INFS3208-无代写
时间:2023-09-14
1Tutorial 2: More on Cloud Computing
INFS3208 – Cloud Computing
2• Question 1: What are the four deployment models in cloud computing?
3Four deployment models in cloud computing
• Public Cloud
• Private Cloud
• Community Cloud
• Hybrid Cloud
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
4Cloud Deployment Models
• A cloud deployment model represents a specific type of cloud environment
• In terms of ownership, size, and access, models can be divided into four common
groups:
– Public cloud
• a publicly accessible cloud environment owned by a third-party cloud provider
• usually supplied via the delivery models and offered to consumers at a cost
• is created and on-going maintained by the cloud provider.
• typical examples: GCP, AWS, AZURE, etc.
– Community cloud
• is similar to a public cloud except that its access is limited to a community of cloud consumers.
• may be jointly owned by the community members or by a third-party cloud provider
• cloud consumers of the community typically share the responsibility for defining and evolving the
community cloud
• Typical examples: Cloud for multiple governmental departments.
Cloud Computing INFS3208
1
5Cloud Deployment Models
– Private cloud
• is owned by a single organization and enables an organization to use CC technology to
access to IT resources by different parts, locations, or departments.
• actual administration may be carried out by internal or outsourced staff.
• within a private cloud, the same organization is technically both the cloud consumer and
provider
• Typical examples: UQCloud (VMs) and UQRDM cloud (STaaS)
– Hybrid cloud
• is a cloud environment comprised of two or more different cloud deployment models.
• Example: private cloud (sensitive data) + public cloud (less sensitive cloud services)
• can be complex and challenging to create and maintain due to the potential disparity in
cloud environments
Cloud Computing INFS3208
1
6The comparative analysis of the best deployment models
Public Private Community Hybrid
Ease of setup and use Easy Requires IT proficiency Requires IT proficiency Requires IT proficiency
Data security and
privacy Low High Comparatively high High
Data control Little to none High Comparatively high Comparatively high
Reliability Vulnerable High Comparatively high High
Scalability and flexibility High High Fixed capacity High
Cost-effectiveness The cheapest one
Cost-intensive,
the most
expensive one
Cost is shared among
community members
Cheaper than a private model but
more costly than a public one
Demand for in-house
hardware No Depends Depends Depends
https://www.sam-solutions.com/blog/four-best-cloud-deployment-models-you-need-to-know/
7• Question 2: Discuss the differences between cloud delivery models and make
examples of delivery models.
8• IaaS
• PaaS
• SaaS
Your Own IT IaaS PaaS SaaS
Application Application Application Application
Data Data Data Data
Runtime Runtime Runtime Runtime
Middleware Middleware Middleware Middleware
O/S O/S O/S O/S
Virtualization Virtualization Virtualization Virtualization
Servers Servers Servers Servers
Storage Storage Storage Storage
Networking Networking Networking Networking
You Manage Provider Manage
9Deliver
Model Control Level Functionality Consumer Activities Provider Activities
SaaS Usage and
usage-related
configuration
Access to front-end user-
interface
Uses and configures cloud
services
Implements, manages, and maintains
cloud service
Monitors usage by cloud consumers
PaaS Limited
administrative
Moderate level of
administrative control over IT
resources relevant to cloud
consumer’s usage of platform
Develops, tests, deploys,
and manages cloud
services and cloud-based
solutions
Pre-configures platform and provisions
underlying infrastructure, middleware,
and other needed IT resources, as
necessary
Monitors usage by cloud consumers
IaaS Full
administrative
Full access to virtualized
infrastructure-related IT
resources and possibly to
underlying physical IT
resources
Sets up and configures
bare infrastructure, and
installs, manages, and
monitors any needed
software
Provisions and manages the physical
processing, storage, networking, and
hosting required
Monitors usage by cloud consumers
10
• Question 3: What do Cloud-Enabling Technologies (CETs) include?
11
Cloud-Enabling Technologies
Modern-day clouds are underpinned by a set of primary technology
components that collectively enable key features and characteristics
associated with contemporary cloud computing:
• Broadband networks and internet architecture
• Data centre technology
• Virtualization technology
• Web technology
• Multitenant technology
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
12
• Question 4: Please summarise the key points of Virtualisation Technology for servers.
13
Virtualisation Technology
1) Server virtualisation is the process of abstracting IT hardware into virtual servers
using virtualisation software.
2) Virtualisation provides hardware independence, server consolidation, and
resource replication, and further supports resource pooling and elastic scalability.
3) Virtual servers are realised through either operating system-based or hardware-
based virtualisation.
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
14
• Question 5: What is Google Cloud Compute Engine? What are the benefits?
15
• Question 5: What is Google Cloud Compute Engine? What are the benefits?
16
• Question 6: Play with GCP Pricing Calculator
(https://cloud.google.com/products/calculator) and check how much the standard
machine n1-standard-2 (no SSD, no static and no public IP address, running 24*7)
costs you per month? Discuss how you can save credit on top of that VM specs.
17
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
1. File naming in Linux System
• Linux is an extensionless system.
• Linux is case-sensitive.
• Spaces in file names are valid.
• The names of hidden files and directories in Linux begin with a . (full stop).
18
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
• Linux is case-sensitive.
19
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
• Handling the file names with spaces
1) Quotes
2) Escape characters
20
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
• Handling the file names with spaces
1) Quotes
2) Escape characters
21
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
2. Manual Pages Command: man
22
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
3. Wildcards
• * - represents zero or more characters
• ? - represents a single character
• […] - represent a range of characters
Wildcards are a set of building blocks that allow you to create a pattern defining a set
of files or directories.
Basic Set of Wildcards
23
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
4. Wildcards Examples (1/3)
24
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
4. Wildcards Examples (2/3)
25
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
4. Wildcards Examples (3/3)
26
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
5. Filters(1/3)
head [-number of lines to print] [path]
tail [-number of lines to print] [path]
27
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
5. Filters(2/3)
wc
uniq
12: number of lines
36: number of words
195: number of characters
28
Linux Command Line Basics Ⅱ
https://miro.medium.com/max/700/1*c2nqm7mLV3sc0pY2HvUCJQ.png
5. Filters(3/3)
sed [path] Basic expression: s/search/replace/g
29
Thank you!
Questions?

essay、essay代写