0% found this document useful (0 votes)
4 views

cc model

The document outlines various cloud deployment and delivery models, including Public, Private, Community, and Hybrid Clouds, along with IaaS, PaaS, and SaaS services. It also discusses virtualization levels, SLA management, remote administration, distributed computing in cloud platforms, and the design of an IAM system with Single Sign-On. Each section highlights key features, advantages, disadvantages, and significance of the respective models and systems.

Uploaded by

Jeevan Kishore
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

cc model

The document outlines various cloud deployment and delivery models, including Public, Private, Community, and Hybrid Clouds, along with IaaS, PaaS, and SaaS services. It also discusses virtualization levels, SLA management, remote administration, distributed computing in cloud platforms, and the design of an IAM system with Single Sign-On. Each section highlights key features, advantages, disadvantages, and significance of the respective models and systems.

Uploaded by

Jeevan Kishore
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

11.

1. Cloud Deployment Models

Model Description Advantages Disadvantages

Services offered over the - Cost-effective- Easy - Less security- Limited


Public Cloud public internet, shared scalability- No control- Data privacy
among multiple users. maintenance concerns

Services maintained on a - High security- More - Expensive- Requires in-


Private
private network for one control- Customized house management- Limited
Cloud
organization. solution scalability compared to public

- Cost shared among


Infrastructure shared by - Shared resources can still
Community members- Specific
organizations with similar have privacy issues- Complex
Cloud security and compliance
needs. management
support

- Flexibility- Cost - Complex to manage-


Combination of Public and
Hybrid Cloud optimization- Better Integration issues- Security
Private Clouds.
security for sensitive data gaps if not properly managed

2. Cloud Delivery Models

Model Description Advantages Disadvantages

Provides virtualized - Need skilled IT


- Complete control over
IaaS(Infrastructure computing resources management- User is
infrastructure- Pay-per-
as a Service) like servers, storage, and responsible for OS and
use- Scalable
networking. applications

- No need to manage
Provides platform to - Limited control over
PaaS(Platform as a servers- Faster
develop, test, and platform- Vendor lock-in
Service) development- Easy
deploy applications. risks
collaboration

- Less customization- Data


Provides ready-to-use - Accessible anywhere-
SaaS(Software as a security depends on
software applications No installation needed-
Service) provider- Internet
over the internet. Cost-effective for users
dependency
Quick Summary:

Aspect Public Cloud Private Cloud Community Cloud Hybrid Cloud

Ownership Third-party Single organization Group of organizations Mixed

Cost Low High Shared Moderate

Security Moderate High High (within community) High (for private part)

Scalability High Moderate Moderate High

Aspect IaaS PaaS SaaS

User Control High (over OS and apps) Medium (only apps) Low (only using app)

Target Users System Admins, Developers Developers End-users

Examples AWS EC2, Azure VM Google App Engine, Heroku Gmail, Dropbox

Would you also like a comparison diagram between these models? (It will make it even quicker
to revise!)
12.

Implementation Levels of Virtualization and Their Significance

1. Instruction Set Architecture (ISA) Level Virtualization

What it is:

• Virtualization happens between hardware and OS, at the instruction set (machine code)
level.

• It translates instructions between different types of processors (for example, x86 to ARM).

Example: Emulators like QEMU.

Significance:

• Enables running software written for one hardware platform on another.

• Useful for testing cross-platform applications.

2. Hardware Level Virtualization

What it is:

• Virtualization is directly supported by hardware components like CPU.

• A hypervisor (VMM - Virtual Machine Monitor) is installed on top of the hardware.

Example: VMware ESXi, Microsoft Hyper-V, KVM.

Significance:

• Provides high performance.

• Allows multiple virtual machines (VMs) to run on the same physical hardware.

• Better isolation between VMs.

3. Operating System Level Virtualization

What it is:

• Virtualization happens inside the OS by creating multiple isolated user spaces.

• All containers share the same OS kernel.

Example: Docker, LXC (Linux Containers).

Significance:

• Lightweight compared to full VMs.


• Fast deployment of applications (containers).

• Good for microservices and cloud-native applications.

4. Library Level Virtualization

What it is:

• Virtualization is done at the library/API level.

• Applications use a common library interface instead of direct system calls.

Example: Wine (Windows applications running on Linux).

Significance:

• Applications behave as if they are running on their native platform.

• Useful for portability across different OS platforms.

5. Application Level Virtualization

What it is:

• Applications are isolated from the underlying OS by using a virtual environment.

• Each app believes it’s running independently.

Example: VMware ThinApp, Microsoft App-V.

Significance:

• Allows running conflicting applications on the same machine.

• Simplifies application deployment and management.

Quick Overview Table

Level Focus Example Significance

ISA Level Instruction translation QEMU Cross-platform emulation

Hardware Level Virtual Machines VMware ESXi, KVM High performance, VM isolation

OS Level Containers Docker, LXC Lightweight, fast deployment

Library Level API calls Wine Cross-platform app support

Application Level Application environment VMware ThinApp Easy app deployment, conflict-free
13.

1. SLA Management System Architecture

What is SLA Management?

• SLA (Service Level Agreement) is a contract between the cloud provider and the customer
that defines the level of service expected (like uptime, performance, support).

• SLA Management System monitors, enforces, and ensures these agreements are met.

Architecture Components:

Component Description

SLA Repository Stores all SLA contracts, terms, conditions.

SLA Negotiation Module Helps customers and providers create/modify SLAs based on needs.

SLA Monitoring Module Continuously checks the performance, availability, and service quality.

Detects if any terms of SLA are broken (e.g., downtime more than
SLA Violation Detector
allowed).

SLA Enforcement
Takes actions if a violation occurs (like penalty, alert, compensation).
Module

Reporting Module Provides real-time reports and dashboards about SLA compliance.

Flow:

1. Customer and provider negotiate SLA ➔ Store in SLA Repository.

2. Monitoring Module checks service quality continuously.

3. Violation Detector catches any SLA breach.

4. Enforcement Module handles penalties or notifications.

5. Reports generated for auditing and transparency.

Significance:

• Builds trust between provider and user.

• Helps measure service quality.

• Ensures accountability for service failures.


2. Remote Administration System Architecture

What is Remote Administration?

• Remote Administration System allows cloud administrators to manage servers,


applications, and networks from any location via the internet.

• Essential for quick troubleshooting, resource management, and system updates.

Architecture Components:

Component Description

Web interface or mobile app where admins login and control


Admin Console
systems.

Authentication & Authorization


Ensures only authorized admins can access.
Module

Executes admin tasks remotely like restart server, configure


Command Execution Engine
network.

Real-time monitoring of system health, CPU usage, memory,


Monitoring Module
network.

Audit and Logging Module Keeps record of admin activities for security and compliance.

Notification Module Alerts for any system issues, breaches, or updates needed.

Flow:

1. Admin logs in securely through Admin Console.

2. Authentication module verifies identity.

3. Admin sends commands (restart server, configure service).

4. Execution engine performs requested actions.

5. Monitoring system gives real-time status updates.

6. Logs and audit reports are generated for security tracking.

Significance:

• Enables 24/7 management without being physically present.

• Supports fast issue resolution and system optimization.


• Increases efficiency and reduces downtime.

Quick Visual Comparison

Aspect SLA Management Remote Administration

Goal Ensure service levels are maintained Manage cloud resources remotely

Key Monitoring, Violation Detection, Authentication, Command Execution,


Modules Enforcement Monitoring

Users Customers and Providers Cloud Administrators

Focus Service performance and compliance System control and maintenance

Would you like me to also provide a diagram for both architectures side-by-side for quick revision?
(It'll make things super easy to memorize!)
14.

How Cloud Platforms Use Distributed Computing Models for Efficient Resource Management

1. What is Distributed Computing?

• Distributed Computing means dividing tasks across multiple servers (nodes) that work
together.

• Goal: Improve speed, reliability, and scalability.

In cloud computing, AWS, GCP, and Azure use distributed models to efficiently manage resources,
handle large-scale user requests, and ensure high availability.

2. How Each Cloud Platform Uses Distributed Computing

AWS (Amazon Web Services)

How AWS uses Distributed Computing:

• EC2 Auto Scaling: Automatically adds/removes virtual machines based on traffic.

• Elastic Load Balancer (ELB): Distributes incoming requests across multiple servers to avoid
overload.

• S3 (Simple Storage Service): Stores files across multiple data centers to ensure availability
and durability.

• DynamoDB: A fully distributed NoSQL database for low-latency access.

Key Distributed Techniques:

• Sharding: Splitting data into smaller pieces and storing them across servers.

• Replication: Copying data to multiple locations to prevent data loss.

• Task Parallelism: Multiple servers process parts of a task simultaneously.

GCP (Google Cloud Platform)

How GCP uses Distributed Computing:

• Google Kubernetes Engine (GKE): Distributes containerized applications across multiple


nodes.

• BigQuery: Distributed data warehouse that processes huge amounts of data by dividing the
workload.
• Cloud Load Balancing: Distributes traffic globally, not just regionally, across Google's massive
infrastructure.

Key Distributed Techniques:

• MapReduce Model: Breaks big data into chunks and processes them in parallel (used in
BigQuery).

• Consistent Hashing: Efficient data distribution across nodes to balance loads.

Microsoft Azure

How Azure uses Distributed Computing:

• Azure Virtual Machine Scale Sets: Automatically scales up or down the number of VMs
based on demand.

• Azure Blob Storage: Distributes file storage across different regions for fault tolerance.

• Azure Cosmos DB: Distributed database offering low-latency and multi-region replication.

Key Distributed Techniques:

• Partitioning: Dividing database into sections for faster access.

• Failover Mechanisms: Automatic switching to backup servers during failures.

3. Why Distributed Computing is Important for Cloud Platforms

Benefits Description

Scalability Easily add/remove servers based on demand.

Fault Tolerance If one server fails, others take over.

Resource Optimization Distributes work so no server is idle or overloaded.

Performance Parallel processing speeds up operations.

Cost Efficiency Only use (and pay for) resources you need.

4. Quick Summary Table

Feature AWS GCP Azure

Distributed Storage Amazon S3 Google Cloud Storage Azure Blob Storage

Distributed Databases DynamoDB BigTable, BigQuery Cosmos DB

Load Balancing Elastic Load Balancer Cloud Load Balancing Azure Load Balancer
Feature AWS GCP Azure

Auto Scaling EC2 Auto Scaling Instance Groups VM Scale Sets

Would you also like a diagram showing how distributed computing works in cloud? (It’ll be
super easy for you to remember!)
15.

Design and Implementation of an IAM System for Cloud-Based Application

1. What is IAM (Identity and Access Management)?

• IAM controls who can access what in a cloud environment.

• It ensures security, authorization, and access control over cloud resources.

2. Basic Design of IAM System

Component Description

User Management Create, manage, and delete user accounts.

Authentication Service Verify user identity (login/password, MFA).

Authorization Service Assign roles/permissions to users.

Policy Engine Define access control policies (e.g., who can read, write, delete).

Audit and Monitoring Log user actions for security and compliance.

3. Steps to Implement IAM System

Step 1: User Registration and Authentication

• Set up user signup and secure login with password rules and Multi-Factor Authentication
(MFA).

Step 2: Role-Based Access Control (RBAC)

• Create roles like Admin, Editor, Viewer.

• Assign permissions to each role (example: Admin can add users, Viewer can only view data).

Step 3: Policy Creation

• Define fine-grained policies like:

o "User A can access Resource X only from 9AM to 5PM"

o "Only Admins can delete records"

Step 4: Session Management

• Manage user sessions securely (session timeout, token-based access).

Step 5: Audit and Logging


• Track and record login attempts, resource access, changes made by users.

Step 6: Integration with Cloud Resources

• Attach IAM roles and policies to cloud services (compute, storage, database).

4. Single Sign-On (SSO) Mechanism

What is SSO?

• Single Sign-On (SSO) lets a user log in once and gain access to multiple cloud applications
without logging in again separately for each app.

How SSO Works:

1. User logs in once to an Identity Provider (IdP) like Google Identity, Okta, or AWS Cognito.

2. The IdP authenticates the user and issues a token (like SAML, OAuth, or OpenID Connect
token).

3. User can now access multiple applications (e.g., email, storage, CRM) without needing to log
in again.

4. Applications trust the token provided by the IdP for authentication.

SSO Flow Example:

Step Action

1 User logs into Identity Provider (e.g., Okta).

2 IdP authenticates and issues a secure token.

3 User tries to access App 1 ➔ token validated ➔ access granted.

4 User tries to access App 2 ➔ same token validated ➔ access granted without re-login.

5. Benefits of SSO

Benefit Description

Convenience One login for all apps; no need to remember multiple passwords.

Security Reduces password fatigue and encourages strong password use.

Faster Access Speeds up access to multiple applications without multiple logins.


Benefit Description

Centralized Control Admins can manage user access and permissions from one place.

Better Monitoring Easier to track user activity and manage compliance.

Final Quick Overview

IAM System SSO Mechanism

Manages user identities, roles, Allows users to access multiple applications with one
permissions login

Provides fine-grained access control Simplifies user authentication

Enforces policies and auditing Enhances security and user experience

Would you also like me to design a small architecture diagram for the IAM System with SSO to make
it even easier to understand? (It’ll take just a minute!)

You might also like