Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

1. Explain types of Cloud based on deployment?

1. Public Cloud
2. Private Cloud
3. Hybrid Cloud

Public Cloud :A Public Cloud is Cloud Computing in which the infrastructure and services are
owned and operated by a third-party provider and made available to the public over the
internet. The public can access and use shared resources, such as servers, storage, and
applications and the main thing is you pay for what you used. . Examples of public cloud
providers – are Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform
(GCP)

Private Cloud
A Private Cloud is a cloud computing environment in which the infrastructure and services
are owned and operated by a single organization, for example, a company or government,
and it is accessed by only authorized users within that organization. Private Cloud
organizations have their own data center. private cloud provides a higher level of security.
Examples – HPE, Dell, VMware, etc.

Hybrid Cloud
A hybrid cloud is a combination of both public and private cloud environments that allows
organizations to take advantage of the benefits of both types of clouds. It manages traffic
levels during peak usage periods It can provide greater flexibility, scalability, and cost-
effectiveness than using a single cloud environment. Examples – IBM, DataCore Software,
Rackspace, Threat Stack, Infinidat, etc
14. What is virtualization and what are its benefits?
 Virtualization : Virtualization uses software called hypervisors to create multiple virtual
computers (known as virtual machines or VMs) on a single physical machine. These virtual
machines can access all the parts of the physical machine, including the computer’s brain or
processors, memory and storage.
Each virtual machine runs on its own operating system and functions like a completely
separate machine even though it’s sharing the resources of one physical computer. This is
the key feature of virtualization: a single physical machine running multiple tasks
simultaneously on different virtual machines, instead of several computers each running a
single task.

Benefits of Virtualization :
As a business owner, you need to stay ahead of the curve—and this often means making the
most of the technology you have on hand. This is where virtualization can be a game-
changer, offering several benefits that can transform the way your business operates and
grows
Cost Savings With virtualization, you can maximize the use of your existing hardware, and
reduce the need for additional physical machines or servers. You won’t just save on your
hardware costs, either: Because you’ll need less hardware, you’ll save on costs associated
with the operation, cooling and maintenance of your hardware. Efficiency Instead of using
several separate servers to run different applications, you can run multiple applications on
different virtual machines all housed on the same physical server. This leads to a reduction in
IT management tasks, better utilization of existing resources and improved efficiency overall.

Cost Savings: With virtualization, you can maximize the use of your existing hardware, and
reduce the need for additional physical machines or servers. You won’t just save on your
hardware costs, either: Because you’ll need less hardware, you’ll save on costs associated
with the operation, cooling and maintenance of your hardware.
Efficiency: Instead of using several separate servers to run different applications, you can run
multiple applications on different virtual machines all housed on the same physical server.
This leads to a reduction in IT management tasks, better utilization of existing resources and
improved efficiency overall.
Reduced Maintenance: Because your multiple virtual machines can be managed through a
single console, IT management and maintenance is no longer as complex—freeing up your IT
team’s time to focus on more productive, strategic tasks instead of updates and ongoing
maintenance.
Disaster Recovery: Virtualization enhances business continuity and makes disaster recovery
easier: Virtual machines are easy to replicate and move to a different server should your
hardware fail. You can also quickly create backups of virtual machines essentially, snapshots
in time you can easily go back to if necessary.
Scalability and Flexibility: With virtualization, you can quickly create or remove virtual
machines as needed, making it easier to scale your tech resources up (or down) in response
to your business’s changing needs.
Better Environmental Footprint: Piggybacking on the reduced maintenance costs of
virtualization, less hardware means less energy consumption—and a win for your business
from an environmental perspective
Explain characteristics of cloud computing in details
1 on demand self-service
2 broad network access
3 rapid elasticity
4 resource pooling
5 measured service
6 multi tenancy
7 virtualization
8 security

5. Explain cloud computing architecture in details?

Architecture of Cloud Computing :


Cloud Computing , which is one of the demanding technology of the current time and which is giving
a new shape to every organization by providing on demand virtualizeds ervices/resources. In this
article, we will know more about the internal architecture of cloud computing. Transparency,
scalability, security and intelligent monitoring are some of the most important constraints which
every cloud infrastructure should experience. Current research on other important constraints is
helping cloud computing system to come up with new features and strategies with a great capability
of providing more advanced cloud solutions.

The cloud architecture is divided into 2 parts i.e.

1 Frontend

2 Backend
1. Frontend :
Frontend of the cloud architecture refers to the client side of cloud computing system.
Means it contains all the user interfaces and applications which are used by the client to
access the cloud computing services/resources. For example, use of a web browser to access
the cloud platform.
Client Infrastructure – Client Infrastructure is a part of the frontend component. It contains
the applications and user interfaces which are required to access the cloud platform. In other
words, it provides a GUI( Graphical User Interface ) to interact with the cloud.

2. Backend : Backend refers to the cloud itself which is used by the service provider. It contains
the resources as well as manages the resources and provides security mechanisms. Along
with this, it includes huge storage, virtual applications, virtual machines, traffic control
mechanisms, deployment models, etc.

Application – Application in backend refers to a software or platform to which client


accesses. Means it provides the service in backend as per the client requirement.
Service – Service in backend refers to the major three types of cloud based services like SaaS,
PaaS and IaaS. Also manages which type of service the user accesses.
Runtime Cloud - Runtime cloud in backend provides the execution and Runtime
platform/environment to the Virtual machine.
Storage – Storage in backend provides flexible and scalable storage service and management
of stored data.
Infrastructure – Cloud Infrastructure in backend refers to the hardware and software
components of cloud like it includes servers, storage, network devices, virtualization
software etc.
Management – Management in backend refers to management of backend components like
application, service, runtime cloud, storage, infrastructure, and other security mechanisms
etc.
Security – Security in backend refers to implementation of different security mechanisms in
the backend for secure cloud resources, systems, files, and infrastructure to end-users.
2. Explain cloud data security and challenges.
Cloud data security refers to the measures and practices put in place to protect data stored
in cloud environments. Cloud computing involves storing and processing data on remote
servers over the internet, providing flexibility and scalability. However, it also introduces
security challenges due to the shared responsibility model, where both the cloud service
provider (CSP) and the customer have roles in securing data.

Key components of cloud data security

1. Data Encryption:

- In-Transit Encryption: Protects data as it travels between the user and the cloud service.
This is often achieved using protocols like SSL/TLS. –
At-Rest Encryption: Safeguards data stored in the cloud by encrypting it when it's not in use.
This helps prevent unauthorized access to the data

2 Identity and Access Management (IAM):

Authentication: Verifies the identity of users accessing cloud resources. –

Authorization: Controls the permissions and privileges granted to authenticated users,


ensuring they have the necessary access levels

3. Multi-Factor Authentication (MFA): - Adds an extra layer of security by requiring users to


provide multiple forms of identification before accessing sensitive data or applications

4. Security Monitoring and Logging: - Monitors and logs activities within the cloud
environment to detect and respond to security incidents promptly.

5. Security Patching and Updates: - Ensures that software and systems are regularly updated
to address vulnerabilities and protect against potential threats.

**Challenges in Cloud Data Security:**

1. Data Breaches: - Unauthorized access to sensitive information, often due to weak


authentication, misconfigurations, or vulnerabilities in cloud services
2. Data Loss: - Accidental or intentional deletion of data, as well as the lack of proper
backup and recovery mechanisms
3. Insufficient Access Controls: - Inadequate management of user permissions, leading to
unauthorized access or privilege escalation.
4. Insecure APIs: - Application Programming Interfaces (APIs) facilitate communication
between different software systems. Insecure APIs can be exploited, leading to data
exposure.
5. Shared Responsibility Model: - Understanding and managing the shared responsibility
between the cloud service provider and the customer. While the CSP is responsible for the
security of the cloud infrastructure, customers must secure their data and configurations.

6. Compliance and Legal Concerns: - Meeting regulatory requirements and ensuring that
data stored in the cloud complies with legal standards can be challenging, especially in highly
regulated industries

7. Data Location and Jurisdiction: - Knowing where data is stored and understanding the
legal jurisdiction can impact data privacy and compliance.

8. Cloud Service Provider Security:- Relying on the security practices of the chosen cloud
service provider, which may vary in terms of robustness. Addressing these challenges
requires a comprehensive approach, involving a combination of technical solutions, policies,
and ongoing monitoring to ensure the security of data in the cloud.

9. write a note on big data and data lake.

Big Data:

Big Data refers to the vast and complex sets of data that exceed the capabilities of traditional data
processing methods. This data is characterized by its volume, velocity, variety, and often, its veracity.
The three main types of data that contribute to Big Data are structured, semi-structured, and
unstructured data. Traditional relational database systems are often inadequate for handling Big Data
due to their limitations in terms of scalability, processing speed, and flexibility

characteristics of Big Data include:

1. **Volume:** Refers to the sheer size of the data generated, collected, and processed.

2. **Velocity:** Indicates the speed at which data is generated, processed, and analyzed in real-time
or near real-time.

3. **Variety:** Encompasses the diverse types of data, including structured (e.g., databases), semi-
structured (e.g., XML, JSON), and unstructured (e.g., text, images, videos).

4. **Veracity:** Relates to the quality and reliability of the data, considering factors such as accuracy
and trustworthiness.

To derive meaningful insights from Big Data, organizations often employ advanced analytics, machine
learning, and data mining techniques. The goal is to extract valuable information, discover patterns,
and make informed decisions based on the massive datasets at hand.

Data Lake: A Data Lake is a centralized repository that allows organizations to store and manage vast
amounts of raw, unstructured, and structured data at scale. Unlike traditional data warehouses,
which typically require data to be structured before ingestion, a Data Lake accepts data in its raw
form and preserves its original structure. This flexibility makes it well-suited for handling the diverse
and voluminous nature of Big Data.
characteristics of a Data Lake include:

1. **Storage Flexibility:** Data Lakes can accommodate various data types, including raw,
structured, and semi-structured data, without the need for predefined schema.

2. **Scalability:** Data Lakes are designed to scale horizontally, allowing organizations to handle
massive volumes of data efficiently.

3. **Schema-on-Read:** Unlike traditional databases that use a schema-on-write approach, Data


Lakes employ a schema-on-read approach. This means that the structure of the data is determined at
the time of analysis, allowing for greater flexibility in data exploration and analysis.

4. **Integration of Data Sources:** Data Lakes can integrate data from diverse sources, providing a
holistic view of an organization's data landscape.

5. **Cost-Effective Storage:** Utilizes cost-effective storage solutions, such as cloud-based object


storage, to store large amounts of data without incurring high costs.

7. Explain the role of virtualization in cloud computing.

 Virtualization

1. Resource Pooling:
2. Multi-Tenancy:
3. Elasticity and Scalability:
4. Isolation and Security:
5. Server Consolidation:
6. Quick Provisioning:
7. Dynamic Resource Allocation:
8. High Availability and Fault Tolerance:
9. Cost Efficiency:
10. Simplified Management:

You might also like