0% found this document useful (0 votes)
18 views34 pages

Cloud Computeing Micro

Cloud computing is a technology that allows data and programs to be stored and accessed on remote servers via the internet. It includes various types such as Public, Private, Hybrid, Community, and Multi Cloud, each serving different organizational needs. The architecture of cloud computing involves front-end and back-end components, with services categorized into IaaS, PaaS, SaaS, and FaaS, while security measures are essential to protect cloud environments from unauthorized access and threats.

Uploaded by

playbold1817
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views34 pages

Cloud Computeing Micro

Cloud computing is a technology that allows data and programs to be stored and accessed on remote servers via the internet. It includes various types such as Public, Private, Hybrid, Community, and Multi Cloud, each serving different organizational needs. The architecture of cloud computing involves front-end and back-end components, with services categorized into IaaS, PaaS, SaaS, and FaaS, while security measures are essential to protect cloud environments from unauthorized access and threats.

Uploaded by

playbold1817
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 34

1 .What is Cloud Computing?

Explain the types of cloud computing in


details?
ANS: Cloud computing means storing and accessing the data and programs on
remote servers that are hosted on the internet instead of the computer’s hard
drive or local server. Cloud computing is also referred to as Internet-based
computing, it is a technology where the resource is provided as a service
through the Internet to the user. The data which is stored can be files, images,
documents, or any other storable document

the following are some of the operations that can be performed with cloud
computing.
-Storage, backup, and recovery of data
-Delivery of software on recovery of data
-development of new applications and services
-Streaming videos and audio.
Types of Cloud
There are the following 5 types of cloud that you can deploy according to the
organization's needs-
o Public Cloud
o Private Cloud
o Hybrid Cloud
o Community Cloud
o Multi Cloud
1. Public Cloud
Public clouds are managed by third parties which provide cloud services
over the internet to the public, these services are available as pay-as-you-go
billing models.
They offer solutions for minimizing IT infrastructure costs and become a
good option for handling peak loads on the local infrastructure. Public clouds are
the go-to option for small enterprises, which can start their businesses without
large upfront investments by completely relying on public infrastructure for their
IT needs. The fundamental characteristics of public clouds are multitenancy.
Examples: Amazon EC2, IBM, Azure, GCP
2. Private cloud
Private clouds are distributed systems that work on private infrastructure
and provide the users with dynamic provisioning of computing resources. Instead
of a pay-as-you-go model in private clouds, there could be other schemes that
manage the usage of the cloud and proportionally billing of the different
departments or sections of an enterprise. Private cloud providers are HP Data
Centers, Ubuntu, Elastic-Private cloud, Microsoft, etc.
Examples: VMware vCloud Suite, OpenStack, Cisco Secure Cloud, Dell Cloud
Solutions, HP Helion Eucalyptus
3. Hybrid cloud
A hybrid cloud is a heterogeneous distributed system formed by combining
facilities of the public cloud and private cloud. For this reason, they are also
called heterogeneous clouds.
A major drawback of private deployments is the inability to scale on-
demand and efficiently address peak loads. Here public clouds are needed.
Hence, a hybrid cloud takes advantage of both public and private clouds.
Examples: AWS Outposts, Azure Stack, Google Anthos, IBM Cloud Satellite,
Oracle Cloud at Customer
4. Community Cloud
Community clouds are distributed systems created by integrating the
services of different clouds to address the specific needs of an industry, a
community, or a business sector. But sharing responsibilities among the
organizations is difficult.
In the community cloud, the infrastructure is shared between organizations
that have shared concerns or tasks. An organization or a third party may manage
the cloud.
Examples: CloudSigma, Nextcloud, Synology C2, OwnCloud, Stratoscale
5. Multicloud
Multicloud is the use of multiple cloud computing services from different
providers, which allows organizations to use the best-suited services for their
specific needs and avoid vendor lock-in.
This allows organizations to take advantage of the different features and
capabilities offered by different cloud providers.
Examples: Cloud Foundry, Kubernetes, Apache Mesos, Red Hat OpenShift,
Docker Swarm

2.Dicuss the Architecture of Cloud Computing?

Cloud Computing Architecture:


Cloud computing architecture refers to the components and sub-components
required for cloud computing. These components typically refer to: Front end
(fat client, thin client) Back-end platforms (servers, storage) Cloud-based
delivery and a network (Internet, Intranet, Intercloud) Architecture of cloud
computing is the combination of both SOA (Service Oriented Architecture) and
EDA (Event Driven Architecture). Client infrastructure, application, service,
runtime cloud, storage, infrastructure, management and security all these are the
components of cloud computing architecture.

1. Frontend : Frontend of the cloud architecture refers to the client side


of cloud computing system. Means it contains all the user interfaces and
applications which are used by the client to access the cloud computing
services/resources. For example, use of a web browser to access the cloud
platform. Client Infrastructure – Client Infrastructure is a part of the frontend
component. It contains the applications and user interfaces which are required
to access the cloud platform. In other words, it provides a GUI( Graphical User
Interface ) to interact with the cloud.

2. Backend : Backend refers to the cloud itself which is used by the service
provider. It contains the resources as well as manages the resources and
provides security mechanisms.
 Application – Application in backend refers to a software or platform to
which client accesses. Means it provides the service in backend as per the
client requirement.
 Service – Service in backend refers to the major three types of cloud based
services like SaaS, PaaS and IaaS. Also manages which type of service the
user accesses.
 Runtime Cloud- Runtime cloud in backend provides the execution and
Runtime platform/environment to the Virtual machine.
 Storage – Storage in backend provides flexible and scalable storage service
and management of stored data.
 Infrastructure – Cloud Infrastructure in backend refers to the hardware and
software components of cloud like it includes servers, storage, network
devices, virtualization software etc.
 Management – Management in backend refers to management of backend
components like application, service, runtime cloud, storage, infrastructure,
and other security mechanisms etc.
 Security – Security in backend refers to implementation of different security
mechanisms in the backend for secure cloud resources, systems, files, and
infrastructure to end-users.
 Internet – Internet connection acts as the medium or a bridge between
frontend and backend and establishes the interaction and communication
between frontend and backend.
 Database– Database in backend refers to provide database for storing
structured data, such as SQL and NOSQL databases. Example of Databases
services include Amazon RDS, Microsoft Azure SQL database and Google
CLoud SQL.
 Networking– Networking in backend services that provide networking
infrastructure for application in the cloud, such as load balancing, DNS and
virtual private networks.
 Analytics– Analytics in backend service that provides analytics capabilities
for data in the cloud, such as warehousing, business intelligence
Benefits of Cloud Computing Architecture:
Makes overall cloud computing system simpler. Improves data processing
requirements. Helps in providing high security. Makes it more modularized.
Results in better disaster recovery. Gives good user accessibility. Reduces IT
operating costs. Provides high level reliability, Scalability
3. What cloud infrastructure model explain in detail.?

Cloud Computing which is one of the demanding technology of current scenario


and which has been proved as a revolutionary technology trend for businesses
of all sizes. It manages a broad and complex infrastructure setup to provide
cloud services and resources to the customers.
Cloud Infrastructure which comes under the backend part of cloud architecture
represents the hardware and software component such as server, storage,
networking, management software, deployment software and virtualization
software etc. In backend, cloud infrastructure enables the complete cloud
computing system.
Cloud infrastructure components :
cloud infrastructure is categorized into three parts in general
1. Computing
2. Networking
3. Storage

1. Hypervisor :
Hypervisor is a firmware or a low level program which is a key to enable
virtualization. It is used to divide and allocate cloud resources between several
customers. As it monitors and manages cloud services/resources that’s why
hypervisor is called as VMM (Virtual Machine Monitor) or (Virtual Machine
Manager).
2. Management Software :
Management software helps in maintaining and configuring the infrastructure.
Cloud management software monitors and optimizes resources, data,
applications and services.
3. Deployment Software :
Deployment software helps in deploying and integrating the application on the
cloud. So, typically it helps in building a virtual computing environment.
4. Network :
It is one of the key component of cloud infrastructure which is responsible for
connecting cloud services over the internet. For the transmission of data and
resources externally and internally network is must required.
5. Server
Server which represents the computing portion of the cloud infrastructure is
responsible for managing and delivering cloud services for various services and
partners, maintaining security etc.
6. Storage :
Storage represents the storage facility which is provided to different
organizations for storing and managing data. It provides a facility of extracting
another resource if one of the resource fails as it keeps many copies of storage.

Q4)What Are The Types of Cloud Computing Services?


The following are the types of Cloud Computing:

Infrastructure as a Service (IaaS)


Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as as Service (FaaS)
Types-of-Cloud-Computing-Services

1. Infrastructure as a Service ( IaaS )


Flexibility and Control: IaaS comes up with providing virtualized computing
resources such as VMs, Storage, and networks facilitating users with control
over the Operating system and applications.
Reducing Expenses of Hardware: IaaS provides business cost savings with the
elimination of physical infrastructure investments making it cost-effective.
Scalability of Resources: The cloud provides in scaling of hardware resources up
or down as per demand facilitating optimal performance with cost efficiency.
2. Platform as a Service ( PaaS )
Simplifying the Development: Platform as a Service offers application
development by keeping the underlying Infrastructure as an Abstraction. It
helps the developers to completely focus on application logic ( Code ) and
background operations are completely managed by the AWS platform.
Enhancing Efficiency and Productivity: PaaS lowers the Management of
Infrastructure complexity, speeding up the Execution time and bringing the
updates quickly to market by streamlining the development process.
Automation of Scaling: Management of resource scaling, guaranteeing the
program’s workload efficiency is ensured by PaaS.
3. SaaS (software as a service)
Collaboration And Accessibility: Software as a Service (SaaS) helps users to
easily access applications without having the requirement of local installations.
It is fully managed by the AWS Software working as a service over the internet
encouraging effortless cooperation and ease of access.
Automation of Updates: SaaS providers manage the handling of software
maintenance with automatic latest updates ensuring users gain experience with
the latest features and security patches.
Cost Efficiency: SaaS acts as a cost-effective solution by reducing the overhead
of IT support by eliminating the need for individual software licenses.
4. Function as a Service (FaaS)
Event-Driven Execution: FaaS helps in the maintenance of servers and
infrastructure making users worry about it. FaaS facilitates the developers to
run code as a response to the events.
Cost Efficiency: FaaS facilitates cost efficiency by coming up with the principle
“Pay as per you Run” for the computing resources used.
Scalability and Agility: Serverless Architectures scale effortlessly in handing the
workloads promoting agility in development and deployment.
Q4 What is Virtualization? explain types of virtualization?
Virtualization is a technique how to separate a service from the underlying
physical delivery of that service. It is the process of creating a virtual version of
something like computer hardware. It was initially developed during the
mainframe era. It involves using specialized software to create a virtual or
software-created version of a computing resource rather than the actual version of
the same resource. With the help of Virtualization, multiple operating systems
and applications can run on the same machine and its same hardware at the same
time, increasing the utilization and flexibility of hardware.
In other words, one of the main cost-effective, hardware-reducing, and
energy-saving techniques used by cloud providers is Virtualization. Virtualization
allows sharing of a single physical instance of a resource or an application among
multiple customers and organizations at one time. It does this by assigning a
logical name to physical storage and providing a pointer to that physical resource
on demand.
Types of Virtualization
1.Application Virtualization
2.Network Virtualization
3. Desktop Virtualization
4.Storage Virtualization
5.Server Virtualization
6.Data virtualization
1. Application Virtualization: Application virtualization helps a user to have
remote access to an application from a server. The server stores all personal
information and other characteristics of the application but can still run on a local
workstation through the internet.
2. Network Virtualization: The ability to run multiple virtual networks with each
having a separate control and data plan. It co-exists together on top of one
physical network. It can be managed by individual parties that are potentially
confidential to each other.
3. Desktop Virtualization: Desktop virtualization allows the users’ OS to be
remotely stored on a server in the data center. It allows the user to access their
desktop virtually, from any location by a different machine.
4. Storage virtualization is an array of servers that are managed by a virtual
storage system. The servers aren’t aware of exactly where their data is stored and
instead function more like worker bees in a hive. It makes managing storage from
multiple sources be managed and utilized as a single repository. storage
5. Server Virtualization: This is a kind of virtualization in which the masking of
server resources takes place. Here, the central server (physical server) is divided
into multiple different virtual servers by changing the identity number, and
processors.
6. Data Virtualization: This is the kind of virtualization in which the data is
collected from various sources and managed at a single place without knowing
more about the technical information like how data is collected, stored &
formatted then arranged that data logically so that its virtual view can be accessed
by its interested people and stakeholders, and users through the various cloud
services remotely.

5. What is cloud security. Discuss it's types?


Cloud computing which is one of the most demanding technology of the
current time, starting from small to large organizations have started using
cloud computing services. Where there are different types of cloud
deployment models are available and cloud services are provided as per
requirement like that internally and externally security is maintained to keep
the cloud system safe. Cloud computing security or cloud security is an
important concern which refers to the act of protecting cloud environments,
data, information and applications against unauthorized access, DDOS attacks,
malwares, hackers and other similar attacks. Community Cloud : These allow
to a limited set of organizations or employees to access a shared cloud
computing service environment.
Types of Cloud Security
Cloud security requires a combination of multiple strategies to ensure across-
the-board protection from emerging threats and exposed vulnerabilities. Cloud
environments include physical and virtual networks; data storage drives, data
servers, virtualization frameworks, operating systems, runtime environments
and several other components. This means multiple methods must be utilized
to ensure there are no exposed vulnerabilities and threats can be mitigated.
Cloud security is accomplished through a combination of data security,
identity and access management (IAM); data retention, business continuity
planning and governance, such as threat prevention; detection and mitigation
policies.
1. IAM is the process that ensures the correct user has specific access
privileges. Common IAM techniques include password management and
multi-factor authentication.
2. Network and device security involves using tools to put barriers
between the access and visibility of data in contained environments,
including techniques such as encryption and VPNs.
3. Security monitoring/alerting is the installation of both automated and
monitored systems, such as a Security Incident and Event Management
(SIEM) platform and a Security Operations Center (SOC), that can check for
and immediately bring attention to unusual or compromising activity.
4. Governance is the enforcing of policies to prevent, detect and mitigate
threats, such as user behavior policies and training.
5. Disaster recovery and business continuity planning are recovery measures
taken in the event of technical disaster. These measures include data
redundancy tactics like establishing backups and frameworks for testing the
validity of backups.
6. Legal compliance refers to the adherence to legislative policies designed to
protect user privacy (GDPR), the integrity of financial data (SOX),
government assets (ITAR) and more.

Q.What is cluster ? Explain its advantages in cloud computing?


ANS: Cluster computing is a collection of tightly or loosely connected
computers that work together so that they act as a single entity. The connected
computers execute operations all together thus creating the idea of a single
system. The clusters are generally connected through fast

Advantages of Cluster Computing :

1. High Performance :
The systems offer better and enhanced performance than that of mainframe
computer networks.
2. Easy to manage :
Cluster Computing is manageable and easy to implement.
3. Scalable :
Resources can be added to the clusters accordingly.
4. Expandability :
Computer clusters can be expanded easily by adding additional computers to the
network. Cluster computing is capable of combining several additional
resources or the networks to the existing computer system.
5. Availability :
The other nodes will be active when one node gets failed and will function as a
proxy for the failed node. This makes sure for enhanced availability.
6. Flexibility :
It can be upgraded to the superior specification or additional nodes can be added.
Q.Discuss in detail CIA triad ?
The CIA Triad Confidentiality, integrity and availability, also known as the
CIA triad, is a model designed to guide policies for information security within
an organization. The model is also sometimes refer ed to as the AIC triad
(availability, integrity and confidentiality) to avoid confusion with the Central
Intel igence Agency. Although elements of the triad are three of the most
foundational and crucial cybersecurity needs, experts believe the CIA triad ne
ds an upgrade to stay ef ective. In this context, confidentiality is a set of rules
that limits ac ess to information, integrity is the assurance that the information
is trustworthy and ac urate, and availability is a guarantee of reliable ac ess to
the information by authorized people. Confidentiality, integrity, availability
Confidentiality
Sometimes safeguarding data confidentiality involves special training for those
privy to sensitive documents. Training can help familiarize authorized people
with risk factors and how to guard against them. Further aspects of training may
include strong passwords and password-related best practices and information
about social engineering methods to prevent users from bending data-handling
rules with good intentions and potential y disastrous results. A good example of
methods used to ensure confidentiality is requiring an ac ount number or routing
number when banking online. Data encryption is another common method of
ensuring confidentiality
Integrity
These measures include file permissions and user ac ess controls. Version
control may be used to prevent er oneous changes or ac idental deletion by
authorized users from becoming a problem. In addition, organizations must put
in some means to detect any changes in data that might oc ur as a result of non-
human-caused events such as an electromagnetic pulse (EMP) or server crash.
Data might include checksums, even cryptographic checksums, for verification
of integrity. Backups or redundancies must be available to restore the af ected
data to its cor ect state. Furthermore, digital signatures can be used to provide
ef ective nonrepudiation measures, meaning evidence of logins, messages sent,
electronic document viewing and sending cannot be denied
Availability
This is best ensured by rigorously maintaining al hardware, performing
hardware repairs immediately when needed and maintaining a properly
functioning operating system (OS) environment that is free of software
conflicts. It's also important to keep cur ent with al necessary system upgrades.
Providing adequate communication bandwidth and preventing the oc ur ence
of bot lenecks are equal y important tactics. Redundancy, failover, RAID -
even high-availability clusters - can mitigate serious consequences when
hardware issues do occur.
8) Write the advantages and disadvantages of Cloud Computing?
Advantages of Cloud Computing
Cost Reduction:
The major reason companies shift towards cloud computing is that it takes
lower costs. The business does not need to build its own IT infrastructure or
purchase hardware or equipment.
Better Collaboration:
Cloud computing allows people to access cloud data from any device, from
anywhere, from any time as long as they have an internet connection.
Backup and Restore Data:
As the data is stored in the cloud, it is a lot easier to get the backup and
recovery of that data with just a few clicks; otherwise, manually, it is a very time-
consuming process on-premise.
Security
Due to different security reasons, cloud providers have designed very high-
security cloud features so that you can allow what data is accessible to which
person groups.
Pay as you go:
Cloud computing allows you flexibility because you have to pay only for
what you use as a service.
Boundless storage capacity:
No storage capacity is predefined, so you can increase or decrease storage
capacity according to your needs at any time.
Accessibility:
Cloud computing allows you to quickly and easily store, access, and
manipulate information on the cloud.
Mobility
Cloud computing allows easy access to all cloud data via mobile through
the internet.
Quicker Deployments:
Cloud computing allows us to deploy our services to the cloud more
quickly and with fewer clicks. As compared to setting up all the configurations
on the normal deployments.
Automatic Software Integrations:
Cloud computing allows you to set automation of software updates and
upgrades. So as soon as a newer version of any software is released, it will
automatically integrate into the services you are using.
Disadvantages of Cloud Computing
Internet Connectivity:
In cloud computing, data (files, images, video, audio, etc.) is stored in the
cloud. So to access the data, an internet connection is required. In the absence of
the internet, we can't access it.
Downtime:
We can't access the data if there is downtime (internet loss at the cloud
provider's end). Other than this, downtime also includes cloud providers that may
face power loss, service maintenance, etc.
Vendor lock-in:
When transferring all the data from one cloud provider to another, there
can be many issues, such as the different cloud providers using different
platforms, hosting, and running of the applications on the different platforms that
can result in configuration and complexities issues.
Limited Bandwidth:
As the Cloud provider provides limited bandwidth to all its users, you have
to pay significantly higher costs if your organization surpasses that limit.
Security:
Even though the cloud providers are storing information very securely, we
still don't have to forget that data is vulnerable to cyber-attacks when stored in the
cloud.
Performance Variation:
As the server is hosted on a cloud provider, which also provides services to
other businesses, any cyberattack on shared resources may slow down your
services.
Lack of support staff:
Some cloud companies do not provide proper support to their clients; then,
you have to only depend on FAQs or online help.
Limited Control and Flexibility:
The cloud infrastructure is completely owned, managed, and monitored by
the cloud providers. So businesses using cloud computing have limited control
over their data, applications, and services. It makes it hard for companies to have
the level of control they want over the different services they use.
Technical issues:
Due to frequent version releases of some applications, you have to constantly
upgrade your systems to meet a market need; in between these updates, there is a
chance that you may be stuck on some technical problems.
7) Write a short note
1. Microsoft Azure
Microsoft Azure was launched in 2010 as Windows Azure, and later in 2014, it
was renamed, Microsoft Azure. It was launched years after the release of AWS
and Google cloud but still, it is the fastest-growing cloud and giving tough
competition to AWS and other cloud service providers. There is a five-year
partnership between Microsoft and Disney. In this partnership, the new method
will be developed to move production content to the cloud. Azure has 54 data
centers regions across the world available in 140 countries. Azure offers
hundreds of services including AI + Machine Learning, Analytics, Blockchain,
Compute, Containers, Databases, Developer Tools, DevOps, Identity,
Integration, Internet of Things, Management, Media, Microsoft Azure
Stack, Migration, Mixed Reality, Mobile, Networking, Security, Storage,
Web, and Windows Virtual Des
2. Google Services
Google cloud is another set of solutions for users to get the benefit of cloud
services. If you are serious about latency to build performance-oriented
applications then Google cloud is the best choice because it includes GCP & G
Suite. According to Gardner, the public cloud services market is forecast to
grow 17% in 2020 to $266.4 billion, up from $227.8 billion in 2019. Google
cloud has a firm grip over the banking and finance sector. eBay, Snapdeal, and
HSBC are some major clients of Google. In July 2019 VMWare also announced
a partnership with Google cloud which is the biggest collaboration of last year.
As of Q1 2020, Google Cloud Platform is available in 22 regions, 61 zones and
200+ countries. It offers a variety of products and services including AI and
Machine Learning, API Management, Compute, Containers, Data Analytics,
Databases, Developer Tools, Healthcare and Life Sciences, Hybrid and Multi-
cloud, Internet of Things, Management Tools, Media and Gaming, Migration,
Networking, Security and Identity, Serverless Computing, and Storage. Google
products are also offered in the cloud, including G Suite, Google Maps
Platform, Google Hardware, Google Identity, Chrome Enterprise, Android
Enterprise, Apigee, Firebase, and Orbitera.
3. IBM Cloud
Developed by IBM, this cloud service offers another set of solutions to the
users to deploy their applications on the cloud. It offers IaaS, SaaS, and PaaS
services via public, private, hybrid and multi-cloud models. IBM generated 5.3
billion dollars of revenues according to Q3 2019 which is 6.4 percent higher
than the previous quarter. IBM cloud offers approximately 170 products and
services to meet the customer’s business demands. IBM’s best bets come in the
form of the Internet of Things, Cognitive Computing and Blockchain. Recently
IBM has Red Hat, for the delivery of hybrid solutions efficiently. The cloud
service is helping home appliance manufacturers, retailers, and medical supply
businesses. Computer Network, Storage, Cloud Packs, Management, Security,
Database, Analytics, AI, IoT, Mobile, Dev Tools, Blockchain, Integration,
Migration, Private Cloud, and VMware are some services offered by IBM cloud

8) Difference between Network security Data security and host


security? ANS: Network Security
Network Security refers to the measures taken by any enterprise or
organization to secure its computer network and data using both hardware
and software systems. This aims at securing the confidentiality and
accessibility of the data and network. Every company or organization that
handles a large
amount of data, has a degree of solutions against many cyber threats. The most
basic example of Network Security is password protection which the user of the
network oneself chooses. In recent times, Network Security has become the
central topic of cyber security with many organizations inviting applications from
people who have skill s in this area
Data security
Data security in cloud computing is critical, regardless of whether it is in public
clouds or private clouds. Compliance and privacy violations, cloud service
provider (CSP) breaches or exposure and ac identical misconfigurations of cloud
services and data storage objects that could lead to data breaches and il incite
data ac ess are just a few of the many data security issues enterprises confront
when they deploy applications and sensitive information into the cloud. Other
threats that also affect on-premises environments, such as insider threats, also
affect cloud computing security. In order for organizations to reap the benefits
of the cloud, they must be aware of the top cloud data security threats and
challenges and how to mitigate them, as well as general and SaaS-, PaaS-
and IaaS-specific cloud security considerations.
Host security
Host security is a term that includes a range of security tools that individuals
and organizations implement and deploy at the host level of their computers.
Organizations and individuals instal host security tools on a single computer or
server in order to protect the computer’s or server’s host. An organization’s or
individual’s host security practices also show what their servers do to protect
against cyber attack s, how they minimize the impact that a successful cyber
attack has on the system, and how they react and respond to at acks when they
happen.
Q11)Define virtualization structure explain its tools and mechanism?
ANS: Structure:
Virtualization allows sharing of a single physical instance of a resource or an
application among multiple customers and organizations at one time. It does
this by assigning a logical name to physical storage and providing a pointer to
that physical resource on demand. The term virtualization is often synonymous
with hardware virtualization, which plays a fundamental role in efficiently
delivering Infrastructure-as-a-Service(IaaS)solutions for cloud computing.

Host Machine: The machine on which the virtual machine is going to be built is
known as Host Machine. Guest Machine: The virtual machine is referred to as
a Guest Machine.
Virtualization Tool:-
1.Vagrant:-Vagrant is an open source virtualization tool which developed
by Hash crop and written in Ruby, but it can be used in
projects written in other programming languages such as PHP, Python, Java,
C#, and JavaScript. This tool which works on command-line that provides a
framework and configuration format for
creating, managing and distributing virtualized development environments.
2.Microsoft Hyper-V:-
Microsoft released Hyper-V in 2016. Hyper-V is virtualization software that, well,
virtualizes software. It can not only virtualize operating systems but also entire
hardware components, such as hard drives and network switches. Unlike
other virtualization tools, Hyper-V is not limited to the user’s device. You can
use it for server virtualization, too.
3. .RedHat Virtualization:-
This system was developed by Red Hat Software. It is written in Java. Its first
version was released in June 2010. Red Hat Enterprise Virtualization, or RHEV,
provides a RHEL-based centralized management server with a web-based
interface for managing virtual machines (VMs) called the RHEV Manager.
4. .VMware Workstation:- With the help of this system, you can run
multiple OS. This system is for Linux or Windows OS users. This system is
specially developed for IT professionals and developers. It will help
developers to develop the software to be compatible for multiple
OS/platform
Q12)Discuss cloud computing risk? Explain cloud server risk provider.
ANS: Cloud computing provides various advantages, such as improved
collaboration, excellent accessibility, Mobility, Storage capacity, etc. But
there are also security risks in cloud computing. Some most common
Security Risks of Cloud Computing are given below-
Data Loss:-Data loss is the most common cloud security risks of cloud
computing. It is also known as data leakage. Data loss is the process in which
data is being deleted, corrupted, and unreadable by a user, software, or
application. Hacked Interfaces and Insecure
APIs:-As we all know, cloud computing is completely depends on Internet, so it
is compulsory to protect interfaces and APIs that are used by external users.
APIs are the easiest way to communicate with most of the cloud services.
Data Breach:-Data Breach is the process in which the confidential data is
viewed, accessed, or stolen by the third party without any authorization, so
organization's data is hacked by the hackers.
Q9)explain in detail virtualization for data center automation?
ANS: Data centre virtualization is the process of creating a virtual server—
sometimes called a software defined data centre (SDCC)—from
traditional, physical servers. The process abstracts physical hardware by
mimicking its
processors, operating system, and other resources with help from a hypervisor.
Data centres have grown rapidly in recent years, and all major IT companies are
pouring their resources into building new data centres. In addition, Google,
Yahoo!, Amazon, Microsoft, HP, Apple, and IBM are all in the game. All these
companies have invested billions of dollars in data-center construction and
automation.
1. Server Consolidation in Data Centres In data centers, a large number
of heterogeneous workloads can run on servers at various times. These
heterogeneous workloads can be roughly divided into two categories: chatty
workloads and non inter-active workloads. Chatty workloads may burst at some
point and return to a silent state at some other point. A web video service is an
example of this, whereby a lot of people use it at night and few people use it
during the day. Noninteractive workloads do not require people’s efforts to
make progress after they are submitted.
2. Virtual Storage Management The term “storage virtualization” was
widely used before the renaissance of system virtualization. Yet the term
has a
different meaning in a system virtualization environment. Previously, storage
virtualization was largely used to describe the aggregation and repartitioning of
disks at very coarse time scales for use by physical machines. In system
virtualization, virtual storage includes the storage managed by VMMs and
guest OSes. Generally, the data stored in this environment can be classified
into two categories: VM images and application data.
3. Cloud OS for Virtualized Data Centers Data centers must be virtualized to
serve as cloud providers. Table 3.6 summarizes four virtual infrastructure
(VI) managers and OSes. These VI managers and OSes are specially tailored
for
virtualizing data centers which often own a large number of servers in clusters.
Nimbus, Eucalyptus, and Open Nebula are all open source software available
to the general public. Only vSphere 4 is a proprietary OS for cloud resource
virtualization and management over data centers.
4. Trust Management in Virtualized Data Centers A VMM changes the
computer architecture. It provides a layer of software between the operating
systems and system hardware to create one or more VMs on a single physical
platform. A VM entirely encapsulates the state of the guest operating system
running inside it. Encapsulated machine state can be copied and shared over
the network and removed like a normal file, which proposes a challenge to
VM security
Q1.what is virtual machine?
ANS: A virtual machine (VM) is a virtual environment that
functions as a virtual computer system with its own CPU,
memory, network interface, and storage, created on a physical
hardware system
Q2 what cloud scale?
ANS: Cloud scalability in cloud computing refers to the ability to
increase or decrease IT resources as needed to meet changing
demand.
Scalability is one of the hallmarks of the cloud and the primary
driver of its exploding popularity with businesses
Q3what is cloud security objective?
ANS: Cloud security aims to protect more than just the
perimeter, bringing security all the way down to the data. Some
of the most
common measures include: Identity and access management
(IAM) to help provision access to resources in cloud
environments.
Q4 what is application design?
ANS: Application and system design refers to the software and
logic that is running on the endpoint, the gateway, in the
network, and within the data center (DC) or cloud where the
service information is ultimately stored and managed.
Q5 what is cloud access control ?
ANS: Cloud Codes Access Control in cloud security lets
companies formulate policies to restrict access through specific
IP addresses, browsers, devices, and during specified time
shifts. Here's an in-depth view of our Access Control in cloud
computing solution.
Q6 define machine image design?
ANS: A machine image is a Compute Engine resource that stores
all the configuration, metadata, permissions, and data from
multiple disks of a virtual machine (VM) instance. You can use a
machine image in many system maintenance, backup and
recovery, and instance cloning scenarios.

Q. Explain following these two 1) grid computing , 2) Automatic Computing


1. Grid Computing
Grid computing is a distributed computing model that leverages a network of
computers to work together to solve complex problems. The key idea is to use
idle processing power and resources from multiple systems, often located in
different geographic locations, to perform tasks more efficiently.
Features of Grid Computing:
 Resource Sharing: Combines the computational power, storage, and other
resources of multiple machines.
 Decentralized: No central control; resources are distributed and may
belong to different organizations.
 Scalability: Can handle larger tasks as more resources are added to the
grid.
 Heterogeneous Systems: Works across different hardware, operating
systems, and platforms.
Examples of Applications:
 Scientific research (e.g., protein folding, climate modeling).
 Data analysis for large-scale projects (e.g., CERN's Large Hadron Collider).
 SETI@home, a project that uses grid computing to search for
extraterrestrial intelligence.

2. Autonomic Computing
Autonomic computing refers to systems designed to manage themselves
automatically with minimal human intervention. Inspired by the human nervous
system, autonomic computing aims to create systems that are self-managing.
Characteristics of Autonomic Computing:
 Self-Configuration: Automatically configures resources in response to
changing conditions.
 Self-Healing: Detects and recovers from faults without human
intervention.
 Self-Optimization: Continuously monitors and adjusts resources for
optimal performance.
 Self-Protection: Identifies and mitigates security risks and unauthorized
access.
Examples of Applications:
 Cloud computing platforms (e.g., AWS, Azure) that scale resources
automatically based on demand.
 Databases that optimize query performance dynamically.
 Network management systems that detect and fix connectivity issues
without manual input.
Q What is AWS ? Explain in detail.
Amazon Web Services (AWS) is a comprehensive and widely used cloud
computing platform developed by Amazon. It provides a wide range of cloud
services that allow businesses, developers, and individuals to build, deploy, and
scale applications and infrastructure without the need for on-premises
hardware.
Key Components of AWS
AWS offers a broad spectrum of services, grouped into the following categories:
1. Compute Services
AWS provides on-demand computing power for running applications and
managing workloads. Key services include:
o Amazon EC2 (Elastic Compute Cloud): Virtual servers (instances) for
running applications.
o AWS Lambda: Serverless computing that allows you to run code in
response to events without managing servers.
o Elastic Beanstalk: An easy-to-use service for deploying and
managing applications in the cloud.
2. Storage Services
AWS offers scalable and secure storage options:
o Amazon S3 (Simple Storage Service): Object storage for storing and
retrieving large amounts of data.
o Amazon EBS (Elastic Block Store): Persistent block storage for EC2
instances.
o Amazon Glacier: Low-cost storage for data archiving and long-term
backup.
3. Database Services
AWS provides managed database services:
o Amazon RDS (Relational Database Service): Managed relational
databases like MySQL, PostgreSQL, Oracle, and SQL Server.
o Amazon DynamoDB: A fast, scalable NoSQL database service.
o Amazon Redshift: A data warehouse for analytics and business
intelligence.
4. Networking and Content Delivery
AWS ensures connectivity and faster delivery:
o Amazon VPC (Virtual Private Cloud): Isolated networks within AWS
for secure deployment.
o Elastic Load Balancing (ELB): Distributes incoming traffic across
multiple instances.
o Amazon CloudFront: Content delivery network (CDN) for delivering
content globally with low latency.
5. Security and Identity
AWS provides tools to secure your applications:
o AWS IAM (Identity and Access Management): Manages user access
and permissions.
o AWS Shield: DDoS protection service.
o AWS WAF (Web Application Firewall): Protects web applications
from threats.
6. Machine Learning and AI
AWS offers advanced machine learning and AI services:
o Amazon SageMaker: A platform for building, training, and
deploying machine learning models.
o Amazon Rekognition: Image and video analysis.
o Amazon Polly: Converts text into lifelike speech.
7. DevOps and Developer Tools
AWS supports development and deployment workflows:
o AWS CodePipeline: Automates continuous integration and delivery.
o AWS CodeBuild: A fully managed build service.
o AWS CloudFormation: Enables infrastructure as code (IaC).
8. Analytics
AWS provides tools for data processing and analysis:
o Amazon EMR (Elastic MapReduce): Processes large data sets using
tools like Apache Spark and Hadoop.
o Amazon Kinesis: Real-time data streaming.
o Amazon QuickSight: Business intelligence and analytics
visualization.

Advantages of AWS
1. Scalability:
AWS allows users to scale resources up or down based on demand,
ensuring cost efficiency and optimal performance.
2. Cost-Effectiveness:
With pay-as-you-go pricing, users only pay for the resources they use,
avoiding upfront infrastructure costs.
3. Global Reach:
AWS operates data centers in multiple regions worldwide, enabling
applications to serve users with low latency.
4. Reliability:
AWS offers high availability and fault tolerance through its distributed
infrastructure and tools like backups and disaster recovery.
5. Security:
AWS complies with numerous security standards and certifications,
ensuring robust security features.
Use Cases of AWS
1. Web Hosting:
Host websites and web applications with services like Amazon EC2, S3,
and CloudFront.
2. Big Data Analytics:
Analyze large datasets using Amazon EMR, Redshift, and Athena.
3. Machine Learning and AI:
Build intelligent applications with AWS SageMaker, Rekognition, and Polly.
4. IoT Applications:
Develop IoT solutions with AWS IoT Core and related services.5)
5. Backup and Disaster Recovery:
Use Amazon S3 and Glacier for secure data backup and archiving.
6. Gaming:
Power game servers and enable multiplayer games with AWS GameLift
and EC2.

Q.Public and Private IPs Explained:


IP Address:
An Internet Protocol (IP) address is a unique identifier for a device connected to
a network. It allows devices to communicate over the internet or a local
network.

Public IP Address:
 Definition:
A public IP address is assigned to a device by an Internet Service Provider
(ISP) and is globally unique. It allows devices to communicate directly over
the internet.
 Visibility:
Public IP addresses are visible to external networks and can be accessed
from anywhere on the internet.
 Use Case:
Used by devices or servers that need to communicate directly over the
internet, such as web servers, email servers, or any device meant to be
accessible to external users.
 Examples:
Public IP addresses look similar to private ones but fall outside the
reserved ranges for private IPs (e.g., 203.0.113.0 or 8.8.8.8).

Private IP Address:
 Definition:
A private IP address is used within a private network (such as a home,
office, or corporate network). These addresses are not routable on the
public internet.
 Reserved Ranges (defined by RFC 1918):
o 10.0.0.0 to 10.255.255.255
o 172.16.0.0 to 172.31.255.255
o 192.168.0.0 to 192.168.255.255
 Visibility:
Private IPs are only visible and usable within their local network.
 Use Case:
Used for internal communication between devices in a local network.
Examples include connecting a laptop to a printer or a smart device to a
router.
 Examples:
o 192.168.1.1
o 10.0.0.5
Key Differences Between Public and Private IPs:

Feature Public IP Private IP

Accessibility Globally accessible Limited to local network

Assigned By Internet Service Provider Router within the local network

Uniqueness Globally unique Can be reused in other networks

Example 203.0.113.0 192.168.1.1


Q.what do you understand EMI discuss EMI Launching your Fisrt EMI
Understanding EMI
EMI stands for Equated Monthly Installment, which is a fixed payment made by
a borrower to a lender at a specified date each month. It is commonly used in
loans for purchasing homes, vehicles, or consumer goods, as well as in personal
and business loans.

Key Features of EMI:


1. Fixed Schedule: The borrower pays a set amount each month for the loan
tenure.
2. Interest + Principal: Each EMI consists of two components:
o Principal: A portion of the borrowed amount.
o Interest: The cost of borrowing, calculated based on the loan
amount and interest rate.
3. Amortization: Over time, the proportion of principal repayment in each
EMI increases, while the interest portion decreases.

EMI Calculation:
The formula to calculate EMI is:

EMI=P⋅r⋅(1+r)n(1+r)n−1EMI = \frac{P \cdot r \cdot (1 + r)^n}{(1 + r)^n -


1}EMI=(1+r)n−1P⋅r⋅(1+r)n
Where:
 PPP: Loan amount (Principal)
 rrr: Monthly interest rate (Annual Interest Rate/12/100\text{Annual
Interest Rate} / 12 / 100Annual Interest Rate/12/100)
 nnn: Loan tenure (in months)

Launching Your First EMI


If you're launching your first EMI plan, it likely refers to:
1. As a Lender/Business:
Offering EMI options to customers for your products or services.
2. As a Borrower:
Starting your first EMI-based loan payment.

For Businesses Offering EMI Plans:


When launching your first EMI plan for customers:
1. Decide on EMI Terms:
o Loan tenure options (e.g., 6 months, 12 months, etc.).
o Interest rates (if applicable).
o Partner with financial institutions or set up an in-house financing
system.
2. Choose Payment Platforms:
o Collaborate with banks, NBFCs (Non-Banking Financial Companies),
or payment gateways.
o Offer zero-cost EMIs or subsidized options for customer
convenience.
3. Promote EMI Availability:
o Clearly advertise EMI options to attract customers.
o Highlight flexible payment terms and any special offers (e.g., zero-
interest EMI).
4. Set Up Automated Systems:
o Use software to calculate EMIs and manage customer payments
efficiently.

For Individuals Starting an EMI:


When you start your first EMI:
1. Understand Loan Details:
o Interest rate and type (fixed or floating).
o Tenure and total cost of the loan.
2. Budget for Payments:
o Ensure you can comfortably afford the monthly installment
alongside other expenses.
3. Set Up Auto-Payment:
o Avoid missing payments by automating EMI transfers from your
account.
4. Review Prepayment Options:
o Check if you can prepay part or all of the loan to save on interest.

Q.Demonstrate Reserved instans Pricing And Security


Group
1. Reserved Instances (RIs) Pricing:
Reserved Instances are a pricing model offered by cloud service providers like
AWS, Azure, or Google Cloud. They allow users to reserve computing capacity
for a fixed term (e.g., 1 year or 3 years) in exchange for a significant discount
compared to On-Demand pricing.
Key Features of Reserved Instances Pricing:
1. Discounted Rates:
o Typically 30%-75% cheaper than On-Demand pricing.
o Savings depend on the term length and payment option chosen.
2. Commitment Terms:
o Terms of 1 year or 3 years.
o Longer terms usually provide higher discounts.
3. Payment Options:
o All Upfront (AURI): Full payment made upfront, maximum discount.
o Partial Upfront (PURI): Part upfront, with the remaining spread
over the term.
o No Upfront (NURI): No upfront payment, monthly payments over
the term.
4. Flexibility:
o Reserved Instances are tied to specific instance families, regions,
and platforms.
o Some providers offer Convertible Reserved Instances, which allow
instance type changes during the term.
Use Cases:
 Workloads with predictable usage (e.g., always-on servers, databases).
 Cost optimization for long-term projects.

Example of Reserved Instances Pricing (AWS EC2):

Instance Type On-Demand (Hourly) RI (1-Year AURI) RI (3-Year AURI)

t2.micro $0.0116 $0.007 $0.005

m5.large $0.096 $0.058 $0.038

2. Security Groups:
A Security Group is a virtual firewall that controls inbound and outbound traffic
for cloud resources (e.g., EC2 instances in AWS). It acts as a rule-based access
control mechanism to secure your cloud environment.
Key Features of Security Groups:
1. Rule-Based:
o Inbound Rules: Define allowed traffic into the resource.
o Outbound Rules: Define allowed traffic leaving the resource.
2. Stateful:
o Changes in inbound rules automatically reflect in the outbound
traffic.
3. Attach to Resources:
o Associated with individual instances or groups of resources.
4. Granular Control:
o Allow/deny traffic based on:
 Protocol (TCP, UDP, ICMP).
 Port Range (e.g., HTTP: 80, HTTPS: 443).
 Source/Destination (IP addresses, CIDR blocks, or other
security groups).
Example of Security Group Rules:

Rule Type Protocol Port Range Source/Destination Description

Inbound TCP 22 203.0.113.0/24 Allow SSH access

Inbound TCP 80 0.0.0.0/0 Allow HTTP access

Outbound All All 0.0.0.0/0 Allow all outbound

Combining Reserved Instances and Security Groups:


When launching reserved instances, you must also configure security groups to
ensure they are protected. Here's how:
1. Launch Reserved Instances:
o Choose the instance type, region, and term commitment for the
reserved instance.
2. Configure Security Groups:
o Set rules to allow only necessary traffic.
o Use specific IP ranges for SSH/administrative access.
o Ensure outbound traffic is restricted to trusted destinations if
needed.

Demonstration of Practical Setup:


Step 1: Reserved Instances Setup (AWS Example):
1. Navigate to AWS EC2 Console.
2. Go to Purchase Reserved Instances.
3. Select:
o Instance Type (e.g., t2.micro).
o Term (e.g., 1 year).
o Payment Option (e.g., All Upfront).
4. Confirm and Purchase.
Step 2: Security Group Configuration:
1. Navigate to Security Groups in AWS EC2.
2. Create a New Security Group:
o Name: WebServerSG.
o Inbound Rule:
 Allow HTTP (80) from 0.0.0.0/0.
 Allow SSH (22) from your IP address.
o Outbound Rule:
 Allow all traffic (default).
3. Attach this security group to the reserved instance.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy