{"id":403,"date":"2018-06-22T14:38:52","date_gmt":"2018-06-22T06:38:52","guid":{"rendered":"http:\/\/www.sniper97.cn\/?p=403"},"modified":"2018-06-22T14:38:52","modified_gmt":"2018-06-22T06:38:52","slug":"%e7%ac%ac%e4%b8%83%e7%ab%a0%e4%ba%91%e5%9f%ba%e7%a1%80%e8%ae%be%e6%96%bd%e6%9c%ba%e5%88%b6","status":"publish","type":"post","link":"http:\/\/www.sniper97.cn\/index.php\/note\/cloud-computing-concepts%ef%bc%8ctechnology-and-architecture\/403\/","title":{"rendered":"\u7b2c\u4e03\u7ae0\u4e91\u57fa\u7840\u8bbe\u65bd\u673a\u5236"},"content":{"rendered":"<p>\u4e91\u57fa\u7840\u8bbe\u65bd\u673a\u5236\uff1a<br \/>\n\uff081\uff09\u903b\u8f91\u7f51\u7edc\u8fb9\u754c<br \/>\n\uff082\uff09\u865a\u62df\u670d\u52a1\u5668<br \/>\n\uff083\uff09\u4e91\u5b58\u50a8\u8bbe\u5907<br \/>\n\uff084\uff09\u4e91\u4f7f\u7528\u76d1\u63a7<br \/>\n\uff085\uff09\u8d44\u6e90\u590d\u5236<br \/>\n\uff086\uff09\u5df2\u5c31\u7eea\u73af\u5883<\/p>\n<h3>7.1\u903b\u8f91\u7f51\u7edc\u8fb9\u754c<\/h3>\n<p>\u903b\u8f91\u7f51\u7edc\u8fb9\u754c\uff08logical network perimeter\uff09\u88ab\u5b9a\u4e49\u4e3a\u5c06\u4e00\u4e2a\u7f51\u7edc\u73af\u5883\u4e0e\u901a\u4fe1\u7f51\u7edc\u7684\u5176\u4ed6\u90e8\u5206\u9694\u79bb\u5f00\u6765\uff0c\u5f62\u6210\u4e86\u4e00\u4e2a\u865a\u62df\u7f51\u7edc\u8fb9\u754c\uff0c\u5b83\u5305\u62ec\u5e76\u9694\u79bb\u4e86\u4e00\u7ec4\u76f8\u5173\u7684\u57fa\u4e8e\u4e91\u7684IT\u8d44\u6e90\uff0c\u8fd9\u4e9b\u8d44\u6e90\u5728\u7269\u7406\u4e0a\u53ef\u80fd\u662f\u5206\u5e03\u5f0f\u7684\u3002<br \/>\n\u8be5\u673a\u5236\u88ab\u7528\u4e8e\uff1a<br \/>\n*\u5c06\u4e91\u4e2d\u7684IT\u8d44\u6e90\u4e0e\u975e\u6388\u6743\u7528\u6237\u9694\u79bb<br \/>\n*\u5c06\u4e91\u4e2d\u7684IT\u8d44\u6e90\u4e0e\u975e\u7528\u6237\u9694\u79bb<br \/>\n*\u5c06\u4e91\u4e2d\u7684IT\u8d44\u6e90\u4e0e\u4e91\u7528\u6237\u9694\u79bb<br \/>\n*\u63a7\u5236\u88ab\u9694\u79bbIT\u8d44\u6e90\u7684\u53ef\u7528\u5e26\u5bbd<br \/>\n\u8be5\u673a\u5236\u5305\u62ec\uff1a<br \/>\n\uff081\uff09\u865a\u62df\u9632\u706b\u5899\uff08virtual firewall\uff09\u2014\u2014\u4e00\u79cdIT\u8d44\u6e90\uff0c\u53ef\u4ee5\u4e3b\u52a8\u8fc7\u6ee4\u88ab\u9694\u79bb\u7f51\u7edc\u7684\u7f51\u7edc\u6d41\u91cf\uff0c\u5e76\u63a7\u5236\u5176\u4e0eInternet\u7684\u4ea4\u4e92\u3002<br \/>\n\uff082\uff09\u865a\u62df\u7f51\u7edc\uff08virtual network\uff09\u2014\u2014\u4e00\u822c\u901a\u8fc7VLAN\u5f62\u6210\uff0c\u8fd9\u79cdIT\u8d44\u6e90\u7528\u6765\u9694\u79bb\u6570\u636e\u4e2d\u5fc3\u57fa\u7840\u8bbe\u65bd\u5185\u7684\u7f51\u7edc\u73af\u5883\u3002<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-406 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/CH07-1.png\" alt=\"\" width=\"775\" height=\"176\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-423 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch07-04.png\" alt=\"\" width=\"831\" height=\"357\" \/><\/p>\n<h3>7.2\u865a\u62df\u670d\u52a1\u5668\uff08virtual service\uff09<\/h3>\n<p>\u865a\u62df\u670d\u52a1\u5668\u662f\u4e00\u79cd\u6a21\u62df\u7269\u7406\u670d\u52a1\u5668\u7684\u865a\u62df\u5316\u8f6f\u4ef6\u3002<br \/>\n<strong>A\u00a0virtual server\u00a0is a form of virtualization software that emulates a physical server.<\/strong><br \/>\n\u901a\u8fc7\u5411\u4e91\u7528\u6237\u63d0\u4f9b\u72ec\u7acb\u7684\u865a\u62df\u670d\u52a1\u5668\u5b9e\u4f8b\uff0c\u4e91\u63d0\u4f9b\u8005\u4f7f\u591a\u4e2a\u4e91\u7528\u6237\u5171\u4eab\u540c\u4e00\u4e2a\u7269\u7406\u670d\u52a1\u5668\u3002<br \/>\n\uff08\u76f8\u540c\u4e8e <strong>\u865a\u62df\u673a\uff08VM\uff09<\/strong>\uff09<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-421 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch07-02.png\" alt=\"\" width=\"377\" height=\"417\" \/><br \/>\n\u901a\u8fc7\u5b89\u88c5\u6216\u91ca\u653e\u865a\u62df\u670d\u52a1\u5668\uff0c\u4e91\u7528\u6237\u53ef\u4ee5\u5b9a\u5236\u81ea\u5df1\u7684\u73af\u5883\uff0c\u8fd9\u4e2a\u73af\u5883\u72ec\u7acb\u4e8e\u5176\u4ed6\u6b63\u5728\u4f7f\u7528\u7531\u540c\u4e00\u5e95\u5c42\u7269\u7406\u670d\u52a1\u5668\u63a7\u5236\u7684\u865a\u62df\u670d\u52a1\u5668\u7684\u4e91\u7528\u6237\u3002<br \/>\n<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">Cloud consumers that install or lease virtual servers can customize their environments independently from other cloud consumers that may be using virtual services hosted by the same underlying physical service<\/span><br \/>\n<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-629 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/7-1-1.png\" alt=\"\" width=\"637\" height=\"455\" \/>.<\/span><\/p>\n<h3>7.3\u4e91\u5b58\u50a8\u8bbe\u5907<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\uff08cloud storage device\uff09<\/span><i><\/i><u><\/u><\/h3>\n<p>\u4e91\u5b58\u50a8\u8bbe\u5907\u673a\u5236\u662f\u6307\u4e13\u95e8\u4e3a\u57fa\u4e8e\u4e91\u914d\u7f6e\u6240\u8bbe\u8ba1\u7684\u5b58\u50a8\u8bbe\u5907\u3002<\/p>\n<h4>7.3.1\u4e91\u5b58\u50a8\u7b49\u7ea7<\/h4>\n<p>\u5e38\u89c1\u7684\u6570\u636e\u5b58\u50a8\u903b\u8f91\u5355\u5143\uff1a<br \/>\n\uff081\uff09\u6587\u4ef6\uff08file\uff09\u2014\u2014\u6570\u636e\u96c6\u5408\u5206\u7ec4\u5b58\u653e\u4e8e\u6587\u4ef6\u5939\u4e2d\u7684\u6587\u4ef6\u91cc\u3002<br \/>\n\uff082\uff09\u5757\uff08block\uff09\u2014\u2014\u5b58\u50a8\u7684\u6700\u4f4e\u7b49\u7ea7\uff0c\u6700\u63a5\u8fd1\u786c\u4ef6\uff0c\u6570\u636e\u5757\u662f\u53ef\u88ab\u72ec\u7acb\u8bbf\u95ee\u7684\u6700\u5c0f\u6570\u636e\u5355\u4f4d\u3002<br \/>\n\uff083\uff09\u6570\u636e\u96c6\uff08dataset\uff09\u2014\u2014\u57fa\u4e8e\u8868\u683c\u7684\u3001\u4ee5\u5206\u9694\u7b26\u5206\u9694\u7684\u6216\u4ee5\u8bb0\u5f55\u5f62\u5f0f\u7ec4\u7ec7\u7684\u6570\u636e\u96c6\u5408\u3002<br \/>\n\uff084\uff09\u5bf9\u8c61\uff08object\uff09\u2014\u2014\u5c06\u6570\u636e\u53ca\u5176\u5b83\u76f8\u5173\u7684\u5143\u6570\u636e\u7ec4\u7ec7\u4e3a\u57fa\u4e8eWeb\u7684\u8d44\u6e90\u3002<br \/>\n&nbsp;<\/p>\n<h4>7.3.2\u7f51\u7edc\u5b58\u50a8\u63a5\u53e3<\/h4>\n<h4>7.3.3\u5bf9\u8c61\u5b58\u50a8\u63a5\u53e3<\/h4>\n<p>\u5404\u79cd\u7c7b\u578b\u7684\u6570\u636e\u90fd\u53ef\u4ee5\u4f5c\u4e3aWeb\u8d44\u6e90\u88ab\u5f15\u7528\u548c\u5b58\u50a8\uff0c\u8fd9\u5c31\u662f\u5bf9\u8c61\u5b58\u50a8\uff0c\u5b83\u4ee5\u53ef\u4ee5\u652f\u6301\u591a\u79cd\u6570\u636e\u548c\u5a92\u4f53\u7c7b\u578b\u7684\u6280\u672f\u4e3a\u57fa\u7840\u3002<\/p>\n<h4>7.3.4\u6570\u636e\u5e93\u5b58\u50a8\u63a5\u53e3<\/h4>\n<p>\u4e3b\u8981\u6709\u4e24\u79cd\u7c7b\u578b\uff1a<br \/>\n\uff081\uff09\u5173\u7cfb\u6570\u636e\u5b58\u50a8(Relation Data Storage)<br \/>\n\u5173\u7cfb\u6570\u636e\u5e93\u4f9d\u9760\u8868\u683c\uff0c\u5c06\u76f8\u4f3c\u7684\u6570\u636e\u7ec4\u7ec7\u4e3a\u884c\u5217\u5f62\u5f0f\u3002<br \/>\n<strong><b>Relational databases rely on tables to organize similar data into rows and columns.<\/b><\/strong><br \/>\n\uff082\uff09\u975e\u5173\u7cfb\u6570\u636e\u5b58\u50a8(Non-r<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; cursor: text; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">elation Data Storage<\/span>)<br \/>\n\u975e\u5173\u7cfb\u6570\u636e\u5b58\u50a8\u4e0e\u4f20\u7edf\u5173\u7cfb\u6570\u636e\u5e93\u6a21\u578b\u76f8\u6bd4\u6709\u8f83\u5927\u5dee\u5f02\uff0c\u5b83\u91c7\u7528\u66f4\u52a0\u677e\u6563\u7684\u7ed3\u6784\u6765\u5b58\u50a8\u6570\u636e\uff0c\u4e0d\u5f3a\u8c03\u5b9a\u4e49\u5173\u7cfb\u548c\u5b9e\u73b0\u6570\u636e\u89c4\u8303\u5316\u3002<br \/>\n<strong>Non-relational database storage established a \u201clooser\u201d structure for stored data with less emphasis on defining relationships and realizing data normalization.<\/strong><br \/>\n&nbsp;<\/p>\n<h3>7.4\u4e91\u4f7f\u7528\u76d1\u63a7<\/h3>\n<p>\u4e91\u4f7f\u7528\u76d1\u63a7\u673a\u5236\u662f\u4e00\u79cd\u8f7b\u91cf\u7ea7\u7684\u81ea\u6cbb\u8f6f\u4ef6\u7a0b\u5e8f\uff0c\u7528\u4e8e\u6536\u96c6\u548c\u5904\u7406IT\u8d44\u6e90\u7684\u4f7f\u7528\u6570\u636e\u3002<br \/>\n<strong>The\u00a0cloud usage monitor\u00a0mechanism is a lightweight and autonomous software program responsible for collecting and processing IT resource usage data.<\/strong><\/p>\n<h4>7.4.1\u76d1\u63a7\u4ee3\u7406\uff08monitoring agent\uff09<\/h4>\n<p>\u662f\u4e00\u4e2a\u4e2d\u95f4\u7684\u4e8b\u4ef6\u9a71\u52a8\u7a0b\u5e8f\uff0c\u5b83\u4f5c\u4e3a\u670d\u52a1\u4ee3\u7406\u9a7b\u7559\u5728\u5df2\u6709\u901a\u4fe1\u8def\u5f84\u4e0a\uff0c\u5bf9\u6570\u636e\u6d41\u8fdb\u884c\u900f\u660e\u7684\u76d1\u63a7\u548c\u5206\u6790\u3002<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-426 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch07-05.png\" alt=\"\" width=\"869\" height=\"407\" \/><\/p>\n<h4>7.4.2\u8d44\u6e90\u4ee3\u7406\uff08resource agent\uff09<\/h4>\n<p>\u662f\u4e00\u79cd\u5904\u7406\u6a21\u5757\uff0c\u901a\u8fc7\u4e0e\u4e13\u95e8\u7684\u8d44\u6e90\u8f6f\u4ef6\u8fdb\u884c\u4e8b\u4ef6\u9a71\u52a8\u7684\u4ea4\u4e92\u6765\u6536\u96c6\u4f7f\u7528\u6570\u636e\u3002<br \/>\n<b>A resource agent\u00a0 is a processing module that collects usage data by having event-driven interactions with specialized resource software.<\/b><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-427 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch07-06.png\" alt=\"\" width=\"833\" height=\"455\" \/><\/p>\n<h4>7.4.3\u8f6e\u8be2\u4ee3\u7406\uff08polling agent\uff09<\/h4>\n<p>\u662f\u4e00\u79cd\u5904\u7406\u6a21\u5757\uff0c\u901a\u8fc7\u8f6e\u8be2IT\u8d44\u6e90\u6765\u6536\u96c6\u4e91\u670d\u52a1\u4f7f\u7528\u6570\u636e\u3002<br \/>\n<strong><b>A polling agent\u00a0 is a processing module that collects cloud service usage data by polling IT resources. <\/b><\/strong><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-428 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch07-07.png\" alt=\"\" width=\"722\" height=\"415\" \/><br \/>\n&nbsp;<\/p>\n<h3>7.5\u8d44\u6e90\u590d\u5236<\/h3>\n<p>\u590d\u5236\u88ab\u5b9a\u4e49\u4e3a\u5bf9\u540c\u4e00\u4e2aIT\u8d44\u6e90\u521b\u5efa\u591a\u4e2a\u5b9e\u4f8b\uff0c\u901a\u5e38\u5728\u9700\u8981\u52a0\u5f3aIT\u8d44\u6e90\u7684\u53ef\u7528\u6027\u548c\u6027\u80fd\u65f6\u6267\u884c\u3002<br \/>\n\u4f7f\u7528\u865a\u62df\u5316\u6280\u672f\u6765\u5b9e\u73b0\u8d44\u6e90\u590d\u5236\uff08resource replication\uff09\u673a\u5236\u53ef\u4ee5\u590d\u5236\u57fa\u4e8e\u4e91\u7684IT\u8d44\u6e90\u3002<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-422 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/ch07-03.png\" alt=\"\" width=\"487\" height=\"341\" \/><\/p>\n<h3>7.6\u5df2\u5c31\u7eea\u73af\u5883<\/h3>\n<p>\u5df2\u5c31\u7eea\u73af\u5883\u673a\u5236\u662fPaaS\u4e91\u4ea4\u4ed8\u6a21\u578b\u7684\u5b9a\u4e49\u7ec4\u4ef6\uff0c\u5b83\u4ee3\u8868\u7684\u662f\u9884\u5b9a\u4e49\u7684\u57fa\u4e8e\u4e91\u7684\u5e73\u53f0\uff0c\u8be5\u5e73\u53f0\u7531\u4e00\u7ec4\u5df2\u5b89\u88c5\u7684IT\u8d44\u6e90\u7ec4\u6210\uff0c\u53ef\u4ee5\u88ab\u4e91\u7528\u6237\u4f7f\u7528\u548c\u5b9a\u5236\u3002<br \/>\n<b>The\u00a0ready-made environment\u00a0mechanism is a defining component of the PaaS cloud delivery model.<\/b><br \/>\n<strong>The\u00a0ready-made environment\u00a0represents a pre-defined, cloud-based platform comprised of a set of already installed IT resources, ready to be used and customized by a cloud consumer.\u00a0<\/strong><br \/>\n\u4e91\u7528\u6237\u4f7f\u7528\u8fd9\u4e9b\u73af\u5883\u5728\u4e91\u5185\u8fdc\u7a0b\u5f00\u53d1\u548c\u914d\u7f6e\u81ea\u8eab\u7684\u670d\u52a1\u4e0e\u5e94\u7528\u7a0b\u5e8f\u3002<br \/>\n<strong>These ready-made environments are utilized by cloud consumers to remotely develop and deploy their own services and applications within a cloud.<\/strong><br \/>\n\u5178\u578b\u7684\u5df2\u5c31\u7eea\u73af\u5883\u5305\u62ec\u9884\u5b89\u88c5\u7684IT\u8d44\u6e90\uff0c\u5982\u6570\u636e\u5e93\u3001\u4e2d\u95f4\u4ef6\uff0c\u5f00\u53d1\u5de5\u5177\u548c\u7ba1\u7406\u5de5\u5177\u3002<br \/>\n&nbsp;<br \/>\n\u5178\u578b\u4f8b\u9898\uff1a<br \/>\n<b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: normal; font-weight: bold;\"><span style=\"font-family: \u5b8b\u4f53;\">\u4e00\u3001\u5224\u65ad\u9898<\/span><\/span><\/b><b><\/b><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">1. \u00a0A\u00a0virtual server\u00a0is a form of virtualization software that emulates a physical server. ( T\u00a0 )<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">2. Cloud consumers that install or lease virtual servers cannot customize their environments independently from other cloud consumers. ( F \u00a0 )<\/span><\/span><br \/>\n<strong>(Cloud consumers that install or lease virtual servers can customize their environments independently from other cloud consumers.)<\/strong><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">3. Non-relational databases rely on tables to organize similar data into rows and columns. ( F\u00a0 )<\/span><\/span><br \/>\n<strong>( Relational databases rely on tables to organize similar data into rows and columns.)<\/strong><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">4. Non-relational database storage establishes a \u201clooser\u201d structure for stored data with less emphasis on defining relationships and realizing data normalization. (\u00a0 T )<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">5. The\u00a0cloud usage monitor\u00a0mechanism is a lightweight and autonomous software program responsible for collecting and processing IT resource usage data. ( T\u00a0 )<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">6. A\u00a0polling agent\u00a0 is a processing module that collects usage data by having event-driven interactions with specialized resource software. (\u00a0 F\u00a0 )<\/span><\/span><br \/>\n<strong>(A resource agent\u00a0 is a processing module that collects usage data by having event-driven interactions with specialized resource software.)<\/strong><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">7. A\u00a0resource agent\u00a0 is a processing module that collects cloud service usage data by polling IT resources. ( F\u00a0 <\/span><\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">)<\/span><\/span><br \/>\n<strong>\uff08A polling agent\u00a0 is a processing module that collects cloud service usage data by polling IT resources. \uff09<\/strong><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">8. The\u00a0ready-made environment\u00a0mechanism is a defining component of the IaaS cloud delivery model. (\u00a0 F\u00a0 )<\/span><\/span><br \/>\n<strong>\uff08The\u00a0ready-made environment\u00a0mechanism is a defining component of the PaaS cloud delivery model. \uff09<\/strong><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">9. The\u00a0ready-made environment\u00a0represents a pre-defined, cloud-based platform comprised of a set of already installed IT resources, ready to be used and customized by a cloud consumer.\u00a0(\u00a0 T )<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">10. These ready-made environments are utilized by cloud consumers to remotely develop and deploy their own services and applications within a cloud. ( T\u00a0 )<\/span><\/span><br \/>\n<b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\"><span style=\"font-family: \u5b8b\u4f53;\">\u4e8c\u3001\u9009\u62e9\u9898<\/span><\/span><\/b><b><\/b><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman';\">1.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0The <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 \u00a0 A \u00a0 \u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">is defined as the isolation of a network environment from the rest of a communications network.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman';\">\u00a0<\/span><br \/>\n<strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">A.<\/span><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-style: italic;\">\u00a0<\/span><\/i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-style: normal;\">logical network perimeter<\/span><\/strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>\u00a0<\/strong>\u00a0\u00a0\u00a0B. trust boundary <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">C. organizational \u00a0boundary \u00a0\u00a0\u00a0\u00a0D.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-style: normal;\">\u00a0<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">Overlapping boundary<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">2. Cloud storage device mechanisms provide common logical units of data storage, such as:<\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\"> \u00a0 \u00a0 D \u00a0 \u00a0<\/span><\/u><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">A. files\u00a0and<\/span><span style=\"color: #000000;\"><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0b<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">locks<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0 \u00a0B.<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0datasets<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0 \u00a0C.<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0object<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0\u00a0<strong>D.\u00a0all<\/strong><\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">3. Resource replication<\/span><\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\"> \u00a0 \u00a0 D \u00a0\u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">.<\/span><u><\/u><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A. is defined as the creation of multiple instances of the same IT resource<\/span><\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">B. is typically performed when an IT resource\u2019s availability and performance need to be enhanced. <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">C. is implemented by virtualization technology to replicate cloud-based IT resources.<\/span><br \/>\n<strong>D.all<\/strong><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">4. Typical ready-made environments include pre-installed IT resources, such as <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0\u00a0 D \u00a0 \u00a0\u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">.<\/span><u><\/u><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">A. databases \u00a0B. middleware \u00a0C. development and governance tools \u00a0<strong>\u00a0D. all<\/strong><\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">5. A<\/span> <u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 \u00a0\u00a0 A \u00a0 \u00a0<\/span><\/u> <span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">is an intermediary, event-driven program that exists as a service agent and resides along existing communication paths to transparently monitor and analyze dataflows<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman';\">.<\/span><br \/>\n<strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A<\/span><\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">. <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">monitoring agent <\/span><\/span><\/strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">B. resource agent\u00a0 \u00a0\u00a0C. polling agent \u00a0\u00a0\u00a0\u00a0D. usage agent<\/span><\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">6.<\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\"> \u00a0 \u00a0 A \u00a0 \u00a0<\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"> are used by cloud providers to share the same physical server with multiple cloud consumers by providing cloud consumers with individual virtual server instances.<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>A. Virtual servers<\/strong> \u00a0\u00a0B.Hypervisors \u00a0\u00a0\u00a0C.VIMs \u00a0\u00a0\u00a0D. All<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">7.<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">\u00a0The\u00a0ready-made environment\u00a0mechanism is a defining component of the <\/span><\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0\u00a0 B \u00a0 \u00a0\u00a0 <\/span><\/u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">cloud delivery model. <\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A. IaaS \u00a0\u00a0<strong>\u00a0B. PaaS<\/strong> \u00a0\u00a0\u00a0C. SaaS \u00a0\u00a0D.all<\/span><\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">8. The primary motivation for using non-relational storage is to avoid the <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 \u00a0 D \u00a0 \u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">that can be imposed by relational databases. <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">A. potential complexity \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B. processing overhead <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">C. more horizontally scalable<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman';\">\u00a0 \u00a0\u00a0<\/span><strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">D.A and B<\/span><\/strong><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">9. The number of virtual server instances is limited by<\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 A \u00a0 \u00a0\u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">.<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>A. the capacity of given physical server<\/strong> \u00a0<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">B. <\/span><\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">Hypervisors<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">\u00a0<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">C. the number of cloud <\/span><\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">consumers<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0D.VIM<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">10. Cloud usage monitors can exist in different formats. <\/span><\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0\u00a0 C \u00a0 \u00a0\u00a0<\/span><\/u><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\"> is not belong them.<\/span><\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A<\/span><\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">. <\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">monitoring agent <\/span><\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">B. resource agent\u00a0 \u00a0\u00a0<strong>C. usage agent<\/strong> \u00a0\u00a0D. polling agent \u00a0\u00a0\u00a0\u00a0<\/span><\/span><br \/>\n&nbsp;<br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4e91\u57fa\u7840\u8bbe\u65bd\u673a\u5236\uff1a \uff081\uff09\u903b\u8f91\u7f51\u7edc\u8fb9\u754c \uff082\uff09\u865a\u62df\u670d\u52a1\u5668 \uff083\uff09\u4e91\u5b58\u50a8\u8bbe\u5907 \uff084\uff09\u4e91\u4f7f\u7528\u76d1\u63a7 \uff085\uff09\u8d44 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[27],"tags":[],"views":8644,"_links":{"self":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts\/403"}],"collection":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/comments?post=403"}],"version-history":[{"count":0,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts\/403\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/media?parent=403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/categories?post=403"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/tags?post=403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}