0% found this document useful (0 votes)
16 views19 pages

Cloud Computing - Session-4

Uploaded by

priyansh.sriv03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views19 pages

Cloud Computing - Session-4

Uploaded by

priyansh.sriv03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Point out the correct statement.

a) A deployment model defines the purpose of the cloud and the nature of how the cloud is
located
b) Service model defines the purpose of the cloud and the nature of how the cloud is
located
c) Cloud Square Model is meant to show is that the traditional notion of a network boundary
being the network’s firewall no longer applies in cloud computing
d) All of the mentioned

Answer – a

Which of the following is provided by ownership dimension of Cloud Cube Model?


a) Proprietary
b) Owner
c) P
d) All of the mentioned

Answer – b

__________ is a measure of whether the operation is inside or outside the security


boundary or network firewall.
a) Per
b) P
c) Pre
d) All of the mentioned

Answer – d
Point out the wrong statement.
a) Public cloud may be managed by the constituent organization(s) or by a third party
b) A community cloud may be managed by the constituent organization(s) or by a third party
c) Private clouds may be either on- or off-premises
d) None of the mentioned

Answer – a

The ________ cloud infrastructure is operated for the exclusive use of an organization.
a) Public
b) Private
c) Community
d) All of the mentioned

Answer – b

__________ cloud is one where the cloud has been organized to serve a common function
or purpose.
a) Public
b) Private
c) Community
d) All of the mentioned

Answer – c

A …………. cloud combines multiple clouds where those clouds retain their unique
identities but are bound together as a unit.
a) Public
b) Private
c) Community
d) Hybrid

Answer – d

Which of the following service provider provides the highest level of service?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned

Answer – a
Point out the correct statement.
a) PaaS supplies the infrastructure
b) IaaS adds application development frameworks, transactions, and control structures
c) SaaS is an operating environment with applications, management, and the user interface
d) All of the mentioned

Answer – c

Which of the following functional cloud computing hardware/software stack is the Cloud
Reference Model?
a) CAS
b) CSA
c) SAC
d) All of the mentioned

Answer – b
(Cloud Security Architecture)

For the _________ model, the security boundary may be defined for the vendor to include
the software framework and middleware layer.
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned

Answer – b

Point out the wrong statement.


a) Each different type of cloud service delivery model creates a security boundary
b) Any security mechanism below the security boundary must be built into the system
c) Any security mechanism above the security boundary must be maintained by the
customer
d) All of the mentioned

Answer – d

Which of the following model allows vendor to provide security as part of the Service
Level Agreement?
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned

Answer – a

Which of the following cloud does not require mapping?


a) Public
b) Private
c) Hybrid
d) None of the mentioned

Answer – a

Which of the following service model is owned in terms of infrastructure by both vendor
and customer?
a) Public
b) Private
c) Hybrid
d) None of the mentioned

Answer – c

Which of the following model type is not trusted in terms of security?


a) Public
b) Private
c) Hybrid
d) None of the mentioned

Answer – a

Which of the following has infrastructure security managed and owned by the vendor?
a) Hybrid
b) Private/Community
c) Public
d) None of the mentioned

Answer – b

Which of the following is one of the unique attributes of Cloud Computing?


a) utility type of delivery
b) elasticity
c) low barrier to entry
d) all of the mentioned
Answer – d

Point out the correct statement.


a) Service Level Agreements (SLAs) is small aspect of cloud computing
b) Cloud computing does not have impact on software licensing
c) Cloud computing presents new opportunities to users and developers
d) All of the mentioned

Answer – c

Applications that work with cloud computing that have low margins and usually low risk
are _____________
a) high touch
b) low touch
c) moderate touch
d) all of the mentioned

Answer – b

Point out the wrong statement.


a) A cloud is defined as the combination of the infrastructure of a datacenter with the ability
to provision hardware and software
b) High touch applications are best done on-premises
c) The Google App Engine follows IaaS
d) None of the mentioned

Answer – c

When you add a software stack, such as an operating system and applications to the
service, the model shifts to _____ model.
a) SaaS
b) PaaS
c) IaaS
d) All of the mentioned

Answer – a
Which of the following is the most refined and restrictive service model?
a) IaaS
b) CaaS
c) PaaS
d) All of the mentioned

Answer – c

_______ is a pay-as-you-go model matches resources to need on an ongoing basis.


a) Utility
b) Elasticity
c) Low barrier to entry
d) All of the mentioned

Answer – a

_______ feature allows you to optimize your system and capture all possible transactions.

a) scalability
b) reliability
c) elasticity
d) none of the mentioned

Answer – c

_______ enables batch processing, which greatly speeds up high-processing applications.


a) Scalability
b) Reliability
c) Elasticity
d) Utility

Answer – a
Which of the following service creates an application hosting environment?
a) EBS (Oracle E-Business Suite)
b) Azure AppFabric
c) EWS (Exchange Web Services)
d) All of the mentioned

Answer – b

Point out the wrong statement.


a) Microsoft’s approach is to view cloud applications as software plus service
b) Microsoft calls their cloud operating system the Windows Platform
c) Azure is a combination of virtualized infrastructure to which the .NET Framework has been
added as a set of .NET Services
d) None of the mentioned

Answer – d

Which of the following is also known as Compute?


a) set of virtual machine instances
b) set of replicas
c) set of commodity servers
d) all of the mentioned

Answer – a

Database marketplace based on SQL Azure Database is code-named ________


a) Akamai
b) Dallas
c) Denali
d) None of the mentioned

Answer - b
Point out the correct statement.
a) The Windows Azure service itself is a hosted environment of virtual machines enabled by
a fabric called Windows Azure ApplicationFab
b) Windows Azure service is a Compliance as a Service offering
c) Windows Live Services is a collection of applications and services that run on the Web
d) All of the mentioned

Answer - c

________ Live Services can be used in applications that run in the Azure cloud.
a) Microsoft
b) Windows
c) Yahoo
d) Ruby

Answer - b

Which of the following is based on Microsoft Dynamics?


a) Static CRM
b) Social CRM
c) Dynamics CRM
d) None of the mentioned

Answer - c

Which of the following is based on Microsoft Sharepoint?


a) Sharepoint Services
b) .NET Services
c) Windows Services
d) All of the mentioned

Answer - a
Azure is Microsoft’s ___________ as a Service Web hosting service.
a) Platform
b) Software
c) Infrastructure
d) All of the mentioned

Answer - c

Which of the following is a pure infrastructure play?


a) Azure
b) Google App Engine
c) AWS
d) None of the mentioned

Answer - c

Which of the following is a virtual machine technology now owned by Oracle that can run
various operating systems?
a) Vmachines
b) VirtualBox
c) ThoughtPolice
d) None of the mentioned

Answer - b

Point out the correct statement.


a) JumpIt is an open-source virtual appliance installation and management service
b) Converting a virtual appliance from one platform to another is easy proposition
c) Nearly all major virtualization platform vendors support OVF, notably VMware, Microsoft,
Oracle, and Citrix
d) All of the mentioned

Answer - c

Which of the following lets a Web service advertise itself in terms of a collection of
endpoints?
a) WSDL(Web Service Description Language)
b) VMc (VMware Cloud)
c) SOAP(Simple Object Access Protocol)
d) All of the mentioned

Answer - a
Which of the following is a specification for multicast discovery on a LAN?
a) WS-Agent
b) WS-Discovery
c) WS-SOAP
d) All of the mentioned

Answer - b

_________ is a cloud computing service model in which hardware is virtualized in the


cloud.
a) IaaS
b) CaaS
c) PaaS
d) None of the mentioned

Answer - a

Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
b) workspace
c) workload
d) all of the mentioned

Answer - c

How many types of virtual private server instances are partitioned in an IaaS stack?
a) one
b) two
c) three
d) all of the mentioned

Answer - c
Edge computing is a distributed information technology (IT) architecture in which client
data is processed at the periphery of the network, as close to the originating source as
possible.

Edge computing brings processing and storage capabilities closer to where it is needed. Why
is this important, and which industries can benefit the most?

Examples of edge computing use cases:

1. Autonomous vehicles

Autonomous platooning of truck convoys will likely be one of the first use cases for
autonomous vehicles. Here, a group of truck travel close behind one another in a convoy,
saving fuel costs and decreasing congestion. With edge computing, it will be possible to
remove the need for drivers in all trucks except the front one, because the trucks will be
able to communicate with each other with ultra-low latency.
2. Remote monitoring of assets in the oil and gas industry

Oil and gas failures can be disastrous. Their assets therefore need to be carefully monitored.

However, oil and gas plants are often in remote locations. Edge computing enables real-time
analytics with processing much closer to the asset, meaning there is less reliance on good
quality connectivity to a centralised cloud.

3. Smart grid

Edge computing will be a core technology in more widespread adoption of smart grids and
can help allow enterprises to better manage their energy consumption.

Sensors and IoT devices connected to an edge platform in factories, plants and offices are
being used to monitor energy use and analyse their consumption in real-time. With real-
time visibility, enterprises and energy companies can strike new deals, for example where
high-powered machinery is run during off-peak times for electricity demand. This can
increase the amount of green energy (like wind power) an enterprise consumes.

4. Predictive maintenance

Manufacturers want to be able to analyse and detect changes in their production lines
before a failure occurs.

Edge computing helps by bringing the processing and storage of data closer to the
equipment. This enables IoT sensors to monitor machine health with low latencies and
perform analytics in real-time.

5. In-hospital patient monitoring

Healthcare contains several edge opportunities. Currently, monitoring devices (e.g. glucose
monitors, health tools and other sensors) are either not connected, or where they are, large
amounts of unprocessed data from devices would need to be stored on a 3 rd party cloud.
This presents security concerns for healthcare providers.
An edge on the hospital site could process data locally to maintain data privacy. Edge also
enables right-time notifications to practitioners of unusual patient trends or behaviours
(through analytics/AI), and creation of 360-degree view patient dashboards for full visibility.

6. Virtualised radio networks and 5G (vRAN)

Operators are increasingly looking to virtualise parts of their mobile networks (vRAN). This
has both cost and flexibility benefits. The new virtualised RAN hardware needs to do
complex processing with a low latency. Operators will therefore need edge servers to
support virtualising their RAN close to the cell tower.

7. Cloud gaming

Cloud gaming, a new kind of gaming which streams a live feed of the game directly to
devices, (the game itself is processed and hosted in data centres) is highly dependent on
latency.

Cloud gaming companies are looking to build edge servers as close to gamers as possible in
order to reduce latency and provide a fully responsive and immersive gaming experience.

8. Content delivery

By caching content – e.g. music, video stream, web pages – at the edge, improvements to
content deliver can be greatly improved. Latency can be reduced significantly. Content
providers are looking to distribute CDNs even more widely to the edge, thus guaranteeing
flexibility and customisation on the network depending on user traffic demands.
9. Traffic management

Edge computing can enable more effective city traffic management. Examples of this include
optimising bus frequency given fluctuations in demand, managing the opening and closing
of extra lanes, and, in future, managing autonomous car flows.

With edge computing, there is no need to transport large volumes of traffic data to the
centralised cloud, thus reducing the cost of bandwidth and latency.

10. Smart homes

Smart homes rely on IoT devices collecting and processing data from around the house.
Often this data is sent to a centralised remote server, where it is processed and stored.
However, this existing architecture has problems around backhaul cost, latency, and
security.

By using edge compute and bringing the processing and storage closer to the smart home,
backhaul and roundtrip time is reduced, and sensitive information can be processed at the
edge. As an example, the time taken for voice-based assistant devices such as Amazon’s
Alexa to respond would be much faster.

10 Edge Computing Use Case Examples

Use Case Brief Description

Autonomous Vehicles Edge computing enables autonomous platooning of truck


convoys, potentially eliminating the need for drivers in all
trucks except the front one.

Remote Monitoring of Enables real-time analytics with processing closer to the


Oil and Gas Assets remote asset, reducing reliance on connectivity to a
centralised cloud.

Smart Grid Aids in managing energy consumption by enabling real-time


visibility of energy use and analysis of consumption.

Predictive Maintenance Brings processing and storage of data closer to the


equipment, allowing for real-time health monitoring and
analytics.
In-Hospital Patient Edge computing on-site provides data privacy, real-time
Monitoring notifications to practitioners, and comprehensive patient
dashboards.

Virtualised Radio Enables complex processing with low latency for virtualised
Networks and 5G RAN hardware.
(vRAN)

Cloud Gaming Cloud gaming companies are using edge servers to reduce
latency and improve the gaming experience.

Content Delivery Improves content delivery by caching content at the edge,


significantly reducing latency.

Traffic Management Edge computing allows effective city traffic management,


optimizing bus frequency, lane usage, and future
autonomous car flows.

Smart Homes Bringing processing and storage closer to the smart home
can improve performance and security of smart home IoT
devices.

These are just a few of many the use cases edge computing enables across multiple
industries. At STL Partners, we are looking to help companies with their edge computing
strategy.

Fog Computing
Fog Computing is the term coined by Cisco that refers to extending cloud computing to an
edge of the enterprise’s network. Thus, it is also known as Edge Computing or Fogging. It
facilitates the operation of computing, storage, and networking services between end devices
and computing data centers.
1. The devices comprising the fog infrastructure are known as fog nodes.
2. In fog computing, all the storage capabilities, computation capabilities, data along with
the applications are placed between the cloud and the physical host.
3. All these functionalities are placed more towards the host. This makes processing
faster as it is done almost at the place where data is created.
4. It improves the efficiency of the system and is also used to ensure increased security.

When to use fog computing?


Fog Computing can be used in the following scenarios:

1. It is used when only selected data is required to send to the cloud. This selected data
is chosen for long-term storage and is less frequently accessed by the host.
2. It is used when the data should be analyzed within a fraction of seconds i.e Latency
should be low.
3. It is used whenever a large number of services need to be provided over a large area
at different geographical locations.
4. Devices that are subjected to rigorous computations and processings must use fog
computing.
5. Real-world examples where fog computing is used are in IoT devices (eg. Car-to-Car
Consortium, Europe), Devices with Sensors, Cameras (IIoT-Industrial Internet of
Things), etc.

Advantages of fog computing


• This approach reduces the amount of data that needs to be sent to the cloud.
• Since the distance to be traveled by the data is reduced, it results in saving network
bandwidth.
• Reduces the response time of the system.
• It improves the overall security of the system as the data resides close to the host.
• It provides better privacy as industries can perform analysis on their data locally.

Disadvantages of fog computing

• Congestion may occur between the host and the fog node due to increased traffic
(heavy data flow).
• Power consumption increases when another layer is placed between the host and the
cloud.
• Scheduling tasks between host and fog nodes along with fog nodes and the cloud is
difficult.
• Data management becomes tedious as along with the data stored and computed, the
transmission of data involves encryption-decryption too which in turn release data.

Applications of fog computing


• It can be used to monitor and analyze the patients’ condition. In case of emergency, doctors
can be alerted.
• It can be used for real-time rail monitoring as for high-speed trains we want as little latency
as possible.
• It can be used for gas and oils pipeline optimization. It generates a huge amount of data
and it is inefficient to store all data into the cloud for analysis.
An example of a typical IoT and cloud computing-based healthcare system

You might also like