Quantum Publications® ——CONTENS Se
(Pobtatand heren, and renter the publasher nox the authors Layered Cloud Archiecture Dengn - NIST Cloud Ci ese
sal be eewporable for amy ertara cman, or damages FRedemnoe Architecare-Publc, Private end Hybrid Cloud Lass
amcy oul of ww of — PaaS ~ SaaS ~ Architectural Design Challenges ~ Cloud Storage
Sieageovs server Advanage of Coad Storage Clad
Storage Providers.
Co Conspetiog CONT Gem LUNIT.4 : RESOURCE MANAGEMENT 1 E10 4-25
Bee Inter Cloud Resource Management ~ Resource Provisioning and
F Eénen 2019.20 (Thoroughly Revised Edition) Resource Provisioning Methods ~ Global Exchange of Cloud
Kanon 202021 Resources ~ Secunty Overview ~ Cloud Security Challenges
alien. mechs Sofrware-ava Service Secunty - Security Governance ~ Virtaal
= Machine Secunty IAM ~Securiy StandardL-2E(CSMTSem-D ___Iatroduction
PART-1
1-28 to 1-17E
2 Cloud computing is paradigan or delivering IT where rapid provisioning,
isan important characteris for computing resources, data applications
and IT.
{ii Maintaining the desired and right level of security, compliances,
regulations, and policies across the different functions of enterprise,
2 Task centric : Cloud computing focus on what one need and how
application can do it. Here documents are given more prionty than the
applications which create them,
1-1E(CSIT-Sem-7)Coad Computing 1-3E(CSITSem-7)
A Self healing: In eifbaling. backups are availabe fr every document
‘nthe cloud Hence, ifene document crashes there will be its duplicate
ready to run.
4 Multienancy and intelligence : Mult-tenancy refers to sharing of
data and conte ecroes lange pool of wera. Aa varicas data are stored in
loud, data ining end analy are necessary for accessing information
‘0 an atelligens manner.
{Programmable Many processes in dout computing shall be automate
‘such as backing up crashed data withite duplicate. Hence, programming
‘associated with loud computing
© Flexible: Fleible as the users may be of different varictics and hence
st has to match with their oeeds
RESTS] wnat are the advantages and disadvantages of cloud
2 Burstepte edge: Cloud computing belpe us to acces the latest
applications any time without spending our time and money oF
installations
igh speed Claud computing allows sto deploy our service uichyin
6 oily (inden vious oiler ‘atthe remote
locations can easly access ll the cloud services Allthey need is internet
connectiity
@ Unlimited storage capacity : Cloud computing offers limitless storage
capacity
Disadvantages of cloud computing +
L
2 Technical issues : Cloud technology is always prone to an outage and
other technical issues,
IME(CSIT Sem?) _tntraduction
8 Security threat in the cloud : Before adopting ¢ load wchooligy. ee
should be well aware ofthe fact that we will be sharing all our compasiy ®
sensitive information toa third-party cloud computing service proviier
Hackers might access this information.
Internet connectivity : Good internet connectivity is must in cloud
computing We cannot access cloud without an internet connection,
Lack of support : Cloud computing companies fail to provide proper
‘support tothe customers. Moreover, they want their user to depend on
FAQsor online help, which ean bea tedious ob for non-technical persons,
[BaeT Eepai vision ofcoud compoting
al
1 Cloud ‘computing peeride the ets a to peorines in virtual hardware,
inorder to fulfillits promises to customers.
QaeTAL ] List the major categories of parallel computing systems.
iL Intretion feel parallel 1 form of parallel computing in
‘which we can calculate the amount of operation carried out by an
operating system at same time. For example1-SE(CSITSem-7)
Que TBD | Discuss the issues related to cloud computing.
al
Several iasues related to cloud computing are :
Performance waves
Data issues
Energy related issues
(ret
‘Sceurity issues : Some ofthe security problems which ar faced by the
cloud computing areas follows:
1. Data integrity When a data is ona cloud, anyone from any location
can access those data from the eloud. Cloud does fot eilferentite
between vmmon data thus enabling anyone to
accea those nenstive dat. This theres lack of data integrity cloud
computing
2 Data theft: Most ofthe cloud vendors instead of acquiring server try
to lease a server from other tervice providers beesuse they are oat
smal threats it may eome neross. A eloud
good security provided by the we
between different hosts or between hosts and user. This issues pertaining
LOE (CSIT-Sem-7) Introduction
to secure communication, authentication, istues concerning single sign
delegation.
nus data issues in cloud computing are as follows
comes to location of the data nothing is
do not know sehere his own data are
reveal where all the data are stored. The
same country of the customer, it might be
data and programs from
ically stored in a sharedClos Computing 1-7E (CSITSem-7)
Various performance issues in eloud computing are:
1. Poor application performance or application hang-ups: Usually
{he application is starved for RAMor
CPU cycles, and faster processors
ii, Horizontal acaling: Horizontal scaling (out) requires the addition
of more machines devices tothe computing platform to handle the
increased demand. Sustained inereasesin demand, however, require
horizontal scaling and load balancing torestore and maintain peak
performance
Energy related issues : Various energy related issues are as follows
1. Cloud computing is rapidly growing in importance as increasing numbers
‘of enterprises and individuals are shifting their workload to cloud service
providers.
2 The electricity costs involved in operating alarge cloud infrastructure of
multiple data centres can be enormous. In fact, cloud service providers
‘often must pay for the peak power they draw, as well as the energy they
3. Lowering these high operating costs is one of the challenges facing
‘loud service providers.
4, Insufficient or malfunctioning cooling system can lead tooverheatingof
the resources reducing system reliability and devices lifetime,
5. High power consumption bythe infrastructure leads to substantial carbon
dioxide (CO,) emission contributing to the greenhouse effect.
ent tls
Fault tolerance is one of the key issues of loud computing, Fault
tolerance is concerned with all the techniques necessary
system to tolerate software faults,
i
?
‘
!
:
i
i
Fault tolerance techniques are employed during the procurement, oF
development, of the software. When a fault jechniques
provide mechanisms to the software system top failure
from occurring.
1-8E(CSTTSem- _lntredeton
[ae] What are the hurdles in cloud computing?
in cloud computing:
vices are opened and deliverod over the network between
service provider and the consumer, the security in this
TT delivery is taken with the concerns of
and availability.
lovels of maturities for organizations seeking
service Level Agreements (SLA) but eloud service
fers are not equipped to deliver the services.
is a need of stringent Recovery Point Objective (RPO) and
ery Time Objective (RTO) with the agreed number of
®(Cloud Computing 1-0E(CSIT-Sem-7)
(Quoi ] Explain briefly the term cloud.
= ;
1 Cloudie an extension ofthe internet with some level of inherent discipline
and ethics
2 Cloud can be thought of unification of information technology with
business intelligence
3. Technology merges virtualization, grid functionalities and web standards
as a single utility model which is del ‘customers over the
4. Cloud brokers negotiate the best deals and relationships between the
‘loud consumers and cloud providers.
5. They can use specialized tools to identify the most appropriate cloud
resource and map the requirements of the application toi.
6 Cloud broker services are mainly categorized into three group
‘4 Service intermediation broker provides a service to a consumer
\Uuateahanors agiven sevice by adding some value on topto increase
seme specific capability
b. Service aguregation brokerage service combines and integrates
{nto one or mare services and ensures that data are modelled across
all component services and movement, security of data botween
the service conrumer and multiple providers
¢ Service arbitrage is similarto cloud service aguregationbut services
being aggregated are not fixed. In addition, these services provide
flexibility and opportunity forthe service aggregator.
Que FA] What are the components of cloud?
Components of cloud :
1. Cloud service consumer (or end user):
{Cloud service consumersare the end wers known asclien
toteract with the system and demand for services a3
requirement
‘4 The client can be categorized into the following three categoris
‘4. Mobile clients : Mobile clients run the applicati
laptops, PDAs and smart phones. This category of clients
dderaands for higher speed and high level of security.
LOB(CSITSem-D Introduction
Thinellcnte: Thinclentanihe aye hard dives ar hare
ives, and largely depend on the server
8 Internet medium : Internet medium is the communication channel
between the cousumer and provider where services are redirected.
4 Datacentre:
i. Datacentee is the collection of servers where the applications
subscribed are housed,
i Ieonsists of storage, network, and server.
T9,) | Give the characteristics of cloud.
[Answer
Characteristics of cloud are :
1. Self-scrviceon-demand: As acloud consumer, users are privileged to
request and provision computing eapabilities bundled with services with
centers are then divided into multiple
services to various consumers in a multi-
wave both physical and virtual resources.
4 Ropidel
1 "Thia characteristicmakes the provisioning rapid and elastic.Cloud Computing MUECSITSem) 12 B(CHTPSom-7 Introduction
cand can fex-up and flexdown fi. Theconsumer does not manage the underlying cloud infrastructure
i Thie provisioning can be automati
‘on the basis of spikes of wilizatio
fil The consumer ean view the’
which ean be bought at any’
QweTAO.] What are the challenges
“Answer
Challenges in cloud :
1. Lack of control : In ease of lack of control, by delegating the IT
Sanagemen te ersice consume loses the ability to
and anuterd of the submitted workload,
ity available as a service,
existing applica
loud ? oriented approach,
concern and needs to be
Interoperability among multiple service providers: This eadsto
ae my a eo beable run the same virtualized
‘pplication on clouds provided by multiple vendors. Appropriate standards
need to be in place for addressing this
4. Resource management : The manag
land other resources in a distributed
problem.
of computing, storage
is recognized as a ‘hard?
Quel] Explain cloud services. a
‘Anewer))
(On the basis of user requirements, the cloud infrastructure has given various
servicing schemes in order to deliver the utility tothe eonsumers or eients ot
fend users:
a. Infrastrueture-as-0-Service (IaaS) :
1 Infrastructure-as-a-Service (IaaS) model allows the customer to
provision processing, strage, network and other important software
such as operating system and applications. Quo] List the benefits of cloud.
ii The consumer does not have control over the underlying ,
infrastructure but has entrol over the operating systems, stOFag®
and deployed applications
1b, Platform-ns-2-Service (PaaS):
4. Platform-as-a-Service (PaaS) model provides capacity to the
ester todeply the castor crested applications nthe lov
frastructure using the programming language or tools Suppo? er a i i
gt language 3. Adhrens oSLAsasthe VM led incsanddowninesaresgifcantiy
[Fig?2I1.11 Cloud services,1-19E(CSITSem-7)
8 Dynamic sharing ofthe resources avilable in IT datacenter through
advo that demands can be met east effectively.
12. fe a greener datacenter.
13, Support for hetorogencous hardware vendors. Avoids vendor locking,
‘Que13:] Explain the evolution of cloud computing.
;pating appeared in the early 1990s as an evolution of
cluster computing
welonged to different org:
arré ‘made among them to share
power
¥. Different from a large cluster, a computing grid was a dynamic
aggregation of heterogencous computing nodes, and its scale was
nationwide or even worldwide,
2 Utility computing:
' vision of computing, defining a service
puting services in which resources such
applications, and infrastructure are
packaged and offered an a pay-use basi,
L14E (CSTESem-n
ii The business model introduced with utility computing brought ne
requirements ard led to an improvement of mainframve technalogy.
‘additional features such a operating systems. process control ata
user metering facilities
iii, The idea of computing as utility remained and extended from the
business domain te the academia with the advent of cluster
computing.
3. Software-as-a-Service
4. Cloud computing : Refer Q
Qi MIA] Discuss the architecture of cloud computing.
ture refers tothe components and subcomponents
‘These componenta consist of
the eliont part ofcloud computing system. It
\d applications that aro required to access
tools. Thisis equivalent
he traditional (non-cloud
computing) delivery of development tools.Clot Computing 1-1BE(CSTT-Sem-7)
a 11GE(CSTT-Sem-7) _Tatratction
@ Peneeceanree Re UR
fy; Tntradtrmctareas'e- Service Una): RAicQ:L1LFagei-11m, , > Disaster recurenys ete snd recveee clouds facttate commercial
a amaaial solutions to maintain highly accesube applications with Dexble multiple
et datacentres and proider acters and rede domotne and data
4 Network : The cloud network layer offers
erstohave 4. cintiseeausaioar Distribute exible capacity to assemble random
L High bandwidth (low latency) : Allowing
ununterrupted access to their data and applications. ‘traffic actions and to lower expenditure for the ongoing life cycle
WL Agile network: On-demand acest to resources requires the ability management by public and private clouds
‘to move quickly and efficiently between servers and possibly even & Web and mobile applications : Deploy mobile applications and web
clouds applications that are extremely scalable and accessible across arange of
UL Nemork security Seriya portant bt when deli ‘erie architectures, technologies and clouds
aeTAG] Give limitations of cloud computing.
fii They fear losing data to competition and the data confidentiality of
iv. Inmany instances. the actual starage locations not disclosed, adding
‘onto the security concerns of enterprises.
vIn the existing models, firewalls across datacentres (owned by
enterprises) protect this sensitive ifarmation
vi Inthe cloud model, service providers are responsible for maintaining
data security and enterprises would have to rely on them
2 Data recovery and availability
4. All business applications have service level agreements that are
stringently followed,
i Operational tenms ply ey rle in managerient of service level
‘Que LAG] Write some applications of cloud computing.
‘Answer
Applications of cloud computing :
1 Big data analy: ram nud recon sil are
bag data exist univer rally. Analyne how Iadoop and great presentation
computing elusters can be set-up in both public and private clouds.
2 Develop and test : Build and test applicatioas in on-requirement 7
platforms using constantly configured resources, lower expenditure, to a
sand decreased release cyclesIntroduction
{Despite ther being multinl oud providers the management of
platarm and infrastractore stil in ts infancy.
It can take advantage of non-local resources when the loc:
resourcen ar finite
iv. Seva compoting wastes the potential ompsting Power thus
a J computing makes better work of hardware.
Describe briefly the components of parallel computing.
PART-2
Underlying Principles of Parallel and Distributed Camputir
' a eration Ca a
s On-Demand Provisioning,
Qve1.17,| Write a short note on parallel computing. Write tbe
‘edvantages of parallel computing over serial computing.
i ich multiple processor‘L Mardware resources :
4. Processors, memory, and peripheral devices (processing nodes) form
the hardware care of a computer system.
i Processor connectivity (system interconnects, network), memory
‘organization, influence the system architecture.
4 Operating systems :
4. Manages the allocation of resources to punning processes,
Ai Mapping tomateh algorithmic structures with hardware architecture
and vice-versa, processor scheduling, memory mapping,
interprocessor communication.
Que 119;] What are the properties of distributed computing ?
al
Propertics of distributed computing:
1. Fault tolerance +
4 Whenone on some nodes fails, the whale system can still work fine
‘except performance
id Need to check the status of each node.
2 Each node play partial role:
i. Each computer has only a limited, incomplete view of the system.
ii Each computer may know only one part of the input,
Resource sharing : Each user can share the computing power and
storage resource inthe system withother wees ese
{oad sharing: Dispatching veverl ass tocach node can help share
loading to the whole system. a
Easy to expand : We expect to use few time whem adding nodes. Ho
tospend notime if possible, Sema eret
Performance : Parallel computing can be considered a sul
ame ed a subset of
Qee80;] Write a short note on distributed computing.
a
1-208 (CSAT-Sem-7)
Leon (CSSD
which component of a software
itera to improve efficiency and
Distributed computing is a mod
system are shared among mul
,,cach processor has its own private memory
Information is exchanged by paasing messages
Differentiate between parallel computingand distributed
Distributed computing,
4 | Computer can have shared
memory or distributed
memory.
‘Computers communica
each other through the
| Processors communicate
with each other using a
bus.
6 | Increase the performance
of the aystem.21 E (CST Sem, =
(Cloud Computing 7 2) -92B(CSTTSem-7) Cease
Gow Competing RCRD
re of distribu and return architecture :
QHTRR] replete briemy the architecture of distributey 4 Call and ret ‘all the systems that are composed by
jected together by method calls
4 ‘Therefore, especially within the context of distributed and paral
TeSputing wer. ater of data i he overall pol
‘ystems
4b Thiselasat styles is characterized by the pr -yele with industry-tailored asset
an wironment that eirhulates feat
are the hardware of software.
consolidation : Reduce operating costs,
ess, and fully utilize the resources.
lelps businesses achieve
iy, Tetention, and security.
sostem are implemented and become portable
rer different hardware and software environment as longs th=®
{8 an implementation of the virtual machiae they interface #02 7
constitutes its exeeution,mat Computing L-SIECSITSem7) 1-24 E (CSTT-Sem-7) ~ ao esencen fal lntredtuction
starts Ubemetod remotely avoked, whl the ints main be pray
Emery eMiiency Oder ren an stainable eer ve ‘Saponeat allowing it hosting eavteomea! te remotely Ieee
‘— - oa ‘ethods through the proxy interface
o
TT 7
© Security’: Provides end-to-end industry customized governance, Qa ‘What are the characteriaties of cloud computiog,
‘ab easageoa tnd eamlane fr aes Sensi]
Elasticity : Maintains cootinuous business and TToperations hie [AG
Janly adapting end responding toFuhs and opportunities
QHeTST] exptain technologies used for distributed computing.
Aarer |]
Technologies used for distribated computing are
Wi RIC maintains the synchronous pattern that is natural in process
procedure and funetisn calls
2 Distributed object frameworks:
{Distributed objeet framewor
Distributed object frameworks leverage the
introduced with RFC, and exten ittoenalle the
iv Proxy and skeleton always constitute a pair, the aerver proce?
maintain the akeleton companent, which isin change of executif
FC i444...arpa
— ane
ee terior
eee *
er a ieeseat tte
Vale i nana
oo
QueHsT: | What are the advantages of elastic cloud computing?
Advantages of elastic cloud computing:
saving ener.
5 Scalability and performance : Scalability
cloud deployments, Cloud instance are de
‘when needed and as aresll enhance performance with excel
of computations.
{Qe 73H] What are the disadvantages ofetasticcloud eompstint
Dintrange fduiiednii ccc,
1. Security and privacy in the cloud Socuty ithe bigest cnet?
sloud computing. Companies essentially ide their private dats 52
tsforoatcn vr chad tao baad oud nee
1-26E (C8ITSem-1) tsar
then up tothe cloud service prover to maanage, protect au tain data
cunfidential.
a Dei de of—
Cloud Enabling
Technologies
2A E(CSIT-Sem-7)
Cloud Enabling Technologies
ae
{ee RAD | Brietty describe the Service Oriented Architecture (SOA).
Seer
4. Service Oriented Architecture (SOA) is an architectural approach in
‘which applications make use of services available sa the network
Service Oriented Arcitectare\SOM) isa styl stare design where
4-2E (CST Sem-D
the maintainer of the service and the
available one or more services for othersCloud Computing 298 (CSITSem.7
2 Service consumer:
Clon Enabting Teebastonien
1 Theservice consumer canloctetbe service metadata inthe registry SerLGptntedandtusicd nay whet coeing var seco.
sod develop the required cient components to bind and we the
fe ose agaregate information and data retrieved from other
services or create workflows of eervices to satisfy the request of
= 4 ities are easily available to anyone on request
6 ications are more reliale because tis easy to
‘Que2a,_] Describe the guiding principles of SOA. rather than huge codes.
6 ices can ran on different aervers within an
aswer | 7
Guiding principles of SOA:
1. Standardized service contract : Services adhere to a given 1 High overhead : A validation of input parameters of ervices tx done
‘communication ageementhichisspecified timighone ormoreserice ——whersver services interact, which decreases performace at nereases
description documents. Joad and response tine
2 Loose coupling: Services are designed as self-contained components, 2 High investment A huge inital ivestznent i required fr SOA
iotein relatenap et minimis Gepeniencins on other eerecan
Complex service management : Whes services interact they
4 Abecraction: Aservice it completely define by serves contract and ‘exchange messages o take. The nuraber of ressage may go sz malliona
desersption documents. They hide their logic, which is encapsulated thecomes a cumbersome task to handle a large number ef messages.
‘within their implementation.
4 Reusability : Being designed as components, services can be reused @u€2.5. | Explain the application areas of SOA.
pss onthe voicing th Siretepied Ci el nt erecta
costs, It allows for a more agile design and cost effective system "Answer ]
ezeasaven
& Lack of state : By providing a stateless interaction pattern, service pe SOA are:
0 ined in etl elution app cha me and they me int
finetone vo ran
So OA helps to maintain nusuma a vrai storage pn for er
7. Composability : By using services as building blocks, Selene eternal hon neceat
spdeomples operations canbe implemented. Service orchestration! GEERT] What are the benefts of using SOA?
Seley the vse ale
© TRGREAIT] Wat are the advantages and diaadvantages of BOA?
ie jon documents
‘constitute supplemental metadata through which they can be effectively
discovered. Service discovery provides an effective means for utilizing
Advantages of SOA:
1. Service reusability : In SOA, applications are made from existing
teorvices Thus, services can be reused to make many applications.eee ee
Clout Competing SSECSITSemy 5 gpicgtt sem) Cloud Enabling Technologies
2 1 Once a tan application
Senor ererfibeoracenc: EE
Elements of Service Oriented Architecture (SOA):
Organizational agility : SOA defines building Nocks of capabilites
2
provided by acftware and it cffers some services that meet tome
ccrpansational requirement which can be recombined and integrated SOA
rapid
4. Leveraging existing system : This is exe ef the major use of SOA
‘which is to clauny elements or fonctions of existing applications and
‘Sake them avalatle tothe er Service Bus
Se ez] [= | =
WEA | Expats horizontal ayer of SOA architecture. 1 1
ae] coe | free] [ nm |
SOA architecture ia viewed as fire horizontal ayers:
1 Coosumer interface layer: These are GUI taxed apps for end users ——=
saeseng te pines, ;
2 Business process layer : These are busiese-use eases in terms of puembce| | Bee
ee
Services layer : These ere whole-enterprise, in service inventory Application frontend:
4 Service component layer: They are used tobuildthe services, such a-_ Application frontends are active elements of the SOA. delivering
0 tional cod teckel iran, {he vale of SOA to the end users
Operational systema layer i contains the data model 1h They initiate and control ll activity ofthe enterprise system.
Service : Iisa software component that encapsulates a high level
‘GeeBR ] Explain vertical layers of SOA architecture. bbusicess concept.
Contract +I: provides a specification of the purpose, functionality,
=a constraint, and usage ofervices.
. 4 Interface : Functicnality of the service exposed by the service tothe
Vertical layers of SOA architecture: clients that are connected tothe service.
1. Integration layer :Stars wth platorm integration (protec support Implementation : The service implementation provides the required
dea etapraton eerie insegration sppleation integration, lading buiness loge and appropriate data. It contains one or more of the
cecterprise pplication integration eopporting BZB and B2C. artfacta: programs, configuration, data and databases,
Business logic : Business process represented by the service
Quality of service Layer : Secorty,evailablity, performance ete.
‘commute the quay of eerie parasicters which ie configured based Data: Data represented i the service used by the service.
e reqared SLAB OLA Service repository: It reper the servic and her tres to
tate the discovery of eervices, operation, access rights, owner,
2 esi lew nite ao aeaese re
Governance layer: stray is poverned to each horizon Service bus: A exible infrastructure for integrating applications and
achueve required operating end capability model See tng ees rating prota ten roanor
Pe fats and service, handling business eventa and delivering thea. providing
0S, secunty, and managing the interaction among services.See DTE(CSTSem7) 28E(CSITSem-7 Cloud Enatting Tecoloses
PART= Answer
‘REST. aT2 oes ‘The REST architecture makes use of four HTTP methods. These are
ont Syeme of Sptoms Web Service, Publish Subveribe , Gut method Tis method bps inlfering readenyaeen forthe
San Post method :This method is implemented for ereating a new resource
2 3, DELETE method :This method is implemented for removing a resource.
4. PUT: This method is implemented for updating an existing resource oF
creating a nov one.
Que Zaz, | Writea short note on RESTful APL.
TAnawer
1. A RESTful API is an Application Program Interface (APD that uses
HTTP requests to GET, PUT, POST and DELETE data.
ferred to asa REST{ul web service that is based on
mal State Transfer (REST) technology, an architectural
roach to communications often used in web services
Long Answer Typo and Medium Answer Type Questions,
‘Que 210] Write a short note on REST.
nud provider to provide updated subscription
4. Thrower could prepare a mb pag tat nudes ote on
‘statements that are described in the code. i
5, RESTisalogical ch
interact with cloud
6. RESTYal APIs are used by sites such as Amazon, Google, LinkedIn and
{Que218, | Differentiate between RESTYul weh service and RESTless
web service.Cloud Compating 29E(CSITSem-7) 9 19E(CSIT-Sem-7) Cloud Enabling Technologies
The sparation mals it easier ta have the front and te back
Tiree servern: and hi akes the app more eal o work
a
‘The RESTAPI In always independent ofthe type of platform or
ogee
a The REST APLalays adap tothe type of ayntax or plane
Trig acd whith ves considerable eedom when changing oF
hese sen tires
Pa aaa e_ Sansnotar one eae
ees nom —] poy
Sper vandals mat [Bory 0 or GRIT wet her nove on web services
Titi ssretins | nina
Es eae
z a
‘ ree
tae
Sonya
ee
ce ran heen theatre iar
ee es
Qae2TE] what are the advantages of REST? ‘a a linieaaielert i Suc
=a Pein cee neneemmets
ieee) —
—— eee gmc
me that has invoked the web service.
1. Separation between the client and the server:
The REST protocol totally separates the user interface from the
server and the data starage.
‘Que Z16]] What are types of web services 7
iawn]
‘Two types of web services:
1. SOAP web services:
server has one evident
spment team can scale the product
1b. They can migrate to other servers or make all kinds of changes io
the database, provided that the data from each request in seat
correctly,Cloud Computing
fe. The SOAP message consists of:
© SOAP document has a root element termed as the
You might also like
CC Unit 1 (1a, 1b, 2a, 2b, 3,4,5,6,7)
CC Unit 1 (1a, 1b, 2a, 2b, 3,4,5,6,7)
9 pages