Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

Explain in brief , what ‘multi-tenancy’ in the context of saas.

Mention three
significant characteristics of a typical saas solution.
Multi-tenancy means that a single instance of the software and its supporting
infrastructure serves multiple customers. Each customer shares the software
application and also shares a single database. Each tenant’s data is isolated and
remains invisible to other tenants.

Software-as–a-Service (SaaS) model allows to provide software


application as a service to the end users. It refers to a software that is
deployed on a host service and is accessible via Internet.

Characteristics
Here are the characteristics of SaaS service model:
 SaaS makes the software available over the Internet.
 The software applications are maintained by the vendor.
 The license to the software may be subscription based or usage based.
And it is billed on recurring basis.
 SaaS applications are cost-effective since they do not require any
maintenance at end user side.
 They are available on demand.
 They can be scaled up or down on demand.
 They are automatically upgraded and updated.
 SaaS offers shared data model. Therefore, multiple users can share
single instance of infrastructure. It is not required to hard code the
functionality for individual users.
 All users run the same version of the software.

What is virtualization? * Compare process-level and system-level virtualization with


respect to technique and virtualization model?

Virtualization is a technique, which allows to share a single physical instance of


a resource or an application among multiple customers and organizations. It
does by assigning a logical name to a physical storage and providing a pointer
to that physical resource when demanded.

A Process virtual machine, sometimes called an application virtual


machine, runs as a normal application inside a host OS and supports a single
process. It is created when that process is started and destroyed when it exits.
Its purpose is to provide a platform-
independent programming
environment that abstracts away
details of the underlying hardware
or operating system, and allows a
program to execute in the same way
on any platform.

The virtualization model of process


virtual machine is –

A System virtual machine provides


a complete system platform which
supports the execution of a
complete operating system
(OS),Just like you said VirtualBox is
one example.

The virtualization model of system


virtual machine is –

Describe Cloud Security Model as defined by Cloud Security Alliance.

What are the benefit of google adwords to the advertiser? What is cpc in context of
adwords ? what are the function of Google analytics ? how does it works for the
user ?

the benefit of Google adwords to the advertiser is –

 increase customer reach


 build customer awareness of your business and brand
 promote the benefits of your products or services
 communicate information about your business
 increase sales and demand
 gain an advantage over your competitors.
CPC is short for Cost-per-click (CPC) bidding means that you pay for
each click on your ads. For CPC bidding campaigns, you set a maximum cost-
per-click bid - or simply "max. CPC" - that's the highest amount that you're
willing to pay for a click on your ad (unless you're setting bid adjustments, or
using Enhanced CPC).

Google Analytics provides event reports that help you


understand how users interact with your app. With Cloud Functions, you can
access conversion events you have logged from Apple and Android devices and
trigger functions based on those events.

Here’s are some of its benefits:

 Measure your website’s performance


 See if your marketing efforts are working
 Which type of content to create or products to list on your website
 Divide users into different segments (like age, gender, country, device,
etc.)
 Optimize website pages to boost conversions

Google Analytics acquires user data from each website


visitor through the use of page tags. A JavaScript page tag is inserted into
the code of each page. This tag runs in the web browser of each visitor,
collecting data and sending it to one of Google's data collection servers.

With respect to the NIST Reference Model of Cloud Computing, explain the
following with suitabie schematic and examples:

Essential Characteristics

Service Models

Deployment Models

https://www.javatpoint.com/cloud-deployment-model
What is cloud computing ? Discuss three main advantages and rwo major
disadvantages and limitation of cloud computing with suitable exampies. ?
Describe key parameters used in a typical Cloud Service level Agreement.**

 The term cloud refers to a network or the internet.


 In the cloud computing, the term compute describes concepts and objects related to
software computation like processing power, memory, networking, storage, and
other resources required for the computational success of any program.
 Cloud Computing can be defined as storing and accessing data and computing
services over the internet
 It doesn’t store any data on your personal computer
 It is a technology that uses remote servers on the internet to store, manage, and
access data online rather than local drives
 The data can be anything such as files, images, documents, audio, video, and more
 It is the on-demand availability of computer services like servers, data storage,
networking, databases, etc
 The main purpose of cloud computing is to give access to data centers to many
users.
 Users can also access data from a remote server
Examples of Cloud Computing Services: AWS, Azure, Google Cloud

advantages of Cloud Computing-

1) Back-up and restore data Once the data is stored in the cloud, it is easier to get back-up
and restore that data using the cloud.
2) Improved collaboration Cloud applications improve collaboration by allowing groups of
people to quickly and easily share information in the cloud via shared storage.for Beginners
3) Excellent accessibility Cloud allows us to quickly and easily access store information
anywhere, anytime in the whole world, using an internet connection. An internet cloud
infrastructure increases organization productivity and efficiency by ensuring that our data is
always accessible.
4) Low maintenance cost Cloud computing reduces both hardware and software
maintenance costs for organizations.
5) Mobility Cloud computing allows us to easily access all cloud data via mobile.
6) IServices in the pay-per-use model Cloud computing offers Application Programming
Interfaces (APIs) to the users for access services on the cloud and pays the charges as per
the usage of service.
7) Unlimited storage capacity Cloud offers us a huge amount of storing capacity for storing
our important data such as documents, images, audio, video, etc. in one place.
8) Data security Data security is one of the biggest advantages of cloud computing. Cloud
offers many advanced features related to security and ensures that data is securely stored
and handled.
Disadvantages of Cloud Computing

1) Internet Connectivity As you know, in cloud computing, every data (image, audio, video,
etc.) is stored on the cloud, and we access these data through the cloud by using the
internet connection. If you do not have good internet connectivity, you cannot access these
data. However, we have no any other way to access data from the cloud.
2) Vendor lock-in Vendor lock-in is the biggest disadvantage of cloud computing.
Organizations may face problems when transferring their services from one vendor to
another. As different vendors provide different platforms, that can cause difficulty moving
from one cloud to another.
3) Limited Control. As we know, cloud infrastructure is completely owned, managed, and
monitored by the service provider, so the cloud users have less control over the function
and execution of services within a cloud infrastructure
4) Security Although cloud service providers implement the best security standards to store
important information. But, before adopting cloud technology, you should be aware that
you will be sending all your organization's sensitive information to a third party, i.e., a cloud
computing service provider. While sending the data on the cloud, there may be a chance
that your organization's information is hacked by Hackers.

There are two major Service Level Agreements (SLA) described:

1. Windows Azure SLA –


Window Azure has different SLA’s for compute and storage. For compute, there is a
guarantee that when a client deploys two or more role instances in separate fault and
upgrade domains, client’s internet facing roles will have external connectivity
minimum 99.95% of the time. Moreover, all of the role instances of the client are
monitored and there is guarantee of detection 99.9% of the time when a role
instance’s process is not runs and initiates properly.
2. SQL Azure SLA –
SQL Azure clients will have connectivity between the database and internet gateway of
SQL Azure. SQL Azure will handle a “Monthly Availability” of 99.9% within a month.
Monthly Availability Proportion for a particular tenant database is the ratio of the time
the database was available to customers to the total time in a month. Time is
measured in some intervals of minutes in a 30-day monthly cycle. Availability is always
remunerated for a complete month. A portion of time is marked as unavailable if the
customer’s attempts to connect to a database are denied by the SQL Azure gateway.

Explain the concepts of laas. PaaS. and SaaS. Use suitable examples and/or
appropriate schematic diagrams t0 , help establish your understanding. ***
1. IAAS: Infrastructure As A Service (IAAS) is means of delivering computing infrastructure
as on-demand services. It is one of the three fundamental cloud service models. The user
purchases servers, software data center space, or network equipment and rent those
resources through a fully outsourced, on-demand service model. It allows dynamic scaling
and the resources are distributed as a service. It generally includes multiple-user on a
single piece of hardware.

Example: DigitalOcean, Linode, Amazon Web Services (AWS), Microsoft Azure, Google
Compute Engine (GCE), Rackspace, and Cisco Metacloud.

2. PAAS: Platform As A Service (PAAS) is a cloud delivery model for applications composed
of services managed by a third party. It provides elastic scaling of your application which
allows developers to build applications and services over the internet and the deployment
models include public, private and hybrid.

Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine,
Apache Stratos, Magento Commerce Cloud, and OpenShift.

3. SAAS: Software As A Service (SAAS) allows users to run existing online applications and
it is a model software that is deployed as a hosting service and is accessed over Output
Rephrased/Re-written Text the internet or software delivery model during which software
and its associated data are hosted centrally and accessed using their client, usually an
online browser over the web. SAAS services are used for the development and
deployment of modern applications.

Example: BigCommerce, Google Apps, Salesforce, Dropbox, ZenDesk, Cisco WebEx,


ZenDesk, Slack, and GoToMeeting.

a) Virtualization in the context of laas.

b)Benefits of Virtualization.

c) Differences between "fuil virtualization' and "Para-virtualization"

d) Amazon Machine Images (AMI) use both types of virtualization,


namely.Hardware Virtual Machine (HVM) as well as Para-virtualization (PV).
Mention the respective situations in which AMi's can use PV or HVM
Benefits of virtualization is –

 Greater IT efficiencies.
 Reduced operating costs.
 Faster workload deployment.
 Increased application performance.
 Higher server availability.
 Eliminated server sprawl and complexity.
Full Virtualization
 In full virtualization, the underlying hardware is completely simulated. Guest
software does not require any modification to run.
Para virtualization
 In Paravirtualization, the hardware is not simulated. The guest software run their
own isolated domains.

Features Full Virtualization ParaVirtualization

Definition It is the first generation of The interaction of the guest operating system
software solutions for server with the hypervisor to improve performance
virtualization. and productivity is known as paravirtualization.

Security It is less secure than It is more secure than full virtualization.


paravirtualization.

Performance Its performance is slow than Its performance is high than full virtualization.
paravirtualization.

Guest OS It supports all the Guest OS The Guest OS has to be modified in


Modification without any change. paravirtualization, and only a few OS support it.

Guest OS It enables the Guest OS to run It enables the Guest OS to interact with the
hypervisor independently. hypervisor.
independent

Potable and It is more portable and It is less portable and compatible.


Compatible compatible.

Isolation It offers optimum isolation. It offers less isolation.

Efficient It is less efficient than It is more simplified than full virtualization.


paravirtualization.

Characteristic It is software based. It is cooperative virtualization.

Examples It is used in Microsoft, It is mainly used in VMware and Xen systems.


VMware, and Parallels
systems.
a) Describe key features of Amazon Elastic Component Cloud (EC2)**

b)What are the differences between Amazon Simple Storage Service (s3) and Elastic
Biock Storage (EBS)?

C ) What is Google APls? Mention broad categories of Google APis with suitable
examples. Name any two programming language environments that are
compatible with Google API.

(d) What does Googie App Engine do? Mention any two serices provided by it.

AWS S3 AWS EBS

The AWS EBS full form is


Amazon Elastic Block
The AWS S3 Full form is Amazon Simple Storage Service Store

AWS S3 is an object storage service that helps the industry in


scalability, data availability, security, etc. It is easy to use.

It has high-performance
AWS S3 is used to store and protect any amount of data for a block storage at every
range of use cases. scale

AWS S3 can be used to store data lakes, websites, mobile


applications, backup and restore big data analytics. ,
enterprise applications, IoT devices, archive etc. It is scalable.
It is also used to run
relational or NoSQL
AWS S3 also provides management features databases

Google Cloud APIs are programmatic interfaces to Google Cloud Platform services. They
are a key part of Google Cloud Platform, allowing you to easily add the power of everything
from computing to networking to storage to machine-learning-based data analysis to your
applications.

APIs are classified both according to their architecture and scope of use. We
have already explored the main types of API architectures so let’s take a look at the scope of
use.

Private APIs

These are internal to an enterprise and only used for connecting systems and data within
the business. . One example of a private API is Home-Cost, a home building cost calculator.

Public APIs

These are open to the public and may be used by anyone. There may or not be some
authorization and cost associated with these types of APIs. For example, Facebook provides
an open API that allows third-party tools to create photo albums or post to a user's news
feed.

Partner APIs

These are only accessible by authorized external developers to aid business-to-business


partnerships. eBays APIs is an example of a partner API.

Composite APIs

These combine two or more different APIs to address complex system requirements or
behaviors. One example might be if a user creates a new account in an eCommerce
application. The composite API might: Create a new User ID.

A REST API is an architectural style for an application program interface (API) that uses HTTP
requests to access and use data. That data can be used to GET, PUT, POST and DELETE data
types, which refers to the reading, updating, creating and deleting of operations concerning
resources.

Javascript, python , java ,c++ etc are compatible with google apis.

Google App Engine is a fully managed, serverless platform for developing and hosting web
applications at scale. You can choose from several popular languages, libraries, and
frameworks to develop your apps, and then let App Engine take care of provisioning servers
and scaling your app instances based on demand.

Write a short note about this topics

(a) Amazon AWS

b) Cloud Cube Model of Cloud Computing

(c) Google GWT

(d) Microsoft SQL Azure

e) Virtual Machine Monitor (VMM)

f) EC2

g) windows Azure Service

h)P2V ,D2C

 AWS stands for Amazon Web Services.


 The AWS service is provided by the Amazon that uses distributed IT infrastructure to
provide different IT resources available on demand. It provides different services such
as infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software
as a service (SaaS).
 Amazon launched AWS, a cloud computing platform to allow the different organizations
to take advantage of reliable IT infrastructure.
 Uses of AWS :

o A small manufacturing organization uses their expertise to expand their business by


leaving their IT management to the AWS.
o A large enterprise spread across the globe can utilize the AWS to deliver the training
to the distributed workforce.
o An architecture consulting company can use AWS to get the high-compute rendering
of construction prototype.
o A media company can use the AWS to provide different types of content such as
ebox or audio files to the worldwide files.

 AWS works : AWS usually works in several different configurations depending on the
user's requirements. However, the user must be able to see the type of configuration
used and the particular server map with respect to the AWS service.

Cloud Computing provides a massive


possibility of scalability and has immediate availability at a low cost. There is a popular
Model in Cloud Computing, and it is known as The Cloud Cube Model. This popular model
was launched by Jericho Forum, and it is mainly used for allowing safe and secure
collaboration with suitable cloud formations which are best for the business requirements.
Let us learn more about Cloud Cube Model.

 Cloud Cube model, helps to categorize the cloud network based on the four-
dimensional factor.
 Their main focus is to protect and secure the cloud network.
 This cloud cube model helps to select cloud formation for secure collaboration.
 This model helps IT managers, organizations, and business leaders by providing the
secure and protected network.

Amazon EC2 (Elastic Compute Cloud) is a web service interface that


provides resizable compute capacity in the AWS cloud. It is designed for developers to have
complete control over web-scaling and computing resources.

EC2 instances can be resized and the number of instances scaled up or down as per our
requirement. These instances can be launched in one or more geographical locations or
regions, and Availability Zones (AZs). Each region comprises of several AZs at distinct
locations, connected by low latency networks in the same region.
Features of EC2
Here is a list of some of the prominent features of EC2 −
Reliable − Amazon EC2 offers a highly reliable environment where replacement of
instances is rapidly possible. Service Level Agreement commitment is 99.9%
availability for each Amazon EC2 region.
Designed for Amazon Web Services − Amazon EC2 works fine with Amazon services
like Amazon S3, Amazon RDS, Amazon DynamoDB, and Amazon SQS. It provides a
complete solution for computing, query processing, and storage across a wide range
of applications.
Secure − Amazon EC2 works in Amazon Virtual Private Cloud to provide a secure and
robust network to resources.
Flexible Tools − Amazon EC2 provides the tools for developers and system
administrators to build failure applications and isolate themselves from common
failure situations.
Inexpensive − Amazon EC2 wants us to pay only for the resources that we use. It
includes multiple purchase plans such as On-Demand Instances, Reserved Instances,
Spot Instances, etc. which we can choose as per our requirement.

Google Web Toolkit (GWT) is a development toolkit to create RICH


Internet Applications (RIA). Here are some of its notable features −

 GWT provides developers option to write client side application in JAVA.


 GWT compiles the code written in JAVA to JavaScript code.
 Application written in GWT is cross-browser compliant. GWT automatically generates
javascript code suitable for each browser.
 GWT is open source, completely free, and used by thousands of developers around the
world. It is licensed under the Apache License version 2.0.
Overall, GWT is a framework to build large scale and high performance web appliation while
keeping them as easy-to-maintain.

A Virtual Machine Monitor (VMM) is a


software program that enables the creation, management and governance of virtual
machines (VM) and manages the operation of a virtualized environment on top of a physical
host machine.
VMM is also known as Virtual Machine Manager and Hypervisor. However, the provided
architectural implementation and services differ by vendor product.

VMM is the primary software behind virtualization environments and implementations.


When installed over a host machine, VMM facilitates the creation of VMs, each with
separate operating systems (OS) and applications. VMM manages the backend operation of
these VMs by allocating the necessary computing, memory, storage and other input/output
(I/O) resources.
VMM also provides a centralized interface for managing the entire operation, status and
availability of VMs that are installed over a single host or spread across different and
interconnected hosts.

Microsoft Azure is a platform as a service (PaaS) solution for


building and hosting solutions using Microsoft’s products and in their data centers. It is a
comprehensive suite of cloud products that allow users to create enterprise-class
applications without having to build out their own infrastructure.

The Azure Service Platform is comprised of three cloud centric products: Windows Azure,
SQL Azure and Azure App Fabric controller. These are in addition to the application hosting
infrastructure facility.

The Azure Service Platform is a big part of Microsoft’s cloud computing initiatives. It is
designed specifically for the cloud.

Microsoft Azure includes Windows Azure, which is a cloud specific OS designed to provide
scalable compute and storage services. It is supported by Azure App Fabric, which is a
collection of different tools for supporting applications in the cloud. SQL Azure enables
storage, as well as management of data, similar to the conventional relational database
services of an SQL server.

Microsoft Azure is a growing set of cloud computing


services created by Microsoft that hosts your existing applications, streamline the
development of a new application, and also enhances our on-premises applications. It helps
the organizations in building, testing, deploying, and managing applications and services
through Microsoft-managed data centers.

Azure Services
o Compute services: It includes the Microsoft Azure Cloud Services, Azure Virtual
Machines, Azure Website, and Azure Mobile Services, which processes the data on
the cloud with the help of powerful processors.
o Data services: This service is used to store data over the cloud that can be scaled
according to the requirements. It includes Microsoft Azure Storage (Blob, Queue
Table, and Azure File services), Azure SQL Database, and the Redis Cache.
o Application services: It includes services, which help us to build and operate our
application, like the Azure Active Directory, Service Bus for connecting distributed
systems, HDInsight for processing big data, the Azure Scheduler, and the Azure
Media Services.
o Network services: It helps you to connect with the cloud and on-premises
infrastructure, which includes Virtual Networks, Azure Content Delivery Network,
and the Azure Traffic Manager.
What is a hypervisor ? Explain the types of hypervisor. Explain what is meant by
Identity as a service. 1+2 +2 **
A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and
runs virtual machines (VMs). A hypervisor allows one host computer to support multiple
guest VMs by virtually sharing its resources, such as memory and processing.

Hypervisor:
 A hypervisor is a software that  It acts as a connection between
allows you to create a virtual layer the physical system and virtual
over the hardware system machines to ensure the proper
 It manages the interaction access of the hardware resources
between the virtual machines and
the system's hardware resources.
 They are installed as any other
software application in the system
and perform the task of
virtualization.

 Type 1 is called a bare metal


Types of Hypervisor: Hypervisor which is directly
Type1/Bare Metal: installed on physical servers.
 It offers high-performance and
lower resource usage. Example:
 This type of hypervisor interacts VMware ESXi, Xen Servers, Hyper-
directly with the hardware V
resources of the system,
 It is replacing the host operating
system, i.e., it is also known as a
bare-metal hypervisor

Type2 (Hosted)

 And it also coordinates with the


virtual machines for hardware
resource management
 This type of hypervisor will be
installed as an application.
 This type of hypervisor runs as a  It offers moderate performance.
software application on the host  But it’s very easy to setup and
operating system. manages the environment.
 Example: VMware Workstation,
Oracle Virtual Box

What are the two different kinds of cloud service offerings by Google ? What is
disintermediation ?
Platform as a service (PaaS) and Infrastucture as a Service(IaaS).

The term disintermediation refers to the process of cutting out the financial
intermediary in a transaction. It may allow a consumer to buy directly from a wholesaler
rather than through an intermediary such as a retailer, or enable a business to order
directly from a manufacturer rather than from a distributor. In the financial industry, it is
seen when an investor is able to buy stock directly rather than through a broker or a
financial institution. The purpose of disintermediation is usually to cut costs, speed up
delivery, or both.

KEY TAKEAWAYS

 Disintermediation is the process of cutting out one or more middlemen from a


transaction, supply chain, or decision-making process.
 The usual reasons for disintermediation are to reduce costs or increase delivery
speed.
 In financial terms, disintermediation involves the removal of banks, brokers, or
other third parties, allowing individuals to transact or invest directly.
 Cryptocurrencies are disintermediating the financial sector and government from
monetary transactions.
 The process doesn't always work because it requires additional staffing and other
resources to replace the services supplied by an intermediary.

What are typlcal features of an ESB ? What are the different types of catalogue
services ?

 EBS stands for Elastic Block Store.


 EC2 is a virtual server in a cloud while EBS is a virtual disk in a cloud.
 Amazon EBS allows you to create storage volumes and attach them to the EC2
instances.
 Once the storage volume is created, you can create a file system on the top of these
volumes, and then you can run a database, store the files, applications or you can
even use them as a block device in some other way.
 Amazon EBS volumes are placed in a specific availability zone, and they are
automatically replicated to protect you from the failure of a single component.
 EBS volume does not exist on one disk, it spreads across the Availability Zone. EBS
volume is a disk which is attached to an EC2 instance.
 EBS volume attached to the EC2 instance where Windows or Linux is installed is
known as the Root device of volume.

There are two types of service catalogues business service


catelog and technical service catelogs .

what are the different factors to be considered while choosing a database for AWS
?

The optimal database solution for a system varies based on requirements


for availability, consistency, partition tolerance, latency, durability, scalability, and query
capability. Many systems use different database solutions for various subsystems and
enable different features to improve performance. Selecting the wrong database solution
and features for a system can lead to lower performance efficiency.

Best Practices:

 Understand data characteristics: Understand the different characteristics of data in


your workload. Determine if the workload requires transactions, how it interacts
with data, and what its performance demands are. Use this data to select the best
performing database approach for your workload (for example, relational
databases, NoSQL Key-value, document, wide column, graph, time series, or in-
memory storage).

 Evaluate the available options: Evaluate the services and storage options that are
available as part of the selection process for your workload's storage mechanisms.
Understand how, and when, to use a given service or system for data storage. Learn
about available configuration options that can optimize database performance or
efficiency, such as provisioned IOPs, memory and compute resources, and caching.

 Collect and record database performance metrics: Use tools, libraries, and systems
that record performance measurements related to database performance. For
example, measure transactions per second, slow queries, or
system latency introduced when accessing the database. Use this data to understand
the performance of your database systems.

 Choose data storage based on access patterns: Use the access patterns of
the workload to decide which services and technologies to use. For example, utilize
a relational database for workloads that require transactions, or a key-value store
that provides higher throughput but is eventually consistent where applicable.

 Optimize data storage based on access patterns and metrics:


Use performance characteristics and access patterns that optimize how data is
stored or queried to achieve the best possible performance. Measure how
optimizations such as indexing, key distribution, data warehouse design, or caching
strategies impact system performance or overall efficiency.

Write a brief note on cloud ecosystem along with examples. 8


A cloud ecosystem is a complex system of interdependent components that all work
together to enable cloud services. In nature, an ecosystem is composed of living and
nonliving things that are connected and work together. In cloud computing, the ecosystem
consists of hardware and software as well as cloud customers, cloud engineers, consultants,
integrators and partners.

The center of a cloud ecosystem is a public cloud provider. It might be an IaaS provider such
as Amazon Web Services (AWS) or a SaaS vendor such as Salesforce. Radiating out from the
center of the cloud are software companies that use the provider's anchor platform, as well
as consultants and companies that have formed strategic alliances with the anchor provider.

Some examples are as follows:


 IaaS providers: IBM SmartCloud Enterprise, Amazon Elastic Compute Cloud
(EC2),RackSpace Hosting, Microsoft
 SaaS providers: Google, Microsoft, SalesForce, Yahoo
 PaaS providers: Google, Microsoft, TIBCO, VMware, Zoho

What is dark web ? Write down the difference b) between deep web and dark web.
Explain the concept of Google Ad words. 2+2+ 3 **
Deep Web: It is the web that cannot be accessed by the search engines, like government
private data, bank data, cloud data, etc. These data are sensitive and private, so kept out of
reach. It is used to provide access to a specific group of people. On the dark Web, users do
intentionally bury data.
Dark Web: The dark web refers to encrypted online content that is not indexed by
conventional search engines. Darknet provides a user with anonymity but service was
introduced that allowed someone to host a website on the darknet and remain anonymous.
This attracted people who do illegal stuff to sell things without getting caught.

Key Deep Web Dark Web

The dark web is that part of the world wide


The deep web is that part of web where the data resides on the
the world wide web where the darknet. One needs to have specialized
Concept
contents cannot be indexed by software, configurations or authorization
search engines. access to access the data on the Dark
Web.

The deep web is used by The dark web is a hub of illegal activities.
Usage organizations like banks, All kinds of criminals remain active on the
corporates, etc. dark web.

The contents of Dark Web are accessible


The contents of Deep Web are
on personal networks/peer to peer
Indexing not indexed by a search
configurations, with special authorization
engine.
access.

Websites are invisible to the Dark Web is not regulated and the IP
Regulation world as public access is not addresses remain hidden.
enabled.

One can access the contents of One needs to have a specific set of
Deep Web with a valid software to access the contents of Dark
Access username/password or other Web.
such authentication
mechanisms.

AdWords is an advertising system Google developed to help businesses reach online target
markets through its search engine platform and partner sites. These partner sites host a text
or image ad that appears on the page after a user searches for keywords and phrases elated
to a business and its products or services. On Google.com, AdWords ads typically appear in
specific locations at the top and right-hand side of a search results page. You can choose
keywords related to your brand, products, services and industry for your AdWords account.
When customers search for these phrases, your store's ad will be served to them. You only
pay when a user clicks on your ad and visits your website or calls your business using "click
to call."

Explain the protocol stack for Service Orlented Architecture (SOA) with a neat
diagram. 8
A Service-Oriented Architecture or SOA is a design pattern which is designed to build
distributed systems that deliver services to other applications through the protocol. It is only
a concept and not limited to any programming language or platform.

SOA architecture is viewed as five horizontal layers. These are described below:

 Consumer Interface Layer: These are GUI based apps for end users accessing the
applications.
 Business Process Layer: These are business-use cases in terms of application.
 Services Layer: These are whole-enterprise, in service inventory.
 Service Component Layer: are used to build the services, such as functional and
technical libraries.
 Operational Systems Layer: It contains the data model.

Here lies the protocol stack of SOA showing each protocol along with their relationship
among each protocol. These components are often programmed to comply with SCA
(Service Component Architecture), a language that has broader but not universal industry
support. These components are written in BPEL (Business Process Execution Languages),
Java, C#, XML etc and can apply to C++ or FORTRAN or other modern multi-purpose
languages such as Python, PP or Ruby. With this, SOA has extended the life of many all-time
famous applications.

Explain cloud computing security architecture. 8


Cloud security architecture describes all the hardware and technologies designed to protect
data, workloads, and systems within cloud platforms. Developing a strategy for cloud
security architecture should begin during the blueprint and design process and should be
integrated into cloud platforms from the ground up.

Cloud Security Core Capabilities

Secure cloud computing architecture encompasses three core capabilities: confidentiality,


integrity, and availability. Understanding each capability will help guide your efforts in
planning a more secure cloud deployment.
 Confidentiality is the ability to keep information secret and unreadable to the
people who shouldn’t have access to that data, such as attackers or people inside an
organization without the proper access level. Confidentiality also includes privacy
and trust, or when a business pledges secrecy in handling their customers’ data.
 Integrity is the idea that the systems and applications are exactly what you expect
them to be, and function exactly as you expect them to function. If a system or
application has been compromised to produce an unknown, unexpected, or
misleading output, this can lead to losses.
 Availability is the third capability and is generally the least considered by cloud
architects. Availability speaks to denial-of-service (DoS) attacks. Perhaps an attacker
can’t see or change your data. But if an attacker can make systems unavailable to
you or your customers, then you can’t carry out tasks that are essential to maintain
your business.

What is Life Cycle of Cloud Computing? Explain. 7


To create such a cloud platform it takes a long number of steps and dedicated time. Let’s
now look at the steps involved or the lifecycle of cloud computing solutions.
Step 1: Define the Purpose
The first and foremost step is to define the purpose for which you want to create a cloud.
For this, you have first to understand your business requirement and what type of
application you want to run on the cloud. After this, you have to decide whether you want
your cloud to be public, private, or hybrid.
Step 2: Define the Hardware
Deciding what type of hardware you will need is the most thought after the process. One
needs to be very precise in making the decision. For this, you will have to choose the
compute service that will provide the right support when you resize your compute
capacity to maintain your application running.
Step 3: Define the Storage
Every application needs a good amount of storage where it’s data can be stored safely. For
any application storage type that should be chosen carefully for this one should choose
the storage service where they can back up and archive their data over the internet.
Step 4: Define the Network
Networking is the key that will deliver your data to the end-users. So, the network must be
configured sincerely and should be flawless so that intruders can not break into the
network. One should define the network that securely delivers data, videos, and
applications with low latency and high transfer speed.
Step 5: Define the Security
Security is a key aspect of any application. Set up your security service which enables
services for user authentication or limiting access to a certain set of users on your
resources.
Step 6: Define the Management Process and Tools
The developer should have complete control over there resource and to configure these
you should define some management tools which monitor your cloud environment,
resources used, and the customer application running on it.
Step 7: Testing the Process
Testing is yet another important thing in the life cycle of deploying any application. All the
faults can figure out only through the testing process involved in it. During testing, you
should verify your application using various developer tools where you build, test, and
deploy your code quickly.
Step 8: Analytics
Finally, analyze and visualize data using analytics service where you can start querying
data instantly and get results then and there only. Once analyzing is done complete, your
application becomes ready you deploying.

Write about Load Balancing. 3


Introduction:
 Load balancing is the practice of distributing computational workloads
between two or more computers.
 On the Internet, load balancing is often employed to divide network traffic
among several servers.
 This reduces the strain on each server and makes the servers more efficient,
speeding up performance and reducing latency.
 Load balancing is essential for most Internet applications to function
properly

Let’s take one real life scenario to understand this concept:

Imagine a checkout line at a grocery store with 8 checkout lines, only one of which is open.
All customers must get into the same line, and therefore it takes a long time for a customer
to finish paying for their groceries. Now imagine that the store instead opens all 8 checkout
lines. In this case, the wait time for customers is about 8 times shorter (depending on
factors like how much food each customer is buying).

Load balancing essentially accomplishes the same thing. By dividing user requests among
multiple servers, user wait time is vastly cut down. This results in a better user experience —
the grocery store customers in the example above would probably look for a more efficient
grocery store if they always experienced long wait times.
What are the difference between Private Cloud and Public Cloud? 5

Public Cloud Private Cloud

Cloud Computing infrastructure is


Cloud Computing infrastructure is shared with the shared with private organizations
public by service providers over the internet. It by service providers over the
supports multiple customers i.e, enterprises. internet. It supports one enterprise.

Multi-Tenancy i.e, Data of many enterprises are


stored in a shared environment but are isolated. Single Tenancy i.e, Data of a single
Data is shared as per rule, permission, and security. enterprise is stored.

Cloud service provider provides all the possible


services and hardware as the user-base is the
world. Different people and organizations may Specific services and hardware as
need different services and hardware. Services per the need of the enterprise are
provided must be versatile. available in a private cloud.

It is hosted at the Service Provider


It is hosted at the Service Provider site. site or enterprise.

It only supports connectivity over


It is connected to the public internet. the private network.

Scalability is limited, and reliability


Scalability is very high, and reliability is moderate. is very high.

Cloud service provider manages the cloud and Managed and used by a single
customers use them. enterprise.

It is cheaper than the private cloud. It is costlier than the public cloud.

Security matters and dependent on the service


provider. It gives a high class of security.

Performance is low to medium. Performance is high.

It has shared servers. It has dedicated servers.

Example: Amazon web service (AWS) and Google Example: Microsoft KVM, HP, Red
Public Cloud Private Cloud

AppEngine etc. Hat & VMWare etc.

What are the differences between Vertical Scaling and Horizontal Scaling? 5
Scaling alters size of a system. In the scaling process, we either compress or expand the
system to meet the expected needs. The scaling operation can be achieved by adding
resources to meet the smaller expectation in the current system, or by adding a new
system in the existing one, or both.

Difference between Horizontal and Vertical Scaling:

Horizontal Scaling Vertical Scaling

When new server racks are added in the When new resources are added in the
existing system to meet the higher existing system to meet the expectation, it
expectation, it is known as horizontal scaling. is known as vertical scaling

It expands the size of the existing system It expands the size of the existing system
horizontally. vertically.

It is harder to upgrade and may involve


It is easier to upgrade. downtime.

It is difficult to implement It is easy to implement

It is costlier, as new server racks comprises of It is cheaper as we need to just add new
a lot of resources resources

It takes more time to be done It takes less time to be done

a) Write about VMware's vSphere Cloud Computing Infrastructure Model. (b) What
are the advantages of Virtualizations? 9+6=15
VMware Infrastructure is a complete infrastructure virtualization suite offering
comprehensive:

 Virtualization.
 Centralized Management.
 Resource Optimization.
 Application Availability.
 Operational Automation Capabilities.

VMware infrastructure aggregates the underlying physical hardware resources across


multiple systems and provides pools of virtual resources to the virtual environment.
VMware Infrastructure offers a set of distributed services that allows high availability,
consolidated backup of your entire virtual datacenter, and concentrated policy-driven
resource allocation. In addition, these distributed services enable organizations to establish
and cost-effectively meet their production goals.
Advantages of virtualization is –

 Reduced upfront hardware and continuing operating costs


 Minimized or eliminated downtime
 Increased IT productivity and responsiveness
 Greater business continuity and disaster recovery response
 Simplified data center management
 Faster provisioning of applications and resources

You might also like