3. ⢠Cloud computing is the on-demand
delivery of IT resources over the
Internet with pay-as-you-go
pricing.
⢠Instead of buying, owning, and
maintaining physical data centers
and servers, you can access
technology services, such as
computing power, storage, and
databases, on an as-needed basis
from a cloud provider like Amazon
Web Services (AWS), azure etc.
4. Definition
Clouds are a large pool of easily usable and accessible virtualized resources
(such as hardware, development platforms and/or services). These resources
can be dynamically reconfigured to adjust to a variable load (scale), allowing
also for an optimum resource utilization.
This pool of resources is typically exploited by a pay-per-use model in which
guarantees are offered by the Infrastructure Provider by means of customized
Service Level Agreements
7. History
John McCarthy, a computer scientist from this era,
came up with the âtheory of time-sharingâ.
By âtime-sharingâ he was referring to an operating
system that gives multiple users of a computer the
ability to act as if he or she was in control of the
machine.
Time-sharing is often considered the original
foundation for the concept we know today as
cloud computing.
8. History
J.C.R Licklider developed the ARPANET
(Advanced Research Projects Agency Network).
His vision was for a global computer network such
that users could access programs and data from
anywhere.
⢠Around this time, users became able to run hosted applications
through their own terminals.
⢠A protocol would basically get information from the main service
and send it to the terminal, receive requests from the terminal,
and pass these requests along to the main service which would
ensure connection to the proper application.
9. History
In the 1970s, The creation of virtual machines
enabled users to run more than one operating
system simultaneously on one physical platform.
10. History
In 1997, one of the first definitions of cloud computing
came from Professor Ramnath Chellapa of Emory
University and the University of South California.
He referred to cloud computing as the âcomputing
paradigm where the boundaries of computing will
be determined by economic rationale rather than
technical limits alone.â
15. Essential characteristics of Cloud Computing (ISO
17788)
On-
deman
d self-
service
s
On-demand self-services:
The Cloud computing services does not
require any human administrators, user
themselves are able to provision, monitor and
manage computing resources as needed.
16. Essential characteristics of Cloud Computing
On-
deman
d self-
service
s
Broad network access:
The Computing services are generally
provided over standard networks and
heterogeneous devices.
Broad
network
access:
17. Essential characteristics of Cloud Computing
On-
deman
d self-
service
s
Rapid elasticity:
The Computing services should have IT
resources that are able to scale out and in
quickly and on as needed basis. Whenever the
user require services it is provided to him and
it is scale out as soon as its requirement gets
over.
Broad
network
access:
Rapid
elasticit
y
18. Essential characteristics of Cloud Computing
On-
deman
d self-
service
s
Resource pooling:
â˘The providers computing resources are pooled
together to serve multiple customers, with different
physical and virtual resources dynamically
assigned and reassigned according to the
customers demand.
â˘There is a sense of location independence in that
the customer generally has no control or
knowledge over the exact location of the provided
resources but may be able to specify location at a
higher level of abstraction (e.g. country, state, or
datacenter).
â˘Example of resources include storage, processing,
memory, and network bandwidth
Broad
network
access:
Rapid
elasticit
y
Resource
pooling
19. Essential characteristics of Cloud Computing
On-
deman
d self-
service
s Broad
network
access:
Rapid
elasticit
y
Resource
pooling
Measured
service
Measured service
â˘Cloud systems automatically control and
optimize resource use by leveraging a
metering capability at some level of
abstraction appropriate to the type of service
(e.g. storage, processing, bandwidth, and
active use account).
â˘Resource usage can be monitored,
controlled, and reported, providing
transparency for both the provider and
consumer of the utilized service.
20. Essential characteristics of Cloud Computing
On-
deman
d self-
service
s Broad
network
access:
Rapid
elasticit
y
Resource
pooling
Measured
service
Multi-tenancy
In a private cloud, the customers are also
called tenants, can have different business
divisions inside the same company. In a
public cloud, the customers are often
entirely different organizations.
Most public cloud providers use the multi-
tenancy model. Multi-tenancy allows
customers to run one server instance, which
is less expensive and makes it easier to
deploy updates to a large number of
customers.
Multi-
tenancy
As per NIST (National Institute of Standards and Technology) the essential features
are : On demand self-service,Broad network access, Resource pooling, Rapid
Elasticity, Measured service
21. Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
22. Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Cloud computing runs on outsider
servers facilitated by third-party hosting
organizations,
traditional computing happens on website
servers and physical hard drives
23. Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Traditional computing costs are higher than cloud
computing costs. T
his is chiefly since the maintenance and operation of
the server is divided among a few distinct gatherings,
which lessens the expense of public services.
Organizations can save money on investment costs by
not accepting costly equipment.
24. Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Cloud-based applications are made for infrastructure
development. They work on theories of automation
and user interface, while Traditional applications are
made on three essential levels known as app logic tier,
presentation tier, and database tier.
25. Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Cloud-based applications are autonomous, as cloud
computing technology is inescapable; on the other hand,
a Traditional application is consistently reliant on a
particular operating system for working appropriately. It is
likewise dependent on hardware, storage, and backing
services.
26. Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
As of now, an efficient and easy coordinated effort is
crucial to maintain a business on the advanced stage.
Cloud-based computing permits simple coordinated effort,
and the developers can finish codes efficiently. Since cloud
computing is service-oriented, you can guarantee
appropriate creation in your organization. Besides, the
business area has turned data-centric. In such scenery,
traditional computing requires completed codes and
regularly leads to an inside clash in an organization.
27. Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Security is one of the crucial requirements to maintain a
business appropriately. Both traditional computing and
cloud computing have distributable highlights regarding
security. You can have numerous layers of security while
utilizing cloud-based computing. Cyberattacks are
uncommon on account of cloud-based computing
because of the presence of various hosts. On the off
chance that you intend to start a business and extend it,
the assistance situated cloud computing can be your best
support network, while traditional computing is made
statically, it just gives a solitary security layer to the
business-related data.
28. Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Cloud-based computing has all around planned design that
guarantees legitimate backup for all the data. Also, the
DRaaS (Disaster recovery as a service) application can
help you access the backups on the off chance that it gets
erased out of sudden, on the opposite side, with regards to
recovery and backup, there is no computerized highlight
present in traditional computing. Nor is there a disaster
recovery administrate
29. Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Cloud-based computing is unique. On account of this
computing, you can get customary updates and
improved highlights. Therefore, maintaining your
business will turn out to be substantially more
reasonable. Indeed, even if there should arise an
occurrence of certain escape clauses, the IT group
works dedicatedly to quick eradication. This sensibility
helps your business run at a decent speed, and you can
procure a decent benefit, while the IT heads discharge
customary applications over long stretches, frequently
half a months or weeks. It happens as the traditional
applications need manual scripting. Also, it canât be
delivered except if all the parts of coding are finished.
30. Component of Cloud Computing
Three Components are
1. Client Computer
2. Distributed Server
3. Data Center
31. Component of Cloud Computing
Clients in cloud computing are in general
to the operation of Local Area
Networks (LANâs). They are just the
desktops where they have their place on
desks.
Clients generally fall into three
categories:
1. Mobile - Mobile devices
2. Thin - Clients are computers that do
not have internal hard drives, but rather
let the server do all the work, and then
display the information.
3.Thick - This type of client is a regular
computer, using a web browser like
Firefox or Internet Explorer to connect to
the cloud.
32. Component of Cloud Computing
It is an array of servers that houses
the subscribed application.
Progressing the IT industry has
brought the concept of virtualizing
servers, where the software might
be installed through the utilization
of various instances of virtual
servers.
This approach streamlines the
process of managing dozens of
virtual servers on multiple physical
servers.
33. Component of Cloud Computing
These are considered as a server
where that is housed in the other
location.
So, the physical servers might not
be housed in a similar location.
Even the distributed server and the
physical server appear to be in
different locations, they perform as
they are so close to each other.
36. Internet Technologies (SOA)
Service-oriented architecture (SOA) is a type of software design
that makes software components reusable using service
interfaces that use a common communication language over
a network.
SOA integrates software components that have been
separately deployed and maintained and allows them to
communicate and work together to form
software applications across different systems.
S 1
S 2 S 3
S 4
S 5
S 6
S 7
37. Example (Car Parking System)
Sub System
MAP of the City
Sub System
User
Authentication
Sub System
Payment Portal
Google map
Facebook
Paypal Integration
39. SOA Principle
Service
Processing
Security
Payment
Standardized Service Contract :
Services adhere to a service-description. A service needs to have
some information that defines what the service is about.
All the Unit knows about the Service
Loose Coupling
Services minimize dependencies on each other. So
if the service functionality breaks at several points
in time, this should not crush the client application
or stop it from running
All the Unit independent to others
40. SOA Principle
Service
Processing
Security
Payment
Service Abstraction
Services wrap the logic they encapsulate from the
unknown external world. The service shouldn't show
how it performs its functionality
How the payment portal works, service
employee does not know
Service Autonomy
Services must control the logic they encapsulate.
All the Unit are autonomous
Service Statelessness
Services should stay stateless. This determines
that services should not keep data from one state
to the other. This would be required to be done
from each client application.
Units are not
store the data
41. SOA Principle
Service
Processing
Security
Payment
Service Discoverability
Services can be discovered (usually in a service registry). We
have previously viewed this in the theory of the UDDI, which
performs a registry which can contain information about the web
service.
Service can be identified by the client
Service Reusability
Logic is divided into services to maximize re-use.
Service Composability
It breaks large problems into tiny problems.
Whole service is divided in small part
42. Web Service
The following ways can characterize a Web
Service:
â˘It is a client-server application segment for
correspondence.
â˘The technique for correspondence between
two gadgets over the system.
â˘It is a product framework for interoperable
machine-to-machine correspondence.
â˘It is an assortment of norms or conventions for
trading data between two gadgets or
applications.
45. Web 2.0
⢠WEB 2.0 Services are more convenient
for the users, as they do not have to learn
more about coding and concepts to work
with it.
⢠Information Technology companies
basically provide this kind of service in
which people can use the services on the
common platform.
⢠Predefined blocks or templates make
their work easy and they can work
together by the centralized
cloud computing system.
⢠Some examples of WEB 2.0 services are
host services like Google Maps,
microblogging sites like Twitter, and
social networking sites like Facebook.
46. Distributed Computing
A distributed computer system consists of multiple
software components that are on multiple computers,
but run as a single system.
The computers that are in a distributed system can be
physically close together and connected by a local
network, or they can be geographically distant and
connected by a wide area network.
A distributed system can consist of any number of
possible configurations, such as mainframes,
personal computers, workstations, minicomputers,
and so on.
The goal of distributed computing is to make such a
network work as a single computer.
48. Distributed Computing
Grid Computing
Grid Computing, as name suggests, is a type of computing that combine resources from various
administrative domains to achieve common goal.
Its main goal to virtualized resources to simply solve problems or issues and apply resources of several
computers in network to single problem at same time to solve technical or scientific problem.
Most production grids such as TeraGrid and EGEE seek to share compute and storage resources distributed
across different administrative domains, with their main focus being speeding up a broad range of scientific
applications, such as climate modeling, drug design, and protein analysis
49. A typical grid computing network consists of three
machine types:
â˘Control node/server: A control node is a server or a
group of servers that administers the entire network and
maintains the record for resources in a network pool.
â˘Provider/grid node: A provider or grid node is a
computer that contributes its resources to the network
resource pool.
â˘User: A user refers to the computer that uses the
resources on the network to complete the task.
50. Traditional Vs Grid Computing
Task: X = (4 x 7) + (3 x 9) + (2 x 5)
â˘Step 1: X = 28 + (3 x 9) + (2 x 5)
â˘Step 2: X = 28 + 27 + (2 x 5)
â˘Step 3: X = 28 + 27 + 10
â˘Step 4: X = 65
(4 X 7) (3 X 9) (2 X 5)
â˘Step 1: X = 28 + 27 + 10
â˘Step 2: X = 65
51. Distributed Computing
Utility Computing
Utility computing is a service provisioning model that
offers computing resources such as hardware, software,
and network bandwidth to clients as and when they
require them on an on-demand basis. The service
provider charges only as per the consumption of the
services, rather than a fixed charge or a flat rate.
52. Grid Computing v/s Utility Computing
GRID Computing UTILITY Computing
It combines different computing
resources from multiple locations to
achieve desired and common goal.
It provide on-demand computing resources and
infrastructure on basis of pay per use method
It distributes workload across multiple
systems and allow computers to contribute
their individual resources to common goal. .
It allows organization to allocate and segregate
computing resources and infrastructure to
various users on basis of their requirements.
It makes better use of existing resources,. It simply reduces IT costs.
It mainly focuses on sharing computing
resources.
It mainly focuses on acquiring computing
resources.
Its main purpose is to integrate usage of
computer resources from cooperating
partners in form of VO (Virtual
Its main purpose is to make computing
resources and infrastructure management
available to customer as per their need.
53. Hardware
⢠The third root is Hardware from the roots of cloud
computing which contains multi-core chips and
virtualization.
⢠When we talk about Hardware for cloud computing, it is
usually virtual and people do not need to buy it
54. Virtualization
⢠Virtualization is a process of creating useful IT services such as memory, storage
and even an OS within an OS using already existing physical resources.
⢠Allows user to use physical machine's full capacity by distributing its capabilities
⢠Enables efficient use of resources thereby improving the business agility
56. Virtualization
⢠How Virtualization Work
⢠Applications, storage, memory, I/0 is abstracted
aver already existing hardware resources
⢠Hypervisor is used to emulate underlying hardware.
⢠Hypervisor separates the physical resources to be
used in the virtual environment
⢠.
⢠This results in server virtualization
57. ⢠Feature of Virtualization
Reduce Hardware Cost
Resource Allocation
Partitioning and Security
Rapid Deployment
Centralized Logic
58. Virtualization Architecture
Host Hardware
Hypervisor (Type 1)
VM 1 VM 2 VM 3
OS OS OS
A
P
P
A
P
P
A
P
P
A
P
P
A
P
P
A
P
P
Host Hardware
Hypervisor (Type 2)
VM 1 VM 2 VM 3
OS OS OS
A
P
P
A
P
P
A
P
P
A
P
P
A
P
P
A
P
P
Host OS
59. Hypervisor
⢠A hypervisor is a crucial piece of software that makes virtualization possible.
⢠It abstracts guest machines and the operating system they run on, from the actual hardware.
⢠Hypervisors create a virtualization layer that separates CPU / Processors, RAM and other physical
resources from the virtual machines you create.
⢠The machine we install a hypervisor on is called a host machine, versus guest virtual machines that
run on top of them.
⢠Hypervisors emulate available resources so that guest machines can use them. No matter what
operating system you boot up with a virtual machine, it will think that actual physical hardware is at its
disposal.
60. Different type of Virtualization
⢠Network Virtualization
⢠Storage Virtualization
⢠Server Virtualization
⢠Application Virtualization
⢠Desktop Virtualization
61. Network Virtualization
⢠Network Virtualization (NV) refers to abstracting network resources that
were traditionally delivered in hardware to software. NV can combine multiple
physical networks to one virtual, software-based network, or it can divide one
physical network into separate, independent virtual networks.
62. Traditional NW v/s Virtualized NW
Traditional NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
63. Traditional NW v/s Virtualized NW
Traditional NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
64. Traditional NW v/s Virtualized NW
Traditional NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
VLAN ID 100
VLAN ID 101
65. Traditional NW v/s Virtualized NW
Traditional NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
VLAN ID 100
VLAN ID 101
VM VM VM
VLAN ID 103
VLAN ID 103
66. Traditional NW v/s Virtualized NW
Traditional NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
VLAN ID 100
VLAN ID 101
VM VM VM
VLAN ID 103
VLAN ID 103
67. Traditional NW v/s Virtualized NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
VLAN ID 100
VLAN ID 101
Logical
Switch
68. Traditional NW v/s Virtualized NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
VLAN ID 100
VLAN ID 101
Logical
Switch
VM VM VM
Encapsulation
De-Encapsulation
69. Server Virtualization
⢠Server virtualization is the
process of dividing a physical
server into multiple unique and
isolated virtual servers by
means of a software
application. Each virtual server
can run its own operating
systems independently.
70. Storage Virtualization
⢠Storage virtualization (also
sometimes called software-
defined storage or a virtual
SAN) is the pooling of
multiple physical storage
arrays from SANs and making
them appear as a single
virtual storage device.
⢠The pool can integrate unlike
storage hardware from
different networks, vendors,
or data centers into one
logical view and manage them
from a single pane of glass.
71. Application Virtualization
⢠Application virtualization is a process that deceives a standard app into
believing that it interfaces directly with an operating system's capacities when,
in fact, it does not.
1.Store the software pack on the device storage.
2.When the user launches the application, the application
gets streamed.
3.As the streaming process begins, the user can use the
software as if it is locally installed.
72. Desktop Virtualization
Desktop virtualization is a method of
simulating a user workstation so it
can be accessed from a remotely
connected device.
By abstracting the user desktop in this
way, organizations can allow users to
work from virtually anywhere with a
network connecting, using any desktop
laptop, tablet, or smartphone to access
enterprise resources without regard to
the device or operating system
employed by the remote user.
73. System Management
⢠The fourth root of cloud computing (System Management)
contains data center automation and autonomic computing.
⢠System management root handles the operations to improve the
productivity and efficiency of the system.
⢠To achieve this system management ensures all the employees
have easy access to all the necessary information.
⢠For that, employees can change configurations, obtain/resend
information and perform other related functions from any
location.
⢠Based on that data, the system responses perform various tasks
such as optimization, adaptation, configuration, and
protection.
⢠Hence, at this root, human involvement is less and the
computing system handles most of the operations.
74. Data Center Automation
⢠Data center automation is the process by which routine workflows and
processes of a data centerâscheduling, monitoring, maintenance,
application delivery, and so onâare managed and executed without
human administration.
⢠Data center automation increases agility and operational efficiency.
⢠It reduces the time IT needs to perform routine tasks and enables them to
deliver services on demand in a repeatable, automated manner. These
services can then be rapidly consumed by end users.
75. Autonomic Computing
⢠Autonomic Computing
is a type of visionary
computing that has
been started by IBM.
This is made to make
adaptive decisions that
use high-level policies.
It has a feature of
constant up-gradation
using optimization and
adaptation.
76. Characteristics of AC
1. The Autonomic system knows itself. This means that it knows its components, specifications capacity, and
the real-time status. It also has knowledge about its own, borrowed, and shared resources.
2. It can configure itself again and again and run its setup automatically as and when required.
3. It has the capability of optimizing itself by fine-tuning workflows.
4. It can heal itself. This is a way of mentioning that it can recover from failures.
5. It can protect itself by detecting and identifying various attacks on it.
6. It can open itself. This means that it must not be a proprietary solution and must implement open standards.
7. It can hide. This means that it has the ability to allow resource optimization, by hiding its complexity.
8. An autonomic system according to IBM must be able to know or expect what kind of demand is going to
arise for its resources to make it a transparent process for the users to see this information.