Cloud Computing Stack: Composability

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which characteristic defines a composable component in cloud architecture?

  • It is stateful and dependent on other components.
  • It requires frequent updates to maintain compatibility.
  • It is self-contained, independent, reusable, and replaceable. (correct)
  • It is tightly coupled with specific hardware.

Why do IaaS vendors typically avoid offering non-standard machine instances?

  • To simplify hardware maintenance.
  • To encourage the use of proprietary operating systems.
  • To maximize the cost for the end user.
  • Because customers generally deploy applications on standard operating systems. (correct)

In which cloud service model does the idea of composability largely disappear from the user's perspective?

  • Desktop as a Service (DaaS)
  • Software as a Service (SaaS) (correct)
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)

What does it mean for a transaction to be stateless in the context of cloud computing?

<p>The transaction is executed without regard to other transactions or requests. (D)</p>
Signup and view all the answers

How do Infrastructure as a Service (IaaS) providers typically present virtual machines to users?

<p>As machine images or instances with defined characteristics. (C)</p>
Signup and view all the answers

What benefit does cloud computing offer to programmers dealing with parallel task execution?

<p>It allows applications to scale execution by attaching to cloud services. (C)</p>
Signup and view all the answers

In the context of cloud computing, what is a platform?

<p>A software layer used to create higher levels of service. (C)</p>
Signup and view all the answers

What is a key advantage of using virtual appliances in cloud computing?

<p>They simplify the assembly of complex services and remove the need for application configuration. (C)</p>
Signup and view all the answers

What is the primary function of the Open Virtualization Format (OVF)?

<p>To convert virtual appliances from one platform to another. (C)</p>
Signup and view all the answers

Which protocol suite forms the foundation for communication protocols in cloud computing?

<p>Hypertext Transfer Protocol (HTTP) and HTTPS (C)</p>
Signup and view all the answers

What is the purpose of the Simple Object Access Protocol (SOAP) in web services?

<p>To exchange structured information and enable communication between applications. (C)</p>
Signup and view all the answers

What role does the Web Services Description Language (WSDL) play in relation to SOAP?

<p>WSDL describes the web service, while SOAP implements the communication. (D)</p>
Signup and view all the answers

When applications exchange data over an insecure medium, what is one of the three basic methods to secure the connection?

<p>Encrypting the data so that it is unreadable if intercepted. (C)</p>
Signup and view all the answers

Which of the following is a characteristic of Google Chrome OS in relation to cloud computing?

<p>It is designed as a cloud-first OS, integrating with cloud services. (C)</p>
Signup and view all the answers

In an IaaS deployment, what is the fundamental unit of virtualized client called?

<p>A workload. (B)</p>
Signup and view all the answers

What does PaaS provide to developers?

<p>A fully integrated development environment to create customized solutions. (B)</p>
Signup and view all the answers

Which of the following responsibilities falls under the vendor's domain in a PaaS model?

<p>Maintaining the hardware and software infrastructure. (A)</p>
Signup and view all the answers

What is a defining characteristic of Software as a Service (SaaS)?

<p>It is accessible globally over the Internet through a browser. (C)</p>
Signup and view all the answers

In the context of Identity as a Service (IDaaS), what does minimal disclosure refer to?

<p>Disclosing the minimal amount of information necessary. (B)</p>
Signup and view all the answers

What is the purpose of decided human identification in IDaaS applications?

<p>To provide a mechanism for human interaction while protecting against identity attacks. (C)</p>
Signup and view all the answers

Flashcards

Composability

Applications built from a collection of components.

Modular Component

A self-contained, reusable, and replaceable unit.

Stateless

A transaction executed without regard to others.

IaaS Infrastructure

Virtual machine technology as a service.

Signup and view all the flashcards

Cloud Platform

Software layer for higher-level services.

Signup and view all the flashcards

Virtual Appliance

A platform instance; Applications such as a Web server or database server that can run on a virtual machine image.

Signup and view all the flashcards

Communication Protocols

Standard Internet protocols for cloud computing.

Signup and view all the flashcards

SOAP

Protocol for exchanging structured info in web services.

Signup and view all the flashcards

WSDL

XML-based language describing web service functionality.

Signup and view all the flashcards

Workload

A fundamental unit of virtualized client in an IaaS deployment

Signup and view all the flashcards

PaaS

Software environment for developers to create solutions.

Signup and view all the flashcards

SaaS

It provides the computing hardware and software, as well as the solution itself

Signup and view all the flashcards

IDaaS

Provides identity authorization and lookup.

Signup and view all the flashcards

Identity

A set of characteristics that make something recognizable or known.

Signup and view all the flashcards

Virtual Connection

Data is protected by a tunneling mechanism.

Signup and view all the flashcards

Study Notes

Exploring Cloud Computing Stack

  • Main components include composability, infrastructure, platforms, virtual appliances, and communication protocols
  • Cloud architecture joins software running on virtualized hardware in multiple locations to provide on-demand service to end-users
  • A unique combination of abstraction and metered service distinguishes cloud computing systems from general n-tiered Internet applications

Composability

  • Involves building applications from a collection of components
  • A composable system uses components to assemble services tailored for specific purposes
  • Composable components must be modular and stateless

Modular

  • A modular component is self-contained, independent, reusable, and replaceable
  • Modularity makes system design easier
  • IaaS vendors may not offer non-standard machine instances due to customer reliance on standard OS like Linux or Windows
  • PaaS vendors might narrow standard parts to those working on their platforms
  • SaaS vendors might eliminate composability for users since they deliver applications as a service, limiting custom applications

Stateless

  • A transaction is executed without regard to other transactions or requests

Infrastructure

  • Most IaaS providers use virtual machine technology
  • Virtual machines can be described in terms of machine image or instance characteristics similar to real machines
  • Virtual servers introduce a new way of thinking about and programming applications for developers

Platforms

  • Platforms in the cloud act as software layers used to create higher levels of service
  • Platforms offer hosted hardware and software for building and deploying Web applications or services
  • Operating system vendors, like Microsoft, provide platforms that allow Windows developers to use ASP.NET application framework, support SQL Server, and program within Visual Studio through Azure Platform
  • Platforms include tools and utilities for application design and deployment: team collaboration, testing, instrumentation, database, Web service integration, and storage

Virtual Appliances

  • Applications like Web or database servers that run on a virtual machine image
  • A virtual appliance is an platform instance and sits in the middle of the cloud computing stack "PaaS"
  • Advantages: use virtual appliances to assemble complex services and removes the need for application configuration and maintenance
  • The operating system is often cleared of unnecessary functionality
  • Virtual appliances can be converted from one platform to another using Open Virtualization Format (OVF), which is a standard file format

Communication Protocols

  • Cloud computing uses standard Internet protocol suite underpinned by HTTP and HTTPS transfer protocols
  • Many client/server protocols (Remote Procedure Call "RPC") have been applied to distributed networking
  • The first RPC technologies was XML-RPC, which uses platform independent XML data that encodes program calls and transports them through HTTP
  • SOAP (Simple Object Access Protocol) is used for exchanging structured information in web services
  • It allows applications running on different operating systems and programming languages to communicate via the Internet

SOAP Characteristics

  • XML-Based: SOAP messages are formatted in XML, making them platform-independent and easy to read
  • Protocol-Independent: SOAP works over various transport protocols like HTTP, SMTP, TCP, etc., with HTTP being the most common
  • Language-Independent: Since SOAP uses XML, it can be implemented in any programming language that supports XML parsing
  • Interoperability: Enables communication between applications on different platforms (e.g., Java, .NET, Python) and operating systems (e.g., Windows, Linux)
  • Standardization: Provides a standardized way to structure messages, making it easier to integrate systems
  • Security: Supports advanced security features like WS-Security, ensuring secure communication over networks

WSDL (Web Services Description Language)

  • Closely related to SOAP and describes the web service itself
  • WSDL is an XML-based language that describes the functionality of a web service and provides details about operations, message formats (SOAP), service location (endpoint URL), and communication protocols (HTTP)
  • It acts as a "contract" between the client and the server, to indicates how to interact with the SOAP-based web service
  • Once the client knows how to interact with the service (via WSDL), it uses SOAP to send and receive messages

Connecting to the Cloud

  • Clients can connect via web browsers or proprietary applications running on servers, PCs, mobile devices, or cell phones
  • These applications exchange data over an insecure and temporary mediums

Securely Connecting

  • Use a secure protocol to transfer data such as SSL (HTTPS), FTPS, SSH, or IPsec
  • Creating a virtual connection: data is protected by a tunneling mechanism using a virtual private network (VPN), or with a remote data transfer protocol such as Microsoft RDP
  • Encrypt the data so that even if the data is intercepted or sniffed, the data will not be meaningful

Google Chrome OS

  • A Linux open-source operating system designed to be a robust cloud client
  • Shipped pre-installed on validated hardware from Google-approved OEMs, includes Trusted Platform Module "TPM" for a "trusted bootpath"
  • Chrome OS exemplifies a cloud-first OS, integrating with Google Cloud services, suited for education, enterprise, and users prioritizing accessibility over local computing
  • Relies on web applications and cloud services rather than traditional desktop software
  • System updates, security patches, and feature enhancements are delivered seamlessly via the cloud without user intervention
  • Stores preferences, bookmarks, and apps in the cloud, allowing users to log in from any Chrome OS device and retain their environment
  • Data is encrypted in transit, reduces IT overhead with centralized cloud management and eliminates the need for expensive hardware, and key apps (e.g., Google Drive, Docs) offer offline functionality with syncing capabilities

Defining IaaS

  • Virtualized resources are mapped to real systems
  • When a client requests resources from the virtual systems, those requests are redirected to the real servers that do the actual work

Workload

  • The fundamental unit of virtualized client in an IaaS deployment
  • Simulates the ability of a physical server to do an amount of work
  • Can be measured by: transactions per minute "TPM", disk Input/Output Per Second "IOPS", amount of RAM consumed under load in MB, network throughput in "Mbps", and Network latency in “milliseconds"
  • Workloads support a certain number of users called "pods"
  • Pods should get consideration when sizing limitations building a large cloudbased application
  • Pods are aggregated into pools within an IaaS region called an availability zone "AZ"

Defining PaaS

  • A software environment where developers can create customized solutions and applications
  • Provides a fully integrated development environment
  • Can be based on specific types of development languages or application frameworks
  • The customer has no responsibility for maintaining the hardware or the software while vendor is responsible for operational aspects of the service, for maintenance, and for managing the product lifecycle
  • The one example that's often quoted is Google's App Engine platform
  • Locks the developers into a solution that is dependent upon the platform vendor

Defining SaaS

  • is the most complete cloud computing service model and provides the computing hardware and software, as well as the solution itself
  • Can be described as software that can be accessed globally over the Internet, using a browser
  • Examples of SaaS software: Google Gmail, Google Docs
  • Characteristics include: software is available over the Internet globally through a browser on demand, the license is subscription-based or usage-based, the service are monitored and maintained by the vendor, all users have the same version of the software, and supports multiple users and provides a shared data model through a multitenancy subscription

Defining IDaaS

  • The Domain Name Service "DNS" provides identity authorization and lookup and the name servers that run domains are IDaaS servers
  • An identity is a set of characteristics that make something recognizable or known.
  • A digital identity is those attributes and metadata of an object that makes an object identifiable
  • When working with IDaaS software, evaluate IDaaS applications on the following basis: User control for consent, Minimal Disclosure, Justifiable access, Decided human identification, and Consistency of Service

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

CHAPTER 8 CLOUD COMPUTING
30 questions

CHAPTER 8 CLOUD COMPUTING

LionheartedPhosphorus avatar
LionheartedPhosphorus
Introduction to Cloud Computing
10 questions
Cloud Computing Infrastructure
10 questions
Introduction to Cloud Computing
12 questions
Use Quizgecko on...
Browser
Browser