Galgotias College ol Engineerlng l, Knowledge park , Creater Noida _ 201 306 Gl Technotogy (UP) INDIA Name of the Course Faculty Name Designation Department Sign of t^ Name ..... $:lrl+n).. N'-.tr^ Ct "1 Course Code , .....Kcs. - .o 7..-s-...... Pertaining to Program / Sem / Branch f. .e.s.e.. .. . .. This is hereby declared that the above mentioned course file has been prepared by me and belong to me. urse Faculty Sign of M ule Coordinator srM, Sign of r Date: Sep 17,2O2l Course File Detailq '..C.\.e.*.\ r-E :.....8'.Ts*h f.W ' ...(nv.'ks.z:.+-... l.) ?.rp Decla ration
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Galgotias College ol Engineerlngl, Knowledge park , Creater Noida _ 201 306
Gl Technotogy(UP) INDIA
Name of the Course
Faculty Name
Designation
Department
Sign oft^
Name ..... $:lrl+n).. N'-.tr^
Ct "1
Course Code , .....Kcs. - .o 7..-s-......Pertaining to Program / Sem / Branch f. .e.s.e.. .. . ..
This is hereby declared that the above mentioned course file has been prepared by meand belong to me.
urse Faculty Sign of M ule Coordinator srM,
Sign of r
Date: Sep 17,2O2l
Course File Detailq
'..C.\.e.*.\ r-E:.....8'.Ts*h f.W' ...(nv.'ks.z:.+-... l.)
The coursc prcscnts a top-down view of cloud computing, from applications and
administration to programming and infrastructure. Its main focus is on parallel programming
techniqucs lbr cloud computinB and large-scale distributed systems which form the cloud
infrastructurc. 'lhc topics include overview of cloud computing, cloud systems, parallel
processing in the cloud, distributed storage systems, virtualization, security in the cloud. and
multicore opcrating systems. Studcnts will study state-of-the-art solutions for cloud
computing dcvclopcd by Google. Amazon, Microsoft, Yahoo, VMWare. etc. Students will
also apply what thcy learn in onc programming assignmcnt and one project executed ovel
Amazon Web Scn'iccs.
INSTITUTE VISION AND MISSIONVision of the Institute
Mission of the Institute
To provide state-of-the-art infrastructural facirities that support achieving academicexcellence.
To provide a work environment that is conducive for professionar gro*h offacurty &To collaborate. with industry for achieving excellence in research, consultancy andentrepreneurship development.
DEPARTMENT VISION, MISSION & PEOSDepartment Vision
Department Mission
Program Educational Objectives
Excel in their career by acquiring
Engineering with the usage ofmodem
To be a leading educational institution recognized for excellence in engineering education &research producing globally competent andiocially rerponri-Ui" t""f,no"rutr.
To be a centre ofexce'ence in oroviding contemporary education and research in the field ofComputer Science and Engineeirng
knowledge in the field of Computer Science &tools and emerging technologies
MIromotin ityoT tecrea conduc ve eam n envlronm ten throu ffec tve ctea hgh and lea rn nng rocesspuap educati onq and research
M2 To promote research, consultancy and
institute collaborations
entrepreneurshi p development through industry -
M3 To make the students corporate ght spirit and interpersonal skillsready with the ri
PEOl
PE02 Demonstrate and analyze real life ety and produce innovative solutionsproblems ofthe soci
PE03 it ski
fe
xltE b am b e ucomm n ca on S dan team kwor n rh nd and Sre earchustrytza on throorgan ugh de envelopm Iearn lnongprofessional and
PROGRAM SPECIFIC OUTCOMES @SOs)
ProgramOutcomes
Statement
POI
ineering
En n knoweering knowtheledge: p edlyp o mf athemat CS eerIN nenganand s al onzatieng thtoPecl So u on fo com mco tep pu
b emsP02 rs:
bstanti fi
Pro lemb naa formlys IE ewIdentify ulate, research te and aanrature, e comys ptncomputer b Iemeng s reacheenng pro Su concatedng us on uss rstng 5 fopmathemati nalural sclences and neer clS ne sceP03 Designdesi
priate
eratiid
De dnl eve ensig t of solu oti nIopm s os u to sn cofor lTt ex com ute er npl een nIIproblems andp slemgn sy onents orcomp CSprocess rh needs rhproap cons derat o forns the c heal thpub and h soc aet danvtronm consental ons.PO4
inclnformation
onC ud ct ln nstio ofestiga com roblemsplex Se resp U earch based okn e andedgresearch methods ud desi o exfng mengn analPen sts, andys no fo ad at'llnterpretat dta,s thes IS theof to VI de concl us oNSPO5
udiacti withties
oM ed rn C sreate andelect, apP v ate techn uesappropri resou danq rces,modem ITand oo S nclengineering ction andng pred mode n o mco xcg Pen neen vt unan derstand fo he ml tat nlo S
ocietal,Th€ e n ree na dng clso ety IeaS0nl npp v formed thng nco altextuby kno eedgsassess heal sa anth, d ulc turalfety egal sssue and the oc ns uen IC e naeq thefess nalo en
P07fe
f,staina
nE ron m ten sand usta na bit Underslanditv he fo thempact ss no a en npro neerl8 gcont and demols, nstrate the kno cd oe dancneed for SU bl deve lo
PO8 thE tcs ethpp v CS andpn comminclp to to an ethprofess ancs d res ns bi ri anes dponorn o rhf n cesPO9
effectidi setti
Ind id ua a dn mtea rklYo Funct on el an nd YI ualdv and as ma beem oeader n diverse team and n ultim sclPOl0 unicate effect
effeclieffect
instruct
oC mm nu titca ons Comm ve com ex nv ee nrlp eng es h h eneen commengt unrng and thtySuch be ab toe mcong reh anend dpwn ve and desireporls gn make ve and cand verecei earcl ons
POI I
tiPTOJ dis
tec nama eProj enm nda anfin ce knDemonstrate ard nu dedge erstan d fo thengand manenglneering ent nclagem es danpn p h ees oto npap v os wn as aeadand aln totean, ects and nmanage mul cl tnp atyPOl2 Life-
ti
Io €a rn Tng Reco th need8nl andfor veha the at on a dnprepar ab to en ery gan andndependen fe earn theng co ontext f tech on o chan
s
ProgramSpecificOutcome
Statement
PSOIlheoreticalDes gn computer-based
S ussystem ng computer that de om n s1 tera hecom s on of thprehen trade-offs nvo ye n the des chotce.gnPSO2 Design, develop and test software for different applications with real time constraints
PROGRAM ourcoMES (pos): computer science and engineering grsduates wiI be abre to:
science,fundamentals,
princi
that meet specificandsafety, cultural,
tool usage:
PO6to
to
environmentalsolutions in societal and
as
society at large,documentation,
on actias,
presentations,
work, memberenvlronments.
tn broadest
scrence
COI]RSE OIJTCOMES
CO-POs AND CO-PSOs MAPPING MATRICES
Course
OutcomesStatement
RCS-075.1distributed
theDemonstrate ofundamental cf andloud lrthe com utat oon e r lep andparacom
RCS-075.2 Understand the concearchitecture.
pt of virtualization and their mechanism with service orienied
RCS-075.3 Clouds on cloud stoPritze the loc dataud ln Pub c tea and bridRCS-075.4 Exam
securithene loudc dala Resource SIby methodsprov IM e t11onlng tn baop
on t.
RCS-075.5 virtual box and ln vten ronmpro en cantgramm abe ed o r Goo epplne
RCS-075.6ication hich distrDeve datalop areprocesslng pap execu lnted buted com pu rng
Program Outcome (PO)Course
Outcome
o o e o o 3 I P P =o =o o c
RCS-075.13 2 2 I
3RCS-075.2
3 2 ? 23
RCS-075.32 3 3 2 2 3 l
RCS-075.43 3 3 3 3 2 7 l .l
RCS-075.53 3 3 3 2 3 3 3 l l
RCS-075.63 l l 3 3 3 3 3 l 3
Averagc 2.8 2.6 2.1 2.5 2.66 266 2.8 2.6 2.6
(On completion of this course, students will be able to,)
Reference ArchitectureNISl' Ctoud Com tingblil'ri Studd oCtCVO ilandb cul)
l8/09/20i919/09i201920
RI2010912019
t{lI{1SaaS
l)aaS2410912019
2510912019RIArchitectural Desi Challe S21 2610912019IUStorage-as-a-Service271091201925R2Advanta es of Cloud Sto10ll0l2(\te16It2Cloud Stora e Providers - 5327 I l/10/2019R2lntcr Clortd Rcsource M ement1Q t5lt0l2019R2l{csource Provisionin & Mcthodst6fiol20lg29It_Glohal Exc c ol' ('loucl I{esourccs17n01201930
u.1lladoo I{cducc-Ma35RIVirtual Box - Goo EneA I lte
2511012019
30/ l0/20 I 936R3
RIi8RIFour Lcvels of Federation
I'ln llleEnvironment lor Goo lc
Federation in the Cloud[)ro
39
3vl0t20t9
0snlJ20l901/l l/2019
t{lFederated Services and lications40RI. R2Advan es ol federation4t
I{e uirements of federation1?.
0611112019
07llL1201908/1 I /201 9
08/08/2019
28/08/2019
I
06/09/201e
laaS
Itl
17
1S
2t:22
)1
R1, R2
-
RIInstallation of-lt l3/11/2019RI
\1,'h GAE useful?t4l1U201941R3Rcvision of Unit Il5/l l/201945
RIRevision of Unit 2t9llll2019-16RIRevision of Unit 320ll | 1201947
I{3Revision of llnit 42l l1l201L),+ tlRRevision of Unit 522llll20t949
References:Rt. rui H**,g. Geoffrey c. Fox, Jack G. Dongarra, "Distributed and cloud computing,
From Paral-let Processing to the Internet ofThings", Morgan Kaufmann Publishers' 2012'
R2. futtinghouse, John W.' and James F. Ransome, -Ctoud Computing: Implementation'
Managemcnt and Security, CRC Press,2017'
R3. Rajkuiar Buyya. Christian Vecchiola, S. ThamaraiSelvi, -Mastering cloud computing,
Tata Mcgraw llill, 2013
Sign tu,ld; ,r"r"^ O,Sign ture of Module Co-ordilator
q!,fp fofSAE
Previous Years UniversityQuestion Papers
New Subject (No euestion paper Available)
Lecture Notes
cloud computing provides us means,of accessing the apprications as utirities overthe lnternet. rt arows us to create, "onngrre,
,nJ c"r;i;;" the apprcations onrine.
What is Cloud?The term croud refers to a Network or rnt€rnet. rn other words, we can sav thatcloud is something, which is present at remote tocation. cr"rli 1"" pt"",i" ."iil$over public and private networks, i.e., WAN, f_nf,f or Vif,l.-Applications such as e-mair. web conferencing, customer relationship management(CRM) execute on cloud.
What is Cloud Computing?Cloud Computing r.f"rr
--L9.!l!ipulating, .configuring, and accessing thehardware and software resources remotery. rt ofdrs onrine data storage,infrastructure, and application.
I
cloud.computing- offers pratform independency, as the software is not required tobe instatted rocaily on the pc..Hence, in" croro borpuling is making our 6r.in"siapplications mobile and collaborative.
Basic ConceptsThere are certain services and.moders working behind the scene making the croudcomputing feasible and accessibre to end useis. Foilowing are tne worring moaetsfor cloud computing:
. Deployment Models
. Service Models
Deployment ModelsDeployment models define the type of access to the cloud, i.e.,Iocated? Ctoud can have any of ine four types'if'"iis"s: puoficand Community.
how the cloud is, Private, Hybrid,
Public CloudThe pubric croud arows systems and services to be easiry accessibre to thegenerar pubric. public croud hay be less ,".rr" u"""rr-" of its openness.
Private CloudThe private cloud aflows systems and services to be accessibre within anorganization. lt is more secured because of it. pii-rrte nitrr".Community Cloud
l,T#:li:xl'v cloud allows svstems and services to be accessibte by a group of
Hybrid CtoudThe hybrid croud is a mixture of pubric and private croud, in which the criticaractivities are performed using private crouo wrriie
-ine non-criticar activities areperformed using public cloud.
Service Models
cloud computing is based on service moders. These are categorized into threebasic service models which are -
. lnfrastructure-as-a-service (laaS)
. Platform-as-a-service(paaS)
. Software-as-a-Service(SaaS)
Communit y Clo
Anything-as-a€orvico (XaaS) is yet another service model, which includesNetwork-as-a-Service, Business-as-a-Service, ldentity-as-a-Service, Database_as-a-Service or Strategy-as-a-Service.
The lnfrastructure-as-a€ervice (laas) is the most basic level of service. Each ofthe service models inherit the security and management mechanism from theunderlying model, as shown in the following diagram:
Applhation
Plattorm
lnfrastructure
I nfrastructure-as-a-Service (laaS)laaS provides access to fundamental resources such as physical machines, virtualmachines, virtual storage, etc.
Platform-as-a-Service (PaaS)PaaS provides the runtimedeployment tools, etc.
environment for applications, development and
Software-as-a-Service (SaaS)
SaaS model allows to use software applications as a service to end-users.
History of Cloud ComputingThe concept of Cloud Gomputing came into existence in the year 1950 withimplementation of mainframe computers, accessible via thin/static clients. Sincethen, cloud computing has been evolved from static clients to dynamic ones andfrom software to services. The following diagram explains the evolution of cloudcomputing:
BenefitsCloud Computing has numerous advantages. Some of them are listed below -
. One can access applications as utilities, over the lnternet.
. One can manipulate and configure the applications online at any time.
. lt does not require to install a software to access or manipulate cloudapplication.
. Cloud Computing offers online development and deployment tools,programming runtime environment through PaaS model.
. Cloud resources are available over the network in a manner that provideplatform independent access to any type of clients.
. Cloud Computing offers on-demand self-service. The resources can beused without interaction with cloud service provider.
. Cloud Computing is highly cost effective because it operates at highefficiency with optimum utilization. lt just requires an lnternet connection
. Cloud Computing offers load balancing that makes it more reliable.
1950s 1960s
I
2000 Beyond 2010
tta 6
Risks related to Ctoud Computingetlno,uojr croud..computing is a promising innovation with various benefits in theworld of computing, it comes with risks. some of them are discussed berow:
Security and Privacy
It -is the biggest concern about croud computing. since data management andinfrastructure management in croud is provided oi thira-party, it is arwiys , ,.r.i tohandover the sensitive information to cloud service providers.
Althoug_h the cloud computing .vendors ensure highry secured password protected
accounts, any sign of security breach may resu-tt in loss of custom"r, ,nobusinesses.
Lock ln
Il_ is_very difficult for the customers to switch from one cloud service provider(CSP) to another. lt results in dependency on a particular CSp for service.
lsolation Failure
This risk involves the failure of isolation mechanism that separates storage,memory, and routing between the different tenants.
Management lnterface Compromiseln case. of public cloud provider, the customer management interfaces areaccessible through the lnternet.
Ne.SoflwareR€ouired
II
CloudComEJting
xrYicr'.
'OcliEry otlEs, Pr. S, S{ S,il.! S,
{o[&qrtiltcarE thg
d a
.Utilrty Cqrultirg
.Strt o,AutrrrtiIrphac.LoclaiDd
'r950sBeyond 2010
't 990s 2000
BenefitsCloud Computing has numerous advantages. Some of them are listed below -. One can access applications as utilities, over the lnternet.. One can manipulate and configure the applications online at any time.
' :rff::,,ff: require to install a software to access or manipurate croud
' croud resources are avairabre over the network in a manner that provideptatform independent access to any type "f;t;;;i;.
"
. Cloud Computing offers gltemand self.service. The resources can beuse d with o ut i n teractio n with ct o u Jse.rvicJ'piJ,,il Ji'' cloud computing is hiqlr.ry cost effective because it operates at hioheftciency with optimum utiriiation. ttiustiequirlil,irnt.rn"i-.-o,in!.ti;; ','v',. Cloud Computing offers load balancing that makes it more reliable.
Rrbks retated to Cloud ComputingArthough croud comoutino is a promising innouation with various benefits in thewortd of computing, it comEs *itn ,i.r,r. s"in.;H# ;1. discussed betowSecurity and privacy
It.is the biggest concern *1yl ggrO computing. Since data management andIntrastructure management in cloud is proviOlO'Of tfirO-p"ny, it is always a risk tohandover the sensitive information to .f IrO'.'"-ri# O.ro,rryO,urc
It is very difficurt for the customers. to switch from one croud service provider(csP) to another. tt resutts in oepenoenc|';;;;[ffcSp for service.Isolation Failure
H J,i:. fr':ilnn'[:J:'l'Jin"": ,;:,'f;,,T, :H:: a n i s m that se pa rates sto ra s e,
Management lnterface Compromiseln case of public cloud raccessible through the tnt"d'Jl'idtt
the customer management interfaces are
Ns SpfiwareReourred
DeploymentModels
5ffillxf,o,.,
SeMceModels
CornmonCharacteristics
IeasaSeMce (SaaS)
asaSeMce (paaS)
lnfrastructure as aSeMce laaS
Broad Networks Acces
Resojrce pooli ng
Rapid Elastictty
Measured Seffice
On Demand Self Servicecloud computing arows the users to use web services and resources on demandone can togon to a website at any timJinj;;;;*" '
Broad Network Access
:llt:,tfiHfputing is completelv web based, it can be accessed from anywhere
Resource Pooling
cloud computing a,ows murtipre tenants to share a poor of resources. one canshare singre physicar instance br narawaie, oai.ii.. .Ii o"ric infrastructure.
lnsecure or lncomplete Data Deletion
It is possible that the data requested for detetion mav rbecause eitner of the fo-t-loiing ,"r.on, rot get deleted. lt happens
' Extra copies of data are stored but are not availabre at the time of deretion. Disk that stores data of multiple tenants is destroyed.
C h a ra cteri stics of C toud C o m p uti n gIffffi':,J;[-kev characteristics of ctouo computi-ng. They are shown in the
,rrilr
Hybrid
It is very easy to scale ,n" ,".ro-yr::, vertically or horizonta y at any time. Scaling ofresources means the ability of resources t6 O"ri'*it,f,.demand. rv uEdr wtrn tncreasing or decreasing
Ii?ffi::J:*. being used by customers at any given point of time are automaticaily
Rapid Elasticity
Measured Serviceln this service croud provider contrors and monitors a, the aspects of croud service.r(esource optimization. biilins, and Ap*iti'ffiil]1"lil,!"r"no o, ,,.Before deploying appticationreq u ire m e nts F; rili; rili" ii Jt jr::'il :'; ffi :."XTy",i
co n s id e r yo u r b us i n es s
. Data Security and privacy Requirement. Budget Requirements
. Type ofcloud - public, private or hybrid. Data backup requirements. Trainingrequirements. Dashboard and reporting requirements. Client access requirements. Data export requirements
il.1{:::,r11t::fi l;:xi,srJ[lt .fgiiIfl 31il3J:H:H"#i[:'#:1}]:sJtan enterprise before migrating the entire businei.:iffi.phases are a"s.r.ioeiin"iri"'io,,o*ing diagram: td Each of these planning
Strategy phaseln this phase' we anaryze the skategy probrems that customer might face. Thereare two steps to perform this analysisl,
. Cloud Computing Value proposition
. Cloud Computing Strategy planning
Cloud Computing Value propositionln this, we analyze the factors influencing the customers when applying cloudcomputing mode and target the k"v p;;br#. i;;i*iJ;';o sorve. These kev factors
. lT management simplirication
. operation and maintenance cost reduction. business mode innovation
. low cost outsourcing hosting. high service quality outsourcing hosting.All of the above analysis helps in decision making for future development.
Cloud rE Uep.orrctio.l
Qu.lityofS€rvbo Cloud
Prqi&r IIA
ITArcikurr
Cloud Computing Strategy planning
The strategy estabrishmentis-l-"_.:d gn the anarysis resurt of the above step. rn thisstep, a strategy document-is.preoared according tolne conoition, . .L.t"i,'.rr'rtntface when applying cloud computing mode.
Planning phaseThis step performs anarvsis of.probrems and risks in the croud apprication to ensurethe customers that the croua'comlf i".ri.".rrrrv meeting their businessgoats. This phase invotves the foilowing fia."i,iri-.i"pr,
. Business Architecture Development
. lT Architecture development
. Requirements on euality of Service Development. Transformation plan development
Business Architecture Developmentln this step, we recognize-the risks that might be caused by croud computingapplication from a business perspective.
lT Architecture Developmentln this step, we identifu the
^apprications that support the business processes andthe technorogies required to support enterpriie afifiicrtLn. .no data systems.
Requirements on euality of Service DevelopmentQuality of seryice refers to the non-functionar requirements such as reriabiritv.
;fi :l,Yi jl'i"j::i,?,?,:Ii?fl.i,i,lli;k;,;;.ril;rvi;;-;i;,i;ffi ;,i.;fi [';Transformation plan Developmentln this step, we formurate a kinds of prans that are required to transform currentbusiness to cloud computing modes.
Deployment phase
l[irln"" focuses on both of the above two phases. tt invotves the foilowing two
. Selecting Cloud Computing provider
. Maintenance and Technical Service
Selecting Cloud Computing provider
This step incrudes serectino a c10ud provider on basis of service Lever Agreement(SLA), which defines the teiet or servile in" prorijJiriri...l
Maintenance and Technical Service
llil!il:T:;l:,[r":?:':fl;:Jices are provided bv the croud provider rhev need
There are certain technorogies working behind the croud computing pratformsmaking croud computing n"*i-ore, reri"t'i"].ri,il]oil"riese technorogies are risted
. Virtualization
. Service-OrientedArchitecture(SOA)
. Grid Computing
. Utitity Computing
VirtualizationVirtualization is a technioue, which. allows to share single physical instance of anapprication or resource among muttifte";r;;#il;r'1r tenants (customers). rt,1",nffiffi:?:'gl?; fflS;,,:fl:?i:tii",,"J,li'.il!ii,L".na JioJ,oing ; ;;;t,";
Modcl
The Murtitenant architecture- offers virtuar isoration among the murtipre tenants.ii.:1,'i;*",,i1fl illi:[:: "*,.. i, Jli;#;;T :,il ]ppi.; i6 ; ;s'' i;;,il il:"t
Application
III
I
I
IIII
IIII
II
ApplicationApplication
Se ru ic e-O ri ented A rc h itectu re (S OA)service-oriented Architecture_helps to .use apptications as a seryice for otherapptications regardress the type,of ,"nooi,-piJir"i-oi'i"cnrotogy. Therefore, it is:::il3f"ff ;:l;l';J::ii[?"i:f":."J:,.ij;#;;#Joi**di,""i.,.,,,iiinf ,iThe cloud computing service oriented architecture is shown in the diagram below.
Grid ComputingGrid Computing refers ro di:rlp-rJ:g computing, in which a group of computerstrom multiple locations are connected wiih e;;h oil;r to achieve a common|.qi!lil";
rhese computer resources # h.t";d;;;ous and seosraphicary
Grid Computing breaks comcpu, tir.ir".ii"ffffi;:,ui!* task into smailer pieces, which are distributed to
Gtalog ServlcesLocator Serylces
GloDe S€rylcss ap s€rykes
r'<- erye!::L&list!rts
Sesl(0pfuthoring
Databases
SuperComputers
Laptops
Front End
Back End
Each of the ends is connected thrgrgh ? network, usua,y lnternet. The foltowinodragram shows the graphicat view or ciouJ co-mpliiig:"r:;,t".trr",
PCs
Utility Computing
9!'ff:Ti:'# ,;3,T::
!!l:r'r:1u"" moder. rt orrers computationar resourcesrr services.," o"."jln"tr,""l',jii;ill?t,ilfli",Lli;tifl[f .o,ni,tins,;;; ;;;;Cloud Computing architecture. com.prises of many clouc, components, which aretooserv coupred we can oroaorv oiviiel-n-e i"riii.nr[x,rre into two parts:
r---_:---_----
Front End
Eack End
consists ofcomputing
I
Front EndThe front end refers to the client part of cloud computing system. ltinterfaces and apptications tnat ire-reqr;;;';#;ss the ctoudplatforms, Example - Web Browser.
Back EndThe back End refers to the croud itserf. rt consists of a, the resources required toprovid_e- cloud computing services. ft a"rprir"a if't,rga data storage, virtualmacnrnes, security mechanism, services, o"prlivrJri,i,"dels, servers, etc.
Note
' rt is the responsibiritv of the back end to provide buirfin security mechanism,traffic control and protocols.
. The server employs certain protocols known as middreware, which help theconnected devices to communicate wittr eacfr otn"i.. Cloud infrastructure consists of servers, storage devices, network, cloudmanagement software, deployment softwaie, anO"pirtrom virtualization.
IIII
I
I
I
I
III
I
gloud lnfrEstrucfu ral Compdtcnt!
Hypervisor
Hypervisor is a firmware or row-rever program that acts as a VirtuarMachine Manager' rt arows to share tne sirigr; phviicar instance of croudresources between several tenants.
Management SoftwareIt helps to maintain and configure the infrastructure.
Deployment SoftwareIt helps to deploy and integrate the application on the cloud.
Network
It is .the key component of croud infrastructure. rt alows to connect croudservices over the rnternet. rt is arso possibre to a"rir.i network.r. ,tirityover the rnternet, which means, the customer cin customize the networkroute and protocol.
Server
The server helps to compute the.resource sharing and offers other servicessuch as resource allocation and de-allocation, "ronitoring tne iesouicdproviding security etc.
Storage
cloud.keeps. murtipre repricas of storage. rf one of the storage resources fairs,
liil" l"i3l,"* elrracted from anothEr on", *ni.-n rrieicroua .orlrtin!
I nf ra str u ctu ra I C o n stra i ntsFundamentar constraints that croud infrastructure shourd imprement areshown in the following diagram:
Transparency
Security
virtuarization is the kev to share resources in croud environment. But it is notpossible to satisfy the OemanO^with ,l;r; ;;;r*'or. ,"*"r. Therefore,there must be transoarencv In resources, load balan;in; and application, sothat we can scale them on demand. ' - -- -- -' '|v" 'r
Scalability
scaling up an apprication derivery sorution is not that easy as scaring up anapplication because it invorves.configrr.tion or"rn.Jo ii even re-architectingthe network. So, apptication ^d"rir"rvlolriion
ir;ffioi" scatabte which wiltrequire the virtuar infrastructrr. .utn *'rt i".-oriJJ ili oe provisioned andde-provisioned easily.
lntelligent MonitoringTo achieve transparencv and^ scalability, application solution delivery willneed to be capable of int6ltigent monitoririj.
-rF"vu'v,, oi
The mega data center in the cloud should be securely architected. Also thecontror node, an entry point in mesa d.i;.;il;;;1:jor,o b" r".rr.Public Cloud allows svstemr
s:*,.;,. *fr:?t*.;il HHTfltif;ilfl# f l;iT,#: "rtx
Public Gloud Modet
A
ser B
User C
User D
BenefitsThere are many benefits of deploying cloud as public cloud model. Thefollowing diagram shows some or'tndseiene?ii..Yv
Huvrrv
ComputeSeMces
PlatformSeMces
StorageServices
{ l!l)
Cost Effective
Public cloud servicesindependence.
Utility Styte CostingPublic cloud is alsoaccessible whenever customer n
High Scatability
Less Customizable
are delivered through lnternet, ensuring location
based on pay-per-use modeleeds them.
and resources are
Since publlc cloud shares sturns out inexpensive. ame resources with large number of customers it
Reliability
The public cloud emDlovs large. number of resources from differentlocations rf any of the res6urces iairs, puori. .ro--uo .I"n"#plov another one.Flexibility
The public cloud can smoothl y integrate with private cloud, which givescustomers a flexible approach.
Location lndependence
Cloud resources are made available on demand from a pool of resources,i.e., they can be scated up o,. oo*n .cJo;il'#;.ilil".,.DisadvantagesHere are some disadvantages of public cloud model:
Low Security
ln public cloud model. data is hosted off-site and resources are sharedpublicty, therefore does not ensure trigher li,rj i J.i]r.rritv.
It is comparatively less customizable than private cloud.Private Cloud allows svstems
. and services to be accessible within anorganization The privats croud is operated onry within a singre organization.However, it may be manased int"rnlilv ov tn" i,.liliiilri,party. The prr;i";;;;'#;;r rs shown in the diasram o"l#ttt't
or bv third-
. High Security and privacy
. Private cloud operations areare shared from distincthigh security and privacy.
not available to general public and resourcespool of resources. Therefore, it ensures
Prlvrtc Cloud Modcl
BenefitsThere are many benefits of deploying cloud as private cloud model. Thefollowing diagram shows some of those-benefits:
ufiure
oraoii
More Control. The private cloud has more control on its resources and hardware thanpublic cloud because it is accessed
"rfV *iif,ir'i.
"iianization.. Cost and Energy Efficiency
' The private croud resource-s- are not as cost effective as resources in pubricctouds but they offer more em.iencv it an -pi,f[ ;il; resources. Disadvantages
. Here are the disadvantages of using private cloud moc,el:
. Restricted Area of Operation
' I,:irlr;*"
cloud is onlv accessible locallv and is very difficutt to deptoy
. High Priced
' Purchasing new hardware in order to furfi, the demanc, is a cosry transaction.. Limited Scalability.
I*""J:,JS:" ctoud can be scated onty within capacity of internat hosted
. Additionat Skifls
' ln order to maintain croud deproyment, organization reguires skired expertise.' Hybrid croud is a mixture of oubric and private croud. Non-criticar activitiesare performed using pubric .toro *rriie tfie'Jriil.li"r.tiuitius are performedusing private croud. The Hvbrid croud u.i"iir liiii. in the diagram berow.
llybrid Cloud Modct
BenefitsThere. are many benefits of deploying cloud as hybrid ctoud modetfottowing diagram shows some oi tnlr"i.n.tiisse
rrrvrru The
Publiclexternal
Hybrid
Scalability
It offers features of both. the public cloud scalability and the private cloudscalability.
Flexibitity
It offers secure resources and scalable public resources.
Cost Efficiency
Public clouds are more cost effective than private ones. Therefore, hybridclouds can be cost saving.
Security
The private cloud in hybrid cloud ensures higher degree of security.Disadvantages
Networking lssuesNetworking becomes complex due to presence of private and public cloud.Security ComplianceIt is necessary to ensure that cloud services are compliant with securitypolicies of the organizafion.
lnfrastructure Dependency
' The hybrid croud moder is dependent on internar rr infrastructure, thereforeit is necessary to ensure r.eaunjan.v,criss jri.i.nt"o.Community Cloud allows system and services to be accessible by group of$t#:':fl';jl,iliifi#i ;rrastr;i;;1;;;;i",J,=",,r orsanizati6nJ r,iil
-;
p;rty rhec;;;;; il ffiili,Id?X?S:flJlf1;il[:t;,,:il,,.:,'j*. r Ll, tn" inil:
Communtty Cloud Modct
Organization 1
BenefitsThere are many benefits of deproying croud as community croud moder.
Cost Effective
Organization 2
Community cloud offers same advantages as that of private cloud at low cost.Sharing Among Organizations
3#il,YflY.9:;3,$]:n?r#,jlll;::',.,,,. to share croud resources and
Ernh nl7'
Security
The community cloud is crsecured than the priurt"
"tJff"'atively more secure than the public cloud but less
/ssues. Since all data is located at..one place, one must be careful in storing data incommunity ctoud because it might ue Lcc;sri[6 io o,n"r..'
[J:,]}'Ji'J',.;:n;,?:,13.:l'*ate responsibirities or sovernance, securitv and
lnfrastructure'as'a€ervice provides access to fundamentar resources such asl$J.,::. if, :1ffS ., JIii!,J;.n8.; ;il; i #:,8, etc npa rt
- iro;' ;il J;
. Virtual machine disk storage. Virtual local area network (VLANs). Load balancers. lP addresses. Software bundles
All of the above resources are made available to end user via serverJr,[1X,;;,ar.
Moreover, these resources .r" ..."...0 by the customers as if they
,sFlrerial Load Balatcer
flfl*w"3I
machine
I
tI
I
II
Mrlualand star€d
oI
vlrtuaj MachineAutoma on
storage
-
0arllrlThe vtrtual machtrE Euploaded lo st{age. -JSofni,are
OwnerVirlualMachlne I
taasvenooF i= -
End User (Iheend us€r sees afnishedapplhatiofl) ls depbyed
#
Benefi/slaaS allows the cloud erov]g:l t9 llee]V locate the infrastructure over the tnternet ina cost-effective manner. some of the k;y-G;ii;;ii"".s ,r" tisted betow:
' Fu' contror of the computing resources through admrnistrative access to vMs.. Flexible and efficient renting of computer hardware.. Portability, interoperability with legacy applications.
Furr contror over computing resources through administrative access to VMslaas a'ows the customer .to..access computing resources through administrativeaccess to virtuat machines in the fottowing ;-a;;""r;-"-"
' customer issues administrative command to croud provider to run the virtuarmachine or to save data on ctoud i;;;; - * "-'' customer issues administrative command to virtuar machines they owned tostart web server or to install new
"ppfi.ai,ori "'"
Flexible and efficient renting of computer hardwarelaaS resources such as. virtual machines, storage devices, bandwidth, lpaddresses, monitoring services, irrewaiil;i;--;* ilirJ avaitabte to the customerson rent' The payment is based ,pon tr'r-"
"rou-ni'"f tira the customer retains aresource. Arso with administrative i".".. to ri,i ].i'ri..ir,in"., the customer can runany software, even a custom operating sVGr.
--- "'--'
Portability, interoperability with legacy applicationsIt is possible to maintain leoacy between applications and workloads between laaSclouds For exampre, netwo-rk ipprications l]cil;;;'i"r"r or e-mair server that:,:rJf,,,
runs on customer_owne'd s"*e.triow"L'.-.i arso run from VMs in taaS
/ssueslaas shares issues with paaS and SaaS, such as Network dependence andbrowser based risks. tt atso has ..r.;ilil;Jr"l] *r,i.r, are mentioned in thefollowing diagram:
Compatibility with legacy security vulnerabilitiesBecause raas offers the customer to run regacy software in provider,s infrastructure.it exposes customers to a, of the ,.;r;,ty;il;;iirii".=or.r.n tegacy software.
Virtual Machine sprawlThe VM can become out-of-date with respect to security updates because raasallows the customer to oDerate tne virtuai riac'niniJli-irrning, suspended and offstate. However, the piovider .;n ;rt";;;;;iil l,;i'." such vMs, but thismechanism is hard and complex.
Robustness of VMlevel isolationlaas offers an isorated environment to individuar customers through hypervisor.Hypervisor is a software taver thgt incfuoei naiJw.'ri-.rpport for virtualizatron tosplit a physical computer into muttipte virtuaf maininJs] "
Data erase practices
The customer uses virtuar machines that in turn use the common disk resourcesqlgvi(ea by the croud provider. when the .rrtor",. ,-"r.*es the resource, the croudprovider must ensure that next customer to ,.ant tna raaorr.e does not observe dataresidue from previous customer.
CharacteristicsHere are the characteristics of laaS service model:
. Virtual machines with pre_installed software.. YiXXi:jffiTff,i.*nn
pre-instailed operatins systems such as Windows,
. On-demand availability of resources.
' Aflows to store copies of particurar data at different rocations.. The computing resources can be easily scaled up and down.
Platform'as-a-service offers.the runtime environment for apprications. rt arso offersle_vetopment and deptoyment toots requireJ i; ;;;H apptications. paaS has al?,Tliii,,""rt l"''t-and-click
tools that '"niol"i -ioi-i!udr6p"r. to .r".i"''-ui"[
App Engine of Googre and Force.com are.exampres of paas offering vendors.Deveroper may rog on to these websites ,ra ,r"'ltlirirt-in Apr to create web-based applications.
But the disadvantage of using. paas is that, the deveroper tocks-in with a particurarvendor' For exampre, an apirication iltt.'ir'i,ipit'nJl'""g"inrt Apr of Googre, andusrng App Engine of Google is likely to work onty i'n tn-ri !}lr,rorr"ntThe following diagram shows, how paaS offers an Apr and deveropment toors to thedevetopers and how it herps the end ;s;r b;;;;;il#;., apptications
,trrlEushessUs€rs
DeveloperrsV
BenefitsFollowing are the benefits of paaS model
rl[Scahblshfrltslructuro
BurlncuApps
bApdic.lfoo
sD
Lower administrative overhead
3rT:tJl}ffi::not bother about the administration because it is the responsibirity
Lower total cost of ownershipCustomer need not purchstorage. r'-'e'lase expensive hardware, seryers, power, and data
Scalable solutions
l#J? easy to scate the resources up or down automaticaily, based on their
More current system software
llrl,f"i,lill..ribitity of the ctoud provider to maintain software versions and patch
/ssuesLike saas, paas also olaces significant burdens on custome/s browsers tomaintain reriabre and sicure corinecro-ns to itre irJvioets systems. Therefore,f-aas.sfraps.mlny of the issues of Sa-aS. H;;;;;r,'i;; are some specific issuesassociated with paas as shown in tne roriowint ai#;;:''
Lack of portability between paaS clouds
flT^lSl_*lqard-tanguages are used, yet the imptementations of ptatformserytces may vary. For example, file, queue, or nasn taUtl interfacei oi one il#;;;may differ from another, making ii bir".iri to tr"nJf,r the workroads from oneplatform to another
Event based processor schedulingThe PaaS apprications are event-oriented which poses resource constraints onapplications, i.e., they have to answer a request in a liven interval of time.
Security engineering of paaS applicationssince Paas apprications are dependent on network, they must expricifly usecryptography and manage security exposures.
CharacteristicsHere are the characteristics of paaS service model:
. PaaS offers browser .based development environment. lt allows thedeveloper to create .database and edit the afprication coae eitner viaApplication programming lnterface or point_and_click tools.
' Paas provides buirt-in security, scarabirity, and web service interfaces.
. lt is easy to integrate paaS with other applications on the same platform.
' PaaS arso provides web. services interfaces that arow us to connect theapplications outside the platform.
PaaS TypesBased on the functions. paas can be crassified into four types as shown in thefollowing diagram:
Stand-alone development environmentsThe stand'arone paas works
1s an. independent entity for a specific function. rtdoes not incrude 'censing
or technicar a;dil;;;r-;n specitic saas apprications.Application delivery-only environmentsThe.aprrication derivery paas incrudes on-demand scaring and appricationsecu ty.
Open platform as a serviceopen PaaS offers an ooen source software that herps a paas provider to runapplications.
Add-on development facilitiesThe add.on PaaS allows to customize the existing SaaS ptatform.Software'as-a€ervice (saas) moder arows to provide software apprication as aservice to the end users. rt refers to . tottrr... tf,ri ls-ieproyeo on a host serviceand is accessibre via rnternet. There are r;;;.id;;b';;prications risted berow:
. Billing and invoicing system
. Customer Relationship Management (CRM) applications. Help desk applications
. Human Resource (HR) solutionssome
-of the Saas apprications are not customizabre such as Microsoft officeSuite. But SaaS provides us Application programming tnterface (Apl), whichallows the developer to develop a customized .pificriion.
ll
Aeid<ingtoPnililies
CharacteristicsHere are the characteristics of SaaS service model:
. SaaS makes the software available over the lnternet.
. The software applications are maintained by the vendor.
. The license to the software^may be subscription based or usage based. Andit is billed on recurring oasrs.
. t#::,JjXl,:XI*r. ffi
"T:leffective
since they do not require any
. They are available on demand.
. They can be scaled up or down on demand.
. They are automatically upgraded and updated.
' saas offers shared -data
moder. Therefore, murtipre users can share sinore;ffif,:.r:,.JJ::::structure.
rt is not requi[i'ti"nilo code the functionarity ior
. All users run the same version of the software.
BenefitsUsing saaS has proved to be. beneficiar in terms of scarabirity, efficiency andperformance. Some of the benefits are tisteO Oeto'w:
'- -'
. Modest software tools
. Efficient use of software licenses. Centrallzed management and data. Platform responsibilities managed by provider. Multitenantsolutions
Modest software toolsThe saas apprication deDroyment requires a ritfle or no crient side softwareinstattation, which resutts in'ttr6 toilowiniO...ntr, ""'" "
. No requirement for complex software packages at client side. Little or no risk of configuration at client side. Low distribution cost
Efficient use of sofhvare licensesThe customer can have .irgl.^li.:-1.g for muttipte computers running at differentlocations which reduces the iicensing cost. Arso, there is ho requirement for ricenseservers because the software runs in-tne frovio.i, inirritrr.trr".
Centralized management and dataThe cloud provider stores data. centrary. However, the croud providers may storedata in a decentrarized manner forthe-sii;;ru;i.[y and reriabirity.
Platform responsibilities managed by providersAll platform responsibilities._.-th
": backups, system maintenance, securitv.hardware refresh, power management, et.. .i." p".foired by the cloud providei.The customer does not need to Sotnei loout fi;;""' '"' "'
Multitenant solutionsMurtitenant sorutions afiow murtipre users to share srngre instance of differentresources in virtuar isoration. customers ."n .rrto-rr.""tt,"ii rJpri.-.tion;iililiaffecting the core functionality.
lssuesThere are severar issues associated with saas, some of them are risted berow:
. Browser based risks
. Network dependence
. Lack of portability between SaaS clouds
Browser based riskslf the customer visits maricious website and browser becomes infected, thesubsequent access to Saas apptication ,igr,il;riiJ;r.'se the customer,s data.To avoid such risks, the customer can use murtipre browsers and dedicate a soecific
!:Silffff"Tj.saaSapplicationtot.Lnr.Srr:nr.iiJ.xt"p*-nir!ff .:i[;;Network dependenceThe saas apprication can be derivered.onry when network is continuousry avairabre.Also network shourd be reriabre but ih;;"t*;;k';ri.iirity ..nnrt be guaranteedeither by cloud provider or by the customer.
- - - ' -"--
Lack of portability between SaaS cloudsTransferring workroads from one saas croud to another is not so easy becausework flow, business logics, user interfaces, support sa,pi. a"n be provider specific.
Open SaaS and SOAOpen SaaS uses those SaaS applications, which are developed using open sourceprogramming language. These
^saas appticationi can
'rrn on any open sourceoperating system and database. open sa'ds niJ."r.rri benefits risted berow:
. No License Required
. Low Deployment Cost
Less Vendor Lock-inMore portable applicationsMore Robust Solution
The following diagram shows the SaaS implementation based on SOA:
SOAP bhdingHTTP transport
Saas Diredoryweb seMce
Saas MessagingWeb Service
e e ESaaS CollaboraltmWeb S6ryice SaaS Conter( Web
SeMc€
SeMce Consumer
CAE Question papers withCOs
Roll No.:TIAS o LEG FENG ERTNG
TECHN GYl, Knowl edge Park-ll, Greater Noida U.p
AND
o t .I2
Course/Branch: B. TECIIA{ESubject Name: Cloud ComputingSubject Code: RCS 07S
Semester: VIIMax. Marks:40Time: 90 Minutes
co l: Demonstrate the fundamentar ofcroud and their computation over para[el anddistributed computing.
:rgi;.Y,Jrt"""d the concept of virrualization and their mechanism wirh service-oriented
Attempt any rou r questions. or*,ffi ::fi :l"rr.e.r Exptain the rorrowing terminorogies ,r(1liL?L.,*, computins?a) Horizontal scaling
b) Vertical scalingc) Pay as you use service architectured) On Demand provisioning
Q,2 Compare cloud and on-prer .
in cloud? r,...nrses computing? How elasticity is different from scalability
Q.3 Discuss in detail evolution of cloud computing?Q,4 What are the underlying principles ofparallel and distributed computing?Q.5 Compare cluster computing with grid computing using real-time examples?
ln:ml]a,yf ourquesrions.O""rr,*-r.u***"tf fi ,:1'y(4xs=20)
Q,6 Ansler the following in regard to virtualization?a) whal are the dilferent types olvirtu alizaLionlb) What is VMware FT? How many vCpUs can be used for a VM in FT?
Q'7 0utrine the conceDt of pubrish subscribe moder in detair with its rear+ime apprications?Q.8 Discuss is in detair service o"i.;il;.;;;;;Iie lsoa)z3'i,:fi:l?,TJH,T,:::'.1",:::t$i-''n? what are the toors and methods invorved using
Q.l0 Elaborate why is ApI necessary in cloud computing?
/CSE/ME/EUEE/ECConrplr]h8
OE O7J
S.o..tGr! VIIMlI. Mtrlr: 60TlmG! 02IIrt
a At,. nF.!y rvo au.stiont s"llo[-A(co: l)
Q.t Explain 0rc folio*ingrr) Explein Orid Como r tno
a, Lff H Hi,ffif "i6ioua computinj.
;i ffiIHlw,rcloudcomF,rins.qJ Why or8{lizlrloru &! r lopdn3 $. clorld for burimrt lrd lT Frpoctlvr? Exphln.
AEltnF .!y rro ou-rro,n: s'ctlor - B (cor l)
Q'a Expldn tlro Rcrourcc \ lnudlation sytrir h &oil.
;: SH HH*f 'r'.'d!bn8r vrnu8rrzrion'
S$ds-{.(co' J)AlGtpl lly Tlo qu.dion iQ'? Explrla Inc foUowlrg . it HyDcrviton (ll) Srvlcc Lrvll Aglar.nsQJ Sphia rbc followlal i t Hylia ctoga. (U) U1atrtnc trnrci.Q.9 WIth bloct dilSrull, cohin cloud compuin3 rcftsrcc ioacl ura rrvlcrs.
S.rlloo-D(CO!a)Att!6pa ely TYo qur3tiot ! :
Q.lo Hoy docr combiua. d lucloru t[o.rt! Etourr.r ln clou( crphlrlQ.tt Exphln ray Cloud P I lfom rd Mu!8cmr0t Complutlon Stotrgc.urpleQ.l2 Discu!! tha cloud co r pudry :ccurity gchitccturc ln bricf.
CO l: Demonstrate the futrdadistributed computing.
mental of cloud and their computation over parallel and
ODD Semester 2019-20
l. Define Cloud-Comoutinp.2. What are the various advLtages of Cloud-Computing?3. Differentiate between service models and Aepf oiren? ,oOels of CIoud-Computing.. Whar are the various needs of d.plovr.nt ,'oa-i;f
"' "'*'1. Pruv and explain the architecrure oicloud.o.oriinn.5. Differentiate berween para,et
"rd diri;ibriJ;;;prf;rg *i* examptes. which one ismore effi cient, explain?
concept of virtualization and their mechanism with service-oriented
L Define the term virtualization with examples.2. Draw and explain the virtualization reference model.3. Draw and explain the various levels of virtualization.4. Explain the implemenktion level of Virtualization.5. Define and explain SOA.
L What is cloud eco system2. Explain Grid Computine.3. Explain hybrid cloua. -4. Differentiate between public and private cloud.). what do you mean by full virtualization?
data by Resource provisioning methods and implement global
l. Draw the NIST Cloud Computing architecture and explain it.2. Explain private cloud modei.3. Explain hybrid cloud model.4. Explain community cloud model5. Explain infiastructure as a service.6. Explain platform as a service.
co 5: Anaryze the virtuar box and programming environment can be appried over Googreapp engine.
co 6: Develop data processing apprication which are executed in distributed computingenvironment by using Hadoop.
L Explain Mobile cloud computing.2. Explain Virtualization technique-s in cloud comoutins.
]. ExRlain Cloud.computing Securiry tecnniques.''-""t4. What are.the cloud computing service providers?). Explain the process of Cloud computing dau storage.
GALGOTTAS COLLEGE OF ENGfN4pRJNG Atyp TECHN9LOGy
Current University ExamQuestion paper
Prift.d Pr!. I otl110725 Fol !to:
Itb Cr{c; B€S0lj
2r7=lJ
B. IECg.(sf,lr vE) IEE{}RT ExrxINArIoil 2o}2o_ clouDcouyuTlr{clht: rE ut
l-"e 11;ipr.u s€crnar rrEqgi" ef ,i;.ring ahta,r!. t choor. o*tfiXlfob'- ',L _ sfcrloJf .{
Atllrpa d qu.stbrs ir bcirtSb* ir ClordEoo S,:l@?DitutcirE b:rrlta.lirrrihGt Cqriqg d Ctqd Coqrtilge+br! crid C.qdirg,ErybbHytidtunDiftrciae taru pblic rad girrt: cb,sd.Btrl ilo po r'-"" 5' fitl rirmaliado?Sb. rt dr urjc rr"tt-'E:: frc.d b dfid?
SECTION'BAtlr[pt tlJ 4rr d 6r frlbnLr:r iur;Ari-e;.lffffituir"*hgirier'rlpotacisr. ?rJ=21D. n3* u r Hlyquisot? E*LiD ir &nil rit urrssan Utusruiosc. sH b tte diftrce titra poce:s .tt
"f irr.tter-6ilf,o,f, aautirr l/:lIMs.d St* lr rlsud lrcu.ly .|'[-,EEE? HsF i, ir(tsirl Fsriit8d b dra ,t rariousrtrEps b c@acd sf r6rdr. Erybia tta rl-rcreriEdc Ed qp. of sifidiaiE b gbud Coryna!:
- scllo!(c-{tl!rpt rly rr_p_rrt of ttr ttoriq: ? r t = ?q] Eor C-luud Cqriry prorirf:s-scelabitity ud iuL robrEr,(b) EEhtu virrd LAIWIJIII) rad viturt i:lN(r/SeLf i, .i s .oryrrrc.-ylugt TI r! p{! of tr btoriq: ? r I = ?(.) E ptiltr tb Clod C.Mrn! se<urirf adi.<R!t usrag :urr;h UbdditgrttLG) E-br ir rbr rryEtro of e tirurl uettbC Etrt roL & ,iry pt I r! .!o.d<lqrriDf?
.$fp'qt ,.uy 6, ,rr1 of lb 6fori!E: ? r t = ?!"1 e'hn re-&r_rlx &rttnorffiir of Ea&op AI?O) Eplahthr Ch{d.''n E!4!r rd s.rvi.; di' Too,t!?
-{ttrrgt_uJ -r, prd of ttr LlorilE: ? r I = ?(r) P'hrt & ,uu. dsrd by s::i,rte orioart urtirrut (SO-$? I;nr doe5 tsrypon cloud mriur?(b) hlr rle urtb:rits id .:j.t,, tle iryorut of ruldlor Bu.orErraedr!:t@s iB Ghrd-
-{tl!rpt y-r,prd of &r eforiry: ?rI=?(r) 91!i! lUSf c]oud qrritg trfurate rrhirldrrt vi.t r rgar i&.Elric6.€rlE-(t) Ealaio &r uig*ba sg'".--ry, 6bs rad ostrst r!.ffirls b detril.
l.b.c-
da.
f
t
J-
{
t.
6.
IIII-ITIIT lrrPrp.r Id:
1.
Assessment Process
aook
NO
a 200/o
ASSESSMENT PROCESS
Theory Lab/Project
Sem in a r/Industrlattra ihing
externala5se ss men t
lnternal assessnlent
CO attalnment(external) CO atta lnment
( lnterna l)
Direct attainment
Total co attainmentlndirect
attainmeht
lsAtta ined ?
Communicate toModule coordlnator
(Cha nge In contentdeltvery)
Communlcate toModule coordinator(lncrease the tevelof competency andlevel of atta lnmenr l
ASSESSMENT TOOLS
I)irect assessment tools:
/ Continuous Assessment Examination I
/ Continuous Assessment Examination II
/ Assignments
/ Ilxtemal University Examinations.
lndirect asscssmcnt tool:
/ ('ourse exit survey.
IN'tI.]IINAI, AND EX'I'EIINAI, A'I"I'AINMENT LEVELS
lnlernal Assessment for theory courses
'l-arget Marks lor Internal: 50%o
o Attainment Levcl I : Lcss than 60 o% students scoring more than target marks.
. Attainment Level 2: 60 % to less than 70 oh students scoring more than target marks.
. Attainment Level 3: Greater than or equal to 70 %o students scoring more than target
marks.
lnternal In-direct Assessment for theory courses (Course exit survey)
Target Marks: 807o7 Aflainment Level l: Less than 60 o/o students scoring more than target marks.
y' Attainment Level 2: 60 % to less than 70 0/o students scoring more than target marks.
y' Attainment Level 3: Greater than or equal to 70 %o students scoring more than target
marks.
External Assessment for theory courses
Module ofthe course: Soflware Systems
'Iarget Marks lor Extcrnal: 50%o
. Attainmenl Level l: Less than 50 yo students scoring more than target marks'
. Attaimnent Levcl 2: 50 % to less than 60 % students scoring more than target marks.
. Attainment Level 3: Greatcr than or equal to 60% students scoring more than target
Total Attainment (0.8 * DA + 0.2 * lA) 2.6tt 2.6Ii 2.68 2.68 2.61.| 2.6t1
Atlainnrent Ler cl 2.68
,)-_V)z
Name of the Course lnstructor:
I
Identification of Weak andBright Students
I
,9
s
-E
R
,g5 a
4&6
o
U
U
qJEE
'5
s
a
SEEg [<.<Eq E.E
ii
E
!&
hEa,E
s
E
I3'n
U
.sE
g
2c
p.Et
9Z=-frx2y,i;€E?? 9 3
E€U;
.9 ,n, .o 9E iJV i
.9 orJE d8e,6€ &E
..!
,9EH
Criteria for Weak Students
Initiatives and Implementation Details of Assisting Weak StudentsThe deparhnent has a well-defined process of monitoring, guiding and assisting weakStudents
care is taken by the faculties in monitoring the performance ofweak students, the student,sdeviations from studies is observed by the respective class coordinators and correctivemeasures are suggested.
Every parent is informed about the attendance by a system.
Additional classes are given .to
weak students through extra classes, remedial crasses,assignment, tutorial sheets and materials are provided L them.
A special counseling and tutorial classes are conducted by the faculty for those studentswho have failed in any subject.
The observable impact of assisting weak students is reduced number of identifiable weakstudents.
Improved results and less number of failure in each subjects
S
No Action Taken
them for studCoun Icl s tstuden ot enconteracti inator/
thei the ir oti
I no fo coord head fo ten htdepartmr ts dto s sscuparen tand operformance m themvate
stutowards d
firsdaiExtra c lasses th cours lne hzero ours efore t e urect(b )
natic as eS ares on ud dcte fta er examl oneekend and rafte end o semf tes cer elass s
I
Student scoring less than65% of marks in previoussemester or having one ormore carry paper.
them with extra stud material for the co lcs.S urse
2
Diploma students whoadmitted with less basicof mathematics
Remedial classes are conducted for them.
Criteria
these
course
for
Remedial sessional
a
Criteria for Bright StudentsScored equal to or greater th an g0o/o of marks in previous semester
Initiatives and Implementation Details of Assisting Bright StudentsThe departrnent always had the curture of encouraging bright students by providing themnecessary guidance and moral support.
The bright students are identified based on their overall performance and their orientationtowards Academics.
Encouraged to attend conferences, rrorkshops and publish papers. Encouraged to take upinnovative projects and apply for funding. Encouraged to participat-e in variouscompetitions.
The. bright students having high academic track records are encouraged by facurties toachieve university ranks, also encouraged to take up competitive examiiations like GATE,GRE etc.,
The bright students having orientation to research are encouraged by facurties to pubrishtheir work in National & International conferences & Journals.
S. No. Roll No. Name Percenta No. of CPI 1609710068 NAMAN SHARMA 62.2 l2 16097t0069 NEHUL SUKRALIA 60.4 03 16097t0070 YARLNIKHI TIKA 55.9 24 t6097t0077 OJASWEE MOHAN 43.7 5
1609710088 RAJIV KUMAR 61.6 06 r 609710091 RISHABH STIANK HWAR 60.1 07 16097t0094 SHAH ATEEB AHMAD 08 16097101I I TUSHAR DUB EY 63.9 I9 16097101 l3 UTKARSH 63 0IO 16097t0n6 VIDIT SON KAR 51.9 3
i There is noticeable improvement in percentage wilh respect to previous year results' ,
! Undertake continuous assessment, ensuring that these results count in the final
grade/marks.;-a;;;;i attention with classroom learning and the role of blended leaming improved
in academic performance.
2.33
26
160971 0094
SAURABI.I RAJPUT
451709710915
l6
l7
(ffi GREATER NUIDA
DEPARTMENT OF COMPUTER SCIENCE AND T'NGINEERING
ACADEMIC YEAR 2019-20ODD SEMESTER
,
Date:10-10-19
Notice
Commencement of Zero Hou r Classes
This is to inform you that zero hour classes for weak students are scheduled from l4- 10- l 9 to 25- l 0- l9
l he time table for zero hour classes is anached herewith
Sub NameSu l, Code l" &2 zero hour 9.00.
Data Structure l4-t0-19 r8.10-t9KCS 302 ization and ArchitectureCom uter Or I 5- 10- 19 2l-t0-t9KCS 3O] l6-10-19 22-10-19Discrete Structures and TheoKOE 038
,oflo rcElectronics En neenn t7-10-t9 23-10-19
3RD !,EAR (A & B)
&cs 501
trcs so:
Sub C(,de
RC'S 07
.rTIl \1D.1.R (ACE)
I 8- r0- t9
21 -l0-IS23- I 0- l9
22- l0-t923- i0-19
-(
All re respective fasulliss of their core rare requested to follow the schedule
w
Sub Code Sub NameRUC 50]
DBMS 2t-10-t94-10-19
RCS 502 5-10-19DAA6-r0-t9
RCS EI2 r7-10-I924-l0-ls25- I0- I 9
RCSTO ISub Name
CR 7S 01
RCSOT I I 0 9
L-
2ND ]1EAR (T' & B)
KCS 3OI
2t-t 0- i9
I & zero
I & zer0 horr r
PPL
twrffruDr
luau
raleaJg 'Ai
\
E,-AF\ I'. Eoz
I
c
oo(oo-
36
z
E
'6
zE
-9
.8
t-EItI3
t
=z
E
;I
i
oi
:
zE
tI
zE
)<
o- a-:E > a
a
o L> 9E;SEy!, .d- I
Y1 a:. *",2d.- ?
vt >.
ega,i
,;,.d-E?
or :r
H]NN'I
(Ed :
E
SP,
,6
65
=E
E
=
o
d
6'Y
E
.9
ii> !
3zn- =
-o, a d
zo
=
.gpoz.(D(Eo,(,;(,)o6c()q,Ft,c(€o)Eo)6''6)
UJ
oq,o,gE(,ar,G'
oo,G(,
$
.1:L
l
l.6l\
E.={f.o 3 F lo.i !,t E 'a),g s 5=o=9zE'
i69:i=
gUJ
+Etr
Ez
F 3eg
d
o
dI
Ez
=E
I
,g
E
o
,=F
_q
dI
vIE
o
g
=
9,2
==
d
t
6z
=t
=
€s
Iao
N
z
Ez
(-)
E(-)
.9
c
.E
E(-)
o
E
.9
s'6q
E
,a(]
,?
EEE
,E
EF
do-
o:lIoI
.!l o
5-
o
=
J.cu>i
Jdii9
IF
c-E.rEl
Jdii{.,/ J.ziiU
lir
o-4ilzL)
.o9>';a-!>r)\r-
.o9oio. Ca rr hl o.Eda
I=s.oUai&c(d6,1/u) I \!
e9>ie(ldq,l o.Edk)
i9>?a.E>il
-,: c( d ll,1
a-lzdg)
.ouDiA.cldt!.oUt'? a-&d Ir)
Hf NN'I
t-r)l<'r)
drd-,:Lk!l
o. & i:t ta
a4 96. c, = !,1
aQra-iqdll\F
_ cf) ?!a9>Ya.(>u
tr)cah!) Ja(d!l )d6e)
5't
) d A t)
-ta =aeedi
tr--a Q.09>Y0- !, > lr,l
-
Jaadi.l )Et9
ld6e)giu>?Fl(drlj
JEdI:'l
1'!
rE !>i-aib
ccUvil- d d t)
JEiT! Jdat)
t'rJCz<!J )di9) )4itQ
zo
t-=
\-c-qtiJooo
.
;E
;g(o
F
E
o-
'=l
'aurl
".1
t,
o3
EE
o
gog
EF
(tl-o'6z.<1,
(Eo(9;o)ooc,(,q,F-ocag
o)coo)
'6,Euloo,t)(I)
E()o(E
oI(g(,
$
::
e
!
(ialgotias Oollcgc of t)nginccring and'fcchnoklgy' Crcater Noida
l)c rtnr cnt of Comnuter Sc ie ncc & I'ln !21ne c rl n (,
Coursc Iixit SurveYlo l9-10(ol)l))
Sub.ject Namc:
Iracultv Name:
Studcnt Name:
Cloud ComPuting
I{av ikant Nirala
Na-.ro',. L""y+-
SubjectCode: RCS-075(B)
Date: 08/l I /2019
Roll No: lboO+loo0?MobileNo: V*3tlL1{+'1
Good (3) Avcragc(2)
Poor (l)
Ycar/Scm: 4'h/Vll l:-Mail:
On the scale of l5-ll. ht-rrr rruuld !ou ratc the follorving?
(lou rscOutconrc
Slalcnrttrt
r inr-ral boxcnvironment c
ll rcellcn t(s)
Vcry(lood (.1)
C()-ll)r'monstratc thc lrrttdarllcntal ol' clottd
and thcir conrputiltiotl ovcr parallel and
CO-2
distributcd comPuting.
Undcrstand tlre "un""'Pr-- of
v rtual zatiott arrd tltcir mcchanism
with scrvicc ori,:ntcd architecturc.
Organiu c
Privalc it
st()ra!:c.
thc clottd data in l'ublic.nd llvbrid Clouds on cloud
('o { L.xaninc thc clotttl data by llesourcc
provisiottirt-r tncllrotls and itnplcnerrt
+
co-3
global secLrritl on it __ _ _Analr zc thcprogrant minc
andCO-S an be
dpplied ovcr Cioogle aPP engine
('o-6 Devclop data Pt'occss ing application
which are executed in distributed
cornputittg cnvirotltrtent by ttsitlg
I ladoop.
Signatu cr11
4-
4-
4-
4-
(ialgotias Collcgc of tinginccring and'l'cchnology, Oreater Noida
l)c :l rtnrcnt of Com Dutcr Scicncc & Englnccrln
Course lixit SurveY20 l9-20(oDD)
Subjcct Name:
liacully Namc:
Student Name:
Ycar/Sctn:
Cloud Computing
Ilav ikant N irala
Jikk\ Y^,\v41h/Vll lvl
On thr: scalc of l5-l l. lrorr rruultl vou rate the frrlkruing?
llt:
Subjcct ('ode:
l)atc:
Roll No:
Mobilc No:
Good (3)
RCS-07s(B)
081'l/2019
lbos?-lo07Z\4- b=z+1zt.r-
(loume( )utcome
('( )- I
(-o-2
co-3
('o-5
Oiganizc the cloudPrivatc and I lYbridstorage.
Anall zcprogranl
St tclncnt
-l)cmiinstrarc tllc lundirmsntal ol' cloud
and thcir cotnptrlation ovcr parallcl antl
distributcd conlPutittg.
Underslaltd thc concept o[
virtualizltiorr urrd thcir lIl!'cllanisln
witlr servicc r)rictlled rcllitecturc.
( ()-{ Examinc thc cloud
data in l)ublic.('louds on cloutl
dala by l{csourcc
provisioning lllL-thods and implcme nt
global secutitr on it.
Excellcnt(s)
Vcr)'( )ood ({)
- i,** virtual box and
nring cnvironment can be
9
6
E
5APPlied oler Ooogle aPP engine
('o-6 l)cvclop tlata Proccss ing tpplication
$,hich urc L'\cctrlcd in distribulccl
cornputing crtr itotlrrlcttl by ttsing
Iladoop.
N^E^\
l'oor ( I )Avcragc(21
Signature of Student
d
4-
+
-
Galgolias Collcge of l)ngineering and Technology, Creater Noida
l)cp l rtmcnt of Com utcr S ce & Enginccring
Course Exit SurveYl0 l9-20(oDI))
Subject Name: Cloud Corrputing
Faculty Name: Itavikant Nirala
Student Name: g+Jr-..
Ycar/Scm: 4'l'/Vlt l:-Mail:
On thc scale of [5-t I' holr troultl ](]u rate the following?
SubjectCode: RCS-075(B)
Date: 0811112019
Roll No: lf,br7 I Ot{S-Mobile No: 39'6''rD'\2&44
Slrlcnrent
l)cntonslrate tltc lut.tdrmcntal ol clorrd
and their cornptrtatiotl ovcr parallel and
dislributed contlluting.
Undcrstand the concept ol
virtualizatiott and thcir mcchanisnl
rvitlr scrvice ericntcd architccturc.
drta in PLrhlic.('louds otr clotrtl
storagc
Exanrinc tlre cloud data by Rcsource
provisionittg nlcthods and inrplenrcnl
global security
Orgarizc thc clotrdPrivate and I ll brid
Excellcnt(s)
vcry(lood (-l)
()lt tt.
CO-5
C()-6 l)evclop drtta Proccssirrg aPP lication
wlrich are e\ecuted in distributed
computing environment bY using
lladoop.
Analyzc thcprogramnringapplied ovcr (i
vinual box and
cnvironmenl can bc
oogle app engine.
a'\;Signature o1' Stutlent
(lo u rscOutcontc
co-l
co-2
CO-{
co-3
Poor (l)Averagc12).
Good (J)
4-
s
ss
4-
.\
)
___.1
IASSIGNMENT-I
Dcfi ne Cloud-ComPuting.[.tuua
"ornputing ii the delivery of different services through the Internet. These
resourcesinclud-etoolsandapplicationslikedatastorage'servers'databases'networking, and software.
Rather thi keeping files on a proprietary hard drive or local storage device' cloud-
based storage make-s it possible to save them to a remote database' As long as an
electronic device has access to the web, it has access to the data and the software
programs to run it.Lit,r-J .o-prting irir popular option for people
-and businesses for a number of
,"uront in"frai,ig .ori iuringt, increased productivity, speed and efficiency'
perfbrmance, and securitY.
What are the various advantages of Ctoud-Computing?
here are many benefits to moving your business to the cloud:
Cloud Compttting(RC5-075)
PRAKHAR CHANDRA( 16097 I 0083)
Roduced IT costs
Moving to cloud computing may reduce the cost of managing and maintaining your
if .yi".t. Rather t'han pu."hasing expensive systems and equipment for your
business, you can reduce your costs fy uiing the resources of your cloud computing
scrvicc providcr. You may be able to reduce your operating costs because:
. the cosl of system upgradeS, new hardware and software may be included in your
contract
. you no longer need to pay wages for expert staff
. your energy consumption costs may be reduced
. there are lcwer time delaYs.
Scnlabiliry-
2
Your business can scale up or scale down your operation and storage needs quickly to
suit your situation, allowing flexibility as your needs change. Rather than purchasing
and installing expensive upgrades yourself, your cloud computer service provider can
handle this f--ot yor. Usipe the cloud frees up your time so you can get on with
running your bttsiness.
Business continuitY
Protecting your data and syste_ms is an important part ofbusiness continuity planning.
Whether you e.rperience a natural disaster, power lailure or other crisis. having your dala
stored in the cloud ensures it is backed up and protected in a secure and safe location.
o"i"g ,if" to access your data again quickty alio*s you to conduct business as usual'
minimising any downtime and loss of productivity'
Collaboration efliciencY
Collaborationinacloudenvironmentgivesyourbusinesstheabilitytocommunicateand,#. tnor" easily outside of the tradltionai methods' lf you are working on a project
across different locations' you could use cloud computing to give employees' contractors
;ilil; puni", u.""r, to the same files. you could also choose a cloud computing
nlo.t.t ,tu, makes it easy for you to share your records with your advisers-(e'g' a -quick
Cloud computing allows employees to be more.flexible in their work practices' For
".".pf., V,i, haie the ability to access data from home' on holiday' or via the commute
to uni ftorn work (providing you have an internet connection)' lfyou need access.to your
data while you ur.'Lff-.it". you can connect to your virtual office' quickly and easily'
3. I)ilfcrcntiute betu'ccn sen'ice models and deployment models of Cloud-
('ompuling. What arc the various nceds of deploymcnt modcls?
Different Types Of Cloud Computing Deployment Models
Mort "lori'hubs
have tens of thouiandi oi r"*"rr and storage devices to enable fast
iouAing. tt is olten possible to choose a geographic area to put the data "closer" to users.
if,*. ?"pfoy."nl models lbr cloud .o.puiing are categorized based on their location'
To kno* rvhich model would best fit the requirements ol your organization, let us first
learn about tlre various tYPes.
Puhlic Cloutlih. nu." says it all. lt is accessible by the public Public deployment models in the cloud
u." p"rf.o for organizations rvith growing and fluctuating demands lt also makes a great
choic" fo, "on,'pu'ni",
with low-seiurity .on."tn' Thus' you pay a cloud service provider
for nelworking services. compute virtualization & storage available on the public
interner. Ihis iL also a great deiivery model for the teams with development and testing.
I1s configuration and diployment aie quick and easy' making it an ideal choice for test
environments.Privale CltttrtlNow that you understand what the public cloud could offer you, of course, you are keen
to kno* *hat a private cloud can do. Companies that look for cost efficiency and gleater
control over data & resources will flnd the private cloud a more suitable choice.
What it means is that it will be integrated with your data center and managed by your lT
team. Alternatively, you can also choose to host it extemally. when it comes to
customization. the piivate cloud offers bigger opportunities that help meet specific
organization's requiiemenls. lt's also a wise choice for mission-critical processes that
may have fiequently changing requirements.
4. Draw anrl explain the architecture of cloud computing'
Cloud Computing architecture comprises ol many cloud components' which are loosely
coupled. Wo can broadly divide the cloud architecture into two parts:
. Front End
. Back End
Each ofthe cnds is connected thro
shows the graphical view ofcloudnetwork, usually lnternet. The following diagram
tTlputing architecture:
!r'.-.=*
-5 Differcntiatc bct*'cen parallel and distributcrl computing with examples' Which
rlg rs the methodwith each
one is more e{Iicicnt, exPlain?purailr .u.putlng is'a type of computation in which many calculations or execution
oipro."rr"t u." cirri"O out simultaneously' Whereas, a distributed system is a system
*n'or" au*pon"nts are locatcd on different networked computers which communicate
and coortlinate thcir actions by passing messages to one another'
Numbcr of comPutersi:t "
nr,rU", of "omprt"r,
involved is a difference between parallel and distributed
;;p;,i;g Parallel computing occurs in a single computer whereas distributed
computing involves multiple computers.
['unctionalitYi" prr"if.f computing, multiple processors execute multiple tasks at the same time'
Flowevor. in disuibuled computing, multiple computers perform tasks at the same
time. Ilence, this is another ditference between parallel and distributed computing.
MemoryVto."outr, r,emory is a major difference between parallel and distributed computing
in paraltel computing, the computer can have- a shared memory or distributed
memory. ln distributed computing. each computer has its own memory'
ComnrunicationAlso. ons other dif'ference between parallel and distributed
of communication. In parallel computing, the pother using a bus. In distributed computing' comp
via the nctwork.
municate with each otherrocesso comuters
eE
c=
)
Cloud Computing(RC5-075)
PttAKl IAI{ cl IANDRA( I 60e7 | 00113 )
ASSIGNMENT-2L Define the term virtualization with examples'
Virtualizationusessoflwaretocreateanabstractionlayerovercomputerhardwarethat allows the hardware elements of a single computer-processors, memory, storage
and more-to be divided inlo multiple virtual computers, commonly called virtual
machines (VMs). Each VM runs its own operating system (OS) and behaves like an
independent computer, even though it is running on just a portion of the actual
underly ing computer hardware.
It follows that virtualization enables more eftlcient utilization of physical computer
hardwarc and allows a greater return on an organization's hardware investment'
2. Draw and explain the virtualization reference model'
Therc are five ma-ior needs of virtualization which are described below:
ENHANCED PERFORMANCE
LIMITED USE OF RESOURCES
MAJOR NEEDS
OF
VIRTUALIZATION
SHORTAGE OF SPACE
ECO.FRIENOLY INITIATIVES I
I
ADMINISTRATIVE COSTS
3, Draw and explain the various levcls of virtualization'
'l'he Five Levels of lmplementing Virtualization
Instruction Set Architecture Level (ISA)ln lSA. virtualization works through an ISA emulation. This is helpful to run heaps oflegacy codc which was originally written for differcnt hardware configurations'
Ti'ese codcs can be run on the virtual machine through an lSA. A binary code that might
necd additional layers to run can now run on an x86 machine or with some tweaking,
even on x64 machines. ISA helps make this a hardrvare-agnostic virtual machine.
HYBRID
CLOUD
PRIVATE
CLOUD
rI
PUBLIC
CLOUD
+ DilTcrentiatc between public and private cloud'Ans: lhe main differentiator between pubtic and private clouds is that you aren't
.".pun.iur"tbranyofthemanagemento!aPubliccloudhostingservicesYourdatais,ioi"a in thc provider.s data cenier and the provider is responsible for the management
and maintcnance ofthe data cenrer. This type ofcloud environment is appealing to many
;;;;;i; bccausc it reduces lead times in testing and deploying new products'
Howcver. thc drarvback is that many companies leel sccurity could be lacking with a
prUti. .tor.t. tjven though you don't control the security of public cloud' all ofyour data
remrins ,"parote from otheis and security breaches of public clouds are rare. So which is
right for you? Ultimately, it all boils down to control' A large company may choose a
prlvate cloud. while a smallcr business might choose a public cloud'
5 What do you mean by full virtualization?Ans: []ull virtualization is a common and cost-elfective type of virtualization. which is
dI ,.
Hardwarc Abstraction Levcl (tIAL)e. tn" nu.. suggests, this levei helps perform virtualization at the hardware level. lt uses
a barc hypurvisor lor its functioning.itrir f"*f helps form thc virtual machine and manages the hardware through
virtualization.It enables virtuali:zation of each hardware component such as lio devices. processors'
memory. etc.
This way multiple users can use the
virtualization at the same time.same hardware with numerous instances of
Operating SYstcm LevelAt'il;G;ii"g system level, the virtualization model creates an abstract layer between
the applications and the OS.
tt i. iiL. an isolated container on the physical server and operating system that utilizes
hardware and software. Each ofthese containers functions like servers'
L!t:;:i":Ti,. are lengthy and cumbertome. which is why applications opt for Aprs
from user-level libraries.rraor, oi,r,. Apls provided by systems are rather well documented. Hence, library level
virtualization is preferred in such scenarios.
Application Levelefifl.otiun-t"u.l virtualization comes handy when you wish to virtualize only an
application. It does not virtualize an entire platform or environment'
on an opcrating system, applications work as one process. Hence it.iralso known as
process-lcvcl v irtualization.
N
Cloud Computing(RC5-075)
Pl{n KHAII CHANDRA( 1609710083 )
Assignment 3
What is cloud eco systemAns: A cloud ..o.yri",r', is a complex system of interdependent components that all work
iog.rt.. to enable cloud seruicei' In nature' an ecosystem is composed of living and
nonliuing things that are connected and work together'
ln cloud'comf,uting, the ecosystem consists of hardware and software as well as cloud
cuslomers. cloud engineers, consultants, integrators and partners'
Explain ()rid ComPuting'ens:Gridcomputingisagroupofnetworkedcomputerswhichworktogetherasavirtual,up"r*rnpr,.r',o pifot.- large tasks, such as anatysing huge sets of data or weather
modeling. )Through-the cloui, you can assemble and use vast computer grids for specific time
i"ti"J! -a purpor.., paying. if necessary. only for what you use to save both the time
lnJ **p"nr" of purchaiing and deploying the necessary. resources yourself'
Also by splitting tasks over multiple maJhines, processing time is significantly reduced to
increase efllciency and minimise wasted resources'
Explain hybrid cloud.nnr, gvUria cloud refers to a mixed computing, storage' and services environment made
uf -of
Ln-p.",rises infrastructure' privaie cloud services'. and a public cloud such
u, Alnu,,on web Services (AWS) or Microsoft Azure-with orchestration among the
various platformS. r
Uring u.ornUlnution of public clouds, on-premises computing, and private clouds in your
data ientcr means that you have a hybrid cloud infrastructure'
_)
{. tlxplain the implementation level of Virtualization'
Five Levels of VirtualizationAppli.ation Level
l,VM/.NETCLR l
Library Level
\^/INE/vCUDA
5. l)efinc and crPlain SO,\.
EI
OperatinB System Level
Virtual Environrnent /
Hardware Abst raction Level
rtual PC
D / Dynamo
Levellnstruction Set
B
SOA
EEl.**ii,iliffi',.
@
E!
basically a method by which computer service requests are separated from the physical
hardwarc that t-acilitates theln.with ,ull virtualization, operating systems and their hosted software are run on top ofvirtual hardware.
Ring 3 User App
Ring 2
Direct ex€cution ofUser Requests
Binary translation ofC)S r(}qLl€,sls
Gu OStlg
VMM
puter Systern
r't g
Host C
Fult Virtualization
\
Cloud Computing(lLC5-075)
PRAKHAR CHANDRA( 16097 I 0083)
ASSIGNMENT-4
Draw the NIST Cloud Computing architecture and explain it'
NlsTCloudComputingreferencearchitecturedefinesfivemajorperformers:. Cloud Provider. Cloud Carrier. Cloud Broker. Cloud Auditor. Cloud ConsumerEach performer is an objec( (a person or an organization) that contributes to. a
;il;i.; or method and/i. peifoims tasks in Cloud computing. There are five major
u.io^ a.nn"a in the NIET cloud computing reference architecture, which are described
below:
Explain hybrid cloud model.I lybrid cloud is a solution that combines a private cloud with one or more public
cloud scrvicos. with proprietary software enabling communication between each
Explain private cloud model.
Private cloud is a cloud computing environment dedicated to a single customer' lt
combines many of the benefits of cloud computing with the security and control of on-
premiscs I-l' infrastructure.
These technologies include the following:
.Virtualization,whichenableslTresourcestobeabstractedfromtheirunderlyingphysicalhardwareandpooledintounboundedresourcepoolsofcomputing. storage, memory. and nitworking capacity that can then p.ortioned
urnung ,-rltipl. ,irtuut maihines (vMs), containers, or other virtualized IT
inliastructureelements.Byremovingtheconstraintsofphysicalhardware,virtualizationenablesmaximumutilizationofhardware.allowshardware to be shared efficiently across multiple users and applications, and
makes possible the scalability. agility, and elasticity ofthe cloud'. Management software gives administrators centralized control over the
infiastruclure and applicitions running on it. This makes it possible to optimize
security, availability, and resource utilization in the private cloud environment.
. Automation speeds tasks-such as server provisioning and integrations-thatrvould otherwise need to be performed manually and repeatedly. Automation
reduces thc need for human intervention. making self-service resource deliverypossible.
-
distinctservicc.Ahybridcloudslrategyprovidesbusinesseswithgreaterflexibilityby moviug workloadi betrveen cloud solutions as needs and costs fluctuate'
Explain contnrunitl cloud model
A community cloud in puling is a collahorative eflort in r.vhich infrastructure is shared
between several or ions from a specific communitv with common concerns (securitY,
compliance,internally or
juLisdi , etc.). rvhether managed interna lly or by a third-Party and hosted
ly.
Explain infrastructure as a servlco.lnfraslructure-as-a-Service, commonly referred to as simply "laaS"' is a form of cloud
computingthatdeliversfundamentalcompute.network.andstorageresourcestoconsumersnn-demund. over the internet' and on a pay-as-you-go basis'
$
HYBRID
I
I
bt)
ConinrunitY Cloucl
\
Cloud Computing(lLC5-075)
PRAKHAR CIIANDRA( I 6097 10083)
ASSIGNMENT-5
Explain Mobilc cloud comPuting.Nlobilc cloLrd conrputing uses clottd comp deliver applications to mobile devices
tools. ... 'l hey can be delivered toing spced and flexibility and dcvelopment
fferenl deviccs with different operatingThcsc mobile aPPS can be dcPloY cd remo vus
vdisystems, computing tasks, and da1x oragc.
t
l tr.t II
E&:
1 Explain Virtrralization techniqucs in cloud computing'
Virtualization in Cloud Computing
Virtualization is a technique of how to separate a seruice from the underlying physical
delivcry ofthat scrvice. lt is the process of creating a virtual version of something like
computer hardware. It rvas initially developed during the main frame era. It involves
using spccialized sollrvare to create a virtual or soflware-created version o
computing rcsource ralher than the actual version of the same resource' With the help
of, Virlualization. rr:ultiple operating systems arrd app lications can run on same machine
and its samc hardware at the same time. II]C reasing the utilization and flcxibi litl'of
fa
hardrvare.Explain Cloud computing Security techniques'.-loud sccrrity is theproteition of data stored online via cloud computing platfoys fr9.m
theft, leakage. and deletion. Methods of providing clotrd security include firewalls,
f.n.trution testing. obfuscation. tokenization' virtual private networks (VPN)' and
avoiding public internet connections.
Et
E
u
g*II
Erplain platform as a son'ice.) is a cloud comPuting model where a third-party provider
Plattirrm as a service (PaaS
dclivcrs hardware and softlvare tools to users over the internet. Usually, these tools are
ncedcd lbr aPPlicati on dcveloprnent. A PaaS Provider hosts hardware and soltware on
its own inl'r'astructurc. As a resull, PaaS frecs develoPers having to install in-house
hardware and software 1o develop or run a new
P.raS
laa S --l 1tr*- Ol(? Ep
i 1'
nIAAS
\-.^---.v
Sa.r S
r -. Cloud Security
:1. Whlt arc the ckrurl computing scrvice providcrs?'l-hcrc arc a handful of well-known, major public c loud
Cloud. Amazon Web Services (AWS), Google Cloud P
Oracle Clor.rd, and Microsoft Azure-but there are also hundrcds ofcon l iders all over the world.
C
5. Explain thc process of Cloud computing data storage.
Like on-premise storage networks, cloud storage uses servers to datal however. the
data is sent to scrvers at an otl'-sitc location. Most ol the servcrs you usc are virtual
machines hosted on a physical server. As your storage needs increase, the provider
creates new virtual servers to meet demand.
.t
Cloud computing
Service
SaasPaas
Ar(rutlont
&(oatbn
vlnlrr{.udu{ r!isrrvkP!
\
I
f-r,,,'l iE
I
G CLASS TEST 201...-201..
(T)Note: Use both sides of the answer
book No additional answer sheet shall be provided
GALGOTIAS COLLEGE OF ENGINEERING& TECHNOLOGY, GR. NOIDA, U.P, To be filled by the examinee Name of Student:
Admission No. (for Ist Sem Only)
Max. Marks
COURSE BTecl BRANCH & SECTION C:SE-BI Marks Obtained
SEMESTER Parta b 9 Q. No. d
NAME OF BJECT Clouel Cauputig
4 2
SUBJECT Res-oS CODE 4
5 PAPER ID 6
DATE8
Roll No n Houres o 91olP- 10
11 Roll No.
in words Eigh* 12
13 Facsimile of the
ntre Supdt. 14
15 The entries made in the above boxes are correct
TotalS2
(Signature of Student in full) Total: Checked the entries mate by Stdents Marks Obtainec in Co's
CO No. Marks
(Signature of Invigilatorvith date)
(in Figures) (in Words)
Maximum Marks
Marks
Obtained
(Signature of Subject Teacher)
N
ETEIFT|EFN FFIEREII|G
S
CLASS TEST 201.....-201.... Note:Use both sides of the answerbook No additional answer
(T sheet shall be provided
GALGOTIAS COLLEGE OF ENGINEERING& TECHNOLOGY, GR.NOIDA, U.P.
Name of Student:SHluAM PUN1A Admission No. .
To be filled by the examineee
COURSE (for Ist Sem Only)
Max. Marks BRANCH &| SECTION Marks Obtained
Part
SEMESTER b Q. No. cd ef h a
NAME OF SUBJECT cloud tonut 2
SUBJECT 3
CODE 4
PAPER ID 2 6
7 DATE B4 ottl 2ot 8
Roll No
,7 10 in figures
11 Roll No. Nini wne 12 in words
13 Facsimile of the
14 Centre Supdt.
15
The entries made, in the above boxes are correct Total 2
Signature of S' 1-nt in fui Total A-
Marks Obtained in Co's Checked the entries made by Students
CO No. Marks -
(Signature of InvigiatTS with date)
(in Figures) (in Words)
Maximum ovs 5
Marks
Marks 28 Obtained
(Signature of Subject Teacher):
ELL
K
E
A
3
6
U
M
(
|
(D
G
Sic ad
b V
ertco
d
-vLstaduzosig4>
S
EI v
ilte
c)
Ctoud
om
pa
P0
io
le
am
ou
y
mo
ney
u o
us
LA
C
alle
a
po
0
AR
2 volu
ion
dovd u
np
ut
here
a
ns u
nt pi
44
SP
Av
iL
e
d aD
OS
, A
2 G
R\s
tora
qe
po
vid
ey
eb
e
lou
d
An
Lte
tod
ts
36
0 M
B£
am
on
pin
us
e o
RaZ
MU
Y{
GRID R
asrd C
op
utn
go
He
On
dem
an
df sovi51 0
Len
ey e
s
Sco
ue
eyduh v
GereN
Lx
os
to
p o
ale
do
wn
n
e.
S1
2
Lald
Ja
lan
w
iHn
m-
Lln
ze
Se tond
in-
a N
oilonteal scalu
T
T
Hw
p
lbtru
H1
eve
4U
Aaln
eH
u_
scalfed
-0p
escuN
y
Sy
Stem
leK
A-puceaH
1ev
l
G CLASS TEST 201...-201.. Note Use both sides of the answer
book No additional answer
(T sheet shall be provided
GALGOTIAS COLLEGE OF ENGINEERING & TECHNOLOGY, GR. NOIDA. U.. Name of Student:Sashonk ds Admission No.. (for Ist Sem Only)
To be filled by the examinee
COURSE BTECHMax. Marks BRANCH &
SECTIONN Cs-13 Marks Obtained
Part SEMESTER Q. No. bcld NAME ODFSUBJECT SUBJECT CODE
CLo (o puh
Pso7 5s 4
5 PAPER ID 6
DATE 4/ot19 Roll No
in figures 10
11 Roll No. NinebSr 12 in words
13 Facsimile of the Centre Supdt 4
15 The entries made in the above boxes are correct
Total Shasha
(Signature of Student in full) Total
Checked the entries made by Students Marks Obtained in Co's
CO No. Marks (Signature of Invigilators with date)
(in Figures) (in Words)
Maximum Marks
Marks Obtained
(Signature of Subject Teacher
b
CL
ASS
TE
ST 2
01.2
.-20
.. N
N
ote:
Use
bot
h si
des
of th
e an
swer
T)
book
No
addi
tion
al a
nsw
ersh
eet
shal
l b
e pr
ovid
ed
GALG
OTIA
S CO
LLEG
E OF
ENG
INEE
RING
&TE
CHNO
LOGY
, GR.
NOID
A.U.
P.
Nam
eof
Stu
dent
:hi
vo
Adm
issio
n N
o.
(for
Ist
Sem
Onl
y)
To
be
fille
d by
th
e ex
amin
ee
COUR
SE
61
EC
H
Max
. Mar
ks
BRAN
CHH&
CS
E-
SEC
TIO
N
Mar
ks O
btai
ned
SEM
ESTE
R V
P
art
NA
ME
OF
SUBJ
ECT
Q. N
o. ab
cd
e ef9
h
1 L
LI
SUBJ
ECT|
Clou
d o
no
ti
SUBJ
ECT
RC
S o
5
2 3
CO
DE
4
PAPE
R I
D 6
DATE
Ot
t/219
7
RoH
No
6o
.in
figu
res|
|6o
l9
Roll
No.
10
11
One
tun
drcd
in
wo
rds
12
13
Fa
csim
ile o
f the
C
entr
e Su
pdt
14
15
T
he
entr
ies
mad
e in
the
abo
ve b
oxes
are
cor
reet
To
talA
(S
iona
tur:
of
Stu
dent
in f
ul)
Tot
al
Che
cked
th
e en
trie
sm
ade
by S
tud
ents
M
arks
Obt
aine
d in
Co'
s C
O N
o.
Mar
ks
Sign
atur
e of
Invi
giat
or
with
dat
e)
(inFi
gure
s)in
Wor
ds)
Max
imum
M
ark
s
Mar
ks
Obt
aine
d (S
igna
ture
of
Sub
ject
Teach
et
b)Veatica 2caing t iAxolady 9 Claud lbcial- SechionAddred- dire domain th in_ yd yen ule hu digfred Ret g accei tu t yeloui loud cloud a wo Stohon Senpe
hich o mointoin, aecaf ,deelop Colvd vendors-Store ontfeadatu
(ow Cost Soluion oOi T Oiented Seuice
awolahle
gn Pravije a- Claud hi ia awo besE ChoniuttenRhic
eod loud becgi et i O
wE ulet enuice ElShcity- Sealledtin cind or&pecdied bred, S0 ropenty
Rewite we cicel2 Cloud b
d On demond viidnin
B lenwite Cloud co Aveulable o dable_ at on toe p aafVen Oy gen es Om dccel TV Cloud Renwirel
cloud
Scalabailit Scalobili deal it ontid f
trul Ond laad hfans Sennta Cude to rovide lexfhi lit On aciol ty-
o 2ecyr innuwhez on vide accel on tw hofs/ tine COultra
> n roes ito too etini Diyhibued Conpahng h hot tme eucod tnouh,
CEsR/o_eenyt be
CA Comhi
dividty tnto ommuntotef_wTh xchauedota
h dhloin se bdao Eech Othei in aaerocelsor
in D1tcibuth0 aronnud
9|DSuuttd loniny i Stowe hon
Danllel Carnpuhi
lutte onutin
Clusten (ten omutik Ou vironintt mOXe hy le Co
lonnect d in a /Netwofk Avaulalale
Con nd Sho dota and Otneloibiitie in aSecuned Environmey
ad Aiad diltbud2 Omah Vounu4itoneg. Sechion-6
_db Virtucisotion Sewice Oyited Achiteck
Ctoud VM PAM oboicol3 ty/e Konwtce moJel VM laltuctm anuice CCAA S) NetwONk Pladton oaeuite PAA)
-a wite ( SAA) utoalittion a coutet
thun a Zeuice(TAA) a Xiwole Sewe clywe tu nultipkAtonce ade to
2n du es ogenia ode Cacce c Cloud o R adminilraho AA HA and alw au Adminidraba
rovidt Keylte/to muliye tAea
V tuci2ahon oroed uRea to
toen Cane handeltd t roic ove enwe OuliPe tomte? coj. Mintenante_ tuHLen an ly Adminiltrouwr Sewice3
Semep Ciou gower
Sewice oode, ace k Avnnin Platfomi raviaed in uch whow ee laPei od deloytsl Sewen i omje
G tuol to odiy Ai.cuion.
Secit rO Ce wwich man toin ecn hu 2No ted to Clo vd 2L d ibuti GO dired-dtn nce
O0 vixuolizahon eath Sojtwaaa eruice CSca oxid CA povihe oviaeixibilt
ulh/E Xice mode i QcceLo hoive UCen_
USeny
to tallaton a?doionNneed Senwice Dn Compute
N ntd hic eknica howltdye Swie model i
Soly
Taas Beng ha.
as relunce_ 20 Semice Vitvelizatton ly ke0le in hondlingh oad ove Xenwen, diltibuh'ne
Vittualizahizm
m ewice. Imgtdioj 6elor Virtlizahon Canetnagh wh le Cemulile onreRim Ode to
bviaf Sewitefo muHPle ußen.
Sewice vendva Wrovid
Seruicr
Inor ror onte AP? n Cloud Cooutig
cluud Conpun
A fewice vendtT Sevip
tuaf anae Poy On demamd
genmicee
a wayy-
Scie XendO ithout_
Dravia afiuaU nltoli _OhC
a Clotdd hoed senwice
eb: -ÁLO-vailablr lib dn XoX bseUe need
anicuan reRounre t penloan an_tor aL AP.
AVeN web_ tu_ euet t Xewile that q dea_ womt to_ OCcellCOU
ho t Edihns,OY Swih ensona defh_On Coogle_Jte-
eh oll fu Oechion cuized
a enwice_ ucdher on mo
Elart kakAn ALT/Alication dok by Lntee 0qcUino
Ytay yeyiortom
Comouhicafih-wifh-
le in Sewice ALT_yh Collfcmon
nteaced ond (lolfeg hican
inlccutiny tw diffrel4=di!fred vedoa la hetu rovije reqeftr
Kenwict
GG GALGOTIAS EDUCATIONAL INSTITUTIONS
ATTENDANCE REGISTER
Cloud bmpuing (KCs-OS)
Name Kavikan Niza
Designation s Prferser
Department Cse
GALGOTIAS COLLEGE OF ENGINEERING & TECHNOLOGY GALGOTIAS INSTITUTE OF MANAGEMENT& TECHNOLOGY 1, Knowledge Park Phase - I1, Greater Noida, Uttar Pradesh 201306