Hey This Is For Scribd by ED LOREM IPSUm

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 43

HR Round FAQs

1.Tell me about your self.


Dear Sirs I am Eshwar S Devaramane a Final Year B.E. student of Information science and
Engineering and have passed all six semester with distinction, with an average CGPA of 8.8
from 2016-present. I have good academic record both in X grade ( ICSC 2013-2014) with a
percentage of 86% and II PUC (state PU Board) in the year 2015-2016 with a percentage of
88%.
I have participated in many Hackathons and I have got a prize in one of the
hackathon in Jan 2019.
I am energetic and very good at Cloud computing, even I have a certificate of Microsoft
cloud fundamentals , networking, web designing and blockchain development. I have
completed my internship (June 2019-July 2019) and worked as block chain developer.
I am a good trouble shooter and easily debug the customers issues for me customer is God
and I listen to them and analyze their issues and needs and provide them best solutions with
minimum risks. I can develop and contribute to internal and external knowledge base. I
believe in team work and try to work with all technology partners. To be honestly I always
strive to deliver outputs on time, every time and always. If required I can work beyond to
achieve the goals of company.
Sirs, I have an excellent verbal and written communication skills also. I have good
problem-solving skills additional with interpersonal skills.
I am an hungry person to learn new things as I am hard working, organized, reliable, helpful,
honest and cooperative .
I am very much interested to work with Nutanix as it work with 4h, Hungry. Humble. Honest.
with Heart. I am ambitious to build the nation as global player.

2.What are your hobbies


Cycling,
3.How would you benefit if you were hired.
I will be an asset to the company delivering the outputs on time, every
time and always.
4.Be frank about your strengths and weakness.
My strength is my flexibility I can adjust to any kind of work culture.
Also, I set a time frame for all major tasks and try to finish the task at
that particular time frame. If, I didn’t achieve my milestone, I used to
analyse the causes that stop me from achieving the goal and try to
rectify the drawbacks next time. I always strive to be on time, every
time and always.
Weaknesses: I am very soft by nature that’s why I easily believe on
others words. I always try to help others without understanding
whether that will be good or bad for me. Also, I am very shy, but once
I get to know a person, I don't have any issues in interacting with that
person.
I always like to watch TV watching comedy shows, interesting
engineering, cycling sports.
5.What do you want to do in life and how and where do you plan
to reach?
" The dreams of my life are not only dreams , are the goals of my
life which I want to live , achieve and experience . "
Firstly I want to be the proud of my family by making their
dreams true. Although their dreams are mine and mine theirs.
I want to stay simple , humble , down to earth , laborious person ,
love of my family throughout my life.
To become a team leader that can develop world class
techproducts.
6.Knowledge about company and its products
Nutanix is an eclectic (multifaceted) group of 4,000+ dreamers,
believers and builders, operating in over 40 countries. A 4H
company with Hungry. Humble. Honest. With Heart. The 4H’s:
these are core values and the DNA of Nutanix . They help drive
employees to succeed, to strive to be better, to learn from every
experience. Employees are encouraged to have spirited debates
and conversations and to think with a founder’s mindset. This
means we’re all CEO’s of the company and, as such, make the
best decision every day that aligns with our company goals. It’s
through our values, our conversations and mindsets that we can
continue to disrupt the industry and drive innovation in the
market.

Nutanix is a global leader in cloud software and hyperconverged


infrastructure solutions, making infrastructure invisible so that
IT can focus on the applications and services that power their
business. Companies around the world use Nutanix Enterprise
Cloud OS software to bring one-click application management
and mobility across public, private and distributed edge clouds so
they can run any application at any scale with a dramatically
lower total cost of ownership. The result is organizations that can
rapidly deliver a high-performance IT environment on demand,
giving application owners a true cloud-like experience. Learn
more about our products at www.nutanix.com or follow us on
Twitter @Nutanix.
Products of Nutanix
Hyperconverged Infrastructure
 Acropolis (AOS)
 AHV Virtualization
 Prism Infrastructure Management
 Move Application Migration
 Mine Secondary Storage
Storage Services
 Files
 Volumes
 Objects
Networking & Security
 Flow Networking
Automation & Orchestration
 Calm Application Automation
 Prism Pro Smart IT Operations
 Era Database Services
 Karbon Kubernetes Service
Cloud Services
 Xi Beam Multicloud Governance
 Xi Epoch Observability & Monitoring
 Xi Frame Desktop-as-a-Service
 Xi IoT Platform
 Xi Leap Disaster Recovery
Product Specifications
 Hardware Platforms
 Software Options
Tools
 Hyperconverged Test Drive
 AOS Community Edition
 X-Ray Infrastructure Benchmarking
 Size Your Datacenter

7. Role of SRE in Nutan

Responsibilities:
 Troubleshoot, debug, and diagnose customer issues
encountered in the field.
 Improve serviceability of the product by testing new features
and developing tools to scale our field deployment and auto-
support infrastructure.
 Provide analysis of our existing customer base to avoid and
minimize risks in the field.
 Define and drive changes to our product with our
development engineering team based on feedback from
customers and field implementations.
 Work with technology partners (ie.g. VMware, Citrix,
Microsoft) to resolve issues and push improvements in our
ecosystem.
 Develop and contribute to internal and external knowledge
bases.
 Provide support on weekdays and also off hours on an as
needed and scheduled rotational basis
 Be a champion for our customers. Go above and beyond to
support their business and use of the Nutanix stack.
Systems Reliability Engineer (SRE): Your support cases are
assigned to an SRE and they are your main contact for providing
technical support and guidance. Their responsibilities include:
• Responding to support cases on the phone and by e-mail •
Recreating customer technical environments • Researching,
identifying and resolving product technical issues • Working with
cross-functional teams within Nutanix to resolve issues •
Documenting case notes accurately, and developing solutions for
the knowledgebase

Common roles and responsibilities for a site reliability


engineer
Implementing an SRE team will greatly benefit both IT operations and
software development teams. Not only can SRE drive deeper reliability to
systems in production but it will likely help IT, support and development
teams spend less time working on support escalations, and give them more
time to build new features and services.

So, let’s quickly go over common site reliability engineering roles and
responsibilities you can expect to see.

Creating a Culture of Reliability


Read the Story

 Building software to help operations and support teams

SRE teams are in charge of proactively building and implementing services


to make IT and support better at their jobs. This can be anything from
adjustments to monitoring and alerting to code changes in production. A
site reliability engineer can be tasked with building a homegrown tool from
scratch to help with weaknesses in software delivery or incident
management.

 Fixing support escalation issues

Similarly to the point above, a site reliability engineer can expect to spend
time fixing support escalation cases. But, as your SRE operations mature,
your systems will become more reliable and you’ll see fewer critical
incidents in production – leading to fewer support escalations. Because an
SRE team touches so many different parts of the engineering and IT
organization, they can be a great source of knowledge and can be helpful
for routing issues to the right people and teams.

 Optimizing on-call rotations and processes

More times than not, site reliability engineers will need to take on-call
responsibilities. At most organizations, the SRE role will have a lot of say in
how the team can improve system reliability through the optimization of on-
call processes. SRE teams will help add automation and context to alerts –
leading to better real-time collaborative response from on-call responders.
Additionally, site reliability engineers can update runbooks, tools and
documentation to help prepare on-call teams for future incidents.

 Documenting “tribal” knowledge


SRE teams gain exposure to systems in both staging and production, as
well as all technical teams. They take part in work with software
development, support, IT operations and on-call duties – meaning they
build up a great amount of historical knowledge over time. Instead of siloing
this knowledge into the mind of one team or one person, site reliability
engineers can be tasked with documenting much of what they know.
Constant upkeep of documentation and runbooks can ensure that teams
get the information they need right when they need it.

 Conducting post-incident reviews

Without thorough post-incident reviews, you have no way to identify what’s


working and what’s not. SRE teams need to keep teams honest and ensure
that everyone – software developers and IT professionals – are conducting
post-incident reviews, documenting their findings and taking action on their
learnings. Then, site reliability engineers are often tasked with action items
for building or optimizing some part of the SDLC or incident lifecycle to
bolster the reliability of their service.

Where does SRE fit on your team?


Site reliability engineering roles and responsibilities are crucial to the
continuous improvement of people, processes and technology within any
organization. Whether your team has already taken on a full-blown DevOps
culture or you’re still attempting to make the transition, SRE offers
numerous benefits to speed and reliability. SRE fits right at the crossroads
of IT operations, support and software engineering. SRE serves as the
perfect blend of skills to tighten the relationship between IT and developers
– leading to shorter feedback loops, better collaboration and more reliable
software.

Pros and cons of being a site reliability engineer


Catchpoint recently put out their 2019 SRE Report showing that site
reliability engineers were some of the happiest employees in software
development and IT. While SREs can’t spend all of their time building new
features for customers, they’re constantly making an impact on customer
experience. In fact, if you’re looking for a role designed to help customers
the most – then SRE is it.

Site reliability engineering not only improves the lives of customers but,
when done right, improves the lives of on-call teams, IT professionals and
software developers. SRE can be one of the most fulfilling roles for a
software engineer. It can help you better understand the struggles of IT and
support, making you a better developer going forward.

See how we added SRE into our own DevOps culture – driving deeper
reliability and collaboration across all of our teams. Download our
free eBook, Building the Resilient Future Faster, to see how site
reliability engineering can increase system reliability and quickly
drive value for your own team.

8. Why do you want to work as an SRE ?


SRE eventually became a full-fledged IT domain, aimed at
developing automated solutions for operational aspects such as
on-call monitoring, performance and capacity planning, and
disaster response. It complements beautifully other core DevOps
practices, such as continuous delivery and infrastructure
automation.
“Site reliability engineers create a bridge between development and
operations by applying a software engineering mindset to system
administration topics.”
You can become an SRE regardless of your background in
software or systems engineering, as long as you have solid
foundations in both and a strong incentive for improving and
automating. If you are a systems engineer and want to improve
your programming skills, or if you are a software engineer and
want to learn how to manage large-scale systems, this role is for
you. Deepening your knowledge in both areas will give you a
competitive edge and more flexibility for the future.
If you are a “continuous improvement aficionado” like me, the
SRE role will allow you to gain the system-wide view: You will
understand how the software delivery value chain works and
know how to ensure agility and reliability and deliver more value
overall. It can be highly motivating and offer an ideal position to
demonstrate the value you bring to your organization.
There is also no better role for staying in touch with the newest
developments in the DevOps world and expanding your
knowledge and skills in high-demand areas such as infrastructure
automation, release engineering, and continuous delivery. It is
highly improbable that you’ll get bored being an SRE. On the
contrary, it’s a highly creative, stimulating, and technically
challenging role.

9. Why Nutanix??/ (Virtualisation and Hyper vision)


 I had studied the company and believe in the direction it is
taking. Also any time I called in to support the people were
extremely friendly and helpful. This is the type of company I
would like to work for.
Very simple it is as good as Google and it is working on cloud
computing and I love to work on cloud computing.
10. Rate yourself in programming, Linux and other topics
In the scale of 1 to 10, I can rate myself as 6 to 7 in all of the
above.
11.Things you wish to improve yourself.
There is no limit for learning if I am honest enough I want to
improve in all the tools which makes both my customers and
employee delightful.

Technical Interview
Nutanix recently visited our campus for internship cum ppo
recruitment for SRE profile. The first round was held on
hackerrank platform which had 50 mcq covered topis linke linux
commands, os, networking and virtualization
interview questions:
linux :what is ping?
how does linux starts/boots the whole process from pressing of
reboot button to displaying of the screen?
who much current is needed to check that the perepheral devices
are working during the boot process and when is it done??
how does the mobile connects to wifi?
there were many more I don’t remember, simply keep your basics
of linux,virtualization, networking and os clear and dig as deep as
you can into the above mentioned topics if you want to get into the
company for SRE. They emphasis very much on LINUX.
Operating System
RAID, or “Redundant Arrays of Independent Disks” is a
technique which makes use of a combination of multiple disks
instead of using a single disk for increased performance, data
redundancy or both. The term was coined by David Patterson,
Garth A. Gibson, and Randy Katz at the University of California,
Berkeley in 1987.

2. SDD VS HDD WORKING


In its simplest form, an SSD is flash storage and has no moving
parts whatsoever. ...SSD storage is much faster than
its HDD equivalent. HDD storage is made up of magnetic tape
and has mechanical parts inside. They're larger than SSDs and
much slower to read and write.
Hard Disk Drive (HDD) vs Solid State Drive (SSD): What’s the
Diff?
A solid-state drive (SSD) is a non-volatile secondary storage
medium, which stores data in a file system using NAND flash
memory (non-volatile memory). However, some models are
constructed using volatile random access memory (RAM) and use
batteries to sustain their power supply, thereby mimicking the
permanent storage capabilities of non-volatile storage mediums
such as hard drives and flash memory.
It is worth noting that because SSDs store data using electrical
charges, that they will lose data if not supplied with power for
prolonged periods. The period is dependent on the model you
have.
SSD stands for ‘Solid-State Drive’ and HDD stands for ‘Hard
Disk Drive’, although it is correct to call an HDD a ‘hard drive’.
A hard disk drive is a mechanical data storage medium that
stores files via magnetization on rotating platters. The files on the
platters are accessed using read/write heads that hover over the
rotating platters with the help of electromagnetic actuators.
SATA hard disk drive (bottom) and two solid-state SATA drives
(top). Image credit: iStock.com/Евгений Миронов
Hard drives may be equipped with one, two, three, or even more
platters dependent on the model. Platters are normally made of
either glass or aluminium, depending on the model. Hard drive
platters typically rotate at speeds ranging from 5,400 RPM to
7,200 RPM. However, some models such as those in the Western
Digital Velociraptor and Seagate Cheetah product lines operate at
speeds of 10,000 RPM and 15,000 RPM respectively.
Table Of Contents
1. Performance Of Solid-State Drives Vs Hard Drives
2. PCI Express Solid-State Drives Vs Their SATA Equivalent
3. Power Consumption Of Solid-State Drives
4. Cost Comparison Of SSDs Vs Hard Drives

Performance Of SSDs Vs Hard Drives


Are SSDs faster than hard drives?
Yes, solid-state drives are significantly faster than hard drives.
The hard drives are the conventional, ‘tried-and-true’ storage
medium, but solid-state drives have been mainstream for years,
and have made their way into PCs and servers alike. Therefore,
the SSD is no longer a novelty. It’s worth noting that despite their
solid-state design, SSDs are not necessarily the most reliable
drives.
The speed of an SSD drive is heavily dependent on the model,
which means you’ll need to choose that carefully. In some cases,
an SSD’s read speeds are easily twice that of a mechanical hard
drive (HDD), at 500-600 MB/s. SSD write speeds are often lower
than read speeds, and but can still easily exceed 500 MB/s. The
Seagate 850 EVO SSD models, for example, have read and write
speeds of 540 MB/s and 520 MB/s respectively.
Most hard drive data transfer rates (both read and write speeds),
on the other hand are under 160 MB/s. Therefore, SSD transfer
rates are 3 to 13 times faster than hdd transfer rates in the case of
SATA and PCI Express SSDs respectively.
Note that not all SSDs will provide improvements as significant as
that.
Please note that there are many performance-related metrics for
drives which aren’t a measure of their performance, but instead
of measure of their interfaces’ performance. For example, the
6Gb/s SATA transfer ratings you may see. What you need is the
read and write speeds, not to belittle the importance of the
interfaces’ performance.
For this comparison, mid-range hard drives (including the Western
Digital Blue) were compared to mid-range SSDs.
PCIe SSDs Vs SATA SSDs
There are various different types of SSDs. A key variation is in
their interfaces: PCIe vs SATA. PCIe solid-state drives are not
installed in the 3.5″ or 2.5″ drive bays that their SATA
counterparts are. Instead, they are mounted on the motherboard
via the PCI Express (PCI-e) slot.
PCI Express (PCIe) SSDs are often significantly faster (both in
terms of read and write speeds) than SATA SSDs. Their
performance is unmatched by SATA SSDs. For example, the
Samsung 960 Pro NVMe SSD has a read speed of up to 3,500
MB/s, and a write speed of up to 2,100 MB/s. The catch is that
PCIe SSDs cost twice as much as their SATA counterparts in
some cases!

New type of storage M2 high speed SSD closeup on white


background. Image credit: UK-VIT/Bigstock.com
For example, a 512 GB Samsung 960 Pro PCIe SSD (this is an m.2
SSD) cost $300 USD at the time this article was written, while a
525GB SATA SSD could be obtained for $150. A 500GB laptop
hard disk drive, on the other hand, costs only $50.
NB: There is a variety of PCI Express slots, so ensure that the
drive matches the one you have. For example, there is PCI
Express x1 (single-lane), PCI Express x16 (16-lane), etc.
Performance Class Hard Drives Vs SSDs
There are high-performance hard drives such as the Western
Digital Velociraptor and Seagate Cheetah. The Velociraptor hard
drives attempt to bridge the gap between SSDs and hard drives
by offering improved performance over 7,200 RPM hard drives,
but without the high price of SSDs.
However, these high performance hard drives are still costly, and
they fall short of the performance of SSDs. The performance
enhancement offered by SSDs is worth the extra money, if you
can afford it. There are other premium hard drives which are a
little better than average, and also come in at reasonable prices.
For example: The WD Black models.
External SSDs
External solid-state drives are on the market. However, there are
various configurations that offer differing transfer rates. For
example: The USB 3.0 SSDs are limited to the transfer speeds of
the USB 3.0 standard, but there are also Thunderbolt SSDs as
well as USB-C SSDs that can transfer data at much higher speeds.
However, this is not always the case. It depends on the drive and
the brand.
What you need to achieve the best possible performance in an
external SSD is a combination of a fast internal interface for the
drive itself (for example: PCI Express, as opposed to SATA), and
a fast USB interface for the casing as well (USB-C).
External hard drives are actually internal SATA (and sometimes
PCI Express) hard drives like those you’d find in a laptop or
desktop computer) installed in an enclosure containing a SATA-
to-USB converter.
Power Consumption Of Solid-State Drives
SSD Vs Hard Drive Energy Usage: Do solid-state drives consume
less power than hard drives?
Yes, solid-state drives consume significantly less power than hard
drives. Therefore solid-state drives can extend laptop battery life.
Crucial claims that their 512GB SATA SSD consumes only 0.075
Watts, while conventional hard drives consume 6.8 Watts.
6.8 Watts is plenty for a laptop battery, and a conventional hard
drive could therefore consume 16% of a laptop battery’s energy
per hour. The laptop battery mentioned this example has a
capacity of 43 Wh, although sizes ranging from 50-85 Wh are
common.
The power consumption of SSDs during both sequential and
random write operations normally ranges from 1.6 to 4.1 Watts.
Would A Laptop Or Desktop Benefit More From An SSD
Upgrade?
A laptop. Laptops benefit more from SSD upgrades than desktops
do, because they are plagued with a limited battery capacity and
are usually shipped with slow hard drives. This applies if you
don’t need much space and are primarily concerned about
performance.
A desktop offers more flexibility because you can install multiple
drives in many cases (this is less likely if you have an all-in-one
computer). For example: You can install a 1TB SSD boot drive
which your operating system and apps are loaded from, resulting
in faster boot and load times, and then install a larger 2TB HDD
to store your infrequently-accessed files such as photos and
documents you don’t view often.
Financially, this would pan out much better than three 1TB SSDs.
Let’s explore the cost differences below.
SSD Vs HDD Cost Comparison
The cost of solid-state drives is the number one deterrent to their
adoption. Nevertheless, SSD prices have come down and they are
fairly popular, especially among MacBook users. SSDs are the
best drives in most respects, they’re just expensive.
NB: Prices vary significantly with brand and model.
Let’s use an example 1TB PCI Express SSD and install a second
drive for infrequently-accessed storage (2TB HDD):
1TB PCie SSD price (Samsung 960 Pro): $300.
2TB HDD (WD Black) price: $120.
Total: $420.
Now let’s compare that to the cost of three of the same 1TB SSDs
mentioned above, and omit the hard drive:
PCIe SSD drive price: 3 * $300.
Total: $900!
In the case of a laptop, you could install an SSD and then
purchase an external hard drive to expand your storage capacity.
I would recommend one of the smaller pocket drives, of course.
Laptops are meant to be portable, and portability is what you’re
paying for!
Let’s say that you want the same 3TB of storage on a laptop. You
could purchase a 1TB SATA SSD (as your laptop is more likely to
have support for this than PCI Express), and a 2TB external hard
drive for infrequently-accessed files.
1TB SATA SSD (Western Digital Blue) price: $290.
2TB External Hard Drive (Seagate Expansion) price: $65.
Total: $355. This is only cheaper because it’s SATA, rather than
PCIe SSD. Another factor to note is that the external hard drive is
also slower than the internal WD Black one used in the desktop
above. The WD Black is more expensive because Black is a
premium product line.
Upgrading To An SSD: Is It Worthwhile?
Upgrading to an SSD is worth it if your computer was
manufactured after 2010. Bear in mind that while an SSD can
breathe life into an old computer, it isn’t enough to compensate
for a slow processor (which could be considered a performance
bottleneck).
For example, I wouldn’t recommend installing an SSD in a
computer with a single-core processor or less than 3GB of RAM.
Ensure that you can at least upgrade to a better processor and
RAM first, and then proceed to upgrade the hard drive. That will
make the upgrade more substantial.
TECHNICAL
SAN VS NAS [STORAGE BASICS]
Storage area networks and network-attached storage both
provide networked storage solutions. A NAS is a
single storage device that operates on data files, while a SAN is a
local network of several devices.
SUBNETTING
Difference between HTTP and HTTPS
Difference Between HTTP and HTTPS. The primary difference
between HTTP and HTTPS protocol is that HTTP is not secure
where as HTTPS is a secure protocol which uses TLS/SSL
certificate to ensure the authentication. ... More precisely, HTTP
and HTTPS are used to transfer hypertext documents on the
world wide web (www).
Difference Between HTTP and HTTPS
July 17, 2017 1 Comment
The primary
difference between HTTP and HTTPS protocol is that HTTP is
not secure whereas HTTPS is a secure protocol which
uses TLS/SSL certificateto ensure the authentication. These are
the alpha privative for URL on the web and used to retrieve the
web pages from the web server.
More precisely, HTTP and HTTPS are used to transfer hypertext
documents on the world wide web (www).
These protocols are fairly easy, a client (typically a browser) sets
a TCP connection to the server (HTTP or HTTPS), sends a
request in the form of an ASCII string and expects a reply. The
reply is often also formatted as an ASCII string, although, many
other data formats can be returned by the server (for example,
images are sent as binary data).
If we are using HTTP protocol, it is easier to breach the security
as data and information transferring is in plain text. But while
using HTTPS protocol, it is tough to breach the security as the
data and information sent is in encrypted form. HTTPS protocol
is highly recommended if the client is transferring his/her
sensitive and confidential data.
Content: HTTP Vs HTTPS
1. Comparison Chart
2. Definition
3. Key Differences
4. Example
5. Conclusion
Comparison Chart

BASIS FOR
HTTP HTTPS
COMPARISON

Prefix Used Url begins with Url begins with "https://"


"http://"

Security Unsecured. Secured.

Operated On Application layer Transport layer.

Encryption No encryption is Encryption is used.


there

Certificate Not required. Necessary

Port Used Port number 80 is Port number 443 is used


used for for communication.
communication.

Characteristics It is subject to man- It is designed to resist


in-the-middle and man-in-the-middle and
eavesdropping eavesdropping attacks
attacks. and is considered secure
against such attacks.

Example Websites like Websites like Banking


internet forums, Websites, Payment
educational sites. gateway, Shopping
Websites, etc.
Definition of HTTP
HTTP (Hypertext Transfer Protocol) is the base of the data
communication for the web this is how the internet works when it
comes to delivering the web pages. It is TCP/IP based protocol
and things like text, audio, videos, images can be transmitted
through it.
HTTP works on request and response cycle where the client
requests a web page. Suppose, if you browse to google.com, you
are requesting a web page from the server, and the server will
deliver you response.

HTTP is a stateless protocol which means every single transaction


you made through HTTP is independent in nature. However, this
can be delivered through using HTTP cookies, server side
sessions, variables, URL rewriting.
When a client wants to browse a website first thing that happens
is that request is sent to the server known as HTTP
message. Thereafter, the server will prepare a response and send
it back. The message will be different depending on its message
response and request.
Request HTTP Message
Request HTTP Message
1. Start line contains method, URI, and HTTP version.
o Method: It is like a command that is given to the
servers so that server will know what to do. for
example, GET, POST, HEAD,
PUT, DELETE, etc.
o URI: It expands to Uniform Resource Identifier is a set
of readable characters and a way to locate the
resource.
o HTTP version: It specifies the version of HTTP a client
is using.
 In the headers, we have informational rules such as:
o Host: Specifies the address of the server where we are
sending a request.
o Accept: Specifies the file type we are requesting.
o Accept language: Specifies the language.
 It doesn’t contain body in the request.
Response HTTP Message
Response HTTP Message
1. Start line: there is no method in the start line as it is only
used in the request. In the response, we have the HTTP
version and status code.
o HTTP version: It specifies the version of HTTP a client
is using.
o Status code: It tells the client if the request succeeded
or failed. for example, 404- page not found, 200 – ok,
etc.
 The header will contain the same information as the
request.
o Host: Specifies the address of the server where we a
request is sent.
o Accept: Specifies the requested file type.
o Accept language: Specifies the language.
 The body will hold the file we have sought.
The main issue of HTTP is that it is not encrypted and plain
text is used, meaning that it is unsecured at transferring data
among the computer and server. It is popular to exploit the man-
in-the-middle attacks, if you run a HTTP connection anyone can
put himself in the middle and start using names, emails,
passwords in the plain text.
Definition of HTTPS
HTTPS (Hypertext Transfer Protocol Secure) is nothing but the
HTTP working in tandem with SSL (Secure Socket Layer) that is
the “S” in HTTPS. SSL takes care of ensuring that the data goes
securely over the internet. The alternative names given to HTTPS
are HTTP over TLS, HTTP over SSL and HTTP secure.
This protocol was designed to increase primarily on the internet
when communicating with web sites and sending sensitive data.
This made man-in-the-middle attack increasingly difficult as the
data send is no longer in plain text.

To secure your website one needs to purchase something


called SSL certificate. These are relatively expensive and most
hosting companies offer them. SSL certificate is analogous to an
online identification card. SSL certificate also encrypts any data
that passes through https protocol.
Now, a client requests data from the server it looks for the SSL
certificate which will verify websites identity with the certificate.
If everything is good, a handshake takes place where an
encryption method is decided through SSL.
Key Differences Between HTTP and HTTPS
The points given below covers the difference between HTTP and
HTTPS:
1. If we talk about security HTTP has security issues whereas
HTTPS is secured.
2. Hypertext Transfer Protocol operates at application layer.
On the contrary, Hypertext Transfer Protocol Secure
functions at Transport Layer.
3. HTTPS requires certificates to verify the identity of the
websites. As against, in HTTP there is no requirement of
certificates.
4. No encryption is used in HTTP. On the other hand both
encryption and decryption is used in HTTPS.
5. For communication purposes, port number 80 is utilized in
HTTP, while HTTPS makes use of port number 443.
6. HTTP is prone to man-in-the-middle and eavesdropping
attacks, but HTTPS is designed to resist such attacks.
Example:
HTTP could be used in most of the websites like internet forums,
educational sites. Because these are open discussion forums,
secured access is not required. For example http://www.ndtv.com
HTTPS should be used in Banking Websites, Payment gateway,
Shopping Websites, Login Pages, Emails and Corporate Sector
Websites. For example https://paytm.com/
Conclusion:
Both HTTP and HTTPS are the hypertext document transferring
protocol, but HTTPS provides a secure way to transfer the
sensitive data,  information and file from client to server and vice-
versa on the internet.
Related Differences:
1. Difference Between SSL and TLS
2. Difference Between Active and Passive Attacks
3. Difference between Static and Dynamic Web Pages
4. Difference Between Web Browser and Web Server
5. Difference between Server-side Scripting and Client-side
Scripting
Difference between TCP and UDP
TCP (Transmission Control Protocol) is connection oriented,
whereas UDP (User Datagram Protocol) is connection-less. This
means that TCP tracks all data sent, requiring acknowledgment
for each octet (generally). ... Because of acknowledgments, TCP is
considered a reliable data transfer protocol.
Virtualization and Hypervisor
Virtualization
Virtualization = Virtual + Realization . In other words,
virtualization means to realize something virtually. A simple
definition of virtualization is the formation of virtual computer
inside the real computer. It is an abstraction layer above the
hardware layer.It is hardware reducing ,memory saving and
cost&energy saving technology that is rapidly transforming the
IT landscape. In computing, virtualization refers to the creation of
a virtual (rather than a real) version of something, including virtual
computer hardware platforms, storage devices, and computer
resources.In other words,virtualization can also be perceived as a
technique which allows us to share a physical instance of a
resource or an application among multiple customers and
organizations.
The idea of virtualization is not new. It was introduced by IBM in
1960 when mainframe computers were in use. Mainframe
computers were underutilized most of the time, hence to amplify
the resource utilization of these mainframe computers, the
virtualization technology was introduced which allows to run
multiple OS(Operating Systems) simultaneously.
Due to invention of desktop and reduction in hardware prices this
technology become dormant for long time.
But over the past few decades with the invention of new
technologies like utility computing and cloud computing,
virtualization has regained its importance.

Server Virtualization
Server virtualization allows multiple servers to be installed on one
or more existing servers. This saves floor space and money since
you don’t have to purchase new servers or expand the square
footage of your server room.
The benefits of server virtualization include:
· Multiple operating systems can be run on a single physical
server(host)
· Many physical servers can often be consolidated into one or two
physical servers, saving your small business money that would
have been spent on physical servers.
· Your small business’s electricity requirements will decrease—
fewer servers run on less power and will also generate less heat
which will reduce your server room cooling bill
· Virtualizing most servers onto one or two physical servers
reduces server maintenance costs.
· Additional RAM, processor power or storage space can be
quickly and easily allocated to any virtual server.
· In case of virtual server error, quick restores can be done from
locally stored backups.
· Virtual servers are easily moved between host servers, allowing
maximum use of available processing power.
Desktop Virtualization
Desktop virtualization removes the need for a CPU at each
computer station. Each user will still have a monitor and mouse,
but will have their desktop CPU virtually stored on a local server.
Benefits of desktop virtualization include:
· Virtual Desktops can run on multiple types of hardware such as:
workstations, Thin Clients, laptops and some smartphones.
· Centralizing the virtualized “CPUs” of desktops provides
increased stability through better administration of workstations
and increased security because the host system keeps all
workstations up to date with patches and hot fixes.
· Virtual desktops can be quickly created after an initial
“original” virtual machine has been produced—anytime a new
desktop computer is needed, copy the original, give it a name and
it is ready for immediate use.
· Users love it because their machine is “never down” and they
always have access to their customization on their virtual
machines. Virtual desktops also reduce the carbon foot print and
increase Total Cost Ownership when compared to maintaining
physical machines.
Application Virtualization
This is a process where applications get virtualized and are
delivered from a sever to the end user’s device, such as laptops,
smartphones, and tablets. So instead of logging into their
computers at work, users will be able to gain access to the
application virtually from anywhere, provided an Internet
connection is available.
Application virtualization separates individual software
applications from the operating system allowing the user to run
almost any application on most of the operating systems.
Other benefits of Application virtualization include:
· Application virtualization separates applications from the
operating systems and can run the applications on work
stations,thin clients,laptops and some smart phones.
· Applications are run centrally so you don’t have to worry about
having enough storage space on the local desktop hard drive
· Multiple applications can run at the same time without bogging
down the system or conflicting with other apps.
· Virtualized applications can be installed, maintained, and
patched as soon as updates are available.
Network Virtualization
Network virtualization is a method of combining available
resources in a network by splitting up the available bandwidth
into channels, each of which is independent from the others, and
each of which can be assigned (or reassigned) to a particular
server or device in real time. Each channel is independently
secured. Every subscriber has shared access to all the resources
on the network from a single computer.
Network virtualization is intended to optimize network speed,
reliability, flexibility, scalability and security. Network
virtualization is said to be especially effective in networks that
experience sudden, large, and unforeseen surges in usage.
Businesses that would benefit from network virtualization are the
ones that have a large number of users and need to keep their
systems up and running all the times. With the distributed
channels, your network speed will increase dramatically, allowing
you to deliver services and applications faster than ever before.
Storage Virtualization
Storage virtualization is the process of grouping the physical
storage from multiple network storage devices so that it looks like
a single storage device. This concept is basically used in Storage
Area Network (SAN) environment.
Through storage virtualization, a new layer of a software and/or
hardware is created in between the storage system and the server
and so the applications will no longer be in the need of knowing
the information regarding which drives or storage subsystems
their data is residing on.
The management of storage and data is becoming difficult and
time consuming. Storage virtualization helps to address this
problem by facilitating easy backup, archiving and recovery tasks
by consuming less time. Storage virtualization aggregates the
functions and hides the actual complexity of the Storage Area
Network.
Benefits of Storage Virtualization:
· One of the major benefit of abstracting the host or server from
the actual storage is the ability to migrate data while maintaining
concurrent I/O access.
· Availability factor gets enriched as the applications are not
restricted to specific storage resources and also can be shielded
from all kinds of disruptions.
· Disaster Recovery option is offered by the management of data
replication at the virtualization layer. This can be achieved as
soon as the primary source is kept as free and is managed by the
common interface.
· Automation of storage capacity provisioning can be eliminated.
Hypervisor
A Hypervisor or Virtual Machine Monitor(VMM) is computer
software, firmware or hardware that creates and runs virtual
machines. A computer on which a hypervisor runs one or more
virtual machines is called a host machine, and each virtual
machine is called guest machine. The hypervisor presents the
guest operating systems with a virtual operating platform and
manages the execution of the guest operating systems. Multiple
instances of a variety of operating systems may share the
virtualized hardware resources: for example, Linux, Windows
and mac OS instances can all run on a single physical x86
machines.
 A hypervisor is a program that would enable you to host
several different virtual machines on a single hardware.
 Each one of these virtual machines or operating systems you
have will be able to run its own programs, as it will appear
that the system has the host hardware’s processor, memory
and resources. In reality, however, it is actually the
hypervisor that is allocating those resources to the virtual
machines.
 In effect, a hypervisor allows you to have several virtual
machines all working optimally on a single piece of
computer hardware.
 Now, hypervisors are fundamental components of any
virtualization effort. You can think of it as the operating
system for virtualized systems. It can access all physical
devices residing on a server. It can also access the memory
and disk. It can controlall aspects and parts of a virtual
machine.
Virtual Machines
VM technology allows multiple virtual machines to run on a
single physical machine
A virtual machine is a software program or an operating system
which possesses the characteristic behavior of an independent
computer system and is capable of performing various tasks like
running applications and programs like a computer. A virtual
machine is also known as a guest.
The main aim of virtualization is to reduce workloads by
transforming the conventional computing to make it more
scalable. Virtualization has been a part of IT landscape for
decades and today can be applied to a wide-range layers,
including operating system-level virtualization, hardware-level
virtualization, server-level virtualization.
Types of Hypervisors
Bare-Metal or Native or Type-I Hypervisor:
These hypervisors run on the top of physical hardware of the
system. Guest OS and applications run on the hypervisor.
 Example: Microsoft Hyper-V hypervisor, VMware
ESX/ESXi, Oracle VM server for x86, KVM or Critix
XenServer.
 A major advantage is that any problem in one of the virtual
machine or guest operating system do not affect the other
guest operating systems running on the hardware.
Embedded or Hosted or Type-II Hypervisor:
These hypervisors run within a host OS. That means Type-II
Hypervisor run as an application on the host OS.
 It is completely dependent on Host Operating System for its
operations. While having a base operating system allows
better specification of policies, any problem in the base
operating system affects the entire system even if the
hypervisor running above the base OS is secure.
 Example: VMware Workstation, Microsoft Virtual PC,
Oracle Virtual Box
Hosted v/s Native Hypervisor
 So, native hypervisors run directly on the hardware while a
hosted hypervisor needs an operating system to do its work.
Which one is better? It depends on what you are after!
 Bare metal hypervisors are faster and more efficient as they
do not need to go through the operating system and other
layers that usually make hosted hypervisor slower. Type-I
Hypervisors are also more secure than Type-II Hypervisors.
 Hosted Hypervisors on the other hand are much easier to
set-up than Bare metal Hypervisors because you have an OS
to work with. These are also compatible with a broad range
of hardware.
 A Hypervisor is a natural target for hackers because its
design control all the resources of the hardware while
managing all the virtual machines residing on it. The bad
news is that a hypervisor is vulnerable to a lot of malicious
code, especially those coming from a rogue virtual machine.
 Docker
 Cloud Computing
 Cloud
 Virtualization
 Hypervisors

You might also like