0% found this document useful (0 votes)
14 views43 pages

1) Explain The Cloud Computing Reference Model With A Neat Diagram

Uploaded by

Meghana .N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views43 pages

1) Explain The Cloud Computing Reference Model With A Neat Diagram

Uploaded by

Meghana .N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

"Cloud computing is a technology that provides on-demand access to shared resources

like servers, storage, applications, network and services over the internet, allowing users
to use these resources without managing physical infrastructure."
MODULE 1
1) Explain the cloud computing reference model with a neat diagram.

A fundamental characteristic of cloud computing is the capability to deliver, on demand,


a variety of IT services that are quite diverse from each other. This variety creates
different perceptions of what cloud computing is among users. Despite this lack of
uniformity, it is possible to classify cloud computing services offerings into three major
categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and
Software-as-a-Service (SaaS).

Cloud Computing Reference Model (7 Marks)


The Cloud Computing Reference Model organizes cloud services into three key layers:

1. Infrastructure-as-a-Service (IaaS)
• Definition: Provides virtual infrastructure (hardware, storage, and networking) on
demand.
• Features:
o Users get virtual machines (VMs) to install and configure software.
o Includes virtual storage (raw disk space or object storage).
o Provides virtual networking for connecting instances to the internet.
• Examples: Amazon EC2, S3, vCloud.
• Use Case: Ideal for developers creating scalable systems or websites.

2. Platform-as-a-Service (PaaS)
• Definition: Offers a runtime environment for application development and
deployment.
• Features:
o Developers focus on application logic using APIs and libraries.
o The provider handles infrastructure, scalability, and fault tolerance.
o Reduces the need for system setup and configuration.
• Examples: Windows Azure, Hadoop, Google App Engine, Aneka.
• Use Case: Useful for programmers building new applications.

3. Software-as-a-Service (SaaS)
• Definition: Provides ready-to-use software applications over the internet.
• Features:
o No need for installation or maintenance by the user.
o Accessible through a browser; shared across multiple users.
• Examples: Google Documents, Facebook, Gmail, Salesforce.
• Use Case: End users benefit from pre-built apps for tasks like email or document
management.

Key Points:
1. Layered Structure: Each layer builds on the one below it.
2. Target Users:
o IaaS: Developers managing infrastructure.
o PaaS: Programmers focusing on coding.
o SaaS: End users accessing complete software.
2) Explain the differences between public, private and hybrid cloud deployment
models.
Differences Between Public, Private, and Hybrid Cloud Deployment Models (7 Marks)

1. Public Cloud
• Definition: IT infrastructure (like data centers, storage, and servers) is owned and
managed by a third-party provider and made available to users over the internet.
• Features:
o Accessible to anyone on a subscription or pay-per-use basis.
o Data and applications are hosted on the provider's premises.
o Quick access to computing resources without upfront investment.
• Examples: Amazon Web Services (AWS), Microsoft Azure, Google Cloud.
• Use Case: Suitable for startups or businesses needing scalability without owning
infrastructure.

2. Private Cloud
• Definition: IT infrastructure is built and managed exclusively for a single
organization, often within its premises.
• Features:
o High security, privacy, and control over data.
o Used by organizations like banks, governments, and enterprises with sensitive
data.
o Requires significant investment and maintenance by the organization.
• Examples: IBM Private Cloud, VMware Private Cloud.
• Use Case: Ideal for organizations with strict regulatory or security needs.

3. Hybrid Cloud
• Definition: A mix of public and private cloud infrastructure, offering flexibility and
scalability.
• Features:
o Sensitive data remains in the private cloud, while other tasks use public cloud
resources.
o Balances security and cost-effectiveness.
o Useful when private cloud resources fall short of demand.
• Examples: A combination of AWS and an in-house private cloud.
• Use Case: Suitable for organizations needing scalability while maintaining security
for critical tasks.
Key Differences

Feature Public Cloud Private Cloud Hybrid Cloud

Ownership Third-party provider Single organization Combination of both

Security Moderate High Balanced

Pay-per-use or
Cost High upfront investment Mix of both
subscription

Limited to in-house
Scalability Easily scalable Scalable using public cloud
resources

Government or Bank Mix of AWS and private


Example AWS, Azure
private clouds solutions

3) Elaborate the various cloud computing characteristics and its benefits.


Characteristics and Benefits of Cloud Computing
Characteristics:
• No up-front commitments
• On-demand access
• Nice pricing
• Simplified application acceleration and scalability
• Efficient resource allocation
• Energy efficiency
• Seamless creation and use of third-party services
1. No Up-front Commitments
o Users pay only for the resources they use, avoiding large initial investments in
IT infrastructure.
2. On-demand Access
o Resources such as storage, computing power, and applications are available
whenever needed, providing flexibility.
3. Nice Pricing
o Cloud services follow a pay-as-you-go model, ensuring cost-effectiveness and
avoiding unnecessary expenses.

4. Simplified Application Acceleration and Scalability


o Applications can be quickly deployed, scaled up, or scaled down based on
demand without much effort.
5. Efficient Resource Allocation
o Resources are allocated dynamically, ensuring optimal utilization and
reducing wastage.
6. Energy Efficiency
o Large data centers optimize energy usage, contributing to sustainability and
reduced environmental impact.
7. Seamless Creation and Use of Third-party Services
o Existing services can be easily integrated, enabling quick development of new
applications and systems.

Benefits of Cloud Computing:


1. Cost Savings
o No big upfront investments; pay only for what you use.
o Reduced maintenance costs as the cloud provider handles it.
2. Scalability
o Easily scale resources up or down based on need.
o Suitable for handling unexpected demand spikes.
3. Accessibility
o Access your data and apps anytime, anywhere, and on any device.
4. Flexibility
o Quickly adjust systems without worrying about infrastructure.
5. Support for Start-ups
o Small businesses can start operations without heavy IT investment.
6. Eco-Friendly
o Efficient use of resources reduces energy consumption.
7. Innovation Opportunities
o Combine existing cloud services to create new solutions.

4) List & Explain the various cloud computing platforms and technologies.

Cloud Computing Platforms and Technologies


Here’s a simplified list for easy memorization and explanation:

1. Amazon Web Services (AWS)


o Services: Elastic Compute Cloud (EC2) for customizable virtual hardware and
Simple Storage Service (S3) for storage-on-demand.
o Use: Provides infrastructure for deploying computing systems.
o Access: Through AWS Console or APIs.

2. Google AppEngine
o Purpose: Scalable runtime for web applications.
o Features: In-memory caching, scalable datastore, job queues, and messaging.
o Benefit: Test applications using the AppEngine SDK before deploying.

3. Microsoft Azure
o Type: Cloud OS and platform for distributed applications.
o Roles:
▪ Web Role: Hosts web applications.
▪ Worker Role: Processes workloads.
▪ Virtual Machine Role: Fully customizable environment.

4. Hadoop (Apache)
o Purpose: Open-source framework for processing large datasets.
o Model: MapReduce (Google-inspired).
▪ Map: Synthesizes input data.
▪ Reduce: Aggregates output.
o Usage: Developers only specify the map and reduce functions.
5. Force.com and Salesforce.com
o Force.com: Platform for creating social enterprise apps.
o Salesforce.com: SaaS for customer relationship management (CRM).
o Special Feature: Prebuilt components and AppExchange integration for app
creation.

6. Manjrasoft Aneka
o Purpose: Rapid development of scalable apps for various clouds.
o Features: Supports tasks, distributed threads, and MapReduce programming
models.
o Use: Seamless deployment on different hardware.

How to Remember?
• Think of AWS as "infrastructure services," AppEngine as "scalable web apps,"
Azure as "role-based distributed apps," Hadoop for "big data processing," Salesforce
for "CRM and social enterprise," and Aneka for "rapid app creation."
5)What are the major distributed computing technologies that led to cloud
computing.
Three Major Distributed Computing Technologies Leading to Cloud Computing
1. Mainframes:
o Powerful, reliable computers for handling large-scale data and transactions.
o Used by big organizations for tasks like online transactions, enterprise
resource planning, and bulk data processing.
o Specialized in managing large data movements and input/output
operations.
2. Clusters:
o Low-cost alternative to mainframes and supercomputers.
o Connects many cheap computers using high-speed networks to work as a
single system.
o Became popular in the 1980s for tasks needing parallel and high-
performance computing.
3. Grids:
o Evolved from clusters in the 1990s.
o Works like a utility (power grid): Users can access computing resources like
electricity or water.
o Combines geographically spread clusters via the Internet, enabling resource
sharing across organizations.
Easy Way to Remember:
• M-C-G:
o Mainframes: Big, reliable, data-heavy.
o Clusters: Many cheap computers connected.
o Grids: Internet-based sharing of cluster power.

6) Describe the main characteristics of a service-oriented computing.


Characteristics of Service-Oriented Computing (SOC)
1. Service as the Building Block
o A service is a self-describing, platform-independent component.
o It performs tasks ranging from simple functions to complex business
processes.
2. Key Properties of Services
o Loosely Coupled: Services can work independently and be reused easily.
o Reusable: Services can be used in multiple applications.
o Location Transparent: Accessible from anywhere via a network.
o Programming Language Independent: Services work across different
platforms.
3. Quality of Service (QoS)
o Evaluates service behavior using attributes like response time, security,
reliability, scalability, and availability.
o QoS agreements are formalized through Service Level Agreements (SLAs)
between clients and providers.
4. Software-as-a-Service (SaaS)
o Delivers applications over the internet on a subscription or rental basis.
o Frees clients from maintenance costs and upgrades.
o Supports multitenancy to achieve economies of scale.
5. Web Services (WS)
o Web services make SOC consumable on the World Wide Web.
o Technologies Used:
▪ WSDL (Web Service Description Language): Defines service
methods and parameters.
▪ SOAP (Simple Object Access Protocol): Facilitates service
interaction over HTTP.
6. Standards and Specifications
o SOC standards are managed by the World Wide Web Consortium (W3C).
o Popular frameworks: ASP.NET and Axis for developing Web Services.
How to Remember?
Think of SOC as a flexible, reusable, and scalable approach delivering services like apps
(SaaS) and web components (WS) with assured performance (QoS).

MODULE 2
1) Explain the characteristics of virtualized environments.
Virtualization in Cloud Computing
Virtualization is the process of creating virtual versions of resources such as hardware,
software, storage, and networks. In a virtualized environment, a single physical resource can
be divided into multiple virtual instances, improving resource usage, isolation, and flexibility.
It allows these virtual resources to function as if they were independent, similar to physical
resources.
There are three main components in a virtualized environment:
1. Guest:
o The guest is the virtual system or environment that works with the
virtualization layer, rather than directly with the physical host.
o It can be a virtual machine (VM), a virtual storage system, or a virtual network
that operates like the physical version but in a virtual form.
2. Host:
o The host is the physical system that provides the resources for virtualization.
o In hardware virtualization, the host is typically a physical server or machine
that runs the virtual instances (VMs).
3. Virtualization Layer (Hypervisor):
o The virtualization layer, also known as the hypervisor or virtual machine
manager, is responsible for managing and creating the virtual environments.
o It sits between the host and the guest, allocating resources and ensuring that
the virtual environments run independently of the physical hardware.

Main Characteristics and Benefits of Virtualization:


• Increased Security:
o Virtualization provides a secure environment by controlling how guests
execute.
o The virtual machine (VM) acts as a protective layer, ensuring that guest
operations are translated properly to the host, adding a layer of security.

• Managed Execution:
o Virtualization allows for more flexible and controlled environments. Some
important features are:
Sharing: You can share the host's resources among multiple virtual systems.
Aggregation: Multiple physical machines can be combined into one virtual
system, making it easier to manage.
Emulation: The virtual system's environment can be controlled and adjusted.
Isolation: Each virtual system works in its own space, so it doesn’t affect
others, making it more stable.
• Portability:
o Virtual systems are portable, meaning you can move them from one machine
to another easily.
o A virtual system (guest) can be packed into a virtual image and moved around
just like moving a file from one computer to another.
Summary:
Virtualization creates efficient, secure, and flexible environments by dividing physical
resources into multiple virtual instances. The process involves a host system, guest systems,
and a virtualization layer that manages these resources. It enables sharing, aggregation,
emulation, isolation, and portability, offering better resource usage and security.

2) Give the taxonomy of virtualization techniques.

Virtualization Techniques
Virtualization is used to create virtual versions of different things, like execution
environments, storage, and networks. By understanding how virtualization works in each
area, we can see how it can be used in different situations.
There are three main areas where virtualization is applied:
1. Execution Environments: These are virtual spaces where programs, operating
systems, and apps can run just like they would on real hardware.
2. Storage: This involves creating virtual storage that looks different from the actual
physical storage. Users interact with the virtual storage instead of the physical one.
3. Networks: Virtual networks make it seem like different networks are working
independently, even though they share the same physical infrastructure.
How is Virtualization Done?
1. Process-Level Virtualization:
o This works on top of an existing operating system and creates a virtual space
for programs to run in.
o Key Techniques:
▪ Emulation: Makes a system mimic another system so that applications
can run on a different system.
▪ High-Level Virtual Machines (VMs): These virtual machines allow
programs to run on a "virtual" computer, like how Java runs on the
Java Virtual Machine (JVM).
▪ Multiprogramming: This allows multiple programs to run on the
same system by switching between them.
2. System-Level Virtualization:
o This works directly on the hardware without needing an existing operating
system, making it more efficient.
o Key Techniques:
▪ Hardware-Assisted Virtualization: Uses the hardware's support to
improve performance, usually with the help of a hypervisor.
▪ Full Virtualization: The guest operating system runs independently as
if it were on real hardware.
▪ Paravirtualization: The guest operating system is modified to work
better with the virtual environment.
▪ Partial Virtualization: Only part of the hardware is virtualized, so
some applications may still need to run directly on the physical host.
Virtualization Models
Different virtualization models explain the environment created by the virtualization
techniques:
1. Application-Level Virtualization:
o Runs individual applications in a virtual environment that is separate from the
host system. This is often done through emulation.
2. Programming Language-Level Virtualization:
o Virtual machines are created for specific programming languages. For
example, Java uses the Java Virtual Machine (JVM) to run Java applications.
3. Operating System-Level Virtualization:
o Allows multiple user environments to run on one operating system. The
operating system shares resources but keeps environments isolated from each
other.
4. Hardware-Level Virtualization:
o In system-level virtualization, this model lets multiple operating systems run
on a single hardware platform using full, paravirtualization, or partial
virtualization techniques.
Summary:
• Virtualization helps create virtual versions of environments, storage, and networks.
• There are two main types: process-level (on top of an existing OS) and system-level
(directly on hardware).
• Virtualization models describe how the virtual environments are created, such as for
applications, programming languages, or entire operating systems.

3) What is virtualization and what are its benefits.


Benefits of Virtualization
Virtualization allows you to run virtual versions of computer systems, instead of using
multiple physical servers. This makes it easier and cheaper for organizations to handle their
storage and processing needs. Here's how virtualization helps:
1. Resource Efficiency:
o Virtualization lets you run multiple virtual machines (VMs) on one physical
server, making better use of available resources like CPU, memory, and
storage. This reduces the need for extra hardware and makes operations more
efficient.
2. Cost Savings:
o By using fewer physical servers, organizations save on hardware costs,
maintenance, space, and energy. Virtualization cuts down the need for
physical equipment while still offering flexibility and growth options.
3. Scalability and Flexibility:
o Virtual environments are highly flexible. You can easily add or remove
resources based on demand, and virtual machines (VMs) can move across
different physical servers, helping you manage resources better.
4. Isolation:
o Virtual machines or containers are isolated from each other. This means that if
one VM has a problem (like a crash or malware), it won't affect the others.
This improves security and system stability.
5. Disaster Recovery:
o Virtualization makes disaster recovery easier. Virtual machines can be backed
up, moved, and replicated to different places easily. In case of a system
failure, it’s faster to switch to another server, minimizing downtime.

6. Simplified Management:
o Virtualized resources can be managed from a single console. This makes
administration easier, and automation tools can help with tasks like deploying,
scaling, and managing VMs. This saves time and reduces mistakes.
7. Improved Testing and Development:
o Virtualization allows developers to create isolated environments for testing
without needing extra physical hardware. They can easily make snapshots,
clones, and test different setups, making it simpler to test new software and
updates.
Summary:
• Virtualization makes it possible to run multiple virtual systems on a single physical
machine, saving resources and costs.
• It offers better flexibility, isolation, and security, and it helps with disaster recovery
and easy management.
• Virtual environments also help developers test and develop software more efficiently.

4) Explain virtualization and cloud computing and pros and cons of virtualization.
Virtualization in Cloud Computing
Virtualization is a technology that allows creating virtual versions of physical resources like
servers, storage devices, and networks. It helps run multiple virtual environments on a single
physical machine, making the hardware invisible to the applications. In cloud computing,
virtualization is used to provide services like Infrastructure-as-a-Service (IaaS) and Platform-
as-a-Service (PaaS), helping businesses use IT resources more efficiently.
For example, you can run a Windows operating system on a virtual machine hosted on a
Linux server. This allows applications to run in isolated, secure, and customizable
environments, even if the applications are not trusted.
Cloud computing uses virtualization to offer on-demand IT services. It dynamically allocates
resources, allowing organizations to scale their computing needs without spending much on
new physical hardware.
Pros of Virtualization:
1. Managed Execution and Isolation: Virtualization creates secure environments,
making it safer to run applications in isolation from each other.
2. Resource Utilization: It allows several virtual machines to share the same physical
resources, making better use of hardware and saving costs.
3. Scalability: Organizations can easily scale their systems by adding more resources
without much cost, making it highly flexible.
4. High Availability: Virtual machines can be moved between servers without any
downtime, ensuring services are always available.
5. Customization: Virtual environments can be adjusted to meet specific needs, making
the system more flexible and adaptable.
Cons of Virtualization:
1. Security Vulnerabilities: While virtualization increases security, it also brings new
risks, requiring careful management to prevent threats.
2. Performance Trade-offs: Sharing hardware between virtual machines can cause a
slight performance drop, as resources are divided.
3. Complexity: Managing virtualized environments can be more complicated and may
require specialized knowledge and tools.
4. Dependency on Hypervisors: Virtual machines rely on hypervisors, which are
critical for performance and security. If the hypervisor fails, it can affect multiple
virtual machines.
In summary, while virtualization offers many benefits like resource management and
scalability, it also comes with challenges such as security issues, performance trade-offs, and
complexity.

5) Explain hypervisors and its types.

Hypervisors and its Types


A hypervisor, also called a virtual machine manager (VMM), is a software that creates and
manages virtual machines (VMs). It allows multiple guest operating systems to run on a
single physical machine by creating a virtualized hardware environment. Hypervisors are key
to virtualization because they manage the resources and ensure that each virtual machine runs
smoothly.
There are two main types of hypervisors: Type I and Type II.
1. Type I Hypervisors:
• Also known as: Native or bare-metal hypervisors.
• How it works: Type I hypervisors run directly on the physical hardware of the
machine. They don't need an operating system to work. Since they interact directly
with the hardware, they offer better performance and efficiency.
• Why it's better: Because there's no host operating system to manage, Type I
hypervisors can manage virtual machines more effectively and with less overhead,
leading to faster and more efficient operations.
• Examples: VMware vSphere (ESX servers) and Xen.
2. Type II Hypervisors:
• Also known as: Hosted hypervisors.
• How it works: Type II hypervisors run on top of an existing operating system. They
rely on the host OS to provide necessary services like virtualization. Essentially, they
are applications running inside the host operating system.
• Why it's slower: Because Type II hypervisors depend on the host OS, there is
additional performance overhead compared to Type I hypervisors.
• Examples: VMware Workstation and Oracle VirtualBox.
Both types of hypervisors allow virtual machines to run as if they were on their own
dedicated hardware. They use techniques like binary translation (changing sensitive
instructions) and direct execution (for non-sensitive instructions) to ensure that the virtual
machines work efficiently.
In short, Type I hypervisors are faster and more efficient as they run directly on hardware,
while Type II hypervisors are more convenient but come with some performance overhead
since they depend on an existing operating system.

6) Discuss machine reference model of execution virtualization.


Machine Reference Model of Execution Virtualization
Virtualizing an execution environment involves creating layers in the computing stack to
simplify operations. These layers define how different components interact, hiding complex
details. Virtualization replaces one layer and handles the calls made to it, ensuring smooth
communication between the layers.
Key Interfaces in the Model:
1. ISA (Instruction Set Architecture):
o Connects hardware and software.
o Important for operating systems (System ISA) and applications that work with
hardware directly (User ISA).
2. ABI (Application Binary Interface):
o Separates the operating system from applications.
o Defines system calls, data types, and program formats, ensuring applications
interact correctly with the OS.
3. API (Application Programming Interface):
o High-level commands used by applications to perform tasks.
o ABI and ISA convert these commands into machine-level instructions that use
resources like memory and CPU registers.
Ring-Based Security:
• A hierarchy of privilege levels (Rings 0 to 3) ensures secure resource access:
o Ring 0: Most privileged, used by the OS kernel.
o Rings 1 & 2: Used by OS-level services.
o Ring 3: Least privileged, used by user applications.
• Modern systems often simplify this to two levels:
o Supervisor Mode (Ring 0): Full access to all instructions, used by the OS or
hypervisor.
o User Mode (Ring 3): Restricted access, used by applications.
Execution Modes:
1. Supervisor Mode:
o Also called kernel mode.
o Allows unrestricted execution of all instructions, enabling the OS to manage
hardware securely.
2. User Mode:
o Restricts access to critical hardware resources.
o If an application tries to use privileged instructions, the system interrupts and
blocks harmful actions.
This layered approach makes systems easier to develop, supports multitasking, and ensures
secure sharing of resources.

MODULE 3
1) Briefly Explain cloud computing architecture with a neat diagram.
Cloud Computing Architecture
Cloud computing architecture organizes its components into layers, making it easy to manage
and deliver services. It starts from the hardware level and goes up to the user interface. Here's
a simple explanation of the architecture:
1. Physical Infrastructure
o This is the foundation of the cloud. It consists of data centers with many
computers (nodes) working together.
o It can include different resources like clusters, PCs, databases, and storage
systems.
2. Core Middleware
o Middleware manages the physical infrastructure and ensures smooth
operation.
o It provides a runtime environment for applications and helps allocate resources
efficiently.
o Virtualization is used here to divide hardware into smaller parts like virtual
machines.
3. Virtualization Technology
o Virtualization splits resources like CPU, memory, storage, and networks.
o It ensures applications are isolated and run securely in their own space.
o Hypervisors manage these virtual machines and provide a virtual view of the
resources.
4. Infrastructure-as-a-Service (IaaS)
o IaaS offers virtualized resources to users, such as virtual machines and
storage.
o Some IaaS solutions provide both hardware and management, while others
provide only management.
5. Cloud Programming Tools and Platforms
o This layer provides tools for users to build applications.
o Examples include web-based tools, command-line interfaces, and
programming frameworks.
o Applications are developed specifically for the cloud using APIs provided by
this layer.
6. User Applications
o This includes services like gaming platforms and social networking websites.
o These applications depend on the cloud for scalability and to handle many
users.
This structure ensures smooth functioning, scalability, and adaptability in cloud computing.

2) Explain IAAS with a neat diagram.

Infrastructure-as-a-Service (IaaS) Explanation


IaaS is a cloud computing service that provides infrastructure like servers, networks, storage,
and more, on demand. Here's a simple breakdown:
1. Customizable Infrastructure
o IaaS allows users to choose what they need, from single servers to complete
setups with databases, networks, and web servers.
o Hardware virtualization is the main technology, which creates virtual
machines to form systems where applications can be installed and run.
2. Role of the Scheduler
o The scheduler is like a manager. It decides where and how virtual machines
(VMs) will run.
o It works with other components to make the system smooth and efficient.
3. Key Components in IaaS
o Pricing and Billing: Tracks the cost of running VMs and helps in charging
users.
o Monitoring: Watches how VMs are running and gathers performance data.
o Reservation: Stores details about past, current, and future VMs.
o QoS/SLA Management: Ensures quality of service (QoS) and tracks Service
Level Agreements (SLAs) with users.
o VM Image Repository: Offers a catalog of ready-to-use VM images and
allows users to upload their custom images.
o VM Pool Manager: Keeps a record of all active VMs.
4. Physical Infrastructure
o The bottom layer consists of the physical hardware, such as servers and
networks.
o This is managed by the management layer, which makes the infrastructure
flexible and ready for use.
IaaS provides flexible, on-demand resources, making it a popular cloud computing service.

3) What is SAAS. Explain its characteristics and its initial benefits.


Software-as-a-Service (SaaS)
SaaS is a way to use software over the Internet without installing it on your device. It allows
users to access applications through a web browser. The software is managed by a third party,
so users don’t have to worry about hardware or software management.
Core Features of SaaS
1. Application Access: Users pay to use an application instead of owning it.
2. Centrally Managed: The application is maintained and updated by the provider.
3. One-to-Many Service: One application can be used by many users at the same time.
4. Integrated Solution: The service is reliable and delivered as promised in the contract.
Early Benefits of SaaS
1. Cost Savings: Reduces software costs and total ownership expenses.
2. Better Service Levels: Improves the quality of services provided.
3. Quick Setup: Applications are ready to use faster.
4. Customizable Applications: Users can configure the software as needed.
5. Basic Integration: Simple ways to connect with other data and apps.
6. Flexible Pricing: Users pay based on subscriptions or only for what they use
(PAYG).
SaaS makes accessing and using software easier and more affordable, especially for
businesses.
4) Explain PAAS with a neat diagram.

Platform-as-a-Service (PaaS)
PaaS is a cloud solution that provides developers with tools and a platform to create, run, and
manage applications without worrying about hardware or infrastructure. It acts as the
middleware where applications are built and deployed.
Application Management
• PaaS provides a runtime environment for applications.
• Developers don’t manage hardware, operating systems, or infrastructure.
• It automates tasks like deploying apps, configuring components, setting up databases,
and scaling based on user needs.
Runtime Framework
• This is the "software stack" where user applications run.
• It executes the app's code based on user and provider policies.
Abstraction
• PaaS focuses on applications rather than infrastructure.
• It hides the complexities of managing virtual machines or physical hardware.
Automation
• PaaS automatically deploys and scales applications when needed.
• It follows agreements (SLAs) between users and providers.
Cloud Services
• PaaS provides tools, APIs, and services for developers to create, monitor, and manage
cloud apps.
• These features make applications scalable, reliable, and easy to develop.
In simple terms, PaaS helps developers build and manage applications efficiently, focusing
only on coding and application design while the platform handles everything else.

5) Describe the fundamental features of the economic and business model behind
cloud computing.
Fundamental Features of the Economic and Business Model Behind Cloud Computing
Cloud computing is designed to save costs, increase flexibility, and scale resources easily. It
moves IT infrastructure and software from a big upfront investment to a pay-as-you-go
service.

1. Reduction in Capital Costs


• No need to buy expensive servers or software upfront.
• Instead, businesses rent resources like servers or storage and subscribe to software as
needed.
2. Depreciation and Lifetime Costs
• Traditional IT hardware and software lose value over time.
• In cloud computing, the provider owns and maintains everything, so businesses don’t
worry about depreciation.

3. Pay-as-You-Go Model
• Companies pay only for what they use.
• No large upfront costs; they can adjust spending based on usage.

4. Operational Cost Control


• IT costs shift from being a big one-time investment to smaller, manageable monthly
costs.
• Easier to predict and control expenses.

5. Elimination of Maintenance and Administrative Costs


• Cloud providers handle all maintenance like cooling, electricity, and updates.
• Businesses save money by not needing an in-house IT team or data center.

6. Scalability and Flexibility


• Businesses can increase or decrease their resource usage as needed.
• This avoids wasting money on extra servers or having a shortage during peak times.

7. Elimination of Indirect Costs


• No large software licensing fees—just pay subscriptions.
• Cloud data centers are energy-efficient, reducing power costs and environmental
impact.

Cloud Pricing Models


1. Tiered Pricing: Pay for predefined service levels (e.g., Amazon EC2).
2. Per-Unit Pricing: Pay based on usage like data transfer (e.g., GoGrid).
3. Subscription-Based Pricing: Pay a regular fee for software (e.g., SaaS tools).

Business Flexibility and Focus


• Outsourcing IT tasks lets businesses focus on their main goals.
• They can innovate and grow without worrying about managing IT systems.

In simple terms, cloud computing saves money, reduces waste, and gives businesses the
flexibility to use only what they need, helping them focus on what they do best.
6) List and Explain some of the challenges in cloud computing.
Challenges in Cloud Computing
Cloud computing has many benefits, but it also faces some challenges. Below are the main
challenges explained in simple terms:

1. Security, Trust, and Privacy


• Protecting sensitive data is a big concern.
• Data is encrypted when stored, but it needs to be decrypted to use, which can create
risks.
• Virtual environments introduce new vulnerabilities.
• Determining who is responsible for data breaches is another challenge.

2. Interoperability and Standards


• Different cloud providers don’t follow the same rules or standards.
• This makes it hard to switch between providers (vendor lock-in).
• Common standards are needed to make systems work together easily.

3. Organizational Aspects
• Cloud changes how businesses use IT.
• Companies need to adjust their processes and train their employees for new roles.
• Moving to a pay-as-you-go model can be hard for some organizations to manage.

4. Scalability and Fault Tolerance


• Cloud systems must handle high and low usage smoothly (scalability).
• They should recover quickly from failures (fault tolerance) to keep services running
without interruptions.

5. Management of Cloud Systems


• Managing cloud resources is more complex than traditional systems.
• Organizations need new strategies to monitor performance, allocate resources, and
control costs.

These challenges must be handled carefully to ensure cloud computing works well for
businesses.

MODULE 4
1) Explain operating system security and virtual machine security.
Operating System Security
Operating system (OS) security focuses on keeping your computer safe from unauthorized
access, data tampering, and harmful software.
OS security is about keeping your computer safe from hackers, viruses, and unauthorized
users.
1. Mandatory OS Security
o Access Control: Decides who can use files and programs.
o Authentication: Confirms if you are the right person to use the system.
o Cryptography: Protects important data by making it unreadable to others.
2. Trusted Applications
Security apps like antivirus should use only the permissions they really need to avoid
unnecessary risks.
3. Discretionary vs. Mandatory Security
o Discretionary Security: Users decide who can access files, but mistakes can
happen.
o Mandatory Security: Strict rules set by the system admin keep everything
safer.
4. Limitations in Commercial OS
Some operating systems (e.g., older Windows versions) don’t have strong security
features, making them easier to attack.
5. Protecting Against Malicious Code
The OS protects against harmful programs like viruses but might still miss some
tricky attacks.
6. Platform Vulnerability
Even if the OS is secure, weak apps can make the entire system vulnerable.
7. Application-Specific Security
Certain apps, like those for online payments, need extra protection (e.g., digital
signatures).
8. Access Control Decomposition
Breaking security tasks into smaller parts ensures everything is clear and secure.

Virtual Machine Security


Virtual machine (VM) security ensures that multiple VMs running on the same hardware
don’t interfere with or harm each other.
Virtual Machine Security
Virtual machine (VM) security is about keeping virtual computers safe when they share
the same hardware.
1. Traditional VM Security Model
o A Virtual Machine Monitor (VMM) manages and separates VMs so they
can’t harm each other.
2. Security Services in VMs
o Trusted Computing Base (TCB): The part that handles security. If it fails,
the whole system is at risk.
o Cloning and Replication: You can copy VMs to safely test suspicious
programs.
3. Challenges in VM Security
o The VMM can only see basic data, so it’s harder to check files inside a VM.
o Smart attackers can detect VMs and avoid traps set for them.
4. Costs and Overheads
o Virtualization needs more resources like memory and CPU power. Managing
it is also harder.
5. VM-Based Intrusion Prevention
o Threats from the VMM:
▪ One VM can hog resources, making others slow.
▪ Hackers can spy on other VMs or attack them.
o Threats from VMs:
▪ Unauthorized users may create insecure VMs.
▪ Altered VM images can bring security risks.
6. Security Group Threats (NIST)
o Common risks include insecure VM setups, weak access rules, and rogue
VMs.
2) Explain the security risks posed by shared images and management os.
Here’s an easy explanation of the security risks posed by shared images and the
management operating system (OS) in cloud computing:

Shared Images Risks


Shared images are pre-built virtual machines (like Amazon Machine Images, AMIs) that
many users can use in cloud services. These can create security issues:
1. Data Leakage
o If the shared image has leftover data from the previous user, sensitive
information like passwords or files can be exposed.
2. Malicious Code
o Hackers might insert harmful software (like viruses) into shared images. When
others use these images, their systems can be infected.
3. Unwanted Connections
o Some shared images may have hidden setups that connect to outside networks,
leaking private data like system logs or IP addresses.

Management Operating System (OS) Risks


The management OS manages virtual machines (VMs) in the cloud. It also has security risks:
1. Vulnerabilities in the Management OS
o The management OS is a key target for attackers because it controls all the
VMs. If hacked, attackers can access sensitive data or even take control of the
system.
2. Dynamic MAC Address Assignment
o VMs are often assigned random MAC addresses (unique identifiers for
network devices). This makes it harder to track malicious VMs and secure the
network.
3. Limited User Control
o Users don’t have much control over where their data is stored in the cloud.
Sometimes, data is left on servers longer than needed, increasing the risk of
unauthorized access.
4. Data Recovery Risks
o The management OS might keep backups or snapshots of VMs. Even if you
delete your data, it may still be recoverable by someone else, which is a
security risk.

Conclusion
Both shared images and the management OS come with serious security challenges in the
cloud. Users and service providers must use strong security measures, like scanning images
for threats and properly managing data, to stay safe.

3) Explain the concept of privacy impact assessment and its importance in cloud
computing.
What is a PIA?
A Privacy Impact Assessment (PIA) is a tool used to find and manage privacy risks when
creating systems or processes that handle personal data. It ensures privacy is considered from
the start, especially in cloud computing, where data is stored and processed on remote servers
by Cloud Service Providers (CSPs).

Why is PIA Important in Cloud Computing?


When using cloud services, privacy risks arise due to:
1. Loss of Control
o Once data is stored with a CSP, the data owner (like a person or company) has
less control over where the data is stored, how long it stays there, or who can
access it.
2. Unauthorized Secondary Use
o CSPs might use your personal data for other purposes, like targeted ads,
without your knowledge. A PIA helps ensure this doesn’t happen.
3. Data Proliferation
o In the cloud, multiple copies of your data may be stored in different places.
This increases the risk of unauthorized access or breaches.
4. Dynamic Provisioning
o Cloud services often use multiple subcontractors and servers to handle your
data. It can be unclear who has access, leading to privacy concerns.

How Does PIA Help?


1. Risk Mitigation
o By identifying privacy risks early, PIA helps prevent issues like data breaches
or misuse of personal information.
2. Compliance with Laws
o Regulations like GDPR in the EU require strong data protection. A PIA helps
ensure cloud services follow these laws.
3. Transparency
o PIA shows how personal data is stored, shared, and protected. This builds trust
between users and cloud providers.
4. Better Decision-Making
o A PIA gives organizations the info they need to choose the best cloud provider
and design secure systems.
5. Improved Security
o By spotting privacy risks, PIAs also uncover security problems, helping
organizations strengthen their systems.

Conclusion
PIA is essential in cloud computing to protect personal data, follow privacy laws, and build
trust with users. It ensures privacy and security are part of the system design from the start.

4) Explain the following associated with cloud computing i) cloud security risks
ii)Security: the top concern for cloud users.
i) Cloud Security Risks
Cloud security risks are problems that can arise when using cloud services. These risks fall
into three main types:
1. Traditional Security Threats
o These are the same dangers faced by any system connected to the internet.
o Example: Hackers might try to steal sensitive data stored in the cloud.
o The problem is bigger in the cloud because many people and businesses use
shared resources.
2. System Availability Risks
o Sometimes cloud services may stop working due to power cuts, system
failures, or other problems.
o Example: If the cloud system goes down, users may lose access to their data or
find it locked temporarily. This can disrupt their work.
3. Third-Party Data Control Risks
o In the cloud, many users share the same resources (multitenancy). This can
lead to:
▪ Data Isolation Issues: One user’s data might get mixed with
another’s.
▪ Security Weaknesses: Hackers could exploit flaws in the system to
gain access.
▪ Hard to Investigate: When something goes wrong, it’s tough to find
out who caused the problem because data can be overwritten quickly.

ii) Security: The Top Concern for Cloud Users


Security is the biggest worry for people and businesses using the cloud. Why? Because they
need to trust cloud service providers (CSPs) to keep their data safe.
Key concerns include:
1. Unauthorized Access and Data Theft
o Users fear hackers or unauthorized people might access their private
information stored in the cloud.
2. Malicious Insiders
o Sometimes employees working at the CSP might misuse their access to view
or steal sensitive data.
3. Account or Service Hijacking
o If someone steals your cloud account credentials (username/password), they
could access your cloud data without permission.
4. Unknown Risk Profile
o Users don’t always know how secure the CSP's systems are or what
vulnerabilities might exist.
o Example: There could be hidden weaknesses in the cloud infrastructure that
users aren’t aware of.

Why It Matters
Cloud security risks and concerns are important because:
• Users want to ensure their data is safe and private.
• If systems fail or get hacked, it can cause big problems for businesses and individuals.
• Understanding these risks helps users take precautions, like choosing reliable cloud
providers and using strong passwords.
MODULE 5
1) Explain the core components of Google app engine.

Here’s a very easy explanation of the core components of Google App Engine for a 10-
mark answer:

1. Infrastructure
• This is the base of Google App Engine.
• It uses many servers in Google’s data centers to handle user requests.
• When someone sends a request (like clicking a link), App Engine finds the best server
to handle it and adds more servers if needed.
• This system makes sure everything runs smoothly without needing extra work from
developers.

2. Runtime Environment
• App Engine supports different programming languages like Java, Python, and Go.
• It gives developers tools to make apps, such as:
o Accessing data easily.
o Managing user accounts.
o Sending messages.
• These tools make web app development faster and easier.
3. Storage
• App Engine uses a special storage system called DataStore.
• It’s great for saving data that doesn’t need a strict structure, unlike regular databases.
• Example: It’s perfect for apps that need fast access to data without many rules.

4. Scalable Services
• App Engine offers services that grow automatically as the app’s usage increases.
• Examples of these services:
o Image Manipulation: Editing images.
o Task Queues: Handling background jobs like sending notifications.
o Cron Jobs: Running tasks at specific times (like reminders).
• These features ensure the app stays fast and reliable, even when more people use it.

Summary
These four components—Infrastructure, Runtime Environment, Storage, and Scalable
Services—make Google App Engine a simple yet powerful platform for building and
hosting apps that can handle many users without slowing down.

2) Discuss in detail the following media applications of cloud computing technologies.


i) Animoto ii) Maya Rendering with Aneka iii)Video encoding on cloud.
Here’s an easy explanation of the media applications of cloud computing technologies
for 10 marks:

i) Animoto
• What is Animoto?
It’s a cloud-based app where you can create videos quickly and easily.
• How does it work?
1. Upload images, music, and video clips.
2. Pick a theme, arrange your content, and choose a soundtrack.
3. Animoto’s AI engine automatically adds animations and transitions.
4. The video is rendered (processed) in the cloud, and you get an email when it’s
ready.
• Why is it useful?
o No need for expert video editing skills.
o Great for personal or professional video creation in less time.

ii) Maya Rendering with Aneka


• What is Maya Rendering?
It’s a process used to create high-quality 3D images for movies, engineering, and
design.
• Example: GoFront Group
o They design high-speed trains and vehicles using 3D models.
o They use a private cloud system (Aneka Cloud) to make rendering faster.
• How does Aneka help?
1. Engineers provide details like frame count and camera positions.
2. Aneka Cloud distributes the rendering work across many machines.
3. What used to take days now takes only a few hours.
• Why is it useful?
o Saves time in creating and improving designs.
o Helps engineers work faster and refine their models.
iii) Video Encoding on Cloud: Encoding.com
• What is video encoding?
It’s converting videos into different formats so they can play on various devices.
• How does the cloud help?
o Encoding.com uses cloud resources to process videos quickly.
o The service is flexible and scalable, meaning it can handle any size or number
of videos.
• Why is it useful?
o Businesses don’t need expensive software or hardware.
o Ensures videos are compatible and high-quality for all platforms.

Summary
• Animoto: Easy video creation using AI.
• Maya with Aneka: Faster 3D rendering for design and movies.
• Video Encoding: Quick video format conversion using cloud power.
3) Explain in detail about the application of cloud computing in i)Healthcare: ECG
analysis in the cloud ii)Geoscience: satellite image processing
i) Healthcare: ECG Analysis in the Cloud
• What is ECG Analysis?
It’s a way to study the heart’s electrical activity through waveforms to detect heart
problems.
• How does the cloud help?
1. Remote Monitoring: Doctors can check patients’ heartbeats from anywhere.
2. Fast Analysis: Cloud processes large ECG data quickly, helping detect issues
like irregular heartbeats.
3. Scalability: Cloud can handle more or fewer patients as needed, so hospitals
don’t need extra hardware.
4. Accessibility: Doctors can access data on any device with the internet, making
it easy to act quickly.
5. Integration: Cloud works with existing hospital systems, sending alerts if
heart problems are detected.
6. Cost-Effective: Hospitals pay only for what they use, saving money compared
to owning servers.

ii) Geoscience: Satellite Image Processing


• What is Satellite Image Processing?
It’s about analyzing images taken by satellites to study the Earth’s surface.
• How does the cloud help?
1. Handles Large Data: Satellites produce huge amounts of data; the cloud can
store and process it efficiently.
2. Powerful Processing: Cloud does complex tasks like cleaning, organizing,
and analyzing the images.
3. Scalability: Cloud resources grow or shrink based on the data size, saving
costs.
4. Integration: The cloud combines different tools for tasks like mapping and
visualizing data.
5. Streamlined Workflow: It ensures all steps, like transforming raw data into
usable maps, happen in order.
6. Collaboration: Researchers worldwide can access and work on the same data
from a central platform.

Summary
• In healthcare, cloud computing makes ECG analysis faster, accessible, scalable,
and affordable.
• In geoscience, it handles big satellite data, processes images efficiently, and supports
global teamwork.
4) Explain Amazon web services(AWS) in detail.

Amazon Web Services (AWS)


Amazon Web Services (AWS) is a cloud computing platform offered by Amazon. It helps
businesses and developers build and manage applications in the cloud. AWS provides a
variety of services that are flexible, scalable, and cost-effective.
Key Components of AWS:
1. Compute Services:
o Amazon EC2 (Elastic Compute Cloud): Lets users run virtual servers on-
demand, so you can get more computing power whenever you need it.
o AWS Elastic Beanstalk: Makes it easy to deploy and manage applications
without worrying about the underlying infrastructure.
o AWS Lambda: A service where you can run code without worrying about
servers. It automatically adjusts to the number of requests.
2. Storage Services:
o Amazon S3 (Simple Storage Service): Lets you store and retrieve large
amounts of data, like files and images, from anywhere on the web.
o Amazon EBS (Elastic Block Store): Provides persistent storage for EC2
instances, so data can be saved even if the server stops.
o Amazon RDS (Relational Database Service): A service that makes it easy to
set up and manage databases like MySQL, PostgreSQL, etc.
3. Networking and Content Delivery:
o Amazon VPC (Virtual Private Cloud): Lets you create a private network in
the AWS cloud, giving you full control over how data is transmitted.
o Amazon CloudFront: Speeds up the delivery of web content by storing
copies of it in different locations around the world.
4. Monitoring and Management:
o Amazon CloudWatch: Monitors your resources like servers and databases,
alerting you if something goes wrong.
o AWS CloudFormation: Helps you set up and manage AWS resources using
code, so you can replicate and manage your setup easily.
5. Additional Services:
o Amazon SQS (Simple Queue Service): A service to send and receive
messages between different parts of an application.
o Amazon SNS (Simple Notification Service): A service to send messages or
notifications (like emails or SMS) to people or systems.
Advantages of AWS:
• Scalability: AWS can grow or shrink based on the needs of your business, so you
don’t need to worry about running out of resources.
• Cost-Effective: You only pay for what you use, which is cheaper than traditional IT
infrastructure.
• Global Reach: AWS has data centers worldwide, so your applications can reach
people from different parts of the world with fast speed.
• Security: AWS ensures your data is safe with strong security protocols, including
encryption and access control.
Use Cases:
• Healthcare: AWS can be used to store and manage patient records and medical data.
• Businesses: Companies use AWS for their applications, websites, and
ERP(Enterprise Resource Planning) systems.
• Collaboration: Services like Google Docs can use AWS to store documents and
allow multiple people to edit them simultaneously.

You might also like