0% found this document useful (0 votes)
62 views5 pages

Cloud Computing Imp1-Merged

Uploaded by

Aniket Koli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views5 pages

Cloud Computing Imp1-Merged

Uploaded by

Aniket Koli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Que1: What are the benefits and challenges and applications of cloud computing?

Explain the terms of SaaS, PaaS & IaaS.


Ans:
Benefits of cloud computing:
1. Backup and restore data: Once the data is stored in the cloud. It is easier to get backup and restore thedata.
2. Improved Collaboration: Cloud allowing groups of people to quickly and easily share information via shared storage.
3. Excellent accessibility: Cloud allows us to quickly and easily access store information anywhere and anytime in the whole world using
an internet connection.
4. Low maintenance cost: It reduces both hardware and software maintenance cost for organization.
5. Mobility: Cloud computing allows us to easily access all cloud data via mobile.
6. Pay-per-use-model: Users pay the charges on cloud as per the usage of services.
7. Unlimited storage capacity: Cloud offers a huge amount of storage capacity for storing important data such as documents, images,
audio, video, etc.
8. Data Security: Cloud offers many advanced features related to the security and ensures that data is securely stored and handled.
Challenges of cloud computing:
1. Data security and privacy: on cloud user or organizational data stored in the cloud is critical and private.
2. Cost management. Q.Short Notes on:-
3. Multi-Cloud Environment Grid Computing:a)Grid computing is the collection of
complex resources from multiple locations to reach a
4. Performance
common goal.
5. Interoperability and flexibility. b)A large project is divided among multiple computers
6. High dependence on network to make use of their resources.
7. Lack of knowledge and Expertise.Applications of c)In grid computing, the computers do not have to
Cloud computing: be in the same physical location and can be
1. Google Cloud Platform operated independently. As far as other computers
are concerned each computer on the grid is a distinct
2. DropboxSaaS: computer.
● SaaS stands for Software as a service. Q.Edge Computing: a)Edge computing used for
● SaaS is used by end users. development, multiple application programs may be
● SaaS gives access to the end user. used, all with different running times.
● It is a service model in cloud computing that host software makes available for clients. b)Edge computing needs comprehensive security.
● There is no requirement about technicalities, the company handles everything.
● It is popular between consumer and company, such as file sharing, email and networking. c)Edge computing is a distributed computing
● Cloud services: MS office web, Facebook and Google Apps. framework that brings enterprise applications closer
● Enterprise Services: IBM cloud analysis. to the data source such as IOT device or local edge
● Outsourced cloud services: AWS, Terremark.PaaS: servers
● PaaS stands for Platform as a Service.
● PaaS is used by developers.
● PaaS gives access to the run time environment to deployment and development tools for applications.
● It is a cloud computing model that delivers tools that are used for development of application.
● In this some knowledge is required for the basic setup.
● It popular between developers who focus on the development of apps and scripts.
● Cloud services: Facebook and Google search engine.
● Enterprise services: Microsoft azure.
● Outsourced cloud services: Force.com, Gigaspaces.IaaS:
● IaaS stands for Infrastructure as a service.
● IaaS is used by network architects.
● IaaS gives access to the resources like virtual machines and virtual storage.
● It is a service model that provides visualized computing resources over the internet.
● It requires technical knowledge.
● It is popular between developer and researchers.
● Cloud services: Amazon Web Services, Sun ,vCloud Express.
● Enterprise services: AWS virtual private cloud.
● Outsourced cloud services: Salesforce.

Que3: Define the Service Oriented Architecture and the concept of SOA.
Que2: What is cloud computing? Explain in detail cluster computing and Grid Ans:-Service Oriented Architecture (SOA):
computing? Ans: Cloud Computing: Cloud Computing is a pay-per-use SOA is a term that represents a model in which automation
model for enabling convenient, on-demand network access to a shared logic is decomposed into smaller, distinct units of logic. Collectively,
pool of configurable computing resources(e.g. networks, servers, storage, these units comprise a large piece of business automation logic.
applications and services) that can be rapidly provisioned and released with Individually.
minimal management effort or service provider interaction.” Cluster Concept Of SOA:
Computing: ● Service-oriented architecture (SOA) is a method of software
● A computer cluster consists of a set of loosely or tightly development that uses software components called services
connected computers that work together so that, in many to create business applications.
respects, they can be viewed as a single system. ● Each service provides a business capability, and services can
● More than 2 computers are connected to solve a problem. also communicate with each other across platforms and
● In cluster computing, a bunch of similar (or identical) computers are languages.
hooked up locally (in the same physical location, directly connected Q.What Is Virtualization
with very high speed connections) to operate as a single & write types? Ans:
computer. Virtualization:
● The whole system (all nodes) behaves like a single system view ● Virtualization is the creation of a virtual (rather than actual) version
and resources are managed by centralized resource manager. of something, such as a server, adesktop, a storage device, an
● The computers in the cluster are operating system or network resources".
normally contained in a single location or ● Virtualization is a technique, which allows sharing single physical
complex. Grid Computing: instance of an application or resourceamong multiple
● Grid computing is the collection of complex resources from multiple organizations or tenants (customers)
location to reach a common goal. Types of virtualization:
● A large project is divided among multiple computers to make use of
their resources. 1. Hardware/Server Virtualization
● In grid computing, the computers do not have to be in the same 2. Network Virtualization
physical location and can be operated independently. As far as 3. Storage Virtualization
other computers are concerned each computer on the grid is a
distinct computer.
4. Memory Virtualization
● Every node is autonomous i.e. it has its own resource manager 5. Software Virtualization
and behaves like an independent entity. 6. Data Virtualization
● Grid are inherently distributed by its nature over a LAN, metropolitan 7. Desktop Virtualization
or WAN.
Que5: What is Virtual Machine (VM)? Write on open source Q.What Is multicloud architecture with its benefits & Challenges?
virtualization manager? Ans:- Multi-Cloud Architecture:
Ans:-Virtual Machine(VM) : ● A multi-cloud environment is one where an enterprise uses more than one
● A virtual machine is a computer file, typically cloud platform (with at least two or more public clouds) that each delivers a
called an image, that behaves like an actual specific application or service.
computer. It can run in a window as a separate ● A multicloud can be comprised of public, private, and edge clouds to
computing environment, often to run a different achieve the enterprise’s end goals. Benefits:
operating system. 1. Mitigating vendor lock-in: By carefully evaluating the expectations and
● A Virtual Machine (VM) is a compute resource that potential pitfalls, and having a strong negotiating position which makes it easy
uses software instead of a physical computer to to switch from one cloud provider to another
runprograms and deploy apps. One or more virtual
“guest” machines run on a physical “host”
2. Suitability: When incorporating multiple clouds into a company's IT strategy,
administrators are able to line up their business requirements with the best
machine.
cloud-hosting providers for each individual task.
Open source virtualization manager:
● Kernel-based virtual machine (KVM): A 3. Competitive pricing:Organizations can now enjoy the freedom of
virtualization module in the linux kernel that allow comparing different providers and securing the best available rates based on
the kernel to function as a hypervisor. their specific IT needs.
● Quick Emulator (QEMU): A generic and open source 4. Flexibility and scalability: Multi-cloud allows businesses to scale their storage
machine emulator and virtualizer. up or down based on an ongoing demand. Challenges:-
● Libvirt: A library and daemons providing a stable, 1. Different workflow and management tools: These tools can
open source API for managing virtualization hosts. be expensive and create silos, adding additional complexity
● Libguestfs: A set of tools for accessing and to already complex infrastructure.
modifying VM disk images.
2. Lack of unified security: The security of your network must be assessed on
● Virt-manager: A desktop user interface for managing a regular basis as your infrastructure and software change over time.
VMs through libvirt.
● Libosinfo: Provides a database of information 3. Skill gaps: When enterprises deploy a new multiplatform tool, IT leads
about operating system releases to assist in often have to retrain staff to learn skills across multiple clouds.
optimally configuring hardware when deploying 4. Data Sharing:Multi-cloud can often cause difficulty in synchronizing and
VMs. sharing data,have different provider maturity,and have issues with API differen
Q.write the data migration in cloud stratagies?What is the data migration?
Ans:- Data migration in Cloud:
Moving data from one cloud environment to another or form on premises to the cloud. This process can be involve a variety of data source and formats
such as structured and unstructured data, database and file system.
Cloud migration strategies:
● Procedure of transferring application, data and other types of business component to any cloud computing platform.
● This is most used model is the application and data center to any public cloud.
● Cloud migration can also entail transferring application and data from one single cloud environment to another cloud to cloud migration.
Process of cloud migration:
● Plan our migration:
○ Needs a solid planning strategy to be successful.
○ Giving complete visibility into our an premise platform including each system dependency.
● Select our cloud environment: Ready to select any cloud provider environment include gcp, microsoftazure,aws.
● Migrate our data and apps.
● Certify post-move success: our work is not complete until we can show any return over investment in our migration.
Q.Write multi core architecture&its benefits&challenges?
Ans:- Multi-Core Architecture: Q.9: What is the concept of cloud Bursting?
● A single integrated circuit is used to package or ● Ans:- Cloud bursting is an application configuration that allows the
hold these processors. These single integrated private cloud to “burst” into the public cloud and access additional
circuits are known as a die. computing resources without service interruption.
● Multicore architecture places multiple processor ● These cloud bursts can be triggered automatically in reaction to high
cores and bundles them as a single physical demand usage or by a manual request.
processor. ● The technology behind cloud bursting includes infrastructure as a
● The objective is to create a system that can service (IaaS), a cloud computing infrastructure that enables
complete more tasks at the same time, thereby developers to dynamically configure cloud resources on demand.
gaining better overall system performance. ● DevOps tools like configuration management and infrastructure as
Benefits: code (IaC) are used to specify the capacity thresholds or trigger events
● Database servers that will activate cloud bursting.
● Web servers Que10: Explain the cloud computing privacy and security challenges in detail?.
● Telecommunication markets Ans:- Cloud computing privacy challenges:
● Multimedia applications 1)Data Confidentiality Issues: Social Security numbers, which must remain
● Scientific applications confidential to prevent identitytheft. passwords, which must remain confidential to
● In general, applications with Thread-level protect systems and accounts.
parallelism (as opposed to instruction-level 2)Geographical Data Storage Issues: The cloud infrastructure is distributed across
parallelism). Challenges: different geographical locations spread throughout the world, it is often possible
● Dividing Activities that the user’s data is stored in a location thatis out of the legal jurisdiction which
● Balance leads to the user’s concerns about the legal accessibility of local law enforcement
● Data Splitting and regulations on data that is stored out of their region.
● Data Dependency 3)Transparency Issues: Excessive sharing of information creates problems of
● Testing and Debugging. information overload and can legitimize endless debate and second-guessing of
Que11: Explain in details the identity management & Access control. senior executive decisions. High levels of visibility can reduce creativity as people
Ans:- Identity Management: fear the watchful eye of their superiors.
● In the past, blue chip companies sat employees down in Cloud computing security challenges:
office buildings protected by a digital firewall.Individuals 4)Denial-of-Service (DoS) attacks: A Denial-of-Service (DoS) attack is an attack
signed into their office computers and worked until five meant to shut down a machine or network, making it inaccessible to its intended
o'clock, then signed out and went home to their personal users. DoS attacks accomplish this by flooding the target with traffic, or sending it
lives. The current reality is much different. information that triggers a crash.
● The solution is to recognize that this is the employee's 5)Data loss due to cyberattacks: Data loss refers to the unwanted removal
new identity, and to adopt a framework that accepts this of sensitive information either due to an information system error, or theft
reality. by cybercriminals. Data leaks are unauthorized exposures of sensitive
Access Control: information through vulnerabilities on the digital landscape.
● Imagine a small legal firm with an important assistant 6)Insecure access control points: Insecure direct object references (IDOR) are a
who signs in successfully by using his or her Windows subcategory of access control vulnerabilities. IDOR arises when an application
password. At many typical legal outfits, this person now uses user-supplied input to access objects directly and an attacker can modify
has full access to the machine in question and could the input to obtain unauthorized access.
(intentionally or accidentally) cause all sorts of trouble, 7)User Account Hijacking – Account Hijacking is the most serious security issue
especially if the device is networked for remote access in Cloud Computing. If somehow the Account of User or an Organization is
so the attorneys can work remotely when needed. hijacked by Hacker.
Que12: Explain Web services: SOAP and REST. Q.Explain Cloud Deployment Model In Details?
Ans:- SOAP: 1)Private cloud:- The cloud infrastructure is operated solely foran
● SOAP stands for simple object access protocol. organization. It may be managed by the organization or a third party and may
● SOAP is a protocol exist on premise or off premise.
● SOAP can’t use REST. 2)Community cloud: The cloud infrastructure is shared by several
● SOAP uses services interface to expose the business logic. organizations and supports a specific community that has shared concerns
● JAX-WS is the java API for SOAP web services. (e.g., mission, security requirements, policy, and compliance considerations).
● SOAP defines standard to strictly followed. It may be managed by the organizations or a third party and may exist on
● It requires more bandwidth and resource than REST. premise or off premise.
● It defines its own security. 3)Public cloud: The cloud infrastructure is made available to the general
● It uses xml data format only. public or a large industry group and is owned by an organization selling cloud
● Less preferred than REST. services.
● REST: 4)Hybrid cloud: The cloud infrastructure is a composition of two or more
● REST stands for Representational State Transfer. clouds (private, community, or public) that remain unique entities but are
● REST is an architectural style. bound together by standardized or proprietary technology that enables data
● REST can use SOAP. and application portability (e.g., cloud bursting for load- balancing between
● REST uses URI to expose business logic. clouds).
● JAX-RS is the java API for RESTful web services.
● REST doesn’t define too must standard like SOAP.
● REST requires less bandwidth and resource than SOAP.
● It inherits security measures from the underlying transport.
● It uses plain text, Html, xml, json data format.
● More preferred than SOAP.
Q.Explain Cloud Computing Security architecture & Its Challenges in details?
Ans:- Cloud computing security architecture:
● A cloud security architecture also known as “cloud computing security architecture”.
● It is defined by the security layers, design, and structure of the platform, tools, software, infrastructure, and best practices that exist within a cloud
security solution.
● Cloud computing in general, refers to the protection of information, applications, data, platforms, and infrastructure that operate or exist within the
cloud.
● Cloud security is applicable to all types of cloud computing infrastructures, including public clouds, private clouds, and hybrid clouds.
● Cloud security is a type of cybersecurity.Challenges:
● DDoS and Denial-of-Service Attacks
● Data breaches
● Data loss
● Insecure access control points
● Notifications and alerts
Q.Write Short Notes On :-
1. Cloud Governances:
a. Cloud governance is a set of rules and policies adopted by companies that run services in the cloud.
b. The goal of cloud governance is to enhance data security, manage risk, and enable the smooth operation of cloud systems.
2. Cloud Computing Architecture:
a. The Cloud Computing architecture comprises of many cloud components.
b. These components typically consist of a front end platform (fat client, thin client, mobile device),back end platforms (servers,
storage), a cloud based delivery, and a network (Internet, Intranet, Inter-cloud). Combined, these components make up cloud
computing architecture.
3. Xaas:
a. Everything as a Service (XaaS) means anything can now be a service with the help of cloud computing and remote
accessing.
b. Where cloud computing technologies provide different kinds of services over the web networks.
c. In Everything as a Service, various tools and technologies, and services are provided to users as a service.
d. Before XaaS and cloud services, companies have to buy licensed products and install them, had to all securities on their site
and provide infrastructure for business purposes.
e.With XaaS, business is simplified as they have to pay for what they need.
f.This Everything as a Service is also known as Anything as a Service.
4. Hypervisor:
a. A hypervisor is a hardware virtualization technique that allows multiple guest operating systems(OS) to run on a single host system
at the same time. The guest OS shares the hardware of thehost computer, such that each OS appears to have its own processor,
memory and other hardware resources.”
b.“The hypervisor is a firmware or low-level program that acts as a Virtual Machine Manager.”
c.There are two types of hypervisor:
i. Type 1 hypervisor
ii. Type 2 hypervisor
5. SLA(Service Level Agreement):
a. A service-level agreement (SLA) is a contract between a service provider and its customers.
b. A Service Level Agreement (SLA) is the bond for performance negotiated between the cloud services provider and the client.
c. Earlier, in cloud computing all Service Level Agreements were negotiated between a client and the service consumer. Nowadays,
with the initiation of large utility-like cloud computing providers, most Service Level Agreements are standardized until a client
becomes a large consumer of cloud services.
6. Cloud Platform:
a. Microsoft Azure is a cloud computing platform and infrastructure, created by Microsoft, for building, deploying and managing
applications and services through a global network of Microsoft- managed datacenters.
b. Google App Engine (often referred to as GAE or simply App Engine) is a platform as a service (PaaS) cloud computing platform for
developing and hosting web applications in Google-managed data centers. Applications are sandboxed and run across multiple
servers.
c. Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully
featured services from data centers globally.
7. Cloud APIs (RESTful): a)Application programming interface.
b)It defines the rules that you must follow to communicate with other software systems.
c)Developers expose or create API’s so that other applications can communicate with theirapplication programmatically.
d)Restful API is an interface that two computer systems use to exchange information securely over the internet.
E_Most of business applications have to communicate with other internal and third-party applications to perform various tasks.
Q.What Is Web Service? Ans:- A web service is a
standardized method for propagating messages between
client and server applications on the World Wide Web. A
web service is a software module that aims to accomplish
a specific set of tasks. Web services can be found and
implemented over a network in cloud computing.The web
service would be able to provide the functionality to the
client that invoked the web service.A web service is a set
of open protocols and standards that allow data exchange
between different applications or systems. Web services
can be used by software programs written in different
programming languages and on different platforms to
exchange data through computer networks such as the
Internet. In the same way, communication on a computer
can be inter-processed.

Q.What Is Virtualization,Explain Types ?Ans:- Virtualization is the "creation of a virtual Q.Define the Service Oriented Architecture and the
(rather than actual) version of something, such as a server, a desktop, a storage device, an concept of SOA.? Ans:- Service Oriented Architecture
operating system or network resources". (SOA):
In other words, Virtualization is a technique, which allows to share a single physical SOA is a term that represents a model in
instance of a resource or an application among multiple customers and organizations. It which automation logic is decomposed into smaller,
does by assigning a logical name to a physical storage and providing a pointer to that distinct units of logic. Collectively, these units
comprise a large piece of business automation logic.
physical resource when demanded.
Individually.
1) Hardware Virtualization:-When the virtual machine software or virtual machine
Concept Of SOA:
manager (VMM) is directly installed on the hardware system is known as hardware ● Service-oriented architecture (SOA) is a
virtualization. method of software development that uses
The main job of hypervisor is to control and monitoring the processor, memory and other software components called services to
hardware resources. create business applications.
After virtualization of hardware system we can install different operating system on it and ● Each service provides a business
run different applications on those OS. capability, and services can also
Usage:Hardware virtualization is mainly done for the server platforms, because controlling communicate with each other across
virtual machines is much easier than controlling a physical server. platforms and languages.
2)Operating System Virtualization:When the virtual machine software or virtual machine Q.Explain Intercloud?Ans:- Intercloud is a cloud deployment
manager (VMM) is installed on the Host operating system instead of directly on the model that links multiple public cloud services together as one holistic
hardware system is known as operating system virtualization. and actively orchestrated architecture. Its activities are coordinated
Usage:Operating System Virtualization is mainly used for testing the applications on across these clouds to automatically and intelligently move
different platforms of OS. workloads (e.g., for data analytics), based on criteria like their cost
3)Server Virtualization:When the virtual machine software or virtual machine and performance characteristics.
manager (VMM) is directly installed on the Server system is known as server virtualization.
Usage:Server virtualization is done because a single physical server can be divided into Three Reasons For Intercloud:-1)Active cloud mngment:- This is the
multiple servers on the demand basis and for balancing the load. major value proposition of intercloud. Decisions about where to place
4)Storage Virtualization:-Storage virtualization is the process of grouping the physical a particular dataset or application no longer require human
storage from multiple network storage devices so that it looks like a single storage deliberation, as would happen with multi-cloud. The intercloud
device.Storage virtualization is also implemented by using software applications. architecture “knows” where to send the information at any given
Usage:-Storage virtualization is mainly done for back-up and recovery purposes. moment.

 Q.Relating SOA & Cloud Computing? Ans:- “Service-oriented” and units of service-oriented logic are referred as “services”. The reason
behind this article on Cloud Computing and Relationship with Service Oriented Architecture is to make this concept clear to the users,
developers and obviously the new service providers.
 Terminologies :
 Standardized service contract : Services belonging to the same group are in accordance with the same contractual standards.
 Abstraction of the service : Service contracts only contain essential information and information relating to the services which are limited to
what is published in the service contracts.
 Re-usability of the service : Services contain and express a logical “agnostic” attitude and can be positioned among reusable enterprise
resources.
 Autonomy of the service : The services that exert a high level of control along their execution environment level down.
 Modularity of the service : Services must be assembled regardless of size and complexity of their composition.

Service Oriented Architecture is a flexible set of design principles that guide the process of development and integration of software systems. The use
of this method involves the realization and the externalization of functionality through a set of inter-operable services that may reside in different
systems and / or administrative domains. The service is intended as a software component that encapsulates the logical operations those are required
to deliver for a given business functionality. In a typical scenario, the service provider is responsible for implementing the service and defines a
service description service discovery agency, concretely realized through a register or a repository such as UDDI (Universal Description Discovery and
Integration). This component allows the availability of the service. The service client queries the service, discovery agency retrieve the service
description of interest in order to report (bind) the service implementation.

Q.Explain Intercloud?Ans:- Intercloud is a cloud deployment model that links multiple public cloud services together as one holistic and actively orchestrated architecture. Its activities
are coordinated across these clouds to automatically and intelligently move workloads (e.g., for data analytics), based on criteria like their cost and performance characteristics.
Three Reasons For Intercloud:-1)Active cloud mngment:- This is the major value proposition of intercloud. Decisions about where to place a particular dataset or application no longer
require human deliberation, as would happen with multi-cloud. The intercloud architecture “knows” where to send the information at any given moment.
2)Cost Saving:-The intelligent automation of intercloud makes it easier to get the best price for cloud resources moment by moment. For instance, an intercloud deployment may look up
the spot price of compute in Cloud B, find that it is lower than the current equivalent cost in Cloud A, and move a workload from Cloud A to Cloud B automatically
3)Performance optimization:-By finding the optimal cloud service provider for every workload, intercloud ensures optimal performance and pricing for analytics. Data from numerous
sources can be reliably loaded, queried, and scaled across clouds.
Q. Cloud Computing Architecture? Ans:-As we know, cloud computing technology is used by both small and large organizations to store the
information in cloud and access it from anywhere at anytime using the internet connection.Cloud computing architecture is a combination of service-
oriented architecture and event-driven architecture.Cloud computing architecture is divided into the following two parts – 1)Front End 2)Back End
Front End:-The front end is used by the client. It contains client-side interfaces and applications that are required to access the cloud computing
platforms. The front end includes web servers (including Chrome, Firefox, internet explorer, etc.), thin & fat clients, tablets, and mobile devices.
Back End:- The back end is used by the service provider. It manages all the resources that are required to provide cloud computing services. It
includes a huge amount of data storage, security mechanism, virtual machines, deploying models, servers, traffic control mechanisms, etc.
A)Components of Cloud Computing Architecture There are the following components of cloud computing architecture –
1. Client Infrastructure :-Client Infrastructure is a Front end component. It provides GUI (Graphical User Interface) to interact with the cloud.
2. Application:- The application may be any software or platform that a client wants to access.
3. Service:- A Cloud Services manages that which type of service you access according to the client’s requirement.
Cloud computing offers the following three type of services:
i. Software as a Service (SaaS) – It is also known as cloud application services. Mostly, SaaS applications run directly through the web browser means
we do not require to download and install these applications. Some important example of SaaS is given below –Example: Google Apps, Salesforce
Dropbox, Slack, Hubspot, Cisco WebEx.
ii. Platform as a Service (PaaS) – It is also known as cloud platform services. It is quite similar to SaaS, but the difference is that PaaS provides a
platform for software creation, but using SaaS, we can access software over the internet without the need of any platform.Example: Windows Azure,
Force.com, Magento Commerce Cloud, OpenShift.

iii. Infrastructure as a Service (IaaS) – It is also known as cloud infrastructure services. It is responsible for managing applications data, middleware,
and runtime environments.Example: Amazon Web Services (AWS) EC2, Google Compute Engine (GCE), Cisco Metapod
4. Runtime Cloud :-Runtime Cloud provides the execution and runtime environment to the virtual machines.
5. Storage :-Storage is one of the most important components of cloud computing. It provides a huge amount of storage capacity in the cloud to store
and manage data.
6. Infrastructure:-It provides services on the host level, application level, and network level. Cloud infrastructure includes hardware and software
components such as servers, storage, network devices, virtualization software, and other storage resources that are needed to support the cloud
computing model.
7.Management:-Management is used to manage components such as application, service, runtime cloud, storage, infrastructure, and other security
issues in the backend and establish coordination between them
8.Security:- Security is an in-built back end component of cloud computing. It implements a security mechanism in the back end.
9.Internet:- The Internet is medium through which front end and back end can interact and communicate with each other.

Q.Short Notes:-1)Google Cloud Platform:- Google Cloud Platform (GCP) is 2)Microsoft Azure:- Microsoft Azure is a growing set of cloud computing
a suite of cloud computing services provided by Google. It is a public services created by Microsoft that hosts your existing applications,
cloud computing platform consisting of a variety of services like compute, streamline the development of a new application, and also enhances our
storage, networking, application development, Big Data, and more, which on-premises applications. It helps the organizations in building, testing,
run on the same cloud infrastructure that Google uses internally for its deploying, and managing applications and services through Microsoft-
end-user products, such as Google Search, Photos, Gmail and YouTube, managed data centers.
etc.The services of GCP can be accessed by software developers, cloud
administrators and IT professionals over the Internet or through a Azure Services:- Compute services: It includes the Microsoft Azure Cloud
dedicated network connection. Services, Azure Virtual Machines, Azure Website, and Azure Mobile
Services, which processes the data on the cloud with the help of powerful
Salesforce:- Salesforce is one of the best cloud-based CRM platforms. It processors.
is an integrated CRM platform that provides a single shared view of each
a)Data services: This service is used to store data over the cloud that can be
customer for all the departments within an organization, such as scaled according to the requirements. It includes Microsoft Azure Storage (Blob,
Marketing, Sales, Commerce, and Service. Our salesforce tutorial is Queue Table, and Azure File services), Azure SQL Database, and the Redis
designed to help beginners with the Salesforce and professionals' basic Cache.
concepts with advanced concepts. In this, we will cover all the essential
b)Application services: It includes services, which help us to build and operate
topics of Salesforce from beginning to Apex development. our application, like the Azure Active Directory, Service Bus for connecting
AWS:- AWS (Amazon Web Services) is a comprehensive, evolving cloud distributed systems, HDInsight for processing big data, the Azure Scheduler, and
the Azure Media Services.
computing platform provided by Amazon that includes a mixture of
infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) and c)Network services: It helps you to connect with the cloud and on-premises
packaged-software-as-a-service (SaaS) offerings. AWS services can offer infrastructure, which includes Virtual Networks, Azure Content Delivery Network,
an organization tools such as compute power, database storage and and the Azure Traffic Manager.
content delivery services. Amazon.com Web Services launched its first
VMware:- VMware is a virtualization and cloud computing software
web services in 2002 from the internal infrastructure that Amazon.com
vendor based in Palo Alto, California. Founded in 1998, VMware is now a
built to handle its online retail operations. In 2006, it began offering its
subsidiary of Dell Technologies. VMware bases its virtualization
defining IaaS services. AWS was one of the first companies to introduce
technologies on its bare-metal hypervisor ESX/ESXi in x86 architecture.
a pay-as-you-go cloud computing model that scales to provide users
Bare-metal embedded hypervisors can run directly on a server’s
with compute, storage or throughput as needed.
hardware without the need of a primary operating system. With VMware
Cloud bursting:- It is a configuration method that uses cloud computing server virtualization, a hypervisor is installed on the physical server to
resources whenever on-premises infrastructure reaches peak capacity. allow for multiple virtual machines (VMs) to run on the same physical
When organizations run out of computing resources in their internal data server. Each VM can run its own operating system, allowing multiple
center, they burst the extra workload to external third-party cloud OSes to run on one physical server. All of the VMs on the same physical
services. Cloud bursting is a convenient and cost-effective way to to server share resources, such as networking and RAM. VMware products
support workloads with varying demand patterns and seasonal spikes in include virtualization, networking and security management
demand. tools, software-defined data center software, and storage software.
VMware vSphere is a server virtualization platform for implementing and
Docker Container:- To know what is docker in cloud computing, first, we
managing VM infrastructures on a large scale.
need to understand what containers are in the cloud environment. A
container is an executable part of the software that is embedded with Xen Para Virtualization:- Paravirtualization involves modifying the OS
application code and libraries and dependencies to run anywhere, be it kernel. The OS kernel acts as a bridge between the applications and the
on desktop or cloud. A container in cloud computing is used to build processing done at the hardware level. Paravirtualization replaces
blocks, which help in producing operational efficiency, developer nonvirtualizable instructions with hypercalls that communicate directly
productivity, and environmental consistency. Containers are small, fast, with the virtualization layer hypervisor. A hypercall is based on the same
and portable. Because of this, the user is assured of reliability, concept as a system call. System calls are used by an application to
consistency, and quickness regardless. request services from the OS and provide the interface between the
application or process and the OS. Hypercalls work the same way, except
Docker in cloud computing is a tool that is used to automate the the hypervisor is used. The hypervisor also provides hypercall interfaces
for other kernel operations including memory management and interrupt
deployment of applications in an environment designed to manage
handling.
containers. It is a container management service. These containers help
In paravirtualization, after the host OS boots, the VM emulator is launched.
applications to work while they are being shifted from one platform to Depending on the platform, the emulator uses either the VMLAUNCH (Intel)
another. Docker’s technology is distinctive because it focuses on the or the VMRUN (AMD) instruction to start execution of the VM. At that point,
requirements of developers and systems. This modern technology there are two copies of the OS in existence. The host is in a suspension
enables enterprises to create and run any product from any geographic mode, while the guest runs in an active state.
location.

You might also like