SlideShare ist ein Scribd-Unternehmen logo
1 von 76
Cloud Computing (Unit 1)
Dr Jeet Ghosh
What is Cloud Computing ?
• Cloud computing is the on-demand
delivery of IT resources over the
Internet with pay-as-you-go
pricing.
• Instead of buying, owning, and
maintaining physical data centers
and servers, you can access
technology services, such as
computing power, storage, and
databases, on an as-needed basis
from a cloud provider like Amazon
Web Services (AWS), azure etc.
Definition
Clouds are a large pool of easily usable and accessible virtualized resources
(such as hardware, development platforms and/or services). These resources
can be dynamically reconfigured to adjust to a variable load (scale), allowing
also for an optimum resource utilization.
This pool of resources is typically exploited by a pay-per-use model in which
guarantees are offered by the Infrastructure Provider by means of customized
Service Level Agreements
Origin of Cloud Computing
Statement of the problem
History
History
John McCarthy, a computer scientist from this era,
came up with the “theory of time-sharing”.
By “time-sharing” he was referring to an operating
system that gives multiple users of a computer the
ability to act as if he or she was in control of the
machine.
Time-sharing is often considered the original
foundation for the concept we know today as
cloud computing.
History
J.C.R Licklider developed the ARPANET
(Advanced Research Projects Agency Network).
His vision was for a global computer network such
that users could access programs and data from
anywhere.
• Around this time, users became able to run hosted applications
through their own terminals.
• A protocol would basically get information from the main service
and send it to the terminal, receive requests from the terminal,
and pass these requests along to the main service which would
ensure connection to the proper application.
History
In the 1970s, The creation of virtual machines
enabled users to run more than one operating
system simultaneously on one physical platform.
History
In 1997, one of the first definitions of cloud computing
came from Professor Ramnath Chellapa of Emory
University and the University of South California.
He referred to cloud computing as the “computing
paradigm where the boundaries of computing will
be determined by economic rationale rather than
technical limits alone.”
Important Milestone
1999
Salesforce.com
2006
Amazon’s
Elastic
Compute
Cloud (EC2
2007
Dropbox
2002
Amazon Web
Services
2006
Google doc
2009
Azure
Google Apps
Some Cloud Services
Following are a few cloud computing examples and uses:
•Communication: Skype, Whatsapp, Slack
•Productivity: Microsoft Office 365, Gmail
•Data Storage: Dropbox, Facebook, Gmail
•Business Processes: Salesforce, Hubspot
•Application Development: Amazon Lumberyard
•Big Data Analytics: Hadoop, Cassandra, HPCC
•Social Networking: MySpace, LinkedIn, Twitter
Cloud Computing Market
Cloud Computing Market
Essential characteristics of Cloud Computing (ISO
17788)
On-
deman
d self-
service
s
On-demand self-services:
The Cloud computing services does not
require any human administrators, user
themselves are able to provision, monitor and
manage computing resources as needed.
Essential characteristics of Cloud Computing
On-
deman
d self-
service
s
Broad network access:
The Computing services are generally
provided over standard networks and
heterogeneous devices.
Broad
network
access:
Essential characteristics of Cloud Computing
On-
deman
d self-
service
s
Rapid elasticity:
The Computing services should have IT
resources that are able to scale out and in
quickly and on as needed basis. Whenever the
user require services it is provided to him and
it is scale out as soon as its requirement gets
over.
Broad
network
access:
Rapid
elasticit
y
Essential characteristics of Cloud Computing
On-
deman
d self-
service
s
Resource pooling:
•The providers computing resources are pooled
together to serve multiple customers, with different
physical and virtual resources dynamically
assigned and reassigned according to the
customers demand.
•There is a sense of location independence in that
the customer generally has no control or
knowledge over the exact location of the provided
resources but may be able to specify location at a
higher level of abstraction (e.g. country, state, or
datacenter).
•Example of resources include storage, processing,
memory, and network bandwidth
Broad
network
access:
Rapid
elasticit
y
Resource
pooling
Essential characteristics of Cloud Computing
On-
deman
d self-
service
s Broad
network
access:
Rapid
elasticit
y
Resource
pooling
Measured
service
Measured service
•Cloud systems automatically control and
optimize resource use by leveraging a
metering capability at some level of
abstraction appropriate to the type of service
(e.g. storage, processing, bandwidth, and
active use account).
•Resource usage can be monitored,
controlled, and reported, providing
transparency for both the provider and
consumer of the utilized service.
Essential characteristics of Cloud Computing
On-
deman
d self-
service
s Broad
network
access:
Rapid
elasticit
y
Resource
pooling
Measured
service
Multi-tenancy
In a private cloud, the customers are also
called tenants, can have different business
divisions inside the same company. In a
public cloud, the customers are often
entirely different organizations.
Most public cloud providers use the multi-
tenancy model. Multi-tenancy allows
customers to run one server instance, which
is less expensive and makes it easier to
deploy updates to a large number of
customers.
Multi-
tenancy
As per NIST (National Institute of Standards and Technology) the essential features
are : On demand self-service,Broad network access, Resource pooling, Rapid
Elasticity, Measured service
Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Cloud computing runs on outsider
servers facilitated by third-party hosting
organizations,
traditional computing happens on website
servers and physical hard drives
Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Traditional computing costs are higher than cloud
computing costs. T
his is chiefly since the maintenance and operation of
the server is divided among a few distinct gatherings,
which lessens the expense of public services.
Organizations can save money on investment costs by
not accepting costly equipment.
Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Cloud-based applications are made for infrastructure
development. They work on theories of automation
and user interface, while Traditional applications are
made on three essential levels known as app logic tier,
presentation tier, and database tier.
Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Cloud-based applications are autonomous, as cloud
computing technology is inescapable; on the other hand,
a Traditional application is consistently reliant on a
particular operating system for working appropriately. It is
likewise dependent on hardware, storage, and backing
services.
Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
As of now, an efficient and easy coordinated effort is
crucial to maintain a business on the advanced stage.
Cloud-based computing permits simple coordinated effort,
and the developers can finish codes efficiently. Since cloud
computing is service-oriented, you can guarantee
appropriate creation in your organization. Besides, the
business area has turned data-centric. In such scenery,
traditional computing requires completed codes and
regularly leads to an inside clash in an organization.
Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Security is one of the crucial requirements to maintain a
business appropriately. Both traditional computing and
cloud computing have distributable highlights regarding
security. You can have numerous layers of security while
utilizing cloud-based computing. Cyberattacks are
uncommon on account of cloud-based computing
because of the presence of various hosts. On the off
chance that you intend to start a business and extend it,
the assistance situated cloud computing can be your best
support network, while traditional computing is made
statically, it just gives a solitary security layer to the
business-related data.
Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Cloud-based computing has all around planned design that
guarantees legitimate backup for all the data. Also, the
DRaaS (Disaster recovery as a service) application can
help you access the backups on the off chance that it gets
erased out of sudden, on the opposite side, with regards to
recovery and backup, there is no computerized highlight
present in traditional computing. Nor is there a disaster
recovery administrate
Traditional IT Vs Cloud Computing
Expenses
Architecture:
The convenience of collaboration
Operating system dependency
Security
Position
Backup Recovery
Availability
Cloud-based computing is unique. On account of this
computing, you can get customary updates and
improved highlights. Therefore, maintaining your
business will turn out to be substantially more
reasonable. Indeed, even if there should arise an
occurrence of certain escape clauses, the IT group
works dedicatedly to quick eradication. This sensibility
helps your business run at a decent speed, and you can
procure a decent benefit, while the IT heads discharge
customary applications over long stretches, frequently
half a months or weeks. It happens as the traditional
applications need manual scripting. Also, it can’t be
delivered except if all the parts of coding are finished.
Component of Cloud Computing
Three Components are
1. Client Computer
2. Distributed Server
3. Data Center
Component of Cloud Computing
Clients in cloud computing are in general
to the operation of Local Area
Networks (LAN’s). They are just the
desktops where they have their place on
desks.
Clients generally fall into three
categories:
1. Mobile - Mobile devices
2. Thin - Clients are computers that do
not have internal hard drives, but rather
let the server do all the work, and then
display the information.
3.Thick - This type of client is a regular
computer, using a web browser like
Firefox or Internet Explorer to connect to
the cloud.
Component of Cloud Computing
It is an array of servers that houses
the subscribed application.
Progressing the IT industry has
brought the concept of virtualizing
servers, where the software might
be installed through the utilization
of various instances of virtual
servers.
This approach streamlines the
process of managing dozens of
virtual servers on multiple physical
servers.
Component of Cloud Computing
These are considered as a server
where that is housed in the other
location.
So, the physical servers might not
be housed in a similar location.
Even the distributed server and the
physical server appear to be in
different locations, they perform as
they are so close to each other.
Roots of Cloud Computing
Internet Technologies
SOA
Web
Service
Web 2.0
Internet Technologies (SOA)
Service-oriented architecture (SOA) is a type of software design
that makes software components reusable using service
interfaces that use a common communication language over
a network.
SOA integrates software components that have been
separately deployed and maintained and allows them to
communicate and work together to form
software applications across different systems.
S 1
S 2 S 3
S 4
S 5
S 6
S 7
Example (Car Parking System)
Sub System
MAP of the City
Sub System
User
Authentication
Sub System
Payment Portal
Google map
Facebook
Paypal Integration
SOA Principle
Service
Processing
Security
Payment
SOA Principle
Service
Processing
Security
Payment
Standardized Service Contract :
Services adhere to a service-description. A service needs to have
some information that defines what the service is about.
All the Unit knows about the Service
Loose Coupling
Services minimize dependencies on each other. So
if the service functionality breaks at several points
in time, this should not crush the client application
or stop it from running
All the Unit independent to others
SOA Principle
Service
Processing
Security
Payment
Service Abstraction
Services wrap the logic they encapsulate from the
unknown external world. The service shouldn't show
how it performs its functionality
How the payment portal works, service
employee does not know
Service Autonomy
Services must control the logic they encapsulate.
All the Unit are autonomous
Service Statelessness
Services should stay stateless. This determines
that services should not keep data from one state
to the other. This would be required to be done
from each client application.
Units are not
store the data
SOA Principle
Service
Processing
Security
Payment
Service Discoverability
Services can be discovered (usually in a service registry). We
have previously viewed this in the theory of the UDDI, which
performs a registry which can contain information about the web
service.
Service can be identified by the client
Service Reusability
Logic is divided into services to maximize re-use.
Service Composability
It breaks large problems into tiny problems.
Whole service is divided in small part
Web Service
The following ways can characterize a Web
Service:
•It is a client-server application segment for
correspondence.
•The technique for correspondence between
two gadgets over the system.
•It is a product framework for interoperable
machine-to-machine correspondence.
•It is an assortment of norms or conventions for
trading data between two gadgets or
applications.
• Web page
HTML Page
• Web Service
Json or Raw Data
Web 2.0
• WEB 2.0 Services are more convenient
for the users, as they do not have to learn
more about coding and concepts to work
with it.
• Information Technology companies
basically provide this kind of service in
which people can use the services on the
common platform.
• Predefined blocks or templates make
their work easy and they can work
together by the centralized
cloud computing system.
• Some examples of WEB 2.0 services are
host services like Google Maps,
microblogging sites like Twitter, and
social networking sites like Facebook.
Distributed Computing
A distributed computer system consists of multiple
software components that are on multiple computers,
but run as a single system.
The computers that are in a distributed system can be
physically close together and connected by a local
network, or they can be geographically distant and
connected by a wide area network.
A distributed system can consist of any number of
possible configurations, such as mainframes,
personal computers, workstations, minicomputers,
and so on.
The goal of distributed computing is to make such a
network work as a single computer.
Distributed Computing
Utility Computing
Grid Computing
Distributed Computing
Grid Computing
Grid Computing, as name suggests, is a type of computing that combine resources from various
administrative domains to achieve common goal.
Its main goal to virtualized resources to simply solve problems or issues and apply resources of several
computers in network to single problem at same time to solve technical or scientific problem.
Most production grids such as TeraGrid and EGEE seek to share compute and storage resources distributed
across different administrative domains, with their main focus being speeding up a broad range of scientific
applications, such as climate modeling, drug design, and protein analysis
A typical grid computing network consists of three
machine types:
•Control node/server: A control node is a server or a
group of servers that administers the entire network and
maintains the record for resources in a network pool.
•Provider/grid node: A provider or grid node is a
computer that contributes its resources to the network
resource pool.
•User: A user refers to the computer that uses the
resources on the network to complete the task.
Traditional Vs Grid Computing
Task: X = (4 x 7) + (3 x 9) + (2 x 5)
•Step 1: X = 28 + (3 x 9) + (2 x 5)
•Step 2: X = 28 + 27 + (2 x 5)
•Step 3: X = 28 + 27 + 10
•Step 4: X = 65
(4 X 7) (3 X 9) (2 X 5)
•Step 1: X = 28 + 27 + 10
•Step 2: X = 65
Distributed Computing
Utility Computing
Utility computing is a service provisioning model that
offers computing resources such as hardware, software,
and network bandwidth to clients as and when they
require them on an on-demand basis. The service
provider charges only as per the consumption of the
services, rather than a fixed charge or a flat rate.
Grid Computing v/s Utility Computing
GRID Computing UTILITY Computing
It combines different computing
resources from multiple locations to
achieve desired and common goal.
It provide on-demand computing resources and
infrastructure on basis of pay per use method
It distributes workload across multiple
systems and allow computers to contribute
their individual resources to common goal. .
It allows organization to allocate and segregate
computing resources and infrastructure to
various users on basis of their requirements.
It makes better use of existing resources,. It simply reduces IT costs.
It mainly focuses on sharing computing
resources.
It mainly focuses on acquiring computing
resources.
Its main purpose is to integrate usage of
computer resources from cooperating
partners in form of VO (Virtual
Its main purpose is to make computing
resources and infrastructure management
available to customer as per their need.
Hardware
• The third root is Hardware from the roots of cloud
computing which contains multi-core chips and
virtualization.
• When we talk about Hardware for cloud computing, it is
usually virtual and people do not need to buy it
Virtualization
• Virtualization is a process of creating useful IT services such as memory, storage
and even an OS within an OS using already existing physical resources.
• Allows user to use physical machine's full capacity by distributing its capabilities
• Enables efficient use of resources thereby improving the business agility
Virtualization
• How Virtualization Work
Web Server Mail Server App Server Hypervisor
Virtualization
• How Virtualization Work
• Applications, storage, memory, I/0 is abstracted
aver already existing hardware resources
• Hypervisor is used to emulate underlying hardware.
• Hypervisor separates the physical resources to be
used in the virtual environment
• .
• This results in server virtualization
• Feature of Virtualization
Reduce Hardware Cost
Resource Allocation
Partitioning and Security
Rapid Deployment
Centralized Logic
Virtualization Architecture
Host Hardware
Hypervisor (Type 1)
VM 1 VM 2 VM 3
OS OS OS
A
P
P
A
P
P
A
P
P
A
P
P
A
P
P
A
P
P
Host Hardware
Hypervisor (Type 2)
VM 1 VM 2 VM 3
OS OS OS
A
P
P
A
P
P
A
P
P
A
P
P
A
P
P
A
P
P
Host OS
Hypervisor
• A hypervisor is a crucial piece of software that makes virtualization possible.
• It abstracts guest machines and the operating system they run on, from the actual hardware.
• Hypervisors create a virtualization layer that separates CPU / Processors, RAM and other physical
resources from the virtual machines you create.
• The machine we install a hypervisor on is called a host machine, versus guest virtual machines that
run on top of them.
• Hypervisors emulate available resources so that guest machines can use them. No matter what
operating system you boot up with a virtual machine, it will think that actual physical hardware is at its
disposal.
Different type of Virtualization
• Network Virtualization
• Storage Virtualization
• Server Virtualization
• Application Virtualization
• Desktop Virtualization
Network Virtualization
• Network Virtualization (NV) refers to abstracting network resources that
were traditionally delivered in hardware to software. NV can combine multiple
physical networks to one virtual, software-based network, or it can divide one
physical network into separate, independent virtual networks.
Traditional NW v/s Virtualized NW
Traditional NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
Traditional NW v/s Virtualized NW
Traditional NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
Traditional NW v/s Virtualized NW
Traditional NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
VLAN ID 100
VLAN ID 101
Traditional NW v/s Virtualized NW
Traditional NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
VLAN ID 100
VLAN ID 101
VM VM VM
VLAN ID 103
VLAN ID 103
Traditional NW v/s Virtualized NW
Traditional NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
VLAN ID 100
VLAN ID 101
VM VM VM
VLAN ID 103
VLAN ID 103
Traditional NW v/s Virtualized NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
VLAN ID 100
VLAN ID 101
Logical
Switch
Traditional NW v/s Virtualized NW
Physical Switch Router
VLAN ID 100
VLAN ID 101
VLAN ID 100
VLAN ID 101
Logical
Switch
VM VM VM
Encapsulation
De-Encapsulation
Server Virtualization
• Server virtualization is the
process of dividing a physical
server into multiple unique and
isolated virtual servers by
means of a software
application. Each virtual server
can run its own operating
systems independently.
Storage Virtualization
• Storage virtualization (also
sometimes called software-
defined storage or a virtual
SAN) is the pooling of
multiple physical storage
arrays from SANs and making
them appear as a single
virtual storage device.
• The pool can integrate unlike
storage hardware from
different networks, vendors,
or data centers into one
logical view and manage them
from a single pane of glass.
Application Virtualization
• Application virtualization is a process that deceives a standard app into
believing that it interfaces directly with an operating system's capacities when,
in fact, it does not.
1.Store the software pack on the device storage.
2.When the user launches the application, the application
gets streamed.
3.As the streaming process begins, the user can use the
software as if it is locally installed.
Desktop Virtualization
Desktop virtualization is a method of
simulating a user workstation so it
can be accessed from a remotely
connected device.
By abstracting the user desktop in this
way, organizations can allow users to
work from virtually anywhere with a
network connecting, using any desktop
laptop, tablet, or smartphone to access
enterprise resources without regard to
the device or operating system
employed by the remote user.
System Management
• The fourth root of cloud computing (System Management)
contains data center automation and autonomic computing.
• System management root handles the operations to improve the
productivity and efficiency of the system.
• To achieve this system management ensures all the employees
have easy access to all the necessary information.
• For that, employees can change configurations, obtain/resend
information and perform other related functions from any
location.
• Based on that data, the system responses perform various tasks
such as optimization, adaptation, configuration, and
protection.
• Hence, at this root, human involvement is less and the
computing system handles most of the operations.
Data Center Automation
• Data center automation is the process by which routine workflows and
processes of a data center—scheduling, monitoring, maintenance,
application delivery, and so on—are managed and executed without
human administration.
• Data center automation increases agility and operational efficiency.
• It reduces the time IT needs to perform routine tasks and enables them to
deliver services on demand in a repeatable, automated manner. These
services can then be rapidly consumed by end users.
Autonomic Computing
• Autonomic Computing
is a type of visionary
computing that has
been started by IBM.
This is made to make
adaptive decisions that
use high-level policies.
It has a feature of
constant up-gradation
using optimization and
adaptation.
Characteristics of AC
1. The Autonomic system knows itself. This means that it knows its components, specifications capacity, and
the real-time status. It also has knowledge about its own, borrowed, and shared resources.
2. It can configure itself again and again and run its setup automatically as and when required.
3. It has the capability of optimizing itself by fine-tuning workflows.
4. It can heal itself. This is a way of mentioning that it can recover from failures.
5. It can protect itself by detecting and identifying various attacks on it.
6. It can open itself. This means that it must not be a proprietary solution and must implement open standards.
7. It can hide. This means that it has the ability to allow resource optimization, by hiding its complexity.
8. An autonomic system according to IBM must be able to know or expect what kind of demand is going to
arise for its resources to make it a transparent process for the users to see this information.

Weitere ähnliche Inhalte

Ähnlich wie CC01.pptx

Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorialsUdara Sandaruwan
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud ComputingMohammed Sajjad Ali
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingCaner KAYA
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdfkhan593595
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing PresentationMohammed Kharma
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basicsBhavani Thangavel
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingnitinw25
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingArwa
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationAkash Tripathi
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introductionguest90f660
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud ComputingLiming Liu
 
cloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfcloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfsuriyakalavinoth
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing Md Nazrul Islam Roxy
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAlessandro Iudica
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingImane SBAI
 
SE2_Lec 23_Introduction to Cloud Computing
SE2_Lec 23_Introduction to Cloud ComputingSE2_Lec 23_Introduction to Cloud Computing
SE2_Lec 23_Introduction to Cloud ComputingAmr E. Mohamed
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxgarkhot123
 

Ähnlich wie CC01.pptx (20)

Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud Computing
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Sami-Cloud
Sami-CloudSami-Cloud
Sami-Cloud
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
cloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdfcloud co3453545665768s6xd5x5a5mputing.pdf
cloud co3453545665768s6xd5x5a5mputing.pdf
 
cc notes one.pdf
cc notes one.pdfcc notes one.pdf
cc notes one.pdf
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
SE2_Lec 23_Introduction to Cloud Computing
SE2_Lec 23_Introduction to Cloud ComputingSE2_Lec 23_Introduction to Cloud Computing
SE2_Lec 23_Introduction to Cloud Computing
 
Unit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptxUnit-I Introduction to Cloud Computing.pptx
Unit-I Introduction to Cloud Computing.pptx
 

KĂźrzlich hochgeladen

Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...
Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...
Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...anilsa9823
 
Alex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson StoryboardAlex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson Storyboardthephillipta
 
Lucknow 💋 Russian Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Ser...
Lucknow 💋 Russian Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Ser...Lucknow 💋 Russian Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Ser...
Lucknow 💋 Russian Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Ser...anilsa9823
 
Lucknow 💋 Call Girl in Lucknow Phone No 8923113531 Elite Escort Service Avail...
Lucknow 💋 Call Girl in Lucknow Phone No 8923113531 Elite Escort Service Avail...Lucknow 💋 Call Girl in Lucknow Phone No 8923113531 Elite Escort Service Avail...
Lucknow 💋 Call Girl in Lucknow Phone No 8923113531 Elite Escort Service Avail...anilsa9823
 
Jeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel ThrowingJeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel ThrowingJeremy Casson
 
Bridge Fight Board by Daniel Johnson dtjohnsonart.com
Bridge Fight Board by Daniel Johnson dtjohnsonart.comBridge Fight Board by Daniel Johnson dtjohnsonart.com
Bridge Fight Board by Daniel Johnson dtjohnsonart.comthephillipta
 
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad EscortsIslamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escortswdefrd
 
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...Jeremy Casson
 
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...gurkirankumar98700
 
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...hanshkumar9870
 
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...anilsa9823
 
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...akbard9823
 
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Servicesonnydelhi1992
 
Lucknow 💋 Russian Call Girls Lucknow - Book 8923113531 Call Girls Available 2...
Lucknow 💋 Russian Call Girls Lucknow - Book 8923113531 Call Girls Available 2...Lucknow 💋 Russian Call Girls Lucknow - Book 8923113531 Call Girls Available 2...
Lucknow 💋 Russian Call Girls Lucknow - Book 8923113531 Call Girls Available 2...anilsa9823
 
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...akbard9823
 
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...anilsa9823
 
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...akbard9823
 
Call Girl Service In Dubai #$# O56521286O #$# Dubai Call Girls
Call Girl Service In Dubai #$# O56521286O #$# Dubai Call GirlsCall Girl Service In Dubai #$# O56521286O #$# Dubai Call Girls
Call Girl Service In Dubai #$# O56521286O #$# Dubai Call Girlsparisharma5056
 
Best Call girls in Lucknow - 9548086042 - with hotel room
Best Call girls in Lucknow - 9548086042 - with hotel roomBest Call girls in Lucknow - 9548086042 - with hotel room
Best Call girls in Lucknow - 9548086042 - with hotel roomdiscovermytutordmt
 

KĂźrzlich hochgeladen (20)

Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...
Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...
Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...
 
Alex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson StoryboardAlex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson Storyboard
 
Lucknow 💋 Russian Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Ser...
Lucknow 💋 Russian Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Ser...Lucknow 💋 Russian Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Ser...
Lucknow 💋 Russian Call Girls Lucknow | Whatsapp No 8923113531 VIP Escorts Ser...
 
Lucknow 💋 Call Girl in Lucknow Phone No 8923113531 Elite Escort Service Avail...
Lucknow 💋 Call Girl in Lucknow Phone No 8923113531 Elite Escort Service Avail...Lucknow 💋 Call Girl in Lucknow Phone No 8923113531 Elite Escort Service Avail...
Lucknow 💋 Call Girl in Lucknow Phone No 8923113531 Elite Escort Service Avail...
 
Jeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel ThrowingJeremy Casson - Top Tips for Pottery Wheel Throwing
Jeremy Casson - Top Tips for Pottery Wheel Throwing
 
Bridge Fight Board by Daniel Johnson dtjohnsonart.com
Bridge Fight Board by Daniel Johnson dtjohnsonart.comBridge Fight Board by Daniel Johnson dtjohnsonart.com
Bridge Fight Board by Daniel Johnson dtjohnsonart.com
 
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad EscortsIslamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
Islamabad Call Girls # 03091665556 # Call Girls in Islamabad | Islamabad Escorts
 
Independent UAE Call Girls # 00971528675665 # Independent Call Girls In Dubai...
Independent UAE Call Girls # 00971528675665 # Independent Call Girls In Dubai...Independent UAE Call Girls # 00971528675665 # Independent Call Girls In Dubai...
Independent UAE Call Girls # 00971528675665 # Independent Call Girls In Dubai...
 
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...
Jeremy Casson - How Painstaking Restoration Has Revealed the Beauty of an Imp...
 
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...
Charbagh / best call girls in Lucknow - Book 🥤 8923113531 🪗 Call Girls Availa...
 
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...
OYO GIRLS Call Girls in Lucknow Best Escorts Service Near You 8923113531 Call...
 
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...
 
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...
 
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
 
Lucknow 💋 Russian Call Girls Lucknow - Book 8923113531 Call Girls Available 2...
Lucknow 💋 Russian Call Girls Lucknow - Book 8923113531 Call Girls Available 2...Lucknow 💋 Russian Call Girls Lucknow - Book 8923113531 Call Girls Available 2...
Lucknow 💋 Russian Call Girls Lucknow - Book 8923113531 Call Girls Available 2...
 
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...
Aminabad @ Book Call Girls in Lucknow - 450+ Call Girl Cash Payment 🍵 8923113...
 
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...
Lucknow 💋 Female Escorts Service in Lucknow | Service-oriented sexy call girl...
 
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...
 
Call Girl Service In Dubai #$# O56521286O #$# Dubai Call Girls
Call Girl Service In Dubai #$# O56521286O #$# Dubai Call GirlsCall Girl Service In Dubai #$# O56521286O #$# Dubai Call Girls
Call Girl Service In Dubai #$# O56521286O #$# Dubai Call Girls
 
Best Call girls in Lucknow - 9548086042 - with hotel room
Best Call girls in Lucknow - 9548086042 - with hotel roomBest Call girls in Lucknow - 9548086042 - with hotel room
Best Call girls in Lucknow - 9548086042 - with hotel room
 

CC01.pptx

  • 1. Cloud Computing (Unit 1) Dr Jeet Ghosh
  • 2. What is Cloud Computing ?
  • 3. • Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing. • Instead of buying, owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage, and databases, on an as-needed basis from a cloud provider like Amazon Web Services (AWS), azure etc.
  • 4. Definition Clouds are a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or services). These resources can be dynamically reconfigured to adjust to a variable load (scale), allowing also for an optimum resource utilization. This pool of resources is typically exploited by a pay-per-use model in which guarantees are offered by the Infrastructure Provider by means of customized Service Level Agreements
  • 5. Origin of Cloud Computing Statement of the problem
  • 7. History John McCarthy, a computer scientist from this era, came up with the “theory of time-sharing”. By “time-sharing” he was referring to an operating system that gives multiple users of a computer the ability to act as if he or she was in control of the machine. Time-sharing is often considered the original foundation for the concept we know today as cloud computing.
  • 8. History J.C.R Licklider developed the ARPANET (Advanced Research Projects Agency Network). His vision was for a global computer network such that users could access programs and data from anywhere. • Around this time, users became able to run hosted applications through their own terminals. • A protocol would basically get information from the main service and send it to the terminal, receive requests from the terminal, and pass these requests along to the main service which would ensure connection to the proper application.
  • 9. History In the 1970s, The creation of virtual machines enabled users to run more than one operating system simultaneously on one physical platform.
  • 10. History In 1997, one of the first definitions of cloud computing came from Professor Ramnath Chellapa of Emory University and the University of South California. He referred to cloud computing as the “computing paradigm where the boundaries of computing will be determined by economic rationale rather than technical limits alone.”
  • 12. Some Cloud Services Following are a few cloud computing examples and uses: •Communication: Skype, Whatsapp, Slack •Productivity: Microsoft Office 365, Gmail •Data Storage: Dropbox, Facebook, Gmail •Business Processes: Salesforce, Hubspot •Application Development: Amazon Lumberyard •Big Data Analytics: Hadoop, Cassandra, HPCC •Social Networking: MySpace, LinkedIn, Twitter
  • 15. Essential characteristics of Cloud Computing (ISO 17788) On- deman d self- service s On-demand self-services: The Cloud computing services does not require any human administrators, user themselves are able to provision, monitor and manage computing resources as needed.
  • 16. Essential characteristics of Cloud Computing On- deman d self- service s Broad network access: The Computing services are generally provided over standard networks and heterogeneous devices. Broad network access:
  • 17. Essential characteristics of Cloud Computing On- deman d self- service s Rapid elasticity: The Computing services should have IT resources that are able to scale out and in quickly and on as needed basis. Whenever the user require services it is provided to him and it is scale out as soon as its requirement gets over. Broad network access: Rapid elasticit y
  • 18. Essential characteristics of Cloud Computing On- deman d self- service s Resource pooling: •The providers computing resources are pooled together to serve multiple customers, with different physical and virtual resources dynamically assigned and reassigned according to the customers demand. •There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g. country, state, or datacenter). •Example of resources include storage, processing, memory, and network bandwidth Broad network access: Rapid elasticit y Resource pooling
  • 19. Essential characteristics of Cloud Computing On- deman d self- service s Broad network access: Rapid elasticit y Resource pooling Measured service Measured service •Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g. storage, processing, bandwidth, and active use account). •Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.
  • 20. Essential characteristics of Cloud Computing On- deman d self- service s Broad network access: Rapid elasticit y Resource pooling Measured service Multi-tenancy In a private cloud, the customers are also called tenants, can have different business divisions inside the same company. In a public cloud, the customers are often entirely different organizations. Most public cloud providers use the multi- tenancy model. Multi-tenancy allows customers to run one server instance, which is less expensive and makes it easier to deploy updates to a large number of customers. Multi- tenancy As per NIST (National Institute of Standards and Technology) the essential features are : On demand self-service,Broad network access, Resource pooling, Rapid Elasticity, Measured service
  • 21. Traditional IT Vs Cloud Computing Expenses Architecture: The convenience of collaboration Operating system dependency Security Position Backup Recovery Availability
  • 22. Traditional IT Vs Cloud Computing Expenses Architecture: The convenience of collaboration Operating system dependency Security Position Backup Recovery Availability Cloud computing runs on outsider servers facilitated by third-party hosting organizations, traditional computing happens on website servers and physical hard drives
  • 23. Traditional IT Vs Cloud Computing Expenses Architecture: The convenience of collaboration Operating system dependency Security Position Backup Recovery Availability Traditional computing costs are higher than cloud computing costs. T his is chiefly since the maintenance and operation of the server is divided among a few distinct gatherings, which lessens the expense of public services. Organizations can save money on investment costs by not accepting costly equipment.
  • 24. Traditional IT Vs Cloud Computing Expenses Architecture: The convenience of collaboration Operating system dependency Security Position Backup Recovery Availability Cloud-based applications are made for infrastructure development. They work on theories of automation and user interface, while Traditional applications are made on three essential levels known as app logic tier, presentation tier, and database tier.
  • 25. Traditional IT Vs Cloud Computing Expenses Architecture: The convenience of collaboration Operating system dependency Security Position Backup Recovery Availability Cloud-based applications are autonomous, as cloud computing technology is inescapable; on the other hand, a Traditional application is consistently reliant on a particular operating system for working appropriately. It is likewise dependent on hardware, storage, and backing services.
  • 26. Traditional IT Vs Cloud Computing Expenses Architecture: The convenience of collaboration Operating system dependency Security Position Backup Recovery Availability As of now, an efficient and easy coordinated effort is crucial to maintain a business on the advanced stage. Cloud-based computing permits simple coordinated effort, and the developers can finish codes efficiently. Since cloud computing is service-oriented, you can guarantee appropriate creation in your organization. Besides, the business area has turned data-centric. In such scenery, traditional computing requires completed codes and regularly leads to an inside clash in an organization.
  • 27. Traditional IT Vs Cloud Computing Expenses Architecture: The convenience of collaboration Operating system dependency Security Position Backup Recovery Availability Security is one of the crucial requirements to maintain a business appropriately. Both traditional computing and cloud computing have distributable highlights regarding security. You can have numerous layers of security while utilizing cloud-based computing. Cyberattacks are uncommon on account of cloud-based computing because of the presence of various hosts. On the off chance that you intend to start a business and extend it, the assistance situated cloud computing can be your best support network, while traditional computing is made statically, it just gives a solitary security layer to the business-related data.
  • 28. Traditional IT Vs Cloud Computing Expenses Architecture: The convenience of collaboration Operating system dependency Security Position Backup Recovery Availability Cloud-based computing has all around planned design that guarantees legitimate backup for all the data. Also, the DRaaS (Disaster recovery as a service) application can help you access the backups on the off chance that it gets erased out of sudden, on the opposite side, with regards to recovery and backup, there is no computerized highlight present in traditional computing. Nor is there a disaster recovery administrate
  • 29. Traditional IT Vs Cloud Computing Expenses Architecture: The convenience of collaboration Operating system dependency Security Position Backup Recovery Availability Cloud-based computing is unique. On account of this computing, you can get customary updates and improved highlights. Therefore, maintaining your business will turn out to be substantially more reasonable. Indeed, even if there should arise an occurrence of certain escape clauses, the IT group works dedicatedly to quick eradication. This sensibility helps your business run at a decent speed, and you can procure a decent benefit, while the IT heads discharge customary applications over long stretches, frequently half a months or weeks. It happens as the traditional applications need manual scripting. Also, it can’t be delivered except if all the parts of coding are finished.
  • 30. Component of Cloud Computing Three Components are 1. Client Computer 2. Distributed Server 3. Data Center
  • 31. Component of Cloud Computing Clients in cloud computing are in general to the operation of Local Area Networks (LAN’s). They are just the desktops where they have their place on desks. Clients generally fall into three categories: 1. Mobile - Mobile devices 2. Thin - Clients are computers that do not have internal hard drives, but rather let the server do all the work, and then display the information. 3.Thick - This type of client is a regular computer, using a web browser like Firefox or Internet Explorer to connect to the cloud.
  • 32. Component of Cloud Computing It is an array of servers that houses the subscribed application. Progressing the IT industry has brought the concept of virtualizing servers, where the software might be installed through the utilization of various instances of virtual servers. This approach streamlines the process of managing dozens of virtual servers on multiple physical servers.
  • 33. Component of Cloud Computing These are considered as a server where that is housed in the other location. So, the physical servers might not be housed in a similar location. Even the distributed server and the physical server appear to be in different locations, they perform as they are so close to each other.
  • 34. Roots of Cloud Computing
  • 36. Internet Technologies (SOA) Service-oriented architecture (SOA) is a type of software design that makes software components reusable using service interfaces that use a common communication language over a network. SOA integrates software components that have been separately deployed and maintained and allows them to communicate and work together to form software applications across different systems. S 1 S 2 S 3 S 4 S 5 S 6 S 7
  • 37. Example (Car Parking System) Sub System MAP of the City Sub System User Authentication Sub System Payment Portal Google map Facebook Paypal Integration
  • 39. SOA Principle Service Processing Security Payment Standardized Service Contract : Services adhere to a service-description. A service needs to have some information that defines what the service is about. All the Unit knows about the Service Loose Coupling Services minimize dependencies on each other. So if the service functionality breaks at several points in time, this should not crush the client application or stop it from running All the Unit independent to others
  • 40. SOA Principle Service Processing Security Payment Service Abstraction Services wrap the logic they encapsulate from the unknown external world. The service shouldn't show how it performs its functionality How the payment portal works, service employee does not know Service Autonomy Services must control the logic they encapsulate. All the Unit are autonomous Service Statelessness Services should stay stateless. This determines that services should not keep data from one state to the other. This would be required to be done from each client application. Units are not store the data
  • 41. SOA Principle Service Processing Security Payment Service Discoverability Services can be discovered (usually in a service registry). We have previously viewed this in the theory of the UDDI, which performs a registry which can contain information about the web service. Service can be identified by the client Service Reusability Logic is divided into services to maximize re-use. Service Composability It breaks large problems into tiny problems. Whole service is divided in small part
  • 42. Web Service The following ways can characterize a Web Service: •It is a client-server application segment for correspondence. •The technique for correspondence between two gadgets over the system. •It is a product framework for interoperable machine-to-machine correspondence. •It is an assortment of norms or conventions for trading data between two gadgets or applications.
  • 44. • Web Service Json or Raw Data
  • 45. Web 2.0 • WEB 2.0 Services are more convenient for the users, as they do not have to learn more about coding and concepts to work with it. • Information Technology companies basically provide this kind of service in which people can use the services on the common platform. • Predefined blocks or templates make their work easy and they can work together by the centralized cloud computing system. • Some examples of WEB 2.0 services are host services like Google Maps, microblogging sites like Twitter, and social networking sites like Facebook.
  • 46. Distributed Computing A distributed computer system consists of multiple software components that are on multiple computers, but run as a single system. The computers that are in a distributed system can be physically close together and connected by a local network, or they can be geographically distant and connected by a wide area network. A distributed system can consist of any number of possible configurations, such as mainframes, personal computers, workstations, minicomputers, and so on. The goal of distributed computing is to make such a network work as a single computer.
  • 48. Distributed Computing Grid Computing Grid Computing, as name suggests, is a type of computing that combine resources from various administrative domains to achieve common goal. Its main goal to virtualized resources to simply solve problems or issues and apply resources of several computers in network to single problem at same time to solve technical or scientific problem. Most production grids such as TeraGrid and EGEE seek to share compute and storage resources distributed across different administrative domains, with their main focus being speeding up a broad range of scientific applications, such as climate modeling, drug design, and protein analysis
  • 49. A typical grid computing network consists of three machine types: •Control node/server: A control node is a server or a group of servers that administers the entire network and maintains the record for resources in a network pool. •Provider/grid node: A provider or grid node is a computer that contributes its resources to the network resource pool. •User: A user refers to the computer that uses the resources on the network to complete the task.
  • 50. Traditional Vs Grid Computing Task: X = (4 x 7) + (3 x 9) + (2 x 5) •Step 1: X = 28 + (3 x 9) + (2 x 5) •Step 2: X = 28 + 27 + (2 x 5) •Step 3: X = 28 + 27 + 10 •Step 4: X = 65 (4 X 7) (3 X 9) (2 X 5) •Step 1: X = 28 + 27 + 10 •Step 2: X = 65
  • 51. Distributed Computing Utility Computing Utility computing is a service provisioning model that offers computing resources such as hardware, software, and network bandwidth to clients as and when they require them on an on-demand basis. The service provider charges only as per the consumption of the services, rather than a fixed charge or a flat rate.
  • 52. Grid Computing v/s Utility Computing GRID Computing UTILITY Computing It combines different computing resources from multiple locations to achieve desired and common goal. It provide on-demand computing resources and infrastructure on basis of pay per use method It distributes workload across multiple systems and allow computers to contribute their individual resources to common goal. . It allows organization to allocate and segregate computing resources and infrastructure to various users on basis of their requirements. It makes better use of existing resources,. It simply reduces IT costs. It mainly focuses on sharing computing resources. It mainly focuses on acquiring computing resources. Its main purpose is to integrate usage of computer resources from cooperating partners in form of VO (Virtual Its main purpose is to make computing resources and infrastructure management available to customer as per their need.
  • 53. Hardware • The third root is Hardware from the roots of cloud computing which contains multi-core chips and virtualization. • When we talk about Hardware for cloud computing, it is usually virtual and people do not need to buy it
  • 54. Virtualization • Virtualization is a process of creating useful IT services such as memory, storage and even an OS within an OS using already existing physical resources. • Allows user to use physical machine's full capacity by distributing its capabilities • Enables efficient use of resources thereby improving the business agility
  • 55. Virtualization • How Virtualization Work Web Server Mail Server App Server Hypervisor
  • 56. Virtualization • How Virtualization Work • Applications, storage, memory, I/0 is abstracted aver already existing hardware resources • Hypervisor is used to emulate underlying hardware. • Hypervisor separates the physical resources to be used in the virtual environment • . • This results in server virtualization
  • 57. • Feature of Virtualization Reduce Hardware Cost Resource Allocation Partitioning and Security Rapid Deployment Centralized Logic
  • 58. Virtualization Architecture Host Hardware Hypervisor (Type 1) VM 1 VM 2 VM 3 OS OS OS A P P A P P A P P A P P A P P A P P Host Hardware Hypervisor (Type 2) VM 1 VM 2 VM 3 OS OS OS A P P A P P A P P A P P A P P A P P Host OS
  • 59. Hypervisor • A hypervisor is a crucial piece of software that makes virtualization possible. • It abstracts guest machines and the operating system they run on, from the actual hardware. • Hypervisors create a virtualization layer that separates CPU / Processors, RAM and other physical resources from the virtual machines you create. • The machine we install a hypervisor on is called a host machine, versus guest virtual machines that run on top of them. • Hypervisors emulate available resources so that guest machines can use them. No matter what operating system you boot up with a virtual machine, it will think that actual physical hardware is at its disposal.
  • 60. Different type of Virtualization • Network Virtualization • Storage Virtualization • Server Virtualization • Application Virtualization • Desktop Virtualization
  • 61. Network Virtualization • Network Virtualization (NV) refers to abstracting network resources that were traditionally delivered in hardware to software. NV can combine multiple physical networks to one virtual, software-based network, or it can divide one physical network into separate, independent virtual networks.
  • 62. Traditional NW v/s Virtualized NW Traditional NW Physical Switch Router VLAN ID 100 VLAN ID 101
  • 63. Traditional NW v/s Virtualized NW Traditional NW Physical Switch Router VLAN ID 100 VLAN ID 101
  • 64. Traditional NW v/s Virtualized NW Traditional NW Physical Switch Router VLAN ID 100 VLAN ID 101 VLAN ID 100 VLAN ID 101
  • 65. Traditional NW v/s Virtualized NW Traditional NW Physical Switch Router VLAN ID 100 VLAN ID 101 VLAN ID 100 VLAN ID 101 VM VM VM VLAN ID 103 VLAN ID 103
  • 66. Traditional NW v/s Virtualized NW Traditional NW Physical Switch Router VLAN ID 100 VLAN ID 101 VLAN ID 100 VLAN ID 101 VM VM VM VLAN ID 103 VLAN ID 103
  • 67. Traditional NW v/s Virtualized NW Physical Switch Router VLAN ID 100 VLAN ID 101 VLAN ID 100 VLAN ID 101 Logical Switch
  • 68. Traditional NW v/s Virtualized NW Physical Switch Router VLAN ID 100 VLAN ID 101 VLAN ID 100 VLAN ID 101 Logical Switch VM VM VM Encapsulation De-Encapsulation
  • 69. Server Virtualization • Server virtualization is the process of dividing a physical server into multiple unique and isolated virtual servers by means of a software application. Each virtual server can run its own operating systems independently.
  • 70. Storage Virtualization • Storage virtualization (also sometimes called software- defined storage or a virtual SAN) is the pooling of multiple physical storage arrays from SANs and making them appear as a single virtual storage device. • The pool can integrate unlike storage hardware from different networks, vendors, or data centers into one logical view and manage them from a single pane of glass.
  • 71. Application Virtualization • Application virtualization is a process that deceives a standard app into believing that it interfaces directly with an operating system's capacities when, in fact, it does not. 1.Store the software pack on the device storage. 2.When the user launches the application, the application gets streamed. 3.As the streaming process begins, the user can use the software as if it is locally installed.
  • 72. Desktop Virtualization Desktop virtualization is a method of simulating a user workstation so it can be accessed from a remotely connected device. By abstracting the user desktop in this way, organizations can allow users to work from virtually anywhere with a network connecting, using any desktop laptop, tablet, or smartphone to access enterprise resources without regard to the device or operating system employed by the remote user.
  • 73. System Management • The fourth root of cloud computing (System Management) contains data center automation and autonomic computing. • System management root handles the operations to improve the productivity and efficiency of the system. • To achieve this system management ensures all the employees have easy access to all the necessary information. • For that, employees can change configurations, obtain/resend information and perform other related functions from any location. • Based on that data, the system responses perform various tasks such as optimization, adaptation, configuration, and protection. • Hence, at this root, human involvement is less and the computing system handles most of the operations.
  • 74. Data Center Automation • Data center automation is the process by which routine workflows and processes of a data center—scheduling, monitoring, maintenance, application delivery, and so on—are managed and executed without human administration. • Data center automation increases agility and operational efficiency. • It reduces the time IT needs to perform routine tasks and enables them to deliver services on demand in a repeatable, automated manner. These services can then be rapidly consumed by end users.
  • 75. Autonomic Computing • Autonomic Computing is a type of visionary computing that has been started by IBM. This is made to make adaptive decisions that use high-level policies. It has a feature of constant up-gradation using optimization and adaptation.
  • 76. Characteristics of AC 1. The Autonomic system knows itself. This means that it knows its components, specifications capacity, and the real-time status. It also has knowledge about its own, borrowed, and shared resources. 2. It can configure itself again and again and run its setup automatically as and when required. 3. It has the capability of optimizing itself by fine-tuning workflows. 4. It can heal itself. This is a way of mentioning that it can recover from failures. 5. It can protect itself by detecting and identifying various attacks on it. 6. It can open itself. This means that it must not be a proprietary solution and must implement open standards. 7. It can hide. This means that it has the ability to allow resource optimization, by hiding its complexity. 8. An autonomic system according to IBM must be able to know or expect what kind of demand is going to arise for its resources to make it a transparent process for the users to see this information.

Hinweis der Redaktion

  1. This is the question that your experiment answers
  2. Summarize your research in three to five points.
  3. Summarize your research in three to five points.
  4. Summarize your research in three to five points.
  5. Summarize your research in three to five points.
  6. Summarize your research in three to five points.
  7. Summarize your research in three to five points.