0% found this document useful (0 votes)
48 views51 pages

Unit 2 CEC

The document outlines the syllabus for Unit 2 on Cloud Enabling Technologies, focusing on Service Oriented Architecture, Virtualization, and Web Services. It covers key concepts such as REST, types of virtualization, and the publish-subscribe model, along with their characteristics and implementation details. The unit aims to provide students with a foundational understanding of these technologies and their applications in cloud computing.

Uploaded by

Mr Anonymous
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views51 pages

Unit 2 CEC

The document outlines the syllabus for Unit 2 on Cloud Enabling Technologies, focusing on Service Oriented Architecture, Virtualization, and Web Services. It covers key concepts such as REST, types of virtualization, and the publish-subscribe model, along with their characteristics and implementation details. The unit aims to provide students with a foundational understanding of these technologies and their applications in cloud computing.

Uploaded by

Mr Anonymous
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Noida Noida Institute

Institute of Engineering
of Engineering and Technology,
and Technology, Greater
Greater Noida
Noida

CLOUD AND EDGE COMPUTING

Unit:2

Cloud Enabling Technologies


Jaya Nidhi Vashishtha
Assistant Professor,
B Tech 6th Sem CSE-IOT
NIET, Greater Noida

Jaya Nidhi Vashishtha Unit2


1
Syllabus

UNIT-II
Cloud Enabling Technologies:
8 HOURS
Service Oriented Architecture – REST and Systems of Systems – Web Services – Publish
Subscribe Model – Basics of Virtualization – Types of Virtualization – Implementation
Levels of Virtualization – Virtualization Structures – Tools and Mechanisms – Virtualization
of CPU – Memory – I/O Devices –Virtualization Support and Disaster Recovery.

Jaya Nidhi Vashishtha Unit2 2


Prerequisites

• The student should have knowledge of:


• Basics of OS.
• Basic concepts of computer fundamentals of computer system and cloud and edge
computing

Jaya Nidhi Vashishtha Unit2 3


Unit Objective

• To study the Service Oriented Architechture.


• To study the basic concepts about Underlying Principles of Virtualization.
• Understanding the Implementation details of Virtualization.
• Understanding of tools & mechanism of virtualization.
• Overview of Virtualization Support & Disaster Recovery.

Jaya Nidhi Vashishtha Unit2 4


Unit Contents

• Service Oriented architecture : Rest & Systems of


system
• Web Services : Publish Subscribe Model

• Basics of Virtualization : Types & Implementation

• Structures : Tools & Mechanisms

• Virtualization of CPU – Memory- I/O devices

• Virtualization : Support & Disaster Recovery

Jaya Nidhi Vashishtha Unit2 5


Services Oriented Architecture

• Service-Oriented Architecture (SOA) is a style of software design where


services are provided to the other components by application components,
through a communication protocol over a network.
• In service oriented architecture, a number of services communicate with
each other, in one of two ways: through passing data or through two or more
services coordinating an activity.

Jaya Nidhi Vashishtha Unit2 6


Services Oriented Architecture

Characteristics Of Service-Oriented Architecture

• Business value

• Strategic goals

• Intrinsic inter-operability

• Shared services

• Flexibility

• Evolutionary refinement

Jaya Nidhi Vashishtha Unit2 7


Services Oriented Architecture

Fig:1 SOA Architechture

Jaya Nidhi Vashishtha Unit2 8


Services Oriented Architecture

Fig:2 SOA Architecture Before vs. After

Jaya Nidhi Vashishtha Unit2 9


Recap

•Service-Oriented Architecture (SOA):


•Involves software design where services communicate over networks.
•Features include business value, interoperability, shared services, and flexibility.

Jaya Nidhi Vashishtha Unit2 10


Daily Quiz

1. What is the primary purpose of Service-Oriented 3. What is a fundamental characteristic of SOA


Architecture (SOA)? services?
a) To increase hardware performance a) Platform independence
b) To organize services to communicate over a network b) Synchronous communication only
c) To replace all legacy systems c) Always requiring human intervention
d) To focus solely on data storage d) Exclusively built using SOAP protocol
Answer: b) To organize services to communicate over a Answer: a) Platform independence
network
2. Which of the following best describes a service in 4. Which protocol is commonly associated with
SOA? Service-Oriented Architecture?
a) A standalone application with no integration capabilities a) TCP/IP
b) A software component that performs a specific task and b) SOAP
communicates using standardized protocols c) FTP
c) A protocol used for data transfer d) SMTP
d) A large, monolithic application Answer: b) SOAP
Answer: b) A software component that performs a specific
task and communicates using standardized protocols

Jaya Nidhi Vashishtha Unit2 11


Rest & Systems of System

• REST stands for Representational State Transfer, and API stands for
Application Program Interface. REST is a software architectural style
that defines the set of rules to be used for creating web services.

A Restful system consists of a:


• client who requests for the resources.
• server who has the resources.

Jaya Nidhi Vashishtha Unit2 12


Rest & Systems of System

Fig:3 Rest API

Jaya Nidhi Vashishtha Unit2 13


Rest & Systems of System

Fig:4 Rest & Systems of System

Jaya Nidhi Vashishtha Unit2 14


Recap

•Rest & Systems of System:


•REST (Representational State Transfer) defines rules for creating web services.
•Restful systems involve a client requesting resources and a server providing them.

Jaya Nidhi Vashishtha Unit2 15


Daily Quiz

1. What does REST stand for in the context of web 3. What best describes a System of Systems (SoS)?
services? a) A single large system designed to solve specific tasks
a) Remote Encapsulation of Secure Transactions b) A collection of systems that operate independently but
b) Representational State Transfer collaborate for a higher goal
c) Reliable Enterprise System Technology c) A monolithic system operating as a centralized entity
d) Reusable Service Toolkit d) A layered system with tightly integrated components
Answer: b) Representational State Transfer Answer: b) A collection of systems that operate
independently but collaborate for a higher goal
2. Which of the following is a defining characteristic 4. How does REST support the design of a System of
of a RESTful service? Systems?
a) Communication through SOAP envelopes a) By enforcing rigid rules for integration between systems
b) Stateless communication between client and server b) By providing a flexible and scalable architectural style
c) Tight coupling of client and server with standard communication protocols like HTTP
d) Use of XML exclusively for data exchange c) By requiring all subsystems to share the same
Answer: b) Stateless communication between client and technology stack
server d) By limiting interactions to synchronous communication
only
Answer: b) By providing a flexible and scalable
architectural style with standard communication protocols
like HTTP
Jaya Nidhi Vashishtha Unit2 16
Web Services

• A web service is a standardized method for propagating messages between client and
server applications on the World Wide Web.
• The web service would be able to provide the functionality to the
client that invoked the web service.
• A web service is a set of open protocols and standards that allow data exchange
between different applications or systems.

Jaya Nidhi Vashishtha Unit2 17


Web Services

• How does web service work?

Fig:5 Web Services Work

Jaya Nidhi Vashishtha Unit2 18


Recap

•Web Services:
•A web service is a standardized method for propagating messages between client
and server applications on the World Wide Web.
•A web service is a standardized method for propagating messages between client
and server applications on the World Wide Web.

Jaya Nidhi Vashishtha Unit2 19


Daily Quiz
1. What is a web service? 3. What protocols are commonly used for
a) A hardware device used for internet connectivity communication in web services?
b) A platform-independent method for enabling a) HTTP, SOAP, and FTP
communication between applications over the web b) SMTP, DNS, and SNMP
c) A protocol for downloading web pages c) POP, IMAP, and SSH
d) A tool for creating static websites d) ARP, RARP, and ICMP
Answer: b) A platform-independent method for enabling Answer: a) HTTP, SOAP, and FTP
communication between applications over the web

2. Which of the following is a key feature of web 4. Which of the following statements is true about
services? SOAP-based web services?
a) Dependency on the same operating system a) SOAP uses only JSON for data exchange.
b) Platform and language independence b) SOAP services are highly dependent on the underlying
c) Restricted to REST architecture platform.
d) Requires only offline communication c) SOAP is a protocol designed for secure, structured, and
Answer: b) Platform and language independence extensible message exchange.
d) SOAP does not support stateful operations.
Answer: c) SOAP is a protocol designed for secure,
structured, and extensible message exchange.

Jaya Nidhi Vashishtha Unit2 20


Publish Subscribe Model

• Publish/subscribe messaging, or pub/sub messaging, is a form of


asynchronous service-to-service communication used in server
less and micro services architectures.
• In a pub/sub model, any message published to a topic is
immediately
received by all of the subscribers to the topic.

Jaya Nidhi Vashishtha Unit2 21


Publish Subscribe Model

Fig:6 Publish Subscribe Model

Jaya Nidhi Vashishtha Unit2


22
Recap

•Publish subscriber Model:


• Publish/subscribe messaging, or pub/sub messaging, is a form of asynchronous service-to-
service communication used in server less and micro services architectures.

Jaya Nidhi Vashishtha Unit2 23


Daily Quiz
1. What is the primary purpose of the Publish- 3. What is a key advantage of the Publish-Subscriber
Subscriber model? model?
a) To directly connect a publisher with a specific a) It allows tight coupling between components.
subscriber b) It ensures scalability and decoupling of components.
b) To facilitate asynchronous communication between c) It requires all systems to use the same technology
publishers and subscribers stack.
c) To send emails between users d) It reduces the need for middleware.
d) To store large volumes of data Answer: b) It ensures scalability and decoupling of
Answer: b) To facilitate asynchronous communication components.
between publishers and subscribers
2. Which of the following is true about the Publish- 4. In the Publish-Subscriber model, what is the role of
Subscriber model? a message broker?
a) Subscribers must explicitly request updates from a) To directly execute the subscriber's logic
publishers. b) To mediate between publishers and subscribers by
b) Publishers send updates to a centralized message managing message delivery
broker, not directly to subscribers. c) To store messages permanently for offline use
c) All subscribers must have the same format and d) To transform messages into specific formats
structure. Answer: b) To mediate between publishers and
d) It only supports synchronous communication. subscribers by managing message delivery
Answer: b) Publishers send updates to a centralized
message broker, not directly to subscribers. Jaya Nidhi Vashishtha Unit2 24
Basics Of Virtualization

• Virtualization in Cloud Computing :


• Virtualization is the "creation of a virtual (rather than actual) version of something, such as a
server, a desktop, a storage device, an operating system or network resources".
• In other words, Virtualization is a technique, which allows to share a single physical instance of
a resource or an application among multiple customers and organizations.

Jaya Nidhi Vashishtha Unit2


25
Basics Of Virtualization

Consider a company that needs servers for three functions:

1.Store business email securely


2.Run a customer-facing application
3.Run internal business applications

Each of these functions has different configuration requirements:

• The email application requires more storage capacity and a Windows operating
system.
• The customer-facing application requires a Linux operating system and high
processing power to handle large volumes of website traffic.
• The internal business application requires iOS and more internal memory (RAM).

Jaya Nidhi Vashishtha Unit2


26
Types of Virtualization

Types of Virtualization:

• Hardware Virtualization.
• Operating system Virtualization.
• Server Virtualization.
• Storage Virtualization.

Jaya Nidhi Vashishtha Unit2 27


Types of Virtualization

Fig:7 Types of Virtualization

Jaya Nidhi Vashishtha Unit2 28


Implementation levels of Virtualization

There are a total of five levels that are commonly used as


follows.

– 1) Instruction Set Architecture Level (ISA)


– 2) Hardware Abstraction Level (HAL)
– 3) Operating System Level
– 4) Library Level
– 5) Application Level

Jaya Nidhi Vashishtha Unit2 29


Implementation levels of Virtualization

Fig:8 Implementation Levels of Virtualization

Jaya Nidhi Vashishtha Unit2 30


Recap

•Virtualization:
• Basics of Virtualization.
• Types of Virtualization.
• Implementation Levels of Virtualization.

Jaya Nidhi Vashishtha Unit2 31


Daily Quiz
1. What is virtualization in computing? 3. At what level is hardware virtualization typically
a) The process of permanently deleting data implemented?
b) The creation of a virtual version of computing resources a) BIOS level
such as hardware, storage, or network b) Hypervisor level
c) The development of a physical machine for testing c) Application layer
d) A method to increase the speed of hardware processors d) Operating system kernel
Answer: b) The creation of a virtual version of computing Answer: b) Hypervisor level
resources such as hardware, storage, or network

2. Which of the following is NOT a type of 4. What is a key benefit of virtualization?


virtualization? a) Increased dependency on physical hardware
a) Hardware virtualization b) Reduced system performance and resource utilization
b) Software virtualization c) Enhanced resource utilization and cost efficiency
c) Power virtualization d) Limitation to a single operating system per machine
d) Network virtualization Answer: c) Enhanced resource utilization and cost
Answer: c) Power virtualization efficiency

Jaya Nidhi Vashishtha Unit2 32


Virtualization Structures

• Virtualization is achieved through the software known as virtual machine monitor or


the hypervisor.
• Bare-metal virtualization hypervisors: (TYPE I HYPERVISOR). Is deployed as a bare-metal
installation (the first thing to be installed on a server as the operating system will be the
hypervisor).

Jaya Nidhi Vashishtha Unit2 33


Virtualization Structures

Fig:9 Virtualization Structures

Jaya Nidhi Vashishtha Unit2 34


Virtualization Structures : Tools & Mechanisms

• After virtualization, a virtualization layer is inserted between the hardware and the
operating system.
• Depending on the position of the virtualization layer, there are several classes of VM architectures,
namely the hypervisor architecture, parameter.
• Virtualization, and host-based virtualization. The hypervisor is also known as the VMM (Virtual
Machine Monitor). They both perform the same virtualization operations.

Jaya Nidhi Vashishtha Unit2 35


Virtualization Of CPU

• To support virtualization, processors such as the x86 employ a special running mode and instructions,
known as hardware-assisted virtualization.
• To save processor states, mode switching is completed by hardware. For the x86 architecture, Intel
and AMD have proprietary technologies for hardware-assisted virtualization.

Jaya Nidhi Vashishtha Unit2 36


Virtualization Of CPU, Memory I/O Devices

• A VM is a duplicate of an existing computer system in which a majority of the VM instructions are


executed
on the host processor in native mode.

•The critical instructions are divided into three categories: privileged instructions, control-
sensitive instructions, and behavior-sensitive instructions.

• Privileged instructions execute in a privileged mode and will be trapped if executed outside this
mode.
• Control-sensitive instructions attempt to change the configuration of resources used.
• Behavior-sensitive instructions have different behaviors depending on the configuration of
resources,
Jaya Nidhi Vashishtha Unit2 37
including the load and store operations over the virtual memory.
Virtualization Support & Disaster Recovery

What is Virtual Disaster Recovery?


• Virtual disaster recovery is a type of DR that typically involves replication and enables a user to fail
over to virtualized workloads.
• For the most efficient virtual disaster recovery, an organization should copy VM workloads off-site
on a regular basis.

Jaya Nidhi Vashishtha Unit2 38


Virtualization Support & Disaster Recovery

Benefits of Virtual Disaster Recovery


• Virtualization provides flexibility in disaster recovery. When servers are virtualized, they are
containerized into VMs, independent from the underlying hardware.
• An organization does not need the same physical servers at the primary site as at its
secondary
disaster recovery site.

Jaya Nidhi Vashishtha Unit2 39


Recap

•Virtualization Structures:
• Virtualization Structures – Tools and Mechanisms
• Virtualization of CPU – Memory – I/O Devices
• Virtualization Support and Disaster Recovery.

Jaya Nidhi Vashishtha Unit2 40


Daily Quiz
2. What does the term "Virtualization Mechanism" 4. What challenge is addressed by I/O device
typically refer to? virtualization?
a) A strategy for creating physical hardware a) Ensuring that all virtual machines have direct access to
b) Techniques and components used to implement physical storage devices
virtualization, such as hypervisors and virtual machine b) Preventing communication between virtual machines
monitors c) Managing access to hardware resources among
c) A specific hardware-only solution for disaster recovery multiple virtual machines without conflict
d) Software used only for network security d) Reducing power usage of I/O devices
Answer: b) Techniques and components used to Answer: c) Managing access to hardware resources
implement virtualization, such as hypervisors and virtual among multiple virtual machines without conflict
machine monitors
5. How does virtualization enhance disaster recovery?
3. What is the primary role of CPU virtualization? a) By eliminating the need for data backups
a) To allow multiple CPUs to function as one b) By enabling quick recovery through virtual machine
b) To allow multiple virtual machines to share the physical replication and snapshot features
CPU resources efficiently c) By completely preventing hardware failures
c) To enhance the physical CPU's clock speed d) By creating redundant physical systems for every
d) To reduce the power consumption of CPUs application
Answer: b) To allow multiple virtual machines to share the Answer: b) By enabling quick recovery through virtual
physical CPU resources efficiently machine replication and snapshot features

Jaya Nidhi Vashishtha Unit2 41


MCQs

1) Does publish() method accepts arbitrary arguments.


(a) 5
(b) 3
(c) 1
(d) 2
2) Point out the wrong statement.
(a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
(b) Virtualization assigns a logical name for a physical resource and then provides a
pointer to that physical resource when a request is made
(c) None
(d) All of above
3) Publishing messages is handled through Class.
(e) Client()
(f) Server()
(g) Publish()
(h) Batch()

Jaya Nidhi Vashishtha Unit2 42


MCQs

1) Which of the following describes a message-passing taxonomy


for a component-based architecture that provides services to clients upon
demand?
a) SOA
b) EBS
c) GEC
d) All of the mentioned

2) SOA an extension of the Service Oriented Architecture to


respond to events that occur as a result of business processes.
a) 2
b) 3
c) 4
d) All of the above

3) Client() class provides to create topics.


a) Software
b) Classes
c) Methods
d) Batch
Jaya Nidhi Vashishtha Unit2 43
MCQs

4) What does CVE in SOA design stand for?


a) Casual Vector
b) Casual Machine
c) All of the above
d) None

5) The message in pub/sub is an opaque blob of .


e) Binomial
f) Canonical
g) Both
h) None

Jaya Nidhi Vashishtha Unit2 44


Previous Year Question Paper

2022-23
2023-24

Jaya Nidhi Vashishtha Cloud & Edge Computing


05/23/2025 45
Unit 3
Expected university question

1. What are different cloud enabling technologies?


2. What is the main purpose of service oriented architecture.
3. What are the 6 constraints of REST?
4. What are the different components of web services.
5. What do you mean by virtualization in cloud computing.
6. What is RESET and systems of systems?
7. Explain system of systems applications and examples.
8. What are the components of publish subscribe model?
9. How virtualization is used in cloud computing?
10. What is virtualization explain the virtualization of CPU and
memory?

Jaya Nidhi Vashishtha Unit2 46


Weakly Assignment

1) What are the different components of web services.


2) Define various types of virtualization.
3) Define Virtualization Structures
4) What is Service Oriented Architecture with example.
5) Explain the working of Web service.
6) Describe the characteristics of web services.
7) What is the key principle of Service-Oriented Architecture?
8) What is the role of broker in Publish Subscribe model?
9) What Are The Main Benefits Of SOA?
10) State the Pros and cons of Virtualization in Cloud Computing

Jaya Nidhi Vashishtha Unit2 47


Summary

This Unit consist of all the benefits of cloud and edge computing are-
• Service Oriented architecture : Rest & Systems of system

• Web Services : Publish Subscribe Model

• Basics of Virtualization : Types & Implementation

• Structures : Tools & Mechanisms

• Virtualization of CPU – Memory- I/O devices

• Virtualization : Support & Disaster Recovery

Jaya Nidhi Vashishtha Unit2 48


Reference

• https://en.wikipedia.org/wiki/Cloud_computing
• https://www.javatpoint.com/cloud-computing
• https://www.javatpoint.com/cloud-service-models
• https://www.javatpoint.com/cloud-service-provider-companies
• https://www.javatpoint.com/what-is-parallel-computing
• https://www.geeksforgeeks.org/introduction-to-parallel-computing/
• https://www.geeksforgeeks.org/evolution-of-cloud-computing/
• https://www.slideshare.net/joyschandran/underlying-principles-of-
parallel-and-distributed-computing
• https://www.techslang.com/definition/what-is-cloud-
provisioning/#:~:text=Also%20referred%20to%20as%20%E2%80%9Con,an
d%20down%20when%20demands%20decrease.

Jaya Nidhi Vashishtha Unit2 49


Jaya Nidhi Vashishtha Unit2 50
Jaya Nidhi Vashishtha
51

You might also like