Professional Documents
Culture Documents
CC Unit - 01
CC Unit - 01
CC Unit - 01
Ans. : -
The term cloud refers to a network or the internet. It is a technology that uses
remote servers on the internet to store, manage, and access data online rather than
local drives. The data can be anything such as files, images, documents, audio,
video, and more.
There are the following operations that we can do using cloud computing:
Cloud computing has many features that make it one of the fastest growing
industries at present. Here are the some features explained below : -
1) Resources Pooling : -
2) On-Demand Self-Service : -
It is one of the important and essential features of cloud computing. This enables
the client to continuously monitor server uptime, capabilities and allocated
network storage. This is a fundamental feature of cloud computing, and a customer
can also control the computing capabilities according to their needs.
3) Easy Maintenance : -
This is one of the best cloud features. Servers are easily maintained, and downtime
is minimal or sometimes zero. Cloud computing powered resources often undergo
several updates to optimize their capabilities and potential.
A key feature and advantage of cloud computing is its rapid scalability. This cloud
feature enables cost-effective handling of workloads that require a large number of
servers but only for a short period. Many customers have workloads that can be run
very cost-effectively due to the rapid scalability of cloud computing.
It is a cloud features that make it the best choice for organizations. The
measurement and reporting service is helpful for both cloud providers and their
customers. This enables both the provider and the customer to monitor and report
which services have been used and for what purposes. It helps in monitoring,
billing and ensuring optimum utilization of resources.
6) Security : -
Data security is one of the best features of cloud computing. Cloud services make a
copy of the stored data to prevent any kind of data loss. If one server loses data
by any chance, the copied version is restored from the other server. This feature
is useful when multiple users are working on a particular file in real-time and one
file suddenly gets corrupted.
7) Automation : -
The client can access cloud data or transfer data to the cloud from any location
with a device and internet connection. These capabilities are available everywhere
in the organization and are achieved with the help of internet.
Ans. : -
Service consumer sends a service request to the service provider, and the service
provider sends the service response to the service consumer. The service connection
is understandable to both the service consumer and service provider.
Service-Oriented Terminologies : -
Let's see some important service-oriented terminologies:
1) Services : - The services are the logical entities that represents a unit of
functionality. A service can exchange information from another service.
Ans. : -
Web services are the types of internet software that uses standardized messaging
protocol over the distributed environment.
Web services play a crucial role in cloud computing and acts as the backbone for
communication and integration between different systems and applications over the
internet.
It integrates the web-based application using the REST, SOAP, WSDL, and UDDI over
the network. For example, Java web service can communicate with .Net application.
A standard markup language that encodes the messages in a format that is both
human-readable and machine-readable.
A directory for storing information about web services, making them easier to
discover and integrate.
Ans. : -
The Web Services architecture describes how to instantiate the elements and
implement the operations in an interoperable manner.
The architecture of web service interacts among three roles: service provider,
service requester, and service registry. The interaction involves the three
operations: publish, find, and bind.
1) Service Provider : -
The service provider creates and maintains the web service. It publishes the
service description to a service registry where it can be discovered by potential
users.
The service consumer uses the web service. It can find the service in the service
registry and bind to it to start using the functionality provided by the service.
3) Service Registry : -
Ans. : -
SOAP stands for Simple Object Access Protocol. It defines the standard XML format.
It also defines the way of building web services. We use Web Service Definition
Language (WSDL) to define the format of request XML and the response XML.
SOAP can be used over various protocols, such as HTTP, SMTP, TCP, and more.
However, HTTP is the most commonly used protocol because of its widespread adoption
and compatibility with firewalls.
Ans. : -
WSDL acronym for Web Service Description Language. WSDL is an XML based interface
description language. It is used for describing the functionality offered by a web
service.
WSDL is a key component that defines how web services can be integrated and
interacted and provides a standard way for service providers to describe their
services and for service consumers to understand how to use them.
It provides the machine-readable description of how the service can be called, what
parameter it expects, and what data structure it returns.
Sometimes it is also known as the WSDL file. The extension of the WSDL file
is .wsdl.
There are 6 key components of WSDL, which are Types, Message, PortType, Port,
Binding and Services.
WSDL documents are published to service registries (e.g., UDDI), allowing service
consumers to discover available web services and understand their capabilities.
Ans. : -
In the context of cloud computing, UDDI plays a vital role in facilitating the
seamless interaction of diverse web services across different platforms and
environments.
The idea behind UDDI is to discover organizations and the services that
organizations offer, much like using a telephone directory. It allows the business
to list themselves by name, product, location, or the web service they offer.
Ans. : -
RESTful services, or RESTful APIs, are web services based on Representational State
Transfer (REST) architecture.
The main goal of RESTful web services is to make web services more effective.
RESTful web services try to define services using the different concepts of HTTP.
REST is an architectural approach, not a protocol.
REST uses various representation to represent a resource like text, JSON, XML. JSON
is the most popular one.
1) Stateless : - Each client request contains all the information needed to process
the request.
4) Layered System : - A client may interact with the server through multiple
intermediaries (e.g., proxies, gateways) without affecting its interaction with the
server.
5) Status Codes : - Standardized codes indicating the result of the HTTP request
(e.g., 200 OK, 404 Not Found, 500 Internal Server Error).
1) Public APIs: Available to any developer or user. Examples include Google Maps
API, Twitter API.
3) Partner APIs: Exposed to specific business partners. These are often used for
business-to-business transactions and collaborations.
4) Composite APIs: Combine multiple service and data sources into a single API,
which is particularly useful in microservices architectures where services are
modular and need to be arranged.
Ans. : -
In the SaaS model, software providers host applications on their own servers,
which customers access via web browsers.
This model eliminates the need for customers to install, maintain, and manage
software on their local devices, as all technical tasks are handled by the service
provider.
These services are available to end-users over the internet, so the end-users do
not need to install any software on their devices to access these services.
1) Web-based Delivery : -
SaaS apps can be accessed from anywhere with an internet connection because they
are supplied over the internet, often through a web browser. Users no longer need
to install and maintain software programs on their local machines as a result.
2) Multiple-Tenancy : -
Multiple Users or "tenants" can access SaaS applications from a single instance of
the program. As a result, the provider can serve several clients with the same
application without conducting unique program instances for every client.
3) Automatic Updates : -
SaaS providers are in charge of keeping the software up to date and making sure
that everyone has access to the newest features and security patches.
5) Data Security : -
Data Security includes data encryption, access restrictions, and backups, is the
responsibility of SaaS providers. Users no longer need to handle their own data
security because of this.
Ans. : -
You can purchase these applications from a cloud service provider on a pay-as-per-
use basis and access them using an Internet connection.
Example : - Google App Engine, Heroku, Microsoft Azure App, AWS Elastic Beanstalk
etc.
PaaS provides a set of tools and frameworks for application development, such as
integrated development environments (IDEs), version control systems, and build
tools.
2) Middleware : -
PaaS includes middleware services, such as databases, message queues, and caching
systems, which facilitate application development and integration.
3) Managed Infrastructure : -
4) Automated Deployment : -
Ans. : -
A hypervisor is a software that you can use to run multiple virtual machines on a
single physical machine.
The hypervisor loads the virtual machine images to create multiple virtual
operating systems. The physical machine is known as a host, and the virtual
operating systems are guests.
Types of Hypervisors : -
1) Type 1 Hypervisor : -
The type 1 hypervisor runs directly on the physical hardware of the host machine.
It doesn't require a host operating system because it interacts directly with the
hardware.
The type 1 hypervisor is generally more secure and stable because it does not run
on top of another operating system.
2) Type 2 Hypervisor : -
The type 2 hypervisor is also known as a hosted or embedded hypervisor. The type 2
hypervisor is a hypervisor program which is installed on a host operating system.
The type 2 hypervisor runs on a host operating system that provides virtualization
services. The hypervisor sits on top of the OS and depends on device support and
management.
Type 2 hypervisors are easier to install, configure, and use than bare-metal
hypervisors. It is similar to installing and using other desktop applications.
Use Cases : -The type 2 hypervisor used in the development and testing
environments, desktop virtualization where ease of use and flexibility are
prioritized.