SlideShare a Scribd company logo
1 of 27
Download to read offline
OIT552 Cloud Computing
Question Bank
Prepared By
Kaviya.P
Assistant Professor / Information Technology
Kamaraj College of Engineering & Technology
(Autonomous)
OIT552 CLOUD COMPUTING
UNIT I – INTRODUCTION TO CLOUD COMPUTING
Introduction to Cloud Computing – Roots of Cloud Computing – Desired Features of Cloud
Computing – Challenges and Risks – Benefits and Disadvantages of Cloud Computing.
PART – A (2 Marks)
1. Define cloud computing. (Buyya)
A Cloud is a type of parallel and distributed system consisting of a collection of
interconnected and virtualized computers. They are dynamically provisioned and
presented as one or more unified computing resources based on service-level
agreements established through negotiation between the service provider and consumers.
2. Define cloud computing. (NIST)
“The National Institute of Standards and Technology (NIST) defines cloud
computing as a "pay-per-use model for enabling available, convenient and on-
demand network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications and services) that can be
rapidly provisioned and released with minimal management effort or service provider
interaction."
3. What are the convergences of various advances leading to the advent of cloud
computing?
4. What is Service Oriented Architecture (SOA)?
Describe, compose, and orchestrate services,package, and transport messages between
services, publish and discover services, represent quality of service (QoS) parameters,
and ensure security in service access.
5. Define the term Web Services.
• Prominent technology for implementing SOA systems and applications.
• They leverage Internet technologies and standards for building distributed systems.
Based on well-known and vendor-independent standards such as HTTP, SOAP, and
WSDL.
6. What are the advantages and disadvantages of distributed computing?
Advantages
• Extensibility and Incremental Growth
• Economics
• Speed
• Inherent distribution of applications and
Reliability
Disadvantages:
• Complexity
• Network Problem
• Security
7. What are the desirable features of Cloud?
• On-Demand Self-service
• Per-usage metering and billing (Measured service)
• Rapid Elasticity
• Resource Pooling
• Broad Network Access
8. List down the types of clouds based on deployment models.
• Public / Internet Clouds
• Private / Enterprise Cloud
• Hybrid / Mixed Cloud
• Community
9. Differentiate private and public cloud.
Private Cloud Public Cloud
It is hosted at Service Provider site.
It is hosted at Service Provider site or
enterprise
It is connected to the public internet
It only supports connectivity over the private
network.
Scalability is very high, and reliability is
moderate.
Scalability is limited, and reliability is very
high.
Example: Amazon VPC and Azure Private
Cloud
Example: Amazon Web Services (AWS),
Google App Engine
10. What are cloud service models?
The three main categories of cloud service models:
Infrastructure as a Service (IaaS): The delivery of technology infrastructure (mostly
hardware) as an on demand, scalable service. Example: Amazon EC2
Platform as a Service (PaaS): A complete development and deployment environment in the
cloud, with resources that enable the user to develop and run their applications
Software as a Service (SaaS): SaaS is a licensed software offering on the cloud and pay per
use. Example: Google Docs
11. Write a short note on community cloud.
Community cloud is a cloud infrastructure that allows systems and services to be
accessible by a group of several organizations to share the information.
Example: Our government organization within India may share computing infrastructure
in the cloud to manage data.
12. List the advantages and disadvantages of cloud computing.
Advantages
• No upfront commitment
• Cost efficiency
• On Demand Self-service
• Disaster Recovery
• Excellent accessibility
• Scalability
• Flexibility
Disadvantages:
• Downtime
• Security
• Vendor Lock-In
• Limited Control
• Legal Issues
13. Define parallel computing.
Parallel computing is a type of computing architecture in which several processors
simultaneously execute multiple, smaller calculations broken down from an overall
larger, complex problem.
The term parallel computing refers to a model in which the computation is divided
among several processors sharing the same memory.
14. Define distributed computing.
• The term distributed computing encompasses any architecture or system that allows
the computation to be broken down into topics and executed concurrently on
different computing elements, whether these are processors on different nodes,
processors on the same computer, or cores within the same processor.
• In Distributed Computing the processors communicate with one another through
communication lines such as high-speed buses or telephone lines
• Each processor has its own local Memory
• Examples: ATM, Internet, Intranet /Workgroups.
15. Define cluster computing
Cluster Computing is a type of parallel or distributed computer system consists of a
collection of inter-connected stand-alone computers working together as a single integrated
computing resource.
Types of Clusters
• High Availability or Failover clusters
• Load Balancing Clusters
• Parallel / Distributed Processing Clusters.
16. Differentiate parallel computing vs. distributed computing
Parallel Computing Distributed Computing
Many operations are performed
simultaneously
System components are located at different
locations
Single computer is required Uses multiple computers
Multiple processors perform multiple
operation
Multiple computers perform multiple
operations
It may have shared or distributed memory It has only distributed memory
17. Differentiate grid and cloud computing.
Grid Computing Cloud Computing
Cloud computing is a centralized executive. Grid computing is a decentralized executive.
In cloud computing, resources are used in
centralized pattern.
In grid computing, resources are used in
collaborative pattern.
Cloud computing is a high accessible service. Grid computing is a low accessible service.
It is highly scalable as compared to grid
computing.
Grid computing is low scalable in comparison to
cloud computing.
18. What is “elasticity” in cloud computing?
• Elasticity is defined as the ability of a system to add and remove resources (such as CPU
cores, memory, VM and container instances) to adapt to the load variation in real time.
• Elasticity is a dynamic property for cloud computing.
• Elasticity is the degree to which a system is able to adapt to workload changes by
provisioning and deprovisioning resources in an autonomic manner.
Elasticity = Scalability + Automation + Optimization
19. List the applications of cloud computing.
• Scientific / Technical Applications
• Business Applications
• Consumer / Social Applications
• Art
• Data storage and back-up
• Education
• Entertainment
• Management
20. List the challenges and risks associated with cloud computing.
• Security, Privacy and Trust
• Data Lock-in and Standardization
• Availability, Fault-Tolerance and Disaster Recovery
• Resource Management and Energy Efficiency
PART – B
1. Explain in detail about evolution of cloud computing.
2. Explain the characteristics/desired features of cloud computing with suitable examples.
3. Elaborate the pros and cons of cloud computing.
4. Explain the challenges and risks associated with cloud computing.
OIT552 CLOUD COMPUTING
UNIT II – VIRTUALIZATION
Introduction to Virtualization Technology – Load Balancing and Virtualization – Understanding
Hypervisor – Seven Layers of Virtualization – Types of Virtualization – Server, Desktop,
Application Virtualization.
PART – A (2 Marks)
1. What is virtualization in cloud computing? (or) Give the role of VM.
• Virtualization is a computer architecture technology by which multiple virtual
machines (VMs) are multiplexed in the same hardware machine.
• The purpose of a VM is to enhance resource sharing by many users and improve
computer performance in terms of resource utilization and application flexibility.
• Hardware resources such as CPU, memory, I/O devices, or software resources such as
OS, software libraries can be virtualized.
2. Give the basic operation of VM.
• Multiplexing: VMs can be multiplexed between hardware machines.
• Suspension: VM can be suspended and stored in stable storage.
• Provision (Resume): A suspended VM can be resumed or provisioned to a new
hardware platform.
• Migration: A VM can be migrated from one hardware platform to another.
3. Define Virtual Machine Monitor (VMM).
• Hardware-level virtualization inserts a layer between real hardware and traditional
operating systems.
• This layer is commonly called the Virtual Machine Monitor (VMM) and it manages
the hardware resources of a computing system.
• Each time programs access the hardware the VMM captures the process
• Three requirements for a VMM:
o VMM should provide an environment identical to the original machine.
o Programs run in this environment should show, only minor decreases in speed.
o VMM should be in complete control of the system resources.
4. List the implementation levels of virtualization.
• Application level
• Library Support level
• Operating System level
• Hardware Abstraction layer level
• Instruction Set Architecture level
5. State the merits of virtualization at various levels.
6. Write a short note on Xen hypervisor.
• Hypervisor supports hardware-level virtualization on bare metal devices such as CPU,
memory, disk, and network interfaces.
• Hypervisor sits directly between physical hardware and its OS.
• Xen is a microkernel hypervisor, which separates the policy from the mechanism.
• It implements all the mechanisms, leaving the policy to be handled by Domain 0.
• Xen does not include any device drivers natively.
7. What is binary translation in virtualization?
• Binary translation is one specific approach to implementing full virtualization that does
not require hardware virtualization features.
• It involves examining the executable code of the virtual guest for "unsafe" instructions,
translating these into "safe" equivalents, and then executing the translated code.
• Alternatives to binary translation are binary patching, and full system emulation.
8. State the advantages and disadvantages of virtualization. (or) “Although
virtualization is widely accepted today, it does have its limits”. Comment on the
statement.
Advantages:
• Utilization of hardware efficiently
• Availability increases with Virtualization
• Disaster recovery is efficient and easy
• Virtualization saves energy
• Cloud migration becomes easy
Disadvantages:
• Data can be at risk
• Learning new infrastructure
• High initial investment
9. Differentiate full virtualization vs para virtualization.
S.No. Full Virtualization Paravirtualization
1.
In Full virtualization, virtual machine
permits the execution of the
instructions with running of
unmodified OS in an entire isolated
way.
In paravirtualization, virtual machine does not
implement full isolation of OS but rather
provides a different API which is utilized
when OS is subjected to alteration.
2. Full Virtualization is less secure.
Paravirtualization is more secure than the Full
Virtualization.
3.
Full Virtualization uses binary
translation and direct approach as a
technique for operations.
While Paravirtualization uses hypercalls at
compile time for operations.
4.
Full Virtualization is slow than
paravirtualization in operation.
Paravirtualization is faster in operation as
compared to full virtualization.
5.
Full Virtualization is more portable
and compatible.
Paravirtualization is less portable and
compatible.
6.
Example: Microsoft and Parallels
systems
Example: VMware and Xen.
10. List the classes of Virtual Machine (VM) architecture.
• Hypervisor Architecture
• Paravirtualization
• Host-based virtualization
11. Differentiate critical and non-critical instructions.
Critical Instruction Non-Critical Instruction
The instructions that can run only in kernel mode
are called critical instruction.
The instructions that can run only in user mode
are called non-critical instruction.
Example: Content Switching, Clear the memory Example: Generate any trap instruction
12. List the categories of critical instructions.
Critical instructions are divided into three categories:
• Privileged instructions: Execute in a privileged mode and will be trapped if executed
outside this mode.
• Control Sensitive Instructions: Attempt to change the configuration of resources used.
• Behaviour- Sensitive Instructions: Load and store operations over the virtual memory.
13. What is need of load balancing in cloud?
• The workload on servers is increasing rapidly, so servers may easily be overloaded,
especially servers for a popular web site.
• Cloud load balancing is the process of distributing workloads across multiple
computing resources.
• Cloud load balancing is defined as the method of splitting workloads and computing
resources in a cloud computing.
14. List algorithms used to balance the load in cloud.
• Round Robin
• Weighted Round Robin
• Least Connection
• Source IP Hash
• Global Server Load Balancing
15. Write a short note on server virtualization.
• Server virtualization is the process of using software on a physical server to create multiple
partitions or "virtual instances" each capable of running independently.
• Uses of server virtualization are:
o To centralize the server administration
o Improve the availability of server
o Helps in disaster recovery
o Ease in development & testing
o Make efficient use of server resources.
16. What is desktop virtualization?
• Desktop virtualization makes accessible a different system as though it were natively
installed on the host, but this system is remotely stored on a different host and accessed
through a network connection.
• Desktop virtualization addresses the problem of making the same desktop environment
accessible from everywhere.
• The basic services for remotely accessing a desktop environment are implemented in
software components such as Windows Remote Services, VNC, and X Server.
17. Write a short note on application virtualization.
• It is a technique allowing applications to be run in runtime environments that do not
natively support all the features required by such applications.
• In this scenario, applications are not installed in the expected runtime environment but are
run as though they were.
PART – B
1. Explain how virtualization is implemented in different layers. (or) Explain various levels
of virtualization implementation.
2. What is virtualization? Describe para and full virtualization architectures. Compare and
contrast them.
3. Explain in detail about load balancing in virtualization.
OIT552 CLOUD COMPUTING
UNIT III – CLOUD ARCHITECTURE, SERVICES AND STORAGE
NIST Cloud Computing Reference Architecture – Public, Private and Hybrid Clouds - IaaS – PaaS
– SaaS – Architectural Design Challenges – Cloud Storage.
PART – A (2 Marks)
1. List the actors in cloud computing.
The five major participating actors in cloud computing are
• Cloud Consumer
• Cloud Provider
• Cloud Broker
• Cloud Auditor
• Cloud Carrier
2. State the role of cloud auditor.
A cloud auditor is a party that can perform an independent examination of cloud service
controls with the intent to express an opinion thereon. A cloud auditor can evaluate the
services provided by a cloud provider in terms of security controls, privacy impact,
performance, etc.
3. What is the responsibility of cloud broker?
Cloud Broker is an entity that manages the use, performance, and delivery of cloud
services, and negotiates relationships between cloud providers and cloud consumers. As
cloud computing evolves, the integration of cloud services may be too complex for cloud
consumers to manage alone.
4. Mention the characteristic features of cloud.
• On-demand self-service
• Broad network access
• Multi-tenancy and resource pooling
• Rapid elasticity and
• scalability
• Measured service
5. Differentiate PaaS, SaaS and IaaS
Cloud Players IaaS PaaS SaaS
IT administrators /
cloud providers
Monitor SLAs
Monitor SLAs and
enable service
platforms
Monitor SLAs and
deploy software
Software developers
To deploy and
store data
Enabling platforms
via configurators
and APIs
Develop and deploy
software
End users or business
users
To deploy and
store data
To develop and test
web software
Use business software
Example Amazon EC2 Google App Engine
Google Apps like Gmail,
Google Docs, etc
6. Differentiate private cloud and public cloud.
Private Cloud Public Cloud
Single Tenancy Multi-Tenancy
It only supports connectivity over the private
network.
It is connected to the public internet
Scalability is limited, and reliability is very
high.
Scalability is very high, and reliability is
moderate.
Dedicated Servers Shared Servers
Eg: Microsoft KVM, HP, RedHat
&VMWare.
Eg: Amazon Web Service (AWS) and Google
App Engine.
7. Why do we need a hybrid cloud?
• Hybrid cloud is a solution that combines a private cloud with one or more public cloud
services, with proprietary software enabling communication between each distinct
service.
• Hybrid cloud allows companies to combine their own data center and/or private cloud
setup with public cloud resources such as Software as a Service, or SaaS. Software
touch points are used between the two infrastructures to help move data back and
forth between them as needed.
8. Write a short note on community cloud.
• A community cloud model is a collaborative effort where infrastructure is shared and
jointly accessed by several organizations from a specific group that share specific
computing concerns such as, security, compliance, or jurisdiction considerations.
• Eg: IBM soft layer cloud
9. Who are the major players of cloud?
• Amazon Web Services (AWS)
• Microsoft Azure
• Google Cloud
• IBM Cloud
• Oracle
• Salesforce
10. Identify the architectural design challenges in cloud.
Challenge 1: Service Availability and Data Lock-in Problem
Challenge 2: Data Privacy and Security Concerns
Challenge 3: Unpredictable Performance and Bottlenecks
Challenge 4: Distributed Storage and Widespread Software Bugs
Challenge 5: Cloud Scalability, Interoperability, and Standardization
Challenge 6: Software Licensing and Reputation Sharing
11. Define cloud storage (Storage as a Service) with examples.
• Cloud storage is a cloud computing model that stores data on the Internet through a
cloud computing provider who manages and operates data storage as a service.
• Stored data can be accessed from anywhere and in anytime over Internet.
• Eg: Apple (iCloud), Amazon (Amazon Web Services), Dropbox, and Google
12. State the advantages and disadvantages of cloud storage.
Advantages
• Usability and accessibility
• Security
• Cost-efficient
• Convenient sharing of files
• Automation
• Multiple users
• Synchronization
Disadvantages
• Internet Connection
• Costs
• Hard drives
• Support
• Privacy
13. Write a short note on Amazon S3.
• Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud
storage service. The service is designed for online backup and archiving of data and
applications on Amazon Web Services (AWS).
• Amazon S3 provides a simple web services interface that can be used to store and retrieve
any amount of data, at any time, from anywhere on the web.
• S3 provides the object-oriented storage service for users.
• Users can access their objects through Simple Object Access Protocol (SOAP) with
either browsers or other client programs which support SOAP.
14. What is Amazon EBS?
• The Elastic Block Store (EBS) provides the volume block interface for saving and
restoring the virtual images of EC2 instances.
• The status of EC2 is saved in the EBS system after the machine is shut down.
• Users can use EBS to save persistent data and mount to the running instances of EC2.
• EBS allows you to create storage volumes from 1 GB to 1 TB that can be mounted as EC2
instances.
15. State the purpose of Amazon SimpleDB.
• SimpleDB provides a simplified data model based on the relational database data
model.
• Structured data from users must be organized into domains.
o Each domain can be considered a table.
o The items are the rows in the table.
• A cell in the table is recognized as the value for a specific attribute (column name) of
the corresponding row.
• This is like a table in a relational database and possible to assign multiple values to
a single cell in the table.
PART – B
1. Explain in detail about NIST Cloud Computing Reference Architecture.
2. With architecture, elaborate the various deployment models and reference models of cloud
computing.
3. List the cloud deployment models and give a detailed note about them.
4. What are the pros and cons of public, private and hybrid cloud?
5. Compare and contrast the cloud deployment models.
6. Describe service and deployment models of a cloud computing environment with
illustrations. How do they fit in NIST cloud architecture?
7. Describe the different working models of cloud computing.
8. Give the importance of cloud computing and elaborate the different types of services
offered by it.
9. Illustrate the cloud delivery models in detail.
10. Describe Infrastructure-as-a-service (IaaS), Platform-as-a-Service (PaaS) and Software-as-
a-Service (SaaS) with an example.
11. Explain in detail about architectural design challenges in cloud.
12. What is cloud storage? Elucidate Amazon cloud storage in detail.
OIT552 CLOUD COMPUTING
UNIT IV – RESOURCE MANAGEMENT AND SECURITY IN CLOUD
Inter Cloud Resource Management – Resource Provisioning Methods – Security Overview –
Cloud Security Challenges – Data Security –Application Security – Virtual Machine Security.
PART – A (2 Marks)
1. Define Intercloud.
• Intercloud is a network of cloud s that are linked with each other. This includes private,
public, and hybrid clouds that come together to provide a seamless exchange of data.
• Combining many different individual clouds into one seamless mass in terms of on-
demand operations.
2. What are the challenges of Intercloud?
• Identification: A system should be created where each cloud can be identified and
accessed by another cloud, like how devices connected to the internet are identified by
IP addresses.
• Communication: A universal language of the cloud should be created so that they are
able to verify each other’s available resources.
• Payment: When one provider uses the assets of another provider, a question arises on
how the second provider will be compensated, so a proper payment process should be
developed.
3. What are extended cloud computing services?
• Hardware as a Service (HaaS)
• Network as a Service (NaaS)
• Location as a Service (LaaS)
• Security as a Service (SaaS)
• Data as a Service (DaaS)
• Communication as a Service (CaaS)
4. List the information available in VM template.
The information available in VM template are:
• The number of cores or processors to be assigned to the VM
• The amount of memory the VM requires
• The kernel used to boot the VM’s operating system
• The disk image containing the VM’s file system
• The price per hour of using a VM
• The address of the physical machine hosting the VM
• The VM’s network configuration
5. What is the responsibility of Virtual Infrastructure Engine (VIE)?
• Users submit VMs on physical machines using different kinds of hypervisors.
• VIEs (Virtual Infrastructure Engine) can create and stop VMs on a physical cluster
6. How does InterGrid Gateway (IGG) allocates resources?
An InterGrid gateway (IGG) allocates resources from one organization's local cluster and
interacts with another IGG that can allocate resources from a cloud computing provider.
Intergrid gateway (IGG) allocates resources from a local cluster three steps:
• Requesting the VMs (Resources)
• Enacting (Validate) the leases
• Deploying (install) the VMs as requested
7. Find the actors present in Intercloud?
• Cloud Broker: An entity that manages the use, performance, and delivery of cloud
services, and negotiates relationships between cloud providers and cloud consumers.
• Cloud Coordinator: It evaluates the available resources
• Supported services:
o Application scheduling
o Resource allocation
o Migration of workloads
• Cloud Exchange: It acts as a market maker for bringing together service producers
and consumers.
8. What is resource provisioning in cloud?
• Cloud provisioning is the allocation of a cloud provider's resources and services to
a customer.
• The growing catalogue of cloud services that customers can provision includes
infrastructure as a service, software as a service and platform as a service, in public or
private cloud environments.
• Resource-provisioning methods:
o Demand-driven method
o Event-driven method
o Popularity-Driven Resource Provisioning
9. Differentiate under-provisioning and over-provisioning.
Under Provisioning Over Provisioning
Allocating fewer resources than required,
otherwise the service cannot serve its users
with a good service.
The peak load causes heavy resource
waste
Leads to broken SLA and penalties. Leads to resource underutilization.
10. List the types of resource provisioning methods.
• Demand-Driven: Adds or removes nodes (VM) based on the current utilization level
of the allocated resources.
• Event-Driven: Adds or removes machine instances based on a specific time event.
• Popularity-Driven: Based on Internet traffic monitored.
11. List the Gartner’s security issues in cloud.
• Privileged user access
• Regulatory compliance
• Data location
• Data segregation
• Recovery
• Investigative support
• Long-term viability
12. What are the threats occurring while transferring or saving data in cloud? (or) list
out the key privacy issues in cloud.
• Handling of data by third party
• Cyber attacks
• Insider threats
• Government intrusion
• Legal liability
• Lack of standardization
• Lack of support
13. Define Man-in-Middle attack.
• Information shared between two parties could be hacked by the middle (third) party.
• Caused due to improper configuration of Secure Socket Layer (SSL).
• A general term for when a perpetrator positions himself in a conversation between a
user and an application either to eavesdrop or to impersonate one of the parties, making
it appear as if a normal exchange of information is underway.
14. What is Cross-Site Scripting attack?
• Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts
are injected into otherwise benign and trusted websites.
• User enters the correct URL of a website, whereas on another site, hacker redirects the
user to his/her website and hacks its identification.
15. List the security services offered by cloud.
• Availability: Data never loss and Machine never fail
• Confidentiality: Authorized to know the information
• Integrity: Data has not been tampered
16. Define data integrity, confidentiality, and availability.
• Data integrity: Refers to the technique for ensuring that the data is genuine, correct and
protected from illegal user alteration. Mechanisms Used: Digital Signature, Hashing
methods and message verification codes.
• Confidentiality: Refers to limiting data access only to authorized users and stopping
access to unauthorized ones. Mechanisms Used: Access control, Biometric,
Encryption, Privacy, Ethics.
• Availability: Availability of data resource. Mechanisms Used: Data backup, recovery
plan.
17. How can the data security be forces in cloud?
• Security need at the data level, so enterprises can be sure that their data is protected
wherever it goes.
• Provides compliance with Payment Card Industry Data Security Standard (PCIDSS).
• Ensures data security using:
o Authentication: OTP
o Encryption and Decryption algorithms
o Data integrity: Hashing techniques (Message Digest, SHA)
18. Define application security.
• Application security is one of the critical success factors for a world-class SaaS
company.
• Application security processes, secure coding guidelines, training, and testing scripts
and tools are typically a collaborative effort between the security and the development
teams.
• SaaS providers should secure their web applications by following Open Web
Application Security Project (OWASP) guidelines for secure application
development, by locking down ports and unnecessary commands.
19. What is Virtual Machine security?
• In the cloud environment, physical servers are consolidated (combined) to multiple
virtual machine instances.
• Following are deployed on virtual machines to ensure security:
o Firewalls
o Intrusion detection and prevention
o Integrity monitoring
o Log inspection
PART – B
1. Explain in detail about cloud resource provisioning methods.
2. Explain in detail about cloud security challenges.
3. Elaborate the security services in detail.
4. Explain data security, application security and virtual machine security.
CS8791 CLOUD COMPUTING
UNIT V – CASE STUDIES
Google App Engine (GAE) – GAE Architecture – Functional Modules of GAE – Amazon Web Services
(AWS) – GAE Applications – Cloud Software Environments – Eucalyptus – Open Nebula – Open Stack.
PART – A (2 Marks)
1. Write a short note on Google App Engine.
• Google AppEngine is a PaaS implementation that provides services for developing and
hosting scalable Web applications.
• AppEngine is essentially a distributed and scalable runtime environment.
• Developers can develop applications in Java, Python, and Go.
2. List the technologies used by GAE.
• Google File System (GFS): For storing large amounts of data.
• MapReduce: For application program development and performing computation.
• Chubby: For distributed application lock services.
• BigTable: Offers a storage service.
3. Write a short note on BigTable.
• It provides a service for storing and retrieving structured and semistructured data.
• BigTable applications include storage of web pages, per-user data, and geographic
locations.
• The database needs to support very high read/write rates and the scale might be millions
of operations per second.
• A single value in each row is indexed; this value is known as the row key.
4. List the application services provided by GAE.
• UrlFetch,
• MemCache,
• Mail and Instant Messaging
• Account management
• Image Manipulation.
5. Write a short note on AWS.
• Amazon Web Services (AWS) is a platform that allows the development of flexible
applications.
• It provides solutions for elastic infrastructure scalability, messaging, and data storage.
• The platform is accessible through SOAP or RESTful Web service interfaces.
• It offers a variety cloud services, most notably:
o S3: Amazon Simple Storage Service (storage)
o EC2: Elastic Compute Cloud (virtual servers)
o Cloudfront (content delivery)
o Cloudfront Streaming (video streaming)
o SimpleDB (structured datastore)
o RDS (Relational Database)
o SQS (reliable messaging)
o Elastic MapReduce (data processing)
o Amazon Virtual Private Cloud (Communication Network)
6. What is Eucalyptus? and list its components.
• Eucalyptus is an open-source software platform for implementing Infrastructure as a
Service (IaaS) in a private or hybrid cloud computing environment.
• Components of Eucalyptus are
o Cloud Controller: Front end for the entire ecosystem
o Walrus: A simple file storage system
o Cluster Controller: Manages the one or more Node controller
o Storage Controller: Provides persistent block storage. Allows the creation of
snapshots of volumes
o VMWare BrokerNode Controller: Maintains the life cycle of the instances
running on each node.
7. What is OpenNebula? and list its components.
• It is an open-source cloud middleware solution that manages heterogeneous distributed
data center infrastructures serves as Infrastructure as a Service.
• The two primary uses of the OpenNebula platform are data center virtualization
solutions and cloud infrastructure solutions.
• OpenNebula has
o Front-End (Master Node): Executes the OpenNebula services.
o Hypervisor Enabled Hosts (Worker Nodes): Provides the resources needed by
the VMs.
o Datastores: Hold the base images of the VMs.
o A Physical Network: Used to support basic services such as interconnection of the
storage servers and OpenNebula control operations, and VLANs for the VMs.
8. State the features of OpenNebula
• Interoperability
• Security
• Integration with third party tools
• Scalability
• Flexibility
9. Write a short note on OpenStack.
• OpenStack is a free and open-source software platform for cloud computing, mostly
deployed as infrastructure-as-a-service (IaaS), whereby virtual servers and other
resources are made available to customers.
• OpenStack software controls large pools of compute, storage, and networking
resources throughout a datacenter, managed through a dashboard or via the OpenStack
API.
10. List the components of OpenStack.
Seven core components of OpenStack are:
• Nova (Compute)
• Glance (Image Service)
• Swift (Object Storage)
• Horizon (Dashboard)
• Keystone (Identity Service)
• Neutron (Networking)
• Cinder (Block Storage)
PART – B
1. Illustrate Google App Engine (GAE) architecture in detail.
2. Explain in detail about the functional modules of GAE.
3. Elaborate the services provided by Amazon Web Services (AWS).
4. Elucidate the architecture of Eucalyptus and its components.
5. Illustrate the OpenNebula architecture and its components.
6. Explain the architecture and components of OpenStack.

More Related Content

What's hot

System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computingpurplesea
 
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Majid Hajibaba
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Load balancing in cloud
Load balancing in cloudLoad balancing in cloud
Load balancing in cloudSouvik Maji
 
Cloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesCloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesThoughtWorks Studios
 
Cloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computingCloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computinghrmalik20
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud computing 8 cloud service models
Cloud computing 8 cloud service modelsCloud computing 8 cloud service models
Cloud computing 8 cloud service modelsVaibhav Khanna
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxkumari36
 
Web servers for the Internet of Things
Web servers for the Internet of ThingsWeb servers for the Internet of Things
Web servers for the Internet of ThingsAlexandru Radovici
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Unit 4
Unit 4Unit 4
Unit 4
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
 
On demand provisioning
On demand provisioningOn demand provisioning
On demand provisioning
 
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Load balancing in cloud
Load balancing in cloudLoad balancing in cloud
Load balancing in cloud
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Cloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesCloud Computing - Benefits and Challenges
Cloud Computing - Benefits and Challenges
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
Cloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computingCloud computing system models for distributed and cloud computing
Cloud computing system models for distributed and cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud computing 8 cloud service models
Cloud computing 8 cloud service modelsCloud computing 8 cloud service models
Cloud computing 8 cloud service models
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 
Web servers for the Internet of Things
Web servers for the Internet of ThingsWeb servers for the Internet of Things
Web servers for the Internet of Things
 

Similar to OIT552 Cloud Computing - Question Bank

A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingShahzad
 
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdfPPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdfVineet446350
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputingsree raj
 
9-cloud-computing.pdf
9-cloud-computing.pdf9-cloud-computing.pdf
9-cloud-computing.pdfErvisTema1
 
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838e
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838eCC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838e
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838eRamzanShareefPrivate
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfkhan593595
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfkhan593595
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised PresentationMayank Aggarwal
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxgarkhot123
 
02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introductionAslamHossain30
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Materialpkaviya
 

Similar to OIT552 Cloud Computing - Question Bank (20)

Cloud Computing - Introduction
Cloud Computing - IntroductionCloud Computing - Introduction
Cloud Computing - Introduction
 
A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computing
 
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdfPPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
 
Cloud+Computing-1.pptx
Cloud+Computing-1.pptxCloud+Computing-1.pptx
Cloud+Computing-1.pptx
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
UNIT 1.pdf
UNIT 1.pdfUNIT 1.pdf
UNIT 1.pdf
 
9-cloud-computing.pdf
9-cloud-computing.pdf9-cloud-computing.pdf
9-cloud-computing.pdf
 
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838e
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838eCC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838e
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838e
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Dbms
DbmsDbms
Dbms
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdf
 
CloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdfCloudComputing_UNIT 3.pdf
CloudComputing_UNIT 3.pdf
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
 
Cloud.pptx
Cloud.pptxCloud.pptx
Cloud.pptx
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
 
02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
 
2_Virtualization.pptx
2_Virtualization.pptx2_Virtualization.pptx
2_Virtualization.pptx
 

More from pkaviya

IT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database ConnectivityIT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database Connectivitypkaviya
 
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfIT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfpkaviya
 
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and ScriptingIT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and Scriptingpkaviya
 
IT2255 Web Essentials - Unit II Web Designing
IT2255 Web Essentials - Unit II  Web DesigningIT2255 Web Essentials - Unit II  Web Designing
IT2255 Web Essentials - Unit II Web Designingpkaviya
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basicspkaviya
 
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfBT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfpkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III pkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IICS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IIpkaviya
 
CS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT ICS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT Ipkaviya
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT Vpkaviya
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVpkaviya
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIIpkaviya
 
CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II pkaviya
 
CS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit ICS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit Ipkaviya
 
IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V pkaviya
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV pkaviya
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit IIIpkaviya
 
IT8602 Mobile Communication Unit II
IT8602 Mobile Communication   Unit II IT8602 Mobile Communication   Unit II
IT8602 Mobile Communication Unit II pkaviya
 

More from pkaviya (20)

IT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database ConnectivityIT2255 Web Essentials - Unit V Servlets and Database Connectivity
IT2255 Web Essentials - Unit V Servlets and Database Connectivity
 
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdfIT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
IT2255 Web Essentials - Unit IV Server-Side Processing and Scripting - PHP.pdf
 
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and ScriptingIT2255 Web Essentials - Unit III Client-Side Processing and Scripting
IT2255 Web Essentials - Unit III Client-Side Processing and Scripting
 
IT2255 Web Essentials - Unit II Web Designing
IT2255 Web Essentials - Unit II  Web DesigningIT2255 Web Essentials - Unit II  Web Designing
IT2255 Web Essentials - Unit II Web Designing
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfBT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdf
 
CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V CS8592 Object Oriented Analysis & Design - UNIT V
CS8592 Object Oriented Analysis & Design - UNIT V
 
CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV CS8592 Object Oriented Analysis & Design - UNIT IV
CS8592 Object Oriented Analysis & Design - UNIT IV
 
CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III CS8592 Object Oriented Analysis & Design - UNIT III
CS8592 Object Oriented Analysis & Design - UNIT III
 
CS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IICS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT II
 
CS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT ICS8592 Object Oriented Analysis & Design - UNIT I
CS8592 Object Oriented Analysis & Design - UNIT I
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT V
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IV
 
CS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit IIICS8591 Computer Networks - Unit III
CS8591 Computer Networks - Unit III
 
CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II
 
CS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit ICS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit I
 
IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V
 
IT8602 - Mobile Communication Unit IV
IT8602 - Mobile Communication   Unit IV IT8602 - Mobile Communication   Unit IV
IT8602 - Mobile Communication Unit IV
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
IT8602 Mobile Communication Unit II
IT8602 Mobile Communication   Unit II IT8602 Mobile Communication   Unit II
IT8602 Mobile Communication Unit II
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

OIT552 Cloud Computing - Question Bank

  • 1. OIT552 Cloud Computing Question Bank Prepared By Kaviya.P Assistant Professor / Information Technology Kamaraj College of Engineering & Technology (Autonomous)
  • 2. OIT552 CLOUD COMPUTING UNIT I – INTRODUCTION TO CLOUD COMPUTING Introduction to Cloud Computing – Roots of Cloud Computing – Desired Features of Cloud Computing – Challenges and Risks – Benefits and Disadvantages of Cloud Computing. PART – A (2 Marks) 1. Define cloud computing. (Buyya) A Cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers. They are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers. 2. Define cloud computing. (NIST) “The National Institute of Standards and Technology (NIST) defines cloud computing as a "pay-per-use model for enabling available, convenient and on- demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction." 3. What are the convergences of various advances leading to the advent of cloud computing?
  • 3. 4. What is Service Oriented Architecture (SOA)? Describe, compose, and orchestrate services,package, and transport messages between services, publish and discover services, represent quality of service (QoS) parameters, and ensure security in service access. 5. Define the term Web Services. • Prominent technology for implementing SOA systems and applications. • They leverage Internet technologies and standards for building distributed systems. Based on well-known and vendor-independent standards such as HTTP, SOAP, and WSDL. 6. What are the advantages and disadvantages of distributed computing? Advantages • Extensibility and Incremental Growth • Economics • Speed • Inherent distribution of applications and Reliability Disadvantages: • Complexity • Network Problem • Security 7. What are the desirable features of Cloud? • On-Demand Self-service • Per-usage metering and billing (Measured service) • Rapid Elasticity • Resource Pooling • Broad Network Access 8. List down the types of clouds based on deployment models. • Public / Internet Clouds • Private / Enterprise Cloud • Hybrid / Mixed Cloud • Community
  • 4. 9. Differentiate private and public cloud. Private Cloud Public Cloud It is hosted at Service Provider site. It is hosted at Service Provider site or enterprise It is connected to the public internet It only supports connectivity over the private network. Scalability is very high, and reliability is moderate. Scalability is limited, and reliability is very high. Example: Amazon VPC and Azure Private Cloud Example: Amazon Web Services (AWS), Google App Engine 10. What are cloud service models? The three main categories of cloud service models: Infrastructure as a Service (IaaS): The delivery of technology infrastructure (mostly hardware) as an on demand, scalable service. Example: Amazon EC2 Platform as a Service (PaaS): A complete development and deployment environment in the cloud, with resources that enable the user to develop and run their applications Software as a Service (SaaS): SaaS is a licensed software offering on the cloud and pay per use. Example: Google Docs 11. Write a short note on community cloud. Community cloud is a cloud infrastructure that allows systems and services to be accessible by a group of several organizations to share the information. Example: Our government organization within India may share computing infrastructure in the cloud to manage data. 12. List the advantages and disadvantages of cloud computing. Advantages • No upfront commitment • Cost efficiency • On Demand Self-service • Disaster Recovery • Excellent accessibility • Scalability • Flexibility Disadvantages: • Downtime • Security • Vendor Lock-In • Limited Control • Legal Issues
  • 5. 13. Define parallel computing. Parallel computing is a type of computing architecture in which several processors simultaneously execute multiple, smaller calculations broken down from an overall larger, complex problem. The term parallel computing refers to a model in which the computation is divided among several processors sharing the same memory. 14. Define distributed computing. • The term distributed computing encompasses any architecture or system that allows the computation to be broken down into topics and executed concurrently on different computing elements, whether these are processors on different nodes, processors on the same computer, or cores within the same processor. • In Distributed Computing the processors communicate with one another through communication lines such as high-speed buses or telephone lines • Each processor has its own local Memory • Examples: ATM, Internet, Intranet /Workgroups. 15. Define cluster computing Cluster Computing is a type of parallel or distributed computer system consists of a collection of inter-connected stand-alone computers working together as a single integrated computing resource. Types of Clusters • High Availability or Failover clusters • Load Balancing Clusters • Parallel / Distributed Processing Clusters. 16. Differentiate parallel computing vs. distributed computing Parallel Computing Distributed Computing Many operations are performed simultaneously System components are located at different locations Single computer is required Uses multiple computers Multiple processors perform multiple operation Multiple computers perform multiple operations It may have shared or distributed memory It has only distributed memory
  • 6. 17. Differentiate grid and cloud computing. Grid Computing Cloud Computing Cloud computing is a centralized executive. Grid computing is a decentralized executive. In cloud computing, resources are used in centralized pattern. In grid computing, resources are used in collaborative pattern. Cloud computing is a high accessible service. Grid computing is a low accessible service. It is highly scalable as compared to grid computing. Grid computing is low scalable in comparison to cloud computing. 18. What is “elasticity” in cloud computing? • Elasticity is defined as the ability of a system to add and remove resources (such as CPU cores, memory, VM and container instances) to adapt to the load variation in real time. • Elasticity is a dynamic property for cloud computing. • Elasticity is the degree to which a system is able to adapt to workload changes by provisioning and deprovisioning resources in an autonomic manner. Elasticity = Scalability + Automation + Optimization 19. List the applications of cloud computing. • Scientific / Technical Applications • Business Applications • Consumer / Social Applications • Art • Data storage and back-up • Education • Entertainment • Management 20. List the challenges and risks associated with cloud computing. • Security, Privacy and Trust • Data Lock-in and Standardization • Availability, Fault-Tolerance and Disaster Recovery • Resource Management and Energy Efficiency
  • 7. PART – B 1. Explain in detail about evolution of cloud computing. 2. Explain the characteristics/desired features of cloud computing with suitable examples. 3. Elaborate the pros and cons of cloud computing. 4. Explain the challenges and risks associated with cloud computing.
  • 8. OIT552 CLOUD COMPUTING UNIT II – VIRTUALIZATION Introduction to Virtualization Technology – Load Balancing and Virtualization – Understanding Hypervisor – Seven Layers of Virtualization – Types of Virtualization – Server, Desktop, Application Virtualization. PART – A (2 Marks) 1. What is virtualization in cloud computing? (or) Give the role of VM. • Virtualization is a computer architecture technology by which multiple virtual machines (VMs) are multiplexed in the same hardware machine. • The purpose of a VM is to enhance resource sharing by many users and improve computer performance in terms of resource utilization and application flexibility. • Hardware resources such as CPU, memory, I/O devices, or software resources such as OS, software libraries can be virtualized. 2. Give the basic operation of VM. • Multiplexing: VMs can be multiplexed between hardware machines. • Suspension: VM can be suspended and stored in stable storage. • Provision (Resume): A suspended VM can be resumed or provisioned to a new hardware platform. • Migration: A VM can be migrated from one hardware platform to another. 3. Define Virtual Machine Monitor (VMM). • Hardware-level virtualization inserts a layer between real hardware and traditional operating systems. • This layer is commonly called the Virtual Machine Monitor (VMM) and it manages the hardware resources of a computing system. • Each time programs access the hardware the VMM captures the process • Three requirements for a VMM: o VMM should provide an environment identical to the original machine. o Programs run in this environment should show, only minor decreases in speed. o VMM should be in complete control of the system resources.
  • 9. 4. List the implementation levels of virtualization. • Application level • Library Support level • Operating System level • Hardware Abstraction layer level • Instruction Set Architecture level 5. State the merits of virtualization at various levels. 6. Write a short note on Xen hypervisor. • Hypervisor supports hardware-level virtualization on bare metal devices such as CPU, memory, disk, and network interfaces. • Hypervisor sits directly between physical hardware and its OS. • Xen is a microkernel hypervisor, which separates the policy from the mechanism. • It implements all the mechanisms, leaving the policy to be handled by Domain 0. • Xen does not include any device drivers natively. 7. What is binary translation in virtualization? • Binary translation is one specific approach to implementing full virtualization that does not require hardware virtualization features. • It involves examining the executable code of the virtual guest for "unsafe" instructions, translating these into "safe" equivalents, and then executing the translated code. • Alternatives to binary translation are binary patching, and full system emulation.
  • 10. 8. State the advantages and disadvantages of virtualization. (or) “Although virtualization is widely accepted today, it does have its limits”. Comment on the statement. Advantages: • Utilization of hardware efficiently • Availability increases with Virtualization • Disaster recovery is efficient and easy • Virtualization saves energy • Cloud migration becomes easy Disadvantages: • Data can be at risk • Learning new infrastructure • High initial investment 9. Differentiate full virtualization vs para virtualization. S.No. Full Virtualization Paravirtualization 1. In Full virtualization, virtual machine permits the execution of the instructions with running of unmodified OS in an entire isolated way. In paravirtualization, virtual machine does not implement full isolation of OS but rather provides a different API which is utilized when OS is subjected to alteration. 2. Full Virtualization is less secure. Paravirtualization is more secure than the Full Virtualization. 3. Full Virtualization uses binary translation and direct approach as a technique for operations. While Paravirtualization uses hypercalls at compile time for operations. 4. Full Virtualization is slow than paravirtualization in operation. Paravirtualization is faster in operation as compared to full virtualization. 5. Full Virtualization is more portable and compatible. Paravirtualization is less portable and compatible. 6. Example: Microsoft and Parallels systems Example: VMware and Xen.
  • 11. 10. List the classes of Virtual Machine (VM) architecture. • Hypervisor Architecture • Paravirtualization • Host-based virtualization 11. Differentiate critical and non-critical instructions. Critical Instruction Non-Critical Instruction The instructions that can run only in kernel mode are called critical instruction. The instructions that can run only in user mode are called non-critical instruction. Example: Content Switching, Clear the memory Example: Generate any trap instruction 12. List the categories of critical instructions. Critical instructions are divided into three categories: • Privileged instructions: Execute in a privileged mode and will be trapped if executed outside this mode. • Control Sensitive Instructions: Attempt to change the configuration of resources used. • Behaviour- Sensitive Instructions: Load and store operations over the virtual memory. 13. What is need of load balancing in cloud? • The workload on servers is increasing rapidly, so servers may easily be overloaded, especially servers for a popular web site. • Cloud load balancing is the process of distributing workloads across multiple computing resources. • Cloud load balancing is defined as the method of splitting workloads and computing resources in a cloud computing. 14. List algorithms used to balance the load in cloud. • Round Robin • Weighted Round Robin • Least Connection • Source IP Hash • Global Server Load Balancing
  • 12. 15. Write a short note on server virtualization. • Server virtualization is the process of using software on a physical server to create multiple partitions or "virtual instances" each capable of running independently. • Uses of server virtualization are: o To centralize the server administration o Improve the availability of server o Helps in disaster recovery o Ease in development & testing o Make efficient use of server resources. 16. What is desktop virtualization? • Desktop virtualization makes accessible a different system as though it were natively installed on the host, but this system is remotely stored on a different host and accessed through a network connection. • Desktop virtualization addresses the problem of making the same desktop environment accessible from everywhere. • The basic services for remotely accessing a desktop environment are implemented in software components such as Windows Remote Services, VNC, and X Server. 17. Write a short note on application virtualization. • It is a technique allowing applications to be run in runtime environments that do not natively support all the features required by such applications. • In this scenario, applications are not installed in the expected runtime environment but are run as though they were. PART – B 1. Explain how virtualization is implemented in different layers. (or) Explain various levels of virtualization implementation. 2. What is virtualization? Describe para and full virtualization architectures. Compare and contrast them. 3. Explain in detail about load balancing in virtualization.
  • 13. OIT552 CLOUD COMPUTING UNIT III – CLOUD ARCHITECTURE, SERVICES AND STORAGE NIST Cloud Computing Reference Architecture – Public, Private and Hybrid Clouds - IaaS – PaaS – SaaS – Architectural Design Challenges – Cloud Storage. PART – A (2 Marks) 1. List the actors in cloud computing. The five major participating actors in cloud computing are • Cloud Consumer • Cloud Provider • Cloud Broker • Cloud Auditor • Cloud Carrier 2. State the role of cloud auditor. A cloud auditor is a party that can perform an independent examination of cloud service controls with the intent to express an opinion thereon. A cloud auditor can evaluate the services provided by a cloud provider in terms of security controls, privacy impact, performance, etc. 3. What is the responsibility of cloud broker? Cloud Broker is an entity that manages the use, performance, and delivery of cloud services, and negotiates relationships between cloud providers and cloud consumers. As cloud computing evolves, the integration of cloud services may be too complex for cloud consumers to manage alone. 4. Mention the characteristic features of cloud. • On-demand self-service • Broad network access • Multi-tenancy and resource pooling • Rapid elasticity and
  • 14. • scalability • Measured service 5. Differentiate PaaS, SaaS and IaaS Cloud Players IaaS PaaS SaaS IT administrators / cloud providers Monitor SLAs Monitor SLAs and enable service platforms Monitor SLAs and deploy software Software developers To deploy and store data Enabling platforms via configurators and APIs Develop and deploy software End users or business users To deploy and store data To develop and test web software Use business software Example Amazon EC2 Google App Engine Google Apps like Gmail, Google Docs, etc 6. Differentiate private cloud and public cloud. Private Cloud Public Cloud Single Tenancy Multi-Tenancy It only supports connectivity over the private network. It is connected to the public internet Scalability is limited, and reliability is very high. Scalability is very high, and reliability is moderate. Dedicated Servers Shared Servers Eg: Microsoft KVM, HP, RedHat &VMWare. Eg: Amazon Web Service (AWS) and Google App Engine. 7. Why do we need a hybrid cloud? • Hybrid cloud is a solution that combines a private cloud with one or more public cloud services, with proprietary software enabling communication between each distinct service. • Hybrid cloud allows companies to combine their own data center and/or private cloud setup with public cloud resources such as Software as a Service, or SaaS. Software
  • 15. touch points are used between the two infrastructures to help move data back and forth between them as needed. 8. Write a short note on community cloud. • A community cloud model is a collaborative effort where infrastructure is shared and jointly accessed by several organizations from a specific group that share specific computing concerns such as, security, compliance, or jurisdiction considerations. • Eg: IBM soft layer cloud 9. Who are the major players of cloud? • Amazon Web Services (AWS) • Microsoft Azure • Google Cloud • IBM Cloud • Oracle • Salesforce 10. Identify the architectural design challenges in cloud. Challenge 1: Service Availability and Data Lock-in Problem Challenge 2: Data Privacy and Security Concerns Challenge 3: Unpredictable Performance and Bottlenecks Challenge 4: Distributed Storage and Widespread Software Bugs Challenge 5: Cloud Scalability, Interoperability, and Standardization Challenge 6: Software Licensing and Reputation Sharing 11. Define cloud storage (Storage as a Service) with examples. • Cloud storage is a cloud computing model that stores data on the Internet through a cloud computing provider who manages and operates data storage as a service. • Stored data can be accessed from anywhere and in anytime over Internet. • Eg: Apple (iCloud), Amazon (Amazon Web Services), Dropbox, and Google
  • 16. 12. State the advantages and disadvantages of cloud storage. Advantages • Usability and accessibility • Security • Cost-efficient • Convenient sharing of files • Automation • Multiple users • Synchronization Disadvantages • Internet Connection • Costs • Hard drives • Support • Privacy 13. Write a short note on Amazon S3. • Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service. The service is designed for online backup and archiving of data and applications on Amazon Web Services (AWS). • Amazon S3 provides a simple web services interface that can be used to store and retrieve any amount of data, at any time, from anywhere on the web. • S3 provides the object-oriented storage service for users. • Users can access their objects through Simple Object Access Protocol (SOAP) with either browsers or other client programs which support SOAP. 14. What is Amazon EBS? • The Elastic Block Store (EBS) provides the volume block interface for saving and restoring the virtual images of EC2 instances. • The status of EC2 is saved in the EBS system after the machine is shut down. • Users can use EBS to save persistent data and mount to the running instances of EC2. • EBS allows you to create storage volumes from 1 GB to 1 TB that can be mounted as EC2 instances. 15. State the purpose of Amazon SimpleDB. • SimpleDB provides a simplified data model based on the relational database data model.
  • 17. • Structured data from users must be organized into domains. o Each domain can be considered a table. o The items are the rows in the table. • A cell in the table is recognized as the value for a specific attribute (column name) of the corresponding row. • This is like a table in a relational database and possible to assign multiple values to a single cell in the table. PART – B 1. Explain in detail about NIST Cloud Computing Reference Architecture. 2. With architecture, elaborate the various deployment models and reference models of cloud computing. 3. List the cloud deployment models and give a detailed note about them. 4. What are the pros and cons of public, private and hybrid cloud? 5. Compare and contrast the cloud deployment models. 6. Describe service and deployment models of a cloud computing environment with illustrations. How do they fit in NIST cloud architecture? 7. Describe the different working models of cloud computing. 8. Give the importance of cloud computing and elaborate the different types of services offered by it. 9. Illustrate the cloud delivery models in detail. 10. Describe Infrastructure-as-a-service (IaaS), Platform-as-a-Service (PaaS) and Software-as- a-Service (SaaS) with an example. 11. Explain in detail about architectural design challenges in cloud. 12. What is cloud storage? Elucidate Amazon cloud storage in detail.
  • 18. OIT552 CLOUD COMPUTING UNIT IV – RESOURCE MANAGEMENT AND SECURITY IN CLOUD Inter Cloud Resource Management – Resource Provisioning Methods – Security Overview – Cloud Security Challenges – Data Security –Application Security – Virtual Machine Security. PART – A (2 Marks) 1. Define Intercloud. • Intercloud is a network of cloud s that are linked with each other. This includes private, public, and hybrid clouds that come together to provide a seamless exchange of data. • Combining many different individual clouds into one seamless mass in terms of on- demand operations. 2. What are the challenges of Intercloud? • Identification: A system should be created where each cloud can be identified and accessed by another cloud, like how devices connected to the internet are identified by IP addresses. • Communication: A universal language of the cloud should be created so that they are able to verify each other’s available resources. • Payment: When one provider uses the assets of another provider, a question arises on how the second provider will be compensated, so a proper payment process should be developed. 3. What are extended cloud computing services? • Hardware as a Service (HaaS) • Network as a Service (NaaS) • Location as a Service (LaaS) • Security as a Service (SaaS) • Data as a Service (DaaS) • Communication as a Service (CaaS)
  • 19. 4. List the information available in VM template. The information available in VM template are: • The number of cores or processors to be assigned to the VM • The amount of memory the VM requires • The kernel used to boot the VM’s operating system • The disk image containing the VM’s file system • The price per hour of using a VM • The address of the physical machine hosting the VM • The VM’s network configuration 5. What is the responsibility of Virtual Infrastructure Engine (VIE)? • Users submit VMs on physical machines using different kinds of hypervisors. • VIEs (Virtual Infrastructure Engine) can create and stop VMs on a physical cluster 6. How does InterGrid Gateway (IGG) allocates resources? An InterGrid gateway (IGG) allocates resources from one organization's local cluster and interacts with another IGG that can allocate resources from a cloud computing provider. Intergrid gateway (IGG) allocates resources from a local cluster three steps: • Requesting the VMs (Resources) • Enacting (Validate) the leases • Deploying (install) the VMs as requested 7. Find the actors present in Intercloud? • Cloud Broker: An entity that manages the use, performance, and delivery of cloud services, and negotiates relationships between cloud providers and cloud consumers. • Cloud Coordinator: It evaluates the available resources • Supported services: o Application scheduling o Resource allocation o Migration of workloads • Cloud Exchange: It acts as a market maker for bringing together service producers and consumers.
  • 20. 8. What is resource provisioning in cloud? • Cloud provisioning is the allocation of a cloud provider's resources and services to a customer. • The growing catalogue of cloud services that customers can provision includes infrastructure as a service, software as a service and platform as a service, in public or private cloud environments. • Resource-provisioning methods: o Demand-driven method o Event-driven method o Popularity-Driven Resource Provisioning 9. Differentiate under-provisioning and over-provisioning. Under Provisioning Over Provisioning Allocating fewer resources than required, otherwise the service cannot serve its users with a good service. The peak load causes heavy resource waste Leads to broken SLA and penalties. Leads to resource underutilization. 10. List the types of resource provisioning methods. • Demand-Driven: Adds or removes nodes (VM) based on the current utilization level of the allocated resources. • Event-Driven: Adds or removes machine instances based on a specific time event. • Popularity-Driven: Based on Internet traffic monitored. 11. List the Gartner’s security issues in cloud. • Privileged user access • Regulatory compliance • Data location • Data segregation • Recovery • Investigative support • Long-term viability
  • 21. 12. What are the threats occurring while transferring or saving data in cloud? (or) list out the key privacy issues in cloud. • Handling of data by third party • Cyber attacks • Insider threats • Government intrusion • Legal liability • Lack of standardization • Lack of support 13. Define Man-in-Middle attack. • Information shared between two parties could be hacked by the middle (third) party. • Caused due to improper configuration of Secure Socket Layer (SSL). • A general term for when a perpetrator positions himself in a conversation between a user and an application either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway. 14. What is Cross-Site Scripting attack? • Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. • User enters the correct URL of a website, whereas on another site, hacker redirects the user to his/her website and hacks its identification. 15. List the security services offered by cloud. • Availability: Data never loss and Machine never fail • Confidentiality: Authorized to know the information • Integrity: Data has not been tampered 16. Define data integrity, confidentiality, and availability. • Data integrity: Refers to the technique for ensuring that the data is genuine, correct and protected from illegal user alteration. Mechanisms Used: Digital Signature, Hashing methods and message verification codes.
  • 22. • Confidentiality: Refers to limiting data access only to authorized users and stopping access to unauthorized ones. Mechanisms Used: Access control, Biometric, Encryption, Privacy, Ethics. • Availability: Availability of data resource. Mechanisms Used: Data backup, recovery plan. 17. How can the data security be forces in cloud? • Security need at the data level, so enterprises can be sure that their data is protected wherever it goes. • Provides compliance with Payment Card Industry Data Security Standard (PCIDSS). • Ensures data security using: o Authentication: OTP o Encryption and Decryption algorithms o Data integrity: Hashing techniques (Message Digest, SHA) 18. Define application security. • Application security is one of the critical success factors for a world-class SaaS company. • Application security processes, secure coding guidelines, training, and testing scripts and tools are typically a collaborative effort between the security and the development teams. • SaaS providers should secure their web applications by following Open Web Application Security Project (OWASP) guidelines for secure application development, by locking down ports and unnecessary commands. 19. What is Virtual Machine security? • In the cloud environment, physical servers are consolidated (combined) to multiple virtual machine instances. • Following are deployed on virtual machines to ensure security: o Firewalls o Intrusion detection and prevention o Integrity monitoring o Log inspection
  • 23. PART – B 1. Explain in detail about cloud resource provisioning methods. 2. Explain in detail about cloud security challenges. 3. Elaborate the security services in detail. 4. Explain data security, application security and virtual machine security.
  • 24. CS8791 CLOUD COMPUTING UNIT V – CASE STUDIES Google App Engine (GAE) – GAE Architecture – Functional Modules of GAE – Amazon Web Services (AWS) – GAE Applications – Cloud Software Environments – Eucalyptus – Open Nebula – Open Stack. PART – A (2 Marks) 1. Write a short note on Google App Engine. • Google AppEngine is a PaaS implementation that provides services for developing and hosting scalable Web applications. • AppEngine is essentially a distributed and scalable runtime environment. • Developers can develop applications in Java, Python, and Go. 2. List the technologies used by GAE. • Google File System (GFS): For storing large amounts of data. • MapReduce: For application program development and performing computation. • Chubby: For distributed application lock services. • BigTable: Offers a storage service. 3. Write a short note on BigTable. • It provides a service for storing and retrieving structured and semistructured data. • BigTable applications include storage of web pages, per-user data, and geographic locations. • The database needs to support very high read/write rates and the scale might be millions of operations per second. • A single value in each row is indexed; this value is known as the row key. 4. List the application services provided by GAE. • UrlFetch, • MemCache, • Mail and Instant Messaging • Account management • Image Manipulation.
  • 25. 5. Write a short note on AWS. • Amazon Web Services (AWS) is a platform that allows the development of flexible applications. • It provides solutions for elastic infrastructure scalability, messaging, and data storage. • The platform is accessible through SOAP or RESTful Web service interfaces. • It offers a variety cloud services, most notably: o S3: Amazon Simple Storage Service (storage) o EC2: Elastic Compute Cloud (virtual servers) o Cloudfront (content delivery) o Cloudfront Streaming (video streaming) o SimpleDB (structured datastore) o RDS (Relational Database) o SQS (reliable messaging) o Elastic MapReduce (data processing) o Amazon Virtual Private Cloud (Communication Network) 6. What is Eucalyptus? and list its components. • Eucalyptus is an open-source software platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment. • Components of Eucalyptus are o Cloud Controller: Front end for the entire ecosystem o Walrus: A simple file storage system o Cluster Controller: Manages the one or more Node controller o Storage Controller: Provides persistent block storage. Allows the creation of snapshots of volumes o VMWare BrokerNode Controller: Maintains the life cycle of the instances running on each node. 7. What is OpenNebula? and list its components. • It is an open-source cloud middleware solution that manages heterogeneous distributed data center infrastructures serves as Infrastructure as a Service. • The two primary uses of the OpenNebula platform are data center virtualization solutions and cloud infrastructure solutions.
  • 26. • OpenNebula has o Front-End (Master Node): Executes the OpenNebula services. o Hypervisor Enabled Hosts (Worker Nodes): Provides the resources needed by the VMs. o Datastores: Hold the base images of the VMs. o A Physical Network: Used to support basic services such as interconnection of the storage servers and OpenNebula control operations, and VLANs for the VMs. 8. State the features of OpenNebula • Interoperability • Security • Integration with third party tools • Scalability • Flexibility 9. Write a short note on OpenStack. • OpenStack is a free and open-source software platform for cloud computing, mostly deployed as infrastructure-as-a-service (IaaS), whereby virtual servers and other resources are made available to customers. • OpenStack software controls large pools of compute, storage, and networking resources throughout a datacenter, managed through a dashboard or via the OpenStack API. 10. List the components of OpenStack. Seven core components of OpenStack are: • Nova (Compute) • Glance (Image Service) • Swift (Object Storage) • Horizon (Dashboard) • Keystone (Identity Service) • Neutron (Networking) • Cinder (Block Storage)
  • 27. PART – B 1. Illustrate Google App Engine (GAE) architecture in detail. 2. Explain in detail about the functional modules of GAE. 3. Elaborate the services provided by Amazon Web Services (AWS). 4. Elucidate the architecture of Eucalyptus and its components. 5. Illustrate the OpenNebula architecture and its components. 6. Explain the architecture and components of OpenStack.