Outsourced Private Cloud and IaaS Overview
47 Questions
0 Views

Outsourced Private Cloud and IaaS Overview

Created by
@FinestHeliotrope8886

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In the IaaS model, who maintains control over the physical hardware?

  • The subscriber
  • The cloud provider (correct)
  • The operating system
  • The hypervisor
  • What does a subscriber receive when using IaaS?

  • Admin rights over the hypervisor
  • Access to virtual machines and network storage (correct)
  • Physical hardware ownership
  • Technical support for all software
  • How are usage fees calculated in IaaS?

  • One-time setup fee for account creation
  • Fixed monthly subscription price
  • Based on user traffic to websites
  • Per CPU hour and data stored per hour (correct)
  • Which layer is controlled by the subscriber in an IaaS environment?

    <p>Guest operating system layer</p> Signup and view all the answers

    What is the function of a hypervisor in an IaaS setup?

    <p>To create and manage virtual machines</p> Signup and view all the answers

    What is the primary responsibility of the top level in the IaaS cloud architecture?

    <p>Central control</p> Signup and view all the answers

    Which of the following statements is true regarding the control dynamics in IaaS?

    <p>Subscribers can load any supported operating system into VMs</p> Signup and view all the answers

    What does the term 'virtual machine' refer to in IaaS?

    <p>An isolated instance of an operating system</p> Signup and view all the answers

    What does the Cloud Manager primarily manage for subscribers?

    <p>User accounts and resource management</p> Signup and view all the answers

    What information is primarily stored in the Data Object Storage (DOS)?

    <p>Subscriber metadata</p> Signup and view all the answers

    What is the role of the Virtual Machine Monitor (VMM) in IaaS?

    <p>Management of the hypervisor layer</p> Signup and view all the answers

    What type of networks do computers within a Cluster Manager generally use?

    <p>Local area networks</p> Signup and view all the answers

    Which level of the IaaS cloud architecture is responsible for calculating resource availability based on commands from the Cloud Manager?

    <p>Cluster Manager</p> Signup and view all the answers

    What mechanism does the Cloud Manager have for servicing subscriber requests?

    <p>Access credential validation</p> Signup and view all the answers

    How does the management of geographically distant computer clusters occur?

    <p>Centralized controls from the top level</p> Signup and view all the answers

    What is a key function of the middle level in IaaS cloud systems?

    <p>Supervising the operation of geographically distributed clusters</p> Signup and view all the answers

    What primarily affects the security of data and processing in an outsourced private cloud?

    <p>The security perimeters and protected communication link</p> Signup and view all the answers

    What is a common consideration for subscribers in choosing an outsourced private cloud?

    <p>Provisioning unique protected and reliable communication links</p> Signup and view all the answers

    What could impact the on-demand bulk data import/export in an outsourced private cloud?

    <p>The network capacity between the provider and subscriber</p> Signup and view all the answers

    What is a potential up-front cost for a subscriber migrating to an outsourced private cloud?

    <p>Negotiating the service level agreement (SLA)</p> Signup and view all the answers

    Which of the following is a risk associated with multi-tenancy in an outsourced private cloud?

    <p>Similar implications as an on-site private cloud</p> Signup and view all the answers

    What does the concept of heterogeneity in networking technologies refer to?

    <p>The use of diverse networking technologies such as optical and wireless</p> Signup and view all the answers

    Which of the following best describes the resources in an outsourced private cloud?

    <p>They are provisioned by the provider in any quantity offered</p> Signup and view all the answers

    What is a significant difference between on-site and outsourced private cloud security measures?

    <p>Both subscriber and provider security perimeters must be hardened</p> Signup and view all the answers

    What may need to be adjusted when using an outsourced private cloud to improve network performance?

    <p>High-performance or high-reliability networking</p> Signup and view all the answers

    Which of the following is a reason for the importance of experimental and deployment facilities in networking?

    <p>To apply testing directly to real-world scenarios after experimentation</p> Signup and view all the answers

    What is a key goal of considering legacy support in modern networking designs?

    <p>To ensure the existing Internet's stakeholders remain satisfied</p> Signup and view all the answers

    Which of the following describes XML best?

    <p>A universal format for encoding text-based data using printable characters</p> Signup and view all the answers

    In the context of XML, what is the purpose of defining language dialects?

    <p>To customize and extend the functionality of XML documents</p> Signup and view all the answers

    What is the fundamental requirement for well-formed XML?

    <p>Follow explicit syntax rules and structures</p> Signup and view all the answers

    Which statement best describes the role of parsers in XML processing?

    <p>They validate and interpret XML syntax for applications</p> Signup and view all the answers

    Which of the following is NOT an example of a networking technology?

    <p>XML</p> Signup and view all the answers

    Which feature allows a VM running on one brand of server to be relocated to another brand without issues?

    <p>Total VM Portability</p> Signup and view all the answers

    Which characteristic is true for a conventional third generation computer in virtualization?

    <p>The set of sensitive instructions must be a subset of privileged instructions.</p> Signup and view all the answers

    What is a primary drawback of full virtualization?

    <p>Performance may be hindered due to hardware emulation.</p> Signup and view all the answers

    What type of sensitive instructions require control of the guest OS to prevent exposure?

    <p>Control Sensitive Instructions</p> Signup and view all the answers

    Which is an advantage of para-virtualization over full virtualization?

    <p>Enables better system performance by avoiding privileged instruction translation.</p> Signup and view all the answers

    What role does the VMM play in para-virtualization?

    <p>It is responsible for managing privileged instruction translation.</p> Signup and view all the answers

    How does full virtualization provide an emulated environment to the guest OS?

    <p>Through dynamic binary translation and hardware emulation.</p> Signup and view all the answers

    What is a significant disadvantage of running an unmodified OS in a virtualized environment?

    <p>It may not utilize all virtualization capabilities effectively.</p> Signup and view all the answers

    What does hardware-assisted virtualization allow a guest OS to do?

    <p>Utilize processor extensions for better efficiency.</p> Signup and view all the answers

    Which of the following is a requirement for using para-virtualization?

    <p>The OS kernel must be recompiled to include para-virtualization APIs.</p> Signup and view all the answers

    What is a limitation of using para-virtualization in certain operating systems?

    <p>Requires virtualization-aware operating systems.</p> Signup and view all the answers

    Which virtualization approach is characterized by modifying the guest OS to improve performance?

    <p>Para-Virtualization</p> Signup and view all the answers

    What does the term 'Ring 0' refer to in virtualization contexts?

    <p>The highest level of privilege where the operating system kernel runs.</p> Signup and view all the answers

    Which of the following best defines hardware-assisted virtualization?

    <p>It leverages hardware capabilities to enhance virtualization.</p> Signup and view all the answers

    Why is it significant that a VMM runs in a more privileged ring than the guest OS?

    <p>It allows the VMM to directly control guest OS operations.</p> Signup and view all the answers

    Study Notes

    Outsourced Private Cloud

    • The security of data and processing in an outsourced private cloud depends on the strength and availability of both security perimeters and the protected communication link.
    • Organizations considering the use of an outsourced private cloud should leverage high-performance and/or high-reliability networking between the provider and subscriber.
    • In the outsourced private cloud scenario, a subscriber can rent resources in any quantity offered by the provider.
    • Subscribers should negotiate service level agreements (SLAs) and potentially upgrade their network to connect to the outsourced private cloud.

    IaaS (Infrastructure as a Service)

    • IaaS provides subscribers with access to virtual computers, network-accessible storage, network infrastructure components such as firewalls, and configuration services.
    • Usage fees are typically calculated based on CPU hours, data GB stored per hour, network bandwidth consumed, network infrastructure used (e.g., IP addresses) per hour, and value-added services used (e.g., monitoring, automatic scaling).
    • IaaS component stack comprises hardware, operating system, middleware, and applications.
    • The provider maintains total control over the physical hardware and administrative control over the hypervisor layer.
    • The subscriber controls the Guest OS, Middleware, and Applications layers.

    IaaS Cloud Architecture

    • IaaS cloud systems have a three-level hierarchy of components:
      • Top Level: Central control
      • Middle Level: Management of potentially large computer clusters
      • Bottom Level: Running host computer systems on which virtual machines are created.
    • The Cloud Manager is the public access point to the cloud where subscribers sign up for accounts, manage rented resources, and access data stored in the cloud.

    Data Object Storage (DOS)

    • DOS typically stores the subscriber's metadata like user credentials and operating system images.

    Server Virtualization

    • Virtualization techniques include full virtualization, para-virtualization, and hardware-assisted virtualization.
    • Full virtualization emulates hardware, enabling VM portability.
    • Para-virtualization modifies the guest OS to communicate with the VMM, improving performance.
    • Hardware-assisted virtualization leverages processor extensions to optimize privileged operations.

    Network Virtualization

    • Network virtualization enables flexible, efficient, and secure network configuration and management.
    • It allows for diverse networking technologies, such as optical, sensor, and wireless.

    Virtual Internet

    • Virtual Internet aims to create a collection of multiple virtual Internets with legacy support.
    • It leverages networking technology and architectural domains for resource management and network spawning.

    XML

    • XML provides a syntax for encoding text-based data and defining custom elements.
    • XML has evolved to include a growing family of application frameworks and dialects.
    • Key features of XML include extensibility, universal format, and structural integrity.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    WEEK2_LEC_MATERIAL.docx

    Description

    This quiz explores the concepts of outsourced private cloud services and Infrastructure as a Service (IaaS). It covers essential aspects including data security, networking requirements, and service level agreements. Test your understanding of how organizations can benefit from these technologies.

    More Like This

    Use Quizgecko on...
    Browser
    Browser