Cloud Computing Answers 1.1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

Q. VIRTUALIZATION.BENEFITS.

TYPES
Virtualization in Cloud Computing is making a virtual platform of
server operating system and storage devices. This will help the user
by providing multiple machines at the same time it also allows to
share the physical resource and an application to multiple users.
BENEFITS
• Security: During the process of virtualization security is one of the
important factors. The security can be provided with the help of
firewalls, which will help to prevent unauthorized access and will
keep the data confidential. Moreover, with the help of firewall and
security, the data can protect from harmful virus’s malware and other
cyber threats.
• Flexible operations: With the help of a virtual network, the work of
IT professional is becoming more efficient and active. The network
switch implement today is very easy to use, flexible and saves time.
With the help of virtualization in Cloud Computing, technical
problems can solve in physical systems. It eliminates the problem of
recovering the data from crashed or corrupted devices and hence
saves time.
• Economical: Virtualization in Cloud Computing, save the cost for a
physical system such as hardware and servers. It stores all the data in
the virtual server, which are quite economical. It reduces the
wastage, decreases the electricity bills along with the maintenance
cost. Due to this, the business can run multiple operating system and
apps in a particular server.
• Eliminates the risk of system failure: While performing some tasks
there are chances that the system might crash down at the wrong
time. This failure can cause damage to the company but the
virtualizations help you to perform the same task in multiple devices
at the same time.
• Flexible transfer of data: The data can transfer to the virtual server
and retrieve anytime. The customers or cloud provider don’t have to
waste time finding out hard drives to find data. With the help of
virtualization, it will very easy to locate the required data and transfer
them to the allotted authorities.
TYPES
Network Virtualisation: Network virtualization helps to manage and
monitor the entire computer network as a single administrative entity.
Admins can keep a track of various components of network infrastructure
such as routers and switches through a single softwarebased
administrator’s console. Network virtualization helps the network for
transferring data perfectly, flexibly, reliably and securely. It improves the
overall network’s productivity and efficiency.
Desktop Virtualisation: Desktop virtualization is when the host server can
run virtual machines using a hypervisor (a software program). A
hypervisor can directly be installed on the host machine or over the
operating system (like Windows, Mac, and Linux). This type of
virtualization is useful for development and testing teams who need to
develop or test applications on different operating systems.
Local desktop Virtualisation: Local desktop virtualization means the
operating system runs on a client device using local hardware
virtualization. This type of desktop virtualization works well when users
do not need a continuous network connection and can meet application
computing requirements with local system resources.
Remote Desktop Virtualization: Remote desktop virtualization is a
common use of virtualization that operates in a client/server computing
environment. This allows users to run operating systems and applications
from a server inside a data centre on a client device. This client device
could be a laptop, thin client device, or a smartphone.
Application Virtualisation: The process of installing an application on a
central server that can virtually be operated on multiple systems is known
as application virtualization. With application virtualization, it’s easier for
organizations to update, maintain, and fix applications centrally. Admins
can control and modify access permissions to the application without
logging in to the user’s desktop. Another benefit of application
virtualization is portability. It allows users to access virtualized
applications even on non-Windows devices, such as iOS or Android.
Server Virtualisation: Server virtualization is a process of partitioning the
resources of a single server into multiple virtual servers. These virtual
servers can run as separate machines. Server virtualization allows
businesses to run multiple independent tasks with different
configurations using a single (host) server. The process also saves the
hardware cost involved in keeping a host of physical servers.
Q. CLOUD COMPUTING REFERENCE MODEL
The cloud computing reference model is a conceptual model that
characterize and standardize the functions of a cloud computing
environment by partitioning it into conceptual layers and cross-layer
functions. This reference model groups the cloud computing functions
and activities into five logical layers and three cross-layer functions.
Cloud computing layers
Physical Layer • It is the Foundation layer of the cloud infrastructure. • It
Specifies entities that operate at this layer: Compute systems, network
devices and storage devices. Operating environment, protocol, tools and
processes. • It executes the request which is generated by the
virtualization and control layer.
Virtual Layer • Deployed on the physical layer. • It Specifies the entities
that operate at this layer like Virtualization software, resource pools,
virtual resources. • It Executes the requests generated by control layer.
Control Layer • Deployed either on virtual layer or on physical layer • It
controls and manages the required software • It enables resource
configuration, resource pool configuration and resource provisioning.
Executes requests generated by service layer.
Service Orchestration Layer • Specifies the entities that operate at this
layer i.e., Orchestration software. • It provides workflows for executing
automated tasks.
Service Layer • Consumers interact and consume cloud resources via this
layer. • It specifies the entities that operate at this layer: Service catalogue
and self-service portal. • Functions of service layer: It stores information
about cloud services in service catalogue and presents them to the
consumers. It enables consumer to access and manage cloud services via
a self-service portal.
Cross-layer function
Business continuity It is responsible for any kind faults as well as
responsible for data replication and backup.
Security It provides secure data transmission between Cloud and
consumer. It protects consumer’s information.
Service Management Specifies adoption of activities related to service
portfolio management and service operation management.
Service portfolio management: • Define the service roadmap, service
features, and service levels • Assess and prioritize where investments
across the service portfolio are most needed.
• Establish budgeting and pricing • Deal with consumers in supporting
activities such as taking orders, processing bills, and collecting payments.
Service operation management: • Enables infrastructure configuration
and resource provisioning • Enable problem resolution • Enables capacity
and availability management • Enables compliance conformance •
Enables monitoring cloud services and their constituent elements

Q. Infrastructure as a Service (IaaS)


Infrastructure-as-a-Service provides access to fundamental resources
such as physical machines, virtual machines, virtual storage, etc. Apart
from these resources, the IaaS also offers: • Virtual machine disk storage
• Virtual local area network (VLANs) • Load balancers • IP addresses •
Software bundles All of the above resources are made available to end
user via server virtualization. Moreover, these resources are accessed by
the customers as if they own them.
Benefits
IaaS allows the cloud provider to freely locate the infrastructure over the
Internet in a costeffective manner. Some of the key benefits of IaaS are
listed below:
• Full control over computing resources: IaaS allows the customer to
access computing resources using administrative rights from virtual
machines in the following manner:
• Flexible and efficient renting of computer hardware: IaaS resources such
as virtual machines, storage devices, bandwidth, IP addresses, firewalls,
etc. are made available to the customers on rent. Also, with
administrative access to virtual machines, the customer can run any type
of software.
• Portability, interoperability: It is possible to switch between applications
and resources between IaaS clouds. For example, network applications
such as web server or e-mail server that normally runs on customer-
owned server hardware can also run from VMs in IaaS cloud.
Characteristics
Here are the characteristics of IaaS service model: • Virtual machines with
pre-installed software. • Virtual machines with pre-installed operating
systems such as Windows, Linux, and Solaris. • On-demand availability of
resources. • Allows to store copies of particular data at different locations.
• The computing resources can be easily scaled up and down.
Q. Platform as a Service (PaaS)
Platform-as-a-Service offers the runtime environment for applications. It
also offers development and deployment tools required to develop
applications.
Benefits
Following are the benefits of PaaS model:
• Lower administrative overhead: Customer need not bother about the
administration because it is the responsibility of cloud provider. • Lower
total cost of ownership: Customer need not purchase expensive
hardware, servers, power, and data storage. • Scalable solutions: It is very
easy to scale the resources up or down automatically, based on their
demand. • More current system software: It is the responsibility of the
cloud provider to maintain software versions and patch installations.
Characteristics
Here are the characteristics of PaaS service model:
• PaaS offers browser-based development environment. It allows the
developer to create database and edit the application code either via
Application Programming Interface or point-and-click tools. • PaaS
provides built-in security, scalability, and web service interfaces. • PaaS
provides built-in tools for defining workflow, approval processes, and
business rules. • It is easy to integrate PaaS with other applications on the
same platform. • PaaS also provides web services interfaces that allow us
to connect the applications outside the platform.

Q. Software as a Service (SaaS)


Software-as–a-Service (SaaS) model allows to provide software
application as a service to the end users. It refers to a software that is
deployed on a host service and is accessible via Internet. There are several
SaaS applications listed below:
• Billing and invoicing system • Customer Relationship Management
(CRM) applications • Help desk applications • Human Resource (HR)
solutions.
Characteristics
Here are the characteristics of SaaS service model:
• SaaS makes the software available over the Internet. • The software
applications are maintained by the vendor. • The license to the software
may be subscription based or usage based. And it is billed on recurring
basis.
• SaaS applications are cost-effective since they do not require any
maintenance at end user side. • They are available on demand. • They
can be scaled up or down on demand. • They are automatically upgraded
and updated. • SaaS offers shared data model. Therefore, multiple users
can share single instance of infrastructure. It is not required to hard code
the functionality for individual users. • All users run the same version of
Benefits
Using SaaS has proved to be beneficial in terms of scalability, efficiency
and performance. Some of the benefits are listed below:
• Modest software tools: The SaaS application deployment requires a
little or no client-side software installation, which results in the following
benefits:
o No requirement for complex software packages at client-side
o Little or no risk of configuration at client-side
o Low distribution cost
• Efficient use of software licenses: The customer can have single license
for multiple computers running at different locations which reduces the
licensing cost. Also, there is no requirement for license servers because
the software runs in the provider's infrastructure.
• Centralized management and data: The cloud provider stores data
centrally. However, the cloud providers may store data in a decentralized
manner for the sake of redundancy and reliability.
• Platform responsibilities managed by providers: All platform
responsibilities such as backups, system maintenance, security, hardware
refresh, power management, etc. are performed by the cloud provider.
The customer does not need to bother about them.
Q. TYPES OF CLOUDS.
There are the following 4 types of cloud that you can deploy according to
the organization's requirements.
1.Public Cloud
Public cloud is open to all to store and access information through
Internet using the pay-perusage method. In public cloud, computing
resources are managed and operated by the Cloud Service Provider (CSP).
Example: Amazon elastic compute cloud (EC2), IBM Smart Cloud
Enterprise, Microsoft, Google App Engine, Windows Azure Services
Platform.
Advantages of Public Cloud
o public cloud is owned at a lower cost than the private and hybrid cloud.
o public cloud is maintained by the cloud service provider, so do not need
to worry about the maintenance.
o public cloud is easier to integrate. Hence it offers a better flexibility
approach to consumers.
o public cloud is location independent because its services are delivered
through the internet.
Disadvantages of Public Cloud
o Public Cloud is less secure because resources are shared publicly.
o Performance depends upon the high-speed internet network link to the
cloud provider.
o The Client has no control of data.
2. Private Cloud
Private cloud is also known as an internal cloud or corporate cloud. It is
used by organizations to build and manage their own data centres
internally or by the third party.
Based on the location and management, National Institute of Standards
and Technology (NIST) divide private cloud into the following two parts
o On-premise private cloud o Outsourced private cloud
Advantages of Private Cloud
o Private cloud provides a high level of security and privacy to the users.
o Private cloud offers better performance with improved speed and space
capacity.
o It allows the IT team to quickly allocate and deliver on-demand IT
resources. o the organization has full control over the cloud because it is
managed by the organization itself. So, there is no need for the
organization to depends on anybody.
Disadvantages of Private Cloud
o Skilled people are required to manage and operate cloud services.
o Private cloud is accessible within the organization, so the area of
operations is limited.
o Private cloud is not suitable for organizations that have a high user base,
and organizations that do not have the prebuilt infrastructure, sufficient
manpower to maintain and manage the cloud.
3.Hybrid Cloud
Hybrid Cloud is a combination of the public cloud and the private cloud. It
is partially secure because the services which are running on the public
cloud can be accessed by anyone, while the services which are running on
a private cloud can be accessed only by the organization's users.
Example: Google Application Suite (Gmail, Google Apps, and Google
Drive), Office 365 (MS Office on the Web and One Drive), Amazon Web
Services.
Advantages of Hybrid Cloud
o Hybrid cloud is suitable for organizations that require more security
than the public cloud.
o Hybrid cloud helps you to deliver new products and services more
quickly.
o Hybrid cloud provides an excellent way to reduce the risk.
o Hybrid cloud offers flexible resources because of the public cloud and
secure resources because of the private cloud.
Disadvantages of Hybrid Cloud
o In Hybrid Cloud, security feature is not as good as the private cloud.
o Managing a hybrid cloud is complex because it is difficult to manage
more than one type of deployment model.
o in the hybrid cloud, the reliability of the services depends on cloud
service providers.
4.Community Cloud
Community cloud allows systems and services to be accessible by a group
of several organizations to share the information between the
organization and a specific community. It is owned, managed, and
operated by one or more organizations in the community, a third party, or
a combination of them. Example: Health Care community cloud.
Advantages of Community Cloud
o Community cloud is cost-effective because the whole cloud is being
shared by several organizations or communities.
o It provides better security than the public cloud.
o It provides collaborative and distributive environment.
o Community cloud allows us to share cloud resources, infrastructure, and
other capabilities among various organizations.
Disadvantages of Community Cloud
o Community cloud is not a good choice for every organization. o Security
features are not as good as the private cloud. o It is not suitable if there is
no collaboration. o the fixed amount of data storage and bandwidth is
shared among all community members.

Q. CHALLENGES IN CLOUD COMPUTING.


Cloud computing, an emergent technology, has placed many challenges in
different aspects of data and information handling. Some of these are
shown in the following diagram:
Security and Privacy
Security and Privacy of information is the biggest challenge to cloud
computing. Security and privacy issues can be overcome by employing
encryption, security hardware and security applications.
Portability
This is another challenge to cloud computing that applications should
easily be migrated from one cloud provider to another. There must not be
vendor lock-in. However, it is not yet made possible because each of the
cloud provider uses different standard languages for their platforms.
Interoperability
It means the application on one platform should be able to incorporate
services from the other platforms. It is made possible via web services,
but developing such web services is very complex.
Computing Performance
Data intensive applications on cloud requires high network bandwidth,
which results in high cost. Low bandwidth does not meet the desired
computing performance of cloud application.
Reliability and Availability
It is necessary for cloud systems to be reliable and robust because most of
the businesses are now becoming dependent on services provided by
third-party.
Q. OVERVIEW OF APPLICATIONS OF CLOUD COMPUTING
Cloud Computing has its applications in almost all the fields such
as business, entertainment, data storage, social networking,
management, entertainment, education, art and global positioning
system, etc. Some of the widely famous cloud computing applications are:
1.Business Applications
Cloud computing has made businesses more collaborative and easier by
incorporating various apps such as Mail Chimp, Chatter and QuickBooks.
• Mail Chimp: Mail Chimp is an email publishing platform which provides
various options to design, send, and save templates for emails.
• Chatter: Chatter helps us to share important information about the
organization in real time. KIIT POLYTECHNIC Cloud Computing 12
Amalendu Kumar Pradhan
• QuickBooks: QuickBooks works on the terminology "Run Enterprise
anytime, anywhere, on any device." It provides online accounting
solutions for the business. It allows more than 20 users to work
simultaneously on the same system.
2.Data Storage and Backup
Box.com, Mozy, Joukuu are the applications offering data storage and
backup services in cloud.
Box.com
Box.com offers drag and drop service for files. The users need to drop the
files into Box and access from anywhere.
Mozy
Mozy offers online backup service for files to prevent data loss.
Joukuu
Joukuu is a web-based interface. It allows to display a single list of
contents for files stored in Google Docs, Box.net and Dropbox.
3.Management Applications
There are apps available for management task such as time tracking,
organizing notes. Applications performing such tasks are:
Toggl
It helps in tracking time period assigned to a particular project.
Evernote
It organizes the sticky notes and even can read the text from images
which helps the user to locate the notes easily.
Outright It is an accounting app. It helps to track income, expenses,
profits and losses in real time.
4.Social Applications
There are several social networking services providing websites such as
Facebook, Twitter, etc.
Facebook
It offers social networking service. One can share photos, videos, files,
status and much more.
Twitter
It helps to interact with the public directly. One can follow any celebrity,
organization and any person, who is on twitter and can have latest
updates regarding the same.
5. Entertainment Applications
Entertainment industries use a multi-cloud strategy to interact with the
target audience. Cloud computing offers various entertainment
applications such as online games and video conferencing.
• Online games: Today, cloud gaming becomes one of the most important
entertainment media. It offers various online games that run remotely
from the cloud. The best cloud gaming services are GeForce Now, Vortex,
Project xCloud, and PlayStation Now.
• Video Conferencing Apps: Video conferencing apps provides a simple
and instant connected experience. It allows us to communicate with our
business partners, friends, and relatives using a cloud-based video
conferencing. The benefits of using video conferencing are that it reduces
cost, increases efficiency, and removes interoperability.
Q. AWS (AMAZON WEB SERVICES).
Amazon web service is an online platform that provides scalable and cost-
effective cloud computing solutions.
AWS is a broadly adopted cloud platform that offers several on-demand
operations like compute power, database storage, content delivery, etc.,
to help corporates scale and grow.
Applications of AWS
The most common applications of AWS are storage and backup, websites,
gaming, mobile, web, and social media applications. Some of the most
crucial applications in detail are as follows:
1. Storage and Backup
One of the reasons why many businesses use AWS is because it offers
multiple types of storage to choose from and is easily accessible as well. It
can be used for storage and file indexing as well as to run critical business
applications.
2. Websites
Businesses can host their websites on the AWS cloud, similar to other web
applications.
3. Gaming
There is a lot of computing power needed to run gaming applications.
AWS makes it easier to provide the best online gaming experience to
gamers across the world.
4. Mobile, Web and Social Applications
A feature that separates AWS from other cloud services is its capability to
launch and scale mobile, e-commerce, and SaaS applications. API-driven
code on AWS can enable companies to build uncompromisingly scalable
applications without requiring any OS and other systems.
Advantages of AWS
AWS provides a user-friendly programming model, architecture, database
as well as operating system that has been already known to employers.
AWS is a very cost-effective service. There are no such thing as long-term
commitments for anything you would like to purchase.
Disadvantages of AWS
AWS has supportive paid packages for intensive or immediate response.
Thus, users might need to pay extra money for that.
There might be some cloud computing problems in AWS especially when
you move to a cloud Server such as backup protection, downtime, and
some limited control.
Q. WINDOWS AZURE ARCHITECTURE.
-Like other cloud platforms, Microsoft Azure depends on a technology
called virtualization, which is the emulation of computer hardware in
software. This is made possible by the fact that most computer hardware
works by following a set of instructions encoded directly into the silicon.
By mapping software instructions to emulate hardware instructions,
virtualized hardware can use software to function like “real” hardware.
-Cloud providers maintain multiple data centres, each one having
hundreds (if not thousands) of physical servers that execute virtualized
hardware for customers. Microsoft Azure architecture runs on a massive
collection of servers and networking hardware, which, in turn, hosts a
complex collection of applications that control the operation and
configuration of the software and virtualized hardware on these servers.
-This complex orchestration is what makes Azure so powerful. It ensures
that users no longer have to spend their time maintaining and upgrading
computer hardware as Azure takes care of it all behind the scenes.

Q. SECURE CLOUD SOFTWARE REQUIREMENTS


Secure Cloud software requirements the requirements for secure cloud
software are concerned with non-functional issues such as minimizing or
eliminating vulnerabilities and ensuring that the software will perform as
required, even under attack.
• It must be dependable under anticipated operating conditions, and
remain dependable under unfriendly operating conditions.
• It must be trustworthy in its own behaviour and it should able to handle
the outside attack
• It must be robust enough to recover quickly to full operational capability
with a minimum of damage to itself, the resources and data it handles,
and the external components with which it interacts.
Q. CLOUD SECURITY POLICY IMPLEMENTATION.
Policy Implementation Security policies are the foundation of a sound
cloud system security implementation. According to the Data and Analysis
Centre for Software (DACS), three main objectives common to all system
security policies and the mechanisms and countermeasures used to
enforce those policies:
• They must allow authorized person to connect and access the system to
prevent unauthorized access or connections, especially by unknown or
suspicious user.
• They must be allowed to read, modify, destroy or delete of data while
preventing unauthorized users
• They must block the entry of content like user input, executable code,
system commands, etc. suspected of containing attack patterns or
malicious logic that could threaten the system’s ability to operate
according to its security policy and its ability to protect the information.
Implementation Issues: Before implementing the security policy it is very
much important to consider the following security issues.
• Access controls • Data protection • Confidentiality • Integrity •
Identification and authentication

Q. CLOUD COMPUTING SECURITY CHALLENGES


Data Loss: Data loss is the most common cloud security risks of cloud
computing. It is also known as data leakage. In a cloud computing
environment, data loss occurs when our sensitive data is somebody else's
hands, one or more data elements cannot be utilized by the data owner,
hard disk is not working properly, and software is not updated.
Data Breach: Data Breach is the process in which the confidential data is
viewed, accessed, or stolen by the third party without any authorization, so
organization's data is hacked by the hackers.
Vendor lock-in: Vendor lock-in is the of the biggest security risks in cloud
computing. Organizations may face problems when transferring their
services from one vendor to another. As different vendors provide different
platforms, that can cause difficulty moving one cloud to another.
Account hijacking: Account hijacking is a serious security risk in cloud
computing. It is the process in which individual user's or organization's cloud
account (bank account, e-mail account, and social media account) is stolen
by hackers. The hackers use the stolen account to perform unauthorized
activities.
Q. VIRTUAL LOCAL AREA NETWORK(VLAN)
A virtual local area network (VLAN) is a logical group of workstations,
servers and network devices that appear to be on the same LAN despite
their geographical distribution. A VLAN allows a network of computers
and users to communicate in a simulated environment as if they exist in a
single LAN and are sharing a single broadcast and multicast domain.
VLANs are implemented to achieve scalability, security and ease of
network management and can quickly adapt to changes in network
requirements and relocation of workstations and server nodes.
The key benefits of implementing VLANs are:
• Allowing network administrators to apply additional security to network
communication • Making expansion of a network or a network device
easier • Providing flexibility to configure devices in a centralized
environment while the devices might be located in different geographical
locations • Decreasing the latency and traffic load on the network and the
network devices, offering increased performance
VLANs also have some disadvantages and limitations as listed below:
• High risk of virus issues because one infected system may spread a virus
through the whole logical network • It requires additional routers in very
large networks to control the network and workload

Q. VIRTUAL STORAGE AREA NETWORK(VSAN)


A virtual storage area network (VSAN) is a logical partitioning created
within a physical storage area network. This implementation model of a
storage virtualization technique divides and allocates some or an entire
storage area network into one or more logical SANs to be used by internal
or external IT services and solutions.
A virtual storage area network (VSAN) is primarily implemented in cloud
computing and virtualization environments. A VSAN allows end users to
create a logical storage area network in the physical SAN (Storage Area
Network) through storage virtualization.
A VSAN provides similar services and features as a typical SAN, but
because it is virtualized, it allows for the addition and relocation of
subscribers without changing the network's physical layout. It also
provides flexible storage capacity that can be increased or decreased over
time.
Q. CLOUD FEDERATION STACK
The creation of a cloud federation needs research and development at
several levels, including conceptual, logical, and operational, as well as
infrastructure.
CONCEPTUAL LEVEL
The CONCEPTUAL LEVEL tackles the difficulties in presenting a cloud
federation as a beneficial option for the usage of services leased by a
single cloud provider. At this stage, it is critical to highlight the benefits of
joining a federation for either service providers or service customers, as
well as the additional opportunities that a federated environment brings
in comparison to a single-provider solution. Elements of concern at this
level are:
Motivations for cloud providers to join a federation
Motivations for service consumers to leverage a federation Advantages
for providers in leasing their services to other providers
Obligations of providers once they have joined the federation Trust
agreements between providers
Transparency versus consumers
The LOGICAL AND OPERATIONAL LEVEL
The LOGICAL AND OPERATIONAL LEVEL of a federated cloud identifies and
resolves the issues by designing a framework that enables the aggregation
of providers from various administrative data within the context of a
single overlay infrastructure, which is the cloud federation. Policies and
guides for interoperability are specified at this level. This is the stage at
which MOCC is put into action and achieved.
INFRASTRUCTURAL LEVEL
INFRASTRUCTURAL LEVEL covers the technological problems involved in
enabling diverse co-computing platforms to easily interoperate. It
addresses the technological constraints that pre-independent cloud
computing systems from belonging to distinct administrative domains. Th
restrictions can be eliminated by using standardized protocols and
interfaces. In other words, this level! for the federation is what the TCP/IP
stack is for the Internet. The IaaS and PaaS layers of the C Computing
Reference Model serve as the foundation for the infrastructure level.
Interoperation interface services may also be implemented at the SaaS
level, particularly for the realization of agreements and federated clouds.
Q. HADOOP AND WORKING
Hadoop is an open-source java-based software framework sponsored
by the Apache Software Foundation for distributed storage and
distributed processing of very large data sets on computer clusters
built from commodity hardware. It provides storage for big data at
reasonable cost.
How Does Hadoop Work?
It is quite expensive to build bigger servers with heavy configurations
that handle large scale processing, but as an alternative, you can tie
together many commodity computers with single-CPU, as a single
functional distributed system and practically, the clustered machines
can read the dataset in parallel and provide a much higher
throughput. Moreover, it is cheaper than one high-end server. So,
this is the first motivational factor behind using Hadoop that it runs
across clustered and low-cost machines.
Hadoop runs code across a cluster of computers. This process
includes the following core tasks that Hadoop performs −
Data is initially divided into directories and files. Files are divided into
uniform sized blocks of 128M and 64M (preferably 128M).
These files are then distributed across various cluster nodes for
further processing.
HDFS, being on top of the local file system, supervises the processing.
Blocks are replicated for handling hardware failure.
Checking that the code was executed successfully.
Performing the sort that takes place between the map and reduce
stages.
Sending the sorted data to a certain computer.
Writing the debugging logs for each job.
Characteristics of Hadoop:
Hadoop provides a reliable shared storage (HDFS) and analysis
system (Map Reduce). 2. Hadoop is highly scalable. It can contain
thousands of servers. 3. Hadoop works on the principles of write
once and read multiple times. 4. Hadoop is highly flexible, can
process both structured as well as unstructured data
Q. CHARACTERISTICS OF CLOUD COMPUTING
According to NIST (National institute of standards) there are five essential
characteristics of cloud computing:
1. On Demand Self Service: User gets on demand computer services like
email, applications etc. without interacting with the service provider.
Some of the cloud service providers are- Amazon Web Service, Microsoft,
IBM, Salesforce.com
2. Broad network access: Cloud services is available over the network and
can be accessed by different clients through Cell phone, IPAD, TAB,
Laptops etc.
3. Resource pooling: Same resources can be used by more than one
customer at a same time. For example- storage and network bandwidth
can be used by any number of customers and without knowing the exact
location of that resource.
4. Rapid elasticity: On user’s demand cloud services can be available and
released. Cloud service capabilities are unlimited and can be accessed at
any time.
5. Measured service: Resources used by the users can be monitored,
controlled. The reports are available for both cloud providers and
consumers. On the basis of this measured reports cloud system
automatically controls and optimizes the resources based on the type of
services.

Q. CLOUD COMPUTING TECHNOLOGY RELIES


Virtualization
Virtualization is a technique, which allows to share single physical
instance of an application or resource among multiple organizations or
tenants (customers). It does this by assigning a logical name to a physical
resource and providing a pointer to that physical resource when
demanded.
Service-Oriented Architecture (SOA)
Service-Oriented Architecture helps to use applications as a service for
other applications regardless the type of vendor, product or technology.
Therefore, it is possible to exchange the data between applications of
different vendors without additional programming or making changes to
services.
Grid Computing
Grid Computing refers to distributed computing, in which a group of
computers from multiple locations are connected with each other to
achieve a common objective. These computer resources are
heterogeneous and geographically dispersed.
Grid Computing breaks complex task into smaller pieces, which are
distributed to CPUs that reside within the grid.
Utility Computing
Utility computing is based on Pay-per-Use model. It offers computational
resources on demand as a metered service. Cloud computing, grid
computing, and managed IT services are based on the concept of utility
computing.

Q. CLOUD COMPUTING AND ITS FEAUTURES


Cloud Computing is the combination of Network with Internet. It is a
technology which is manipulating, configuring, and accessing the
hardware and software resources remotely. It offers online data storage,
infrastructure, and application. It is the on-demand delivery of IT
resources over the Internet.
FEATURES
Resources Pooling
Resource pooling is one of the essential features of cloud computing.
Resource pooling means that a cloud service provider can share resources
among multiple clients, each providing a different set of services
according to their needs. It is a multi-client strategy that can be applied to
data storage, processing and bandwidth-delivered services.
On-Demand Self-Service
It is one of the important and essential features of cloud computing. This
enables the client to continuously monitor server uptime, capabilities and
allocated network storage. This is a fundamental feature of cloud
computing, and a customer can also control the computing capabilities
according to their needs.
Easy Maintenance
This is one of the best cloud features. Servers are easily maintained, and
downtime is minimal or sometimes zero. Cloud computing powered
resources often undergo several updates to optimize their capabilities and
potential. Updates are more viable with devices and perform faster than
previous versions.
Scalability And Rapid Elasticity
A key feature and advantage of cloud computing is its rapid scalability.
This cloud feature enables cost-effective handling of workloads that
require a large number of servers but only for a short period. Many
customers have workloads that can be run very cost-effectively due to the
rapid scalability of cloud computing.
Security
Data security is one of the best features of cloud computing. Cloud
services make a copy of the stored data to prevent any kind of data loss. If
one server loses data by any chance, the copied version is restored from
the other server. This feature comes in handy when multiple users are
working on a particular file in real-time, and one file suddenly gets
corrupted.

Q. ADVANTAGES/DISADVANTAGES OF CLOUD COMPUTING


ADVANTAGES
• Back-up and restore data: Once the data is stored in the cloud, it is
easier to get backup and restore that data using the cloud computing
TECHNOLOGY.
• Excellent accessibility: It allows us to access and store data or
information quickly and easily from anywhere and anytime using internet
connection. Ultimately it increases the productivity and efficiency of the
organization.
• Low maintenance cost: Cloud computing reduces both hardware and
software maintenance costs for an organization.
• Mobility: Cloud computing allows us to easily access all cloud data while
on roaming.
• Unlimited storage capacity: Cloud offers us a huge amount of storage
capacity for storing our data such as documents, images, audio, video,
etc. in one place.
• Data security: Data security is one of the biggest advantages of cloud
computing. Cloud offers many advanced features related to security and
ensures that the data is safe.
DISADVANTAGES
• Internet Connectivity: Cloud Server can be accessed only through
internet. So, if there is no good internet connectivity or no internet
connection, then the data cannot be accessed properly.
• Limited Control: As we know, cloud infrastructure is completely owned,
managed, and monitored by the service provider, so the cloud users have
less control on the cloud servers.
• Security: Although cloud service providers implement the best security
standards, but before adopting cloud technology, the organization must
be aware that they are handing over all the organization's sensitive
information to a third party, which is a cloud computing service provider.
While sending the data on the cloud, there may be a chance that your
organization's information is hacked by Hackers.

Q. CLOUD ECOSYSTEM
Cloud Ecosystem A cloud ecosystem is a complex system of inter-
dependent components that all works together to enable the cloud
services. In cloud computing, the ecosystem consists of hardware and
software as well as cloud customers, cloud engineers, consultants,
integrators and partners.
The benefits of a cloud ecosystem
• Companies can use a cloud ecosystem to build new business
models. They can promote their business using cloud eco system
than they sell their product to the customer. Specially in medical
equipment.
• In a cloud ecosystem, it is also easier to review data and analyse
how each part of the system affects the other parts. For example, a
doctor can examine a patient over the cloud because all the previous
data and present problems of the patient available in the cloud.
• Cloud ecosystem is helpful for complex system of interdependent
components that work together to enable the cloud services.
• The centre of a cloud ecosystem is a public cloud provider. It might
be an IaaS provider such as Amazon Web Services (AWS) or a SaaS
vendor such as Salesforce.
• There is no vendor lock-in in the cloud ecosystem. That means a
client can switch over its business one cloud to other cloud without
any restriction. Ex. Mobile No. portability.
Q. CLOUD COMPUTING SERVICES.
Cloud computing offers the following three type of services:
Software as a Service (SaaS) – It is also known as cloud application
services. Mostly, SaaS applications run directly through the web browser
means we do not require to download and install these applications.
Example: Google Apps, Salesforce Dropbox, Slack, Hubspot, Cisco WebEx.
Platform as a Service (PaaS) – It is also known as cloud platform services.
It is quite similar to SaaS, but the difference is that PaaS provides a
platform for software creation, but using SaaS, we can access software
over the internet without the need of any platform. Example: Windows
Azure, Force.com, Magento Commerce Cloud, OpenShift.
Infrastructure as a Service (IaaS) – It is also known as cloud infrastructure
services. It is responsible for managing applications data, middleware, and
runtime environments. Example: Amazon Web Services (AWS) EC2,
Google Compute Engine (GCE), Cisco Metapod.

Q. FUNDAMENTAL OF CLOUD SECURITY


The fundamental security terms relevant to cloud computing are
• Confidentiality: Confidentiality is the characteristic of something being
made accessible only to authorized users. Within cloud environments,
confidentiality primarily pertains to restricting access to data in transit
and storage. The message issued by the cloud consumer to the cloud
service is considered confidential only if it is not accessed or read by an
unauthorized party.
• Integrity: Data integrity in the cloud is that the cloud service provider
can be guaranteed that the data transmission between the user and the
server must be secure. Integrity can extend to how data is stored,
processed, and retrieved by cloud services and cloudbased IT resources.
• Authenticity: Authenticity means data can be provided through some
authorized source. This concept ensures the non-rejection of data.
• Availability: Availability is the characteristic of being accessible and
usable during a specified time period. In typical cloud environments, the
availability of cloud services can be a responsibility that is shared by the
cloud provider and the cloud carrier.
• Risk: Risk is the possibility of loss or harm arising while performing an
activity. Risk is typically measured according to its threat level and the
number of possible or known vulnerabilities.
Q. CLOUD COMPUTING SECURITY CHALLENGES
Data Loss: Data loss is the most common cloud security risks of cloud
computing. It is also known as data leakage. In a cloud computing
environment, data loss occurs when our sensitive data is somebody else's
hands, one or more data elements cannot be utilized by the data owner,
hard disk is not working properly, and software is not updated.
Hacked Interfaces and Insecure APIs (Application Program Interface): As
we all know, cloud computing is completely depending on Internet, so it is
compulsory to protect interfaces and APIs that are used by external users.
APIs are the easiest way to communicate with most of the cloud services.
In cloud computing, few services are available in the public domain. These
services can be accessed by third parties, so there may be a chance that
these services easily harmed and hacked by hackers.
Data Breach: Data Breach is the process in which the confidential data is
viewed, accessed, or stolen by the third party without any authorization,
so organization's data is hacked by the hackers.
Vendor lock-in: Vendor lock-in is the of the biggest security risks in cloud
computing. Organizations may face problems when transferring their
services from one vendor to another. As different vendors provide
different platforms, that can cause difficulty moving one cloud to another.
Account hijacking: Account hijacking is a serious security risk in cloud
computing. It is the process in which individual user's or organization's
cloud account (bank account, e-mail account, and social media account) is
stolen by hackers. The hackers use the stolen account to perform
unauthorized activities.
Q. VISION OF CLOUD COMPUTING
1. Cloud computing provides the facility of virtual hardware, runtime
environment and services to an individual or an organization. 2. The service of
cloud server can be accessed as long as the user needed. There is no
requirement of any upfront commitment. 3. The entire collection of computing
system is transformed into a collection of utilities, which can be provisioned
and composed together to deploy systems in hours rather than days, with no
maintenance costs.4. The long-term vision of a cloud computing is that, IT
services and business can be traded as a utility in an open market without any
technological and legal barriers. 5. Due to the existence of a global platform for
trading cloud services will also help service providers to potentially increase
their revenue. 6. A cloud provider can also become a consumer of a competitor
service in order to fulfil its promises to customers.
Q. ADVANTAGES/DISADVANTAGES OF VIRTUALIZATION
ADVANTAGES
Cheap
IT infrastructures find virtualization to be a more affordable implementation
option because it doesn't require the use or installation of actual hardware
components. Dedicating substantial amounts of space and money to create an
on-site resource is no longer required.
Disaster recovery
When servers are virtualized, disaster recovery is relatively simple thanks to
fast backup restoration and current snapshots of your virtual machines.
Organizations were better able to create a low-cost replication location thanks
to virtualization. If a disaster occurs in the data centre or server room itself, you
can still relocate such virtual machines to a cloud provider. Having the flexibility
level guarantees that the disaster recovery plan will be simpler to implement
and will have a 99% success rate.
Saves energy
Both individuals and businesses can save energy by using virtualization. The
rate of energy consumption can be reduced because no local hardware or
software alternatives are being employed.
Quick and Easy Set up –
In traditional methods Setting up physical system and servers are very time-
consuming. But with the help of virtualization the entire process is done in
very less time which results in productive setup.
DISADVANTAGES
Data can be at Risk –
Working on virtual instances on shared resources means that our data is hosted
on third party resource which put’s our data in vulnerable condition. Any
hacker can attack on our data or try to perform unauthorized access. Without
Security solution our data is in threaten situation.
Learning New Infrastructure –
As Organization shifted from Servers to Cloud. They required skilled staff who
can work with cloud easily. Either they hire new IT staff with relevant skill or
provide training on that skill which increase the cost of company.
High Initial Investment –
It is true that Virtualization will reduce the cost of companies but also it is truth
that Cloud has high initial investment. It provides numerous services which are
not required and when unskilled organization will try to set up in cloud, they
purchase unnecessary services which are not even required to them.

Backward Skip 10sPlay Video

You might also like