Cloud Computing - Session-4
Cloud Computing - Session-4
a) A deployment model defines the purpose of the cloud and the nature of how the cloud is
located
b) Service model defines the purpose of the cloud and the nature of how the cloud is
located
c) Cloud Square Model is meant to show is that the traditional notion of a network boundary
being the network’s firewall no longer applies in cloud computing
d) All of the mentioned
Answer – a
Answer – b
Answer – d
Point out the wrong statement.
a) Public cloud may be managed by the constituent organization(s) or by a third party
b) A community cloud may be managed by the constituent organization(s) or by a third party
c) Private clouds may be either on- or off-premises
d) None of the mentioned
Answer – a
The ________ cloud infrastructure is operated for the exclusive use of an organization.
a) Public
b) Private
c) Community
d) All of the mentioned
Answer – b
__________ cloud is one where the cloud has been organized to serve a common function
or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned
Answer – c
A …………. cloud combines multiple clouds where those clouds retain their unique
identities but are bound together as a unit.
a) Public
b) Private
c) Community
d) Hybrid
Answer – d
Which of the following service provider provides the highest level of service?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned
Answer – a
Point out the correct statement.
a) PaaS supplies the infrastructure
b) IaaS adds application development frameworks, transactions, and control structures
c) SaaS is an operating environment with applications, management, and the user interface
d) All of the mentioned
Answer – c
Which of the following functional cloud computing hardware/software stack is the Cloud
Reference Model?
a) CAS
b) CSA
c) SAC
d) All of the mentioned
Answer – b
(Cloud Security Architecture)
For the _________ model, the security boundary may be defined for the vendor to include
the software framework and middleware layer.
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned
Answer – b
Answer – d
Which of the following model allows vendor to provide security as part of the Service
Level Agreement?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned
Answer – a
Answer – a
Which of the following service model is owned in terms of infrastructure by both vendor
and customer?
a) Public
b) Private
c) Hybrid
d) None of the mentioned
Answer – c
Answer – a
Which of the following has infrastructure security managed and owned by the vendor?
a) Hybrid
b) Private/Community
c) Public
d) None of the mentioned
Answer – b
Answer – c
Applications that work with cloud computing that have low margins and usually low risk
are _____________
a) high touch
b) low touch
c) moderate touch
d) all of the mentioned
Answer – b
Answer – c
When you add a software stack, such as an operating system and applications to the
service, the model shifts to _____ model.
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned
Answer – a
Which of the following is the most refined and restrictive service model?
a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned
Answer – c
Answer – a
_______ feature allows you to optimize your system and capture all possible transactions.
a) scalability
b) reliability
c) elasticity
d) none of the mentioned
Answer – c
Answer – a
Which of the following service creates an application hosting environment?
a) EBS (Oracle E-Business Suite)
b) Azure AppFabric
c) EWS (Exchange Web Services)
d) All of the mentioned
Answer – b
Answer – d
Answer – a
Answer - b
Point out the correct statement.
a) The Windows Azure service itself is a hosted environment of virtual machines enabled by
a fabric called Windows Azure ApplicationFab
b) Windows Azure service is a Compliance as a Service offering
c) Windows Live Services is a collection of applications and services that run on the Web
d) All of the mentioned
Answer - c
________ Live Services can be used in applications that run in the Azure cloud.
a) Microsoft
b) Windows
c) Yahoo
d) Ruby
Answer - b
Answer - c
Answer - a
Azure is Microsoft’s ___________ as a Service Web hosting service.
a) Platform
b) Software
c) Infrastructure
d) All of the mentioned
Answer - c
Answer - c
Which of the following is a virtual machine technology now owned by Oracle that can run
various operating systems?
a) Vmachines
b) VirtualBox
c) ThoughtPolice
d) None of the mentioned
Answer - b
Answer - c
Which of the following lets a Web service advertise itself in terms of a collection of
endpoints?
a) WSDL(Web Service Description Language)
b) VMc (VMware Cloud)
c) SOAP(Simple Object Access Protocol)
d) All of the mentioned
Answer - a
Which of the following is a specification for multicast discovery on a LAN?
a) WS-Agent
b) WS-Discovery
c) WS-SOAP
d) All of the mentioned
Answer - b
Answer - a
Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned
Answer - c
How many types of virtual private server instances are partitioned in an IaaS stack?
a) one
b) two
c) three
d) all of the mentioned
Answer - c
Edge computing is a distributed information technology (IT) architecture in which client
data is processed at the periphery of the network, as close to the originating source as
possible.
Edge computing brings processing and storage capabilities closer to where it is needed. Why
is this important, and which industries can benefit the most?
1. Autonomous vehicles
Autonomous platooning of truck convoys will likely be one of the first use cases for
autonomous vehicles. Here, a group of truck travel close behind one another in a convoy,
saving fuel costs and decreasing congestion. With edge computing, it will be possible to
remove the need for drivers in all trucks except the front one, because the trucks will be
able to communicate with each other with ultra-low latency.
2. Remote monitoring of assets in the oil and gas industry
Oil and gas failures can be disastrous. Their assets therefore need to be carefully monitored.
However, oil and gas plants are often in remote locations. Edge computing enables real-time
analytics with processing much closer to the asset, meaning there is less reliance on good
quality connectivity to a centralised cloud.
3. Smart grid
Edge computing will be a core technology in more widespread adoption of smart grids and
can help allow enterprises to better manage their energy consumption.
Sensors and IoT devices connected to an edge platform in factories, plants and offices are
being used to monitor energy use and analyse their consumption in real-time. With real-
time visibility, enterprises and energy companies can strike new deals, for example where
high-powered machinery is run during off-peak times for electricity demand. This can
increase the amount of green energy (like wind power) an enterprise consumes.
4. Predictive maintenance
Manufacturers want to be able to analyse and detect changes in their production lines
before a failure occurs.
Edge computing helps by bringing the processing and storage of data closer to the
equipment. This enables IoT sensors to monitor machine health with low latencies and
perform analytics in real-time.
Healthcare contains several edge opportunities. Currently, monitoring devices (e.g. glucose
monitors, health tools and other sensors) are either not connected, or where they are, large
amounts of unprocessed data from devices would need to be stored on a 3 rd party cloud.
This presents security concerns for healthcare providers.
An edge on the hospital site could process data locally to maintain data privacy. Edge also
enables right-time notifications to practitioners of unusual patient trends or behaviours
(through analytics/AI), and creation of 360-degree view patient dashboards for full visibility.
Operators are increasingly looking to virtualise parts of their mobile networks (vRAN). This
has both cost and flexibility benefits. The new virtualised RAN hardware needs to do
complex processing with a low latency. Operators will therefore need edge servers to
support virtualising their RAN close to the cell tower.
7. Cloud gaming
Cloud gaming, a new kind of gaming which streams a live feed of the game directly to
devices, (the game itself is processed and hosted in data centres) is highly dependent on
latency.
Cloud gaming companies are looking to build edge servers as close to gamers as possible in
order to reduce latency and provide a fully responsive and immersive gaming experience.
8. Content delivery
By caching content – e.g. music, video stream, web pages – at the edge, improvements to
content deliver can be greatly improved. Latency can be reduced significantly. Content
providers are looking to distribute CDNs even more widely to the edge, thus guaranteeing
flexibility and customisation on the network depending on user traffic demands.
9. Traffic management
Edge computing can enable more effective city traffic management. Examples of this include
optimising bus frequency given fluctuations in demand, managing the opening and closing
of extra lanes, and, in future, managing autonomous car flows.
With edge computing, there is no need to transport large volumes of traffic data to the
centralised cloud, thus reducing the cost of bandwidth and latency.
Smart homes rely on IoT devices collecting and processing data from around the house.
Often this data is sent to a centralised remote server, where it is processed and stored.
However, this existing architecture has problems around backhaul cost, latency, and
security.
By using edge compute and bringing the processing and storage closer to the smart home,
backhaul and roundtrip time is reduced, and sensitive information can be processed at the
edge. As an example, the time taken for voice-based assistant devices such as Amazon’s
Alexa to respond would be much faster.
Virtualised Radio Enables complex processing with low latency for virtualised
Networks and 5G RAN hardware.
(vRAN)
Cloud Gaming Cloud gaming companies are using edge servers to reduce
latency and improve the gaming experience.
Smart Homes Bringing processing and storage closer to the smart home
can improve performance and security of smart home IoT
devices.
These are just a few of many the use cases edge computing enables across multiple
industries. At STL Partners, we are looking to help companies with their edge computing
strategy.
Fog Computing
Fog Computing is the term coined by Cisco that refers to extending cloud computing to an
edge of the enterprise’s network. Thus, it is also known as Edge Computing or Fogging. It
facilitates the operation of computing, storage, and networking services between end devices
and computing data centers.
1. The devices comprising the fog infrastructure are known as fog nodes.
2. In fog computing, all the storage capabilities, computation capabilities, data along with
the applications are placed between the cloud and the physical host.
3. All these functionalities are placed more towards the host. This makes processing
faster as it is done almost at the place where data is created.
4. It improves the efficiency of the system and is also used to ensure increased security.
1. It is used when only selected data is required to send to the cloud. This selected data
is chosen for long-term storage and is less frequently accessed by the host.
2. It is used when the data should be analyzed within a fraction of seconds i.e Latency
should be low.
3. It is used whenever a large number of services need to be provided over a large area
at different geographical locations.
4. Devices that are subjected to rigorous computations and processings must use fog
computing.
5. Real-world examples where fog computing is used are in IoT devices (eg. Car-to-Car
Consortium, Europe), Devices with Sensors, Cameras (IIoT-Industrial Internet of
Things), etc.
• Congestion may occur between the host and the fog node due to increased traffic
(heavy data flow).
• Power consumption increases when another layer is placed between the host and the
cloud.
• Scheduling tasks between host and fog nodes along with fog nodes and the cloud is
difficult.
• Data management becomes tedious as along with the data stored and computed, the
transmission of data involves encryption-decryption too which in turn release data.