Cloud computing unit 1
Cloud computing unit 1
Data Protection and Privacy: Ensuring that the cloud service provider implements
robust mechanisms to protect data against breaches and unauthorized access, in
compliance with data protection regulations likeGDPR.
Data Sovereignty: Adhering to laws and regulations that dictate how data is stored,
processed, and transferred, ensuring data resides in legal jurisdictions as required by
the client's compliance needs.
Access Control: Establishing and maintaining stringent access controls to ensure that
only authorized personnel can access sensitive information.
Audit and Reporting: Providing regular audit reports to customers, demonstrating
compliance with the agreed-upon standards and allowing customers to conduct their
audits or assessments.
Incident Management: Establishing protocols for incident response, including timely
notification in the event of a security breach or compliance failure.
Service Availability: Guaranteeing specific uptime standards as part of maintaining
service quality, which can also be a compliance requirement in certain regulated
industries.
Data Retention and Deletion: Specifying how long data will be retained and the
mechanisms for data deletion, in compliance with regulatory requirements on data
retention periods.
Business Continuity and Disaster Recovery: Ensuring that there are plans and systems
in place to maintain service continuity and to recover data in the event of a disaster,
which is often a requirement in regulatory frameworks.
The cloud computing reference model is an abstract model that divides a cloud
computing environment into abstraction layers and cross-layer functions to
characterize and standardize its functions. This reference model divides cloud
computing activities and functions into three cross-layer functions and five logical
layers.
Each of these layers describes different things that might be present in a cloud
computing environment, such as computing systems, networking, storage equipment,
virtualization software, security measures, control and management software, and so
forth. It also explains the connections between these organizations. The five layers are
the Physical layer, virtual layer, control layer, service orchestration layer, and service
layer.
Cloud Computing reference model is divided into 3 major service models: 1.Software
as a Service (SaaS)
2.Platform as a Service (PaaS)
3.Infrastructure as a Service (IaaS)
The below diagram explains the cloud computing reference model:
SaaS
Software as a Service (SaaS) is a form of application delivery that relieves users of the
burden of software maintenance while making development and testing easier for
service providers.
The cloud delivery model's top layer is where applications are located. End customers
get access to the services this tier offers via web portals. Because online software
services provide the same functionality as locally installed computer programs,
consumers (users) are rapidly switching from them. Today, ILMS and other
application software can be accessed via the web as a service.
In terms of data access, collaboration, editing, storage, and document sharing, SaaS is
unquestionably a crucial service. Email service in a web browser is the most well-
known and widely used example of SaaS, but SaaS applications are becoming more
cooperative and advanced.
The cloud consumer has full control over all the cloud services.
The provider has full control over software applications-based services.
The cloud provider has partial control over the implementation of cloudservices.
The consumer has limited control over the implementation of these cloud
Service.
Paas:
The cloud provider has entire rights or control over the provision of cloud services
to consumers.
The cloud consumer has selective control based on the resources they need or have
opted for on the application server, database, or middleware.
Consumers get environments in which they can develop their applications or
databases. These environments are usually very visual and very easy to use.
Provides options for scalability and security of the user’s resources.
Services to create workflows and websites.
Services to connect users’ cloud platforms to other external platforms.
IaaS
paid for on a usage basis. The service may include dynamic scaling so that if the
customers need more resources than expected, they can get them immediately.
The consumer has full/partial control over the infrastructure of the cloud, servers,
and databases.
The consumer has control over the Virtual Machines' implementation and
maintenance.
The consumer has a choice of already installed VM machines with pre- installed
Operating systems.
The cloud provider has full control over the data centers and the other
hardware involved in them.
It has the ability to scale resources based on the usage of users.
It can also copy data worldwide so that data can be accessed from anywhere in the
world as soon as possible.
Simplify complex issues; for example, clarify the boundaries between the
responsibilities of the clients and those of the provider of service in case of failures.
Reduce areas of conflict.
Encourage dialogue in the event of disputes.
Eliminate unrealistic expectations.
An SLA records a common understanding in several areas:
services,
priorities,
responsibilities,
guarantees,
warranties.
An agreement usually covers: services to be delivered, performance, tracking, and
reporting, problem management, legal compliance and resolution of disputes, customer
duties and responsibilities, security, handling of confidential information, and
termination. Each area of service in cloud computing should define a “target level of
service” or a “minimum level of service” and specify the levels of availability,
serviceability, performance, operation, or other attributes of the service such as
billing.
Penalties may also be specified in the case of non-compliance with the SL A. It is
expected that any service-oriented architecture (SOA) will eventually include
middleware supporting management.
The common metrics specified by an SLA are service-specific. For Example, the
metrics used by a call center usually are:
abandonment rate: percentage of calls abandoned while waiting to be answered;
average speed to answer: average time before the service desk answer call
(iii)time service factor: percentage of calls answered within a definite time frame;
(iv)first-call resolution: percentage of incoming calls that can be resolved without
callback;and (v)turnaround time: time to complete a certain task.
There are two well-differentiated phases in SLA management: the negotiation of the
contract and the monitoring of its fulfillment real-time.
In turn, automated negotiation has three main components:
the object of negotiation, which defines the attributes and constraints under
negotiationthe negotiation protocols, which describe the interaction between
negotiating parties and the decision models responsible for processing proposals and
generating counter proposals.
The selection process is subject to customizable compliance with user requirements,
such as security, deadlines, and costs. The authors propose an infrastructure called
Compliant Cloud Computing (C3) consisting of:
a language to express user requirements and the compliance level agreements (CLAs).
the middleware for managing CLAs.
Social Engineering and Phishing: Attackers may use social engineering tactics to trick
users or cloud service providers into revealing sensitive information or granting
unauthorized access.
Inadequate Security Monitoring: Without proper monitoring and alerting systems in
place, it’s challenging to detect and respond to security incidents in a timely manner.
6.What are the major challenges faced in cloud?
=> Some of the major challenges faced in cloud computing include:
Security and Privacy Concerns: Security is a top concern for organizations moving their
data and applications to the cloud. Data breaches, unauthorized access, and compliance
issues are significant risks. Ensuring the security and privacy of data stored in the cloud
requires robust encryption, access control mechanisms, and adherence to compliance
standards.
Data Governance and Compliance: Organizations must comply with various regulatory
requirements and industry standards when storing and processing data in the cloud.
Managing data governance, ensuring compliance with regulations like GDPR, HIPAA,
or PCI-DSS, and maintaining data sovereignty can be complex, especially in multi-
cloud or hybrid cloud environments.
Data Loss and Recovery: Data loss can occur due to factors such as hardware failures,
human errors, or malicious activities. Having robust backup and disaster recovery
strategies is crucial to ensure data availability and business continuity in the event of a
failure or outage.
Performance and Reliability: Cloud service providers typically guarantee high
availability and reliability, but occasional outages or performance degradation can still
occur. Organizations need to assess the performance metrics and Service Level
Agreements (SLAs) offered by cloud providers to ensure they meet their business
requirements.
Vendor Lock-in: Moving applications and data to the cloud often involves
dependencies on specific cloud platforms or services. Vendor lock-in can limit
flexibility and increase costs if organizations decide to migrate to a different cloud
provider in the future. Employing multi- cloud or hybrid cloud strategies can mitigate
the risks associated with vendor lock-in.
Cost Management: While cloud computing offers scalability and cost-efficiency
benefits, managing cloud costs can be challenging. Organizations need to monitor
resource usage, optimize infrastructure provisioning, and implement cost control
measures to avoid unexpected expenses and optimize cloud spending.
Integration Complexity: Integrating cloud services with existing on-premises systems
and applications can be complex. Compatibility issues, data migration challenges, and
ensuring seamless connectivity between different cloud environments require careful
planning and implementation.
Skills Gap: Adopting cloud technologies often requires specialized skills in areas such
as cloud architecture, security, and DevOps practices. Organizations may face
challenges in recruiting and retaining qualified personnel with the necessary expertise
to manage cloud infrastructure effectively.
.
Cloud Governance and Management: Maintaining centralized control and visibility
over cloud resources is essential for ensuring security, compliance, and cost
optimization. Establishing effective cloud governance policies, implementing
automation tools, and adopting cloud management platforms can help organizations
manage their cloud environments more efficiently.
Storage Services: Azure provides scalable and durable cloud storage options for
various data types, including blobs, files, queues, tables, and disks.
Networking Services: Azure enables users to create virtual networks, connect on-
premises data centers to the cloud, manage traffic, and implement security features like
firewalls and DDoS protection.
Database Services: Azure offers a range of database services including SQL Database,
Cosmos DB, MySQL, PostgreSQL, and more, catering to various data storage and
management needs.
AI and Machine Learning: Azure provides services for artificial intelligence (AI) and
machine learning (ML), including Azure Machine Learning, Cognitive Services, and
Azure Databricks.
Internet of Things (IoT): Azure IoT Suite enables organizations to connect, monitor,
and manage IoT devices and analyze data generated by these devices.
Developer Tools: Azure offers a range of developer tools and services such as
Azure DevOps, Visual Studio Team Services, and Azure SDKs for various
programming languages.
Microsoft OneDrive: A cloud storage service for storing and sharing files and
documents, accessible from any device with an internet connection.
These are just a few examples of Microsoft's online services, which are designed
to enhance productivity, collaboration, and business operations for individuals and
organizations alike.
8. With a block diagram, explain AWS management console offered by
Amazon
As an AI text model, I can't create visual diagrams directly. However, I can guide
you on how you might create a block diagram to represent the AWS Management
Console. Here's a textual representation of what such a block diagram might look
like:
Dashboard:
- Offers an overview of key metrics, service health status, and recent activities
across the AWS account.
Services:
Divided into categories such as Compute, Storage, Database, Networking, Security,
Analytics, Machine Learning, and more.
Each category represents a group of related AWS services.
Compute Services:
- Includes services such as Amazon EC2 (Elastic Compute Cloud) for virtual
servers, Amazon ECS (Elastic Container Service) for containerized applications, and
AWS Lambda for serverless computing.
Storage Services:
- Encompasses services like Amazon S3 (Simple Storage Service) for object storage,
Amazon EBS (Elastic Block Store) for block storage, and Amazon Glacier for long-
term archival.
Database Services:
- Includes Amazon RDS (Relational Database Service) for managed relational
databases, Amazon DynamoDB for NoSQL databases, and Amazon Redshift for
data warehousing.
Networking Services:
- Covers services such as Amazon VPC (Virtual Private Cloud) for networking
isolation, Amazon Route 53 for DNS management, and AWS Direct Connect for
dedicated network connections.
- Includes Amazon CloudWatch for monitoring and logging, AWS Config for
resource inventory and configuration management, and AWS CloudTrail for audit
trail logging.
9.How does windows Azure support cloud services? Justify with suitable
diagram.
Azure Regions:
Azure data centers are organized into regions, which are geographic locations
around the world.
Each region consists of multiple data centers that are interconnected through high-
speed networks.
Azure Services:
Azure offers a wide range of cloud services across various categories, including
computing, storage, networking, databases, AI, and more.
These services are designed to meet different business needs and support diverse
workloads.
Although I can't provide a graphical diagram directly, you can represent these
components visually using blocks and arrows to illustrate their relationships and
interactions. This textual representation outlines how Microsoft Azure supports
cloud services through its
infrastructure, services, management tools, security features, and integration
capabilities.
Flexibility and Accessibility: Cloud computing provides users with the flexibility to
access resources and applications from anywhere with an internet connection. This
accessibility enables remote work, collaboration among distributed teams, and
seamless integration across different devices and platforms.
Some popular IaaS providers include Amazon Web Services (AWS), Microsoft
Azure, Google Cloud Platform (GCP), and IBM Cloud. These providers offer a
wide range of services, including virtual machines, storage solutions, networking
capabilities, and more, allowing businesses to build, deploy, and manage their
applications and workloads in the cloud.
1.Cloud Service Providers (CSPs): Companies that deliver cloud services, such as
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a
Service (SaaS). Examples include Amazon Web Services (AWS), Microsoft Azure,
and Google Cloud Platform (GCP).
Saas:
Software as a Service (SaaS) is a cloud computing model where software
applications are hosted and provided to users over the internet on a subscription
basis. Instead of purchasing and installing software on individual devices, users
access the application via a web browser or a thin client. SaaS eliminates the need
for organizations to manage and maintain complex software infrastructure, as all
aspects of software deployment, maintenance, updates, and security are managed by
the SaaS provider.
Key characteristics of SaaS include:
Accessibility: Users can access SaaS applications from any internet-connected
device, enabling remote work, collaboration, and flexibility.
Subscription-based pricing: SaaS applications are typically licensed on a
subscription basis, allowing organizations to pay only for the features and resources
they use, often on a monthly or annual basis.
Scalability: SaaS applications can scale dynamically to accommodate changes in
user demand and business needs, enabling organizations to easily add or reduce user
licenses or upgrade/downgrade service tiers.
Automatic updates and maintenance: SaaS providers handle software updates,
patches, security enhancements, and infrastructure maintenance, ensuring that users
always have access to the latest features and security protections without needing to
perform manual updates.
SaaS is widely used across various industries and for a range of applications,
including customer relationship management (CRM), enterprise resource planning
(ERP), human resource management (HRM), collaboration and productivity tools,
and more. Its benefits include cost savings, simplified IT management, rapid
deployment,and continuous innovation, making it a popular choice for businesses of
all sizes seeking to streamline operations and drive digital transformation.
Paas:
Platform as a Service (PaaS) is a cloud computing model that provides a platform
allowing customers to develop, run, and manage applications without the
complexity of building and maintaining the underlying infrastructure. PaaS
offerings typically include development tools, middleware, database management
systems, and other resources needed for application development and deployment.
Key characteristics of PaaS include:
1.Instance Selection: Users choose the type of virtual server (instance) based on
their requirements, such as computing power, memory, and storage capacity.
2.Provisioning: Once selected, users can provision (launch) instances on- demand,
specifying parameters like operating system, network settings, and security
configurations.
3.Usage-Based Billing: Users are billed based on the duration of their instance
usage, typically charged by the hour or second. There are no upfront costs or long-
term commitments, and users only pay for the resources consumed.
4.Elasticity and Scaling: EC2 offers elasticity, allowing users to easily scale their
compute capacity up or down based on demand. Instances can be added or removed
dynamically to accommodate fluctuations in workload.
5.Integration with AWS Services: EC2 seamlessly integrates with other AWS
services, enabling users to build comprehensive cloud solutions. For example, users
can attach storage volumes from Amazon S3 or use load balancers for distributing
traffic across instances.
6. Management and Monitoring: Users can monitor and manage their EC2 instances
through the AWS Management Console, CLI (Command Line Interface), or APIs.
They can track performance metrics, set up alerts, and automate tasks using AWS
services like CloudWatch.
1. Downtime and Reliability: Cloud services are susceptible to outages, which can
result in downtime for users. While cloud providers strive for high availability,
occasional disruptions can still occur, impacting businesses reliant on continuous
access to their applications and data.
2.Security Concerns: Storing data in the cloud raises security concerns, such as
unauthorized access, data breaches, and potential exposure to cyber threats. Despite
robust security measures implemented by cloud providers, data privacy and
compliance issues may arise, especially for sensitive information.
3.Limited Control and Customization: Users have limited control over the
underlying infrastructure and configuration of cloud services, which may restrict
customization options. Organizations with unique requirements or regulatory
constraints may face challenges adapting to standardized cloud environments.
5.Data Transfer Costs: Moving large volumes of data to and from the cloud can
incur significant data transfer costs, especially for organizations with high
bandwidth requirements or frequent data transfers. These costs may become
substantial over time, impacting the overall cost-effectiveness of cloud adoption.
6.Vendor Lock-In: Switching between cloud providers or migrating away from the
cloud can be complex and costly, leading to vendor lock-in. Organizations may find
themselves dependent on a single provider's ecosystem, limiting their flexibility and
ability to negotiate favorable terms.Google provides certain services in cloud
environment.
Discuss in terms of SaaS and PaaS.
Google provides various services in the cloud environment, catering to different
levels of abstraction and requirements. Two of the primary service models offered
by Google Cloud Platform (GCP) are Software as a Service (SaaS) and Platform as
a Service (PaaS)
1.Software as a Service (SaaS):
SaaS refers to cloud-based applications that are fully managed and delivered over
the internet. Users typically access SaaS applications via a web browser without
needing to install or maintain any software. Google offers several SaaS
applications, including:
Google Workspace (formerly G Suite): Google Workspace provides a suite of
productivity and collaboration tools, including Gmail, Google Drive, Google Docs,
Sheets, Slides, and more. Users can access these applications online without the
need for any installation, and Google manages all aspects of the software, including
updates, security, and infrastructure.
Google Workspace Marketplace: Google also hosts third-party SaaS applications in
its marketplace, allowing users to access a wide range of additional software
solutions that integrate seamlessly with Google Workspace.
Google Meet: Google Meet is a video conferencing platform that enables users to
host and join video meetings from anywhere. It's a SaaS offering where users can
access the service via web browsers or dedicated applications without the need for
complex setup or infrastructure management.
Google App Engine:Google App Engine is a fully managed platform for building
and deploying web applications and APIs. Developers can focus on writing code
without worrying about the underlying infrastructure, as Google manages
scalability, load balancing, and security. App Engine supports multiple
programming languages, including Java, Python, Go, and Node.js.
Google Cloud offers a wide range of services covering both SaaS and PaaS models.
SaaS applications like Google Workspace are fully managed productivity tools
accessed over the internet, while PaaS offerings like App Engine and Cloud
Functions provide developers with platforms for building and deploying
applications without worrying about underlying infrastructure management.
The cloud deployment model identifies the specific type of cloud environment
based on ownership, scale, and access, as well as the cloud’s nature and purpose.
The location of the servers you’re utilizing and who controls them are defined bya
cloud deployment model. It specifies how your cloud infrastructure will look, what
you can change, and whether you will be given services or will have to create
everything yourself. Relationships between the infrastructure and your users are
also defined by cloud deployment types.
Different types of cloud computing deployment models are described below.
1.Public Cloud
2.Private Cloud
3.Hybrid Cloud
4.Community Cloud
5.Multi-Cloud
Public Cloud:The public cloud makes it possible for anybody to access systems
and services. The public cloud may be less secure as it is open to everyone. The
public cloud is one in which cloud infrastructure services are provided over the
internet to the general people or major industry groups. The infrastructure in this
cloud model is owned by the entity that delivers the cloud services, not by the
consumer. It is a type of cloud hosting that allows customers and users to easily
access systems and services. This form of cloud computing is an excellent
example of cloud hosting, in which service providers supply services to a variety of
customers. In this arrangement, storage backup and retrieval services are given for
free, as a subscription, or on a per-user basis.
Private Cloud:
The private cloud deployment model is the exact opposite of the public cloud
deployment model. It’s a one-on-one environment for a single user (customer).
There is no need to share your hardware with anyone else. The distinction
between private and public clouds is in how you handle all of the hardware. It is
also called the “internal cloud” & it refers to the ability to access systems and
services within a given border or organization. The cloud platform is implemented
in a cloud-based secure environment that is protected by powerful firewalls and
under the supervision of an organization’s IT department. The private cloud gives
greater flexibility of control over cloud resources.
Hybrid Cloud
By bridging the public and private worlds with a layer of proprietary software,
hybrid cloud computing gives the best of both worlds. With a hybrid solution, you
may host the app in a safe environment while taking advantage of the public cloud’s
cost savings. Organizations can move data and applications between differentclouds
using a combination of two or more cloud deployment methods, depending on their
needs.
Community Cloud
It allows systems and services to be accessible by a group of organizations. It is a
distributed system that is created by integrating the services of different clouds to
address the specific needs of a community, industry, or business. The infrastructure
of the community could be shared between the organization which has shared
concerns or tasks. It is generally managed by a third party or by the combination
one or more organizations in the community
16.Explain the services provided by the AWS from a user perspective with
suitable examples.
Compute Services:Amazon Elastic Compute Cloud (EC2): EC2 offers scalable virtual
servers in the cloud. Users can launch instances with various configurations to run
applications, host websites, or perform other computing tasks. For example, a user can
launch an EC2 instance to host a website, run a machine learning model, or process large
datasets.
Storage Services:Amazon Simple Storage Service (S3): S3 provides scalable object
storage for storing and retrieving data. Users can store a wide range of data types,
including documents, images, videos, and backups. For instance, a user can store website
assets such as images and videos on S3 for serving to visitors.
1.Regions: AWS has multiple geographical regions across the globe. Each region is a
separate geographic area, which consists of multiple availability zones. Examples of
regions include us-east-1 (North Virginia), eu-west-1 (Ireland), ap- southeast-2
(Sydney), etc.
2.Availability Zones (AZs): Each region consists of multiple availability zones. An
availability zone is a distinct data center within a region. These zones are isolated from
each other in terms of infrastructure and are designed to be independent of failures in
other zones. This redundancy ensures high availability and fault tolerance.
3.Edge Locations: AWS has numerous edge locations worldwide, which are used by
Amazon CloudFront, AWS's content delivery network (CDN) service. These edge
locations serve cached copies of content to users, reducing latency and improving
performance.
4.Networking Layer:Virtual Private Cloud (VPC): VPC is a virtual network dedicated
to your AWS account. It allows you to create isolated sections of the AWS Cloud
where you can launch resources in a logically isolated environment. This helps in
better security and control over your network configuration.
5.Subnets: Within a VPC, you can create subnets. Subnets are segments of IP address
ranges in your VPC. You can launch AWS resources like EC2 instances or RDS
databases within these subnets.
6.Route Tables: Route tables control the routing for network traffic leaving the
subnets. You can define routes to direct traffic to specific destinations.
7. Internet Gateway: An internet gateway enables communication between your VPC
and the internet. It allows instances within the VPC to connect to the internet, and vice
versa.
8. NAT Gateway/NAT Instance: NAT (Network Address Translation) gateways or
instances allow instances within a private subnet to initiate outbound traffic to the
internet while preventing inbound traffic from initiating a connection with them.
9.Elastic Load Balancer (ELB): ELB distributes incoming application traffic across
multiple targets, such as EC2 instances, in multiple availability zones. It helps in
achieving high availability and fault tolerance for your applications.
10.Compute Layer:EC2 (Elastic Compute Cloud): EC2 provides resizable compute
capacity in the cloud. You can launch virtual servers (instances) based on your
requirements, and scale them up or down as needed.
11.Auto Scaling: Auto Scaling automatically adjusts the number of EC2 instances in
response to demand or a predefined schedule. It helps maintain application availability
and ensures that you have the right amount of compute capacity at any given time.
12.Elastic Beanstalk: Elastic Beanstalk is a platform as a service (PaaS) offering from
AWS that allows you to deploy and manage applications without worrying about the
underlying infrastructure. It automatically handles capacity provisioning, load
balancing, scaling, and application health monitoring.
13.Storage Layer:S3 (Simple Storage Service): S3 provides scalable object storage in
the cloud. It allows you to store and retrieve any amount of data from anywhere on the
web.
14.EBS (Elastic Block Store): EBS provides block-level storage volumes that you can
attach to EC2 instances. It is suitable for use as primary storage for databases, file
systems, or any applications that require high-performance block storage.
15.Glacier: Glacier is a low-cost storage service designed for long-term archiving and
backup of data that is infrequently accessed.
16.Storage Gateway: Storage Gateway is a hybrid storage service that enables on-
premises applications to seamlessly use AWS cloud storage. It connects on- premises
software appliance with cloud-based storage to provide seamless integration between
your on-premises IT environment and AWS storage infrastructure.
17.Database Layer:
RDS (Relational Database Service): RDS makes it easy to set up, operate, and scale
relational databases in the cloud. It supports multiple database engines such as
MySQL, PostgreSQL, SQL Server, Oracle, and MariaDB.
18.DynamoDB: DynamoDB is a fully managed NoSQL database service that provides
fast and predictable performance with seamless scalability. It is suitable for
applications that require low-latency, high-throughput database operations.
19.Redshift: Redshift is a fully managed data warehouse service that allows you to
run complex queries on large datasets. It is optimized for online analytical processing
(OLAP) workloads and provides high-performance querying capabilities.
20. Security Layer:Identity and Access Management (IAM): IAM enables you to
securely control access to AWS services and resources. You can create and manage
users, groups, and permissions to grant or deny access as needed.
21.Security Groups: Security groups act as virtual firewalls for your EC2 instances,
controlling inbound and outbound traffic at the instance level. You can specify rules to
allow or deny traffic based on protocols, ports, and IP addresses.
22.Network Access Control Lists (NACLs): NACLs act as stateless firewalls for
controlling traffic at the subnet level. They allow you to define rules to allow or deny
traffic based on IP addresses and port numbers
Management & Monitoring Layer:
23.CloudWatch: CloudWatch provides monitoring for AWS resources and
applications in real-time. It collects and tracks metrics, sets alarms, and automatically
reacts to changes in your AWS resources.
24.CloudTrail: CloudTrail provides a record of actions taken by a user, role, or AWS
service in your account. It enables governance, compliance, operational auditing, and
risk auditing of your AWS account.
25.AWS Config: AWS Config enables you to assess, audit, and evaluate the
configurations of your AWS resources. It continuously monitors and records AWS
resource configurations and allows you to automate the evaluation of recorded
configurations against desired configurations reporting. For example, a user can use
Redshift to analyze sales data to identify trends and patterns.
These are just a few of the many services offered by AWS. The platform continues
to evolve, with new services and features regularly added to meet the needs of
businesses of all sizes and industries.
19. With a neat diagram, explain the services offered by Amazon web services.
Storage & Content Services: These services offer various storage solutions.
Amazon S3: Object storage. Amazon EBS: Block storage. Amazon Glacier: Cold
storage.
Management & Monitoring Services: Services for managing and monitoring AWS
resources.
AI/ML & Analytics Services: Services for artificial intelligence, machine learning,
and analytics.
Route 53 - low-latency DNS service used to manage user's DNS public records.
Characteristics of IaaS:
Resources are available as a service.
Services are highly scalable.
Dynamic and flexible.
GUI and API-based access.
Automated administrative tasks.
Example: DigitalOcean, Linode, Amazon Web Services (AWS), Microsoft Azure,
Google Compute Engine (GCE), Rackspace, and Cisco Metacloud.
Characteristics of PaaS
Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App
Engine, Apache Stratos, Magento Commerce Cloud, and OpenShift.
3.Software as a Service (SaaS)::
SaaS is also known as "on-demand software". It is a software in which the
applications are hosted by a cloud service provider. Users can access these
applications with the help of internet connection and web browser.
Characteristics of SaaS:
There are the following characteristics of SaaS -
Managed from a central location
Hosted on a remote server
Accessible over the internet
Users are not responsible for hardware and software updates. Updates are applied
automatically.
The services are purchased on the pay-as-per-use basis
System Virtual Machine: These types of virtual machines gives us complete system
platform and gives the execution of the complete virtual operating system. Just like
virtual box, system virtual machine is providing an environment for an OS to be installed
completely. We can see in below image that our hardware of Real Machine is being
distributed between two simulated operating systems by Virtual machine monitor. And
then some programs, processes are going on in that distributed hardware of simulated
machines separately.
Process Virtual Machine: While process virtual machines, unlike system virtual
machine, does not provide us with the facility to install the virtual operating system
completely. Rather it creates virtual environment of that OS while using some app or
program and this environment will be destroyed as soon as we exit from that app. Like
in below image, there are some apps running on main OS as well some virtual
machines are created to run other apps. This shows that as those programs required
different OS, process virtual machine provided them with that for the time being those
programs are running. Example – Wine software in Linux helps to run Windows
applications.
22.Define SLA and list the objectives of SLA.
SLA stands for Service Level Agreement. It's a contract between a service provider
and a customer that outlines the level of service expected from the provider.
23.What are the challenges for cloud computing in developing efficient cloud
application? or What are the cloud computingchallenges? Explain
Data security is a major concern when working with Cloud environments. It is one
of the major challenges in cloud computing as users have to take accountability for
their data, and not all Cloud providers can assure 100% data privacy. Lack of
visibility and control tools, no identity access management, data misuse, and Cloud
misconfiguration are the common causes behind Cloud privacy leaks. There are also
concerns with insecure APIs, malicious insiders, and oversights or neglect in Cloud
Data Solution: Configure network hardware and install the latest software updates to
prevent security vulnerabilities. Using firewalls, antivirus, and increasing bandwidth
for Cloud data availability are some ways to preventdata security risks.
2.Multi-Cloud Environments
Common cloud computing issues and challenges with multi-cloud environments are -
configuration errors, lack of security patches, data governance, and no granularity. It is
difficult to track the security requirements of multi-clouds and apply data
management policies acrossvarious boards.
3.Performance Challenges
The performance of Cloud computing solutions depends on the vendors who offer
these services to clients, and if a Cloud vendor goes down, the business gets affected
too. It is one of the major challenges associated with cloud computing.
Organizations are finding it tough to find and hire the right Cloud talent, which is
another common challenge in cloud computing. There is a shortage of professionals with
the required qualifications in the industry. Workloads are increasing, and the number of
tools launched in the market is increasing. Enterprises need good expertise in order to
usethese tools and find out which ones are ideal for them.
7.Reliability and Availability
High unavailability of Cloud services and a lack of reliability are two major concerns
in these ecosystems. Organizations are forced to seek additional computing
resources in order to keep up with changing business requirements. If a Cloud vendor
gets hacked or affected, the data of organizations using their services gets
compromised. It is another one of the many cloud security risks and challenges
faced by the industry.
8.Password Security
Account managers use the same passwords to manage all their Cloud accounts.
Password management is a critical problem, and it is often found that users resort to
using reused and weak passwords.
9.Cost Management
Even though Cloud Service Providers (CSPs) offer a pay-as-you-go subscription for
services, the costs can add up. Hidden costs appear in the form of underutilized
resources in enterprises.
10.Lack of expertise
Cloud computing is a highly competitive field, and there are many professionals who
lack the required skills and knowledge to work in the industry. There is also a huge
gap in supply and demand for certified individuals and many job vacancies.
24.What are the four major design goals of cloud computing?
The four major design goals of cloud computing are typicallyconsidered to be:
Reliability: Cloud services must be highly reliable, minimizing the risk of service
disruptions or data loss. This involves employing redundant infrastructure, fault-
tolerant systems, and backup mechanisms to ensure continuous availability and data
integrity.
25.List out the six layers of cloud services and their providers.
1,Cloud Client: This layer refers to the devices you use to access cloud services,
such as laptops, smartphones, and tablets. You likely already have the devices you
need to use cloud services.
2.Cloud Application: This layer includes the software applications delivered over
the internet. These can be web applications you access through a browser or mobile
apps you download to your device. Some examples of cloud applications include: *
Gmail * Dropbox * Salesforce * Microsoft Office 365 * Zoom
4.Cloud Services: This layer includes the various services offered on the cloud,
such as storage, databases, security, and analytics. Some examples of cloud
services include: * Amazon Simple Storage Service (S3) * Microsoft Azure Blob
storage * Google Cloud Storage * Amazon DynamoDB * Microsoft Azure Cosmos
DB * Google Cloud Firestore
5.Providers: Major cloud service providers include Amazon Web Services (AWS),
Microsoft Azure, and Google Cloud Platform (GCP).
6.Cloud Platform: This layer includes the platform that allows developers to build
and deploy cloud applications. Some examples of cloud platforms include: *
Amazon Web Services Elastic Beanstalk * Microsoft Azure App Service * Google
App Engine
7.Providers: The same major cloud service providers - AWS, Azure, and GCP -
also offer cloud platform services.
8.Cloud Infrastructure: This layer includes the physical infrastructure that supports
the cloud, such as servers, storage, and networking equipment. Cloud providers
manage this infrastructure and make it available to users on-demand.
9.Providers: Again, major cloud service providers like AWS, Azure, and GCP have
massive data centers around the world that house this infrastructure.
10.Network: This layer includes the network that connects all of the different
layers of the cloud, including the cloud client, cloud application, cloud services,
cloud platform, and cloud infrastructure. Cloud providers manage this network to
ensure that data can flow securely and reliably between all of the different parts of
the cloud.
11.Providers: Cloud service providers build and manage their own global networks
to move data around
26.Explain the role of networks in cloud computing?
Networks play a crucial role in cloud computing, acting as the backbone that connects
various components and enables communication between them. Here are some key
roles of networks in cloud computing:
Connectivity: Networks provide the essential connectivity that allows users to access
cloud services and resources from anywhere with an internet connection. Whether it's
accessing applications, databases, storage, or virtual machines, networks ensure that
users can connect totheir resources in the cloud reliably.
Resource Sharing: In a cloud environment, multiple users and applications often share
the same physical infrastructure. Networks facilitate resource sharing by providing
mechanisms for efficientlydistributing resources among different users and applications
while maintaining isolation and security.
Security: Networks play a vital role in ensuring the security of cloud environments.
Network security measures such as firewalls, intrusion detection/prevention systems,
encryption, and virtual private networks (VPNs) help protect cloud resources from
unauthorized access, data breaches, and other security threats.
Reliability and Availability: Cloud providers strive to offer high levels of reliability
and availability for their services. Networks are designed with redundancy and failover
mechanisms to ensure that services remain accessible even in the event of hardware
failures or network outages. Additionally, load balancing and traffic management
techniques help distribute traffic across multiple servers to improve reliability and
availability.
Data Transfer: Networks facilitate the transfer of data between on- premises systems
and cloud environments, as well as between different cloud services and regions.
Efficient data transfer mechanisms such as content delivery networks (CDNs), caching,
and compression help optimize data transfer performance and reduce latency.
27.Differentiate between various type of applications running on cloud.?
Ans: Applications running on the cloud can be broadly categorized into three main
types: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as
a Service (IaaS).
1) Software as a Service(SaaS):
SaaS applications are fully hosted and managed by a third-party provider.
Users access SaaS applications via a web browser or API without needing to
install or maintain any software locally.
SaaS applications are typically designed to serve a broad user base with
standardized functionality and configuration options.
2) Platform as a Service(PaaS):
PaaS provides a platform and environment for developers to build, deploy,
and manage their own applications without having to worry about underlying
Infrastructure.
Developers can focus on writing and deploying code, while the PaaS provider
manages the underlying infrastructure, scalability, and security.
Examples of PaaS include Google App Engine, Microsoft Azure App Service,
and Heroku.
PaaS is well-suited for developers who want to rapidly develop and deploy
applications without the overhead of managing servers and infrastructure.
3) Infrastructure as a Service(IaaS):
IaaS provides virtualized computing resources over the internet, including
servers, storage, networking, and virtual machines.
Users have full control over the operating systems, applications, and
development frameworks running on the infrastructure.
IaaS is suitable for organizations that require greater control and flexibility over their
infrastructure, such as those with specific security or compliance requirements or those
running resource-intensive workloads.