0 ratings0% found this document useful (0 votes) 36 views70 pagesCloudcomputing
Unit 1 cloud introduction
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
PURLISHLED BY:
Publications®
(A Unit of Quantum Page Pvt. Ltd.)
Pict No 69/27, Bite:
Apram Singh
Quantum:
Pane 50129. 416079
Veal pageqeastams pmaid.com Website: wwe.quastampaceain
Delhi Office 1 M-28, Navevo Shahdara, Deh-110032
© Quem Pact Pot bo.
No pot d the gable mp be epeadnsl © tenon
+ ony fe by op mma wht prema
‘Au Rao Ramm
vermunn cru n te work p domed bom ee
Interweb lable Every effort has ben made to ersare
sccuracy, however redtir the publaher ror the authors
(essteree Oe acricacy oF complete of amy edcrmaten
Pubic here anu newer the publasher nor the authors
stall be eeporahie tor amy error omiaairm, or damages
armcy ot of wr of he formation
Cloud Computing (CST ; Sem-7)
1 Eden 2011.17
Fr Edwon 2019.20 (Thoroagitly Revime! Edicion)
Eaten 200027
© Ration 2021.27
7 Ramen 2002.29
Pande Goan aan Oia
e—_—__oONnNS
KCS 713 : Cloud Computing
LUNTE : INTRODUCTION (1-1 Et0 1-266)
Introctacton to Choad Computing - Deir of Chal - Evedutin
cof Cloud Computing - Underlying Principles of Parallel and
Dastributed Computing ~ Cloud Characteristics ~ Elasticity in
(Cou! - Onstemand Provisioning
UNTF2; CLOUD ENABLING TECHNOLOGIES (2-1 Eto 2-33 E)
‘Service Onenied Architecture - REST and Systems of Systems =
WebSerracs -Publah, Sobscne Mel ~ Bots of Virtualization
~Typescl Virualizanon - Implementation Levels of Virtualzatm
= Virtualization Structures ~ Tools and Mechanisms ~
Viruatizaton of CTU = Memory - 1/0 Devices -Vertuaizaton
Support and Dasaster Recovery
LUNTTS: CLOUD ARCHITECTURE, SERVICES & STORAGE,
G1Ews326
Layered Cloud Architecture Dengn ~ NIST Cloud Computng
[Relerence Architecture ~ Public, Private and Hybrid Clouds Las
PaaS - SaaS ~ Architectural Design Challenges ~ Cloud Storage
7 Storageers-Serrice - Advantages of Cloud Storage - Cloud
Storage Providers -S3-
LUNTT-4 : RESOURCE MANAGEMENT (414-256)
Inter Cloud Resource Management ~ Resource Provisioning ene
Rewuice Provsicnang Methods ~ Global Exchange of Cloud
Resources ~ Sccunty Overview ~ Cloud Security Challenges =
Seftwareas-a Service Secunty ~ Security Governance ~ Virtaal
‘Machine Secunty ~ IAM ~ Secunty Standards
UNITS: CLOUD TECHNOLOGIES & ADVANCEMENTS (5-1 Eto5-21 E)
Hadoop - MapRedace ~ Virtual Box — Googe App Eng-ne ~
Programming Envisorament for Google App Enge ~ Open Stach ~
Federation in the Cloud ~ Four Levels of Federation ~ Federated
Scorers end Applications - Future of Federation.
SHORT QUESTIONS 1SQ-1Et0$Q-206)
‘SOLVED PAPERS (2019-20 TO 2021-22) (SP-1E to SP-32 E)2E(CSITSem-1) __Fatrtin
PART-1
Introduction to Cloud Computing, Defirition of Cloud, Evolution
of Cloud Computing.
a Introduction
Long Answer Type and Medium Answer Type Questions
‘Ques |] What do you mean hy cloud computing ? Also, give its
properties.
CONTENTS
Part-1 Introduction to Cloud ~~. ‘Answer
Computing. Definition 1. Cloud computing is the mears of delivering all IT from computer
‘of Cloud, Evolution of ‘applications, software, business processes, messaging, and collaboration
Cloud Computing toend users asa service wherever and whenever they need it
Underlying Principles of 1-17E to 1-268 2 Cloud computing isa paradigea for delivering T where rapid provisioning
Pale and Distriinted San important characters fr computing resources data applications
Computing, Cloud and IT,
Chametartica, Elasticity Cloud computing helps us to face the challenges such as
fa Cloud, On-Demand a arson aa
Provielocing i Decreasing the capex and opex cost
i Enhancing the service quality.
iii Maintaining the desired and right level of security, compliances,
‘regulations, and policies across the dierent functions of enterprise:
fv. Rapid provisioning. agility, and business transparency for consistent
selbservice delivery
4. Thus, cloud computingis the service and deployment model using large
resource pool based provisioning of virtual or physical resources in a
service model using the internet (publiceloudlor intranet (private cloud
Properties of cloud computing are:
1, User centric This means once a user is connected to loud any data,
such as images, videos, applications, becomes his property, Not oaly th
databut the devices esanected tit and the user ean share it with other
2 Task centric : Cloud computing focus on what one need and how
application can do it. Here documents are given more priority than the
applications which create them,
1-1E(CSIT-Sem-7)Coad Computing 1-3E(CSITSem-7)
A Self healing: In eifbaling. backups are availabe fr every document
‘nthe cloud Hence, ifene document crashes there will be its duplicate
ready to run.
4 Multienancy and intelligence : Mult-tenancy refers to sharing of
data and conte ecroes lange pool of wera. Aa varicas data are stored in
loud, data ining end analy are necessary for accessing information
‘0 an atelligens manner.
{Programmable Many processes in dout computing shall be automate
‘such as backing up crashed data withite duplicate. Hence, programming
‘associated with loud computing
© Flexible: Fleible as the users may be of different varictics and hence
‘thas tomatch with their needs
RESTS] wnat are the advantages and disadvantages of cloud
computing ?
‘Advantages of cloud computing:
1. Cost saving: It helps us to eave eubstantial capital cast as it does not
‘need any physical hardware investments
2 Strategic edge : Cloud computing helps us to access the latest
applications any time without spending our time and money on
igh speed : Cloud computing allows usto deploy our service quickly in
fewer dicks. This faster deployment allows us to get the resources
required for our eystem within fewer minutes.
4 Reliability : Through cloud computing we can always get instantly
‘updated about the changes.
Mobility : Employees who are working on the premises or at the remote
locations can easly access ll the cloud services Allthey need is internet
onnectinity
@ Unlimited storage capacity : Cloud computing offers limitless storage
capacity
Disadvantages of cloud computing +
1. Performance can vary: When we are working in aloud environment,
our application is running on the server which simultaneously provides
resources to other businesses that can affect the performance of our
shared resource
2 Technical issues : Cloud technology is always prone to an outage and
other technical issues,
3. Sccurity threat in the cloud : Before adopting cloud technology. *®
should be well aware ofthe fact that we will be sharing all our compasiy ®
sensitive information toa third-party cloud computing service proviier
Hackers might access this information.
Internet connectivity : Good internet connectivity is must in cloud
computing We cannot access cloud without an internet connection,
Lack of support : Cloud computing companies fail to provide proper
‘support tothe customers. Moreover, they want their user to depend on
FAQsor online help, which ean bea tedious ob for non-technical persons,
QaeT] Explain vision of cloud computing.
‘Answer
1 Clout computing provides the facility to provision virual hardware,
runtime environment and wervice toa person having money
2 ‘These all things canbe used as long as they are needed by the user
The whale collection ofcomputing systems tranformed into collection
tf lites, which can be provisioned and composed together ta deploy
systems in hours rather than daa, with no maintenance costs
4 Thelongterm vision ofacloud computingiethat IT cevics are traded
{utilities inan open market without technological end legal barriers
{Inthe future, we an imagine that it willbe poss to ind the eolation
that matehes with our requirements by simply entering ot requett ia
flobal digital marke that trades with loud computing service.
6 Theexitenc of uch market will enable the automation of discovery
processandits integration into its exiting software ystems
Due to the existence of global platform for trang cloud service will
alas helpservce providers to poentialy increase heir revenue.
& Acloud prover can also become a consumer af campetition service
inorder full ts promises to customers
Seal
[Answer
Categories of parallel computing systems:
{Bit level parallelim = tin form of parallelism which is based on
increasing processors word ste, Ieahortens the numberof instructions
thatthe system man run inorder to perform atask on variables which
arepreaterin sie
ii Instruetion Level parallelism : tis a form of parallel computing in
‘hich we cam calculate the amount of operation carried aut by an
operating system at same time. For example
J] List the major categories of parallel computing systems.Cloud Computing 1-SE(CSITSem-7)
Anstruction pipelining
Out of order execution
Register renaming
‘Speculative execution
Branch prediction
Que TBD | Discuss the issues related to cloud computing.
Several iasues related to cloud computing are :
Performance waves
Data issues
Energy related issues
Fig 151.
Security issues : Some ofthe security problems which are faced by the
cloud computing are as follows pe »
1. Data integrity: When data is ona loud, anyone fom any lacaion
can ccom thine data fom the ead Cle ern not diferente
tweet aseniive data from a common data ths enabling anyone to
acca thou senstve data Thus theres lack of data integrity in cloud
computing
2 Data theft: Most ofthe cloud vendors instead of acquiring server
tolleae server from other service providers esuse they ae cot
‘Mfective ad Mexibefor operation
3. Security on vendorlovel: Vendor should make sure that the server
tewellpecured fromallthe external threats tmay come ares: Aloud
tt good only when there in good ncurty provided ty the vendor tothe
commer
4. Security on user level : Even though th vendor has provided good
security yer forthe customer, the customer should make sure that
because of te wn acted, there should ot be any loss of data ar
USinpering of data for otber users who are using the tame eoud
{Information security Security related othe infrmation exchanged
Intween diffrent host o tween ost and nr. Thins pertaining
LOE (CSIT-Sem-7) Introduction
to secure communication, authentication, istues concerning single sign
‘on and delegation.
Data issues : Various data issues in loud computing are as follows
1. Dataloss: Ifthe vendor closes due to financial or legal problems there
be alors of data for the customers. The customers will ot be able to
feces thase data because data is no more available for thecustomer as
the vendor shut down.
2 Data location : When it comes to location of the data nothing is
transparent even the customers do not know where his awn data are
located. The vendor dovs not reveal where all the data are stored. The
data will not even be in the same country of the customer, it might be
located anywhere in the world.
& Data lock-in : Software stacks have improved interoperability among.
platforms, but the APIs for eloud computing itselfare still essentially
proprictaryorat least have not en the subject of active standardisation
‘Thus, customers cannot easily extract their data and programs from
one site to run on another.
4. Data segregation : Data in the cloud is typically stored in a shared
‘environment whereby one customer's data is stored alongside another
‘customer's data, hence itis difficult to assure data segregation.
5. Dataconfidentiality and auditability : Current cloud offerings are
‘essentially public (rather than private) networks, exposing the system
tomoreattarks. Auditabilty could be added asan additional eaver beyond
the roach ofthe virtualized guest OS providing facilites arguably more
secure than those built into the applications themselves and centralizing
the software responsibilities related to confidentiality and auditabiity to
‘single logical layer.
6 Dataintogrity : One of the biggest concerns with cloud data storage is
the verification of data integrity at untrusted servers, and how todeal
with sensitive data. Its not an easy task to maintain customer's most
Sensitive eloud data securely, which isneeded in many applications for
clients.
Deletion of data: Data that has tobe deleted by the user because he or
she no longer needs it or many no longer process it for another reason
is also deleted by the provider and no more copies of data are available
‘This can lead to problems, particular in conneetion with backups.
Service level agreements : According to the purpose for which the
data is processed, itis important to agree on binding service levels for
availability and data recovery and if necessary, safe guarded by supporting
fzedpealis inthe oven of won-compliance wth the agreed nerve1-7E (CSITSem-7)
Various performance issues in cloud computing ae:
1. Poor application performance or application hang-ups: Usually
the application is starved fer RAMor CPU cele, and faster processorg
cr mare RAM is added
2 Slow access to applications and data : Bandwidth is usually the
une, and the moet commen elution isto add fast netvork
connections
8 Horizontal and vertical scalability:
L Vertical scaling : Vertical scaling (up) entails adding more
resources tothe eae computing pool.
fi, Horizontal acaling Horizontal cling (out) requires the addition
of more machines devices to the computing platform tobandle the
incrated demand Sustained increassin demand, however, require
Horizontal scaling and load balancing torestore and maintain peak
performance
Eneray related issues: Various energy related issues re as fellows
1. Cloud empting is rapidly growing in importance as increasing numbers
sof enterprises and individuals are shifing their workload to cloud service
providers
2. Theclectricity cots involved in operating alangecloud infrastructure of
sultiple data centres can be enormous. In foct, cloud service providers
fflen must pay ar the peak power they draw, a well as the energy they
4. Lowering these high operating costs is one of the challenges facing
cloud service providers.
4. Insuiicient or malfunctioning coling system canlead toaverheatingof
the resources reducing system reliahility and doves lifetime.
5. High power consumption by the ifratructure lends to substantial carbon
dioxide (00, )emission contributing to the greenhouse effect
Fault tolerance :
1 Fault tolerance is one ofthe key issues of cloud computing. Fault
tolerance is concerned with al the techniques necessary to enable @
system to tolerate software falts
2 These software faults may or may not manifet themselves during
tyetems operations but when they do, software fault tolerant techniguet
ould provide the necessary mechanisms ofthe software ayatem 10
prevent ryetem failure oecurrences.
Fault tolerance techniques are employed during the procurement, of
developmeat, ofthe software, When a fault occur, theee technque®
provide mechanisms to tho software syrtem to prevent syste failure
From eccurning
1-8E(CSTTSem-
[ae] What are the hurdles in cloud computing?
urdies in cloud computing :
1. Scourfty:
L_Asthe services are opened and dliverod over the network between
te cloud service provider and the eonsuraer, the security inthis
tmodel i perceived at higher levela
{Other inhibitors can be location-independent resource pooling
‘where consumer does not know where his services are running oF
srbere his data is stored.
ii, Limited service management and monitoring capabilites inthe
public eloud model als added tothecomplesities,
2 Regulation and compliances :
i There isa nced of data governance models tobe established in the
enterprises and federating data privacy.
ii In large organizations, IT delivery is taken with the concerns of
reliably, performance, and availability
{i There are different levela of maturities for organizations seeking
different levels of Service Level Agreements SLA) but eloud eervice
providers are not equipped to deliver the services.
ik, There i a need of stringent Recovery Point Objective (RPO) and
the Recovery Time Objective (RTO) with the agreed number of
ininshhours downtime.
Cloud migration :
L Thisrequires the property of powerful interoperability ofplatforms
that should identify the appropriate applicatioa that exa be migrated
tothe loud.
Its important to Kentify the interdepondoncios and integration
points withstandards and interfaces tht are lacking amang service
providers.
fi, Cloud migration becomes more complex ifthe service bundles are
integrated from multiple cloud service providers. This can also
tecome the deal breaker o the reason for downgraded performance.
4. Worldond suitability for clou
i. Notallthe opplication are suitable candidates for the cloud,
fi I depends on the function of the business, enterprise policies,
application architecture, scalability, suitability, usage patterns
secordingt pay-per-use-model, or infrastructure requirements in
theservice modelCiowd Con 1-0E(CSIT-Sem-7)
Que 17, 1 Explain briefly the term cloud.
‘Answer i
1 Cloudie an extension ofthe internet with some level of inherent discipline
and ethics
2 Cloud can be thought of unification of information technology with
business intelligence
3. Technology merges virtualization, grid functionalities and web standards
‘as a single utility model which i delivered to the customers over the
internet, whereas the business intelligence defines the best cost schemes
leading to win-win situation for both the cloud service provider as well
as the cloud service cansumer
4. Cloud brokers negotiate the best deals and relationships between the
‘loud consumers and cloud providers.
5 They can use specialized tools to identify the most appropriate cloud
resource and map the requirements ofthe application to
6 Cloud broker services are mainly categorized into three group
‘a Service intermediation broker provides a service to a consumer
‘that exhances a given service by adding ome value ontop to increase
some specific capability
b. Service aggregation brokerage service combines and integrates
{nto one or mare services and ensures that data are modelled across
all component services and movement, security of data between
the service consumer and multiple providers.
¢ Service arbitrage is similar to cloud servie aggregation but services
being agzregated are not fixed. In addition, these services provide
flexibility and opportunity for the service aggregator.
‘Wee TAT] What are the components of cloud ?
—
Components of eloud :
1. Cloud service consumer (or end user):
{Cloud service contumersare the end wsrslinown asclints, which
toteract with the system aad demand for services as per th
requirement
4 Tho-client can be categorized into the following three categories:
‘Mobile clients : Mobile clienta run the application from
laptops, PDAs and emart phones, This eateory of clients
demands for higher speed and high level af seurty
LOB(CSITSem-D Introduction
b. Thinclicnts: Thin lientsneither have hard drives nor have
DVD ROM drives, and largely depend on the sorver
e Thick clients : Thick clients are self-eufficent in terms of
2 Cloud service provider:
L Cloud service providers are the agonts which host the servers in
the cloud and deliver aerview to the end users.
i The major cloud providers are Google, Amazon, Sales Force, IBS,
‘Microsoft and Rackspace.
8 Internet medium : Internet medium is the communication chann‘l
between the cousumer and provider where services are redirected.
4 Datacentre:
i. Datacentee is the collection of servers where the applications
subscribed are housed,
ii Itconsists of storage, network, and server.
QueI9.1] Give the characteristics of cloud.
Taewer
Characteristics of cloud a
1. Selfscrviceon-demand: As cloud consumer, ases are privileged
request and provision computing capabilities bundled wth rervices with
tr without approval proses powered ly automation and werkflows.
2 Ubiquitous networkaccess: This is the characteristic by which
user and server computing devices can be acessed ever the network
ven using the neat generation heterogenous devices auch a9
‘smartphone, tablets, thinand thick elients
Resource pooling
“This charoteristierefersto the posing of resources cross multiple
acer
ii These pooled virtual datacenters are then divided into maltinte
pools 10 provide their services to various consumers in a mult
nant mode
ii These poolacan have bath physical and virtual resources,
fy. ‘The doviees provided by this pool give the notion of location
independent compute (storage, servers, processing, network
bandwidth virtual machines, et), where the consumer does nat
havecontrator visibility abut the servic lation and is geography
4. Rapid claticity :
Thischaractorsticmakes the provisioning rapid and elasticCloud Computing 1-115 (CSITSem-7)
This provisioning can be automatic and ean Mlex-up and flex-down
‘on the basis of spikes of utilization.
fii The consumer ean view the infinite capacity available asa service,
‘which ean be bought at any point of time.
‘Que 101] What are the challenges in cloud ?
‘Answer
Challenges in cloud :
1. Lack of control : In case of Inek of contrel, by delegating the Tr
‘management toa third party, the service consumer loses the ability to
directly control and monitar the execution of the submitted workload.
2 Sccurity : For eccurity, trusting a third party to store enterprises
confidential data is a source of potential concern and needs to be
effectively addressed by the eloud service provider.
Interoperability among multiple service providers : This leadsto
avoid vendor loccin, itis desirable to beable torun the same virtualized
‘applicationon clouds provided by multiple vendors. Appropriate standards
‘need to bein place for addressing this concern.
4. Resource management : The management of computing, storage
and other resources in a distributed system is recognized as a ‘hard
problem.
QueHAI] Explain cloud services.
aera
(nthe Bais of wer requirement, the cud infrastructure hs given various
Scricngechemss in oder to deliver the wit tothe consumers diets
aoe
fa Infrastructure-as-aService (aa6)
{Infrastructures Servic (IaaS) model allows the eustomer
rovsin processing trage,netrork and other important sow
chat operatingsutem and plications,
The consumer does not have control over the underlying
infrastructure bot has contol over the operating systems, stT9e°
and deployed aplications. sneer
bb Plattora-eea-Service (PaaS):
4. Platform-as-a-Service (PaaS) mode] provides capacity to the
tne to ethane eae plone
infrastructure using the programming ‘or tools Suppo
by the cloud provider. —
112 B(CSTT-Sem-) Introduction
fi Theconsumer dace not manage the underlying cloud infrastructure
‘auch as network, storage, ete, but has control over the deployed
applications,
It also provides solutions for integrating cloud computing into
‘existing application, services, and infrastructure with a market-
oriented approach,
© Software-as-a-Service (SaaS)
i. Software-as-a-Sorvico (SaaS) model enables the customer to use
the provided application hosted on the cloud infrastructure.
ii In this model, the customer does not have any control over the
cloud infrastructure but has a lttleeontrol aver the application
configuration settings.
{ik Theapplieations are accessible from the cient devices such as thin
client or web browser interface
(FigB.11.1; Cloud series
Quenaa,
Answer
Benefits of cloud:
1. Increased agility on the IT datacenter resources and innovation.
2, Enabling of self-service portal and thus ensure Virtual Machines (VMs)
inlesslead-times.
5. AdbereaceofSLAsas the VMleadimes anddown-ties are sigifianty
ist the benefits of cloud.TISE(CSIT Sem) 1.14 B(CSTTSem-1
‘The business mode! introduced with utility computing brought new
requirements ard led to an improvement of mainframve technalogy.
‘additional features such a operating systems. process control ata
4 Thal and error configuration tests can be dane at ease. iz
5 Complete contro! aver cloud wage for administrators is possible,
6 Scalability and flexibly allow the laaS loud to almost deliver the promise
of unlimited TT services on demand. user metering facilites.
7 Usage-based payment and not getting billed when the utilization ii The idea of computing as utility remained and extended from the
decreases bosiness domain to the academia with the advent of cluster
computing
Significant reduction in the costs for IT datacenter.
8 Dynamic sharing of the resources available in IT datacenter through
private cloud so that demands ean be met cost effectively.
10. Considerable inerease in the utilization of resources of T datacenter
11. Inerease in the operational efficiency of the resources in the IT
datacenter,
12, Achieve a greener datacenter.
13, Support for hetorogencous hardware vendors. Avoids vendor locking,
3, Software-as-a-Service : Refer Q. 111, Page I-11E, Unit
4. Cloud computing :Refer Q. 1.1, Page I~2E, Unit-1
Qi MIA] Discuss the architecture of cloud computing.
‘Answer
Clood computing architecture refers to the components and subcomponents
required for cloud computing. These components consist of
‘Que13:] Explain the evolution of cloud computing.
=
Evolution of cloud computing:
Grid computing:
ty
Grid computing appeared in the early 19908 as an evolution of
cluster computing
Utility computing is a vision of computing, defining a service
provisioning model for computing services in which resources such
fas storage, compute power, applications, and infrastructure are
packaged and offered an a pay-use basi,
Front end platform
i. Cloud computing architecture consists of front end platforms called
clients or eloud clients.
i These clients comprise servers, fat (or thik) cients, thin clients,
zeroclients tablets and mobile devices.
fii. These client platforms intoract with the cloud data storage through
‘an application (middleware), through a web browser, or through a
virtual session.
fv, The front end rofers tothe elient part ofcloud computing system. It
cect ige neal Sempre
‘use othor utilities such as power, gas, and water. 2 Backend platform:
2 a ee aad ahead sn de oo a
cluster by means of internet connection. eee " required to provide cloud computing services.
cae er eases titerent oceenlmsiees tl ticchaniom, services, deployment models, servers et.
Dato am cr sate see canary Te nee efi:
Siti Pe aa eratersiewa
a. wiigenetae ee
‘web-based, community shared development tols. Thisis equivalent
tolocally installed development tools in the traditional (non-cloud
computing) delivery of development tools.1-1SE(CSIT-Sem-7)
(Choad Computing
oe
iL Platform-ave-Service (PaaS): Refer Q LU, Page 1-11E, Unit-1
Iv, Infrastracture-as-a-Service (IasS): Refer Q. 1.11, Page 1-118,
Use.
40 Network : The cloud network layer offers
L High bandwidth (low latency) : Allowing users to have
ceninterrupted accens to their data and applications
fh Agile network: On-demand acess to resources requires the ability
te move quickly and efficiently between servers and possibly even
clouds
Ui Network security :Secunty is always important, but when dealing
with multi tenancy. it becomes much more important because we
Are dealing with aegregaing maluple customers
Thom
Backend
‘Que LAG] Write some applications of cloud computing.
‘Answer
Applications of cloud computing:
1. Bigdata analytics: From fraud recognition to statistical investigation.
2
bag data exist univerally: Analyse how Iadoop and great presestation
‘ommputing clusters can be set-up in both public and private clouds.
Develop and test : Build and test applicatioas in on-requirement
platforms using constantly configured resources, lower expenditure,
sand decreased release cycles
1-10 (CSTT-Sem-7)
a
Disaster recovery : Public and pnvate clouds facilitate commercial
solutions to maintain highly accesuble applications with Mexsbe roultsple
datacentres and provider architectures, and reduce down-time and data
loss
Gaming applications : Distribute Dexible capacity to assemble random
traffic actions and to lower expenditure for the ongoing life cycle
management by public and private clouds.
Web and mobile applications: Deploy mobile applications and web
‘applications that are extremely salable and accessible across a range of
verified architectures, technologies and clouds.
Que T16] Give limitations of cloud computing.
po
Limitations of cloud computing :
L
Data protection :
i. Datasecurity isa crucial element that warrants serutiny.
Enterprises are reluctant to buy an assurance of business data
security from vendors.
‘They fea losing data to competition andthe data confidentiality of|
Inmany instances. the actual tarageleationis mat disclosed, adding
‘onto the security concerns of enterprises.
In the existing models, firewalls across datacentres (owned by
cnterprises) protect this sensitive information
Si Inthe oud model, service providers are responsible for maintaining
data security and enterprises would have to rely on them,
Data recovery and availability +
{All business applications have service level agreements that are
Stringent followed,
ii Operational teams play a key rle in management of service level
tgrecments ind ranthee goreraance of epplications
fi Inproduction environments, operational teams support
Appropriate clustering and fll over
b Datareplication
Bystem menitering (transactions menitedg
sae ee, centiaring
4 Maintenance (runtime governance)
t
Disaster recovery
Capacity and performance management.Clea Conspatiog 1-17E (CST Sem.)
Management capabilities:
i Despite there being multiple cloud providers, the management of
platform and infrastructure is till in its infancy.
i Forexample. features like Auto-scaling are a crucial requirement
for many enterprises
{ii There is huge potential to improve on the scalability and load
balancing features provided tay.
4. Regulatory and compliance restrictions :
i. Insome of the European countries, government regulations do not
allow customer's personal information and other sensitive
‘information to be physically located outside the state or country.
8. Inorder tomect such requirements, cloud providers need toset-up
‘9 datacentre or a storage site exclusively within the country to
comply with regulations
i Having such an infrastructure may not always be feasible and isa
big challenge for cloud providers.
Paaey
Underlying Principles of Parallel and Distributed Computing,
(Cloud Characteristics, Elasticity in Cloud,
‘On-Demand Provisioning,
1-18 (C8IT-Sem-7) Introduction
i. Itaaves time and money as many resources working together will
reduce the time and eut potential costs
ii Ttean be impractical solve larger problems on serial competing:
It can take advantage of non-local resources when the local
resources are finite
iv. Serial computing wastes the potential compating power, thus
parallel computing makes better work of hardware.
QueIIE | Describe briefly the components of parallel computing.
Components of parallel computing:
‘Anever Type Questions
QBELIT:] Write « short note on parallel computing. Write the
‘edvantages of parallel computing over serial computing.
1. Parallel computing is a computation type in which mul
par 5 {ype in which multiple races
2 Problems are broluen down into instructions and are solved concurreatl¥.
3 The main reason for parallel programming is to execute cade efficient,
‘since parallel programming saves time, allowing the execution o
1, Computing problems
1. Numerical computing : Science and engineering numerical
probleme demand intensive integer and oating pant computations
HL Logical reasoning : Artifical Intelligence (AI) demands loge
inferences and symbolic manipulations and large space searches.
2 Parallel algorithms and data structures ¢
Special algorithms and data structures are needed to epecify the
‘computations and communication present in computing problems
\from dependency analyse)
fi Most oumerical algorithms are deterministic using regular data
structures1-19E(CSIT-Sem.7,
W. Parallel algorithm development requires interdiscipli
interaction,
‘L Mardware resources :
4. Processors, memory, and peripheral devices (processing nodes) form
the hardware care of a computer system.
i Processor connectivity (system interconnects, network), memory
‘organization, influence the system architecture,
4 Operating systems :
4. Manages the allocation of resources to punning processes,
Ai Mapping tomateh algorithmic structures with hardware architecture
and vice-versa, processor scheduling, memory mapping,
interprocessor communication.
Que 119;] What are the properties of distributed comp
Anewer,
Properties of distributed computing:
1. Fault tolerance :
4 Whenone on some nodes fails, the whale system can still work fine
‘except performance
id Need to check the status of each node.
2 Each node play partial rol
i. Each computer has only a limited, incomplete view of the system.
ii Each computer may know only one part of the input,
2. Resource sharing : acl user can share the computing power and
storage resource inthe system with other usceg. ee
4 Load sharing: Dispatc ees ;
pererlherme rag tasks to each node can help share
5 Easy toexpand : Weespect tous fw time w
tospend notime if possible, time when adding nodes. Hope
@ Performance : Parallel computing
distributed eamputing.
QeeBO|] Write a short note on distributed computing,
8?
‘can be considered a subset of
compating isa model in which components ofa safteare
pina fared among multiple computorstotmprone ficeney and
performance. an
rn diriuted computing, each proceso has its own private mem
» Uiattnted memory). tnormaion i exchanged by passing messages
tetween the proceso.
4. A dtrbutedaysem allowe resource sharing,
Sprtems connected to the net
4. The goal of distributed computing isto make network a8 a single
computer.
6. Examplenofdstributed tems oppistions of distin computing
tres lntranct, Internet WWW, eal
Que]2ii | Differentiate between parallel computingand distributed
computing.
including software by
(Answer!
Distributed computing
‘A system whose components are
located on different networked
computers, which communicate
fond coordinate their actions by
‘passing messages toone another,
[S-No.| | Parallel computing
1. | Itisa type of computation
in which many calculations
or the execution of
processes are carried out
simultaneously.
2 | Treccursin a single involves multiple computers
computer.
3. Multiple processors execute | Multiple computers perform take
mullipletasks atthesame | atthe same time.
time.
© | Computercan have shared [Each computer has its own
memory distributed | memory.
memory.
5 | Processors communicate | Computers communicate with
with eachother using | eachother through the network
bus.
‘Allows scalability sharing
resources and helps to perform
‘computation tasks efficiently,
6 | Increase the performance
of the aystem.1-21 E(CSATSem.7)
GEIST] Explain briefty the architecture of dlstributeg
computing.
Answer —
Architecture of distributed computing:
1. Data-centered architecture:
‘These architectures identify the data as the fundamental clement
Of the software system and access to shared data is the core
‘characteristic ofthe data-centered architectures.
‘Therefore, especially within the context of distributed and parallel
computing system, integrity of data is the overall goal for such
systems.
The repository architectural style is the most relevant reference
‘model ia this eategory.
It is characterized by two main components; the contral data
structure, which represents the current state ofthe system, anda
collection of independent components, which operate on the central
data,
‘The ways in which the independent components interact with the
‘central data structure can be very heterogeneous.
2 Data-flow architecture
i
In the case of dataflow architectures, itis the availability of data
that controls the computation,
With respect to the data-centered styles, where the access todatais
the core feature, data-flow styles explicitly incorporate the pattern
‘of dataflow, since their designis determined by an orderly motion
of data from component to component, which is the form of
‘communication between them,
Data-flow architectures are optimal when the et
optimal when the system to be desigm
crubodiesamult-stage process, which canbe clearly identified it?
‘collection of separate components that need to be orchestrated
pale ponents that need to be orchestra
3. Virtual machine architecture :
‘This lass of architectural styles i characterized by the presence of
‘shstract execution environment that sitnulates features that
fare not available in the hardware of software,
‘Applications and system are im .
Aplications plemented and become portable
dilfercat hardware and software environment as long 0s the"?
is an implementation of the vi : :
Sea reuementatin of the virtual machine they interface Wt
Introduction
1-228 (CSIT-Sem-7) Hon
4. Call and return architecture :
‘all the systems that are camposed by
i This category identifies
components mostly connected together by method calls,
‘The activity of systems modoled in this way is characterized by &
7 chain of method calls whose overall execution and composition
Sfmt the exeutton of one F more operations
Si ‘The internal organization of components and their connections
may vary.
5 Architoctural styles based on independent components :
‘This class of architectural styles model systems in term of
independent components having their own life cycle, which interact
toeach other in order to perform their activities.
‘There are two major categories within this class, which differentiate
in the way the interaction among components is managed
a. Communicating processes : In this architectural style,
‘components are represented by independent processes that
leverage Inter-Process Communication (IPC) facilities for
coordinate mansgement.
b. Event systems : In this architectural syle, the components
ofthesystemare loosely coupled and conaected. In addition to
exposing operation for data and state manipulation, each
‘component also publishes (or announces)a collection of events
that other components ean register with.
(Que 1.28)] What do you mean by dynamic cloud infrastructure ?
1
Cloud computing clients ean access standanlized IT resources to deploy
now applications, services, or computing resources rapidly without re-
cngincering their entire infrastructure, thus making it dynamic.
Cloud dymamie infrastructure is based on an architecture that combines
the following initiatives:
4. Service management : Offers business transparency and
‘automation across the pillars of business for consistent delivery.
1b. Asset management: Maximizes the value oferitical business and
IT assets over their life cycle with industry-tailored asset
‘management solutions,
c Virtualization and consolidation : Reduce operating costs,
improve responsiveness, and fully utilize the resources.
@ Information infrastructure : Helps businesses achieve
information compliance, availability, retention, and securitythe method remotely invoked, while the cients maintasn the proxy
‘component allowing its hosting environment to remotely invoke
(Cloud Computiog LSSECSTTSem7 1-24 (CSTT-Sem-7)
ctyectiven
© Energy efficiency : Ofer green and sustainable enengy ealutcny nati
Fas ‘methods through the proxy inter
{Security : Provides end-to-end mtustry customized povernance,
‘ak management, and compliance for businesses,
Elasticity : Maintains cotinuous business and TT operations while
rapadly adapting and responding to risks and opportunities,
‘Qoe TSE] Explain technologies used for distributed computing.
Anewer
Technologies used for distribated computing are:
1. Remote procedure call:
\ Remote Procedure Call (RPC) isthe fundamental abstraction
cnabling ibe execution of procedures on client's request.
& Wallows extending the concept of procedure call beyond the
boundaries ofa processor and aingle memory address space
The called procedure and calling procedure may be on thease
system, or they may be on different asters Ina network,
Theaystem ia based on a client server model
¥ Theserver process maintains registry ofall the available proeret
that ean be remote aivobed, and Listens for requests from eles
that epecty which procedure to invoke together with the values sf
the parameters require y the procedure
Yi RIC maintains the synchronous pattern that is natural in process
procedure and funetio alls
2 Distributed object frameworks :
Distributed ebjcet frameworks extend the object-oriented
programing eystems by allowing objects toe distributed across
heterogeneous network and previ facilities so that they ©
coherently act as they were in the eaze advens spare
Distributed object frameworks leverage the basic mechan
introduced with RFC, and extends to enale the remote invoeat
sf elyect methods and to keep track af references to objet ma
available through a oetwork connection
iv Proxy and skeleton always constitute a pair, the server prvces*
maintain the skeleton companent, which is in charge of exeeutiSS
‘TEE TSHT] What are the characteristics of cloud computing ?
cE
Characteristics of cloud computing are
1. Ondemand self-service: Resources can automatically be provisioned
without the need of human interaction as and when needed.
2 Compatibility :Cloud services allow accoss to the data from any location
and on any device. Employees ean work from anywhere.
X_ Elastleity Cloud sorvices are scalable. Consumers can add resources
they need and discard resources they do not want
4. Reliability + Cloud runs.on multiple servers and is automated to run
‘even {fone server fails Resources ary drawn from the other servers to
‘ensure continuity without any interruption
& Disaster recovery With replication and storing ncrosa multiple servers,
cloud allows easy cost-effective solutions at times of data loss due to
some theft or calamity,
& Updates : Consumers need not werry about sofware updates and
{echnical issues, The eloul servers are located in different places uway
from our business premises The providers doallthe updatesand patches
Security Cloud services offers enhanced security. We ean accwas our
data from any ayatem even if we lose ur personal device.
S1RG] Write a short note on elasticity In cloud.
1 Incloud computing. elasticity indefinal na"the degre ta which aystens
{sablo adapt to workload changes by provisioning and d-provisining
‘esoutees in an autonomic manner, auch that at each pai in ie the
availa resources match the current demand ax closely na pose’
2. Elasticity is a defining characteristic that differentiato cloud camputing
{corn previously proposed computing paradigms, such agri cocsputing
4. The dynamic adaptation of capacity, by altering the use of computing
esourves, to meet a varying workload ts ealled elastic computing
4 Elasticity sims at matching the amouat of reaurce allocated toa service
With the amount of resource it actually requires, aveiding over
Provisioning or under provisioning.— Seuss
ea
erg
eee
a romaine
Deke ice me
om
QueTST | What are the advantages of elastic cloud comput,
‘Answer,
Advantages of clasti cloud computing:
1. Costefficency?
1 Clulisavaiatie ot machcheaperrates thas raditonal opr
nidean significant lower the oral I expenses.
4 Byuring elo latin companiescansave licensing fees sel
eliminate overboad charges auch asthe cost af data sarge
fofare updates, management te,
2 Convenfence and continuous avalaility: Cloud makes exit
acces of shared douments wd fs wth view and oli ure Pale
‘lbads ali flr services that are avaible wherever the end wet
tight be loted Morcover it guaranteed continuous avalaiity af
Teanurees and inate of apsem allure alternative instances we
utmatialy pawned onther machines
{2 Backup and reovery The poset ofbachng up and recveriag 8s
is easy asinfruatin i esidngon cloud and not ona physi deve.
Tevaruscud provider able ad dene olan
lens
4. Cloud isenvironment friendly :The chude moreeticen than‘
(ypicl I infrstructareandit takes fewerresoures ta compute U3!
ssving eens.
& Sealabilty and performance: Sclliy is obi fetus ft
load deplymests. lou instances are deployed automaticly
then needed end as ares enhance performance withexcllet se!
computations
‘Wee 3R] What are the disadvantages ofelasticcloud computing?
‘answer |
Disadvantages of clastic cloud computing
1. Security and privacy i the loud: Seeurityath geste
loud computing. Companies essentially hide their private data 2
tsrmaionoetbl rence ae co ea
1-26E (C8ITSem-1)
2
then up tothe cloud service prover to maanage, protect au tain data
cunfidential.
Lite control: ine the aplatons and ered ey nd
remotely companies, users and third party virtual environmen
Timited coatral over the function and execution of the hardware and
software
Dependency and vendor lock-in : One of the major drawbacks of
cloud computing isthe implicit dependency onthe provider. It» also
falled"vendor lok in”. Asit comes difficult to migrate vast dato from
tld providertonew. So, itis advisable to sleet vendar sery carefully
Increased vulnerability: Gloud based solutions are exposed wn the
publiinternet therefore aremore vulnerable target for malicious users
tnd hackers.
e098Cloud Enabling
Technologies
CONTENTS
Service Oriented Architecture.
REST and Systems of...
Systems, Wob Service
Publish-Subscribe Model
Irgplementation Levels
of Virtualization
Virtualization Structure, Tools
sand Mechanism, Virtualization
sf CPU, Memory, UO Devices,
Virtualization Support and
Disaster Recovery
2A E(CSIT-Sem-7)
4-2E (CST Sem-D
Long Answer Type und Medium Answer Type Questions
{ee RAD | Brietty describe the Service Oriented Architecture (SOA).
Answer
1. Service Oriented Architecture (SOA) is an architectural approach in
which applications make use of services available ia the network,
2. Service Oriented Architecture(SOA)is a style of software design where
services are provided tothe other companests by applicatica components
through a communication protocol over a network.
8. SOAallows users to combine a large numberof facilities from existiog
services to form applications.
4. SOA encompasses aset of design principles that structures the system
development and provide means for integrating components Into a
coherent and decentralized system.
5. SOA tused computing packages functionalities intoa set of interoperable
services, which can be integrated into different aoftware systems
belonging to separate business domains.
6. SOA provides a translation and management layer within the cloud
architecture that removes the barner fer loud chents obtaining desired
QESET |] Explain the major voles of Service Oriented Architecture
‘There ar two major rales of Service Oriented Architecture ‘SOA
1 Bervice provide
4 Tho sevice provider Is the maitsiner of the sevice and the
organization that makes avaiable on or tore services for sakes
toe
4 Toadvertie services the provider an publish them in
together witha vervice contact that specifies the eaten ore
serie, How louse the ruiements fs theresa
foes charged. " ee ae aeCloud Computing 2IE(CSIT-Sem.7)
2 Service consumer : -
1. Theservice consumer can acate the service metadata inthe registry
‘and develop the required client components to bind and use the
ser
‘Services aggregate information and data retrieved from other
‘services er create workflows af services to satisfy the request of a
Sven service consumer.
QerBa) ] Describe the euiding principles of SOA.
‘Answer |
Guiding principles of SOA:
1. Standardized service contract : Services adhere to a given
‘communication agreement which is specified through one or more service
description documents.
2 Loose coupling: Services are designed us selfcontained components,
ssaintain relationship that minimizes dependencies on other services
Abstraction: A service i complete defined by service contracts and
descroption documents. They hide their logic, which is encapsulated
within their implementation,
4 Reusability : Being designed as components, services ean be reused
sare effectively, thus reducing the development time and the associated
costs. It allows for a more agile design and cost effective system
implementation and deployment.
5 Lack of state : By providing a stateless interaction pattern, service
increase the chance of being reused and aggregated, especially in a
seoenario where a single service is used by multiple consumers belonging
todifferent administrative and business domains.
6 Discoverability : Services are defined by description documents that
‘constitute supplemental metadata through which they can be effectively
Gincovered. Service diseovery provides an effective moans for utilising
third:pany rewureee
7. Composability : By using services as building blocks, sophisticated
‘ead complex operations can be implemented. Servie orchestration at
‘choreography provide a solid support for composing services and
achieving the business goals
+ BRBAID] Wat are the advantages and dlandvantages of OA?
‘Advantages of SOA:
1. Service reusability : In SOA, opplications are mace from existing
‘eorvices Thus, services ean be reused to make many applications
24 E(CSAT-Sem-7) Cloud Enabling Technion
1% Easy maintenance 1 As services are independent of each other they
‘can he updated and modified easily without affecting other services
8, Platform independent SOA allows making a complex application by
combining services picked from different sources and are indepensent
of the platform.
A. Availability : SOA facilitien are easily available to anyooe on request
|& Relinbility : SOA applications are more reliable because it is eaay to
‘debug small codes rather than hoge codes.
G Scalability : Servicer ean run on different servers within aa
environment, this increases scalability.
Disadvantages of SOA:
|. High overhead : A validation of input parameters of services ts done
‘whenever services interact, which decreases perfermance ast increases
Toad and response time,
2 High investment : A huge initial investment is required for SOA
Complex service management : Whea services interact they
‘exchange messages o tasks. The mumsber of meagre may go x mains
Ithecomes a cumbersome task to handle a large number ef messages,
Que25. | Explain the application areas of SOA.
Answer |
Application areas of SOA are:
1. SOA infrastructure is used by suany armics and airforce to deploy
situational awareness ayers
SOA is used to improve the healtheare delivery
3. SOAisusedin mobile solutions apps such as games and they use inbeslt
funetions to run
4. SOA helps to maintain museums a virtualized storage poo! for eur
{information and cuateat
Queds, | What are the benefits of using SOA?
‘Answer |
Benefits of using SOA:
1, Language neutral integration ; Kegardless of the developing
nuyuage used, the evster offers and invoke services through a cor
mechanism, Programming language nowtralization is ane o! the key
benefits of SOA's integration approach.Cloud Competing 2SE(CSITSem7)
2 Component reuse : Once an erganiation built an application
componcet. and offered it asa service, the rest ef the organization ean
‘eile that sernice
2 Organizational agility : SOA defines building Mocks of capabilities
provided by acftware and it cffers some services that meet tome
ccrpansational requirement which can be recombined and integrated
ready
4. Leveraging existing system : This is exe ef the major use of SOA
‘which is to clauny elements or fonctions of existing applications and
‘make them availatle ta the erganizaticns er exterprise.
WaeEF | Exptais horizontal layer of SOA architecture.
Aeswer |
SOA architecture is viewed as fire horizontal layers:
1 Consumer intertace layer : These are GUI based apps for end users
2 Business process layer : These are businest-ase cases in terms of
2 Services layer : These are whele-enterprise, in service inventory.
4 Service component layer : They are used to build the services, each
os fectcnsl end uchoseal Ebranes,
Operational systems layer: lt contains the data model.
‘GeeBR ] Explain vertical layers of SOA architecture.
eewer |
Vertical layers of 504 architecture:
1. Integration layer :Stars wth platorm integration (protec support
deta tegration, service integration, epplication integration, leading to
cecterproe epplustica intepratica eapportng BB and BIC.
2 Quality of service layer : Seconty, evailability, performance ete.
‘cemsttate the quality of wervie parameters which sre ennfigured based
x reqared SLAs, OLAS
2 Informational layer : Provide business informatica.
4 Governance Layer: strategy is poverned to each horizontal layer to
ackoeve reqaired operating and capability model
GeeEwT] Explain the elements of SOA.
2BE(CSITSem-7)
oon
om |] [omens
gaz] [| =|
f T 1
conn | fave] [ me |
ie
‘a. Application frontends are active elements of the SOA, delivering
‘the value of SOA to the end users.
1b They initiate and control al activity ofthe enterprise system.
‘Service : It is a software component that encapsulates a high level
business concept.
Contract : It provides a specification of the purpose, functionality,
constraints, and weage of eervices.
Interface : Functionality ofthe service exposed by the service to the
clienta that are connected tothe service.
Implementation : The service implementation provides the required
bburiness logie and appropriate data. It contains ene or more of the
artifacts: programs, configuration, data and databases.
Business logic : Business process represented by the service
Data : Data represented in the service used by the service.
Service repository :It registers the services and their attributes to
facilitate the discavery of services, operation, access rights, owner,
qualities, etc
Service bus: A flexible infrastructure for integrating applications and
services by : routing messages, transforming protocols between requestor
and service, handling business events and delivering them. providing.
0S, secunty, and managing the interaction among services.
ams
You might also like
CC Unit 1 (1a, 1b, 2a, 2b, 3,4,5,6,7)
CC Unit 1 (1a, 1b, 2a, 2b, 3,4,5,6,7)
9 pages