0% found this document useful (0 votes)
10 views

Cloudcomputing

Unit 1 cloud introduction

Uploaded by

yt1300572
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
10 views

Cloudcomputing

Unit 1 cloud introduction

Uploaded by

yt1300572
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 70
PURLISHLED BY: Publications® (A Unit of Quantum Page Pvt. Ltd.) Pict No 69/27, Bite: Apram Singh Quantum: Pane 50129. 416079 Veal pageqeastams pmaid.com Website: wwe.quastampaceain Delhi Office 1 M-28, Navevo Shahdara, Deh-110032 © Quem Pact Pot bo. No pot d the gable mp be epeadnsl © tenon + ony fe by op mma wht prema ‘Au Rao Ramm vermunn cru n te work p domed bom ee Interweb lable Every effort has ben made to ersare sccuracy, however redtir the publaher ror the authors (essteree Oe acricacy oF complete of amy edcrmaten Pubic here anu newer the publasher nor the authors stall be eeporahie tor amy error omiaairm, or damages armcy ot of wr of he formation Cloud Computing (CST ; Sem-7) 1 Eden 2011.17 Fr Edwon 2019.20 (Thoroagitly Revime! Edicion) Eaten 200027 © Ration 2021.27 7 Ramen 2002.29 Pande Goan aan Oia e—_—__oONnNS KCS 713 : Cloud Computing LUNTE : INTRODUCTION (1-1 Et0 1-266) Introctacton to Choad Computing - Deir of Chal - Evedutin cof Cloud Computing - Underlying Principles of Parallel and Dastributed Computing ~ Cloud Characteristics ~ Elasticity in (Cou! - Onstemand Provisioning UNTF2; CLOUD ENABLING TECHNOLOGIES (2-1 Eto 2-33 E) ‘Service Onenied Architecture - REST and Systems of Systems = WebSerracs -Publah, Sobscne Mel ~ Bots of Virtualization ~Typescl Virualizanon - Implementation Levels of Virtualzatm = Virtualization Structures ~ Tools and Mechanisms ~ Viruatizaton of CTU = Memory - 1/0 Devices -Vertuaizaton Support and Dasaster Recovery LUNTTS: CLOUD ARCHITECTURE, SERVICES & STORAGE, G1Ews326 Layered Cloud Architecture Dengn ~ NIST Cloud Computng [Relerence Architecture ~ Public, Private and Hybrid Clouds Las PaaS - SaaS ~ Architectural Design Challenges ~ Cloud Storage 7 Storageers-Serrice - Advantages of Cloud Storage - Cloud Storage Providers -S3- LUNTT-4 : RESOURCE MANAGEMENT (414-256) Inter Cloud Resource Management ~ Resource Provisioning ene Rewuice Provsicnang Methods ~ Global Exchange of Cloud Resources ~ Sccunty Overview ~ Cloud Security Challenges = Seftwareas-a Service Secunty ~ Security Governance ~ Virtaal ‘Machine Secunty ~ IAM ~ Secunty Standards UNITS: CLOUD TECHNOLOGIES & ADVANCEMENTS (5-1 Eto5-21 E) Hadoop - MapRedace ~ Virtual Box — Googe App Eng-ne ~ Programming Envisorament for Google App Enge ~ Open Stach ~ Federation in the Cloud ~ Four Levels of Federation ~ Federated Scorers end Applications - Future of Federation. SHORT QUESTIONS 1SQ-1Et0$Q-206) ‘SOLVED PAPERS (2019-20 TO 2021-22) (SP-1E to SP-32 E) 2E(CSITSem-1) __Fatrtin PART-1 Introduction to Cloud Computing, Defirition of Cloud, Evolution of Cloud Computing. a Introduction Long Answer Type and Medium Answer Type Questions ‘Ques |] What do you mean hy cloud computing ? Also, give its properties. CONTENTS Part-1 Introduction to Cloud ~~. ‘Answer Computing. Definition 1. Cloud computing is the mears of delivering all IT from computer ‘of Cloud, Evolution of ‘applications, software, business processes, messaging, and collaboration Cloud Computing toend users asa service wherever and whenever they need it Underlying Principles of 1-17E to 1-268 2 Cloud computing isa paradigea for delivering T where rapid provisioning Pale and Distriinted San important characters fr computing resources data applications Computing, Cloud and IT, Chametartica, Elasticity Cloud computing helps us to face the challenges such as fa Cloud, On-Demand a arson aa Provielocing i Decreasing the capex and opex cost i Enhancing the service quality. iii Maintaining the desired and right level of security, compliances, ‘regulations, and policies across the dierent functions of enterprise: fv. Rapid provisioning. agility, and business transparency for consistent selbservice delivery 4. Thus, cloud computingis the service and deployment model using large resource pool based provisioning of virtual or physical resources in a service model using the internet (publiceloudlor intranet (private cloud Properties of cloud computing are: 1, User centric This means once a user is connected to loud any data, such as images, videos, applications, becomes his property, Not oaly th databut the devices esanected tit and the user ean share it with other 2 Task centric : Cloud computing focus on what one need and how application can do it. Here documents are given more priority than the applications which create them, 1-1E(CSIT-Sem-7) Coad Computing 1-3E(CSITSem-7) A Self healing: In eifbaling. backups are availabe fr every document ‘nthe cloud Hence, ifene document crashes there will be its duplicate ready to run. 4 Multienancy and intelligence : Mult-tenancy refers to sharing of data and conte ecroes lange pool of wera. Aa varicas data are stored in loud, data ining end analy are necessary for accessing information ‘0 an atelligens manner. {Programmable Many processes in dout computing shall be automate ‘such as backing up crashed data withite duplicate. Hence, programming ‘associated with loud computing © Flexible: Fleible as the users may be of different varictics and hence ‘thas tomatch with their needs RESTS] wnat are the advantages and disadvantages of cloud computing ? ‘Advantages of cloud computing: 1. Cost saving: It helps us to eave eubstantial capital cast as it does not ‘need any physical hardware investments 2 Strategic edge : Cloud computing helps us to access the latest applications any time without spending our time and money on igh speed : Cloud computing allows usto deploy our service quickly in fewer dicks. This faster deployment allows us to get the resources required for our eystem within fewer minutes. 4 Reliability : Through cloud computing we can always get instantly ‘updated about the changes. Mobility : Employees who are working on the premises or at the remote locations can easly access ll the cloud services Allthey need is internet onnectinity @ Unlimited storage capacity : Cloud computing offers limitless storage capacity Disadvantages of cloud computing + 1. Performance can vary: When we are working in aloud environment, our application is running on the server which simultaneously provides resources to other businesses that can affect the performance of our shared resource 2 Technical issues : Cloud technology is always prone to an outage and other technical issues, 3. Sccurity threat in the cloud : Before adopting cloud technology. *® should be well aware ofthe fact that we will be sharing all our compasiy ® sensitive information toa third-party cloud computing service proviier Hackers might access this information. Internet connectivity : Good internet connectivity is must in cloud computing We cannot access cloud without an internet connection, Lack of support : Cloud computing companies fail to provide proper ‘support tothe customers. Moreover, they want their user to depend on FAQsor online help, which ean bea tedious ob for non-technical persons, QaeT] Explain vision of cloud computing. ‘Answer 1 Clout computing provides the facility to provision virual hardware, runtime environment and wervice toa person having money 2 ‘These all things canbe used as long as they are needed by the user The whale collection ofcomputing systems tranformed into collection tf lites, which can be provisioned and composed together ta deploy systems in hours rather than daa, with no maintenance costs 4 Thelongterm vision ofacloud computingiethat IT cevics are traded {utilities inan open market without technological end legal barriers {Inthe future, we an imagine that it willbe poss to ind the eolation that matehes with our requirements by simply entering ot requett ia flobal digital marke that trades with loud computing service. 6 Theexitenc of uch market will enable the automation of discovery processandits integration into its exiting software ystems Due to the existence of global platform for trang cloud service will alas helpservce providers to poentialy increase heir revenue. & Acloud prover can also become a consumer af campetition service inorder full ts promises to customers Seal [Answer Categories of parallel computing systems: {Bit level parallelim = tin form of parallelism which is based on increasing processors word ste, Ieahortens the numberof instructions thatthe system man run inorder to perform atask on variables which arepreaterin sie ii Instruetion Level parallelism : tis a form of parallel computing in ‘hich we cam calculate the amount of operation carried aut by an operating system at same time. For example J] List the major categories of parallel computing systems. Cloud Computing 1-SE(CSITSem-7) Anstruction pipelining Out of order execution Register renaming ‘Speculative execution Branch prediction Que TBD | Discuss the issues related to cloud computing. Several iasues related to cloud computing are : Performance waves Data issues Energy related issues Fig 151. Security issues : Some ofthe security problems which are faced by the cloud computing are as follows pe » 1. Data integrity: When data is ona loud, anyone fom any lacaion can ccom thine data fom the ead Cle ern not diferente tweet aseniive data from a common data ths enabling anyone to acca thou senstve data Thus theres lack of data integrity in cloud computing 2 Data theft: Most ofthe cloud vendors instead of acquiring server tolleae server from other service providers esuse they ae cot ‘Mfective ad Mexibefor operation 3. Security on vendorlovel: Vendor should make sure that the server tewellpecured fromallthe external threats tmay come ares: Aloud tt good only when there in good ncurty provided ty the vendor tothe commer 4. Security on user level : Even though th vendor has provided good security yer forthe customer, the customer should make sure that because of te wn acted, there should ot be any loss of data ar USinpering of data for otber users who are using the tame eoud {Information security Security related othe infrmation exchanged Intween diffrent host o tween ost and nr. Thins pertaining LOE (CSIT-Sem-7) Introduction to secure communication, authentication, istues concerning single sign ‘on and delegation. Data issues : Various data issues in loud computing are as follows 1. Dataloss: Ifthe vendor closes due to financial or legal problems there be alors of data for the customers. The customers will ot be able to feces thase data because data is no more available for thecustomer as the vendor shut down. 2 Data location : When it comes to location of the data nothing is transparent even the customers do not know where his awn data are located. The vendor dovs not reveal where all the data are stored. The data will not even be in the same country of the customer, it might be located anywhere in the world. & Data lock-in : Software stacks have improved interoperability among. platforms, but the APIs for eloud computing itselfare still essentially proprictaryorat least have not en the subject of active standardisation ‘Thus, customers cannot easily extract their data and programs from one site to run on another. 4. Data segregation : Data in the cloud is typically stored in a shared ‘environment whereby one customer's data is stored alongside another ‘customer's data, hence itis difficult to assure data segregation. 5. Dataconfidentiality and auditability : Current cloud offerings are ‘essentially public (rather than private) networks, exposing the system tomoreattarks. Auditabilty could be added asan additional eaver beyond the roach ofthe virtualized guest OS providing facilites arguably more secure than those built into the applications themselves and centralizing the software responsibilities related to confidentiality and auditabiity to ‘single logical layer. 6 Dataintogrity : One of the biggest concerns with cloud data storage is the verification of data integrity at untrusted servers, and how todeal with sensitive data. Its not an easy task to maintain customer's most Sensitive eloud data securely, which isneeded in many applications for clients. Deletion of data: Data that has tobe deleted by the user because he or she no longer needs it or many no longer process it for another reason is also deleted by the provider and no more copies of data are available ‘This can lead to problems, particular in conneetion with backups. Service level agreements : According to the purpose for which the data is processed, itis important to agree on binding service levels for availability and data recovery and if necessary, safe guarded by supporting fzedpealis inthe oven of won-compliance wth the agreed nerve 1-7E (CSITSem-7) Various performance issues in cloud computing ae: 1. Poor application performance or application hang-ups: Usually the application is starved fer RAMor CPU cele, and faster processorg cr mare RAM is added 2 Slow access to applications and data : Bandwidth is usually the une, and the moet commen elution isto add fast netvork connections 8 Horizontal and vertical scalability: L Vertical scaling : Vertical scaling (up) entails adding more resources tothe eae computing pool. fi, Horizontal acaling Horizontal cling (out) requires the addition of more machines devices to the computing platform tobandle the incrated demand Sustained increassin demand, however, require Horizontal scaling and load balancing torestore and maintain peak performance Eneray related issues: Various energy related issues re as fellows 1. Cloud empting is rapidly growing in importance as increasing numbers sof enterprises and individuals are shifing their workload to cloud service providers 2. Theclectricity cots involved in operating alangecloud infrastructure of sultiple data centres can be enormous. In foct, cloud service providers fflen must pay ar the peak power they draw, a well as the energy they 4. Lowering these high operating costs is one of the challenges facing cloud service providers. 4. Insuiicient or malfunctioning coling system canlead toaverheatingof the resources reducing system reliahility and doves lifetime. 5. High power consumption by the ifratructure lends to substantial carbon dioxide (00, )emission contributing to the greenhouse effect Fault tolerance : 1 Fault tolerance is one ofthe key issues of cloud computing. Fault tolerance is concerned with al the techniques necessary to enable @ system to tolerate software falts 2 These software faults may or may not manifet themselves during tyetems operations but when they do, software fault tolerant techniguet ould provide the necessary mechanisms ofthe software ayatem 10 prevent ryetem failure oecurrences. Fault tolerance techniques are employed during the procurement, of developmeat, ofthe software, When a fault occur, theee technque® provide mechanisms to tho software syrtem to prevent syste failure From eccurning 1-8E(CSTTSem- [ae] What are the hurdles in cloud computing? urdies in cloud computing : 1. Scourfty: L_Asthe services are opened and dliverod over the network between te cloud service provider and the eonsuraer, the security inthis tmodel i perceived at higher levela {Other inhibitors can be location-independent resource pooling ‘where consumer does not know where his services are running oF srbere his data is stored. ii, Limited service management and monitoring capabilites inthe public eloud model als added tothecomplesities, 2 Regulation and compliances : i There isa nced of data governance models tobe established in the enterprises and federating data privacy. ii In large organizations, IT delivery is taken with the concerns of reliably, performance, and availability {i There are different levela of maturities for organizations seeking different levels of Service Level Agreements SLA) but eloud eervice providers are not equipped to deliver the services. ik, There i a need of stringent Recovery Point Objective (RPO) and the Recovery Time Objective (RTO) with the agreed number of ininshhours downtime. Cloud migration : L Thisrequires the property of powerful interoperability ofplatforms that should identify the appropriate applicatioa that exa be migrated tothe loud. Its important to Kentify the interdepondoncios and integration points withstandards and interfaces tht are lacking amang service providers. fi, Cloud migration becomes more complex ifthe service bundles are integrated from multiple cloud service providers. This can also tecome the deal breaker o the reason for downgraded performance. 4. Worldond suitability for clou i. Notallthe opplication are suitable candidates for the cloud, fi I depends on the function of the business, enterprise policies, application architecture, scalability, suitability, usage patterns secordingt pay-per-use-model, or infrastructure requirements in theservice model Ciowd Con 1-0E(CSIT-Sem-7) Que 17, 1 Explain briefly the term cloud. ‘Answer i 1 Cloudie an extension ofthe internet with some level of inherent discipline and ethics 2 Cloud can be thought of unification of information technology with business intelligence 3. Technology merges virtualization, grid functionalities and web standards ‘as a single utility model which i delivered to the customers over the internet, whereas the business intelligence defines the best cost schemes leading to win-win situation for both the cloud service provider as well as the cloud service cansumer 4. Cloud brokers negotiate the best deals and relationships between the ‘loud consumers and cloud providers. 5 They can use specialized tools to identify the most appropriate cloud resource and map the requirements ofthe application to 6 Cloud broker services are mainly categorized into three group ‘a Service intermediation broker provides a service to a consumer ‘that exhances a given service by adding ome value ontop to increase some specific capability b. Service aggregation brokerage service combines and integrates {nto one or mare services and ensures that data are modelled across all component services and movement, security of data between the service consumer and multiple providers. ¢ Service arbitrage is similar to cloud servie aggregation but services being agzregated are not fixed. In addition, these services provide flexibility and opportunity for the service aggregator. ‘Wee TAT] What are the components of cloud ? — Components of eloud : 1. Cloud service consumer (or end user): {Cloud service contumersare the end wsrslinown asclints, which toteract with the system aad demand for services as per th requirement 4 Tho-client can be categorized into the following three categories: ‘Mobile clients : Mobile clienta run the application from laptops, PDAs and emart phones, This eateory of clients demands for higher speed and high level af seurty LOB(CSITSem-D Introduction b. Thinclicnts: Thin lientsneither have hard drives nor have DVD ROM drives, and largely depend on the sorver e Thick clients : Thick clients are self-eufficent in terms of 2 Cloud service provider: L Cloud service providers are the agonts which host the servers in the cloud and deliver aerview to the end users. i The major cloud providers are Google, Amazon, Sales Force, IBS, ‘Microsoft and Rackspace. 8 Internet medium : Internet medium is the communication chann‘l between the cousumer and provider where services are redirected. 4 Datacentre: i. Datacentee is the collection of servers where the applications subscribed are housed, ii Itconsists of storage, network, and server. QueI9.1] Give the characteristics of cloud. Taewer Characteristics of cloud a 1. Selfscrviceon-demand: As cloud consumer, ases are privileged request and provision computing capabilities bundled wth rervices with tr without approval proses powered ly automation and werkflows. 2 Ubiquitous networkaccess: This is the characteristic by which user and server computing devices can be acessed ever the network ven using the neat generation heterogenous devices auch a9 ‘smartphone, tablets, thinand thick elients Resource pooling “This charoteristierefersto the posing of resources cross multiple acer ii These pooled virtual datacenters are then divided into maltinte pools 10 provide their services to various consumers in a mult nant mode ii These poolacan have bath physical and virtual resources, fy. ‘The doviees provided by this pool give the notion of location independent compute (storage, servers, processing, network bandwidth virtual machines, et), where the consumer does nat havecontrator visibility abut the servic lation and is geography 4. Rapid claticity : Thischaractorsticmakes the provisioning rapid and elastic Cloud Computing 1-115 (CSITSem-7) This provisioning can be automatic and ean Mlex-up and flex-down ‘on the basis of spikes of utilization. fii The consumer ean view the infinite capacity available asa service, ‘which ean be bought at any point of time. ‘Que 101] What are the challenges in cloud ? ‘Answer Challenges in cloud : 1. Lack of control : In case of Inek of contrel, by delegating the Tr ‘management toa third party, the service consumer loses the ability to directly control and monitar the execution of the submitted workload. 2 Sccurity : For eccurity, trusting a third party to store enterprises confidential data is a source of potential concern and needs to be effectively addressed by the eloud service provider. Interoperability among multiple service providers : This leadsto avoid vendor loccin, itis desirable to beable torun the same virtualized ‘applicationon clouds provided by multiple vendors. Appropriate standards ‘need to bein place for addressing this concern. 4. Resource management : The management of computing, storage and other resources in a distributed system is recognized as a ‘hard problem. QueHAI] Explain cloud services. aera (nthe Bais of wer requirement, the cud infrastructure hs given various Scricngechemss in oder to deliver the wit tothe consumers diets aoe fa Infrastructure-as-aService (aa6) {Infrastructures Servic (IaaS) model allows the eustomer rovsin processing trage,netrork and other important sow chat operatingsutem and plications, The consumer does not have control over the underlying infrastructure bot has contol over the operating systems, stT9e° and deployed aplications. sneer bb Plattora-eea-Service (PaaS): 4. Platform-as-a-Service (PaaS) mode] provides capacity to the tne to ethane eae plone infrastructure using the programming ‘or tools Suppo by the cloud provider. — 112 B(CSTT-Sem-) Introduction fi Theconsumer dace not manage the underlying cloud infrastructure ‘auch as network, storage, ete, but has control over the deployed applications, It also provides solutions for integrating cloud computing into ‘existing application, services, and infrastructure with a market- oriented approach, © Software-as-a-Service (SaaS) i. Software-as-a-Sorvico (SaaS) model enables the customer to use the provided application hosted on the cloud infrastructure. ii In this model, the customer does not have any control over the cloud infrastructure but has a lttleeontrol aver the application configuration settings. {ik Theapplieations are accessible from the cient devices such as thin client or web browser interface (FigB.11.1; Cloud series Quenaa, Answer Benefits of cloud: 1. Increased agility on the IT datacenter resources and innovation. 2, Enabling of self-service portal and thus ensure Virtual Machines (VMs) inlesslead-times. 5. AdbereaceofSLAsas the VMleadimes anddown-ties are sigifianty ist the benefits of cloud. TISE(CSIT Sem) 1.14 B(CSTTSem-1 ‘The business mode! introduced with utility computing brought new requirements ard led to an improvement of mainframve technalogy. ‘additional features such a operating systems. process control ata 4 Thal and error configuration tests can be dane at ease. iz 5 Complete contro! aver cloud wage for administrators is possible, 6 Scalability and flexibly allow the laaS loud to almost deliver the promise of unlimited TT services on demand. user metering facilites. 7 Usage-based payment and not getting billed when the utilization ii The idea of computing as utility remained and extended from the decreases bosiness domain to the academia with the advent of cluster computing Significant reduction in the costs for IT datacenter. 8 Dynamic sharing of the resources available in IT datacenter through private cloud so that demands ean be met cost effectively. 10. Considerable inerease in the utilization of resources of T datacenter 11. Inerease in the operational efficiency of the resources in the IT datacenter, 12, Achieve a greener datacenter. 13, Support for hetorogencous hardware vendors. Avoids vendor locking, 3, Software-as-a-Service : Refer Q. 111, Page I-11E, Unit 4. Cloud computing :Refer Q. 1.1, Page I~2E, Unit-1 Qi MIA] Discuss the architecture of cloud computing. ‘Answer Clood computing architecture refers to the components and subcomponents required for cloud computing. These components consist of ‘Que13:] Explain the evolution of cloud computing. = Evolution of cloud computing: Grid computing: ty Grid computing appeared in the early 19908 as an evolution of cluster computing Utility computing is a vision of computing, defining a service provisioning model for computing services in which resources such fas storage, compute power, applications, and infrastructure are packaged and offered an a pay-use basi, Front end platform i. Cloud computing architecture consists of front end platforms called clients or eloud clients. i These clients comprise servers, fat (or thik) cients, thin clients, zeroclients tablets and mobile devices. fii. These client platforms intoract with the cloud data storage through ‘an application (middleware), through a web browser, or through a virtual session. fv, The front end rofers tothe elient part ofcloud computing system. It cect ige neal Sempre ‘use othor utilities such as power, gas, and water. 2 Backend platform: 2 a ee aad ahead sn de oo a cluster by means of internet connection. eee " required to provide cloud computing services. cae er eases titerent oceenlmsiees tl ticchaniom, services, deployment models, servers et. Dato am cr sate see canary Te nee efi: Siti Pe aa eratersiewa a. wiigenetae ee ‘web-based, community shared development tols. Thisis equivalent tolocally installed development tools in the traditional (non-cloud computing) delivery of development tools. 1-1SE(CSIT-Sem-7) (Choad Computing oe iL Platform-ave-Service (PaaS): Refer Q LU, Page 1-11E, Unit-1 Iv, Infrastracture-as-a-Service (IasS): Refer Q. 1.11, Page 1-118, Use. 40 Network : The cloud network layer offers L High bandwidth (low latency) : Allowing users to have ceninterrupted accens to their data and applications fh Agile network: On-demand acess to resources requires the ability te move quickly and efficiently between servers and possibly even clouds Ui Network security :Secunty is always important, but when dealing with multi tenancy. it becomes much more important because we Are dealing with aegregaing maluple customers Thom Backend ‘Que LAG] Write some applications of cloud computing. ‘Answer Applications of cloud computing: 1. Bigdata analytics: From fraud recognition to statistical investigation. 2 bag data exist univerally: Analyse how Iadoop and great presestation ‘ommputing clusters can be set-up in both public and private clouds. Develop and test : Build and test applicatioas in on-requirement platforms using constantly configured resources, lower expenditure, sand decreased release cycles 1-10 (CSTT-Sem-7) a Disaster recovery : Public and pnvate clouds facilitate commercial solutions to maintain highly accesuble applications with Mexsbe roultsple datacentres and provider architectures, and reduce down-time and data loss Gaming applications : Distribute Dexible capacity to assemble random traffic actions and to lower expenditure for the ongoing life cycle management by public and private clouds. Web and mobile applications: Deploy mobile applications and web ‘applications that are extremely salable and accessible across a range of verified architectures, technologies and clouds. Que T16] Give limitations of cloud computing. po Limitations of cloud computing : L Data protection : i. Datasecurity isa crucial element that warrants serutiny. Enterprises are reluctant to buy an assurance of business data security from vendors. ‘They fea losing data to competition andthe data confidentiality of| Inmany instances. the actual tarageleationis mat disclosed, adding ‘onto the security concerns of enterprises. In the existing models, firewalls across datacentres (owned by cnterprises) protect this sensitive information Si Inthe oud model, service providers are responsible for maintaining data security and enterprises would have to rely on them, Data recovery and availability + {All business applications have service level agreements that are Stringent followed, ii Operational teams play a key rle in management of service level tgrecments ind ranthee goreraance of epplications fi Inproduction environments, operational teams support Appropriate clustering and fll over b Datareplication Bystem menitering (transactions menitedg sae ee, centiaring 4 Maintenance (runtime governance) t Disaster recovery Capacity and performance management. Clea Conspatiog 1-17E (CST Sem.) Management capabilities: i Despite there being multiple cloud providers, the management of platform and infrastructure is till in its infancy. i Forexample. features like Auto-scaling are a crucial requirement for many enterprises {ii There is huge potential to improve on the scalability and load balancing features provided tay. 4. Regulatory and compliance restrictions : i. Insome of the European countries, government regulations do not allow customer's personal information and other sensitive ‘information to be physically located outside the state or country. 8. Inorder tomect such requirements, cloud providers need toset-up ‘9 datacentre or a storage site exclusively within the country to comply with regulations i Having such an infrastructure may not always be feasible and isa big challenge for cloud providers. Paaey Underlying Principles of Parallel and Distributed Computing, (Cloud Characteristics, Elasticity in Cloud, ‘On-Demand Provisioning, 1-18 (C8IT-Sem-7) Introduction i. Itaaves time and money as many resources working together will reduce the time and eut potential costs ii Ttean be impractical solve larger problems on serial competing: It can take advantage of non-local resources when the local resources are finite iv. Serial computing wastes the potential compating power, thus parallel computing makes better work of hardware. QueIIE | Describe briefly the components of parallel computing. Components of parallel computing: ‘Anever Type Questions QBELIT:] Write « short note on parallel computing. Write the ‘edvantages of parallel computing over serial computing. 1. Parallel computing is a computation type in which mul par 5 {ype in which multiple races 2 Problems are broluen down into instructions and are solved concurreatl¥. 3 The main reason for parallel programming is to execute cade efficient, ‘since parallel programming saves time, allowing the execution o 1, Computing problems 1. Numerical computing : Science and engineering numerical probleme demand intensive integer and oating pant computations HL Logical reasoning : Artifical Intelligence (AI) demands loge inferences and symbolic manipulations and large space searches. 2 Parallel algorithms and data structures ¢ Special algorithms and data structures are needed to epecify the ‘computations and communication present in computing problems \from dependency analyse) fi Most oumerical algorithms are deterministic using regular data structures 1-19E(CSIT-Sem.7, W. Parallel algorithm development requires interdiscipli interaction, ‘L Mardware resources : 4. Processors, memory, and peripheral devices (processing nodes) form the hardware care of a computer system. i Processor connectivity (system interconnects, network), memory ‘organization, influence the system architecture, 4 Operating systems : 4. Manages the allocation of resources to punning processes, Ai Mapping tomateh algorithmic structures with hardware architecture and vice-versa, processor scheduling, memory mapping, interprocessor communication. Que 119;] What are the properties of distributed comp Anewer, Properties of distributed computing: 1. Fault tolerance : 4 Whenone on some nodes fails, the whale system can still work fine ‘except performance id Need to check the status of each node. 2 Each node play partial rol i. Each computer has only a limited, incomplete view of the system. ii Each computer may know only one part of the input, 2. Resource sharing : acl user can share the computing power and storage resource inthe system with other usceg. ee 4 Load sharing: Dispatc ees ; pererlherme rag tasks to each node can help share 5 Easy toexpand : Weespect tous fw time w tospend notime if possible, time when adding nodes. Hope @ Performance : Parallel computing distributed eamputing. QeeBO|] Write a short note on distributed computing, 8? ‘can be considered a subset of compating isa model in which components ofa safteare pina fared among multiple computorstotmprone ficeney and performance. an rn diriuted computing, each proceso has its own private mem » Uiattnted memory). tnormaion i exchanged by passing messages tetween the proceso. 4. A dtrbutedaysem allowe resource sharing, Sprtems connected to the net 4. The goal of distributed computing isto make network a8 a single computer. 6. Examplenofdstributed tems oppistions of distin computing tres lntranct, Internet WWW, eal Que]2ii | Differentiate between parallel computingand distributed computing. including software by (Answer! Distributed computing ‘A system whose components are located on different networked computers, which communicate fond coordinate their actions by ‘passing messages toone another, [S-No.| | Parallel computing 1. | Itisa type of computation in which many calculations or the execution of processes are carried out simultaneously. 2 | Treccursin a single involves multiple computers computer. 3. Multiple processors execute | Multiple computers perform take mullipletasks atthesame | atthe same time. time. © | Computercan have shared [Each computer has its own memory distributed | memory. memory. 5 | Processors communicate | Computers communicate with with eachother using | eachother through the network bus. ‘Allows scalability sharing resources and helps to perform ‘computation tasks efficiently, 6 | Increase the performance of the aystem. 1-21 E(CSATSem.7) GEIST] Explain briefty the architecture of dlstributeg computing. Answer — Architecture of distributed computing: 1. Data-centered architecture: ‘These architectures identify the data as the fundamental clement Of the software system and access to shared data is the core ‘characteristic ofthe data-centered architectures. ‘Therefore, especially within the context of distributed and parallel computing system, integrity of data is the overall goal for such systems. The repository architectural style is the most relevant reference ‘model ia this eategory. It is characterized by two main components; the contral data structure, which represents the current state ofthe system, anda collection of independent components, which operate on the central data, ‘The ways in which the independent components interact with the ‘central data structure can be very heterogeneous. 2 Data-flow architecture i In the case of dataflow architectures, itis the availability of data that controls the computation, With respect to the data-centered styles, where the access todatais the core feature, data-flow styles explicitly incorporate the pattern ‘of dataflow, since their designis determined by an orderly motion of data from component to component, which is the form of ‘communication between them, Data-flow architectures are optimal when the et optimal when the system to be desigm crubodiesamult-stage process, which canbe clearly identified it? ‘collection of separate components that need to be orchestrated pale ponents that need to be orchestra 3. Virtual machine architecture : ‘This lass of architectural styles i characterized by the presence of ‘shstract execution environment that sitnulates features that fare not available in the hardware of software, ‘Applications and system are im . Aplications plemented and become portable dilfercat hardware and software environment as long 0s the"? is an implementation of the vi : : Sea reuementatin of the virtual machine they interface Wt Introduction 1-228 (CSIT-Sem-7) Hon 4. Call and return architecture : ‘all the systems that are camposed by i This category identifies components mostly connected together by method calls, ‘The activity of systems modoled in this way is characterized by & 7 chain of method calls whose overall execution and composition Sfmt the exeutton of one F more operations Si ‘The internal organization of components and their connections may vary. 5 Architoctural styles based on independent components : ‘This class of architectural styles model systems in term of independent components having their own life cycle, which interact toeach other in order to perform their activities. ‘There are two major categories within this class, which differentiate in the way the interaction among components is managed a. Communicating processes : In this architectural style, ‘components are represented by independent processes that leverage Inter-Process Communication (IPC) facilities for coordinate mansgement. b. Event systems : In this architectural syle, the components ofthesystemare loosely coupled and conaected. In addition to exposing operation for data and state manipulation, each ‘component also publishes (or announces)a collection of events that other components ean register with. (Que 1.28)] What do you mean by dynamic cloud infrastructure ? 1 Cloud computing clients ean access standanlized IT resources to deploy now applications, services, or computing resources rapidly without re- cngincering their entire infrastructure, thus making it dynamic. Cloud dymamie infrastructure is based on an architecture that combines the following initiatives: 4. Service management : Offers business transparency and ‘automation across the pillars of business for consistent delivery. 1b. Asset management: Maximizes the value oferitical business and IT assets over their life cycle with industry-tailored asset ‘management solutions, c Virtualization and consolidation : Reduce operating costs, improve responsiveness, and fully utilize the resources. @ Information infrastructure : Helps businesses achieve information compliance, availability, retention, and security the method remotely invoked, while the cients maintasn the proxy ‘component allowing its hosting environment to remotely invoke (Cloud Computiog LSSECSTTSem7 1-24 (CSTT-Sem-7) ctyectiven © Energy efficiency : Ofer green and sustainable enengy ealutcny nati Fas ‘methods through the proxy inter {Security : Provides end-to-end mtustry customized povernance, ‘ak management, and compliance for businesses, Elasticity : Maintains cotinuous business and TT operations while rapadly adapting and responding to risks and opportunities, ‘Qoe TSE] Explain technologies used for distributed computing. Anewer Technologies used for distribated computing are: 1. Remote procedure call: \ Remote Procedure Call (RPC) isthe fundamental abstraction cnabling ibe execution of procedures on client's request. & Wallows extending the concept of procedure call beyond the boundaries ofa processor and aingle memory address space The called procedure and calling procedure may be on thease system, or they may be on different asters Ina network, Theaystem ia based on a client server model ¥ Theserver process maintains registry ofall the available proeret that ean be remote aivobed, and Listens for requests from eles that epecty which procedure to invoke together with the values sf the parameters require y the procedure Yi RIC maintains the synchronous pattern that is natural in process procedure and funetio alls 2 Distributed object frameworks : Distributed ebjcet frameworks extend the object-oriented programing eystems by allowing objects toe distributed across heterogeneous network and previ facilities so that they © coherently act as they were in the eaze advens spare Distributed object frameworks leverage the basic mechan introduced with RFC, and extends to enale the remote invoeat sf elyect methods and to keep track af references to objet ma available through a oetwork connection iv Proxy and skeleton always constitute a pair, the server prvces* maintain the skeleton companent, which is in charge of exeeutiSS ‘TEE TSHT] What are the characteristics of cloud computing ? cE Characteristics of cloud computing are 1. Ondemand self-service: Resources can automatically be provisioned without the need of human interaction as and when needed. 2 Compatibility :Cloud services allow accoss to the data from any location and on any device. Employees ean work from anywhere. X_ Elastleity Cloud sorvices are scalable. Consumers can add resources they need and discard resources they do not want 4. Reliability + Cloud runs.on multiple servers and is automated to run ‘even {fone server fails Resources ary drawn from the other servers to ‘ensure continuity without any interruption & Disaster recovery With replication and storing ncrosa multiple servers, cloud allows easy cost-effective solutions at times of data loss due to some theft or calamity, & Updates : Consumers need not werry about sofware updates and {echnical issues, The eloul servers are located in different places uway from our business premises The providers doallthe updatesand patches Security Cloud services offers enhanced security. We ean accwas our data from any ayatem even if we lose ur personal device. S1RG] Write a short note on elasticity In cloud. 1 Incloud computing. elasticity indefinal na"the degre ta which aystens {sablo adapt to workload changes by provisioning and d-provisining ‘esoutees in an autonomic manner, auch that at each pai in ie the availa resources match the current demand ax closely na pose’ 2. Elasticity is a defining characteristic that differentiato cloud camputing {corn previously proposed computing paradigms, such agri cocsputing 4. The dynamic adaptation of capacity, by altering the use of computing esourves, to meet a varying workload ts ealled elastic computing 4 Elasticity sims at matching the amouat of reaurce allocated toa service With the amount of resource it actually requires, aveiding over Provisioning or under provisioning. — Seuss ea erg eee a romaine Deke ice me om QueTST | What are the advantages of elastic cloud comput, ‘Answer, Advantages of clasti cloud computing: 1. Costefficency? 1 Clulisavaiatie ot machcheaperrates thas raditonal opr nidean significant lower the oral I expenses. 4 Byuring elo latin companiescansave licensing fees sel eliminate overboad charges auch asthe cost af data sarge fofare updates, management te, 2 Convenfence and continuous avalaility: Cloud makes exit acces of shared douments wd fs wth view and oli ure Pale ‘lbads ali flr services that are avaible wherever the end wet tight be loted Morcover it guaranteed continuous avalaiity af Teanurees and inate of apsem allure alternative instances we utmatialy pawned onther machines {2 Backup and reovery The poset ofbachng up and recveriag 8s is easy asinfruatin i esidngon cloud and not ona physi deve. Tevaruscud provider able ad dene olan lens 4. Cloud isenvironment friendly :The chude moreeticen than‘ (ypicl I infrstructareandit takes fewerresoures ta compute U3! ssving eens. & Sealabilty and performance: Sclliy is obi fetus ft load deplymests. lou instances are deployed automaticly then needed end as ares enhance performance withexcllet se! computations ‘Wee 3R] What are the disadvantages ofelasticcloud computing? ‘answer | Disadvantages of clastic cloud computing 1. Security and privacy i the loud: Seeurityath geste loud computing. Companies essentially hide their private data 2 tsrmaionoetbl rence ae co ea 1-26E (C8ITSem-1) 2 then up tothe cloud service prover to maanage, protect au tain data cunfidential. Lite control: ine the aplatons and ered ey nd remotely companies, users and third party virtual environmen Timited coatral over the function and execution of the hardware and software Dependency and vendor lock-in : One of the major drawbacks of cloud computing isthe implicit dependency onthe provider. It» also falled"vendor lok in”. Asit comes difficult to migrate vast dato from tld providertonew. So, itis advisable to sleet vendar sery carefully Increased vulnerability: Gloud based solutions are exposed wn the publiinternet therefore aremore vulnerable target for malicious users tnd hackers. e098 Cloud Enabling Technologies CONTENTS Service Oriented Architecture. REST and Systems of... Systems, Wob Service Publish-Subscribe Model Irgplementation Levels of Virtualization Virtualization Structure, Tools sand Mechanism, Virtualization sf CPU, Memory, UO Devices, Virtualization Support and Disaster Recovery 2A E(CSIT-Sem-7) 4-2E (CST Sem-D Long Answer Type und Medium Answer Type Questions {ee RAD | Brietty describe the Service Oriented Architecture (SOA). Answer 1. Service Oriented Architecture (SOA) is an architectural approach in which applications make use of services available ia the network, 2. Service Oriented Architecture(SOA)is a style of software design where services are provided tothe other companests by applicatica components through a communication protocol over a network. 8. SOAallows users to combine a large numberof facilities from existiog services to form applications. 4. SOA encompasses aset of design principles that structures the system development and provide means for integrating components Into a coherent and decentralized system. 5. SOA tused computing packages functionalities intoa set of interoperable services, which can be integrated into different aoftware systems belonging to separate business domains. 6. SOA provides a translation and management layer within the cloud architecture that removes the barner fer loud chents obtaining desired QESET |] Explain the major voles of Service Oriented Architecture ‘There ar two major rales of Service Oriented Architecture ‘SOA 1 Bervice provide 4 Tho sevice provider Is the maitsiner of the sevice and the organization that makes avaiable on or tore services for sakes toe 4 Toadvertie services the provider an publish them in together witha vervice contact that specifies the eaten ore serie, How louse the ruiements fs theresa foes charged. " ee ae ae Cloud Computing 2IE(CSIT-Sem.7) 2 Service consumer : - 1. Theservice consumer can acate the service metadata inthe registry ‘and develop the required client components to bind and use the ser ‘Services aggregate information and data retrieved from other ‘services er create workflows af services to satisfy the request of a Sven service consumer. QerBa) ] Describe the euiding principles of SOA. ‘Answer | Guiding principles of SOA: 1. Standardized service contract : Services adhere to a given ‘communication agreement which is specified through one or more service description documents. 2 Loose coupling: Services are designed us selfcontained components, ssaintain relationship that minimizes dependencies on other services Abstraction: A service i complete defined by service contracts and descroption documents. They hide their logic, which is encapsulated within their implementation, 4 Reusability : Being designed as components, services ean be reused sare effectively, thus reducing the development time and the associated costs. It allows for a more agile design and cost effective system implementation and deployment. 5 Lack of state : By providing a stateless interaction pattern, service increase the chance of being reused and aggregated, especially in a seoenario where a single service is used by multiple consumers belonging todifferent administrative and business domains. 6 Discoverability : Services are defined by description documents that ‘constitute supplemental metadata through which they can be effectively Gincovered. Service diseovery provides an effective moans for utilising third:pany rewureee 7. Composability : By using services as building blocks, sophisticated ‘ead complex operations can be implemented. Servie orchestration at ‘choreography provide a solid support for composing services and achieving the business goals + BRBAID] Wat are the advantages and dlandvantages of OA? ‘Advantages of SOA: 1. Service reusability : In SOA, opplications are mace from existing ‘eorvices Thus, services ean be reused to make many applications 24 E(CSAT-Sem-7) Cloud Enabling Technion 1% Easy maintenance 1 As services are independent of each other they ‘can he updated and modified easily without affecting other services 8, Platform independent SOA allows making a complex application by combining services picked from different sources and are indepensent of the platform. A. Availability : SOA facilitien are easily available to anyooe on request |& Relinbility : SOA applications are more reliable because it is eaay to ‘debug small codes rather than hoge codes. G Scalability : Servicer ean run on different servers within aa environment, this increases scalability. Disadvantages of SOA: |. High overhead : A validation of input parameters of services ts done ‘whenever services interact, which decreases perfermance ast increases Toad and response time, 2 High investment : A huge initial investment is required for SOA Complex service management : Whea services interact they ‘exchange messages o tasks. The mumsber of meagre may go x mains Ithecomes a cumbersome task to handle a large number ef messages, Que25. | Explain the application areas of SOA. Answer | Application areas of SOA are: 1. SOA infrastructure is used by suany armics and airforce to deploy situational awareness ayers SOA is used to improve the healtheare delivery 3. SOAisusedin mobile solutions apps such as games and they use inbeslt funetions to run 4. SOA helps to maintain museums a virtualized storage poo! for eur {information and cuateat Queds, | What are the benefits of using SOA? ‘Answer | Benefits of using SOA: 1, Language neutral integration ; Kegardless of the developing nuyuage used, the evster offers and invoke services through a cor mechanism, Programming language nowtralization is ane o! the key benefits of SOA's integration approach. Cloud Competing 2SE(CSITSem7) 2 Component reuse : Once an erganiation built an application componcet. and offered it asa service, the rest ef the organization ean ‘eile that sernice 2 Organizational agility : SOA defines building Mocks of capabilities provided by acftware and it cffers some services that meet tome ccrpansational requirement which can be recombined and integrated ready 4. Leveraging existing system : This is exe ef the major use of SOA ‘which is to clauny elements or fonctions of existing applications and ‘make them availatle ta the erganizaticns er exterprise. WaeEF | Exptais horizontal layer of SOA architecture. Aeswer | SOA architecture is viewed as fire horizontal layers: 1 Consumer intertace layer : These are GUI based apps for end users 2 Business process layer : These are businest-ase cases in terms of 2 Services layer : These are whele-enterprise, in service inventory. 4 Service component layer : They are used to build the services, each os fectcnsl end uchoseal Ebranes, Operational systems layer: lt contains the data model. ‘GeeBR ] Explain vertical layers of SOA architecture. eewer | Vertical layers of 504 architecture: 1. Integration layer :Stars wth platorm integration (protec support deta tegration, service integration, epplication integration, leading to cecterproe epplustica intepratica eapportng BB and BIC. 2 Quality of service layer : Seconty, evailability, performance ete. ‘cemsttate the quality of wervie parameters which sre ennfigured based x reqared SLAs, OLAS 2 Informational layer : Provide business informatica. 4 Governance Layer: strategy is poverned to each horizontal layer to ackoeve reqaired operating and capability model GeeEwT] Explain the elements of SOA. 2BE(CSITSem-7) oon om |] [omens gaz] [| =| f T 1 conn | fave] [ me | ie ‘a. Application frontends are active elements of the SOA, delivering ‘the value of SOA to the end users. 1b They initiate and control al activity ofthe enterprise system. ‘Service : It is a software component that encapsulates a high level business concept. Contract : It provides a specification of the purpose, functionality, constraints, and weage of eervices. Interface : Functionality ofthe service exposed by the service to the clienta that are connected tothe service. Implementation : The service implementation provides the required bburiness logie and appropriate data. It contains ene or more of the artifacts: programs, configuration, data and databases. Business logic : Business process represented by the service Data : Data represented in the service used by the service. Service repository :It registers the services and their attributes to facilitate the discavery of services, operation, access rights, owner, qualities, etc Service bus: A flexible infrastructure for integrating applications and services by : routing messages, transforming protocols between requestor and service, handling business events and delivering them. providing. 0S, secunty, and managing the interaction among services. ams

You might also like