0% found this document useful (0 votes)
11 views

Cloud Computing - 2 Marks

Cloud computing is the storage and access of data and services over the internet, providing on-demand IT resources. It differs from distributed computing, which involves solving problems across multiple autonomous computers, and grid computing, which focuses on collaborative task execution. Key concepts include virtualization, deployment models, and security challenges like guest-hopping and hyperjacking.

Uploaded by

Prasathkumar V
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Cloud Computing - 2 Marks

Cloud computing is the storage and access of data and services over the internet, providing on-demand IT resources. It differs from distributed computing, which involves solving problems across multiple autonomous computers, and grid computing, which focuses on collaborative task execution. Key concepts include virtualization, deployment models, and security challenges like guest-hopping and hyperjacking.

Uploaded by

Prasathkumar V
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1. What is cloud computing?

Cloud Computing is defined as storing and accessing of data and computing services
over the internet. It doesn’t store any data on your personal computer. It is the on-
demand availability of computer services like servers, data storage, networking,
databases, etc. The main purpose of cloud computing is to give access to data centers to
many users. Users can also access data from a remote server.

Examples of Cloud Computing Services: AWS, Azure.

2. Compare and contrast cloud computing and distributed computing.


 Cloud computing refers to providing on demand IT resources/services like
server, storage, database, networking, analytics, software etc. over internet. Distributed
computing refers to solve a problem over distributed autonomous computers and they
communicate between them over a network.
 In simple cloud computing can be said as a computing technique that delivers
hosted services over the internet to its users/customers. In simple distributed
computing can be said as a computing technique which allows to multiple computers to
communicate and work to solve a single problem.
 There are many benefits of cloud computing like cost effective, elasticity and
reliable, economies of Scale, access to the global market etc. There are many benefits of
distributed computing like flexibility, reliability, improved performance etc.
 Cloud computing provides services such as hardware, software, networking
resources through internet. Distributed computing helps to achieve computational tasks
faster than using a single computer as it takes a lot of time.
 The goal of cloud computing is to provide on demand computing services over
internet on pay peruse model. The goal of distributed computing is to distribute a
single task among multiple computers and to solve it quickly by maintaining
coordination between them.

3. What are the deployment models available in cloud computing?

There are Four Main deployment models available in Cloud Computing:

 Private Cloud
 Public Cloud
 Hybrid Cloud
 Community Cloud

4. Compare and contrast cloud computing and grid computing.


 Cloud Computing is the use of remote servers to store, manage, and
process data rather than using local servers while Grid Computing can be defined as a
network of computers working together to perform a task that would rather be difficult
for a single machine.
 Cloud computing is a centralized executive while grid computing is a
decentralized executive.
 Cloud computing is based on service-oriented while Grid computing is
based on application-oriented.
 Cloud computing uses service like IAAS, PAAS, SAAS while Grid computing
uses service like distributed computing, distributed pervasive, distributed information.

5. List the benefits of virtualization?


 More flexible and efficient allocation of resources.
 Enhance development productivity.
 It lowers the cost of IT infrastructure.
 Remote access and rapid scalability.
 High availability and disaster recovery.
 Pay peruse of the IT infrastructure on demand.
 Enables running multiple operating systems.

6. Define para virtualization.

Para-virtualization is a virtualization technique that presents a software interface to


virtual machines that is similar, but not identical to that of the underlying hardware.

7. List the benefits of cloud virtual machine.


 Low cost
 Easy scalability
 Ease of setup and maintenance
 Shared responsibility

8. Define hypervisor.
A hypervisor or virtual machine monitor (VMM) is a piece of computer software,
firmware or hardware that creates and runs virtual machines. Hypervisors is a
fundamental element of hardware virtualization is the hypervisor, or virtual machine
manager (VMM).

9. Define desktop virtualization.

Desktop virtualization abstracts the desktop environment available on a personal


computer in order to provide access to it using a client/server approach. Desktop
virtualization provides the same outcome of hardware virtualization but serves a
different purpose.

10. Compare containers and virtual machines.

Containers and virtual machines are two types of virtualization technologies that share
many similarities. Virtualization is a process that allows a single resource, such as RAM,
CPU, Disk, or Networking, to be virtualized and represented as multiple resources.
However, the main difference between containers and virtual machines is that virtual
machines virtualize the entire machine, including the hardware layer, while containers
only virtualize software layers above the operating system level.

11. Define storage virtualization.

Storage virtualization is a system administration practice that allows decoupling the


physical organization of the hardware from its logical representation. Using this
technique, users do not have to be worried about the specific location of their data,
which can be identified using a logical path.

12. Compare physical cluster and virtual cluster.

A physical cluster is a collection of physical servers / machines interconnected by a


physical network such as a LAN. On the other hand, A virtual cluster is a collection of
virtual servers / machines interconnected by a virtual network.

13. Name the applications of google app engine.


 Web application hosting
 NoSQL datastore (Google Cloud Datastore)
 Traffic splitting and A/B testing.
 Email sending
 Memcache
 Task Queues

14. What is eucalyptus?

Eucalyptus is an open-source cloud computing software architecture based on Linux


that offers Infrastructure as a Service (IaaS) and a storage platform. It delivers fast and
effective computing services and is designed to be compatible with Amazon's EC2 cloud
and Simple Storage Service (S3). Eucalyptus Command Line Interfaces (CLIS) have the
capability to manage both Amazon Web Services and private instances.

15. Name some of the storage tools in Azure.

 Blob
 Queue
 File and Disk Storage
 Data Lake Store
 Backup and Site Recovery

16. What is OpenStack?

The OpenStack project is an open source cloud computing platform for all types of
clouds, which aims to be simple to implement, massively scalable, and feature rich.
Developers and cloud computing technologists from around the world create the
OpenStack project. OpenStack provides an Infrastructure-as-a-Service (IaaS) solution
through a set of interrelated services.
17. What is guest hopping?

Guest-hopping attack: In this type of attack, an attacker will try to get access to one
virtual machine by penetrating another virtual machine hosted in the same hardware.
One of the possible mitigations of guest hopping attack is the Forensics and VM
debugging tools to observe the security of cloud.

18. List down the challenges of identity and access management.

 Lack of centralized view


 Difficulties in User Lifecycle Management
 Keeping application integrations updated
 Compliance Visibility into Third Party SaaS Tools

19. What is hyperjacking?

Hyper jacking is an attack in which a hacker takes malicious control over the hypervisor
that creates the virtual environment within a virtual machine (VM) host.

20. List down the requirements of identity and access management. IAM
requirements are organized into four categories:

 Account Provisioning & De- provisioning


 Authentication
 Authorization & Role Management
 Session Management

You might also like