You are on page 1of 14

Cloud Computing

1. What are the types of deployment models in cloud computing?

Ans- Four cloud deployment models:


public clouds - this type of cloud deployment model supports all users who want to
make use of a computing resource, such as hardware (OS, CPU, memory, storage)
or software (application server, database) on a subscription basis.
private clouds- a private cloud is typically infrastructure used by a single
organization. Such infrastructure may be managed by the organization itself to
support various user groups, or it could be managed by a service provider that takes
care of it either on-site or off-site. Are expensive.
community clouds- supports multiple organizations sharing computing resources
that are part of a community; examples include universities cooperating in certain
areas of research, or police departments within a county or state sharing computing
resources. Access to a community cloud environment is typically restricted to the
members of the community.
hybrid clouds- In a hybrid cloud, an organization makes use of interconnected
private and public cloud infrastructure. Many organizations make use of this model
when they need to scale up their IT infrastructure rapidly.

2. How will you decide which service model of cloud computing is good for
your organization?

Ans- Cloud models come in three types: SaaS (Software as a Service), IaaS
(Infrastructure as a Service) and PaaS (Platform as a Service). Each of the cloud
models has their own set of benefits that could serve the needs of various
businesses.

Choosing between them requires an understanding of these cloud models,


evaluating your requirements and finding out how the chosen model can deliver
your intended set of workflows.
3. What are limitations of cloud computing

Ans-
● Risk of data confidentiality
● Depends on internet connection
● Secrecy and security are among the most doubtful things in cloud computing.
● Risk of a level compliance deviation from the provider against the regulations
applied by the user.
● Vulnerable in the event of an attack
● Data Mobility-
(which refers to the possibility of sharing data between cloud services and how
to retrieve data if one day the user makes a process of terminating cloud
computing services.)
● Technical problem
● Does not work well if the connection is slow.

4. What are the risks related to cloud computing?

Ans- The main security risks of cloud computing are:


Compliance violations
Identity theft
Malware infections and data breaches
Diminished customer trust and potential revenue loss

5. What is a hypervisor? What are the benefits?


Ans- A hypervisor is a software layer that creates and runs many isolated virtual
machines (VMs) over single hardware.

Benefits:
Data replication: Hypervisors can be used for easy cloning and replication.
Hypervisor-based replication is easier and more cost-effective than any other
replication method of virtual machines.
Consolidating Servers: Hypervisors also offer inbuilt graphical dashboards. You
can also download additional enhancements to the inbuilt dashboards for better
visibility. This ability lets you consolidate and manage your servers centrally even
when they are running different operating systems.
Desktop Virtualization: You can easily host a virtual desktop on a server, and the
desktop replicates the user’s physical desktop. This lets employees access their
workstations over the Internet through client devices, allowing them to work
remotely.
6. What are the advantages and disadvantages of cloud deployment models?
Ans- ADVANTAGES:
● Cost efficiency
● High speed
● Excellent accessibility
● Back-up and restore data
● Manageability
● Sporadic batch processing: Cloud Computing lets us add or subtract resources
and services according to our needs. So, if the workload is not 24/7, we need not
worry about the resources and services getting wasted and we won’t end up
stuck with unused services.
● Strategic edge
DISADVANTAGES:
● Vulnerability to attacks
● Network connectivity dependency
● Downtime: The cloud providers may sometimes face technical outages that can
happen due to various reasons, such as loss of power, low Internet connectivity,
data centers going out of service for maintenance, etc. This can lead to a
temporary downtime in the cloud service.
● Vendor lock-in
● Limited control

ADVANTAGES AND DISADVANTAGES BASED ON PARTICULAR


DEPLOYMENT MODEL:
A. PRIVATE CLOUD:
Advantages:
Organization specific
High degree of security and level of control
Ability to choose your resources (ie. specialized hardware)

Disadvantages:
Lack of elasticity and capacity to scale (bursts)
Higher cost
Requires a significant amount of engineering effort
B. PUBLIC CLOUD
Advantages:
Scalability/Flexibility/Bursting
Cost effective
Ease of use

Disadvantages:
Shared resources
Operated by third party
Unreliability
Less secure

C. HYBRID CLOUD
Advantages:

Cost effective
Scalability/Flexibility
Balance of convenience and security

Disadvantages:

Same disadvantages as the public cloud

D. MULTI-CLOUD
Advantages:
convenience for security and reliability

7. What is cloud migration?

Cloud migration is the process of moving digital business operations into the cloud.It
involves moving data, applications, and IT processes from some data centers to
other data centers

8. How cloud computing is different from traditional client server architecture.

Client server is a process where data processing is distributed between a client and
a server. Client server is a kind of application architecture whereas cloud computing
is the way that defines how applications are hosted. Cloud is the latest technology
that allows businesses to abstract software from the hardware, and scale up/down
the applications as per the business demands.

9. What is a type 1 hypervisor?

A bare-metal hypervisor (Type 1) is a layer of software we install directly on top of a


physical server and its underlying hardware.
There is no software or any operating system in between, hence the name bare-
metal hypervisor. A Type 1 hypervisor is proven in providing excellent performance
and stability since it does not run inside Windows or any other operating
system.Type 1 hypervisors are mainly found in enterprise environments.

10. What is a type 2 hypervisor?

This type of hypervisor runs inside of an operating system of a physical host


machine.
This is why we call type 2 hypervisors – hosted hypervisors. As opposed to type 1
hypervisors that run directly on the hardware, hosted hypervisors have one software
layer underneath. In this case we have:
● A physical machine.
● An operating system installed on the hardware (Windows, Linux, macOS).
● A type 2 hypervisor software within that operating system.
● The actual instances of guest virtual machines.

11. What are the types of hardware virtualization?

Hardware virtualization is of three kinds.These are:

Full Virtualization: Here the hardware architecture is completely simulated. Guest


software doesn't need any modification to run any applications.

Emulation Virtualization: Here the virtual machine simulates the hardware & is
independent. Furthermore, the guest OS doesn't require any modification.

Para-Virtualization: Here, the hardware is not simulated; instead the guest


software runs its isolated system.

12. What is a virtual machine?

A virtual machine (VM) is a virtual environment that functions as a virtual computer


system with its own CPU, memory, network interface, and storage, created on a
physical hardware system (located off- or on-premises). Software called a
hypervisor separates the machine’s resources from the hardware and provisions
them appropriately so they can be used by the VM.
13. What is the difference between S3 and EC2?

INDEX AMAZON S3 AMAZON EC2

1. "Reliable", "Scalable" and "Cheap" "Quick and reliable cloud servers",


are the primary reasons why "Scalability" and "Easy management"
Amazon S3 is favored. are the key factors why developers
consider Amazon EC2

2. For those use cases, Amazon S3 Amazon EC2 is a popular solution for
offers an easy and highly scalable hosting websites or Web apps in the
means of hosting the static data that Amazon cloud.
the website or Web app serves.

3. while S3 is related to the storage EC2 is a hosted cloud-based machine


services.

4. Amazon S3 is just a storage service, An EC2 instance is like a remote computer


typically used to store large binary running Windows or Linux and on which
files. Amazon also has other storage you can install whatever software you
and database services, like RDS for want, including a Web server running PHP
relational databases and DynamoDB code and a database server.
for NoSQL.

5. Amazon S3 is used by Airbnb, Spotify, Airbnb, Uber Technologies, and Netflix are
and Netflix some of the popular companies that use
Amazon EC2

14. What is VPC?

Amazon Virtual Private Cloud (Amazon VPC) enables you to launch AWS resources
into a virtual network that you've defined. This virtual network closely resembles a
traditional network that you'd operate in your own data center, with the benefits of
using the scalable infrastructure of AWS.

A virtual private cloud (VPC) is a secure, isolated private cloud hosted within a
public cloud. VPC customers can run code, store data, host websites, and do
anything else they could do in an ordinary private cloud, but the private cloud is
hosted remotely by a public cloud provider. (Not all private clouds are hosted in this
fashion.) VPCs combine the scalability and convenience of public cloud computing
with the data isolation of private cloud computing.
15. What is autoscaling?

AWS Auto Scaling monitors your applications and automatically adjusts capacity to
maintain steady, predictable performance at the lowest possible cost. Using AWS
Auto Scaling, it’s easy to set-up application scaling for multiple resources across
multiple services in minutes. The service provides a simple, powerful user interface
that lets you build scaling plans for resources including Amazon EC2 instances and
Spot Fleets, Amazon ECS tasks, Amazon DynamoDB tables and indexes, and
Amazon Aurora Replicas.

16. What is docker and where is it used?

Docker is a tool designed to make it easier to create, deploy, and run applications
by using containers. Containers allow a developer to package up an application with
all of the parts it needs, such as libraries and other dependencies, and deploy it as
one package

Docker is a basic tool, like git or java, that you should start incorporating into your
daily development and ops practices.

● Use Docker as version control system for your entire app's operating system
● Use Docker when you want to distribute/collaborate on your app's operating
system with a team
● Use Docker to run your code on your laptop in the same environment as you
have on your server (try the building tool)
● Use Docker whenever your app needs to go through multiple phases of
development (dev/test/qa/prod, try Drone or Shippable, both do Docker CI/CD)
● Use Docker with your Chef Cookbooks and Puppet Manifests (remember,
Docker doesn't do configuration management)

17. What is the difference between docker and VM?

https://cloudacademy.com/blog/docker-vs-virtual-machines-differences-you-
should-know/
18. What are the different types of IP in AWS? (I m not sure abt this - Patel)

https://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html

19. What are the features of Amazon RDS?

https://aws.amazon.com/rds/features/

1. Lower administrative burde


a. Easy to use
b. Automatic software patching
c. Best practice recommendations
2. Performance
a. General Purpose (SSD) Storage
b. Provisioned IOPS (SSD) Storage
3. Scalability
a. Push-button compute scaling
b. Easy storage scaling
c. Read Replicas
4. Availability and durability
a. Automated backups
b. Database snapshots
c. Multi-AZ deployments
d. Automatic host replacement
5. Security
a. Encryption at rest and in transit
b. Network isolation
c. Resource-level permissions
6. Manageability
a. Monitoring and metrics
b. Event notifications
c. Configuration governance
7. Cost-effectiveness
a. Pay only for what you use
b. Reserved instances
c. Stop and start

20. What problems does IAM solve? (i am not sure about this one )

https://aws.amazon.com/iam/faqs/

IAM makes it easy to provide multiple users secure access to your AWS resources.
IAM enables you to:
● Manage IAM users and their access: You can create users in AWS's identity
management system, assign users individual security credentials (such as
access keys, passwords, multi-factor authentication devices), or request
temporary security credentials to provide users access to AWS services and
resources. You can specify permissions to control which operations a user can
perform.
● Manage access for federated users: You can request security credentials with
configurable expirations for users who you manage in your corporate directory,
allowing you to provide your employees and applications secure access to
resources in your AWS account without creating an IAM user account for them.
You specify the permissions for these security credentials to control which
operations a user can perform.

21. Give an example where Private cloud is best suited.

https://searchcloudcomputing.techtarget.com/definition/private-cloud

Private cloud is a type of cloud computing that delivers similar advantages to public
cloud, including scalability and self-service, but through a proprietary architecture.
Unlike public clouds, which deliver services to multiple organizations, a private cloud
is dedicated to the needs and goals of a single organization.

Some of the largest players in the private cloud market include:

● Hewlett Packard Enterprise (HPE) -- offers the Helion Cloud Suite software,
Helion CloudSystem hardware, Helion Managed Private Cloud and Managed
Virtual Private Cloud services.
● VMware -- enables virtualization with its vSphere product, and offers its
vRealize Suite cloud management platform and Cloud Foundation Software-
Defined Data Center platform for private clouds.
● Dell EMC-- offers virtual private cloud services, as well as cloud management
and cloud security software.
● Oracle -- offers its Private Cloud Appliance X8, which enables compute and
storage capabilities optimized for private cloud deployment.
● IBM -- offers private cloud hardware, along with IBM Cloud Managed
Services, cloud security tools and cloud management and orchestration tools.
● Red Hat -- offers private cloud deployment and management with a range of
platforms, including OpenStackand Gluster Storage, as well as Red Hat
Cloud Suite for management and development.

22. Explain Elastic IP in AWS.

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/elastic-ip-addresses-
eip.html
An Elastic IP address is a static IPv4 address designed for dynamic cloud
computing. An Elastic IP address is associated with your AWS account. With
an Elastic IP address, you can mask the failure of an instance or software by
rapidly remapping the address to another instance in your account.

An Elastic IP address is a public IPv4 address, which is reachable from the


internet. If your instance does not have a public IPv4 address, you can
associate an Elastic IP address with your instance to enable communication
with the internet. For example, this allows you to connect to your instance
from your local computer.

We currently do not support Elastic IP addresses for IPv6.


23. What resources in cloud can be load balanced? ( i m not sure )

https://www.geeksforgeeks.org/load-balancing-in-cloud-computing/

24. What is AAA in IAM? give an example.

https://www.geeksforgeeks.org/computer-network-aaa-authentication-
authorization-and-accounting/#:~:text=AAA%20(Authentication%2C
%20Authorization%2C%20Accounting,the%20network%20(through
%20accounting).

https://www.techopedia.com/definition/24130/authentication-authorization-
and-accounting-aaa#:~:text=Examples%20of%20AAA%20protocols
%20include,Access%2DControl%20System%20(TACACS)

AAA (Authentication, Authorization, Accounting) –

AAA is a standard based framework used to control who is permitted to use network
resources (through authentication), what they are authorised to do (through
authorization) and capture the actions performed while accessing the network
(through accounting).

Authentication –

Process by which it can be identified that the user, which want to access the
network resources, valid or not by asking some credentials such as username and
password. Common methods are to put authentication on console port, AUX port or
vty lines.

Authorization –

It provide capabilities to enforce policies on network resources after the user has
gain access to the network resources through authentication. After the
authentication is successful, authorisation can be used to determine that what
resources is the user allowed to access and the operations that can be performed.

Accounting –

It provide means of monitoring and capturing the events done by the user while
accessing the network resources.It even monitors how long the user has an access
to the network. The administrator can create an accounting method list to specify
what should be accounted and to whom the accounting records should be send.

Examples of AAA protocols include:


● Diameter, a successor to Remote Authentication Dial-In User Service (RADIUS)
● Terminal Access Controller Access-Control System (TACACS)
● Terminal Access Controller Access-Control System Plus (TACACS+) a
proprietary Cisco Systems protocol that provides access for network servers,
routers and other network computing devices.

25. How does cloud computing maintain high availability?

https://journalofcloudcomputing.springeropen.com/articles/10.1186/s13677-
016-0066-8#:~:text=In%20order%20to%20reach%20a,to%20avoid%20outages
%20or%20failures.

As stated previously, high availability in Clouds remains a big challenge for


providers since Cloud infrastructure systems are very complex and must address
different services with different requirements. In order to reach a certain level of high
availability, a Cloud provider should monitor its resources and deployed services
continuously. With information about resources and service behaviors available, a
Cloud provider could make good management decisions in order to avoid outages
or failures

26. Explain lifecycle of EC2 Instance


(https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-
instance-lifecycle.html)
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/concepts.html
The EC2 instances in an Auto Scaling group have a path, or lifecycle, that differs
from that of other EC2 instances. The lifecycle starts when the Auto Scaling group
launches an instance and puts it into service. The lifecycle ends when you
terminate the instance, or the Auto Scaling group takes the instance out of service
and terminates it.

27. Any 10 Docker commands.


https://dzone.com/articles/top-docker-commands-itsyndicate

1. docker attach - Attaches your local input/output/error stream to a running


container.
2. docker commit - Creates a new image from the current changed state of the
container.
3. docker exec- Runs a command in a container that is active or running.
4. docker history- Displays the history of an image.
5. docker info- Shows system-wide information.
6. docker inspect- Finds system-level information about docker containers and
images.
7. docker login- Logins to local registry or Docker Hub.
8. docker pull- Pulls an image or a repository from your local registry or Docker
Hub.
9. docker ps- Lists various properties of containers.
10. docker restart- Stops and starts a container.
11. docker rm- Remove containers.
12. docker rmi- Remove images
13. docker run- Runs a command in an isolated container.
14. docker search- Searches the Docker Hub for images.
15. docker start- Starts already stopped containers.
16. docker stop- Stops running containers.
17. docker version- Provides docker version information.

28. Explain website hosting procedure on VM instance. (ile)

29. What is elastic beanstalk?


AWS Elastic Beanstalk is an easy-to-use service for deploying and scaling web
applications and services developed with Java, .NET, PHP, Node.js, Python, Ruby,
Go, and Docker on familiar servers such as Apache, Nginx, Passenger, and IIS.
You can simply upload your code and Elastic Beanstalk automatically handles
the deployment, from capacity provisioning, load balancing, auto-scaling to
application health monitoring. At the same time, you retain full control over the AWS
resources powering your application and can access the underlying resources at any
time.
There is no additional charge for Elastic Beanstalk - you pay only for the AWS
resources needed to store and run your applications.

30. Load balancing procedure in cloud. (ile)

31. Questions based on Mini project


EXTRA QUESTIONS:

1. What is a cloud?
Ans- A cloud is a combination of networks,hardware, services, storage, and
interfaces that helps in delivering computing as a service.
It has three users :
● End users
● Business management users
● cloud service provider

You might also like