Cloud Computing
Cloud Computing
1 Introduction
CONTENTS
Part-1 : Introduction to Cloud 1-2E to 1-17E
Computing, Definition
of Cloud, Evolution of
Cloud Computing :
Part-2 : Underlying Principles of. .1-17E to 1-26E
Parallel and Distributed
Computing, Cloud
Characteristics, Elasticity
in Cloud, On-Demand
Provisioning
1-1E (CSIT-Sem-7)
1-2E(CSTT-Sem-7) Introduction
PART- 1
Introduction to Cloud Computing, Definition of Cloud, Evolution
of Cloud Computing.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Que 1.1. What do you mean by cloud computing ? Als0, give its
properties.
Answer
1 Cloud computing is the mears of delivering all IT from computer
applications, software, business processes, messaging, and collaboration
to end users as a service wherever and whenever they need it.
2 Cloud computing is a paradigm for delivering IT where rapid provisioning
is an important characteristic for computing resources, data applications
and IT.
3 Cloud computing helps us to face the challenges such as :
Decreasing the capex and opex cost.
Enhancing the service quality.
ii. Maintaining the desired and right level of security, compliances,
regulations, and policies across the different functions of enterprise.
iv. Rapid provisioning, agility, and business transparency for consistent
self-service delivery.
4 Thus, cloud computing is the service and deployment model using large
resource pool based provisioning of virtual or physical resources in a
service model using the intermet (public cloud) or intranet (private cloud).
Properties of cloud computing are :
1. User centric: This means once a user isconnected to cloud any data,
such as images, videos, applications, becomes his property. Not only the
data but the devices connected to it and the user can share it with other
users.
2. Task centric : Cloud computing focus on what one need and how
application can do it. Here documents are given more priority than the
applications which create them.
1-3E (CSTT-Sem-7)
Cloud Computing
3. Self healing: In selfhealing, backups are available for every document
in the cloud. Hence, if one document crashes there will be its duplicate
ready to run.
4. Multi-tenancy and intelligence: Multi-tenancy refers to sharing of
data and costs across a large pool of users. As various data are stored in
cloud, data mining and analysis are necessary for accessing information
in an intelligent manner.
5. Programmable: Many processes in cloud computing shall be automate
such as backing up crashed data with its duplicate, Hence, programming
is associated with cloud computing.
6 Flexible: Flexible as the users may be of different varieties and hence
has to match with their needs.
Answer
Several issues related tocloud computing are :
Issues in clouds
Security issues
Data issues
Performance issues
Energy related issues
Fault tolerance
Fig. 1.5.1.
Security issues : Some of the security problems which are faced by the
cloud computing are as follows:
1. Data integrity: When a data is on a cloud, anyone from any location
differentiate
can access those data from the cloud. Cloud does not
between asensitive data from a common data thus enabling anyone to
access those sensitive data. Thus there is a lack of data integrity in cloud
computing.
2. Data theft: Most of the cloud vendors instead of acquiring a server try
to lease a server from other service providers because they are cost
effective and flexible for operation.
3. Security on vendor level: Vendor should make sure that the server
is well secured from allthe external threats it may come across. Acloud
is good only when there is good security provided by the vendor to the
customers.
4. Security on user level: Even tho ugh the vendor has provided good
security layer for the customer, the customer should make sure that
because of its own action, there should not be any loss of data or
tampering of data for other users who are using the same cloud.
5. Information security : Security related to the information exchanged
between different hosts or between hosts and user. This issues pertaining
1-6 E (CSIT-Sem-7)
Introduction
to secure communication,
on and delegation. authentication, issues concerning single sign
Data issues:Various data issues in cloud
1. Data loss:
computing are as follows :
Ifthe vendor closes due to financial or legal
will be a loss of data for the customers. The problems there
access those data customers will not be able to
because data is nomore available for the customer as
the vendor shut down.
2 Data location : When it comes to location of the
data
transparent even the customers do not know where his ownnothing is
data are
located. The vendor does not reveal where all the data are
stored. The
data will not even be in the same country of the
located anywhere in the world. customer, it might be
3. Data lock-in: Software stacks have improved
platforms, but the APls for cloud computing itself interoperability among
are still essentially
proprietary. or at least have not been the subject of active standardisation.
Thus, customers cannot easily extract their data and programs from
one site to run on another.
4Data segregation : Data in the cloud is typically stored in a shared
environment whereby one customer's data is stored alongside another
customer's data, hence it is difficult to assure data segregation.
5. Dataconfidentiality and auditability : Current cloud offerings are
essentially public (rather than private) networks, exposing the system
tomore attacks. Auditability could be added as an additional saver
beyond
the reach of the virtualized guest OS providing facilities
secure than those built into the applications themselves andarguably more
the software responsibilities related to confidentiality and centralizing
a single logical layer. auditability to
6. Data integrity : One of the biggest concerns with cloud
data storage is
the verification of data integrity at untrusted servers, and how to deal
with sensitive data. It is not an easy task to maintain customer's most
sensitive cloud data securely, which is needed in many applications for
clients.
7. Deletion of data: Data that has to be deleted by the user because he or
she no longer needs it or many no longer process it for another
is also deleted by the provider and no more copies of reason
data are available.
This can lead toproblems, particular in connection with backups.
8. Service level agreements : According to the purpose for which
data is processed, it is important to agree on binding service levels the
for
availability and data recovery and if necessary, safe guarded by supporting
fixed penalties in the event of non-compliance with the agreed service
levels.
Cloud Computing 1-7E (CSTT-Sem-7)
Answer
1 Cloud is an extension ofthe internet with some level of inherent discipline
and ethics.
2 Cloud can be thought of unification of information technology with
business intelligence.
3 Technology merges virtualization, grid functionalities and web standards
as a single utility model which is delivered to the custumers over the
internet, whereas the business intelligence defines the best cost schemes
leading to win-win situation for both the cloud service provider as well
as the cloud service consumer.
4 Cloud brokers negotiate the best deals and relationships between the
cloud consumers and cloud providers.
5. They can use specialized tools to identify the most appropriate cloud
resource and map the requirements of the application to it.
6
Cloud broker services are mainly categorized into three group:
Service intermediation broker provides a service to a consumer
that enhances a given service by adding some value on top to increase
some specific capability.
integrates
b Service aggregation brokerage service combines and
are modelled across
into one or more services and ensures that data
of data between
all component services and movement, security
the service consumer and multiple providers,
C Service arbitrage is similar to cloud service aggregation but services
services provide
being aggregated are not fixed. In addition, these
flexibility and opportunity for the service aggregator.
Que 1.8. What are the components of cloud ?
Answer
Components of cloud :
1. Cloud service consumer (or end user):
clients, which
i. Cloud service consumers are the end users known as
interact with the system and demand for services as per their
requirement.
ii The client can be categorized into the following three categories:
a Mobile clients : Mobile clients run the application from
laptops, PDAs and smart phones. This category of clients
demands for higher speed and high level of security.
1-10 E (CSIT-Sem-7)
Introduction
b. Thinclients :Thin clients neither have hard
DVD ROM drives, and largely depend on the drives nor have
server.
C. Thick clients : Thick clients are self-sufficient in terms of
accessories.
2. Cloud service provider :
Cloud service providers are the agents which host the
the cloud and deliver service to the servers in
end users.
ii. The major cloud providers are Google, Amazon, Sales Force, IBM,
Microsoft and Rackspace.
3. Internet medium: Internet medium is the communication channel
between the consumer and provider where services are redirected.
4. Datacentre:
Datacentre is the collection of servers where the applications
subscribed are housed.
ii. It consists of storage, network, and server.
Que 1.9. Give the characteristics of cloud.
Answer
Characteristics of cloud are :
1 Self-service on-demand: As acloud consumer, users are privileged to
request and provision computing capabilities bundled with services with
or without approval process powered by automation and workflows.
2. Ubiquitous network access: This is the characteristic by which end
user and server computing devices can be accessed over the network
even using the next generation heterogeneous devices such as
smartphone, tablets, thin and thick chents.
3 Resource pooling:
This characteristic refers to the poolingof resources across
datacenters. multiple
These pooled virtual datacenters are then divided into multiple
pools to provide their services to various consumers in a multi
tenant model.
i. These pools can have both physical and virtual resources.
iv. The devices provided by this pool give the notion of
location
independent compute (storage, servers, processing, network
bandwidth, virtual machines, etc.), where the consumer does not
have control or visibility about the service location and its
geography.
4. Rapid elasticity :
This characteristic makes the provisioning rapid and elastic.
Cloud Computing 1-11 E (CSIT-Sem-7)
i
Software-as-a-Service (SaaS):
Software-as-a-Service
the
(SaaS) model enables the customer to use
provided application hosted on the cloud
i. In this model, the customer does not infrastructure.
have any control over the
cloud infrastructure but has a little control
over the application
configuration settings.
iii. The applications are accessible from the
client devices such as thin
client or web browser interface.
Cloud
SaaS
PaaS
laaS
Answer
Evolution of cloud computing:
1. Grid computing :
evolution of
Grid computing appeared in the early 1990s as an
cluster computing.
. Grid computing proposed a new approach to access large
computational power, huge storage facilities, and a variety of
services. Users can consume resources in the same way as they
use other utilities such as power, gas, and water.
iüi. Grids initially developed as aggregation of geographically dispersed
cluster by means of internet connection.
and
iv. These clusters belonged to different organizations
computational
arrangements were made among them to share the
power.
Different from a large cluster, a computing grid was a dynamic
was
aggregation of heterogeneous computing nodes, and its scale
nationwide or even worldwide.
2. Utility computing :
Utility computing is a vision of computing, defining a service
such
provisioning model for computing services in which resources
infrastructure are
as storage, compute power, applications, and
packaged and offered on a pay-use basis.
1-14 E (CS/IT-Sem-7)
Introduction
The business model introduced with utility computing
requirements and led to an improvement of mainframebrought new
technology,
additional features such as operating systems, process controland
user metering facilities.
i. The idea of computing as utility remained and extended from
business domain to the academia with the advent of cluster the
computing.
3. Software-as-a-Service: Refer Q. 1.11, Page 1-11E, Unit-1.
4. Cloud computing : Refer Q. 1.1, Page 1-2E, Unit-1.
Que 1.14. Discuss the architecture of cloud
computing.
Answer
Cloud computing architecture refers to the components and
required for cloud computing. These components consist of:subcomponents
1 Front end platform :
Cloud computing architecture consists of front end platforms called
clients or cloud clients.
These clients comprise servers, fat (or thick) clients, thin clients,
zero clients, tablets and mobile devices.
i. These client platforms interact with the cloud data
storage through
an application (middleware), through a web browser, or
virtual session.
through a
iv. The front end refers to the client part of cloud
computing
consists of interfaces and applications that are requiredsystem. It
to access
the cloud computing platforms like web browser.
2 Back end platform:
Theback end refers to the cloud itself. It consists of all the
required to provide cloud computing services. resources
It comprises of huge data storage, virtual
mechanism, services, deployment models, servers, machines, security
etc.
ii. It is online network storage wheredata is
stored and accessible to
multiple cients.
3 Cloud based delivery: These include the following:
i
Software-as-a-Service (SaaS): Refer Q. 1.11, Page 1-11E, Unit-1.
ii.
Development-as-a-Service
web-based, community shared
(DaaS) : Development as a service is
development tools. This is equivalent
to locally installed development tools in the
traditional (non-cloud
computing) delivery of development tools.
Cloud Computing 1-15 E (CSIT-Sem-7)
Internet
Application
Management Service
Security
Storage
Infrastructure
Answer
Applications of cloud computing:
1. Big data analytics : From fraud recognition to statistical investigation,
big data exist universally. Analyse how Hadoop and great presentation
computing clusters can be set-up in both public and private clouds.
2.
Develop and test : Build and test applications in on-requirement
platforms using constantly configured resources, lower expenditure,
and decreased release cycles.
1-16 E (CSIT-Sem-7) Introduction
3. Management capabilities :
the management of
Despite there being multiple cloud providers,
infancy.
platform and infrastructure is still in its
ii. For example, features like
Auto-scaling are a crucial requirement
for many enterprises.
scalability and load
There is huge potential to improve on the
balancing features provided today.
restrictions :
4. Regulatory and compliance
government regulations do not
i In some of the European countries,
information and other sensitive
allow customer's personal the state or country.
informatipn to be physically located outside
cloud providers need to set-up
In order to meet such requirements,
exclusively within the country to
a datacentre or a storage site
comply with regulations.
may not always be feasible and is a
iii. Having such an infrastructure
big challenge for cloud providers.
PART-2
Questions-Answers
Questions
Long Answer Type and Medium Answer Type
Answer
1. Parallel computing is a computation type in which multiple processors
execute multiple tasks simultaneously.
2. Problems are broken down into instructions and are solved concurrently.
3. The main reason for parallel programming is to execute code efficiently,
since parallel programming saves time, allowing the execution of
applications in a shorter time.
4. Advantages of parallel computing over serial computing are :
1-18 E (CSIT-Sem-7) Introduction
i
lt saves time and money as many resources working together will
E:
F: reduce the time and cut potential costs.
It can be impractical to solve larger problems on serial computing.
i. It can take advantage of non-local resources when the local
resources are finite.
iv. Serial computing wastes the potential computing power, thus
parallel computing makes better work of hardware.
Que 1.18. Describe briefly the components of parallel computing.
Answer
Components of parallel computing :
Assign
Computing parallel
problems
computation s
to processors
Parallel
algorithms Mapping Hardware
and data architecture
,structures
Answer
1. Distributed computing is a model in which components of a software
system are shared among multiple computers to improve
performance. efficiency and
2 In distributed computing, each processor has its
own private memory
(distributed memory). Information is exchanged by passing messages
between the processors.
3 A distributed system allows resource sharing,
systems connected to the network.
including software by
4 The goal of distributed computing is to make network as a
computer.
single
5. Examples of distributed systems /applications of distributed computing
are :Intranets, Internet, WWW, email.
Que 1.21. Differentiate between parallel computing and distributed
computing.
Answer
S.No. Parallel computing Distributed computing
1 It is a type of computation A system whose components are
in which many calculations located on different networked
or the execution of computers, which communicate
processes are carried out and coordinate their actions by
simultaneously. passing messages to one another.
2 It occurs in a single It involves multiple
computer.
computers.
3. Multiple processors execute Multiple computers perform tasks
multiple tasks at the same at the same time.
time.
Answer
1. Cloud computing clients can access standardizedIT resources to deploy
new applications, services, or computing resources rapidly without re
engineering their entire infrastructure, thus making it dynamic.
2. Cloud dynamic infrastructure is based on an architecture that combines
the following initiatives :
a. Service management : Offers business transparency and
automation across the pillars of business for consistent delivery.
b. Asset management: Maximizes the value of critical business and
IT assets over their life cycle with industry-tailored asset
management solutions.
C. Virtualization and consolidation : Reduce operating costs,
improve responsiveness, and fully utilize the resources.
d. Information infrastructure : Helps businesses achieve
information compliance, availability, retention, and security
Cloud Computing 1-23 E (CSIT-Sem-7)
objectives.
e. Energy efficiency : Offers green and sustainable energy solutions
for business.
£. Security :Provides end-to-end industry customized governance,
risk management, and compliance for businesses.
g. Elasticity : Maintains continuous business and IT operations while
rapidly adapting and responding to risks and opportunities.
Que 1.24. Explain technologies used for distributed computing.
Answer
Technologies used for distributed computing are :
1. Remote procedure call :
i. Remote Procedure Call (RPC) is the fundamental abstraction
enabling the execution of procedures on client's request.
beyond the
It allows extending the concept of procedure call
boundaries of a processor and a single memory address space.
be on the same
ii. The called procedure and calling procedure may network.
system, or they may be on different systems in a
Answer
Advantages of elastic cloud computing:
1 Cost efficiency :
approaches
Cloud is available at much cheaper rates than traditional
and can significantly lower the overall IT expenses.
licensing fees as well as
ii By using cloud solution companies can save storage,
eliminate overhead charges such as the cost of data
software updates, management etc.
makes easier
2. Convenience and continuous availability : Cloud
and modify choice. Public
access ofshared documents and files with view
available wherever the end user
clouds also offer services that are
continuous availability of
might be looted Moreover it guaranteed alternative instances are
resources and in use of system failure,
automatically spawned on other machines
up and recovering data
3. Backup and recovery : The process of backingnot on a physical device.
cloud and
is easy as information is residing on flexible backup/recovery
The various cloud providers offer reliable and
solutions.
cloud is more efficient than the
4. Cloud is environment friendly:The resources to compute, thus
typical IT infrastructure and it takes fewer
saving energy.
a built-in feature for
5. Scalability and performance : Scalability is automatically only
are deployed
cloud deployments. Cloud instances performance with excellent speed
when needed and as a result enhance
of computations.
Answer
Disadvantages of elastic cloud computing:
biggest concern in
1. Security and privacy in the cloud: Security is the private data and
their
cloud computing. Companies essentially hide
infrastructure is used, it is
information over cloud as remote based cloud
1-26 E (CSIT-Sem-7) Introduction
then up to the cloud service provider to manage, protect and retain data
confidential.
2. Limited control : Since the applications and services are running
remotely companies, users and third party virtual environments have
limited control over the function and execution of the hardware and
software.
3. Dependency and vendor lock-in : One of the major drawbacks of
cloud computing is the implicit dependency on the provider. It is also
called "vendor lock-in". As it becomes difficult to migrate vast data from
old provider to new. So, it is advisable to select vendor very carefully.
4. Increased vulnerability :Cloud based solutions are exposed on the
public internet therefore are more vulnerable target for malicious users
and hackers.
2 UNIT
2 Cloud Enabling
Technologies
CONTENTS
Part-1 : Service Oriented Architecture 2-2E to 2-6E
.2-23E to 2-33E
Part-4 : Virtualization Structure, Tools .......,. ....
2-1 E (CSIT-Sem-7)
2-2 E (CSIT-Sem-7)
Cloud Enabling Technologies
PART-1
Service Oriented Architecture.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
There are two major roles of Service Oriented Architecture (SOA):
1. Service provider:
a The service provider is the maintainer of the service and the
organization that makes available one or more services for others
to use.
b To advertise services, the provider can
publish them in a
together with a service contract that specifies the natureregistry,
of the
service, how to use it, the requirements for the service, and the
fees chargcd.
Cloud Computing 2-3E (CSIT-Sem-7)
2. Service consumer :
a. The service consumer can locate the service metadata in the registry
and develop the required client components to bind and use the
service.
Answer
Advantages of SOA:
1 Service reusability : In SOA,
applications are made from existing
applications.
services. Thus, services can be reused to make many
24E (CSTT-Sem-7) Cloud Enabling Technologies
Easy maintenance: As services are independent of each other they
can be updated and modified easily without affecting other services.
3. Platform independent: SOA allows making a complex application by
combining services picked from different sources and are independent
of the platform.
4. Availability: SOA facilities are easily available to anyone on request.
5. Reliability :SOA applications are more reliable because it is easy to
debug small codes rather than huge codes.
6. Scalability : Services can run on different servers within an
environment, this increases scalability.
Disadvantages of SOA:
1. High overhead: A validation of input parameters of services is done
whenever services interact, which decreases performance as it increases
load and response time.
2. High investment :A huge initial investment is required for SOA.
3. Complex service management : When services interact they
exchange messages to tasks. The number of messages may go in millions.
It becomes a cumbersome task to handle a large number of messages.
Answer
Benefits of usingSOA:
1. Language neutral integration : Regardless of the develoving
language used, the svstem offers and invoke services through a coror
mechanism. Programming language neutralization is one o! the key
benefits of SOA's integration approach.
Cloud Computing 2-5 E (CSIT-Sem-7)
Answer
sOA architecture is viewed as five horizontal layers:
1. Consumer interface layer : These are GUI based apps for end users
accessing the applications.
2. Business process layer : These are business-use cases in terms of
application.
3. Services layer: These are whole-enterprise, in service inventory.
4. Service component layer : They are used to build the services, such
as functional and technical libraries.
5. Operational systems layer: It contains the data model.
Answer
Vertical layers of SOA architecture:
1. Integration layer :Starts with pltform integration (protocols support),
data integration, service integration, application integration, leading to
enterprise application integration supporting B2B and B2C.
2 Quality of service layer : Security, availability, performance ete.,
constitute the quality of service parameters which are configured based
on required SLAs, OLAs.
3 Informational layer :Provide business information.
4 Governance layer : IT strategy is governed to each horizontal layer to
achieve required operating and capability model.
Que 2.9.Explain the elements of SOA.
2-6E (CSIT-Sem-7) Cloud Enabling Technologies
Answer
Elements of Service Oriented Architecture (SOA):
SOA
Application Service
Service Service Bus
frontend repository
1. Application frontend :
a.
Application frontends are active elements of the SOA, delivering
the value of SOA to the end users.
b They initiate and control all activity of the enterprise system.
2. Service: It is a software component that encapsulates a high level
business concept.
3 Contract : It provides a specification of the purpose, functionality,
constraints, and usage of services.
4 Interface : Functionality of the service exposed by the service to the
clients that are connected to the service.
5. Implementation :The service implementation provides the required
business logic and appropriate data. It contains one or more of the
artifacts :programs, configuration, data and databases.
6. Business logic : Business process represented by the service.
7 Data: Data represented in the service used by the service.
8. Service repository :It registers the services and their attributes to
facilitate the discovery of services, operation, access rights,
qualities, etc. owner,
9. Service bus: Aflexible infrastructure for integrating
applications and
services by :routing messages, transforming protocols between
and service, handling business events and requestor
QoS,security, and managing the delivering them, providing
interaction among services.
2-7 E (CSIT-Sem-7)
Cloud Computing
PART-2
Publish-Subscribe
Systems, Web Services,
REST and Systems of Model.
Questions-Answers
note on REST.
Que 2.10. Write a short
Answer information
State Transfer (REST) is a way of getting contains
Representational which
1
from a website by reading a designated webpagecontent.
content includes thedesired
describes and
an XML file that
cloud provider to provide updated subscription
2 REST is used by
information.
includes content and XML
provider could prepare a web page that
3 The code.
described in the
statements that are (URL)
need to know the Uniform Resource Locator
Subscribers only witha web browser.
4
page where the XML file is located, read it display it
for the using XML information, and
understand the content
appropriately. sites use with RDF
same publishing approach that many
5 REST uses the
(RSS). RSS uses the Resource Description Framework
Site Summary way to describe a website.
(RDF), which is a standard
benefits :
REST offers the following support
response time and reduced server load due to its
1. It gives better representations.
for the caching of maintain session
scalability is improved by reducing the need to
2. Server
state. resource, so less
single browser can access any application and any
3 A be written.
client-side software needs to the use
resource discovery mechanism is not needed, due to
4 separate
A
of hyperlinks in representations.
compatibility and evolvability characteristics.
5. It has better long-term
2.11. What are HTTP methods used by REST architecture ?
Que
2-8 E (CSTT-Sem-7)
Cloud Enabling Technologies
Answ er
The REST architecture makes use of four HTTP methods. These are :
1 GET method : This method helps in offering read-only access for the
resources.
2. POST mnethod:This method is implemented for creating a new resource.
3. DELETE method:This method is implemented for removing a resource.
4. PUT: This method is implemented for updating an existing resource or
creating a new one.
Answer
1 ARESTful API is an Application Program Interface (API) that uses
HTTP requests to GET, PUT, POST and DELETE data.
2. A RESTful API is referred to as a RESTful web service that is based on
Representational State Transfer (REST) technology, an architectural
style and approach to communications often used in web services
development.
3. REST technology is generally preferred to the more robust Simple Object
Access Protocol (SOAP) technology because REST leverages less
bandwidth, making it more suitable for internet usage.
4 An API for website is a code that allows two software programs to
communicate with each other.
5 REST is a logical choice for building APIs that allow users to connect and
interact with cloud services.
6. RESTful APIs are used by sites such as Amazon, Google, LinkedÉn and
Twitter.
7 A RESTful API breaks down a transaction to create a series of small
modules. Each module addresses a particular underlying part of the
transaction. This modularity provides developers with a lot of flexibility.
Que 2.13. Differentiate between RESTful web service and RESTless
web service.
Cloud Computing 2-9 E (CSIT-Sem-7)
Answer
Answer
The advantages of REST are :
the server:
1. Separation between the client and
interface from the
a The REST protocol totally separates the user
server and the data storage.
interface to other
b For example, it improves the portability of the the projects, and
types of platforms, it increases the scalability of
be evolved
allows the different components of the developments to
independently.
2. Visibility, reliability and scalability :
has one evident
The separation between client and server
product
advantage, that each development team can scale the
without problem.
of changes in
b They can migrate to other servers or make all kinds is sent
the database, provided that the data from each request
correctly.
2-10 E (CSIT-Sem-7)
Cloud Enabling Technologies
The separation makes it easier to have the front and the back on
different servers, and this makes the apps more flexible to work
with.
3. The REST APIis always independent of the type of platform or
languages :
a. The REST API always adapts to the type of syntax or platforms
being used, which gives considerable freedom when changing or
testing new environments within the development.
b. With a REST API we can have PHP, Java, Python Servers.
Que 2.15. Write a short note on web services.
Answer
1 A web service is a software package that is used for communicating
between two devices or web entities lying on the network.
2 They involve a service provider along with a service requester, i.e., the
client.
3. Since web services are advantageous as they are language transparent,
so there is no issue whether the fundamental system is providing the
service developed in Java, PHP or any other language while the client
application is written in Python, Ruby, Perlor JavaScript.
4. Task performed by web services :
Web services are searched for over the network as well as call upon
accordingly.
As a web service is called, it would be capable of providing operation
for the client that has invoked the web service.
Answèr
Two types of web services:
1 SOAP web services:
i The abbreviation ofSOAP is Service Oriented Architecture Protocol.
ii It is an XML based protocol having the main benefit of
the SOAP web service as its security. implementing
iüi. SOAP offersa wrapper for sending a web service based
messages
over the Internet by the help of HTTP protocol. AIl its messages are
usually in XML format.
Cloud Computing 2-11 E (CSIT-Sem-7)
Answer
requests.
b. Manipulation of resources through representations :
Client has representation of resource and it contains enough
information to modify or delete the resource on the server,
provided that it has permission to do so.
2-12 E (CSIT-Sem-7)
Cloud Enabling Technologies
C.
Self-descriptive messages: Each message includes enough
information to describe how to process the message so that
server can easily analyse the request.
d. Hypermedia As The Engine of Application State
(HATEOAS): It need to include links for each response so
that client can discover other resources easily.
2. Stateless:
i. It means that the necessary state used to handle the
request is
contained within the request itself and server would not store
anything related to the session.
i. In REST, the client must include all information for the server to
fulfill the request whether as a part of headers or URI.
3. Cacheable:
Every response should include whether the response is cacheable
or not and for how much duration responses can be cached at the
client side.
ii. Client will return the data from its cache for any subsequent
and there would be no need to send the request again to the request
server.
4 Client-Server:
i REST application should have client-server architecture.
. A client is someone who is requesting
resources and are not
concerned with data storage, which remains internal to each server,
and server is someone who holds the
resources and are not
concerned with the user interface or user state.
5. Layered system :
An application architecture needs to be composedof
multiple layers.
Each layer does not know anything about any layer other than that
of immediate layer and there can be lot of
between client and the end server.
intermediate servers
ii. Intermediary servers may improve system
availability by enabling
load-balancing and by providing shared caches.
6. Code on demand:
It is an optional feature. According to this, servers can
executable code to the client.
also provide
Answer
Subscriber
Message
Message
Publisher Publish/subscribe channel Subscriber
Subscriber
Fig. 2.20.1.
1. Publisher: Publishes messages to the communication infrastructure.
2. Subscriber: Subscribes to a category of messages.
3.
Communication infrastructure (channel, classes) : Receives
messages from publishers and maintains subscriber subscription.
4. The publisher will categorize published messages into classes where
subscribers will receive the message.
5 A publisher has one input channel that splits into
channels, one for each subscriber. multiple output
6 Subscribers can express interest in one or more classes and only receive
interested message.
7 In pub/sub model the publisher and subscriber are
unaware of each
other. The publisher sends messages to subscribers, without knowing
about subscriber.
8. Subscriber receives messages, without having knowledge of the
publishers. If there are no subscribers around to receive the topic-based
information, the message is dropped.
Que 2.21. What are the benefits of publish-subscribe model ?
Answer
Following are the benefits of publish-subscribe model:
1. It decouples subsystems that need to
communicate. Subsystems can be
managed independently, and messages can be properly managed even
if one or more receivers are offline.
2. It increases scalability and improves
responsiveness of the sender. The
sender can quickly send a single message to the input channel, then
2-15 E (CSIT-Sem-7)
Cloud Computing
messaging
return to its core processing responsibilities. The delivered to
infrastructure is responsible for ensuring messages
interested subscribers.
helps applications to
3. It improves reliability. Asynchronous messaging
increased loads and handle
continuously run smoothly under
intermittent failures more effectively.
to pick up messages
4. It allows scheduled processing. Subscribers can waitprocessed according
untiloff-peak hours, or messages can be routed or
to a specific schedule.
5 It enables simpler integration between systems using different platforms,
protocols, as well as between
programming languages, or communication
the cloud.
on-premises systems and applications running in
enterprise.
6 It facilitates asynchronous workflows across an
monitored and messages can be
7 It improves testability. Channels can be strategy.
inspected or logged as part of an overall integration test
PART-3
Implementation
Basics of Virtualization, Types of Virtualization,
Levels of Virtualization.
Questions-Answers
Type Questions
Long Answer Type and Medium Answer
Why it is needed ?
Que 2.22. Define virtualization.
Answer
decouples the
1. Virtualization is an abstraction layer (hypervisor) thatdeliver greater
(0S) to
physical hardware from the Operating System
IT resource utilization and flexibility.
of platform and allows
2. The virtualization platform provides the isolation same physical
multiple businesses to run multiple virtual machines on the
machine.
3. Following are the benefits provided by virtualization:
i. Money saving :
With virtualization technology, the number of physical servers
can be reduced.
Therefore, the ongoing pro curement, maintenance, and
b.
ongoing operational costs will also be reduced.
2-16 E (CSTT-Sem-7)
Cloud Enabling Technologies
ii. Dramatic increase in control:
a.
Virtualization provides aflexible foundation to provide capacity
according to the demand for an organization.
b. New servers can be quickly deployed. Therefore, services can
be provided within minutes.
C. It is also easy to ship the infrastructure when it is deployed
using virtualization techniques.
iüi. Simplified disaster recovery :
More efficient and cost effective disaster recovery solutions
a.
can be realized with virtualization technologies.
b. Servers and online business can be transferred to an alternate
site within minutes with the help of virtualization.
iv. Business readiness assessment :
Virtualization introduces a shared computing model to an
enterprise and it is easy to understand infrastructure
requirements in a virtualized environment.
Virtualization can help to :
1 Reduce the cost of the existing infrastructure by reducing operational
and systems management cost while maintaining the needed capacity.
2 Reduce the complexity of adding to the infrastructure.
3. Gather information and collaboration across the organization to increase
both the utilization of information and its effective use.
4. Deliver on-Service Level Agreement (SLA) response time during spikes
in production and test scenarios.
5. Build a heterogeneous infrastructure across the organization that is
more responsive to the organization's needs.
Que 2.23. Explain various current virtualization initiatives.
Answer
Various current virtualization initiatives are:
1. Virtual CPU and memory:
i. Physical CPUs and RAM can be dedicated or dynamically allocated
to virtual machines.
As there is no OS dependency on the physical hardware, with the
CPUchecking off, virtual machines can be migrated to different
hosts, with background changes to the physical CPUand memory
resources being transparent to the guest OSs running on virtual
machines.
Cloud Computing 2-17 E (CSIT-Sem-7)
2. Virtual networking :
This creates a virtual 'network in a box' solution that allows the
hypervisor to manage virtual machine network traffic through the
physical Network Interface Controller (NIC) and allows each of the
virtual machines to have a unique identity on the network from
the physical host.
3. Virtual disk :
i Storage Area Network (SAN) based storage is presented as storage
targets to the physical host, which in turn used to host virtual
machine's vdisks (virtual disks).
4 Consolidated management :
i. The performance and health of virtual machines and guest OSs
can be monitored and console access to all of the servers can be
obtained via single console.
5. Virtual machine :
Active virtual machines can be transparently transferred across
physical hosts with no down-time and no loss of service availability
or performance.
The virtual machine's execution state, active memory, network
identity,and active network connections are preserved across the
source and destination hosts so that the guest OS and running
applications are unaware of the migration.
6. Storage virtual machine :
i Vdisks of active virtual machines can be seamlessly and
transparently transferred across data stores, while the execution
state, active memory, and active network connections remain on
the same physical host.
7. Dynamic load balancing :
Dynamically load balances virtual machines across the most optimal
physical hosts to ensure that pre-defined performance levels are
met.
Virtual machines can be automatically and seamlessly transferred
to a less busy hostif a particular host in a resource pool is in a high
utilization state.
iüi. Different resource pools can be defined for different business needs.
iv. For instance, production pools can be defined with more demanding
service level requirements, while development pools can be used
with more relaxed service level requirements.
8. Logical Partitions (LPARs) :
i LPARs result in hardware layer logical partitioning tocreate two or
more isolated computing domains, each with its own CPU, memory
address space and VO interface, with each domain capable of housing
a separate OS environment on single physical server.
2-18E(CNTT Sem
ii LPARs canshare OPUacbave dedcated plyatsal
ii Likewise, an LAR can be a dudeatud jlyanal ydan
space or memory addeeaaea Can lw dyaancally ulbocaud nnE
LPARs as needed
9. Logical Donains (DOMs) :
Operating ayatums unng in each logal dama
independently managed, lati, alpd, utatud, nd nled
without inpucling other LOMa rnig n hat
AType I 'bare etal hypervioog lalate plg v
from physical resources.
For exanple,domains aross diatc Wueada n la paHl
the multithveading lechnologY, hecam lhe hypVan
dynamically managing andencapaulating the allnathd hyaal
resouCe8.
10. Zones :
Answer
Advantages i
Virtualization software reduces VMM comdexily
2. Improves hunctionality.
Increase ertormance
4 Provides server consolidation, tuetingad develpnent, epviaot
dynamic load balancing and the daalerrevery and alan pnvea th
Byslen reliability and security
5.
Connervalion af enorgY, maintenanve of logny apptatnt
Bupporting a erosa platorm ofiee
Disadvantages
1. High risk in the pthyaical fault
2. It in alo not eany, quite eomplieated
3 Not supported by allapleationa
2-19 E (CSTT-Sem-7)
Cloud Computing
point of failure, demands power machines, visualization
4 It has single
may lead to lower performance.
possible.
5. Application is identified to be always not
note on server
virtualization.
Que 2.25. Write a short
Application Application
Operating system
Operating system
Virtualization/Hypervisor
Memory Disk
CPU
virtualization.
Fig. 2.25.1. Server
Virtual machine: partition, or
termed as a virtual environment,
1 Virtual machine can be
container. physically exist but is
environment, a server that does not
2 Ina server server is called 'guest'.
created on a different termed as 'host'.
instance where a virtual machine runs is
3. The physical server.
can have multiple VMs running on the
4. These hosts
resources can be dynamically assigned to
toa pool of
5. AllVMs assigned
pool-based available resources.
VM, he/she is privileged to use his/her VM as
6. When auser talks to this functionalities such as accessing the OSs,
with all
a physical server hard disk from the common pool.
CPU, memory, and servers based on supported
multiple virtual
7. The hypervisor virtualizes
architecture. and memory.
bundled with an OS, CPU, hard disk,
8 Each virtual machine is
2-20 E (CSTT-Sem-7) Cloud Enabling Technologies
Virtualization technologies : Two major types of technologies are
employed in server virtualization:
a. Hardware virtualization :
i. Hardware virtualization is also known as hypervisor-based
virtualization, bare-metal hypervisor, type 1virtualization, or
simply hypervisor.
This virtualization technology has a virtualization layer running
immediately on the hardware which divides the server machine
into several , virtual machines or partitions, with a guest OS
running in each of these machines.
i. The binary transparency is provided by avirtualized approach
and products enable the transparency for OSs, middleware,
and applications.
b. OS virtualization:
This type of server virtualization is also known as OS-based
virtualization, OS-level virtualization, or type 2virtualization.
OS virtualization creates virtualization environments within a
single instance of an 0S.
üi. Virtual environments created by OS virtualization are often
called 'containers'.
iv. Because all virtualization environmentS must share resources
of a single OS while having a private virtual OS environment,
a particular implementation of the technology may alter the
file system orientation and often introduce access restrictions
to global system configuration or settings.
|Application |Application
Guest OS Guest OS
Application Hypervisor
Host OS
Hardware
Answer
Types of virtualization :
1. OS virtualization :
i Virtualizing an operating system environment is the most common
form of virtualization.
2-21 E (CSTT-Sem-7)
Cloud Computing
instances of an
ii. It involves putting a second instance or multiple
operating system, like Windows, on a single machine.
of physical
li. This empowers businesses to reduce the amount the number
hardware required to run their software by cutting down
of actual machines.
rack space,
ivIt saves companies cash on energy, cabling, hardware,
and more, while still allowing them to run the same quantity of
applications.
2. Application-server virtualization :
Application-server virtualization is also referred to as 'advanced
servers
load balancing,'as it spreads applications across servers and
across applications.
specific
This enables IT departments to balance the workload of
.
ii
software in an agile way that does not overload a specific server or
underload a specific application in the event of a large project or
change.
ii. It also allows for easier management of
servers and applications,
since we can manage them as a single instance.
3 Application virtualization :
Application virtualization operates application on computers as if
on
they reside naturally on the hard drive, but instead are running
a server.
storing
The ability to use RAM and CPUto run the programs while
terminal services and
them on a server, like through Microsoft are
cloud-based software, improves how software security updates
pushed, and how software is rolled out.
Administrative virtualization :
4.
least-known forms of
1. Administrative virtualization is one of the
used in data
virtualization, likely due to the fact that its primarily
centers.
'management,' virtualization
The concept of administration, or policies.
means segmented admin roles through group and user
involves virtually
5. Network virtualization : Network virtualizationlike routing tables,
managing IPs, and is accomplished through tools
NICs, switches, and VLAN tags.
Page 2-19E, Unit-2.
6 Hardware virtualization : Refer Q. 2.25,
7. Storage virtualization:
are managed by a
Storage virtualization isan array of servers that
virtual storage system.
where their data is stored.
The servers are not aware of exactly
level of virtualization.
Que 2.27. Explain the implementation
2-22 E (CSIT-Sem-7)
Cloud Enabling Technologies
Answer
Various implementation level of virtualization :
1. Instruction Set
Architecture (ISA) level:
i. At the ISA level, virtualization is performed by
ISAby the ISAof the host machine. emulating a given
The basic emulation method is through code
üi. An interpreter program interprets the source interpretation.
instructions one by one. instructions to target
iv. One source instruction may require tens or hundreds of
target instructions to perform its function. This process is native
slow. relatively
V For better performance, dynamic binary translation is
Vi. This approach translates basic blocks of dynamic
desired.
to target instructions. source instructions
Vi. The basic blocks can also be
extended to program traces or super
blocks to increase translationefficiency.
vi. AVirtual Instruction Set
Architecture (V-ISA) thus requires adding
a processor-specific software
translation layer to the compiler.
2. Hardware abstraction level:
It is performed right on top of the
bare hardware and generates a
virtual hardware environment for a VM.
The idea is to virtualize a
computer's resources, such as its
processors, memory, and VO devices so as hardware utilization
rate by multiple users concurrently may be
3. Operating system level :
upgraded.
OS-level virtualization creates isolated containers on a
physical server and the OS instances to utilize the hardwaresingle
and
software in data centers.
The containers behave like real servers.
OS-level virtualization is
commonly used in creating virtual hosting environments to allocate
hardware resources among a large number of mutually distrusting
users.
5. User-application level :
Virtualization at the application level virtualizes an application as a
VM.
On a traditional OS, an application often runs as a process.
iüi. Therefore, application-level virtualization is also known as
process-level virtualization. The most popular approach is to deploy
High Level Language (HLL).
Application level
JVM/.NET
WINEVisual MainWin
Virtual Environment/FVM
Bochs/BIRD/Dyn amo
Fig. 2.27.1.
PART-4
Questions-Answers
Long Answer Type and Medium Answer Type Questions
XonoLinux XonoWindows
Domain 0
XEN (Hypervisor)
Hardware devices
Fig. 2.29.1.
with fll
Que 2.30. Write a short note on binary translation
virtualization.
OR
Describe host-based virtualization.
2-26 E (CSIT-Sem-7) Cloud Enabling Technologies
Answer
Binary translation with full virtualization :
1. Full virtualization:
i. With fullvirtualization, non-critical instructions run on the hardware
directly while critical instructions are discovered and replaced with
traps intothe VMM tobe emulated by software.
Both the hypervisor and VMM approaches are considered full
virtualization.
ii. Critical instructions are trapped into the VMM because binary
translation can incur a large performance overhead.
iv. Non-critical instructions do not control hardware or threaten the
security of the system, but critical instructions do.
V.
Therefore, running non-critical instructions on hardware not only
can promote efficiency, but also can ensure system security.
2. Binary translation of guest OS requests using a VMM:
i. VMware puts the VMM at Ring 0 and the guest OS at Ring 1.
: The VMM scans the instruction stream and identifies the
privileged,
control and behaviour sensitive instructions.
üi. When these instructions are identified, they are trapped into the
VMM, which emulates the behaviour of these instructions. The
method used in this emulation is called binary translation.
iv. Full virtualization combines binary translation and direct
execution.
The guest OS is completely decoupled from the underlying
hardware. Consequently, the guest OS is unaware that it is being
virtualized.
Fig. 2.30.1.
Cloud Computing 2-27 E (CSIT-Sem-7)
Host-based virtualization:
An alternative VM architecture is to install a virtualization layer on
top of the host OS. This host OS is still responsible for managing
the hardware.
ii. The guest OS are installed and run on top of the virtualization
layer.
ii. Dedicated applications may run on the VMs. Certainly,some other
applications can also run with the host OS directly.
iv. Advantages of host- based architecture:
a.
The user can install the VM architecture without modifying
the host OS. The virtualizing software can rely on the host OS
services. This will
to provide device drivers and other low-level
simplify the VM design and ease its deployment.
b The host-based approach appeals to many host machine
configurations. Compared to the hypervisor/VMM architecture,
the performance of the host-based architecture may also be
low.
Application Application
Para-virtualized Para-virtualized
guest operating guest operating
system system
Hypervisor/VMM
Hardware
Fig. 2.31,1.
1
Para-virtualization needs to modify the guest operating systems.
substantial OS
2 Apara-virtualized VM provides special API requiring
modifications in user applications.
machine
3 The virtualization layer can be inserted at different positions in a
software stack.
4 Para-virtualization attempts toreduce the virtualization overhead, and
kernel.
thus improve performance by modifying only the guest OS
5 The guest operating systems are para-virtualized. They are assisted by
non-virtualizable OS instructions
an intelligent compiler to replace the
by hypercalls.
2-28 E (CSIT-Sem-7)
Cloud Enabling Technologies
6 The traditional X86 processor offers four instruction execution rings:
Rings 0, 1, 2, and 3.
7. The lower the ring number, the higher the privilege of instruction being
executed.
8. The OS is responsible for managing the hardware and the privileged
instructions to execute at Ring 0, while user-level applications run at
Ring 3.
Ring 3 User Apps
Ring 2 Direct
execution
of user
Ring 1
requests
Paravirtualized
Ring 0 Guest OS
Hypercalls to the
Virtualization layer virtualization
layer replace
non-virtualizable
Host computer OS instructions
system hardware
Fig. 2.31.1.
6. Xen :
i Xen is a best Linux hypervisors.
i.
The Xen hypervisor is inserted between the server's hardware and
the operating system.
iü. This creates an abstraction layer that allows multiple guest operating
systems to be concurrently executed on a single physical server.
iv. Xen is included with most popular Linux distributions like Fedora,
RHEL,CentOS, Ubuntu, and Debian.
Answer
1 CPUvirtualization is a hardware feature that allows a single processor
to act as ifit was multiple individual CPUs.
2-30 E (CSIT-Sem-7)
Cloud Enabling Technologies
2 This allows an operating system to effectively &efficiently utilize the
CPU power in the computer.
3 CPUvirtualization goes by different names depending on the CPU
manufacturer.
4 For Intel CPUs, this feature is called Intel Virtualization
Intel VT, and with AMD CPUs it is called AMD-V. Regardless Technology, or
of what it
is called, each virtualization technology provides generally the
features and benefits to the operating system. same
5 CPUvirtualization is disabled by default in the BIOS and needs to be
enabled in order for an operating system to take advantage of it.
6 CPU virtualization involves a single CPUacting as if it were multiple
separate CPUs. The most common reason for doing this is to run multiple
different operating systems on one machine.
7. CPUvirtualization emphasizes performance and runs directly on the
dvailable CPUs whenever possible.
8 The underlying physical resources are used whenever possible and the
virtualization layer runs instructions only as needed to make virtual
machines operate as ifthey were running directly on a physical machine.
Que 2.34. Describe memory virtualization in cloud computing.
Answer
1. Memory virtualization decouples volatile Random Access Memory (RAM)
resources from individual systems in the data center, and then aggregates
those resources into a virtualized memory pool available to any computer
in the cluster.
2 The memory pool is accessed by the operating system or applications
running on top of the operating system.
3 The distributed memory pool can then be utilized as a high-speed cache,
a messaging layer, or a large shared memory resource for a CPU.
4 Memory virtualization allows networked and distributed, servers to share
a pool of memory to overcome physical memory limitations, a common
bottleneck in software performance.
5 With this capability integrated into the network, applications can take
advantage of a very large amount of memory to improve overall
performance, system utilization, increase memory usage eficiency, and
enable new use cases.
6 Memory virtualization implementations are distinguished from shared
memory systems.
7 Shared memory systems do not permit abstraction of memory resources,
thus requiring implementation with a single operating system instance
(i.e., not within a clustered application environment).
Cloud Computing 2-31 E (CSIT-Sem-7)
Answer
1 In VO virtualization, a virtual device is substituted for its physical
equivalent, such as a Network Interface Card (NIC) or Host Bus Adapter
(HBA).
setup
2 Aside from simplifying server configurations, /O virtualizationdevices.
has cost implications by reducing the electric power drawn by I/O
3
Virtualization and blade server technologies cram dense computing power
centers
into a small form factor. With the advent of virtualization, dataas burst
started using commodity hardware to support functions such
computing, load balancing and multi-tenant networked storage.
4
JOvirtualization is based on a one-to-many approach. The path between
a physical server and nearby peripherals is virtualized,
allowing a single
IT resource tobe shared among Virtual Machines (VMs).
5 The virtualized devices interoperate with commonly used applications,
operating systems and hypervisors.
2-32 E (CSIT-Sem-7) Cloud Enabling Technologies
6 This technique can be applied to any server component, including disk
based RAID controllers, Ethernet NICs, Fibre Channel HBAs, graphics
cards and internally znounted Solid-State Drives (SSDs). For example, a
single physical NIC is presented as a series of multiple virtual NICs.
Que 2.37 Describe virtualization support.
Answer
1 With the help of VM technology, a new computing mode known as cloud
computing is emerging. Cloud computing is transforming the computing
landscape by sharing the hardware and costs of managing a computational
center to third parties, just like bankS.
2 Cloud computing has atleast two challenges :
The ability to use a variable number of physical machines and VM
instances depending on the needs of a problem. For example, a task
may need only a single CPU during some phases of execution but
may need hundreds of CPUs at other times ?
The slow operation of instantiating new VMs. Currently, new VMs
originate either as fresh boots or as replicates of a template VM,
unaware of the current application state. Therefore, to support
cloud computing, a large amount of research and development is to
be done.
CONTENTS
Part-1 : Layered Cloud Architecture ........... 3-2E to 3-6E
Design, NIST Cloud Computing
Reference Architecture
31E(CNIT-Sem-7)
3-2E (CSIT-Sem-7)
Cloud Architecture, Services &Storage
PART- 1
Questions-Answers
Questions
Long Answer Type and Medium Answer Type
Answer
Layered architecture of acloud:
Application layer
Platforms layer
(Software framework)
Infrastructure layer
Datacenter layer
1. Application layer :
used by
a. This layer consists of different cloud services which are
cloud users.
b These applications provide services to the end user as per their
requirements.
2. Platform layer :
a. This layer consists of application software and operating system.
b. The objective of this layer is to deploy applications directly on the
virtual machines.
Cloud Computing 3-3E(CNIT-Sem-7)
3. Infrastrueture layer :
It in avirtualization layer where physical resources are
into set of virtual resources through different partitioned
technologiessuch as Xen, KVM andVMware. virtualization
This layer is the core of the cloud environment where cloud resources
nre dynamically provisioned using different
technologies. virtualization
4. Datacenter layer :
This layer is accountable for managing physical resources such as
Nervers, Nwitches, routers, power supply, and
in the datacenter of the cloud environment. cooling system et.,
b All the resources are available and managed in
datacenters to
provide Nervices to the end user.
The dataconter consists of physical servers, connected through
high speed deviceN such as router and gwitches.
Que 3.2. Describe briefly NIST cloud computing reference
architecture.
Answer
NIST cloud computing architecture :
Cloud
consumer
Cloud carrier
1. Cloud consumer :
Acloud consumer is the end user who browses or
utilizes the
services provided by Cloud Service Providers (CSP), sets up service
contracts with the cloud provider.
In this, set of organizations having mutual
performs a security and risk assessment forregulatory constraints
cach use case of cloud
migrations and deployments.
i. Cloudconsumers use Service-LevelAgreement (SLAs) to
the technical performance specify
provider.
requirements to be fulfilled by a cloud
iv. SLAs can cover terms concerning the
and remedies for performance failures.quality service, security,
of
34E (CSIT-Sem-7) Cloud Architecture, Services &Storage
2. Cloud auditor :
Cloud auditor is an entity that can conduct independent assessment
of cloud services, security, performance and information system
operations of the cloud implementations.
i. The services that are provided by Cloud Service Providers (CSP)
can be evaluated by service auditors in terms of privacy impact,
security control and performance, etc.
iü. Cloud Auditor can make assessment of the security controls in the
information system to determine the extent to which the controls
are implemented correctly, operating as planned and constructing
necessities
the desired outcome with respect to meeting the security
for the system.
auditor :
iv. There are three major roles of cloud
a. Security audit
b Privacy impact audit
C.
Performance audit
3. Cloud service providers :
services to cloud consumers
i It is a group or object that delivers cloud
or end users.
variety of cloud services
.H
It offers consumers to purchase a growing
from cloud service providers.
cloud-based services:
ii. There are various categories of
providers
a. laaS providers : In this model, the cloud service
in an on
offer infrastructure components that would exist servers,
premises datacenter. These compcnents consist of
networking and storage as well as the virtualization layer.
Software-as-a-Service (SaaS), vendors
b. SaaS providers : In technologies, such as
provide a wide sequence of business Customer
Human Resources Management (HRM) software, which the
all
Relationship Management (CRM) software, internet.of
SaaS vendor hosts and provide services through
(PaaS), vend
C. PaaS providers : In Platform-as-a-Service
that can access to
offer cloud infrastructure and services
products are
perform many functions. In PaaS, services andproviders offer
mostly utilized in software development. PaaS
providers provide
more services than laaS providers. PaaS application stack,
operating system and middleware along with
tothe underlying infrastructure.
4. Cloud broker: performance, use and
An organization or a unit that manages the offers
delivery of cloud services by enhancing specific capability and
the value-added services to cloud consumers.
into one or more new
It combines and integrates various services
services.
Cloud Computing 3-5 E (CSIT-Sem-7)
SaaS
Paas Middleware layer
Operating system
layer
Cloud provider
Fig. 3.3.1. Scope of controls between provider and consumer.
3. The application layer includes software applications targeted at end
users or programs.
4 The applications are used by SaaS consumers, or installed/managed/
maintained by PaaS consumers, IaaS consumers, and SaaS providers.
5. The middleware layer provides software building blocks (for example,
ibraries, database, and Java Virtual Machine) for
software in the cloud. The middleware is used develcping application
by PaaS consumers,
installed/managed/maintained by laaS consumers or PaaS providers,
and hidden fromn SaaS consumers.
3-6E (CSIT-Sem-7) Cloud Architecture, Services &Storage
6. The OS layer includes operating system and drivers, and is hidden from
SaaS consumers and PaaS consumers.
7 An laaS cloud allows one or multiple guest OS's to run virtualized on a
single physical host.
8 Generally, consumers have broad freedom to choose which OS to be
hosted among all the OS's that could be supported by the cloud provider.
The laaS consumers should assume full responsibility for the guest
OS's, while the laaS provider controls the host OS.
PART-2
Questions-Answers
Answer
Public cloud is a cloud in which the cloud infrastructure and computing
1
network.
resources are made available to the general public over a public
Public cloud offers resource pooling, self-service, service accounting,
2
elasticity, multi-tenancy to manage the solutions, deployment, and
securing the resources and applications.
Public cloud
Cloud
iv. In this case, it is more important for the providers to test their
disaster recovery option as they are heavily tied with SLAB and
penalties.
V At the same time, organization as a consumer should als0 check
and test the disaster recovery options with mock drills of fail over.
6. Physical security:Physical threats are also important to be analyzed
when opting for cloud services from a provider. There are various points
tobe analyzed:
i. Whether allthe facilities of the cloud provider have the same level
of security ?
ii Is it possible that only one site is secured and there is no information
available for the data residency ?
iüi. Whether datacenter is having all the necessary physical security
components such as biometric access, surveillance cameras, logbook,
escorts, and automatic alarms ?
7. Regulations :
i If any of the service provider says that they never had a security
issue, it means they are either misleading or not aware of the
consequences of the incidents.
i. So, all cloud service providers should have a special task force for
any incident response based on the policies and regulations.
ii. These policies should be shared with the end customers also.
8. Programming conventions :
1. Whether it is IaaS, SaaS, or PaaS, cloud providers still use their
own software that may be prone to security threats and bugs.
It is recommended to the cloud providers to use the secure coding
and programming practices. It should be based on standards that
are well documented, reviewed, accepted, and adhered.
9. Data control :
Today in the security domain, an organization's greatest risk is daa
and information control.
All governments and corporate organizations have laid down
compliances and regulations to handle the situation.
i. Therefore, the cloud service provider should be able to adhere to
the guidelines laid by the region or agency.
iv. The cloud provider should own the policies to meet the regulation
and compliances.
V. There should be strong encryption mechanism for the in-flight
data.
Answer
Advantages of public cloud:
1. Flexible
2 Reliable
3 High scalable
4 Low cost
5. Place independence
Disadvantages of public cloud:
1 Less secured
2 Poor customizable
Answer
1 Private clouds are deployments made inside the company's firewall (on
premise datacenters) and traditionally run by on-site servers.
2. Private clouds offer some of the benefits of a public cloud computing
environment, such as elastic on-demand capacity, self-service
provisioning, and service-based access.
3 Private cloud is suitable when the traditional requirements, such as
control, security, and resiliency, are more emphasized by an organization
with the restricted and designated user access and authorization.
Services in private cloud:
1. Virtualization
2 Government and management
3. Multi-tenancy
4 Consistent deployment
5. Chargeback and pricing
6 Security and access control
Benefits of using private clouds :
1. Eliminating capital expenses and operating costs :
Ownership of the hardware or software eliminates the pay-per
use potential, as these must be upfront purchases.
The full cost of operations must be shouldered as there is no
elasticity.
iüi. If the private cloud hardware is sized for peak loads, there will be
inefficient excess capacity.
iv. Otherwise, the owner will face complex procurement cycles.
Cloud Computing 3-11 E (CSIT-Sem-7)
2. Removing undifferentiated heavy lifting by offloading data
center operations :
i Utility pricing (for lower capital expenses and
operating expenses)
usually implies an outside vendor offering on-demand
. It relies on the economies of services.
of resources. multiple tenants sharing a larger pool
ii. These higher costs might be justified if the
easier self-service provisioning and benefits of quicker and
service-oriented access are large.
Que 3.8. What are the types of
private cloud ?
Answer
Types of private cloud :
1. Shared private cloud:
a. This is a shared compute capacity with variable
to business units that are based on usage-based pricing
service offerings, accounts data
centers.
b. It requires an internal profit center to take over or buy
made available through account consolidations. infrastructure
2 Dedicated private cloud:
a
Dedicated private cloud has IT service catalog with dynamic
provisioning.
b. It depends on standardized
Service-Oriented Architecture (SOA)
assets that can be broadly deployed into new and existing accounts
and is a lower-cost model.
3. Dynamic private cloud:
a Dynamic private cloud allows client workloads to dynamically
migrate from and to the compute cloud as needed.
b This model can be shared and dedicated.
C It delivers the ultimate value of clouds.
d This is a very low-management model with reliable SLAs and
scalability.
Que 3.9. Write down the advantages and disadvantages of private
cloud.
Answer
Advantages of private cloud :
1. Highly privateand secured: Private cloud resource
secured.
sharing is highly
3-12 E (CSIT-Sem-7) Cloud Architecture, Services &Storage
Answer
1. Ahybrid cloud is a combination of an interoperating public and private
cloud.
2
This is the model where consumer takes the non-critical application or
information and compute requirements to the public cloud while keeping
all the critical information and application data in control.
3 The hybrid model is used by both public and private clouds
simultaneously.
4.
It is an intermediate step in the evolution process, providing businesses
on-ramp from their current IT environment into the cloud.
5. It offers the best of both cloud worlds - the scale and convenience of a
public cloud and the control and reliability of on-premises software and
infrastructure - and let them move fluidly between the two on the basis
of their needs.
6 This model allows the following :
a Elasticity is the ability to scale capacity up or down within minutes,
without owning the capital expense of the hardware or datacenter.
b. Pay-as-you-go pricing.
C.
Network isolation and secure connectivity as if all the resources
were ina privately owned datacenter.
d. Gradually move to the public cloud configuration, replicate an entire
datacenter, or move anywhere in between.
Cloud Computing 3-13 E (CSIT-Sem-7)
'Community
cloud
Private cloud
Public cloud
Answer
Advantages of hybridcloud:
1. Flexible 2. Secure
3 Cost effective 4. Scalable
Disadvantages of hybrid cloud:
1 Complex networking problem
2. Organization's security compliance
Que 3.13. Differentiate between public, private, hybrid cloud.
Answer
PART-3
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Cloud Computing 3-15 E (CS/IT-Sem-7)
Load balancer
VM VM VM VM VM VM
laaS
Virtualization Layer
7. With laaS, one can configure the required resources as per the
requirement and the user can increase or decrease capacity within
minutes.
8 We can ask for one, hundreds or even thousands of server instances
simultaneously as per our computing need. Good service provider ensures
99.99% availability of the service wthin aregion over atrailing 365 day
period.
9 The laaS service provider ensures that the infrastructural needs of the
virtual machine are continuously met. With the quick availability of
laaS and infrastructure delivered as a service, it frees the organization
to focus their time and resources in bringing innovations in applications
and solutions.
10. However, it is the responsibility of the user to invest on the operating
system and application software.
Que 3.15. What are the advantages and disadvantages of IaaS ?
Answer
Advantages of IaaS:
1. Allows IT to shift focus: With the quick availability of laaSservices,
infrastructure delivered as a service (ready to consume), it frees an
organization to leverage and focus their time and resources in bringing
innovations in applications and solutions.
2 Hassle free service:
i Each infrastructure component is provided as a service.
For example, hardware as a service, server as a service, computing
as a service, storage as a service.
iüü. This adds lot offlexibility to anyone looking for only specific services.
iv. Some require more computing power and others more storage.
3 Utility service:
laaS follows a utility service model - pay per-use/pay per-go
subscription based model.
i. Availability of ready to go laaS offerings with limited time for
implementation and customization (if provided).
iüi. This is hallmark of cloud services.
4. Dynamie scaling:
Scales up and down of infrastructure services based on the
application usage, best for the applications where there are
significant spikes and troughs on the usage of infrastructures.
This again is one of the pillars of cloud computing services.
Cloud Computing 3-17 E (CSIT-Sem-7)
4. Tata communications :
Its solution is InstaCompute.
InstaCompute is Tata Communications laaS offering. InstaCompute
datacenters are located in Hyderabad and Singapore, with
operations in both countries.
Load balancer
PaaS
Virtualization layer
Development platform
Fig. 3.17.1. PaaS.
Cloud Computing -19 E(CNIT-Sem-7)
3. Peatures of PaaS:
Operating system
ii. Server-side scripting environment
ii. Database management system
iv. Server software
v. Support
vi. Storage
vii. INetwork access
vii. Tools for design and development
ix. Hosting
Disadvantages of PaaS:
1 Developers may not be able to use a full range of conventional tools (for
example, relational databases witn unrestricted joins).
2 It locked into a certain platform. However, most PaaS are relatively
lock-in free.
4. Cloud services :
a PaaS provide developers and architects with services and APls that
help to simplify the job of delivering elastically scalable, highly
available cloud applications.
b These cloud services provide a wide variety of capabilities key
differentiators among competing PaaS oferings.
Que 3.20. Write down the vendors of PaaS cloud computing
platform.
Answer
Vendors providing PaaS cloud computing platform :
1 Google Apps Engine (GAE)
2 SalesForce.com
3 Windows Azure
4. AppFog
5. Openshift
6. Cloud foundry from VMware
Cloud Computing 3-21 E (CSIT-Sem-7)
Answer
1.
SaaS (Software-as-a-Service) is an application hosted on a remote server
and accessed through the internet.
2.
SaaS is the web-based e-mail service offered by companies such as
Microsoft (Hotmail), Coogle (Gmail), and Yahoo! (Yahoo Mail).
3.
Each mail service meets the basic criteria, the vendor (Microsoft, Yahoo,
and so on) hosts all of the programs and data in a central location,
is
providing end users with access to the data and software, which
accessed across the World Wide Web.
SaaS application delivered to client
3 SaaS, has no licensing. Rather than buying the application,we pay for it
through the use of a subscription, and we only pay for what we use. If
we stop using the application, we stop paying.
Answer
Vendor advantages of SaaS:
1. SaaS not only does the end user benefit, but so does the vendor.
(They are in the business to make money, so there is at least that
benefit. )
2. Financial benefit is vendors get a constant stream of income, often what
is more than the traditional software licensing setup.
3
Vendors can fond off piracy concerns and unlicensed use of software.
4.
Vendors also benefit more as more subscribers come online.
5 They have a huge investment in physical space, hardware, technology
staff, and process development.
provider can
6 The more resources are used to capacity, the more the
clear as margin.
Limitations of SaaS:
1
Technical obstacles to SaaS have included an effective, multi-tenant
architecture. This has become less and less of a problem due to
virtualization, but designing an application to efficiently deliver it to
thousands of customers via the internet is hard work.
2 Software companies are being asked to become service companies, and
the two do not necessarily mesh well.
3 They tend to have a corporate culture that is dominated by engineering
innovation and a license-sales mindset. These are fine traits to have if
we are writing programs and applications, but it is not the best when we
are called upon for customer service.
4 Further, a business model that is built on selling licensed software does
not easily transform into a subscription model very cleanly. Not only
does the vendor face challenges, but so does the customer.
5 While some applications are ideal for SaaS, others are not good to use
employing an SaaS model.
Que 3.26. Write a short note on driving forces of SaaS.
A
Cloud Computing 3-25 E (CSIT-Sem-7)
Answe:
Driving forces of SaaS are:
1. Popularity :
1. SaaS has become big buzz in the already buzzy issue of cloud
computing.
SaaS is becoming trendy, because of its a number of factors. But
there are solid reasons other than type that make it so popular.
2. Plenty of SaaS platforms :
i. There are many SaaS platforms which grow each rapidly.
ii For example, Oracle is developing its own SaaS platform while
Microsoft is working tomake their own applications SaaS ready.
ii. As SaaS becomes more and more popular, more vendors are going
to be forced to make their platforms SaaS-friendly for SaaS-based
applications.
iv. Another reason SaaS platforms will continue to grow is because of
the interest in Green IT and the efforts to move toward virtualized
infrastructure.
V That means clients are likely to move toward SaaS platforms so
they can reduce the number of servers.
3. Virtualization benefits:
Virtualization makes it easy to move to a SaaS system.
It is easier for Independent Software Vendors (ISVs) to adopt SaaS
is the growth of virtualization.
ii. The growing popularity of some SaaS vendors using Amazon's EC2
cloud platform and the overall popularity of virtualized platforms
help with the development of SaaS.
4. SaaS and SOA:
AService-Oriented Architecture (SOA) is one in which IT supports
the business processes that cover current and emerging
requirements to run the business end-to-end.
This ranges from Electronic Data Interchange (EDI) to online
auctions. By updating older technologies like Internet-enabling EDI
based systems companies can make their IT systems available to
internal or external customers.
iii. SOA unifies business processes by structuring large applications as
a collection of smaller modules known as services.
iv. SOA presents a design framework for realizing rapid and low-cost
system development and improving total system quality. SaaS and
SOA are quite similar; what they have in common is that they use
a service model.
5. Economic impact :
i. Many industry observers think conventional ISVs will have a
tougher time than SaaS vendors.
3-26 E (CSIT-Senm-7) Cloud Architecture, Services &Storage
PART-4
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Cloud Computing 3-27 E (CSIT-Sem-7)
Answer
Cloud architectural design challenges:
1. Service availability and data lock-in problem.
2. Data privacy and security concerns.
3. Unpredictable performance and bottlenecks.
4. Distributed storage and widespread software bugs.
5 Cloud scalability, interoperability, and standardization
6 Software licensing and reputation sharing.
Que 3.29. Write a short note on storage.
Answer
1. The necessary storage is provided and configured in much the same
way as the computing resources. IP-based storage systems are deployed.
2. To reduce hardware configuration effort, the computing systems use
direct-attached storage. Using Fiber-Channel (FC) cards in the servers
and deploying an FC network increases overall system complexity
substantially. The IP storage systems are linked via Giga-bit Ethernet.
Backup
integrate
Data storage Application OS Archive
Backup
DC 1 DC2
DWDM
Mirror
Fig. 3.29.1. Storage resource : backup-integrated,
read-only and archive storage.
3 Storage is automatically allocated to the server systems that require it.
Storage resources are located in different fire zones as well as in
different datacenters, preventing data loss in the event of a disaster.
3-28 E (CSIT-Sem-7) Cloud Architecture, Services & Storage
Answer
the cloud,
1 Cloud storage is defined as the storage of data online in multiple
wherein a company's data is stored in and accessible from
distributed and connected resources that comprise a cloud.
2 Cloud storage can provide the benefits of greater accessibility and
backup,archival
reliability,rapid deployment, strong protection for datastorage costs as a
and disaster recovery purposes, and lower overall
result of not having to purchase, manage and maintain expensive
hardware.
3
Cloud storage does have the potential for security and compliance
concerns that are not associated with traditional storage systems.
Cloud Computing 3-29 E (CSTT-Sem-7)
Answer
1 Storage-as-a Service (SaaS) is abusiness model in which alarge company
rents space in their storage infrastructure to a smaller company or
individual.
2 In the enterprise, SaaS vendors are targeting
applications by promoting SaaS as a convenient way secondary storage
to manage backups.
3 The key advantage to SaaS in the enterprise is in cost
savings, in
personnel, in hardware and in physical storage space.
4 Storage-as-a-Service is generally seen as a good alternative for a small
or mid-sized business that lacks the capital budget
personnel to implement and maintain their own storageand/or technical
infrastructure.
3-30 E (CSIT-Sem-7) Cloud Architecture, Services &Storage
5. SaaS is also being promoted as a way for all businesses to mitigate risks
enhance
in disaster recovery, provide long-term retention for records and
both business continuity and availability.
Answer
Challenges faced by thecloud service providers :
1. Data corruption : Cloud services which host consumer data are usually
burdened with the responsibility of ensuring the integrity and availability
of these data, depending on the subscribed service level.
2. Logical security : In terms of information security, an appropriate
control of logical security should be adopted by the producer to ensure
adequate confidentiality (i.e., data and transactions are open only to
those who are authorized to view or access them).
3. Data interoperability :Producer should follow the interoperability
standards in order for the consumers to be able to combine any of the
cloud services into their solutions.
4. Software vulnerability and breaches : There are occasions when
the public community discovers vulnerabilities of specific software,
middleware, web services, or other network services components in the
3-32 E (CIT-Sem-7) Cloud Architecture, Services &Storage
CONTENTS
Part-1 : Inter Cloud Resource 4-2E to 4-6E
Management
Part-2 : Resource Provisioning and 4-6E to 4-9E
Resource Provisioning Methods
Part-3 : Global Exchange of ...4-9E to 4-10E
Cloud Resources
4-1 E (CSIT-Sem-7)
4-2 E (CSIT-Sem-7) Resource Management & Security in Cloud
PART- 1
Questions-Answers
Questions
Long Answer Type and Medium Answer Type
Answer
networks, including public,
1 Inter cloud is the concept of connected cloud
private, and hybrid clouds.
2 It incorporates a number of technology efforts that are put together to
networks.
improve interoperability and portability among cloud terms
cloud networks. The
3 The goal was to improve interoperability of
this concept.
inter cloud computing and intercloud were used to address
platforms and
Inter cloud is used to connect different cloud computingdatacenters
4. or
allows the data and applications to be ported between
cloud services.
service
5. The main focus is on direct interoperability between public cloud
providers.
interconnected clouds
6 To provide cloud services as utility successfully,
are required and interoperability and portability are important factors
in inter cloud.
resource.
7. The limitations of cloud are that they have limited physical
Explain the types of inter cloud resource management.
Que 4.2.
Answer
Types of inter cloud resource management are:
1. Federation clouds :
providers
i A federation cloud is an inter cloud where a set of cloud
willingly interconnect their cloud infrastructures in order to share
resources among each other.
i.
The cloud providers in the federation voluntarily collaborate to
exchange resources.
ii. This type of inter cloud is suitable for collaboration of governmental
clouds (Clouds owned and utilized by non-profit institution or
government) or private cloud portfolios (Cloud is a part of aportfolio
of clouds where the clouds belong to the same organization).
Cloud Computing 43E (CIT-Sem-7)
Answer
Topologies used in inter cloud architectures:
1. Peer-to-peer inter cloud federation :
i. Clouds collaborate directly with each other but may use distributed
entities for directories or brokering.
ii Clouds communicate with each other and negotiate directly without
mediators.
iüi. The inter cloud projects that use Peer-to-Peer federation are
RESERVOIR (Resources and Services Virtualization without
Barriers Project).
Centralized inter cloud federation:
Clouds use a central entity to perform or faciitate resource sharing.
The centralentity acts as a storehouse where the available cloud
resources are registered.
iüi. The inter cloud projects that use centralized inter cloud federation
are inter cloud, Dynamic Cloud Collaboration (DCC) and federated
cloud management.
3. Multi-cloud service :
i Clients access multiple clouds througha service.
Aservice is hosted by the cloud client either externally or in-house.
ii. The services contain broker components.
45E (CSIT-Sem-7)
Cloud Computing
services are OPTIMIS,
iv. The inter cloud projects that use multi-cloud cloud management
contrail, MOSAIC, STRATOS and commercial
systems.
4. Multi-cloud libraries :
as a
1 Clients develop their own brokers by using a unified cloud API
library. in a
i. Inter clouds that use libraries facilitate the usage of clouds
uniform way.
ii. Examples of Several Multi-cloud Libraries are Java library
J-clouds,
Python library Apache Lib-Clouds, Ruby library Apache Delta
Cloud.
Que 4.5. Explain the extended cloud computing services.
Answer
1 Fig. 4.5.1 shows six layers of cloud services ranging from hardware,
network, and collocation to infrastructure, platform, and software
applications.
6 The bottom three layers are more related to physical requirements. The
bottom most layer provides Hardware-as-a-Service (HaaS).
7. The next layer is for interconnecting all the hardware components, and
is simply called Network-as-a-Service (NaaS). Virtual LANs fall within
the scope of NaaS.
The next layer up offers Location-as-a-Service (LaaS), which provides a
collocation service to house, power, and secure all the physical hardware
and network resources.
9 The cloud infrastructure layer can be further subdivided as Data-as-a
Service (DaaS) and Communication-as-a-Service (CaaS).
PaaS SaaS
Cloud Players IaaS
Monitor SLAs and enable Monitor SLAs and
IT administration/ Monitor SLAs
service platforms deploy software
cloud providers
To deploy and store Enabling platforms via Develop and deploy
Software developers configurators and APls software
(vendors) data
PART-2
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
Types of resource provisioning :
1. Static provisioning:
For applications that have predictable and generaly unchanging
demands workloads we use static provisioning effectively.
ii. With advance provisioning, the customer contracts with the provider
for services and the provider prepares the appropriate resources in
advance of start of service.
ii. The customer is charged a flat fee or is billed on a monthly basis.
2. Dynamic provisioning :
i. In cases where demand by applications may change
orvary, dynamic
provisioning techniques have been suggested whereby VTls may
be migrated on-the-fly to new compute nodes within the cloud.
ii With dynamic provisioning, the provider allocates more
as they are needed and removes them when they resources
are not. The
customer is billed on a pay-per-use basis. When dynamic
4-8E (CSIT-Semn-7) Resource Management &Security in Cloud
Answer
Parameters used for resource provisioning are :
i. Response time :The resource provisioning algorithm designed must
take minimal time to respond when executing the task.
be
ii. Minimize cost : From the cloud user point of view cost should
minimized.
cloud service
iii. Revenue maximization: This is to be achieved from the
provider's view.
provide service in
iv. Fault tolerance: The algorithmn should continue to
spite of failure of nodes.
V. Reduced SLA violation : The algorithm designed must be able to
reduce SILA violation.
migration
vi. Reduced power consumption : VM placement and
techniques must have lower power consumption.
Que 4.10. Describe the resource provisioning methods.
Answer
PART-3
Questions-Answers
4. This would enable services to be commoditised and thus, would pave the
way for the creation of a market infrastructure for trading in services.
5. The market directory allows participants to locate providers or consumers
with the right offers.
6. The banking system ensures that financial transactions pertaining to
agreements between participants are carried out.
Que 4.12. What are the market-oriented techniques ?
Answer
Various market-oriented techniques are:
1. Aneka:
i. Aneka is implied in Platform-as-a-Service type and offers platform
in cloud computing to its users making it convenient for them to
create and deploy applications.
Its unique feature is its flexible design and customization capability
that allows it to target different application scenarios.
2. Workflow engine :
in
i. The Workflow Management System (WMS) assists users
representing their applications as a workflow.
from higher
i. It then executes these workflows on the cloud platform
level of abstraction.
editor that allows for
ii. The WMS provisions an easy to use workflow
application composition.
3. MetaCDN:
low cost
i MetaCDN creates an integrated overlay network at a verymultiple
offered by
by exploiting storage cloud resources being
laaS vendors.
with multiple storage
It eradicates the difficulty arose due to dealing
providers.
4. CloudSim :
to the users that enable
i The CloudSim toolkit offers an environment
clouds.
extensible
them to model and simulate
applications executed.
iü. They offers platform where user can get theirallows extension and
customizable tool that
iii. It is a complete
description of policies in the software stack.
5. Resource management :
is considered as an
Resource management in cloud computing utilization of available
important aspect as it leads to proper optimum computing
resources for making a cloud as an
environment.
management falls under various
ii. The taxonomy of resource SLA-aware, market-oriented,
categories such as energy-aware,
cloud computing.
load balanced, hybrid cloud and mobile
Cloud Computing 4-11 E(CIT-Sem-7)
PART-4
Security Overview, Cloud Security Challenges.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Cloud computing
Security challenges
2.
The classification shown in Fig.4.13.1 reveals various common challenges
under cloud computing. The deployment model is classified further as
private, public and hybrid cloud and the security issues of the samehave
been exposed in common.
its
3 The service model is classified into the SaaS, PaaS and laaS briefing
respect to
security challenges in common. Thesecurity challenges withNetwork
network are also known as for any internet based service. is
considered as the backbone for cloud computing.
Answer
Various security challenges related with the service models :
1. Data leakage and consequent problem :
i Data deletion or alteration without backup leads to certain drastic
data related problems like security, integrity, locality, segregation
and breaches.
This would lead to sensitive data being accessed by the unauthorized
users.
2 Malicious attacks:
i The threat of malicious attackers is augmented for customers of
cloud services by the use of various IT services which lacks the
intelligibility between the procedure and process relating to service
providers.
Malicious users may gain access to certain confidential data and
thus leading to data breaches.
3. Backup and storage :
The cloud vendor must ensure that regular backup of data is
implemented with all measures.
But this backup data is generally found in unencrypted form leading
to misuse of the data by unauthorized parties.
ii. Thus, data backups lead to various security threats.
4. Shared technological issues:
i laaS vendors transport their services in a scalable way by
contributing infrastructure.
But this structure does not offer strong isolation properties for a
multi-tenant architecture.
ii. Hence, in order to address this gap, a virtualization hypervisor
intercede the access between guest operating systems and the
physical compute resources.
4-14 E (CS/IT-Sem-7) Resource Management &Security in Cloud
5. Service hijacking :
i. Service hijacking is associated with gaining an illegal control on
certain authorized services by various unauthorized users.
It accounts for various techniques like phishing, éxploitation of
software and fraud.
ii. This is considered as one of top most threats.
6. VM hopping :
i With VMhopping, an attacker on one VM gains rights to use another
victim VM's.
The attacker can check the victim VM's resource procedure, alter
its configurations and can even delete stored data, thus, putting it
in danger the VM's confidentiality, integrity and availability.
ii. Arequirement for this attack is that the two VM's must be operating
on the same host, and the attacker must recognize the victim VM's
IP address.
7. VM mobility :
i The contents of VMs virtual disks are saved as files such that VMs
can be copied from one host to another over the system or via
moveable storage devices with no physically stealing a hard drive.
i. VM mobility might offer quick use but could show the way to security
problems likewise, the rapid spread of susceptible configurations
that an attacker could make use of, to endanger the security of a
novel host.
8. VM denial of service:
Virtualization lets numerous VM's split physical resources like CPU,
network bandwidth and memory or disk.
ADenial-of-Service (DoS) attack in virtualization takes place when
one VM occupies all the obtainable physical resources such that the
hypervisor cannot hold-up more VM's and accessibility is endangered.
iii The most excellent move towards preventing aDoS attack is to
bound resource allocation using correct configurations.
Que 4.16. What are cloud security controls ?
Answer
Cloud security controls are::
1. Detective control : This type of control is used to detect and react
instantly and appropriately to any incident.
2. Preventive control :It strengthen the system against any incident or
attack by actually eliminating the vulnerabilities.
Cloud Computing 4-15 E (CSIT-Sem-7)
PART-5
Questions-Answers
Answer
Objectives of cloudsecurity governance:
1. Strategic alignment : Enterprises should mandate that security
investments, services, and projects in the cloud are executed to achieve
established business goals (For example, market competitiveness,
financial, or operational performance).
2. Value delivery: Enterprises should define, operationalize, and maintain
an appropriate security function/organization with appropriate strategic
and tactical representation, and charged with the responsibility to
maximize the business value (Key Goal Indicators, RGI) from the pursuit
of security initiatives in the cloud.
3 Risk mitigation : Security initiatives in the cloud should subject to
measurements that gauge effectiveness in mitigating risk to the
Cloud Computing 4-17 E (CSIT-Sem-7)
enterprise (Key Risk Indicators). These initiatives should also yield results
that progressively demonstrate a reduction in these risks over time.
4. Effective use of resources :It is important for enterprises to establish
a practical operating model for managing and performing security
operations in the cloud, including the proper definition and
operationalization of due processes, the institution of appropriate roles
and responsibilities, and use of relevant tools for overall efficiency and
effectiveness.
5. Sustained performance: Security initiatives in the cloud should be
measurable in terms of performance, value and risk to the enterprise
(Key Performance Indicators, Key Risk Indicators), and yield results
that demonstrate attainment of desired targets (Key Goal Indicators)
Over time.
Application
Guest
Application Processes
Processes Guest VM
Virtualization OS
Runtime
software
Virtualization
OS Hypervisor Software
Host
Hardware Host Hardware
machine
(a) (b)
Host
(Target ISA)
6
OS runs in privileged
In aconventional time-shared system, theassociated with it run in
mode (system mode) while the applications
unprivileged mode (user mode).
7 With system virtualization, however, the
guest OS(s) will run
unprivileged mode while the hypervisor can operate in privileged
system VM. In native
mode. Such a system is denoted as native
program
system VM, every privileged instruction issued by a user
at any guest OS has to trap to the hypervisor.
every function
8 The hypervisor needs to specify and implementcontrary, if the
required for managing hardware resources. In
top of a host OS, the
hypervisor operates in unprivileged mode onmode.
guest OS(s) will also operate in unprivileged
In this case,
9 This system is called user-mode hosted system VM. trap to the
privileged instructions from guest OS(s) still need to the host
to
hypervisor. In return, the hypervisor also needs to trap
OS.
more trap per
10. Clearly, this increases the overhead by adding one
the functions
every privileged instruction. The hypervisor can utilize resources.
already available on the host OS to manage hardware
11. Finally, the hypervisor can operate partly in privileged mode and
partly in user-mode in a system referred to as dual-mode hosted
the host OS's
system VM. This way, the hypervisor can make use of
resource management functions and also preclude the one more
user-mode hosted
trap per each privileged instruction incurred in
system VMs.
Answer
1. Identity and Access Management (IAM) is a system that secures, stores,
and manages user identities and access privileges.
2. It ensures that users are who they say they are and will grant access to
applications and resources only if they have the permission to use them.
3 Some of the most common IAM solutions include Single Sign-On (SSO),
Multi-Factor Authentication (MFA), and access management, all of which
can be deployed on-premises or in the cloud.
4 Modern technology enables businesses to be mo ile anu efficient
than ever before.
5 For instance, the cloud lets the employees work from anywhere at any
time on any device.
6 However, this means that the workforce has moved beyond the
protections of on-premise security.
Que 4.22. Describe the benefits of IAM.
Cloud Computing 4-21 E (CSIT-Sem-7)
Answer
Benefits of IAM are:
1. Improving user experiences :
SSO eliminates the need for Users to remember and input multiple
passwords to access different areas of the system.
.
Answer
Advantages of LAM are:
1. Users have fewer accounts and passwords to manage.
2. Less password fatigue related to managing multiple passwords.
3 Less user time needed to log separately into different systems.
4 Fewer support requests for password resets.
5. Provides acentral location for administrative management of accounts.
Disadvantages of IAM are:
1 The primary concern with SSO systems is that it creates a single point of
failure ifthe authentication server fails. This forces the added burden of
multiple authentication servers to provide redundancy.
2. This single point also creates a single breach point. Ifa user account is
breached, an attacker can gain access to all protected systems that the
compromised user account has access to.
Answer
Architecture of IAM are:
Cloud-based and multi-tenant architecture:
a.
A multi-tenant architecture provides lots of benefit such as the
vendor can issue updates, security fixtures, and improves
performance.
b. It also modifies the capability to manage access provision and
governance effectively.
ii. Security, management architecture :
The most important need of IAM is identity and access management.
b. IAM in Cloud computing offer features like multi-factor
authentication, digital access cards, and biometrics.
C.
These features help to easily retrieve the information in a secure
manner.
Answer
Following are the cloud security standards :
1. Information Technology Infrastructure Library (TIL) :
i. It is a set of best practices and guidelines that define an integrated,
process-based approach for managing information technology
services.
ITIL helps to make sure that proper security measures are taken at
allimportant levels, namely strategic, tactical, and operational level.
iiüi Many IT organizations employ security management framework
Information Technology Infrastructure Library (ITIL)
iv. This industry standard management framework provides guidance
for planning and implementing a governance program with
sustaining management processes that protect information assets
and thus provide security.
V
Hence, it provides a framework with continuous improvement that
is necessary to align and realign IT services to changing business
needs.
2. Open Virtualization Format (0VF):
i Open Virtualization Format (0VF) is a standard pertaining to
portability concern. OVF provides the ability for an efficient,flexible
and secure distribution of enterprise software over the cloud.
OVF thus provides customers, vendor and platform independence
as it facilitates mobility of virtual machines.
4-24 E (CSTT-Sem-7) Resource Management &Security in Cloud
i. Across the cloud OVF plays a major role in providing cross-platform
portability. It also helps to provide simplified deployment over
multiple platforms.
iv. An OVF format virtual machine can be deployed easily by customers.
They can do so on the platform of their choice. It helps to enhance
customer experience as it provides customers with portability,
platform independence, verification, signing, versioning, and
licensing terms.
3. ITU-TX.1601:
The ITU standard presents a sketch of issues pertaining to cloud
computing and proposes a framework for cloud security.
It talks in detail about various security challenges and ways to
reduce these security risks in cloud computing. It also discusses a
framework that provides an insight into what security capabilities
are required for making the cloud secure and facing security
challenges.
iüi. ITU-TX.1601 starts by listing down major security threats that the
cloud can encounter.
1V. The standard discusses the security challenges based on the nature
of the role that an individual or an organization plays in the cloud
computing paradigm.
V. The standard divides the roles of an individual or an organization
into following three categories :
a. Cloud Service Provider (CSP):An individual or an
organization responsible for making cloud services available.
b. Cloud Service Customer (CSC) : An individual or an
organization that uses cloud services.
c. Cloud Service Partner (CSN) :A partner that helps support
the CSPs or the CSCs.
4. PCI DSS:
i. Payment Card Industry Data Security Standard (PCI DSS) was
released by PCI security standards council.
PCI's main objective is to provide security guidelines for credit card
usage and address CSP's and CSC's.
iüi. Cloud security is ashared responsibility between the CSP and its
clients
iv. The division of responsibilities between the client and the CSP for
managing PCI DSS controls is influenced by multiple factors, which
are:
CONTENTS
.5-2E to 5-10E
Part-1: Hadoop, MapReduce,
Virtualbox
.6-10E to 5-14E
Part-2: Google App Engine,
Programming Environment
for Google App Engine
.6-14E to 5-21E
Part-3: Openstack, Federation in the
Cloud, Four Levels of
Federation, Federated Services
and Applications, Future
of Federation
5-1 E (CSIT-Sem-7)
5-2 E (CSTT-Sem-7) Cloud Technologies &Advancements
PART-1
Hadoop, MapReduce, Virtualbox.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
Features of Hadoop:
1. Suitable for big data analysis :
i. As big data tends to be distributed and unstructured in nature,
Hadoop clusters are best suited for analysis of big data.
Since it is processing logic (not the actual data) that flows to the
computing nodes, less network bandwidth is consumed.
ii. This concept is called as data locality concept which helps to increase
the efficiency of Hadoop based applications.
2. Scalability :
Hadoop clusters can easily be scaled to any extent by adding
additional cluster nodes and thus allows for the growth of big data.
Scaling does not require modifications to application logic.
3. Fault tolerance :
Hadoop ecosystem has a provision to replicate the input data on to
other cluster nodes.
ii In case of a cluster node failure, data processing can still proceed by
using data stored on another cluster node.
Answer
Modules of Hadoop:
1. HDFS (Hadoop Distributed File System): It states that the files will
be broken into blocks and stored in nodes over the distributed
architecture.
2. YARN (Yet Another Resource Negotiator) : It is used for job
scheduling and managing the cluster.
3. MapReduce :
This is a framework which helps Java programs to do the parallel
computation on data using key value pair.
The Map task takes input data and converts it into a dataset which
can be computed in key value pair.
The output of Map task is consumed by reduce task and then the
reducer gives the desired result.
4. Hadoop common:These Java libraries are used to start Hadoop and
are used by other Hadoop modules.
Que 5.5. What are the advantages of Hadoop ?
Answer
Advantages of Hadoop:
1. Fast :in HDFS, the data distributed over the cluster helps in faster
retrieval. As tools are present on the same server, reducing the processing
time. It is able to process terabytes of data in minutes and peta bytes in
hours.
2. Scalable : Hadoop cluster can be extended by just adding nodes in the
cluster.
3. Cost effective : Hadoop is open-source that uses commodity hardware
tostore data so it is cost effective as compared to traditional relational
database management system.
4 Resilient to failure:HDFS has the property with which it can
data over the network, so if one node is down or some other replicate
network
failure happens, then Hadoop takes the other copy of data and use it.
Normally, data are replicated thrice but the replication factor is
configurable.
Que 5.6. Explain the architecture of Hadoop.
Cloud Computing 5 5E (CSIT-Sem-7)
Answer
Architecture of Hadoop:
MapReduce layer HDFS layer
Task Name
tracker node
Master Data
Job
tracker, node
Task Data
Slave tracker node
Fig. 5.6.1.
NameNode:
cluster.
i It is a single master server that exists in the HDFS
ii As it is a single node, it may beconme the reason of single point
failure.
ii. It manages the file system namespace by executing an operation
like the opening, renaming and closing the files.
iv. It simplifies the architecture of the system.
DataNode:
The HDFS cluster contains multiple DataNodes.
Each DataNode contains multiple data blocks.
iii. These data blocks are used to store data.
iv. It is the responsibility of DataNode to read and write requests from
the file system's clients.
V It performs block creation, deletion, and replication upon instruction
from the NameNode.
Job tracker:
i. The role ofjob tracker is to accept the MapReduce jobs from client
and process the data by using NameNode.
iü. Inresponse, NameNode provides metadata to job tracker.
Task tracker:
It works as a slave node for job tracker.
It receives task and code from job tracker and applies that code on
the file. This process can also be called as a Mapper.
5-6E(CSTT-Sem-7) Cloud Technologies & Advancements
Answer
1. MapReduce is based on the parallel programming framework to process
large amounts of data dispersed across different system.
2 The process is initiated when a user request is received to execute the
MapReduce program and terminated once the results are written back
to the HDFS (Hadoop Distributed File System).
3 MapReduce facilitate the processing and analyzing of both unstructured
and sem-structured data collected from different sources, which may
not be analyzed effectively by other traditional tools.
4. MapReduce enables computational processing of data stored in a file
system without the requirement of loading the data initially into a
database.
5 It primarily supports two operations, map and reduce.
6 These operations execute in parallel on a set of worker nodes.
7 MapReduce works on a master working approach in which the master
process controls and directs the entire activity, such as collecting,
segregating, and delegating the data among different working.
Que 5.9. Explain the working and phases of MapReduce.
Answer
1 The MapReduce algorithm contains two important tasks, namely Map
and Reduce:
The Map task takes a set of data and converts it into another set of
data, where individual elements are broken down into tuples (key
value pairs).
The Reduce task takes the output from the Map as an input and
combines those data tuples (key-value pairs) into a smaller set of
tuples.
2. The reduce task is always performed after the map task.
Phases of MapReduce:
1. Input phase : Here we have a record reader that translates each
record in an input file and sends the parsed data to the mapper in the
form of key-value pairs.
2. Map: Map is a user-defined function, which'takes a series of key-value
pairs and processes each one of them to generate zero or more key
value pairs.
3. Intermediate keys : They key-value pairs generated by the mapper
are known as intermediate keys.
8E(CSIT-Sem-7) Cloud Technologies &Advancements
4. Combiner :
1. Acombiner is a type of local reducer that groups
the map phase into identifiable sets.
similar data from
ii It takes the intermediate keys from the
mapper as input and applies
a user-defined code to aggregate the values in a small
scope of one
mapper.
iüü. Itis not a part of the main MapReduce algorithm; it is
5.
optional.
Shuffle and sort:
i The Reducer task starts with the shuffle and sort step.
It downloads the grouped key-value pairs onto the local
machine,
where the reducer is running.
iüi. The individual key-value pairs are sorted by key into a larger
list.
data
iv. The data list groups the equivalent keys together so that their
values can be iterated easily in the reducer task.
6. Reducer:
The reducer takes the grouped key-value paired data as input and
runs a reducer function on each one of them.
iü. Here, the data can be aggregated, filtered, and combined in a
number of ways, and it requires a wide range of processing.
iüi. Once the execution is over, it gives zero or more key-value pairs to
the final step.
7. Output phase :
i In the output phase, we have an output formatter that translates
the final key-value pairs from the reducer function and writes
them ontoa file using a record writer.
Input |UP nput Input Input |Input Input +Input phase
M M M M
Map phase
kl:vkl vk2:v klv klvkl:vk2:v klvkl:vk2v klv kl:vkl:vk2.v Intermediate
keys
Group by key Combiner
(optional)
Shufle
kl:v,v,v,v| k2:v k3:v,v k4:v,v,v |k5:v
and sort
Reducer
R R
phase
Output
Output phase
Fig. 5.9.1.
5-9 E (CIT-Sem-7)
Cloud Computing
Answer
virtualizing the x86
1. Virtualbox is an open-source software used for
computing architecture.
5-10 E (CSIT-Sem-7) Cloud Technologies &Advancements
2 It acts as a hypervisor, creating a VM (Virtual Machine) in which the
user can run another OS (Operating System).
3 The operating system in which virtualbox runs is called the host OS.
4. The operating system running in the VM is called the guest OS.
Virtualb0x supports Windows, Linux, or MacOS as its host OS.
5 When configuring avirtual machine, the user can specify how many
CPUcores,and how much RAM and disk space should be devoted to the
VM.
6 When the VM is running, it can be paused (system execution is frozen at
that moment in time), and resumed later when the user wishes to
continue.
PART-2
Questions-Answers
2
The App Engine requires that apps written in Java or Python, store data
in Google BigTable and use the Google query language. Non-compliant
applications require modification to use App Engine.
3. Google App Engine provides more infrastructure than other scalable
hosting services such as Amazon Elastic Compute Cloud (EC2).
4 The App Engine also eliminates some system administration and
developmental tasks to make it easier to write scalable applications.
5 Google App Engine is free up to a certain amount of resource usage.
6 Users exceeding the per-day or per-minute usage rates for CPU
resources, storage, number of APIcalls or requests and concurrent
requests can pay for more of these resources.
5. The SDK/Java depth rest on IDE, and the default project directory
structure is different from normal web app.
6. It is not easy to process unit test. It cannot fix the root cause and does
not support add SSL to website.
7. The GAE may be the development for future web application, but it is
not equipped for building a modern web site.
8 It suffers from the inability to weak server software. The file system
and many standard library modules are inaccessible. Only Python and a
few runs of Java Virtual Machine are accessible.
Answer
Services provided by Google App Engine:
1. Data store :
i. App engine provides a powerful distributed data storage service
that features query engine and transactions. Data store entities
are schemaless.
Answer
Supported environments for Google App Engine:
1. Java Runtime Environment :
PART-3
Openstack, Federation in the Cloud, Four Levels of Federation,
Federated Services and Applications, Future of Federation.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
3. Cinder :
i It is a block storage component, which is more analogous to the
traditional notion of a computer being able to access specific locations
on a disk drive.
ii. This more traditional way of accessing files might be important in
scenarios in which data access speed is the most important
consideration.
4. Neutron :
It provides the networking capability for openstack.
ii. It helps to ensure that each of the components of an openstack
deployment can communicate with one another quickly and
efficiently.
5. Horizon:
i. It is the dashboard behind openstack.
i.
Developers can access all of the components of openstack
individually through an Application Programming Interface (API),
5-16E (CSIT-Sem-7) Cloud Technologies &Advancements
but the dashboard provides system administrators a look at what is
going on in the cloud, and how to manage it.
6. Keystone :
i Itprovides identity services for openstack.
i. It is essentially a central list of all of the users of the openstack
cloud, mapped against all of the services provided by the cloud,
which they have permission to use.
ii. Itprovides multiple means of access, so that, developers caneasily
map their existing user access methods against keystone.
7 Glance:
i. It provides image services to openstack.
In this case, images refers to images (or virtual copies) of hard
disks.
ii. Glance allows these images to be used as templates when deploying
new virtual machine instances.
8. Ceilometer:
1. It provides telemetry services, which allow the cloud to provide
billing services to individual users of the cloud.
It also keeps a verifiable count of each user's system usage of each
of the various components of an openstack cloud.
9. Heat :
i. It is the orchestration component of openstack, which allows
developers to store the requirements ofa cloud application in a file
that defines what resources are necessary for that application.
:
In this way, it helps to manage the infrastructure needed for a
cloud service to run.
Que 5.20. Write down the benefits of using openstack?
Answer
Benefits of using openstack :
1. Enables rapid innovation :
L.
Openstack's orchestration and self-service capabilities offers
developers and IT staff with faster and better access to IT resources.
Because developers can provision machines rapidly and on-demand,
they can significantly reduce development and testing periods and
have more freedom to experiment with new ideas.
2. Cuts down time-to-market :
Faster deployment of IT resources also means end users and
i.
business units no longer have to wait days or weeks to start using
the network services and applications they need.
Cloud Computing 5-17 E (CSIT-Sem-7)
ii. In turn, they would be more capable of rolling out and completing
projects earlier than before.
3. Boosts scalability and resource utilization:
i Although not as scalable as public clouds, openstack private clouds
still offer a significant degree of scalability. We can still spin up and
spin down servers on demand.
4. Eases regulatory compliance :
i. Because openstack enables the construction of private, on-premise
clouds, it can help in regulatory compliance endeavors.
If our cloud is in our own datacenter, we will have more control of
access privileges, security measures, and security policies.
ii. We can personally take charge of ensuring that policies for securing
personal data, financial data,and other confidential and regulated
information are actually enforced and not just printed on a piece of
paper.
Answer
1. Cloud federation refers to the unionization of software, infrastructure
and platform services from disparate networks that can be accessed by
a client through the internet.
2. The federation of cloud resources is facilitated through network
gateways that connect public or external clouds, private or internal
clouds (owned by a single entity) and/or community clouds (owned by
several cooperating entities); creating a hybrid cloud computing
environment.
3
The federated cloud computing services rely on the existence of physical
datacenters.
4. Two approaches of cloud federation are :
a. Centralized federation model : This is the approach taken by
several identity federation standards. It distinguishes two
operational roles in transaction:
i The identity provider
i. The service provider
b. Claim-based model : This approach addresses the problem of
user authentication from a different perspective and requires users
toprovide claims answering who they are and what they can do in
order to access content or complete a transaction.
Que 5.22. What are the benefits of cloud federation?
5-18 E (CSIT-Sem-7)
Cloud Technologies & Advancements
Answer
Benefits of cloud federation are :
1. The federation of cloud resources
allows client to optimize enterprise IT
service delivery.
2 The federation of cloud resources allows a client to
cho0se best cloud
service providers in terms of flexibility cost and availability of services to
reach particular business or technological need within their
3
organization.
Federation across different cloud resources pools allows applications to
run in the most appropriate infrastructure
environments.
4 The federation of cloud resources also allows an
enterprise to
workloads around the globe, move data between disparate distribute
networks
and implement innovative security models for user access to cloud
resources.
Answer
Levels of federation are:
1. Permissive federation:
i. Permissive federation occurs when a server accepts a connection
from a peer network server without verifying its identity using
DNS lookups or certificate checking.
ii. The lack of verification or authentication may lead to domain
spoofing (the unauthorized use of a third-party domain name in an
email message in order to pretend to be someone else), which
opens the door to widespread spam and other abuses.
2 Verified federation:
This type of federation occurs when a server accepts a connection
from a peer after the identity of the peer has been verified.
i. It uses information obtained via DNS and by means of domain
specific keys exchanged beforehand.
iii. The connection is not encrypted, and the use ofidentity verification
effectively prevents domain spoofing.
iv. Tomake this work, federation requires proper ITS setup, and that
is still subject to DNS poisoning attacks.
V Verified federation has been the default service policy on the open
XMPP since the release of the open-source jabberd 1.2 server.
3. Encrypted federation:
i In this mode, a server accepts a connection from a peer if and only
if the peer supports Transport Layer Security (TLS).
Cloud Computing 5-19 E (CSTT-Sem-7)
ii. The peer must present a digital certificate. The certificate may be
self-signed, but this prevents using mutual authentication.
i. If this is the case, both parties proceed to weakly verify identity
using Server Dialback. XEP-0220 defines the server dialback
protocol, which is used to provide identity verification.
iv. Server dialback uses the DNS as the basis for verifying identity,
the basic approach is that when a receiving server receives a server
to-server connection request from an originating server, it does
not accept the request until it has verified a key with an authoritative
server for the domain asserted by the originating server.
V.
Although server dialback does not provide strong authentication or
trusted federation, and although it has effectively prevented most
instances of address spoofing on the XMPP network since its release
in 2000.
identity
vi. This results in an encrypted connection with weak
verification.
4. Trusted federation:
only under the
Here, a server accepts a connection from a peer
a
condition that the peer supports TLS and the peer can present
(CA) that
digital certificate issued by a root Certification Authority
is trusted by the authenticating server.
more
ii The list of trusted root CAs may be determined by one or
software, or
factors, such as the operating system, XMPP server
local service policy.
resrlts not only
ii. In trusted federation, the use of digital certificates
authentication.
in a channelencryption but also in strong
effectively prevents DNS
iv. The use of trusted domain certificates since such
poisoning attacks but makes federation more difficult,
obtain.
certificates have traditionally not been easy to
cloud federation ?
Que 5.24. What are the advantages provided by
Answer
Advantages provided by cloud federation :
to
i. Performance guarantees : By lending resources, it is possible services.
the rendered
maintain the necessary levels of performance to
diversity for data and services
ii. Availability guarantees : Location areas,
allows migration of services. For example, disaster-prone
maintaining higher availability to the client.
5-20 E (CSTT-Senm-7)
Cloud Technologies & Advancements
iii. Convenience:Federation provides convenience the client in relation
tocontracted services, allowing a unified
to
view from services of different
providers.
iv. Dynamic workload
scatter load according todistribution:Geographic
the client location.
distribution allows to
Que 5.25. What are the approaches used to model cloud
federation ?
Answer
Approaches used to model cloud federation are:
1 Semantics based:
i. A theoretical federation
model based on semantics and
Infrastructure-as-a-Service (IaaS) is proposed.
The authors utilize ontology to provide
autonomous clouds in a resource sharinginteroperability
environment.
between
ii. The use of ontologies is justified by the
difficulties offering
interoperability, which is acritical aspect in afederated cloud.
iv. The difficulties in providing
interoperability include different
implementation schemes for the same type of entity or components
on each cloud, where ontologies are utilised to
model such differences. understand and
2. Market-oriented:
i The federation model oriented to computation services was
proposed.
ii It focuses on the
commercialization
structure that resembles a services ofinfrastructure resources in a
market.
ii. To support this model, four components are
the cloud federation :
utilized as the core of
a. Clouds: Where resources are located and the services will be
offered to the clients.
b. Application broker: Interface responsible for intermediating
operations between client and federation.
C. Cloud coordinator :Component located in each cloud and
responsible for maintaining the integrity of the federation.
d. Concentrator:Acts as the market of resources and services.
3. Reservoir :
The reservoir is a project leaded by IBM and
developed with the
objective to provide a cloud federation environment that offers
software-as-a-service to providers.
Cloud Computing 5-21 E (CSIT-Sem-7)