Cloud-Computing Quantum
Cloud-Computing Quantum
1 Introduction
CONTENTS
Part-1 : Introduction to Cloud 1-2E to 1-17E
Computing, Definition
of Cloud, Evolution of
Cloud Computing :
Part-2 : Underlying Principles of. .1-17E to 1-26E
Parallel and Distributed
Computing, Cloud
Characteristics, Elasticity
in Cloud, On-Demand
Provisioning
1-1E (CSIT-Sem-7)
1-2 E(CSTT-Sem-7) Introduction
PART- 1
Introductionto Cloud Computing,Definitionof Cloud, Evolution
of Cloud Computing.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Que 1.1. What do you mean by cloud computing ? Als0, give its
properties.
Answer
1 Cloud computing is the mears of delivering all IT from computer
applications,software,businessprocesses,messaging,and collaboration
to end users as a servicewherever and wheneverthey need it.
2 Cloud computingis a paradigmfor deliveringIT where rapid provisioning
is an importantcharacteristicfor computingresources,data applications
and IT.
3 Cloud computinghelps us to face the challengessuch as :
Decreasingthe capex and opex cost.
Enhancingthe servicequality.
ii. Maintainingthe desired and right level of security,compliances,
regulations,and policiesacross the differentfunctionsof enterprise.
iv. Rapid provisioning,agility,and businesstransparencyfor consistent
self-servicedelivery.
4 Thus, cloud computingis the service and deploymentmodel using large
resource pool based provisioningof virtual or physicalresources in a
servicemodel using the intermet(publiccloud)or intranet(privatecloud).
Properties of cloud computingare :
1. User centric: This means once a user is connected to cloud any data,
such as images,videos, applications,becomes his property.Not only the
data but the devices connected to it and the user can share it with other
users.
2. Task centric : Cloud computing focus on what one need and how
applicationcan do it. Here documentsare given more prioritythan the
applicationswhich create them.
1-3E (CSTT-Sem-7)
Cloud Computing
3. Self healing:In selfhealing,backupsare availablefor every document
in the cloud. Hence, if one document crashes there will be its duplicate
ready to run.
4. Multi-tenancyand intelligence: Multi-tenancyrefers to sharing of
data and costs across a large pool of users. As various data are stored in
cloud, data mining and analysis are necessaryfor accessinginformation
in an intelligent manner.
5. Programmable:Many processesin cloud computingshall be automate
such as backingup crasheddata with its duplicate,Hence, programming
is associated with cloud computing.
6 Flexible: Flexibleas the users may be of differentvarietiesand hence
has to match with their needs.
Answer
Severalissues related tocloud computingare :
Issues in clouds
Security issues
Data issues
Performance issues
Energy related issues
Fault tolerance
Fig. 1.5.1.
Security issues : Some of the security problems which are faced by the
cloud computingare as follows:
1. Data integrity: When a data is on a cloud, anyone from any location
differentiate
can access those data from the cloud. Cloud does not
between asensitive data from a common data thus enabling anyone to
access those sensitivedata. Thus there is a lack of data integrityin cloud
computing.
2. Data theft: Most of the cloud vendors instead of acquiringa server try
to lease a server from other service providers because they are cost
effective and flexible for operation.
3.
Security on vendor level: Vendor should make sure that the server
is well secured from allthe external threats it may come across. Acloud
is good only when there is good security provided by the vendor to the
customers.
4. Security on user level: Even tho ugh the vendor has provided good
security layer for the customer, the customer should make sure that
because of its own action, there should not be any loss of data or
tamperingof data for other users who are using the same cloud.
5. Information security : Securityrelated to the informationexchanged
betweendifferenthosts or betweenhosts and user. This issues pertaining
1-6 E (CSIT-Sem-7)
Introduction
to secure communication,
on and delegation. authentication,issues concerningsingle sign
Data issues:Variousdata issues in cloud
1. Data loss:
computingare as follows :
Ifthe vendor closes due to financial or legal
will be a loss of data for the customers.The problemsthere
access those data customers will not be able to
because data is nomore availablefor the customer as
the vendor shut down.
2 Data location : When it comes to location of the
data
transparenteven the customers do not know where his ownnothing is
data are
located. The vendor does not reveal where all the data are
stored. The
data will not even be in the same country of the
located anywhere in the world. customer, it might be
3. Datalock-in:Softwarestacks have improved
platforms,but the APls for cloud computingitself interoperabilityamong
are still essentially
proprietary.or at least have not been the subjectof active standardisation.
Thus, customers cannot easily extract their data and programs from
one site to run on another.
4Data segregation: Data in the cloud is typicallystored in a shared
environmentwhereby one customer'sdata is stored alongside another
customer'sdata, hence it is difficultto assure data segregation.
5. Dataconfidentialityand auditability: Current cloud offeringsare
essentiallypublic (rather than private) networks, exposingthe system
to more attacks. Auditabilitycould be added as an additionalsaver
beyond
the reach of the virtualizedguest OS providingfacilities
secure than those built into the applicationsthemselvesandarguablymore
the software responsibilitiesrelated to confidentialityand centralizing
a single logical layer. auditabilityto
6. Data integrity: One of the biggest concerns with cloud
data storage is
the verificationof data integrityat untrustedservers, and how to deal
with sensitivedata. It is not an easy task to maintaincustomer'smost
sensitivecloud data securely,which is needed in many applicationsfor
clients.
7. Deletion of data: Data that has to be deleted by the user becausehe or
she no longer needs it or many no longer process it for another
is also deleted by the providerand no more copies of reason
data are available.
This can lead toproblems, particularin connectionwith backups.
8. Service level agreements: According to the purpose for which
data is processed,it is importantto agree on binding service levelsthe
for
availabilityand data recoveryand if necessary,safe guarded by supporting
fixed penaltiesin the event of non-compliancewith the agreed
levels. service
Cloud Computing 1-7E (CSTT-Sem-7)
Answer
1 Cloud is an extensionofthe internetwith some level of inherent discipline
and ethics.
2 Cloud can be thought of unification of information technology with
businessintelligence.
3 Technologymerges virtualization,grid functionalitiesand web standards
as a single utility model which is delivered to the custumers over the
internet,whereasthe businessintelligencedefines the best cost schemes
leading to win-win situationfor both the cloud service provider as well
as the cloud service consumer.
4 Cloud brokers negotiate the best deals and relationshipsbetween the
cloud consumersand cloud providers.
5. They can use specializedtools to identify the most appropriatecloud
resource and map the requirementsof the applicationto it.
6
Cloud broker servicesare mainly categorizedinto three group:
Service intermediation broker provides a service to a consumer
that enhancesa given service by addingsome value on top to increase
some specific capability.
integrates
b Service aggregation brokerage service combines and
are modelled across
into one or more services and ensures that data
of data between
all componentservicesand movement, security
the service consumer and multiple providers,
C Service arbitrageis similarto cloud serviceaggregationbut services
services provide
being aggregatedare not fixed. In addition,these
flexibilityand opportunityfor the service aggregator.
Que 1.8. What are the components of cloud ?
Answer
Components of cloud :
1. Cloud service consumer (or end user):
clients, which
i. Cloud service consumersare the end users known as
interact with the system and demand for services as per their
requirement.
ii The clientcan be categorizedinto the following three categories:
a Mobile clients : Mobile clients run the application from
laptops, PDAs and smart phones. This category of clients
demands for higher speed and high level of security.
1-10 E (CSIT-Sem-7)
Introduction
b. Thinclients:Thin clients neither have hard
DVD ROM drives, and largely depend on the drives nor have
server.
C. Thick clients : Thick clients are self-sufficientin terms of
accessories.
2. Cloud service provider:
Cloud service providers are the agents which host the
the cloud and deliver service to the servers in
end users.
ii. The major cloud providersare Google, Amazon, Sales Force, IBM,
Microsoftand Rackspace.
3. Internet medium: Internet medium is the communicationchannel
between the consumer and providerwhere servicesare redirected.
4. Datacentre:
Datacentre is the collection of servers where the applications
subscribedare housed.
ii. It consists of storage,network,and server.
Que 1.9. Give the characteristics of cloud.
Answer
Characteristics of cloud are :
1 Self-serviceon-demand:As acloud consumer, users are privilegedto
request and provisioncomputingcapabilitiesbundledwith serviceswith
or without approvalprocess powered by automationand workflows.
2. Ubiquitousnetworkaccess:This is the characteristicby which end
user and server computing devices can be accessed over the network
even using the next generation heterogeneous devices such as
smartphone,tablets,thin and thick chents.
3 Resource pooling:
This characteristicrefers to the poolingof resourcesacross
datacenters. multiple
These pooled virtual datacenters are then divided into multiple
pools to provide their services to various consumers in a multi
tenant model.
i. These pools can have both physical and virtual resources.
iv. The devices provided by this pool give the notion of
location
independent compute (storage, servers, processing, network
bandwidth, virtual machines, etc.), where the consumer does not
have control or visibilityabout the service locationand its
geography.
4. Rapid elasticity:
This characteristicmakes the provisioningrapid and elastic.
Cloud Computing 1-11 E (CSIT-Sem-7)
i
Software-as-a-Service(SaaS):
Software-as-a-Service
the
(SaaS) model enables the customer to use
providedapplicationhosted on the cloud
i. In this model, the customer does not infrastructure.
have any control over the
cloud infrastructurebut has a little control
over the application
configuration settings.
iii. The applicationsare accessiblefrom the
client devices such as thin
client or web browser interface.
Cloud
SaaS
PaaS
laaS
Answer
Evolution of cloud computing:
1. Grid computing :
evolution of
Grid computing appeared in the early 1990s as an
clustercomputing.
. Grid computing proposed a new approach to access large
computationalpower, huge storage facilities, and a variety of
services. Users can consume resources in the same way as they
use other utilities such as power, gas, and water.
iüi. Grids initiallydevelopedas aggregationof geographicallydispersed
cluster by means of internet connection.
and
iv. These clusters belonged to different organizations
computational
arrangementswere made among them to share the
power.
Different from a large cluster, a computing grid was a dynamic
was
aggregationof heterogeneouscomputingnodes, and its scale
nationwide or even worldwide.
2. Utility computing:
Utility computing is a vision of computing, defining a service
such
provisioningmodel for computingservicesin which resources
infrastructure are
as storage, compute power, applications, and
packaged and offeredon a pay-use basis.
1-14 E (CS/IT-Sem-7)
Introduction
The business model introducedwith utility computing
requirementsand led to an improvementof mainframebrought new
technology,
additionalfeatures such as operatingsystems, process controland
user metering facilities.
i. The idea of computingas utility remained and extended from
business domain to the academia with the advent of cluster the
computing.
3. Software-as-a-Service:Refer Q. 1.11, Page 1-11E, Unit-1.
4. Cloud computing: Refer Q. 1.1, Page 1-2E, Unit-1.
Que 1.14. Discuss the architecture of cloud
computing.
Answer
Cloud computingarchitecturerefers to the componentsand
required for cloud computing.These componentsconsist of:subcomponents
1 Front end platform :
Cloud computingarchitectureconsistsof front end platformscalled
clients or cloud clients.
These clients comprise servers, fat (or thick) clients, thin clients,
zero clients, tablets and mobile devices.
i. These client platformsinteractwith the cloud data
storage through
an application(middleware),through a web browser, or
virtual session.
through a
iv. The front end refers to the client part of cloud
computing
consists of interfacesand applicationsthat are requiredsystem. It
to access
the cloud computingplatformslike web browser.
2 Back end platform:
Theback end refers to the cloud itself. It consistsof all the
requiredto provide cloud computingservices. resources
It comprises of huge data storage, virtual
mechanism,services, deploymentmodels, servers, machines, security
etc.
ii. It is online network storage wheredata is
stored and accessibleto
multiple cients.
3 Cloud based delivery:These include the following:
i
Software-as-a-Service(SaaS): Refer Q. 1.11, Page 1-11E, Unit-1.
ii.
Development-as-a-Service
web-based,communityshared
(DaaS) : Developmentas a service is
developmenttools. This is equivalent
to locally installeddevelopmenttools in the
traditional(non-cloud
computing)deliveryof developmenttools.
CloudComputing 1-15 E (CSIT-Sem-7)
Internet
Application
Management Service
Security
Storage
Infrastructure
Answer
Applications of cloudcomputing:
1. Big data analytics: From fraud recognitionto statisticalinvestigation,
big data exist universally.Analyse how Hadoop and great presentation
computingclusterscan be set-up in both public and private clouds.
2.
Develop and test : Build and test applications in on-requirement
platforms using constantly configured resources, lower expenditure,
and decreasedrelease cycles.
1-16 E (CSIT-Sem-7) Introduction
3. Management capabilities :
the managementof
Despite there being multiplecloud providers,
infancy.
platformand infrastructureis still in its
ii. For example,features like
Auto-scalingare a crucial requirement
for many enterprises.
the scalabilityand load
There is huge potential to improve on
balancingfeaturesprovidedtoday.
restrictions :
4. Regulatory and compliance
governmentregulationsdo not
i In some of the Europeancountries,
information and other sensitive
allow customer's personal the state or country.
informatipnto be physicallylocatedoutside
cloud providersneed to set-up
In order to meet such requirements,
exclusivelywithin the country to
a datacentre or a storage site
complywith regulations.
may not always be feasible and is a
iii. Having such an infrastructure
big challengefor cloud providers.
PART-2
and DistributedComputing,
UnderlyingPrinciples of ParallelElasticity
Cloud Characteristics, in Cloud,
On-DemandProvisioning.
Questions-Answers
Questions
Long Answer Type and Medium Answer Type
Answer
1. Parallelcomputingis a computationtype in which multiple processors
execute multipletasks simultaneously.
2. Problems are broken down into instructionsand are solved concurrently.
3. The main reason for parallel programmingis to executecode efficiently,
since parallel programming saves time, allowing the execution of
applicationsin a shorter time.
4. Advantagesof parallelcomputingover serial computingare :
1-18 E (CSIT-Sem-7) Introduction
i
lt saves time and money as many resourcesworkingtogetherwill
E:
F: reduce the time and cut potentialcosts.
It can be impracticalto solve larger problems on serial computing.
i. It can take advantage of non-local resources when the local
resources are finite.
iv. Serial computing wastes the potential computing power, thus
parallelcomputingmakes betterwork of hardware.
Que 1.18. Describebriefly the components of parallelcomputing.
Answer
Componentsof parallelcomputing:
Computing Assign
parallel
problems
computations
to processors
Parallel
algorithms Mapping Hardware
and data architecture
,structures
Answer
1. Distributedcomputing is a model in which components of a software
system are shared among multiplecomputersto improve
performance. efficiencyand
2 In distributedcomputing,each
processor has its own private memory
(distributedmemory). Informationis exchangedby passing messages
between the processors.
3 A distributedsystem allows resource sharing,
systems connectedto the network.
including software by
4 The goal of distributed computing is to make network as a
computer.
single
5. Examplesof distributedsystems/applicationsof distributedcomputing
are :Intranets,Internet,WWW, email.
Que 1.21. Differentiatebetweenparallel computingand distributed
computing.
Answer
S.No. Parallel computing Distributedcomputing
1 It is a type of computation A system whose components are
in which many calculations located on different networked
or the execution of computers, which communicate
processes are carried out and coordinate their actions by
simultaneously. passingmessagesto one another.
2 It occurs in a single It involves multiple
computer.
computers.
3. Multiple processorsexecute Multiple computersperform tasks
multipletasks at the same at the same time.
time.
Answer
1. Cloud computingclients can access standardizedITresourcesto deploy
new applications,services,or computing resources rapidly without re
engineeringtheir entire infrastructure,thus making it dynamic.
2. Cloud dynamic infrastructureis based on an architecturethat combines
the following initiatives:
a. Service management : Offers business transparency and
automationacross the pillars of business for consistentdelivery.
b. Asset management:Maximizesthe value of criticalbusiness and
IT assets over their life cycle with industry-tailored asset
management solutions.
C. Virtualizationand consolidation: Reduce operating costs,
improve responsiveness,and fully utilizethe resources.
d. Information infrastructure : Helps businesses achieve
information compliance, availability, retention, and security
Cloud Computing 1-23 E (CSIT-Sem-7)
objectives.
e. Energyefficiency: Offersgreen and sustainableenergysolutions
for business.
£. Security :Providesend-to-endindustrycustomizedgovernance,
risk management,and compliancefor businesses.
g. Elasticity: Maintainscontinuousbusinessand IT operationswhile
rapidly adaptingand respondingto risks and opportunities.
Que 1.24. Explain technologies used for distributedcomputing.
Answer
Technologies used for distributed computing are :
1. Remote procedure call :
i. Remote Procedure Call (RPC) is the fundamental abstraction
enabling the execution of procedureson client'srequest.
beyond the
It allows extending the concept of procedure call
boundariesof a processorand a single memory address space.
be on the same
ii. The called procedure and calling procedure maynetwork.
system, or they may be on different systems in a
model.
iv. The system is based on a client server
availableprocedures
V The server process maintainsa registryof all the clients
that can be remote invoked, and listens for requests fromvalues of
with the
that specifywhich procedureto invoke together
the parametersrequired by the procedure.
is natural in process
vi. RPCmaintainsthe synchronouspattern that
procedure and function calls.
2 Distributed object frameworks:
object-oriented
Distributed object frameworks extend the
across a
programmingsystemsby allowingobjectsto be distributed can
heterogeneousnetwork and provide facilities so that they
coherentlyact as if they were in the same address space.
ii Distributed object frameworks leverage the basic mechanism
introducedwith RPC,and extend it to enable the remote invocation
made
of object methods and to keep track of references to object
available through a network connection.
with
ii. Distributedobjects frameworksgive the illusionofinteraction
a local instance while invoking remote methods. This is done by a
mechanismcalled proxy-skeleton.
iv. Proxy and skeleton always constitute a pair, the server process
maintain the skeleton component,which is in charge of executing
1-24 E (CSIT-Sem-7)
Introduction
the methodremotely invoked,while the
clients
component allowing its hosting environmenttomaintainthe proxy
remotely invoke
methods through the proxy interface.
Que 1.25. What are the
characteristicsof cloud computing?
Answer
Characteristicsof cloud computingare :
1. On
demandself-service:
without the need of humanResources
can automaticallybe
interactionas and when needed.provisioned
2.
Compatibility:Cloud servicesallow access to the data from any location
and on any device. Employees can work
from anywhere.
3.
Elasticity:Cloud servicesare scalable. Consumerscan add
they need and discard resources they do not resources
want.
4. Reliability: Cloud runs on multiple servers and is automated to run
even if one server fails. Resources are drawn from the other
ensure continuitywithout any interruption. servers to
5. Disaster recovery:With replicationand storing across multipleservers,
cloud allows easy cost-effectivesolutions at times of data loss due to
some theft or calamity.
6. Updates : Consumers need not
technicalissues. The cloud serversworry about software updates and
are located in differentplaces
from our businesspremises.The away
7.
providersdo all the updatesand patches.
Security:Cloud services offers
data from any system even if we enhanced security.We can accessour
lose our personaldevice.
Que 1.26. Write a short note on
elasticityin cloud.
Answer
1 In cloud computing,elasticityis
is able to adapt to defined as "the degree to whicha system
workload changesby provisioningand
resourcesin an autonomic manner, de-provisioning
such that at each point in time the
availableresourcesmatch the current demand as closely as possible".
2
Elasticityis a definingcharacteristicthat
from previouslyproposed differentiatescloud computing
computingparadigms,
The dynamic adaptationof such as grid computing.
resources,to meet a varyingcapacity, by altering the use of
computing
workload is called elasticcomputing.
4.
Elasticityaims at
with the amountmatching the amountof resourceallocatedto a
of resource it service
provisioningor under-provisioning. actually requires, avoiding over
Cloud Computing 1-25 E (CSIT-Sem-7)
Answer
Advantagesof elastic cloud computing:
1 Cost efficiency :
approaches
Cloud is availableat much cheaperrates than traditional
and can significantlylower the overall IT expenses.
licensingfees as well as
ii By using cloud solutioncompaniescan save storage,
eliminate overhead charges such as the cost of data
software updates, managementetc.
makes easier
2. Convenience and continuous availability : Cloud
and modifychoice. Public
access ofshared documentsand files with view
available wherever the end user
clouds also offer services that are
continuous availabilityof
might be looted Moreover it guaranteedalternative instances are
resources and in use of system failure,
automaticallyspawned on other machines
up and recoveringdata
3. Backup and recovery : The processof backing
cloud and not on a physicaldevice.
is easy as informationis residingon flexible backup/recovery
The various cloud providersoffer reliableand
solutions.
cloud is more efficientthan the
4. Cloud is environment friendly:The resourcesto compute,thus
typicalIT infrastructureand it takes fewer
saving energy.
a built-in feature for
5. Scalability and performance : Scalabilityis automaticallyonly
are deployed
cloud deployments.Cloud instancesperformance with excellentspeed
when needed and as a result enhance
of computations.
Answer
Disadvantages of elasticcloud computing:
biggestconcernin
1. Security and privacy in the cloud: Securityis the private data and
their
cloud computing. Companies essentiallyhide
infrastructureis used, it is
informationover cloud as remote based cloud
1-26 E (CSIT-Sem-7) Introduction
then up to the cloud service providerto manage, protect and retain data
confidential.
2. Limited control : Since the applications and services are running
remotely companies,users and third party virtual environmentshave
limited control over the function and execution of the hardware and
software.
3. Dependency and vendor lock-in : One of the major drawbacks of
cloud computing is the implicit dependency on the provider. It is also
called "vendor lock-in".As it becomesdifficultto migrate vast data from
old providerto new.So, it is advisableto select vendor very carefully.
4. Increasedvulnerability :Cloud based solutions are exposed on the
public internetthereforeare more vulnerabletarget for malicioususers
and hackers.
2 UNIT
2 Cloud Enabling
Technologies
CONTENTS
Part-1 : Service Oriented Architecture 2-2E to 2-6E
2-1 E (CSIT-Sem-7)
2-2 E (CSIT-Sem-7)
Cloud EnablingTechnologies
PART-1
Service OrientedArchitecture.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
There are two major roles of Service Oriented Architecture(SOA):
1. Service provider:
a The service provider is the maintainer of the service and the
organizationthat makes availableone or more services for others
to use.
b To advertise services,the provider can
publish them in a registry,
together with a service contract that specifies the nature of the
service, how to use it, the requirementsfor the service, and the
fees chargcd.
Cloud Computing 2-3E (CSIT-Sem-7)
2. Service consumer :
a. The service consumercan locate the servicemetadatain the registry
and develop the required client components to bind and use the
service.
Answer
Advantages of SOA:
1 Service reusability : In SOA,
applicationsare made from existing
applications.
services. Thus, services can be reused to make many
24E (CSTT-Sem-7) Cloud EnablingTechnologies
Easy maintenance: As services are independent of each other they
can be updated and modifiedeasily without affectingother services.
3. Platformindependent:SOA allows making a complex applicationby
combiningservices picked from differentsources and are independent
of the platform.
4. Availability:SOA facilitiesare easily availableto anyone on request.
5. Reliability :SOA applicationsare more reliable because it is easy to
debug small codes rather than huge codes.
6. Scalability : Services can run on different servers within an
environment,this increasesscalability.
Disadvantages of SOA:
1. High overhead: A validation of input parameters of services is done
wheneverservicesinteract,which decreasesperformanceas it increases
load and response time.
2. High investment :A huge initial investment is required for SOA.
3. Complex service management : When services interact they
exchangemessagesto tasks.The numberof messagesmay go in millions.
It becomes a cumbersometask to handle a large number of messages.
Applicationareas of SOAare:
1 SOA infrastructureis used by many armies and airforce to deploy
situationalawarenesssystems.
2. SOA is used to improvethe healthcaredelivery.
3. SOAis used in mobile solutionsapps such as games and they use inbuilt
functions to run.
4 SOA helps to maintain museums a virtualizedstorage pool for their
information and content.
Answer
Benefits of usingSOA:
1. Language neutral integration: Regardless of the develoving
languageused, the svstem offers and invoke services through a coror
mechanism.Programminglanguage neutralizationis one o! the key
benefits of SOA'sintegrationapproach.
Cloud Computing 2-5 E (CSIT-Sem-7)
Answer
sOA architectureis viewed as five horizontallayers:
1. Consumerinterfacelayer : These are GUI based apps for end users
accessingthe applications.
2. Business process layer : These are business-usecases in terms of
application.
3. Serviceslayer: These are whole-enterprise,in service inventory.
4. Service component layer : They are used to build the services,such
as functional and technical libraries.
5. Operational systems layer: It contains the data model.
Answer
Vertical layers of SOA architecture:
1. Integrationlayer:Startswith pltformintegration(protocolssupport),
data integration,service integration,applicationintegration,leadingto
enterpriseapplicationintegrationsupportingB2B and B2C.
2 Quality of service layer : Security, availability,performanceete.,
constitutethe quality of service parameterswhich are configuredbased
on required SLAs, OLAs.
3 Informationallayer :Provide business information.
4 Governancelayer: IT strategyis governedto each horizontallayerto
achieve requiredoperatingand capabilitymodel.
Que 2.9.Explain the elements of SOA.
2-6E (CSIT-Sem-7) Cloud EnablingTechnologies
Answer
Elementsof ServiceOrientedArchitecture (SOA):
SOA
Application Service
Service Service Bus
frontend repository
1. Application frontend :
a. Applicationfrontendsare active elementsof the SOA, delivering
the value of SOA to the end users.
b They initiate and control all activity of the enterprise system.
2. Service: It is a software component that encapsulatesa high level
businessconcept.
3 Contract : It provides a specificationof the purpose, functionality,
constraints,and usage of services.
4 Interface : Functionalityof the service exposed by the service to the
clients that are connected to the service.
5. Implementation:The service implementationprovides the required
business logic and appropriate data. It contains one or more of the
artifacts :programs,configuration,data and databases.
6. Businesslogic : Business process representedby the service.
7 Data: Data representedin the service used by the service.
8. Servicerepository :It registersthe services and their attributesto
facilitate the discovery of services, operation, access rights,
qualities,etc. owner,
9. Servicebus: Aflexible infrastructurefor integrating
applicationsand
servicesby :routingmessages,transformingprotocolsbetween
and service, handling business events and requestor
QoS,security, and managing the deliveringthem, providing
interactionamong services.
2-7 E (CSIT-Sem-7)
Cloud Computing
PART-2
Publish-Subscribe
Services,
Systems,Web
RESTand Systems of Model.
Questions-Answers
note on REST.
Que 2.10. Write a short
Answer information
State Transfer (REST) is a way of getting contains
Representational which
1
from a website by readinga designatedwebpage content.
content desired
describes and includes the
an XML file that
cloud provider to provide updated subscription
2 REST is used by
information.
includescontentand XML
provider could prepare a web page that
3 The described in the code.
statements that are (URL)
need to know the Uniform Resource Locator
Subscribers only witha web browser.
4
page where the XML file is located,read it display it
for the using XML information, and
understand the content
appropriately. sites use with RDF
same publishingapproachthat many
5 REST uses the
(RSS). RSS uses the ResourceDescriptionFramework
Site Summary way to describe a website.
(RDF), which is a standard
benefits :
REST offers the following support
response time and reducedserver load due to its
1. It gives better representations.
for the cachingof maintainsession
scalabilityis improved by reducingthe need to
2. Server
state. resource, so less
single browser can access any applicationand any
3 A be written.
client-side software needs to the use
resource discovery mechanismis not needed, due to
4 separate
A
of hyperlinksin representations. characteristics.
5. It has better
long-termcompatibilityand evolvability
Answ er
The REST architecture makes use of four HTTP methods. These are :
1 GET method : This method helps in offering read-only access for the
resources.
2. POST mnethod:Thismethod is implementedfor creatinga new resource.
3. DELETE method:Thismethod is implementedfor removinga resource.
4. PUT: This method is implementedfor updatingan existingresourceor
creating a new one.
Answer
1 ARESTful API is an Application Program Interface (API) that uses
HTTP requests to GET, PUT, POST and DELETE data.
2. A RESTful API is referred to as a RESTful web service that is based on
RepresentationalState Transfer (REST) technology,an architectural
style and approach to communicationsoften used in web services
development.
3. REST technologyis generallypreferredto the more robust Simple Object
Access Protocol (SOAP) technology because REST leverages less
bandwidth,making it more suitablefor internetusage.
4 An API for website is a code that allows two software programs to
communicate with each other.
5 REST is a logical choice for buildingAPIs that allow users to connect and
interact with cloud services.
6. RESTful APIs are used by sites such as Amazon, Google, LinkedÉn and
Twitter.
7 A RESTful API breaks down a transaction to create a series of small
modules. Each module addresses a particular underlying part of the
transaction.This modularityprovidesdeveloperswith a lot of flexibility.
Que 2.13. Differentiate betweenRESTfulweb serviceand RESTless
web service.
Cloud Computing 2-9 E (CSIT-Sem-7)
Answer
Answer
The advantagesof REST are :
the server:
1. Separation between the client and
interfacefrom the
a The REST protocol totally separatesthe user
server and the data storage.
interfaceto other
For example,it improves the portabilityof the the projects,and
b
types of platforms,it increasesthe scalabilityof
be evolved
allows the differentcomponentsof the developmentsto
independently.
2. Visibility,reliabilityand scalability: evident
has one
The separation between client and server
product
advantage, that each development team can scale the
without problem.
of changes in
b They can migrateto other serversor make all kinds is sent
the database, provided that the data from each request
correctly.
2-10 E (CSIT-Sem-7)
Cloud EnablingTechnologies
The separation makes it easier to have the front and the back on
different servers, and this makes the apps more flexible to work
with.
3. The REST APIis always independentof the type of platformor
languages :
a. The REST API always adapts to the type of syntax or platforms
being used, which gives considerablefreedom when changing or
testing new environmentswithin the development.
b. With a REST API we can have PHP, Java,Python Servers.
Que 2.15. Write a short note on web services.
Answer
1 A web service is a software package that is used for communicating
between two devices or web entities lying on the network.
2 They involve a service provider along with a service requester,i.e., the
client.
3. Since web services are advantageousas they are languagetransparent,
so there is no issue whether the fundamental system is providing the
service developed in Java, PHP or any other languagewhile the client
applicationis written in Python,Ruby, PerlorJavaScript.
4. Task performedby web services :
Web services are searched for over the network as well as call upon
accordingly.
As a web service is called, it would be capable of providingoperation
for the client that has invoked the web service.
Answèr
Two types of web services:
1 SOAP web services:
i The abbreviationofSOAP is ServiceOrientedArchitectureProtocol.
ii It is an XML based protocolhaving the main benefitof
the SOAP web service as its security. implementing
iüi. SOAP offersawrapper for sending a web service based
messages
over the Internetby the help of HTTPprotocol.AIl its messages are
usually in XML format.
Cloud Computing 2-11 E (CSIT-Sem-7)
Answer
requests.
b. Manipulationof resources through representations :
Client has representationof resource and it contains enough
informationto modify or delete the resource on the server,
provided that it has permissionto do so.
2-12 E (CSIT-Sem-7)
Cloud EnablingTechnologies
C.
Self-descriptivemessages:Each messageincludesenough
informationto describe how to process the message so that
server can easily analyse the request.
d. Hypermedia As The Engine of Application State
(HATEOAS):It need to include links for each response so
that client can discover other resources easily.
2. Stateless:
i. It means that the necessarystate used to handle the
request is
contained within the request itself and server would not store
anything relatedto the session.
i. In REST, the client must include all informationfor the
server to
fulfill the request whether as a part of headers or URI.
3. Cacheable:
Every response should include whether the response is cacheable
or not and for how much duration responses can be cached at the
client side.
ii. Client will return the data from its cache for any subsequent
and there would be no need to send the request again to the request
server.
4 Client-Server:
i REST applicationshould have client-serverarchitecture.
. A client is someone who is requesting
resources and are not
concernedwith data storage,which remains internalto each server,
and server is someone who holds the
resources and are not
concerned with the user interface or user state.
5. Layered system :
An applicationarchitectureneeds to be composedof
multiplelayers.
Each layer does not know anythingabout any layer other than that
of immediate layer and there can be lot of
between client and the end server.
intermediateservers
ii. Intermediaryservers may improvesystem
availabilityby enabling
load-balancingand by providingshared caches.
6. Code on demand:
It is an optionalfeature.Accordingto this, serverscan
executablecode to the client.
also provide
Answer
2. It is an architecturestyle. It is a protocol.
3. It usessimple HTTP protocol. It uses SOAP envelop and then
HTTP to transfer the data.
4. It supports many different It supports only XMLformat.
data format like JSON, XML,
YAML etc.
Subscriber
Message
Message
Publisher Publish/subscribechannel Subscriber
Subscriber
Fig. 2.20.1.
1. Publisher:Publishesmessagesto the communicationinfrastructure.
2. Subscriber:Subscribesto a category of messages.
3. Communicationinfrastructure(channel, classes) : Receives
messagesfrom publishersand maintainssubscribersubscription.
4. The publisher willcategorize published messages into classes where
subscriberswill receive the message.
5 A publisher has one input channel that splits into
channels, one for each subscriber. multiple output
6 Subscriberscan express interestin one or more classes and only receive
interestedmessage.
7 In pub/sub model the publisher and subscriber are
unaware of each
other. The publishersends messages to subscribers,without knowing
about subscriber.
8. Subscriber receives messages, without having knowledge of the
publishers.If there are no subscribersaround to receive the topic-based
information,the message is dropped.
Que 2.21. What are the benefits of publish-subscribemodel ?
Answer
Followingare the benefits of publish-subscribemodel:
1. It decouplessubsystemsthat need to
communicate.Subsystemscan be
managed independently,and messages can be properly managedeven
if one or more receivers are offline.
2. It increasesscalabilityand improves
responsivenessof the sender.The
sender can quickly send a single message to the input channel, then
2-15 E (CSIT-Sem-7)
Cloud Computing
messaging
return to its core processing responsibilities. Thedelivered to
infrastructure is responsible for ensuring messages
interested subscribers.
helps applicationsto
3. It improves reliability.Asynchronousmessaging
increased loads and handle
continuously run smoothly under
intermittentfailures more effectively.
to pick up messages
4. It allows scheduledprocessing.Subscriberscan waitprocessedaccording
untiloff-peakhours, or messagescan be routedor
to a specific schedule.
5 It enablessimplerintegrationbetweensystems usingdifferentplatforms,
protocols,as well as between
programminglanguages,or communication
the cloud.
on-premisessystemsand applicationsrunningin
enterprise.
6 It facilitatesasynchronousworkflowsacross an
monitoredand messagescan be
7 It improvestestability.Channelscan be strategy.
inspectedor logged as part of an overallintegrationtest
PART-3
Implementation
Basics of Virtualization,Types of Virtualization,
Levels of Virtualization.
Questions-Answers
Type Questions
Long Answer Type and MediumAnswer
Why it is needed ?
Que 2.22. Define virtualization.
Answer
decouples the
1. Virtualizationis an abstractionlayer (hypervisor)thatdelivergreater
(0S) to
physical hardwarefrom the OperatingSystem
IT resourceutilizationand flexibility.
of platformand allows
2. The virtualizationplatformprovidesthe isolation same physical
multiplebusinessesto run multiplevirtualmachineson the
machine.
3. Followingare the benefitsprovided by virtualization:
i. Money saving :
With virtualizationtechnology,the number of physical servers
can be reduced.
Therefore, the ongoing pro curement, maintenance, and
b.
ongoingoperationalcosts will also be reduced.
2-16 E (CSTT-Sem-7)
Cloud EnablingTechnologies
ii. Dramaticincrease in control:
a.
Virtualizationprovidesaflexiblefoundationto providecapacity
accordingto the demand for an organization.
b. New serverscan be quickly deployed. Therefore,servicescan
be providedwithin minutes.
C. It is also easy to ship the infrastructurewhen it is deployed
using virtualizationtechniques.
iüi. Simplifieddisasterrecovery:
More efficient and cost effective disaster recovery solutions
a.
can be realizedwith virtualizationtechnologies.
b. Servers and online businesscan be transferredto an alternate
site within minuteswith the help of virtualization.
iv. Business readiness assessment:
Virtualizationintroduces a shared computing model to an
enterprise and it is easy to understand infrastructure
requirementsin a virtualizedenvironment.
Virtualizationcan help to :
1 Reduce the cost of the existinginfrastructureby reducing operational
and systems managementcost while maintainingthe needed capacity.
2 Reduce the complexityof adding to the infrastructure.
3. Gather informationand collaborationacross the organizationto increase
both the utilization of information and its effectiveuse.
4. Deliveron-ServiceLevel Agreement(SLA) response time during spikes
in productionand test scenarios.
5. Build a heterogeneousinfrastructure across the organization that is
more responsiveto the organization'sneeds.
Que 2.23. Explain various current virtualizationinitiatives.
Answer
Various current virtualization initiatives are:
1. Virtual CPU and memory:
i. Physical CPUs and RAM can be dedicatedor dynamicallyallocated
to virtual machines.
As there is no OS dependencyon the physical hardware, with the
CPUchecking off, virtual machines can be migrated to different
hosts, with backgroundchanges to the physical CPUand memory
resources being transparentto the guest OSs running on virtual
machines.
Cloud Computing 2-17 E (CSIT-Sem-7)
2. Virtual networking:
This creates a virtual 'networkin a box' solution that allows the
hypervisorto managevirtualmachinenetworktrafficthroughthe
physicalNetworkInterfaceController(NIC) and allows each of the
virtual machines to have a unique identityon the network from
the physicalhost.
3. Virtual disk :
i StorageArea Network(SAN) based storageis presentedas storage
targets to the physical host, which in turn used to host virtual
machine's vdisks (virtual disks).
4 Consolidatedmanagement:
i. The performance and health of virtual machines and guest OSs
can be monitored and console access to all of the servers can be
obtainedvia single console.
5. Virtual machine :
Active virtual machines can be transparentlytransferredacross
physicalhosts with no down-timeand no loss of serviceavailability
or performance.
The virtual machine's executionstate, active memory, network
identity,and active networkconnectionsare preservedacross the
source and destinationhosts so that the guest OS and running
applicationsare unawareof the migration.
6. Storage virtual machine :
i Vdisks of active virtual machines can be seamlessly and
transparentlytransferredacross data stores,while the execution
state, active memory, and active network connectionsremain on
the same physical host.
7. Dynamicload balancing:
Dynamicallyload balancesvirtualmachinesacrossthe most optimal
physicalhosts to ensure that pre-definedperformancelevels are
met.
Virtualmachinescan be automaticallyand seamlesslytransferred
to a less busy hostif a particularhost in a resourcepool is in a high
utilization state.
iüi. Differentresourcepools can be definedfor differentbusinessneeds.
iv. For instance,productionpools can be definedwith more demanding
service level requirements,while developmentpools can be used
with more relaxed servicelevel requirements.
8. LogicalPartitions (LPARs):
i LPARs result in hardware layer logical partitioningtocreatetwo or
more isolatedcomputingdomains,each with its own CPU, memory
addressspace and VO interface,with each domain capableof housing
a separate OS environmenton single physicalserver.
2-18E(CNTTSem
ii LPARs canshare OPUacbavededcatedplyatsal
ii Likewise, an LAR can be a dudeatud jlyanal ydan
space or memory addeeaaeaCan lw dyaancally ulbocaud nnE
LPARs as needed
9. Logical Donains (DOMs) :
Operatingayatums unng in each logal dama
independently managed, lati, alpd, utatud, nd nled
without inpuclingotherLOMa rnig n hat
AType I 'bare etal hyperviooglalate plg v
from physicalresources.
For exanple,domainsaross diatc Wueada n la paHl
the multithveadinglechnologY, hecam lhe hypVan
dynamically managingandencapaulatingthe allnathd hyaal
resouCe8.
10. Zones :
Answer
Advantages i
Virtualizationsoftwarereduces VMM comdexily
2. Improves hunctionality.
Increase ertormance
4 Providesserverconsolidation,tuetingad develpnent, epviaot
dynamicload balancingand thedaalerrevery and alan pnvea th
Byslen reliability and security
5.
Connervalionaf enorgY,maintenanve of logny apptatnt
Bupporting a erosa platorm ofiee
Disadvantages
1. High risk in the pthyaical fault
2. It in alo not eany, quite eomplieated
3 Not supported by allapleationa
2-19 E (CSTT-Sem-7)
Cloud Computing
point of failure, demands power machines,visualization
4 It has single
may lead to lower performance.
possible.
5. Applicationis identifiedto be alwaysnot
note on server
virtualization.
Que 2.25. Write a short
Answer computerthat
works
virtualization as amaskingof the server
1. Server with servers, storage,
of resources
comprises the count and identityuser.
end
processors and OS from the VMs
server into multipleisolated
2 Administratorsdivide the physical
talking to same resourcep0ols. server
an abstractionof the physical
Virtualizationofserversprovidesserver
3
pools for users(Fig.2.25.1).
by maintainingresource
Application Application
Operatingsystem
Operatingsystem
Virtualization/Hypervisor
Memory Disk
CPU
virtualization.
Fig. 2.25.1.Server
Virtual machine: partition, or
termed as a virtual environment,
1 Virtual machinecan be
container. physicallyexist but is
environment, a server that does not
2 Ina server server is called'guest'.
createdon a different termed as 'host'.
instance where a virtual machine runs is
3. The physicalserver.
can have multiple VMs runningon the
4. These hosts
resources can be dynamicallyassignedto
toa pool of
5. AllVMs assigned
pool-based available resources.
VM, he/she is privilegedto use his/herVM as
6. When auser talks to this functionalitiessuch as accessing the OSs,
with all
a physical server hard disk from the common pool.
CPU, memory, and serversbased on supported
multiple virtual
7. The hypervisorvirtualizes
architecture.
bundledwith an OS, CPU,hard disk, and memory.
8 Eachvirtualmachineis
2-20 E (CSTT-Sem-7) Cloud EnablingTechnologies
Virtualizationtechnologies: Two major types of technologies are
employedin server virtualization:
a. Hardware virtualization :
i. Hardware virtualizationis also known as hypervisor-based
virtualization,bare-metalhypervisor,type 1virtualization,or
simply hypervisor.
This virtualizationtechnologyhas a virtualizationlayer running
immediatelyon the hardwarewhichdividesthe servermachine
into several , virtual machines or partitions, with a guest OS
running in each of these machines.
i. The binarytransparencyis providedby avirtualizedapproach
and products enable the transparencyfor OSs, middleware,
and applications.
b. OS virtualization:
This type of server virtualizationis also known as OS-based
virtualization,OS-level virtualization,or type 2virtualization.
OS virtualization creates virtualization environments within a
single instanceof an 0S.
üi. Virtual environmentscreated by OS virtualizationare often
called 'containers'.
iv. Because all virtualizationenvironmentSmust share resources
of a single OS while having a privatevirtual OS environment,
a particularimplementationof the technology may alter the
file systemorientationand often introduceaccess restrictions
to globalsystem configurationor settings.
|Application |Application
Guest OS Guest OS
Application Hypervisor
Host OS
Hardware
Answer
Types of virtualization :
1. OS virtualization :
i Virtualizingan operatingsystem environmentis the most common
form of virtualization.
2-21 E (CSTT-Sem-7)
Cloud Computing
instances of an
ii. It involves putting a second instance or multiple
operatingsystem, like Windows,on a single machine.
physical
li. This empowers businesses to reduce the amount of
hardwarerequiredto run theirsoftwareby cuttingdown the number
of actual machines.
rack space,
ivIt saves companiescash on energy, cabling, hardware, of
and more, while still allowing them to run the same quantity
applications.
2. Application-servervirtualization:
Application-servervirtualizationis also referred to as 'advanced
servers
load balancing,'asit spreads applicationsacross serversand
across applications.
specific
This enables IT departments to balance the workload of
.
ii
software in an agile way that does not overload a specificserver or
underload a specific applicationin the event of a large project or
change.
ii. It also allows for easier managementof
servers and applications,
since we can manage them as a single instance.
3 Application virtualization :
Applicationvirtualizationoperates applicationon computersas if
on
they reside naturallyon the hard drive, but instead are running
a server.
storing
The abilityto use RAM and CPUto run the programswhile
terminal services and
them on a server, like through Microsoft are
cloud-basedsoftware,improves how softwaresecurityupdates
pushed, and how softwareis rolled out.
Administrative virtualization :
4.
least-known forms of
1.
Administrative virtualization is one of the
used in data
virtualization,likelydue to the fact that its primarily
centers.
'management,'virtualization
The concept of administration,or policies.
means segmentedadmin roles throughgroup and user
involves virtually
5. Network virtualization : Network virtualizationlike routing tables,
managing IPs, and is accomplishedthrough tools
NICs, switches,and VLAN tags.
Page 2-19E, Unit-2.
6 Hardware virtualization : Refer Q. 2.25,
7. Storage virtualization:
are managed by a
Storagevirtualizationis an array of servers that
virtual storage system.
where their data is stored.
The servers are not aware of exactly
level of virtualization.
Que 2.27. Explain the implementation
2-22 E (CSIT-Sem-7)
Cloud EnablingTechnologies
Answer
Various implementationlevel of virtualization:
1. InstructionSet
Architecture(ISA) level:
i. At the ISA level, virtualizationis performedby
ISAby the ISAof the host machine. emulatinga given
The basic emulationmethod is throughcode
üi. An interpreterprograminterpretsthe sourceinterpretation.
instructionsone by one. instructionsto target
iv. One source instruction may require
tens or hundreds of native
target instructionsto perform its function. This process is
slow. relatively
V For better performance,dynamic binary translationis
Vi. This approach translatesbasic blocks of dynamic
desired.
to target instructions. source instructions
Vi. The basic blocks can also be
extendedto program traces or super
blocks to increase translationefficiency.
vi. AVirtualInstructionSet
Architecture(V-ISA)thus requiresadding
a processor-specificsoftware
translationlayer to the compiler.
2. Hardware abstractionlevel:
It is performedright on top of the
bare hardware and generatesa
virtual hardware environmentfor a VM.
The idea is to virtualize a
computer's resources, such as its
processors, memory, and VO devices so as hardware utilization
rate by multiple users concurrentlymay be
3. Operating system level :
upgraded.
OS-level virtualizationcreates isolated containers on a
single
physical server and the OS instances to utilize the hardware
software in data centers. and
The containersbehave like real servers.
OS-levelvirtualizationis
commonly used in creatingvirtual hosting environmentsto allocate
hardwareresources among a large number of mutually distrusting
users.
5. User-application level :
Virtualizationat the applicationlevel virtualizesan applicationas a
VM.
On a traditionalOS, an applicationoften runs as a process.
iüi. Therefore, application-level virtualization is also known as
process-levelvirtualization.The most popularapproachis to deploy
High Level Language(HLL).
Applicationlevel
JVM/.NET
WINEVisual MainWin
Operatingsystem level
Virtual Environment/FVM
Bochs/BIRD/Dynamo
Fig. 2.27.1.
PART-4
Questions-Answers
Long Answer Type and Medium Answer Type Questions
XonoLinux XonoWindows
Domain 0
XEN (Hypervisor)
Hardware devices
Fig. 2.29.1.
with fll
Que 2.30. Write a short note on binary translation
virtualization.
OR
Describe host-based virtualization.
2-26 E (CSIT-Sem-7) Cloud EnablingTechnologies
Answer
Binary translationwith full virtualization:
1. Full virtualization:
i. With fullvirtualization,non-criticalinstructionsrun on the hardware
directlywhile criticalinstructionsare discoveredand replacedwith
traps intothe VMM tobe emulated by software.
Both the hypervisor and VMM approaches are considered full
virtualization.
ii. Critical instructionsare trapped into the VMM because binary
translationcan incur a large performanceoverhead.
iv. Non-critical instructions do not control hardware or threaten the
securityof the system, but criticalinstructionsdo.
V.
Therefore,runningnon-criticalinstructionson hardwarenot only
can promote efficiency,but also can ensure system security.
2. Binary translation of guest OS requests using a VMM:
i. VMware puts the VMM at Ring 0 and the guest OS at Ring 1.
: The VMM scans the instructionstream and identifiesthe
privileged,
control and behaviour sensitive instructions.
üi. When these instructionsare identified,they are trapped into the
VMM, which emulates the behaviour of these instructions.The
method used in this emulationis called binary translation.
iv. Full virtualizationcombines binary translationand direct
execution.
The guest OS is completely decoupled from the underlying
hardware.Consequently,the guest OS is unaware that it is being
virtualized.
Fig. 2.30.1.
Cloud Computing 2-27 E (CSIT-Sem-7)
Host-based virtualization:
An alternativeVM architectureis to install a virtualizationlayer on
top of the host OS. This host OS is still responsiblefor managing
the hardware.
ii. The guest OS are installed and run on top of the virtualization
layer.
ii. Dedicatedapplicationsmay run on the VMs. Certainly,some other
applicationscan also run with the host OS directly.
iv. Advantagesof host- basedarchitecture:
a.
The user can install the VM architecture without modifying
the host OS. The virtualizingsoftwarecan rely on the host OS
services.This will
to provide device drivers and other low-level
simplifythe VM design and ease its deployment.
b The host-based approach appeals to many host machine
configurations.Comparedto the hypervisor/VMMarchitecture,
the performanceof the host-based architecturemay also be
low.
Application Application
Para-virtualized Para-virtualized
guest operating guest operating
system system
Hypervisor/VMM
Hardware
Fig. 2.31,1.
1
Para-virtualizationneeds to modify the guest operatingsystems.
substantialOS
2 Apara-virtualizedVM provides special API requiring
modificationsin user applications.
machine
3 The virtualizationlayer can be insertedat differentpositionsin a
software stack.
4 Para-virtualizationattemptstoreduce the virtualizationoverhead,and
kernel.
thus improve performanceby modifyingonly the guest OS
5 The guest operatingsystems are para-virtualized. They are assisted by
OS instructions
non-virtualizable
an intelligentcompilerto replace the
by hypercalls.
2-28 E (CSIT-Sem-7)
Cloud EnablingTechnologies
6 The traditionalX86 processoroffers four instructionexecution rings:
Rings 0, 1, 2, and 3.
7. The lower the ring number, the higher the privilege of instructionbeing
executed.
8. The OS is responsiblefor managing the hardware and the privileged
instructionsto execute at Ring 0, while user-level applicationsrun at
Ring 3.
Ring 3 User Apps
Ring 2 Direct
execution
of user
Ring 1
requests
Paravirtualized
Ring 0 Guest OS
Hypercallsto the
Virtualizationlayer virtualization
layer replace
non-virtualizable
Host computer OSinstructions
system hardware
Fig. 2.31.1.
6. Xen :
i Xen is a best Linux hypervisors.
i.
The Xen hypervisoris inserted betweenthe server'shardwareand
the operatingsystem.
iü. This createsan abstractionlayer that allows multipleguest operating
systems to be concurrentlyexecutedon a single physical server.
iv. Xen is includedwith most popular Linux distributionslike Fedora,
RHEL,CentOS, Ubuntu, and Debian.
Answer
1 CPUvirtualizationis a hardwarefeaturethat allows a single processor
to act as ifit was multipleindividualCPUs.
2-30 E (CSIT-Sem-7)
Cloud EnablingTechnologies
2 This allows an operatingsystem to effectively&efficientlyutilize the
CPU powerin the computer.
3 CPUvirtualizationgoes by different names depending on the CPU
manufacturer.
4 For Intel CPUs, this feature is called Intel Virtualization
Intel VT, and with AMD CPUs it is called AMD-V. RegardlessTechnology,or
of what it
is called, each virtualizationtechnology provides generally the
features and benefitsto the operatingsystem. same
5 CPUvirtualizationis disabled by default in the BIOS and needs to be
enabled in order for an operatingsystem to take advantageof it.
6 CPUvirtualizationinvolves a single CPUacting as if it were multiple
separateCPUs. The most common reason for doing this is to run multiple
different operatingsystems on one machine.
7. CPUvirtualizationemphasizesperformanceand runs directly on the
dvailable CPUs whenever possible.
8 The underlyingphysicalresources are used wheneverpossible and the
virtualizationlayer runs instructionsonly as needed to make virtual
machinesoperate as ifthey were runningdirectlyon a physical machine.
Que 2.34. Describe memory virtualizationin cloud computing.
Answer
1. MemoryvirtualizationdecouplesvolatileRandom Access Memory (RAM)
resourcesfrom individualsystemsin the data center, and then aggregates
those resourcesinto a virtualizedmemory pool availableto any computer
in the cluster.
2 The memory pool is accessed by the operating system or applications
running on top of the operatingsystem.
3 The distributedmemory pool can then be utilizedas a high-speedcache,
a messaginglayer, or a large shared memory resourcefor a CPU.
4 Memoryvirtualizationallows networkedand distributed,serversto share
a pool of memory to overcome physical memory limitations,a common
bottleneckin software performance.
5 With this capabilityintegratedinto the network, applicationscan take
advantage of a very large amount of memory to improve overall
performance,system utilization,increase memory usage eficiency,and
enable new use cases.
6 Memory virtualizationimplementationsare distinguishedfrom shared
memory systems.
7 Shared memory systems do not permit abstractionof memory resources,
thus requiringimplementationwith a single operatingsystem instance
(i.e., not within a clusteredapplicationenvironment).
Cloud Computing 2-31 E (CSIT-Sem-7)
Answer
1 In VO virtualization,a virtual device is substituted for itsphysical
equivalent,such as a Network InterfaceCard (NIC) or Host Bus Adapter
(HBA).
setup
2 Aside from simplifyingserver configurations,/O virtualization
devices.
has cost implicationsby reducingthe electricpower drawn by I/O
3
Virtualizationand blade server technologiescram dense computingpower
centers
into a small form factor. With the advent of virtualization,dataas burst
started using commodityhardware to support functions such
computing,load balancingand multi-tenantnetworkedstorage.
4
JOvirtualizationis based on a one-to-manyapproach.The path between
a physical server and nearby peripheralsis virtualized,
allowinga single
IT resource tobe shared among Virtual Machines (VMs).
5 The virtualizeddevices interoperatewith commonly used applications,
operatingsystemsand hypervisors.
2-32 E (CSIT-Sem-7) Cloud EnablingTechnologies
6 This techniquecan be applied to any server component,including disk
based RAID controllers,Ethernet NICs, Fibre Channel HBAs,graphics
cards and internallyznountedSolid-StateDrives (SSDs). For example, a
single physical NIC is presentedas a series of multiplevirtual NICs.
Que 2.37 Describe virtualizationsupport.
Answer
1 With the help of VM technology,a new computingmode known as cloud
computingis emerging.Cloud computingis transformingthe computing
landscapeby sharingthe hardwareand costs of managinga computational
center to third parties,just like bankS.
2 Cloud computinghas atleast two challenges:
The ability to use a variable number of physicalmachines and VM
instancesdependingon the needs of a problem. For example, a task
may need only a single CPU during some phases of executionbut
may need hundreds of CPUs at other times ?
The slow operationof instantiatingnew VMs. Currently,new VMs
originate either as fresh boots or as replicatesof a template VM,
unaware of the current applicationstate. Therefore, to support
cloud computing,a large amount of researchand developmentis to
be done.
CONTENTS
Part-1 : Layered Cloud Architecture ........... 3-2E to 3-6E
Design, NIST Cloud Computing
Reference Architecture
31E(CNIT-Sem-7)
3-2E (CSIT-Sem-7)
Cloud Architecture,Services&Storage
PART- 1
Questions-Answers
Questions
Long Answer Type and Medium Answer Type
Answer
Layered architecture of acloud:
Applicationlayer
Platformslayer
(Software framework)
Infrastructure layer
(Storages,virtual machine)
Datacenter layer
1. Application layer :
used by
a. This layer consists of different cloud services which are
cloud users.
b These applicationsprovide services to the end user as per their
requirements.
2. Platform layer :
a. This layer consistsof applicationsoftware and operatingsystem.
b. The objectiveof this layer is to deploy applicationsdirectlyon the
virtual machines.
Cloud Computing 3-3E(CNIT-Sem-7)
3. Infrastrueturelayer :
Itin avirtualizationlayer where physicalresourcesare
into set of virtual resources through different partitioned
virtualization
technologiessuch as Xen,KVM andVMware.
This layer is the core of thecloud environmentwhere cloud resources
nre dynamically provisioned using different
technologies. virtualization
4. Datacenterlayer :
This layer is accountablefor managing physical resourcessuch as
Nervers, Nwitches,routers, power supply, and
in the datacenter of the cloud environment. cooling system et.,
b All the resources are available and managed in
datacenters to
provide Nervices to the end user.
The dataconter consists of physical servers, connected through
high speed deviceN such as router and gwitches.
Que 3.2. Describe briefly NIST cloud computing reference
architecture.
Answer
NIST cloud computingarchitecture:
Cloud
consumer
Cloud carrier
1. Cloud consumer :
Acloud consumer is the end user who browses or utilizes the
services provided by Cloud Service Providers(CSP),sets up service
contractswith the cloud provider.
In this, set of organizationshaving mutual
performs a securityand risk assessment forregulatory constraints
cach use case of cloud
migrationsand deployments.
i. Cloudconsumersuse Service-LevelAgreement (SLAs) to
the technicalperformance requirementsto be specify
provider. fulfilled by a cloud
iv. SLAs can cover terms concerningthe
and remedies for performancefailures.quality service, security,
of
34E (CSIT-Sem-7) Cloud Architecture,Services&Storage
2. Cloud auditor :
Cloud auditoris an entity that can conductindependentassessment
of cloud services, security,performanceand informationsystem
operationsof the cloud implementations.
i. The services that are provided by Cloud Service Providers(CSP)
can be evaluated by service auditors in terms of privacy impact,
securitycontrol and performance,etc.
iü. Cloud Auditor can make assessment of the securitycontrolsin the
informationsystem to determinethe extent to which the controls
are implementedcorrectly,operatingas planned and constructing
necessities
the desiredoutcome with respect to meeting the security
for the system.
auditor :
iv. There are three major roles of cloud
a. Securityaudit
b Privacyimpactaudit
C.
Performance audit
3. Cloud service providers :
servicesto cloud consumers
i It is a group or object that delivers cloud
or end users.
variety of cloud services
.H
It offers consumersto purchasea growing
from cloud service providers.
cloud-based services:
ii. There are various categoriesof
providers
a. laaS providers : In this model, the cloud service
in an on
offer infrastructure components that would exist servers,
premises datacenter. These compcnents consist of
networkingand storageas well as the virtualizationlayer.
Software-as-a-Service(SaaS), vendors
b. SaaS providers : In technologies,such as
provide a wide sequence of business Customer
Human Resources Management(HRM)software,which the
all
RelationshipManagement(CRM) software, internet. of
SaaS vendor hosts and provide servicesthrough
(PaaS), vend
C. PaaS providers : In Platform-as-a-Service
offer cloud infrastructure and services that can access to
products are
perform many functions. In PaaS, services andprovidersoffer
mostly utilizedin softwaredevelopment.PaaS
providers provide
more services than laaS providers. PaaS applicationstack,
operatingsystemand middlewarealong with
tothe underlyinginfrastructure.
4. Cloudbroker: performance,use and
An organizationor a unit that manages the
deliveryof cloud servicesby enhancingspecificcapabilityand offers
the value-added services to cloudconsumers.
into one or more new
It combines and integrates various services
services.
Cloud Computing 3-5 E (CSIT-Sem-7)
SaaS
Paas Middlewarelayer
Operating system
layer
Cloud provider
Fig. 3.3.1. Scope of controls between provider and consumer.
3. The application layer includes software applications targeted at end
users or programs.
4 The applicationsare used by SaaS consumers, or installed/managed/
maintainedby PaaS consumers,IaaS consumers,and SaaS providers.
5. The middlewarelayer provides software building blocks (for example,
ibraries,database, and Java Virtual Machine) for
software in the cloud. The middleware is useddevelcping application
by PaaS consumers,
installed/managed/maintainedby laaS consumers or PaaS providers,
and hidden fromn SaaS consumers.
3-6E (CSIT-Sem-7) Cloud Architecture,Services&Storage
PART-2
Questions-Answers
Answer
Public cloud is a cloud in which the cloud infrastructure and computing
1
network.
resourcesare made availableto the general public over a public
Publiccloud offers resource pooling, self-service,service accounting,
2
elasticity, multi-tenancyto manage the solutions, deployment, and
securingthe resourcesand applications.
Public cloud
Cloud
iv. In this case, it is more important for the providers to test their
disaster recovery option as they are heavily tied with SLAB and
penalties.
V At the same time, organizationas a consumer should als0 check
and test the disaster recoveryoptionswith mock drills of fail over.
6. Physical security:Physicalthreatsare also importantto be analyzed
when optingfor cloud servicesfrom a provider.There are various points
to be analyzed:
i. Whether allthe facilitiesof the cloud providerhave the same level
of security?
ii Is it possiblethat only one site is secured and there is no information
availablefor the data residency?
iüi. Whether datacenteris having all the necessary physical security
componentssuch as biometricaccess, surveillancecameras, logbook,
escorts, and automatic alarms ?
7. Regulations :
i If any of the service provider says that they never had a security
issue, it means they are either misleading or not aware of the
consequencesof the incidents.
i. So, all cloud service providersshould have a special task force for
any incidentresponsebased on the policiesand regulations.
ii. These policies should be shared with the end customersalso.
8. Programming conventions :
1. Whether it is IaaS, SaaS, or PaaS, cloud providersstill use their
own softwarethat may be prone to securitythreats and bugs.
It is recommended to the cloud providers to use the secure coding
and programmingpractices.It should be based on standardsthat
are well documented,reviewed, accepted, and adhered.
9. Data control :
Today in the securitydomain,an organization'sgreatestrisk is daa
and information control.
All governments and corporate organizationshave laid down
compliancesand regulationsto handle the situation.
i. Therefore,the cloud service providershould be able to adhere to
the guidelineslaid by the region or agency.
iv. The cloud provider should own the policies to meet the regulation
and compliances.
V. There should be strong encryption mechanism for the in-flight
data.
Answer
Advantages of publiccloud:
1. Flexible
2 Reliable
3 High scalable
4 Low cost
5. Place independence
Disadvantages of publiccloud:
1 Less secured
2 Poor customizable
Answer
1 Private clouds are deploymentsmade inside the company'sfirewall (on
premise datacenters)and traditionallyrun by on-site servers.
2. Private clouds offer some of the benefits of a public cloud computing
environment, such as elastic on-demand capacity, self-service
provisioning,and service-basedaccess.
3 Private cloud is suitable when the traditional requirements,such as
control,security,and resiliency,are more emphasizedby an organization
with the restrictedand designateduser access and authorization.
Servicesin private cloud:
1. Virtualization
2 Governmentand management
3. Multi-tenancy
4 Consistentdeployment
5. Chargebackand pricing
6 Security and access control
Benefits of using private clouds :
1. Eliminatingcapital expensesand operatingcosts :
Ownership of the hardware or software eliminatesthe pay-per
use potential,as these must be upfront purchases.
The full cost of operations must be shouldered as there is no
elasticity.
iüi. If the privatecloud hardwareis sized for peak loads, there will be
inefficientexcesscapacity.
iv. Otherwise,the owner will face complex procurementcycles.
Cloud Computing 3-11 E (CSIT-Sem-7)
2. Removing undifferentiatedheavy lifting by offloading data
center operations:
i Utilitypricing(for lower capitalexpenses and
operatingexpenses)
usually implies an outside vendor offeringon-demand
. It relies on the economiesof services.
of resources. multipletenantssharinga larger pool
ii. These highercosts might be justifiedif the
easier self-serviceprovisioningand benefitsof quicker and
service-orientedaccess are large.
Que 3.8. What are the types of
private cloud ?
Answer
Types of private cloud :
1. Shared privatecloud:
a. This is a shared compute capacitywith variable
to business units that are based on usage-basedpricing
service offerings,accounts data
centers.
b. It requiresan internalprofit centerto take over or buy
made available throughaccount consolidations. infrastructure
2 Dedicatedprivatecloud:
a
Dedicated private cloud has IT service catalog with dynamic
provisioning.
b. It depends on standardized
Service-OrientedArchitecture(SOA)
assetsthat can be broadlydeployed into new and existingaccounts
and is a lower-cost model.
3. Dynamic private cloud:
a Dynamic private cloud allows client workloads to dynamically
migrate from and to the compute cloud as needed.
b This model can be shared and dedicated.
C It delivers the ultimate value of clouds.
d This is a very low-managementmodel with reliable SLAs and
scalability.
Que 3.9. Write down the advantagesand disadvantagesof private
cloud.
Answer
Advantagesof private cloud :
1. Highly privateand secured:Privatecloud resource
secured.
sharing is highly
3-12 E (CSIT-Sem-7) Cloud Architecture,Services&Storage
Answer
1. Ahybrid cloud is a combinationof an interoperatingpublic and private
cloud.
2
This is the model where consumer takes the non-critical application or
informationand compute requirementsto the public cloud while keeping
all the criticalinformationand applicationdata in control.
3 The hybrid model is used by both public and private clouds
simultaneously.
4.
It is an intermediatestep in the evolutionprocess,providingbusinesses
on-ramp from their current IT environment into the cloud.
5. It offers the best of both cloud worlds- the scale and convenienceof a
public cloud and the control and reliabilityof on-premisessoftwareand
infrastructure- and let them move fluidly between the two on the basis
of their needs.
6 This model allows the following:
a Elasticityis the ability to scale capacity up or down within minutes,
without owning the capital expenseof the hardwareor datacenter.
b. Pay-as-you-gopricing.
C.
Network isolation and secure connectivityas if all the resources
were ina privately owned datacenter.
d. Graduallymove to the public cloud configuration,replicatean entire
datacenter, or move anywhere in between.
Cloud Computing 3-13 E (CSIT-Sem-7)
'Community
cloud
Private cloud
Public cloud
Answer
Advantages of hybridcloud:
1. Flexible 2. Secure
3 Cost effective 4. Scalable
Disadvantagesof hybrid cloud:
1 Complexnetworkingproblem
2. Organization'ssecuritycompliance
Que 3.13. Differentiate betweenpublic,private,hybridcloud.
Answer
PART-3
Questions-Answers
LongAnswerType and MediumAnswerTypeQuestions
Cloud Computing 3-15 E (CS/IT-Sem-7)
Load balancer
VM VM VM VM VM VM
laaS
VirtualizationLayer
7. With laaS, one can configure the required resources as per the
requirement and the user can increase or decrease capacity within
minutes.
8 We can ask for one, hundreds or even thousands of server instances
simultaneouslyas per our computingneed. Good serviceproviderensures
99.99% availabilityof the servicewthin aregionover atrailing365 day
period.
9 The laaS service provider ensures that the infrastructural needs of the
virtual machine are continuouslymet. With the quick availabilityof
laaS and infrastructuredeliveredas a service, it frees the organization
to focus their time and resourcesin bringinginnovationsin applications
and solutions.
10. However, it is the responsibilityof the user to invest on the operating
system and applicationsoftware.
Que 3.15. What are the advantages and disadvantages of IaaS ?
Answer
Advantages of IaaS:
1. Allows IT to shift focus: With the quick availability of laaSservices,
infrastructure delivered as a service (ready to consume), it frees an
organizationto leverage and focus their time and resourcesin bringing
innovationsin applicationsand solutions.
2 Hassle free service:
i Each infrastructure componentis provided as a service.
For example, hardware as a service, server as a service, computing
as a service, storage as a service.
iüü. This adds lot offlexibilityto anyone lookingfor only specificservices.
iv. Some require more computing power and others more storage.
3 Utility service:
laaS follows a utility service model - pay per-use/pay per-go
subscriptionbased model.
i. Availabilityof ready to go laaS offerings with limited time for
implementationand customization(if provided).
iüi. This is hallmark of cloudservices.
4. Dynamie scaling:
Scales up and down of infrastructure services based on the
application usage, best for the applications where there are
significantspikes and troughs on the usage of infrastructures.
This again is one of the pillars of cloud computingservices.
Cloud Computing 3-17 E (CSIT-Sem-7)
4. Tata communications :
Its solutionis InstaCompute.
InstaComputeis TataCommunicationslaaS offering.InstaCompute
datacenters are located in Hyderabad and Singapore, with
operationsin both countries.
Load balancer
PaaS
Virtualizationlayer
Developmentplatform
Fig. 3.17.1. PaaS.
Cloud Computing -19 E(CNIT-Sem-7)
3. Peatures of PaaS:
Operatingsystem
ii. Server-sidescriptingenvironment
ii. Database managementsystem
iv. Server software
v. Support
vi. Storage
vii. INetwork access
vii. Tools for design and development
ix. Hosting
Disadvantages of PaaS:
1 Developers maynot be able to use a full range of conventionaltools (for
example, relationaldatabaseswitn unrestrictedjoins).
2 It locked into a certain platform. However, most PaaS are relatively
lock-in free.
4. Cloud services :
a PaaS provide developersand architectswith servicesand APls that
help to simplify the job of delivering elasticallyscalable, highly
availablecloud applications.
b These cloud services provide a wide variety of capabilitieskey
differentiatorsamong competingPaaS oferings.
Que 3.20. Write down the vendors of PaaS cloud computing
platform.
Answer
Vendors providingPaaS cloud computingplatform:
1 Google Apps Engine (GAE)
2 SalesForce.com
3 Windows Azure
4. AppFog
5. Openshift
6. Cloud foundry from VMware
Cloud Computing 3-21 E (CSIT-Sem-7)
Answer
1.
SaaS (Software-as-a-Service)is an applicationhosted on a remote server
and accessed through the internet.
2.
SaaS is the web-based e-mail service offered by companies such as
Microsoft(Hotmail),Coogle (Gmail), and Yahoo! (Yahoo Mail).
3.
Each mail servicemeets the basic criteria,the vendor (Microsoft,Yahoo,
and so on) hosts all of the programs and data in a central location,
is
providing end users with access to the data and software, which
accessed across the World Wide Web.
SaaS application delivered to client
Answer
Vendor advantages of SaaS:
1. SaaS not only does the end user benefit, but so does the vendor.
(They are in the business to make money, so there is at least that
benefit. )
2. Financial benefit is vendors get a constant stream of income, often what
is more than the traditional software licensing setup.
3
Vendors can fond off piracy concerns and unlicensed use of software.
4.
Vendors also benefit more as more subscribers come online.
5 They have a huge investmentin physical space, hardware, technology
staff, and process development.
provider can
6 The more resources are used to capacity, the more the
clear as margin.
Limitations of SaaS:
1
Technical obstacles to SaaS have included an effective,multi-tenant
architecture. This has become less and less of a problem due to
virtualization,but designing an applicationto efficientlydeliver it to
thousands of customers via the internet is hard work.
2 Software companiesare being asked to become service companies,and
the two do not necessarilymesh well.
3 They tend to have a corporateculture that is dominatedby engineering
innovation and a license-sales mindset. These are fine traits to have if
we are writingprograms and applications,but it is not the best when we
are called upon for customer service.
4 Further, a business model that is built on selling licensedsoftwaredoes
not easily transform into a subscriptionmodel very cleanly. Not only
does the vendor face challenges,but so does the customer.
5 While some applications are ideal for SaaS, others are not good to use
employingan SaaS model.
Que 3.26. Write a short note on driving forces of SaaS.
A
Cloud Computing 3-25 E (CSIT-Sem-7)
Answe:
Drivingforces of SaaS are:
1. Popularity :
1. SaaS has become big buzz in the already buzzy issue of cloud
computing.
SaaS is becoming trendy, because of its a number of factors. But
there are solid reasonsother than type that make it so popular.
2. Plenty of SaaS platforms:
i. There are many SaaS platformswhich grow each rapidly.
ii For example, Oracle is developingits own SaaS platform while
Microsoftis workingtomake their own applicationsSaaS ready.
ii. As SaaS becomes more and more popular, more vendors are going
to be forced to make their platformsSaaS-friendlyfor SaaS-based
applications.
iv. Anotherreason SaaS platformswill continueto grow is becauseof
the interest in Green IT and the effortsto move toward virtualized
infrastructure.
V That means clients are likely to move toward SaaS platformsso
they can reduce the number of servers.
3. Virtualization benefits:
Virtualizationmakes it easy to move to a SaaS system.
It is easierfor IndependentSoftwareVendors(ISVs) to adopt SaaS
is the growthof virtualization.
ii. The growingpopularityof some SaaS vendors using Amazon'sEC2
cloud platformand the overall popularityof virtualizedplatforms
help with the developmentof SaaS.
4. SaaS and SOA:
AService-OrientedArchitecture(SOA) is one in which IT supports
the business processes that cover current and emerging
requirements to run the business end-to-end.
This ranges from Electronic Data Interchange (EDI) to online
auctions.By updatingolder technologieslike Internet-enablingEDI
based systems companiescan make their IT systems availableto
internal or external customers.
iii. SOA unifiesbusinessprocessesby structuringlarge applicationsas
a collection of smaller modules known as services.
iv. SOA presentsa design frameworkfor realizingrapid and low-cost
systemdevelopmentand improvingtotal system quality.SaaS and
SOA are quite similar;what they have in common is that they use
a service model.
5. Economic impact :
i. Many industry observers think conventionalISVs will have a
tougher time than SaaS vendors.
3-26 E (CSIT-Senm-7) Cloud Architecture,Services&Storage
machines,virtual deploymenttoolsfor
storage etc. applications.
4 It is used by It is used by It is used by end users.
network developers.
architects.
PART-4
Questions-Answers
Long Answer Type and Medium Answer Type Questions
CloudComputing 3-27 E (CSIT-Sem-7)
Answer
Cloud architectural design challenges:
1. Service availabilityand data lock-in problem.
2. Data privacy and securityconcerns.
3. Unpredictableperformanceand bottlenecks.
4. Distributedstorage and widespreadsoftware bugs.
5 Cloudscalability,interoperability,and standardization
6 Softwarelicensingand reputationsharing.
Que 3.29. Write a short note on storage.
Answer
1. The necessary storage is provided and configured in much the same
way as the computingresources.IP-basedstorage systems are deployed.
2. To reduce hardware configurationeffort, the computingsystems use
direct-attachedstorage. Using Fiber-Channel(FC) cards in the servers
and deploying an FC network increases overall system complexity
substantially.The IP storagesystems are linked via Giga-bitEthernet.
Backup
integrate
Data storage Application OS Archive
Backup
DC 1 DC2
DWDM
Mirror
Fig. 3.29.1. Storageresource : backup-integrated,
read-only and archive storage.
3 Storage is automaticallyallocatedto the server systems that require it.
Storage resourcesare located in different fire zones as well as in
differentdatacenters,preventingdata loss in the event of a disaster.
3-28 E (CSIT-Sem-7) Cloud Architecture,Services& Storage
Answer
the cloud,
1 Cloud storage is defined as the storage of data online in multiple
wherein a company's data is stored in and accessible from
distributed and connectedresourcesthat comprisea cloud.
2 Cloud storage can provide the benefits of greater accessibilityand
reliability,rapid deployment,strong protectionfor data backup,archival
and disaster recovery purposes, and lower overall storage costs as a
result of not having to purchase, manage and maintain expensive
hardware.
3
Cloud storage does have the potential for security and compliance
concernsthat are not associatedwith traditionalstorage systems.
Cloud Computing 3-29 E (CSTT-Sem-7)
Answer
1 Storage-as-aService (SaaS) is abusinessmodel in which alarge company
rents space in their storage infrastructureto a smaller company or
individual.
2 In the enterprise, SaaS vendors are targeting
applicationsby promotingSaaS as a convenientway secondary storage
to manage backups.
3 The key advantage to SaaS in the enterprise is in cost
savings, in
personnel, in hardware and in physical storage space.
4 Storage-as-a-Serviceis generallyseen as a good alternativefor a small
or mid-sized business that lacks the capital budget
personnelto implementand maintaintheir own storageand/or technical
infrastructure.
3-30 E (CSIT-Sem-7) Cloud Architecture,Services&Storage
5. SaaS is also being promotedas a way for all businessesto mitigate risks
enhance
in disasterrecovery,providelong-termretentionfor recordsand
both businesscontinuityand availability.
Answer
Challengesfaced by thecloud serviceproviders:
1. Data corruption : Cloud serviceswhich host consumerdata are usually
burdenedwith the responsibilityof ensuringthe integrityand availability
of these data, dependingon the subscribedservice level.
2. Logical security : In terms of informationsecurity, an appropriate
control of logical securityshould be adopted by the producer to ensure
adequate confidentiality(i.e., data and transactionsare open only to
those who are authorized to view or access them).
3. Data interoperability:Producer should follow the interoperability
standards in order for the consumers to be able to combine any of the
cloud services into their solutions.
4. Software vulnerabilityand breaches : There are occasions when
the public community discovers vulnerabilitiesof specific software,
middleware,web services,or other networkservicescomponentsin the
3-32 E (CIT-Sem-7) Cloud Architecture,Services&Storage
CONTENTS
Part-1 : Inter Cloud Resource 4-2E to 4-6E
Management
Part-2 : Resource Provisioning and 4-6E to 4-9E
Resource Provisioning Methods
Part-3 : Global Exchange of ...4-9E to 4-10E
Cloud Resources
4-1 E (CSIT-Sem-7)
4-2 E (CSIT-Sem-7) Resource Management& Securityin Cloud
PART- 1
Questions-Answers
Questions
Long Answer Type and Medium Answer Type
Answer
networks,includingpublic,
1 Inter cloud is the conceptof connectedcloud
private,and hybrid clouds.
are put togetherto
2 It incorporatesa number of technologyefforts that networks.
improveinteroperabilityand portabilityamong cloud terms
cloud networks. The
3 The goal was to improve interoperabilityof
this concept.
inter cloud computingand intercloudwere used to address
platformsand
Inter cloud is used to connect differentcloud computingdatacenters
4. or
allows the data and applicationsto be ported between
cloud services.
service
5. The main focus is on direct interoperabilitybetween public cloud
providers.
interconnectedclouds
6 To provide cloud services as utility successfully, factors
important
are requiredand interoperabilityand portabilityare
in inter cloud.
resource.
7. The limitationsof cloud are that they have limited physical
Explain the types of inter cloud resource management.
Que 4.2.
Answer
Types of inter cloud resource management are:
1. Federation clouds :
providers
i A federation cloud is an inter cloud where a set of cloud
willinglyinterconnecttheir cloud infrastructuresin order to share
resources among each other.
i.
The cloud providers in the federation voluntarily collaborate to
exchange resources.
ii. This type of inter cloud is suitablefor collaborationof governmental
clouds (Clouds owned and utilized by non-profit institution or
government)or private cloud portfolios(Cloud is a part of aportfolio
of clouds where the clouds belong to the same organization).
Cloud Computing 43E (CIT-Sem-7)
4. Integrationand interoperability:
i. Sensitive data in an enterprise also may not be migrated to the
cloud for securityreasons and privacy.
Aneed related to integrationand interoperabilityarises between
identity
assets on premisesand the cloud services.Issues related to
management, data management, and business process
orchestrationneed to be resolved.
5. Scalable monitoring of system components :
distributed but the
The components in a federated system are
techniques employed for system monitoring and managing use
centralizedapproaches.
arising
Due to concerns of scalability,performanceand reliability
volume
from the managementof multiple service queues and large and
of service requests,centralizedapproaches are not suitable
architectures using service monitoringand management services
based on decentralizedmessagingand indexingmodels are needed.
Que 4.4. Describe the topologies used in inter cloud architecture.
Answer
Topologiesused in inter cloudarchitectures:
1. Peer-to-peer inter cloud federation :
i. Clouds collaboratedirectlywith each other but may use distributed
entities for directoriesor brokering.
ii Clouds communicatewith each other and negotiatedirectlywithout
mediators.
iüi. The inter cloud projects that use Peer-to-Peer federation are
RESERVOIR (Resources and Services Virtualization without
BarriersProject).
Centralized inter cloud federation:
Clouds use a central entity to performor faciitateresourcesharing.
The centralentity acts as a storehousewhere the available cloud
resourcesare registered.
iüi. The inter cloud projectsthat use centralizedinter cloud federation
are inter cloud, Dynamic Cloud Collaboration(DCC) and federated
cloud management.
3. Multi-cloud service :
i Clientsaccess multipleclouds throughaservice.
Aservice is hosted by the cloud client either externallyor in-house.
ii. The services contain broker components.
45E (CSIT-Sem-7)
Cloud Computing
servicesare OPTIMIS,
iv. The intercloud projectsthat use multi-cloud cloud management
contrail,MOSAIC, STRATOS and commercial
systems.
4. Multi-cloud libraries :
as a
1 Clients develop their own brokers by using a unified cloud API
library. in a
i. Inter clouds that use libraries facilitate the usage of clouds
uniform way.
ii. Examplesof SeveralMulti-cloudLibrariesare Java library
J-clouds,
Python library Apache Lib-Clouds, Ruby library Apache Delta
Cloud.
Que 4.5. Explain the extended cloud computingservices.
Answer
1 Fig. 4.5.1 shows six layers of cloud services ranging from hardware,
network, and collocation to infrastructure, platform, and software
applications.
Cloud application(SaaS)
Cloud softwareenvironment(PaaS)
Cloud software infrastructure
Computational Storage Communications
resources (IaaS) (DaaS) (CaaS)
Answer
1 Table 4.6.1,shows that cloud players are divided into three classes :
a Cloud serviceprovidersand IT administrators.
b. Software developersor vendors.
C End users or business users.
and SaaS
2 These cloud players vary in their roles under the IaaS, PaaS
models.
viewed by
3 The table entries distinguish the three cloud models as
different players.
a
4 From the software vendors perspective,applicationperformanceon
given cloud platform is most important.
performanceis the
5 From the providerperspective,cloud infrastructure
primary concern.
security,
6 From the end users perspective,the quality of services,including
is the most important.
vendors and
Table 4.6.1. Cloud difference in perspectives of providers,
users.
PaaS SaaS
Cloud Players IaaS
Monitor SLAs and enable Monitor SLAs and
IT administration/ Monitor SLAs
service platforms deploy software
cloud providers
To deploy and store Enabling platforms via Develop and deploy
Software developers configuratorsand APls software
(vendors) data
PART-2
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
Types of resource provisioning:
1. Static provisioning:
For applicationsthat have predictableand generaly unchanging
demands workloadswe use static provisioningeffectively.
ii. With advance provisioning,the customercontractswith the provider
for services and the providerprepares the appropriateresources in
advance of start of service.
ii. The customer is charged a flat fee or is billed on a monthly basis.
2. Dynamic provisioning:
i. In cases where demand by applicationsmay change
orvary, dynamic
provisioningtechniqueshave been suggested whereby VTls may
be migrated on-the-flyto new compute nodes within the cloud.
ii With dynamic provisioning,the providerallocates more
as they are needed and removes them when they resources
are not. The
customer is billed on a pay-per-use basis. When dynamic
4-8E (CSIT-Semn-7) Resource Management&Securityin Cloud
Answer
Parameters used for resource provisioning are :
i. Response time :The resource provisioningalgorithmdesigned must
take minimal time to respond when executingthe task.
be
ii. Minimize cost : From the cloud user point of view cost should
minimized.
cloud service
iii. Revenue maximization: This is to be achieved from the
provider'sview.
provide service in
iv. Fault tolerance: The algorithmnshould continueto
spite of failure of nodes.
V. Reduced SLA violation : The algorithm designed must be able to
reduce SILA violation.
migration
vi. Reduced power consumption : VM placement and
techniquesmust have lower power consumption.
Que 4.10. Describethe resource provisioning methods.
Answer
PART-3
Questions-Answers
Answer
Various market-orientedtechniquesare:
1. Aneka:
i. Aneka is implied in Platform-as-a-Servicetype and offers platform
in cloud computingto its users making it convenientfor them to
create and deploy applications.
Its unique feature is its flexibledesign and customizationcapability
that allows it to target differentapplicationscenarios.
2. Workflowengine :
in
i. The Workflow Management System (WMS) assists users
representingtheir applicationsas a workflow.
from higher
i. It then executesthese workflowson the cloud platform
level of abstraction.
editor that allows for
ii. The WMS provisionsan easy to use workflow
applicationcomposition.
3. MetaCDN:
low cost
i MetaCDNcreatesan integratedoverlaynetworkat a verymultiple
offered by
by exploitingstorage cloud resources being
laaS vendors.
with multiplestorage
It eradicatesthe difficultyarose due to dealing
providers.
4. CloudSim :
to the users that enable
i The CloudSimtoolkitoffersan environment
clouds.
extensible
them to model and simulate
applicationsexecuted.
iü. They offersplatformwhere user can get theirallows extension and
customizable tool that
iii. It is a complete stack.
descriptionof policiesin the software
5. Resource management :
is considered as an
Resource management in cloud computing utilizationof available
important aspect as it leads to proper optimum computing
resources for making a cloud as an
environment.
management falls under various
ii. The taxonomy of resource SLA-aware, market-oriented,
categoriessuch as energy-aware,
cloud computing.
load balanced,hybridcloud and mobile
Cloud Computing 4-11 E(CIT-Sem-7)
PART-4
Security Overview,Cloud Security Challenges.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Cloud computing
Security challenges
2.
The classificationshown in Fig.4.13.1 reveals variouscommon challenges
under cloud computing.The deploymentmodel is classifiedfurther as
private,public and hybrid cloud and the securityissues of the samehave
been exposed in common.
its
3 The service model is classifiedinto the SaaS, PaaS and laaS briefing
respect to
securitychallengesin common. ThesecuritychallengeswithNetwork
network are also known as for any internet based service. is
consideredas the backbone for cloud computing.
Answer
Various security challenges related with the service models :
1. Data leakageand consequentproblem:
i Data deletion or alteration without backup leads to certain drastic
data relatedproblemslike security,integrity,locality,segregation
and breaches.
This would leadto sensitivedata beingaccessedby the unauthorized
users.
2 Malicious attacks:
i The threat of malicious attackers is augmented for customers of
cloud services by the use of various IT services which lacks the
intelligibilitybetweenthe procedureand processrelatingto service
providers.
Malicious users may gain access to certain confidentialdata and
thus leadingto data breaches.
3. Backup and storage :
The cloud vendor must ensure that regular backup of data is
implementedwith all measures.
But this backupdata is generallyfound in unencryptedform leading
to misuse of the data by unauthorizedparties.
ii. Thus, data backupslead to varioussecuritythreats.
4. Shared technologicalissues:
i laaS vendors transport their services in a scalable way by
contributinginfrastructure.
But this structure does not offer strong isolation propertiesfor a
multi-tenantarchitecture.
ii. Hence, in order to address this gap, a virtualizationhypervisor
intercede the access between guest operating systems and the
physicalcompute resources.
4-14 E (CS/IT-Sem-7) Resource Management&Securityin Cloud
5. Service hijacking:
i. Service hijacking is associated with gaining an illegal control on
certainauthorizedservicesby variousunauthorizedusers.
It accounts for various techniques like phishing, éxploitationof
software and fraud.
ii. This is consideredas one of top most threats.
6. VM hopping:
i WithVMhopping,an attackeron one VM gainsrightsto use another
victim VM's.
The attackercan check the victim VM's resourceprocedure,alter
its configurationsand can even delete storeddata, thus, puttingit
in dangerthe VM's confidentiality,integrityand availability.
ii. Arequirementfor this attackis that the two VM's must be operating
on the same host, and the attacker must recognizethe victim VM's
IP address.
7. VM mobility :
i The contents of VMs virtual disks are saved as files such that VMs
can be copied from one host to another over the system or via
moveable storage devices with no physicallystealinga hard drive.
i. VM mobilitymight offer quick use but could show the way to security
problems likewise, the rapid spread of susceptibleconfigurations
that an attackercould make use of, to endangerthe securityof a
novel host.
8. VM denial of service:
Virtualizationlets numerousVM's split physicalresourceslike CPU,
network bandwidth and memory or disk.
ADenial-of-Service(DoS) attack in virtualizationtakes place when
one VM occupies all the obtainablephysicalresourcessuch that the
hypervisorcannot hold-upmore VM's and accessibilityis endangered.
iii The most excellent move towards preventing aDoS attack is to
bound resource allocationusing correct configurations.
Que 4.16. What are cloud security controls ?
Answer
Cloud securitycontrolsare::
1. Detective control : This type of control is used to detect and react
instantlyand appropriatelyto any incident.
2. Preventivecontrol:It strengthenthe system againstany incidentor
attack by actuallyeliminatingthe vulnerabilities.
Cloud Computing 4-15 E (CSIT-Sem-7)
PART-5
Software-as-a-ServiceSecurity,SecurityGovernance,Virtual
Machine Security,IAM, SecurityStandards.
Questions-Answers
Answer
Objectives of cloudsecuritygovernance:
1. Strategic alignment : Enterprises should mandate that security
investments,services,and projectsin the cloud are executedto achieve
established business goals (For example, market competitiveness,
financial, or operationalperformance).
2. Value delivery: Enterprisesshould define, operationalize,and maintain
an appropriatesecurityfunction/organizationwith appropriatestrategic
and tactical representation, and charged with the responsibilityto
maximizethe businessvalue (Key Goal Indicators,RGI) from the pursuit
of securityinitiativesin the cloud.
3 Risk mitigation : Security initiativesin the cloud should subject to
measurements that gauge effectivenessin mitigating risk to the
Cloud Computing 4-17 E (CSIT-Sem-7)
Application
Guest
Application Processes
Processes Guest VM
Virtualization OS
Runtime
software
Virtualization
OS Hypervisor Software
Host
Hardware Host Hardware
machine
(a) (b)
Host
(Target ISA)
6
OS runs in privileged
In aconventionaltime-sharedsystem, theassociatedwith it run in
mode (systemmode) whilethe applications
unprivilegedmode (user mode).
7 With system virtualization,however, the
guest OS(s)will run
unprivilegedmode while the hypervisorcan operate in privileged
system VM. In native
mode. Such a system is denoted as native
program
system VM, every privilegedinstruction issued by a user
at any guest OS has to trap to the hypervisor.
every function
8 The hypervisorneeds to specify and implementcontrary, if the
required for managing hardware resources. In
hypervisoroperatesin unprivilegedmode onmode. top of a host OS, the
guest OS(s) will also operate in unprivileged
In this case,
9 This system is called user-mode hosted system VM. trap to the
privilegedinstructions from guest OS(s) still need to the host
to
hypervisor.In return, the hypervisoralso needs to trap
OS.
more trap per
10. Clearly, this increases the overhead by adding one
the functions
everyprivilegedinstruction.The hypervisorcan utilize resources.
already available on the host OS to manage hardware
11. Finally,the hypervisorcan operate partly in privilegedmode and
referred to as dual-mode hosted
partly in user-mode in a system
the host OS's
system VM. This way, the hypervisorcan make use of
resource management functions and also preclude the one more
user-modehosted
trap per each privilegedinstructionincurredin
system VMs.
Answer
1. Identityand Access Management(IAM) is a system that secures,stores,
and manages user identities and access privileges.
2. It ensures that users are who they say they are and will grant access to
applicationsand resources only if they have the permissionto use them.
3 Some of the most common IAM solutions include Single Sign-On (SSO),
Multi-FactorAuthentication(MFA), and access management,all of which
can be deployed on-premisesor in the cloud.
4 Modern technology enables businesses to be mo ile anu efficient
than ever before.
5 For instance,the cloud lets the employeeswork from anywhereat any
time on any device.
6 However, this means that the workforce has moved beyond the
protectionsof on-premisesecurity.
Que 4.22. Describethe benefits of IAM.
Cloud Computing 4-21 E (CSIT-Sem-7)
Answer
Benefits of IAMare:
1. Improving user experiences:
SSO eliminatesthe need for Users to rememberand input multiple
passwordsto access differentareas of the system.
.
Answer
Advantages of LAM are:
1. Users have fewer accountsand passwordsto manage.
2. Less passwordfatigue relatedto managingmultiplepasswords.
3 Less user time neededto log separatelyinto differentsystems.
4 Fewer support requestsfor passwordresets.
5. Providesacentrallocationfor administrativemanagementof accounts.
Disadvantages of IAM are:
1 The primary concern with SSO systemsis that it creates a single point of
failure ifthe authentication server fails. This forces the added burden of
multiple authenticationservers to provide redundancy.
2. This single point also creates a single breach point. Ifa user account is
breached,an attacker can gain access to all protectedsystems that the
compromiseduser account has access to.
Answer
Architecture of IAMare:
Cloud-based and multi-tenant architecture:
a.
A multi-tenant architecture provides lots of benefit such as the
vendor can issue updates, security fixtures, and improves
performance.
b. It also modifies the capability to manage access provision and
governanceeffectively.
ii. Security, management architecture :
The most importantneed of IAM is identityand access management.
b. IAM in Cloud computing offer features like multi-factor
authentication,digital access cards, and biometrics.
C.
These features help to easily retrieve the informationin a secure
manner.
Answer
Followingare the cloud securitystandards:
1. InformationTechnologyInfrastructureLibrary (TIL) :
i. It is a set of best practicesand guidelinesthat definean integrated,
process-basedapproach for managing informationtechnology
services.
CONTENTS
.5-2E to 5-10E
Part-1: Hadoop, MapReduce,
Virtualbox
.6-10E to 5-14E
Part-2: Google App Engine,
Programming Environment
for Google App Engine
.6-14E to 5-21E
Part-3: Openstack,Federation in the
Cloud, Four Levels of
Federation, Federated Services
and Applications,Future
of Federation
5-1 E (CSIT-Sem-7)
5-2 E (CSTT-Sem-7) Cloud Technologies&Advancements
PART-1
Hadoop, MapReduce, Virtualbox.
Questions-Answers
Long Answer Type and MediumAnswer Type Questions
Answer
Features of Hadoop:
1. Suitable for big data analysis :
i. As big data tends to be distributed and unstructured in nature,
Hadoop clusters are best suited for analysisof big data.
Since it is processing logic (not the actual data) that flows to the
computingnodes, less network bandwidthis consumed.
ii. This conceptis called as data localityconcept which helps to increase
the efficiencyof Hadoop based applications.
2. Scalability :
Hadoop clusters can easily be scaled to any extent by adding
additionalcluster nodes and thus allows for the growth of big data.
Scalingdoes not require modificationsto applicationlogic.
3. Fault tolerance :
Hadoop ecosystemhas a provisionto replicatethe input data on to
other cluster nodes.
ii In case of a clusternode failure, data processingcan still proceed by
using data stored on another cluster node.
Answer
Modules of Hadoop:
1. HDFS (Hadoop DistributedFile System):It states that the files will
be broken into blocks and stored in nodes over the distributed
architecture.
2. YARN (Yet Another Resource Negotiator) : It is used for job
schedulingand managingthe cluster.
3. MapReduce :
This is a frameworkwhich helps Java programs to do the parallel
computationon data using key value pair.
The Map task takes input data and convertsit into a data set which
can be computedin key value pair.
The output of Map task is consumed by reduce task and then the
reducer gives the desired result.
4. Hadoop common:These Java librariesare used to start Hadoop and
are used by other Hadoop modules.
Que 5.5. What are the advantagesof Hadoop ?
Answer
Advantages of Hadoop:
1. Fast :in HDFS, the data distributedover the cluster helps in faster
retrieval.As tools are presenton the same server, reducingthe processing
time. It is able to process terabytesof data in minutes and peta bytes in
hours.
2. Scalable: Hadoop clustercan be extended by just adding nodes in the
cluster.
3. Cost effective: Hadoop is open-sourcethat uses commodityhardware
to store data so it is cost effectiveas compared to traditionalrelational
databasemanagementsystem.
4 Resilientto failure:HDFShas the property with which it can
data over the network, so if one node is down or some other replicate
network
failure happens, then Hadoop takes the other copy of data and use it.
Normally, data are replicated thrice but the replication factor is
configurable.
Que 5.6. Explain the architectureof Hadoop.
Cloud Computing 5 5E (CSIT-Sem-7)
Answer
Architecture of Hadoop:
MapReducelayer HDFS layer
Task Name
tracker node
Master Data
Job
tracker, node
Task Data
Slave tracker node
Fig. 5.6.1.
NameNode:
cluster.
i It is a single master server that exists in the HDFS
ii As it is a single node,it may beconme the reason of single point
failure.
ii. It manages the file system namespace by executingan operation
like the opening, renamingand closing the files.
iv. It simplifiesthe architectureof the system.
DataNode:
The HDFS cluster containsmultiple DataNodes.
Each DataNodecontainsmultipledata blocks.
iii. These data blocks are used to store data.
iv. It is the responsibilityof DataNodeto read and write requestsfrom
the file system'sclients.
V It performsblock creation,deletion,and replicationupon instruction
from the NameNode.
Job tracker:
i. The role ofjob trackeris to accept the MapReducejobs from client
and process the data by using NameNode.
iü. Inresponse, NameNode provides metadatato job tracker.
Task tracker:
It works as a slave node for job tracker.
It receivestask and code from job tracker and applies that code on
the file. This process can also be called as a Mapper.
5-6E(CSTT-Sem-7) Cloud Technologies& Advancements
Answer
1. MapReduceis based on the parallelprogrammingframeworkto process
large amountsof data dispersedacrossdifferentsystem.
2 The process is initiatedwhen a user requestis receivedto executethe
MapReduceprogramand terminatedonce the results are writtenback
to the HDFS (HadoopDistributedFile System).
3 MapReducefacilitatethe processingand analyzingof both unstructured
and sem-structureddata collectedfrom different sources,which may
not be analyzedeffectivelyby othertraditionaltools.
4. MapReduceenables computationalprocessingof data stored in a file
system without the requirementof loading the data initially intoa
database.
5 It primarilysupportstwo operations,map and reduce.
6 These operationsexecute in parallelon a set of worker nodes.
7 MapReduceworks on a master workingapproachin which the master
process controls and directs the entire activity, such as collecting,
segregating,and delegatingthe data among differentworking.
Que 5.9. Explain the working and phases of MapReduce.
Answer
1 The MapReducealgorithmcontainstwo importanttasks, namely Map
and Reduce:
The Map task takes a set of data and convertsit into another set of
data, where individualelementsare brokendown into tuples (key
value pairs).
The Reduce task takes the output from the Map as an input and
combinesthose data tuples (key-valuepairs) into a smallerset of
tuples.
2. The reduce task is always performedafter the map task.
Phases of MapReduce:
1. Input phase : Here we have a record reader that translates each
record in an input file and sends the parsed data to the mapper in the
form of key-value pairs.
2. Map: Map is a user-defined function,which'takes a series of key-value
pairs and processes each one of them to generate zero or more key
value pairs.
3. Intermediate keys : They key-valuepairs generatedby the mapper
are known as intermediate keys.
8E(CSIT-Sem-7) Cloud Technologies&Advancements
4. Combiner :
1. Acombiner is a type of local reducer that groups
the map phase into identifiablesets.
similardata from
ii It takes the intermediatekeys from the
mapper as input and applies
a user-definedcode to aggregatethe values in a small
scope of one
mapper.
iüü. Itis not a part of themain MapReducealgorithm;it is
5.
optional.
Shuffle and sort:
i The Reducer task starts with the shuffle and sort step.
It downloadsthe grouped key-value pairs onto the local
machine,
where the reducer is running.
iüi. The individualkey-valuepairs are sorted by key into a larger
list.
data
iv. The data list groups the equivalent keys together so that their
values can be iterated easily in the reducer task.
6. Reducer:
The reducer takes the grouped key-valuepaired data as input and
runs a reducer function on each one of them.
iü. Here, the data can be aggregated, filtered, and combined in a
number of ways, and it requires a wide range of processing.
iüi. Once the executionis over, it gives zero or more key-value pairs to
the final step.
7. Output phase :
i In the output phase, we have an output formatter that translates
the final key-value pairs from the reducer function and writes
them ontoa file using a record writer.
Input |UP nput Input Input |Input Input +Input phase
M M M M
Map phase
kl:vkl vk2:v klv klvkl:vk2:v klvkl:vk2v klv kl:vkl:vk2.v Intermediate
keys
Group by key Combiner
(optional)
Shufle
kl:v,v,v,v| k2:v k3:v,v k4:v,v,v |k5:v
and sort
Reducer
R R
phase
Output
Output phase
Fig. 5.9.1.
5-9 E (CIT-Sem-7)
Cloud Computing
Answer
virtualizingthe x86
1. Virtualbox is an open-source software used for
computingarchitecture.
5-10 E (CSIT-Sem-7) Cloud Technologies&Advancements
2 It acts as a hypervisor,creating a VM (Virtual Machine) in which the
user can run another OS (OperatingSystem).
3 The operatingsystem in which virtualboxruns is called the host OS.
4. The operating system running in the VM is called the guest OS.
Virtualb0xsupportsWindows, Linux, or MacOS as its host OS.
5 When configuring avirtual machine, the user can specify how many
CPUcores,and how much RAM and disk space should be devoted to the
VM.
6 When the VM is running, it can be paused (systemexecutionis frozen at
that moment in time), and resumed later when the user wishes to
continue.
PART-2
Questions-Answers
2
The App Enginerequiresthat apps writtenin Java or Python,store data
in Google BigTable and use the Google query language. Non-compliant
applicationsrequire modificationto use App Engine.
3. Google App Engine provides more infrastructurethan other scalable
hosting servicessuch as Amazon ElasticCompute Cloud (EC2).
4 The App Engine also eliminates some system administrationand
developmentaltasks to make it easierto write scalableapplications.
5 Google App Engine is free up to a certainamount of resourceusage.
6 Users exceeding the per-day or per-minute usage rates for CPU
resources, storage, number of APIcalls or requests and concurrent
requests can pay for more of these resources.
5. The SDK/Java depth rest on IDE, and the default project directory
structure is different from normal web app.
6. It is not easy to process unit test. It cannot fix the root cause and does
not support add SSL to website.
7. The GAE may be the developmentfor future web application,but it is
not equippedfor buildinga modern web site.
8 It suffers from the inabilityto weak server software. The file system
and many standardlibrarymodulesare inaccessible.Only Python and a
few runs of Java Virtual Machine are accessible.
Answer
Servicesprovidedby Google App Engine:
1. Data store :
i. App engine provides a powerful distributeddata storage service
that features query engine and transactions. Data store entities
are schemaless.
Answer
Supportedenvironmentsfor Google App Engine:
1. Java Runtime Environment :
PART-3
Openstack, Federationin the Cloud, Four Levels of Federation,
FederatedServicesand Applications,Future of Federation.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
3. Cinder :
i It is a block storage component, which is more analogous to the
traditionalnotion of a computerbeing able to access specificlocations
on a disk drive.
ii. This more traditional way of accessingfiles might be importantin
scenarios in which data access speed is the most important
consideration.
4. Neutron :
It provides the networkingcapabilityfor openstack.
ii. It helps to ensure that each of the components of an openstack
deployment can communicate with one another quickly and
efficiently.
5. Horizon:
i. It is the dashboardbehind openstack.
i.
Developers can access all of the components of openstack
individuallythrough an ApplicationProgrammingInterface(API),
5-16E (CSIT-Sem-7) Cloud Technologies&Advancements
but the dashboardprovidessystemadministratorsa look at what is
going on in the cloud, and how to manage it.
6. Keystone :
i Itprovidesidentityservicesfor openstack.
i. It is essentiallya central list of all of the users of the openstack
cloud,mapped against all of the services provided by the cloud,
which they have permissionto use.
ii. Itprovidesmultiplemeans of access, so that, developerscaneasily
map their existinguser access methodsagainst keystone.
7 Glance:
i. It providesimage servicesto openstack.
In this case, images refers to images (or virtual copies) of hard
disks.
ii. Glance allows these imagesto be used as templateswhen deploying
new virtual machine instances.
8. Ceilometer:
1. It provides telemetry services, which allow the cloud to provide
billingservices to individualusers of the cloud.
It also keeps a verifiablecountof each user's systemusage of each
of the various componentsof an openstack cloud.
9. Heat :
i. It is the orchestrationcomponent of openstack,which allows
developersto store the requirementsofa cloud applicationin a file
that defineswhat resourcesare necessaryfor that application.
:
In this way, it helps to manage the infrastructure needed for a
cloud service to run.
Que 5.20. Write down the benefits of usingopenstack?
Answer
Benefits of using openstack :
1. Enables rapid innovation :
L.
Openstack's orchestration and self-service capabilities offers
developersand IT staff withfaster and better access to IT resources.
Because developerscan provisionmachinesrapidlyand on-demand,
they can significantlyreduce developmentand testing periods and
have more freedom to experimentwith new ideas.
2. Cuts down time-to-market :
Faster deployment of IT resources also means end users and
i.
business units no longer have to wait days or weeks to start using
the network services and applicationsthey need.
Cloud Computing 5-17 E (CSIT-Sem-7)
ii. In turn, they would be more capable of rolling out and completing
projectsearlierthan before.
3. Boosts scalability and resource utilization:
i Althoughnot as scalableas public clouds, openstackprivate clouds
still offer a significantdegree of scalability.We can still spin up and
spin down servers on demand.
4. Eases regulatorycompliance:
i. Becauseopenstackenablesthe constructionof private,on-premise
clouds, it can help in regulatorycomplianceendeavors.
If our cloud is in our own datacenter,we will have more control of
access privileges,securitymeasures,and securitypolicies.
ii. We can personallytake chargeof ensuringthat policiesfor securing
personaldata, financial data,and other confidentialand regulated
informationare actuallyenforcedand not just printedon a piece of
paper.
Answer
1. Cloud federationrefers to the unionizationof software,infrastructure
and platformservicesfrom disparatenetworksthat can be accessedby
a client through the internet.
2. The federation of cloud resources is facilitated through network
gatewaysthat connect public or external clouds, private or internal
clouds (owned by a single entity) and/or communityclouds (owned by
several cooperating entities); creating a hybrid cloud computing
environment.
3 The federatedcloud computingservicesrely on the existenceof physical
datacenters.
4. Two approachesof cloud federationare :
a. Centralizedfederationmodel : This is the approach taken by
several identity federation standards. It distinguishes two
operationalroles in transaction:
i The identity provider
i. The service provider
b. Claim-based model : This approach addresses the problem of
user authenticationfrom a differentperspectiveand requires users
toprovide claims answeringwho they are and what they can do in
order to access content or completea transaction.
Que 5.22. What are the benefits of cloud federation?
5-18 E (CSIT-Sem-7)
Cloud Technologies& Advancements
Answer
Benefitsof cloud federationare :
1. The federationof cloud resources
allows client to optimizeenterpriseIT
service delivery.
2 The federation of cloud resources allows a client to
cho0se best cloud
service providersin terms of flexibilitycost and availabilityof servicesto
reach particularbusinessor technologicalneed within their
3
organization.
Federationacross differentcloud resourcespools allows applicationsto
run in the most appropriateinfrastructure
environments.
4 The federationof cloud resourcesalso allows an
enterpriseto
workloads around the globe, move data between disparatedistribute
networks
and implement innovative security models for user access to cloud
resources.
Answer
Levels of federationare:
1. Permissivefederation:
i. Permissivefederationoccurs when a server accepts a connection
from a peer network server without verifying its identity using
DNS lookups or certificatechecking.
ii. The lack of verification or authentication may lead to domain
spoofing(the unauthorizeduse of a third-partydomain name in an
email message in order to pretend to be someone else), which
opens the door to widespreadspam and other abuses.
2 Verified federation:
This type of federation occurs when a server accepts a connection
from a peer after the identity of the peer has been verified.
i. It uses information obtained via DNS and by means of domain
specifickeys exchanged beforehand.
iii. The connectionis not encrypted,and the use ofidentityverification
effectivelypreventsdomain spoofing.
iv. Tomake this work, federationrequires proper ITS setup, and that
is still subject to DNS poisoning attacks.
V Verifiedfederationhas been the default service policy on the open
XMPP since the release of the open-sourcejabberd 1.2 server.
3. Encryptedfederation:
i In this mode, a server accepts a connectionfrom a peer if and only
if the peer supportsTransportLayer Security(TLS).
Cloud Computing 5-19 E (CSTT-Sem-7)
cloud federation ?
Que 5.24. What are the advantages providedby
Answer
Advantages provided by cloud federation :
to
i. Performance guarantees : By lending resources, it is possibleservices.
the rendered
maintain the necessarylevels of performanceto
diversity for data and services
ii. Availability guarantees : Location areas,
allows migration of services. For example, disaster-prone
maintaininghigheravailabilityto the client.
5-20 E (CSTT-Senm-7)
Cloud Technologies& Advancements
iii. Convenience:Federationprovidesconvenience the clientin relation
tocontractedservices,allowing a unified
to
view from servicesof different
providers.
iv. Dynamic workload
scatterload accordingtodistribution:Geographic
the client location.
distributionallows to
Que 5.25. What are the approaches used to model cloud
federation ?
Answer
Approachesused to model cloudfederationare:
1 Semanticsbased:
i. A theoretical federation
model based on semantics and
Infrastructure-as-a-Service(IaaS) is proposed.
The authors utilize ontology to provide
autonomousclouds in a resource sharinginteroperability
environment.
between
ii. The use of ontologies is justified by the
difficulties offering
interoperability,which is acritical aspect in afederatedcloud.
iv. The difficulties in providing
interoperabilityinclude different
implementationschemesfor the same type of entityor components
on each cloud, where ontologies are utilised to
model such differences. understand and
2. Market-oriented:
i The federation model oriented to
proposed.
computation services was
ii It focuses on the
commercialization
structure that resemblesa servicesofinfrastructure resourcesin a
market.
ii. To support this model, four componentsare
the cloud federation :
utilized as the core of
a. Clouds: Where resources are located and the serviceswill be
offered to the clients.
b. Application broker:Interfaceresponsiblefor
operationsbetween client and federation. intermediating
C. Cloud coordinator :Component located in each cloud and
responsible maintainingthe integrityof the federation.
for
d. Concentrator:Acts as the market of resourcesand services.
3. Reservoir :
The reservoiris a project leaded by IBM and
developed with the
objective to provide a cloud federation environment that offers
software-as-a-serviceto providers.
Cloud Computing 5-21 E (CSIT-Sem-7)