Untitled

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following strategies is most effective in mitigating flood-related risks to data centers?

  • Relying solely on data backups and recovery plans.
  • Implementing stricter access control measures.
  • Increasing the physical security around the data center perimeter.
  • Establishing the data center outside of flood-prone areas. (correct)

Identity as a Service (IDaaS) based single sign-on can help mitigate data damage from terminated employees by promptly removing their access privileges.

True (A)

What is a primary advantage of using cloud services in the event of a desktop failure, compared to traditional desktop setups?

easy data recovery/access

To quickly replace a failed server, enterprises traditionally keep ________ servers.

<p>redundant</p> Signup and view all the answers

Match the threat with the corresponding mitigation strategy:

<p>Lost Laptop = Data Synchronization via Cloud Desktop Failure = Desktop as a Service Server Failure = Redundant Servers Flood = Choosing non-flood zone location</p> Signup and view all the answers

What is the primary advantage of blade servers over traditional servers in the context of server failure?

<p>Replacement of blade servers is a relatively simple process. (D)</p> Signup and view all the answers

Strong passwords alone are sufficient to protect sensitive data on a lost device from experienced hackers.

<p>False (B)</p> Signup and view all the answers

How does using a Cloud service help in situations where a laptop is lost or stolen, concerning data recovery?

<p>data synchronization</p> Signup and view all the answers

Which factor most significantly impacts the unpredictability of latency in cloud computing?

<p>Internet-based communication variability (A)</p> Signup and view all the answers

Hosting safety-critical processing controls for avionics on a cloud infrastructure is generally recommended due to enhanced reliability.

<p>False (B)</p> Signup and view all the answers

What specific type of application requires predictably high performance, making it potentially unsuitable for cloud computing?

<p>real time applications</p> Signup and view all the answers

A major challenge when updating data offline in cloud computing environments is ensuring proper data ______ across all copies.

<p>synchronization</p> Signup and view all the answers

Which of the following is NOT a mentioned factor affecting cloud reliability?

<p>Geographic location of data centers (D)</p> Signup and view all the answers

Cloud computing eliminates all economic risks for consumers by moving to a pay-as-you-go model.

<p>False (B)</p> Signup and view all the answers

Besides version control and group collaboration, what other mechanism is crucial for handling offline data updates in the cloud?

<p>synchronization capabilities</p> Signup and view all the answers

Match the following cloud computing issues with their primary challenge:

<p>Latency = Unpredictable round-trip times Offline Data Synchronization = Maintaining consistency across data copies Scalable Programming = Adapting legacy applications Safety-Critical Processing = Risk to human life and property</p> Signup and view all the answers

What is a primary reason Cloud consumers need redundant internet connections or backup devices?

<p>To ensure connectivity to Cloud IT resources, mitigating network failures. (D)</p> Signup and view all the answers

Cloud-based storage and database systems primarily use backups, rather than replication, to minimize downtime.

<p>False (B)</p> Signup and view all the answers

What is the main advantage of cloud-based phone systems over traditional systems in the event of a failure?

<p>reliable and failure safe telephone service</p> Signup and view all the answers

Enterprises use ____________ Internet connections from different providers to avoid network failure.

<p>redundant</p> Signup and view all the answers

Match each failure type with its typical mitigation strategy:

<p>Network Failure = Redundant internet connections or wireless hotspots Database System Failure = Database replication with failover systems Phone System Failure = Cloud-based phone systems with built-in redundancy</p> Signup and view all the answers

Why is it important for IT staff to classify risks according to their business impact?

<p>To allow investment in risk-reduction mechanisms to be appropriately limited. (D)</p> Signup and view all the answers

Implementing resource redundancy and backups always eliminates all risks to a company's IT infrastructure.

<p>False (B)</p> Signup and view all the answers

Besides using mobile phones, what is the impact of phone system failure on customers?

<p>customers are left unaware of the phone number to connect to the company</p> Signup and view all the answers

What is the primary reason for a company to use a planned schedule for Cloud migration?

<p>To allow sufficient time for training and post-deployment application testing. (B)</p> Signup and view all the answers

The cost of software licenses is not a factor when calculating the total cost of ownership (TCO) of a Cloud-based solution.

<p>False (B)</p> Signup and view all the answers

Name three IT governance requirements that are important when migrating to a Cloud solution.

<p>Align Cloud solution with business strategy, identify needed controls, describe access control policies.</p> Signup and view all the answers

Before designing a Cloud application, it is important to identify both functional and __________ requirements.

<p>non-functional</p> Signup and view all the answers

Which of the following is an example of a functional requirement?

<p>The system should process payments. (A)</p> Signup and view all the answers

Why is it important for a consumer to discuss regulatory requirements regarding data privacy with a Cloud provider?

<p>To ensure these requirements are part of the legal Cloud agreement. (C)</p> Signup and view all the answers

Beta releases are not helpful for testing cloud based application.

<p>False (B)</p> Signup and view all the answers

Match each IT resource requirement with its description:

<p>RAM usage = Amount of memory the application needs to run efficiently. Bandwidth consumption = Rate at which the application transfers data over a network. Disk storage = Amount of space needed to store application data and files. Average simultaneous users = Number of users accessing the application at the same time.</p> Signup and view all the answers

Which of the following strategies primarily contributes to enhancing the portability of a cloud solution?

<p>Prioritizing the use of generic or open-source APIs and programming environments. (A)</p> Signup and view all the answers

Implementing an inexpensive cloud solution during initial deployment guarantees cost-effectiveness in the long run.

<p>False (B)</p> Signup and view all the answers

Besides disaster recovery, what other types of events should a cloud solution be designed to recover from?

<p>user error, programming bugs, power outage</p> Signup and view all the answers

To ensure continuous operation despite errors, a cloud solution should focus on its ______.

<p>robustness</p> Signup and view all the answers

Match the following cloud solution design metrics with their corresponding descriptions:

<p>Performance = Optimizing speed by reducing graphics, network operations, and using caching. Privacy = Ensuring data protection against unauthorized internal and external access. Reliability = Considering hardware failure events and using redundant configurations. Usability = Improving design through user reviews and prototypes.</p> Signup and view all the answers

Which Cloud solution design metric involves a consideration for hardware failure events?

<p>Reliability (D)</p> Signup and view all the answers

Response time of a cloud solution is not a critical factor for online form submissions and reports.

<p>False (B)</p> Signup and view all the answers

What should developers developing cloud solutions take into account?

<p>Cloud based security and privacy issues. (C)</p> Signup and view all the answers

Which of the following scenarios best describes 'scaling in' within a cloud computing environment?

<p>Releasing unused server instances to reduce operational costs. (C)</p> Signup and view all the answers

A cloud application should always be designed for unlimited scaling to accommodate any future increases in workload.

<p>False (B)</p> Signup and view all the answers

What is the primary purpose of a load balancer in a horizontally scaled cloud application?

<p>To distribute workload evenly across multiple cloud resources.</p> Signup and view all the answers

In the context of database operations, __________ operations are generally more suitable for horizontal scaling due to their non-conflicting nature.

<p>read</p> Signup and view all the answers

Match the scaling type with its corresponding action in a cloud environment:

<p>Scaling Up = Upgrading resources Scaling Down = Releasing resources Scaling Out = Acquiring resources Scaling In = Releasing unused resources</p> Signup and view all the answers

When analyzing database operations for scalability, what is a key consideration regarding write operations?

<p>Write operations require synchronization across database instances, potentially increasing time consumption. (D)</p> Signup and view all the answers

Why is it important to evaluate a system's data logging requirements in the context of cloud application scalability?

<p>To prevent excessive disk space and CPU consumption by logging operations. (B)</p> Signup and view all the answers

Capacity planning and scalability are essentially the same concept in cloud computing.

<p>False (B)</p> Signup and view all the answers

Flashcards

Flood Mitigation

Mitigate flood damage by avoiding data center setup in flood zones and choosing Cloud providers outside such zones.

IDaaS for Access Control

Using Identity as a Service (IDaaS) based single sign-on helps promptly remove access privileges of terminated employees in the cloud.

Lost Equipment Risks

Losing a laptop can lead to data loss and potential identity theft, especially if the stored data is confidential.

Cloud Data Synchronization

Cloud services allow data to be synchronized across multiple devices, so users can retrieve data from other devices or online interfaces.

Signup and view all the flashcards

Traditional Desktop Failure

In a traditional setup, a desktop failure causes downtime until the computer is replaced and data is restored from a backup.

Signup and view all the flashcards

Cloud-Based Desktop Recovery

In cloud computing, employees can resume work on another computer by logging into their Cloud service after a desktop failure.

Signup and view all the flashcards

Redundant Servers

Enterprises keep redundant servers to quickly replace a failed server and maintain uptime.

Signup and view all the flashcards

Blade Server Replacement

Replacing blade servers is a relatively simple process if a replacement server is in stock.

Signup and view all the flashcards

Cloud Limitations

Cloud is not a universal IT solution, nor suitable for all applications due to potential issues.

Signup and view all the flashcards

Cloud Latency

Unpredictable delay in Internet-based communication, affecting real-time applications in the Cloud.

Signup and view all the flashcards

Offline Data Synchronization

The challenge of updating all data copies in the cloud after offline changes, requiring version control.

Signup and view all the flashcards

Scalable Programming

Need to update legacy applications to fully utilize the scalable computing capacity of the Cloud.

Signup and view all the flashcards

Data Storage Management

Consumers need to control data lifecycle and be informed of unauthorized data access in the Cloud.

Signup and view all the flashcards

Cloud Reliability

Probability of a system offering failure-free service for a specified period in a specified environment.

Signup and view all the flashcards

Network Dependence

Internet unreliability and attacks can negatively affect Cloud reliability.

Signup and view all the flashcards

Safety-Critical Processing

Critical applications controlling sensitive hardware (avionics, medical devices for example) are not suitable for the cloud.

Signup and view all the flashcards

Cloud Uptime

Redundancy and failover systems ensure high availability.

Signup and view all the flashcards

Redundant Connections

Cloud consumers need backup internet connections.

Signup and view all the flashcards

Database Backup

Causes downtime of database system.

Signup and view all the flashcards

Database Replication

Database instances help minimize downtime.

Signup and view all the flashcards

Cloud Based Phone Systems

Cloud phone systems offers reliable service.

Signup and view all the flashcards

Risk Classification

IT should assess risks based on impact.

Signup and view all the flashcards

Cost of Reducing Risks

Cost should be considered when reducing risks.

Signup and view all the flashcards

Risk Reduction

Reduces risks, resource redundancy and backups.

Signup and view all the flashcards

Data Compliance in Cloud Agreements

The consumer's responsibilities regarding data privacy, storage, and access under regulatory requirements.

Signup and view all the flashcards

Cloud Application IT Resource Needs

Periods with high and low resource use, number of users, storage, database needs, RAM, bandwidth, and caching.

Signup and view all the flashcards

Cloud Migration Schedule

A planned timeframe for moving to the Cloud, including training and testing after deployment.

Signup and view all the flashcards

Cloud Beta-Release

Using a pre-release version of the Cloud app for internal feedback and testing by employees.

Signup and view all the flashcards

Key Budget Factors for Cloud Migration

Running costs, IT staff salaries, software licenses, and hardware maintenance, compared to Cloud solution costs for TCO.

Signup and view all the flashcards

IT Governance Requirements for Cloud

Aligning to business strategy, internal/external controls, access policies, logging of errors/events, and performance monitoring.

Signup and view all the flashcards

Functional Requirements

Defining what the system will do, provided by system analysts to designers. Focus on identifying errors early to save cost and time.

Signup and view all the flashcards

System Requirements

Define the specific tasks the system will perform

Signup and view all the flashcards

Scaling Out vs. Scaling Up

Getting new resources is scaling out, while upgrading existing resources is scaling up. Scaling in and down are the reverse.

Signup and view all the flashcards

Load Balancer Role

A load balancer distributes workload across Cloud IT resources, like client requests.

Signup and view all the flashcards

Workload Allocation Patterns

Methods for distributing workload, include round robin, random, or complex algorithms.

Signup and view all the flashcards

Balanced Cloud Application Design

Cloud application design should balance scalability needs with reasonable expectations, exploring horizontal and vertical options.

Signup and view all the flashcards

Minimize Key Page Objects

Reduce the number of objects (graphics, animation, audio) on key pages to speed up loading.

Signup and view all the flashcards

Measurement Point Selection

Identify the 20% of code that performs 80% of processing, and focus scaling efforts there.

Signup and view all the flashcards

Database Operation Analysis

Read operations can use replicated databases (horizontal scaling) because they don't conflict, but write operations need synchronization.

Signup and view all the flashcards

Capacity Planning vs. Scalability

Capacity planning is for specific time resource needs, while scalability is acquiring additional resources for increasing workload.

Signup and view all the flashcards

Cloud Performance

Enhancing performance involves reducing graphics, network operations, and utilizing caching to address potential bottlenecks.

Signup and view all the flashcards

Cloud Price Considerations

Cloud solution design should balance initial affordability with long-term costs, considering scalability, disaster recovery, and performance within budget.

Signup and view all the flashcards

Cloud Privacy Assurance

Cloud solutions, especially for sensitive data (healthcare, education, finance), must ensure robust privacy and security against unauthorized access, including replicated databases and backups.

Signup and view all the flashcards

Cloud Portability

Cloud solutions should be designed to be portable across different platforms by favoring generic or open-source APIs and programming environments over provider-specific ones.

Signup and view all the flashcards

Cloud Recovery Features

Cloud solutions should incorporate recovery mechanisms for various events, including user errors, programming bugs, and power outages, beyond just disaster recovery scenarios.

Signup and view all the flashcards

Cloud Response Time

Ensuring minimal delay, particularly in online forms and report generation.

Signup and view all the flashcards

Cloud Robustness

Solution's ability to maintain functionality despite errors or system failures, complemented by resource monitoring for timely alerts to critical events.

Signup and view all the flashcards

Study Notes

  • Open issues in cloud cover cloud computing course topics

Overview

  • Cloud is not a universal solution for all IT service consumers or applications
  • Cloud computing inherently involves issues not unique to the cloud itself
  • Complex computing systems are vulnerable to hardware failures and security breaches
  • Issues tied to cloud computing are discussed in relation to NIST USA guidelines

Computing Performance

  • Real-time applications need high performance and predictability
  • Cloud computing shares performance issues with other distributed computing forms
  • Latency, measured by round-trip time, is unpredictable in internet-based communication
  • Offline data synchronization on the cloud presents a problem, needing version control and group collaboration
  • Legacy applications must be updated to leverage the scalable computing capacity of cloud
  • Consumers need control over the data lifecycle and data intrusion/unauthorized access

Cloud Reliability

  • It refers to how likely a system will provide failure-free service over a time
  • Cloud reliability depends on the provider's infrastructure and subscribed service connectivity
  • Cloud reliability measurement faces difficulties due to the intricacies of cloud procedures
  • Internet unreliability affects security of cloud reliability

Cloud Reliability: Economic Goals and Evaluation

  • Cloud provides economic savings upfront, eliminating maintenance costs and scale economies
  • Cloud computing has economic risks
  • Lack of automated SLA compliance mechanisms requires a common SLA template
  • A common SLA template aids in making decisions about manual audits
  • Portability of Workloads, initial cloud adoption barriers are the needs of data transfer to the Cloud
  • Interoperability between Cloud Providers, consumers fear vendor lock-in due to a lack of interoperability,
  • Disaster Recovery, economic and performance losses can be avoided for providers and consumer by using disaster recovery implementation

Compliance

  • Compliance adherence is required to law and preferred procedure
  • US Federal government agencies are creating methods to solve compliance issues
  • Consumers are responsible for compliance, but providers implement it
  • There is a limited visibility of security procedures, and consumers can ask about their implementation
  • Acquire assurances from providers on data compliance and security issues
  • Forensic support on any incident should be provided to evaluate attacks
  • Providers are responsible for forensic analysis for SaaS
  • Consumers are responsible for forensic analysis for IaaS

Information Security

  • Info security is related to confidentiality and data integrity
  • Info security is linked with the assurance of availability
  • Administrative controls, technical controls, and physical controls can be used for security
  • Application of administrative controls specifies the authority of specific users to create, update, delete, disclose, and transport data
  • Technical controls cover Identity and Access Management (IAM), data encryption, and data audit-handling requirements according to any regulatory need
  • Public and private clouds have security exposures
  • Providers can provide physical data separation in addition to logical separation
  • NIST recommends providers offer monitoring mechanisms for consumer security compliance

Disk Failure - Understanding the Threats

  • Disk drives are electro-mechanical things which wear out and eventually fail
  • Disasters or theft cause disk failures
  • All mechanical devices have mean time between failure (MTBF)
  • MTBF values calculated by manufacturers are generic across devices
  • Traditional approaches have backup storage on storage, but risk data loss, and the recovery process takes a long time
  • A Redundant Array of Independent Disks (RAID) has multiple copies of data and distributes them over disks
  • Cloud-based data storage provides data access and replication over the internet
  • Cloud-based backups are stored remotely and can be readily available

Power Failure or Disruption - Understanding the Threats

  • Storms or power supply faults can damage computers with electrical surges
  • Electrical surges can permanently damage data storage
  • Unsaved data are lost during power blackouts
  • Surge protectors are traditionally used, but useless in blackouts
  • Data centers can install and use expensive uninterruptible power supply (UPS) devices or backup generators
  • A solution for data centers is to shift data to another site
  • Migrating data centers to Cloud reduces power backups as their costs are divided among consumers, and locations can be moved to another grid

Computer Virus - Understanding the Threats

  • Surfing the web can cause the user to unknowingly download software or junk drives over their devices
  • Computer viruses and spyware are risks to user's devices
  • Install antivirus software and set to auto-update to get the most recent updates
  • Restrict user privilege to install software
  • Use a firewall over a router, on the computer, or around the LAN
  • Cloud computing makes it difficult for non-cloud based viruses to penetrate
  • Cloud providers have security for consumer safety of their data sofwat

Fire, Flood and Disgruntled EE's - Understanding the Threats

  • Fire and fire suppressing practices can damage computing equipment, backup and data
  • Unexpected rainfall can affect computing equipment
  • Angry employees can launch viruses, delete files and leak passwords
  • By residing the data center over cloud, prevents consumer effort of fire-prevention
  • Floods cannot be avoided or put-off, avoid flood zones
  • Cloud Identity as a Service can prevent terminated employees to do damage effectively

Lost Equipment and Desktop Failure- Understanding the Threats

  • Losing equipment or laptops leads to data loss, or personal identity loss
  • If confidential data is stored on the lost device, this can lead to increased security concerns
  • Keeping backups, strong passwords, and login requirements is often used, and is effective
  • Data can still be accessed via Cloud computing from an online face, or synced devices if lost
  • User becomes offline until desktop in case of desktop failure is replaced
  • Backup stores are traditionally used for desktops or enterprises and restore data as soon as possible

Networking Environment - Understanding the Threats

  • Servers run the same risks as desktops
  • Replacing blade servers is relatively simple
  • Redundant Servers were once kept to replace the failed server quickly
  • Cloud providers can provide 99.9% up-time through server redundancy and fail-over, and thus consumers aren't worried about server failure
  • Network Failure can occur due to a faulty device and causes downtime
  • Redundant networking and backup devices are important as a hotspot back up

Understanding the Threats: Database System and Phone System Failure

  • Many companies store databases for customer records, sales, purchases, and HR systems
  • Failed databases can cause dependent unavailable applications
  • Companies either either use backup or replication of database instances
  • Failover systems work with cloud-based database systems to minimize downtime
  • If a phone system is damaged, employees can mobile phones, but customers are not
  • Traditional solutions reduce Phone System impact
  • Redundancy is internally provided via cloud based systems for reliable service

Measuring Business Impact, Disaster Recovery Plan Template

  • Risks can be costly when reducing for resource redundancy and backups
  • Risk-reduction mechanisms can limit investment
  • IT staff should evaluate and classify each risk according to its impact
  • Occurrence table to indicate disaster probability impact can be shown
  • Document disaster recovery plan, to contain plan overview, goals and objectives, types of events covered, risk analysis and mitigation techniques
  • Standard languages preferred for cloud services
  • Plan created with clear resources consumer

Measuring Business Impact, Disaster Recovery Plan Template (Cont.)

  • Cloud provider should act upon the disaster recovery plan of the consumer for critical data and software
  • Compensation should be offered for interrupted service
  • Implement controls to comply with legal, ISO, and audit standard
  • Policies of provider should be sufficient to protect against malicious insiders
  • Licensing, to be considered during licensing

Data Governance

  • Ensure application interfaces are generic, before developing the Cloud based applications data adaptors
  • Data Separation, ensure measures are implanted to ensure a seperation of sensitive and non-sensitive data from the client
  • Data Integrity uses checksum and replication techniques
  • Ensure providers follow data regulations
  • Provide cloud consumers mechanisms to delete data and maintain evidence of proof
  • Examine archiving procedures of the provider and ensure they are satisfactory

Security & Reliability

  • Implement security policies along with implementing Consumer-side Vulnerabilities
  • Encryption is applied for web sessions, data transfer and data storage
  • Consumers should factor in security procedures of the provider for physical implementations
  • If there is a physical attack on the provider's site, there must be a recovery plan
  • Implement advanced authentication procedures by the consumer to prevent identity theft
  • Identify access management, performance, and reliability scores, should the consumer use the key benchmarks after deployment

VMs, Software and Applications

  • Sufficient mechanisms that make the provider implement to avoid attacks which implement the resources for VM's such as security and network should be implemented
  • Plan for the VM migration, should the customers VM migration be planned across different providers if necessary.
  • Cloud should not be used to implement critical software due to unreliable response time
  • For secure development tools, integrate the security features
  • Make sure the application has dependable function, and supports performance functionality
  • Apps deploying in the could should be configured to be in VLAN segment
  • The Cloud's security frameworks should have customizable and secured policies to the application deployed
  • Standard programming languages should be preferred by consumers

Define System Goals And Requirements

  • Migration to the cloud should be well planned considering
  • Data security and privacy requirements
  • A site capacity plan which allows initial operation for the app
  • Scalability requirements at runtime
  • System uptime requirements
  • Business continuity and disaster requirements
  • Operating system and programming language requirements
  • Client devices support
  • Reporting requirements, data export and API's should be specified

Protecting Existing Data and Know Application Charactaristics

  • To restore at a certain time, it is highly recommended that the consumer back up data to help in restoring the data.
  • Data privacy, storage and access, should there be any issues with discussion with the provider to be in the legal document
  • The IT resources of what the application is should be required
  • Important features must be lowed
  • High and low demand periods
  • Disk storage and RAM Requirements
  • Usage requirement on bandwith, caching, database needs and simultaneous users

Deployment Schedule and Review Budget - IT Gov Issues

  • Sufficient time for application after deployment should be given with a planned schedule
  • Beta releases should be done to allow feedback given back to the developer
  • Companies should license software, and use payroll key budget in relation to in house costs
  • In-House maintenance, IT staff and data center staff may be factored in the final comparison
  • IT Governance is important for defining the cloud solution with company strategy

Cloud based solution requirements for the customer

  • Before deploying the application to the system
  • System should consist functional and non-functional implementations
  • Errors should be identified in any early stage, to save cost and time
  • All requirements which are functional and non-functional should be specified by analyst

Designing cloud based requirements

  • Designing solutions for logging and exceptions at critical parts for access
  • Cloud solution should have accessibility through cloud, and use cases which are redundant
  • Back up for downtime and restoring can be improved if data is handled through a re-negotiated provider

Cloud solution design metrics

  • Existing and Future Capaciity to IT resources
  • Interfacement of an os, device, and or browser
  • Environment design and disaster mitigation consideration
  • In terms of data design consideration Interoperabilty for Cloud solutions

Cloud Solution Design pt.2

  • Performance - Using data replication, graphics and caching for use
  • Price - Design with short and long term budget in mind with features of portability, recover, performance
  • Privacy is to be implemented for medical, education and financial cases
  • The Cloud should be portable with generic API's to work on Open Source applications
  • Recovery is to be for disaster etc...

Cloud Solution Design Metric pt. 3

  • Reliability - Design configuration for hardware failure issues
  • Response time should be as fast as possible
  • Robustness - Monitor cloud to ensure that little issues are tackled immediately
  • Security is vital for a cloud solution
  • Testability - the cases for functionality must have tests for functionality for the solution
  • Usability - Ensure the customers can use the cloud for what they intend

Applications

  • Cloud apps should scale to the maximum requirement
  • The scaling process should be determined to meet new resources, and scaling on each resource that is on a down-time and up-time
  • To ensure better scalability, balance design

Cloud scalability

  • Optimize key pages, pages in the web should reduce space
  • Selecting what part with code to measure is important as 1 to 20 percent of the code performs to to 80 percent
  • Operations of the database with read and write can be designed to perform scaling
  • The performance is not affected with read operations through repliacting databases
  • Use databases for scalability operations
  • What system has data log with performance should be considered with the log requirements of the user

Cloud Computing : Scalability And More

  • Meeting the requirements, for scalable capacity is a must
  • Scalability means acquiring addition resources to process the increasing workload.
  • Don't scaling is to to be performed to increase the work load on each product
  • Reducing performance, is tuning the process to a perfect solution of the RAM.

Scheduling and Resource Management

  • Reducing the workload, execution, time and cost is vital for performance
  • Resource scheduling and what it fulfills must be reliable, secure and scalable
  • Cloud providers look to maximize profits while consumers look to time minimize execution

Scheduling resource Management pt.2

  • Perform scheduling on budget with priority
  • Ensure the clients and their requests are processed correctly
  • Prevent the other constraint from taking priority

Time Scheduling of Recources

  • Processing of time based scheduling makes for less stress on the request from a provider
  • Schedule the recources with the job line approaching faster
  • Evaluate through all stats such as number of deadlines, cost and overcost

Cost Based and Time Resource Scheduling

  • Managing both cost and time may prove to be difficult if provisioning is used to meet the deadline on hand of the work
  • Deadlines should be considered to have hybrid approach to maximize profits
  • Cost Based scheduling should be applied with the Hybrid approach

Bargain Recourse Scheduling

  • Consider resource market to see the what provider can offer the customer
  • See what cost is there on the processing
  • To meet all deadlines, bargaining is important and to succeed in bargaining

Profit base Recourcing scheduling

  • Profit based scheduling aims at increasing the revenue.
  • Must consider SLA requirements while following this process
  • Also make sure the SLA is not broken

SLA and QES Resource Scheduling

  • Focus on maintaining SLAs for scheduled recourses.
  • Prevent overload to prevent overload
  • All homogenous tasks should meet the SLAs from the start

Energy Rebaased Resource Scheduling

  • Lowering the energy levels to decreasing costs and saving environment
  • Estimations should be in sync with resource decision
  • What distribution should be preferred with energy distribution for each task

Optimization Resource Scheduling

  • Optimizing the algorithm to make it optimal for problems
  • Must consider researcher inputs like bayesina and processing
  • Drawbacks of time or the output may result some tasks

Priority-Based Resource Scheduling

  • Lower high priority, in which which the resource to be allocated
  • Lower priority tasks needs to be reallocatd to reduce starvation

VM Based resource scheduling

  • The VM can host cloud based applications so it is deployed on a Vm Level
  • Every application used on the VM can be accounted for scheduled requirements
  • The Destination host may run out of IT required for previously deployed VMs

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Untitled Quiz
6 questions

Untitled Quiz

AdoredHealing avatar
AdoredHealing
Untitled
6 questions

Untitled

StrikingParadise avatar
StrikingParadise
Untitled Quiz
50 questions

Untitled Quiz

JoyousSulfur avatar
JoyousSulfur
Untitled
121 questions

Untitled

NicerLongBeach3605 avatar
NicerLongBeach3605
Use Quizgecko on...
Browser
Browser