0% found this document useful (0 votes)
175 views8 pages

21CS72 Solutions

Uploaded by

sandeeprasinti07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views8 pages

21CS72 Solutions

Uploaded by

sandeeprasinti07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

21CS72 21CS72

Model Question Paper-1 with effect from 2021 (CBCS Scheme) applications over the internet on a subscription basis. Users can access these
applications from anywhere, eliminating the need for installation and maintenance on
USN local devices.

Seventh Semester B.E. Degree Examination The reference model also emphasizes the importance of dynamic provisioning, which
Subject Title Cloud Computing allows for the rapid allocation and release of resources based on user demand. This
utility-oriented approach means that users typically pay for what they use, similar to
TIME: 03 Hours Max. Marks: 100 how utilities like water or electricity are billed.

Note: 01. Answer any FIVE full questions, choosing at least ONE question from each MODULE.
b Explain the differences between public, private and hybrid cloud deployment models.
1, 7
2
Public, private, and hybrid cloud deployment models each serve different needs and use
Module -1 CO Ma cases in the realm of cloud computing. Here’s a detailed breakdown of each model:
Download s rks
Q.01 a Explain the cloud computing reference model with a neat diagram.
1, 7
2
The cloud computing reference model is a framework that categorizes the various
services and technologies associated with cloud computing. It highlights the capability
of cloud computing to deliver a diverse range of IT services on demand, which can lead
to different perceptions of what cloud computing entails among users. Despite these
varying interpretations, the model classifies cloud computing services into three
primary categories:

1. Public Clouds :
- Definition : Public clouds are owned and operated by third-party service providers
who deliver their computing resources over the internet. These resources include
virtualized data centers, storage, and applications.
- Accessibility : They are available to anyone who wants to purchase or subscribe to
the services, making them highly scalable and cost-effective.
1. Infrastructure-as-a-Service (IaaS) : This is the foundational layer of the cloud - Use Cases : Ideal for small to medium-sized businesses or startups that need to
computing stack, providing virtualized hardware resources such as servers, storage, and quickly access IT resources without the overhead of managing physical infrastructure.
networking. Users can rent these resources on demand, allowing for flexibility and Users can leverage compute, storage, and application services without significant
scalability without the need for significant capital investment in physical infrastructure. upfront investment.

2. Platform-as-a-Service (PaaS) : This layer offers a platform allowing developers to 2. Private Clouds :
build, deploy, and manage applications without worrying about the underlying - Definition : Private clouds are dedicated environments that are exclusively used by
infrastructure. It provides tools and services that facilitate the development process, a single organization. They can be hosted on-premises within the organization’s own
making it easier to create scalable applications. data center or managed by a third-party provider.
- Security and Control : This model offers enhanced security and privacy, making it
3. Software-as-a-Service (SaaS) : At the top of the stack, SaaS delivers software suitable for organizations with strict regulatory requirements, such as government
JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL
OR GROUP OR GROUP

21CS72 21CS72
agencies and financial institutions. provider. This allows businesses to focus on their core activities rather than IT
- Use Cases : Organizations that need to keep sensitive data in-house or require high management.
levels of customization and control over their IT resources often opt for private clouds.
- Increased Agility : Organizations can quickly adapt their IT resources to meet changing
3. Hybrid Clouds : business needs without the constraints of capital expenditures for hardware and software.
- Definition : Hybrid clouds combine elements of both public and private clouds,
allowing data and applications to be shared between them. This model enables - Ease of Scalability : The cloud's vast capacity allows organizations to handle
organizations to leverage the benefits of both environments. unexpected surges in demand efficiently. For instance, they can quickly provision
- Flexibility : Organizations can use private clouds for sensitive operations while additional servers during peak times and scale down when demand decreases.
utilizing public clouds for less critical tasks or to handle peak loads when private
resources are insufficient. - Accessibility : Users can access their data and applications from any device connected
- Use Cases : This model is becoming increasingly popular as it allows businesses to to the Internet, providing flexibility and convenience.
scale their resources dynamically and optimize costs while maintaining control over
sensitive data. - Utility Model : Cloud computing transforms IT services into a utility model, similar to
c Elaborate the various cloud computing characteristics and its benefits. how we consume water or electricity. This means organizations can access IT resources
1,2 6
as needed and pay only for what they use.
Cloud computing offers a range of characteristics that provide significant benefits to both
cloud service consumers (CSCs) and cloud service providers (CSPs). Here are some of
the key characteristics and their associated benefits: OR
Q.02 a List & Explain the various cloud computing platforms and technologies.
1, 7
1. No Up-Front Commitments : Users can access cloud services without the need for
2
long-term contracts or significant initial investments. This flexibility allows organizations Cloud computing platforms and technologies are diverse and cater to various needs in
to scale their usage based on current needs. the IT landscape. Here’s a detailed overview of the key platforms and technologies
associated with cloud computing:
2. On-Demand Access : Cloud services are available whenever needed, enabling users to
quickly access resources without delays. This immediacy is crucial for businesses that 1. Infrastructure-as-a-Service (IaaS) :
require rapid responses to changing demands. - Definition : IaaS provides virtualized computing resources over the internet. It
allows users to rent IT infrastructure such as servers, storage, and networking on a pay-
3. Nice Pricing : The pricing models for cloud services are often competitive and can be per-use basis.
tailored to the user's consumption patterns. Many services operate on a pay-per-use basis, - Examples : Amazon Web Services (AWS), Microsoft Azure, and Google Cloud
meaning organizations only pay for what they use, which can lead to substantial cost Platform (GCP) are prominent IaaS providers. They enable businesses to scale their
savings. infrastructure dynamically based on demand, which is particularly useful for
applications with fluctuating workloads.
4. Simplified Application Acceleration and Scalability : Cloud computing allows
organizations to easily scale their applications up or down based on demand. This is 2. Platform-as-a-Service (PaaS) :
particularly beneficial during peak usage times, as resources can be added or removed - Definition : PaaS offers a platform allowing customers to develop, run, and manage
without significant effort. applications without the complexity of building and maintaining the underlying
infrastructure.
5. Efficient Resource Allocation : Cloud providers can optimize resource distribution - Examples : Google App Engine, Microsoft Azure App Service, and Heroku are
across multiple users, ensuring that resources are used effectively and reducing waste. examples of PaaS. They provide development tools, middleware, and database
management systems, enabling developers to focus on writing code rather than
6. Energy Efficiency : By utilizing shared resources in large data centers, cloud managing servers.
computing can lead to lower energy consumption compared to traditional on-premises
infrastructure. 3. Software-as-a-Service (SaaS) :
- Definition : SaaS delivers software applications over the internet, on a subscription
7. Seamless Creation and Use of Third-Party Services : Cloud platforms often facilitate basis. Users can access these applications via a web browser, eliminating the need for
the integration of third-party services, allowing organizations to enhance their installation and maintenance.
applications with additional functionalities without extensive development work. - Examples : Popular SaaS applications include Salesforce, Google Workspace, and
Microsoft 365. These services are hosted in the cloud and can be accessed from
Benefits of Cloud Computing: anywhere, making them highly convenient for users.

- Reduced Maintenance and Operational Costs : Organizations benefit from lower costs 4. Virtualization :
related to infrastructure maintenance, as these responsibilities shift to the cloud service - Definition : Virtualization is a core technology that allows multiple virtual instances
JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL
OR GROUP OR GROUP
21CS72 21CS72
of operating systems to run on a single physical machine. It abstracts the hardware management of cloud services through rich interfaces and web services.
layer, enabling efficient resource utilization.
- Importance : It plays a crucial role in cloud computing by allowing providers to 4. Service Orientation : This architectural style focuses on providing services to other
maximize hardware usage and offer scalable services. Technologies like VMware and applications through a network. It is essential for the development of cloud services that
Hyper-V are widely used for virtualization. can be consumed on-demand.

5. Distributed Systems : 5. Utility Computing : This model treats computing resources as a utility, similar to
- Definition : A distributed system is a network of independent computers that water or electricity, where users pay for what they use. It embodies the pay-per-use
appears to its users as a single coherent system. This architecture is fundamental to concept that is central to cloud computing.
cloud computing.
- Characteristics : It enables resource sharing, fault tolerance, and scalability, which These technologies have evolved over time, with significant milestones such as
are essential for cloud services. The cloud infrastructure is essentially a large distributed mainframe computing, cluster computing, and grid computing paving the way for the
computing facility. cloud computing paradigm we see today.
c Describe the main characteristics of a service-oriented computing 1, 6
6. Web 2.0 Technologies : 2
- Definition : Web 2.0 refers to the evolution of the web into a platform for user- Service-oriented computing (SOC) is a fundamental paradigm that underpins cloud
generated content and interactive applications. It includes technologies that facilitate the computing systems, characterized by several key features:
delivery and management of cloud services.
- Examples : AJAX, RESTful APIs, and social media integration are part of Web 2.0 1. Service Abstraction : At its core, SOC treats services as the primary building blocks
technologies that enhance user interaction with cloud services. for application and system development. A service is an abstraction that represents a self-
describing, platform-agnostic component capable of performing a wide range of
7. Service Orientation : functions, from simple tasks to complex business processes.
- Definition : This approach involves designing software applications as a collection
of services that communicate over a network. It is a key principle in cloud computing. 2. Interoperability : SOC promotes the development of applications that are flexible,
- Benefits : It promotes reusability, scalability, and flexibility in application low-cost, and interoperable. This means that different services can work together
development, allowing businesses to adapt quickly to changing needs. seamlessly, regardless of the underlying technology or platform.

8. Utility Computing : 3. Rapid Development : The service-oriented approach allows for the rapid development
- Definition : Utility computing is a model where computing resources are provided of applications. By leveraging existing services, developers can create new applications
as a metered service, similar to traditional utilities like electricity or water. more quickly and efficiently, focusing on integrating various services rather than building
- Significance : This model underpins the pricing strategies of cloud services, everything from scratch.
allowing users to pay only for what they consume, which can lead to cost savings.
4. Quality of Service (QoS) : SOC introduces the concept of QoS, which encompasses a
cloud computing encompasses a variety of platforms and technologies that work set of functional and non-functional attributes used to evaluate service performance.
together to provide scalable, flexible, and cost-effective IT solutions. Each component These attributes can include response time, security, reliability, scalability, and
plays a vital role in the overall cloud ecosystem, enabling businesses to leverage the availability. QoS requirements are typically defined in a Service Level Agreement (SLA)
power of the cloud for their operations. between the service provider and the client.
b What are the major distributed computing technologies that led to 1, 7
cloud computing. 2 5. Web Services : One of the most prominent expressions of SOC is through Web
Services (WS). These are software components that expose functionalities accessible via
The major distributed computing technologies that led to the development of cloud method invocation over the Internet, typically using protocols like HTTP. Web services
computing include: utilize standards such as the Web Service Description Language (WSDL) for defining
service characteristics and the Simple Object Access Protocol (SOAP) for
1. Distributed Systems : These are collections of independent computers that work communication.
together to present themselves as a single coherent system. They are foundational to
cloud computing, allowing resources to be shared and utilized more efficiently. 6. Utility Computing : SOC aligns with the concept of utility computing, where
computing resources are provided as a service, similar to utilities like water or electricity.
2. Virtualization : This technology enables the creation of virtual versions of physical This model allows users to access services based on their needs without worrying about
resources, such as servers and storage devices. It allows for better resource management the underlying infrastructure.
and flexibility in deploying applications.
7. Dynamic Provisioning : SOC supports dynamic provisioning of IT resources, enabling
3. Web 2.0 : This refers to the evolution of the web into a platform for user-generated organizations to scale their services up or down based on demand. This flexibility is a
content and interactive applications. Web 2.0 technologies facilitate the delivery and significant advantage of cloud computing, allowing for efficient resource management.
JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL
OR GROUP OR GROUP

21CS72 21CS72
allocated to each guest, such as memory and processor frequency, which helps in
8. Integration and Composition : SOC facilitates the integration of various services, meeting service-level agreements (SLAs) and optimizing performance.
allowing for the composition of applications from multiple service providers. This
capability enables organizations to create more complex systems by aggregating existing 6. Isolation : Each virtual environment is isolated from others, which means that
services, focusing on adding value rather than reinventing the wheel. applications running in one virtual machine do not interfere with those in another. This
isolation is crucial for maintaining stability and security in multi-tenant environments,
such as cloud computing.

7. Resource Management : Virtualization simplifies the allocation and partitioning of


resources among different guests. This is particularly important in scenarios like server
Module-2 consolidation, where efficient resource management can lead to reduced power
Download consumption and operational costs.
Q. 03 a Explain the characteristics of virtualized environments. 2, 7
3
Virtualized environments are defined by several key characteristics that enhance their these characteristics make virtualized environments a powerful solution for modern IT
functionality and efficiency. Here are the main components: infrastructure, enabling organizations to optimize their resources while enhancing
security and manageability.
b Give the taxonomy of virtualization techniques. 2, 7
3
The taxonomy of virtualization techniques can be classified based on the service or
entity being emulated. Here are the main categories:

1. Components of Virtualization : A virtualized environment consists of three major


components: the guest , the host , and the virtualization layer . The guest is the system
component that interacts with the virtualization layer instead of directly with the host.
The host is the original environment where the guest operates, while the virtualization
layer recreates the environment for the guest to function.

2. Security : One of the standout features of virtualization is its ability to provide


increased security. The virtualization layer allows for controlled execution of the guest,
creating a secure environment where operations are managed transparently. This is
particularly useful in preventing harmful operations from affecting the host system, as
the guest operates within a sandboxed environment.

3. Managed Execution : Virtualization enables managed execution, which includes


features like sharing, aggregation, emulation, and isolation. This means that multiple
virtual environments can coexist on the same physical hardware, allowing for better 1. Execution Virtualization : This is the oldest and most developed area of
virtualization. It focuses on emulating execution environments and can be further
resource utilization and performance tuning. For instance, a powerful guest can be fully
utilized rather than being underused. divided into two major categories based on the type of host they require:
- Process-Level Techniques : These are implemented on top of an existing operating
4. Portability : Virtual machine instances are typically represented by files that can be system, which has full control of the hardware.
easily moved across different physical systems. This portability allows for flexibility in - System-Level Techniques : These are implemented directly on hardware and
require minimal support from an existing operating system.
managing computing resources and environments.

5. Performance Tuning : Advances in virtualization technology have made it easier to 2. Storage Virtualization : This technique allows the decoupling of the physical
organization of hardware from its logical representation. Users can access their data
fine-tune the performance of virtual machines. Administrators can control the resources
JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL
OR GROUP OR GROUP
21CS72 21CS72
using a logical path without worrying about its specific physical location. demand increases.

3. Network Virtualization : While less popular than execution and storage 7. High Availability and Accessibility : Virtualization technologies often provide
virtualization, it is often a complementary feature necessary for building virtual features that enhance the availability of applications and services, ensuring that they can
computing systems. be accessed remotely and reliably.

Within execution virtualization, there are various techniques that provide different types virtualization has transformed the way IT infrastructure is managed, providing
of virtual computation environments, such as: organizations with the tools to optimize their resources while addressing the growing
- Bare Hardware : Direct access to hardware resources. demands for capacity and efficiency. However, it is important to note that
- Operating System Resources : Virtualization at the OS level. virtualization also introduces new security challenges that require careful management
- Low-Level Programming Language : Virtualization that abstracts programming and oversight.
OR
language execution.
- Application Libraries : Virtualization that involves libraries linked to application Q.04 a Explain virtualization and cloud computing and pros and cons of 2, 7
virtualization. 3
images.
Virtualization is a technology that allows the creation of virtual versions of physical
resources, such as servers, storage devices, and networks. It enables multiple virtual
virtualization encompasses a wide range of techniques that enhance the efficiency and environments to run on a single physical machine, effectively abstracting the
manageability of computing environments, particularly in cloud computing contexts.
underlying hardware. This technology is particularly significant in cloud computing,
c What is virtualization and what are its benefits. 2, 6
3 where it facilitates the delivery of Infrastructure-as-a-Service (IaaS) and Platform-as-a-
Virtualization is a technology that creates an abstract environment, allowing multiple Service (PaaS) solutions. By using virtualization, organizations can create secure,
operating systems or applications to run on a single physical machine. It essentially customizable, and isolated environments for running applications, even if those
emulates hardware or software environments, enabling efficient resource utilization and applications are untrusted. For instance, you can run a Windows operating system on a
management. This technology is particularly significant in cloud computing, where it virtual machine that is hosted on a Linux server.
supports Infrastructure-as-a-Service (IaaS) solutions.
Cloud computing leverages virtualization to provide on-demand IT infrastructure and
The benefits of virtualization are numerous: services. It allows for the dynamic allocation of resources, enabling organizations to
scale their computing capabilities efficiently and cost-effectively. Virtualization plays a
1. Managed Execution : Virtualization allows for controlled execution environments, crucial role in ensuring that cloud services are customizable, secure, and manageable,
which can be configured to enhance security and manageability. This means that which are essential for delivering IT services effectively.
applications can run in isolated environments, reducing the risk of interference or
security breaches. Pros of Virtualization:
1. Managed Execution and Isolation : Virtualization allows for the creation of secure
2. Isolation : Each virtual machine operates independently, meaning that if one and controllable computing environments, which is vital for running applications
application crashes or is compromised, it does not affect others running on the same safely.
host. This isolation is crucial for maintaining system stability and security. 2. Resource Utilization : It enables efficient use of physical resources by allowing
multiple virtual machines to share the same hardware, leading to cost savings.
3. Resource Utilization : Virtualization enables better allocation and partitioning of 3. Scalability : Virtualization supports the creation of elastically scalable systems,
resources among different virtual machines. This is particularly beneficial in server allowing organizations to provision additional capabilities with minimal costs.
consolidation scenarios, where multiple workloads can be run on fewer physical 4. High Availability : Techniques like live migration allow virtual machines to be
servers, leading to cost savings and improved efficiency. moved between physical hosts without downtime, ensuring continuous service
availability.
4. Portability : Virtual machines are typically represented by files that can be easily 5. Customization : Organizations can tailor their virtual environments to meet specific
moved between different physical systems. This portability allows for greater flexibility needs, enhancing flexibility in service delivery.
in managing and deploying applications.
Cons of Virtualization:
5. Performance Tuning : Advances in hardware and software have made it easier to 1. Security Vulnerabilities : While virtualization can enhance security through
fine-tune the performance of virtual machines. Administrators can adjust resource isolation, it also introduces new security threats that need careful management.
allocations, such as memory and processing power, to meet specific performance 2. Performance Trade-offs : Virtualization can lead to performance overhead, as
requirements. resources are shared among multiple virtual machines, which may affect application
performance.
6. Scalability : Virtualization supports the creation of elastically scalable systems, 3. Complexity : Managing a virtualized environment can be more complex than
allowing organizations to provision additional resources quickly and cost-effectively as traditional setups, requiring specialized skills and tools.

JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL


OR GROUP OR GROUP

21CS72 21CS72
4. Dependency on Hypervisors : The performance and security of virtual machines implementation.
depend heavily on the hypervisor, which can become a single point of failure if not
managed properly.

while virtualization offers significant advantages in terms of resource management,


scalability, and security, it also presents challenges that organizations must address to
fully leverage its potential in cloud computing.
b Explain hypervisors and its types. 2, 7
3
Hypervisors, also known as virtual machine managers (VMMs), are crucial components
of hardware virtualization. They create a virtualized hardware environment that allows
multiple guest operating systems to run on a single physical machine. There are two
primary types of hypervisors: Type I and Type II.

At the core of this model is the Instruction Set Architecture (ISA), which serves as the
interface between hardware and software. The ISA defines the instruction set for the
processor, including registers, memory management, and interrupt handling. This
foundational layer is critical for the operating system (OS) to function effectively.

Execution virtualization itself encompasses techniques that create an execution


environment separate from the host system. This can involve running guest operating
systems or applications in isolation from the underlying hardware. The virtualization
layer intercepts calls directed towards the hardware, allowing for a controlled execution
environment.

1. Type I Hypervisors : Also referred to as native or bare-metal hypervisors, these run There are two primary categories of execution virtualization techniques: process-level
directly on the physical hardware. They do not require a host operating system to and system-level. Process-level techniques operate on top of an existing operating
function, which allows them to interact directly with the hardware's Instruction Set system, leveraging its resources, while system-level techniques interact directly with
Architecture (ISA). This direct interaction enables better performance and efficiency the hardware, requiring minimal support from the OS.
since the hypervisor can manage guest operating systems without the overhead of a host
OS. Examples of Type I hypervisors include VMware vSphere (ESX servers) and Xen. Moreover, the model also highlights the importance of security and privilege levels. In
a hypervisor-managed environment, guest operating systems typically run in user mode
2. Type II Hypervisors : These are hosted hypervisors that run on top of an existing (Ring 3), preventing them from directly accessing sensitive CPU status. This separation
operating system. They rely on the host OS to provide virtualization services and is vital for maintaining security and isolation between different virtual machines.
interact with it through the Application Binary Interface (ABI). This means that Type II
hypervisors are essentially applications running within the host OS, which can
Module-3
introduce some performance overhead compared to Type I hypervisors. Examples of Download
Type II hypervisors include VMware Workstation and Oracle VirtualBox. Q. 05 a Briefly Explain cloud computing architecture with a neat diagram. 2, 7
3
Both types of hypervisors enable full virtualization, allowing guest operating systems to Cloud computing architecture refers to the structured framework that enables the delivery
run as if they were on dedicated hardware. They utilize techniques like binary of cloud services. It encompasses various layers and components that work together to
translation for sensitive instructions and direct execution for non-sensitive ones, provide scalable and efficient computing resources over the internet. Here’s a brief
ensuring efficient operation of virtual machines. overview of the key elements of cloud computing architecture:
c Discuss machine reference model of execution virtualization. 2, 6
3
The machine reference model of execution virtualization is a crucial framework that
defines how different levels of the computing stack interact while abstracting
implementation details. This model is essential for virtualizing execution environments,
as it establishes clear interfaces between various layers, simplifying their

JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL


OR GROUP OR GROUP
21CS72 21CS72
b Explain IAAS with a neat diagram.
2, 7
3
Infrastructure-as-a-Service (IaaS) is a cloud computing model that provides virtualized
computing resources over the internet. It allows users to rent IT infrastructure such as
servers, storage, and networking on a pay-as-you-go basis. This model is particularly
beneficial for businesses that want to avoid the costs and complexities associated with
managing physical hardware.

Here’s a neat diagram to illustrate the IaaS model:

1. Layers of Cloud Architecture :


- Applications : This is the top layer where end-user applications reside, such as CRM
systems (e.g., SalesForce.com) and productivity tools (e.g., Google Apps).
- Platform : This layer provides a platform for developers to build and deploy
applications, often referred to as Platform-as-a-Service (PaaS). Examples include Google
App Engine and Microsoft Azure.
- Infrastructure : The Infrastructure-as-a-Service (IaaS) layer offers virtualized
computing resources over the internet, such as Amazon EC2 and S3, allowing users to
manage their own infrastructure.
- Hardware : The foundational layer consists of physical servers, storage, and
networking components that support the cloud services.

2. Types of Clouds : Key Components of IaaS:


- Public Clouds : Open to the general public and hosted by third-party providers, 1. Virtualization : This is the core technology that allows multiple virtual machines
offering services over the internet. (VMs) to run on a single physical server. Each VM can be configured with different
- Private Clouds : Exclusive to a single organization, providing enhanced security and operating systems and applications.
control over data.
- Hybrid Clouds : A combination of public and private clouds, allowing data and 2. Management Layer : This includes tools for managing the virtual machines,
applications to be shared between them. scheduling their execution, and handling pricing and billing for the resources
- Community Clouds : Shared infrastructure among several organizations with consumed.
common concerns, such as security and compliance.
3. Physical Infrastructure : This consists of the actual hardware, including servers,
3. Key Characteristics : storage systems, and network devices, which are abstracted and made available to users
- On-Demand Self-Service : Users can provision resources as needed without human as virtual resources.
intervention.
- Broad Network Access : Services are accessible over the network from various Benefits of IaaS:
devices. - Cost Efficiency : Reduces capital expenditure on hardware and maintenance.
- Resource Pooling : Providers pool resources to serve multiple customers, dynamically - Scalability : Easily scale resources up or down based on demand.
assigning and reallocating resources as needed. - Flexibility : Users can customize their infrastructure according to their specific needs.
- Rapid Elasticity : Resources can be scaled up or down quickly to meet demand. - Focus on Core Business : Allows businesses to concentrate on their core activities
- Measured Service : Resource usage is monitored, controlled, and reported, providing without worrying about the underlying infrastructure.
transparency for both the provider and the consumer.
IaaS is a foundational layer in cloud computing, enabling businesses to build and
manage their IT environments without the burden of physical hardware management.
JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL
OR GROUP OR GROUP

21CS72 21CS72
c What is SAAS. Explain its characteristics and its initial benefits. 2, 6
3
Software-as-a-Service (SaaS) is a software delivery model that provides users with
access to applications over the Internet as a web-based service. This model allows users
to utilize software without the need for complex hardware or software management, as
these tasks are handled by third-party providers. Here are some key characteristics and
initial benefits of SaaS:

Characteristics of SaaS:
1. Application Access : Users access applications via the Internet, typically through a
web browser, which means they do not need to install software on their local machines.
2. Centralized Management : The applications are centrally managed by the service
provider, ensuring that updates, maintenance, and security are handled without user
intervention.
3. One-to-Many Service Delivery : SaaS operates on a multi-tenant architecture, where
a single instance of the application serves multiple users or organizations, optimizing
resource use and cost.
4. Subscription-Based Pricing : Users typically pay a recurring fee to access the
software, which can be structured as a subscription or pay-as-you-go model, making it
financially accessible. 1. Software Delivery Model : PaaS delivers a complete development and deployment
5. Customization and Integration : SaaS applications can often be customized to meet environment in the cloud, which includes hardware, software, and tools necessary for
specific user needs and can integrate with other services and applications, enhancing application development. This means developers can focus on writing code and
their functionality. developing applications rather than worrying about the infrastructure.

Initial Benefits of SaaS: 2. Automation : PaaS environments automate the deployment of applications, scaling
1. Cost Reduction : SaaS significantly lowers software costs and total cost of them as needed based on demand. This automation is typically governed by a Service
ownership (TCO) since users do not need to invest in hardware or pay large upfront Level Agreement (SLA) between the customer and the provider, which is not a native
licensing fees. feature of Infrastructure-as-a-Service (IaaS) solutions.
2. Service-Level Improvements : Providers often offer service-level agreements
(SLAs) that guarantee certain performance and availability standards. 3. Development Tools and APIs : PaaS offerings provide developers with various
3. Rapid Implementation : Users can quickly start using the software without lengthy services and APIs that simplify the creation and delivery of applications. These tools
installation processes, allowing for faster deployment and time-to-value. often include components for application monitoring, management, and reporting,
4. Standalone and Configurable Applications : SaaS applications can be configured to which are essential for maintaining application performance and reliability.
meet specific business needs while remaining standalone solutions.
5. Rudimentary Application and Data Integration : Early SaaS offerings provided basic 4. Integration Capabilities : PaaS solutions allow for the integration of third-party
integration capabilities, allowing users to connect with other applications and data services through standard interfaces and protocols, making application development
sources. more agile and responsive to user needs.

SaaS has evolved from its initial offerings to become a robust and flexible model that 5. Vendor Lock-in : One of the significant concerns with PaaS is the potential for
continues to gain acceptance in the cloud computing landscape, providing significant vendor lock-in. Unlike IaaS, which offers more flexibility in terms of the software
advantages to businesses of all sizes. stack, PaaS environments often bind applications to specific runtimes and APIs
OR provided by the vendor, making it challenging to migrate applications to other
Q. 06 a Explain PAAS with a neat diagram. 2, 7 platforms.
3
Platform-as-a-Service (PaaS) is a cloud computing service model that provides a 6. Cost Efficiency : PaaS can reduce costs associated with application development,
platform allowing developers to build, deploy, and manage applications without the deployment, and management. By offloading the responsibility of technology upgrades
complexity of maintaining the underlying infrastructure. Here are some key aspects of to the PaaS provider, organizations can focus on their core business activities.
PaaS:
7. Categories of PaaS : PaaS solutions can be categorized into three main types:
- PaaS-I : Offers a fully integrated development environment hosted in the cloud.
- PaaS-II : Focuses on providing scalable infrastructure primarily for web
applications.
- PaaS-III : Provides a cloud programming platform for various types of applications,
JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL
OR GROUP OR GROUP
21CS72 21CS72
not limited to web apps. option for businesses of all sizes.

Popular PaaS providers include Microsoft Azure, Google App Engine, and Heroku, c List and Explain some of the challenges in cloud computing. 2, 6
each offering unique features and capabilities tailored to different development needs. 3
Overall, PaaS is designed to streamline the application development process, making it Cloud computing presents several challenges that need to be addressed for its effective
easier for developers to create and deploy applications in a cloud environment. adoption and management. Here are some of the key challenges:

1. Security, Trust, and Privacy : One of the most significant obstacles to widespread
b Describe the fundamental features of the economic and business 2, 7 cloud adoption is the concern over security, trust, and privacy. Traditional
model behind cloud computing. 3 cryptographic technologies are employed to protect sensitive data from tampering and
unauthorized access. However, the use of virtualization technologies introduces new
The economic and business model behind cloud computing is primarily driven by
vulnerabilities that were not previously considered. For instance, while data may be
several key features that enhance efficiency and reduce costs for organizations. Here are
encrypted and stored securely in the cloud, it must be decrypted by applications that
the fundamental aspects:
process it. This creates potential risks, especially if those applications are hosted in a
managed virtual environment. Determining liability for data breaches and ensuring that
1. Pay-as-you-go Model : One of the most significant advantages of cloud computing is
systems are secure and trustworthy from technical, social, and legal perspectives are
its financial model, which allows businesses to pay only for the resources they use. This
ongoing challenges.
eliminates the need for large upfront capital investments in IT infrastructure, making it
more accessible for startups and smaller enterprises.
2. Interoperability and Standards : The lack of standardized protocols and
interoperability between different cloud services can hinder seamless integration and
2. Reduction of Capital Costs : Cloud computing helps organizations reduce capital
migration between platforms. Vendor lock-in is a major concern, as organizations may
costs associated with purchasing and maintaining IT infrastructure. Instead of investing
find it difficult to switch providers without incurring significant costs or disruptions.
heavily in hardware and software, companies can leverage cloud services, which
Establishing common standards is essential to facilitate interoperability and reduce the
transform these capital expenses into operational costs.
risks associated with vendor lock-in.
3. Elimination of Depreciation Costs : By using cloud services, businesses can avoid
3. Organizational Aspects : Cloud computing fundamentally changes how IT services
the depreciation costs associated with owning IT assets. This is particularly beneficial
are consumed and managed. This shift requires organizations to adapt their business
as technology evolves rapidly, and organizations often find themselves with outdated
processes and cultural attitudes towards IT. The introduction of a pay-as-you-go billing
equipment.
model necessitates a new level of maturity in organizational processes. IT departments
may need to redefine their roles and responsibilities, which can lead to challenges in
4. Subscription-Based Software Licensing : Cloud computing typically replaces
workforce management and skill requirements. The transition may also create tensions
traditional software licensing with subscription models. This means that organizations
between different groups within an organization as they adjust to new ways of working.
can access the latest software without the burden of purchasing licenses upfront,
allowing for more flexibility and cost management.
4. Scalability and Fault Tolerance : Designing cloud systems that are both highly
scalable and fault-tolerant is a significant technical challenge. As demand for services
5. Lower Maintenance and Administrative Costs : Cloud providers handle the
fluctuates, cloud infrastructures must be able to scale up or down efficiently while
maintenance and administration of IT resources, which reduces the burden on internal
maintaining performance. Additionally, ensuring that these systems can recover quickly
IT teams. This can lead to significant savings in terms of labor costs and allows IT staff
from failures is crucial for maintaining service availability and reliability.
to focus on more strategic initiatives.
5. Management of Cloud Systems : The management of cloud computing systems
6. Tiered and Per-Unit Pricing Models : Cloud providers often offer tiered pricing,
involves complexities that differ from traditional IT environments. Organizations must
where services are available at different levels of performance and cost, as well as per-
develop new strategies for monitoring, managing, and optimizing cloud resources,
unit pricing based on specific usage metrics (like data transfer or memory allocation).
which can be more dynamic and distributed than on-premises systems. This includes
This flexibility allows businesses to tailor their cloud usage to their specific needs and
addressing issues related to resource allocation, performance monitoring, and cost
budget.
management.
7. Environmental and Indirect Cost Savings : Utilizing cloud services can also lead to a while cloud computing offers numerous benefits, these challenges must be carefully
reduction in indirect costs, such as carbon footprint emissions. For instance, by navigated to ensure successful implementation and operation.
consolidating data centers and optimizing resource usage, companies can lower their Module-4
environmental impact and potentially reduce taxes related to emissions in certain Download
regions. Q. 07 a Explain operating system security and virtual machine security.
3, 10
the economic model of cloud computing not only provides financial benefits but also 4
Operating system security and virtual machine security are two critical aspects of
promotes operational efficiency, scalability, and flexibility, making it an attractive
JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL
OR GROUP OR GROUP

21CS72 21CS72
ensuring the integrity and confidentiality of data in computing environments, especially Shared Images:
in cloud computing. When users opt to utilize shared images, such as Amazon Machine Images (AMIs) in
the Infrastructure as a Service (IaaS) model, they expose themselves to various security
Operating System Security : vulnerabilities. One major concern is that these images can be accessed by multiple
Operating systems (OS) are complex software systems that manage hardware and users, which increases the risk of unauthorized access and data breaches. For instance,
software resources on a computer. They consist of millions of lines of code, making if a user employs a popular AMI, they may inadvertently inherit vulnerabilities or
them vulnerable to a wide range of attacks. One of the main challenges in OS security is malicious code embedded within that image. This can lead to issues such as:
the inadequate isolation between applications. If one application is compromised, it can
potentially affect the entire platform and all other applications running on it. This is 1. Data Leakage: Sensitive data may be exposed if the shared image contains remnants
because the security level of the platform is reduced to that of the most vulnerable of previous users' data or configurations.
application. Additionally, traditional operating systems provide weak mechanisms for 2. Malicious Code: Attackers can exploit shared images to distribute malware, which
applications to authenticate each other, and there is often no trusted path for users to can then affect all users utilizing that image.
interact with applications securely. This lack of robust security measures can lead to 3. Unsolicited Connections: Instances running on shared images may establish
unauthorized access and data theft. outgoing connections that leak privileged information, such as IP addresses or system
logs, to unauthorized entities.
Virtual Machine Security:
Virtual machine (VM) security, on the other hand, leverages virtualization technology Management Operating System (OS):
to enhance security. A Virtual Machine Monitor (VMM), or hypervisor, is responsible The management OS, which is responsible for creating and managing virtual machines
for managing multiple VMs on a single physical machine. One of the key advantages of (VMs), also introduces several security risks:
virtualization is that it provides stronger isolation between VMs compared to the
isolation between processes in a traditional OS. This means that if one VM is 1. Vulnerabilities in the Management OS: The management OS can be a target for
compromised, the others can remain secure. The VMM controls access to hardware and attacks, as it has control over the hypervisor and the VMs. If compromised, an attacker
can enforce memory isolation, disk access, and network access, which helps mitigate could manipulate the VMs or access sensitive data.
security risks. 2. Dynamic MAC Address Assignment: In virtual environments, VMs are often
assigned random MAC addresses to avoid collisions. This can complicate the
identification of malicious systems, making it harder to secure the network.
3. Limited User Control: Users have minimal control over where their sensitive data is
stored, as it may be distributed across multiple servers. This lack of control can lead to
data being left on servers indefinitely, increasing the risk of unauthorized access.
4. Data Recovery Risks: The management OS may retain snapshots or backups of
VMs, which can lead to situations where deleted data is not truly erased, allowing
potential recovery by unauthorized users.

shared images and the management OS present critical security challenges in cloud
environments, necessitating robust security measures and user awareness to mitigate
these risks effectively.
OR
FIGURE 9.2 (a) Virtual security services provided by the VMM. (b) A dedicated Q. 08 a Explain the concept of privacy impact assessment and its importance in cloud
security VM 3, 10
computing.
4
the security of a virtualized environment is contingent upon the integrity of the VMM Privacy Impact Assessment (PIA) is a crucial process designed to evaluate the potential
and the management operating system (often referred to as Dom0 in Xen effects that a project or system may have on the privacy of individuals. In the context of
environments). If either of these components is compromised, the security of all VMs cloud computing, where sensitive data is often stored and processed, conducting a PIA
can be jeopardized. Moreover, while VMMs are generally smaller and less complex is particularly important.
than traditional operating systems, they still introduce their own set of vulnerabilities.
For instance, the management OS is responsible for creating VMs and transferring data, As of mid-2012, there were no international standards for PIAs, although various
which can also be a point of attack. countries and organizations require PIA reports. The assessment typically involves
analyzing legal implications, such as compliance with regulations like the U.K.-U.S.
b Explain the security risks posed by shared images and management os. 3, 10 Safe Harbor process, which helps U.S. companies adhere to European data protection
4 laws. This proactive approach encourages organizations to embed privacy
The security risks posed by shared images and the management operating system (OS) considerations into their systems from the outset, rather than making reactive changes
in cloud computing environments are significant and multifaceted. later that could disrupt functionality.

JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL


OR GROUP OR GROUP
21CS72 21CS72
A PIA tool can be deployed as a web-based service, where users input project b Explain the following associated with cloud computing 3, 4 10
information, privacy risks, and stakeholder details. The tool then generates a PIA report i) cloud security risks ii)Security: the top concern for cloud users
summarizing findings, risk assessments, and considerations regarding security,
transparency, and cross-border data flows. This structured approach helps organizations Sure! Let's dive into both aspects of cloud computing you've mentioned:
identify and mitigate privacy issues before they become problematic.
i) Cloud Security Risks
In cloud computing, where data is often shared across multiple tenants and geographical Cloud security risks can be categorized into three broad classes:
locations, the risks to privacy are heightened. For instance, the lack of transparency in
cloud service providers (CSPs) makes it challenging for users to verify if their data has 1. Traditional Security Threats : These are the familiar threats that any internet-
been deleted or adequately protected. Additionally, the potential for data loss or connected system faces, but their impact is magnified in the cloud due to the vast
leakage, account hijacking, and unauthorized access underscores the need for robust resources and large user base. For instance, unauthorized access and data theft are
privacy measures. significant concerns, especially since users often have to trust cloud service providers
(CSPs) with sensitive information.
PIAs are essential in fostering trust between cloud service providers and users,
ensuring that privacy rights are respected and that organizations are held accountable 2. Threats Related to System Availability : Cloud services can be vulnerable to outages
for the data they manage. By identifying privacy risks early in the development caused by system failures, power outages, or other catastrophic events. Such incidents
process, organizations can implement necessary safeguards, thereby enhancing the can lead to data lock-in, where organizations may find it challenging to access their data
overall security and integrity of cloud computing environments. during service disruptions, potentially crippling their operations.

3. Third-Party Data Control Threats : With multitenancy, where multiple users share the
same cloud resources, there are risks associated with data isolation. Vulnerabilities in the
virtualization management layer (VMM) can open new attack channels, making it
difficult to trace the actions of an attacker. Additionally, the rapid write operations in
cloud storage can erase forensic evidence, complicating investigations into security
incidents.

ii) Security: The Top Concern for Cloud Users


Security is consistently reported as the primary concern for cloud users. Many users are
accustomed to having complete control over their systems, typically protected by
corporate firewalls. Transitioning to the cloud requires them to extend trust to CSPs,
which can be a daunting shift.

Key concerns include:

- Unauthorized Access and Data Theft : Users worry about their confidential
information being accessed without permission. Data is particularly vulnerable when
stored, as it remains exposed for longer periods compared to when it is actively
processed.

- Malicious Insiders : The risk posed by rogue employees within a CSP is significant, as
these individuals may have access to sensitive data without adequate oversight.

- Account or Service Hijacking : Users must be vigilant against credential theft, which
can lead to unauthorized access to their cloud services.

- Unknown Risk Profile : Users often face risks stemming from their lack of knowledge
about the security measures in place at the CSP, including potential vulnerabilities in the
cloud infrastructure itself.

Module-5
Download
Q. 09 a Explain the core components of Google app engine. 3, 4 10
JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL
OR GROUP OR GROUP

21CS72 21CS72
Google App Engine is a powerful platform as a service (PaaS) that allows developers i) Animoto
to build and host scalable web applications. It is structured around four core
components:

1. Infrastructure : This is the backbone of App Engine, designed to efficiently serve Animoto is a popular cloud-based application that allows users to create videos easily
user requests. It utilizes a vast network of servers located in Google’s data centers. and quickly. The platform provides a user-friendly interface where individuals can
When an HTTP request is made, App Engine identifies the servers hosting the upload images, music, and video clips. Users can select a specific theme for their
application, assesses their load, and allocates additional resources if necessary. This video, arrange the media in the desired order, and choose a soundtrack. Once the
design allows for seamless handling of requests without the need for state information storyboard is set, the rendering process occurs in the background, and users are notified
to be maintained between them, simplifying the infrastructure's workload. via email when their video is ready.
2. Runtime Environment : App Engine supports multiple programming languages, The core innovation of Animoto lies in its proprietary artificial intelligence (AI)
including Java, Python, and Go. This environment provides the necessary tools and engine, which automatically selects animation and transition effects based on the
services that developers need to create applications. It includes features for data access, uploaded media. This means users can create visually stunning videos without needing
account management, messaging, and more, which streamline common web extensive video editing skills or intervention. The service is particularly appealing for
application operations. those looking to produce high-quality videos for personal or professional use without
the steep learning curve typically associated with video editing software.
3. Storage : App Engine offers a service called DataStore, which is optimized for
storing semi-structured data. Unlike traditional relational databases, DataStore allows ii) Maya Rendering with Aneka
for more flexibility in data structure and access patterns, making it suitable for web
applications that require quick data retrieval without strict constraints.

4. Scalable Services : App Engine provides a variety of scalable services that


developers can leverage to enhance their applications. These services include image
manipulation, task queues for background processing, and cron jobs for scheduled
tasks. They are designed to scale automatically based on the application's needs,
ensuring that performance remains consistent even under varying loads.

Together, these components create a robust environment for developing applications


that can easily scale to meet user demands while minimizing the complexity typically
associated with traditional web development.
b Discuss in detail the following media applications of cloud computing technologies. i)
3, 4 10
Animoto ii) Maya Rendering with Aneka
iii)Video encoding on cloud.

JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL


OR GROUP OR GROUP
21CS72 21CS72
Maya rendering, particularly in the context of engineering and movie production, has
greatly benefited from cloud computing technologies. For instance, the engineering In healthcare, cloud computing technologies are being utilized to enhance diagnostic
department of GoFront group, a division of China Southern Railway, has implemented processes, particularly in the analysis of electrocardiogram (ECG) data. Here are some
a private cloud solution for rendering train designs. This process involves creating key points regarding this application:
high-quality, three-dimensional (3D) images of models for high-speed electric
locomotives and other vehicles. - Remote Monitoring : Cloud computing enables the remote monitoring of patients'
heartbeats, allowing healthcare providers to analyze ECG data from anywhere at any
The system allows GoFront engineers to input various parameters for the rendering time. This is particularly beneficial for continuous monitoring of patients with heart
process, such as the number of frames and cameras. These tasks are submitted to the conditions.
Aneka Cloud, which efficiently distributes the workload across available machines. By
utilizing cloud resources, the time required for rendering has been significantly - ECG Data Analysis : The ECG represents the electrical activity of the heart,
reduced from days to just hours. This efficiency is crucial for iterative design producing a waveform that reflects the heartbeat. By analyzing the shape of this
processes, enabling engineers to visualize and refine their designs rapidly. waveform, healthcare professionals can identify arrhythmias and detect heart diseases.
Cloud technologies facilitate the processing of large volumes of ECG data efficiently.

iii) Video Encoding on Cloud: Encoding.com - Elasticity and Cost-Effectiveness : One of the primary advantages of using cloud
Video encoding and transcoding are computationally intensive tasks that can be infrastructure for ECG analysis is its elasticity. The cloud can dynamically scale
effectively managed using cloud technologies. Encoding.com is a prime example of a resources up or down based on demand, which means hospitals do not need to invest
cloud-based service that specializes in these operations. With the increasing demand heavily in physical infrastructure. This flexibility allows for more effective budget
for video content across various devices and formats, cloud solutions provide the utilization.
necessary infrastructure to handle the complexities of video encoding.
- Ubiquity and Accessibility : Cloud-hosted systems can be accessed from any
Cloud technologies allow for flexible and scalable video processing, enabling users to internet-enabled device, ensuring that healthcare providers can retrieve and analyze
convert videos from one format to another without the prohibitive costs associated with ECG data without being tied to specific locations or hardware. This accessibility is
traditional software and hardware solutions. This service is particularly beneficial for crucial for timely medical interventions.
businesses and individuals who need to deliver video content across multiple
platforms, ensuring compatibility and quality without the need for extensive in-house - Integration with Existing Systems : Cloud technologies can be easily integrated with
resources. existing hospital systems, enhancing the overall workflow. For instance, a cloud-based
web service can store ECG data and process it using scalable cloud resources, ensuring
OR that healthcare professionals receive timely alerts if anomalies are detected.
Q. 10 a Explain in detail about the application of cloud computing in 3, 4 10
i)Healthcare: ECG analysis in the cloud ii)Geoscience: satellite image processing - Cost Savings : Cloud services typically operate on a pay-per-use model, which
means healthcare providers only pay for the resources they actually use. This pricing
Cloud computing has significantly transformed various sectors, including healthcare structure can lead to significant cost savings compared to traditional in-house systems.
and geoscience, by providing scalable and efficient solutions. Let's delve into the
applications in these two areas: ii) Geoscience: Satellite Image Processing
i) Healthcare: ECG Analysis in the Cloud

In the field of geoscience, cloud computing is revolutionizing the way satellite images
are processed and analyzed. Here are some details about this application:

JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL


OR GROUP OR GROUP

21CS72 21CS72
- Handling Large Data Volumes : Satellite remote sensing generates vast amounts of
data, often hundreds of gigabytes of raw images. Cloud computing provides the
necessary infrastructure to process these large datasets efficiently, which is essential
for generating various Geographic Information System (GIS) products.

- I/O and Compute-Intensive Tasks : The processing of satellite images involves both
input/output operations and computationally intensive tasks. Cloud computing can
handle these demands by providing scalable resources that can be adjusted based on
the workload.

- Dynamic Resource Provisioning : Cloud platforms can dynamically provision


resources, meaning they can grow or shrink based on the processing needs. This is
particularly useful for geoscience applications where the volume of data can vary
significantly.

- Integration of Technologies : A cloud-based implementation for satellite image


processing can integrate various technologies across the computing stack. For example,
a Software as a Service (SaaS) application can provide services for geocode generation
and data visualization, while a Platform as a Service (PaaS) solution like Aneka can
manage data import and execution of image-processing tasks. Key Components of AWS:

- Efficient Workflow Management : The use of cloud computing allows for the 1. Compute Services :
creation of workflows that can process satellite images in a streamlined manner. For - Amazon Elastic Compute Cloud (EC2) : This is the cornerstone of AWS's compute
instance, a workflow engine can manage the sequence of operations required to services, allowing users to deploy virtual servers (instances) based on specific images.
transform raw satellite images into usable data products. EC2 provides the flexibility to scale computing resources up or down as needed.
- AWS Elastic Beanstalk : A PaaS offering that simplifies the deployment and
- Accessibility and Collaboration : Cloud computing enhances collaboration among management of applications by automatically handling the infrastructure provisioning,
researchers and scientists by providing a centralized platform where data can be load balancing, and scaling.
accessed and processed. This accessibility fosters innovation and allows for the sharing - AWS Lambda : A serverless computing service that lets you run code without
of insights across different teams and organizations. provisioning or managing servers, automatically scaling based on the number of
requests.

2. Storage Services :
- Amazon Simple Storage Service (S3) : A highly scalable object storage service that
allows users to store and retrieve any amount of data from anywhere on the web. It
organizes data in "buckets" and "objects," making it easy to manage and access.
- Amazon Elastic Block Store (EBS) : Provides block-level storage volumes for use
with EC2 instances, offering persistent storage that can be attached to instances.
- Amazon RDS (Relational Database Service) : A managed database service that
supports various database engines, making it easier to set up, operate, and scale
relational databases in the cloud.

3. Networking and Content Delivery :


- Amazon Virtual Private Cloud (VPC) : Allows users to create isolated networks
within the AWS cloud, providing control over the network configuration, including IP
b Explain Amazon web services(AWS) in detail. 3, 4 10 address ranges and subnets.
- Amazon CloudFront : A content delivery network (CDN) that speeds up the
Amazon Web Services (AWS) is a comprehensive cloud computing platform provided distribution of static and dynamic web content to users globally by caching copies of
by Amazon, offering a wide range of services that enable developers and businesses to content at edge locations.
build, deploy, and manage applications in the cloud. AWS is primarily known for its
Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) offerings, which 4. Monitoring and Management :
provide scalable and flexible solutions for various computing needs.
JOIN WHATSAPP CHANNEL JOIN WHATSAPP CHANNEL
OR GROUP OR GROUP
21CS72 BCS502
- Amazon CloudWatch : A monitoring service that provides insights into resource
utilization, application performance, and operational health. It collects metrics from
various AWS services and allows users to set alarms and automate responses.
- AWS CloudFormation : A service that helps users define and provision AWS
infrastructure using code, allowing for easy replication and management of resources REVISED BLOOMS TAXONOMY LEARNING LEVEL (RBT)
through templates.
L1: Remember L2: Understand L3: Apply L4: Analyze L5: Evaluate L6: Create
5. Additional Services :
- Amazon Simple Queue Service (SQS) : A fully managed message queuing service
that enables decoupling of microservices, distributed systems, and serverless
applications. COURSE OUTCOMES (COs)
- Amazon Simple Notification Service (SNS) : A messaging service for sending 1
notifications to subscribers or other applications, supporting various protocols like Understand and analyze various cloud computing platforms and service provider.
SMS, email, and HTTP.

Advantages of AWS: 2
Illustrate various virtualization concepts.
- Scalability : AWS services can scale up or down based on demand, allowing
businesses to handle varying workloads efficiently.
3
- Cost-Effectiveness : With a pay-as-you-go pricing model, users only pay for the Identify the architecture, infrastructure and delivery models of cloud computing.
resources they consume, reducing upfront costs associated with traditional
infrastructure.
- Global Reach : AWS has data centers in multiple regions around the world, enabling 4
Understand the Security aspects of CLOUD.
low-latency access and compliance with local regulations.
- Security : AWS provides a robust security framework, including data encryption,
identity and access management, and compliance certifications. 5
Define platforms for development of cloud applications
Use Cases:
AWS is utilized across various sectors, including healthcare for managing patient data,
enterprise resource planning (ERP) systems for businesses, and collaborative tools like
Google Docs for document sharing and editing.
PROGRAM OUTCOMES (POs)
1 Engineering Knowledge 5 Modern tool usage 9 Individual and Team-Work
2 Problem Analysis 6 Engineer and Society 10 Communication
3 Design / Development 7 Environment and 11 Project Management and
Solutions Sustainability Finance
4 Conduct Investigations of 8 Ethics 12 Life-long Learning
Complex problems

JOIN WHATSAPP CHANNEL


OR GROUP

Page 02 of 02

You might also like