0% found this document useful (0 votes)
80 views

CC 1 Unit Notes

cloud computing notes unit 1

Uploaded by

sundaramp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views

CC 1 Unit Notes

cloud computing notes unit 1

Uploaded by

sundaramp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

MAHENDRA INSTITUTE OF TECHNOLOGY

(AUTONOMOUS)

Course Code & Title IT2014702 & Cloud Computing Sem: 07


Question Bank All Units Dept.: IT

Unit 1

DISTRIBUTED SYSTEM MODELS

Scalable computing – Network Based Systems – System Models – Software Environment for
Distributed and Cloud computing – Performance – Security – Energy Efficiency.

2 Marks - Part (A)

1. What is mean by Scalability?


Scalability refers to the ability of an organization to perform well under an increasing or expanding workload. A system
that scales well will be able to maintain or increase its level of performance even as it's tested by growing operational
demands.

2. What are the technologies for network based systems?

 The different technologies for a Network-based system are as follows.


 (i) Advances in CPU Processors.
 (ii) Multicore CPU and Many-Core GPU Architectures.
 (iii) Multithreading Technology.

3. Compare the High-Performance Computing and High-Throughput


Computing.
Parameter HPC HTC

HPC stands for High-Performance HTC stands for High Throughput


Stands for
Computing Computing

HPC is defined as the type of computing HTC is defined as a type of computing


that makes use of multiple computer that parallelly executes a large number
Definition
processors in order to perform complex of simple and computationally
computations parallelly. independent tasks.

HPC consists of running a large number


HPC consists of running large-scale,
of tasks that are independent and small
complex, and computationally intensive
Workload in size and does not require a large
applications that need significant
amount of memory and resources.
resources and memory.
Parameter HPC HTC

HTC is designed to increase the number


It is designed to provide maximum
Processing Power of tasks that needs to be completed in a
performance and speed for large tasks.
given specific amount of time.

4. What are the techniques available in energy consumption?

 Multiple Sclerosis
 Acute/Chronic Respiratory Failure
 Congestive Heart Failure and Other Cardiac Conditions
 Motor Neurone Disease
 Hospice/Palliative Care Patients

5. Mention the different types of performance metrics.

 Metrics for business performance. These metrics signify how well business is growing and if you're balancing
spend with revenue for long term financial health. ...
 Metrics measuring sales team performance. ...
 Metrics measuring project management efficiency. ...
 Employee performance metrics.

13 arks - Part (B)

1. Explain the need of Distributed systems its characteristics with example.


Distributed systems: A distributed System is a collection of autonomous computer systems that are physically
separated but are connected by a centralized computer network that is equipped with distributed system software. The
autonomous computers will communicate among each system by sharing resources and files and performing the tasks
assigned to them.
Types of Distributed Systems
There are many models and architectures of distributed systems in use today.
 Client-server systems: The most traditional and simple type of distributed system, involves a multitude of
networked computers that interact with a central server for data storage, processing, or other common goal.
 Peer-to-peer networks: They distribute workloads among hundreds or thousands of computers all running the
same software.
 Cell phone networks: It is an advanced distributed system, sharing workloads among handsets, switching systems,
and internet-based devices.
Working:
Any Social Media can have its Centralized Computer Network as its Headquarters and computer systems that can be
accessed by any user and using their services will be the Autonomous Systems in the Distributed System Architecture.

 Distributed System Software: This Software enables computers to coordinate their activities and to share the
resources such as Hardware, Software, Data, etc.
 Database: It is used to store the processed data that are processed by each Node/System of the Distributed systems
that are connected to the Centralized network.
 As we can see that each Autonomous System has a common Application that can have its own data that is shared
by the Centralized Database System.
 To Transfer the Data to Autonomous Systems, Centralized System should be having a Middleware Service and
should be connected to a Network.
 Middleware Services enable some services which are not present in the local systems or centralized system default
by acting as an interface between the Centralized System and the local systems. By using components of
Middleware Services systems communicate and manage data.
 The Data which is been transferred through the database will be divided into segments or modules and shared with
Autonomous systems for processing.
 The Data will be processed and then will be transferred to the Centralized system through the network and will be
stored in the database.
Characteristics
 Resource Sharing: It is the ability to use any Hardware, Software, or Data anywhere in the System.
 Openness: It is concerned with Extensions and improvements in the system (i.e., How openly the software is
developed and shared with others)
 Concurrency: It is naturally present in Distributed Systems, that deal with the same activity or functionality that
can be performed by separate users who are in remote locations. Every local system has its independent Operating
Systems and Resources.
Advantages:
 Applications in Distributed Systems are Inherently Distributed Applications.
 Information in Distributed Systems is shared among geographically distributed users.
 Resource Sharing (Autonomous systems can share resources from remote locations).
Disadvantages:
 Relevant Software for Distributed systems does not exist currently.
 Security possess a problem due to easy access to data as the resources are shared to multiple systems.
 Networking Saturation may cause a hurdle in data transfer i.e., if there is a lag in the network then the user will face
a problem accessing data.

2. State the uses of cloud computing and also explain the evolution of cloud in detail.

Cloud Computing means storing and accessing the data and programs on remote servers that are hosted on the internet
instead of the computer’s hard drive or local server. Cloud computing is also referred to as Internet-based computing, it
is a technology where the resource is provided as a service through the Internet to the user. The data that is stored can
be files, images, documents, or any other storable document.

The following are some of the Operations that can be performed with Cloud Computing
 Storage, backup, and recovery of data
 Delivery of software on demand
 Development of new applications and services
 Streaming videos and audio
Architecture Of Cloud Computing
Cloud computing architecture refers to the components and sub-components required for cloud computing. These
components typically refer to:
1. Front end ( Fat client, Thin client)
2. Back-end platforms ( Servers, Storage )
3. Cloud-based delivery and a network ( Internet, Intranet, Intercloud )

1. Front End ( User Interaction Enhancement )


The User Interface of Cloud Computing consists of 2 sections of clients. The Thin clients are the ones that use web
browsers facilitating portable and lightweight accessibilities and others are known as Fat Clients that use many
functionalities for offering a strong user experience.
2. Back-end Platforms ( Cloud Computing Engine )
The core of cloud computing is made at back-end platforms with several servers for storage and processing computing.
Management of Applications logic is managed through servers and effective data handling is provided by storage. The
combination of these platforms at the backend offers the processing power, and capacity to manage and store data
behind the cloud.
3. Cloud-Based Delivery and Network
On-demand access to the computer and resources is provided over the Internet, Intranet, and Intercloud. The Internet
comes with global accessibility, the Intranet helps in internal communications of the services within the organization
and the Intercloud enables interoperability across various cloud services. This dynamic network connectivity ensures an
essential component of cloud computing architecture on guaranteeing easy access and data transfer.

Types
The following are the types of Cloud Computing:
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
4. Function as as Service (FaaS)
1. Infrastructure as a Service ( IaaS )
 Flexibility and Control: IaaS comes up with providing virtualized computing resources such as VMs, Storage,
and networks facilitating users with control over the Operating system and applications.
 Reducing Expenses of Hardware: IaaS provides business cost savings with the elimination of physical
infrastructure investments making it cost-effective.
2. Platform as a Service ( PaaS )
 Simplifying the Development: Platform as a Service offers application development by keeping the
underlying Infrastructure as an Abstraction. It helps the developers to completely focus on application logic
( Code ) and background operations are completely managed by the AWS platform.
 Enhancing Efficiency and Productivity: PaaS lowers the Management of Infrastructure complexity, speeding
up the Execution time and bringing the updates quickly to market by streamlining the development process.
3. SaaS (software as a service)
 Collaboration And Accessibility: Software as a Service (SaaS) helps users to easily access applications
without having the requirement of local installations. It is fully managed by the AWS Software working as a
service over the internet encouraging effortless cooperation and ease of access.
 Automation of Updates: SaaS providers manage the handling of software maintenance with automatic latest
updates ensuring users gain experience with the latest features and security patches.
4. Function as a Service (FaaS)
 Event-Driven Execution: FaaS helps in the maintenance of servers and infrastructure making users worry
about it. FaaS facilitates the developers to run code as a response to the events.
 Cost Efficiency: FaaS facilitates cost efficiency by coming up with the principle “Pay as per you Run” for the
computing resources used.

3. Explain the cluster architecture in detail.


Cluster architecture:

Cluster computing is a collection of tightly or loosely connected computers that work together so that they act as a
single entity. The connected computers execute operations all together thus creating the idea of a single system. The
clusters are generally connected through fast local area networks (LANs)

Cluster Computing important:


1. Cluster computing gives a relatively inexpensive, unconventional to the large server or mainframe computer
solutions.
2. It resolves the demand for content criticality and process services in a faster way.
3. Many organizations and IT companies are implementing cluster computing to augment their scalability,
availability, processing speed and resource management at economic prices.
4. It ensures that computational power is always available.
5. It provides a single general strategy for the implementation and application of parallel high-performance systems
independent of certain hardware vendors and their product decisions.

Types:
1. High performance (HP) clusters:
HP clusters use computer clusters and supercomputers to solve advance computational problems. They are used to
performing functions that need nodes to communicate as they perform their jobs. They are designed to take benefit of
the parallel processing power of several nodes.
2. Load-balancing clusters :
Incoming requests are distributed for resources among several nodes running similar programs or having similar
content. This prevents any single node from receiving a disproportionate amount of task. This type of distribution is
generally used in a web-hosting environment.
3. High Availability (HA) Clusters:
HA clusters are designed to maintain redundant nodes that can act as backup systems in case any failure occurs.
Consistent computing services like business activities, complicated databases, customer services like e-websites and
network file distribution are provided. They are designed to give uninterrupted data availability to the customers.
Classification:
1. Open Cluster:
IPs are needed by every node and those are accessed only through the internet or web. This type of cluster causes
enhanced security concerns.
2. Close Cluster:
The nodes are hidden behind the gateway node, and they provide increased protection. They need fewer IP addresses
and are good for computational tasks.
Components:
1. Cluster Nodes
2. Cluster Operating System
3. The switch or node interconnect
4. Network switching hardware

Advantages:
1. High Performance:
The systems offer better and enhanced performance than that of mainframe computer networks.
2. Easy to manage:
Cluster Computing is manageable and easy to implement.
Disadvantages:
1. High cost:
It is not so much cost-effective due to its high hardware and its design.
2. Problem in finding fault:
It is difficult to find which component has a fault.
Application:
 Various complex computational problems can be solved.
 It can be used in the applications of aerodynamics, astrophysics and in data mining.
 Weather forecasting.
 Image Rendering.

16 Marks - Part (C)

1. Explain the Virtual Machines in detail.


Virtual Machines: A virtual machine is a computer file, typically called an image, that behaves like an actual computer .
It can run in a window as a separate computing environment, often to run a different operating system—or even to
function as the user's entire computer experience—as is common on many people's work computers.
Types of Virtual Machine:
There are two different types of virtual machines. They are:
 Process Virtual Machine
 System Virtual Machine
1. Process Virtual Machine: A process virtual machine is defined as a type of virtual machine that allows only a
single process to run as an application on the host system and provides a platform-independent environment. A process
VM gets created once the process is started and gets destroyed when the process ends. Java Virtual Machine (JVM) is
an example of a process virtual machine that allows any operating system to run java applications.
2. System Virtual Machine: A system virtual machine is defined as a type of virtual machine that is fully virtualized
to substitute a physical machine. The physical resources of the host device are shared among the multiple virtual
machines. This process of virtualization depends upon a hypervisor that runs on the top of the operating system.
Working:
 Virtualization provides with dedicated software based memory, CPU and storage.
 The overall process is then done by the hypervisor software.
 According to the need the resources are being moved from the host towards the guest by the hypervisor. Hypervisor
also schedules the operations in virtual machines in order to avoid the conflicts that can arise while using the
resources.
 As virtual machine is separated from the remaining system, it has no access to make any unapproved modifications
to the host computer systems.
 This is done for preventing the virtual machines from interfering with the central operating systems of the host.

1. Device Backup:
 Virtual machines provide file backups as they copy the existing programs and operating systems. The
applications and settings that are being used on other devices can be backed up with the help of virtual
machines.
 In case of any issue with the device, it helps to access the prior versions of the operating system or the
applications.
2. Testing:
 Virtual machines are being used for the purpose of testing for many use cases such as the beta release of
software can be copied for testing before releasing the final overall versions of the products to the customers.
 The test scripts can also be tested through the software and make sure that everything that is developed works
accordingly.
3. Program Development:
 Virtual machines help to individually develop the programs. The developers can code the applications in a new
environment with the help of virtual machines.
 The versions can be directly deployed to the cloud for other available users if the virtual machine has
connections to the cloud server.
4. Cyber security:
 The host devices can be used to run the programs if the live devices have any security-related issues. It helps to
protect the data and devices of the employees in the organizations.
 Virtual machines are being used by many cyber security professionals for inspecting existing cyber security
related issues.

You might also like