cc1 1
cc1 1
Q.
(i) It is a computing model that defines A wonderful illustration of this scenario
services provisionning technique for services would be a company that utilizes the private
Q. What are the various cloud deployment cloud to safeguard its data and the public
models? Explain in detail. cloud to engage with its clients.
Cloud technology offers several advantages Explain the Cloud Computing Stack in
to consumers; these advantages should be detail
categorized based on the demands of the Cloud computing, often described as a stack,
users. has a broad range of services built on top of
The cloud deployment model outlines the one another under the name cloud. The
nature and purpose of the cloud and reflects accepted definition of cloud computing
the specific type of cloud environment based comes from the National Institute of
on ownership, size, and access. Most Standards and Technology (NIST).
businesses use cloud infrastructure to save The NIST definition runs to several hundred
capital investment and control operational words but begins as follows:
costs. "Cloud computing is a model for enabling
Types include: ubiquitous, convenient, on-demand network
Private clouds access to a shared pool of configurable
Public Cloud computing resources (e.g., networks, servers,
Community Cloud storage, applications, and services) that can
Hybrid Cloud be rapidly provisioned and released with
(1) Private clouds minimal management effort or service
It is a cloud-based infrastructure utilized by provider interaction" • Cloud computing can
independent businesses. It gives you more be described as a stack that is formed by
control over your security. The data is layers, similar to a cake. Those layers will be
protected by a firewall and can be hosted built using cloud computing services,
inside or outside. servers, and components, which can leverage
Private clouds are ideal for enterprises that several different clouds forming a single
have stringent security, management, and application stack. The network stability and
availability needs. scalability of the stack will determine its
(2) Public Cloud resilience and high availability.
This form of cloud service is available on a Let's get more familiar with the types of
public network. Customers have no say over cloud stack components as shown in Fig.
where the infrastructure is located. 1.5.1 and concepts that are common in the
It is based on a shared cost model for all cloud world.
users, or on a licensing strategy such as pay
per user. Public cloud deployment strategies
are ideal for enterprises with changeable and
rising demands.
It is also popular among organizations of all
sizes for online applications, email, and non-
sensitive data storage.
(3) Community Cloud
This is a model that is shared by companies
that belong to a certain community, such as
banks, government organizations, or Q. Explain the NIST cloud computing
commercial firms. model in detail.
Members of the community usually have •From the National Institute of Standards and
similar concerns about privacy, performance, Technology (NIST) definition of cloud
and security. This cloud computing computing, "Cloud computing is a model for
deployment methodology is maintained and enabling ubiquitous, convenient, on-demand
hosted internally or by a third- party network access to a shared pool of
provider. configurable computing resources that can
(4) Hybrid Cloud be rapidly provisioned and released with
This approach combines the benefits of both minimal management effort or service
private and public clouds, yet each may provider interactive."
operate independently. NIST Reference Model of cloud computing
Furthermore, as part of this cloud computing is depicted in Fig. 1.4.1 below. The NIST
deployment paradigm, internal or external definition lists five essential characteristics
suppliers might contribute resources. of cloud computing: on-demand self-service,
Scalability, flexibility, and security are all broad network access, resource pooling,
advantages of a hybrid cloud.
3
rapid elasticity or expansion, and measured Many clients have similar workloads, which
service. may be performed very cost-effectively due
It also lists three "service models" (software, to Cloud Computing's quick scalability.
platform and infrastructure), and four (5) Economical
"deployment models" (private, community, This cloud feature aids enterprises in
public and hybrid) that together categorize lowering their IT spend. The customer must
ways to deliver cloud services. pay the administration for the space they
have utilized in Cloud Computing.
There are no hidden fees or additional
charges to pay. The administration is cost-
effective, and some space is frequently
provided for free.
Benefits:
1)Faster time to market
You can spin up new instances or retire them
in seconds, allowing developers to accelerate
development with quick deployments. Cloud
computing supports new innovations by
making it easy to test new ideas and design
new applications without hardware
Describe characteristics and benefits of limitations or slow procurement processes.
cloud computing Characteristics: 2)Scalability and flexibility
(1) Resources Pooling Cloud computing gives your business more
One of the most important aspects of cloud flexibility. You can quickly scale resources
computing is resource pooling. Resource and storage up to meet business demands
pooling means that a cloud service provider without having to invest in physical
may share resources across several clients, infrastructure.
providing them with a unique set of services Companies don’t need to pay for or build the
based on their needs. infrastructure needed to support their highest
It is a multi-client technique that may be load levels. Likewise, they can quickly scale
used for data storage, processing, and down if resources aren’t being used.
bandwidth provisioning. 3)Cost savings
The administration method of real-time Whatever cloud service model you choose,
resource allocation does not interfere with you only pay for the resources you actually
the client's experience. use. This helps you avoid overbuilding and
(2) On-Demand Self-Service overprovisioning your data center and gives
It is a key and necessary component of cloud your IT teams back valuable time to focus on
computing. It allows the client to continually more strategic work.
check the server's availability, capabilities, 4)Better collaboration
and network storage space. Cloud storage enables you to make data
This is a core feature of Cloud Computing, available anywhere you are, anytime you
and a customer may also regulate the need it. Instead of being tied to a location or
computing capabilities based on his specific device, people can access data from
demands. (3) Easy Maintenance anywhere in the world from any device—as
It is an essential component of cloud long as they have an internet connection.
computing. It enables the client to monitor 5)Advanced security
the server's availability, capabilities, and Despite popular perceptions, cloud
network storage capacity on a continuous computing can actually strengthen your
basis. security posture because of the depth and
This is a key element of cloud computing, breadth of security features, automatic
and a client can also customize the maintenance, and centralized management.
computing capabilities to meet his needs. Describe features and applications of
(4) Scalability and Rapid Elasticity cloud deployment models. 1. Public Cloud
Rapid scalability and Elasticity is a Features:
significant feature and benefit of cloud Third-Party Management: Owned and
computing. This cloud feature enables the managed by third-party cloud service
cost-effective operation of workloads that providers (e.g., AWS, Microsoft Azure,
demand a large number of servers but only Google Cloud).
for a short period of time. Multi-Tenancy: Resources are shared
among multiple users (tenants), enhancing
cost-efficiency.
Feature Cloud Computing 4 Internet
Q.
Retail and E-commerce: Handles everything with an on-premises data center,
fluctuating traffic and sensitive customer including acquiring and installing hardware,
data efficiently. virtualization, installing the operating system
DevOps: Supports continuous integration and any other essential applications,
and deployment, enabling rapid development configuring the network, configuring the
with secure data handling. firewall, and configuring data storage. After
Manufacturing: Facilitates real-time data we complete all of the setup, we are
processing on private clouds and less critical responsible for maintaining it during its full
data on public clouds. existence.
Q.Explain Identity as a service (IdaaS) in In addition to paying hosting fees, the team
detail. should also set up servers, buy, update, and
Identity as a Service (IdaaS) install software, frequently backup data, use
Identity as a service (IdaaS) is a cloud-based VPNs, and monitor the additional space on
subscription model for Identity Access 2 the premises for network security.
Management (IAM), where identity and Applications
access services are rendered over the internet With IdaaS SSO, a network's users are asked
by a thir party provider rather than deployed to sign in once when first accessing the
on-premises. network. With that one log in, the user can
IdaaS can contain a range of services, but access any authorized company resources
typically includes single sign-on (SSO), and programs.
multi-facto authentication (MFA) and IdaaS multifactor authentication is the
directory services that provide organizations opposite where users must provide multiple
with simple and cor effective identity and factors to prove they're authorized. This
access management capabilities. SSO application offers a higher level of security
typically uses either Security Assertio as it determines how risky a user may be.
Markup Language (SAML) or OpenID Organizations can use these applications and
Connect (OIDC). many others to ensure only authorized users
IBM IAM, Google Cloud Identity, VMware are accessing their networks. From schools
are some of the examples of IdaaS provider. and hospitals to small businesses and global
organizations, IdaaS applications help
various industries monitor who accesses their
network. In doing so, organizations
are able to stop unauthorized users from
gaining access before a security breach
occurs.
Advantages:
(a) Reduce costs: Using a cloud-based Idaas
solution eliminates the need for equipment
purchases, specialized IT staff and ongoing
training, allowing your IT team to stay
focused on day-to-day operations. (b) Better
user experiences: Single sign-on and multi-
factor authentication let user's login with a
single set of credentials, which reduces
friction and password reset assistance.
(c) Increase revenue and customer loyalty: A
good first impression from a smooth login
process leads to more customer interactions
and sales.
Disadvantages:
One of the big negatives of Idaas that many
companies anticipate is the danger of having
to outsource critical functions. Once you Database as a Service (DbaaS)
send your identity management service Database as a service (DbaaS) is a cloud
requirements to the cloud, they are outside computing managed service model that
your company firewall, and critical functions enables users to set up, operate, manage and
of your business are exposed to the internet. scale with some form of access to a database
You must be sure your data and systems without the need for setting it up on physical
remain safe if you are going to use an IdaaS hardware, installing software, or configuring
system. it for performance, database management by
With software like active directory domain themselves.
services, providing identity on the web is It allows users associated with database
frequently expensive. activities to access and use a cloud database
system without purchasing it.
8
Q.
DbaaS is self-service/ on demand database (a) Flexibility: NaaS offer more flexibility
consumption coupled with automation of and greater customization. Changes are made
operations. Advantage: to the network via software, not hardware. IT
High quality of service: Cloud vendors teams are often able to reconfigure their
manage database systems as part of a Service corporate networks on demand. (b)
Level Agreement (SLA) guarantee to ensure Scalability: Cloud services like NaaS are
that the systems are running to optimal naturally more scalable than traditional,
performance. These guarantees also include hardware-based services. Enterprise NaaS
compliance to stringent security regulations. customers can simply purchase more
The service availability is managed by the capacity from a vendor instead of
cloud vendor to high standards as per the purchasing, plugging in, and turning on more
SLA agreement. hardware.
Faster deployment: Free your resources from (c) Access from anywhere: Depending on
administrative tasks and engage your how a cloud-based network is configured,
employees on tasks that lead directly to users may be able to access it from anywhere
innovation and business growth instead of and on any device without using a VPN,
merely keeping the systems running. although this introduces the need for strong
Resource elasticity: The technology access control. Ideally, all a user needs is an
resources dedicated for database systems can Internet connection and login credentials.
be changed in response to changing usage Disadvantages:
requirements. This is especially suitable in Compatibility: The NaaS vendor's
business use cases where the demand for infrastructure may not be compatible with
database workloads is dynamic and not legacy systems that are still in place like
entirely predictable. older hardware, on-premise-based
Disadvantage: applications, etc.
Traditional enterprises could have objections Legacy data centers In many enterprises,
to cloud-based services in general. important applications and processes still run
Since the data is entrusted to a third party for in on-premise data centers, not the cloud.
storage and processing, the enterprise loses This makes migration to a NaaS model
its immediate access to the information and slightly more challenging.
servers responsible for its execution. Vendor lock-in: When an enterprise moves to
In case of vital failure of the DbaaS server or a cloud service, there is always the risk of
network, the organization may lose its data. becoming A vendor lock-in can have major
Applications: repercussions if the ser provider's
DbaaS is ideal for small to medium-sized infrastructure fails or their prices increase.
companies without big IT departments. As Applications
the DbaaS takes on the financial Popular NaaS use cases include:
burden of hardware and maintenance, (a) Software-Defined WAN
smaller teams can build apps that they cannot (c) Virtual Private Network (VPN)
afford to support on-premises. (b) Content Delivery Network (CDN)
DbaaS is also a popular option for teams that
want to set up and scale databases for
complex distributed apps. For example, in an
IaaS and DbaaS setup, the DbaaS solution
can request resources from the IaaS platform
that automatically manages the provisioning,
storing, and networking processes.
Lower total cost of ownership: Customer firewalls, etc. The price is determined by how
need not purchase expensive hardware, long the consumer keeps a resource.
servers, power, and data storage. Portability, interoperability with legacy
Scalable solutions: It is very easy to scale the applications: It is possible to maintain legacy
resources up or down automatically, based on between applications and workloads between
their demand. Disadvantages: IaaS clouds. For example, network
(a) Lack of portability between PaaS clouds: applications such as web server or e-mail
Although when standard languages are used, server that normally runs on customer-owned
platform service implementations can vary. server hardware can also run from VMs in
Transferring workloads from one platform to IaaS cloud Limitations
another can be challenging because, for (a) Compatibility with legacy security
instance, the file, queue, or hash table vulnerabilities: As IaaS allows the customer
interfaces of one platform may be different to run legacy software in the provider's
from another. (b) Event based processor infrastructure, it exposes customers to all of
scheduling : The PaaS applications are event- the vulnerabilities of such legacy software.
oriented, which places resource restrictions (b) Virtual Machine sprawl : Due to the fact
on them because they must respond to that IaaS allows the customer to operate the
requests in a specific amount of time. virtual machines in running, suspended, and
(c) Security engineering of Paas applications: off states, the VM can become out-of-date
PaaS applications must explicitly employ with security updates. These VMs can,
cryptography and handle security exposures however, be updated automatically by the
because they depend on the network. provider, but this mechanism is difficult and
Q. Explain Infrastructure as a service complex. (c) Robustness of VM-level
(IaaS) in detail. isolation: Through hypervisors, IaaS provides
IaaS provides access to fundamental isolated environments for individual
resources such as physical machines, virtual customers. Virtualization is accomplished by
machines, virtual storage, etc. splitting a physical computer into multiple
Apart from these resources, the IaaS also virtual machines via a hypervisor, a software
offers: Virtual machine disk storage, Virtual layer that also includes hardware support for
local area network (VLANs), Load balancers, virtualization. Applications
IP addresses, Software packages. Popular IaaS use cases include:
All of the above resources are made available Disaster Recovery (d) Startups
to end user via server virtualization. Ecommerce (e) Software Development
IoT, Event Processing, Artificial Intelligence
(AI)
Benefits
Full control of the computing resources
through administrative access to VMs:
Through administrative access to virtual
machines, IaaS enables customers to access
computational resources. To run the virtual
machine or save data on the cloud server, the
customer issues administrative commands to
the cloud provider.
Flexible and efficient renting of computer
hardware: Customers can rent IaaS resources
including virtual machines, storage units,
bandwidth, IP addresses, monitoring services,