage and
investments in
control security in the cloud, and protect associated
accordance with enterprise business goals.
iv. This hierarchy can be employed as in-sourced, out-sourced, or co
sourced model depending on the culture, norms, and risk tolerance
of the enterprise.
4.
Lack of metrics for measuring performance and risk:
i.
Another major challenge for cloud customers is the lack of defined
metrics to measure security performance and risks. A problem that
also stifles executive visibility into the real security risks in the
cloud.
Que 4.18. What are objectives of cloud security governance ?

Answer
Objectives of cloudsecurity governance:
1. Strategic alignment : Enterprises should mandate that security
investments, services, and projects in the cloud are executed to achieve
established business goals (For example, market competitiveness,
financial, or operational performance).
2. Value delivery: Enterprises should define, operationalize, and maintain
an appropriate security function/organization with appropriate strategic
and tactical representation, and charged with the responsibility to
maximize the business value (Key Goal Indicators, RGI) from the pursuit
of security initiatives in the cloud.
3 Risk mitigation : Security initiatives in the cloud should subject to
measurements that gauge effectiveness in mitigating risk to the
Cloud Computing 4-17 E (CSIT-Sem-7)

enterprise (Key Risk Indicators). These initiatives should also yield results
that progressively demonstrate a reduction in these risks over time.
4. Effective use of resources :It is important for enterprises to establish
a practical operating model for managing and performing security
operations in the cloud, including the proper definition and
operationalization of due processes, the institution of appropriate roles
and responsibilities, and use of relevant tools for overall efficiency and
effectiveness.
5. Sustained performance: Security initiatives in the cloud should be
measurable in terms of performance, value and risk to the enterprise
(Key Performance Indicators, Key Risk Indicators), and yield results
that demonstrate attainment of desired targets (Key Goal Indicators)
Over time.

Que 4.19. Write down properties and characteristics of VM.


Answer
Virtual machine is open-source software that runs an operating system and
application. It is comprised of a set of specification and configuration files and
is backed by the physical resource of a host.
Virtual machine properties:
1. Dispatcher : Hypervisor starting point to decide which module to eall
for the given trap.
2. Allocator: It has to decide what system resources are to be provided.
3. Interpreter:It needs one interpreter routine per privileged instruction,
each routine has to simulate the effect of the instruction which is trapped.
Characteristics of VM :
1 A virtual machine (VM) is a special program, which must nmeet the
following three characteristics:
a. The efficiency property
b. The resource control property
C. The equivalence property
The virtual machine can run any program in its virtual environment.
3 The efficiency property requires that the large portion of the program
instructions will be executed directly on the physical processor, without
any changesor interventions from the virtual machine nonitor.
4 This requirement is not only set for performance reasons, but also to
exclude emulators or simulators from the virtual machine detinition.
Que 4.20. Discuss implementations of virtual machines.
Answer
There are two main implementations of Virtual Machines (VMs):
4-18E(CSTT-Sem-7) Resource Management &Security in Cloud

i. Process virtual machines :


1 AprocessVMis a vitual machine capable of supporting an individual
process as long as the process isalive. Fig. 4.20.1(a) demonstrates
process VMs.

Application
Guest
Application Processes
Processes Guest VM

Virtualization OS
Runtime
software
Virtualization
OS Hypervisor Software
Host
Hardware Host Hardware
machine
(a) (b)

Fig. 4.20.1. Virtual machine types (a) Process virtual


machines, and (b) System virtual machines.
2 A process VM terminates when the hosted process ceases. From a
process VM perspective, a machine consists of a virtual memory
address space, user-level registers and instructions assigned to a
single process so as to execute a user program.
deemed a
3. A regular process in a general-purpose OS can also be
machine. However, a process in an OS can only support user
In
program binaries compiled for the ISA of the host machine.
other words,executing binaries compiled for an ISA different than
that of the host machine cannot be ensued with regular processes.
4.
Conversely, a process VM allows emulation. As shown in Fig. 4.20.2,
emulation is the process of allowing the interfaces and
functionalities of one system (the source) to be employed on a
system with different interfaces and functionalities (the target).
Guest
(Source ISA)

Host
(Target ISA)

Fig, 4.20.2. Emulation process.


5.
The abstraction of the process VM is provided by a piece of
virtualizing software called the runtime as shown in Fig. 4.20.1(a).
The runtime is placed at the Application Binary Interface (ABI), on
top of the host OS, and the underlying hardware. It is this runtime
that emulates the VM instructions and system calls when guest
and host ISAs are different.
Cloud Computing 4-19 E (CTT-Sem-7)

6. Aprocess VM may not directly correspond to any physical platform


but employed mainly tooffer cross-platform portability. Such kinds
of process VMs are known as High Level Language Virtual Machines
(HLL VMs).
7. An HLL VM abstracts away details of the underlying hardware
resources and the OS and allows programs to run in the same way
on any platform. Java VM (JVM) and Microsoft Common Language
Infrastructure (CLI) are examples of HLLVMs.
8 A process VM is similar to a regular process running on an OS.
However, a process VM allows, through emulation, the execution
of an application compiled for an ISA differentthan that of the host
machine.
ii. System virtual machines :
1 Asystem VM is a virtual machine capable of virtualizing a full set of
hardware resources including processors,memories, and IO devices,
thus providing a complete system environment.
2 Asystem VM can support an OS along with its associated processes
as long as the system environment is alive. Fig. 4.20.1(b) illustrates
system VMs. The hypervisor (or the Virtual Machine Monitor (VMM)
is a piece of software that provides abstraction for the system VM.
3 It can be placed at the ISA level directly on top of the raw hardware
and below system images (for example, OSs). The hardware
resources of the host platform can be shared among multiple guest
VMs. The hypervisor manages the allocation of, and access to, the
hardware resources to/by the guest VMs.
4 The hypervisor provides an elegant way to logically isolate multiple
guest VMs sharing a single physical infrastructure (for example,
the cloud datacentres). Each guest VM is given the illusion of
acquiring the hardware resources of the underlying physical
machine.
5. There are different classes of system VMs as shown in Fig. 4.20.3.
Guest Guest
applications applications
Guest
applications Guest OS Guest OS
Unprivileged
Applications Guest OS Hypervisor Hypervisor mode

OS Hypervisor Host OS Host OS Privileged


mode
Hardware Hardware Hardware Hardware
Traditional Native system User-mode hosted Dual-mode hosted
system s VMs system VMs system VMs
Fig. 4.20.3. Different system VM classes.
4-20 E (CSTT-Sem-7) Resource Management &Security in Cloud

6
OS runs in privileged
In aconventional time-shared system, theassociated with it run in
mode (system mode) while the applications
unprivileged mode (user mode).
7 With system virtualization, however, the
guest OS(s) will run
unprivileged mode while the hypervisor can operate in privileged
system VM. In native
mode. Such a system is denoted as native
program
system VM, every privileged instruction issued by a user
at any guest OS has to trap to the hypervisor.
every function
8 The hypervisor needs to specify and implementcontrary, if the
required for managing hardware resources. In
top of a host OS, the
hypervisor operates in unprivileged mode onmode.
guest OS(s) will also operate in unprivileged
In this case,
9 This system is called user-mode hosted system VM. trap to the
privileged instructions from guest OS(s) still need to the host
to
hypervisor. In return, the hypervisor also needs to trap
OS.
more trap per
10. Clearly, this increases the overhead by adding one
the functions
every privileged instruction. The hypervisor can utilize resources.
already available on the host OS to manage hardware
11. Finally, the hypervisor can operate partly in privileged mode and
partly in user-mode in a system referred to as dual-mode hosted
the host OS's
system VM. This way, the hypervisor can make use of
resource management functions and also preclude the one more
user-mode hosted
trap per each privileged instruction incurred in
system VMs.

Que 4.21. Write a short note on IAM.

Answer
1. Identity and Access Management (IAM) is a system that secures, stores,
and manages user identities and access privileges.
2. It ensures that users are who they say they are and will grant access to
applications and resources only if they have the permission to use them.
3 Some of the most common IAM solutions include Single Sign-On (SSO),
Multi-Factor Authentication (MFA), and access management, all of which
can be deployed on-premises or in the cloud.
4 Modern technology enables businesses to be mo ile anu efficient
than ever before.
5 For instance, the cloud lets the employees work from anywhere at any
time on any device.
6 However, this means that the workforce has moved beyond the
protections of on-premise security.
Que 4.22. Describe the benefits of IAM.
Cloud Computing 4-21 E (CSIT-Sem-7)

Answer
Benefits of IAM are:
1. Improving user experiences :
SSO eliminates the need for Users to remember and input multiple
passwords to access different areas of the system.
.

All vendors offer a variety of user authentication schemes ranging


from more strict multi-factor authentication to federated solutions
that leverage existing user security profiles.
2. Enhancing security profiles :
i. IAM systems can authenticate and authorize users based on the
access level indicated in their directory profiles.
IAM system can also automatically control user access using other
factors to specific functions of our system.
3. Simplifies auditing and reporting :
i. Consolidating user identities and passwords with SSO makes it
easier for IT departments to audit where and how these user
credentials are used.
In the event that user credentials are compromised, IAM systems
make it easier for IT departments to identify which user was
compromised and which data was accessed during the breach.
4. Allows easy access no matter where we are :
IAM/SS0 allows users to access to all interconnected systems,
regardless of where the user is physically located.
This can be especially useful for large companies doing business
globally, providing ease of access to employees, partners and clients
alike.
5. Inereases productivity and reduces IT costs :
The original benefit of SSO for IT departments was to eliminate the
cost of internal help desks helping users locked out of their
application accounts.
IAM leverage in already existing identity stores such as Active
Director. IAM allows to extend what we have intothe future.
ii. Cloud-based and mobile-based IAM tools not only allow users to
authenticate from anywhere anytime, they also provide the
extensive audit trails, analytics, access rules and policies totruly
automate identity access and management across the enterprise.
Que 4.23. What are the advantage and disadvantages of IAM ?
4-22 E (CSIT-Sem-7) Resource Management &Security in Cloud

Answer
Advantages of LAM are:
1. Users have fewer accounts and passwords to manage.
2. Less password fatigue related to managing multiple passwords.
3 Less user time needed to log separately into different systems.
4 Fewer support requests for password resets.
5. Provides acentral location for administrative management of accounts.
Disadvantages of IAM are:
1 The primary concern with SSO systems is that it creates a single point of
failure ifthe authentication server fails. This forces the added burden of
multiple authentication servers to provide redundancy.
2. This single point also creates a single breach point. Ifa user account is
breached, an attacker can gain access to all protected systems that the
compromised user account has access to.

Que 4.24. Explain the architecture of IAM.

Answer
Architecture of IAM are:
Cloud-based and multi-tenant architecture:
a.
A multi-tenant architecture provides lots of benefit such as the
vendor can issue updates, security fixtures, and improves
performance.
b. It also modifies the capability to manage access provision and
governance effectively.
ii. Security, management architecture :
The most important need of IAM is identity and access management.
b. IAM in Cloud computing offer features like multi-factor
authentication, digital access cards, and biometrics.
C.
These features help to easily retrieve the information in a secure
manner.

ii. Single Sign-On (SS0)and federation :


a. SSO enhances the experience of the end user while maintaining
security and availability of the network to users as intended.
b. The user can use the safest password combination without working
hard to remember, which is used to access services on regular
basis.
C. It also benefits in another way, as it helps to manage secure
authentication for third-party cloud services.
Cloud Computing 4-23 E (CTT-Sem-7)
iv. Analytics and intelligence:
Analytics and intelligence capabilities are used to report the use of
access privileges in the context of multifaceted relationships.
b. This relationship is between users, their roles and responsibilities,
job function, and data usage.
C. This information allows the organization toidentifyanomalies for
former employee's awesome specific type of workforce segment:
V. Governance, risk, and compliance :
a. The governance, risk and compliance are supported by modifying
the automation and intelligence capabilities of an identity as a service
system.
b This IAM function helps an organization to define and automate
the application specific processes, which will get familiar with the
access and usage patterns.

Que 4.25. Discuss the cloud security standards.

Answer
Following are the cloud security standards :
1. Information Technology Infrastructure Library (TIL) :
i. It is a set of best practices and guidelines that define an integrated,
process-based approach for managing information technology
services.

ITIL helps to make sure that proper security measures are taken at
allimportant levels, namely strategic, tactical, and operational level.
iiüi Many IT organizations employ security management framework
Information Technology Infrastructure Library (ITIL)
iv. This industry standard management framework provides guidance
for planning and implementing a governance program with
sustaining management processes that protect information assets
and thus provide security.
V
Hence, it provides a framework with continuous improvement that
is necessary to align and realign IT services to changing business
needs.
2. Open Virtualization Format (0VF):
i Open Virtualization Format (0VF) is a standard pertaining to
portability concern. OVF provides the ability for an efficient,flexible
and secure distribution of enterprise software over the cloud.
OVF thus provides customers, vendor and platform independence
as it facilitates mobility of virtual machines.
4-24 E (CSTT-Sem-7) Resource Management &Security in Cloud
i. Across the cloud OVF plays a major role in providing cross-platform
portability. It also helps to provide simplified deployment over
multiple platforms.
iv. An OVF format virtual machine can be deployed easily by customers.
They can do so on the platform of their choice. It helps to enhance
customer experience as it provides customers with portability,
platform independence, verification, signing, versioning, and
licensing terms.
3. ITU-TX.1601:
The ITU standard presents a sketch of issues pertaining to cloud
computing and proposes a framework for cloud security.
It talks in detail about various security challenges and ways to
reduce these security risks in cloud computing. It also discusses a
framework that provides an insight into what security capabilities
are required for making the cloud secure and facing security
challenges.
iüi. ITU-TX.1601 starts by listing down major security threats that the
cloud can encounter.
1V. The standard discusses the security challenges based on the nature
of the role that an individual or an organization plays in the cloud
computing paradigm.
V. The standard divides the roles of an individual or an organization
into following three categories :
a. Cloud Service Provider (CSP):An individual or an
organization responsible for making cloud services available.
b. Cloud Service Customer (CSC) : An individual or an
organization that uses cloud services.
c. Cloud Service Partner (CSN) :A partner that helps support
the CSPs or the CSCs.
4. PCI DSS:
i. Payment Card Industry Data Security Standard (PCI DSS) was
released by PCI security standards council.
PCI's main objective is to provide security guidelines for credit card
usage and address CSP's and CSC's.
iüi. Cloud security is ashared responsibility between the CSP and its
clients
iv. The division of responsibilities between the client and the CSP for
managing PCI DSS controls is influenced by multiple factors, which
are:

a. The client uses the cloud service for what purpose.


b. What scope of PCI DSS requirements is the client outsourcing
to the CSP ?
Cloud Computing 4-25 E (CSIT-Sem-7)

c. The CSP validates which service and system


its own operations.
components within
d. The service option that the client has selected to
engage the
CSP (laaS, PaaS or SaaS).
e. The scope of any additional services the CSP is providing to pro
actively manage the client's compliance.
5. ISOTEC 27017 Code of practice for information security controls:
i. This standard is yet to be launched in the market.
It aims to provide further guidance in the information security
domain of cloud computing.
iü. It is aimed at supplementing the guidance in ISO/IEC 27002 and
various other IS027k standards including ISO/IEC 27018 on the
privacy aspects of cloud computing, ISOMEC 27031 on business
continuity, and ISO/IEC27036-4 on relationship managemernt, as
well as all the other ISO27k standards.
iv. The scope and purpose :
a. It aims is to provide an advancement to ISOIEC 27002 in terms
of adding value to its practices of control implementation
b. Additionally, the standard will provide further security advice
for both: clients and service providers. It will do that by offering
advice for both side-by-side in each section.
5
UNIT
Cloud Technologies
and Advancements

CONTENTS
.5-2E to 5-10E
Part-1: Hadoop, MapReduce,
Virtualbox
.6-10E to 5-14E
Part-2: Google App Engine,
Programming Environment
for Google App Engine
.6-14E to 5-21E
Part-3: Openstack, Federation in the
Cloud, Four Levels of
Federation, Federated Services
and Applications, Future
of Federation

5-1 E (CSIT-Sem-7)
5-2 E (CSTT-Sem-7) Cloud Technologies &Advancements

PART-1
Hadoop, MapReduce, Virtualbox.

Questions-Answers
Long Answer Type and Medium Answer Type Questions

Que 5.1. Describe briefly the term Hadoop ?


Answer
1 Hadoop is an open-source software framework used for storing data
and running applications on clusters of commodity hardware.
2 It provides massive storage for any kind of data, enormous processing
power and the ability to handle virtually limitless concurrent tasks or
jobs.
3 The Hadoop ecosystem is a framework of various types of complex and
evolving tools and components. Some of these elements are very different
from each other in terms of their architecture however, what keeps
them all together under a single roof is that they all derive their
functionalities from the scalability and power of Hadoop.
4 Hadoop ecosystem can be defined as a comprehensive collection of tools
and technologies that can be effectively implemented and deployed to
provide big data solutions in a cost-effective rmanner.
5 MapReduce and Hadoop Distributed File System (HDFS)are twocore
components of the Hadoop ecosystem that is used to manage big data.
However, they are not sufficient to deal with the big data challenges.
6 Along with these two, the Hadoop ecosystem provides a collection of
various elements to support the complete development and deployment
of big data solutions.
Que 5.2. Why do we use Hadoop ?
Answer
Use of Hadoop:
1 Ability to store and process huge amounts of any kind of data quickly.
2. Computing power: Hadoop's distributed computing model processes
big data fast.
53E (CSIT-Sem-7)
Cloud Computing
3. Fault tolerance :Data and application processing are protected against
hardware failure. Ifa node goes down, jobs are automatically redirected
to other nodes to make sure that distributed computing does not fail.
Multiple copies of all data are stored automatically.
4. Flexibility:Unlike traditional relational databases, we do not have to
preprocess data before storing it. We can store as much data as we want
and decide how to use it later. That includes unstructured data like text,
images and videos.
5. Low cost : The open-source framework is free and uses commodity
hardware to store large quantities of data.
6 Scalability: We can easily grow our system to handle more data simply
by adding nodes.

Que 5.3. Explain features of Hadoop.

Answer

Features of Hadoop:
1. Suitable for big data analysis :
i. As big data tends to be distributed and unstructured in nature,
Hadoop clusters are best suited for analysis of big data.
Since it is processing logic (not the actual data) that flows to the
computing nodes, less network bandwidth is consumed.
ii. This concept is called as data locality concept which helps to increase
the efficiency of Hadoop based applications.
2. Scalability :
Hadoop clusters can easily be scaled to any extent by adding
additional cluster nodes and thus allows for the growth of big data.
Scaling does not require modifications to application logic.
3. Fault tolerance :
Hadoop ecosystem has a provision to replicate the input data on to
other cluster nodes.
ii In case of a cluster node failure, data processing can still proceed by
using data stored on another cluster node.

Que 5.4. Write a short note on modules of Hadoop.


54E(CSIT-Sem-7) Cloud Technologies &Advancements

Answer

Modules of Hadoop:
1. HDFS (Hadoop Distributed File System): It states that the files will
be broken into blocks and stored in nodes over the distributed
architecture.
2. YARN (Yet Another Resource Negotiator) : It is used for job
scheduling and managing the cluster.
3. MapReduce :
This is a framework which helps Java programs to do the parallel
computation on data using key value pair.
The Map task takes input data and converts it into a dataset which
can be computed in key value pair.
The output of Map task is consumed by reduce task and then the
reducer gives the desired result.
4. Hadoop common:These Java libraries are used to start Hadoop and
are used by other Hadoop modules.
Que 5.5. What are the advantages of Hadoop ?

Answer
Advantages of Hadoop:
1. Fast :in HDFS, the data distributed over the cluster helps in faster
retrieval. As tools are present on the same server, reducing the processing
time. It is able to process terabytes of data in minutes and peta bytes in
hours.
2. Scalable : Hadoop cluster can be extended by just adding nodes in the
cluster.
3. Cost effective : Hadoop is open-source that uses commodity hardware
tostore data so it is cost effective as compared to traditional relational
database management system.
4 Resilient to failure:HDFS has the property with which it can
data over the network, so if one node is down or some other replicate
network
failure happens, then Hadoop takes the other copy of data and use it.
Normally, data are replicated thrice but the replication factor is
configurable.
Que 5.6. Explain the architecture of Hadoop.
Cloud Computing 5 5E (CSIT-Sem-7)

Answer
Architecture of Hadoop:
MapReduce layer HDFS layer

Task Name
tracker node

Master Data
Job
tracker, node

Task Data
Slave tracker node

Fig. 5.6.1.
NameNode:
cluster.
i It is a single master server that exists in the HDFS
ii As it is a single node, it may beconme the reason of single point
failure.
ii. It manages the file system namespace by executing an operation
like the opening, renaming and closing the files.
iv. It simplifies the architecture of the system.
DataNode:
The HDFS cluster contains multiple DataNodes.
Each DataNode contains multiple data blocks.
iii. These data blocks are used to store data.
iv. It is the responsibility of DataNode to read and write requests from
the file system's clients.
V It performs block creation, deletion, and replication upon instruction
from the NameNode.
Job tracker:
i. The role ofjob tracker is to accept the MapReduce jobs from client
and process the data by using NameNode.
iü. Inresponse, NameNode provides metadata to job tracker.
Task tracker:
It works as a slave node for job tracker.
It receives task and code from job tracker and applies that code on
the file. This process can also be called as a Mapper.
5-6E(CSTT-Sem-7) Cloud Technologies & Advancements

Que 5.7. Differentiate between cloud computing and Hadoop.


Answer
S. No. Cloud computing Hadoop
1 Storing of data, applications Hadoop process and store large
and software are in cloud volume data
sets in a distributed
servers accessible through GDFS computing environment
the internet on-demand across clusters and data nodes.
basis.
2 Cloud computing reduces Business can apply Hadoop to
the cost of managing and analyze a variety of business
maintaining IT systems, problems such as product
instead of purchasing recommendation, fraud detection,
expensive systems and and sentiment analysis.
equipment for the business.
3 Cloud computing offers a Hadoop HDFS provides
reliable, secure and appropriate response times and
consistent Quality of Service increased system availability.
(QoS) manage ment as
decided in service level
agreements.
4 Cloud management console Hadoop database can be connected
provides a complete analysis to many data reporting tools like
of cloud usage as reports and Microstrategy, and, data meter.
graphs.
5 Computing behaviour like Big data with a large volume of
performance, scalability, data is processed and analyzed
availability, and security is using Hadoop.
analyzed.
6 Cloud computing focus on Hadoop focuses on manipulating
system performance, large data sets with structured and
network performance, data unstructured data.
security, and availability.
Cost is focused on delivering
Software-as-a-Service in the
cloud.
Cloud Computing 5-7E (CSTT-Sem-7)

Que 5.8. Write a short note on MapReduce.

Answer
1. MapReduce is based on the parallel programming framework to process
large amounts of data dispersed across different system.
2 The process is initiated when a user request is received to execute the
MapReduce program and terminated once the results are written back
to the HDFS (Hadoop Distributed File System).
3 MapReduce facilitate the processing and analyzing of both unstructured
and sem-structured data collected from different sources, which may
not be analyzed effectively by other traditional tools.
4. MapReduce enables computational processing of data stored in a file
system without the requirement of loading the data initially into a
database.
5 It primarily supports two operations, map and reduce.
6 These operations execute in parallel on a set of worker nodes.
7 MapReduce works on a master working approach in which the master
process controls and directs the entire activity, such as collecting,
segregating, and delegating the data among different working.
Que 5.9. Explain the working and phases of MapReduce.

Answer
1 The MapReduce algorithm contains two important tasks, namely Map
and Reduce:
The Map task takes a set of data and converts it into another set of
data, where individual elements are broken down into tuples (key
value pairs).
The Reduce task takes the output from the Map as an input and
combines those data tuples (key-value pairs) into a smaller set of
tuples.
2. The reduce task is always performed after the map task.
Phases of MapReduce:
1. Input phase : Here we have a record reader that translates each
record in an input file and sends the parsed data to the mapper in the
form of key-value pairs.
2. Map: Map is a user-defined function, which'takes a series of key-value
pairs and processes each one of them to generate zero or more key
value pairs.
3. Intermediate keys : They key-value pairs generated by the mapper
are known as intermediate keys.
8E(CSIT-Sem-7) Cloud Technologies &Advancements
4. Combiner :
1. Acombiner is a type of local reducer that groups
the map phase into identifiable sets.
similar data from
ii It takes the intermediate keys from the
mapper as input and applies
a user-defined code to aggregate the values in a small
scope of one
mapper.
iüü. Itis not a part of the main MapReduce algorithm; it is
5.
optional.
Shuffle and sort:
i The Reducer task starts with the shuffle and sort step.
It downloads the grouped key-value pairs onto the local
machine,
where the reducer is running.
iüi. The individual key-value pairs are sorted by key into a larger
list.
data
iv. The data list groups the equivalent keys together so that their
values can be iterated easily in the reducer task.
6. Reducer:
The reducer takes the grouped key-value paired data as input and
runs a reducer function on each one of them.
iü. Here, the data can be aggregated, filtered, and combined in a
number of ways, and it requires a wide range of processing.
iüi. Once the execution is over, it gives zero or more key-value pairs to
the final step.
7. Output phase :
i In the output phase, we have an output formatter that translates
the final key-value pairs from the reducer function and writes
them ontoa file using a record writer.
Input |UP nput Input Input |Input Input +Input phase

M M M M
Map phase
kl:vkl vk2:v klv klvkl:vk2:v klvkl:vk2v klv kl:vkl:vk2.v Intermediate
keys
Group by key Combiner
(optional)
Shufle
kl:v,v,v,v| k2:v k3:v,v k4:v,v,v |k5:v
and sort
Reducer
R R
phase
Output
Output phase
Fig. 5.9.1.
5-9 E (CIT-Sem-7)
Cloud Computing

Que 5.10.Explain the features of MapReduce.


Answer
Features of MapReduce:
1. Scheduling:
and reduce, which are
MapReduce involves two operations : map smaller chunks are run in
executed by dividing large problems into
parallel by different computing resources.
subtasks and running these
The operation of breaking tasks into called mapping, which is
subtasks independently in parallel is
performed ahead of the reduce operation.
2. Synchronization :
requires synchronization.
i Execution of several concurrent processes
framework is aware of the
The MapReduce program execution
ii.
are taking place in the
mapping and reducing operations that
program.
3. Co-location of code/data (Data locality) :
mechanism depends on the
i. The effectiveness of a data processing for the code to execute.
location of the code and the data required
both code and data reside on the
The best result is obtained when
same machine.
of the code and data produces the
iüi. This means that the co-location
most effective processing outcome.
4. Handling of errors/faults :
fault tolerance and
MapReduce engines provide a high level of
robustness in handling errors.
these engines is their high
The reason for providing robustness to
tendency to make errors or faults.
5. Scale-out architecture :
way that they can
MapReduce engines are built in such arequired.
i
accommodate more machines, as and when
computing resources to the
This possibility of introducing more more suited
architecture makes the MapReduce programming model
data.
tothe higher computational demands of big
Que 5.11. Write a short note on virtualbox ?

Answer
virtualizing the x86
1. Virtualbox is an open-source software used for
computing architecture.
5-10 E (CSIT-Sem-7) Cloud Technologies &Advancements
2 It acts as a hypervisor, creating a VM (Virtual Machine) in which the
user can run another OS (Operating System).
3 The operating system in which virtualbox runs is called the host OS.
4. The operating system running in the VM is called the guest OS.
Virtualb0x supports Windows, Linux, or MacOS as its host OS.
5 When configuring avirtual machine, the user can specify how many
CPUcores,and how much RAM and disk space should be devoted to the
VM.
6 When the VM is running, it can be paused (system execution is frozen at
that moment in time), and resumed later when the user wishes to
continue.

Que 5.12. Describe the working of MapReduce algorithm.


Answer
Working of MapReduce algorithm :
1. Take a large dataset or set of records.
2. Perform iteration over the data.
3. Extract some interesting patterns to prepare an output list by using the
map function.
4. Arrange the output list properly to enable optimization for further
processing.
5. Compute a set of results by using the reduce function.
6. Provide the final output.

PART-2

Google App Engine, Programming Environment


for Gdogle App Engine.

Questions-Answers

Long Answer Type and Medium Answer Type Questions

Que 5.13. Write a short note on Google App Engine (GAE).


Answer

1. Google App Engine (GAE) is a Platform-as-a- Service (PaaS) product


that provides web app developers and enterprises with access to Google's
scalable hosting and tier-1 Internet service.
Cloud Computing 5-11 E (CSIT-Sem-7)

2
The App Engine requires that apps written in Java or Python, store data
in Google BigTable and use the Google query language. Non-compliant
applications require modification to use App Engine.
3. Google App Engine provides more infrastructure than other scalable
hosting services such as Amazon Elastic Compute Cloud (EC2).
4 The App Engine also eliminates some system administration and
developmental tasks to make it easier to write scalable applications.
5 Google App Engine is free up to a certain amount of resource usage.
6 Users exceeding the per-day or per-minute usage rates for CPU
resources, storage, number of APIcalls or requests and concurrent
requests can pay for more of these resources.

Que 5.14. What are the advantage and disadvantages of GAE?


Answer
Advantages of GoogleApp Engine (GAE):
1 GAE do not scale however, even after we empower billing, the whole
system is augmented to support only 500 requests per second. If we
want more, we can reach Google's disposal to increase our thresholds,
so we can have millions ofusers, but more than 500 requests per second.
2 GAE feature set is good enough to build a decent website and we do not
need to do the maintenance work.
3 It does not require any server administration. It has free usage allocation
and provides scalability. GAE has better access to Google user accounts
and deployment process is very easy.
4 GAE has the highest admin load, but once it is set up, deploying and re
deploying is quick.
5 We can get any feature from the store with GAE.
Disadvantages of GAE:
1 GAE is not stable enough and the budget would increase much when
the website becomes bulky.
2 Without native file system read/write access, it is hard to process some
data transform with existing library, and it do not support some native
file system base library as well.
3 It does not provide full text search API.
4 SDK (Software Development Kit) Java is unfavorable with GAE as it is
unsatisfactory to accomplish lots ofexternal libraries.
5-12 E (CSIT-Sem-7) Cloud Technologies &Advancements

5. The SDK/Java depth rest on IDE, and the default project directory
structure is different from normal web app.
6. It is not easy to process unit test. It cannot fix the root cause and does
not support add SSL to website.
7. The GAE may be the development for future web application, but it is
not equipped for building a modern web site.
8 It suffers from the inability to weak server software. The file system
and many standard library modules are inaccessible. Only Python and a
few runs of Java Virtual Machine are accessible.

Que 5.15. What are the features of Google App Engine ?


Answer
Features of GoogleApp Engine:
1. Persistent storage with queries, sorting and transactions.
Automaticscaling and load balancing.
iii. APls for authenticating users and sending email using Google accounts.
iv. Task queues for performing work outside of the scope of aweb request.
V. Scheduled tasks for triggering events at specified times and regular
ntervals.
vi. Dynamic web serving, with full support for common web technologies.
Que 5.16. Explain the services provided by Google App Engine.

Answer
Services provided by Google App Engine:
1. Data store :
i. App engine provides a powerful distributed data storage service
that features query engine and transactions. Data store entities
are schemaless.

i. The structure of data entities is provided and enforced by application


code. The Java interfaces and the Python data store interface
include features for applying and enforcing structure within app.
The data store is strongly consistent and uses optimistic concurrency
control. An update of an entity occurs in a transaction that retried
afixednumber of times if other processes are trying to update the
same entity simultaneously.
operations in a
iv. The application can execute multiple data store ensuring the
single transaction which either all succeed or all fail
integrity ofour data.
Cloud Computing 5-13 E (CSIT-Sem-7)
2. Google accounts :
i. App Engine supports integrating an app with Google accounts for
user authentication. Our application can allow a user to sign in
with a Google account, and access the email address and displayable
name associated with the account.
It also saves the effort of implementing a user account
system just
for the application.
ii. Ifthe application is running under Google apps, it can use the same
features with members of the organization and Google apps
accounts.
iv. The users APIcan also tell the application whether the current
user is aregistered administrator for the application. This makes it
easy to implement admin-only areas of the site.
3. URL fetch: Applications can access resources on the Internet, such as
web services or other data using App Engine's. URL fetch service
retrieves web resources using the same high-speed Google
infrastructure that retrieves web pages for many other Google products.
4 Mail : Applications can send email messages using App Engine's mail
service. The mail service uses Google infrastructure to send email
messages.
5 Image manipulation:The image service lets the application manipulate
images. With this API, wve can resize, crop, rotate and flip images in
JPEG and PNG formats.
6 Memcache:
i The memcache service provides application with a high performance
in memory key value cache that is accessible by multiple instances
of the application.
ii Memcache is useful for data that do not need the persistence and
transactional features of the data store, such as temporary data or
data copied from the data store to the cache for high speed access.
7. Scheduled tasks and task queues:
An application can perform tasks outside of responding to web
requests.
The application can perform these tasks on a schedule, such as on
a daily or hourly basis.
iii. The application can perform tasks added to a queue by the application
itself, such as a background task created while handling a request.

Que 5.17. Describe briefly the supported environments for Google


App Engine.
5-14 E (CSIT-Sem-7) Cloud Technologies &Advancements

Answer
Supported environments for Google App Engine:
1. Java Runtime Environment :

Develop application using common java web development tools and


APIstandards.
i. It includes java Runtime Environment 6, platform and libraries.
ii. App interacts with the environment using Java Servlet standard
and can use common web application techniques such as Java Server
pages.
2 Python Runtime Environment :
Implement app using the Python runtime environment, and run it
on an optimized Python interpreter.
ii. Appengine includes rich data modelling APls and tools for managing
and accessing app's data.
iüi. Uses Python version 2.5.2, in future being considered Python 3.
iv. Provides rich APIs for the data store, Google accounts, URL fetch,
and email services.
V. It provides simple Python web application framework called web
app to make it easy to start building applications.

PART-3
Openstack, Federation in the Cloud, Four Levels of Federation,
Federated Services and Applications, Future of Federation.

Questions-Answers
Long Answer Type and Medium Answer Type Questions

Que 5.18. Explain openstack.


Answer
1 Openstack is an open-source software that allows the deployment and
management of a cloud Infrastructure-as-a-Service (IaaS) platform.
2. Openstack supports both private and public cloud deployments.
3 It fulfills two main requirements of the cloud, massive
scalability and
simplicity ofimplementation.
4. Openstack is highly configurable as user can choose whether or not to
implement several services offered by the software.
Cloud Computing 5-15 E (CSIT-Sem-7)

5 The configuration of each component is also up to the user and is easily


made through the Application Programming Interface (AP).
6. Therefore, there are many different ways to use openstack, which makes
it a flexible tool that is able to work along with other software.
7. Another reason to adopt openstack is that it supports different
hypervisors (Xen, VMware or Kernel-based Virtual Machine KVM)
and several virtualization technologies (such as bare-metal or high
performance computing).
Que 5.19.What are the components of openstack ?
Answer
Components of openstack:Openstack has open nature, anyone can add
additional components to openstack to help it to meet their needs. But the
openstack community has collaboratively identified nine key components
that are a part of the core of openstack, officially maintained by the openstack
community :
1 Nova :
i It is the primary computing engine behind openstack.
i. It is used for deploying and managing large numbers of virtual
machines and other instances to handle computing tasks.
2. Swift :
i It is a storage system for objects and files.
ii. It allows the system, rather than the developer, to make sure that
data is backed up in case of the failure of a machine or network
connection.

3. Cinder :
i It is a block storage component, which is more analogous to the
traditional notion of a computer being able to access specific locations
on a disk drive.
ii. This more traditional way of accessing files might be important in
scenarios in which data access speed is the most important
consideration.
4. Neutron :
It provides the networking capability for openstack.
ii. It helps to ensure that each of the components of an openstack
deployment can communicate with one another quickly and
efficiently.
5. Horizon:
i. It is the dashboard behind openstack.
i.
Developers can access all of the components of openstack
individually through an Application Programming Interface (API),
5-16E (CSIT-Sem-7) Cloud Technologies &Advancements
but the dashboard provides system administrators a look at what is
going on in the cloud, and how to manage it.
6. Keystone :
i Itprovides identity services for openstack.
i. It is essentially a central list of all of the users of the openstack
cloud, mapped against all of the services provided by the cloud,
which they have permission to use.
ii. Itprovides multiple means of access, so that, developers caneasily
map their existing user access methods against keystone.
7 Glance:
i. It provides image services to openstack.
In this case, images refers to images (or virtual copies) of hard
disks.
ii. Glance allows these images to be used as templates when deploying
new virtual machine instances.
8. Ceilometer:
1. It provides telemetry services, which allow the cloud to provide
billing services to individual users of the cloud.
It also keeps a verifiable count of each user's system usage of each
of the various components of an openstack cloud.
9. Heat :
i. It is the orchestration component of openstack, which allows
developers to store the requirements ofa cloud application in a file
that defines what resources are necessary for that application.
:
In this way, it helps to manage the infrastructure needed for a
cloud service to run.
Que 5.20. Write down the benefits of using openstack?

Answer
Benefits of using openstack :
1. Enables rapid innovation :
L.
Openstack's orchestration and self-service capabilities offers
developers and IT staff with faster and better access to IT resources.
Because developers can provision machines rapidly and on-demand,
they can significantly reduce development and testing periods and
have more freedom to experiment with new ideas.
2. Cuts down time-to-market :
Faster deployment of IT resources also means end users and
i.
business units no longer have to wait days or weeks to start using
the network services and applications they need.
Cloud Computing 5-17 E (CSIT-Sem-7)

ii. In turn, they would be more capable of rolling out and completing
projects earlier than before.
3. Boosts scalability and resource utilization:
i Although not as scalable as public clouds, openstack private clouds
still offer a significant degree of scalability. We can still spin up and
spin down servers on demand.
4. Eases regulatory compliance :
i. Because openstack enables the construction of private, on-premise
clouds, it can help in regulatory compliance endeavors.
If our cloud is in our own datacenter, we will have more control of
access privileges, security measures, and security policies.
ii. We can personally take charge of ensuring that policies for securing
personal data, financial data,and other confidential and regulated
information are actually enforced and not just printed on a piece of
paper.

Que 5.21. Write a short note on cloud federation.

Answer
1. Cloud federation refers to the unionization of software, infrastructure
and platform services from disparate networks that can be accessed by
a client through the internet.
2. The federation of cloud resources is facilitated through network
gateways that connect public or external clouds, private or internal
clouds (owned by a single entity) and/or community clouds (owned by
several cooperating entities); creating a hybrid cloud computing
environment.
3
The federated cloud computing services rely on the existence of physical
datacenters.
4. Two approaches of cloud federation are :
a. Centralized federation model : This is the approach taken by
several identity federation standards. It distinguishes two
operational roles in transaction:
i The identity provider
i. The service provider
b. Claim-based model : This approach addresses the problem of
user authentication from a different perspective and requires users
toprovide claims answering who they are and what they can do in
order to access content or complete a transaction.
Que 5.22. What are the benefits of cloud federation?
5-18 E (CSIT-Sem-7)
Cloud Technologies & Advancements

Answer
Benefits of cloud federation are :
1. The federation of cloud resources
allows client to optimize enterprise IT
service delivery.
2 The federation of cloud resources allows a client to
cho0se best cloud
service providers in terms of flexibility cost and availability of services to
reach particular business or technological need within their
3
organization.
Federation across different cloud resources pools allows applications to
run in the most appropriate infrastructure
environments.
4 The federation of cloud resources also allows an
enterprise to
workloads around the globe, move data between disparate distribute
networks
and implement innovative security models for user access to cloud
resources.

Que 5.23. What are the levels of federation ?

Answer
Levels of federation are:
1. Permissive federation:
i. Permissive federation occurs when a server accepts a connection
from a peer network server without verifying its identity using
DNS lookups or certificate checking.
ii. The lack of verification or authentication may lead to domain
spoofing (the unauthorized use of a third-party domain name in an
email message in order to pretend to be someone else), which
opens the door to widespread spam and other abuses.
2 Verified federation:
This type of federation occurs when a server accepts a connection
from a peer after the identity of the peer has been verified.
i. It uses information obtained via DNS and by means of domain
specific keys exchanged beforehand.
iii. The connection is not encrypted, and the use ofidentity verification
effectively prevents domain spoofing.
iv. Tomake this work, federation requires proper ITS setup, and that
is still subject to DNS poisoning attacks.
V Verified federation has been the default service policy on the open
XMPP since the release of the open-source jabberd 1.2 server.
3. Encrypted federation:
i In this mode, a server accepts a connection from a peer if and only
if the peer supports Transport Layer Security (TLS).
Cloud Computing 5-19 E (CSTT-Sem-7)

ii. The peer must present a digital certificate. The certificate may be
self-signed, but this prevents using mutual authentication.
i. If this is the case, both parties proceed to weakly verify identity
using Server Dialback. XEP-0220 defines the server dialback
protocol, which is used to provide identity verification.
iv. Server dialback uses the DNS as the basis for verifying identity,
the basic approach is that when a receiving server receives a server
to-server connection request from an originating server, it does
not accept the request until it has verified a key with an authoritative
server for the domain asserted by the originating server.
V.
Although server dialback does not provide strong authentication or
trusted federation, and although it has effectively prevented most
instances of address spoofing on the XMPP network since its release
in 2000.
identity
vi. This results in an encrypted connection with weak
verification.
4. Trusted federation:
only under the
Here, a server accepts a connection from a peer
a
condition that the peer supports TLS and the peer can present
(CA) that
digital certificate issued by a root Certification Authority
is trusted by the authenticating server.
more
ii The list of trusted root CAs may be determined by one or
software, or
factors, such as the operating system, XMPP server
local service policy.
resrlts not only
ii. In trusted federation, the use of digital certificates
authentication.
in a channelencryption but also in strong
effectively prevents DNS
iv. The use of trusted domain certificates since such
poisoning attacks but makes federation more difficult,
obtain.
certificates have traditionally not been easy to

cloud federation ?
Que 5.24. What are the advantages provided by

Answer
Advantages provided by cloud federation :
to
i. Performance guarantees : By lending resources, it is possible services.
the rendered
maintain the necessary levels of performance to
diversity for data and services
ii. Availability guarantees : Location areas,
allows migration of services. For example, disaster-prone
maintaining higher availability to the client.
5-20 E (CSTT-Senm-7)
Cloud Technologies & Advancements
iii. Convenience:Federation provides convenience the client in relation
tocontracted services, allowing a unified
to
view from services of different
providers.
iv. Dynamic workload
scatter load according todistribution:Geographic
the client location.
distribution allows to
Que 5.25. What are the approaches used to model cloud
federation ?
Answer
Approaches used to model cloud federation are:
1 Semantics based:
i. A theoretical federation
model based on semantics and
Infrastructure-as-a-Service (IaaS) is proposed.
The authors utilize ontology to provide
autonomous clouds in a resource sharinginteroperability
environment.
between
ii. The use of ontologies is justified by the
difficulties offering
interoperability, which is acritical aspect in afederated cloud.
iv. The difficulties in providing
interoperability include different
implementation schemes for the same type of entity or components
on each cloud, where ontologies are utilised to
model such differences. understand and
2. Market-oriented:
i The federation model oriented to computation services was
proposed.
ii It focuses on the
commercialization
structure that resembles a services ofinfrastructure resources in a
market.
ii. To support this model, four components are
the cloud federation :
utilized as the core of
a. Clouds: Where resources are located and the services will be
offered to the clients.
b. Application broker: Interface responsible for intermediating
operations between client and federation.
C. Cloud coordinator :Component located in each cloud and
responsible for maintaining the integrity of the federation.
d. Concentrator:Acts as the market of resources and services.
3. Reservoir :
The reservoir is a project leaded by IBM and
developed with the
objective to provide a cloud federation environment that offers
software-as-a-service to providers.
Cloud Computing 5-21 E (CSIT-Sem-7)

The reservoir modelling is focused in loose coupling, and also in


avoiding limitations shown by isolated clouds, such as:
Difficulties small providers have in providing scalability.
b. Lack of interoperability.
C Lack of support to Business Service Management (BSM).
i. The official documentation highlights four functional requirements:
rapid installation of applications and services, dynamic elasticity,
semantic and continuous optimization, and independence of
virtualization technologies.

You might also like