Professional Documents
Culture Documents
JIT9010
JIT9010
Seventh Semester
(Regulation 2019)
Answer ALL questions
2. ● Internet
Technologies
3. ● Hardware
4. ● System Management
5. ● Distributed
Computing
The roots of cloud computing are sub-divided into four types.
Internet Technologies
Hardware
System Management
Distributed Computing
2. What is the use of a cloud computing?
3. What is a cloud-hypervisor?
The hypervisor is generally a program or a combination of software and hardware that
allow the abstraction of the underlying physical hardware.
Hypervisors is a fundamental element of hardware virtualization is the hypervisor, or
virtual machine manager (VMM).
4. Define virtualization.
6. Define IaaS.
Infrastructure or Hardware-as-a-Service (IaaS/HaaS) solutions are the most popular and
developed market segment of cloud computing. They deliver customizable infrastructure on
demand.
Reduce: A reducer cannot start while a mapper is still in progress. Worker nodes process each
group of <key,value> pairs output data, in parallel to produce <key,value> pairs as output. All
the map output values that have the same key are assigned to a single reducer, which then
aggregates the values for that key. Unlike the map function which is mandatory to filter and
sort the initial data, the reduce function is optional.
PART B – (5 × 16 = 80 marks)
Or
b. Sketch and give details about convergence of various advances leading to the advent
of cloud computing.
The convergence of various technological advances has played a crucial role in the
development and widespread adoption of cloud computing. Here's a sketch of the key
factors and details contributing to this convergence:
Advancements in Networking:
Evolution of Internet Protocols: The development of reliable and scalable internet protocols,
especially Transmission Control Protocol (TCP) and Internet Protocol (IP), laid the
foundation for seamless communication over the internet.
High-Speed Connectivity: The expansion of high-speed broadband and the deployment of
fiber-optic networks globally improved data transfer speeds and reduced latency, making
it feasible to access and transmit large volumes of data.
Virtualization Technology:
Server Virtualization: Technologies like VMware and Xen allowed multiple virtual machines
to run on a single physical server, optimizing hardware utilization and paving the way for
scalable and flexible cloud infrastructure.
Storage Virtualization: Virtualizing storage resources enabled dynamic allocation and
efficient management of data storage across diverse physical devices.
Distributed Computing Concepts:
Grid Computing: Concepts from grid computing provided insights into distributed resource
management, enabling the seamless integration of computing resources across multiple
locations.
Parallel Processing: Advances in parallel processing techniques allowed for the efficient
utilization of computing power, essential for handling large-scale workloads.
Utility Computing Models:
Pay-as-You-Go Models: Concepts from utility computing, where users pay for computing
resources on a metered basis, became fundamental to cloud computing business models.
This shifted the focus from ownership to operational expenses.
Advancements in Data Storage and Retrieval:
Databases and Data Warehousing: Innovations in database management systems and data
warehousing solutions provided scalable and reliable methods for storing and retrieving
vast amounts of data, critical for cloud services.
Security Measures:
Economies of Scale: Cloud providers, with massive data centers and resources, achieved
economies of scale, allowing them to offer cost-effective solutions for businesses of all
sizes.
Mobile and Ubiquitous Computing:
Mobile Devices: The proliferation of mobile devices and the need for ubiquitous access to
data pushed the demand for cloud services, enabling users to access their data from
anywhere with an internet connection.
The convergence of these technological advances, combined with market demands for
flexibility, scalability, and cost efficiency, led to the rapid development and mainstream
adoption of cloud computing as a fundamental paradigm in modern IT infrastructure.
12. (a) Explain about cloud load balancing with necessary diagrams.
Load balancing is a technique to spread work between two or more computers, network
links, CPUs, hard drives, or other resources, in order to get optimal(best) resource utilization,
maximize throughput(is the amount of work that a computer can do in a given period of time),
and minimize response time.
Load balancing can help with almost any kind of service, including
HTTP (Hyper Text Transfer Protocol)
Request through Web browser
DNS(Domain Name System)
Converts human meaningful names (domain name) to IP address in Internet
FTP (File Transfer Protocol)
Used for the transfer of computer files between a client and server
POP(Post Office Protocol) / IMAP(Internet Message Access Protocol)
Used for retrieving email from mail server
SMTP(Simple Mail Transfer Protocol)
Protocol for sending e-mail messages between servers.
Load balancing is done by
Dedicated program
Hardware device (such as a multilayer switch).
Or
Types of Virtualization
Full Virtualization
Host Based virtualization
ParaVirtualization
Operating System
Virtualization
Application Virtualization
Desktop Virtualization
13. (a) Draw and elucidate NIST cloud computing reference architecture.\
Actor Definition
Cloud Consumer Acquires and uses services
Cloud Provider A person or organization, or entity responsible for making a
service available to interested parties.
Cloud Auditor A party that can conduct independent assessment of cloud
services, performance and security monitoring of cloud services
Cloud Broker Intermediate between consumer and provider, they create new
services
Cloud Carrier An intermediary that provides connectivity and transport of
cloud services from Cloud Providers to Cloud Consumers.
Or
14. (a) Clarify various technologies available for data security in cloud
Data Security
Physical security defines how you control physical access to the servers that support
your infrastructure. The cloud still has physical security constraints. After all, there are
actual servers running somewhere.
When selecting a cloud provider, you should understand their physical security
protocols and the things you need to do on your end to secure your systems against
physical vulnerabilities.
Or
Figure 4.1
The above figure shows six layers of cloud services, ranging from hardware,
network, and collocation to infrastructure, platform, and software applications. Top
three service layers as SaaS, PaaS, and IaaS, respectively.
The cloud platform provides PaaS, which sits on top of the IaaS infrastructure. The
top layer offers SaaS.
The implication is that one cannot launch SaaS applications with a cloud platform.
The cloud platform cannot be built if compute and storage infrastructures are not
there. The bottom three layers are more related to physical requirements.
The bottommost layer provides Hardware as a Service (HaaS). The next layer is for
interconnecting all the hardware components, and is simply called Network as a
Service (NaaS).
Virtual LANs fall within the scope of NaaS. The next layer up offers Location as a
Service (LaaS), which provides a collocation service to house, power, and secure all
the physical hardware and network resources. Some authors say this layer provides
Security as a Service (“SaaS”).
The cloud infrastructure layer can be further subdivided as Data as a Service (DaaS)
and Communication as a Service (CaaS) in addition to compute and storage in IaaS.
Cloud players are divided into three classes: (1) cloud service providers and IT
administrators, (2) software developers or vendors, and (3) end users or business
users.
These cloud players vary in their roles under the IaaS, PaaS, and SaaS models. The
table entries distinguish the three cloud models as viewed by different players.
From the software vendors’ perspective, application performance on given cloud
platform is most important.
From the providers’ perspective, cloud infrastructure performance is the primary
concern. From the end users’ perspective, the quality of services, including security,
is the most important.
15. (a) The available disk space per node is 8 TB (10 disks with 1 TB, 2 disk for operating
system etc. were excluded.). Assuming initial data size is 600 TB, how will you
estimate the number of data nodes (n)?
Rough calculation:
Or
The OpenStack project is an open source cloud computing platform for all types of clouds, which aims to be
simple to implement, massively scalable and feature rich.
● Developers and cloud computing technologists from around the world create the OpenStack project.
● OpenStack provides an Infrastructure as a Service (IaaS) solution through a set of interrelated services.
● Each service offers an application programming interface (API) that facilitates this integration.
● Depending on their needs, administrator can install some or all services.
2 200315