FCC by Akatsuki
FCC by Akatsuki
FCC by Akatsuki
1|Page
5. Explain need of diversified services.
Diversified services are like having different tools in a toolbox. It's important
because people have different needs, and offering a variety of services helps to
meet those needs. It's like having options that allow everyone to do what they want
or need to do.
6. Explain merits of cloud computing services.
1. Cost Efficiency: Pay-as-you-go model reduces upfront costs.
2. Scalability: Easily scale resources based on demand.
3. Flexibility and Accessibility: Accessible from anywhere with an internet
connection.
4. Resource Utilization: Efficient allocation and utilization of resources.
5. Reliability and Availability: High service reliability and data availability.
6. Automatic Updates: Provider handles maintenance and updates.
7. Security Measures: Robust security protocols and compliance standards.
8. Collaboration and Efficiency: Facilitates collaborative work and enhances
efficiency.
9. Disaster Recovery: Built-in recovery and backup solutions.
10.Innovation and Time-to-Market: Enables rapid deployment and innovation.
11.Environmental Impact: Promotes resource consolidation and sustainability.
12.Global Presence: Operates data centres globally for improved performance.
7. Explain main responsibilities of cloud service provider.
Cloud service providers have two main responsibilities:
1. Infrastructure and Security: They manage the physical and virtual resources
(like servers and storage) and ensure strong security to protect data from
unauthorized access.
2. Reliability and Support: Providers make sure their services are always available,
resolve customer issues, and offer support. They also follow rules and
regulations, provide updates, and have plans for disaster recovery.
8. What do you mean by full virtualization?
Full virtualization means running complete operating systems, including their
kernels, on virtual machines (VMs). This setup allows multiple operating systems to
run independently on a single physical machine, with each VM operating as if it has
its own dedicated hardware. It's like having separate, isolated computers running
on the same physical server. Examples include VMware and Hyper-V.
9. What is SaaS?
SaaS is also known as "On-Demand Software". It is a software distribution model in
which services are hosted by a cloud service provider. These services are available
2|Page
to end-users over the internet so, the end-users do not need to install any software
on their devices to access these services
10. What are the advantages of cloud computing
One can access applications as utilities, over the Internet.
One can manipulate and configure the applications online at any time.
It does not require to install a software to access or manipulate cloud
application.
Cloud Computing offers online development and deployment tools,
programming runtime environment through PaaS model.
Cloud resources are available over the network in a manner that provide
platform independent access to any type of clients.
Cloud Computing offers on-demand self-service. The resources can be used
without interaction with cloud service provider.
Cloud Computing is highly cost effective because it operates at high efficiency
with optimum utilization. It just requires an Internet connection
Cloud Computing offers load balancing that makes it more reliable.
11.What is server virtualization?
Server virtualization is like turning one physical server into multiple virtual servers.
It helps run different operating systems and applications on the same machine,
making things more efficient and saving on resources. It's a way of getting more out
of a single server.
12.What is service-oriented computing?
Service-oriented computing is like using different apps on your phone. Each app
does a specific job, and you can mix and match them to create a personalized
experience. In the same way, in service-oriented computing, we use small,
specialized software parts (services) that work together to create flexible and useful
applications. It's like building with digital building blocks to make things work the
way you want them to.
13.Define a Cloud Computing in a Sentence?
Cloud computing is like renting computer power and services online whenever you
need them, instead of owning and managing your own physical hardware.
14.What are the Three types of Cloud based on deployment?
1. Public Cloud
2. Private Cloud
3. Hybrid Cloud
15.Name the three primary service modal in Cloud computing?
1. Infrastructure as a Service (IaaS)
3|Page
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
16.Give the Example of IAAS , SAAS,PAAS.
1.Infrastructure as a Service (IaaS):
-Example: Amazon Web Services (AWS), Microsoft Azure Virtual Machines.
2.Platform as a Service (PaaS):
-Example: Google App Engine, Microsoft Azure App Services.
3.Software as a Service (SaaS):
-Example: Salesforce, Google Workspace, Microsoft 365.
17.Define Advantages of Cloud computing?
1. Cost Efficiency
2. Scalability and Flexibility
3. Accessibility and Remote Collaboration
4. Automatic Updates and Maintenance
5. Business Continuity and Disaster Recovery
18.List out six Disadvantages of Cloud computing?
1. Security Concerns
2. Downtime and Service Outages
3. Limited Customization and Control
4. Dependency on Internet Connection
5. Costs Over Time
6. Data Transfer and Bandwidth Costs
19.Name three technologies behind cloud computing with their example?
Three technologies behind cloud computing and their examples:
1. Virtualization:
Example: VMware, Microsoft Hyper-V.
2. Containerization:
Example: Docker, Kubernetes.
3. Automation:
Example: Ansible, Puppet.
20.Explain the concept of virtualization?
Virtualization creates virtual versions of computer hardware, operating systems, or
resources, allowing multiple instances to run on a single physical system. This
optimizes resource usage and enhances flexibility in IT infrastructure management.
4|Page
21.List out the task of cloud services management?
◊ Resource Provisioning
◊ Security Management
◊ Performance Optimization
◊ Cost Optimization
◊ Data Governance
◊ Operational Efficiency
22.Differentiate between manage & unmanage cloud storage classes?
1. Managed Cloud Storage:
- What it is: Cloud storage where the provider takes care of all the tech stuff.
- Your Job: You just use it; provider handles backups, security, and
maintenance.
2. Unmanaged Cloud Storage:
- What it is: You're in control; set up, secure, and manage the storage yourself.
- Your Job: You handle backups, security, and other tech details.
23. Explain cloud storage devices.
Cloud storage devices are virtual storage solutions hosted on remote servers. Users
can store and access data over the internet, eliminating the need for physical
storage devices. Data is stored in data centers, providing scalable and accessible
storage, with examples including Google Drive, Dropbox, and Amazon S3.
5|Page
- Role: Helps organizations with guidance on data protection, identity management,
and overall cloud security through education and frameworks.
27.Define OLAP & OLTP in data processing techniques?
1. OLAP (Online Analytical Processing):
- What is it? OLAP is for analysing large volumes of data to gain insights and make
business decisions.
- Use Case: Ideal for tasks like data mining, trend analysis, and strategic planning.
2. OLTP (Online Transaction Processing):
- What is it? OLTP is focused on managing and processing day-to-day transactions
in real-time.
- Use Case: Suited for tasks like order processing, online banking, and inventory
management.
28.Briefly explain the significance of data lake?
• Unified Storage: Data lakes consolidate diverse data types (structured and
unstructured) into a single repository, promoting a unified storage approach.
• Advanced Analytics: They support advanced analytics, machine learning, and
data processing, enabling organizations to derive valuable insights from large and
varied datasets.
• Scalability and Cost-Effectiveness: Data lakes scale horizontally to handle vast
amounts of data, often leveraging cost-effective storage solutions, making them
suitable for organizations with growing or fluctuating data needs
29.What are the phases involve include planning?
1. Assessment and Analysis:
- Understand your current IT setup and business needs.
- Identify which parts of your operations can benefit from the cloud.
2. Cost Analysis and Budgeting:
- Figure out how much moving to the cloud will cost.
- Create a budget that covers all aspects of cloud adoption.
3. Security and Compliance Planning:
- Make a plan to keep your data safe in the cloud.
- Ensure that your chosen cloud provider follows necessary rules and regulations.
6|Page
LONG QUESTIONS
1. Explain in detail or differentiate between public , private & hybrid cloud
based deployment?
Public Cloud
A Public Cloud is Cloud Computing in which the infrastructure and services are
owned and operated by a third-party provider and made available to the public
over the internet. The public can access and use shared resources, such as
servers, storage, and applications and the main thing is you pay for what you
used. . Examples of public cloud providers – are Amazon Web Services (AWS),
Microsoft Azure, and Google Cloud Platform (GCP).
Private Cloud
A Private Cloud is a cloud computing environment in which the infrastructure
and services are owned and operated by a single organization, for example, a
company or government, and it is accessed by only authorized users within that
organization. Private Cloud organizations have their own data center. private
cloud provides a higher level of security. Examples – HPE, Dell, VMware, etc.
Hybrid Cloud
A hybrid cloud is a combination of both public and private cloud environments
that allows organizations to take advantage of the benefits of both types of
clouds. It manages traffic levels during peak usage periods It can provide greater
flexibility, scalability, and cost-effectiveness than using a single cloud
environment. Examples – IBM, DataCore Software, Rackspace, Threat Stack,
Infinidat, etc.
7|Page
2. Explain the three primary services models in cloud computing with
details & example?
Cloud computing is a technology that enables users to access and use computing
resources over the internet. There are three primary service models in cloud
computing, often referred to as the "Cloud Service Models" or "Cloud Computing
Service Models." These models describe the level of abstraction and control that
8|Page
users have over the computing resources. The three primary service models are
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a
Service (SaaS).
9|Page
In summary, IaaS provides virtualized infrastructure, PaaS offers a platform for
application development, and SaaS delivers fully-fledged software applications
over the internet. These cloud service models cater to different levels of abstraction
and control, allowing users to choose the level of management they want over the
computing resources.
3. Describe the strategy ,planning & deployment faces of cloud
computing?
various planning phases that must be practised by an enterprise before migrating
the entire business to cloud. Each of these planning phases are described in the
following diagram:
Strategy Phase
In this phase, we analyze the strategy problems that customer might face. There are
two steps to perform this analysis:
Cloud Computing Value Proposition
Cloud Computing Strategy Planning
Cloud Computing Value Proposition : In this, we analyze the factors influencing
the customers when applying cloud computing mode and target the key
problems they wish to solve. These key factors are:
10 | P a g e
◊ IT management simplification
◊ operation and maintenance cost reduction
◊ business mode innovation
◊ low cost outsourcing hosting
◊ high service quality outsourcing hosting.
All of the above analysis helps in decision making for future development.
IT Architecture Development :
In this step, we identify the applications that support the business processes and
the technologies required to support enterprise applications and data systems.
11 | P a g e
Deployment Phase
This phase focuses on both of the above two phases. It involves the following
two steps:
Selecting Cloud Computing Provider
Maintenance and Technical Service
Selecting Cloud Computing Provider :
This step includes selecting a cloud provider on basis of Service Level Agreement
(SLA), which defines the level of service the provider will meet.
12 | P a g e
4. Storage:
Role: Cloud storage services provide scalable and reliable data storage. They can
be object-based, file-based, or block-based, catering to different types of data
storage requirements.
Example Technologies: Amazon S3, Google Cloud Storage, Azure Blob Storage.
5. Identity and Access Management (IAM): Role: IAM technologies control access
to cloud resources by managing user identities, roles, and permissions. They ensure
secure and authorized interactions with cloud services.
Example Technologies: AWS Identity and Access Management (IAM), Azure
Active Directory, Google Cloud Identity and Access Management.
6. Serverless Computing:
Role: Serverless computing abstracts infrastructure management, allowing
developers to focus on writing code without the need to manage servers. It is
event-driven and automatically scales based on demand.
Example Technologies: AWS Lambda, Azure Functions, Google Cloud Functions.
7. Monitoring and Management:
Role: Monitoring tools track the performance, availability, and health of cloud
resources. Management tools help in configuring and managing cloud services
efficiently.
Example Technologies: AWS CloudWatch, Azure Monitor, Google Cloud
Operations Suite.
8. Security:
Role: Security technologies in cloud computing address concerns related to data
protection, encryption, compliance, and threat detection. They ensure the
confidentiality and integrity of data.
Example Technologies: AWS Key Management Service (KMS), Azure Security
Center, Google Cloud Security Command Center.
These technologies collectively enable the delivery of infrastructure, platform,
and software services in a scalable, flexible, and cost-effective manner in cloud
computing environments.
5. Explain cloud computing architecture in details?
Architecture of Cloud Computing :
Cloud Computing , which is one of the demanding technology of the current
time and which is giving a new shape to every organization by providing on
demand virtualized services/resources. Starting from small to medium and
medium to large, every organization use cloud computing services for storing
information and accessing it from anywhere and any time only with the help of
13 | P a g e
internet. In this article, we will know more about the internal architecture of
cloud computing.
Transparency, scalability, security and intelligent monitoring are some of the
most important constraints which every cloud infrastructure should experience.
Current research on other important constraints is helping cloud computing
system to come up with new features and strategies with a great capability of
providing more advanced cloud solutions.
Cloud Computing Architecture :
The cloud architecture is divided into 2 parts i.e.
Frontend
Backend
The below figure represents an internal architectural view of cloud computing.
14 | P a g e
management and security all these are the components of cloud computing
architecture.
1. Frontend :
Frontend of the cloud architecture refers to the client side of cloud computing
system. Means it contains all the user interfaces and applications which are used
by the client to access the cloud computing services/resources. For example, use
of a web browser to access the cloud platform.
15 | P a g e
Security –
Security in backend refers to implementation of different security mechanisms
in the backend for secure cloud resources, systems, files, and infrastructure to
end-users.
Internet – Internet connection acts as the medium or a bridge between frontend
and backend and establishes the interaction and communication between
frontend and backend.
Database– Database in backend refers to provide database for storing
structured data, such as SQL and NOSQL databases. Example of Databases
services include Amazon RDS, Microsoft Azure SQL database and Google CLoud
SQL.
Networking– Networking in backend services that provide networking
infrastructure for application in the cloud, such as load balancing, DNS and
virtual private networks.
Analytics– Analytics in backend service that provides analytics capabillities for
data in the cloud, such as warehousing, bussness intellegence and machine
learning.
Benefits of Cloud Computing Architecture :
Makes overall cloud computing system simpler.
Improves data processing requirements.
Helps in providing high security.
Makes it more modularized.
Results in better disaster recovery.
Gives good user accessibility.
Reduces IT operating costs.
Provides high level reliability.
Scalability.
6. Explain the task involved in cloud management with their roles?
Cloud Management in Cloud Computing:
Cloud Management in Cloud computing is maintaining and controlling the cloud
services and resources be it public, private or hybrid. Some of its aspects include
load balancing, performance, storage, backups, capacity, deployment etc. To do so
a cloud managing personnel needs full access to all the functionality of resources in
the cloud. Different software products and technologies are combined to provide a
cohesive cloud management strategy and process.
16 | P a g e
As we know Private cloud infrastructure is operated only for a single organization,
so that can be managed by the organization or by a third party. Public cloud services
are delivered over a network that is open and available for public use. In this model,
the IT infrastructure is owned by a private company and members of the public can
purchase or lease data storage or computing capacity as needed. Hybrid cloud
environments are a combination of public and private cloud services from different
providers. Most organizations store data on private cloud servers for privacy
concerns, while leveraging public cloud applications at a lower price point for less
sensitive information. The combination of both the public and private cloud are
known as Hybrid cloud servers.
Need of Cloud Management :
Cloud is nowadays preferred by huge organizations as their primary data storage.
A small downtime or an error can cause a great deal of loss and inconvenience for
the organizations. So as to design, handle and maintain a cloud computing service
specific members are responsible who make sure things work out as supposed and
all arising issues are addressed.
Cloud Management Platform :
A cloud management platform is a software solution that has a robust and
extensive set of APIs that allow it to pull data from every corner of the IT
infrastructure. A CMP allows an IT organization to establish a structured approach
to security and IT governance that can be implemented across the organization’s
entire cloud environment.
Cloud Management Tasks :
The below figure represents different cloud management tasks :
17 | P a g e
Auditing System Backups –
It is required to audit the backups from time to time to ensure restoration of
randomly selected files of different users. This might be done by the
organization or by the cloud provider.
Flow of data in the system –
The managers are responsible for designing a data flow diagram that shows how
the data is supposed to flow throughout the organization.
Vendor Lock-In –
The managers should know how to move their data from a server to another in
case the organization decides to switch providers.
Knowing provider’s security procedures –
The managers should know the security plans of the provider, especially
Multitenant use, E-commerce processing, Employee screening and Encryption
policy.
Monitoring the Capacity, Planning and Scaling abilities –
The manager should know if their current cloud provider is going to meet their
organization’s demand in the future and also their scaling capabilities.
Monitoring audit log –
In order to identify errors in the system, logs are audited by the managers on a
regular basis.
Solution Testing and Validation –
It is necessary to test the cloud services and verify the results and for error-free
solutions.
18 | P a g e
Does not impose a file system and allows the operating system to manage the
data on the blocks.
File Storage:
Organizes data into files and folders.
Provides a file system that manages metadata and facilitates easy organization
and retrieval of data.
2. Use Cases:
Block Storage:
Ideal for applications and scenarios that require direct, low-level access to data,
such as databases and virtual machines.
Well-suited for scenarios where performance and random access are critical.
File Storage:
Suited for shared file systems, collaboration, and situations where multiple users
or systems need access to the same data concurrently.
Commonly used for file servers, document management, and network-attached
storage (NAS).
3. Access Method:
Block Storage:
Accessed at the block level, requiring a file system to organize and manage data.
Provides low-level, direct access to data, allowing for more control over storage
configurations.
File Storage:
Accessed using network protocols such as NFS (Network File System) or SMB
(Server Message Block).
Allows for hierarchical file organization and provides a file system for data
access.
4. Scalability:
Block Storage:
Scales well for applications that require high-performance and can benefit from
adding more raw storage.
Suitable for scenarios where storage needs are anticipated to grow at the block
level.
File Storage:
Scales well for scenarios with large amounts of unstructured data that can
benefit from a file-based organizational structure.
Allows for the addition of files and directories without the need to manage
individual blocks.
19 | P a g e
5. Performance:
Block Storage:
Typically provides higher performance for applications that require low-latency
access to data.
Well-suited for scenarios where input/output operations per second (IOPS) are
crucial.
File Storage:
While still providing good performance, may not match the raw speed of block
storage.
Suitable for applications with moderate performance requirements.
6. Flexibility:
Block Storage:
Offers more flexibility in terms of configuring file systems and managing data at
a lower level.
File Storage:
Provides a more straightforward and user-friendly approach to organizing and
accessing data through a hierarchical file system.
7. Examples in Cloud Services:
Block Storage:
Amazon Elastic Block Store (EBS), Azure Managed Disks, Google Cloud Persistent
Disks.
File Storage:
Amazon Elastic File System (EFS), Azure File Storage, Google Cloud Filestore.
8. Describe the various type of hardware virtualization in cloud
environment?
Hardware virtualization in a cloud environment involves the abstraction of physical
hardware resources to create multiple virtual instances, allowing better utilization
of the underlying infrastructure. There are two primary types of hardware
virtualization: full virtualization and para-virtualization. Additionally, there is a
concept called hardware-assisted virtualization that enhances the performance of
virtualization solutions. Here's a description of each type:
1. Full Virtualization:
- Description:
In full virtualization, a hypervisor (also known as Virtual Machine Monitor - VMM)
emulates the entire hardware environment, creating virtual machines that behave
as if they are running on physical hardware.
20 | P a g e
- Characteristics:
Guest operating systems are not aware that they are running in a virtualized
environment.
Allows running unmodified operating systems as virtual machines.
Provides better compatibility with a wide range of operating systems.
- Example Technologies:
- VMware ESXi, Microsoft Hyper-V, KVM with QEMU.
2. Para-virtualization:
- Description: Para-virtualization involves modifying the guest operating system to
be aware of the virtualization layer. This collaboration between the guest and the
hypervisor improves performance by allowing more efficient communication
between them.
- Characteristics:
Requires modifications to the guest operating system kernel.
Enhances performance by avoiding certain overhead associated with full
virtualization.
Provides better performance but may require changes to the guest OS.
- Example Technologies:
- Xen (XenServer), Virtuozzo, Microsoft Hyper-V with Linux Integration Services.
3. Hardware-Assisted Virtualization:
- Description: Hardware-assisted virtualization utilizes specific features built into
modern CPUs to enhance the performance of virtualization. These features, such as
Intel VT (Virtualization Technology) or AMD-V, allow the hypervisor to offload
certain tasks to the hardware, reducing overhead and improving efficiency.
- Characteristics:
Accelerates virtualization by providing hardware-level support.
Allows the hypervisor to directly execute virtual machine instructions
without significant software emulation.
Enhances overall virtualization performance.
- Example Technologies:
- VMware VT-x (for Intel processors), AMD-V (for AMD processors), Microsoft
Hyper-V using hardware-assisted virtualization.
These types of hardware virtualization are often used in conjunction with other
technologies such as containerization for more efficient resource utilization and
isolation.
21 | P a g e
The choice between full virtualization and para-virtualization depends on factors
like performance requirements, compatibility with the guest operating systems,
and the level of control desired over the virtualized environment. Hardware-
assisted virtualization is widely adopted to achieve better performance across
various virtualization solutions.
9. Evaluate the role of cloud security alliance & it’s impacts on cloud
security?
The Cloud Security Alliance (CSA) is a non-profit organization dedicated to
promoting best practices and research in cloud computing security. It plays a
significant role in shaping the landscape of cloud security by providing guidance,
education, and resources for both industry professionals and organizations. The
impact of the Cloud Security Alliance on cloud security is substantial, and here are
several key aspects:
1. Guidance and Best Practices:
◊ Role: The CSA develops and publishes frameworks, guidelines, and best
practices for securing various aspects of cloud computing, including
infrastructure, data, applications, and more.
◊ Impact: Organizations can leverage CSA's guidance to establish robust security
policies, implement controls, and adhere to industry-recognized standards. This,
in turn, helps enhance the overall security posture of cloud deployments.
22 | P a g e
4. Collaboration and Networking:
◊ Role: CSA facilitates collaboration among industry stakeholders, including
enterprises, security professionals, cloud service providers, and regulators,
through events, working groups, and initiatives.
◊ Impact: The collaborative efforts foster a community-driven approach to
addressing security challenges. Sharing insights and experiences allows
organizations to learn from one another and collectively enhance the security of
cloud environments.
5. Security Consensus Assessments:
◊ Role: CSA develops and maintains the Cloud Controls Matrix (CCM) and the
Consensus Assessments Initiative Questionnaire (CAIQ), which provide
frameworks for assessing and documenting security controls in cloud
environments.
◊ Impact: These assessments help organizations evaluate the security practices of
cloud service providers, make informed decisions when selecting providers, and
establish a common understanding of security expectations.
7. Global Reach:
◊ Role: CSA operates globally, with chapters and partnerships around the world,
addressing regional and international aspects of cloud security.
◊ Impact: The global presence of CSA ensures that its guidance and initiatives have
a broad impact, addressing diverse needs and challenges faced by organizations
operating in different regions.
the Cloud Security Alliance plays a crucial role in advancing the state of cloud
security through guidance, research, education, collaboration, and advocacy. Its
impact is evident in the adoption of best practices, the development of a skilled
workforce, and the establishment of a more secure and trustworthy cloud
computing environment.
23 | P a g e
10. Illustrate the significance of various cloud applications in business &
data storage?
Certainly! The significance of various cloud applications in business and data
storage is substantial, bringing about transformative changes and advantages for
organizations. Here's an illustration of their significance:
Significance of Cloud Applications in Business:
1. Cost-Efficiency:
◊ Illustration: Cloud applications, delivered as Software as a Service (SaaS),
eliminate the need for businesses to invest heavily in infrastructure and
software licenses. They follow a subscription-based model, reducing upfront
costs.
◊ Impact: This cost-efficiency enables businesses, especially small and medium
enterprises (SMEs), to access advanced software without the financial burden
of traditional software acquisition.
2. Scalability:
◊ Illustration: Cloud applications can scale easily to accommodate growing user
bases or increased workloads. Organizations can adjust their usage and costs
according to their needs.
◊ Impact: Scalability ensures that businesses can adapt quickly to changes in
demand, supporting growth without the need for major infrastructure changes.
24 | P a g e
5. Flexibility and Mobile Workforce:
◊ Illustration: Cloud applications support a mobile workforce by allowing users to
access tools and data from various devices. This flexibility enhances remote
work capabilities.
◊ Impact: Organizations can attract and retain top talent by offering flexibility.
Employees can work from anywhere, contributing to improved work-life
balance and job satisfaction.
Significance of Cloud Data Storage in Business:
1. Cost-Effective Storage Solutions:
◊ Illustration: Cloud data storage offers a pay-as-you-go model, eliminating the
need for upfront capital investment in physical storage infrastructure.
◊ Impact: Businesses can manage costs effectively by paying only for the storage
capacity they use. This is particularly beneficial for data with fluctuating storage
requirements.
25 | P a g e
◊ Impact: Enhanced data security and compliance measures build trust with
customers, partners, and regulatory bodies, addressing concerns related to data
protection and privacy.
In today's world, everybody has smartphones and uses the internet. Everyone uses
various social media platforms, which generate extensive data. It is unstructured,
structured, or semi-structured data, such as images, text, videos, etc.
Big data is categorized with the concept of 5V's, which are volume, velocity and
variety, veracity, and value.
Volume: It is the amount of data that is generated and collected on a daily basis,
which ranges from terabytes to petabytes of data.
26 | P a g e
Veracity: It means the accuracy and reliability of the data for drawing
conclusions.
Value: It refers to the insights from the data that can be used to make more
profitable decisions to benefit businesses.
Big data delivers both challenges and chances for businesses and organizations. On
the one hand, storing, processing, and analyzing big data using traditional analysis
tools is tough and costly. On the other hand, big data can deliver useful insights into
supporting businesses to grow by making better decisions. There are many
businesses and organizations these days that are investing in big data analytics
tools to handle big data.
Traditional Data Big Data
It is usually a small amount of data that can It is usually a big amount of data that cannot
be collected and analyzed using traditional be processed and analyzed easily using
methods easily. traditional methods.
It usually comes from internal systems. It comes from various sources such as mobile
devices, social media, etc.
It consists of data such as customer It consists of data such as images, videos, etc.
information, financial transactions, etc.
Analysis of traditional data can be done Analysis of big data needs advanced analytics
with the use of primary statistical methods. methods such as machine learning, data
mining, etc.
Traditional methods to analyze data are Methods to analyze big data are fast and
slow and gradual. instant.
27 | P a g e
It is limited in its value and insights. It provides valuable insights and patterns for
good decision-making.
It is used for simple and small business It is used for complex and big business
processes. processes.
It is easy to secure and protect than big data It is harder to secure and protect than
because of its small size and simplicity. traditional data because of its size and
complexity.
It requires less time and money to store It requires more time and money to store big
traditional data. data.
It is less efficient than big data. It is more efficient than traditional data.
28 | P a g e
Besides this, a transactional database doesn’t offer itself to analytics. To effectively
perform analytics, an organization keeps a central Data Warehouse to closely study
its business by organizing, understanding, and using its historical data for making
strategic decisions and analyzing trends.
Benefits of Data Warehouse
Better business analytics: Data warehouse plays an important role in every
business to store and analysis of all the past data and records of the company.
which can further increase the understanding or analysis of data for the
company.
Faster Queries: The data warehouse is designed to handle large queries that’s
why it runs queries faster than the database.
Improved data Quality: In the data warehouse the data you gathered from
different sources is being stored and analyzed it does not interfere with or add
data by itself so your quality of data is maintained and if you get any issue
regarding data quality then the data warehouse team will solve this.
Historical Insight: The warehouse stores all your historical data which contains
details about the business so that one can analyze it at any time and extract
insights from it.
29 | P a g e
OLAP services provide a multidimensional view of data, which helps in applying
operations on data in various ways.
OLTP Examples
An example considered for OLTP System is ATM Center a person who
authenticates first will receive the amount first and the condition is that the
amount to be withdrawn must be present in the ATM. The uses of the OLTP System
are described below.
30 | P a g e
OLTP Services provide Data Integrity, Consistency, and High Availability to the
data.
1. Storage Layer:
Object Storage: Data Lakes often use scalable object storage systems, such
as Amazon S3, Azure Blob Storage, or Google Cloud Storage, to store vast
amounts of raw data in its native format.
Schema on Read: Unlike traditional databases, a Data Lake follows a "schema
on read" approach, allowing users to apply the schema when the data is
accessed or processed.
2. Ingestion Layer:
Batch and Real-time Ingestion: Data can be ingested into the Data Lake in
batches or in real-time, depending on the source and requirements.
Data Catalog: Metadata and indexing tools help catalog and organize data,
providing a searchable inventory of available datasets.
3. Processing Layer:
Big Data Processing Frameworks: Distributed processing frameworks such
as Apache Spark, Apache Flink, and Apache Hadoop are used for scalable data
processing.
31 | P a g e
Data Orchestration: Tools like Apache Airflow or Apache NiFi are employed
for orchestrating data workflows and pipelines.
5. Metadata Management:
Metadata Store: A metadata store maintains information about the various
datasets, their structures, and the relationships between them.
Catalog Services: Catalog services provide a unified view of metadata, aiding
in data discovery and understanding.
32 | P a g e
3. Cost-Effectiveness:
◊ Illustration: Cloud-based Data Lakes leverage cost-effective object storage,
allowing organizations to pay for the storage and processing resources they use.
◊ Impact: This cost-effective model is particularly beneficial for organizations with
varying data storage and processing needs.
4. Advanced Analytics:
◊ Illustration: Data Lakes support advanced analytics, machine learning, and
artificial intelligence applications by providing a centralized repository for
diverse datasets.
◊ Impact: Organizations can derive valuable insights from large datasets,
enabling data-driven decision-making and innovation.
5. Data Democratization:
- Illustration: Data Lakes promote data democratization by providing a central
repository accessible to various stakeholders across the organization.
- Impact: This accessibility empowers users with diverse skill sets to explore
and analyze data, fostering a culture of data-driven decision-making.
Data Warehousing:
Schema Rigidity: Requires a predefined schema (schema-on-write) before
data is ingested.
Curated Data Storage: Stores curated and processed data, optimized for
specific analytical queries.
Structured Processing: Suitable for structured and relational data processing.
33 | P a g e
Data Lake provides a scalable and flexible solution for storing and processing
diverse data types, enabling organizations to derive valuable insights and
support advanced analytics.
Many organizations adopt a hybrid approach, leveraging both Data Lakes and
Data Warehouses to meet different data processing and analysis requirements.
Each virtual machine runs on its own operating system and functions like a
completely separate machine—even though it’s sharing the resources of one
physical computer. This is the key feature of virtualization: a single physical
machine running multiple tasks simultaneously on different virtual machines,
instead of several computers each running a single task.
Benefits of Virtualization :
As a business owner, you need to stay ahead of the curve—and this often means
making the most of the technology you have on hand. This is where
virtualization can be a game-changer, offering several benefits that can
transform the way your business operates and grows.
34 | P a g e
Cost Savings
With virtualization, you can maximize the use of your existing hardware, and
reduce the need for additional physical machines or servers. You won’t just save
on your hardware costs, either: Because you’ll need less hardware, you’ll save
on costs associated with the operation, cooling and maintenance of your
hardware.
Efficiency
Instead of using several separate servers to run different applications, you can
run multiple applications on different virtual machines all housed on the same
physical server. This leads to a reduction in IT management tasks, better
utilization of existing resources and improved efficiency overall.
Reduced Maintenance
Because your multiple virtual machines can be managed through a single
console, IT management and maintenance is no longer as complex—freeing up
your IT team’s time to focus on more productive, strategic tasks instead of
updates and ongoing maintenance.
Disaster Recovery
Virtualization enhances business continuity and makes disaster recovery easier:
Virtual machines are easy to replicate and move to a different server should your
hardware fail. You can also quickly create backups of virtual machines—
essentially, snapshots in time you can easily go back to if necessary.
35 | P a g e
15. Write the disadvantages of virtualization.
Disadvantages of virtualization
Numerous complex dimensions that digital technology had to explore have been
resolved through virtualization.
2. Restraints
Virtualization is hampered by a number of issues. Virtualization cannot be used
with every server and application currently in existence. Therefore, certain
firms' IT infrastructures would not be able to support the virtualized solutions.
They no longer receive support from a number of vendors as well. The demands
of both individuals and organisations must be served using a hybrid approach.
4. Time-intensive
In comparison to local systems, virtualization takes less time to implement, but
it ultimately costs users time. This is due to the fact that there are additional
procedures that need to be completed in order to attain the desired result.
36 | P a g e
5. Threats to security
Information is our current currency. Having money allows you to make money.
Without it, people will forget about you. The success of a corporation depends
on information, hence it is frequently targeted.
37 | P a g e
maintaining isolation. Each user's applications and data run in separate virtual
environments, ensuring security and privacy.
38 | P a g e
10. Simplified Management: Virtualization abstracts the underlying hardware
complexity, making it easier to manage and administer the infrastructure. Cloud
providers can centrally manage and monitor virtualized resources, providing a
streamlined approach to infrastructure management.
39 | P a g e
Customization: Tailored to meet the specific needs and requirements of
the organization.
Costs: May have higher upfront costs but offers greater control over
ongoing expenses.
- Examples: VMware Cloud Foundation, OpenStack (often used to build
private clouds), and some enterprise data centers.
3. Hybrid Cloud:
- Description: A hybrid cloud deployment model combines elements of both
public and private clouds, allowing data and applications to be shared between
them. It provides greater flexibility and optimization of workloads by enabling
data and applications to move between the private and public environments.
- Characteristics:
Flexibility: Enables workload portability and flexibility in choosing where
to run applications based on requirements.
Data Integration: Allows organizations to integrate on-premises data
centers with public cloud resources.
Scalability: Offers the ability to scale workloads in the public cloud while
maintaining sensitive data on-premises.
- Examples: Microsoft Azure with Azure Hybrid Cloud, AWS Outposts, Google
Anthos.
4. Community Cloud:
- Description: A community cloud is shared by several organizations with
common computing concerns, such as regulatory requirements, industry
standards, or security policies. It is a collaborative effort where a cloud
infrastructure is designed for and used by a specific community of users.
- Characteristics:
Shared Interests: Designed to meet the specific needs of a community
with shared interests or requirements.
Collaboration: Enables collaboration between organizations within the
community while maintaining specific regulatory or compliance
standards.
Cost Sharing: Participants share the costs of the community cloud
infrastructure.
- Examples: Government community clouds, healthcare community clouds,
or financial services community clouds.
40 | P a g e
These cloud deployment models provide organizations with the flexibility to
choose the approach that best aligns with their requirements, whether it's
optimizing costs, ensuring security and compliance, or achieving a balance
between on-premises and public cloud resources.
18. Explain SOA in details?
Service-Oriented Architecture :
Service-Oriented Architecture (SOA) is a stage in the evolution of application
development and/or integration. It defines a way to make software components
reusable using the interfaces.
41 | P a g e
deployment.
There are two major roles within Service-oriented Architecture:
Service provider: The service provider is the maintainer of the service and the
organization that makes available one or more services for others to use. To
advertise services, the provider can publish them in a registry, together with a
service contract that specifies the nature of the service, how to use it, the
requirements for the service, and the fees charged.
Service consumer: The service consumer can locate the service metadata in the
registry and develop the required client components to bind and use the service.
Services might aggregate information and data retrieved from other services or
create workflows of services to satisfy the request of a given service consumer. This
practice is known as service orchestration Another important interaction pattern is
service choreography, which is the coordinated interaction of services without a
single point of control.
Components of SOA:
42 | P a g e
Guiding Principles of SOA:
Advantages of SOA:
Service reusability: In SOA, applications are made from existing services. Thus,
services can be reused to make many applications.
Easy maintenance: As services are independent of each other they can be updated
and modified easily without affecting other services.
Platform independent: SOA allows making a complex application by combining
services picked from different sources, independent of the platform.
Availability: SOA facilities are easily available to anyone on request.
Reliability: SOA applications are more reliable because it is easy to debug small
services rather than huge codes
Scalability: Services can run on different servers within an environment, this
increases scalability
43 | P a g e
Disadvantages of SOA:
44 | P a g e
Characteristics of Utility Computing:
1. On-Demand Self-Service:
- Users can provision computing resources, such as virtual machines, storage,
or applications, without requiring human intervention from the service provider.
2. Resource Pooling:
- Resources are pooled together to serve multiple users, allowing for more
efficient use of infrastructure. Users typically share the same underlying
hardware and benefit from economies of scale.
4. Rapid Elasticity:
- Resources can be quickly scaled up or down based on demand. This elasticity
ensures that users can dynamically adjust their computing capacity to handle
varying workloads.
5. Measured Service:
- Resource usage is monitored, controlled, and reported, allowing for
transparent and accountable billing. Users are charged based on the actual
consumption of resources.
45 | P a g e
It includes tools and services for application development and deployment.
Examples include Google App Engine, Microsoft Azure App Service, and Heroku.
1. Cost-Efficiency:
- Users only pay for the resources they consume, leading to cost savings. There
are no upfront infrastructure costs, and organizations can avoid
overprovisioning by scaling resources based on actual demand.
2. Scalability:
- Utility computing allows for seamless scalability, enabling users to scale their
computing resources up or down quickly to meet changing requirements.
3. Flexibility:
- Users have the flexibility to choose the type and amount of resources they
need. This adaptability is particularly beneficial for businesses with fluctuating
workloads.
46 | P a g e
7. Innovation and Rapid Deployment:
- Users can quickly deploy and experiment with new applications and services
without the need for significant upfront investments. This fosters innovation
and agility.
1. Hardware:
Data Centers: Large-scale data centers house the physical hardware,
including servers, storage devices, and networking equipment, to support
cloud services.
Servers: These are the computing machines that run virtualization software
to host multiple virtual machines (VMs) or containers.
Storage Devices: Disk arrays and storage servers provide scalable and
redundant storage for data and applications.
Networking Equipment: Routers, switches, and other networking
components enable communication between different components within
the data center and across the internet.
2. Software:
Hypervisor (Virtual Machine Monitor): Software that allows multiple virtual
machines to run on a single physical server, enabling server virtualization.
Operating Systems: Cloud providers use operating systems that support
virtualization and efficiently manage resources within virtual machines.
Container Orchestration: Tools like Kubernetes manage the deployment,
scaling, and operation of application containers, enhancing flexibility and
efficiency.
47 | P a g e
3. Networking:
Load Balancers: Distribute incoming network traffic across multiple servers
to ensure optimal resource utilization and reliability.
Content Delivery Networks (CDNs): Improve the delivery speed of web
content by caching it in multiple geographically distributed locations.
Virtual Private Cloud (VPC): Provides isolated network environments for
cloud resources, allowing users to define their network configurations.
4. Storage Services:
Object Storage: Scalable and durable storage for unstructured data, often
accessed through APIs (e.g., Amazon S3).
Block Storage: Provides storage volumes that can be attached to virtual
machines for data persistence.
File Storage: Network-attached storage solutions for sharing files between
multiple virtual machines.
5. Management Tools:
Cloud Management Platforms (CMPs): Tools that provide a unified interface
for managing and monitoring resources across multiple cloud services.
Monitoring and Logging Tools: Services that track and log performance
metrics, errors, and activities within the cloud environment.
6. Security:
Identity and Access Management (IAM): Controls user access and
permissions within the cloud environment.
Firewalls and Security Groups: Network security features that control traffic
and protect resources from unauthorized access.
Encryption: Ensures data privacy and security by encrypting data during
transmission and storage.
1. On-Demand Self-Service:
- Users should be able to provision and manage computing resources as
needed without requiring human intervention.
48 | P a g e
2. Broad Network Access:
- Services and resources should be accessible over the network from various
devices with standard internet protocols.
3. Resource Pooling:
- Computing resources are shared among multiple users, allowing for efficient
utilization and optimization of resources.
4. Rapid Elasticity:
- Cloud resources should be quickly and elastically scaled up or down to meet
demand, ensuring flexibility and responsiveness.
5. Measured Service:
- Usage of cloud resources should be monitored, controlled, and metered,
allowing for transparent and accountable billing.
Additional Considerations:
1. Scalability:
- Cloud services should be designed to handle varying workloads by scaling
resources horizontally or vertically.
2. Interoperability:
- Cloud services and platforms should be interoperable, allowing users to
integrate and use services from multiple providers
3. Portability:
- Applications and data should be easily portable between different cloud
providers and environments.
49 | P a g e
Understanding these infrastructure components and constraints is essential for
effectively leveraging cloud computing services and designing applications that
take full advantage of the benefits offered by cloud environments.
----------------------------------------------------------------------------------------------------------------------------
50 | P a g e