Your SlideShare is downloading. ×
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Ibm cloud computing certification exam 000 280 and 000-032 q&a full set
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ibm cloud computing certification exam 000 280 and 000-032 q&a full set

5,819

Published on

It’s a compilation of IBM example test page and multiple simulation tests. All materials are publicly available. It’s just a compilation of different sources. …

It’s a compilation of IBM example test page and multiple simulation tests. All materials are publicly available. It’s just a compilation of different sources.
Compiled & Edited by http://vtcloud.blogspot.com No rights are reserved.
Content: Preparation Material (page1~page52)+ 54 Answered Questions (Quite useful cheatsheet, page52~page84)

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
5,819
On Slideshare
0
From Embeds
0
Number of Embeds
13
Actions
Shares
0
Downloads
417
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. It’s a compilation of IBM example test page and multiplesimulation tests. All materials are publicly available. It’s just acompilation of different sources. Compiled & Edited by http://vtcloud.blogspot.com No rights are reserved.Content: Preparation Material (page1~page52)+ 54 AnsweredQuestions (Quite useful cheatsheet, page52~page84)How to use the preparation material? Ctrl+FPreparation Material:Test 000-280: IBM Cloud Computing Infrastructure Architect V1Section 1 - Cloud Computing Design Principles Given an audience familiar with the cloud computing, define the cloud computing paradigmand cloud deployment models so that various types of cloud deployment models have beenexplained. With emphasis on performing the following tasks: Cloud computing is a new paradigm for both service delivery and consumption. Thisparadigm is characterized by rapid service provisioning, service elasticity, usage-based billing, andubiquitous service access. A private cloud is owned by an enterprise and operates within the corporate firewall.Services on the private cloud can only be accessed by approved users. Private Cloud -Premise: Client (Implemented by Service Provider) -Managed: Client -Infrastructure: Dedicated -Access: Internal Enterprise Network -Payment: Traditional Private Managed Cloud -Premise: Client (Implemented by Service Provider) -Managed: Service Provider
  • 2. -Infrastructure: Dedicated -Access: Internal Enterprise Network -Payment: Traditional Private Hosted Cloud -Premise: Service Provider -Managed: Service Provider -Infrastructure: Dedicated -Access: VPN Network, Public Internet -Payment: Hybrid - Traditional and/or Pay-as-you-Go A public cloud is owned and operated by a service provider. Services on the public cloudare made available to users over a network, usually the internet. Public Cloud -Premise: IBM -Managed: IBM -Infrastructure: Shared -Access: Public Internet -Payment: Pay-as-you-Go A hybrid cloud consists of both private and public cloud components. Some services in ahybrid cloud are owned and operated by the enterprise, while others are provide over a network bya service provider. Shared-Private Hosted Cloud -Premise: Service Provider -Managed: Service Provider -Infrastructure: Shared (by "member" clients) -Access: VPN Network, Public Internet -Payment: Pay-as-you-Go Private, public, and hybrid clouds have key differences. Private clouds provide enterprises with a greater degree of control in theconstruction and delivery of cloud services at the cost of owning and operating the infrastructure. Public clouds allow enterprises to consume services without owning and operatinginfrastructure, while sacrificing some control over the construction and delivery of services. Hybrid clouds use a connectivity backbone to allow enterprises to consume bothpublic and private cloud services according to their needs. Given the attributes of Cloud computing, explain how the service delivery model of cloudcomputing differentiates from standard IT service delivery models, so that the new cloud servicemodel and its attributes have been defined. With emphasis on performing the following tasks: Standardized, consumable, Web-based deliverable services
  • 3. A cloud computing platform combines the modular components of a service-orientedarchitecture and an Internet protocol-based convergence of networks and devices within ahigh-performance pool of virtualized computer hardware and software resources. Elastic scaling (Elasticity and Scalability) Capabilities can be rapidly and elastically provisioned toquickly scale up and rapidly released to quickly scale down. To the consumer, the capabilitiesavailable for rent often appear to be infinite and can be purchased in any quantity at any time. Flexible pricing Capabilities are charged by using a metered, fee-for-service, or advertising based billingmodel to promote optimization of resource use. Examples are measuring the storage, bandwidth,and computing resources consumed and charging for the number of active user accounts permonth. Clouds within an organization accrue cost between business units and may or may not useactual currency. Metering and billing capability Delivered at a granular level of billing and metering, this workload standardization canhelp measure, monitor and lower the cost of your services while easing complexity of your ITinfrastructure. Given the knowledge of the IBM Common Cloud Computing Management PlatformReference Architecture (CCMP-RA), explain the three segments represented to delivery common,reusable assets, so that the building blocks of a cloud computing solution have been defined. With emphasis on performing the following tasks: What is the IBM Common Cloud Management Platform Reference Architecture(CCMP-RA)? It is a cross-IBM effort for an RA enabling cloud economics by optimizing resource andlabor utilization, and delivering the foundational cloud management infrastructure for both privateand public clouds. Which three segments make up the IBM Common Cloud Management PlatformReference Architecture (CCMP-RA)? The CCMP-RA is structured into three segments, Cloud service consumer, Cloudservice provider, and Cloud service developer, all designed to deliver common, reusable assets. What are the two components of the IBM Common Cloud Management PlatformReference Architecture (CCMP-RA)? Business Support Services (BSS): Business-level functionality for management ofCloud Services -Service offering catalog
  • 4. -Usage metering and accounting Operational Support Services (OSS): Operational-level functionality formanagement of Cloud Services -Service request management -Provisioning -Monitoring and event management -Image life-cycle management Given the knowledge of the IBMs Cloud strategy, explain IBMs business strategy aroundCloud computing and the core differentiators, so that IBMs solution strategy for supporting cloudenvironment has been defined. With emphasis on performing the following tasks: IBM solution strategy for Cloud computing is to actively participate in three majoraddressable market segments: Components Supply -Virtualized servers and storage -Cloud software products (Tivoli, Lotus, Rational, etc) Infrastructure Services: Infrastructure as a Service (IaaS) and Platform as a Service(PaaS) -Computing on Demand -Smart Business Services Business Services: Software as a Service (SaaS) and Business Process as a Service(BPaaS) -LotusLive, Information Protection Services, Expense reporting IBM core differentiators for Cloud are: (NOTE: define on a technical level) Workload optimization Deployment choices Integrated Service Management IBMs key workloads for Cloud Analytics Collaboration Development and Test Desktop and Devices Infrastructure Compute Infrastructure Storage Business Services IBMs Cloud portfolio includes the phases across the cloud life-cycle. Plan - Develop cloud strategies. Build - Build cloud delivery capabilities.
  • 5. Deliver - Provide cloud services. -From the IBM Cloud. -Define and deliver a cloud computing proof of concept or pilot for a specificworkload. Given an understanding of cloud computing, explain the different types of cloud services, sothat their definition and differences are clearly understood. With emphasis on performing the following tasks: Define SaaS. SaaS is a type of cloud service where the service provider supplies all the infrastructurealong with the software product. Users interact with the service by using a Web-based front-end.This eliminates the need to install and run the application on the customers own computers.Examples of SaaS include IBMs LotusLive, Google Docs, Gmail, etc. Define PaaS. PaaS is a type of cloud service that supplies the software and product development toolshosted by the provider on their hardware infrastructure. Users can create applications by using thisplatform and the APIs provided or with a graphical user interface for development. Examples ofPaaS include Force.com from Salesforce.com, Google App Engine, Microsoft Windows Azure,etc. Define IaaS. IaaS is a type of cloud service that provides access to basic building blocks as services.These building blocks can be combined or layered to build the infrastructure needed for runningthe applications. Examples of IaaS include IBM Business Development and Test Cloud, AmazonWeb Services (AWS) and Rackspace. Define BPaaS. BPaas is a type of cloud service that provides business services via Web-centricinterfaces on multi-tenant and shared infrastructures without the need to manage or control theunderlying resources. Examples of BPaaS include payroll processing, HR, etc. Given an audience familiar with the cloud deployment model, outline the challenges ofintegration in a cloud environment so as to understand how IBM solutions can be used to addresstraditional hurdles in cloud integration. With emphasis on performing the following tasks: Consistent access management policies in an integrated cloud environment are critical toreducing costs and avoiding security flaws. IBM Tivoli Access Management solutions allow youto enforce consistent access management policies across cloud environments to reduce both risksand costs.
  • 6. Connecting applications across cloud environments can require extensive custom codingand present security challenges to the enterprise. Cast Iron solutions from IBM WebSphere enableusers to connect applications and their data in integrated cloud environments in a highly securemanner without requiring custom user coding. In an integrated cloud environment, creating secure access mechanisms betweenenterprise endpoints and public cloud endpoints is important to maintain flexibility withoutsacrificing security. The Secure Cloud Connector found in certain WebSphere DataPowerAppliance models provides for identity verification of public cloud endpoints, and it securelytransmits encrypted data between enterprise endpoints and public cloud endpoints in an integratedcloud environment. Given a set of infrastructure considerations when setting up a cloud environment, describethe importance of security, automation, network, storage management, and virtualization in acloud environment, so that the infrastructure considerations of cloud computing have defined. With emphasis on performing the following tasks: Security: Assess the risks associated with data integrity and security in the cloudenvironment. Regulatory compliance through audits and data location considerations in terms ofprivacy laws and jurisdictions. Protect sensitive data through access control and encryption to separate data in amulti-tenant environment. Backup and recovery of data in the cloud environment. Automation: Provides standardization in deployment and management of IT services. Provides the ability to maintain or improve quality and cost of IT services. Provides a management stack that is easier to handle and provides for smootherworkload migration. Provides the ability to reduce costly manual interventions and skill requirements,and reduces errors caused by them. Network and storage management: Network hardware supporting various networks used in the cloud environment. Network management components used to administer the network. Components for monitoring the health of the network. Management and access to storage on the cloud. Virtualization: Computing resources (application servers. physical servers, databases, storages,services) are dynamically and automatically provisioned as demand varies. Underutilized physical servers are consolidated into a smaller number of more fullyutilized physical servers. Sharing, manageability and isolation of computing resources. Significant cost savings via server consolidations and optimal resource utilizations.
  • 7. Advanced virtualization - Virtualization with standardization and automation arenecessary to provide increased flexibility while lowering costs. Rapid provisioning of resources - With easy access to an easy-to-use servicerequest catalog that hides the complexity of the underlying infrastructure, the end user is able toselect and access standardized, pre-configured and pretested solutions, services and resourcesreducing the time and IT resources necessary to deliver. How do you design for failure? Cloud computing is fully enabled by virtualization technology (hypervisors) andvirtual appliances. A virtual appliance is an application that is bundled with all the componentsthat it is required to run, along with a streamlined operating system. In a cloud computingenvironment, a virtual appliance can be instantly provisioned and decommissioned as needed,without complex configuration of the operating environment. This flexibility is the key advantage to cloud computing, and what distinguishes itfrom other forms of grid or utility computing and SaaS. The ability to launch new instances of anapplication with minimal labor and expense allows application providers to: -Scale up and down rapidly. -Recover from a failure. -Bring up development or test instances. -Roll out new versions to the customer base. -Efficiently load test an application. Given a set of service delivery considerations when setting up a cloud environment, describethe importance of security, automation, network, storage management, and virtualization in acloud environment, so that the service delivery infrastructure considerations of cloud computinghave defined. With emphasis on performing the following tasks: Service Delivery - OSS component of cloud infrastructure planning and architecture perthe IBM Common Cloud Management Platform Reference Architecture (CCMP-RA) Platform, Operating system and workload image provisioning Monitoring and event management for SLAs within a cloud, including instrumented andmonitored functions IT asset and license management relationship to capacity and performance managementfor cloud architecture Virtualization planning, design, architecture and management for service levelattainment and maintenance Core components of Service Managed Virtualization and Clouds -Locating and Requesting Services: Secure user centric self-service portal /Automation engine / and Service catalog -Deploying Cloud Services: Automated provisioning / and Image management -Managed Cloud Services: Monitoring / Security and Metering Cloud specific security architecture, planning, industry security frameworks and
  • 8. operational support characteristics, including data handling Cloud specific storage and network architecture, planning, industry frameworks andoperational support characteristics Given a list of cloud characteristics, define their impact on service delivery models and howthey differ from traditional the IT model so that a clear mapping of the characteristics to servicedelivery model has been produced. With emphasis on performing the following tasks: Rapid service delivery: Services can be accessed nearly instantly allowing businesses to more quickly build, test,and deploy solutions. Rapid service delivery can drastically shorten their lead time for deliveringnew solutions, thereby decreasing solution development costs and increasing revenue potential. Resource consolidation: The virtualization of resources like servers and storage enables users to increase assetutilization by driving higher density. In turn, this decreases resource requirements, decreasesmanagement costs, and decreases overall operating costs. Elastic scaling: Elastic scaling means that businesses can scale up and scale down IT services based oncurrent demand and business goals. As opposed to designing systems for peak load which resultsin unused resources, elastic scaling means businesses use what they are required to meet theirbusiness goals and no more. Considerations for Scaleable Architecture, which include not just theprovisioning of resources on a platform basis to meet the service needs and agreements but alsothe cross platform migration of applications or workloads to maintain and/or enhance theprofitability of running client workloads on a cloud. Self-service: Self-service access to IT services removes traditional obstacles associated with serviceacquisition. The decrease in service acquisition time can decrease the overall delivery time for aproduct or solution. Usage-based billing: Cloud consumers pay only for the services that they actually use. This means consumerscan more closely align IT expenditures with business goals, and consumers do not pay forresources that they are not actively using. Ubiquity: By delivering services through the Internet and other networks, consumers can moreeasily gain access to cloud services. Businesses can use the cloud delivery platform to increasetheir delivery channels both internally and externally. This increase can increase revenue
  • 9. opportunity and decrease internal operating costs.Section 2 - Planning for a Cloud Environment Given a list of common infrastructure and environmental components, identify their use incloud environments, so as to understand how to evaluate a customers current infrastructure andenvironment in order to facilitate the adoption of cloud. With emphasis on performing the following tasks: Servers: Depending on the cloud model being adopted (i.e. public vs. private),customer-owned servers may no longer be required or they may be repurposed for the cloud.Users considering adopting public cloud services will not use their own servers as part of theircloud. Customers considering building a private cloud may use existing servers, along withvirtualization technology, to build up the cloud infrastructure. Storage: As with servers, consumer-owned storage infrastructure is not a requirement whenusing the public cloud. For the private cloud, users will contribute storage to the overall solutionand can choose from a number of different types based on their need. Storage types like NFS, NAS, SAN, and more may be part of the users cloudinfrastructure. Storage virtualization may be used in the cloud infrastructure. Network: Regardless of whether a user is pursing a public or private cloud, their networkinginfrastructure could be part of the solution. Many public clouds allow for the creation of virtualprivate networks that securely communicate with the user-owned network. For users buildingprivate clouds, their networking infrastructure provides the connectivity backbone for the solution. Applications: Applications must be closely analyzed prior to moving to a cloud-basedenvironment. For many cloud environments, applications must be able to run in virtualizedcontainers. Applications should be loosely-coupled so that their components can independentlyscale in elastic cloud environments. Data: Data migration, connectivity, and storage strategies must be considered whenmoving to the cloud. When moving to a cloud, some data may be migrated to the new environment. Ifmoving data to a public cloud, all regulatory and legal concerns should be examined prior tomigration. Data connectivity patterns may require changes. For instance, if applications run ina public cloud but data is stored privately (cloud or otherwise), secure access channels are requiredto be established between the application and data. Many new data storage options have become popular in the cloud. This includes
  • 10. key-value stores, non-relational object stores, distributed memory-based stores, and more.According to data structure and data access patterns, new cloud-based storage options may bemore appropriate and efficient. Automation: Automation plays a critical role in realizing the full value of cloud computing.Customers existing automation systems should be examined to determine if it is possible to usethem in conjunction with the new cloud computing environment. Standardization: Migrating to cloud computing necessitates a certain degree of standardization forthe services a customer uses to deliver via the cloud. Existing standardization practices should beexamined to determine if they are sufficient, or if additional standardization techniques arerequired for the move to cloud computing. Virtualization: Virtualization plays a key role in many cloud computing environments. Existingvirtualization technologies used by the customer should be identified and evaluated to determine ifthey will integrate with the new cloud computing environment. If the cloud migration means newvirtualization technologies will be used, existing infrastructure and applications should be testedwith this technology. Given a clients desire to move their environment to a cloud computing model, review theclients current IT operational model, so that an understanding of the required functional changesare clearly identified. With emphasis on performing the following tasks: Understand the clients IT Operational model as it exists today and their approach todesign, build and run and how it is required to transform to a cloud operational model. Identify if the client understands and has implemented shared services in their current ITOperational model, and leverage this capability for the transformation to a cloud operationalmodel. Understand clients level of convergence and/or separation between server, network andstorage components in order to evaluate their readiness for Cloud transformation. Hardware Layer: Understand the infrastructure component level mean time betweenfailures (MTBF) metrics as they pertain to and are managed for a cloud operational model. OS Layer: Understand OS level image rationalization and standardization etc. Application Stack Layer: Understand application image standardization and applicationdeployment methods, align workload related infrastructure requirements such as latency,collocation, data structures, transaction timing/security and version control; stateless vs. stateful. Interconnection Layer: Understand the data structure, data sharing, and networkmultipoint implementation (latency, security, transaction etc.) SLA. Availability/Redundancy/Continuity Layer: Re-architect for workload delivery, movingthe architecture from individual server availability. Given the understanding of cloud capabilities, define the workloads characteristics of public
  • 11. and private cloud implementations. With emphasis on performing the following tasks: Why define workload characteristics? Workload characteristics drive the rate and degree of standardization. Complextransaction and information management processes will likely present challenges and risks ofmigration to standardized services. Understanding the workload is critical to help determine which workload andservices make sense to move first and to which type of cloud, public, private or hybrid. Items to review with moving workloads to a cloud environment: Regulatory requirements or constraints Criticality or SLAs Security concerns Highly customized applications Software that is not yet virtualized (third-party software) Licensing issues Complex processes and transactions Interoperability between systems Portability of components Integration of components Workload or application characteristics for consideration: Loosely-coupled -Computation and data are separate. Model scales well, but requires new failure and consistency approaches. Tightly-coupled -May not be able to separate application from HW components. Decoupled -Private cloud computing, public cloud computing, or both, security must becomeadaptive to support a model where workloads are decoupled from the physical hardwareunderneath and dynamically allocated to a fabric of computing resources. -The decoupling and abstraction of the entire IT stack and movement to private andpublic cloud-computing models means that workloads and information will no longer be tied tospecific devices, fixed IP or MAC addresses, breaking static security policies based on physicalattributes. To enable faster and more-accurate assessments of whether a given action should beallowed or denied, more real-time context information must also be incorporated at the time asecurity decision is made. Transactional DB -Data driven + small computation on small data Require support for massive multi-tenancy.
  • 12. Content-Centric -Computation is required to be close to data + large computation on large data. Data and Storage Integration -Evolution of distributed file systems Enabled through evolution of distributed file systems Java Application Servers -Extending to highly distributed environments What are asynchronous systems architectures? -To tolerate failure, applications must operate as a part of a group, while not beingtoo tightly-coupled to their peers. Each piece of the application should be able to continue toexecute despite the loss of other functions. Asynchronous interfaces are an ideal mechanism tohelp application components tolerate failures or momentary unavailability of other components. Workloads that can take advantage of public clouds: Test systems and environments Single virtual appliance workloads Pre-production systems and environments Mature packaged offerings, like e-mail and collaboration Software development environments Batch processing jobs with limited security requirements Isolated workloads where latency between components is not an issue Storage solutions (including storage as a service) Backup solutions (including backup and restore as a service) Data-intensive workloads if the provider has a cloud storage offering linked to thecloud compute offering Workloads more appropriate for private clouds: Employee information or other sensitive data typically restricted to the enterprise Workloads composed of multiple, co-dependent services High throughput online transaction processing Workloads based on third-party software that does not have a virtualization orcloud-aware licensing strategy Workloads requiring customization Given a user interested in setting up a cloud environment, describe key requirements andconsiderations so as to produce a comprehensive plan for setting up a cloud environment. With emphasis on performing the following tasks: Identify the required hardware and operating system components for the cloud. Select hardware componentry and operating systems based on price point,performance levels, and virtualization technology integration.
  • 13. Procure server virtualization technologies that will be used as the foundation for thecloud environment. Select server virtualization technology based on several factors, includingcompatibility with existing hardware, costs, performance, and capabilities. Based on user needs in terms of performance, volume, and access patterns, install theappropriate storage infrastructure. The storage infrastructure used must be compatible with the server virtualizationtechnology in use. Apply storage virtualization techniques where appropriate to increase density anddecrease costs. Configure the network infrastructure to support the services that will be delivered in thecloud environment. The network infrastructure must be compatible with the server virtualizationtechnology in use. Utilize network virtualization techniques such as Virtual Local Area Networks(VLANs) and virtual switches to decrease the overall costs of the network infrastructure. Analyze the concurrent number of active endpoints to determine if techniques suchas Network Address Translation (NAT), network masquerading, and private IP addresses areappropriate. Put in place a service management tool to manage the various elements of the cloud. Service management tooling should provide an inventory of the elements (server,storage, network, virtual machines, etc.) of the cloud. Service management tooling should enable provisioning and de-provisioningservices to the cloud. Service management tooling should include service request managementcapabilities. Service management tooling should enable the definition and enforcement ofSLAs. Service management tooling should provide insight into cloud resource utilization. Carefully analyze customer applications and workloads targeted for the cloud. Map the interaction points between applications and the cloud infrastructure tounderstand dependencies and communication patterns. Assess the application or workload and its affinity for a cloud environment byconsidering the applications characteristics such as its degree of loose coupling and dependencieson external components. Given the objective of architecting a cloud computing solution, identify the networkrequirements to support the infrastructure, applications, and services. With emphasis on performing the following tasks: Private, Public, and Intra-Cloud networking Balance of security with performance
  • 14. -Network hops (latency) between application and platform servers, and client -Encryption overheads with VPNs (IPSec, SSL) -Non-encrypted connections Connections to Public clouds -Network QOS with various ISPs -SLAs to ensure network availability and bandwidth Intra-Cloud Connections -Bandwidth of trunk links between Data Centers -Architecting middleware and application location to minimize data movement Network Hardware Physical ethernet and fibre channel networks -Bandwidth -Switches and routers -Port Groups and VLAN tagging Firewall rules to allow or deny access to network devices and protocols Virtual Hardware -Virtual network adapters and switches - fully utilize HW and reduce costs. Management Networks Virtual server management networks: -Used to provision, configure, administer, monitor, migrate, and delete the virtualservers. Hardware management networks: -Used to manage the physical infrastructure (Blades, blade chassis, switches,storage, Power Distribution Units). Customer Networks Provides access to virtual servers and customer applications. SANs: Provides access to centralized, shared storage. VLANs: Used to secure server and data access via network isolation. Network Management/monitoring components: Used to administer the network andmonitor the health of the network. Server-side considerations Outbound / Inbound requirements TCP/IP configuration on various platforms, VIOS / XEN / VMware / Linux / AIX /Windows etc. Given an understanding of cloud computing, explain the considerations for softwaremigration, so that the software migration strategy is clearly understood.
  • 15. With emphasis on performing the following tasks: Application Readiness: Migrating legacy applications based on old technologies to acloud-based infrastructure will not bring the right benefits. Some of the questions to be consideredare -> Is the application web-based? Will it benefit from a multi-tenant architecture? Can it scaleout? Does it really need elasticity? Data Ownership and Access: The application, the hardware, the operating system andeverything else can potentially be owned by the cloud service provider. But the data is what theintellectual property is predicated upon and one should be able take ownership of the data ashe/she sees fit. The cloud subscription gives access to the functionality of the application orfunction that one can use. If that access is removed, can one still access the data, so he/she canretain ownership? Data Volumes: Cloud is great for off-site elastic computing, where extra resources canbe applied in the form of more compute power or more storage. However as the storage capabilitygrows, migrating terabytes of data across a WAN can be a problem. Integration: Applications running in the Cloud will require integration with applicationsrunning on-premise and other applications in the Cloud. A robust integration platform is requiredto be available to facilitate this. SOA and BPM providers play a critical role in minimizingintegration challenges. Management and Monitoring: The application architecture should have provisions toprovide good control to administrators on various management aspects. Compliance: Cloud computing services for applications and data which are subject tocompliance require a high degree of transparency on the part of service providers. One is requiredto carefully review the contracts and service-level agreements to understand how the Cloudservice meets specific compliance requirements. Cost Analysis: The business case for Cloud application migration is required to take thetarget Cloud platform into consideration. The migration and overhead costs vary widely based onthe target Cloud platform and thus will skew the estimated cost savings. Cost analysis helps decidewhether to go ahead with moving a particular application to the Cloud or not from a TCO/ROIperspective. Cost should include capital expenditure, operational expenditure, and overhead costsinvolved in migration. Migration: Defining a migration strategy involves understanding the different migrationoptions available, establishing business priorities, and evolving a strategy that offers a fine balancebetween costs and meeting business priorities. Basically, enterprises have two core options with acloud infrastructure - private or public. Against these, they have the following migration paths toconsider - Infrastructure as a Service (IaaS), Software as a Service (SaaS) or Platform as a Service(PaaS). The choice is driven by priorities such as elasticity, business model, security, migrationcosts, etc. It is not uncommon for a large enterprise to leverage a hybrid approach in any of themigration options and paths. Transition: Actual process of migration, helps service providers realize the target IaaSarchitecture as a detailed design, covering the network, server, SAN, tools, processes, and peoplerequired for an operational model. It is underpinned by existing core competencies in network,compute, storage, tools, and process improvement and expertise in delivering advanced,virtualized data centers.
  • 16. Section 3 - Architecting a Cloud Environment Given knowledge of a cloud environment, define the IBM Virtualization Managementsolutions available for a cloud environment, so that virtualization capabilities within a cloudenvironment have been defined and resources are easily allocated depending on the workloaddemands to realize the operational cost benefits. With emphasis on performing the following tasks: Benchmark the clients environment to understand the implementation of their currentvirtualization and provisioning solutions and management capabilities. Understand the unique infrastructure and virtualization complexities around cloudcomputing, including service provisioning, in order to attain more effective resource utilizationparameters. Describe the IT network and SAN changes, new requirements and functionalconvergence relating to cloud computing. Understand the problem determination and isolation complexities relating to thevirtualization, workload management and provisioning infrastructure due to interdependencies,interrelationships and interactions. (PD/PSI) Describe the differences and unique attributes of cloud computing as pertains toworkload over provisioning vs. over committing. Cloud systems are complex and integrated and require integrated management facilitiesto deal with systematic impact to services, which differ greatly from legacy IT downtime andservice outage issues. Least common denominator issue in cloud computing, the smallest broken componentand/or downtime will bring the entire service down. IBM Cloud management facilities are integrated to escalate service outage issues whichhave a ripple effect on the entire system, furthermore the integration of management facilitiessimplifies the problem isolation and resolution processes. Given knowledge about cloud computing and virtualization, describe the supported IBMhypervisors in the context of the IBM Virtualization Management solutions, so that you are able torecommend the appropriate hypervisor for a cloud computing solution. With emphasis on performing the following tasks: Understand characteristics of the workloads in the cloud infrastructure. Understand the business goals that are trying to be achieved by going to cloud. Understand how systems and tools help deliver on those metrics. Identify hypervisors that are supported in those environments. Given a private cloud environment and an audience knowledgeable of WebSphere solutions,
  • 17. identify pertinent WebSphere solutions so as to understand their use in creating, building, andoperating a private cloud environment. With emphasis on performing the following tasks: IBM Hypervisor Edition products, such as the WebSphere Application ServerHypervisor Edition, provide IBM middleware technologies in a virtualized package. Packages a complete middleware software stack into a single virtual image. Optimized to run on hypervisor technology such as VMware, PowerVM, andz/VM. Explain how the IBM WebSphere CloudBurst Appliance allows you to build, deploy,and manage middleware environments in a private cloud. Integrates with hypervisor technology and network components to create a sharedvirtualized infrastructure. Use IBM Hypervisor Edition products to build middleware patterns to be deployedto the private cloud. Deploy middleware patterns to the private cloud in a resource-aware manner. Apply fixes and upgrades to environments deployed to the private cloud. Track user usage and cloud resource usage in the private cloud. Track software license usage in the private cloud. Explain how the WebSphere Virtual Enterprise delivers cloud capabilities formiddleware applications. Create application SLAs that define required qualities of service for yourapplications. Utilize dynamic application request routing to meet SLAs and ensure that the mostimportant applications get the most resources. Create and enforce application health policies that proactively identify and addresserror conditions in your application runtime. Dynamically and selectively update deployed applications without incurringdowntime or degrading user experience. Given the understanding of cloud environments, describe what IBM solutions for monitoringand alerts. With emphasis on performing the following tasks: Benefits provided by Monitoring Collecting historic data to assist with planning future data center resource needsand to optimize virtualized resource placement; Capturing real-time data to quickly react to unexpected resource needs; Measuring adherence to performance SLAs; Proactively generating alerts and detail data to quickly detect and solve applicationproblems; Reporting resource usage data by application, necessary for allocating costs
  • 18. appropriately. Components to Monitor Applications and Database Services and transactions -SLAs -Availability -End user response time Server -CPU, memory, and storage -Virtualization, hypervisors Storage -Capacity and performance Network -Components -routers and switches, network traffic, SNMP, DNS, DHCP, LDAP -Performance issues and security Data Center -Energy Management Common Monitoring metrics Throughput - How quickly the service responds. Reliability - How often the service is available. Load balancing - When elasticity kicks in. (New VMs are booted or terminated, forexample.) Durability - How likely the data is to be lost. Elasticity - The ability for a given resource to grow infinitely, with limits (themaximum amount of storage or bandwidth, for example) clearly stated. Linearity - How a system performs as the load increases. Agility - How quickly the provider responds as the consumers resource load scalesup and down. Automation - What percentage of requests to the provider are handled without anyhuman interaction. Customer service response times - How quickly the provider responds to a servicerequest. This refers to the human interactions required when something goes wrong with theon-demand, self-service aspects of the cloud. What is the purpose of event management? Report and automate the response to changes in the infrastructure from monitoring. Report and automate the availability of the infrastructure. Monitoring options Monitoring tools and agents can be included in SW or HW solutions for private
  • 19. clouds. Integrated to existing monitoring tools. Real-time service visibility, dashboards and intelligence from Cloud SolutionProvider Cloud based monitoring services for public clouds Agent or agent less monitoring Given an understanding of cloud computing, explain the different IBM provisioning solutions,so that the IBM provisioning strategy for a cloud environment is clearly understood. With emphasis on performing the following tasks: Provisioning is the most import aspect of a cloud environment which providesautomation of the Service Catalog functions. IBM provides the following 3 solutions for provisioning in a cloud environment. Tivoli Service Automation Manager (TSAM): It is a software solution optimized toaccelerate Cloud deployments with an approach to service-aware automation. To achieve this itleverages both Tivolis Process Automation Engine (TPAE) and IBMs CCMDB for clearlydefined insights into physical and virtual infrastructure interdependencies from a configuration,asset and service management perspective. It also includes capabilities from Tivoli ProvisioningManager (TPM) for actively provisioning new VMs and the Tivoli Service Request Manager(TSRM) for self-provisioning through service catalog requests. IBM Service Delivery Manager (ISDM): It is a tightly integrated servicemanagement solution that combines the necessary software components to implement cloudcomputing. Its delivered as a pre-integrated software stack deployed as a set of virtual images thatautomate IT service deployment, and provide resource monitoring, cost management, andprovisioning services via cloud. Products within the software stack include TSAM, IBM TivoliMonitoring (ITM), Tivoli Usage and Accounting Manager (TUAM), and Tivoli SystemAutomation (TSA), which is designed to control and optimize the performance of systemsresources such as file utilization, processes, and IP addresses in clustered or Cloud environments. IBM CloudBurst: CloudBurst is a purpose-built solution designed to optimizebusiness workloads with minimal customization. It includes the entire software stack delivered bythe ISDM, as well as hardware including pre-configured servers, storage and networking.CloudBurst is designed for fast deployment and fast time to value and supports a common userinterface, common reporting, security, and other services across the Cloud environment. Itintegrates with existing systems, network and storage hardware, and comes as a single blade in aBladeCenter H chassis with redundant Ethernet and Fibre Channel switch modules. CloudBurstalso supports energy utilization and management, backup and recovery, metering and accounting. An architect should reference the following table to decide which provisioning solutionbest meets the need of the organization. TSAM ISDM CloudBurst Feature/FunctionStand-alone Software Offering X XSelf-Service Portal for reservation of computing X X X
  • 20. Storage & Networking resourcesRapid deployment of services in service catalog X X XAutomated provisioning and de-provisioning of X X Xresources"lights-out" automated operation X X XPre-packaged automation templates andworkflos for most common resource types such X Xas Vmware virtual images and LPARSReal-time monitoring of physical and virtual X XresourcesEnergy management to reduce cost X XIntegrated usage and chargeback capabilities X Xthrough TUAMReusable image library for rapid deployment X XVirtualization management X XIncluded quickstart implementation services XReady to go solution including XHardware,software and Services Given the objective of architecting a cloud computing solution, identify the securityrequirements to protect unauthorized access to infrastructure, applications, and services. With emphasis on performing the following tasks: Assessment of the business and IT security risks; identify vulnerabilities and gaps in keysecurity controls; create policy design and definitions for secure controls; and offer a prioritizedlist of recommendations against business goals for security best-practice improvements to helpmitigate business risks. Loss of governance - Because the organization may not have direct control of theinfrastructure, trust in the provider and its own ability to provide proper security is paramount. Compliance risk - The cloud provider impacts the organizations ability to complywith regulations, privacy expectations and industry standards, because data and systems may existoutside the organizations direct control. Isolation failure - Multi-tenancy and resource sharing are defining characteristics ofthe cloud. It is entirely possible for competing companies to be using the same cloud services, ineffect running their workloads shoulder-to-shoulder. Keeping memory, storage and network accessseparate is essential. Data protection - The ubiquitous nature of data in the cloud raises unprecedentedidentity and access management threats. Because the organization relinquishes direct control overdata, it relies on the provider to keep that data secure and, when it is deleted, ensure that it ispermanently destroyed.
  • 21. Management interface and role-based access - Cloud applications are accessed andmanaged through the Internet, and involve deep and extensive control. The risk associated with asecurity breach is therefore increased and proper access authorization must be carefullyconsidered. Assess your cloud security readiness with robust service offerings. Identity and access management Data protection Auditing and monitoring Legal, regulatory and privacy requirements Access controls for sensitive data Greater visibility and monitoring of access Protection of data at rest and in transit Adherence to regulations Improved security management to increase efficiency and reduce costs. Security and Resiliency defined as in the IBM Common Cloud ManagementPlatform Reference Architecture (CCMP-RA) Command & Control / Security Policy Management / Software, System & ServiceAssurance Data Policy Enforcement / Identity Lifecycle Management / Threat & VulnerabilityManagement Audit & Compliance Management / Access Management & Security Entitlement /Security Extension to IT Service Management Availability & Continuity Management Given the objective of architecting a cloud computing solution, identify the requirements andconsiderations to provide storage capacity, and data protection and recovery to support theinfrastructure, applications, and services. With emphasis on performing the following tasks: Data and storage management in the Cloud are critical: To provide a reliable, on-demand service experience. To reduce costs and enable scalability. To mitigate risks. The keys to effective cloud storage management include: Data protection and recovery Data security and life-cycle management Storage utilization and optimization Storage resource management Automate data management policies through three distinct processes: Migration, Archival and Expiration. Data migration within the Cloud can help you get control of, and efficientlymanage, data growth and its associated storage costs by providing automated space management.It provides the following key features:
  • 22. -Storage pool virtualization that helps maximize utilization of the managed storageresources; -Restore management capabilities that are optimized based on the location of thedata; -Migration that is transparent to the users and to applications; -Migrations that are scheduled to minimize network traffic during peak hours; -Automatic migrations that occur outside the backup window; -Threshold limit settings that can eliminate "out of disk space" messages.Section 4 - Management of the Cloud Environment Given the objective of architecting a cloud computing solution, describe and discuss thedesign of IBM Service Management as per the IBM Common Cloud Management PlatformReference Architecture (CCMP-RA). With emphasis on performing the following tasks: Business Support Services (BSS) Offering management / Customer management / Pricing and Rating Order management / Entitlement management / Subscriber management General accounting / Invoicing and Billing / Peering and Settlement Contracts and Agreements / Opportunity to order / Service offering catalog Metering, Analytics and Reporting Operational Support Services (OSS) Service delivery catalog Service templates / Service automation management Service request management / Change and configuration management / Imagelife-cycle management Provisioning / Incident and problem management / IT service level management Monitoring and event management / IT asset and license management / Capacityand performance management Virtualization management Core components of Service Managed Virtualization and Clouds Locating and Requesting Services -Self-service portal / Automation engine / and Service catalog Deploying Cloud Services -Automated provisioning / and Image management Managed Cloud Services -Monitoring / Security and Metering
  • 23. Service Management Capabilities Process and Technology Automation across Business Services -Align assets and resources to business priorities: How are resources beingdeployed to meet business demand. -Automate Service Operations: Are activities efficiently executed when deliveringbusiness services. Visibility across Applications, Data and underlying Infrastructures -Map service dependencies to infrastructure: How are resources connected toprovide business services. -Monitor infrastructure resources: How are infrastructure events affecting services. -Understand user service experience: How are services meeting business user needs,How are services meeting business agility needs. Service Management Control aligned to Business Priorities -Provide business aligned dashboards: What is the health of my business andservices that support it. -Provide Security and Compliance solutions: How secure and compliant are mybusiness services. -Fulfill Service Requests: How effectively are requests for services being managed. -Continuous Service and Application portfolio management: Which services orapplication should be the focus of new solutions, transformation, improvement, cost cutting,consolidation or retirement. Given the understanding of cloud environments, describe what IBM solutions providereporting and analytics capabilities for a cloud environment, so that the IBM Cloud Computingreporting tools available from IBM have been explained. With emphasis on performing the following tasks: Usage and Metering reporting requirements: Understand costs, track, allocate and invoice by department, user and manyadditional criteria. Collect, analyze and bill based on usage and costs of shared assets. Deliver detailed information and reports about the intricate use of shared resources. Available Tivoli Usage and Accounting Manager (TUAM) reports in IBM ServiceDelivery Manager (ISDM): Configuration Report - RCFGX001.rptdesign -Contains information about report configuration. Client Report - RCLTX001.rptdesign -Lists all clients registered in the TUAM database. Invoice - RINVC007.rptdesign
  • 24. -Displays the key accounting information, such as the number of server hours,memory hours and CPU hours, multiplied by the defined rate per each account code. Run Total Invoice - RIVTC001.rptdesign -Displays the number of server hours, memory hours and CPU hours, consumed inthe whole infrastructure. Rate Report - RRATX001.rptdesign -Lists the rates as defined in the TUAM database. Tivoli Monitoring reporting Historical Data -Use historical data collection and reporting to gather useful metrics about yourmanaged network. You can also use historical data with the chart baselining tools for predictiveanalysis and in situation modeling for key performance indicators. Situations for Event Monitoring -Situations are definitions of conditions to test, such as slow transaction rates orinvalid logon attempts. Use situations to raise alerts of certain conditions and to trigger singleaction commands or automated workflows. Automating Actions and Responses -The Tivoli Enterprise Portal has functionality that enables you to design your ownTake Action commands, Launch Application definitions, and Policy definitions, then store themfor use by other users. A policy, rather than being run by the user, runs automatically when areferenced situation event is opened. Custom Queries -In views that display monitored data, attribute values from agents are retrieved byqueries to the Tivoli Enterprise Monitoring Server. -You can edit the queries that are used in the predefined workspaces provided byyour monitoring products, or create new queries to populate new views. In addition, you canretrieve data from any JDBC- or ODBC-compliant database to display in a chart or table bywriting an SQL SELECT statement. These custom queries are created in the Query editor. Define the Tivoli Common Reporting Tool. The Tivoli Common Reporting tool is a reporting feature available to users ofTivoli products and provides a consistent approach to viewing and administering reports. Tivoliproducts can provide report packages designed for use with Tivoli Common Reporting, withreports that use a consistent look and feel. Tivoli Common Reporting consists of several components: -A data store for storing and organizing report designs, reports, and supportingresources. The data store is a location within the Tivoli Common Reporting infrastructure where
  • 25. all report-related files and reports are managed and maintained. -A Web-based user interface for specifying report parameters and other reportproperties, generating formatted reports, and viewing reports. -A command-line interface for working with objects in the data store andperforming additional administrative functions. -Report packages, archive files containing reports, documentation, graphics, anddynamic link libraries. Report packages for some monitoring agents are included as .zip files onthe Application CD in the REPORTS directory, and the REPORTS directory is divided intosubdirectories named with the three-character prefix that identifies the product. Report packagesfor some monitoring agents are available from the IBM Tivoli Open Process Automation Library(http://www-18.lotus.com/wps/portal/topal). You can search on "Tivoli Common Reporting" tofind report packages on OPAL. A sample set of reports was provided with the Tivoli CommonReporting product. Other sets can be downloaded and installed by using the Import facility. Youcan find additional report packages generated by other non-IBM users, business report templates,and the Tivoli Common Reporting: Development and Style Guide on the IBM developerWorks(Website: http://www.ibm.com/developerworks/spaces/tcr). -The open-source Eclipse BIRT Report Designer that you can use to modify reportsor create your own. This tool is not included with Tivoli Common Reporting, but can bedownloaded from http://www.eclipse.org/birt/phoenix/ or from the Tivoli Common Reportingpage at IBM developerWorks (http://www.ibm.com/developerworks/spaces/tcr). Analytics Products IBM Cognos -IBM Smart Analytics Cloud IBM SPSS -IBM Predictive Analysis Business Rules Management IBM ILog Jrules -The IBM WebSphere ILOG JRules business rule management system (BRMS)provides a comprehensive set of capabilities that enable Business and IT functions within theorganization to work together collaboratively for authoring, maintaining and deploying decisionlogic that is critical to business systems. Given an understanding of cloud computing, describe TUAM capabilities, so that IBMaccounting and billing strategy for a cloud environment is clearly understood. With emphasis on performing the following tasks: IBMs accounting and billing capabilities on the Cloud are provided by TUAM. IBMTUAM can collect data from the provisioning solutions to provide service usage reporting andenable accurate billing of cloud services consumed. It provides comprehensive insights into IT consumer costs across virtualized, hybrid andtraditional infrastructure and application environments. From a Cloud perspective, it can show
  • 26. whos (individual, department, geography, SP customer, project etc.) using what and how much ofthe shared resources are available. If chargeback is desired, it can also generate bills, either for actually billing or fordata-driven capacity and portfolio planning. TUAM drill-down delivers both per-service andper-service component usage, which is important for Cloud. For instance, it can itemize on avolume or dollars-and-cents basis database usage, e-mail usage, print server usage, storagerequirements, and systems/workload usage for Cloud and non-Cloud infrastructures, in support ofboth distributed and mainframe-hosted services. The benefits of this type of visibility are manifold. It allows for capacity and resourceplanning, portfolio and service planning, vendor management, and conversely vendor-enabledbilling for customers. Most importantly, it provides a foundation for IT and business executives to discuss inconsistent and meaningful dollars-and-cents terms how and why and at what cost IT services arebeing used and so promote better communication between IT and the business it supports.Test 000-032: Foundations of IBM Cloud Computing Architecture V1Section 1 - Cloud Computing Concepts and Benefits Given a list of cloud computing environment attributes, describe how those attributes arerealized to provide business advantages, so that the business advantages of cloud computing havebeen defined. With emphasis on performing the following tasks: Virtualization: IT resources can be shared between many computing resources (physicalservers or application servers). Provide more efficient utilization of IT resources and reduce hardware cost throughresource consolidations and economies of scale. Lowering total cost of ownership and improvingasset utilization. Provisioning: IT resources are rapidly provisioned (or de-provisioned) based onconsumer demands. Reduce IT cycle time and management cost. Elastic scaling: IT environments scale up and down by any magnitudes as needed tosatisfy customer demands. Optimize IT resource utilization and increase flexibility. Service Automation Management: IT environments that provide the capability to request,deliver, and manage IT services automatically. Reduce IT operational costs by automating the processes used to deliver andmanage a cloud computing environment. Pervasiveness: Services are delivered through the use of the Internet and on anyplatform. Improve customers experience by enabling services to be accessed from anywhere,
  • 27. at anytime, and on any device. Flexible pricing: Services are tracked with usage metrics to enable multiple paymentmodels. Improve cost transparency and offer more flexible pricing schemes. Given the definition and attributes of virtualization, describe how virtualization is a keyinfrastructure element for cloud computing so that the costs for infrastructure investment can bereduced. With emphasis on performing the following tasks: Computing resources (application servers. physical servers, databases, storages, services)are dynamically created, expanded, compacted, or moved as demand varies. Under-utilized physical servers are consolidated into a smaller number of morefully-utilized physical servers. Virtualization is a key infrastructure element for cloud computing because it Provides important advantages in sharing, manageability, and isolation ofcomputing resources. Reduces costs significantly via server consolidations and optimal resourceutilization. Provides a way for provisioning a computing resource dynamically andautomatically. Given an audience with knowledge of current data system technology, define dynamicinfrastructure so a model of how cloud computing relates to dynamic infrastructure is produced. With emphasis on performing the following tasks: Explain dynamic infrastructure. Dynamic Infrastructure is an information technology paradigm concerning the design ofDataCenters so that the underlying hardware and software can respond dynamically to changinglevels of demand in more fundamental and efficient ways than before. Explain the relationship between cloud computing and dynamic infrastructure. Cloud computing is a way to establish a dynamic infrastructure, specifically tooptimize the IT infrastructure through virtualization and energy-efficienct initiatives to achievemore with less. Dynamic infrastructure helps to visualize all resource servers, storage, desktops,and applications and proactively handle energy management across the business. This helps toreduce cost, resolve power and cooling issues, free up staff, and better manage and automateoperations, which enables customers to dynamically adjust their IT to meet changing demandlevels and new business requirements. Given an audience with knowledge of current data system technology, define elasticity so a
  • 28. model of how cloud computing relates to elasticity is produced. With emphasis on performing the following tasks: Explain elasticity as it relates to cloud computing. A user can create, launch, and terminate server instances as needed. This user paysby the hour for active servers, hence the term "elastic". Explain the benefits of elasticity. Given the benefits of automation in an IT infrastructure, describe how automation is a keyinfrastructure management attribute of cloud computing in order to reduce system administrativetasks and achieve cost saving. With emphasis on performing the following tasks: Automation is a key infrastructure management attribute for cloud computing because,without the benefits of automation, the complexity of a cloud environment is increasedsignificantly and added costs are generated - costs high enough to cancel out the cost savingsderived from cloud computing in the first place. Automation provides the following benefits: standardization and automation for deployment and management of IT services. the ability to maintain or improve quality and cost per IT service. a management stack that is easier to handle and provides for smoother workloadmigration. the ability to be audit proof and integrated with process governance. the ability to reduce costly manual interventions. the ability for IT to reduce the skill requirements needed for deploying andmanaging IT services. reduced errors caused by manual processes. Given the benefits of provisioning in an IT infrastructure, define how provisioning is a keyinfrastructure management attribute for cloud computing, so that the benefits of provisioning havebeen defined. With emphasis on performing the following tasks: Provisioning is an automated process that handles computing resource managementprocesses. Provisioning helps optimize availability by maintaining configurations and managingchanges to resources. Provisioning is used to capture and rerun scenarios of highly complex tasks; thus,minimizing the potential for human errors. Given the characteristics of a public cloud, explain how the cloud users would utilize services
  • 29. from a public cloud in an economical way. With emphasis on performing the following tasks: Obtaining an instance of a cloud computing environment via a public cloud is easy andinexpensive because hardware, application, and bandwidth costs are covered by the provider. Computing resources in a public cloud can be scaled to meet the needs of the cloudusers. A public cloud can use flexible pricing models. No resources are wasted because thecloud users pay for what they use on an as-needed basis, without the requirement to invest inadditional internal infrastructure. A public cloud helps businesses shift the bulk of the costs from capital expenditures andIT infrastructure investment to a utility operating expense model. A public cloud also helps isolatethe end-users from the complexity of IT operations and management. Given the characteristics of a private cloud, explain how enterprise and business users benefitfrom private clouds, so that the benefits of private clouds have been defined. With emphasis on performing the following tasks: A private cloud is owned by an enterprise and can only be accessed by internal users. A private cloud is deployed internally behind the corporates security firewall. A private cloud is operated and maintained by either the enterprises IT operations or bya 3rd party cloud service provider. By totally owning a cloud computing environment, an enterprise can provide and governcomputing resources (physical servers, application servers, storage space, applications, services,etc.) in an efficient, compliant, and secure manner. At the same time, by using a private cloud, anenterprise can also achieve significant cost saving from the infrastructures consolidation andvirtualization. Given the characteristics of a hybrid cloud - which consists of multiple private clouds(internal) and public clouds (external), explain how this hybrid model is an attractive cloud modelfor many enterprises to achieve both cost savings and security, so that the characteristics of ahybrid cloud have been explained. With emphasis on performing the following task: A hybrid cloud model is prevalent in the industry today as it helps enterprises achievesubstantial savings from investments in the infrastructure required to provide resources via publicclouds. At the same time, a hybrid cloud also provides secure ways for enterprises to keep andprotect sensitive data under their own control of private clouds. Given the characteristics of a virtual private cloud, explain how this model is necessary tosecurely manage computing resources in a public cloud, so that the benefits of a virtual private
  • 30. cloud have been explained. With emphasis on performing the following task: A virtual private cloud can help quickly create an economical and functional computingenvironment and provide additional security measures and system management tools. Given an audience with knowledge of current data system technology, define private, public,and hybrid clouds. With emphasis on performing the following tasks: Define a private cloud. Private cloud and internal cloud are neologisms that some vendors have recently used todescribe offerings that emulate cloud computing on private networks. These (typicallyvirtualization automation) products claim to "deliver some benefits of cloud computing withoutthe pitfalls", capitalizing on data security, corporate governance, and reliability concerns. Private clouds are where activities and functions are provided "as a service" over acompanys intranet. Private clouds are built by an organization for its own users, and everything isdelivered within the organizations firewall (instead of the Internet). The private cloud owner doesnot share resources with any other companies, so multitenancy is not an issue. Therefore, privateclouds are also called "internal clouds". Define a public cloud. Public cloud or external cloud describes cloud computing in the traditional mainstreamsense, whereby resources are dynamically provisioned on a fine-grained, self-service basis overthe Internet via Web applications/Web services. These Web applications/Web services originatefrom an off-site third-party provider who shares resources and bills on a fine-grained utilitycomputing basis. Public clouds are where IT activities/functions are provided "as a service" over theInternet, which allows access to technology-enabled services without knowledge of, expertise with,or control over the technology infrastructure that supports them. Therefore, public clouds are alsocalled "external clouds". Define a hybrid cloud. A hybrid cloud environment consisting of multiple internal and/or external providers"will be typical for most enterprises". By integrating multiple cloud services, users may be able toease the transition to public cloud services while avoiding issues such as PCI compliance. Hybrid clouds are where the external and internal service delivery methods areintegrated. Rules and policies are established by the organization based on factors such as securityneeds, criticality, and underlying architecture so that activities and tasks are allocated to externalor internal clouds as appropriate. Given the definition of SaaS, explain how SaaS differentiates from the other kinds of cloud
  • 31. computing delivery models, so that the term "SaaS has been clearly described. With emphasis on performing the following tasks: Explain SaaS. SaaS "delivers software as a service over the Internet, eliminating the need toinstall and run the application on the customers own computer and simplifying maintenance andsupport. Differentiate SaaS from Platform as a Service (PaaS) and Infrastructure as a Service(IaaS). SaaS, PaaS and IaaS represent different delivery models of a cloud computingenvironment. SaaS delivers software as a service over the Internet. PaaS delivers computing platform as a service. IaaS delivers computer infrastructure (normally a virtual machine) as a service. Explain the key concepts of SaaS. Tenancy: the same environment can be shared among many customers or users. Payment method: the SaaS is normally modeled as pay-as-you-go, which isdifferent from traditional licensed applications. Application management: the SaaS provider is responsible for managing thecomputing environment. Application upgrade: the SaaS provider can upgrade the application or release newfeatures seamlessly, in contrast to the traditional and costly software upgrade. Describe some examples of SaaS. Google Docs LotusLive Salesforce.com Given the definition of PaaS, explain how PaaS differentiates from the other kinds of cloudcomputing delivery models, so that the term PaaS is clearly described. With emphasis on performing the following tasks: Explain PaaS. PaaS "delivers a computing platform and/or solution stack as a service, oftenconsuming cloud infrastructure and sustaining cloud applications. It facilitates deployment ofapplications without the cost and complexity of buying and managing the underlying hardwareand software layers. Differentiate between PaaS and SaaS and IaaS. SaaS, PaaS and IaaS represent delivery models of a cloud computing environment. SaaS delivers software as a service over the Internet. PaaS delivers a computing platform as a service.
  • 32. IaaS delivers computer infrastructure (normally a virtual machine) as a service. Explain how PaaS relates to Computing Platform. A computing platform "describes some sort of hardware architecture or softwareframework (including application frameworks), that allows software to run". A PaaS delivers acomputing platform as a service. Given the definition of IaaS, explain how IaaS differentiates from the other kinds of cloudcomputing delivery models so that the term IaaS is clearly defined. With emphasis on performing the following tasks: Explain IaaS. IaaS "delivers computer infrastructure, typically a platform virtualizationenvironment, as a service." Differentiate between IaaS and SaaS and PaaS. SaaS, PaaS and IaaS represent different delivery models of a cloud computingenvironment. SaaS delivers software as a service over the Internet. PaaS delivers a computing platform as a service. IaaS delivers computer infrastructure (normally a virtual machine) as s service. Explain how IaaS relates to utility computing. "Utility computing relates to the business model in which application infrastructureresources, hardware, and/or software are delivered. Cloud computing relates to the way we design,build, deploy, and run applications that operate in a visualized environment, sharing resources andboasting the ability to dynamically grow, shrink, and self-heal." List some examples of IaaS. Amazon Elastic Compute Cloud Eucalyptus IBM Smart Business Test & Development Cloud Given the definition of a hosted service, explain how a hosted service relates to cloudcomputing, so that the similarities and differences between a hosted service and cloud computingare described. With emphasis on performing the following tasks: Explain the kinds of service providers. "An application service provider (ASP) is a business that provides computer-basedservices to customers over a network. Software offered using an ASP model is also sometimescalled on-demand software or software as a service (SaaS). The most limited sense of this businessis providing access to a particular application program (such as customer relationship management)using a standard protocol such as HTTP."
  • 33. "An Internet service provider (ISP) is a company that offers its customers access tothe Internet." "A hosted service provider (xSP) is a business that delivers a combination oftraditional IT functions such as infrastructure, applications (SaaS), security, monitoring, storage,Web development, Website hosting and email, over the Internet or other wide area networks(WANs). An xSP combines the abilities of an ASP and an ISP." Define how ASP relates to cloud computing. An ASP provides a cloud computing service, more specifically a SaaS. Define the difference between a Service Provider and cloud computing. A service provider might not provide any cloud computing capability. For example, anISP is not considered to be a cloud computing service. Given the definition of grid computing, explain how grid computing relates to cloudcomputing, so that the distinction between cloud computing and grid computing becomes clear. With emphasis on performing the following tasks: Explain grid computing. Grid computing is a type of parallel and distributed system that enables the sharing,selection, and aggregation of geographically distributed "autonomous" resources dynamically atrun-time depending on their availability, capability, performance, cost, and usersquality-of-service requirements. Differentiate between grid computing and cloud computing. Grid computing is "a form of distributed computing and parallel computing, whereby asuper and virtual computer is composed of a cluster of networked, loosely-coupled computersacting in concert to perform very large tasks." So the goal of grid computing is to divide a singleand large task among many loosely-coupled computers. Grid computing might run in a cloudcomputing environment. The main difference is that, whereas grid computing is comprised ofmany computers working together to achieve one goal, cloud computing is aimed to providecomputing resources for independent tasks. Given the definition of utility computing, explain how utility computing relates to cloudcomputing, so that the difference between cloud computing and utility computing is explained. With emphasis on performing the following tasks: Explain utility computing. "Utility computing is the packaging of computing resources, such as computation andstorage, as a metered service similar to a traditional public utility (such as electricity, water,natural gas, or telephone network). This system has the advantage of a low or no initial cost toacquire hardware; instead, computational resources are essentially rented. Customers with very
  • 34. large computations or a sudden peak in demand can also avoid the delays that would result fromphysically acquiring and assembling a large number of computers." Differentiate between utility computing and cloud computing. "Utility computing relates to the business model in which application infrastructureresources – hardware and/or software – are delivered. While cloud computing relates to the waywe design, build, deploy and run applications that operate in a visualized environment, sharingresources and boasting the ability to dynamically grow, shrink, and self-heal." Given a set of customer business requirements, explain cloud computing features, so that amapping of each requirement to one or more features is produced. With emphasis on performing the following tasks: Categorize customer business requirements. This may be from a business pain point ofview or the framework defined in ITIL. Map cloud computing features to the corresponding business requirements. Since cloudcomputing features cover a wide scope, you may use case scenarios of existing solutions that aresimilar to a given customer pain point, or categorize each requirement to a part of ITIL, anddiscuss how cloud computing satisfies that part of ITIL. Given an understanding of cloud computing, define multitenancy as it relates to cloudcomputing, so that its advantages and disadvantages have been defined. With emphasis on performing the following tasks: Multitenancy: a single instance of software runs on a server, serving multiple clients(tenants). Multitenancy vs Multi-instance In a Multitenancy environment, multiple customers share the same application, runningon the same operating system, on the same hardware, with the same data storage mechanism. Thedistinction between the customers is achieved during application design, so that customers do notshare or see each others data. Contrast this with multi-instance where one or the other of thesecomponents is abstracted so that each customer application appears to be running on a separatephysical machine. Benefits of Multitenancy. Cost savings Multitenancy allows for cost savings over and above the basic economies of scaleachievable from consolidating IT resources into a single operation. An application instance usuallyincurs a certain amount of memory and processing overhead, which can be substantial whenmultiplied by many customers, especially if the customers are small. Multitenancy reduces thisoverhead by amortizing it over many customers. Efficiency
  • 35. Peak demand by individual tenants can be more easily accommodated becauseprocessing power can be "borrowed" from other tenants in that application instance that areexperiencing processing lulls. Concerns with multitenancy Data Privacy Because different clients are sharing the same application resources (storage,databases, software) there is a danger of one clients data being exposed to another client if propersafeguards are not built into the application. Complexity of Customization Because a single application instance must serve the needs of multiple clients, it ismore difficult to customize the application to meet the individual needs of a clients organization. Given an audience familiar with data system architecture, explain how cloud computingcapabilities save energy so that a list of features of a more efficient data system is produced. With emphasis on performing the following tasks: Identify energy costs in a data system. Physical systems require energy even when they are not fully utilized. Furthermore, thisenergy is turned into heat, which must be removed from the DataCenter. Additionally, energy maybe more expensive in some places than others. Identify how cloud computing optimizes utilization of energy-intensive resources. Maximizing CPU usage, allowing rapid consolidation of VMs to shut down surplussystems, savings on cooling. Multiple virtual assets can share the same physical resources to betterutilize energy. As requirements diminish, even on an hourly basis, virtual assets can beconsolidated allowing physical assets to be shut down. Then when requirements increase, physicalassets can be brought online to meet demand. Ability to move visualized assets to run on physical assets in a location whereenergy is cheaper (such as closer to a generation station) or where cooling is easier. Virtual assetscan be quickly migrated to take advantage of changes in energy pricing/availability. Given an audience familiar with data system architecture, explain the difference between acloud computing environment and a cluster environment so that the difference between the two inthe DataCenter environment are understood. With emphasis on performing the following tasks: Cloud computing is Internet-based computing; whereby, shared resources, software, andinformation are provided to computers and other devices on-demand, like a public utility. A computer cluster is a group of linked computers, working together closely so that inmany respects they form a single computer. The components of a cluster are commonly - but not
  • 36. always - connected to each other through fast local area networks. Outline differences between clouds and clusters. The two are not opposites, and there can be overlaps in functionality. Cloudindicates that a group of resources is shared, through virtualization and multi-tenancy. On theother hand, clustering describes how a set of assets (physical or visualized) work together as asingle system. #The goal of cluster computing is to perform autonomous computing, workingtogether to fulfill a certain task. Cloud computing is systems working independently. Given a thorough analysis of the customers existing business processes, explain andarticulate how existing processes can be offered as cloud services and existing approval processescan be automated so that a highly-automated cloud solution can be achieved. With emphasis on performing the following tasks: Describe the existing processes that will be automated as cloud services. Companies that are implementing a cloud environment need to analyze theirexisting processes to determine the areas where it can be automated in an efficient way whenoffered as a cloud service. Approvals play an essential role in the core operations of every business. As a rule,most approvals represent the delegation of authority to carry out an activity, for exampleprovisioning of computing resources. It is critical to understand and document how approvals are obtained today to seewhere opportunities for automation and efficiency improvements can be introduced. Describe how the dynamic provisioning of cloud resources can influence the changes onthe business approval process. Customers existing business approval processes may contain several manualapproval steps that may slow down the overall provisioning process. In a cloud environmentwhere IT services are rapidly provisioned and provided as standardized offerings, these manualapproval steps should be identified and automated.Section 2 - Cloud Computing Design Principles Given an understanding of cloud computing, define cloud architecture, so that anunderstanding of cloud architecture has been demonstrated. With emphasis on performing the following tasks: Cloud architecture Cloud architectures are designs of software applications that use Internet-accessibleon-demand services. Applications built on cloud architectures are such that the underlyingcomputing infrastructure is used only when it is needed (for example to process a user request),draw the necessary resources on-demand (like compute servers or storage), perform a specific job,
  • 37. then relinquish the unneeded resources and often dispose themselves after the job is done. Whilein operation, the application scales up or down elastically based on resource needs. Given the Wikipedia definition of cloud computing layers, identify and define the 5 layers ofcloud computing, so that the five layers of cloud computing have been defined. With emphasis on performing the following tasks: Cloud computing layers: Client; Application; Platform; Infrastructure; Server Client: a cloud client consists of computer hardware and/or computer software thatrelies on cloud computing for application delivery, or that is specifically designed for delivery ofcloud services and that, in either case, is essentially useless without it. Examples include somecomputers, phones and other devices, operating systems and browsers. Application: cloud application services or "Software as a Service (SaaS)" deliversoftware as a service over the Internet, eliminating the need to install and run the application onthe customers own computers and simplifying maintenance and support. Platform: cloud platform services or "Platform as a Service (PaaS)" deliver acomputing platform and/or solution stack as a service, often consuming cloud infrastructure andsustaining cloud applications. It facilitates deployment of applications without the cost andcomplexity of buying and managing the underlying hardware and software layers. Infrastructure: cloud infrastructure services or "Infrastructure as a Service (IaaS)"delivers computer infrastructure, typically a platform virtualization environment, as a service.Rather than purchasing servers, software, DataCenter space or network equipment, clients insteadbuy those resources as a fully outsourced service. Server: the servers layer consists of computer hardware and/or computer softwareproducts that are specifically designed for the delivery of cloud services, including multi-coreprocessors, cloud-specific operating systems and combined offerings. Given an audience familiar with data system architecture, explain the hardware used in acloud computing environment so that the infrastructure of a cloud environment has been produced. With emphasis on performing the following tasks: Processing unit: the processing unit generally contains CPU and RAM used by thevisualized resources. It must be able to support the following: Elasticity: ability to meet changing requirements of visualized resources. As anexample, a processing unit may need to support multiple visualized resources with competingrequirements for processing power and RAM. Migration: the ability to move visualized assets from one processing unit toanother. Storage: storage can be localized to the processing unit or can be shared among multipleprocessing units. Storage must be able to support: the following: Rapid provisioning and deprovisioning of virtual assets Migration of virtual assets Security measures to keep one customer from accessing another customers data
  • 38. Network: the network hardware must be able to support the various networks used in thecloud environment. Different networks have different requirements, and this means that there may be avariety of specialized hardware. For example, fiber channel hardware may be used to implement astorage area network (SAN) processing unit and centralized storage, while ethernet hardware mayneed to support different speeds. Single networking hardware components may also support multiple networks. Forexample, a management network and customer network may share the same physical ethernetswitch. Given an audience familiar with data system architecture, explain the principles ofnetworking in a cloud computing environment so that the infrastructure of a cloud computingnetwork has been produced. With emphasis on performing the following tasks: Network Hardware: must be able to support the various networks used in the cloudenvironment. Management networks Virtual server management networks: virtual assets may require a set of dedicatedmanagement networks. These may be used to administer, monitor, and migrate the virtual asset. Virtual server provisioning networks: a set of dedicated provisioning networks maybe required for the various provisioning tools. - Used to access provisioning tools (e.g., for requesting the provisioning of a virtualasset); - Used by provisioning tools to provision and configure virtual assets. Hardware management networks - A set of networks used to manage the physical infrastructure (blades, bladechassis, switches, storage, and Power Distribution Units) SANs: provide access to centralized storage. Customer data management networks: provide users with access to visualized assets. Network management/monitoring components: used to administer the network andmonitor the health of the network. They are tied into cloud monitoring components to provide anoverall view. Virtual local area networks (VLANs) VLANs can be used to separate different networks and provide security features toprevent unauthorized access to customer or administrator data. Given an understanding of cloud computing, summarize the importance of the DataCenter incloud computing, so that understanding of the importance of the DataCenter in cloud computinghas been demonstrated.
  • 39. With emphasis on performing the following tasks: DataCenter is a facility used to house computer systems and associated components,such as telecommunications and storage systems. It generally includes redundant or backup powersupplies, redundant data communication connections, environmental controls (e.g., airconditioning, fire suppression) and security devices. Importance of DataCenter in cloud computing. Given that security is still a concern in a cloud computing environment, provide a list ofsecurity measures so that a comprehensive data and user security strategy can be implemented forcloud computing. With emphasis on performing the following tasks: Privileged user access: access control measures need to be employed to protect sensitivedata. Regulatory compliance: external audits and security certifications should be conductedto ensure the security and integrity of data in the clouds. Data location: locations of where data is stored must be taken into consideration in termsof local authoritys privacy laws, jurisdictions, etc. Data segregation: data encryption techniques must be used to segregate different sets ofdata in a multi-tenancy situation. Recovery: systems back-up and data recovery must be implemented in the clouds. Given the networking performance strategies, describe the network performance implicationsof building "DataCenter clouds" and identify the possible performance issues in multi-networkenvironments to meet the requirements of cloud computing performance. With emphasis on performing the following tasks: Describe the network performance implications of building "DataCenter clouds." DataCenter clouds are formed by connecting two or more DataCenter cloudnetworks over a wide area network (WAN). Due to the inherent nature of WAN, network data lossand latency must be closely examined to make sure that sufficient bandwidth is allocated. Identify the network performance issues related to creating multi-network DataCenters. The latency accumulated in networks is largely proportional to the number ofinterfaces a packet transits from source to destination, and each switch that handles packets posesa risk of loss and delay. Networks should be planned as flat as possible. Given the key requirements of cloud computing, (1) describe how existing Web servicetechnologies can be used by cloud providers, (2) describe how Web technologies can be used byend-users to access cloud services, and (3) identify some of the common Web Services that areprovided by cloud companies so that the end-user experience and productivity can be improved.
  • 40. With emphasis on performing the following tasks: Describe how existing Web service technologies can be used by cloud providers to offerCloud services. Cloud service providers use existing Web technologies such as PHP, AJAX, RESTAPI, SOAP, XML, HTML5, and others to develop a dynamic Web front-end for its end-users tosee and order their cloud service offerings. Describe how Web technologies can be used by end-users to access Cloud services. In the SaaS model, end-users will only need access to the applications that arebeing offered as opposed to the infrastructure platforms that the applications are running on.Generally, these applications are provided in the form of a Web application. In some cases, cloudservice companies provide wrapper Web service APIs that give its users the ability to integratewith other applications on the Web. Identify some of the common Web services that are provided by cloud companies. Some of the leading cloud companies provide basic building-block type Webservices that fulfill some of the core needs of accessing cloud computing environments. Theseservices include storage, computing, messaging, datasets, ordering new cloud services, andmodifying existing cloud services. Given that solutions in the cloud are multi-tenant solutions and rely on the network to deliverservices to a large volume of users, describe the implementation practices so that solutions in theclouds can be more effective. With emphasis on performing the following tasks: The following factors are used to measure the performance of a cloud-based solution: Software & Service Delivery Response time System management & maintenance planning Proactive communication Notifications regarding maintenance activities System monitoring Key-performance-index (KPI) System Scalability Ability to respond to large volumes of service requests & users Ability to handle high volumes of services during peak demands Ability for system expansion with minimal costs Consistent service quality Consistent service and system performance Reliability as service request volumes grow High Availability Facilities with reliable power, cooling, and network infrastructure High-availability infrastructure, including networking, server infrastructure, and
  • 41. software N+1 redundancy 24/7 operational capability Given a customer with knowledge of standard computer billing and accounting procedures,explain the billing models that pertain to cloud computing such that a model of cloud billing isproduced. With emphasis on performing the following tasks: The subscription business model is a business model where a customer must pay asubscription price to have access to the product/service. The model was pioneered by magazinesand newspapers, but is now used by many businesses and Websites. Rather than selling productsindividually, a subscription sells periodic use (monthly, yearly, or seasonally) or access to aproduct or service. Resource-based billing model: this billing model ties cost to some resources or set ofresources. For example, the amount of RAM used multiplied by the number of hours used (Is thisan overlap of utility billing model?). For another example, renting multiples of some predefinedpackage of RAM, CPU, and disk. Utility billing model: utility billing is the packaging of computing resources, such ascomputation and storage, as a metered service similar to a traditional public utility (such aselectricity, water, natural gas, or telephone network). This system has the advantage of low or noinitial cost to acquire hardware; instead, computational resources are rented. Customers with verylarge computations or a sudden peak in demand can also avoid the delays that would result fromphysically acquiring and assembling a large number of computers. Given the ITIL and a summary of the customer environment, explain how the facets of ITILsupport the customer environment so that a model of the business systems, as supported by cloudcomputing and ITIL, is produced. With emphasis on performing the following tasks: Explain how service support pertains to cloud computing. The service support ITIL discipline focuses on the user of the Information &Communication Technology (ICT) services and is primarily concerned with ensuring that theyhave access to the appropriate services to support the business functions. Cloud computingprovides an especially fluid environment, so change and configuration management are bothimportant and challenging. For example, explain how to track a virtual machine that may be started up, shutoff, cloned, modified, destroyed and recreated. As a configuration item, service requests for provision and modification of virtualassets must follow a process that maintains control while matching the flexibility of virtual assetsin the cloud. Incident and problem management must also reflect the specific challenges of virtualassets. For example, what is the underlying cause of a series of incidents, a virtual asset, the
  • 42. underlying physical infrastructure, or the interaction between the two? Release management must encompass issues regarding the ability to not only clonevirtual assets, but then modify and redeploy those assets. For example, how will the upgrade of theoperating system on a virtual server propagate to clones of that virtual server, some of which mayhave been modified? Explain how service delivery pertains to cloud computing. The service delivery discipline concentrates on the proactive services the ICT mustdeliver to provide adequate support to business users. It focuses on the business as the customer ofthe ICT service (compare with: service support). The discipline consists of the following processes,explained in subsections below: - Service Level Management - Capacity Management - IT Service Continuity Management - Availability Management - Financial Management Service delivery must also be implemented with cloud computing characteristics inmind. - The ability to migrate virtual assets from one physical resource to another canhelp meet service-level agreements. On the other hand, service-level agreements will pertain tovirtual assets even more than the physical infrastructure on which the assets are located. - Capacity management requires that physical infrastructure, as well as the virtualasset, be considered. - The capabilities of cloud computing provide tools to further service continuityand availability. - Auditing mechanisms for virtual assets must exist to consider usage of virtualassets and measure how that correlates to use of a given physical asset. Explain challenges in using the ITIL methodology with cloud computing. Challengesinclude the flexibility and increasingly dynamic nature of a cloud environment; Intellectual Property concerns (example: managing software licenses) for virtualassets; the separation of physical infrastructure from the services provided by virtual assetsthat run on that infrastructure. Explain the benefits of using an ITIL methodology with cloud computing. Cloud computing can assist with many areas of ITIL methodology implementation.For example, using the migratability of virtual assets to meet SLAs and more effectively performcapacity management. The fluid nature of a cloud computing environment benefits a formal managementmethodology such as ITIL.Section 3 - IBM Software Cloud Computing Architecture
  • 43. Given the benefits of cloud computing, explain the steps to create the cloud computingresources on the IBM Cloud so that those computing resources can be used to shorten thedevelopment cycle. With emphasis on performing the following tasks: Use the following steps to create a cloud instance on IBM Cloud for development andtesting: Register to set up an account Provide the following required specifications: Computing power (CPU, memory) Storage space size Operating System Database Middleware applications Software applications Provisioning - this is an automatic process and does not require user interventions. Access the newly-created cloud computing resource and begin to use it. Given the Jazz.net Website, describe how the Rational Jazz platform enables cloud-basedC/ALM, so that an understanding of how Rational Jazz enables C/ALM has been demonstrated. With emphasis on performing the following tasks: Rational Jazz software development platform Define the architectural principals that make Jazz well-suited for a cloudenvironment. RESTful Web services In order to make its data and services available to the widest range of clients, a toolexposes its data and services through a resource-oriented Web service [Richardson and Ruby,RESTful Web Services, OReilly, 2007]. The intent of the Web service is to provide a stablelong-term, programmatic Web-based API for directly accessing the facilities and data offered bythe tool. These Web services use an arrangement of URIs, HTTP methods, and standardrepresentation languages such as XML and JSON, which work like the rest of the Web. Theprotocol is stateless; client state is carried in the client; server state is explicitly reflected in theresources. Web user interfaces Web user interfaces are the choice for most Jazz tools because they allow the toolsto be accessed with little or no application install footprint on the client machine. C/ALM An integrated set of application lifecycle tools that allows seamless collaborationbetween team members regardless of their role.
  • 44. Identify the three main tool offerings that are contained within the Jazz C/ALMplatform. - Rational Team Concert - Rational Requirements Composer - Rational Quality Manager Define and describe IBM Smart Business Development and Test on the IBM cloud. IBM Smart Business Development and Test on the IBM cloud addresses yourdevelopment and test needs with a competitive edge. The flexible provisioning offered by thissolution means you can get the IT resources you need, on demand, at a predetermined cost.Capital expenditures are limited or eliminated. Operational costs are contained and predictable. ITpersonnel no longer need to spend precious cycles deploying, configuring, and maintaining yourdevelopment and test environment. Given IBM Smart Business Development and Test Cloud strategy, define the IBM SmartBusiness Development and Test Cloud offering, so that an understanding of its key features,values, and benefits has been demonstrated. With emphasis on performing the following tasks: IBM Smart Business Development and Test Cloud Definition -IBM Smart Business Development and Test Cloud helps you evaluate, plan,design, and implement a dynamically scalable, visualized development and testing private cloudenvironment. Benefits - Assists in reducing capital and licensing expenses as much as 50 to 75 percentusing visualized resources. - Helps reduce operating and labor costs as much as 30 to 50 percent by automatingdevelopment and testing resource provisioning and configuration. - Facilitates innovation and time to market by helping reduce development andtesting setup time from weeks to minutes. - Improves quality through more accurate configurations and enhanced modeling tohelp reduce defects by as much as 15 to 30 percent. - Helps accelerate cloud computing initiatives with IBM CloudBurstTMimplemented through QuickStart services. Given the developer-works article titled "Automating the Construction of Applications andApplication Environments," describe how the Rational Automation Framework (RAFW) can beused to automatically build CloudBurst application environments, so that an understanding ofRAFW is demonstrated.
  • 45. With emphasis on performing the following tasks: Challenges Constructing applications and application environments is a core part of IT in manyenterprises today. Because the process of building such resources is usually human-driven, it canbe time-consuming and prone to errors, which means users naturally turn to technology to helpautomate this process. In the on-demand, elastic world of cloud computing, having an automatedenvironment-built process becomes an essential requirement. What is RAFW RAFW can be viewed as an integration between Rational Build Forge andWebSphere CloudBurst. RAFW for WebSphere reduces the complexity of managing yourWebSphere environment. The automation framework for WebSphere is designed specifically toautomate installation and patching, configuration change management, and applicationdeployment. It supports the WebSphere application server and WebSphere portal products. The automation framework for WebSphere has the following installablecomponents: - Framework server - you install this in your Rational Build Forge environment - Target Systems - these are automatically set up on WebSphere nodes. The framework server stores WebSphere configuration data, media for installation,and a library of WebSphere actions in a central location, enabling remote administration ofapplication and portal servers located anywhere in your network. Integration with Rational Build Forge delivers additional value. You can scheduleand automate action execution, track and audit WebSphere configuration changes, and use projectsto integrate WebSphere actions with other application processes. Solving the challenges with RAFW You could use either WebSphere CloudBurst or Rational Build Forge by itself tocreate a customized WebSphere Application Server environment that includes the operatingsystem, WebSphere middleware, and user applications. However, by not integrating these twoproducts together you sacrifice flexibility and functionality. If you were to use WebSphere CloudBurst in this capacity without Rational BuildForge, you would need to develope script packages and put these packages put into the WebSphereCloudBurst pattern to carry out all the application deployment coordination. By enabling RationalBuild Forge to handle the application building and deployment process, the actual applicationbecomes more loosely coupled from the WebSphere CloudBurst pattern. This lets you deployupdated versions of applications without requiring updates to the WebSphere CloudBurst patterns.This also gives you the ability to use the same pattern for different applications. Additionally, theRAFW for WebSphere provides a set of scripts for common WebSphere Application Serverapplication deployment and configuration that can be used in Rational Build Forge projects,greatly reducing custom scripting requirements. Of course, you could build a super script to mimicall the capabilities of Rational Build Forge and #RAFW for WebSphere, but why would you wantto go through that effort? On the flip side, given that Rational Build Forge is an adaptive executionenvironment, you could conceivably include the setup of both the operating system and
  • 46. WebSphere Application Server environments as steps within a project. However, running throughthe installation and configuration process is slower than the image-based techniques leveraged byWebSphere CloudBurst. In addition, WebSphere CloudBurst enables you to control the completelifecycle of visualized WebSphere Application Server environments. Using the appliance, you cancreate, deploy, and manage such environments, and it is very easy to remove the environmentsonce they are no longer needed. WebSphere CloudBurst also provides WebSphere ApplicationServer intelligence in the form of hardened, best-practice configurations built on ten years of fieldexperience. Again, you could write super scripts to mimic all the capabilities of WebSphereCloudBurst, but why would you want to? Integrating WebSphere CloudBurst and Rational Build Forge leverages eachproduct so that each is used primarily for what it does best. You, therefore, benefit from maximumagility, flexibility, and rapidity in both interactions with applications and with the environmentsthat support those applications. Given the economic benefits that cloud computing provides, explain how one can use theIBM WebSphere Hypervisor and WebSphere CloudBurst Appliance to implement virtualization sothat physical computing resources can be consolidated to achieve optimal utilization. With emphasis on performing the following tasks: There are a couple of ways to implement virtualization to consolidate computing resourcesusing WebSphere CloudBurst appliance and WebSphere hypervisor: Configure multiple virtual machines on a single hypervisor on a single hardwareplatform. Configure multiple virtual machines on multiple hypervisors on an operating systemplatform. Given the portfolio of Tivoli products, explain how some Tivoli products can be used thecontrol and provision a cloud environment, so that many tasks associated with a cloudenvironment can be automated. With emphasis on performing the following tasks: Explain how IBM Tivoli Monitoring(ITM) can be used to control a hypervisorenvironment. ITM for virtual servers "centrally monitors server virtualization, consolidation,resource performance, and availability at the enterprise level". Explain how IBM CloudBurst can be used as a cloud environment appliance. It provides the tools to extend cloud offerings into production. It is a self-service portal for rapid access to cloud services. It uses a track system with built-in metering and accounting. It uses active management of server power consumption for increased efficiency. It manages workloads and systems through a single interface. It creates redundancy layers in the hardware platform, which eliminates points of
  • 47. failure. It provides optional security to protect your production cloud. Explain how Tivoli Service Automation Manager(TSAM) can be used to automate theprovision and control of the cloud computing environment. TSAM provides the capability to request, fulfill, and manage complete softwarestacks for the DataCenter. This comprises the definition, offering, request, and automatedprovisioning of the stack, including integrated management of the environment. Whether it is adevelopment, test, pre-production or production system, TSAM can help provide thesecapabilities. Given the portfolio of Tivoli security products, explain how some Tivoli security productscan be used to provide access, integrity, and confidentiality to the resources in the cloud. With emphasis on performing the following tasks: Explain how IBM Tivoli Federated Identity Manager(TFIM) can be used to assure theidentity of the user accessing a cloud resource. When organizations utilize cloud architectures, those clouds are comprised ofenormous numbers of virtual servers running the applications in parallel. Using TFIM,organizations can assert trusted identities to applications in the cloud and not have to manage alarge number of application identities in the cloud. Therefore, the cloud can remain a truly elasticservice provider. This will be the case regardless of whether the cloud supports internal services,external services or is hosted on-site or off-site. TFIM can be used in any of these scenarios. Explain how IBM Tivoli Security Policy Manager(TSPM) can be used to federate,simplify, and optimize security policy management TSPM helps strengthen application access, facilitates compliance, and supportsoperational governance across the IT infrastructure. TSPM minimizes operational inefficiencies and vulnerability related toentitlements and SOA security policy management. TSPM manages SOA security policies and entitlements throughout the policylifecycle, from authoring and publishing to enforcing and updating. TSPM enforces policies at run-time, which strengthens your organizations securityposture. TSPM directs change and centrally controls policies to more quickly and efficientlyaddress new or more stringent compliance requirements. TSPM uses federated policy management to help bridge the gap between businessand IT approaches to security policies. TSPM enables end-to-end application authorization using flexible policyadministration and standards-based policy decisions. Given the characteristics of the IBM Tivoli Storage Productivity Center (TSPC), explain howit can be used to manage the storage environment in a Cloud environment, so that the user caneasily manage their storage resources.
  • 48. With emphasis on performing the following task: Explain how TSPC can be used to manage the storage resources in a Cloudenvironment. The TSPC suite of storage infrastructure management tools can help customersreduce the complexity of managing their storage environments by centralizing, simplifying, andautomating storage tasks associated with storage systems, storage networks, replication services,and capacity management. Given an existing service lifecycle strategy in the cloud environment, identify the IBM Tivoliproducts that provide the functionality of defining and publishing self-service offerings, so that theservice offering has been defined. With emphasis on performing the following tasks: Identify the IBM Tivoli product that provides the service catalog functionality. IBM Tivoli Service Request Manager (TSRM) enables users to obtain IT servicesthrough published service offerings. Identify the IBM Tivoli product that provides the functionality of defining cloudservices as self-service offerings. TSRM not only automates the manual tasks involved, but also helps customerstransform their DataCenter organization into a cloud model. TSRM provides capabilities torequest, fulfill, and manage complete software stacks for the DataCenter. This comprises thedefinition, offering, request, and automated provisioning of the stack, including integratedmanagement of the environment. Given a thorough analysis of a customers existing business processes, explain how existingIBM solutions can be applied in order to achieve highly-automated cloud environments thatsatisfy the customer business requirements. With emphasis on performing the following tasks: Describe the IBM Service Management solutions. Service Request Management & Fulfillment: Automates end-to-end service delivery using a unified architecture and workflowfully integrated with governance processes. - TSRM provides a single point of contact to manage incidents and problems. Incident & Problem Management: Identifies and resolves incidents before they become a problem, ensure processcompliance, and improve end-user satisfaction. - IBM Tivoli Netcool/Omnibus delivers real-time, centralized monitoring ofcomplex networks and IT domains.
  • 49. - IBM Tivoli Business Service Manager helps visualize the health of criticalbusiness services and associated SLAs. Asset and Change & Configuration Management: Integrated approach for managing assets throughout the lifecycle from procurementto operation to retirement. - IBM Tivoli Asset Management for IT helps manage the IT asset lifecycle in orderto control cost and mitigate compliance risk. - IBM Tivoli Change and Configuration Management Database stores standardizeddata on configurations and change histories to help integrate people, processes, information, andtechnology. Server and Application Provisioning and Release Management: Leverages best-practice processes to plan, manage, and report on all aspects ofrelease deployment; improves successful deployment rate via automated workflows, approvals,and a consolidated view of all changes in the infrastructure. - IBM Tivoli Provisioning Manager automates the provisioning, configuration, andmaintenance of a variety of devices. - IBM Rational Team Concert enables more successful application softwarereleases by providing software configuration and change management. They combine flexibleworkflows with industry-leading version management. - IBM Rational Build Forge automates and accelerates build and release processesto enable iterative development, high-performance builds, and streamlined software delivery. Describe the IBM cloud solutions that are available to automate business processes. IBM Implementation Services for cloud computing: Design and implementation for test environments provides strategy, planning,design, and implementation for building a private test cloud. The private test cloud enableson-demand provisioning of a visualized and dynamically scalable test environment that is secure.This includes an operating system, middleware, storage, network, images, and data. The IBM Service Management Center for cloud computing: A cross IBM solution that provides the operational support systems necessary tohelp Enterprise DataCenters achieve cloud-level efficiencies. It provides the necessary tools andpractices to manage the life cycle of cloud services, from service definition through servicetermination. Supporting both the provisioning of virtual resources and optimization of virtualoperations, the IBM Service Management Center helps lower costs and improves efficiency byautomating tasks for visualized servers, storage, and networking resources. It also offers theassurance of higher service availability and consolidated operations by visualizing virtualenvironments. Cloud Services Lifecycle Management: One of the first offerings within IBM Service Management Center for CloudComputing is TSAM, which automates the design, deployment, and management of services, such
  • 50. as middleware, applications, hardware, and networks. - TSAM not only automates the manual tasks involved, but also helps customerstransform their DataCenter organization into a cloud model. TSAM provides capabilities torequest, fulfill, and manage complete software stacks for the DataCenter. This comprises thedefinition, offering, request, and automated provisioning of the stack, including integratedmanagement of the environment. Cloud Security Management: Security is one of the major concerns in cloud environments today. As customersimplement and deliver cloud-based services, they need to implement comprehensive security forthe cloud. IBM is making the process of securing the cloud much easier with the delivery of threesecurity offerings that provide targeted capabilities in the areas of identity and access, data andapplication security, and security for z/OS. - Tivoli Identity and Access Assurance: administers, secures, and monitors useraccess to resources and provides compliance auditing. - Tivoli Data and Application Security: protects data and applications via auditableaccess controls, fine-grained entitlements, and encryption key management. - Tivoli Security Management for z/OS: automates efficient security administration,policy-based user management, security monitoring, and compliance reporting on the mainframe. Cloud Storage Management: Storage within a cloud environment is a critical necessity to ensure high availabilityto end-user environments while simultaneously reducing costs and minimizing risks. IBMInformation Infrastructure solutions are the building blocks for cloud computing with nextgeneration visualized storage and storage management products. - IBM XIV Storage System allows automated and visualized data management, anddramatically simplified systems management helps tame dynamic workloads. -IBM System Storage Area Network Volume Controller visualizes IBM andnon-IBM storage to enable resource pooling, thin provisioning, and simplified management. - TSPC manages visualized storage environments with tools that can helpcustomers reduce the complexity of storage environments by centralizing, simplifying, andautomating storage tasks associated with cloud infrastructures. - IBM Tivoli Storage Manager provides flexible levels of data protection, and canmeet a variety of recovery time objectives so multiple levels of service can be offered. Moreimportantly, this product can be configured to segregate data by client. Describe the IBM Development & Test Cloud solutions. The IBM Smart Business Development and Test on the IBM cloud features IBMrational software delivery services delivered over IBMs secure, scalable cloud. The IBM Smart Business Development and Test cloud provides an on-premisescloud built by IBM services. IBM CloudBurst for Development and Test offers preintegrated hardware, storage,virtualization, and networking to create an on-premises cloud environment. - IBM CloudBurst provides pre-installed, fully integrated service management
  • 51. capabilities across hardware, middleware, and applications. - IBM WebSphere CloudBurst Appliance helps developers and operationspersonnel establish and deploy software images and patterns into a cloud environment. IBMCloudBurst offers a ready-made cloud environment into which these images and patterns can bedeployed and is designed to be used by an organization that does not want to create a cloudenvironment using existing assets. Given the portfolio of IBM Information Management cloud offerings, explain how some ofthe solutions can be leveraged to reduce costs and manage the data in a smarter, faster, and morereliable manner. With emphasis on performing the following tasks: Differentiate and identify the IBM Information Management database product thatoffers the highest OLTP performance at low cost and requires no administration. Differentiate and identify the IBM Information Management enterprise class databaseproduct that is scalable and optimized for SOA, CRM, and data warehousing. Differentiate and identify the IBM Information Management product that enablescustomers to integrate and manage data from multiple diverse sources. Given the portfolio of IBM Information Management and IBM Smart Analytics Cloudofferings, explain how customers can leverage business intelligence at a low cost. With emphasis on performing the following tasks: Differentiate and identify the IBM Information Management BI solution that enables thecustomers to consolidate their data, make better business decisions, and reduce cost. Differentiate and identify the IBM Information Management BI solution that enables thecustomers to monitor all of their data across the organization via reports, analysis, scorecards,plans, etc. Differentiate and identify the IBM hardware & software (appliance) offerings thatprovide an end-to-end solution for a customers BI needs. Given the need for a collaboration solution, define how the collaboration services can be usedin a cloud computing environment using IBM LotusLive, so that the customer understands thecollaboration capabilities available in IBM LotusLive. With emphasis on performing the following tasks: Definition LotusLive is a collection of integrated, online collaboration solutions and socialnetworking services for your business. Benefits & Services Use LotusLive to work with people seamlessly inside and outside yourorganization and to streamline communications.
  • 52. LotusLive Meetings is a full-featured Web-meetings service that can help youreduce travel costs, shorten sales cycles, and be more productive. LotusLive Events is an online event-management and Web-conferencing servicethat can help you create, host, and manage your next webinar. LotusLive Connections delivers integrated online social networking andcollaboration tools for networking, business instant messaging, and more. LotusLive Notes is a Lotus Domino hosted e-mail solution that provides e-mail,calendar, and scheduling capabilities. LotusLive iNotes is a Web-based e-mail service that provides essential messagingand calendaring capabilities to businesses of all sizes. LotusLive Engage is an integrated suite of collaboration tools that combine yoursocial network with Web conferencing and collaboration capabilities, such as file storing andsharing, instant messaging, and activity managing. Given the customers need for support of hand-held devices, define how to access the cloudenvironment using a hand-held device, so that the IBM LotusLive iNotes application has beenexplained. With emphasis on performing the following tasks: LotusLive provides push e-mail capabilities for mobile devices, as well as othercollaborative services such as instant messaging. Benefits & Services LotusLive iNotes provides support for mobile devices via IMAP IDLE. IMAP IDLE provides a "push" e-mail feature in LotusLive iNotes. LotusLive Mobile lets you access your LotusLive network and collaborationservices - including webcasting services, instant messaging, and more - right from your mobiledevice.Exam Cheat Sheet: 54 Q&AsTitle : IBM Cloud Computing Infrastructure Architect V11.Cloud architectures designed for service delivery and availability ofservices are extremely important.How is software failure within a cloud infrastructure environmenthandled? (Choose two.)A. replace the failed nodeB. restart the software image
  • 53. C. use elastic IP addresses for consistent and re-mappable routesD. allow the state of the system to re-sync by reloading messages fromqueuesE. design services with proper real time disaster recovery and statefuluser contextAnswer: D,E2.Which term is used to describe a hypervisor running multiple operatingsystems simultaneously.?A. full virtualizationB. paravirtualizationC. partial virtualizationD. nested virtualizationAnswer: D3.What are two considerations before moving data to a public cloud?(Choose two.)A. A company must restructure all data to accommodate a public clouddata model.B. A company should analyze all legal and regulatory issues that pertainto the data.C. A company can safely assume that cloud services will replicate andbackup all of their data.D. A company should encrypt all data so that they do not have to analyze
  • 54. legal and regulatory issues.E. A company should analyze data structure to see if they can takeadvantage of public cloud datamodels.Answer: B,E4.What is a critical and unique component during the design and planningprocess for a cloud service?A. IT Service availabilityB. Business Service availabilityC. IT Infrastructure/Component availabilityD. IT Service and Infrastructure/Component availabilityAnswer: B5.A customer wants to implement a private cloud solution and they areanticipating changes in theircurrent virtualization operational model. Which virtualizationconfiguration characteristic is affected by theimplementation of cloud infrastructure?A. higher latencyB. lower server utilizationC. higher demand/transient useD. easier dependency/user managementAnswer: C
  • 55. 6.What are two optimized workload characteristics supported by the IBMcloud portfolio? (Choose two.)A. analyticsB. tightly-coupledC. centralized message busD. high-performance computingE. structured related data modelAnswer: A,D7.A cloud infrastructure should be architected to accommodate whichtechnical risks?A. overflowing network buffers resulting in loss of dataB. termination of service by an internet service providerC. fiber cable damage causing a failover to copper channelsD. unauthorized configuration changes to storage network devicesAnswer: D8.Which area of the current IT enterprise availability and redundancycomponents must be addressed inorder to move to a cloud operational model?A. server capacity to service capacityB. workload availability to service availabilityC. application availability to workload availabilityD. server mean time between failures (MTBF) to service MTBF
  • 56. Answer: C9.Which technology is used in certain IBM WebSphere DataPowerappliances to provide identityverification of public cloud endpoints and to securely transmit encrypteddata between enterpriseendpoints and public cloud endpoints in an integrated cloud environment?A. IBM Tivoli CloudBurst ApplianceB. WebSphere CloudBurst ApplianceC. WebSphere DataPower Secure CommunicatorD. WebSphere DataPower Secure Cloud ConnectorAnswer: D10.A company is setting up a cloud environment to host several of theirapplications. These applicationsvary in importance and the company wants to ensure that the mostbusiness critical applications get themost resource. Which solution will help achieve this goal?A. WebSphere eXtreme ScaleB. WebSphere Business EventsC. WebSphere Virtual EnterpriseD. WebSphere Business MonitorAnswer: C11.Which characteristic best describe the difference between Service
  • 57. Oriented Architecture (SOA) andcloud computing?A. pay per use modelB. shared computing resourcesC. SOA exists within the firewallD. leverage IT resources on demandAnswer: C12.What is the collection and control point for alerts?A. Tivoli Enterprise ConsoleB. Tivoli Enterprise Portal ServerC. Tivoli Enterprise Monitoring AgentD. Tivoli Enterprise Monitoring ServerAnswer: C13.A company hosts office applications on a stand alone server in theirdata center. A recent spike indemand for one of their applications resulted in the denial of access tosome potential users. Whichcharacteristic of the cloud service delivery model would meet thefluctuating demands of the companysusers?A. service ubiquityB. service elasticity
  • 58. C. self-service accessD. usage-based billingAnswer: B14.An enterprise wants to take advantage of cloud computing but retaincontrol over the construction anddelivery of all cloud-based services. Which cloud deployment model willmeet their needs?A. hybrid cloudB. private cloudC. community cloudD. public shared cloudAnswer: B15.What are two methods that address both network infrastructuresecurity and performance for a cloudcomputing environment? (Choose two.)A. encryption (SSL)B. limiting network hopsC. network load balancingD. denial of service preventionE. intrusion detection and preventionAnswer: B,D16.Which component is necessary to view monitoring reports for IBM
  • 59. Service Delivery Manager?A. Tivoli Enterprise PortalB. Tivoli Service Request ManagerC. Tivoli Service Automation ManagerD. WebSphere Administrative ConsoleAnswer: A17.Which IBM product implements metering capabilities?A. IBM Tivoli MonitoringB. IBM Tivoli Common ReportingC. IBM Tivoli System AutomationD. IBM Tivoli Usage and Accounting ManagerAnswer: D18.Which storage infrastructure function provides benefit for public cloudcomputing?A. metadataB. multipath I/OC. clustered trivial databaseD. real time storage managementAnswer: C19.What are two key infrastructure components for data migration whenplanning a move to cloud?(Choose two.)
  • 60. A. storageB. networkC. monitoringD. data miningE. high availabilityAnswer: A,B20.A cloud service vendor provides business services such as humanresources and payroll processing.They use Web interfaces on a shared infrastructure providing multi-tenantservices without the need tomanage or control the underlying resources. What type of cloud service isthis company providing?A. Platform as a ServiceB. Software as a ServiceC. Infrastructure as a ServiceD. Business Process as a ServiceAnswer: DExam 032 – Foundations of IBM Cloud Computing Architecture V11. A startup unit within a company is planning to go live with a newproduction application. The application has a small number of users butthe user base is expected to grow exponentially within a few months.
  • 61. How should the application be set up?A. A horizontal cluster of application servers on two different machinesto serve many users.B. A set of computation resources enough to handle requests from theinitial user population.C. A vertical cluster of application servers on the same machine to takeadvantage of full CPU capacity.D. A set of two clustered servers in a cloud computing environment thatwill be able to serve all anticipated users.Answer: B2. A company has implemented a cloud computing solution that allowsusers to request and provision application development environments.How can automation help manage the inherent risk when many usersaccess these environments?A. By authenticating users in the system.B. By implementing multi-tenancy techniques.C. By establishing an audit trail and integrating with existing processgovernance.D. By optimizing availability to maintain configurations and managechanges to resources. Answer: C3. Which feature of cloud computing optimizes availability by
  • 62. maintaining configurations and managing changes to resources?A. automationB. elasticityC. provisioningD. virtualizationAnswer: C4. What are two ways a virtual private cloud can help businesses reducetheir cost? (Choose two.)A. By virtualizing key business processes.B. By providing maximum control over all data and infrastructure.C. By reducing infrastructure capital expenditures for short term demand.D. By terminating the instances when idle and only paying for what theyuse.E. By using their internal IT department to maintain the entireinfrastructure.Answer: CD5. Which two options are an accurate characteristic of the Software as aService cloud delivery model? (Choose two.) A. It allows for the deployment of customer owned software on apublic cloud.B. It allows for application maintenance and upgrades to be primarilymanaged by the cloud provider.
  • 63. C. It allows the sharing of application resources in a one to manyenvironment and on a pay for use basis.D. It provides access to storage and virtual machines which can becombined and layered for running applications.E. It provides access to a middleware software stack and developmenttools hosted by the provider on the hardware infrastructure to build andrun custom applications. Answer: BC6. What is provided by the Platform as a Service cloud computingdelivery model?A. Access to hosted applications.B. A computing platform and a runtime environment.C. A platform where virtualized machines can be hosted.D. Services integrated with private networks and applications. Answer: B7. Which statement best describes cloud architectures?A. Single tiered application design.B. Design techniques to help make applications run faster.C. An industry standard set of specifications for creating cloudapplications.D. Designs of software applications that use Internet accessibleon-demand services.
  • 64. Answer: D8. In order to reduce travel cost, a company has decided to leverage theservices of a public cloud to provide virtual collaboration capabilities (i.e.web conferences, video, and chat) to its employees. However thecompany wants to pay only for the computing resources used by itsemployees. Which billing model would meet this requirement?A. utilityB. recurringC. subscriptionD. per user basedAnswer: A9. What are two challenges that IBM Rational Automation Frameworkfor WebSphere addresses when building application environments?(Choose two.)A. It reduces errors due to manual execution.B. It reduces time consuming application build processes.C. It reduces manual test procedures which add time to quality testing.D. It improves quality of applications due to badly written requirements.E. It allows for collaboration on work items due to geographicallydispersed resources.Answer: AB10. How can it be determined if a server has enough capacity to handle
  • 65. peak workload for a virtual machine?A. Use the hypervisor to reallocate workload to ensure enough spacefor the virtual machine.B. Measure the CPU utilization in the virtual machine to see if it issufficiently below 100%.C. Look up the physical CPU capacity of the server and compare it tothe application utilization when it was not virtualized.D. Measure the utilization of the server and all the virtual machines onit to see if there is enough allocation space left for the virtual machine.Answer: D11. Which statement defines the IBM WebSphere CloudBurst Appliance?A. It is a device that routes messages between virtualized WebSphereapplication environments.B. It is a device that provides cloud-based storage capabilities forapplications that run on WebSphere.C. It provides the ability to regulate and route application requests tovirtualized WebSphere application environments.D. It allows users to create, deploy, and manage virtualized WebSphereapplication environments in an on-premise or private cloud.Answer: D12. How is data accessed and moved into and out of the IBM SmartBusiness Storage Cloud?
  • 66. A. Through IBMs public cloud portal.B. Through new standard cloud computing protocols.C. Through standard file access protocols like NFS, CIFS, and FTP.D. Through standard block storage protocols such as Fibre Channel andiSCSI.Answer: C13. A large enterprise is experiencing a significant increase in their dataand it is putting a strain on their existing infrastructure. They areconcerned about their ability to meet the demand without significantcapital expenditures and are looking for a cost effective cloud basedsolution. They want database software that can deliver industry leadingperformance across multiple work loads while lowering administration,storage, development, and server costs. It should also be reliable, scalable,and optimized for SOA, CRM, and data warehousing. Which IBMdatabase server offering is best suited for this client scenario?A. IBM Lotus Domino ServerB. IBM InfoSphere DataStageC. IBM DB2 Enterprise ServerD. IBM InfoSphere Information ServerAnswer: C14. What is IBM’s offering for online collaboration services using thecloud?
  • 67. A. IBM LotusLiveB. IBM Lotus QuickerC. IBM Smart Business CloudD. IBM Smart Analytics CloudAnswer: A15. Which Tivoli product migrates an operating system replica fromRedHat KVM to VMware?A. IBM Tivoli Storage ManagerB. IBM Tivoli Business Service ManagerC. IBM Tivoli for Operating System DeploymentD. IBM Tivoli Provisioning Manager for ImagesAnswer: D16. A customer is struggling with inconsistent software builds in thetesting and staging environment. Which cloud attribute can help resolvethe problem?A. pervasivenessB. elastic scalingC. flexible pricingD. automatic provisioningAnswer: D
  • 68. 17.What are two important benefits of using cloud computing? (Choosetwo.)A. Optimizes IT investments.B. Deployment of single tenant application.C. Enhanced Web V2.0 interfaces for user interactions.D. Lower total cost of ownership and improved asset utilization.E. Provides better availability than a standard computing environment.Answer: AD 18.What functionality is provided by the IBM Security NetworkIntrusion Prevention System Virtual Appliance for a cloud environment?A. antivirus supportB. network level IDS/IPSC. host level IDS/IPS and anti-virus supportD. host and network level intrusion detection and preventionAnswer: D 19.Which customer scenario best fits a deployment on a public cloud?A. A customer whose IT infrastructure is underutilized.B. A customer who deals with highly sensitive user information.C. A customer who does not have the IT infrastructure to handle variablesystem load.D. A customer who is not too concerned about security control over theirdata, and the system load is almost a constant at all times.
  • 69. Answer:20.What is the definition of provisioning as an automated process relatedto cloud computing?A. It moves data from one cloud to another.B. It provides server consolidation capability.C. It adds security constraints to a cloud environment.D. It handles computing resource management processes.Answer: D 21. A company is considering a cloud environment to improve theoperating efficiency for their data and applications. The company is partof an industry where strict security and data privacy issues are of thehighest importance. Which type of cloud would be a good choice?A. hybrid cloudB. public cloudC. private cloudD. governed cloudAnswer: C22.What is the benefit of using automation techniques in conjunction withcloud computing?A. Automation reduces human errors.B. Automation allows for sharing of computer resources.C. Automation reduces costs by increasing asset utilization.
  • 70. D. Automation optimizes availability by maintaining configurations andmanaging changes to resources.Answer: A23.What type of hypervisor provides the highest efficiency andperformance?A. utility basedB. storage basedC. software basedD. firmware basedAnswer: D24. A company needs to provide IT services to a worldwide customerbase utilizing a diverse set of devices. Which attribute of cloudcomputing can help the company deliver such services?A. pervasivenessB. flexible pricingC. vertical scaling of application serversD. horizontal scaling of application serversAnswer: A25. What is one functionality of IBM Tivoli Service AutomationManager?A. software discoveryB. business service monitoring
  • 71. C. virtual server provisioningD. out of the box cloud solutionAnswer: C26. Which concept aligns business and IT assets, helps provide flexible ITcapacity, and provides real time allocation of IT resources in line withdemand from business processes?A. elasticityB. virtualizationC. dynamic infrastructureD. automated management of resourcesAnswer: C27. An enterprise needs highly controlled storage and access to theirdatabases as well as managing the infrastructure for web front ends andother applications. They have a large existing IT infrastructure and theyare continually expanding the capabilities. Which cloud computing modelwill satisfy all their current needs and enable them to reduce cost?A. public cloudB. hybrid cloudC. private cloudD. internal cloudAnswer: B28. What are two important benefits of using cloud computing? (Choose
  • 72. two.)A. Optimizes IT investments.B. Deployment of single tenant application.C. Enhanced Web V2.0 interfaces for user interactions.D. Lower total cost of ownership and improved asset utilization.E. Provides better availability than a standard computing environment.Answer: AD29. Which statement best describes the relationship between application,server and client in a multi-tenancyenvironment?A. Single instance of software running on a server and serves one client.B. Single instance of software running on a server and serves multipleclients.C. Multiple instances of software running on a server and serves multipleclients.D. Multiple instances of software running on multiple servers and servesone client.Answer: B30. A company is currently using IBM LotusLive and would like theirmobile users to have access to theinstant messaging feature. How can this be accomplished?
  • 73. A. Mobile users can install IBM LotusLive Engage on their mobiledevice.B. Mobile devices with a IBM Sametime Connect client can beconfigured to connect to the IBM LotusLiveSametime community.C. Supported client devices can be configured to use the IMAP IDLEprotocol to support instant messagingwith the IBM LotusLive servers.D. A Sametime gateway can be installed and configured to provideconnectivity via the text messagingservice available on mobile devices.Answer: B31. When will cloud computing provide the most value?A. A company has several thousands of documents that need to beindexed in many months.B. A company has several hundreds of documents that need to be indexedin a few minutes.C. A company has to process their payroll actives at the end of each payperiod in batch mode.D. A company has purchased additional hardware in order to process theirpayroll activities faster at the endof each pay period.
  • 74. Answer: C32. A customer is struggling with inconsistent software builds in thetesting and staging environment. Whichcloud attribute can help resolve the problem?A. pervasivenessB. elastic scalingC. flexible pricingD. automatic provisioningAnswer: D33. Which resources are typically provided by an Infrastructure as aService cloud computing delivery model?A. applicationsB. virtual machinesC. virtual private networksD. middleware software stacksAnswer: B34.Which statement best describes the relationship between application,server, and client in a multi-tenancy environment?A. Single instance of software running on a server and serves one client.B. Single instance of software running on a server and serves multipleclients.
  • 75. C. Multiple instances of software running on a server and serves multipleclients.D. Multiple instances of software running on multiple servers and servesone client.Answer: B 35.Which concept aligns business and IT assets, helps provide flexibleIT capacity, and provides realtime allocation of IT resources in line withdemand from business processes?A. elasticityB. virtualizationC. dynamic infrastructureD. automated management of resourcesAnswer: C36.An enterprise needs highly controlled storage and access to theirdatabases as well as managing the infrastructure for web front ends andother applications. They have a large existing IT infrastructure and theyare continually expanding the capabilities. Which cloud computing modelwill satisfy all their current needs and enable them to reduce cost?A. public cloudB. hybrid cloudC. private cloudD. internal cloud
  • 76. Answer: B37.What are two important benefits of using cloud computing? (Choosetwo.)A. Optimizes IT investments.B. Deployment of single tenant application.C. Enhanced Web V2.0 interfaces for user interactions.D. Lower total cost of ownership and improved asset utilization.E. Provides better availability than a standard computing environment.Answer: A,D 38.What is one functionality of IBM Tivoli Service AutomationManager?A. software discoveryB. business service monitoringC. virtual server provisioningD. out of the box cloud solutionAnswer: C 39.A company is currently using IBM LotusLive and would like theirmobile users to have access to the instant messaging feature. How canthis be accomplished?A. Mobile users can install IBM LotusLive Engage on their mobiledevice.B. Mobile devices witha IBM Sametime Connect client can be configured
  • 77. to connect to the IBM LotusLive Sametime community.C. Supported client devices can be configured to use the IMAP IDLEprotocol to support instant messaging with the IBM LotusLive servers.D. A Sametime gateway can be installed and configured to provideconnectivity via the text messaging service available on mobile devices.Answer: B40. When will cloud computing provide the most value?A. A company has several thousands of documents that need to beindexed in many months.B. A company has several hundreds of documents that need to be indexedin a few minutes.C. A company has to process their payroll actives at the end of each payperiod in batch mode.D. A company has purchased additional hardware in order to process theirpayroll activities faster at the end of each pay period.Answer: C41.A customer is struggling with inconsistent software builds in thetesting and staging environment. Which cloud attribute can help resolvethe problem?A. pervasivenessB. elastic scalingC. flexible pricing
  • 78. D. automatic provisioningAnswer: D42.A company needs to provide IT services to a worldwide customer baseutilizing a diverse set of devices Which attribute of cloud computing canhelp the company deliver such services?A. pervasivenessB. flexible pricingC. vertical scaling of application serversD. horizontal scaling of application serversAnswer: A43.Which customer scenario is best suited to maximize the benefitsgained from using a virtual private cloud?A. A small start up business focused primarily on short term projects andhas minimal security policies.B. An enterprise whose IT infrastructure is under utilized on average andthe system load is fairly consistent.C. An enterprise that requires minimal security over their data and has alarge existing infrastructure that is capable of handling future needs.D. An enterprise that does not want to sacrifice security or make changesto their management practices but needs additional resources for test anddevelopment of new solutions.Answer: D
  • 79. 44.A company wants to build a test environment to test software updatesand new solutions. The environment should mirror the productionenvironment and be secure and inaccessible from outside the companynetwork. The company does not want to invest in infrastructure that maybe idle for a significant amount of time. Which cloud computing modelwill satisfy all these requirements?A. Public CloudB. Private CloudC. External CloudD. Virtual Private CloudAnswer: D45.What advantage is there for an enterprise to adopt a virtual privatecloud model?A. Reduce costs by adopting a flexible pricing model for the entireoperation.B. Reduce infrastructure costs since all data centers will be managed in athird party cloud.C. Manage sensitive data in a compliant and secure manner and benefitfrom flexible pricing models for select services or infrastructure.D. Obtain maximum control over aspects such as security andperformance since the entire infrastructure will be managed within the ITdepartment.
  • 80. Answer: C46.A company is considering a cloud environment to improve theoperating efficiency for their data and applications. The company is partof an industry where strict security and data privacy issues are of thehighest importance. Which type of cloud would be a good choice?A. hybrid cloudB. public cloudC. private cloudD. governed cloudAnswer: C47. Which two statements are true about the public cloud model? (Choosetwo.)A. It meets security and auditing requirements for highly regulatedindustries.B. Resources and infrastructure are managed and maintained by theenterprise IT operations staff.C. It shifts the bulk of the costs from capital expenditures and ITinfrastructure investment to an utility operating expense model.D. It shifts the bulk of the costs from capital expenditures to creating avirtualized and elastic infrastructure within the enterprise data center.E. Resources are dynamically provisioned on a self service basis from anoff site third party provider who shares resources in a multi-tenanted
  • 81. infrastructure.Answer: C,E48. A company would like to leverage cloud computing to provideadvanced collaboration services (i.e.video, chat, and web conferences) forits employees but does not have the IT resources to deploy such aninfrastructure. Which cloud computing model would best fit thecompany ? needs?A. Hybrid CloudB. Public CloudC. Private CloudD. Virtual Private CloudAnswer: B49.A company has decided to leverage the web conferencing servicesprovided by a cloud provider and to pay for those services as they areused. The cloud provider manages the infrastructure and any applicationupgrades. This is an example of what type of cloud delivery model?A. Platform as a ServiceB. Software as a ServiceC. Application as a ServiceD. Infrastructure as a ServiceAnswer: B50. Which statement best describes the Software as a Service cloud
  • 82. delivery model?A. A virtual machine provisioned and provided from the cloud whichallows the customer to deploy custom applications.B. A multi-tenant storage service provisioned from the cloud whichallows the customer to leverage the cloud for storing software data.C. A solution stack or set of middleware delivered to the client from thecloud which provides services for the design, development, and testing ofindustry aligned applications.D. An application delivered to the client from the cloud which eliminatesthe need to install and run the application on the customers owncomputers and simplifying maintenance and support.Answer: D 51. Which delivery model is an example of a cloud computingenvironment that provides users with a web based e-mail service?A. Software as a ServiceB. Platform as a ServiceC. Computing as a ServiceD. Infrastructure as a ServiceAnswer: A52.How can a company leverage the Platform as a Service cloudcomputing delivery model?A. A company requires more processing power to perform its financial
  • 83. analysis calculations and acquires additional computational resources.B. A company requires a customer relationship management solution andobtains an application that addresses their requirements from a cloudprovider.C. A company is running out of storage space to store a customerdatabase and dynamically requests additional space via the cloud provider?web services interface.D. A company obtains an environment with a software stack from a cloudprovider, develops a custom application, and makes that applicationavailable to its customers on the Internet.Answer: D53. A cloud provider offers an environment for building applications thatwill run from the customers environment. Which cloud computingdelivery model are they using?A. Platform as a ServiceB. Software as a ServiceC. Development as a ServiceD. Infrastructure as a ServiceAnswer: A54.Which statement is true about the Platform as a Service cloudcomputing delivery model?A. It provides a virtual machine and storage so that computing platforms
  • 84. can be created.B. It provides a runtime environment for applications and includes a setof basic services such as storage and databases.C. It provides the entire infrastructure along with a completed applicationthat is accessible using a web based front end.D. It is required by the infrastructure as a service delivery model so thatend user applications can be delivered on the cloud.Answer: B

×