{"id":295,"date":"2018-06-19T19:44:36","date_gmt":"2018-06-19T11:44:36","guid":{"rendered":"http:\/\/www.sniper97.cn\/?p=295"},"modified":"2018-06-19T19:44:36","modified_gmt":"2018-06-19T11:44:36","slug":"%e7%ac%ac%e4%ba%94%e7%ab%a0-%e4%ba%91%e4%bd%bf%e8%83%bd%e6%8a%80%e6%9c%af","status":"publish","type":"post","link":"http:\/\/www.sniper97.cn\/index.php\/note\/cloud-computing-concepts%ef%bc%8ctechnology-and-architecture\/295\/","title":{"rendered":"\u7b2c\u4e94\u7ae0 \u4e91\u4f7f\u80fd\u6280\u672f"},"content":{"rendered":"<h1><\/h1>\n<p>\u672c\u7ae0\u4e3b\u8981\u5185\u5bb9\uff1a<br \/>\n\uff081\uff09\u5bbd\u5e26\u7f51\u7edc\u548cinternet\u67b6\u6784<br \/>\n\uff082\uff09\u6570\u636e\u4e2d\u5fc3\u6280\u672f<br \/>\n\uff083\uff09\u865a\u62df\u5316\u6280\u672f<br \/>\n\uff084\uff09Web\u6280\u672f<br \/>\n\uff085\uff09\u591a\u79df\u6237\u6280\u672f<br \/>\n\uff086\uff09\u670d\u52a1\u6280\u672f<br \/>\n&nbsp;<\/p>\n<h2>5.1\u5bbd\u5e26\u7f51\u7edc\u548cInternet\u67b6\u6784<\/h2>\n<p>\uff08\u4e3b\u8981\u4e3a\u8ba1\u7b97\u673a\u7f51\u7edc\u77e5\u8bc6\uff0c\u8fd9\u91cc\u5c31\u4e0d\u8be6\u7ec6\u8fdb\u884c\u6982\u5ff5\u89e3\u91ca\u3002\u53ea\u7ed9\u51fa\u4e00\u4e2a\u5927\u7684\u6846\u67b6\u3002\uff09<br \/>\n&nbsp;<\/p>\n<p style=\"background-color: transparent; color: #555555; font-family: &amp;quot; roboto&amp;quot;,&amp;quot;helvetica neue&amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px 0px 13px 0px;\">\u6240\u6709\u7684\u4e91\u90fd\u5fc5\u987b\u8fde\u63a5\u5230\u7f51\u7edc\u3002<\/p>\n<p style=\"background-color: transparent; color: #555555; font-family: &amp;quot; roboto&amp;quot;,&amp;quot;helvetica neue&amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px 0px 13px 0px;\">\u4e92\u8054\u7f51\u6216Internet\u5141\u8bb8\u8fdc\u7a0b\u4f9b\u7ed9IT\u8d44\u6e90\uff0c\u5e76\u76f4\u63a5\u652f\u6301\u65e0\u5904\u4e0d\u5728\u7684\u7f51\u7edc\u63a5\u5165\u3002<b><\/b><i><\/i><u><\/u><\/p>\n<h3>5.1.1 internet\u670d\u52a1\u63d0\u4f9b\u8005\uff08ISP\uff09<\/h3>\n<p><strong>Internet Service Providers \uff08ISP\uff09<\/strong><br \/>\nInternet\u6700\u5927\u7684\u4e3b\u5e72\u7f51\u7531ISP\u5efa\u7acb\u5e76\u90e8\u7f72\u7684\uff0c\u5b83\u4eec\u4f9d\u9760\u6838\u5fc3\u8def\u7531\u5668\u8fdb\u884c\u6218\u7565\u4e92\u8054\u3002<br \/>\n<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\u5168\u7403\u4e92\u8054\u662f\u901a\u8fc7\u4e00\u4e2a\u4e09\u5c42<\/span><strong>\u62d3\u6251\u7ed3\u6784\uff08topology\uff09<\/strong><span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\u5f62\u6210\u7684\u3002<\/span><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-610\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/5-2-300x300.png\" alt=\"\" width=\"366\" height=\"366\" \/><br \/>\n&nbsp;<br \/>\n<strong>\u4e92\u8054\u67b6\u6784\uff08internetworking architecture\uff09<\/strong>\u7684\u4e24\u4e2a\u7ec4\u6210\u90e8\u5206\uff1a<br \/>\n\uff081\uff09\u65e0\u8fde\u63a5\u5206\u7ec4\u4ea4\u6362\uff08connectionless packet switching\uff09<br \/>\n\uff082\uff09\u57fa\u4e8e\u8def\u7531\u5668\u7684\u4e92\u8054\uff08router-based interconnectivity\uff09<br \/>\n&nbsp;<\/p>\n<h3>5.1.2 \u65e0\u8fde\u63a5\u5206\u7ec4\u4ea4\u6362\uff08\u6570\u636e\u62a5\u7f51\u7edc\uff09\uff08connectionless packet switching\uff09<\/h3>\n<p><strong>\u7aef\u5230\u7aef\uff08end-to-end\uff09\uff08sender-receiver pair\uff09<\/strong>\u6570\u636e\u6d41\u88ab\u5206\u5272\u4e3a\u56fa\u5b9a\u5927\u5c0f\u7684\u5305\uff0c\u7531<strong>\u7f51\u7edc\u4ea4\u6362\u673a\uff08network switches\uff09<\/strong>\u548c<strong>\u8def\u7531\u5668\uff08router\uff09<\/strong>\u8fdb\u884c\u63a5\u53d7\u548c\u5904\u7406\uff0c\u901a\u8fc7<strong>\u6392\u961f\uff08queued\uff09\u8f6c\u53d1\uff08forwarded\uff09<\/strong>\u4ece\u4e00\u4e2a\u4e2d\u95f4\u8282\u70b9\u4f20\u9012\u5230\u4e0b\u4e00\u4e2a\u8282\u70b9\u3002<\/p>\n<h3>5.1.3\u57fa\u4e8e\u8def\u7531\u5668\u7684\u4e92\u8054\uff08router-based interconnectivity\uff09<\/h3>\n<p>\u8def\u7531\u5668\u662f\u8fde\u63a5\u591a\u4e2a\u7f51\u7edc\u7684\u8bbe\u5907\uff0c\u901a\u8fc7\u5b83\u5b9e\u73b0\u6570\u636e\u5305\u7684\u8f6c\u53d1\u3002<br \/>\n\u7f51\u7edc\u4e92\u8fde\u7684\u57fa\u672c\u673a\u5236\uff1a<br \/>\n\u5c06\u4e00\u7ec4\u63a5\u6536\u5230\u7684\u65e0\u5e8f\u6570\u636e\u5305\u5408\u5e76\u751f\u6210\u4e00\u4e2a\u6d88\u606f\u3002<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-611\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/5-3-300x226.png\" alt=\"\" width=\"500\" height=\"377\" \/><br \/>\n\u7f51\u7edc\u6280\u672f\uff1a<br \/>\n\uff081\uff09\u7269\u7406\u7f51\u7edc\uff08physical network\uff09<br \/>\nIP\u6570\u636e\u5305\u901a\u8fc7\u8fde\u63a5\u76f8\u90bb\u8282\u70b9\u7684\u5e95\u5c42\u7269\u7406\u7f51\u7edc\u8fdb\u884c\u4f20\u8f93\u3002<br \/>\n\u7269\u7406\u7f51\u7edc\u5305\u62ec<strong>\u6570\u636e\u94fe\u8def\u5c42\uff08data link layer\uff09<\/strong>\u548c<strong>\u7269\u7406\u5c42\uff08physical layer\uff09<\/strong>\u3002<br \/>\n&nbsp;<br \/>\n\uff082\uff09\u4f20\u8f93\u5c42\u534f\u8bae\uff08Transport Layer Protocol\uff09<br \/>\n<strong>\u4f20\u8f93\u63a7\u5236\u534f\u8bae\uff08TCP\uff09<\/strong>\u548c<strong>\u7528\u6237\u6570\u636e\u62a5\u534f\u8bae\uff08UDP\uff09<\/strong><br \/>\n&nbsp;<br \/>\n\uff083\uff09\u5e94\u7528\u5c42\u534f\u8bae\uff08Application Layer Protocol\uff09<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-297\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/1-1-300x166.png\" alt=\"\" width=\"540\" height=\"299\" \/><\/p>\n<h3>5.1.4\u6280\u672f\u548c\u5546\u4e1a\u8003\u91cf<\/h3>\n<p>\uff081\uff09\u8fde\u63a5\u6027\u95ee\u9898<br \/>\n\u4f01\u4e1a\u5185\u90e8\u7684IT\u8d44\u6e90\u4ee5\u53ca\u8bbe\u5907\u7684\u8bbf\u95ee\u53ca\u901a\u4fe1\u3002<br \/>\nCloud providers can easily configure cloud-based IT resources to be accessible for both external and internal users through an Internet connection.<br \/>\n\u4e91\u63d0\u4f9b\u8005\u53ef\u4ee5\u5c06\u4e91IT\u8d44\u6e90\u8f7b\u677e\u914d\u7f6e\u4e3a\u5141\u8bb8\u5185\u90e8\u548c\u5916\u90e8\u7528\u6237\u5141\u8bb8\u901a\u8fc7Internet\u8fde\u63a5\u8fdb\u884c\u8bbf\u95ee\u3002<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-612\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/5-4-300x138.png\" alt=\"\" width=\"517\" height=\"238\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-613\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/5-5-300x261.png\" alt=\"\" width=\"479\" height=\"417\" \/><br \/>\n\uff082\uff09\u7f51\u7edc\u5e26\u5bbd\u548c\u5ef6\u65f6\u95ee\u9898<br \/>\n\u5ef6\u65f6\uff08latency\uff09\uff1a\u65f6\u95f4\u5ef6\u8fdf\uff0c\u662f\u6570\u636e\u5305\u4ece\u4e00\u4e2a\u6570\u636e\u8282\u70b9\u4f20\u9012\u5230\u53e6\u4e00\u4e2a\u8282\u70b9\u6240\u9700\u8981\u7684\u65f6\u95f4\u3002<br \/>\n\u201c\u5c3d\u529b\u800c\u4e3a\u201d\u7684<strong>\u670d\u52a1\u8d28\u91cf\uff08QoS\uff09\uff08quality-of-service\uff09<\/strong><br \/>\n\uff083\uff09\u4e91\u8fd0\u8425\u5546\u548c\u4e91\u63d0\u4f9b\u8005\u9009\u62e9<br \/>\n\u4e91\u7528\u6237\u548c\u4e91\u63d0\u4f9b\u8005\u95f4Internet\u8fde\u63a5\u7684\u670d\u52a1\u6c34\u5e73\u662f\u7531\u4ed6\u4eec\u7684ISP\u51b3\u5b9a\u7684\u3002<br \/>\n&nbsp;<\/p>\n<h2>5.2\u6570\u636e\u4e2d\u5fc3\u95ee\u9898(Data Center Technology)<\/h2>\n<p>\u6709\u5229\u4e8e\u80fd\u6e90\u5171\u4eab\uff0c\u63d0\u9ad8\u5171\u4eabIT\u8d44\u6e90\u4f7f\u7528\u7387\u4ee5\u53ca\u63d0\u9ad8IT\u4eba\u5458\u7684\u6548\u7387\u3002<br \/>\n\u73b0\u4ee3\u6570\u636e\u4e2d\u5fc3\u662f\u6307\u4e00\u79cd\u7279\u6b8a\u7684IT\u57fa\u7840\u8bbe\u65bd\uff0c\u7528\u4e8e\u96c6\u4e2d\u653e\u7f6eIT\u8d44\u6e90\uff0c\u5305\u62ec\uff1a<strong>\u670d\u52a1\u5668\uff08services\uff09\u3001\u6570\u636e\u5e93\uff08data-bases\uff09\u3001\u7f51\u7edc\u4e0e\u901a\u4fe1\u8bbe\u5907\uff08networking and telecommunication devices\uff09<\/strong>\u4ee5\u53ca<strong>\u8f6f\u4ef6\u7cfb\u7edf\uff08software system\uff09<\/strong>\u3002<br \/>\n\u6570\u636e\u4e2d\u5fc3\u5305\u542b\u4e86<strong>\u7269\u7406\u548c\u865a\u62df\u7684IT\u8d44\u6e90<\/strong>\u3002<br \/>\n\uff081\uff09\u7269\u7406IT\u8d44\u6e90\u5c42\u662f\u6307\u653e\u7f6e\u8ba1\u7b97\/\u7f51\u7edc\u7cfb\u7edf\u548c\u8bbe\u5907\uff0c\u4ee5\u53ca\u786c\u4ef6\u7cfb\u7edf\u53ca\u5176\u64cd\u4f5c\u7cfb\u7edf\u7684\u57fa\u7840\u8bbe\u65bd\u3002<br \/>\n\uff082\uff09\u865a\u62df\u5c42\u5bf9\u8d44\u6e90\u8fdb\u884c\u62bd\u8c61\u548c\u63a7\u5236\uff0c\u901a\u5e38\u662f\u7531<strong>\u865a\u62df\u5316\u5e73\u53f0\uff08virtualization platform\uff09<\/strong>\u4e0a\u7684\u8fd0\u884c\u548c\u7ba1\u7406\u5de5\u5177\u6784\u6210\u3002<\/p>\n<h3>5.2.1 \u865a\u62df\u5316(virtualization)<\/h3>\n<p>\u865a\u62df\u5316\u5e73\u53f0\u5c06\u7269\u7406\u8ba1\u7b97\u548c\u7f51\u7edcIT\u8d44\u6e90\u62bd\u8c61\u4e3a\u865a\u62df\u5316\u90e8\u4ef6\uff0c\u8fd9\u6837\u66f4\u6613\u4e8e\u8fdb\u884c\u8d44\u6e90<strong>\u5206\u914d\uff08allocate\uff09\uff0c\u64cd\u4f5c\uff08operate\uff09\uff0c\u91ca\u653e\uff08release\uff09\uff0c\u76d1\u89c6\uff08monitor\uff09\u548c\u63a7\u5236\uff08control\uff09<\/strong>\u3002<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-614\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/5-6-281x300.png\" alt=\"\" width=\"423\" height=\"452\" \/><br \/>\nVIM \uff08virtual infrastructure management \u865a\u62df\u57fa\u7840\u8bbe\u65bd\u7ba1\u7406\u5668\uff0c\u7528\u4e8e\u534f\u8c03\u4e0eVM\u5b9e\u4f8b\u521b\u5efa\u76f8\u5173\u7684\u7269\u7406\u670d\u52a1\u5668\uff09<\/p>\n<h3>5.2.2 \u6807\u51c6\u5316\u4e0e\u6a21\u5757\u5316\uff08Standardization and Modularity\uff09<\/h3>\n<p>\u6570\u636e\u4e2d\u5fc3\u4ee5<strong>\u6807\u51c6\u5316\u5546\u7528\u786c\u4ef6\uff08standardized commodity hardware\uff09<\/strong>\u4e3a\u57fa\u7840\uff0c\u7528<strong>\u6a21\u5757\u5316\u67b6\u6784\uff08modular architecture\uff09<\/strong>\u8fdb\u884c\u8bbe\u8ba1\uff0c\u6574\u5408\u4e86\u591a\u4e2a\u76f8\u540c\u7684\u57fa\u7840\u8bbe\u65bd\u6a21\u5757\u548c\u8bbe\u5907\uff0c\u5177\u5907<strong>\u53ef\u6269\u5c55\u6027\uff08scalability\uff09<\/strong>\uff0c<strong>\u53ef\u589e\u957f\u6027\uff08growth\uff09<\/strong>\u548c<strong>\u5feb\u901f\u66f4\u6362\u786c\u4ef6\uff08speedy hardware replacement\uff09<\/strong>\u7684\u7279\u70b9\u3002<br \/>\n\u6807\u51c6\u5316\u548c\u6a21\u5757\u5316\u662f<strong>\u51cf\u5c11\u6295\u8d44\uff08reduce investment\uff09<\/strong>\u548c<strong>\u8fd0\u8425\u6210\u672c\uff08operatiounal costs\uff09<\/strong>\u7684\u5173\u952e\u6761\u4ef6\u3002\u56e0\u4e3a\u5b83\u4eec\u5b9e\u73b0\u91c7\u8d2d\uff08procurement\uff09\uff0c\u6536\u8d2d\uff08acquisition\uff09\uff0c\u90e8\u7f72\uff08deployment\uff09\uff0c\u8fd0\u8425\uff08operation\uff09\u548c\u7ef4\u62a4\uff08maintenance\uff09\u7684\u89c4\u6a21\u7ecf\u6d4e\u3002<\/p>\n<h3>5.2.3 \u81ea\u52a8\u5316\uff08Automation\uff09<\/h3>\n<p>\u6570\u636e\u4e2d\u5fc3\u5177\u5907\u7279\u6b8a\u7684\u5e73\u53f0\u5c06<strong>\u4f9b\u7ed9\uff08provisioning\uff09\uff0c\u914d\u7f6e\uff08configuration\uff09\uff0c\u6253\u8865\u4e01\uff08patching\uff09\u548c\u76d1\u63a7\uff08monitor\uff09\u7b49\u4efb\u52a1\u8fdb\u884c\u81ea\u52a8\u5316\uff0c\u800c\u4e0d\u9700\u8981\u76d1\u7ba1\uff08supervision\uff09<\/strong>\u3002<br \/>\n\u6570\u636e\u4e2d\u5fc3\u7ba1\u7406\u5e73\u53f0\u548c\u5de5\u5177\u7684\u6539\u8fdb\u5229\u7528\u4e86\u81ea\u4e3b\u8ba1\u7b97\u6280\u672f\u5b9e\u73b0<strong>\u81ea\u914d\u7f6e\uff08self-configuration\uff09\u548c\u81ea\u6062\u590d\uff08self-recovery\uff09<\/strong>\u3002<\/p>\n<h3>5.2.4 \u8fdc\u7a0b\u64cd\u4f5c\u4e0e\u7ba1\u7406\uff08Remote Operation and Management\uff09<\/h3>\n<p>\u5728\u6570\u636e\u4e2d\u5fc3\uff0cIT\u8d44\u6e90\u7684\u5927\u591a\u6570\u64cd\u4f5c\u548c\u7ba1\u7406\u4efb\u52a1\u90fd\u662f\u7531\u7f51\u7edc\u8fdc\u7a0b\u63a7\u5236\u53f0\u548c\u7ba1\u7406\u7cfb\u7edf\u6765\u6307\u6325\u7684\u3002<\/p>\n<h3>5.2.5 \u9ad8\u53ef\u7528\u6027\uff08High Availability\uff09<\/h3>\n<p>\u6570\u636e\u4e2d\u5fc3\u91c7\u7528\u4e86<strong>\u5197\u4f59\u5ea6\uff08redundancy\uff09<\/strong>\u8d8a\u6765\u8d8a\u9ad8\u7684\u8bbe\u8ba1\u3002\u6570\u636e\u4e2d\u5fc3\u901a\u5e38\u5177\u6709\u5197\u4f59\u7684\u4e0d\u95f4\u65ad\u7535\u6e90\uff08uninterruptable power supplies\uff09\uff0c\u7efc\u5408\u5e03\u7ebf\uff08cabling\uff09\uff0c\u73af\u5883\u63a7\u5236\u5b50\u7cfb\u7edf\uff08environmental control subsystem in anticipation of system failure\uff09\uff0c\u5197\u4f59\u7684\u901a\u4fe1\u94fe\u8def\uff08communication link\uff09\u548c\u96c6\u7fa4\u786c\u4ef6\uff08clustered hardware for load balancing\uff09\u3002<\/p>\n<h3>5.2.6 \u5b89\u5168\u611f\u77e5\u7684\u8bbe\u8ba1\uff0c\u64cd\u4f5c\u4e0e\u7ba1\u7406\uff08Security-Aware Design\uff0cOperation\uff0cand Management \uff09<\/h3>\n<p>\u5982\uff1a\u7269\u7406\u548c\u903b\u8f91\u7684\u8bbf\u95ee\u63a7\u5236\uff08physical and logical access control\uff09\uff0c\u6570\u636e\u6062\u590d\u7b56\u7565\uff08data recovery strategies\uff09\u3002<\/p>\n<h3>5.2.7 \u914d\u5957\u8bbe\u65bd\uff08Facilities\uff09<\/h3>\n<p>\u6570\u636e\u4e2d\u5fc3\u7684\u914d\u5957\u8bbe\u65bd\u653e\u7f6e\u5728\u4e13\u95e8\u8bbe\u8ba1\u7684\u4f4d\u7f6e\uff0c\u914d\u5907\u4e86\u4e13\u95e8\u7684\u8ba1\u7b97\u8bbe\u5907\uff0c\u5b58\u50a8\u8bbe\u5907\u548c\u7f51\u7edc\u8bbe\u5907\u3002<\/p>\n<h3>5.2.8 \u8ba1\u7b97\u786c\u4ef6\uff08Computing Hardware\uff09<\/h3>\n<h3>5.2.9 \u5b58\u50a8\u786c\u4ef6\uff08Storage Hardware\uff09<\/h3>\n<p>\u6d89\u53ca\u6280\u672f\uff1a<br \/>\n\uff081\uff09\u786c\u76d8\u9635\u5217\uff08hard disk array\uff09<br \/>\n\uff082\uff09I\/O\u9ad8\u901f\u7f13\u5b58\uff08I\/O catcohing\uff09<br \/>\n\uff083\uff09\u70ed\u63d2\u62d4\u786c\u76d8\uff08hot-swappable hard disk\uff09<br \/>\n\uff084\uff09\u5b58\u50a8\u865a\u62df\u5316\uff08storage virtualizatoion\uff09<br \/>\n\uff086\uff09\u5feb\u901f\u6570\u636e\u590d\u5236\u673a\u5236\uff08fast data replication mechanism\uff09\uff0c\u5305\u62ec\u5feb\u7167\uff08snapshotting\uff09\uff0c\u5377\u514b\u9686\uff08volume cloning\uff09<br \/>\n\u7f51\u7edc\u5b58\u50a8\u8bbe\u5907\u901a\u5e38\u5206\u4e3a\u4e24\u7c7b\uff1a<br \/>\n<strong>\uff081\uff09\u5b58\u50a8\u533a\u57df\u7f51\u7edc\uff08Storage Area Network\uff0cSAN\uff09<\/strong><br \/>\n<strong>\uff082\uff09\u7f51\u7edc\u9644\u52a0\u5b58\u50a8\uff08Network-Attached Storage\uff0cNAS\uff09<\/strong><br \/>\n&nbsp;<br \/>\n<strong>\u76f4\u63a5\u9644\u52a0\u5b58\u50a8\uff08<span style=\"text-align: left; color: #555555; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; text-decoration: none; word-spacing: 0px; display: inline !important; white-space: normal; orphans: 2; float: none; -webkit-text-stroke-width: 0px; background-color: transparent;\">DAS\uff09<\/span><\/strong><b><\/b><i><\/i><u><\/u><\/p>\n<h3>5.2.10 \u7f51\u7edc\u786c\u4ef6\uff08network hardware\uff09<\/h3>\n<p>\u7f51\u7edc\u57fa\u7840\u8bbe\u65bd\u53ef\u5206\u4e3a\u4e94\u4e2a\u7f51\u7edc\u5b50\u7cfb\u7edf\uff1a<br \/>\n\uff081\uff09\u8fd0\u8425\u5546\u548c\u5916\u7f51\u4e92\u8054\uff08Carrier and External Network Interconnection\uff09<br \/>\n\uff082\uff09Web\u5c42\u8d1f\u8f7d\u5747\u8861\u548c\u52a0\u901f\uff08Web-Tier Load Balancing and Acceleration\uff09<br \/>\n\uff083\uff09LAN\u5149\u7f51\u7edc\uff08LAN Fabric\uff09<br \/>\n\uff084\uff09SAN\u5149\u7f51\u7edc\uff08SAN Fabric\uff09<br \/>\n\uff085\uff09NAS\u7f51\u5173\uff08NAS Gateways\uff09<\/p>\n<h3>5.2.11 \u5176\u4ed6\u8003\u91cf<\/h3>\n<p>IT\u786c\u4ef6\u53d7\u5feb\u901f\u6280\u672f\u6298\u65e7\u7684\u5f71\u54cd\uff0c\u5176\u751f\u547d\u5468\u671f\u4e00\u822c\u662f5~7\u5e74\u3002<br \/>\n&nbsp;<\/p>\n<h2>5.3\u865a\u62df\u5316\u6280\u672f\uff08Virtualization Technology\uff09<\/h2>\n<p>\u865a\u62df\u5316\u662f\u5c06\u7269\u7406IT\u8d44\u6e90\u8f6c\u5316\u4e3a\u865a\u62dfIT\u8d44\u6e90\u7684\u8fc7\u7a0b\u3002<br \/>\n\u8fd0\u884c\u865a\u62df\u5316\u7684\u7269\u7406\u670d\u52a1\u5668\u79f0\u4e3a<strong>\u4e3b\u673a\uff08host\uff09<\/strong>\u6216<strong>\u7269\u7406\u4e3b\u673a\uff08physical host\uff09<\/strong>\u3002<br \/>\n\u4e0e\u865a\u62df\u673a\u7ba1\u7406\u76f8\u5173\u7684\u670d\u52a1\u7684\u8f6f\u4ef6\u79f0\u4e3a<strong>\u865a\u62df\u673a\u7ba1\u7406\u5668\uff08virtual muachine manager\uff09<\/strong>\u6216<strong>\u865a\u62df\u673a\u76d1\u89c6\u5668\uff08virtual Machine monitor\uff09<\/strong>\uff0c\u6700\u5e38\u89c1\u7684\u540d\u79f0\u4e3a<strong>\u865a\u62df\u673a\u76d1\u63a7\u5668\uff08hypervisor\uff09<\/strong>\u3002<br \/>\n\u865a\u62df\u673a\u76d1\u63a7\u5668\u7531\u5904\u7406\u786c\u4ef6\u7ba1\u7406\u529f\u80fd\u7684\u8f6f\u4ef6\u6784\u6210\uff0c\u5f62\u6210\u4e86\u865a\u62df\u5316\u7ba1\u7406\u5c42\u3002<br \/>\nHypervisor exists as a thin layer of software that handles hardware management functions to establish a virtualization management layer.<\/p>\n<h3>5.3.1\u786c\u4ef6\u65e0\u5173\u6027\uff08Hardware Independence\uff09<\/h3>\n<h3>5.3.2\u670d\u52a1\u5668\u6574\u5408\uff08Server Consolidation\uff09<\/h3>\n<p>\u4e00\u4e2a\u865a\u62df\u4e3b\u673a\u4e0a\u53ef\u4ee5\u540c\u65f6\u521b\u5efa\u591a\u4e2a\u865a\u62df\u670d\u52a1\u5668\u3002<br \/>\n\u865a\u62df\u5316\u6280\u672f\u5141\u8bb8\u4e0d\u540c\u7684\u865a\u62df\u670d\u52a1\u5668\u5171\u4eab\u540c\u4e00\u4e2a\u7269\u7406\u670d\u52a1\u5668\u3002<br \/>\n\u901a\u5e38\u7528\u6765\u63d0\u9ad8\u786c\u4ef6\u5229\u7528\u7387\uff0c\u8d1f\u8f7d\u5747\u8861\u4ee5\u53ca\u5bf9\u53ef\u7528\u7684IT\u8d44\u6e90\u7684\u4f18\u5316\u3002<br \/>\nThe different virtual servers can run different guest operating systems on the same host.<br \/>\n\u670d\u52a1\u5668\u6574\u5408\u5e26\u6765\u4e86\u7075\u6d3b\u6027\uff0c\u4f7f\u5f97\u4e0d\u540c\u7684\u865a\u62df\u670d\u52a1\u5668\u53ef\u4ee5\u5728\u540c\u4e00\u4e2a\u4e3b\u673a\u4e0a\u8fd0\u884c\u4e0d\u540c\u7684\u5ba2\u6237\u64cd\u4f5c\u7cfb\u7edf\u3002<br \/>\n&nbsp;<br \/>\n<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">The coordinate function that is provided by the virtualization software allows multiple virtual service to be simultaneously created in the same virtualization host. Virtualization technology enable different virtual service to share one physical service .This\u00a0 process is called service consolidation\u3002<\/span><\/p>\n<h3>5.3.3\u8d44\u6e90\u590d\u5236\uff08Resource Replication\uff09<\/h3>\n<h3>5.3.4\u57fa\u4e8e\u64cd\u4f5c\u7cfb\u7edf\u7684\u865a\u62df\u5316\uff08Operating System-Based Virtualization\uff09<\/h3>\n<p>\u662f\u6307\u5728\u4e00\u4e2a\u5df2\u5b58\u5728\u7684\u64cd\u4f5c\u7cfb\u7edf\u4e0a\u5b89\u88c5\u865a\u62df\u5316\u8f6f\u4ef6\uff0c\u8fd9\u4e2a\u5df2\u5b58\u5728\u7684\u64cd\u4f5c\u7cfb\u7edf\u88ab\u79f0\u4e3a\u5bbf\u4e3b\u64cd\u4f5c\u7cfb\u7edf\uff08host operating system\uff09\u3002<br \/>\n\u865a\u62df\u5316\u8f6f\u4ef6\u5c06\u9700\u8981\u7279\u6b8a\u64cd\u4f5c\u8f6f\u4ef6\u7684\u786c\u4ef6IT\u8d44\u6e90\u8f6c\u5316\u4e3a\u517c\u5bb9\u591a\u4e2a\u64cd\u4f5c\u7cfb\u7edf\u7684\u865a\u62dfIT\u8d44\u6e90\u3002<br \/>\nVirtualization software translates hardware IT resources into virtualized IT resources.<\/p>\n<h3>5.3.5\u57fa\u4e8e\u786c\u4ef6\u7684\u865a\u62df\u5316\uff08Hardware-Based Virtualization\uff09<\/h3>\n<p>\u57fa\u4e8e\u786c\u4ef6\u7684\u865a\u62df\u5316<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\u662f\u6307\u5c06\u865a\u62df\u5316\u8f6f\u4ef6\u76f4\u63a5\u5b89\u88c5\u5728\u7269\u7406\u4e3b\u673a\u786c\u4ef6\u4e0a\uff0c\u4ece\u800c\u7ed5\u8fc7\u5bbf\u4e3b\u64cd\u4f5c\u7cfb\u7edf\uff0c\u8fd9\u4e5f\u9002\u7528\u4e8e\u57fa\u4e8e\u64cd\u4f5c\u7cfb\u7edf\u7684\u865a\u62df\u5316\u3002<\/span><b><\/b><i><\/i><u><\/u><br \/>\n\u4e3b\u8981\u95ee\u9898\u662f\u4e0e\u786c\u4ef6\u8bbe\u5907\u7684\u517c\u5bb9\u6bd4\u786c\u4ef6\u7684\u865a\u62df\u5316\u901a\u5e38\u66f4\u9ad8\u6548\u3002<\/p>\n<h3>5.3.6\u865a\u62df\u5316\u7ba1\u7406\uff08Virtualization Management\uff09<\/h3>\n<p>\u865a\u62df\u5316IT\u8d44\u6e90\u7684\u7ba1\u7406\u901a\u5e38\u662f\u7531\u865a\u62df\u5316\u57fa\u7840\u8bbe\u65bd\u7ba1\u7406\uff08virtualization Infrastructure management \uff0cVIM\uff09\u5de5\u5177\u5b9e\u73b0\u7684\u3002<\/p>\n<h3>5.3.7\u5176\u4ed6\u8003\u91cf<\/h3>\n<p>\uff081\uff09\u6027\u80fd\u5f00\u9500\uff08performance overhead\uff09<br \/>\n\uff082\uff09\u7279\u6b8a\u786c\u4ef6\u517c\u5bb9\u6027\uff08special hardware compatibility\uff09<br \/>\n\uff083\uff09\u53ef\u79fb\u690d\u6027\uff08portability\uff09<\/p>\n<h2>5.4 Web\u6280\u672f\uff08Web Technology\uff09<\/h2>\n<p>Web\u6280\u672f\u901a\u5e38\u7528\u4f5c\u670d\u52a1\u7684\u4ecb\u8d28\u548c\u7ba1\u7406\u63a5\u53e3\u3002<br \/>\nArtifacts accessible via WWW are referred to as\u00a0resources\u00a0or\u00a0Web resources.<br \/>\n\u53ef\u4ee5\u901a\u8fc7WWW\u8bbf\u95ee\u7684\u4e8b\u7269\u79f0\u4e3a\u8d44\u6e90\uff08resource\uff09\u6216Web \u8d44\u6e90\uff08<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">Web resources<\/span>\uff09\u3002<\/p>\n<h3>5.4.1\u57fa\u672cWeb\u6280\u672f\uff08Basic Web Technology\uff09<\/h3>\n<p>Web\u6280\u672f\u67b6\u6784\u7531\u4e09\u4e2a\u57fa\u672c\u5143\u7d20\u7ec4\u6210\uff1a<br \/>\n\uff081\uff09\u7edf\u4e00\u8d44\u6e90\u5b9a\u4f4d\u7b26\uff08Uniform Resource Locator\uff0cURL\uff09<br \/>\n\uff082\uff09\u8d85\u6587\u672c\u4f20\u8f93\u534f\u8bae\uff08Hypertext Transfer Protocol\uff0cHTTP\uff09<br \/>\n\uff083\uff09\u6807\u8bb0\u8bed\u8a00\uff08Markup Language\uff09\uff08HTML\uff0cXML\uff09<br \/>\n&nbsp;<br \/>\nWeb\u8d44\u6e90\u4e5f\u79f0\u8d85\u5a92\u4f53\uff08Hypermedia\uff09\u3002<\/p>\n<h3>5.4.2Web\u5e94\u7528\uff08Web Application\uff09<\/h3>\n<p>PaaS ready-made environments enable cloud consumers to develop and deploy Web applications.<br \/>\n\u5df2\u5c31\u7eeaPaaS\u73af\u5883\u4f7f\u5f97\u4e91\u7528\u6237\u53ef\u4ee5\u5f00\u53d1\u548c\u90e8\u7f72Web\u5e94\u7528\u3002<\/p>\n<h2>5.5\u591a\u79df\u6237\u6280\u672f\uff08Multi tenant Technology\uff09<\/h2>\n<p>The multitenant application design was created to enable multiple users to access the same application logic simultaneously.<br \/>\n\u8bbe\u8ba1\u591a\u79df\u6237\u5e94\u7528\u7684\u76ee\u7684\u662f\u4f7f\u5f97\u591a\u4e2a\u7528\u6237\uff08\u591a\u79df\u6237\uff09\u5728\u903b\u8f91\u4e0a\u540c\u65f6\u8bbf\u95ee\u540c\u4e00\u4e2a\u5e94\u7528\u3002<br \/>\nThe multitenant applications ensure that tenants do not have access to data and configuration information that is not their own.<br \/>\n\u591a\u79df\u6237\u5e94\u7528\u786e\u4fdd\u6bcf\u4e00\u4e2a\u79df\u6237\u90fd\u4e0d\u4f1a\u8bbf\u95ee\u5230\u4e0d\u5c5e\u4e8e\u81ea\u5df1\u7684\u6570\u636e\u548c\u914d\u7f6e\u4fe1\u606f\u3002<br \/>\n\u79df\u6237\u53ef\u4ee5\u72ec\u7acb\u5b9a\u5236\u7684\u5e94\u7528\u7279\u5f81\uff1a<br \/>\n\uff081\uff09\u7528\u6237\u754c\u9762\uff08user interface\uff09<br \/>\n\uff082\uff09\u4e1a\u52a1\u6d41\u7a0b\uff08business process\uff09<br \/>\n\uff083\uff09\u6570\u636e\u6a21\u578b\uff08data model\uff09<br \/>\n\uff084\uff09\u8bbf\u95ee\u63a7\u5236\uff08access control\uff09<br \/>\n\u591a\u79df\u6237\u5e94\u7528\u7684\u7279\u70b9\uff1a<br \/>\n\uff081\uff09\u4f7f\u7528\u9694\u79bb\uff08usage isolation\uff09<br \/>\n\uff082\uff09\u6570\u636e\u5b89\u5168\uff08data security\uff09<br \/>\n\uff083\uff09\u53ef\u6062\u590d\u6027\uff08recovery\uff09<br \/>\n\uff084\uff09\u5e94\u7528\u5347\u7ea7\uff08application upgrade\uff09<br \/>\n\uff085\uff09\u53ef\u6269\u5c55\u6027\uff08scalability\uff09<br \/>\n\uff086\uff09\u4f7f\u7528\u8ba1\u8d39\uff08metered usage\uff09<br \/>\n\uff087\uff09\u6570\u636e\u5c42\u9694\u79bb\uff08data tier isolation\uff09<br \/>\n&nbsp;<\/p>\n<h2>5.6\u670d\u52a1\u6280\u672f\uff08Service Technology\uff09<\/h2>\n<p>\u670d\u52a1\u6280\u672f\u662f\u4e91\u8ba1\u7b97\u7684\u57fa\u77f3\uff0c\u5b83\u5f62\u6210\u4e86\u201c\u4f5c\u4e3a\u670d\u52a1\u201d\u7684\u4e91\u4ea4\u4ed8\u6a21\u578b\u7684\u57fa\u7840\u3002<br \/>\nThe field of service technology is a keystone foundation of cloud computing that formed the basis of the \u201cas-a-service\u201d cloud delivery models.<\/p>\n<h3>5.6.1 Web\u670d\u52a1\uff08Web Service\uff09<\/h3>\n<p>Web\u670d\u52a1\u7684\u6838\u5fc3\u6280\u672f\u8868\u73b0\uff1a<br \/>\n\uff081\uff09Web\u670d\u52a1\u63cf\u8ff0\u8bed\u8a00\uff08Web Service Description Language\uff09<br \/>\n\uff082\uff09XML\u6a21\u5f0f\u63cf\u8ff0\u8bed\u8a00\uff08XML schema definition language\uff09<br \/>\n\uff083\uff09SOAP \uff08Simple Object Access Protocol\uff09<br \/>\n\uff084\uff09\u7edf\u4e00\u63cf\u8ff0\uff0c\u53d1\u73b0\u548c\u96c6\u6210\uff08Universal Description \uff0cDiscovery and Integration\uff0cUDDI\uff09<\/p>\n<h3>5.6.2 REST\u670d\u52a1\uff08REST Service\uff09<\/h3>\n<p>REST\u670d\u52a1\u662f\u6309\u7167\u4e00\u7ec4\u7ea6\u675f\u6761\u4ef6\u8bbe\u8ba1\u7684\uff0c\u8fd9\u7ec4\u7ea6\u675f\u6761\u4ef6\u4f7f\u5f97\u670d\u52a1\u67b6\u6784\u6a21\u62dfWWW\u7684\u5c5e\u6027\uff0c\u4ece\u800c\u5bfc\u81f4\u670d\u52a1\u7684\u5b9e\u73b0\u8981\u4f9d\u8d56\u4e8e\u4f7f\u7528\u6838\u5fc3Web\u6280\u672f\u3002<br \/>\nREST\u670d\u52a1\u6ca1\u6709\u72ec\u7acb\u7684\u63a5\u53e3\u6280\u672f\uff0c\u662f\u5171\u4eab\u4e00\u4e2a\u901a\u7528\u6280\u672f\u63a5\u53e3\uff0c\u8be5\u6280\u672f\u63a5\u53e3\u79f0\u4e3a<strong>\u7edf\u4e00\u5408\u7ea6\uff08<span style=\"text-align: left; color: #555555; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; text-decoration: none; word-spacing: 0px; display: inline !important; white-space: normal; cursor: text; orphans: 2; float: none; -webkit-text-stroke-width: 0px; background-color: transparent;\">Uniform Contrast<\/span>\uff09\uff0c<\/strong>\u4e00\u822c\u662fHTTP\u65b9\u6cd5\u5efa\u7acb\u7684\u3002<br \/>\n\u6709\u516d\u4e2a\u8bbe\u8ba1\u7ea6\u675f\uff1a<br \/>\n\uff081\uff09\u5ba2\u6237\u7aef-\u670d\u52a1\u5668\uff08Client-Service\uff09<br \/>\n\uff082\uff09\u65e0\u72b6\u6001\uff08Stateless\uff09<br \/>\n\uff083\uff09\u7f13\u5b58\uff08Cache\uff09<br \/>\n\uff084\uff09\u63a5\u53e3\/\u7edf\u4e00\u5408\u7ea6\uff08Interface\/Uniform Contrast\uff09<br \/>\n\uff085\uff09\u5c42\u6b21\u5316\u7cfb\u7edf\uff08Layered System\uff09<br \/>\n\uff086\uff09\u6309\u9700\u7f16\u7801\uff08Code-On-Demand\uff09<\/p>\n<h3>5.6.3\u670d\u52a1\u4ee3\u7406\uff08Service Agent\uff09<\/h3>\n<p>\u670d\u52a1\u4ee3\u7406\u662f\u4e8b\u4ef6\u9a71\u52a8\u7a0b\u5e8f\uff0c\u5b83\u5728\u8fd0\u884c\u65f6\u62e6\u622a\u4fe1\u606f\u3002<br \/>\n\u5206\u4e3a<strong>\u4e3b\u52a8\u670d\u52a1\u4ee3\u7406<\/strong>\u548c<strong>\u88ab\u52a8\u670d\u52a1\u4ee3\u7406<\/strong>\u3002<br \/>\n\uff081\uff09<strong>\u4e3b\u52a8\u670d\u52a1\u4ee3\u7406\uff08Active Service Agent\uff09<\/strong>\uff1a\u5728\u62e6\u622a\u5e76\u8bfb\u53d6\u4fe1\u606f\u540e\uff0c\u4f1a\u91c7\u53d6\u4e00\u5b9a\u7684\u63aa\u65bd\uff0c\u901a\u5e38\u662f\u4fee\u6539\u4fe1\u606f\u5185\u5bb9\uff08\u6700\u5e38\u89c1\u7684\u662f\u4fee\u6539\u4fe1\u606f\u5934\u90e8\u6570\u636e\uff0c\u5c11\u90e8\u5206\u4f1a\u4fee\u6539\u4fe1\u606f\u4f53\u6570\u636e\uff09\u3002<br \/>\n<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">Active service agent perform an active upon intercepting and reading the content of a message . The action typically requires making change to the message contents or change the path itself\u3002<\/span><br \/>\n\uff082\uff09<strong>\u88ab\u52a8\u670d\u52a1\u4ee3\u7406\uff08Passive <span style=\"text-align: left; color: #555555; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; text-decoration: none; word-spacing: 0px; display: inline !important; white-space: normal; cursor: text; orphans: 2; float: none; -webkit-text-stroke-width: 0px; background-color: transparent;\">Service Agent<\/span>\uff09<\/strong>\uff1a\u4e0d\u4f1a\u4fee\u6539\u6570\u636e\uff0c\u800c\u662f\u8bfb\u53d6\u4fe1\u606f\u540e\u6355\u6349\u7279\u5b9a\u5185\u5bb9\u4ee5\u4fbf\u8fdb\u884c\u76d1\u63a7\u3001\u8bb0\u5f55\u6216\u8005\u62a5\u544a\u3002<br \/>\n<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\uff082\uff09Passive service agent do not change message contents. Instead \uff0cthey read the message and may then capture certain path of its contents ,usually for monitoring ,logging ,or reporting purposes.<\/span><\/p>\n<h3>5.6.4\u670d\u52a1\u4e2d\u95f4\u4ef6\uff08Service Middleware\uff09<\/h3>\n<p>&nbsp;<br \/>\n\u4e24\u79cd\u6700\u5e38\u89c1\u7684\u4e2d\u95f4\u4ef6\u5e73\u53f0\u7c7b\u578b<br \/>\n\uff081\uff09\u4f01\u4e1a\u670d\u52a1\u603b\u7ebf\uff08ESB\uff09\uff08Enterprise Service Bus\uff09<br \/>\n\uff082\uff09\u4e1a\u52a1\u6d41\u7a0b\u5e73\u53f0\uff08orchestration platform\uff09<br \/>\n\u4e0a\u8ff0\u4e24\u79cd\u670d\u52a1\u4e2d\u95f4\u4ef6\u90fd\u53ef\u4ee5\u5728\u57fa\u4e8e\u4e91\u7684\u73af\u5883\u4e2d\u8fdb\u884c\u90e8\u7f72\u548c\u8fd0\u884c\u3002<br \/>\n&nbsp;<br \/>\n\u5173\u952e\u70b9\u5c0f\u7ed3\uff1a<br \/>\n\uff081\uff09\u4e91\u7528\u6237\u548c\u4e91\u63d0\u4f9b\u8005\u901a\u5e38\u5229\u7528Internet\u8fdb\u884c\u901a\u4fe1\u3002Internet \u4ee5\u65e0\u4e2d\u5fc3\u7684\u4f9b\u7ed9\u548c\u7ba1\u7406\u6a21\u578b\u4e3a\u57fa\u7840\uff0c\u4e0d\u53d7\u4efb\u4f55\u96c6\u4e2d\u5f0f\u5b9e\u4f53\u63a7\u5236\u3002<br \/>\n\uff082\uff09\u7f51\u7edc\u4e92\u8054\u67b6\u6784\u7684\u4e3b\u8981\u7ec4\u4ef6\u662f\u4f7f\u7528\u7f51\u7edc\u8def\u7531\u5668\u548c\u4ea4\u6362\u673a\u7684\u65e0\u8fde\u63a5\u5206\u7ec4\u4ea4\u6362\u4e0e\u57fa\u4e8e\u8def\u7531\u5668\u7684\u4e92\u8054\u3002\u7f51\u7edc\u5e26\u5bbd\u548c\u5ef6\u8fdf\u662f\u5f71\u54cdQoS\u7684\u56e0\u7d20\uff0c\u800c\u7f51\u7edc\u62e5\u585e\u5bf9\u5176\u6709\u5de8\u5927\u5f71\u54cd\u3002<br \/>\n\uff083\uff09\u6570\u636e\u4e2d\u5fc3\u662f\u4e13\u95e8\u7684IT\u57fa\u7840\u8bbe\u65bd\uff0c\u7528\u4e8e\u96c6\u4e2d\u5b58\u653eIT\u8d44\u6e90\uff0c\u5982\u670d\u52a1\u5668\uff0c\u6570\u636e\u5e93\u548c\u8f6f\u4ef6\u7cfb\u7edf\u3002<br \/>\n\uff084\uff09\u6570\u636e\u4e2d\u5fc3\u7684IT\u786c\u4ef6\u901a\u5e38\u662f\u7531\u6807\u51c6<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\u5546\u7528\u670d\u52a1\u5668\u6784\u6210\uff0c\u5176\u5177\u6709\u589e\u5f3a\u7684\u8ba1\u7b97\u80fd\u529b\u7684\u5b58\u50a8\u5bb9\u91cf\uff0c\u800c\u5b58\u50a8\u6280\u672f\u5219\u5305\u62ec\u4e86\u78c1\u76d8\u9635\u5217\u548c\u5b58\u50a8\u865a\u62df\u5316\u3002\u589e\u52a0\u5b58\u50a8\u5bb9\u91cf\u6280\u672f\u5305\u62ec\uff1aDAS\uff0cSAN\u548cNAS\u3002<\/span><br \/>\n\uff085\uff09\u8ba1\u7b97\u786c\u4ef6\u6280\u672f\u5305\u62ec\u673a\u67b6\u5f0f\u670d\u52a1\u5668\u9635\u5217\u548c\u591a\u6838CPU\u67b6\u6784\u3002\u4e13\u7528\u7684\u9ad8\u5bb9\u91cf\u7f51\u7edc\u786c\u4ef6\uff08\u5982\u5185\u5bb9\u611f\u77e5\u7684\u8def\u7531\u3001LAN\u548cSAN\u5149\u7f51\u7edc\u53caNAS\u7f51\u5173\u7b49\uff09\u548c\u6280\u672f\u53ef\u4ee5\u63d0\u9ad8\u7f51\u7edc\u3002\u4e92\u8054\u6027\u3002<br \/>\n\uff086\uff09\u670d\u52a1\u5668\u865a\u62df\u5316\u662f\u6307\u5229\u7528\u865a\u62df\u5316\u8f6f\u4ef6\u5c06IT\u786c\u4ef6\u62bd\u8c61\u4e3a\u865a\u62df\u670d\u52a1\u5668\u3002<br \/>\n\uff087\uff09\u865a\u62df\u5316\u63d0\u4f9b\u4e86\u786c\u4ef6\u65e0\u5173\u6027\u3001\u670d\u52a1\u5668\u6574\u5408\u3001\u8d44\u6e90\u590d\u5236\u3001\u5bf9\u8d44\u6e90\u6c60\u66f4\u5f3a\u7684\u652f\u6301\u548c\u7075\u6d3b\u7684\u6269\u5c55\u6027\u3002<br \/>\n\uff088\uff09\u5b9e\u73b0\u865a\u62df\u670d\u52a1\u5668\u65e2\u53ef\u4ee5\u91c7\u7528\u57fa\u4e8e\u64cd\u4f5c\u7cfb\u7edf\u7684\u865a\u62df\u5316\uff0c\u4e5f\u53ef\u4ee5\u91c7\u7528\u57fa\u4e8e\u786c\u4ef6\u7684\u865a\u62df\u5316\u3002<br \/>\n\uff089\uff09Web\u6280\u672f\u7ecf\u5e38\u88ab\u7528\u4e8e\u4e91\u670d\u52a1\u7684\u5b9e\u73b0\uff0c\u5e76\u5728\u524d\u7aef\u7528\u4e8e\u8fdc\u7a0b\u7ba1\u7406\u4e91IT\u8d44\u6e90\u3002<br \/>\n\uff0810\uff09Web\u67b6\u6784\u7684\u57fa\u672c\u6280\u672f\u5305\u62ec\uff1aURL\u3001HTTP\u3001HTML\u3001XML\u3002<br \/>\n\uff0811\uff09\u57fa\u4e8eWeb\u7684\u670d\u52a1\uff08\u5982Web\u670d\u52a1\u548cREST\u670d\u52a1\uff09\u4f9d\u9760\u975e\u4e13\u6709\u901a\u4fe1\u548c\u6280\u672f\u63a5\u53e3\u5b9a\u4e49\u6765\u5efa\u7acb\u4e8eWeb\u6280\u672f\u7684\u6807\u51c6\u901a\u4fe1\u6846\u67b6\u3002<br \/>\n\uff0812\uff09\u670d\u52a1\u4ee3\u7406\u63d0\u4f9b\u4e8b\u4ef6\u9a71\u52a8\u8fd0\u884c\u65f6\u5904\u7406\uff0c\u9002\u7528\u4e8e\u4e91\u4e2d\u5927\u91cf\u7684\u529f\u80fd\u3002\u8bb8\u591a\u4ee3\u7406\u90fd\u81ea\u52a8\u90e8\u7f72\u5728\u64cd\u4f5c\u7cfb\u7edf\u548c\u57fa\u4e8e\u4e91\u7684\u4ea7\u54c1\u3002<br \/>\n\uff0813\uff09\u670d\u52a1\u4e2d\u95f4\u4ef6\uff08\u5982ESB\u548c\u4e1a\u52a1\u6d41\u7a0b\u5e73\u53f0\uff09\u53ef\u4ee5\u5728\u4e91\u4e0a\u90e8\u7f72\u3002<br \/>\n&nbsp;<br \/>\n\u5178\u578b\u4f8b\u9898\uff1a<br \/>\n<b><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\"><span style=\"color: #000000; font-family: \u5b8b\u4f53;\">\u4e00\u3001\u5224\u65ad\u9898<\/span><\/span><\/b><b><\/b><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">1. (\u00a0<strong> T\u00a0<\/strong> ) All clouds must be connected to a network.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">2. (\u00a0 <strong>T\u00a0<\/strong> ) Cloud providers can easily configure cloud-based IT resources to be accessible for both external and internal users through an Internet connection.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">3. (\u00a0<strong> F\u00a0<\/strong> ) Data centers consist of only physical IT resources. \uff08<strong>Data\u00a0 center consist of both physical and virtualized IT resource<\/strong>\uff09<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">4. (\u00a0 <strong>T\u00a0<\/strong> ) The different virtual servers can run different guest operating systems on the same host.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">5. ( <strong>T<\/strong>\u00a0 ) Virtualization software translates hardware IT resources into virtualized IT resources.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">6. (\u00a0<strong> T<\/strong> ) Hardware-based virtualization generally compare operating system-based virtualization makes more efficient.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">7. (\u00a0 <strong>T<\/strong>\u00a0 ) Hypervisor exists as a thin layer of software that handles hardware management functions to establish a virtualization management layer.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">8. (\u00a0 <strong>T<\/strong>\u00a0 ) Artifacts accessible via WWW are referred to as\u00a0resources\u00a0or\u00a0Web resources.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">9. (\u00a0 <strong>T<\/strong>\u00a0 ) PaaS ready-made environments enable cloud consumers to develop and deploy Web applications.\u00a0<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">10. (\u00a0 <strong>T<\/strong>\u00a0 ) The multitenant application design was created to enable multiple users to access the same application logic simultaneously.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">11. (<strong>\u00a0 T\u00a0<\/strong> ) Multitenant applications ensure that tenants do not have access to data and configuration information that is not their own.\u00a0<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">12. ( <strong>T<\/strong> ) The field of service technology is a keystone foundation of cloud computing that formed the basis of the \u201cas-a-service\u201d cloud delivery models.\u00a0<\/span><\/span><br \/>\n<b><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\"><span style=\"color: #000000; font-family: \u5b8b\u4f53;\">\u4e8c\u3001\u9009\u62e9\u9898<\/span><\/span><\/b><b><\/b><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">1. Established and deployed by ISPs, the Internet\u2019s largest backbone networks are strategically interconnected by core ( \u00a0 A \u00a0 ) \u00a0that connect the world\u2019s multinational networks.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A. routers<\/strong> \u00a0\u00a0\u00a0\u00a0\u00a0B. Switchs \u00a0\u00a0\u00a0C. Modems \u00a0\u00a0\u00a0D. firewalls<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">2. The concept of the Internet was based on a (\u00a0 A \u00a0\u00a0 ) provisioning and management model.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A. decentralized<\/strong> \u00a0\u00a0\u00a0B. centralize \u00a0\u00a0C. local \u00a0\u00a0\u00a0D. part<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">3. The Internet\u2019s topology has become a dynamic and complex aggregate of ISPs that are highly interconnected via its core ( A \u00a0 \u00a0 ).\u00a0<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A. protocols<\/strong> \u00a0\u00a0\u00a0B. managements \u00a0\u00a0\u00a0C.signals \u00a0\u00a0\u00a0D.not all<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">4. Worldwide connectivity is enabled through a hierarchical topology composed of ( \u00a0\u00a0 A\u00a0 ) Tiers.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A.3<\/strong> \u00a0\u00a0\u00a0B.4 \u00a0\u00a0\u00a0C.7 \u00a0\u00a0\u00a0D.8<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">5. In Connectionless Packet Switching Datagram Networks<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff0c<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">Each packet carries the necessary \uff08 A \uff09 information.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A. location<\/strong> \u00a0\u00a0\u00a0B. node \u00a0\u00a0\u00a0C.rout \u00a0\u00a0\u00a0D.all<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">6. A (\u00a0 A \u00a0\u00a0 ) is a device that is connected to multiple networks through which it forwards packets.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A. router<\/strong> \u00a0\u00a0\u00a0\u00a0\u00a0B. Switch \u00a0\u00a0\u00a0C. Modem \u00a0\u00a0\u00a0D. firewall<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">7. ( \u00a0\u00a0 D\u00a0 ) is transport layer protocol.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A. HTTP \u00a0\u00a0\u00a0B. SMTP \u00a0\u00a0\u00a0C.IP \u00a0\u00a0\u00a0<strong>D. TCP<\/strong><\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">8. ( D \u00a0 \u00a0 ) is transport layer protocol.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A. TCP \u00a0\u00a0\u00a0B. UDP \u00a0\u00a0\u00a0C. HTTP \u00a0\u00a0<strong>\u00a0D. both A and B<\/strong> <\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">9. What factors lead to suffer network service-level degradation. ( \u00a0 D \u00a0 )<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A. bandwidth reduction \u00a0\u00a0\u00a0B. latency increase \u00a0\u00a0\u00a0C. packet loss \u00a0\u00a0<strong>\u00a0D.All<\/strong><\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">10. The service levels of Internet connections between cloud consumers and cloud providers are determined by their <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0 A\u00a0 <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A. ISPs<\/strong> \u00a0\u00a0\u00a0B. cloud consumers \u00a0\u00a0\u00a0C. cloud providers \u00a0\u00a0\u00a0D. administrator<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">11. The resource abstraction and control of the <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0 D\u00a0 <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">layer is comprised of operational and management tools that are often based on virtualization platforms.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A. transport \u00a0\u00a0\u00a0B. network \u00a0\u00a0\u00a0C. \u00a0physical IT resource \u00a0\u00a0\u00a0<strong>D.virtualization<\/strong><\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">12. This interconnection is usually comprised of <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"> \u00a0 A <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">that provide routing between external WANconnections and the data center\u2019s LAN.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A. backbone routers<\/strong> \u00a0\u00a0\u00a0B. backbone switch \u00a0\u00a0\u00a0C. backbone hub \u00a0\u00a0\u00a0D.none<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">13. Virtualization is the process of converting a <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0 C\u00a0 <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0IT resource into a virtual IT resource.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A.software \u00a0\u00a0\u00a0B.logical \u00a0\u00a0\u00a0<strong>C. physical<\/strong> \u00a0\u00a0\u00a0D.All<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">14. Virtualization software runs on a physical server called a\u00a0<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"> A \u00a0 <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">, whose underlying hardware is made accessible by the virtualization software.\u00a0<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A. host\u00a0<\/strong> \u00a0\u00a0\u00a0B.client \u00a0\u00a0\u00a0C.broser \u00a0\u00a0\u00a0D.none<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">15. Through hardware independence, virtual servers can easily be moved to another virtualization host, automatically resolving multiple hardware-software <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"> D \u00a0 <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">issues.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A. independence \u00a0\u00a0\u00a0B. unreliability \u00a0\u00a0\u00a0C. unavailability \u00a0\u00a0\u00a0<strong>D.incompatibility<\/strong><\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">16. Virtual servers are created as virtual disk images that contain <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"> \u00a0 A <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">file copies of hard disk content.\u00a0<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A. binary<\/strong> \u00a0\u00a0\u00a0B. Decimal \u00a0\u00a0\u00a0C. Hexadecimal \u00a0\u00a0\u00a0D. ASCII <\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">17. virtualization infrastructure management (VIM)\u00a0tools that collectively manage <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"> \u00a0 A <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0and rely on a centralized management module.\u00a0<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A. virtual IT resources<\/strong> \u00a0\u00a0\u00a0B. physical IT resources \u00a0\u00a0\u00a0C. both A and B \u00a0\u00a0D.None <\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">18. <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0 A\u00a0 <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff09<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">is the primary communications protocol used to exchange content and data throughout the World Wide Web.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"><strong>A.HTTP<\/strong> \u00a0\u00a0\u00a0B.TCP \u00a0\u00a0\u00a0C.UDP \u00a0\u00a0\u00a0D.XML<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">19. The third tier of Web Applications is the <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff08D\uff09<\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">that is comprised of persistent data stores.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A. Data\u00a0Link\u00a0Layer \u00a0\u00a0\u00a0B. presentation layer \u00a0\u00a0\u00a0C. application layer \u00a0\u00a0\u00a0<strong>D.data layer<\/strong><\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">20. Along with XML, the core technologies behind Web services are represented by the following industry standards:D<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A. WSDL \u00a0\u00a0\u00a0B. SOAP \u00a0\u00a0\u00a0C. UDDI \u00a0<strong>\u00a0\u00a0D.ALL<\/strong><\/span><\/span><br \/>\n&nbsp;<br \/>\n\u7b80\u7b54\u9898\uff1a<br \/>\n<strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">1. Explains the difference between the concept of Multitenancy and Virtualization.<\/span><\/strong><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\uff081\uff09With virtualization :Multiple virtual copies of the service\u00a0 environment can be hosted by a single physical service\u3002<\/span><br \/>\n\uff082\uff09with multitenancy \uff1aA physical or virtual service hosting an application is designed to allow usage by multiple\u00a0 different users\u3002<br \/>\n<span style=\"margin: 0px; color: #747474; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><br \/>\n<strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">2. What industry standards are represented the core technologies behind Web services?<\/span><\/strong><br \/>\n\uff081\uff09<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">Web Service Description Language\uff08WSDL\uff09<\/span><br \/>\n\uff082\uff09<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">XML schema definition language\uff08XML Scheme\uff09<\/span><br \/>\n\uff083\uff09<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">Simple Object Access Protocol\uff08SOAP\uff09<\/span><br \/>\n<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\uff084\uff09Universal Description \uff0cDiscovery and Integration\uff0c\uff08UDDI\uff09<\/span><br \/>\n&nbsp;<br \/>\n<strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">3.<\/span>\u00a0<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">Describing the active and passive service agents.<\/span><\/strong><br \/>\n\uff081\uff09Active service agent perform an active upon intercepting and reading the content of a message . The action typically requires making change to the message contents or change the path itself\u3002<br \/>\n\uff082\uff09Passive service agent do not change message contents.Instead \uff0cthey read the message and may then capture certain path of its contents ,usually for monitoring ,logging ,or reporting purposes.<br \/>\n<i>\u00a0<\/i><br \/>\n<strong><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: italic;\">4.<\/span><\/i><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">\u00a0<\/span><\/span><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: italic;\">Description the <\/span><\/i><\/strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>Modern data centers.<\/strong> <\/span><i><\/i><br \/>\nModern data centers exist as specialized IT infrastructure used to house centralized IT resource \uff0csuch as services \u3001data-bases \u3001networking and telecommunication devices\uff0c and software system<span style=\"text-align: left; color: #555555; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; text-decoration: none; word-spacing: 0px; display: inline !important; white-space: normal; cursor: text; orphans: 2; float: none; -webkit-text-stroke-width: 0px; background-color: transparent;\">.<\/span><br \/>\n&nbsp;<br \/>\n<strong><span style=\"margin: 0px; color: #161616; font-family: 'Times New Roman'; font-size: 12pt;\">5.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0What is called<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: italic;\">server consolidation<\/span><\/i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0?<\/span><\/strong><br \/>\nThe coordinate function that is provided by the virtualization software allows multiple virtual service to be simultaneously created in the same virtualization host. Virtualization technology enable different virtual service to share one physical service .This\u00a0 process is called service consolidation\u3002<br \/>\n&nbsp;<br \/>\n<strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">6. Which categories for Networked storage devices usually fall into?<\/span><\/strong><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">\uff081\uff09 Service Area Network \uff08SAN\uff09<\/span><\/span><br \/>\nconnected through a dedicated network<br \/>\nprovide block-level data storage access<br \/>\nusing industry standard protocol<br \/>\n\uff082\uff09Network-Attached Storage\uff08NAS\uff09<br \/>\nHard drive arrays are contained and managed by this dedicated device\u00a0 \uff0c connects through a network.<br \/>\nusing file-centric data access protocol like the Network File System \uff08NFC\uff09 or\u00a0 Service Message Block\u00a0 \uff08 SMB\uff09.<br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">\u00a0<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">\u00a0<\/span><\/span><br \/>\n<span style=\"color: #000000;\"><strong>7<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">. Data centers require extensive network hardware in order to enable multiple levels of connectivity. \u00a0the data center is broken down into five network subsystems,<\/span>\u00a0<\/strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>What is these ?<\/strong> <\/span><\/span><br \/>\n\uff081\uff09Carrier and External Network Interconnection<br \/>\n\uff082\uff09Web-Tier Load Balancing and Acceleration<br \/>\n\uff083\uff09LAN Fabric<br \/>\n\uff084\uff09SAN Fabric<br \/>\n\uff085\uff09NAS Gateways<br \/>\n<span style=\"color: #000000;\">\u00a0<\/span><br \/>\n&nbsp;<br \/>\n<strong>8<\/strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>. Three fundamental elements comprise the technology architecture of the Web, Which is these?<\/strong> <\/span><br \/>\n\uff081\uff09Uniform Resource Locator\uff0cURL<br \/>\n\uff082\uff09Hypertext Transfer Protocol\uff0cHTTP<br \/>\n\uff083\uff09Markup Language\uff08HTML\uff0cXML\uff09<br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u672c\u7ae0\u4e3b\u8981\u5185\u5bb9\uff1a \uff081\uff09\u5bbd\u5e26\u7f51\u7edc\u548cinternet\u67b6\u6784 \uff082\uff09\u6570\u636e\u4e2d\u5fc3\u6280\u672f \uff083\uff09\u865a\u62df\u5316\u6280\u672f \uff084\uff09W [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[27],"tags":[],"views":9850,"_links":{"self":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":0,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}