TheChapter 1cloud computingOverview of exercises
1.1Multiple choice questions
1. The following statement about cloud computing is incorrect ( D ).
A. Can provide on-demand, billable services
B. Can meet users' flexible usage needs
C. Users can obtain the required resources through the network at any time and place
D. Mainly based on nonVirtualizationResource pool
2. The following is not part of the current typical cloud computing service model ( B ).
A. Software as a service B. System as a service C. Platform as a service D. Infrastructure as a service
3. The following is the basic characteristics of cloud computing (D ).
A. Utility calculation B. Based on network access C. Users can configure resources themselves D. All of the above
4、IaaSThe main resources provided by the service model do not include ( C ).
A. Computing resources B. Storage resources C. Applications D. Network resources
5. The following cloud computing platforms that do not belong to IaaS services are ( C ).
A.AWS B.EC2 C.Windows Azure D.S3
6. The PaaS service model emphasizes the concept of (A ).
A. Platform B. Resources C. Environment software
7. The following is not a cloud computing deployment model ( C ).
A. Public cloud � Private Cloud C. Enterprise Cloud D. Hybrid cloud
8. The emergence and development of cloud computing combines many technologies, including (D ).
A.Virtualization technologyB. Distributed computing C. Utility calculation D. All of the above
9. The main purpose of grid computing and public computing services is ( A ).
A. Integrate a large number of machines into a virtual super machine for people distributed around the world
B. Realize computing power like gas, water, and electricity, free and free to use
C. The scale can be dynamically adjusted and scaled according to the actual needs of users
D. The reliability of the platform is guaranteed through node mutual insurance
10. The architecture of cloud computing does not include ( C ).
A. SOABuilding layer B. Physical Resource Layer C. Network scheduling layer D. Virtualization resource pool layer
11. The management function of ( D ) is included in the management middleware layer of cloud computing.
A. User B. Task C. Application All of the above
12. There are many key technologies in cloud computing, including ( D ).
A. Distributed data storage technology � distributedparallelProgramming model technology
C. Green energy-saving technology D. All of the above
13. Cloud computing security guarantee technologies include ( D ).
A. Identity authentication mechanism B. Access control mechanism C. Isolation technology D. All of the above
14. The following statement is incorrect ( A ).
A. Data center locations can only be fixed
B. Areas in the data center that include daily administrative staff work
C. The PUE value of the data center is generally not less than 1
D. Servers in data centers need power and cooling when running
15. The core of blockchain is (D) and it is the method for each node in the blockchain network to reach an agreement.
A. Data layer B. Network layer C. Contract layer D. Consensus layer
1.2 Fill in the blanks
1. From the perspective of ( the core service level of cloud computing, cloud computing can be divided into three service models: IaaS, PaaS and SaaS.
2. Compared with private clouds, public clouds are platforms shared by different units, institutions and individuals, and are prone to security risks, so they emphasize modules such as (isolation of user applications).
3. The construction of cloud computing system, optimization and scheduling of cloud computing tasks, and root cause traceability can be obtained through (big data) analysis.
4. The essence of blockchain is a kind of (untampered distributed database under a point-to-point network), which is mainly used in links and fields that need to be traced, such as Internet finance, product supply chain, etc.
5. Unlike cloud computing,Edge computingPutting computing tasks on computing resources close to (data source) can effectively reduce the delay of the computing system, reduce data transmission bandwidth, and alleviate the pressure on cloud computing data centers.
1.3 Short answer questions
1. Please briefly describe the typical characteristics of cloud computing.
answer:
- Large scale. Cloud computing centers generally have a considerable scale. For example, Alibaba Cloud currently deploys data centers in dozens of regions around the world, with a total server scale of millions. By integrating a massive number of server clusters, it can provide huge computing and storage capabilities.
- Resource aggregation. Cloud computing aggregates large-scale dispersed computing resources and storage resources to jointly support users to complete various computing tasks and meet storage needs.
- Virtual abstraction. Cloud computing provides users with virtualized servers based on physical servers to enable users to use and improve resource utilization; virtual machines are isolated from each other, improving security.
- Use as needed, billed as much as possible. Cloud computing has a huge resource pool, and cloud services allow computing power to be used as a public resource like water and electricity. Users can purchase computing resources like water and electricity as needed, and charge them according to the amount of use.
- High reliability. When there is a problem with the computing nodes in cloud computing, the reliability of the cloud platform can be guaranteed through mutual insurance of nodes. The cloud platform uses multi-copy backup and resource monitoring to ensure the high reliability of the system.
- High scalability. The cloud is composed of a large number of servers and other resources through the network. The server can be merged into and exited from the cloud relatively conveniently and simply. The scale of the cloud can be dynamically adjusted and scaled according to the actual needs of users.
- High utilization rate and cost-effectiveness. Cloud computing has fully utilized server resources through resource aggregation and other methods. Through IT resources and on-demand commercialization model, software service costs have been greatly reduced and more services are provided with fewer resources. Small-scale institutions can reduce human and financial expenditures by renting computing resources such as cloud service providers and focusing on the company's own business.
2. What key technologies does current cloud computing mainly contain?
answer:
Current cloud computing mainly includes virtualization technology, distributed parallel programming model technology, distributed data storage technology, distributed task scheduling technology, monitoring and management technology, cloud computing security guarantee mechanism, cloud computing network technology and green energy-saving technology, etc.
3. Please briefly describe the main components of the data center.
answer:
- Main room. The building space for installing and operating data equipment, including server room, network room, storage room, etc.
- Auxiliary area. Mainly responsible for the installation, debugging, maintenance, operation, monitoring and management of electronic information equipment and software, including equipment repair rooms, testing machines, fire fighting and security rooms, etc.
- Support area. Mainly responsible for providing power support and safety guarantees for the main computer room and auxiliary area, including distribution room, battery room and air conditioning room.
- Administrative management area. The area where the daily administrative management staff is located is responsible for the management and scheduling of staff and the status management of equipment.
4. Please briefly describe the relationship between blockchain and cloud computing.
answer:
Cloud ServiceThe advantages of providers using cloud platforms to support blockchain are mainly reflected in three aspects: cost efficiency, application ecology and security and privacy. Blockchain can be loaded on the cloud platform, and can even be integrated with the underlying layer of the cloud platform. By combining it with cloud service providers, blockchain technology can be integrated, packaged and delivered, laying the foundation for application implementation.
Under certain conditions, blockchain can also in turn support cloud computing. For example, the immutability of blockchain can make cloud computing itself more secure and reliable and ensure data integrity.
5. Please compare and analyze traditional virus defense strategies with cloud-based virus defense strategies.
answer:
Traditional network antivirus software provides virus defense services for each user. By installing corresponding antivirus software on each node, it monitors the operation of the computer. When it is found that the computer is suspected of being infected with a virus, it starts to detect and kill. Network antivirus software providers also detect viruses by monitoring some situations on the Internet and update the virus database. The problem with this method is that it has a large lag in response to the virus and the response is not timely enough.
The cloud-based virus defense system not only installs antivirus software on each user terminal, but also installs a probe program to collect samples of suspected viruses through the probe program, and package the samples and send them to the cloud data center of the virus defense system. When the system finds that many users have submitted the same or similar suspected virus samples, new viruses may be discovered in time, so as to respond to the virus faster and provide virus solutions as soon as possible. The more users there are, the more reliable it is to conduct security analysis based on collected samples.
The cloud-based virus defense system can also make the antivirus software of the client smaller, stronger virus detection and killing capabilities, and more suitable for mobile devices. With the popularity of smartphones, a large number of viruses targeting smartphones have also emerged.Cloud SecurityThe virus detection and killing work can be put into the cloud to handle. Every time users access the Internet, they can filter access requests and returned results through the cloud security layer, and even prevent viruses without installing antivirus software.
1.4 Answer questions
1. A university plans to build a campus energy control system based on cloud computing. Please answer the following questions:
- Which cloud computing service model and deployment model are more suitable to choose? Why?
- What service functions of management middleware can be used in a cloud-based campus energy system?
answer:
- The SaaS service model can be selected, and the cloud service provider provides the corresponding software and functional service modules of the energy system, and the deployment model belongs to the private cloud.
- Functions such as account management, usage billing in user management middleware; functions such as life cycle management, task execution in task management middleware; functions such as load balancing, monitoring and statistics in resource management middleware; functions such as identity authentication, access authorization in security management middleware.