Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
114 views

Accenture Networking and Cloud Computing

I cloud network

Uploaded by

infodaya14
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views

Accenture Networking and Cloud Computing

I cloud network

Uploaded by

infodaya14
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 81

Java Networking

Java Networking is a concept of connecting two or more computing devices


together so that we can share resources.
Java socket programming provides facility to share data between
different computing devices.

Advantage of Java Networking


sharing resources
centralize software management
Java Networking Terminology

IP Address
Protocol
Port Number
MAC Address
Connection-oriented and connection-less protocol
Socket
IP Address

IP address is a unique number assigned to a node of a network e.g.

192.168.0.1 .

It is composed of octets that range from 0 to 255.

It is a logical address that can be changed.


Protocol

A protocol is a set of rules basically that is followed for communication.


For example:

TCP
FTP
Telnet
SMTP
POP etc
Port Number

The port number is used to uniquely identify different applications.

It acts as a communication endpoint between applications.

The port number is associated with the IP address for communication between

two applications
Connection-oriented and connection-
less protocol

In connection-oriented protocol, acknowledgment is sent by the receiver.

So it is reliable but slow.

An example of a connection-oriented protocol is TCP.

But, in the connection-less protocol, acknowledgment is not sent by the receiver.

So it is not reliable but fast.

An example of a connection-less protocol is UDP


The java.net package

A Low Level API, which deals with the following abstractions:

Addresses, which are networking identifiers, like IP addresses.

Sockets, which are basic bidirectional data communication mechanisms.

Interfaces, which describe network interfaces.


The java.net package

A High-Level API, which deals with the following abstractions:

URIs, which represent Universal Resource Identifiers.

URLs, which represent Universal Resource Locators.

Connections, which represent connections to the resource pointed to by

the URL
The java.net package

A High-Level API, which deals with the following abstractions:

URIs, which represent Universal Resource Identifiers.

URLs, which represent Universal Resource Locators.

Connections, which represent connections to the resource pointed to by

the URL
How does www work?
http

7. Application Layer- The application layer is used by end-user software

6. Presentation Layer - The presentation layer prepares data for the application layer.

5. Session Layer- The session layer creates communication channels, called sessions,
between devices.
http

4. Transport Layer - The transport layer takes data transferred in the session layer and breaks it into
“segments” on the transmitting end.

3. Network Layer - The network layer has two main functions. One is breaking up segments into
network packets, and reassembling the packets on the receiving end.

2. Data Link Layer - The data link layer establishes and terminates a connection between two
physically-connected nodes on a network.

1. Physical Layer - The physical layer is responsible for the physical cable or wireless connection
between network nodes.
http

• The client is a web browser which communicates with the web server which hosts the
website.

• http protocol defines how messages are formatted and transmitted and what actions the
Web Server and browser should take in response to different commands.

• When you enter a URL in the browser, an HTTP command is sent to the Web server, and
it transmits the requested Web Page.
http

• When we open a website using a browser, a connection to the web server is opened, and
the browser communicates with the server through HTTP and sends a request.

• HTTP is carried over TCP/IP to communicate with the server.

• The server processes the browser's request and sends a response, and then the
connection is closed.

• Thus, the browser retrieves content from the server for the user.
Browser

• A web browser, which is commonly known as a browser, is a program that displays text,
data, pictures, videos, animation, and more.

• It provides a software interface that allows you to click hyperlinked resources on the
World Wide Web.

• When you double click the Browser icon installed on your computer to launch it, you get
connected to the World Wide Web and can search Google or type a URL into the address
bar
Browser

• In the beginning, browsers were used only for browsing due to their limited potential.

• Today, they are more advanced

• Some of the commonly used browsers include Google Chrome, Mozilla Firefox, Internet
Explorer, Safari, and more.
Request and Response

• Each interaction between the client and server is called a message.

• HTTP messages are requests or responses.

• Client devices submit HTTP requests to servers, which reply by sending HTTP responses
back to the clients.
HTTP request

● This is when a client device, such as an internet browser, asks the server for the

information needed to load the website.

● The request provides the server with the desired information it needs to tailor its

response to the client device.


http request

Each HTTP request contains encoded data, with information such as

• The specific version of HTTP followed. HTTP and HTTP/2 are the two versions.

• A URL. This points to the resource on the web.

• An HTTP method. This indicates the specific action the request expects to receive
from the server in its response.

• HTTP request headers. This includes data such as what type of browser is being used
and what data the request is seeking from the server. It can also include cookies,
which show information previously sent from the server handling the request.

• An HTTP body. This is optional information the server needs from the request, such
as user forms -- username/password logins, short responses and file uploads -- that
are being submitted to the website.
HTTP response

The HTTP response message is the data received by a client device from the web server.

As its name suggests, the response is the server's reply to an HTTP request. The

information contained in an HTTP response is tailored to the context the server received

from the request.


HTTP response

HTTP responses typically include the following data:

1. HTTP status code, which indicates the status of the request to the client device.
Responses may indicate success, an informational response, a redirect, or errors on
the server or client side.

2. HTTP response headers, which send information about the server and requested
resources.

3. An HTTP body: If a request is successful, this contains the requested data in the
form of HTML code, which is translated into a web page by the client browser.
HTTP response-status codes

In response to HTTP requests, servers often issue response codes, indicating the
request is being processed, there was an error in the request or that the request is
being redirected. Common response codes are:
Client and server

A client and server networking model is a model in which computers such as servers
provide the network services to the other computers such as clients to perform a user
based tasks. This model is known as client-server networking model.
Client and server

• An application program is known as a client program, running on the local machine


that requests for a service from an application program known as a server program,
running on the remote machine.

• A client program runs only when it requests for a service from the server while the
server program runs all time as it does not know when its service is required.

• A server provides a service for many clients not just for a single client.

• Therefore, we can say that client-server follows the many-to-one relationship.

• Services are required frequently, and many users have a specific client-server
application program.
Client and server

• A client is a program that runs on the local machine requesting service from the
server. A client program is a finite program means that the service started by the
user and terminates when the service is completed.

• Similarly, when we talk the word Servers, It mean a person or medium that serves
something. Similarly in this digital world a Server is a remote computer which
provides information (data) or access to particular services.
Client and server

• User enters the URL of the website or file. The Browser then requests the DNS
Server.
• DNS Server lookup for the address of the WEB Server.
• DNS Server responds with the IP address of the WEB Server.
• Browser sends over an HTTP/HTTPS request to WEB Server’s IP
• Server sends over the necessary files of the website.
• Browser then renders the files and the website is displayed. This rendering is
done with the help of DOM interpreter, CSS interpreter and JS Engine collectively
known as the JIT Compilers.
Client and server
• An application program is known as a client program,
running on the local machine that requests for a service
from an application program known as a server program,
running on the remote machine.

• A client program runs only when it requests for a


service from the server while the server program runs
all time as it does not know when its service is
required.

• A server provides a service for many clients not just


for a single client.

• Therefore, we can say that client-server follows the


many-to-one relationship.

• Services are required frequently, and many users have a


specific client-server application program.
CLOUD COMPUTING
Objective

• Introduction to Cloud Computing


• Cloud Computing Architecture
• Cloud Computing Technologies
• Cloud Computing Vs Grid Computing
• Cloud Computing Applications
• Types of Cloud
Introduction to Cloud Computing

The term cloud refers to a network or the internet.


It is a technology that uses remote servers on the internet to store, manage, and
access data online rather than local drives.
The data can be anything such as files, images, documents, audio, video, and more.

There are the following operations that we can do using cloud computing:
• Developing new applications and services
• Storage, back up, and recovery of data
• Hosting blogs and websites
• Delivery of software on demand
Why cloud computing
Characteristics of Cloud Computing

1) Agility
2) High availability and reliability
3) High Scalability
4) Multi-Sharing
5) Device and Location Independence
6) Maintenance
7) Low Cost
8) Services in the pay-per-use mode
Advantages of cloud computing
Disadvantages of cloud computing

1) Internet Connectivity

2) Vendor lock-in

3) Limited Control

4) Security
Cloud Computing Architecture

• Cloud computing technology is used by both small and large organizations to store
the information in cloud and access it from anywhere at anytime using the internet
connection.
• Cloud computing architecture is a combination of service-oriented architecture and
event-driven architecture
• Cloud computing architecture is divided into the following two parts -
• Front End
• Back End
Cloud Computing Architecture
Cloud Computing Architecture

1. Client Infrastructure
Client Infrastructure is a Front end component. It provides GUI (Graphical User
Interface) to interact with the cloud.

2. Application
The application may be any software or platform that a client wants to access.

3. Service
A Cloud Services manages that which type of service you access according to the
client’s requirement.
Cloud Computing Architecture

4. Runtime Cloud
Runtime Cloud provides the execution and runtime environment to the virtual machines.

5. Storage
Storage is one of the most important components of cloud computing. It provides a huge
amount of storage capacity in the cloud to store and manage data.

6. Infrastructure
It provides services on the host level, application level, and network level.

7. Management
Management is used to manage components such as application, service, runtime cloud,
storage, infrastructure, and other security issues in the backend and establish
coordination between them.
Types of Cloud
Private cloud

• Private cloud is also known as an internal cloud or corporate cloud.


• It is used by organizations to build and manage their own data centers internally
or by the third party.
• It can be deployed using Open Source tools such as Openstack.
Advantages Of Private Cloud

1) More Control

Private clouds have more control over their resources and hardware than public clouds

because it is only accessed by selected users.

2) Security & privacy

Security & privacy are one of the big advantages of cloud computing. Private cloud

improved the security level as compared to the public cloud.

3) Improved performance

Private cloud offers better performance with improved speed and space capacity.
Disadvantages Of Private Cloud

1) High cost
The cost is higher than a public cloud because set up and maintain hardware resources
are costly.

2) Restricted area of operations


As we know, private cloud is accessible within the organization, so the area of
operations is limited.

3) Limited scalability
Private clouds are scaled only within the capacity of internal hosted resources.

4) Skilled people
Skilled people are required to manage and operate cloud services.
Public cloud

● Public Cloud provides a shared platform that is accessible to the general public
through an Internet connection.
● Public cloud operated on the pay-as-per-use model and administered by the third
party, i.e., Cloud service provider.
● In the Public cloud, the same storage is being used by multiple users at the same
time.
Advantages of Public Cloud

1) Low Cost

Public cloud has a lower cost than private, or hybrid cloud, as it shares the same

resources with a large number of consumers.

2) Location Independent

Public cloud is location independent because its services are offered through the

internet.

3) Quickly and easily set up

Organizations can easily buy public cloud on the internet and deployed and configured

it remotely through the cloud service provider within a few hours.

4) Business Agility

Public cloud provides an ability to elastically re-size computer resources based on


Disadvantages of Public Cloud

1) Low Security

Public Cloud is less secure because resources are shared publicly.

2) Performance

In the public cloud, performance depends upon the speed of internet connectivity.

3) Less customizable

Public cloud is less customizable than the private cloud.


Hybrid Cloud

1. Hybrid cloud is a combination of public and private

clouds.

2. The main aim to combine these cloud (Public and

Private) is to create a unified, automated, and well-

managed computing environment.

3. In the Hybrid cloud, non-critical activities are

performed by the public cloud and critical activities are

performed by the private cloud.

4. The best hybrid cloud provider companies are Amazon,

Microsoft, Google, Cisco, and NetApp.


Advantages of Hybrid Cloud

1) Flexible and secure


It provides flexible resources because of the public cloud and secure resources
because of the private cloud.
2) Cost effective
Hybrid cloud costs less than the private cloud. It helps organizations to save costs
for both infrastructure and application support.
3) Cost effective
It offers the features of both the public as well as the private cloud. A hybrid cloud
is capable of adapting to the demands that each company needs for space, memory, and
system.
4) Security
Hybrid cloud is secure because critical activities are performed by the private cloud.
5) Risk Management
Hybrid cloud provides an excellent way for companies to manage the risk.
Disadvantages of Hybrid Cloud

1) Networking issues
In the Hybrid Cloud, networking becomes complex because of the private and the public
cloud.

2) Infrastructure Compatibility
Infrastructure compatibility is the major issue in a hybrid cloud. With dual-levels of
infrastructure, a private cloud controls the company, and a public cloud does not, so
there is a possibility that they are running in separate stacks.

3) Reliability
The reliability of the services depends on cloud service providers
Advantages of Community Cloud

Cost effective
Community cloud is cost effective because the whole cloud is shared between several
organizations or a community.

Flexible and Scalable


The community cloud is flexible and scalable because it is compatible with every user.
It allows the users to modify the documents as per their needs and requirement.

Security
Community cloud is more secure than the public cloud but less secure than the private
cloud.

Sharing infrastructure
Community cloud allows us to share cloud resources, infrastructure, and other
capabilities among various organizations.
Disadvantages of Community Cloud

Community cloud is not a good choice for every organization.

Slow adoption of data

The fixed amount of data storage and bandwidth is shared among all community members.

Community Cloud is more costly than the public cloud.

Sharing responsibilities among organizations is difficult.


Question-1

In which of the following the hypervisor is installed on a physical


server (host) and a guest OS?

1. Software assisted full virtualization


2. Hardware assisted full virtualization
3. Para virtualization
A)2 and 3
B)1,2 and 3
C) only 3
D) 1 and 2
Question-2

Which class of IP address is shown below?

142.200.226.202

A)class C
B)class A
C)class B
D)class D
Question-3

Which class of IP address is shown below?

142.200.226.202

A)class C
B)class A
C)class B
D)class D
Question-4

Which of the following statement is correct for variable size framing in


data link layer?

1.A length field can be introduced in the frame to indicate the length
of the frame
2.End of the frame need to be defined
3.Beginning of the next frame need to be defined

A)1 and 2
B)1 and 3
C)1,2 and 3
D) 2 and 3
Question-5

In cloud computing, the concept of__________helps in pooling and sharing


of resources.

A)Polymorphism
B)Virtualization
C)Abstraction
D)All of the mentioned options
Question-6

A stateful firewall maintains which of the following list of active


connections?

A)Bridging table
B)State table
C)Routing table
d.Connection table
Question-7

Which of the following information is present in the ipv4 header but not
in IPv6 header?

A)Address Format
B)Time to Live
C)HOP limit
d.Version
Question-8

The size of an IP address in IPv6 is

A)4 bytes
B)8 bytes
C)128 bytes
d.100 bytes
Question-9

Which of the following is a 2 port networking device?


1.Repeater
2.Hub
3.Bridge

A)1 and 2
B)1 and 3
C) 1,2 and 3
D) 2 and 3
Question-10

Find the Hamming distance between 11111000 and 10000111?

A)5 B)4 C)6 D)7


Question-11

In P2P file sharing the peers request files from other peers by
establishing-
A)TCP connections
B)HTTP connections
C)FTP connections
D)SMTP connections
Question-12

Microsoft Azure is an example of which of the following type of cloud


service model?

A)IDaaS
B)IaaS
C)PaaS
D)SaaS
Question-13

Which of the following implementation(s) uses UDP as a transport layer


protocol?

A)DNS
B)SMTP
C)HTTPS
D)HTTP
Question-14

Which of the following layer decides the ideal topology type for node
arrangement in network?

A)Physical layer
B)Transport layer
C)presentation layer
D)network layer
Question-15

Which of the following are the examples of PaaS model of cloud?

1. AWS Elastic Beanstalk


2. Windows Azure
3.Heroku

A)1 and 2
B)1 and 3
C)1,2 and 3
D)2 and 3
Question-16

Which of the following statement is correct for Time division


multiplexing?

1. Statistical TDM makes efficient use of the bandwidth only if the


arrival pattern of the data stream is probabilistic.
2. TDM requires the transmitter and receiver to be synchronized
periodically.
3.It is used in radio and television transmission
A)1 and 2
B)1 and 3
C)1,2 and 3
D)2 and 3
Question-17

Which of the following tasks is not done by data link layer?

A)framing
B)error control
C)flow control
D)channel coding
Question-18

Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-
bit jamming signal is 46.4 ms. The minimum frame size is

A)45.2 bits
B)52.2 bits
C)452 bits
D)512 bits
Question-19

Which of the following is private IP address?

A)12.0.0.1
B)168.172.19.39
C)172.15.14.36
D)192.168.24.43
Question-20

Which of the following cloud computing service model provides runtime


environments and deployment tools for applications?

A)PaaS (platform-As-A-Service)
B)SaaS(Software-As-A-Service)
C)IaaS(Infrastructure-As-A-Service)
D)All of the mentioned options
Question-21

Which of the following cloud computing service model is used by network


architects?
A)PaaS (platform-As-A-Service)
B)SaaS(Software-As-A-Service)
C)IaaS(Infrastructure-As-A-Service)
D)All of the mentioned options
Question-22

Which of the following network device uses Media Access Control(MAC)

addresses for transferring frames?

A)Repeater

B)Router

C)Switch

D)Bridge
Question-23

In Distance vector routing bandwidth required is less than Link state routing

due to 1. Local Sharing

2. Small packets

3. Flooding

A)1 and 3

B)1 and 2

C)1,2 and 3

D)2 and 3
Question-24

Which of the following encryption algorithm use Block cipher with the 16 bytes

data block?

A)Data Encryption Standard

B)Advanced Encryption Standard

C)Rivest Cipher 4

D)None of the above


Question-25

If you have to encrypt the message in the Advance Encryption Algorithm

(AES) which consists of 12 rounds then what is the size of the key to

encrypt the message?

A)192 bits

B)256 bits

C)127 bits

D)128 bits
Question-26

Which characteristics of cloud is used to increase or decrease the

resources based on the requirements?

A)Metered usage

B)Rapid elasticity

C)On-demand self-service

D)None of the above


Question-27

Which of the following option is correct based on the following statements?

Statement 1: Wired Equivalent Privacy uses the initialization vector (IV)

method.

Statement 2: Wired Equivalent Privacy uses the AES algorithms to encrypt the

data.

Statement 3: Wired Equivalent Privacy were initially restricted to 64-bit

encryption only.

Statement 4: Wi-Fi protected Access II uses 384-bit Hashed Message

Authentication Mode.

A)Only 1 and 3 are true

B)Only 2 and 4 are true


Question-28

You are using two prime numbers 13(P) and 11(Q) to generate public and private

key in RSA cryptosystem. If the public key is 37 then find the private key.

A)19

B)11

C)25

D)13
Question-29

In EC2 the users can choose which of the following configuration of the virtual

machine

1.RAM size

2.Local disk size

3.Processor speed

A)1 and 3

B)1 and 2

C)1,2 and 3

D)2 and 3
Question-30

Which of the following statement(s) is/are correct for SaaS?

1. SaaS makes the software available over the internet

2. The software and the service are monitored and maintained by the

vendor

A)Neither 1 nor 2

B)Both 1 and 2

C)only 1

D)only 2

You might also like