0% found this document useful (0 votes)
10 views

CC_NOTES[1]

The document provides comprehensive notes on cloud computing, covering its convergence with hardware advancements, internet technologies, and distributed computing. It details various cloud service models (IaaS, PaaS, SaaS) and deployment models (public, private, community, hybrid), as well as features of IaaS and PaaS providers. Additionally, it discusses challenges and risks associated with cloud computing, including security, data lock-in, and availability.

Uploaded by

shankar creation
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

CC_NOTES[1]

The document provides comprehensive notes on cloud computing, covering its convergence with hardware advancements, internet technologies, and distributed computing. It details various cloud service models (IaaS, PaaS, SaaS) and deployment models (public, private, community, hybrid), as well as features of IaaS and PaaS providers. Additionally, it discusses challenges and risks associated with cloud computing, including security, data lock-in, and availability.

Uploaded by

shankar creation
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

CLOUD COMPUTING NOTES MID-TERM

ADITYA BATTIN 2020BCS095

Q.1 : Explain convergence of various advances leading to the advent of


cloud computing.
Ans : The development of cloud computing is the result of the convergence of key technological
advances in several areas:
Hardware Advancements:
1. Virtualization: This technology allows multiple virtual machines (VMs) to efficiently share
physical hardware resources, enabling the running of multiple operating systems and software stacks
on a single server, thereby optimizing resource utilization.
2. Multi-core chips: The widespread use of multi-core processors boosted server processing power,
making it feasible to run multiple VMs on a single server, further enhancing resource utilization.

Internet Technologies:
1. Web Services: Open standards for Web services facilitated the integration of diverse applications
across different platforms, offering a standardized method for applications to communicate and share
data.
2. Service-Oriented Architectures (SOA): SOA promoted loosely coupled, protocol-independent, and
standards-based distributed computing. It described services in a standardized language, encouraging
interoperability.
3. Web 2.0: The Web 2.0 paradigm emphasized programmable aggregation of information and
services, allowing for the creation of complex applications through the combination of building
blocks and APIs.

Distributed Computing and Utility Computing:


1. Grid Computing: Grid computing aimed to aggregate distributed resources for transparent access.
It sought to share compute and storage resources across administrative domains, primarily in
scientific applications, albeit facing challenges in ensuring Quality of Service (QoS) and
compatibility.
2. Utility Computing: Utility computing was defined as the on-demand delivery of infrastructure,
applications, and business processes over the Internet. This approach allowed consumers to reduce IT
costs by obtaining services from external providers based on their needs, while providers optimized
efficiency and return on investment.

System Management and Autonomic Computing:


1. Hardware Virtualization: Hardware virtualization, facilitated by hypervisors like VMware, Xen,
and KVM, allowed multiple VMs to run on a single physical server, enhancing isolation,
consolidation, and migration capabilities.
2. Virtual Appliances: Virtual appliances bundled applications with their necessary environments,
simplifying software customization, configuration, and portability. Marketplaces for virtual
appliances streamlined software deployment.
3. Autonomic Computing: The concept of autonomic computing inspired data center automation,
where systems aim to manage themselves with minimal human intervention. Autonomic managers
use monitoring data to make real-time optimizations.
Q.2 : Write a short note on grid and utility computing.
Ans :

Grid Computing:
Definition: Grid computing is a distributed computing approach that aggregates resources from
different administrative domains, allowing transparent access to these resources. Its primary aim is to
enhance the performance of scientific applications, like climate modeling, drug design, and protein
analysis, by sharing computational and storage resources.
Key Aspects:
Standard Web Services: Grid computing relies on standard Web services-based protocols to discover,
access, allocate, monitor, account for, and manage distributed resources as a single virtual system.
This standardization is crucial for efficient grid operation.
OGSA: The Open Grid Services Architecture (OGSA) defines core capabilities and behaviors to
address key concerns in grid systems, promoting uniformity and interoperability.
Examples: TeraGrid and EGEE are prominent production grids that seek to accelerate a range of
scientific applications. These grids enable researchers to harness vast computational resources
distributed across different institutions
Utility Computing:
Definition: Utility computing involves users assigning a "utility" value to their computing jobs,
which reflects their specific requirements, such as deadlines and importance. They pay a service
provider based on this utility, while providers aim to maximize their own utility, often linked to
profit. Utility computing creates a marketplace where resources are allocated based on the perceived
value of jobs.
Key Aspects:
Resource Allocation: Utility computing optimizes resource allocation by considering job-specific
utility values, ensuring that higher-value jobs receive prioritized access to resources.
Flexible Resource Management: Users can set their utility value based on their job's specific
requirements, offering flexibility in resource allocation.
Examples: Amazon Web Services (AWS) is a prime example of utility computing, where users pay
for computing resources based on their specific needs. AWS offers a variety of services that can be
scaled up or down as required, making it a cost-effective solution for many businesses.
Q.3 Explain Hardware Virtualization with suitable diagram.
Ans :
Hardware virtualization is a technology that allows multiple operating systems and software stacks
to run on a single physical platform. This is achieved by using a software layer known as the Virtual
Machine Monitor (VMM), or hypervisor, which mediates access to the physical hardware. The
hypervisor presents each guest operating system with a Virtual Machine (VM), which is a set of
virtual platform interfaces.
There are three basic capabilities regarding the management of workload in a virtualized system:
 Isolation: Each program runs in its own isolated space (VM), enhancing security,
reliability, and performance control. Failures in one VM don't affect others.
 Consolidation: Multiple different tasks run on one machine, optimizing system use and
overcoming software and hardware compatibility issues during upgrades.
 Migration: Applications can be moved between machines (migration) for maintenance,
balancing loads, or disaster recovery by packaging the entire state of an operating
system into a VM.

A hardware virtualized server hosting three virtual machines, each one running distinct
operating system and user level software stack.
Several VMM platforms exist that form the basis of many utility or cloud computing environments.
The most notable ones are VMWare, Xen, and KVM.

1. VMWare ESXi: A bare-metal hypervisor from VMWare that installs directly on the physical
server and provides advanced virtualization techniques of processor, memory, and I/O.
2. Xen: An open-source hypervisor that pioneered the para-virtualization concept, allowing the
guest operating system to interact with the hypervisor for improved performance.
3. KVM (Kernel-based Virtual Machine): A Linux virtualization subsystem that is part of the
mainline Linux kernel, leveraging hardware-assisted virtualization to support unmodified
guest operating systems.
Q.4 Define Atomic computing with its properties.
Ans :
Autonomic computing is a field of research that aims to reduce human involvement in the
operation of complex computing systems. The goal is for these systems to manage
themselves, guided by high-level human input.
Autonomic, or self-managing, systems operate based on several key components:
 Monitoring probes and gauges (sensors): These collect data about the system’s
operation.
 Adaptation engine (autonomic manager): This computes optimizations based
on the data collected by the sensors.
 Effectors: These implement changes in the system based on the optimizations
computed by the autonomic manager.
IBM’s Autonomic Computing Initiative has defined four key properties of autonomic
systems:
1. Self-Configuration: The system can configure itself based on high-level policies
provided by humans.
2. Self-Optimization: The system can optimize its own performance and resources to
achieve the best possible results.
3. Self-Healing: The system can detect and correct faults and problems without
human intervention.
4. Self-Protection: The system can anticipate and protect itself from threats and
attacks.
IBM also suggested a reference model for autonomic control loops of autonomic managers,
called MAPE-K (Monitor, Analyse, Plan, Execute—Knowledge).
Q.5 Explain the cloud computing stack using suitable diagram.
Ans : The cloud computing stack, often referred to as the cloud computing service
models, is a conceptual framework that categorizes cloud computing services into three
distinct layers based on the level of abstraction and the service model provided by cloud
providers.
These layers are explained as follows :
Infrastructure as a Service (IaaS):
 IaaS offers virtualized computing resources like VMs, storage, and networking on
demand.
 Users have control over VM configurations, and it follows a pay-as-you-go model.
 Example: AWS Elastic Compute Cloud (EC2).
Platform as a Service (PaaS):
 PaaS abstracts the underlying infrastructure, providing a development and
deployment platform.
 Developers focus on code, and it offers programming languages and frameworks.
 Example: Google AppEngine.

Software as a Service (SaaS):


 SaaS delivers fully functional software applications over the internet.
 Users access applications via web browsers without installation.
 Example: Salesforce.com for CRM.
Q.6 Enlist and explain the cloud deployment model with suitable diagram.
Ans :
Public Cloud:
Definition: Public clouds are cloud services made available to the general public on a pay-
as-you-go basis.
Explanation: Public clouds are hosted and operated by third-party providers and are
accessible over the internet. They offer a wide range of services to users, who can scale
resources as needed. Users typically have no control over the underlying infrastructure,
making it a cost-effective choice for many organizations.
Private Cloud:
Definition: Private clouds are cloud environments that are set up within an organization's
internal data center and are not accessible to the general public.
Explanation: Private clouds provide the benefits of cloud computing, such as self-service,
scalability, and metered billing, but within the organization's own infrastructure. This
deployment model offers greater control and security, making it suitable for organizations
with specific compliance and security requirements.
Community Cloud:
Definition: Community clouds are cloud environments shared by multiple organizations
with common concerns, such as mission, security requirements, and compliance
considerations.
Explanation: Community clouds are designed to meet the needs of specific communities or
industries. Multiple organizations collaborate to share cloud resources while addressing
shared concerns. This model allows for resource sharing among trusted partners, ensuring
compliance with industry-specific regulations.
Hybrid Cloud:
Definition: Hybrid clouds combine elements of both private and public clouds, allowing
data and applications to move between them as needed.
Explanation: In a hybrid cloud, an organization can leverage its private cloud for sensitive
or critical workloads while using public cloud resources for scalability and flexibility. The
ability to move workloads between these environments is known as "cloud bursting,"
providing a dynamic and cost-effective solution for handling fluctuations in resource
demands.
Types of Cloud based on deployment models

Q.7 Define Cloud and explain its desired features.


Ans :
Definition of cloud computing :
“It is a techno-business disruptive model of using distributed large-scale data centre’s either
private or public or hybrid offering customers a scalable virtualized infrastructure or an
abstracted set of services qualified by service-level agreements (SLAs) and charged only by
the abstracted IT resources consumed.”
1. Self-Service: Cloud users should have on-demand, instant access to resources
without needing human intervention.
2. Per-Usage Metering and Billing: Users should pay only for the resources they
use, on a short-term basis (e.g., hourly), with transparent and efficient pricing,
accounting, and billing.
3. Elasticity: Clouds should provide the illusion of infinite computing resources that
can be rapidly provisioned as needed and released when no longer required, allowing
for scalability.
4. Customization: Cloud resources should be highly customizable to accommodate
the diverse needs of users, whether it involves configuring virtual appliances,
granting privileged access, or providing some level of customization for different
service classes (IaaS, PaaS, SaaS).
Q. 8 Explain Cloud Infrastructure Management. Enlist it's features.
Ans :

Definition: Cloud infrastructure management refers to the process of overseeing and


controlling the physical and virtual resources, such as servers, storage, and networks, within
a cloud computing environment.
Cloud infrastructure management involves overseeing physical and virtual resources in a
cloud environment, such as servers and storage.
A virtual infrastructure manager (VIM) is used to orchestrate and optimize these resources,
ensuring efficient provisioning for applications and users.
1. Virtualization Support: Utilizes hardware virtualization for flexible resource
partitioning in multi-tenant data centers.
2. Self-Service Resource Provisioning: Enables users to directly access and
customize cloud services without administrator intervention.
3. Multiple Backend Hypervisors:
• Supports various virtualization technologies, ensuring a uniform
management layer.
• Particularly prevalent in open-source VIMs with pluggable drivers.

4. Storage Virtualization:
• Abstracts logical storage from physical devices, creating virtual disks
independent of hardware and location.
• Commonly used with storage area networks (SANs) and storage
controllers.
5. Interface to Public Clouds:
• Integrates resources from public clouds to meet varying workload
demands.
• Transparence usage of leased resources for applications.
6. Virtual Networking:
• Creates isolated virtual networks like VLANs, enhancing network
management and security.
• Supports secure VPN connections for local and remote VMs.
7. Dynamic Resource Allocation:
• Monitors resource utilization and reallocates resources among VMs to
match supply and demand.
• Aids in energy conservation and SLA optimization.
8. Virtual Clusters:
• Holistically manages groups of VMs for on-demand computing clusters.
• Useful for multi-tier Internet applications.
9. Reservation and Negotiation Mechanism:
• Supports advance reservations and complex leasing terms to meet resource
demands.
• Accommodates scenarios where resources are in high demand with
negotiation features.
10. High Availability and Data Recovery:
• Offers high availability features to minimize downtime through VM
failover.
• Implements redundancy and synchronized VMs for mission-critical
applications.
• Utilizes data backup mechanisms, often with incremental backups and
proxies, to protect VM images.

Q.9 Enlist and explain features of IaaS providers.


Ans :
Features of IaaS Providers:
Geographic Presence:
Description: Availability of data centers in multiple locations worldwide to improve
availability and responsiveness.
Examples: Amazon EC2 offers "availability zones" and "regions" distributed across different
geographic areas.

Client User Interfaces and Access to Servers:


Description: Various methods for users to interact with cloud services, including graphical
user interfaces (GUI), command-line tools (CLI), and web service (WS) APIs.
Examples: End users often prefer GUIs, while CLI offers flexibility for automation.

Advance Reservation of Capacity:


Description: Ability for users to reserve cloud resources for a specific timeframe in advance.
Examples: Amazon Reserved Instances, which allow users to pay upfront for guaranteed
availability over a specified period.
Service-Level Agreement (SLA):
Description: A commitment by providers to deliver specific Quality of Service (QoS) levels,
often including availability and performance guarantees.
Examples: Amazon EC2 provides an SLA that guarantees a certain percentage of annual
uptime.

Hypervisor and Operating System Choice:


Description: Selection of virtualization platforms and supported operating systems.
Examples: Many IaaS providers use hypervisors like Xen, offering a choice between Linux
and Windows.
Automated Horizontal Scaling and Load Balancing:
Description: Automatic scaling based on application-specific metrics and distribution of
incoming traffic among available servers.
Examples: Cloud providers like Amazon EC2 offer services like Auto Scaling and Elastic
Load Balancing.

Q.10 Enlist and explain features of PaaS providers.


Ans :
Features of PaaS Providers:
Programming Models, Languages, and Frameworks:
Description: PaaS providers offer various programming models and support for multiple
programming languages and frameworks, allowing developers to create applications
efficiently.
Examples: Google App Engine supports Python and Java, while Microsoft Azure provides a
.NET stack. Heroku specializes in Ruby on Rails.

Developer Tools:
Description: Tools and development environments that simplify the process of building,
deploying, and managing applications on the platform.
Examples: Google App Engine provides an Eclipse-based IDE, while Microsoft Azure offers
tools for Visual Studio.

Persistence Options:
Description: Methods for storing and retrieving application data, including support for
relational databases and distributed storage solutions.
Examples: Google App Engine uses BigTable, while Salesforce's Force.com uses its own
object database.

Automatic Scaling:
Description: PaaS platforms often feature auto-scaling capabilities, enabling applications to
adapt dynamically to varying levels of traffic and resource demand.
Examples: Platforms like Google App Engine and Heroku provide automatic scaling.

Backend Infrastructure:
Description: Information about the underlying infrastructure and services supporting the
PaaS, including components like load balancers, databases, and data storage.
Examples: Google App Engine leverages its own infrastructure, while Microsoft Azure relies
on Microsoft's data centers.
Q.11 Explain challenges and risks of cloud computing.
Ans :
Challenges and Risks in Cloud Computing:
Security, Privacy, and Trust:
 Issue: Cloud services are often public, making them susceptible to attacks.
 Challenges: Ensuring cloud environments are as secure as in-house systems. Trust in
providers is crucial for privacy.
 Legal Considerations: Data centers' physical locations can affect data management and
compliance with local laws.
Data Lock-In and Standardization:
 Concern: Users worry about being locked into one cloud provider, making it hard to move
their data.
 Solution: Standardization efforts aim to create open standards for cloud computing. Examples
include the Cloud Computing Interoperability Forum (CCIF) and the Unified Cloud Interface
(UCI).
Availability, Fault-Tolerance, and Disaster Recovery:
 User Expectations: Users expect service availability, performance, and clear measures for
handling system failures.
 SLAs: Service Level Agreements (SLAs) are needed to specify service details, including
availability and performance guarantees.
Resource Management and Energy Efficiency:
 Resource Allocation: Efficiently managing physical resources shared among virtual machines
is a challenge.
 Dynamic VM Mapping: Policies for mapping VMs must consider factors like CPU, memory,
and network bandwidth.
 Data Management: Handling large data quantities in VM management activities requires
efficient mechanisms.
 Energy Efficiency: Data centers consume substantial electricity, impacting costs and the
environment. Dynamic resource management can optimize performance and minimize energy
consumption.
These challenges and risks must be carefully addressed by cloud providers, developers, and users to
ensure the benefits of cloud computing while mitigating potential issues related to security, data
management, and resource optimization.
Q.12 Explain the promise of the cloud computing services with suitable
diagram.
Ans :
1. Simplicity and Ease of Use: Cloud computing offers simplicity, uniformity, and
ease of use through abstractions, making it accessible without the need to
understand underlying complexities.
2. Economic Savings: Small and medium enterprises can achieve substantial
economic savings by using cloud computing for cyclical IT needs, as documented in
numerous success stories.
3. Cloudonomics: The economic benefits and trade-offs of leveraging cloud services,
known as "cloudonomics," have become a topic of deep interest among IT managers
and technology architects.
4. Spawning Non-Mission Critical Needs: The promise of the cloud, both in terms
of economics and technology, allows enterprises to move non-mission-critical IT
needs to cloud services, particularly those that are web-oriented, seasonal,
parallelizable, and not highly security-dependent.
5. Successful Adoption by Startups: Many startups have successfully established
their IT departments exclusively using cloud services, achieving high returns on
investment (ROI).
6. Pilots in Large Enterprises: Large enterprises are running successful pilots for
cloud adoption, including experimenting with running complex applications like SAP
on cloud offerings.
7. Predicted Widespread Adoption: Industry analysts predict that a significant
percentage of top enterprises would have migrated the majority of their IT needs to
cloud offerings, demonstrating the widespread impact and benefits of cloud
computing.

The Promise of Cloud Computing Services


Q.13 Draw a suitable diagram for VPC and explain with it's features.
Ans :

Definition : “A Virtual Private Cloud (VPC) is a self-contained, logically isolated virtual


network environment that emulates the structure and functionality of a conventional on-
premises network, providing a scalable infrastructure for deploying and managing
resources.”

AMAZON Virtual Private Cloud

The following features help you configure a VPC to provide the connectivity that your
applications need:

1. Subnets: Subnets are like address ranges within your virtual private cloud (VPC).
Each subnet is confined to a single Availability Zone and serves as a place to deploy
AWS resources.
2. IP Addressing: You can assign IP addresses (IPv4 and IPv6) to your VPCs and
subnets. You can even bring your existing public IP addresses to AWS and assign
them to your resources, like EC2 instances or load balancers.
3. Routing: Route tables determine where network traffic from your subnets or
gateways should go. They act like roadmaps for directing data within your network.
4. Gateways and Endpoints: Gateways, like internet gateways, connect your VPC to
external networks (e.g., the internet). VPC endpoints enable private connections to
AWS services without exposing them to the internet.
5. Peering Connections: VPC peering lets you connect resources in different VPCs
securely, allowing them to communicate as if they were in the same network.
6. Traffic Mirroring: You can copy network traffic from your instances and send it to
security and monitoring tools for in-depth analysis.
7. Transit Gateways: Think of transit gateways as central hubs that facilitate traffic
routing between your VPCs, VPN connections, and Direct Connect connections. They
simplify network architecture.
8. VPC Flow Logs: These logs capture details about the IP traffic flowing to and from
network interfaces within your VPC, helping with troubleshooting and security
analysis.
9. VPN Connections: AWS VPN lets you establish secure connections between your
VPCs and your on-premises networks.

Q.14 Draw and explain cloud computing service offering and deployment
models.
Ans :

Cloud Computing Service Offering:


Cloud computing service offerings refer to the types of services and functionalities provided by cloud service
providers to users and organizations. These offerings cater to various user needs, from infrastructure
provisioning to software applications. There are three primary categories of cloud service offerings:

1. Infrastructure as a Service (IaaS):

 Definition: IaaS is a cloud computing service offering that provides virtualized and scalable
hardware resources such as computing power, storage, and network infrastructure.
 Users: Targeted at IT professionals and system administrators.
 Examples: Amazon Web Services (AWS) with services like EC2 (Elastic Compute Cloud) and
S3 (Simple Storage Service).
2. Platform as a Service (PaaS):

 Definition: PaaS is a cloud computing service offering focused on supporting programming


platforms, offering runtime environments that implicitly use cloud services provided by the
vendor.
 Users: Preferred by programmers and developers.
 Examples: Google AppEngine for Java and Python programming, and Microsoft Azure for
.Net development.
3. Software as a Service (SaaS):

 Definition: SaaS on the cloud is about delivering software applications to end-users via the
internet, with underlying cloud infrastructure providing support.
 Users: Architects and end-users of large software packages.
 Examples: Salesforce.com, Gmail, Yahoo Mail, Facebook, Twitter, and other cloud-supported
applications.

Cloud Computing Deployment Models:


Cloud computing deployment models refer to how cloud services and resources are implemented, organized,
and managed for use by organizations. There are three primary deployment models:
1. Public Clouds:

 Definition: Public clouds are cloud environments provided by cloud vendors to the general
public or multiple organizations. These environments offer shared resources, such as virtual
servers and storage, over the internet.
 Characteristics: Scalable, cost-effective, and maintained by the service provider.
 Examples: Amazon Web Services (AWS), Google Cloud, Microsoft Azure.

2. Private Clouds:

 Definition: Private clouds are cloud infrastructures exclusively operated and used by a single
organization. They are hosted on-premises or by a third-party provider, and access is
restricted to that organization.
 Characteristics: Enhanced control, customization, and privacy.
 Examples: On-premises data centers or cloud solutions dedicated to a single enterprise.

3. Hybrid Clouds:

 Definition: Hybrid clouds combine elements of both public and private clouds, allowing data
and applications to be shared between them. Organizations can use hybrid models to meet
specific business needs.
 Characteristics: Flexibility, security, and the ability to balance on-premises and cloud
resources.
 Examples: Combining public cloud services with private data centers or proprietary cloud
solution
Q.15 Explain Challenges in the Cloud with suitable diagram.
Ans :

Challenges in the Cloud:

1 .Simplistic View vs. Complexity: Cloud service offerings present a simplified view of IT, programming,
and resource usage, but the underlying systems face significant complexity and challenges.

2 Underlying System Challenges:

 Failure-Prone: Cloud systems operate in an environment where failures can occur, which
necessitates robust mechanisms for fault tolerance and recovery.
 Heterogeneity: Cloud environments often consist of diverse hardware and software
components, making system management more complex.
 Resource Hogging: Efficient resource allocation and management are essential to ensure
optimal performance.
 Security Shortcomings: Cloud systems must address serious security concerns, such as data
privacy and protection.

3 Idealized View vs. Realistic Management: Cloud services often promise features like network
reliability, instant network latency, and infinite bandwidth, which must be managed realistically to
avoid design and implementation fallacies.

4 Security Challenges: Security is a paramount concern in cloud computing, involving issues related to
data protection, compliance, and trust. The Cloud Security Alliance is actively addressing these
challenge

Q.16 Draw and Explain 7 step model for migration to cloud.


Ans :
The Seven-Step Model for Migration to the Cloud involves a structured and process-
oriented approach to migrating into a cloud environment:
 Conduct Cloud Migration Assessments: Assess and understand all aspects of
the migration, including application, code, design, architecture, and usage levels, as
well as tools, test cases, configurations, functionalities, and non-functional
 requirements (NFRs). This leads to a comprehensive migration strategy.
 Isolate the Dependencies: Identify and isolate systemic and environmental
dependencies of enterprise application components within the on-premises data
center to gauge the complexity of the migration.
 Map the Messaging & Environment: Create mapping constructs to determine
what remains in the local data center and what moves to the cloud, considering
messaging and environmental factors.
 Re-architect & Implement the Lost Functionalities: If necessary, re-architect,
redesign, and reimplement parts of the enterprise application on the cloud. Address
any functionality that may be lost during migration.
 Leverage Cloud Functionalities & Features: Utilize the intrinsic features of
cloud computing services to enhance the enterprise application.
 Test the Migration: Thoroughly validate and test the migrated enterprise
application, including components running on the cloud. Address any issues or
challenges that arise during testing.
 Iterate and Optimize: If needed, iterate through the process to optimize the
migration, ensuring it is robust and comprehensive. Continuously refine the
migration approach based on results and feedback.

The Seven-Step Model of Migration into the Cloud.

Q.17 Draw and Explain iterative 7 Step model of migration to Cloud


Ans :
The iterative seven-step model for cloud migration involves a structured approach with a
focus on refining and optimizing the migration process:
 Assessment and Understanding: Initially, assess all aspects of the migration,
including applications, code, architecture, and tools, to formulate a comprehensive
migration strategy.
 Dependency Isolation: Identify and isolate dependencies within the on-premises
data center to gauge migration complexity.
 Mapping Constructs: Create mapping constructs to determine what stays on-
premises and what moves to the cloud, considering messaging and environmental
factors.
 Re-architect and Implement: If needed, re-architect and redesign parts of the
application for the cloud, addressing any potential functionality loss.
 Leverage Cloud Features: Utilize cloud features to enhance the application's
capabilities.
 Testing and Validation: Rigorously test the migrated application, including cloud
components, addressing any issues.
 Iterative Optimization: Continuously iterate and refine the migration approach
based on testing results and feedback, ensuring robustness and comprehensiveness.

The iterative Seven-step Model of Migration into the Cloud.


Q.18 Derive the equations of cloud migration and deciding cloud
migrations.
Ans :
Deriving the equation for cloud migrating :
At the core of application migration to the cloud, there are typically two scenarios:
1. The application is clean and independent, so it can run unchanged on the cloud.
2. Some parts of the application need code adjustments or cannot be fully migrated to
the cloud, resulting in a hybrid cloud setup.
Let's define some terms for deriving the equation:
 P: Application before migration running in the captive data center.
 P'c: Part of the application after migration to a hybrid cloud.
 P'l: Part of the application still running in the captive local data center.
 P'ofc: Part of the application optimized for the cloud.
For the second scenario, where only a part of the application is migrated to the cloud, the
equation is as follows:
 (P --> P'c + P'l)
After optimizing the part of the application on the cloud to meet its specific requirements,
the equation changes to:
 (P'c + P'l --> P'ofc + P'l)

Deriving the equation for deciding to cloud migration :


To arrive at a decision to migrate to cloud or not it is a very difficult task. the ROI on
the migration should be posituve for a broad range of pricing varablity.
Lets say that there is an company that wants to move its buesness to cloud. Assuming that
there
are M classes of applications and Each class of questions assigned a certain weightage Bi.
There wass a class with min N questions.
Model the weitage based decision as M x N weightage matrix.

Terms used :
Cl: Lower weightage threshold.
Ch: Higher weightage threshold.
Aij: Specific constant assigned for a question.
Xij: Fraction between 0 and 1 representing the relevance and applicability of the answer to
a question.

Q 19.Write a short note on IT as a Service and Integration as a Service.


Ans :
IT as a Service (ITaaS):
 Definition: IT as a Service (ITaaS) is a modern IT delivery model that views IT
resources, activities, and infrastructure as services.
 Service-Oriented Approach: ITaaS transforms every IT element into a service,
emphasizing service orientation principles.
 Design Philosophy: Systems are designed as collections of evolving services, and
infrastructures become service-enabled and collaborative.
 Influence of the Internet: ITaaS is influenced by the pervasive internet, enabling
on-demand access to IT resources.
 Role of Cloud Computing: Cloud computing, especially cloud services, plays a
significant role in realizing ITaaS.
 Consumption-Based Billing: Maturing consumption-based metering and billing
capabilities contribute to the "everything as a service" paradigm.
 Efficient IT Delivery: ITaaS represents a shift in how IT is delivered, providing
service-oriented, on-demand access to IT resources.

Integration as a Service (IaaS):


 Definition: Integration as a Service (IaaS) is a capability offered by cloud platforms
to address business integration requirements.
 Seamless Connectivity: IaaS bridges the gap between cloud-based solutions and
on-premises applications and data sources, ensuring seamless connectivity.
 Security Considerations: Many traditional applications and data sources are
locally maintained due to security concerns.
 Role of B2B Integration: IaaS leverages business-to-business (B2B) integration
technology to create a reliable and secure bridge.
 B2B System Capabilities: B2B systems are traditionally used to automate
business processes between manufacturers and trading partners.
 Features: They provide application-to-application connectivity, encryption for
secure data transfer, data conversion, and data delivery across multiple enterprises.
 Web Infrastructure: IaaS uses this established communication and collaboration
model to facilitate interoperability between cloud and traditional systems over web
infrastructure.

Q 20.Why SaaS Integration is hard?. Enlist it's constraining attributes and


reasons.
Ans :
Cloud Integration Challenges:
1. New Integration Scenarios:The shift to a cloud model introduces new
integration scenarios, including connecting local applications to the cloud and
integrating cloud applications with each other.
2. Limited Access to Cloud Resources:Access to cloud resources (SaaS, PaaS, and
infrastructure) is more limited than local applications, requiring custom applications
designed to support integration.
3. Dynamic Resources Impacting Integration:Dynamic changes in cloud
infrastructure and application versioning can impact integration models, requiring a
shift towards Representational State Transfer (REST) interfaces.
4. Performance Challenges:Network latency becomes an issue in cloud integration
due to the dynamic nature of cloud resources, leading to potential slowdowns in
performance.
Constraining Attributes of SaaS Applications:
1. Dynamic Nature of SaaS Interfaces: SaaS applications often have interfaces
that constantly change, making it difficult to maintain integration connections.
2. Dynamic Nature of Metadata Native to SaaS Providers: SaaS providers like
Salesforce.com have dynamic metadata that can change, requiring frequent
adjustments to integration mechanisms.
3. Managing Assets Outside the Firewall: SaaS applications may exist outside the
organization's firewall, making integration and data synchronization more complex.
4. Massive Data Transfer and Data Quality:The need to transfer massive amounts
of data between SaaS and on-premise systems daily can lead to data quality and
integrity issues.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy