Cloud Advocate v1

Comienza Ya. Es Gratis
ó regístrate con tu dirección de correo electrónico
Cloud Advocate v1 por Mind Map: Cloud Advocate v1

1. Introduction to the cloud

1.1. Definition

1.1.1. A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources

1.1.1.1. that can be rapidly provisioned and released with minimal management effort or service provider interaction.

1.1.2. Examples of Cloud Resources

1.1.2.1. Network

1.1.2.2. Servers

1.1.2.3. Storage

1.1.2.4. Applications

1.1.2.5. Services

1.1.3. Five Essential Caracteristics

1.1.3.1. On Demand Self Service

1.1.3.2. Broad Network Access

1.1.3.3. Resource Pooling Multi tenant Model

1.1.3.4. Rapid Elasticity

1.1.3.5. Measured Service Pay as you Go

1.1.4. Three types of Deployment Models

1.1.4.1. Public Cloud

1.1.4.1.1. Services and hardware published into internet, with usage shared with other ursers or companies

1.1.4.2. Private Cloud

1.1.4.2.1. Cloud Infrastructure is exclusive for an single organization, owned and managed by a single operator

1.1.4.3. Hybrid Cloud

1.1.4.3.1. Environment that connects a Private resource to a third party public service providers in a single and flexible infrastructure

1.1.5. Thre Service Models

1.1.5.1. Infrastructure-as-a-service (IaaS)

1.1.5.1.1. Provides phisical computing resources, such as servers, storages, networking, data center space, without manage the physical machine

1.1.5.2. Platform-as-a-service (PaaS)

1.1.5.2.1. Provides access into Hardware and Software Tools that is needed do develop and deploy applications to users over the Internet

1.1.5.3. Software-as-a-service (SaaS)

1.1.5.3.1. Complete software access to users over the internet

1.1.5.4. Multicloud

1.1.5.4.1. Mix of all other service models to provide to the customers the expected results to attend its clients accordingly.

1.1.6. Key Considerations for Cloud Computing

1.1.6.1. Key Drivers for Cloud Migration

1.1.6.1.1. Agility

1.1.6.1.2. Flexibility

1.1.6.1.3. Competitiveness

1.1.6.2. Organizations Developing Cloud Strategy

1.1.6.2.1. Infrastructure and Workloads Eliminates cost of building and operating Data Centers

1.1.6.2.2. Software-as-a-Service paying for application access is more viable than buying a off-the-shelf box and its required updates

1.1.6.2.3. Speed and Productivity Makes possible to get and deploy a new application in a few hours on cloud.

1.1.6.2.4. Cloud Dashboards Easy control and oversees of all resources with visibility and efficiency, using real-time statistics and active analytics tools

1.1.6.2.5. Risk Exposure Invest on Buying a new hardware versus rent resources. Pay-as-you-go model can bring opportunities to try and experiment with lower investment risks

1.1.6.3. Benefits of Cloud Adoption

1.1.6.3.1. Flexibility

1.1.6.3.2. Efficiency

1.1.6.3.3. Strategic Value

1.1.6.4. Challenges and Preceived Risks

1.1.6.4.1. Data Security

1.1.6.4.2. Governance and Sovereignity Issues

1.1.6.4.3. Legal, regulatory and compliance issues

1.1.6.4.4. lack of standardization

1.1.6.4.5. Choosing the right deployment services and resources

1.1.6.4.6. Partnering with the right cloud service providers

1.1.6.4.7. Business continuity and Disaster Recovery

1.1.7. Cloud Service Providers

1.1.7.1. Aliyun (Alibaba Cloud)

1.1.7.2. Amazon Web Services (AWS Cloud)

1.1.7.3. Google Cloud Platform (GCP)

1.1.7.4. IBM Cloud

1.1.7.5. Microsoft Azure

1.1.7.6. Oracle Cloud

1.1.7.7. Sales Force

1.1.7.8. System Analysis Program Development (SAP)

1.1.8. Check Your Knowledge

1.1.8.1. How does the National Institute of Standards and Technology (NIST) define cloud computing?

1.1.8.1.1. ( X ) A model for enabling convenient, on-demand network access to a shared pool of compute resources.

1.1.8.1.2. ( ) A model for delivering a dedicated pool of computing resources onpremises.

1.1.8.1.3. ( ) The capability to provide dedicated network access that can be provisioned in batch mode.

1.1.8.1.4. ( ) On-demand non-configurable computer resources that can be rapidly provisioned.

1.1.8.2. In which decade did the practice of time sharing or resource pooling evolve to make more efficient use of computing power via the mainframe?

1.1.8.2.1. ( X ) 1950s

1.1.8.2.2. ( ) 1960s

1.1.8.2.3. ( ) 1970s

1.1.8.2.4. ( ) 1980s

1.1.8.3. Which of the following best describes a computing environment that connects an organization’s on-premises private cloud and a third-party public cloud into a single flexible infrastructure for running applications and workloads?

1.1.8.3.1. ( ) Public

1.1.8.3.2. ( ) Private

1.1.8.3.3. ( X ) Hybrid

1.1.8.4. Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) are generally known as which of the following?

1.1.8.4.1. ( ) Engagement models

1.1.8.4.2. ( X ) Service models

1.1.8.4.3. ( ) Deployment models

1.1.8.4.4. ( ) Operation models

1.1.8.5. Which of the following separates virtual machines logically, assigning each its own slice of underlying computing power, memory, and storage, thus preventing the virtual machines from interfering with each other?

1.1.8.5.1. ( ) Microservice

1.1.8.5.2. ( ) Full stack

1.1.8.5.3. ( ) Application

1.1.8.5.4. ( D ) Hypervisor

1.1.8.6. Which of the following is another term used for the utility billing method?

1.1.8.6.1. ( ) Pay-in-advance

1.1.8.6.2. ( X ) Pay-as-you-go

1.1.8.6.3. ( ) Flat rate payment

1.1.8.6.4. ( ) Billing invoice

1.1.8.7. Access to infrastructure and physical computing resources such as servers, networking, storage, and data center space best describes which of the following?

1.1.8.7.1. ( ) Software-as-a-Service (SaaS)

1.1.8.7.2. ( ) Platform-as-a-Service (PaaS)

1.1.8.7.3. ( X ) Infrastructure-as-a-Service (IaaS)

1.1.8.7.4. ( ) Function as a Service (FaaS)

1.1.8.8. Which of the following cloud service providers specializes in Softwareas- a-Service (SaaS) focused on customer relationship management?

1.1.8.8.1. ( ) SAP

1.1.8.8.2. ( ) Oracle Cloud

1.1.8.8.3. ( X ) Salesforce

1.1.8.8.4. ( ) Google Cloud Services

1.1.8.9. Which one of the following is considered a perceived risk of cloud computing?

1.1.8.9.1. ( ) Infrastructure

1.1.8.9.2. ( ) Data security

1.1.8.9.3. ( ) Workloads

1.1.8.9.4. ( ) Managing assets

1.1.8.10. On-demand self-service, broad network access, resource pooling, rapid elasticity, and measured services are considered which of the following?

1.1.8.10.1. ( ) Five essential characteristics of a service provider according to IBV.

1.1.8.10.2. ( ) Five essential characteristics of compute options according to Gartner.

1.1.8.10.3. ( ) Five essential characteristics of deployment models according to ITG.

1.1.8.10.4. ( X ) Five essential characteristics of the cloud according to NIST.

1.2. Cloud Adoption and Emerging Technologies

1.2.1. Anyone can access computing capacity via cloud

1.2.2. An IBM Institute for Business Value study indicated more than three quarters of enterprises using some cloud computing to expand new industries

1.2.2.1. 74% To improve customers experience

1.2.2.2. 71% to create enhanced products and services downsizing legacy systems reducing costs

1.2.3. The remaining competitive business needs to respond quickly to the marketplace changes, predict customers' needs thru analytics, and apply this understanding to adapt their products and services.

1.2.4. Enablers for growth, agility and inovation:

1.2.4.1. Cognitively enabled Workflows

1.2.4.2. AI, Automation, IoT and Blochain, Hibrid Cloud and secured Multicloud Infrastructure

1.2.5. Power, Scalability, Flexibility, Pay-as-you-Go are foundations for transformation to cloud

1.2.6. The IDC (International Data Corporation) predicts by 2025 the total amount of digital data created worldwide will rise to 163 ZETTABYTES.

1.2.6.1. 30% of this data will be real time information

1.2.7. Case Studies

1.2.7.1. American Airlines

1.2.7.1.1. Need:

1.2.7.1.2. Resolution:

1.2.7.1.3. Results:

1.2.7.2. UBank

1.2.7.2.1. Need:

1.2.7.2.2. Resolution

1.2.7.2.3. Results:

1.2.7.3. Active Trades

1.2.7.3.1. Need:

1.2.7.3.2. Resolution:

1.2.7.3.3. Results:

1.2.8. Internet of Things on Cloud

1.2.8.1. What is it?

1.2.8.1.1. Connecting devices to the internet to systems or other devices

1.2.8.2. How It works?

1.2.8.2.1. Devices with built-in sensors connected to an IoT Platform

1.2.8.2.2. Which Integrates daras from different devices

1.2.8.2.3. Allows to apply analytics to share most valuable information with applications built to adress specific needs

1.2.8.3. Advantages of IoT

1.2.8.3.1. Access information

1.2.8.3.2. Control a device miles away in real time

1.2.8.3.3. Device communication is transparent

1.2.8.3.4. Data packet transfer - reduces time/cost

1.2.8.3.5. Reduces human intervention

1.2.8.3.6. Increases efficiency

1.2.8.4. Disadvantages of IoT

1.2.8.4.1. Security

1.2.8.4.2. Privacy

1.2.8.4.3. Complex Network

1.2.8.4.4. use of outdated firmware

1.2.8.4.5. Automation resulting decreasing job offers

1.2.8.4.6. Internet Walls - created for protection

1.2.9. Artificial Inteligence (AI) on the Cloud

1.2.9.1. What is it?

1.2.9.1.1. Combination of computer science and robust datasets to drive into complex problem solving.

1.2.9.1.2. Simulation of human intelligence in machines programmed to think like humans and mimic their actions.

1.2.9.2. Applicability?

1.2.9.2.1. IoT produces and delivers the data

1.2.9.2.2. AI empowers the insights

1.2.9.2.3. Cloud support the opperations providing scalability and processing empowerment to produce valuable information to the users.

1.2.9.3. Use Cases

1.2.9.3.1. US Tennis Association (USTA) - US Open

1.2.10. Blockchain

1.2.10.1. What Is It?

1.2.10.1.1. Secured, distributed, open technology to exchange transaction data applications

1.2.10.1.2. built-by transparency and traceability

1.2.10.1.3. Growing list of records,

1.2.10.1.4. Immutable Network Based on High level of Access control

1.2.10.1.5. Blockchain and AI wokrs together

1.2.10.2. Use Cases

1.2.10.2.1. Farmers in Salinas

1.2.10.2.2. Kone - Elevators, escalators, auto walks and automated doors

1.2.11. Check Your Knowledge

1.2.11.1. Which of the following provided the foundation for the transformation to the cloud?

1.2.11.1.1. A. The power, scalability, flexibility, and pay-as-you-go economics.

1.2.11.1.2. B. The need to provide compute resources for complex problems.

1.2.11.1.3. C. Faster go-to-market strategies were needed by organizations.

1.2.11.1.4. D. Enablement for growth, agility and innovation.

1.2.11.2. According to an IBM Institute for Business Value study what percentage of enterprises today are using cloud computing to expand into new industries?

1.2.11.2.1. A. 35 percent

1.2.11.2.2. B. 65 percent

1.2.11.2.3. C. 75 percent

1.2.11.2.4. D. 85 percent

1.2.11.3. As its client base grew, which of the following solutions did ActivTrades provision in order to cut latency, accelerate execution, and streamline the delivery of new functions?

1.2.11.3.1. A. It migrated three major systems from on-premises infrastructure to IBM Cloud for VMware solutions, backed by data storage, networking, and security offerings on the IBM Cloud.

1.2.11.3.2. B. It launched new initiatives in an IBM Cloud platform environment, including a virtual assistant that incorporates IBM Watson technology to support its online application service.

1.2.11.3.3. C. It migrated to an IBM Cloud environment, establishing a scalable hosting platform for low-latency delivery to enterprise customers around the world.

1.2.11.3.4. D. It recognized the opportunity to remove the constraints of their existing customer-facing applications based on monolithic code into cloud-nativebased microservices architecture on the cloud.

1.2.11.4. A secure, distributed and open technology with lower costs that builds transparency and traceability in transactional applications describes which of the following?

1.2.11.4.1. A. Analytics

1.2.11.4.2. B. Blockchain

1.2.11.4.3. C. Internet of Things

1.2.11.4.4. D. Artificial intelligence

1.2.11.5. An IBM retail client wants help with gathering data on their customers’ buying habits relative to their five top products. Which one of the following cloud services can be added to help support the client with this request?

1.2.11.5.1. A. Internet of Things

1.2.11.5.2. B. Blockchain

1.2.11.5.3. C. Artificial intelligence

1.2.11.5.4. D. Analytics

1.2.11.6. What type of relationship exists between IoT, AI, and the cloud?

1.2.11.6.1. A. Dependent

1.2.11.6.2. B. Independent

1.2.11.6.3. C. Synergistic

1.2.11.6.4. D. Symbiotic

1.2.11.7. Which of the following best describes the software application that continues to learn about user preferences based on the frequency of use?

1.2.11.7.1. A. Smart tech

1.2.11.7.2. B. Small sensor

1.2.11.7.3. C. Smart assistant

1.2.11.7.4. D. Data stack

1.2.11.8. The IDC predicts by the year 2025, the total amount of digital data created worldwide will rise to how many zettabytes?

1.2.11.8.1. A. 143

1.2.11.8.2. B. 153

1.2.11.8.3. C. 163

1.2.11.8.4. D. 173

1.2.11.9. In the use case examples which one of the following companies recognized the opportunity to remove the constraints of their existing customer-facing applications based on monolithic code into cloud-native-based microservices architecture on the cloud?

1.2.11.9.1. A. American Airlines

1.2.11.9.2. B. Bitly

1.2.11.9.3. C. UBank

1.2.11.9.4. D. ActivTrades

1.3. Cloud Computing Service and Deployment Models

1.3.1. Three Service Models

1.3.1.1. Infrastructure as a Service

1.3.1.1.1. The cloud provider manages the physical resources, data centers, cooling power, network, and security and the computing resources that include servers and storage.

1.3.1.1.2. Networking and storage resources have been virtualized by a vendor so a user can access and configure them the way they want.

1.3.1.1.3. User is also known by a persona. The persona for IaaS is the system admin or IT admin.

1.3.1.2. Platform as a Service

1.3.1.2.1. The cloud provider manages the platform infrastructure operating systems, development tools, databases, and business analytics.

1.3.1.2.2. The user or persona for a PaaS is a developer.

1.3.1.2.3. Essential Characteristics of PaaS

1.3.1.2.4. Use Cases for PaaS

1.3.1.2.5. Advantages of PaaS

1.3.1.2.6. Disadvantages of PaaS

1.3.1.2.7. PaaS MarketShare

1.3.1.3. Software as a Service

1.3.1.3.1. The cloud provider also hosts and manages the applications and data.

1.3.1.3.2. Software − the user doesn’t have to install or update; it is done by the provider.

1.3.1.3.3. Charged via a subscription model rather than a one time license fee.

1.3.1.3.4. User or persona for SaaS can be anyone.

1.3.1.3.5. Key Characteristics of SaaS

1.3.1.3.6. Advantages of SaaS

1.3.1.3.7. Disadvantages of SaaS

1.3.1.3.8. Use Cases for SaaS Organizations Are:

1.3.2. Deployment Models

1.3.2.1. Public Cloud

1.3.2.1.1. Characteristics of a Public Cloud

1.3.2.1.2. Features of Public Cloud

1.3.2.1.3. Public Cloud Providers

1.3.2.1.4. Benefits of the Public Cloud

1.3.2.1.5. Benefits of the Public Cloud

1.3.2.1.6. Risks Related to the Public Cloud

1.3.2.1.7. Use Cases for Public Cloud Organizations are:

1.3.2.2. Private Cloud

1.3.2.2.1. NIST defines private cloud as cloud infrastructure provisioned for exclusive use by a single organization comprising multiple consumers such as the business units within the organizations.

1.3.2.2.2. Characteristics

1.3.2.2.3. Benefits of a Private Cloud

1.3.2.2.4. Risks Related to the Private Cloud

1.3.2.2.5. Private Cloud Providers

1.3.2.2.6. Use Cases for Private Cloud Organizations are:

1.3.2.3. Hybrid Cloud

1.3.2.3.1. Connects an organization’s on-premises private cloud and third-party public cloud into a single, flexible infrastructure for running the organization’s applications and workloads

1.3.2.3.2. Key Tenets of Hybrid Cloud

1.3.2.3.3. Types of Hybrid Cloud

1.3.2.3.4. Benefits of the Hybrid Cloud

1.3.2.3.5. Use Cases for Hybrid Cloud Organizations are utilizing:

1.3.3. Check Your Knowledge

1.3.3.1. You have been working with a client to secure a business deal involving one of their infrastructure platforms; subsequently, they have decided to implement IaaS for the wide range of services it provides. Who will be the typical user for IaaS?

1.3.3.1.1. A. Site developer

1.3.3.1.2. B. System administrator

1.3.3.1.3. C. System engineer

1.3.3.1.4. D. Associate architect

1.3.3.2. In which of the following service models does the cloud service provider take responsibility for the installation, configuration, and operation of the application infrastructure?

1.3.3.2.1. A. IaaS

1.3.3.2.2. B. PaaS

1.3.3.2.3. C. SaaS

1.3.3.2.4. D. FaaS

1.3.3.3. Which of the following represents a use case for SaaS?

1.3.3.3.1. A. Leveraging it to avoid the need for ongoing upgrades, maintenance, and patching.

1.3.3.3.2. B. Organizations use it to develop, run, manage, and secure APIs and microservices.

1.3.3.3.3. C. Mine massive amounts of data sets to locate valuable patterns and trends.

1.3.3.3.4. D. To build, test, deploy, enhance, and scale applications rapidly and cost effectively.

1.3.3.4. It may be owned, managed, and operated by the organization, a third party, or some combination of those functions and may exist on or off premises identifies characteristics of which cloud deployment model?

1.3.3.4.1. A. Public Cloud

1.3.3.4.2. B. Private Cloud

1.3.3.4.3. C. Hybrid Cloud

1.3.3.5. Interoperability, scalability, and portability are key tenets of which one of the following cloud deployment models?

1.3.3.5.1. A. Public

1.3.3.5.2. B. Private

1.3.3.5.3. C. Hybrid

1.3.3.6. Which of the following is a benefit of the hybrid cloud deployment model?

1.3.3.6.1. A. It offers the most significant economies of scale.

1.3.3.6.2. B. It offers control of IT infrastructure.

1.3.3.6.3. C. It offers control access and security.

1.3.3.6.4. D. It offers resource optimization.

1.3.3.7. Which of the following describes a use case for the public cloud?

1.3.3.7.1. A. Using the flexibility it offers to build applications anywhere and move them anywhere without having to compromise security and compliance in the process.

1.3.3.7.2. B. Integrating data and application services from existing application.

1.3.3.7.3. C. Providing an opportunity to modernize and unify in-house and legacy applications.

1.3.3.7.4. D. Using it for computing resources to build secondary infrastructures for disaster recovery, data protection, and business continuity.

1.3.3.8. Which of the following describes a use case for the private cloud?

1.3.3.8.1. A. Providing an opportunity to modernize and unify an organization’s inhouse and legacy applications.

1.3.3.8.2. B. Lifting and shifting their on-premises virtualized workloads.

1.3.3.8.3. C. Taking advantage of the resilience and business continuity of the provider.

1.3.3.8.4. D. Creating richer and more personal experiences by combining new data sources.

1.3.3.9. A virtualized, multi-tenant architecture enabling tenants or users to share computing resources residing outside their firewalls best describes a characteristic for which cloud type?

1.3.3.9.1. A. Private cloud

1.3.3.9.2. B. Public cloud

1.3.3.9.3. C. Hybrid cloud

1.3.3.10. Which of the following is considered a use case for a public cloud?

1.3.3.10.1. A. Using the flexibility to build applications anywhere and move them anywhere without having to compromise security and compliance in the process.

1.3.3.10.2. B. Upgrading the user experience of the on-premises applications and deploying them globally to new devices while incrementally modernizing core business systems.

1.3.3.10.3. C. Increasingly opting to access cloud-based applications and platforms so an organization’s teams can focus on building and testing applications and platforms, thus reducing time-to-market for their products and services.

1.3.3.10.4. D. “Lifting and Shifting” an organization’s on-premises virtualized workloads without conversion or modification to reduce their on-premises data center footprint and position themselves to scale without added capital expense.

1.4. Components of Cloud Computing

1.4.1. Cloud Infrastructure

1.4.1.1. Regions

1.4.1.1.1. Geographical region where Cloud Data Centers are clustered

1.4.1.1.2. The Regions are isolated from another, so if it`s impacted by a natural disaster

1.4.1.1.3. Regions may have names such as NA (North America) South or US (United States) West

1.4.1.2. Zones

1.4.1.2.1. Each cloud region can have multiple zones (also known as availability zones or AZ)

1.4.1.2.2. Zones are typically distinct data centers with their own power, cooling, and networking resources

1.4.1.3. Data Centers

1.4.1.3.1. A huge warehouse or room containing cloud infrastructure equipment.

1.4.1.3.2. Contain pods and racks or standardized containers of computing resources such as servers plus storage and networking equipment

1.4.1.4. Computing Resources

1.4.1.4.1. Virtual Servers

1.4.1.4.2. Bare Metal Servers

1.4.1.4.3. Serverless

1.4.1.4.4. Storage

1.4.1.4.5. Networking infrastructure

1.4.1.4.6. Types of Virtual Machines

1.4.1.4.7. Bare Metal Servers

1.4.1.4.8. Containers

1.4.2. Check Your Knowledge

1.4.2.1. Which one of the following layers is considered the foundation of the cloud?

1.4.2.1.1. A. Control layer

1.4.2.1.2. B. Orchestration layer

1.4.2.1.3. C. Infrastructure layer

1.4.2.1.4. D. Application layer

1.4.2.2. Which of the following is known as distinct data centers with their own power, cooling, and networking resources?

1.4.2.2.1. A. Zones

1.4.2.2.2. B. Regions

1.4.2.2.3. C. Domains

1.4.2.2.4. D. Locals

1.4.2.3. Which of the following are characteristics of a region? Identify all that apply.

1.4.2.3.1. A. Has a name such as NA South or US East.

1.4.2.3.2. B. Is isolated from other regions, so if one was impacted by a natural disaster, the cloud operations in others would continue to function.

1.4.2.3.3. C. The cloud’s overall fault tolerance decreases latency and avoids creating a single shared point of failure.

1.4.2.3.4. D. A geographic area or location where a cloud provider’s infrastructure is clustered.

1.4.2.4. Which one of the following is a characteristic of both a bare metal server and a virtual server?

1.4.2.4.1. A. Commonly used in traditional data centers, but often struggle with scale.

1.4.2.4.2. B. Provisioned with default storage in local drives.

1.4.2.4.3. C. Used to enhance the functionality and management of web pages.

1.4.2.4.4. D. Enable users to request information from applications.

1.4.2.5. What is the function of a hypervisor?

1.4.2.5.1. A. Used to connect availability zones and regions.

1.4.2.5.2. B. Distributes content to multiple points throughout the world so users can access.

1.4.2.5.3. C. Pulls resources from the physical server and allocate them to a virtual environment.

1.4.2.5.4. D. An executable unit of software in which application code is packaged.

1.4.2.6. What is another name given to a Type 2 hypervisor?

1.4.2.6.1. A. Bare metal

1.4.2.6.2. B. Single tenant

1.4.2.6.3. C. Dynamic LPAR

1.4.2.6.4. D. Hosted

1.4.2.7. Virtual servers and virtual instances are two terms used synonymously in the IBM Cloud with which of the following?

1.4.2.7.1. A. Virtual machines

1.4.2.7.2. B. Virtual service

1.4.2.7.3. C. Virtual platform

1.4.2.7.4. D. Virtual resources

1.4.2.8. What type of server satisfies workload examples such as ERP, CRM, AI, deep learning and virtualization?

1.4.2.8.1. A. dBase

1.4.2.8.2. B. Bare metal

1.4.2.8.3. C. Virtual machine

1.4.2.8.4. D. LPAR

1.4.2.9. VMware, ESXi, Microsoft Hyper-v, and open-source KVM are some examples of which Type of hypervisor?

1.4.2.9.1. A. 1

1.4.2.9.2. B. 2

1.4.2.9.3. C. 3

1.4.2.9.4. D. 4

1.4.2.10. Which of the following is added to the network to enable users’ access to the application in the internet tier?

1.4.2.10.1. A. IP address

1.4.2.10.2. B. Cloud network

1.4.2.10.3. C. Private gateway

1.4.2.10.4. D. Public gateway

1.4.2.11. What is the main difference between deploying a network in an on-premises data center and deploying a cloud network?

1.4.2.11.1. A. Peripheral devices

1.4.2.11.2. B. Standard devices

1.4.2.11.3. C. Physical devices

1.4.2.11.4. D. Material devices

1.4.2.12. Portability, scalability, streamlined development and deployment of cloudnative applications and architectures are some of the advantages of which one of the following components?

1.4.2.12.1. A. Networks

1.4.2.12.2. B. Containers

1.4.2.12.3. C. Servers

1.4.2.12.4. D. Storage

1.5. Module 5: Cloud Computing Storage and Content Delivery Networks

1.5.1. Is a computer model where data and files are stored in digital format in the cloud.

1.5.2. Four types of cloud storage

1.5.2.1. Direct Attached

1.5.2.1.1. Referred to as local storage.

1.5.2.1.2. Presented to a cloud-based server – sits either within the host server chassis or within the same rack.

1.5.2.1.3. Storage is fast and normally used to store a server’s operating system.

1.5.2.1.4. Operating system is “Ephemeral” – it only lasts as long as the compute resource is attached to it. It is deleted after the virtual instance is terminated.

1.5.2.1.5. Cannot be shared with other nodes.

1.5.2.1.6. Redundant array of independent disk (RAID) techniques can be used. It is not as resilient to failure as other types of storage.

1.5.2.1.7. Disadvantage

1.5.2.2. File

1.5.2.2.1. File storage must be attached to a compute node before it can be accessed and have data stored on it.

1.5.2.2.2. Presented as network file system (NFS) − means the storage is connected to compute nodes over a standard ethernet network. Also referred to as network attached storage, network file storage or simply NFS.

1.5.2.2.3. Can be mounted or used on multiple servers at once.

1.5.2.2.4. Extremely resilient to failure and the data is far more secure because the storage appliances offer services such as encryption in transit and encryption at rest.

1.5.2.2.5. Involves less disk management and maintenance.

1.5.2.2.6. File Storage is mounted to compute nodes via an ethernet network.

1.5.2.2.7. Tends to be slower than Direct Attached or block storage because it travels over an ethernet network.

1.5.2.2.8. Allows for larger amounts of storage to be provisioned. It can be presented as a disk to a server.

1.5.2.2.9. It tends to be used for workloads where consistently high network speeds are not a requirement.

1.5.2.2.10. File storage is a good choice where file shares are required, where workloads do not require lightning-fast connectivity to storage, or where cost is a factor.

1.5.2.2.11. Works well for organizing data in a hierarchical folder structure.

1.5.2.2.12. It is less expensive than direct attached or block storage.

1.5.2.2.13. Input/Output operations per second (IOPS) − refers to the speed at which the disks can write and read data (not the speed of the network between storage and the compute node). The higher the IOPS value, the faster the speed of the underlying disk. A higher IOPS will also normally cost more. Understanding IOPS is important because if the IOPS value is too low for your application, the storage can become a bottleneck and cause your application to run slowly.

1.5.2.2.14. Disadvantages

1.5.2.3. Block

1.5.2.3.1. Block storage breaks files into chunks (or blocks) of data and stores each block separately under a unique address.

1.5.2.3.2. Suitable for databases and other applications where disk speed is important.

1.5.2.3.3. Normally mounted onto only one compute node at a time. Since these disks run at a consistent high speed, they are perfect for workloads that need consistently fast storage (e.g., databases and mail servers). Perfect for workloads that need low-latency storage to work effectively.

1.5.2.3.4. Presented to compute nodes using high-speed fiber connections, meaning read/write speeds are faster and reliable.

1.5.2.3.5. It is mounted as a volume to compute nodes using a dedicated network of fibers, through which signals move at the speed of light. The fiber optic networks are more expensive to build – one reason why block storage tends to have a higher price-point.

1.5.2.3.6. Infinite in size to the end user. Great repository for all sorts of unstructured data types – videos, logs, backups, data from IoT, application binaries, and virtual machine images.

1.5.2.3.7. Highly available and resilient and will often include data encryption at rest and in transit.

1.5.2.3.8. Provisioned in ‘volumes’ which can then be mounted onto a compute node.

1.5.2.3.9. Input/output operations per second (IOPS) – how quickly data can be read or written to the storage. A consideration when provisioning block storage.

1.5.2.3.10. Persistent – will not be deleted and data are preserved and available.

1.5.2.3.11. Disadvantages

1.5.2.4. Object

1.5.2.4.1. Accessed via an application program interface (API) – it is not attached to a compute node.

1.5.2.4.2. Infinite in size to the end user. Great repository for all sorts of unstructured data types – videos, logs, backups, data from IoT, application binaries and virtual machine images (unstructured means not stored in in any kind of hierarchical folder or directory structure).

1.5.2.4.3. Object storage uses buckets and objects are stored within these buckets in a structurally flat way. You can provision multiple buckets, however, you cannot place buckets within buckets.

1.5.2.4.4. Customer consumes the storage needed and pays (per gigabyte) for what is consumed.

1.5.2.4.5. Slowest in terms of read and write speeds.

1.5.2.4.6. Used to store files that are static.

1.5.2.4.7. The least expensive of the storage models.

1.5.2.4.8. Disadvantages

1.5.2.5. Content Delivery Networks (CDNs)

1.5.2.5.1. A distributed server network that delivers temporarily stored, or cached, copies of website content to users based on the users’ geographical location.

1.5.2.5.2. A CDNs stores content in distributed locations and reduces the distance between website visitors and the website server.

1.5.2.5.3. A service that accelerates internet content delivery. Its main benefit is that it makes websites faster.

1.5.2.5.4. Benefits

1.5.3. Check Your Knowledge

1.5.3.1. Direct attached, file, block, and object are considered which one of the following?

1.5.3.1.1. A. Types of containers

1.5.3.1.2. B. Types of networks

1.5.3.1.3. C. Types of tiers

1.5.3.1.4. D. Types of cloud storage

1.5.3.2. Which type of storage is also referred to network attached storage, network file storage, or simply NFS?

1.5.3.2.1. A. Direct attached

1.5.3.2.2. B. File

1.5.3.2.3. C. Block

1.5.3.2.4. D. Object

1.5.3.3. Poor performance when data needs to be shared is considered a disadvantage of which of the following types of storage?

1.5.3.3.1. A. Direct attached

1.5.3.3.2. B. File

1.5.3.3.3. C. Block

1.5.3.3.4. D. Object

1.5.3.4. Highly available and resilient and will often include data encryption at rest and in transit are characteristics attached to what type of storage?

1.5.3.4.1. A. Direct attached

1.5.3.4.2. B. File

1.5.3.4.3. C. Block

1.5.3.4.4. D. Object

1.5.3.5. Which type of storage is accessed via an application program interface (API) and is not attached to a compute node?

1.5.3.5.1. A. Direct attached

1.5.3.5.2. B. File

1.5.3.5.3. C. Block

1.5.3.5.4. D. Object

1.5.3.6. Which one of the following describes a characteristic of object storage?

1.5.3.6.1. A. Provisioned in volumes which can then be mounted onto a compute node.

1.5.3.6.2. B. A great repository for all sorts of unstructured data types.

1.5.3.6.3. C. Storage is fast and normally used to store a server’s operating system.

1.5.3.6.4. D. Involves less disk management and maintenance.

1.5.3.7. Which one of the following describes a characteristic of direct attached storage?

1.5.3.7.1. A. Offers infinite capacity as you can keep adding files to it.

1.5.3.7.2. B. Is typically provisioned in volumes.

1.5.3.7.3. C. Is mounted to compute nodes via an ethernet network.

1.5.3.7.4. D. The operating system only last as long as the compute resource is attached to it.

1.5.3.8. What is the purpose of a content delivery network (CDN)?

1.5.3.8.1. A. To accelerate read and write speeds.

1.5.3.8.2. B. To protect content delivered over a network.

1.5.3.8.3. C. To make websites faster and more responsive.

1.5.3.8.4. D. To safeguard backup and disaster recovery.