SECTION A
a. Compare parallel computing and distributed computing.
Parallel computing involves the simultaneous execution of tasks split into smaller sub-tasks,
processed concurrently on multiple processors within a single system. Distributed computing, on
the other hand, refers to a system where multiple computers communicate over a network to
achieve a common goal. The main difference lies in their architecture: parallel computing is
centralized, while distributed computing is decentralized.
b. List the characteristics of cloud computing.
1. On-Demand Self-Service: Users can provision resources without human interaction.
2. Broad Network Access: Services are accessible over the internet from any device.
3. Resource Pooling: Resources are shared among multiple users.
4. Rapid Elasticity: Resources can be scaled up or down based on demand.
5. Measured Service: Usage is monitored and billed according to consumption.
c. Define disaster recovery.
Disaster recovery is the process of restoring IT systems and data after a disaster or disruption. It
involves strategies and tools to ensure business continuity and minimal downtime.
d. List types of virtualizations.
1. Hardware Virtualization
2. Operating System Virtualization
3. Storage Virtualization
4. Network Virtualization
5. Application Virtualization
6. Desktop Virtualization
e. Define community cloud with example.
A community cloud is a cloud infrastructure shared by organizations with common concerns,
such as security or compliance requirements. Example: Universities sharing a cloud for
research collaboration.
f. List the types of services provided by cloud.
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
4. Function as a Service (FaaS)
g. Define VM security.
VM security refers to the measures taken to protect virtual machines from threats, ensuring data
integrity, confidentiality, and availability. It includes techniques like access controls, encryption,
and regular updates.
h. List the security threats in cloud computing.
1. Data Breaches
2. Insecure Interfaces and APIs
3. Account Hijacking
4. Insider Threats
5. Data Loss
6. Denial of Service (DoS) Attacks
i. List four levels of Federation.
1. Infrastructure Federation
2. Service Federation
3. Data Federation
4. Security Federation
j. Define virtual box.
VirtualBox is an open-source virtualization software that allows users to run multiple operating
systems on a single physical machine by creating virtual environments.
SECTION B
a. Define the need of cloud computing and explain its evolution with suitable diagram.
Cloud computing is needed to provide scalable, cost-effective, and flexible IT solutions that
reduce infrastructure costs and improve accessibility. Its evolution includes:
1. Mainframe Computing: Centralized computing.
2. Client-Server Computing: Decentralized access.
3. Grid Computing: Resource sharing across systems.
4. Cloud Computing: On-demand access to resources over the internet.
(Insert diagram illustrating this evolution)
b. Describe the different techniques used for implementation of Hardware virtualization.
Explain them with diagram.
1. Full Virtualization: Simulates entire hardware to allow multiple OS to run independently.
Example: VMware.
2. Para-Virtualization: Requires modification of the guest OS to communicate with the
hypervisor.
Example: Xen.
3. Hardware-Assisted Virtualization: Uses CPU features to improve virtualization
efficiency.
Example: Intel VT-x, AMD-V.
(Insert diagrams for each technique)
c. Explain the major goal of NIST. Also explain the different layers in cloud computing.
NIST’s goal is to provide a clear framework for cloud computing to ensure security,
interoperability, and portability. The layers include:
1. Infrastructure Layer: Physical hardware and virtualization.
2. Platform Layer: Middleware and development tools.
3. Application Layer: End-user applications and services.
4. Data center layer
5.
d. Explain resource provisioning and resource provisioning methods.
Resource provisioning is the process of allocating resources to applications as needed.
Methods include:
Importance of Cloud Provisioning:
1. Scalability: Being able to actively scale up and down with flux in demand for resources is one of the
major points of cloud computing
2. Speed: Users can quickly spin up multiple machines as per their usage without the need for an IT
Administrator
3. Savings: Pay as you go model allows for enormous cost savings for users, it is facilitated by
provisioning or removing resources according to the demand.
METHODS
Static Provisioning: Resources are pre-allocated based on expected demand.
Dynamic Provisioning: Resources are allocated and scaled in real-time.
Self-Provisioning: End-users provision resources directly without administrator
intervention.
e. Explain Hadoop and its history. Also illustrate Hadoop architecture.
Hadoop is an open-source framework for processing large datasets in a distributed computing
environment. It originated from Google’s MapReduce paper in 2004. Key components of its
architecture include:
1. HDFS (Hadoop Distributed File System): Provides distributed storage.
2. MapReduce: Handles data processing. Map is utilized and in next phase Reduce is u
tilized.
3. YARN (Yet Another Resource Negotiator): Manages cluster resources.
4. Hadoop Common: Provides libraries and utilities.
(Insert Hadoop architecture diagram)
SECTION C
3a. Discuss cloud computing delivery model with advantages and disadvantages.
1. Infrastructure as a Service (IaaS):
○ Advantages: Scalability, flexibility, cost-efficiency.
○ Disadvantages: Requires technical expertise, potential security risks.
2. Platform as a Service (PaaS):
○ Advantages: Simplifies development, reduces infrastructure management.
○ Disadvantages: Limited control over underlying infrastructure, vendor lock-in.
3. Software as a Service (SaaS):
○ Advantages: Easy to use, minimal maintenance.
○ Disadvantages: Less customization, data security concerns.
3b. Describe in detail about cloud computing reference model with a neat diagram.
The cloud computing reference model defines the layers of services and technologies in a cloud
environment:
1. Infrastructure Layer: The physical and virtual resources (e.g., servers, storage, and
networks).
2. Platform Layer: Middleware, databases, and development tools for building
applications.
3. Application Layer: Software and services delivered to end-users.
(Insert diagram of the reference model)
4a. Discuss Service-oriented architecture (SOA). Also explain building block of SOAP.
SOA is a design approach where services are provided to other components over a network
using standardized communication protocols. It promotes reusability, scalability, and
interoperability.
Building Blocks of SOAP:
1. Envelope: Defines the structure of the message.
2. Header: Contains metadata and processing instructions.
3. Body: Contains the actual message content or request/response data.
4. Fault : error
4b. Explain Architectural constraints of web services.
Web services have several architectural constraints to ensure reliability and interoperability:
1. Statelessness: Each request from a client must contain all the information needed for
processing.
2. Standardized Protocols: Use of standard protocols like HTTP and SOAP.
3. Modularity: Services should be designed as independent components.
4. Interoperability: Services should work across different platforms and languages.
5a. Describe the components of Cloud Provider. Also explain the responsibility of cloud
provider for SaaS, PaaS, and IaaS.
Components of a Cloud Provider:
1. Data Centers: Physical facilities housing servers and storage.
2. Network Infrastructure: Ensures connectivity.
3. Service Management Tools: Tools for monitoring and managing services.
Responsibilities:
● SaaS: Application deployment, updates, and security.
● PaaS: Platform runtime, middleware, and scalability.
● IaaS: Provisioning and managing virtual machines, storage, and networking.
5b. Explain Amazon S3. Also describe the advantages of cloud storage.
Amazon S3 (Simple Storage Service) is an object storage service that provides scalable,
secure, and high-speed data storage.
Advantages of Cloud Storage:
1. Scalability: Easy to scale up or down based on needs.
2. Cost-Effective: Pay only for the storage used.
3. Accessibility: Access data from anywhere with an internet connection.
4. Durability: High data durability with redundancy.
6a. Explain inter cloud resource management in cloud computing.
Inter-cloud resource management involves coordinating and allocating resources across
multiple cloud providers to optimize performance, cost, and scalability. It includes:
1. Resource Allocation: Balancing workloads.
2. Interoperability: Ensuring seamless integration.
3. Monitoring and Analytics: Tracking usage and performance.
6b. Discuss security challenges and security governance in cloud computing
environment.
Security Challenges:
1. Data Breaches: Unauthorized access to sensitive data.
2. Account Hijacking: Exploiting user credentials.
3. Insecure APIs: Vulnerabilities in APIs used to interact with cloud services.
4. Denial of Service (DoS) Attacks: Preventing legitimate access to services.
Security Governance:
1. Policy Enforcement: Defining and implementing security policies.
2. Compliance: Ensuring adherence to legal and regulatory requirements.
3. Risk Management: Identifying and mitigating potential risks.
4. Auditing: Regularly reviewing security practices.
7a. Give a suitable definition of cloud federation stack and explain it in detail.
A cloud federation stack refers to the layered framework that enables multiple cloud providers to
collaborate and share resources seamlessly. It ensures interoperability, scalability, and efficient
resource utilization.
Components of Cloud Federation Stack:
1. Infrastructure Layer: Physical and virtual resources shared among federated clouds.
2. Service Layer: Services offered by federated clouds, such as compute and storage.
3. Security Layer: Policies and mechanisms ensuring secure data exchange.
4. Management Layer: Tools and processes for orchestrating resources across clouds.
7b. Explain Web services in detail. Differentiate Web services and APIs.
Web services are standardized ways of enabling communication between different software
applications over a network. They use protocols like SOAP or REST and are
platform-independent.
Key Features of Web Services:
1. Interoperability: Support for multiple programming languages and platforms.
2. Standardized Protocols: Use of XML, HTTP, and SOAP.
3. Scalability: Easily scalable for different application needs.
Differences between Web Services and APIs:
1. Definition: Web services are a subset of APIs, focusing on network-based
communication.
2. Protocol: Web services use standardized protocols like SOAP; APIs can use any
protocol.
3. Flexibility: APIs are more flexible and can be implemented without the constraints of
web services.
a. Define Threat Agents? Explain their Role in Cloud Security.
Threat agents are entities, individuals, or groups that can exploit vulnerabilities in a system to
compromise its security. These agents may include hackers, insiders, malicious software, or
even natural disasters.
Role in Cloud Security:
1. Identifying vulnerabilities in cloud infrastructure.
2. Attempting to breach data confidentiality, integrity, or availability.
3. Forcing cloud providers to implement robust security measures, such as encryption and
monitoring.
b. What are Security Services in the Cloud?
Cloud security services are measures to ensure the protection of data, applications, and
infrastructure.
1. Data Encryption: Protects data at rest and in transit.
2. Access Control: Implements user authentication and authorization.
3. Threat Monitoring: Detects potential attacks or breaches.
4. Compliance Management: Ensures adherence to legal and regulatory standards.
5. Backup and Recovery: Prevents data loss.
c. What is Encryption? Define the Types of Encryption.
Encryption is the process of converting plaintext into ciphertext to protect data from
unauthorized access.
Types of Encryption:
1. Symmetric Encryption: Uses the same key for encryption and decryption (e.g., AES).
2. Asymmetric Encryption: Uses a pair of public and private keys (e.g., RSA).
3. Hashing: Converts data into a fixed-size hash, which is irreversible (e.g., SHA-256).
d. What is Utility Computing?
Utility computing is a service provisioning model where computing resources like storage,
servers, and applications are provided on demand and billed based on usage. Examples include
Amazon EC2 and Google Cloud Platform.
e. What is IaaS, PaaS, and SaaS?
1. IaaS (Infrastructure as a Service): Provides virtualized hardware resources like storage
and networking.
Example: AWS EC2.
2. PaaS (Platform as a Service): Provides a platform for developers to build and deploy
applications.
Example: Google App Engine.
3. SaaS (Software as a Service): Delivers software over the internet.
Example: Microsoft 365.
f. What is VM Network Routing?
VM network routing involves directing network traffic between virtual machines within a cloud or
virtualization environment. It ensures communication between VMs on the same or different
networks using software-defined networking (SDN).
g. Give Some Examples of Web 2.0 Applications.
1. Social Media: Facebook, Twitter.
2. Collaborative Platforms: Wikipedia, Google Docs.
3. Video Sharing: YouTube, Vimeo.
4. E-commerce: Amazon, eBay.
h. What are IaaS, PaaS, and SaaS?
This is already answered in e above.
i. What are Security Services in the Cloud?
This is already answered in b above.
j. What are Modules of Hadoop?
1. HDFS (Hadoop Distributed File System): Manages distributed storage.
2. MapReduce: Processes and analyzes large datasets.
3. YARN (Yet Another Resource Negotiator): Manages cluster resources.
4. Hadoop Common: Provides utilities and libraries for other modules.
SECTION B
a. What is Virtual Desktop Infrastructure? Explain with Diagram.
Virtual Desktop Infrastructure (VDI) delivers desktop environments to end-users over a network
using virtual machines hosted on a central server.
● Users access their desktops remotely from any device.
● Reduces hardware costs and improves data security.
(Insert diagram of VDI architecture here.)
b. How Does Unauthorized Access Can Be Detected by the Help of Virtualization
Techniques?
1. Access Control: Virtual machines enforce strict user authentication.
2. Network Monitoring: Hypervisors monitor network traffic for anomalies.
3. Isolation: Each VM operates independently, preventing lateral movement.
4. Audit Logs: Virtualization tools log access and changes, aiding in detection.
c. Take a Suitable Example and Explain the Concept of MapReduce.
MapReduce processes large datasets in parallel.
● Map Phase: Splits input data into smaller chunks and processes them.
● Reduce Phase: Aggregates and summarizes the output from the Map phase.
Example: Counting the frequency of words in a document.
d. Explain Cloud Computing Reference Model with Diagram.
The cloud reference model includes:
1. Infrastructure Layer: Physical and virtual resources.
2. Platform Layer: Middleware, development tools.
3. Application Layer: End-user services.
(Insert diagram illustrating these layers.)
e. What is the Difference Between Cloud Computing and Distributed Computing?
1. Cloud Computing: Provides on-demand services like storage, computing, and
applications over the internet.
2. Distributed Computing: Uses a network of interconnected computers to achieve a
common goal.
SECTION C
3a. Explain Cloud Computing Security Architecture.
The architecture ensures the protection of cloud data and applications through:
1. Data Security: Encryption, access control.
2. Network Security: Firewalls, intrusion detection systems.
3. Application Security: Secure APIs, regular updates.
4. Compliance: Ensures regulatory adherence.
3b. Explain Infrastructure Virtualization and Cloud Computing Solutions with Diagram.
Infrastructure Virtualization:
● Abstracts physical hardware into virtual machines.
● Examples: VMware, Hyper-V.
Cloud Computing Solutions:
● Combines virtualization with scalability, flexibility, and resource pooling.
(Insert diagram showing the integration of virtualization in cloud solutions.)
4a. What are the Different Techniques Used for Implementation of Hardware
Virtualization? Explain in Detail.
1. Full Virtualization: Simulates complete hardware.
2. Para-Virtualization: Modifies guest OS for hypervisor interaction.
3. Hardware-Assisted Virtualization: Uses CPU features for efficiency (e.g., Intel VT-x).
4b. What is Load Balancing? What are the Advantages of Load Balancing?
Load Balancing: Distributes incoming traffic across multiple servers to ensure optimal resource
utilization.
Advantages:
1. Improves performance.
2. Ensures high availability.
3. Prevents server overload.
5a. What are the Different Security Challenges in Cloud Computing? Discuss Each in
Brief.
1. Data Breaches: Unauthorized access to sensitive data.
2. Account Hijacking: Exploiting user credentials.
3. Insecure APIs: Vulnerabilities in interfaces.
4. DoS Attacks: Preventing access to services.
5b. What is Honeypot? What are the Different Types of Honeypot?
A honeypot is a security mechanism designed to detect, deflect, or analyze potential cyber
threats.
Types:
1. Research Honeypots: Study attacker behavior.
2. Production Honeypots: Protect actual systems by luring attackers.
6a. What Do You Mean by Third-Party Cloud Services? Give Suitable Examples.
Third-party cloud services are provided by external vendors who manage the infrastructure,
platform, or software.
Examples: AWS, Microsoft Azure, Google Cloud.
6b. Explain the Major Cloud Features of Google Applications Engine.
1. Scalability: Automatically adjusts resources based on demand.
2. Supports Multiple Languages: Java, Python, Go, etc.
3. Integrated Services: Includes data storage, analytics, and machine learning.
7a. Give a Suitable Definition of Cloud Federation Stack and Explain It in Detail.
A cloud federation stack allows multiple cloud providers to collaborate and share resources
seamlessly.
Components:
1. Infrastructure Layer.
2. Service Layer.
3. Security Layer.
4. Management Layer.
7b. Write Short Notes on Any Two of the Following:
i. Hadoop: An open-source framework for distributed storage and processing of big data.
Components include HDFS, MapReduce, YARN.
ii. Microsoft Azure: A cloud platform offering IaaS, PaaS, and SaaS. Features include virtual
machines, app services, and machine learning tools.
SECTION A
(a) Compare Parallel Computing and Distributed Computing.
Aspect Parallel Computing Distributed Computing
Definition Uses multiple processors/cores in a Uses multiple systems connected
single system. via a network.
Resource Shared memory or tightly coupled. Independent systems with
Sharing distributed memory.
Scalability Limited by hardware resources. Highly scalable with additional
nodes.
Failure Less tolerant due to dependency on More tolerant due to independent
Tolerance shared resources. nodes.
Examples GPU computation, multi-core Distributed databases, Hadoop.
processors.
(b) What are the Service Models Available in Cloud Computing?
1. IaaS (Infrastructure as a Service): Provides virtualized computing resources. Example:
AWS EC2.
2. PaaS (Platform as a Service): Offers development platforms. Example: Google App
Engine.
3. SaaS (Software as a Service): Delivers software over the internet. Example: Microsoft
365.
(c) Express the Levels of Virtualization.
1. Hardware Virtualization: Abstracts physical hardware into virtual machines.
2. Operating System Virtualization: Allows multiple OS instances on a single physical
machine.
3. Application Virtualization: Enables applications to run in isolated environments.
4. Storage Virtualization: Abstracts physical storage into a unified storage system.
(d) Illustrate Web Services.
Web services are standardized methods for communication between systems over the internet
using protocols like HTTP and XML. Examples include REST and SOAP-based APIs.
Key Features:
● Platform-independent.
● Interoperable.
● Supports integration across different technologies.
(e) Differentiate Public Cloud and Private Cloud.
Aspect Public Cloud Private Cloud
Ownership Owned by third-party providers. Owned by a single organization.
Accessibilit Open to multiple users. Restricted to a specific
y organization.
Cost Pay-as-you-go model. Higher due to infrastructure costs.
Security Relatively less secure. Highly secure and controlled.
(f) List the Characteristics of SaaS.
1. Accessible via web browsers.
2. Subscription-based pricing.
3. No need for local installation.
4. Scalable and multi-tenant architecture.
5. Automatic updates and maintenance.
(g) List the Security Issues in Cloud.
1. Data breaches.
2. Insecure APIs.
3. Account hijacking.
4. Insider threats.
5. Denial of Service (DoS) attacks.
6. Data loss.
(h) Define Security Governance.
Security governance is the framework of policies, procedures, and controls designed to manage
and secure an organization's assets, ensuring compliance with laws and regulations.
(i) List the Functional Models of GAE (Google App Engine).
1. Application hosting.
2. Data storage and retrieval.
3. Task queues for asynchronous processing.
4. Monitoring and logging.
5. Automatic scaling and load balancing.
(j) What is the Use of CloudWatch in Amazon EC2?
Amazon CloudWatch monitors resources and applications running on AWS, including EC2
instances.
Uses:
1. Tracks metrics like CPU usage and network activity.
2. Sends alerts for anomalies.
3. Helps in debugging and troubleshooting.
SECTION B
(a) Describe Major Deployment Models and Services for Cloud Computing.
Deployment Models:
1. Public Cloud: Open for general public use (e.g., AWS, Azure).
2. Private Cloud: Dedicated to a single organization.
3. Hybrid Cloud: Combines public and private clouds.
4. Community Cloud: Shared by organizations with similar goals.
Services:
1. IaaS.
2. PaaS.
3. SaaS.
(b) Illustrate the Three Major Components of a Virtualized Environment.
1. Hypervisor: Manages virtual machines (e.g., VMware).
2. Virtual Machines: Instances of OS and applications.
3. Storage and Networking: Shared resources for VMs.
(Insert diagram showing hypervisor managing multiple VMs.)
(c) Diagram and Explanation of Cloud Computing Reference Architecture.
Conceptual Reference Model Layers:
1. Infrastructure: Physical and virtual resources.
2. Platform: Middleware and runtime environments.
3. Application: User-facing services.
(Insert detailed diagram.)
(d) Demand-Driven and Event-Driven Resource Provisioning
1. Demand-Driven: Allocates resources based on usage patterns.
Example: Scaling servers during high traffic.
2. Event-Driven: Responds to specific triggers or events.
Example: Auto-scaling when CPU usage exceeds a threshold.
(e) Elaborate HDFS Concepts with Suitable Illustrations.
HDFS (Hadoop Distributed File System):
● Designed for distributed storage of large datasets.
● Divides data into blocks and distributes across nodes.
● Ensures fault tolerance through replication.
(Insert diagram showing NameNode and DataNodes interaction.)
SECTION C
(3a) Cloud Computing Reference Model with Diagram.
(Refer to earlier explanation in Section B (c).)
(3b) Innovative Characteristics of Cloud Computing
1. On-demand self-service.
2. Broad network access.
3. Resource pooling.
4. Rapid elasticity.
5. Measured service.
(4a) REST Architecture Style for Distributed Systems
● REST (Representational State Transfer) uses standard HTTP methods.
● Stateless architecture ensures scalability.
● Simple and lightweight compared to SOAP.
(4b) Pros and Cons of Virtualization
Pros:
1. Reduces hardware costs.
2. Increases resource utilization.
3. Enhances scalability and flexibility.
Cons:
1. Complex management.
2. Security vulnerabilities.
3. Performance overhead.
(5a) Designing Public, Private, and Hybrid Clouds
Public Cloud: Open access, scalable, and cost-effective.
Private Cloud: Secure, controlled, and customized.
Hybrid Cloud: Combines the best of both.
(Insert diagram illustrating these models.)
(5b) Cloud Deployment Models with Neat Diagrams
(Refer to earlier explanation in Section B (a).)
(6a) Secure Software Development Life Cycle (SDLC)
● Includes phases like requirements, design, implementation, testing, and maintenance
with security integrated into each step.
(Insert diagram showing SDLC phases.)
(6b) Security Monitoring and Incident Response
● Security monitoring tracks threats in real-time.
● Incident response involves detection, analysis, and recovery from security breaches.
(7a) Google Cloud Infrastructure and GAE Architecture
● Google Cloud Infrastructure: Provides scalable and secure global infrastructure.
● GAE Architecture: Includes runtime, storage, and management services for application
hosting.
(7b) Web Services of Amazon
1. EC2 (Elastic Compute Cloud).
2. S3 (Simple Storage Service).
3. RDS (Relational Database Service).
4. Lambda (Serverless computing).
5. CloudFront (Content delivery network).
SECTION A
(a) Compare Parallel Computing and Distributed Computing.
Aspect Parallel Computing Distributed Computing
Definition Involves multiple processors or cores Involves multiple independent
within a single system working systems (nodes) connected via a
simultaneously to solve a problem. network working together to solve
tasks.
Architecture Centralized system with shared Decentralized system with
memory and processors. distributed memory.
Resource Resources (e.g., memory, CPU) are Resources are loosely coupled and
Sharing tightly coupled and shared among operate independently across
processors. nodes.
Scalability Limited scalability due to hardware Highly scalable by adding more
constraints of the system. nodes to the network.
Fault Less tolerant as failure of a shared More tolerant as independent nodes
Tolerance resource affects the entire system. can continue functioning if one fails.
Examples Multi-core processors, GPU Distributed databases, Hadoop,
computation, supercomputers. cloud computing platforms.
(b) What are the Service Models Available in Cloud Computing?
Cloud computing provides three main service models:
1. Infrastructure as a Service (IaaS):
○ Offers fundamental computing resources such as virtual machines, storage, and
networking.
○ Provides flexibility and control over the infrastructure.
○ Examples: AWS EC2, Google Compute Engine.
2. Platform as a Service (PaaS):
○ Offers a platform for developers to build, test, and deploy applications without
managing the underlying infrastructure.
○ Simplifies development and deployment.
○ Examples: Google App Engine, Microsoft Azure.
3. Software as a Service (SaaS):
○ Delivers fully functional applications over the internet.
○ Users access software without worrying about installation or maintenance.
○ Examples: Microsoft 365, Salesforce, Dropbox.
(c) Express the Levels of Virtualization.
Virtualization is categorized into multiple levels based on the abstraction layer:
1. Hardware Virtualization:
○ Virtualizes the physical hardware to create multiple virtual machines (VMs).
○ Managed by a hypervisor (e.g., VMware, Hyper-V).
2. Operating System Virtualization:
○ Allows multiple OS instances to run on a single physical machine.
○ Used in containers like Docker and LXC.
3. Application Virtualization:
○ Separates applications from the underlying OS to ensure they run in isolated
environments.
○ Examples include VMware ThinApp and Citrix XenApp.
4. Storage Virtualization:
○ Abstracts physical storage devices to create a unified storage pool.
○ Examples include SAN and NAS systems.
(d) Illustrate Web Services.
Web Services are software systems designed to support interoperable machine-to-machine
interaction over a network.
● Features:
○ Platform-independent and language-neutral.
○ Operates over standard protocols (e.g., HTTP, HTTPS).
○ Uses XML or JSON for data exchange.
● Examples of Web Services:
○ SOAP (Simple Object Access Protocol): A protocol for exchanging structured
information.
○ REST (Representational State Transfer): A lightweight, stateless architectural
style.
● Use Cases:
○ Online payment gateways, social media APIs, and weather data retrieval
services.
(e) Differentiate Public Cloud and Private Cloud.
Aspect Public Cloud Private Cloud
Ownership Owned and managed by third-party Owned and managed by a single
service providers. organization.
Accessibilit Open for use by the general public. Restricted to specific users within an
y organization.
Cost Cost-effective with pay-as-you-go Expensive due to infrastructure and
pricing. maintenance costs.
Security Offers basic security features; risk of High-level security with full control.
data breaches.
Scalability Highly scalable due to large resource Limited scalability depending on
pools. in-house resources.
Examples AWS, Microsoft Azure, Google Government clouds, enterprise private
Cloud. clouds.
(f) List the Characteristics of SaaS.
1. Web-based Access: Applications are accessible via a web browser.
2. Subscription Pricing: Pay-as-you-use model with monthly or yearly subscriptions.
3. Centralized Hosting: Hosted on a cloud server, reducing client-side installation.
4. Scalability: Accommodates growing user demands seamlessly.
5. Automatic Updates: Regular updates are handled by the provider.
6. Multi-tenancy: A single instance serves multiple users with data isolation.
(g) List the Security Issues in Cloud.
1. Data Breaches: Unauthorized access to sensitive data.
2. Insecure APIs: Vulnerable APIs can expose systems to attacks.
3. Account Hijacking: Compromising user credentials to access cloud resources.
4. Insider Threats: Malicious actions by employees or contractors.
5. Denial of Service (DoS) Attacks: Overloading cloud resources to make services
unavailable.
6. Data Loss: Accidental deletion or corruption of data.
(h) Define Security Governance.
Security governance refers to the framework of rules, practices, and policies that ensure
effective protection of an organization’s information assets.
● Purpose:
○ Align security strategies with business objectives.
○ Ensure compliance with legal and regulatory requirements.
(i) List the Functional Models of GAE (Google App Engine).
1. Application Hosting: Provides runtime environments for Python, Java, Go, etc.
2. Data Storage: Includes Datastore and Cloud SQL for structured and unstructured data.
3. Task Queues: Manages background processes asynchronously.
4. Monitoring and Logging: Tracks application performance and logs errors.
5. Auto-Scaling: Dynamically adjusts resources based on traffic.
(j) What is the Use of CloudWatch in Amazon EC2?
Amazon CloudWatch is a monitoring service for AWS resources.
Uses:
1. Performance Monitoring: Tracks metrics like CPU utilization, memory usage, and
network activity.
2. Alerts and Notifications: Sends notifications when metrics cross thresholds.
3. Resource Optimization: Helps optimize EC2 instances for cost-efficiency.
4. Log Analysis: Collects and analyzes logs for troubleshooting.
SECTION B
(a) Describe in detail about major Deployment Models and Services for Cloud Computing.
Deployment Models:
1. Public Cloud:
○ Definition: Resources are owned and operated by third-party providers and
delivered over the internet.
○ Advantages:
■ Cost-effective with pay-as-you-go pricing.
■ Highly scalable and accessible.
○ Disadvantages:
■ Less control over data security and compliance.
○ Examples: AWS, Google Cloud, Microsoft Azure.
2. Private Cloud:
○ Definition: Infrastructure is dedicated to a single organization and managed
either on-premises or by a third party.
○ Advantages:
■ Enhanced security and compliance.
■ Greater control over resources.
○ Disadvantages:
■ High implementation and maintenance costs.
○ Examples: Enterprise data centers, VMware Cloud.
3. Hybrid Cloud:
○ Definition: Combines public and private clouds, allowing data and applications to
be shared between them.
○ Advantages:
■ Flexibility to move workloads.
■ Optimized costs and performance.
○ Disadvantages:
■ Complexity in management.
○ Examples: Microsoft Azure Stack, AWS Outposts.
4. Community Cloud:
○ Definition: Shared infrastructure for a specific community or organization group.
○ Advantages:
■ Cost-sharing among participants.
■ Meets shared compliance requirements.
○ Disadvantages:
■ Limited scalability.
○ Examples: Healthcare, government collaborations.
Service Models:
● IaaS (Infrastructure as a Service): Offers virtualized hardware resources. Example:
AWS EC2.
● PaaS (Platform as a Service): Provides platforms for application development.
Example: Google App Engine.
● SaaS (Software as a Service): Delivers software applications over the internet.
Example: Salesforce.
(b) Illustrate the Three Major Components of a Virtualized Environment.
1. Hypervisor:
○ Software layer enabling virtualization by creating and managing virtual machines
(VMs).
○ Types:
■ Type 1 (Bare Metal): Runs directly on hardware. Examples: VMware
ESXi, Microsoft Hyper-V.
■ Type 2 (Hosted): Runs on a host operating system. Example: VirtualBox.
2. Virtual Machines (VMs):
○ Independent virtualized instances with their own OS and applications.
○ Share underlying physical resources.
3. Virtualized Resources:
○ Abstracted hardware components like CPUs, memory, and storage, dynamically
allocated to VMs.
○ Examples: SAN (Storage Area Network), virtual NICs.
(c) Give the Diagram of Cloud Computing Reference Architecture and Explain the
Conceptual Reference Model.
Diagram: The Cloud Computing Reference Architecture consists of layers:
● User Layer: Interface for cloud consumers (web portals, mobile apps).
● Service Layer: Provides SaaS, PaaS, and IaaS services.
● Resource Layer: Manages physical and virtual resources (storage, networking,
compute).
● Management Layer: Handles provisioning, monitoring, and scaling.
● Security Layer: Enforces security policies and ensures compliance.
Conceptual Reference Model:
● Roles: Cloud provider, cloud consumer, cloud auditor, and cloud broker.
● Functions:
○ Resource abstraction and pooling.
○ Elasticity and scalability.
○ Monitoring and metering.
○ Security and privacy enforcement.
(d) Illustrate the Following in Detail:
i. Demand-Driven Resource Provisioning:
● Definition: Allocates resources dynamically based on user demand.
● Example: AWS Auto Scaling adjusts the number of EC2 instances during peak traffic.
● Advantages:
○ Optimized resource utilization.
○ Cost savings by avoiding over-provisioning.
ii. Event-Driven Resource Provisioning:
● Definition: Allocates resources in response to specific events or triggers.
● Example: Scaling storage in response to file uploads.
● Advantages:
○ Fast response to workload changes.
○ Automation reduces manual intervention.
(e) Elaborate HDFS Concepts with Suitable Illustrations.
HDFS (Hadoop Distributed File System):
● Definition: A distributed file system designed for large-scale data storage and
processing.
● Key Components:
○ NameNode:
■ Manages metadata and directory structure.
■ Centralized control of file system operations.
○ DataNode:
■ Stores actual data blocks.
■ Sends periodic heartbeat signals to NameNode.
○ Secondary NameNode:
■ Maintains backup of NameNode metadata.
○ Block Concept:
■ Files are divided into fixed-size blocks (default 128 MB) distributed across
DataNodes.
● Advantages:
○ High fault tolerance with replication (default: 3 copies).
○ Scalability and distributed data access.
SECTION C
3 (a) Describe in Detail about Cloud Computing Reference Model with Diagram.
Reference Model Layers:
1. Hardware Layer: Physical infrastructure (servers, storage, networks).
2. Virtualization Layer: Abstraction of physical resources into virtual instances.
3. Infrastructure Layer: Virtualized resources provided as IaaS.
4. Platform Layer: Development and deployment tools (PaaS).
5. Application Layer: Cloud-hosted applications (SaaS).
6. Management Layer: Orchestrates resource allocation, monitoring, and maintenance.
7. Security Layer: Ensures data integrity, confidentiality, and compliance.
Diagram:
A typical diagram illustrates layers from hardware to applications, showing interactions between
users and the cloud.
4 (a) Discuss Service-Oriented Architecture (SOA). Also Explain the Building Blocks of
SOAP.
Service-Oriented Architecture (SOA):
● Definition: A design paradigm where services are reusable, loosely coupled, and
interoperable.
● Advantages:
○ Platform independence.
○ Scalability and flexibility.
○ Reusability of components.
Building Blocks of SOAP:
1. Envelope: Defines the structure of the message.
2. Header: Contains optional metadata.
3. Body: Carries the actual message or request.
4. Fault: Provides error-handling information.
5 (a) List and Discuss Principles for Designing Public, Private, and Hybrid Clouds.
Public Cloud:
● Focus on multi-tenancy, scalability, and cost efficiency.
● Ensure API security and compliance with global standards.
Private Cloud:
● Prioritize data security, access control, and dedicated resources.
● Enable integration with existing on-premises systems.
Hybrid Cloud:
● Design for interoperability and seamless data transfer.
● Use orchestration tools for unified management.
Would you like further expansion on specific topics or other sections?
Cloud Deployment Models
Last Updated : 03 May, 2023
Pre-Requisite: Cloud Computing
In cloud computing, we have access to a shared pool of computer resources
(servers, storage, programs, and so on) in the cloud. You simply need to
request additional resources when you require them. Getting resources up
and running quickly is a breeze thanks to the clouds. It is possible to release
resources that are no longer necessary. This method allows you to just pay
for what you use. Your cloud provider is in charge of all upkeep.
What is a Cloud Deployment Model?
Cloud Deployment Model functions as a virtual computing environment with
a deployment architecture that varies depending on the amount of data you
want to store and who has access to the infrastructure.
Types of Cloud Computing Deployment Models
The cloud deployment model identifies the specific type of cloud
environment based on ownership, scale, and access, as well as the cloud’s
nature and purpose. The location of the servers you’re utilizing and who
controls them are defined by a cloud deployment model. It specifies how
your cloud infrastructure will look, what you can change, and whether you
will be given services or will have to create everything yourself.
Relationships between the infrastructure and your users are also defined by
cloud deployment types. Different types of cloud computing deployment
models are described below.
● Public Cloud
●
● Private Cloud
●
● Hybrid Cloud
●
● Community Cloud
●
● Multi-Cloud
●
Public Cloud
The public cloud makes it possible for anybody to access systems and
services. The public cloud may be less secure as it is open to everyone. The
public cloud is one in which cloud infrastructure services are provided over
the internet to the general people or major industry groups. The
infrastructure in this cloud model is owned by the entity that delivers the
cloud services, not by the consumer. It is a type of cloud hosting that allows
customers and users to easily access systems and services. This form of
cloud computing is an excellent example of cloud hosting, in which service
providers supply services to a variety of customers. In this arrangement,
storage backup and retrieval services are given for free, as a subscription, or
on a per-user basis. For example, Google App Engine etc.
Public Cloud
Advantages of the Public Cloud Model
● Minimal Investment: Because it is a pay-per-use service, there is no
substantial upfront fee, making it excellent for enterprises that
require immediate access to resources.
● No setup cost: The entire infrastructure is fully subsidized by the
cloud service providers, thus there is no need to set up any
hardware.
● Infrastructure Management is not required: Using the public cloud
does not necessitate infrastructure management.
● No maintenance: The maintenance work is done by the service
provider (not users).
● Dynamic Scalability: To fulfill your company’s needs, on-demand
resources are accessible.
Disadvantages of the Public Cloud Model
● Less secure: Public cloud is less secure as resources are public so
there is no guarantee of high-level security.
● Low customization: It is accessed by many public so it can’t be
customized according to personal requirements.
Private Cloud
The private cloud deployment model is the exact opposite of the public cloud
deployment model. It’s a one-on-one environment for a single user
(customer). There is no need to share your hardware with anyone else. The
distinction between private and public clouds is in how you handle all of the
hardware. It is also called the “internal cloud” & it refers to the ability to
access systems and services within a given border or organization. The cloud
platform is implemented in a cloud-based secure environment that is
protected by powerful firewalls and under the supervision of an
organization’s IT department. The private cloud gives greater flexibility of
control over cloud resources.
Private Cloud
Advantages of the Private Cloud Model
● Better Control: You are the sole owner of the property. You gain
complete command over service integration, IT operations, policies,
and user behavior.
● Data Security and Privacy: It’s suitable for storing corporate
information to which only authorized staff have access. By
segmenting resources within the same infrastructure, improved
access and security can be achieved.
● Supports Legacy Systems: This approach is designed to work with
legacy systems that are unable to access the public cloud.
● Customization: Unlike a public cloud deployment, a private cloud
allows a company to tailor its solution to meet its specific needs.
Disadvantages of the Private Cloud Model
● Less scalable: Private clouds are scaled within a certain range as
there is less number of clients.
● Costly: Private clouds are more costly as they provide personalized
facilities.
Hybrid Cloud
By bridging the public and private worlds with a layer of proprietary
software, hybrid cloud computing gives the best of both worlds. With a
hybrid solution, you may host the app in a safe environment while taking
advantage of the public cloud’s cost savings. Organizations can move data
and applications between different clouds using a combination of two or
more cloud deployment methods, depending on their needs.
Hybrid Cloud
Advantages of the Hybrid Cloud Model
● Flexibility and control: Businesses with more flexibility can design
personalized solutions that meet their particular needs.
● Cost: Because public clouds provide scalability, you’ll only be
responsible for paying for the extra capacity if you require it.
● Security: Because data is properly separated, the chances of data
theft by attackers are considerably reduced.
Disadvantages of the Hybrid Cloud Model
● Difficult to manage: Hybrid clouds are difficult to manage as it is a
combination of both public and private cloud. So, it is complex.
● Slow data transmission: Data transmission in the hybrid cloud
takes place through the public cloud so latency occurs.
Community Cloud
It allows systems and services to be accessible by a group of organizations. It
is a distributed system that is created by integrating the services of different
clouds to address the specific needs of a community, industry, or business.
The infrastructure of the community could be shared between the
organization which has shared concerns or tasks. It is generally managed by
a third party or by the combination of one or more organizations in the
community.
Community Cloud
Advantages of the Community Cloud Model
● Cost Effective: It is cost-effective because the cloud is shared by
multiple organizations or communities.
● Security: Community cloud provides better security.
● Shared resources: It allows you to share resources, infrastructure,
etc. with multiple organizations.
● Collaboration and data sharing: It is suitable for both collaboration
and data sharing.
Disadvantages of the Community Cloud Model
● Limited Scalability: Community cloud is relatively less scalable as
many organizations share the same resources according to their
collaborative interests.
● Rigid in customization: As the data and resources are shared
among different organizations according to their mutual interests if
an organization wants some changes according to their needs they
cannot do so because it will have an impact on other organizations.
Multi-Cloud
We’re talking about employing multiple cloud providers at the same time
under this paradigm, as the name implies. It’s similar to the hybrid cloud
deployment approach, which combines public and private cloud resources.
Instead of merging private and public clouds, multi-cloud uses many public
clouds. Although public cloud providers provide numerous tools to improve
the reliability of their services, mishaps still occur. It’s quite rare that two
distinct clouds would have an incident at the same moment. As a result,
multi-cloud deployment improves the high availability of your services even
more.
Multi-Cloud
Advantages of the Multi-Cloud Model
● You can mix and match the best features of each cloud provider’s
services to suit the demands of your apps, workloads, and business
by choosing different cloud providers.
● Reduced Latency: To reduce latency and improve user experience,
you can choose cloud regions and zones that are close to your
clients.
● High availability of service: It’s quite rare that two distinct clouds
would have an incident at the same moment. So, the multi-cloud
deployment improves the high availability of your services.
Disadvantages of the Multi-Cloud Model
● Complex: The combination of many clouds makes the system
complex and bottlenecks may occur.
● Security issue: Due to the complex structure, there may be
loopholes to which a hacker can take advantage hence, makes the
data insecure.
What is the Right Choice for Cloud Deployment Model?
As of now, no such approach fits picking a cloud deployment model. We will
always consider the best cloud deployment model as per our requirements.
Here are some factors which should be considered before choosing the best
deployment model.
● Cost: Cost is an important factor for the cloud deployment model as
it tells how much amount you want to pay for these things.
● Scalability: Scalability tells about the current activity status and how
much we can scale it.
● Easy to use: It tells how much your resources are trained and how
easily can you manage these models.
● Compliance: Compliance tells about the laws and regulations which
impact the implementation of the model.
● Privacy: Privacy tells about what data you gather for the model.
●