Accenture Networking and Cloud Computing
Accenture Networking and Cloud Computing
IP Address
Protocol
Port Number
MAC Address
Connection-oriented and connection-less protocol
Socket
IP Address
192.168.0.1 .
TCP
FTP
Telnet
SMTP
POP etc
Port Number
The port number is associated with the IP address for communication between
two applications
Connection-oriented and connection-
less protocol
the URL
The java.net package
the URL
How does www work?
http
6. Presentation Layer - The presentation layer prepares data for the application layer.
5. Session Layer- The session layer creates communication channels, called sessions,
between devices.
http
4. Transport Layer - The transport layer takes data transferred in the session layer and breaks it into
“segments” on the transmitting end.
3. Network Layer - The network layer has two main functions. One is breaking up segments into
network packets, and reassembling the packets on the receiving end.
2. Data Link Layer - The data link layer establishes and terminates a connection between two
physically-connected nodes on a network.
1. Physical Layer - The physical layer is responsible for the physical cable or wireless connection
between network nodes.
http
• The client is a web browser which communicates with the web server which hosts the
website.
• http protocol defines how messages are formatted and transmitted and what actions the
Web Server and browser should take in response to different commands.
• When you enter a URL in the browser, an HTTP command is sent to the Web server, and
it transmits the requested Web Page.
http
• When we open a website using a browser, a connection to the web server is opened, and
the browser communicates with the server through HTTP and sends a request.
• The server processes the browser's request and sends a response, and then the
connection is closed.
• Thus, the browser retrieves content from the server for the user.
Browser
• A web browser, which is commonly known as a browser, is a program that displays text,
data, pictures, videos, animation, and more.
• It provides a software interface that allows you to click hyperlinked resources on the
World Wide Web.
• When you double click the Browser icon installed on your computer to launch it, you get
connected to the World Wide Web and can search Google or type a URL into the address
bar
Browser
• In the beginning, browsers were used only for browsing due to their limited potential.
• Some of the commonly used browsers include Google Chrome, Mozilla Firefox, Internet
Explorer, Safari, and more.
Request and Response
• Client devices submit HTTP requests to servers, which reply by sending HTTP responses
back to the clients.
HTTP request
● This is when a client device, such as an internet browser, asks the server for the
● The request provides the server with the desired information it needs to tailor its
• The specific version of HTTP followed. HTTP and HTTP/2 are the two versions.
• An HTTP method. This indicates the specific action the request expects to receive
from the server in its response.
• HTTP request headers. This includes data such as what type of browser is being used
and what data the request is seeking from the server. It can also include cookies,
which show information previously sent from the server handling the request.
• An HTTP body. This is optional information the server needs from the request, such
as user forms -- username/password logins, short responses and file uploads -- that
are being submitted to the website.
HTTP response
The HTTP response message is the data received by a client device from the web server.
As its name suggests, the response is the server's reply to an HTTP request. The
information contained in an HTTP response is tailored to the context the server received
1. HTTP status code, which indicates the status of the request to the client device.
Responses may indicate success, an informational response, a redirect, or errors on
the server or client side.
2. HTTP response headers, which send information about the server and requested
resources.
3. An HTTP body: If a request is successful, this contains the requested data in the
form of HTML code, which is translated into a web page by the client browser.
HTTP response-status codes
In response to HTTP requests, servers often issue response codes, indicating the
request is being processed, there was an error in the request or that the request is
being redirected. Common response codes are:
Client and server
A client and server networking model is a model in which computers such as servers
provide the network services to the other computers such as clients to perform a user
based tasks. This model is known as client-server networking model.
Client and server
• A client program runs only when it requests for a service from the server while the
server program runs all time as it does not know when its service is required.
• A server provides a service for many clients not just for a single client.
• Services are required frequently, and many users have a specific client-server
application program.
Client and server
• A client is a program that runs on the local machine requesting service from the
server. A client program is a finite program means that the service started by the
user and terminates when the service is completed.
• Similarly, when we talk the word Servers, It mean a person or medium that serves
something. Similarly in this digital world a Server is a remote computer which
provides information (data) or access to particular services.
Client and server
• User enters the URL of the website or file. The Browser then requests the DNS
Server.
• DNS Server lookup for the address of the WEB Server.
• DNS Server responds with the IP address of the WEB Server.
• Browser sends over an HTTP/HTTPS request to WEB Server’s IP
• Server sends over the necessary files of the website.
• Browser then renders the files and the website is displayed. This rendering is
done with the help of DOM interpreter, CSS interpreter and JS Engine collectively
known as the JIT Compilers.
Client and server
• An application program is known as a client program,
running on the local machine that requests for a service
from an application program known as a server program,
running on the remote machine.
There are the following operations that we can do using cloud computing:
• Developing new applications and services
• Storage, back up, and recovery of data
• Hosting blogs and websites
• Delivery of software on demand
Why cloud computing
Characteristics of Cloud Computing
1) Agility
2) High availability and reliability
3) High Scalability
4) Multi-Sharing
5) Device and Location Independence
6) Maintenance
7) Low Cost
8) Services in the pay-per-use mode
Advantages of cloud computing
Disadvantages of cloud computing
1) Internet Connectivity
2) Vendor lock-in
3) Limited Control
4) Security
Cloud Computing Architecture
• Cloud computing technology is used by both small and large organizations to store
the information in cloud and access it from anywhere at anytime using the internet
connection.
• Cloud computing architecture is a combination of service-oriented architecture and
event-driven architecture
• Cloud computing architecture is divided into the following two parts -
• Front End
• Back End
Cloud Computing Architecture
Cloud Computing Architecture
1. Client Infrastructure
Client Infrastructure is a Front end component. It provides GUI (Graphical User
Interface) to interact with the cloud.
2. Application
The application may be any software or platform that a client wants to access.
3. Service
A Cloud Services manages that which type of service you access according to the
client’s requirement.
Cloud Computing Architecture
4. Runtime Cloud
Runtime Cloud provides the execution and runtime environment to the virtual machines.
5. Storage
Storage is one of the most important components of cloud computing. It provides a huge
amount of storage capacity in the cloud to store and manage data.
6. Infrastructure
It provides services on the host level, application level, and network level.
7. Management
Management is used to manage components such as application, service, runtime cloud,
storage, infrastructure, and other security issues in the backend and establish
coordination between them.
Types of Cloud
Private cloud
1) More Control
Private clouds have more control over their resources and hardware than public clouds
Security & privacy are one of the big advantages of cloud computing. Private cloud
3) Improved performance
Private cloud offers better performance with improved speed and space capacity.
Disadvantages Of Private Cloud
1) High cost
The cost is higher than a public cloud because set up and maintain hardware resources
are costly.
3) Limited scalability
Private clouds are scaled only within the capacity of internal hosted resources.
4) Skilled people
Skilled people are required to manage and operate cloud services.
Public cloud
● Public Cloud provides a shared platform that is accessible to the general public
through an Internet connection.
● Public cloud operated on the pay-as-per-use model and administered by the third
party, i.e., Cloud service provider.
● In the Public cloud, the same storage is being used by multiple users at the same
time.
Advantages of Public Cloud
1) Low Cost
Public cloud has a lower cost than private, or hybrid cloud, as it shares the same
2) Location Independent
Public cloud is location independent because its services are offered through the
internet.
Organizations can easily buy public cloud on the internet and deployed and configured
4) Business Agility
1) Low Security
2) Performance
In the public cloud, performance depends upon the speed of internet connectivity.
3) Less customizable
clouds.
1) Networking issues
In the Hybrid Cloud, networking becomes complex because of the private and the public
cloud.
2) Infrastructure Compatibility
Infrastructure compatibility is the major issue in a hybrid cloud. With dual-levels of
infrastructure, a private cloud controls the company, and a public cloud does not, so
there is a possibility that they are running in separate stacks.
3) Reliability
The reliability of the services depends on cloud service providers
Advantages of Community Cloud
Cost effective
Community cloud is cost effective because the whole cloud is shared between several
organizations or a community.
Security
Community cloud is more secure than the public cloud but less secure than the private
cloud.
Sharing infrastructure
Community cloud allows us to share cloud resources, infrastructure, and other
capabilities among various organizations.
Disadvantages of Community Cloud
The fixed amount of data storage and bandwidth is shared among all community members.
142.200.226.202
A)class C
B)class A
C)class B
D)class D
Question-3
142.200.226.202
A)class C
B)class A
C)class B
D)class D
Question-4
1.A length field can be introduced in the frame to indicate the length
of the frame
2.End of the frame need to be defined
3.Beginning of the next frame need to be defined
A)1 and 2
B)1 and 3
C)1,2 and 3
D) 2 and 3
Question-5
A)Polymorphism
B)Virtualization
C)Abstraction
D)All of the mentioned options
Question-6
A)Bridging table
B)State table
C)Routing table
d.Connection table
Question-7
Which of the following information is present in the ipv4 header but not
in IPv6 header?
A)Address Format
B)Time to Live
C)HOP limit
d.Version
Question-8
A)4 bytes
B)8 bytes
C)128 bytes
d.100 bytes
Question-9
A)1 and 2
B)1 and 3
C) 1,2 and 3
D) 2 and 3
Question-10
In P2P file sharing the peers request files from other peers by
establishing-
A)TCP connections
B)HTTP connections
C)FTP connections
D)SMTP connections
Question-12
A)IDaaS
B)IaaS
C)PaaS
D)SaaS
Question-13
A)DNS
B)SMTP
C)HTTPS
D)HTTP
Question-14
Which of the following layer decides the ideal topology type for node
arrangement in network?
A)Physical layer
B)Transport layer
C)presentation layer
D)network layer
Question-15
A)1 and 2
B)1 and 3
C)1,2 and 3
D)2 and 3
Question-16
A)framing
B)error control
C)flow control
D)channel coding
Question-18
Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-
bit jamming signal is 46.4 ms. The minimum frame size is
A)45.2 bits
B)52.2 bits
C)452 bits
D)512 bits
Question-19
A)12.0.0.1
B)168.172.19.39
C)172.15.14.36
D)192.168.24.43
Question-20
A)PaaS (platform-As-A-Service)
B)SaaS(Software-As-A-Service)
C)IaaS(Infrastructure-As-A-Service)
D)All of the mentioned options
Question-21
A)Repeater
B)Router
C)Switch
D)Bridge
Question-23
In Distance vector routing bandwidth required is less than Link state routing
2. Small packets
3. Flooding
A)1 and 3
B)1 and 2
C)1,2 and 3
D)2 and 3
Question-24
Which of the following encryption algorithm use Block cipher with the 16 bytes
data block?
C)Rivest Cipher 4
(AES) which consists of 12 rounds then what is the size of the key to
A)192 bits
B)256 bits
C)127 bits
D)128 bits
Question-26
A)Metered usage
B)Rapid elasticity
C)On-demand self-service
method.
Statement 2: Wired Equivalent Privacy uses the AES algorithms to encrypt the
data.
encryption only.
Authentication Mode.
You are using two prime numbers 13(P) and 11(Q) to generate public and private
key in RSA cryptosystem. If the public key is 37 then find the private key.
A)19
B)11
C)25
D)13
Question-29
In EC2 the users can choose which of the following configuration of the virtual
machine
1.RAM size
3.Processor speed
A)1 and 3
B)1 and 2
C)1,2 and 3
D)2 and 3
Question-30
2. The software and the service are monitored and maintained by the
vendor
A)Neither 1 nor 2
B)Both 1 and 2
C)only 1
D)only 2