Sol Prev Year

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

prev.yearquestion-2021-111-ami.

cl
his
can maximize the number
of VMs host machine can

support by using memory overcommit !


"

Without overeomrnit → 21 VMS

with
1-2*8
an →
≈ 32 VMS

memory saved =

(32×6)-128
-
64GB

b) oniin : ↳• of Revenue

go.EE/--X- capacity
demand
→ g% capacity
demand

↑#• demand

Loss of Users
toucan :

capacity

#
of
demand

solu•É↑nd
tionEDynamicprovisions.NL capacity

cloud service models


② 3

5) Iaas :_
provide configurable
where consumer
computing resources
can
deploy & Ron s/o ,
0s , app .

Ex -
Amazon F- C2
☐ Paas E to deploy consumer creates
◦reacquired app . ER : Microsoft Azure

'Dsaas : -
use provider's app .

Ex: Google does .

4- a) virtualization Ps to create an
of actual
pilusion some
things
such as networks server etc .

_-
guest needs guest 0s needs
OS

modification

F-xi.IE#
no
change
ER: KVM

b) ④ Cloud deployment models : -

☒ Private cloud : operated _

solely
for an organization .

b) Public cloud 8- available to

general public .
② community cloud : shared by several
organizations & supports a specific
community that has shared concerns .

d) Hybrid cloud 8 composition of 21more


from above .

of cloud
Issues computing 8
a) Cost : - cc can be expensive
b) time : -
CC n u time
consuming
c) traffic ? - CC causes traffic .

d) privacy :
e) security :

f) lack of skill :

etc .

G- Hypervisor or virtual machine


software layer
monitor CVMMJ is a

that support & the execution


manage
Of VMS . Thus VM →
guest OS & app
OS OS
TFp
OS

d) A network security group


contains security roles that allow
or deny inbound network traffic
to , or outbound network traffic
from , several types of Azure
resources . For each role you can

specify source & destination poet ,

& protocol .

Thus we can control


who can send traffic to our

system & ensure


security .

# Inbound roles
¥ >

outbound Rules
?⃝
② a) DVM elasticity 8 Resources

rapidly provisioned
'

can be
& released as per demand .

No upfront cost 8 No need of


large amount of capital money to

start the buisness .

Reduced IT maintenance 8 The money

& manpower can be used to reach


the main focus of the buisness .

b) D Stop & copy 8 Stop source


VM.co#pages over network ,

start destination VM .

high downtime
low
migration time
total .

☐ Demandmigration: copy over


critical 0s structures ,
start destination
UM ,
page faults trigger network COPY .

200 downtime

high totalmigration time .

'
D.Iteratirepreeopyss Iteratively
copy pages over network , keep copying
dirtied pages until threshold At ,

threshold stop source VM , copy


,

remaining pages & start destination


VM .

Balances service downtime total


migration time .

⑦ The most important reason for


geographical replication ios to
ensure that users everywhere have
low latency access to data , because
distance from user to replica is
than userto central ☒cation
less
estion
-
2019-201

1) Definition from NIST8


cloud computing is a model for
enabling convenient, on demand
network access to a shared pool
o configurable computingrestures
that can be rapidly provisioned &
released with minimal management
effort or service provider interaction

5 characteristic: -

1 On demand self service


2) Broad network access
3) Resource pooling
) Rapid elasticity
5) Measured service
Enabling technologies -

D Distributed computing system


2) Virtualization technology
3) Data center & its management
system
4)Distributed filesystem & programming
method .

5) service oriented architecture .

c) without overcommit
-6%-8 VMS
with
a
¥ ≈ 10 VMS

memory saved =
40×8) -64
- 16 GB
a) cloud
computing is the use of

computing resources that are

delivered as a service over network .

Benefits of cc 8

☐ Reduced IT cost
2) scalability
3) Boisness continuity .

4) Collaboration efficiency .

5) flezcibility of work

6) Access to automatic updates .

b) DTrcanspooeentpageshwa.mg#
multiple VMS share thesame page .

The content of thepage are same

for all the VMs .


Many system
②5) are the same
memory .

i¥F
111%11<78441-+16%1%1
e) Multi
tenancy is widely used
-

& risky in public & private


clouds .

Risks of multi
tenancy -

D data isolation
2) Inference
3) change management

d) Fault tolerance is the


property
that enables a system to continue

operating properly in the event of


the failure of some of FB components .

techniques 8-
☐ Redundancy & replication
2) distributed system
3) No single point of failure .

etc .
2) a)

b) SOA is a collection of services


which communicate with
each other .

FE%¥q
provider
ÉʰÉ
d) Cloud
computing 8- is the use of

omposi#orcas that are

provided as a service over a network .

several interconnected
Distributedcoonputingro
computers share the computing task

assigned to the system .

Qusternpting8 duster is a type of

parallel & distributed system , which


consists of a collection of interconnected
stand-alone computers working
together as a single Prntegrated
computing resource .

crridcomputing8-moltip.ie clusters
interconnected by WAN .
4) a) Load
Balancing ? To distribute

@
ÑadaEoss multiple
resources
imputing
.

> Reduces costs with management

↳ maximizes availability

b)

You might also like