SlideShare a Scribd company logo
1 of 28
Definition, Architecture and issues
Seyed Mahdi Hosseini Moghaddam
*
*
*The idea of cloud computing is almost as old as
the computer itself. The concept was born in
the 1960s from the ideas of pioneers like J.C.R.
Licklider (instrumental in the development of
ARPANET) envisioning computation in the form
of a global network and John McCarthy (who
coined the term “artificial intelligence”)
framing computation as a public utility. Some
of the first uses included the processing of
financial transactions and census data.
*
1. First Age: In the beginning of the first age the focus
was on big infrastructure mainframes, big point-to-
point networks, and centralized databases.
2. Second Age: The second age of computing is really
the story of the rise of the Internet, Sun, Cisco,
Mosaic, web 1.0, eBay, Yahoo, baby.com, and the
first Internet Bubble.
3. Third Age: Revealing individual services, even select
customer data as callable services one of the key
application lessons that is leading to the third age
such as Amazon.
*
*Software as a Service (SaaS),
*Platform as a Service (PaaS),
*Infrastructure as a Service (IaaS)
*
*Include the delivery of computer hardware
(servers, storage, networking technology, and
data center space) as a service. It may also
include the delivery of virtualization and
operating systems technology to manage the
resources
*
*Is the delivery of more than just infrastructure.
It delivers what you might call a solution stack
an integrated set of software that provides
everything a developer needs to build an
application for both software development and
runtime.
*
Delivering of business applications designed for a
specific purpose. Software as a Service comes in two
distinct modes:
*Simple multi-tenancy: Each customer has its own
resources that are segregated from those of other
customers. It amounts to a relatively unproductive
form of multi-tenancy.
*Fine-grain multi-tenancy: propose the same level
of segregation but is far more efficient. All
resources are common, but customer data and
access capabilities are segregated through the
application.
*
*
Parallel computing allows us to solve large
problems by splitting them into smaller ones and
solving them concurrently. Parallel hardware and
software systems allow us to solve problems
demanding more resources than those provided
by a single system and, at the same time, to
reduce the time required to obtain a solution.
*
1. Bit level parallelism. The number of bits processed per clock
cycle, often called a word size, has increased gradually from
4-bit processors to 8-bit, 16-bit, 32-bit, and since 2004 to 64-
bit. This has reduced the number of instructions required to
process larger size operands and allowed a significant
performance improvement.
2. Instruction-level parallelism. Today’s computers use multi-
stage processing pipelines to speed up execution. Once an n-
stage pipeline is full, an instruction is completed at every
clock cycle. A “classic” pipeline of a RISC (Reduced
Instruction Set Computing) architecture consists of five stages
: instruction fetch, instruction decode, instruction execution,
memory access, and write back. A CISC (Complex Instruction
Set Computing) architecture could have a much large number
of pipelines stages, e.g., an Intel Pentium 4 processor has a
35-stage pipeline.
*
3. Data parallelism or loop parallelism. The
program loops can be processed in parallel.
4. Task parallelism. The problem can be
decomposed into tasks that can be carried out
concurrently. A widely used type of task
parallelism is the SPMD (Same Program
Multiple Data) paradigm. As the name
suggests individual processors run the same
program but on different segments of the
input-data. Data dependencies cause
different flows of control in individual
tasks.
*
*A distributed system is a collection of
autonomous computers, connected through a
network and distribution software called
middleware, which enables computers to
coordinate their activities and to share the
resources of the system; the users perceive the
system as a single, integrated computing
facility.
*
*Concurrency means that several activities are
executed simultaneously. Concurrency is
exploited by application software to speed up
a computation and to allow a number of clients
to access a service. Parallel applications
partition the workload and distribute it to
multiple threads running concurrently. The
Message Passing Interface (MPI) supports both
synchronous and asynchronous communication
and it is often used by parallel and distributed
applications.
*
* Cloud interoperability and integration standards, covering cloud to-
cloud (C2C) integration, hybrid-to-private cloud integration, and
interoperability of various cloud patterns with one another.
* Cloud interface standards and application programmer interfaces
(APIs) to facilitate the consumption of cloud to support specific
business requirements, standardize the access to and invocation of
cloud computing, and more.
* Cloud discovery, portability, onboarding and off boarding models, and
cloud provider abstraction to enable seamless switching of cloud
providers without disrupting business operations.
* Cloud performance benchmarks to guide consumers on how cloud can
increase asset utilization, resource optimization, and other
performance guides, as well as pricing model standardization of
various a la carte cloud models (e.g., comparing Amazon’s web
services to other cloud service and solution providers).
*
*Cloud governance standards for design-time planning,
architecture, modeling, and deployment, as well as
run-time standards for management, monitoring,
operations and support, quality of service (QoS), and
service level agreements (SLAs).
*Cloud security and privacy concerns, such as data
integrity, physical and logical security, and all other
related security requirements for services,
applications, and interactions in a cloud ecosystem.
*Cloud standards for various tiers of cloud enablement,
such as virtualization standards for physical resources,
as well as virtualization of applications, application
infrastructure and containers, and more.
*
*
*
1. Cloud Physical Tier. Provides the physical computing,
storage, network, and security resources that are
virtualized and cloud enabled to support cloud
requirements. The cloud physical tier has nothing to do
with cloud, specifically. The physical tier provides the
substrate on which cloud virtualization technologies and
cloud operating systems platforms build to enable higher
order cloud patterns to be realized. While we identify the
Cloud Physical Tier in this discussion, we will not
reference it further in the Cloud computing reference
model.
2. Cloud Virtualization Tier. Provides core physical
hardware virtualization and provides a potentially useful
(in certain situations) foundation for cloud computing.
*
4. Cloud Operating System Tier. Provides the cloud computing
‘‘fabric,’’ as well as application virtualization, core cloud
provisioning, metering, billing, load balancing,
workflow, and related functionality typical of cloud
platforms. The Cloud OS tier is represented by a wide variety
of new cloud platforms and cloud enablement technologies.
5. Cloud Platform Tier. Provides the technical solutions, application
and messaging middleware, application servers, et cetera
that comprise cloud- and/or application platforms, as well as
pre-integrated cloud- and application platforms themselves,
offered via PaaS delivery models.
6. Cloud Business Tier. Comprises the business or mission
exploitation of cloud-enabled business applications, software,
data, content, knowledge, and associated analysis
frameworks, and other cloud consumption models that
facilitate and enable end-user business value from cloud
consumers’ ability to access, bind, and consume cloud
capabilities.
*
*Cloud computing at Amazon
*Cloud computing, the Google.
*Microsoft Windows Azure
*Open-source software platforms for private
clouds
*
There are several risks involved when a large
organization relies solely on a single cloud provider:
1. Cloud services may be unavailable for a short, or
even for an extended period of time.
2. The single vendor may decide to increase the
prices for service and charge more for computing
cycles, memory, storage space, and network
bandwidth than other cloud service providers.
*
Another solution
could be based on an
extension of the
design principle of a
RAID-5 system used
for reliable data
storage
*
Cloud interoperability could alleviate the concerns that users
become hopelessly dependent on a single cloud service
provider
* First, we need a set of standards for interoperability
covering items such as: naming, addressing, identity, trust,
presence, messaging, multicast, and time. Indeed, we need
common standards for identifying all the objects involved,
the means to transfer, store, and process information, and
we also need a common clock to measure the time between
two events.
* Security is a major concern for cloud users and an Intercloud
could only create new threats. The primary concern is that
tasks will cross from one administrative domain to another
and that sensitive information about the tasks and user could
be disclosed during this migration.
*
*Identify and define the customer’s needs and
constraints including the level of resources, security,
timing, and quality of service.
*Provide a framework for understanding; a critical
aspect of this framework is a clear definition of
classes of service and the costs.
*Simplify complex issues; for example, clarify the
boundaries between the responsibilities of the clients
and those of the provider of service in case of failures.
*Reduce areas of conflict.
*Encourage dialog in the event of disputes.
*Eliminate unrealistic expectations.
*
*An agreement usually covers: services to be
delivered, performance, tracking and
reporting, problem management, legal
compliance and resolution of disputes,
customer duties and responsibilities, security,
handling of confidential information, and
termination.
*
*Software licensing for cloud computing is an
enduring problem without a universally accepted
solution at this time
*When a user requests a license from the license
service, the terms of the license usage are
negotiated and they are part of a Service Level
Agreement document
*The SLA describes all aspects of resource usage,
including the Id of application, duration, number of
processors, and guarantees, such as the maximum
cost and deadlines.
*
*To understand the complexity of the issues related
to software licensing, we point out some of the
difficulties related to authorization. To verify the
authorization to use a license, an application must
have the certificate of an authority. This certificate
must be available locally to the application because
the application may be executed in an environment
with restricted network access; this opens the
possibility for an administrator to hijack the license
mechanism by exchanging the local certificate.
*

More Related Content

What's hot

A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingShahzad
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud ComputingIJERA Editor
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolutioneSAT Publishing House
 
An assessment of cloud computing
An assessment of cloud computingAn assessment of cloud computing
An assessment of cloud computingeSAT Journals
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
Cloud Computing By Pankaj Sharma
Cloud Computing By Pankaj SharmaCloud Computing By Pankaj Sharma
Cloud Computing By Pankaj SharmaRanjan Kumar
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsDarshan Rajagopal
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Lecture28 cc-security3
Lecture28 cc-security3Lecture28 cc-security3
Lecture28 cc-security3Ankit Gupta
 

What's hot (20)

A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
H046053944
H046053944H046053944
H046053944
 
176
176176
176
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
D045031724
D045031724D045031724
D045031724
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computing
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud Computing
 
Introduction of cloud By Pawan Thakur
Introduction of cloud By Pawan ThakurIntroduction of cloud By Pawan Thakur
Introduction of cloud By Pawan Thakur
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolution
 
An assessment of cloud computing
An assessment of cloud computingAn assessment of cloud computing
An assessment of cloud computing
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
Cloud Computing By Pankaj Sharma
Cloud Computing By Pankaj SharmaCloud Computing By Pankaj Sharma
Cloud Computing By Pankaj Sharma
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile Robots
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Lecture28 cc-security3
Lecture28 cc-security3Lecture28 cc-security3
Lecture28 cc-security3
 

Viewers also liked

Edgar Dale Cone of Experience
Edgar Dale Cone of ExperienceEdgar Dale Cone of Experience
Edgar Dale Cone of ExperienceDanicaLiwag
 
Engl102 assignment3final
Engl102 assignment3finalEngl102 assignment3final
Engl102 assignment3finalJohn Le
 
조현수 논문(노동법학과)
조현수 논문(노동법학과)조현수 논문(노동법학과)
조현수 논문(노동법학과)HYUNSOO (HENRY) CHO
 
Love Your Leftovers Volunteer Training Slideshow
Love Your Leftovers Volunteer Training SlideshowLove Your Leftovers Volunteer Training Slideshow
Love Your Leftovers Volunteer Training SlideshowJosé Latorre
 
сколько стоит жизнь студента во франции
сколько стоит жизнь студента во франциисколько стоит жизнь студента во франции
сколько стоит жизнь студента во францииNataLisitskaya
 
Case conference compartment syndrome
Case conference compartment syndrome Case conference compartment syndrome
Case conference compartment syndrome Atthaya Raksuan
 
An introduction to Location Based Services in Persian
An introduction to Location Based Services in PersianAn introduction to Location Based Services in Persian
An introduction to Location Based Services in PersianMahdi Hosseini Moghaddam
 

Viewers also liked (12)

Edgar Dale Cone of Experience
Edgar Dale Cone of ExperienceEdgar Dale Cone of Experience
Edgar Dale Cone of Experience
 
SARDAR PLACEMENT
SARDAR PLACEMENTSARDAR PLACEMENT
SARDAR PLACEMENT
 
Engl102 assignment3final
Engl102 assignment3finalEngl102 assignment3final
Engl102 assignment3final
 
조현수 논문(노동법학과)
조현수 논문(노동법학과)조현수 논문(노동법학과)
조현수 논문(노동법학과)
 
память
памятьпамять
память
 
Love Your Leftovers Volunteer Training Slideshow
Love Your Leftovers Volunteer Training SlideshowLove Your Leftovers Volunteer Training Slideshow
Love Your Leftovers Volunteer Training Slideshow
 
2014 pavasaris
2014 pavasaris2014 pavasaris
2014 pavasaris
 
сколько стоит жизнь студента во франции
сколько стоит жизнь студента во франциисколько стоит жизнь студента во франции
сколько стоит жизнь студента во франции
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Case conference compartment syndrome
Case conference compartment syndrome Case conference compartment syndrome
Case conference compartment syndrome
 
An introduction to Location Based Services in Persian
An introduction to Location Based Services in PersianAn introduction to Location Based Services in Persian
An introduction to Location Based Services in Persian
 
Transformational Generative Grammar
Transformational Generative GrammarTransformational Generative Grammar
Transformational Generative Grammar
 

Similar to Cloud computing

cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud ComputingMonica Rivera
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1ADEOLA ADISA
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
module1st-cloudcomputing-180131063409 - Copy.pdf
module1st-cloudcomputing-180131063409 - Copy.pdfmodule1st-cloudcomputing-180131063409 - Copy.pdf
module1st-cloudcomputing-180131063409 - Copy.pdfBenakappaSM
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingArwa
 
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptx
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptxCS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptx
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptxMALATHYANANDAN
 
Cloud computing
Cloud computingCloud computing
Cloud computingJawhar Ali
 
Cloud computing
Cloud computingCloud computing
Cloud computingshethzaid
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838e
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838eCC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838e
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838eRamzanShareefPrivate
 
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTING
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTINGTU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTING
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTINGSujit Jha
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsIJEEE
 
Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computingTarek Nader
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxgarkhot123
 

Similar to Cloud computing (20)

cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud Computing
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
module1st-cloudcomputing-180131063409 - Copy.pdf
module1st-cloudcomputing-180131063409 - Copy.pdfmodule1st-cloudcomputing-180131063409 - Copy.pdf
module1st-cloudcomputing-180131063409 - Copy.pdf
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptx
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptxCS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptx
CS8791 CLOUD COMPUTING_UNIT-I_FINAL_ppt (1).pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838e
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838eCC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838e
CC Notes.pdf of jdjejwiwu22u28938ehdh3y2u2838e
 
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTING
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTINGTU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTING
TU_BCA_7TH_SEM_CC_INTRODUCTION TO CLOUD COMPUTING
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
 
Ijetcas14 424
Ijetcas14 424Ijetcas14 424
Ijetcas14 424
 
Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
 

Recently uploaded

Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiMonica Sydney
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 

Recently uploaded (20)

Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 

Cloud computing

  • 1. Definition, Architecture and issues Seyed Mahdi Hosseini Moghaddam *
  • 2. * *The idea of cloud computing is almost as old as the computer itself. The concept was born in the 1960s from the ideas of pioneers like J.C.R. Licklider (instrumental in the development of ARPANET) envisioning computation in the form of a global network and John McCarthy (who coined the term “artificial intelligence”) framing computation as a public utility. Some of the first uses included the processing of financial transactions and census data.
  • 3. * 1. First Age: In the beginning of the first age the focus was on big infrastructure mainframes, big point-to- point networks, and centralized databases. 2. Second Age: The second age of computing is really the story of the rise of the Internet, Sun, Cisco, Mosaic, web 1.0, eBay, Yahoo, baby.com, and the first Internet Bubble. 3. Third Age: Revealing individual services, even select customer data as callable services one of the key application lessons that is leading to the third age such as Amazon.
  • 4. * *Software as a Service (SaaS), *Platform as a Service (PaaS), *Infrastructure as a Service (IaaS)
  • 5. * *Include the delivery of computer hardware (servers, storage, networking technology, and data center space) as a service. It may also include the delivery of virtualization and operating systems technology to manage the resources
  • 6. * *Is the delivery of more than just infrastructure. It delivers what you might call a solution stack an integrated set of software that provides everything a developer needs to build an application for both software development and runtime.
  • 7. * Delivering of business applications designed for a specific purpose. Software as a Service comes in two distinct modes: *Simple multi-tenancy: Each customer has its own resources that are segregated from those of other customers. It amounts to a relatively unproductive form of multi-tenancy. *Fine-grain multi-tenancy: propose the same level of segregation but is far more efficient. All resources are common, but customer data and access capabilities are segregated through the application.
  • 8. *
  • 9. * Parallel computing allows us to solve large problems by splitting them into smaller ones and solving them concurrently. Parallel hardware and software systems allow us to solve problems demanding more resources than those provided by a single system and, at the same time, to reduce the time required to obtain a solution.
  • 10. * 1. Bit level parallelism. The number of bits processed per clock cycle, often called a word size, has increased gradually from 4-bit processors to 8-bit, 16-bit, 32-bit, and since 2004 to 64- bit. This has reduced the number of instructions required to process larger size operands and allowed a significant performance improvement. 2. Instruction-level parallelism. Today’s computers use multi- stage processing pipelines to speed up execution. Once an n- stage pipeline is full, an instruction is completed at every clock cycle. A “classic” pipeline of a RISC (Reduced Instruction Set Computing) architecture consists of five stages : instruction fetch, instruction decode, instruction execution, memory access, and write back. A CISC (Complex Instruction Set Computing) architecture could have a much large number of pipelines stages, e.g., an Intel Pentium 4 processor has a 35-stage pipeline.
  • 11. * 3. Data parallelism or loop parallelism. The program loops can be processed in parallel. 4. Task parallelism. The problem can be decomposed into tasks that can be carried out concurrently. A widely used type of task parallelism is the SPMD (Same Program Multiple Data) paradigm. As the name suggests individual processors run the same program but on different segments of the input-data. Data dependencies cause different flows of control in individual tasks.
  • 12. * *A distributed system is a collection of autonomous computers, connected through a network and distribution software called middleware, which enables computers to coordinate their activities and to share the resources of the system; the users perceive the system as a single, integrated computing facility.
  • 13. * *Concurrency means that several activities are executed simultaneously. Concurrency is exploited by application software to speed up a computation and to allow a number of clients to access a service. Parallel applications partition the workload and distribute it to multiple threads running concurrently. The Message Passing Interface (MPI) supports both synchronous and asynchronous communication and it is often used by parallel and distributed applications.
  • 14. * * Cloud interoperability and integration standards, covering cloud to- cloud (C2C) integration, hybrid-to-private cloud integration, and interoperability of various cloud patterns with one another. * Cloud interface standards and application programmer interfaces (APIs) to facilitate the consumption of cloud to support specific business requirements, standardize the access to and invocation of cloud computing, and more. * Cloud discovery, portability, onboarding and off boarding models, and cloud provider abstraction to enable seamless switching of cloud providers without disrupting business operations. * Cloud performance benchmarks to guide consumers on how cloud can increase asset utilization, resource optimization, and other performance guides, as well as pricing model standardization of various a la carte cloud models (e.g., comparing Amazon’s web services to other cloud service and solution providers).
  • 15. * *Cloud governance standards for design-time planning, architecture, modeling, and deployment, as well as run-time standards for management, monitoring, operations and support, quality of service (QoS), and service level agreements (SLAs). *Cloud security and privacy concerns, such as data integrity, physical and logical security, and all other related security requirements for services, applications, and interactions in a cloud ecosystem. *Cloud standards for various tiers of cloud enablement, such as virtualization standards for physical resources, as well as virtualization of applications, application infrastructure and containers, and more.
  • 16. *
  • 17. *
  • 18. * 1. Cloud Physical Tier. Provides the physical computing, storage, network, and security resources that are virtualized and cloud enabled to support cloud requirements. The cloud physical tier has nothing to do with cloud, specifically. The physical tier provides the substrate on which cloud virtualization technologies and cloud operating systems platforms build to enable higher order cloud patterns to be realized. While we identify the Cloud Physical Tier in this discussion, we will not reference it further in the Cloud computing reference model. 2. Cloud Virtualization Tier. Provides core physical hardware virtualization and provides a potentially useful (in certain situations) foundation for cloud computing.
  • 19. * 4. Cloud Operating System Tier. Provides the cloud computing ‘‘fabric,’’ as well as application virtualization, core cloud provisioning, metering, billing, load balancing, workflow, and related functionality typical of cloud platforms. The Cloud OS tier is represented by a wide variety of new cloud platforms and cloud enablement technologies. 5. Cloud Platform Tier. Provides the technical solutions, application and messaging middleware, application servers, et cetera that comprise cloud- and/or application platforms, as well as pre-integrated cloud- and application platforms themselves, offered via PaaS delivery models. 6. Cloud Business Tier. Comprises the business or mission exploitation of cloud-enabled business applications, software, data, content, knowledge, and associated analysis frameworks, and other cloud consumption models that facilitate and enable end-user business value from cloud consumers’ ability to access, bind, and consume cloud capabilities.
  • 20. * *Cloud computing at Amazon *Cloud computing, the Google. *Microsoft Windows Azure *Open-source software platforms for private clouds
  • 21. * There are several risks involved when a large organization relies solely on a single cloud provider: 1. Cloud services may be unavailable for a short, or even for an extended period of time. 2. The single vendor may decide to increase the prices for service and charge more for computing cycles, memory, storage space, and network bandwidth than other cloud service providers.
  • 22. * Another solution could be based on an extension of the design principle of a RAID-5 system used for reliable data storage
  • 23. * Cloud interoperability could alleviate the concerns that users become hopelessly dependent on a single cloud service provider * First, we need a set of standards for interoperability covering items such as: naming, addressing, identity, trust, presence, messaging, multicast, and time. Indeed, we need common standards for identifying all the objects involved, the means to transfer, store, and process information, and we also need a common clock to measure the time between two events. * Security is a major concern for cloud users and an Intercloud could only create new threats. The primary concern is that tasks will cross from one administrative domain to another and that sensitive information about the tasks and user could be disclosed during this migration.
  • 24. * *Identify and define the customer’s needs and constraints including the level of resources, security, timing, and quality of service. *Provide a framework for understanding; a critical aspect of this framework is a clear definition of classes of service and the costs. *Simplify complex issues; for example, clarify the boundaries between the responsibilities of the clients and those of the provider of service in case of failures. *Reduce areas of conflict. *Encourage dialog in the event of disputes. *Eliminate unrealistic expectations.
  • 25. * *An agreement usually covers: services to be delivered, performance, tracking and reporting, problem management, legal compliance and resolution of disputes, customer duties and responsibilities, security, handling of confidential information, and termination.
  • 26. * *Software licensing for cloud computing is an enduring problem without a universally accepted solution at this time *When a user requests a license from the license service, the terms of the license usage are negotiated and they are part of a Service Level Agreement document *The SLA describes all aspects of resource usage, including the Id of application, duration, number of processors, and guarantees, such as the maximum cost and deadlines.
  • 27. * *To understand the complexity of the issues related to software licensing, we point out some of the difficulties related to authorization. To verify the authorization to use a license, an application must have the certificate of an authority. This certificate must be available locally to the application because the application may be executed in an environment with restricted network access; this opens the possibility for an administrator to hijack the license mechanism by exchanging the local certificate.
  • 28. *