CC MP Set1 Answers - Unlocked
CC MP Set1 Answers - Unlocked
Note: 01. Answer any FIVE full questions, choosing at least ONE question from each MODULE.
Module -1 CO Ma
Download s rks
Q.01 a Explain the cloud computing reference model with a neat diagram.
1, 7
2
The cloud computing reference model is a framework that categorizes the various
services and technologies associated with cloud computing. It highlights the capability
of cloud computing to deliver a diverse range of IT services on demand, which can lead
to different perceptions of what cloud computing entails among users. Despite these
varying interpretations, the model classifies cloud computing services into three
primary categories:
The reference model also emphasizes the importance of dynamic provisioning, which
allows for the rapid allocation and release of resources based on user demand. This
utility-oriented approach means that users typically pay for what they use, similar to
how utilities like water or electricity are billed.
b Explain the differences between public, private and hybrid cloud deployment models.
1, 7
2
Public, private, and hybrid cloud deployment models each serve different needs and use
cases in the realm of cloud computing. Here’s a detailed breakdown of each model:
1. Public Clouds :
- Definition : Public clouds are owned and operated by third-party service providers
who deliver their computing resources over the internet. These resources include
virtualized data centers, storage, and applications.
- Accessibility : They are available to anyone who wants to purchase or subscribe to
the services, making them highly scalable and cost-effective.
- Use Cases : Ideal for small to medium-sized businesses or startups that need to
quickly access IT resources without the overhead of managing physical infrastructure.
Users can leverage compute, storage, and application services without significant
upfront investment.
2. Private Clouds :
- Definition : Private clouds are dedicated environments that are exclusively used by
a single organization. They can be hosted on-premises within the organization’s own
data center or managed by a third-party provider.
- Security and Control : This model offers enhanced security and privacy, making it
suitable for organizations with strict regulatory requirements, such as government
JOIN WHATSAPP CHANNEL
OR GROUP
21CS72
agencies and financial institutions.
- Use Cases : Organizations that need to keep sensitive data in-house or require high
levels of customization and control over their IT resources often opt for private clouds.
3. Hybrid Clouds :
- Definition : Hybrid clouds combine elements of both public and private clouds,
allowing data and applications to be shared between them. This model enables
organizations to leverage the benefits of both environments.
- Flexibility : Organizations can use private clouds for sensitive operations while
utilizing public clouds for less critical tasks or to handle peak loads when private
resources are insufficient.
- Use Cases : This model is becoming increasingly popular as it allows businesses to
scale their resources dynamically and optimize costs while maintaining control over
sensitive data.
c Elaborate the various cloud computing characteristics and its benefits.
1,2 6
Cloud computing offers a range of characteristics that provide significant benefits to both
cloud service consumers (CSCs) and cloud service providers (CSPs). Here are some of
the key characteristics and their associated benefits:
1. No Up-Front Commitments : Users can access cloud services without the need for
long-term contracts or significant initial investments. This flexibility allows organizations
to scale their usage based on current needs.
2. On-Demand Access : Cloud services are available whenever needed, enabling users to
quickly access resources without delays. This immediacy is crucial for businesses that
require rapid responses to changing demands.
3. Nice Pricing : The pricing models for cloud services are often competitive and can be
tailored to the user's consumption patterns. Many services operate on a pay-per-use basis,
meaning organizations only pay for what they use, which can lead to substantial cost
savings.
7. Seamless Creation and Use of Third-Party Services : Cloud platforms often facilitate
the integration of third-party services, allowing organizations to enhance their
applications with additional functionalities without extensive development work.
- Reduced Maintenance and Operational Costs : Organizations benefit from lower costs
related to infrastructure maintenance, as these responsibilities shift to the cloud service
JOIN WHATSAPP CHANNEL
OR GROUP
21CS72
provider. This allows businesses to focus on their core activities rather than IT
management.
- Increased Agility : Organizations can quickly adapt their IT resources to meet changing
business needs without the constraints of capital expenditures for hardware and software.
- Accessibility : Users can access their data and applications from any device connected
to the Internet, providing flexibility and convenience.
- Utility Model : Cloud computing transforms IT services into a utility model, similar to
how we consume water or electricity. This means organizations can access IT resources
as needed and pay only for what they use.
OR
Q.02 a List & Explain the various cloud computing platforms and technologies.
1, 7
2
Cloud computing platforms and technologies are diverse and cater to various needs in
the IT landscape. Here’s a detailed overview of the key platforms and technologies
associated with cloud computing:
1. Infrastructure-as-a-Service (IaaS) :
- Definition : IaaS provides virtualized computing resources over the internet. It
allows users to rent IT infrastructure such as servers, storage, and networking on a pay-
per-use basis.
- Examples : Amazon Web Services (AWS), Microsoft Azure, and Google Cloud
Platform (GCP) are prominent IaaS providers. They enable businesses to scale their
infrastructure dynamically based on demand, which is particularly useful for
applications with fluctuating workloads.
2. Platform-as-a-Service (PaaS) :
- Definition : PaaS offers a platform allowing customers to develop, run, and manage
applications without the complexity of building and maintaining the underlying
infrastructure.
- Examples : Google App Engine, Microsoft Azure App Service, and Heroku are
examples of PaaS. They provide development tools, middleware, and database
management systems, enabling developers to focus on writing code rather than
managing servers.
3. Software-as-a-Service (SaaS) :
- Definition : SaaS delivers software applications over the internet, on a subscription
basis. Users can access these applications via a web browser, eliminating the need for
installation and maintenance.
- Examples : Popular SaaS applications include Salesforce, Google Workspace, and
Microsoft 365. These services are hosted in the cloud and can be accessed from
anywhere, making them highly convenient for users.
4. Virtualization :
- Definition : Virtualization is a core technology that allows multiple virtual instances
JOIN WHATSAPP CHANNEL
OR GROUP
21CS72
of operating systems to run on a single physical machine. It abstracts the hardware
layer, enabling efficient resource utilization.
- Importance : It plays a crucial role in cloud computing by allowing providers to
maximize hardware usage and offer scalable services. Technologies like VMware and
Hyper-V are widely used for virtualization.
5. Distributed Systems :
- Definition : A distributed system is a network of independent computers that
appears to its users as a single coherent system. This architecture is fundamental to
cloud computing.
- Characteristics : It enables resource sharing, fault tolerance, and scalability, which
are essential for cloud services. The cloud infrastructure is essentially a large distributed
computing facility.
7. Service Orientation :
- Definition : This approach involves designing software applications as a collection
of services that communicate over a network. It is a key principle in cloud computing.
- Benefits : It promotes reusability, scalability, and flexibility in application
development, allowing businesses to adapt quickly to changing needs.
8. Utility Computing :
- Definition : Utility computing is a model where computing resources are provided
as a metered service, similar to traditional utilities like electricity or water.
- Significance : This model underpins the pricing strategies of cloud services,
allowing users to pay only for what they consume, which can lead to cost savings.
The major distributed computing technologies that led to the development of cloud
computing include:
3. Web 2.0 : This refers to the evolution of the web into a platform for user-generated
content and interactive applications. Web 2.0 technologies facilitate the delivery and
JOIN WHATSAPP CHANNEL
OR GROUP
21CS72
management of cloud services through rich interfaces and web services.
These technologies have evolved over time, with significant milestones such as
mainframe computing, cluster computing, and grid computing paving the way for the
cloud computing paradigm we see today.
c Describe the main characteristics of a service-oriented computing 1, 6
2
Service-oriented computing (SOC) is a fundamental paradigm that underpins cloud
computing systems, characterized by several key features:
1. Service Abstraction : At its core, SOC treats services as the primary building blocks
for application and system development. A service is an abstraction that represents a self-
describing, platform-agnostic component capable of performing a wide range of
functions, from simple tasks to complex business processes.
3. Rapid Development : The service-oriented approach allows for the rapid development
of applications. By leveraging existing services, developers can create new applications
more quickly and efficiently, focusing on integrating various services rather than building
everything from scratch.
4. Quality of Service (QoS) : SOC introduces the concept of QoS, which encompasses a
set of functional and non-functional attributes used to evaluate service performance.
These attributes can include response time, security, reliability, scalability, and
availability. QoS requirements are typically defined in a Service Level Agreement (SLA)
between the service provider and the client.
5. Web Services : One of the most prominent expressions of SOC is through Web
Services (WS). These are software components that expose functionalities accessible via
method invocation over the Internet, typically using protocols like HTTP. Web services
utilize standards such as the Web Service Description Language (WSDL) for defining
service characteristics and the Simple Object Access Protocol (SOAP) for
communication.
6. Utility Computing : SOC aligns with the concept of utility computing, where
computing resources are provided as a service, similar to utilities like water or electricity.
This model allows users to access services based on their needs without worrying about
the underlying infrastructure.
Module-2
Download
Q. 03 a Explain the characteristics of virtualized environments. 2, 7
3
Virtualized environments are defined by several key characteristics that enhance their
functionality and efficiency. Here are the main components:
4. Portability : Virtual machine instances are typically represented by files that can be
easily moved across different physical systems. This portability allows for flexibility in
managing computing resources and environments.
6. Isolation : Each virtual environment is isolated from others, which means that
applications running in one virtual machine do not interfere with those in another. This
isolation is crucial for maintaining stability and security in multi-tenant environments,
such as cloud computing.
Within execution virtualization, there are various techniques that provide different types
of virtual computation environments, such as:
- Bare Hardware : Direct access to hardware resources.
- Operating System Resources : Virtualization at the OS level.
- Low-Level Programming Language : Virtualization that abstracts programming
language execution.
- Application Libraries : Virtualization that involves libraries linked to application
images.
virtualization encompasses a wide range of techniques that enhance the efficiency and
manageability of computing environments, particularly in cloud computing contexts.
c What is virtualization and what are its benefits. 2, 6
3
Virtualization is a technology that creates an abstract environment, allowing multiple
operating systems or applications to run on a single physical machine. It essentially
emulates hardware or software environments, enabling efficient resource utilization and
management. This technology is particularly significant in cloud computing, where it
supports Infrastructure-as-a-Service (IaaS) solutions.
4. Portability : Virtual machines are typically represented by files that can be easily
moved between different physical systems. This portability allows for greater flexibility
in managing and deploying applications.
Pros of Virtualization:
1. Managed Execution and Isolation : Virtualization allows for the creation of secure
and controllable computing environments, which is vital for running applications
safely.
2. Resource Utilization : It enables efficient use of physical resources by allowing
multiple virtual machines to share the same hardware, leading to cost savings.
3. Scalability : Virtualization supports the creation of elastically scalable systems,
allowing organizations to provision additional capabilities with minimal costs.
4. High Availability : Techniques like live migration allow virtual machines to be
moved between physical hosts without downtime, ensuring continuous service
availability.
5. Customization : Organizations can tailor their virtual environments to meet specific
needs, enhancing flexibility in service delivery.
Cons of Virtualization:
1. Security Vulnerabilities : While virtualization can enhance security through
isolation, it also introduces new security threats that need careful management.
2. Performance Trade-offs : Virtualization can lead to performance overhead, as
resources are shared among multiple virtual machines, which may affect application
performance.
3. Complexity : Managing a virtualized environment can be more complex than
traditional setups, requiring specialized skills and tools.
2. Type II Hypervisors : These are hosted hypervisors that run on top of an existing
operating system. They rely on the host OS to provide virtualization services and
interact with it through the Application Binary Interface (ABI). This means that Type II
hypervisors are essentially applications running within the host OS, which can
introduce some performance overhead compared to Type I hypervisors. Examples of
Type II hypervisors include VMware Workstation and Oracle VirtualBox.
Both types of hypervisors enable full virtualization, allowing guest operating systems to
run as if they were on dedicated hardware. They utilize techniques like binary
translation for sensitive instructions and direct execution for non-sensitive ones,
ensuring efficient operation of virtual machines.
c Discuss machine reference model of execution virtualization. 2, 6
3
The machine reference model of execution virtualization is a crucial framework that
defines how different levels of the computing stack interact while abstracting
implementation details. This model is essential for virtualizing execution environments,
as it establishes clear interfaces between various layers, simplifying their
At the core of this model is the Instruction Set Architecture (ISA), which serves as the
interface between hardware and software. The ISA defines the instruction set for the
processor, including registers, memory management, and interrupt handling. This
foundational layer is critical for the operating system (OS) to function effectively.
Moreover, the model also highlights the importance of security and privilege levels. In
a hypervisor-managed environment, guest operating systems typically run in user mode
(Ring 3), preventing them from directly accessing sensitive CPU status. This separation
is vital for maintaining security and isolation between different virtual machines.
Module-3
Download
Q. 05 a Briefly Explain cloud computing architecture with a neat diagram. 2, 7
3
Cloud computing architecture refers to the structured framework that enables the delivery
of cloud services. It encompasses various layers and components that work together to
provide scalable and efficient computing resources over the internet. Here’s a brief
overview of the key elements of cloud computing architecture:
2. Types of Clouds :
- Public Clouds : Open to the general public and hosted by third-party providers,
offering services over the internet.
- Private Clouds : Exclusive to a single organization, providing enhanced security and
control over data.
- Hybrid Clouds : A combination of public and private clouds, allowing data and
applications to be shared between them.
- Community Clouds : Shared infrastructure among several organizations with
common concerns, such as security and compliance.
3. Key Characteristics :
- On-Demand Self-Service : Users can provision resources as needed without human
intervention.
- Broad Network Access : Services are accessible over the network from various
devices.
- Resource Pooling : Providers pool resources to serve multiple customers, dynamically
assigning and reallocating resources as needed.
- Rapid Elasticity : Resources can be scaled up or down quickly to meet demand.
- Measured Service : Resource usage is monitored, controlled, and reported, providing
transparency for both the provider and the consumer.
2. Management Layer : This includes tools for managing the virtual machines,
scheduling their execution, and handling pricing and billing for the resources
consumed.
Benefits of IaaS:
- Cost Efficiency : Reduces capital expenditure on hardware and maintenance.
- Scalability : Easily scale resources up or down based on demand.
- Flexibility : Users can customize their infrastructure according to their specific needs.
- Focus on Core Business : Allows businesses to concentrate on their core activities
without worrying about the underlying infrastructure.
Characteristics of SaaS:
1. Application Access : Users access applications via the Internet, typically through a
web browser, which means they do not need to install software on their local machines.
2. Centralized Management : The applications are centrally managed by the service
provider, ensuring that updates, maintenance, and security are handled without user
intervention.
3. One-to-Many Service Delivery : SaaS operates on a multi-tenant architecture, where
a single instance of the application serves multiple users or organizations, optimizing
resource use and cost.
4. Subscription-Based Pricing : Users typically pay a recurring fee to access the
software, which can be structured as a subscription or pay-as-you-go model, making it
financially accessible.
5. Customization and Integration : SaaS applications can often be customized to meet
specific user needs and can integrate with other services and applications, enhancing
their functionality.
SaaS has evolved from its initial offerings to become a robust and flexible model that
continues to gain acceptance in the cloud computing landscape, providing significant
advantages to businesses of all sizes.
OR
Q. 06 a Explain PAAS with a neat diagram. 2, 7
3
Platform-as-a-Service (PaaS) is a cloud computing service model that provides a
platform allowing developers to build, deploy, and manage applications without the
complexity of maintaining the underlying infrastructure. Here are some key aspects of
PaaS:
3. Development Tools and APIs : PaaS offerings provide developers with various
services and APIs that simplify the creation and delivery of applications. These tools
often include components for application monitoring, management, and reporting,
which are essential for maintaining application performance and reliability.
5. Vendor Lock-in : One of the significant concerns with PaaS is the potential for
vendor lock-in. Unlike IaaS, which offers more flexibility in terms of the software
stack, PaaS environments often bind applications to specific runtimes and APIs
provided by the vendor, making it challenging to migrate applications to other
platforms.
6. Cost Efficiency : PaaS can reduce costs associated with application development,
deployment, and management. By offloading the responsibility of technology upgrades
to the PaaS provider, organizations can focus on their core business activities.
7. Categories of PaaS : PaaS solutions can be categorized into three main types:
- PaaS-I : Offers a fully integrated development environment hosted in the cloud.
- PaaS-II : Focuses on providing scalable infrastructure primarily for web
applications.
- PaaS-III : Provides a cloud programming platform for various types of applications,
JOIN WHATSAPP CHANNEL
OR GROUP
21CS72
not limited to web apps.
Popular PaaS providers include Microsoft Azure, Google App Engine, and Heroku,
each offering unique features and capabilities tailored to different development needs.
Overall, PaaS is designed to streamline the application development process, making it
easier for developers to create and deploy applications in a cloud environment.
The economic and business model behind cloud computing is primarily driven by
several key features that enhance efficiency and reduce costs for organizations. Here are
the fundamental aspects:
6. Tiered and Per-Unit Pricing Models : Cloud providers often offer tiered pricing,
where services are available at different levels of performance and cost, as well as per-
unit pricing based on specific usage metrics (like data transfer or memory allocation).
This flexibility allows businesses to tailor their cloud usage to their specific needs and
budget.
7. Environmental and Indirect Cost Savings : Utilizing cloud services can also lead to a
reduction in indirect costs, such as carbon footprint emissions. For instance, by
consolidating data centers and optimizing resource usage, companies can lower their
environmental impact and potentially reduce taxes related to emissions in certain
regions.
the economic model of cloud computing not only provides financial benefits but also
promotes operational efficiency, scalability, and flexibility, making it an attractive
JOIN WHATSAPP CHANNEL
OR GROUP
21CS72
option for businesses of all sizes.
1. Security, Trust, and Privacy : One of the most significant obstacles to widespread
cloud adoption is the concern over security, trust, and privacy. Traditional
cryptographic technologies are employed to protect sensitive data from tampering and
unauthorized access. However, the use of virtualization technologies introduces new
vulnerabilities that were not previously considered. For instance, while data may be
encrypted and stored securely in the cloud, it must be decrypted by applications that
process it. This creates potential risks, especially if those applications are hosted in a
managed virtual environment. Determining liability for data breaches and ensuring that
systems are secure and trustworthy from technical, social, and legal perspectives are
ongoing challenges.
4. Scalability and Fault Tolerance : Designing cloud systems that are both highly
scalable and fault-tolerant is a significant technical challenge. As demand for services
fluctuates, cloud infrastructures must be able to scale up or down efficiently while
maintaining performance. Additionally, ensuring that these systems can recover quickly
from failures is crucial for maintaining service availability and reliability.
while cloud computing offers numerous benefits, these challenges must be carefully
navigated to ensure successful implementation and operation.
Module-4
Download
Q. 07 a Explain operating system security and virtual machine security.
3, 10
4
Operating system security and virtual machine security are two critical aspects of
JOIN WHATSAPP CHANNEL
OR GROUP
21CS72
ensuring the integrity and confidentiality of data in computing environments, especially
in cloud computing.
FIGURE 9.2 (a) Virtual security services provided by the VMM. (b) A dedicated
security VM
the security of a virtualized environment is contingent upon the integrity of the VMM
and the management operating system (often referred to as Dom0 in Xen
environments). If either of these components is compromised, the security of all VMs
can be jeopardized. Moreover, while VMMs are generally smaller and less complex
than traditional operating systems, they still introduce their own set of vulnerabilities.
For instance, the management OS is responsible for creating VMs and transferring data,
which can also be a point of attack.
b Explain the security risks posed by shared images and management os. 3, 10
4
The security risks posed by shared images and the management operating system (OS)
in cloud computing environments are significant and multifaceted.
1. Data Leakage: Sensitive data may be exposed if the shared image contains remnants
of previous users' data or configurations.
2. Malicious Code: Attackers can exploit shared images to distribute malware, which
can then affect all users utilizing that image.
3. Unsolicited Connections: Instances running on shared images may establish
outgoing connections that leak privileged information, such as IP addresses or system
logs, to unauthorized entities.
shared images and the management OS present critical security challenges in cloud
environments, necessitating robust security measures and user awareness to mitigate
these risks effectively.
OR
Q. 08 a Explain the concept of privacy impact assessment and its importance in cloud
3, 10
computing.
4
Privacy Impact Assessment (PIA) is a crucial process designed to evaluate the potential
effects that a project or system may have on the privacy of individuals. In the context of
cloud computing, where sensitive data is often stored and processed, conducting a PIA
is particularly important.
In cloud computing, where data is often shared across multiple tenants and geographical
locations, the risks to privacy are heightened. For instance, the lack of transparency in
cloud service providers (CSPs) makes it challenging for users to verify if their data has
been deleted or adequately protected. Additionally, the potential for data loss or
leakage, account hijacking, and unauthorized access underscores the need for robust
privacy measures.
PIAs are essential in fostering trust between cloud service providers and users,
ensuring that privacy rights are respected and that organizations are held accountable
for the data they manage. By identifying privacy risks early in the development
process, organizations can implement necessary safeguards, thereby enhancing the
overall security and integrity of cloud computing environments.
Sure! Let's dive into both aspects of cloud computing you've mentioned:
1. Traditional Security Threats : These are the familiar threats that any internet-
connected system faces, but their impact is magnified in the cloud due to the vast
resources and large user base. For instance, unauthorized access and data theft are
significant concerns, especially since users often have to trust cloud service providers
(CSPs) with sensitive information.
3. Third-Party Data Control Threats : With multitenancy, where multiple users share the
same cloud resources, there are risks associated with data isolation. Vulnerabilities in the
virtualization management layer (VMM) can open new attack channels, making it
difficult to trace the actions of an attacker. Additionally, the rapid write operations in
cloud storage can erase forensic evidence, complicating investigations into security
incidents.
- Unauthorized Access and Data Theft : Users worry about their confidential
information being accessed without permission. Data is particularly vulnerable when
stored, as it remains exposed for longer periods compared to when it is actively
processed.
- Malicious Insiders : The risk posed by rogue employees within a CSP is significant, as
these individuals may have access to sensitive data without adequate oversight.
- Account or Service Hijacking : Users must be vigilant against credential theft, which
can lead to unauthorized access to their cloud services.
- Unknown Risk Profile : Users often face risks stemming from their lack of knowledge
about the security measures in place at the CSP, including potential vulnerabilities in the
cloud infrastructure itself.
Module-5
Download
Q. 09 a Explain the core components of Google app engine. 3, 4 10
JOIN WHATSAPP CHANNEL
OR GROUP
21CS72
Google App Engine is a powerful platform as a service (PaaS) that allows developers
to build and host scalable web applications. It is structured around four core
components:
3. Storage : App Engine offers a service called DataStore, which is optimized for
storing semi-structured data. Unlike traditional relational databases, DataStore allows
for more flexibility in data structure and access patterns, making it suitable for web
applications that require quick data retrieval without strict constraints.
Animoto is a popular cloud-based application that allows users to create videos easily
and quickly. The platform provides a user-friendly interface where individuals can
upload images, music, and video clips. Users can select a specific theme for their
video, arrange the media in the desired order, and choose a soundtrack. Once the
storyboard is set, the rendering process occurs in the background, and users are notified
via email when their video is ready.
The core innovation of Animoto lies in its proprietary artificial intelligence (AI)
engine, which automatically selects animation and transition effects based on the
uploaded media. This means users can create visually stunning videos without needing
extensive video editing skills or intervention. The service is particularly appealing for
those looking to produce high-quality videos for personal or professional use without
the steep learning curve typically associated with video editing software.
The system allows GoFront engineers to input various parameters for the rendering
process, such as the number of frames and cameras. These tasks are submitted to the
Aneka Cloud, which efficiently distributes the workload across available machines. By
utilizing cloud resources, the time required for rendering has been significantly
reduced from days to just hours. This efficiency is crucial for iterative design
processes, enabling engineers to visualize and refine their designs rapidly.
Cloud technologies allow for flexible and scalable video processing, enabling users to
convert videos from one format to another without the prohibitive costs associated with
traditional software and hardware solutions. This service is particularly beneficial for
businesses and individuals who need to deliver video content across multiple
platforms, ensuring compatibility and quality without the need for extensive in-house
resources.
OR
Q. 10 a Explain in detail about the application of cloud computing in 3, 4 10
i)Healthcare: ECG analysis in the cloud ii)Geoscience: satellite image processing
- ECG Data Analysis : The ECG represents the electrical activity of the heart,
producing a waveform that reflects the heartbeat. By analyzing the shape of this
waveform, healthcare professionals can identify arrhythmias and detect heart diseases.
Cloud technologies facilitate the processing of large volumes of ECG data efficiently.
- Integration with Existing Systems : Cloud technologies can be easily integrated with
existing hospital systems, enhancing the overall workflow. For instance, a cloud-based
web service can store ECG data and process it using scalable cloud resources, ensuring
that healthcare professionals receive timely alerts if anomalies are detected.
In the field of geoscience, cloud computing is revolutionizing the way satellite images
are processed and analyzed. Here are some details about this application:
- I/O and Compute-Intensive Tasks : The processing of satellite images involves both
input/output operations and computationally intensive tasks. Cloud computing can
handle these demands by providing scalable resources that can be adjusted based on
the workload.
- Efficient Workflow Management : The use of cloud computing allows for the
creation of workflows that can process satellite images in a streamlined manner. For
instance, a workflow engine can manage the sequence of operations required to
transform raw satellite images into usable data products.
1. Compute Services :
- Amazon Elastic Compute Cloud (EC2) : This is the cornerstone of AWS's compute
services, allowing users to deploy virtual servers (instances) based on specific images.
EC2 provides the flexibility to scale computing resources up or down as needed.
- AWS Elastic Beanstalk : A PaaS offering that simplifies the deployment and
management of applications by automatically handling the infrastructure provisioning,
load balancing, and scaling.
- AWS Lambda : A serverless computing service that lets you run code without
provisioning or managing servers, automatically scaling based on the number of
requests.
2. Storage Services :
- Amazon Simple Storage Service (S3) : A highly scalable object storage service that
allows users to store and retrieve any amount of data from anywhere on the web. It
organizes data in "buckets" and "objects," making it easy to manage and access.
- Amazon Elastic Block Store (EBS) : Provides block-level storage volumes for use
with EC2 instances, offering persistent storage that can be attached to instances.
- Amazon RDS (Relational Database Service) : A managed database service that
supports various database engines, making it easier to set up, operate, and scale
relational databases in the cloud.
5. Additional Services :
- Amazon Simple Queue Service (SQS) : A fully managed message queuing service
that enables decoupling of microservices, distributed systems, and serverless
applications.
- Amazon Simple Notification Service (SNS) : A messaging service for sending
notifications to subscribers or other applications, supporting various protocols like
SMS, email, and HTTP.
Advantages of AWS:
- Scalability : AWS services can scale up or down based on demand, allowing
businesses to handle varying workloads efficiently.
- Cost-Effectiveness : With a pay-as-you-go pricing model, users only pay for the
resources they consume, reducing upfront costs associated with traditional
infrastructure.
- Global Reach : AWS has data centers in multiple regions around the world, enabling
low-latency access and compliance with local regulations.
- Security : AWS provides a robust security framework, including data encryption,
identity and access management, and compliance certifications.
Use Cases:
AWS is utilized across various sectors, including healthcare for managing patient data,
enterprise resource planning (ERP) systems for businesses, and collaborative tools like
Google Docs for document sharing and editing.
L1: Remember L2: Understand L3: Apply L4: Analyze L5: Evaluate L6: Create
2
Illustrate various virtualization concepts.
3
Identify the architecture, infrastructure and delivery models of cloud computing.
4
Understand the Security aspects of CLOUD.
5
Define platforms for development of cloud applications
Page 02 of 02