Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

UNIT-3

1. Define the role and benefit of virtualization in cloud.(Nov/Dec 2021)


Virtualization in Cloud Computing is making a virtual platform of server
operating system and storage devices. This will help the user by providing multiple
machines at the same time it also allows sharing a single physical instance of resource or
an application to multiple users.

2. What is disaster recovery.(Nov/Dec 2021)


Disaster recovery as a service(DRaaS) is a cloud computing service model that
allows an organization to back up its data and IT infrastructure in a third party cloud
computing environment and provide all the DR orchestration, all through a SaaS solution

3. Differentiate public and private cloud?(Nov/Dec 2020)


public private
Cloud computing that's delivered via the A cloud service that is not shared with any
internet and shared across organizations other organization
Cost low Cost high
Less secure More secure

4. summarize the benefits and drawbacks of using “platform as a service”?

(Nov/Dec 2020)
Cost Effective: No need to purchase hardware or pay expenses during
downtime. Time Savings: No need to spend time setting up/maintaining the core
stack. Speed to Market: Speed up the creation of apps. Future-Proof: Access to state-
of-the-art data center, hardware and operating systems.
5. Although virtualization widely accepted today, it does have its limits:. Comment
on the statement
VIRTUALIZATION HAS BEEN increasingly used for leveraging
underutilized compute resources, but there are questions about whether we are trying
to use virtual machines (VMs) in situations for which they were not intended. Virtual
computing has a much longer history than most imagine. Like many technological
approaches that have been repurposed over time (Tag Switching/Multiprotocol Label
Switching, or MPLS, comes to mind), virtual computing initially had a different value
proposition, enabling legacy applications to execute on modern systems/
Server virtualization has many perks but keep its limitations in mind. This
excerpt from "Advanced Server Virtualization" gives examples of when server
virtualization is not the best practice.
6. List the requirements of VMM
 Windows Server 2008 R2 Standard, Enterprise or Datacenter with SP1.
 Windows Remote Management (WinRM) 2.0 – a part of W2008 R2.
 .NET 3.5 with SP1 (a feature in W2008 R2)
 WAIK for Windows 7

7. Distinguish between physical and virtual clusters


physical cluster  Virtual clusters 
A physical cluster is a collection Virtual clusters have different properties
of servers (physical machines) connected and potential applications
by a physical network such as a LAN

8. Mention the characteristics features of the cloud.


 Homogeneity
 Virtualization
 Resilient computing
 Low cost software
 Service orientation
 Advanced security technologies.

9. Summarize the differences between PaaS and SaaS.

PaaS(Platform as a service) SaaS(software as a service)


The SaaS model applies to
It includes middleware, database,
business process industry
development tools and some runtime
application, consumer relationship
support such as web2.0 and java. It
management (CRM), Enterprise
includes both hardware and software
resource Planning (ERP), Human
integrated with specific programming
Resources (HR) and collaborative
interface.
application.
The Platform as a Service model The software as a service refers to
enables the user to deploy user built browser initiated application
applications onto a virtualized cloud software over thousands of paid
platform. customer.

10. Give the role of VM.


Virtual machine is a representation of a real machine using software that provides
an operating environment which can run or host a guest operating system. Virtual
machine are created and managed by virtual machine monitors.

11. Why do we need hybrid cloud?


A hybrid cloud is built with both public and private clouds; Private clouds can
also support a hybrid cloud model by supplementing local infrastructure with computing
capacity from an external public cloud. For example, the research compute cloud (RC2) is
a private cloud built by IBM.

12. What are the types of hypervisor?


There are two types of hypervisors
 Type 1 hypervisors run directly on the system hardware. They are often referred to as
a "native" or "bare metal" or "embedded" hypervisors in vendor literature.
 Type 2 hypervisors run on a host operating system. When the virtualization
movement first began to take off, Type 2 hypervisors were most popular.
Administrators could buy the software and install it on a server they already had.

13. What is Hypervisor?


A hypervisor or virtual machine monitor (VMM) is a piece of computer software,
firmware or hardware that creates and runs virtual machines. A computer on which a
hypervisor is running one or more virtual machines is defined as a host machine. Each
virtual machine is called a guest machine.

14. What is cloud computing and what are its deployment models?
Cloud computing is a type of computing that mainly depends on resource sharing
instead of handling applications by local servers or individual devices.
Deployment models are
 Private cloud
 Community cloud
 Public cloud
 Hybrid cloud

15. List the advantages and disadvantages of cloud service deployment.


Advantages
 Economy of scale
 Utilization of the full resources
 Less up - front investment
Disadvantages
 Security
 Need redundancy tool
 No physical backup

16. What are the advantages and disadvantages of cloud computing?


Advantages
 Improved performance
 Less maintenance cost
 Increased computing power
 Increased data safety
Disadvantages
 Can be slow
 Requires a constant internet connection
 Stored data might not be secure
 Low speed connection

17. Explain PaaS?


The Platform as a Service model enables the user to deploy user built applications
onto a virtualized cloud platform. It includes middleware, database, development tools
and some runtime support such as web2.0 and java. It includes both hardware and
software integrated with specific programming interface.

18. What is the working principle of Cloud Computing?


The cloud is a collection of computers and servers that are publicly accessible via
the This hardware is typically owned and operated by a third party on a consolidated basis
in one or more data center locations. The machines can run any combination of operating
systems.

19. What is Virtualization?


Virtualization is the construction of a virtual rather than actual version of
something such as an operating system, a server, a storage device or network resources.
20. Define Cloud services with example.
Any web-based application or service offered via cloud computing is called
a cloud. Cloud services can include anything from calendar and contact applications to
word processing and presentations.

21. Explain cloud provider and cloud broker?


Cloud Provider
Is a company that offers some component of cloud computing typically
infrastructure as a service, software as a Service or Platform as a Service. It is
something referred as CSP.
Cloud Broker
It is a third party individual or business that act as an intermediary between the
purchase of cloud computing service and sellers of that service.

22. Define - Private Cloud.


The private cloud is built within the domain of an intranet owned by a single
organization. Therefore, they are client owned and managed. Their access is limited to the
owning clients and their partners. Their deployment was not meant to sell capacity over
the Internet through publicly accessible interfaces. Private clouds give local users a
flexible and agile private infrastructure to run service workloads within their
administrative domains.

23. Define - Public Cloud.


A public cloud is built over the Internet, which can be accessed by any user who
has paid for the service. Public clouds are owned by service providers. They are accessed
by subscription. Many companies have built public clouds, namely Google App Engine,
Amazon AWS, Microsoft Azure, IBM Blue Cloud, and Sales force Force.com. These are
commercial providers that offer a publicly accessible remote interface for creating and
managing VM instances within their proprietary infrastructure.

24. Define - Hybrid Cloud.


A hybrid cloud is built with both public and private clouds; Private clouds can
also support a hybrid cloud model by supplementing local infrastructure with computing
capacity from an external public cloud. For example, the research compute cloud (RC2) is
a private cloud built by IBM.

25. Define anything-as-a-service?


Providing services to the client on the basis on meeting their demands at some pay
per use cost such as data storage as a service, network as a service, communication as a
service etc. It is generally denoted as anything as a service (XaaS).

26. What is mean by SaaS?


The software as a service refers to browser initiated application software over
thousands of paid customer. The SaaS model applies to business process industry
application, consumer relationship management (CRM), Enterprise resource Planning
(ERP), Human Resources (HR) and collaborative application.

27. What is mean by IaaS?


The Infrastructure as a Service model puts together the infrastructure demanded
by the user namely servers, storage, network and the data center fabric. The user can
deploy and run on multiple VM’s running guest OS on specific application.

28. Explain PaaS?


The Platform as a Service model enables the user to deploy user built applications
onto a virtualized cloud platform. It includes middleware, database, development tools
and some runtime support such as web2.0 and java. It includes both hardware and
software integrated with specific programming interface.

29. List out the types of virtualization.


 Network virtualization
 Storage virtualization
 Server virtualization

30. What are the various key attributes of cloud?


 Shared/pooled resources
 Broad network access
 On demand self services
 Scalable and elastic
 Metered by use

31. How cloud deployment model differs from each other?


Cloud hosting deployment models represent the exact categories of cloud
environment and are mainly distinguished by the proprietorship, size and access. It
defines about the purpose and the nature of the cloud.

32. What is the purpose of hypervisor?


A hypervisor is a virtual machine manager/ monitor (VMM0, or virtualization
manager. It is a program that allows multiple operating systems to share a single
hardware host.

33. Define intrusion.


Intrusions are unauthorized access to a certain computer from local or network
users and intrusion detection is used to recognize the unauthorized access.

34. Define intrusion detection.


Intrusion detection is built on operating systems, and is based on the
characteristics of intrusion actions. A typical IDS can be classified as a host based IDDS
or a network based IDS, depending o the data source.

35. Define VM based intrusion detection.


Virtualization based intrusion detection can isolate guest VMs on the same
hardware platform. The VM based IDS contains a policy engine and a policy module.

36. Explain the work of instance, group and cloud manager in virtual networking of
private cloud.
Instance manger controls the execution, inspection and termination of VM instances on the
host where it runs.
Group manager gathers information about and schedules VM execution on specific instance
managers, as well as manages virtual instance network.
Cloud manager is the entry point into cloud for users and administrators.

37. Define CR/TR motion.


A checking recovery/trace replay approach (CR/TR motion) is proposed to
provide fast VM migration. This approach transfers the execution trace file in iterations
rather than dirty pages, which logged by a trace daemon.

38. How to manage the virtual cluster.


There are four ways to manage the virtual cluster:
 We can use a guest based manager.
 We can build a cluster manager.
 To use an independent cluster.
 We can use an integrated cluster.

39. How to divide the critical instructions in CPU virtualization?


The critical instructions are divided into three categories
 Privileged instruction
 Control sensitive instructions
 Behavior sensitive instruction.

40. Define KVM.


Kernel based VM is a Linux Para virtualization system a part of the Linux version
2.6.20 kernel. KVM is a hardware assisted Para virtualization tool, which improves
performance and supports unmodified guest OSes such as windows , Linux, Solaris and
other UNIX variants.

41. What are the major categories available in hardware virtualization?


Hardware virtualization can be classified into two categories:
 Full virtualization
 Host based virtualization.

42. Explain micro kernel hypervisor.


A micro kernel hypervisor includes only basic and unchanging functions like
physical memory management and processor scheduling. Device drivers and other
changeable components are outside hypervisor.

43. Explain monolithic hypervisor.


Monolithic hypervisor implements all the functions, including those of device
drivers. It must be able to convert physical devices into virtual resources dedicated for
deployed VM to use.

44. What are the ways available to implement virtual root directories?
 Duplicating common resources to each VM partitions
 Sharing most resources with the host environment and only creating private resources
copies on the VM on demand.

45. What are the requirements needs for VMM?


 VMM should provide an environment for program
 Program run in this environment should show
 VMM should be in complete of the system resources.

46. What are the varieties of private cloud pattern?


 Dedicated
 Community
 Managed

47. As an infrastructure as a service what are the resources that are provided by it?
Infrastructure as a service provides virtual and physical resources that are used to
build a cloud. It deals with the complexities of deploying and maintaining of the services
provided by this layer.

48. What are the advantages of public cloud?


 It saves capital cost behind purchasing the server hardware, operating system and
application software licenses.
 No training is required to use or access the cloud services.

49. Define database as a service.


Database as a service is cloud based approach for storage and management of
structure data. The database as a service delivers similar functionality as like relational
database management system such as ORACLE, MYSQL etc.

50. Define storage as a service.


It is an outsource model which allows organizations to store their data on rented
storage space at remote lacation.teh storage as a service providers rent their storage space
to the organization on a cost per gigabyte stored or cost per data transfer basis.

51. Define instruction set architecture level.


Virtualization at the instruction set architecture level is implemented by emulating
an instruction set architecture completely on software stack. Theses instruction would
include both processor oriented and I/O specific instructions for the devices.

52. Define memory virtualization.


 The memory virtualization involves physical memory to be shared and dynamically
allocated to virtual machine.
 The virtualized memory is seen by the application as a contiguous address space
which is not tied to the underlying physical memory in the system.

53. List the Different level of virtualization?


 Instruction set architecture level
 Hardware abstraction layer
 Operating system level virtualization
 Library level virtualization
 Application level virtualization

You might also like