0% found this document useful (0 votes)
6 views7 pages

CC Assignment

The document outlines various aspects of cloud computing, including roles such as Cloud Auditor and Cloud Broker, definitions of key terms like NIST and hypervisor, and concepts like logical network perimeter and virtual servers. It discusses resource replication, differences between public and private clouds, cloud characteristics, and types of cloud storage. Additionally, it highlights the drawbacks of cloud computing, including security issues, downtime, limited control, and hidden costs.

Uploaded by

mr.bhayani009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views7 pages

CC Assignment

The document outlines various aspects of cloud computing, including roles such as Cloud Auditor and Cloud Broker, definitions of key terms like NIST and hypervisor, and concepts like logical network perimeter and virtual servers. It discusses resource replication, differences between public and private clouds, cloud characteristics, and types of cloud storage. Additionally, it highlights the drawbacks of cloud computing, including security issues, downtime, limited control, and hidden costs.

Uploaded by

mr.bhayani009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

1. Cloud Auditor, Cloud Broker.

 Cloud Auditor:- It is a third party that conduct independent assessment of cloud


environment.
 Cloud Broker:- This role is assumed by party that responsibility of managing and negotiating
the use of cloud service.

2. Write full form of NIST.


 NIST – National Institute of Standard and Technology

3. Logical network perimeter


 A Logical Network Perimeter is a virtual boundary that controls access to network resources
using software-defined rules rather than physical barriers. It enforces security policies
through firewalls, VPNs, encryption, and identity-based authentication.

4. Virtual Server
 A Virtual Server is a software-based server that runs on a physical machine using
virtualization technology, allowing multiple servers to operate independently on the
same hardware. It provides flexibility, scalability, and resource efficiency while
mimicking the functionality of a physical server.

5. What is hypervisor?
 A Hypervisor is a software or firmware layer that enables virtualization by allowing
multiple virtual machines (VMs) to run on a single physical host. It manages resource
allocation and isolates VMs to ensure independent operation.
Write answer in detail:

1. Draw the figure of Workload distribution architecture.

2. Write an example of resource pool.


 An example of a Resource Pool is a VMware vSphere Resource Pool, where CPU
and memory resources from a physical host or cluster are grouped and allocated dynamically
to virtual machines (VMs) based on predefined policies. For instance, in a corporate
environment, an "HR Resource Pool" may be allocated a specific amount of CPU and RAM
to ensure HR-related applications have guaranteed performance, separate from other
departments.

3.Draw neat sketch of elastic resource capacity architecture.


4. Explain resource replication in cloud computing with necessary diagram.
 Definition:
Resource replication in cloud computing is the process of creating and maintaining
multiple copies of data, applications, or virtual machines across different locations or
cloud servers. This enhances availability, fault tolerance, disaster recovery, and load
balancing.

Key Aspects of Resource Replication:


1. Data Replication – Copies of data are stored across multiple data centers to prevent
data loss.
2. VM Replication – Virtual machines are replicated to ensure high availability and
failover support.
3. Storage Replication – Cloud providers replicate storage across different zones to
avoid data loss.
4. Application Replication – Applications run across multiple cloud regions to improve
performance.

Diagram:

5. Write a difference between public cloud and private cloud.


Difference Between Public Cloud and Private Cloud
Feature Public Cloud Private Cloud

Owned and managed by Owned and managed by a


Ownership third-party providers (e.g., single organization.
AWS, Azure, Google Cloud).
Restricted to a single
Available to multiple users or organization or specific
Accessibility
businesses over the internet. users.
Feature Public Cloud Private Cloud

Pay-as-you-go model; no Higher costs due to


Cost infrastructure maintenance infrastructure setup and
costs. maintenance.

Standard security measures; Higher security and


Security shared infrastructure may control as it is dedicated
pose risks. to one organization.

Limited scalability based


Highly scalable with on- on on-premises
Scalability
demand resource allocation. infrastructure.

6. Enlist different cloud characteristics.

Cloud Computing Characteristics

 On-Demand Self-Service – Users can provision resources automatically without


human intervention.
 Broad Network Access – Cloud services are accessible over the internet from any
device.
 Resource Pooling – Resources (CPU, storage, network) are shared among multiple
users dynamically.
 Rapid Elasticity – Resources can scale up or down automatically based on demand.
 Measured Service (Pay-as-you-go) – Users pay only for the resources they consume.
 Multi-Tenancy – Multiple customers share the same infrastructure while maintaining
data isolation.
 High Availability & Reliability – Cloud providers ensure minimal downtime and data
redundancy.
 Security – Cloud platforms offer encryption, authentication, and compliance controls.
 Automation & Manageability – Automated resource provisioning, monitoring, and
maintenance.

7. Explain different boundaries of cloud computing with figure.


 1. Physical Boundary:-
 Refers to the physical infrastructure of cloud computing, such as data centers,
servers, and storage devices.
 Cloud providers manage these resources across multiple geographical locations.
 Users have no direct control over physical hardware.
2. Logical Boundary:-
 Defines virtualized environments where cloud resources (such as virtual machines,
containers, and networks) operate.
 Ensures isolation between different tenants in multi-cloud environments.
 Examples: Virtual Private Cloud (VPC), Software-Defined Networks (SDN).
3. Security Boundary:-
 Defines the security controls that separate cloud environments from unauthorized
access.
 Includes firewalls, encryption, access control, identity management, and
compliance policies.
 Ensures data integrity, privacy, and protection from cyber threats.

Figure:-

8. Enlist and explain types of cloud storage level with suitable figure.

1. Object Storage

 Definition: Stores data as objects with metadata and a unique identifier.


 Use Case: Suitable for unstructured data such as multimedia, backups, and big data
analytics.
 Examples: Amazon S3, Google Cloud Storage, Azure Blob Storage.
 Advantages: Scalable, cost-effective, and ideal for distributed access.

2. Block Storage

 Definition: Divides data into fixed-sized blocks, each with a unique address.
 Use Case: Best for applications requiring high performance, such as databases and
virtual machines.
 Examples: Amazon EBS, Google Persistent Disk, Azure Disk Storage.
 Advantages: Low latency, high-speed access, and better performance than object
storage.

3. File Storage

 Definition: Stores data in a hierarchical file and folder structure.


 Use Case: Used for file-sharing applications, home directories, and collaboration
tools.
 Examples: Amazon EFS, Google Filestore, Azure Files.
 Advantages: Familiar file-based access, easy to manage, and supports multiple users
9. Explain a main difference between Monitoring agent, Resource agent and Polling
agent with suitable figure.

Agent Type Function Purpose Example Use Case


A server monitoring
Observes system performance,
Ensures real-time agent in AWS
Monitoring collects data on metrics like
health monitoring CloudWatch tracking
Agent CPU, memory, and network
and issue detection. CPU usage.
usage.

Kubernetes node agent


Manages and controls Helps in provisioning,
Resource handling container
specific cloud resources like scaling, and managing
Agent workloads.
VMs, databases, or storage. cloud services.

Periodically requests data Used when real-time A database polling agent


Polling from a system or application monitoring is not checking for new
Agent to check for updates or status necessary but periodic transactions every 10
changes. updates are needed. minutes.

10. Enlist and explain drawback of cloud computing.


 1. Security and Privacy Issues
 Explanation: Storing sensitive data in the cloud raises concerns about data breaches,
unauthorized access, and compliance with regulations.
 Example: If a cloud provider is hacked, confidential business data may be exposed.

 2. Downtime and Service Outages
 Explanation: Cloud services depend on internet connectivity, making them vulnerable
to downtime due to network failures or provider issues.
 Example: If AWS or Google Cloud experiences an outage, businesses relying on their
services may face disruptions.

 3. Limited Control and Dependency on Provider
 Explanation: Users have limited control over cloud infrastructure, as cloud providers
manage hardware, security, and updates.
 Example: Businesses cannot customize the underlying infrastructure as they would
with an on-premises data center.

 4. Hidden Costs and Pricing Complexity
 Explanation: Pay-as-you-go pricing can lead to unexpected costs, especially if
resource usage is not carefully managed.
 Example: A company using auto-scaling features may receive a high bill if traffic
spikes unexpectedly.

You might also like