`Hey,
Note: Brother in case of any queries, just comment in box I would be very happy to assist all your queries
Public Clouds
In a public cloud, individual businesses share on premise and access to basic computer infrastructure (servers, storage, networks, development platforms etc.) provided by a CSP. Each company shares the CSP’s infrastructure with the other companies that have subscribed to the cloud. Payment is usually pay-as-you-go with no minimum time requirements. Some CSPs derive revenue from advertising and offer free public clouds.
Public clouds are usually based on massive hardware installations distributed in locations throughout the country or across the globe. Their size enables economies of scale that permit maximum scalability to meet requirements as a company’s needs expand or contract, maximum flexibility to meet surges in demand in real time, and maximum reliability in case of hardware failures.
Public clouds are well suited for hosting development platforms or web browsers, for big data processing that places heavy demands on computer resources, and for companies that do not have advanced security concerns.
Private Clouds
In a private cloud, a business has access to infrastructure in the cloud that is not shared with anyone else. The business typically deploys its own platforms and software applications on the cloud infrastructure. The business’s infrastructure usually lies behind a firewall that is accessed through the company intranet over encrypted connections. Payment is often based on a fee-per-unit-time model.
Hybrid Cloud
In a hybrid cloud, a company’s cloud deployment is split between public and private cloud infrastructure. Sensitive data remains within the private cloud where high security standards can be maintained. Operations that do not make use of sensitive data are carried out in the public cloud where infrastructure can scale to meet demands and costs are reduced.
Hybrid clouds are well suited to carrying out big data operations on non-sensitive data in the public cloud while keeping sensitive data protected in the private cloud. Hybrid clouds also give companies the option of running their public-facing applications or their capacity intensive development platforms in the public portion of the cloud while their sensitive data remains protected.
A trunk port is a port that is assigned to carry traffic for all the VLANs that are accessible by a specific switch, a process known as trunking. Trunk ports mark frames with unique identifying tags – either 802.1Q tags or Inter-Switch Link (ISL) tags – as they move between switches. Therefore, every single frame can be directed to its designated VLAN.
An Ethernet interface can either function as a trunk port or as an access port, but not both at the same time. A trunk port is capable of having more than one VLAN set up on the interface. As a result, it is able to carry traffic for numerous VLANs at the same time.
Kindly revert for any queries
Thanks.
What is the difference between Private, Public, Community, and Hybrid Clouds. Give a practical example of...
Pick one of the Cloud models given in the book: Private Community Public Hybrid Now, discuss how the Cloud model you chose works with a company you work at or you are familiar with. What makes that Cloud model the best choice? What about hybrid Cloud models (more than one choice)? Is that the easy choice to make, saying more than one model is necessary?
What is the difference between simulation and optimization? Give practical example for each in field of civil engineering or construction management.
Explain the difference between service-learning and community service. Give an example of each and discuss your personal experience with either or both.
1. What is the difference between 1-mode and 2-mode graph? Give an example for each. 2. List various graph data structures to store social network information. 3. What is “six degrees of separation” in the context of social networks? What is the average degree of separation for Facebook and Twitter (you can cite other studies that have reported these statistics)? 4. What is “strength of weak ties”? Explain the rationale behind this phenomenon. 5. List and describe the various centrality...
What is the difference between a relative price change and inflation? Give one example from internet research of a country that experienced inflation following a stimulus to spending (either private or government). Explain why the stimulus occurred
answer ONE of the following questions: 1. Give an example of a voluntary association and describe how women's involvement in them altered their lives. 2. Explain the difference between the "public" and the "private" spheres of life. Describe how those spheres changing in the early 19th century.
5. Explain the difference between a Nash equilibrium and a dominant strategies equilibrium. Give an example to show how the prisoners' dilemma helps to explain behaviour. 6. Why might a firm set prices based on a markup above average cost rather than equalising marginal costs and marginal benefits? 7. Using a diagram, explain how an external cost of production (i.e. a negative production externality) can be internalised with a tax. |8. Explain the conditions of price discrimination. Give two examples...
Please answer each question with at least 50 words. 1. Explain how asymmetric information in a product market can lead to market failure. 2. Give an example that illustrates the difference between private costs and social costs. 3. Explain how both an emission tax and tradable pollution permits system can reduce pollution. 1. Explain how asymmetric information in a product market can lead to market failure. 2. Give an example that illustrates the difference between private costs and social costs....
Explain the difference between passive and active attacks on a network. Give an example of each. Which headers are left in plaintext when we use link encryption? Network encryption? Application encryption? How is end-to-end encryption different from other types of encryption? At what layer does it take place? Describe the SSL key negotiation in terms of the keying techniques introduced in Section 14.2. Explain how the different IPsec modes apply encryption either above or below the IP layer Describe WEP2...
just part c and d 3. Consider the group Z45 (a) Give an example of a subnormal series which is not a composition series. Explain why your example works. (b) Find a refinement of the series you gave above which is a composition series. That is, show how to extend your series into a composition series. (c) Find all other composition series and briefly explain how you know you have them all. (d) If p(x) is a polynomial whose splitting...