Professional Documents
Culture Documents
CC Unit - 05
CC Unit - 05
Ans. : -
1. Security Concerns : -
Security is often the top concern when it comes to cloud computing. Storing
sensitive data in the cloud can make it a target for cyber-attacks. Ensuring robust
encryption, access controls, and security protocols is essential.
2. Data Privacy : -
Laws like GDPR, HIPAA, and others impose strict requirements on data privacy.
Users may have concerns about who can access their data and how it is used by the
cloud provider.
Major cloud providers can experience downtime due to hardware failures, software
bugs, or DDoS attacks, affecting the availability of services.
5. Cost Management : -
The pay-as-you-go model can lead to unexpected expenses if resource usage is not
carefully monitored and managed.
6. Lack of Control : -
Organizations are reliant on the cloud provider for updates, maintenance, and
service continuity, which can be a risk if the provider faces issues.
7. Compliance Challenges : -
Ans. : -
Low Latency Network (Ensure low-latency network connections using Content Delivery
Networks (CDNs) like Amazon CloudFront, Azure CDN, or Google Cloud CDN to reduce
latency by serving content closer to the users) and WebSocket Protocols (Implement
WebSocket or similar protocols to enable real-time, bidirectional communication
between the server and clients).
Real-time Data Processing (Use services like AWS Kinesis, Google Cloud Dataflow, or
Azure Stream Analytics to process data streams in real time).
5. Data Security : -
Data Encryption (Ensure data is encrypted both in transit and at rest to protect
against unauthorized access), and Access control (Implement strict access control
policies using Identity and Access Management (IAM) services to ensure that only
authorized users and services can access the application).
Ans. : -
1. Performance
2. Reliability
3. Availability
4. Security
5. Service Level Agreement (SLAs) : - SLAs define the QoS metrics, such as uptime,
response time, and support responsiveness, that a cloud provider guarantees.
6. Resource Management
7. Monitoring and Management
8. Cost Efficiency
Ans. : -
Ans. : -
Mobile Cloud Computing (MCC) within the context of cloud computing refers to the
integration of cloud resources with mobile devices to enhance their functionality,
performance, and capabilities.
Mobile Computing : -
Mobile Devices : - Refers to smartphones, tablets, and other handheld devices that
are portable and connected to the internet.
Applications : - Apps that run on these devices, which can be strong in terms of
processing power, storage, and battery life.
Cloud Computing : -
Ans. : -
Cloud computing provides methods and built in tools to monitor real time management
in cloud computing including AWS CloudWatch, Azure Monitor and Google Cloud
Monitoring etc.
1. Performance Monitoring : -
Tracking the usage of CPU, memory, disk I/O, and network bandwidth to ensure
resources are not over or underutilized. Monitoring application metrics such as
response time, throughput, and error rates to ensure they are performing as
expected.
2. Availability Monitoring : -
Ensuring that cloud services are available and accessible to users as per the
agreed SLAs. Performing regular health checks on services and components to detect
and address issues proactively.
3. Security Monitoring : -
Monitoring for signs of unauthorized access or suspicious activity. Ensuring that
cloud resources observation with security policies and regulatory requirements.
4. Cost Monitoring : -
Billing and Usage Reports: Tracking usage patterns and costs to identify areas
where savings can be made. Budget Alerts: Setting up alerts for when spending
approaches predefined budget thresholds.
5. Log Monitoring : -
Collecting and analyzing logs from various services to identify errors, warnings,
and other significant events.
Ans. : -
2. Microsoft Azure : -
1. Response Time: Measure the time taken for a system to respond to a request.
4. Resource Utilization: Monitor the usage of CPU, memory, storage, and network
bandwidth.
7. Error Rates: Track the frequency and types of errors occurring within the system
Ans. : -
1. Scalability : -
2. Network Access : -
Access from Anywhere: Cloud services can be accessed over the internet from any
device, anywhere in the world. Multi-Device Support: Services are accessible via
various devices such as laptops, smartphones, and tablets.
3. Multi-Tenancy : -
Multiple customers share the same physical resources while maintaining data
isolation and privacy.
4. Measure Service : -
Pay-as-You-Go: Users pay only for the resources they consume, based on metered
usage. Usage Monitoring: Detailed reporting and billing based on resource
consumption.
5. Reliability : -
6. Security:
1. Computing Services : -
Virtual Machines (VMs): Provision and manage VMs to run applications and services.
Containers: Deploy and manage containerized applications for improved portability
and efficiency. Serverless Computing: Run code without managing servers, scaling
automatically with demand (e.g., AWS Lambda, Azure Functions).
2. Storage Services : -
Object Storage: Store and retrieve large amounts of unstructured data (e.g., Amazon
S3, Google Cloud Storage). Block Storage: Attach strong storage volumes to VMs
(e.g., AWS EBS, Azure Disk Storage).
File Storage: Network-attached storage for shared file systems (e.g., Amazon EFS,
Azure Files).
3. Database Services : -
Relational Databases: Managed SQL databases (e.g., Amazon RDS, Azure SQL Database).
NoSQL Databases: Managed non-relational databases for high-performance and scalable
applications (e.g., Amazon DynamoDB, Google Cloud Bigtable). Data Warehousing:
Scalable data warehouses for analytics (e.g., Amazon Redshift, Google BigQuery).
4. Networking Services : -
Data Analytics: Tools for processing and analyzing large datasets (e.g., AWS Glue,
Google Cloud Dataflow). Machine Learning Services: Pre-trained models and
infrastructure for building and deploying ML models (e.g., Amazon SageMaker, Azure
Machine Learning).
Monitoring Tools: Track the performance and health of resources (e.g., AWS
CloudWatch, Azure Monitor). Resource Management: Tools for managing and optimizing
cloud resource usage (e.g., AWS Trusted Advisor, Azure Cost Management).
Identity Management: Services for managing user identities and access (e.g., AWS
IAM, Azure Active Directory). Security Tools: Tools for threat detection,
compliance, and data protection (e.g., AWS Shield, Azure Security Center).