Week 3 - Network and cloud infrastructure Flashcards

1
Q

What is the IT environment used to host?

A

Data

Services

Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Traditional IT Infrastructure

A

Infrastructure is…
Owned
Controlled
Operated
Managed
…by same organisation.

All hardware is owned by the organisation

Upfront commitment to fixed set of resources

Complete control over set of resources

Staff needed to manage resources:
- Hardware Maintenance
- Software Configuration
- Physical Security
- Software Security

If demand require less/more resources, it cannot be
easily added/removed

Organisation is responsible for resiliency and backup
– Resources required for data backup
– Resources required for server resilience

Applications must be designed with fixed set of resources in mind

Fast connectivity in cases where there is a direct ethernet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data centre

A

Facility that centralizes
organisation/department IT
operations and hardware

Stores critical computing
and storage hardware

Enables delivery of shared
applications and data

Virtualisation commonly
used to optimize resource
utilisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ‘Cloud’

A

Cloud is not a physical thing

Abstract concept referring
to computer resources that:

  1. Is on a network at a
    remote location
  2. Provides services to other computers over the
    network
  3. Is managed by a 3rd Party
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud Environment

A

Cloud is a network of servers

Each server has different
function/s

Example:
Server for compute power
Server for data management
Server for a messaging
application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud providers

A

Companies offering remote computing resources
are called cloud providers

Users of these remote computing resources pay per usage

Often calculated as a function of time and resource size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud Characteristics

A

On Demand Self Service:
Consumer can provision computing capacity, such as server
time and network storage, automatically as needed without
requiring human interaction with each server provider.

Broad Network Access:
Accessed via multiple device types

Resource Pooling:
Providers computing resources are pooled to serve
multiple consumers using multi tenant model.
Different physical and virtual resources dynamically
assigned and reassigned according to consumer demand

Rapid Elasticity:
Capabilities can be dynamically provisioned and released

Measured Service:
Resource usage can be monitored, controlled and reported.
Provided transparency for consumer and provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Benefits of Cloud vs Traditional IT

A

Cost:
No up front capital expense required to purchase hardware and
software
Less IT staff needed for managing infrastructure
Lower costs on electricity (powering servers and cooling)

Flexibility:
Easy to scale up or down depending on current business
demands

Secure Backup:
In cases of physical damage to local hardware, cloud stored
data can still be accessed

Reliability:
Data backup, disaster recovery and business continuity easier
Data backup, disaster recovery and business continuity easier and less expensive.
Data can easily be mirrored at multiple redundant sites

Mobility:
Data and applications are available to consumers wherever they are in the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disadvantages of Cloud vs Traditional IT

A

Downtime:
Cloud computing systems are internet based and access is
dependent on consumer internet connection
Internet service outage, or poor performance, will cause issues

Cost:
While cost is a key advantage of cloud, improper usage of the
system can result in costs increasing drastically.

Security:
While cloud providers are secure, consumers have less control
over the security vs traditional IT
Data breaches can occur via hacking

Data Transfer Costs:
Uploading data to the cloud is commonly inexpensive/free
however downloading data over basic monthly allowances can
incur charges per GB.

Customer Support:
Providers usually charge high fees to provide support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud service models

A
  1. Infrastructure as a Service
  2. Platform as a Service
  3. Software as a Service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a server?

A

Computer Resource:
1. On a network
2. Provides services/web-pages to Other Computers over Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Web browser

A

Client Application
Retrieves and Presents information from World Wide Web

Web Page Stored in Hyper Text Mark-up Language (HTML)

Standardized way of representing web content

Browser reads HTML and displays information the way the web page developer designed the page to be
seen

Using TCP/IP, makes requests using Hyper Text Transport Protocol (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web server

A

A network computer with the primary role of serving Web pages to clients on request

Can also host a Web site along with images, style sheets, and other content - Clients (Web browsers) can access the Web pages

Uses Hyper Text Transfer Protocol (HTTP)

Receives HTTP requests from clients
Processes and replies to these requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTP

A

Hyper Text Transfer Protocol
TCP/IP Application Layer Protocol

Request - Response Protocol
Client Submits HTTP request to server
Server returns a response message to the client
Completion Status
Requested Content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTP Session

A

Sequence of Request- Response transactions

Client initiates connection (3 Way Handshake)
Connection established using TCP on particular port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTTP Request

A

Client requests resource from server
HTTP methods used to indicated desired action on
identified resource

  1. GET
    Used to Retrieve data
  2. POST
    Used to Send data
  3. HEAD
    Used to retrieve meta data
17
Q

HTTP Response

A

Server interprets and processes request
Retrieves requested resource

Static Resource
Copies resource in order return it to client (e.g. HTML page)

Dynamic Resource
Performs execution of resource and copies result in order to return to client (e.g. PHP script)

18
Q

How does computer connected to network know how to
interpret, process, retrieve requested resources?

A

Web Server Software is a Set of programs that
* understand HTTP requests
* Process HTTP requests
* Return HTTP responses
* Process Dynamic Resources

19
Q

Apache Web Server

A

Developed by Apache Software Foundation (ASF)

Designed to run on a wide variety of operating
systems

Worlds most used Web Server
Served 44% of all active websites
(March 2019)
Serves 47% of top 1 Million Busiest Sites

Open Source & Free

Apache Software License
Users can use software for any purpose
Can modify and distribute modified versions

Apache software is mostly modular

PHP module
A popular module

PHP
A server side scripting language
Commonly used to create dynamic Web pages

20
Q

Virtual Hosts

A

Virtual hosts can be used to support multiple Web sites on one physical server

By default, Apache is configured with a default host and no virtual host

Apache supports:
1. Name based virtual hosts
* Multiple Web sites share the same IP address
2. IP based virtual hosts
* Multiple IP addresses for a single machine

21
Q

Creating a web page

A

DocumentRoot directive

Defines the directory Apache uses to serve Web pages to clients
* Uniform Resource Locator (URL)
– An address to a resource on the Internet
- Website resource files stored inside Document Root

22
Q

Remote Access

A

A means to remotely connect to, and control, other computers

Allows control of computers in
– Other Room
– Other Building
– Other Continent

Use terminal window on your computer as if it was the terminal window of a different (remote) computer

23
Q

Telnet

A

Client - Server Architecture
* Telnet client program establishes connection to remote computer running a telnet server program
– Client needs IP address of server
– Client needs user account on server

  • Client sends commands as text
  • Server reads and executes these commands
    – Returns default output generated from running commands

Developed in 1969
Communication was handled by passing ASCII characters as streams between client and server

  • All messages are unencrypted
    – This includes any passwords you might enter!!!
    – NOT SECURE
24
Q

Secure Shell (SSH)

A

Application Layer Protocol
– Client <–> Server
* First Developed in 1995
* Encrypted remote access
– Similar to telnet, but communications sent in
encrypted format

25
Q

SSH Tunnel

A

Establishes secure channel over an unsecure network
* Secure channel referred to as a
Tunnel
* Most common application
remote command line
* However, other message protocols can be directed over the tunnel
* E.g. File Upload/Download, Proxy Web browsing

26
Q

SSH Client and server

A

SSH is client server protocol

SSH server process:
* Must be running on machine you are remotely accessing
* By default, server is bound to port 22

  • SSH client process:
  • Must know IP address of server machine
  • Must know which port to send messages to on that machine
27
Q

Containers

A

Unit of software that packages up CODE and ALL DEPENDENCIES so the application runs from one
computing environment to another.

28
Q

Docker

A

Delivers software in packages called containers