0% found this document useful (0 votes)
5 views14 pages

AWS For Cloud

The document provides an overview of cloud computing, its characteristics, benefits, evolution, and underlying principles of parallel and distributed computing. It discusses key concepts such as elasticity, service-oriented architecture (SOA), cloud enabling technologies, and virtualization, including its types and implementation levels. Additionally, it explains the publish-subscribe model and the structures involved in virtualization.

Uploaded by

nagamani19912
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views14 pages

AWS For Cloud

The document provides an overview of cloud computing, its characteristics, benefits, evolution, and underlying principles of parallel and distributed computing. It discusses key concepts such as elasticity, service-oriented architecture (SOA), cloud enabling technologies, and virtualization, including its types and implementation levels. Additionally, it explains the publish-subscribe model and the structures involved in virtualization.

Uploaded by

nagamani19912
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

UNIT-1

1. What is Cloud Computing and Characteristics?

 Cloud computing is a modern technology that delivers computing resources


such as servers, storage, databases, networking, software over the internet.
 Instead of managing physical hardware or data centers, users can access these
resources whenever needed.

Characteristics of Cloud Computing:

1. On-Demand Self-Service: Users can access computing resources whenever needed


without human intervention.

2. Broad Network Access: Services are accessible over the internet through various
devices like laptops, tablets, and smartphones.

3. Resource Pooling: Providers share resources among multiple users using a multi-
tenant model.

4. Scalability: Resources can scale up or down based on demand, ensuring flexibility.

5. Pay-As-You-Go Pricing: Users pay only for what they use, avoiding upfront costs.

6. Elasticity: Resources are automatically adjusted to meet workload demands,


ensuring optimal performance and cost efficiency.

7. High Availability and Reliability : Cloud services are designed to minimize


downtime and ensure continuous availability.
8. Reliability : Data is often replicated across multiple data centers for fault tolerance.

2. Explain Benefits of Cloud Computing?

 Cost Efficiency: Eliminates the need for purchasing and maintaining hardware.
 Flexibility and Mobility: Access resources from anywhere with an internet
connection.
 Enhanced Collaboration: Teams can work together on shared data and
applications.
 Improved Security: Leading providers invest in advanced security measures.
 Improved Performance : Cloud providers offer high-performance servers with
the latest technology.
 Enhanced Security : Cloud providers implement advanced security measures,
including encryption, firewalls, and regular audits.
3. Evolution of cloud computing

It represents the development of a system where computing resources like servers,


storage, and applications are accessed over the internet instead of being stored locally.

1. Early Days of Computing (1960s):


The idea of sharing computing power began with mainframe computers that were
expensive and used by multiple users through "time-sharing."

2. Virtualization (1970s–1990s):
Virtualization technologies emerged, allowing a single physical machine to run
multiple virtual machines, improving resource utilization.

3. Internet and Web Expansion (1990s):


The rise of the internet and the World Wide Web made remote access to computing
resources possible.

4. Emergence of Cloud Services (2000s):


Companies like Amazon launched Amazon Web Services (AWS) in 2006, introducing
cloud services like storage (S3) and computing power (EC2).

The concept of "pay-as-you-go" started, where users only paid for what they used.

5. Growth of SaaS, PaaS, and IaaS (2010s): Different service models emerged:
SaaS (Software as a Service): Applications delivered over the internet (e.g., Gmail,
Salesforce).
PaaS (Platform as a Service): Platforms for developers to build applications (e.g.,
Google App Engine).
IaaS (Infrastructure as a Service): Virtualized hardware resources (e.g., AWS,
Microsoft Azure).

6. Current Trends (2020s):


Advanced technologies like AI/ML integration, edge computing, and hybrid cloud are
transforming cloud computing further.

4. Underlying principles of Parallel and Distributed Computing?

Parallel Computing: Parallel computing is a method where a single task is divided into
smaller sub-tasks, and these sub-tasks are executed simultaneously on multiple
processors within the same system.

Principles of Parallel Computing

Decomposition: Breaking a large problem into smaller sub-problems that can be


solved independently or semi-independently.
Concurrency: Multiple tasks or operations are executed simultaneously.

Synchronization: Ensuring that tasks running in parallel are coordinated to produce


correct results.
Example: Using locks or barriers to control shared data access.

Load Balancing: Distributing tasks evenly across all processors to maximize resource
utilization and minimize idle time.

Shared Memory Access: Processors access a common memory space for data
exchange.

Distributed Computing: Distributed computing involves multiple independent


computers (nodes) working together to solve a single problem. Each computer works
on a different part of the task and communicates over a network

Resource Sharing: Sharing resources like processors, memory, and storage across
multiple systems in a network.

Decentralization: No single point of control; all systems (nodes) work independently


and coordinate through communication.
Example: Peer-to-peer networks.

Communication: Nodes exchange data over a network using protocols like TCP/IP or
message passing (e.g., MPI).

Fault Tolerance: Ability to continue functioning despite failures in some nodes or


components.

5. Elasticity in Cloud Computing

 Elasticity in cloud computing refers to the ability of a system to automatically


adjust its resources (such as CPU, memory, or storage) in response to changes
in demand.
 This ensures that the system uses just the right amount of resources—scaling
up when demand increases and scaling down when demand decreases.
 On-demand provisioning is a crucial aspect of elasticity, allowing resources to
be allocated or released automatically based on real-time demand.

How On-Demand Provisioning Enables Elasticity

1. Dynamic Resource Allocation:


o Resources such as compute power, storage, and network bandwidth are
provisioned or de-provisioned automatically when demand changes.
o For example, during peak traffic, additional virtual machines or storage
are added to handle the load.
2. Scalability:
o On-demand provisioning supports both scaling up (adding resources)
and scaling down (removing resources).
o This ensures that applications have exactly the resources they need, no
more and no less.
3. Automation:
o Elasticity relies on automated monitoring tools to track resource usage
and trigger provisioning actions.
o Tools like AWS Auto Scaling or Azure Autoscale make this process
seamless.
UNIT-2

1. Explain Service Oriented Architecture?

 Service-Oriented Architecture (SOA) is a design approach where software is


made up of small, independent services.
 Each service performs a specific task and communicates with other services to
complete larger tasks.
Characterstics of SOA

1. Loosely Coupled
o Services operate independently, changes in one service don’t heavily
impact others.
2. Interoperability
o SOA supports communication between services built using different
technologies and programming languages.
o Standard protocols like HTTP, SOAP, or REST facilitate this
interaction.
3. Reusability
o Services can be reused across multiple applications, saving time and
development costs.
o Example: A payment gateway service can be used in different e-
commerce platforms.
4. Discoverability
o Services in SOA are published in a directory, making them easy to find
and integrate.
5. Standardized Interfaces
o Each service communicates using a well-defined interface, often
described using standards like WSDL (Web Services Description
Language) for SOAP-based services or OpenAPI for REST-based
services.

SOA Components
1. Service Provider
o The entity that creates and maintains the service. It also registers the
service in a directory.
2. Service Consumer
o Any application or service that uses the available services to perform
tasks.
3. Service Registry
o A directory that lists all available services. Service consumers can
discover and connect to services using this registry.

2. Cloud Enabling Technologies?

Service-Oriented Architecture (SOA)

SOA is an architectural style that enables applications to provide and consume


services over a network. Services are independent, reusable components that perform
specific business functions.

Features of SOA
 Interoperability: Services communicate using standard protocols.
 Loose Coupling: Components remain independent and modular.
 Reusability: Services can be reused across multiple applications.
 Scalability: Easy to add or remove services without impacting the system.

REST (Representational State Transfer)

REST is an architectural style for designing networked applications, relying on


stateless communication and resource-based interactions over HTTP.

Key Principles
 Resources: Exposed via URIs.
 Statelessness: Each request contains all necessary information.
 Standard Methods: Uses HTTP methods like GET, POST, PUT, DELETE.
 Representation: Data is exchanged in formats like JSON or XML.

Systems of Systems (SoS)

SoS refers to the integration of multiple independent systems to achieve a common


goal. Each system retains its autonomy while contributing to the larger system.

Characteristics of SoS
 Autonomy: Individual systems operate independently.
 Interoperability: Systems communicate seamlessly.
 Evolution: Systems can be updated or replaced without disrupting the SoS.
 Decentralization: No single system controls the others.

Web Services
Web services are software components that allow communication between
applications over a network.

Types of Web Services


1. SOAP (Simple Object Access Protocol)
o Protocol-driven and uses XML for communication.
o Suitable for secure and complex enterprise-level applications.
2. RESTful Web Services
o Lightweight and resource-focused.
o Uses standard web protocols like HTTP.

3. Publish Subscribe Model?

The Publish-Subscribe (Pub-Sub) model is a communication pattern widely used in


distributed systems and event-driven architectures. It decouples the components that
produce messages (publishers) from the components that consume them (subscribers),
making the system more modular and scalable.

How It Works

1. Publisher
o The entity that generates and publishes messages or events.
o Publishers do not send messages directly to subscribers but instead to a
central entity called a broker or topic.
2. Subscriber
o The entity that registers interest in specific types of messages or events
(topics).
o Subscribers receive only the messages they are subscribed to.
3. Broker
o Acts as an intermediary between publishers and subscribers.
o Categorizes messages based on topics and ensures delivery to the
appropriate subscribers.
4. Basics of Virtualization

 Virtualization is a technology that enables the creation of virtual (rather than


physical) versions of computing resources, such as servers, storage, networks,
or even entire operating systems.
 This abstraction allows multiple virtual environments to coexist on a single
physical machine, maximizing resource utilization and flexibility.

Key Concepts in Virtualization

1. Host Machine
o The physical machine that provides the hardware resources for virtualization.
2. Guest Machine
o The virtual machine or environment created within the host machine.
3. Hypervisor
o A software layer that manages and allocates the physical resources to virtual
machines.
o Types of hypervisors:
 Type 1 (Bare-Metal): Runs directly on the hardware (e.g., VMware
ESXi, Microsoft Hyper-V).
 Type 2 (Hosted): Runs on top of an operating system (e.g., VMware
Workstation, Oracle VirtualBox).

Benefits of Virtualization

1. Efficient Resource Utilization


o Consolidates multiple workloads on fewer physical machines, reducing
hardware costs.
2. Flexibility and Scalability
o Easily add or remove virtual machines based on requirements.
3. Isolation
o Each virtual environment operates independently, ensuring one does not affect
another.
4. Cost Savings
o Reduces the need for physical hardware, maintenance, and power
consumption.
5. Disaster Recovery and Backup
o Simplifies data recovery with snapshots and cloning of virtual machines.

Components of Virtualization

1. Virtual Machines (VMs)


o A software-based emulation of a physical computer, complete with virtualized
CPU, memory, and storage.
2. Virtual Networks
o Simulates physical network connections between virtual machines.
3. Virtual Storage
o Pools physical storage resources and allocates them to virtual environments.
4. Types of Virtualization

1. Server Virtualization
o Virtualizes physical servers into multiple virtual servers.
o Use Case: Data centers for running multiple server applications on one
physical machine.
2. Desktop Virtualization
o Allows users to access a virtual desktop from any device.
o Use Case: Remote work and BYOD (Bring Your Own Device) environments.
3. Network Virtualization
o Abstracts network resources like switches and routers into virtual networks.
o Use Case: Software-Defined Networking (SDN).
4. Storage Virtualization
o Combines multiple physical storage resources into a single logical unit.
o Use Case: Cloud storage and data management.
5. Application Virtualization
o Enables applications to run in isolated environments without being installed on
the local OS.
o Use Case: Software testing and deployment.
6. Data Virtualization
o Abstracts and integrates data from multiple sources into a unified view.
o Use Case: Business Intelligence (BI) tools.

5. Implementation Levels of Virtualization

 Virtualization can be implemented at different levels depending on the


resources being virtualized and complexity of the system.

1. Hardware Virtualization

Hardware virtualization involves abstracting the physical hardware resources, such as


CPU, memory, and storage, to create multiple virtual machines (VMs). At this level,
the hypervisor manages the allocation and execution of these virtual machines.

How It Works

 The hypervisor sits directly on the physical hardware or on top of an operating


system, controlling the virtual machines.
 Each virtual machine operates independently, with its own operating system
and applications, as if it were running on a separate physical server.
Types of Hardware Virtualization
 Type 1 (Bare-Metal Hypervisor): The hypervisor runs directly on the
hardware without an underlying OS (e.g., VMware ESXi, Microsoft Hyper-V).
 Type 2 (Hosted Hypervisor): The hypervisor runs on top of a host operating
system (e.g., VMware Workstation, Oracle VirtualBox).

2. Operating System-Level Virtualization (Containerization)


Operating system-level virtualization involves creating isolated user spaces
(containers) on a single OS kernel. Unlike full virtualization, where each VM has its
own operating system, containers share the same underlying OS, which makes them
more lightweight and efficient.

How It Works
 Containers use the host operating system’s kernel to run multiple isolated
environments (containerized applications).
 A containerized application can run on any system that supports the container
runtime, such as Docker.

Types of OS-Level Virtualization
 Containers: Lightweight, fast, and portable environments that package
applications with all dependencies needed to run (e.g., Docker, Kubernetes).
 Linux Containers (LXC): A type of OS-level virtualization for running
multiple Linux distributions on the same host.

3. Application Virtualization

Application virtualization abstracts an application from the underlying operating


system, allowing it to run without being installed on the local machine. The
application operates in an isolated virtual environment, which can be streamed from a
central server or run locally within a virtualized wrapper.

How It Works
 The application is encapsulated and delivered as a virtualized instance, separate
from the underlying operating system.
 This allows applications to run on different machines without requiring direct
installation or configuration.

4. Network Virtualization

Network virtualization abstracts physical network resources into virtual networks,


allowing multiple virtual networks to run on a shared physical network infrastructure.
This includes virtualizing network functions such as routing, switching, and firewalls.

How It Works
 A software-defined network (SDN) controller manages virtual networks and
allocates network resources to different virtual machines or containers.
 It creates virtual switches, routers, and firewalls to manage network traffic
without needing to change the physical network infrastructure.

5. Storage Virtualization
Storage virtualization abstracts physical storage devices (e.g., hard drives or SSDs)
into a unified virtual storage pool that can be easily managed, allocated, and accessed
by applications or virtual machines.

How It Works
 A storage virtualization layer consolidates physical storage devices into a
logical pool, which can then be managed centrally.
 Virtual storage can be dynamically resized or moved between physical devices,
making storage management more efficient and flexible.

6. Data Virtualization

Data virtualization involves abstracting and integrating data from multiple sources
into a unified, logical view without physically moving or copying the data. This
allows users and applications to access data from different systems without worrying
about its location or format.

How It Works
 A data virtualization layer connects to various data sources (e.g., databases,
data warehouses, cloud storage) and presents them as a single data source.
 Data is accessed in real-time through a unified query interface.

6. Virtualization Structures

 Virtualization structures refer to the different ways in which virtualization


technologies are designed and implemented in a computing environment.
 These structures define how the virtualized resources are managed and how
different components interact to create a virtualized system.
 The key structures in virtualization include the Hypervisor, Virtual
Machines, and the Virtualization Layer.

1. Hypervisor

The hypervisor is the core component in any virtualization system. It is a software


layer that sits between the physical hardware and the virtual machines (VMs),
managing the creation, allocation, and execution of virtual environments.

Types of Hypervisors
 Type 1 (Bare-Metal Hypervisor):
o Runs directly on the host hardware without an underlying operating
system. It has direct access to the hardware and can control and manage
virtual machines more efficiently.
o Examples: VMware ESXi, Microsoft Hyper-V, Xen.
 Type 2 (Hosted Hypervisor):
o Runs on top of a host operating system and depends on the host OS to
manage hardware resources. Type 2 hypervisors are typically used for
desktop virtualization.
o Examples: VMware Workstation, Oracle VirtualBox, Parallels.
2. Virtual Machines (VMs)

A Virtual Machine is a software-based emulation of a physical computer, which runs


its own operating system and applications as if it were a separate physical machine.

3. Virtualization Layer

The virtualization layer is the software or set of tools that sits between the hardware
and the virtual machines or containers. It abstracts the physical hardware and creates
virtual environments that behave like separate machines or resources.

4. Virtualization Management and Orchestration

Virtualization management refers to the tools and software that administrators use to
monitor, configure, and control virtual environments. Orchestration refers to the
automation of the deployment, scaling, and management of virtual machines and other
resources across multiple environments.
5. Virtual Storage

Virtual storage abstracts and aggregates physical storage resources into a single,
logical storage pool, making it easier to manage and allocate storage.

Types of Virtual Storage


 Block Storage Virtualization: Virtualizes storage at the block level, allowing
storage devices to be pooled and accessed by multiple systems.
 File Storage Virtualization: Abstracts file-level storage, enabling the
aggregation of multiple file systems into one logical unit.
 Object Storage Virtualization: Used in cloud environments to store and
manage large amounts of unstructured data, allowing virtualized access to
objects like images and documents.

6. Virtual Network

A virtual network is a software-defined network that abstracts the physical network


infrastructure to allow virtual machines and containers to communicate with each
other and external systems, regardless of their physical location.

7. Virtualization Security Structures

Security in a virtualized environment focuses on ensuring that each virtual machine or


container is isolated and protected from unauthorized access, both within the virtual
environment and from external threats.
7. Tools and Mechanisms in Virtualization

Virtualization technologies are supported by a range of tools and mechanisms that


facilitate the creation, management, and operation of virtual environments. These
tools allow administrators to manage virtual machines (VMs), containers, networks,
storage, and resources effectively while optimizing performance, scalability, and
security.

1. Hypervisor Tools and Mechanisms

Hypervisor tools and mechanisms help manage the virtualization layer that controls
the virtual machines (VMs) and their resources. These tools facilitate the creation,
provisioning, and monitoring of VMs.

Common Tools and Mechanisms


 VMware vSphere: A comprehensive suite of virtualization products for
managing and automating the provisioning of VMs. It includes vCenter
Server, vSphere ESXi, and vSphere Client.
 Microsoft Hyper-V: A Microsoft virtualization product that allows users to
create and manage VMs on Windows-based systems. Includes Hyper-V
Manager, System Center Virtual Machine Manager (SCVMM), and
Windows Admin Center.

2. Containerization Tools

Containerization tools allow the packaging and running of applications within isolated
containers that share the same host OS. These tools are widely used for microservices,
cloud-native applications, and DevOps pipelines.
Common Tools and Mechanisms
 Docker: The most popular containerization platform, enabling the creation and
management of containers. Docker provides tools like Docker Engine, Docker
Compose, and Docker Swarm for orchestration.
 Kubernetes: A powerful container orchestration platform that automates the
deployment, scaling, and management of containerized applications.
Kubernetes uses tools like kubectl, Helm, and Kubeadm.
 OpenShift: A Kubernetes-based container platform by Red Hat that provides
additional features like integrated CI/CD, security, and developer tools.
 Amazon ECS (Elastic Container Service): A fully managed container
orchestration service for deploying Docker containers at scale in AWS.

3. Virtual Network Tools

Virtual network tools manage the abstraction of physical network components (like
routers, switches, firewalls) into software-defined virtual networks. These tools are
essential for managing network connectivity within virtualized environments.
Common Tools and Mechanisms
 VMware NSX: A network virtualization and security platform that allows for
the creation of virtual networks within VMware environments.
 OpenStack Neutron: A networking component within OpenStack that
provides networking as a service for VMs in a cloud environment.
 Cisco ACI (Application Centric Infrastructure): A data center solution for
managing virtual networks, combining physical and virtual network
management.
 SDN (Software-Defined Networking): Tools like OpenFlow, Floodlight, and
Cumulus Networks are used for managing network resources
programmatically and dynamically.

4. Virtual Storage Tools


Virtual storage tools enable the abstraction of physical storage devices into logical
storage pools, allowing administrators to manage and allocate storage resources
flexibly across virtual environments.

Common Tools and Mechanisms


 VMware vSAN: A storage virtualization solution integrated into VMware
vSphere, allowing for the creation of software-defined storage clusters.
 Microsoft Storage Spaces Direct (S2D): A storage solution for creating
scalable, high-performance storage systems using locally attached drives on
Windows Server.
 Ceph: An open-source software-defined storage platform that provides block,
object, and file storage for large-scale environments.
 NetApp ONTAP: A storage platform offering both traditional and virtualized
storage services for hybrid cloud environments.

5. Virtualization Management and Monitoring Tools

These tools are used to monitor, manage, and optimize virtualized environments. They
provide administrators with insights into resource utilization, performance, and
potential issues within the virtual infrastructure.

Common Tools and Mechanisms


 VMware vCenter Server: A management platform for VMware
environments, providing a central point to manage and monitor virtual
machines and hosts.
 Microsoft System Center Virtual Machine Manager (SCVMM): A
management tool for Hyper-V environments that helps with provisioning and
managing VMs and hosts.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy