0% found this document useful (0 votes)
126 views82 pages

Cloud Computing Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
126 views82 pages

Cloud Computing Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
UNIT -1 INTRODUCTION © Cloud Computing is the delivery of computing services such as servers, storage, databases, networking, software, analytics, intelligence, and more, over the Cloud (Internet), Cloud Computing provides an alternative to the on-premises datacentre. With an on- premises datacentre, we have to manage everything, such as purchasing and installing hardware, virtualization, installing the operating system, and any other required applications, setting up the network, configuring the firewall, and setting up storage for data. After doing all the set-up, we become responsible for maintaining it through its entire lifecycle. * But if we choose Cloud Computing, a cloud vendor is responsible for the hardware purchase and maintenance. They also provide a wide variety of software and platform as a service, We can take any required services on rent. The cloud computing services will be charged based on usage * Cloud computing refers to the delivery of computing resources- including servers, storage, database, networking, software, analytics, and intelligence- over the internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. © Cloud computing services can be used by individuals or organizations to store, proce and manage data, as well as run applications and websites | Servers, Laptops Application A Desktops y collaboration = C ‘commutation Platform a © = Object Identity, Runtime, oo Database Storage Infrasturcture ou = oe Block Storage Phones Cloud computing Tablets + The cloud environment provides an easily accessible online portal that makes handy for the user to manage the compute, storage, network, and application resources. * On-Demand Self-Service Cloud computing allows on-demand self-services. Services include storage, networking, analysis, etc. Users can select and use single or multiple services depending on their needs. Users become more accountable for their intake, which improves their ability to make wise decisions. Users can make use of resources following their needs and specifications. They are charged at the end of the billing cycle based on how much they use the services provided by the cloud service providers. © Broad Network Access The cloud is accessible to any device from any location because of widespread network access. A cloud provider must offer its clients numerous network access options. Otherwise, a few systems would be available for using the cloud service. Broad network access contains configuration for secure remote access, paying special attention to mobile cloud computing, regulating the data that broad access network providers have collected, enforcing role-based access control, etc. As a result, cloud computing removes obstacles and borders because it operates across numerous regions. * Scalability or Rapid Elasticity A system's capacity to manage an increasing volume of work by adding resources is known as scalability. Cloud services must quickly develop to keep up with the ongoing expansion of businesses. One of the most flexible aspects of cloud computing is scalability. In addition to having the potential to increase the number of servers or infrastructure in response to demand, it also offers a significant number of features that satisfy the needs of its clients Scalability further improves cloud computing’s cost-effectiveness and suitability for business use. It can be dialed back when demand is low and exponentially expanded when demand is high. When demand declines, services revert to how they were before. It is comparable to when a restaurant can accept more people during peak hours, but it is a cloud. This requires a lot of planning, money, and resources, but cloud service providers handle every element. « Resource Pooling Resource pooling is one of the core components of cloud computing. A cloud service provider can provide each client with different services based on their demands by employing resource pooling to divide resources across many clients. Resource pooling is a multi-client approach for location independence, network infrastructure pooling, storage systems, etc. The process of real-time resource assignment does not affect the client's experience. This is often used in wireless technologies like a radio transmission. « Measured Service Cloud systems automatically manage and manage resource utilization by using a metering capability. The consumption of resources is tracked for each application and tenant; it will give both the user and the resource supplier an account of what has been utilized. Monitoring, regulating, and reporting resource utilization allows for transparency for the service provider and the service user. The metering capability is built into some level of service abstraction, which enables transparency between the customer and the service provider. Each user must be billed according to how much of the service they use, and the cloud provider must be able to measure this usage. « Security Users of cloud computing are particularly concerned about data security. Cloud service providers store users’ encrypted data and offer additional security features like user authentication and protection against breaches and other threats. User authentication entails identifying and verifying a user's authorization. Access is denied to the user if they do not have permission. Data servers are physically protected. These servers are usually kept in a secure, isolated location to prevent unauthorized access or disruption. « Automation Automation in cloud computing refers to a cloud service's ability to be installed, configured, and maintained automatically. In other words, it is the process of maximizing technology and minimizing the amount of manual labor necessary. However, it is not simple to automate the cloud ecosystem. It requires the deployment of significant storage, servers, and virtual machines. After successful deployment, these resources need to be maintained. « Budget Friendly Businesses can reduce their IT expenses by utilizing this aspect of the cloud. In cloud computing, the client is responsible for paying the administration for any space they use. There are no additional fees or hidden costs to be paid. The payment structure is crucial since it reduces expenses. Due to the extra functionality, cloud computing choices have a wide range of pricing. The payment option is simple and helps consumers save time when making frequent payments. * Flexibility Cloud computing users can access data or services with internet-enabled devices like smartphones and laptops. You can instantly access anything you want in the cloud with just a click, making working with data and sharing it simple. Many businesses prefer to store their work on cloud systems because it facilitates collaboration and saves money and resources. Its expansion is also being sped up by the number of features analytic tools offer. © Resilience Resilience in cloud computing refers to a service's capacity to quickly recover from any disruption. The speed at which a cloud’s servers, databases, and network system restart and recover from damage or harm is a measure of its resilience. Cloud computing offers vital services because it guarantees constant server uptime. This enables service recovery in the event of a disruption, and the cloud service provider plans to enhance disaster management by maintaining backup cloud nodes. ‘As we know, cloud computing technology is used by both small and large organizations to store the information in cloud and access it from anywhere at anytime using the internet connection. Cloud computing architecture is a combination of service-oriented architecture and event-driven architecture. Cloud computing architecture is divided into the following two parts — © Front end « Back end The below diagram shows the architecture of cloud computing - Architecture of Cloud Computing internet Application Runtime Cloud Back End = 2 e = Sart Front End The front end is used by the client. It contains client-side interfaces and applications that are required to access the cloud computing platforms. The front end includes web servers (including Chrome, Firefox, intemet explorer, ctc.), thin & fat clients, tablets, and mobile devices. Back End ‘The back end is used by the service provider. It manages all the resources that are required to provide cloud computing services. It includes a huge amount of data storage, security mechanism, virtual machines, deploying models, servers, traffic control mechanisms, etc. There are the following components of cloud computing architecture - 1, Client Infrastructure: Client Infrastructure is a Front end component. It provides GUI (Graphical User Interface) to interact with the cloud. 2. Application : The application may be any software or platform that a client wants to access. 3. Service: A Cloud Services manages that which type of service you access according to the client’s requirement. 4. Runtime Cloud: Runtime Cloud provides the execution and runtime environment to the virtual machines. 5. Storage: Storage is one of the most important components of cloud computing. It provides a huge amount of storage capacity in the cloud to store and manage data. 6. Infrastructure: It provides services on the host level, application level, and network level. Cloud infrastructure includes hardware and sofiware components such as servers, storage, network devices, virtualization software, and other storage resources that are needed to support the cloud computing model. 7. Management: Management is used to manage components such as application, service, runtime cloud, storage, infrastructure, and other security issues in the backend and establish coordination between them. 8. Security: Security is an in-built back end component of cloud computing. It implements a security mechanism in the back end. 9. Internet: The Internet is medium through which front end and back end can interact and communicate with each other. FRONTEND Cen? ‘Application Cloud Runtime BACKEND M a n a g e m e n t Cloud computing offers the following three type of services: i. Software as a Service (SaaS) — It is also known as cloud application services. Mostly, SaaS applications run directly through the web browser means we do not require to download and install these applications. Some important example of SaaS is given below - Example: Google Apps, Salesforce Dropbox, Slack, HubSpot, Cisco WebEx. ii, Platform as a Service (PaaS) — It is also known as cloud platform services. It is quite similar to SaaS, but the difference is that PaaS provides a platform for software creation, but using SaaS, we can access software over the internet without the need of any platform, Example: Windows Azure, Force.com, Magento Commerce Cloud, OpenShift. Infrastructure as a Service (IaaS) — It is also known as cloud infrastructure services. It is responsible for managing applications data, middleware, and runtime environments. Example: Amazon Web Services (AWS) EC2, Google Compute Engine (GCE), Cisco Metapod. It works as your virtual computing environment with a choice of deployment model depending on how much data you want to store and who has access to the Infrastructure. Different Types Of Cloud Computing Deployment Models Most cloud hubs have tens of thousands of servers and storage devices to enable fast loading. It is often possible to choose a geographic area to put the data "closer" to users. Thus, deployment models for cloud computing are categorized based on their location. To know which model would best fit the requirements of your organization, let us first learn about the various types. * Public Cloud The name says it all. It is accessible to the public. Public deployment models in the cloud are perfect for organizations with growing and fluctuating demands. It also makes a great choice for companies with low-security concerns. Thus, you pay a cloud service provider for networking services, compute virtualization & storage available on the public internet. It is also a great delivery model for the teams with development and testing. Its configuration and deployment are quick and easy, making it an ideal choice for test environments. Public Cloud COMPANY A PUBLIC USERS COMPANY B COMPANY C ) | Pasay esa oe NO I aS esas) OPTIONAL SUBSCRIBER BASED ere yell aoe PERIMETER Eyes) APPLICATION ‘SERVERS. ‘SERVERS HARDWARE ‘SERVICES sewer" | aaene || mem | ree STORAGE SERVICES Benefits of Public Cloud Minimal Investment - As a pay-per-use service, there is no large upfront cost and is ideal for businesses who need quick access to resources o No Hardware Setup - The cloud service providers fully fund the entire Infrastructure o No Infrastructure Management - This does not require an in-house team to utilize the public cloud. Limitations of Public Cloud © Data Security and Privacy Concerns - Since it is accessible to all, it does not fully protect against cyber-attacks and could lead to vulnerabilities. o Reliability Issues - Since the same server network is open to a wide range of users, it can lead to malfunction and outages Service/License Limitation - While there are many resources you can exchange with tenants, there is a usage cap. Private Cloud Now that you understand what the public cloud could offer you, of course, you are keen to know what a private cloud can do. Companies that look for cost efficiency and greater control over data & resources will find the private cloud a more suitable choice. It means that it will be integrated with your data centre and managed by your IT team. Alternatively, you can also choose to host it externally. The private cloud offers bigger opportunities that help meet specific organizations’ requirements when it comes to customization. It’s also a wise choice for mission-critical processes that may have frequently changing requirements. Private Cloud PERIMETER DATABASE LEGACY SYSTEMS HARDWARE APPLICATIONS OWNER'S DATACENTER [BLOCKED ACCESS Benefits of Private Cloud Data Privacy - It is ideal for storing corporate data where only authorized personnel gets access © Security - Segmentation of resources within the same Infrastructure can help with better access and higher levels of security. © Supports Legacy Systems - This model supports legacy systems that cannot access the public cloud. Limitations of Private Cloud o Higher Cost - With the benefits you get, the investment will also be larger than the public cloud. Here, you will pay for software, hardware, and resources for staff and training. © Fixed Scalability - The hardware you choose will accordingly help you scale in a certain direction o High Maintenance - Since it is managed in-house, the maintenance costs also increase. « Community Cloud The community cloud operates in a way that is similar to the public cloud. There's just one difference - it allows access to only a specific set of users who share common objectives and use cases. This type of deployment model of cloud computing is managed and hosted internally or by a third-party vendor. However, you can also choose a combination of all three. Community Cloud HARDWARE STORED ON, es | PREMISES. AT A PEER COMPUTERS THAT COMPANY, OR AT A MANAGE ACCESS THIRD PARTY PROVIDER VERIFIED USER ASKING TO ACCESS SHARED: CLOUD RESOURCES shared are ) orGanization @ 2usres y ORGANIZATION 2¢ ae ) ORGANIZATION 3( Benefits of Community Cloud o Smaller Investment - A community cloud is much cheaper than the private & public cloud and provides great performance © Setup Benefits - The protocols and configuration of a community cloud must align with industry standards, allowing customers to work much more efficiently. Limitations of Community Cloud © Shared Resources - Due to restricted bandwidth and storage capacity, community resources often pose challenges. © Not as Popular - Since this is a recently introduced model, it is not that popular or available across industries, + Hybrid Cloud As the name suggests, a hybrid cloud is a combination of two or more cloud architectures. While each model in the hybrid cloud functions differently, it is all part of the same architecture. Further, as part of this deployment of the cloud computing model, the internal or external providers can offer resources. Let's understand the hybrid model better. A company with critical data will prefer storing on a private cloud, while less sensitive data can be stored on a public cloud. The hybrid cloud is also frequently used for ‘cloud bursting’, It means, supposes an organization runs an application on-premises, but due to heavy load, it can burst into the public cloud. Hybrid Cloud Access Control Traditional Systems, (Non-Cloud) All Users Benefits of Hybrid Cloud © Cost-Effectiveness - The overall cost of a hybrid solution decreases since it majorly uses the public cloud to store data. © Security - Since data is properly segmented, the chances of data theft from attackers are significantly reduced. o Flexibility - With higher levels of flexibility, businesses can create custom solutions that fit their exact requirements Limitations of Hybrid Cloud Complexity - It is complex setting up a hybrid cloud since it needs to integrate two or more cloud architectures Specific Use Case - This model makes more sense for organizations that have multiple use cases or need to separate critical and sensitive data, There are the following three types of cloud service models - 1. Infrastructure as a Service (IaaS) 2. Platform as a Service (PaaS) 3. Software as a Service (SaaS) Infrastructure as a Service (IaaS) laaS is also known as Hardware as a Service (HaaS). It is a computing infrastructure managed over the internet. The main advantage of using IaaS is that it helps users to avoid the cost and complexity of purchasing and managing the physical servers. Characteristics of IaaS There are the following characteristics of IaaS - © Resources are available as a service © Services are highly scalable Dynamic and flexible e GUI and API-based access Automated administrative tasks Example: DigitalOcean, Linode, Amazon Web Services (AWS), Microsoft Azure, Google Compute Engine (GCE), Rackspace, and Cisco Metacloud. Platform as a Service (PaaS) PaaS cloud computing platform is created for the programmer to develop, test, run, and manage the applications. Characteristics of PaaS There are the following characteristics of PaaS - © Accessible to various users via the same development application. o Integrates with web services and databases. o Builds on virtualization technology, so resources can easily be scaled up or down as per the organization's need. © Support multiple languages and frameworks. © Provides an ability to "Auto-scale". Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine, Apache Stratos, Magento Commerce Cloud, and OpenShift. Software as a Service (SaaS) SaaS is also known as "on-demand software". It is a software in which the applications are hosted by a cloud service provider. Users can access these applications with the help of internet connection and web browser. Characteristics of SaaS There are the following characteristics of SaaS - o Managed from a central location o Hosted on a remote server © Accessible over the internet © Users are not responsible for hardware and software updates. Updates are applied automatically. © The services are purchased on the pay-as-per-use basis Example: BigCommerce, Google Apps, Salesforce, Dropbox, ZenDesk, Cisco WebEx, ZenDesk, Slack, and GoToMeeting. Cloud service providers provide various applications in the field of art, business, data storage and backup services, education, entertainment, management, social networking, etc. The most widely used cloud computing applications are given below - rad Cloud Data Storage and Backup Computing fete Application Encremment WEEE ets rere) 1. Art Applications Cloud computing offers various art applications for quickly and easily design attractive cards, booklets, and images. Some most commonly used cloud art applications are given below: 2. Business Applications Business applications are based on cloud service providers. Today, every organization requires the cloud business application to grow their business. It also ensures that business applications are 24*7 available to users. 3, Data Storage and Backup Applications Cloud computing allows us to store information (data, files, images, audios, and videos) on the cloud and access this information using an internet connection. As the cloud provider is responsible for providing security, so they offer various backup recovery application for retrieving the lost data. 4, Education Applications Cloud computing in the education sector becomes very popular. It offers various online distance learning platforms and student information portals to the students. The advantage of using cloud in the field of education is that it offers strong virtual classroom environments, Ease of accessibility, secure data storage, scalability, greater reach for the students, and minimal hardware requirements for the applications. 5. Entertainment Applications Entertainment industries use a multi-cloud strategy to interact with the target audience. Cloud computing offers various entertainment applications such as online games and video conferencing. 6. Management Applications Cloud computing offers various cloud management tools which help admins to manage all types of cloud activities, such as resource deployment, data integration, and disaster recovery. ‘These management tools also provide administrative control over the platforms, applications, and infrastructure. 7. Social Applications Social cloud applications allow a large number of users to connect with each other using social networking applications such as Facebook, Twitter, LinkedIn, etc. Excellent Accessibility 1) Back-up and restore data Once the data is stored in the cloud, it is easier to get back-up and restore that data using the cloud. 2) Improved collaboration Cloud applications improve collaboration by allowing groups of people to quickly and easily share information in the cloud via shared storage. lity 3) Excellent accessi Cloud allows us to quickly and easily access store information anywhere, anytime in the whole world, using an intemet connection. An internet cloud infrastructure increases organization productivity and efficiency by ensuring that our data is always accessible. 4) Low maintenance cost Cloud computing reduces both hardware and software maintenance costs for organizations. 5) Mobility Cloud computing allows us to easily access all cloud data via mobile. 6) iServices in the pay-per-use model Cloud computing offers Application Programming Interfaces (APIs) to the users for access services on the cloud and pays the charges as per the usage of servic: 7) Unlimited storage capacity Cloud offers us a huge amount of storing capacity for storing our important data such as documents, images, audio, video, etc. in one place. 8) Data security Data security is one of the biggest advantages of cloud computing. Cloud offers many advanced features related to security and ensures that data is securely stored and handled. A list of the disadvantage of cloud computing is given below - 1) Internet Connectivity As you know, in cloud computing, every data (image, audio, video, ete.) is stored on the cloud, and we access these data through the cloud by using the internet connection. If you do not have good internet connectivity, you cannot access these data. However, we have no any other way to access data from the cloud. 2) Vendor lock-in Vendor lock-in is the biggest disadvantage of cloud computing. Organizations may face problems when transferring their services from one vendor to another. As different vendors provide different platforms, that can cause difficulty moving from one cloud to another. 3) Limited Control As we know, cloud infrastructure is completely owned, managed, and monitored by the service provider, so the cloud users have less control over the function and execution of services within a cloud infrastructure, 4) Security Although cloud service providers implement the best security standards to store important information. But, before adopting cloud technology, you should be aware that you will be sending all your organization's sensitive information to a third party, ie., a cloud computing service provider. While sending the data on the cloud, there may be a chance that your organization's information is hacked by Hackers. The use of a widely dispersed system strategy to accomplish a common objective is called grid computing. A computational grid can be conceived as a decentralized network of interrelated files and non-interactive activities. Grid computing differs from traditional powerful computational platforms like cluster computing in that each unit is dedicated to a certain function or activity. Grid computers are also more diverse and spatially scattered than cluster machines and are not physically connected. However, a particular grid might be allocated to a unified platform, and grids are frequently utilized for various purposes. General-purpose grid network application packages are frequently used to create grids. The size of the grid might be extremely enormous. Grids are decentralized network computing in which a "super virtual computer" is made up of several loosely coupled devices that work together to accomplish massive operations. Distributed or grid computing is a sort of parallel processing that uses entire devices (with onboard CPUs, storage, power supply, network connectivity, and so on) linked to a network connection (private or public) via a traditional network connection, like Ethernet, for specific applications. This contrasts with the typical quantum computer concept, consisting of several cores linked by an elevated universal serial bus on a local level This technique has been used in corporate entities for these applications ranging from drug development, market analysis, seismic activity, and backend data management in the assistance of e-commerce and online services. It has been implemented to computationally demanding research, numerical, and educational difficulties via volunteer computer technology "A limited grid can also be referred to as intra-nodes collaboration, while a bigger, broader grid can be referred to as inter-nodes cooperati Cloud Computing Cloud computing uses a client-server architecture to deliver computing resources such as servers, storage, databases, and software over the cloud (Internet) with pay-as-you-go pricing. Cloud computing becomes a very popular option for organizations by providing various advantages, including cost-saving, increased productivity, efficiency, performance, data back- ups, disaster recovery, and security Cloud Computing Grid Computing Grid computing is also called as “distributed computing." It links multiple computing resources (PC's, workstations, servers, and storage elements) together and provides a mechanism to access them. The main advantages of grid computing are that it increases user productivity by providing transparent access to resources, and work can be completed more quickly. Grid Computing Let's understand the difference between cloud computing and grid computing. Cloud Computing Cloud Computing follows _ client-server computing architecture. Scalability is high. Cloud Computing is more flexible than grid computing. Cloud operates as a centralized management system. In cloud computing, cloud servers are owned by infrastructure providers. Cloud computing uses services like Iaas, PaaS, and SaaS. Cloud Computing is Service-oriented. It is accessible through standard web protocols. Grid Computing Grid computing follows a distributed computing architecture. Scalability is normal. Grid Computing is less flexible than cloud computing. Grid operates as a decentralized management system. In Grid computing, grids are owned and managed by the organization. Grid computing uses systems like distributed computing, distributed information, and distributed pervasive. Grid Computing is Application-oriented. It is accessible through grid middleware. UNIT -2 CLOUD ARCHITECTURE, SERVICE AND APPLICATION * Composability * Infrastructure * Platforms * Virtual Appliances * Communication Protocols + Applications Visualization/API <> Software as a Service Security Compute Services Platform as a Service Network | | Servers Storage ee oo Ss 2 as a Service “o S €@ Cloud Computing Stack « A composable component must be: © Modular: It is a self-contained and independent unit that is cooperative, reusable, and replaceable. © Stateless: A transaction is executed without regard to other transactions or requests. © The essence of a service-oriented design is that services are constructed from a set of modules using standard communications and service interfaces. © An example ofa set of widely used standards describes the services themselves in terms of the Web Services Description Language (WSDL), data exchange between services using some form of XML, and the communications between the services using the SOAP protocol. © Most large Infrastructure as a Service (Jaa$) providers rely on virtual machine technology to deliver servers that can run applications. * Virtual servers described in terms of a machine image or instance have characteristics that often can be described in terms of real servers delivering a certain number of microprocessor (CPU) cycles, memory access, and network bandwidth to customers. © Virtual machines are containers that are assigned specific resources. The software that runs in the virtual machines is what defines the utility of the cloud computing system (tetera Ui) and delivery * Platform in the cloud is a software layer that is used to create higher levels of service. o Salesforce.com's Force.com Platform o Windows Azure Platform © Google Apps and the Google AppEngine A virtual appliance is software that installs as middleware onto a virtual machine. * Virtual appliances are software installed on virtual servers—application modules that are meant to run a particular machine instance or image type. + A virtual appliance is a platform instance. Therefore, virtual appliances occupy the middle of the cloud computing stacks/w installed on Vservers Connecting to the Cloud « A web browser * A proprietary application Annicaione _ ;+——+fEmbedded]( ative }[_wen viral [Bata [Metadata] Content }+—} + (Stractured [Unstructured] appliance Cloud computing communication protocols are standardized methods for exchanging data and information between the various components of a cloud computing system. Some of the most commonly used protocols in cloud computing include: « HTTP (Hypertext Transfer Protocol): used for web applications and data transfer. © HTTPS ( transfer. [P Secure): an encrypted version of HTTP, used for secure data « XML-RPC and SOAP: used for remote procedure calls and for exchanging structured data in web services. « SMTP (Simple Mail Transfer Protocol): used for email communication. © FTP (File Transfer Protocol): used for transferring files between a client and a server. « Remote Desktop Protocol (RDP): used for remote desktop connections. * Telnet: used for remote access and management of network devices. * SSH (Secure Shell): used for secure remote login and other secure network services. © These protocols are essential for the communication and coordination of cloud computing services, and help ensure that data is transmitted and processed efficiently and securely. Iaas is also known as Hardware as a Service (Haa8). It is one of the layers of the cloud computing platform. ¢ It allows customers to outsource their IT infrastructures such as servers, networking, processing, storage, virtual machines, and other resoure Customers access these resources on the Internet using a pay-as-per use model. In traditional hosting services, IT infrastructure was rented out for a specific period of time, with pre-determined hardware configuration. © The client paid for the configuration and time, regardless of the actual use. With the help of the IaaS cloud computing platform layer, clients can dynamically scale the configuration to meet changing requirements and are billed only for the services actually used, IaaS cloud computing platform layer eliminates the need for every organization to maintain the IT infrastructure. « IaaS is offered in three models: public, private, and hybrid cloud. © The private cloud implies that the infrastructure resides at the customer-premise. «In the case of public cloud, it is located at the cloud computing platform vendor's data center, and the hybrid cloud is a combination of the two in which the customer selects the best of both public cloud or private cloud. aS provider provides the following services - 1. Compute: Computing as a Service includes virtual central processing units and virtual main memory for the Vms that is provisioned to the end- users. 2. Storage: IaaS provider provides back-end storage for storing files. 3. Network: Network as a Service (NaaS) provides networking components such as routers, switches, and bridges for the Vms. 4. Load balancers: It provides load balancing capability at the infrastructure layer. C4 laaS Infrastructure as a service @ S — There are the following advantages of IaaS computing layer - 1. Shared infrastructure: IaaS allows multiple users to share the same physical infrastructure. 2. Web access to the resources: Iaas allows IT users to access resources over the internet. 3. Pay-as-per-use model: IaaS providers provide services based on the pay-as-per-use basis. The users are required to pay for what they have used. 4. Focus on the core business: IaaS providers focus on the organization's core business rather than on IT infrastructure. 5. On-demand scalability: On-demand scalability is one of the biggest advantages of IaaS. Using IaaS, users do not worry about to upgrade software and troubleshoot the issues related to hardware components. 1. Security: Security is one of the biggest issues in IaaS. Most of the IaaS providers are not able to provide 100% security. 2. Maintenance & Upgrade: Although TaaS service providers maintain the software, but they do not upgrade the software for some organizations. 3. Interoperability issues: It is difficult to migrate VM from one IaaS provider to the other, so the customers might face problem related to vendor lock-i * SaaS is also known as "On-Demand Software". It is a software distribution model in which services are hosted by a cloud service provider. * These services are available to end-users over the internet so, the end-users do not need to install any software on their devices to access these services. There are the following services provided by SaaS providers - Business Services - SaaS Provider provides various business services to start-up the business. The SaaS business services include ERP (Enterprise Resource Planning), CRM (Customer Relationship Management), billing, and sales. Document Management - SaaS document management is a software application offered by a third party (SaaS providers) to create, manage, and track electronic documents. Example: Slack, Samepage, Box, and Zoho Forms. Social Networks - As we all know, social networking sites are used by the general public, so social networking service providers use SaaS for their convenience and handle the general public's information. Mail Services - To handle the unpredictable number of users and load on e-mail services, many e-mail providers offering their services using SaaS. _[G@} Motiies Database PCs OT Jeet Codes © Platform as a Service (PaaS) provides a runtime environment. It allows programmers to easily create, test, run, and deploy web applications. You can purchase these applications from a cloud service provider on a pay-as-per use basis and access them using the Internet connection. In PaaS, back end scalability is managed by the cloud service provider, so end- users do not need to worry about managing the infrastructure. © PaaS includes infrastructure (servers, storage, and networking) and platform (middleware, development tools, database management systems, business intelligence, and more) to support the web application life cycle. Example: Google App Engine, Force.com, Joyent, Azure. PaaS providers provide the Programming languages, Application frameworks, Databases, and Other tools: 1. Programming languages: PaaS providers provide various programming languages for the developers to develop the applications. Some popular programming languages provided by PaaS providers are Java, PHP, Ruby, Perl, and Go. 2. Application frameworks: PaaS providers provide application frameworks to casily understand the application development. Some popular application frameworks provided by PaaS providers are Node.js, Drupal, Joomla, WordPress, Spring, Play, Rack, and Zend. 3. Databases: PaaS providers provide various databases such as ClearDB, PostgreSQL, MongoDB, and Redis to communicate with the applications 4, Other tools: PaaS providers provide various other tools that are required to develop, test, and deploy the applications. Scripting 4 / Platform asa Service | ‘Security ‘Software © Identity-as-a-Service (IDaaS) refers to the identity and access management (IAM) services provided by the cloud service provider on a subscription basis. © This store information as a digital entity and is used for electronic transactions. Some of the significant core functions of IDaa$ are: 1. Data Stores 2. Policy Engine 3. Query Engine © IDaa$ is a category in which user identity is hosted on the cloud, which helps to ensure that authorized users can only get access and block cyber criminals and unauthorized access to sensitive data, What is Identity? * An identity is a characteristic and attributes that makes something recognized uniquely. Objects may have the same attributes, but their unique identities are different. This unique identity is assigned with the help of unique identification. Authentication Server 1. Single sign-on (SSO): Single sign-on (SSO) allows users to log in once at the network parameter and access all the SaaS applications. SSO provides a single authentication server and manages access to multiple systems. The user logins to the authentication server using his username and password, and the authentication server generates the user’s ticket and sends it back to the user. After the user sends the ticket to the intranet server, the intranet server passes that ticket to the authentication server. The authentication server returns the user's security credentials to the intranet server. Intranet Server 3. Ticket 4. Ticket 1. Usemame and password 6. Security Credentials 2 Ticket Authentication Server 2. Multi-factor authentication (MFA): Multi-factor authentication (MFA) uses multiple authentication methods to verify the user's identity. For example, users may be asked to enter the USB device into their system to log in, along with a password. MFA provides more security than the classic username and password method. 3. Identity Management: Identity providers (IdP) create, store, manage and maintain the digital identity information, which is used to provide authentication access to the application within a distributed network or federation. 1. Reduce : Provides multiple security methods of accessing the application. 2. Cost Effective: IDaaS is cost-effective and quickly set up by the service provider. It makes things less complicated and frees the IT staff from core business initiatives. 3. Improve User Experience: It helps users from password fatigue and allows users to access the application consistently help of a single set of credentials. 4. Easily Setup: [Daas is easy to set up and configure at a lower price © Compliance as a Service (CaaS) is a cloud service, service level agreement (SLA) that specified how a managed service provider (MSP) will help an organization meet its regulatory compliance mandates. © Compliance support services in the cloud are often used by large organizations that operate in highly-regulated industries such as healthcare, banking and finance. The goal of Compliance as a Service is to reduce an organization’s compliance burden by outsourcing compliance management tasks to a third-party that has the resources required to meet regulatory requirements in a more cost-effective manner. * CaaS providers typically supply their customers with access to software and support materials that have been designed to be compliant with specific regulations. This is because compliance concerns manifest themselves in different ways, depending on the organization's line of business and location. For example: In healthcare, the Health Insurance Portability and Accountability Act (HIPAA) requires network administrators to create logical boundaries between protected and unprotected workflows. In finance, the Sarbanes-Oxley Act (SOX) requires specific encryption levels for different data types. In retail, PCI-DSS requires people and programming to have a business justification for accessing cardholder data. + In Europe, the EU Data Protection Act requires European customer data to be stored on servers located in Europe. Broad On-Demand (eee) Essential Characteristics Resource Pooling Senco) Deco) Tiesutie em 8 Service Models Service (SaaS) Service (PaaS) ante Ey > ‘rubtio.. ) wen P vivo) Ln ae Compliance MSPs are responsible for maintaining and updating their cloud services over time. If there are changes to financial regulations, the provider will be responsible for adjusting services accordingly, as per the customer's SLA. This help alone means that Compliance as a Service can save a large enterprise millions of dollars over the years by reducing administrative overhead. Compliance as a service is not without its downsides because ultimately, cloud service users share risk with the provider. When a company fails to meet compliance standards, there can be severe legal and financial penalties. In the event of a financial penalty being levied because of something the cloud provider has done (or failed to do), the cloud customer will be fined (not the cloud provider). Ifa company decides to use Compliance as a Service, it must perform due diligence to find the right service, While many CaaS providers offer compliance services for major regulations,. UNIT -3 CLOUD INFRASTRUCTURE AND VISUALIZATION * Hardware in cloud computing refers to the physical components of the cloud infrastructure, including servers, storage devices, and network equipment that are used to deliver cloud services. * Infrastructure in cloud computing refers to the combination of hardware, virtualization technology, and software that forms the backbone of cloud services. * It provides the foundation for delivering and managing cloud-based services, such as storage, computing, and networking resources, over the internet. © This infrastructure is managed and maintained by the cloud service provider, allowing customers to access and use cloud resources on-demand, without having to invest in and maintain their own physical infrastructure. Clients in cloud virtualization refer to the end-user devices or systems that connect to and access cloud-based resources and services, Security in cloud virtualization refers to the measures taken to protect cloud-based data, systems, and networks from unauthorized access, theft, and other security threats. The network in cloud virtualization refers to the communication infrastructure that enables different components of the cloud environment to communicate and exchange data with each & = Services in cloud virtualization refer to the various applications and services that are hosted and delivered over the internet, on a subscription or pay-per-use basis, to users and organizations. In general, hardware and infrastructure in cloud virtualization refers to the physical components, such as servers, storage, and networking equipment, that support the delivery of cloud-based services. These hardware and infrastructure components are abstracted and virtualized to create a highly scalable and flexible environment for hosting cloud-based services, Cloud Infrastructure Infrastructure components necessary to cloud services NiTader-liPz-lale)a) Virtualization technology is used for the following purposes: 1. Server consolidation: Virtualization technology enables multiple virtual servers to run on a single physical server, which helps to reduce the number of physical servers required and improve resource utilization. XN Improved scalability: Virtualization enables the creation of virtual resources, such as virtual machines and storage, that can be easily added or removed as needed to accommodate changing demands. we . Disaster recovery and business continuit Virtualization technology enables the creation of virtual replicas of physical systems, which can be used for disaster recovery and business continuity purposes. 4. Improved security: Virtualization technology provides isolation between virtual systems, which helps to prevent the spread of malware and other security threats. 5, Development and testing: Virtualization technology enables developers and testers to create virtual environments for testing and development purposes, which can be easily reset and reused as needed. 6. Cloud computin; Virtualization technology is the foundation for many cloud computing platforms, which cnable organizations and individuals to access computing resources and services over the internet. Improved scalability Server consolidation Disaster recovery and business continuity Virtualization technology Cloud computing Improved security Development and testing Load balancing and virtualization are two important concepts in cloud computing. Load balancing: © Load balancing is a technique used to distribute workloads evenly across multiple resources, such as servers or network links, in order to improve performance, reliability, and availability. * In cloud computing, load balancing is used to distribute incoming traffic to multiple virtual machines or containers, ensuring that no single resource is overburdened and that all resources are used effectively. Virtualization: Virtualization is the abstraction of physical resources, such as servers, storage, and networking, into multiple virtual instances that can run on a single physical server. In cloud computing, virtualization is used to create a highly scalable and flexible environment for hosting cloud-based services. By using virtualization, cloud providers can quickly and easily allocate resources to meet changing demands, while also providing users with the ability to access a wide range of computing resources and services on-demand. Load balancing and virtualization work together in cloud computing to improve the performance, reliability, and scalability of cloud-based services. Load balancing helps to ensure that resources are used effectively, while virtualization enables the creation of virtual resources that can be easily added or removed as needed to accommodate changing demands. Resource Distribu 1. Virtualization and Cloud Computing technology ensure end-users develop a unique computing environment. It is achieved through the creation of one host machine. Through this host machine, the end-user can restrict the number of active users. Resource Allotment 1. The resource allotment is made simple with virtualization technology, the process is as simple as clicking a few buttons. 2. Users can get their whole infrastructure ready within hours, and they can customize it later without any hassle. Resource Isolation 1, Resource isolation is one of the important characteristics of virtualization in the cloud. 2. This enables applications to run in an environment that is completely dedicated to them, Load Balancing 1. The load balancer as the name suggest handles the request load of a server. 2. The virtualization platforms make sure that the incoming requests are distributed to the appropriate servers Portability 1. The virtualization resources are portable, meaning they can be copied and moved from ‘one system to another, and the same functionality can be expected. 2. This allows the users to create and reuse the configuration instead of repeating it. Accessibility of server resources: 1. Virtualization delivers several unique features that ensure no need for physical servers. 2. Such features ensure a boost to uptime, and there is less fault tolerance and availability of resources. Reduced Cost 1. Virtualization in the cloud provides an easy-to-use platform, which enables the users to get resources with few clicks 2. And Users have to pay for what they use. Security 1. Security has been the one of the most beneficial thing happened after adopting virtualization. 2. The security measures include Firewall to defend against cyber and virus threats, End- to-End encryption, Data Backups, and more. Easy Setup 1, Virtualization in cloud makes sure that the platform is easy to use for the users who are setting up their infrastructure. 2. In addition to that cloud providers make sure to provide an easy solution to migrate resources from one service to another. Flexible Data Transfer 1. The data can be transferred to virtual servers anytime and also be retrieved due to this users or cloud providers need not to waste time in finding out hard drives to discover data. 2. With the implementation of virtualization, it has become easy to allocate the required data and transfer them to the appropriate authorities. Remove System Failure Risk 1. While performing any function, it often happens that the system might malfunction in critical timing. 2. This system failure can be protected with virtualization © Data Privacy Issue 1. Along with all the benefits of the cloud and virtualization, one of the important disadvantages is privacy 2. Because even though virtualization in the cloud would help users to create any number of virtual resources e Learning Curve 1. Mastering virtualization technology in cloud has a bit difficult learning curve and can take some time and experience. 1) Hardware Virtualisation © When the virtual machine software or virtual machine manager (VMM) is directly installed on the hardware system is known as hardware virtualization. * The main job of hypervisor is to control and monitoring the processor, memory and other hardware resources. © After virtualization of hardware system, we can install different operating system on it and run different applications on those OS. 2) Application Virtualisation * This can be defined as the type of Virtualization that enables the end-user of an application to have remote acces © This is achieved through a server. * This is achieved through a server. © The server is accessible through the internet, and it runs on a local workstation. © With Application virtualization, an end-user can run two different versions of the same software or the same application. 3) Network Virtualisation «This kind of virtualization can execute many virtual networks, and each has a separate control and data plan. © It co-occurs on the top of a physical network, and it can be run by parties who are not aware of one another. © Network virtualization creates virtual networks, and it also maintains a provision of virtual networks. © Through network virtualization, logical switches, firewalls, routers, load balancers, and workload security management systems can be created. 4) Operating System Virtualisation © When the virtual machine software or virtual machine manager (VMM) is installed on the Host operating system instead of directly on the hardware system is known as operating system virtualization. 5) Desktop Visualisation © This can be defined as the type of Virtualization that enables the operating system of end-users to be remotely stored on a server or data center. * It enables the users to access their desktops remotely and do so by sitting in any geographical location. They can also use different machines to virtually access their desktops. © With desktop virtualization, an end-user can work on more than one operating systems basis the business need of that individual. * If the individual wants to work on an operating system other than the Window Operating System, he can use desktop virtualization, 6) Storage Virtualisation This type of Virtualization provides virtual storage systems that facilitate storage management. © It facilitates the management of storage effectively and through multiple sources. * Storage virtualizations ensure consistent performance and smooth performance. * Italso offers continuous updates and patches on advanced functions. * Italso helps cope with the changes that come up in the underlying storage equipment. 7) Server Virtualisation ¢ This kind of Virtualization ensures masking of servers The main or the intended server is divided into many virtual servers Such servers keep changing their identity numbers and processors to facilitate the masking process. This ensures that each server can run its own operating systems in complete isolation. Virtualization Storage Virtualization . Load balancing is the method that allows you to have a proper balance of the amount of work being done on different pieces of device or hardware equipment. “Cloud load balancing is defined as the method of splitting workloads and computing properties in a cloud computing.” It enables enterprise to manage workload demands or application demands by distributing resources among numerous(aumber of) computers, networks or servers. Typically, what happens is that the load of the devices is balanced between different servers or between the CPU and hard drives in a single cloud server. Load balancing was introduced for various reasons. One of them is to improve the speed and performance of each single device, and the other is to protect individual devices from hitting their limits by reducing their performance. Traffic on the Internet is growing rapidly, accounting for almost 100% of the current traffic annually. * Therefore, the workload on the servers is increasing so rapidly, leading to overloading of the servers. WEE SERVERS GROUP L blog Load Balancer WEE SERVERS GROUP 1 WEE SERVERS GROUPS, > SS — Forums, There are two primary solutions to overcome the problem of overloading on the server 1, First is a single-server solution in which the server is upgraded to a higher-performance server. However, the new server may also be overloaded soon, demanding another upgrade. Moreover, the upgrading process is arduous and expensive. 2. The second is a multiple-server solution in which a scalable service system on a cluster of servers is built, That's why it is more cost-effective and more scalable to build a server cluster system for network services. Load balancing solutions can be categorized into two types — 1, Software-based load balancers: Software-based load balancers run on standard hardware (desktop, PCs) and standard operating systems. 2. Hardware-based load balancer: Hardware-based load balancers are dedicated boxes which include Application Specific Integrated Circuits (ASICs) adapted for a particular use. * Direct Routing Request Despatch Technique: This method of request dispatch is similar to that implemented in IBM's NetDispatcher. A real server and load balancer share a virtual IP address. * Dispatcher-Based Load Balancing Cluster: A dispatcher performs smart load balancing using server availability, workload, capacity and other user-defined parameters to regulate where TCP/IP requests are sent. Linux Virtual Load Balancer: This is an open-source enhanced load balancing solution used to build highly scalable and highly available network services such as HTTP, POP3, FTP, SMTP, media and caching, and Voice over Internet Protocol (VoIP) is done. It is a simple and powerful product designed for load balancing and fail-over. 1) STATIC ALGORITHM * Static algorithms are built for systems with very little variation in load. «© The entire traffic is divided equally between the servers in the static algorithm. «This algorithm requires in-depth knowledge of server resources for better performance of the processor, which is determined at the beginning of the implementation. * However, the decision of load shifting does not depend on the current state of the system © One of the major drawbacks of static load balancing algorithm is that load balancing tasks work only afer they have been created. 2) DYNAMIC ALGORITHM © The dynamic algorithm first finds the lightest server in the entire network and gives it priority for load balancing. * This requires real-time communication with the network which can help increase the system's traffic * Here, the current state of the system is used to control the load. * The characteristic of dynamic algorithms is to make load transfer decisions in the current system state. 3). ROUND ROBIN ALGORITHM * As the name suggests, round robin load balancing algorithm uses round-robin method to assign jobs . First, it randomly selects the first node and assigns tasks to other nodes in a round-robin manner. « This * Processors assign each process circularly without defining any priority 4) WEIGHTED ROUND ROBIN ALGORITHM ne of the easiest methods of load balancing. * Weighted Round Robin Load Balancing Algorithms have been developed to enhance the most challenging issues of Round Robin Algorithms. «In this algorithm, there are a specified set of weights and functions, which are distributed according to the weight values. © Processors that have a higher capacity are given a higher value. Therefore, the highest loaded servers will get more tasks. © Processors that have a higher capacity are given a higher value. Therefore, the highest loaded servers will get more tasks. 5) OPPORTUNISTIC LOAD BALANCING ALGORITHM * The opportunistic load balancing algorithm allows each node to be busy. « It never considers the current workload of each system. « Regardless of the current workload on each node, OLB distributes all unfinished tasks to these nodes. Load balancing al gorithms Dynamic load balancing algorithm [9] Static load balancing algorithm [8] oe NY Ant i OLB || Moai \in-nia|) 8 Hog be 30) 46 colony |} foraging BH] [39] [6] [18] 9 i Throttled | Carton algorithm || algorithm [64] (62) * A hypervisor, also known as a virtual machine monitor or VMM. The hypervisor is a piece of software that allows us to build and run virtual machines which are abbreviated as VMs. * Ahypervisor allows a single host computer to support multiple virtual machines (VMs) by sharing resources including memory and processing. + Hypervisors allow the use of more of a system's available resources and provide greater IT versatility because the guest VMs are independent of the host hardware which is one of the major benefits of the Hypervisor. + In other words, this implies that they can be quickly switched between servers. Since a hypervisor with the help of its special feature, it allows several virtual machines to operate on a single physical server. So, it helps us to reduce: o The Energy uses o The Maintenance requirements of the server. a “x Hardware Hypervisor a Sy Oe + There are two types of hypervisors: "Type 1" (also known as "bare metal") and "Type 2" (also known as "hosted") + A type I hypervisor functions as a light operating system that operates directly on the host's hardware, while a type 2 hypervisor functions as a software layer on top of an operating system, similar to other computer programs. + Since they are isolated from the attack-prone operating system, bare-metal hypervisors are extremely stable. + Furthermore, they are usually faster and more powerful than hosted hypervisors.. + For these purposes, the majority of enterprise businesses opt for bare-metal hypervisors for their data center computing requirements. + While hosted hypervisors run inside the OS, they can be topped with additional (and different) operating systems. + The hosted hypervisors have longer latency than bare-metal hypervisors which is a very major disadvantage of the it + This is due to the fact that contact between the hardware and the hypervisor must go through the OS's extra layer. + The native or bare metal hypervisor, the Type 1 hypervisor is known by both names. + Itreplaces the host operating system, and the hypervisor schedules VM services directly to the hardware. + The type | hypervisor is very much commonly used in the enterprise data center or other server-based environments. + It includes KVM, Microsoft Hyper-V, and VMware vSphere. If we are running the updated version of the hypervisor then we must have already got the KVM integrated into the Linux kernel in 2007. + It is also known as a hosted hypervisor, The type 2 hypervisor is a software layer or framework that runs on a traditional operating system. + It operates by separating the guest and host operating systems. The host operating system schedules VM services, which are then executed on the hardware. + Individual users who wish to operate multiple operating systems on a personal computer should use a form 2 hypervisor. + This type of hypervisor also includes the virtual machines with it. + Hardware acceleration technology improves the processing speed of both bare-metal and hosted hypervisors, allowing them to build and handle virtual resources more quickly. + Ona single physical computer, all types of hypervisors will operate multiple virtual servers for multiple tenants. Different businesses rent data space on various virtual servers from public cloud service providers, One server can host multiple virtual servers, each of which is running different workloads for different businesses. app || app | | APP APP || App | | APP Hypervisor Hypervisor Operating System Hardware Hardware Typel Hypervisor Type2 Hypervisor What is a cloud hypervisor? Hypervisors are a key component of the technology that enables cloud computing since they are a software layer that allows one host device to support several virtual machines at the same time. Hypervisors allow IT to retain control over a cloud environment's infrastructure, processes, and sensitive data while making cloud-based applications accessible to users in a virtual environment. Increased emphasis on creative applications is being driven by digital transformation and increasing consumer expectations. As a result, many businesses are transferring their virtual computers to the cloud. Having to rewrite any existing application for the cloud, on the other hand, will eat up valuable IT resources and create infrastructure silos. ‘A hypervisor also helps in the rapid migration of applications to the cloud as being a part of a virtualization platform. As a result, businesses will take advantage of the cloud's many advantages, such as lower hardware costs, improved accessibility, and increased scalability, for a quicker return on investment. Using a hypervisor to host several virtual machines has many advantages: + Speed: The hypervisors allow virtual machines to be built instantly unlike bare-metal servers. This makes provisioning resources for complex workloads much simpler. + Efficiency: Hypervisors that run multiple virtual machines on the resources of a single physical machine often allow for more effective use of a single physical server. + Flexi the program no longer relies on particular hardware devices or drivers, bare-metal : Since the hypervisor distinguishes the OS from the underlying hardware, hypervisors enable operating systems and their related applications to operate on a variety of hardware types. + Portability: Multiple operating systems can run on the same physical server thanks to hypervisors (host machine). The hypervisor's virtual machines are portable because they are separate from the physical computer. As an application requires more computing power, virtualization software allows it to access additional machines without interruption. Containers and hypervisors also help systems run faster and more efficiently. But they both do these things in very different manner that is why are different form each other. The Hyperviso! © Using virtual machines, an operating system can operate independently from the underlying hardware. o Make virtual computing, storage, and memory services available to all. Containers: © There is no specific need of the O.S for the program to run, the container makes it sure. o They only need a container engine to run on any platform or on any operating system. Are incredibly versatile since an application has everything it requires to operate within a container, Containers and hypervisors have various functions. Containers, unlike virtual machines, contain only an app and its associated services. Since they are lighter and more compact than virtual machines, they are often used for rapid and versatile application creation and movement. A virtual machine (VM) creates a separate world from the rest of the device, so whatever runs inside it won't mess with everything else on the host hardware. Since virtual machines are isolated, even though one is compromised, the rest of the system should be unaffected. However, if the hypervisor is compromised, it may trigger issues with all of the VMs that it handles, putting the data in each one at risk. Depending on the type of hypervisor, security protocols and specifications can differ. + Incloud computing, portability refers to the ability of an application to run cons across different cloud environments or on-premise. + Some common applications that are frequently ported to cloud environments include: tently Web applications: including content management systems, e-commerce platforms, and customer relationship management (CRM) systems Enterprise applications: such as human resources management systems (HRMS), enterprise resource planning (ERP) systems, and supply chain management (SCM) systems. Database applications: including relational databases, NoSQL databases, and cloud- native databases. Big data and analytics applications: including data warehousing, business intelligence, and data analytics tools. Artificial intelligence and machine learning applications: including image recognition, natural language processing (NLP), and predictive analytics. Porting applications to the cloud can help organizations increase scalability, reliability, and accessibility while reducing costs. When porting an application to the cloud, it's important to consider the architecture and design of the application, as well as the cloud provider's security and compliance requirements. Porting an application to the cloud involves migrating the application and its associated data, testing the application in the new environment, and making any necessary adjustments, There are several approaches to porting an application to the cloud, including lift-and- shift, refactoring, and re-architecting. The approach that is best for a given application will depend on factors such as the application's current architecture and the desired outcome. Porting an application to the cloud can also provide an opportunity to modernize and enhance the application, adding new features and capabilities that can improve the user experience and increase business value. When porting an application to the cloud, it's important to consider the security of the application and the data it handles, as well as the compliance requirements of the organization and its customers. Cloud providers typically offer a range of security and compliance services, but it's important to understand how these services work and to ensure that they meet the organization's specific needs. Porting an application to the cloud can be a complex and time-consuming process, but it can provide many benefits to organizations, including increased agility, improved reliability, and reduced costs. ® Cloud Provider 2 imran Cloud Provider 1 Portability (Migration) Cloud capacity refers to the ability of a cloud computing system to handle the workload demand and provide reliable and secure computing resources, such as computing power, storage, and network bandwidth. Baseline in cloud capacity planning refers to the minimum acceptable performance and resource utilization level that must be maintained to meet the needs of the applications and services running in the cloud. Metrics are the measurement tools used to monitor and evaluate the performance and resource utilization of the cloud against the established baseline. Cloud capacity is the measure of a cloud computing system's ability to handle the workload demand and provide computing resources, such as processing power, storage, and network bandwidth. It is crucial for ensuring the reliability, performance, and security of cloud-based applications and services. Baseline in cloud capacity planning refers to a set of minimum standards for performance and resource utilization that must be met in order to ensure the proper functioning of the cloud system. This baseline is established based on factors such as the expected workload demand, the required resources, and the desired level of performance and reliability. Metrics, on the other hand, are the tools used to monitor and evaluate the cloud system's performance and resource utilization against the established baseline. Some specific metrics that are commonly used in cloud capacity planning include: CPU utilization: measures the percentage of processing power being used by the cloud system. Memory utilization: measures the percentage of memory resources being used. Network bandwidth utilization: measures the amount of data being transmitted over the network in a given time period. Storage utilization: measures the amount of storage space being used. Latency: measures the time taken for a request to be processed and a response to be received. Availability: measures the percentage of time that the cloud system is available and accessible to users. These metrics provide valuable insights into the current and future capacity needs of the cloud system, helping organizations to make informed decisions about resource allocation and capacity planning. Managed Seli-service Operations Provisioning Fastc Resource Managomont ‘Capacity Third-party ‘utoration monet viiity cmneee Virtualised Pricing Resouress UNIT — 4 EXPLORING CLOUD SERVICES * SaaS is also known as "On-Demand Software". It is a software distribution model in which services are hosted by a cloud service provider. ‘These services are available to end-users over the internet so, the end-users do not need to install any software on their devices to access these services. There are the following services provided by SaaS providers - Business Services - SaaS Provider provides various business services to start-up the business. The SaaS business services include ERP (Enterprise Resource Planning), CRM (Customer Relationship Management), billing, and sales. Document Management - SaaS document management is a software application offered by a third party (SaaS providers) to create, manage, and track electronic documents. Example: Slack, Samepage, Box, and Zoho Forms. Social Networks - As we all know, social networking sites are used by the general public, so social networking service providers use SaaS for their convenience and handle the general public's information Mail Servi - To handle the unpredictable number of users and load on e-mail services, many e-mail providers offering their services using SaaS. App Server Database : 1) SaaS is easy to buy: SaaS pricing is based on a monthly fee or annual fee subscription, so it allows organizations to access business functionality at a low cost, which is less than licensed applications. Unlike traditional software, which is sold as a licensed based with an up-front cost (and often an optional ongoing support fee), SaaS providers are generally pricing the applications using a subscription fee, most commonly a monthly or annually fee. 2. One to Many: SaaS services are offered as a one-to-many model means a single instance of the application is shared by multiple users. 3. Less hardware required for SaaS: The software is hosted remotely, so organizations do not need to invest in additional hardware. 4, Low maintenance required for SaaS: Software as a service removes the need for installation, set-up, and daily maintenance for the organizations. The initial set-up cost for SaaS is typically less than the enterprise software. SaaS vendors are pricing their applications based on some usage parameters, such as a number of users using the application. So SaaS does easy to monitor and automatic updates. 5. Multidevice support: SaaS services can be accessed from any device such as desktops, laptops, tablets, phones, and thin clients. 6. API Integr: standard APIs. 1) Security: data is stored in the cloud, so security may be an issue for some users. However, cloud computing is not more secure than in-house deployment. ion: SaaS services easily integrate with other software or services through 2) Latency issue: Since data and applications are stored in the cloud at a variable distance from the end-user, there is a possibility that there may be greater latency when interacting with the application compared to local deployment. Therefore, the SaaS model is not suitable for applications whose demand response time is in milliseconds. 3) Total Dependency on Internet: Without an internet connection, most SaaS applications are not usable, 4) Switching between SaaS vendors is difficult: Switching SaaS vendors involves the difficult and slow task of transferring the very large data files over the internet and then converting and importing them into another SaaS also. Virtualization has been a hot topic for the past few years. Some of the advantages that virtualization can offer the enterprises include: + Enhanced System Security: Virtualization has the ability to trace requests and route hackers to other locations, if a request scems unsuitable. It thus provides enhanced security by keeping business information safe from potential harm + Better System Reliability: In virtualization, the /O resources can be isolated providing better security and reliability. + Disaster Recovery: Virtualization provides a better, faster and more secure disaster recovery to enterprises, by transferring information to another server in the same instance that the original server might be crashing, thus preventing information loss. + Space, Server Consolidation and Scalability: Virtualization accommodates the ever changing requirements of an enterprise with regard to its workload and space. The physical space as well as server usage can be consolidated in a virtual machine, thus saving energy usage, operating costs and server expenses. + Endless Memory and Accessibility: Enterprise business can take advantage of the limitless memory to store vital information in an accessible and secure place. Like SaaS, virtualization is accessible from any location and device having an Intemet connection. We are moving slowly but steadily to a world where computing resources and applications will be virtual, from Testing as a Services (TaaS) to Software as a Service (SaaS), organizations will be formed around virtual network access. Both virtualization and SaaS are interconnected in a way that after your data and server is virtualized, it is integrated to a cloud service, Together with virtualization, SaaS definitely proves to be a powerful combination for enterprises. Examples of SaaS Popular examples of SaaS include: Google Workspace (formerly GSuite) Dropbox Salesforce Cisco WebEx SAP Concur GoToMeeting © Platform as a Service (PaaS) provides a runtime environment. It allows programmers to easily create, test, run, and deploy web applications. You can purchase these applications from a cloud service provider on a pay-as-per use basis and access them using the Internet connection. In PaaS, back end scalability is managed by the cloud service provider, so end- users do not need to worry about managing the infrastructure. * PaaS includes infrastructure (servers, storage, and networking) and_ platform (middleware, development tools, database management systems, business intelligence, and more) to support the web application life cycle. Example: Google App Engine, Force.com, Joyent, Azure. PaaS providers provide the Programming languages, Application frameworks, Databases, and Other tools: 1, Programming languages: PaaS providers provide various programming languages for the developers to develop the applications. Some popular programming languages provided by PaaS providers are Java, PHP, Ruby, Perl, and Go. 2. Application frameworks: PaaS providers provide application frameworks to casily understand the application development. Some popular application frameworks provided by PaaS providers are Node.js, Drupal, Joomla, WordPress, Spring, Play, Rack, and Zend. 3. Databases: PaaS providers provide various databases such as ClearDB, PostgreSQL, MongoDB, and Redis to communicate with the applications 4, Other tools: PaaS providers provide various other tools that are required to develop, test, and deploy the applications. ‘Scripting © { Platform asa Service | SSeS erty, \ Network There are the following advantages of PaaS - 1) Simplified Development PaaS allows developers to focus on development and innovation without worrying about infrastructure management. 2) Lower risk No need for up-front investment in hardware and software. Developers only need a PC and an internet connection to start building applications. 3) Prebuilt business functionality Some PaaS vendors also provide already defined business functionality so that users can avoid building everything from very scratch and hence can directly start the projects only. 4) Instant community PaaS vendors frequently provide online communities where the developer can get the ideas to share experiences and seek advice from others. 5) Scalability Applications deployed can scale from one to thousands of users without any changes to the applications. 1) Vendor lock-in One has to write the applications according to the platform provided by the PaaS. vendor, so the migration of an application to another PaaS vendor would be a problem. 2) Data Privacy Corporate data, whether it can be critical or not, will be private, so if it is not located within the walls of the company, there can be a risk in terms of privacy of data. 3) Integration with the rest of the systems applications It may happen that some applications are local, and some are in the cloud. So there will be chances of increased complexity when we want to use data which in the cloud with the local data. + Collaboration among development teams + Design and development of applications + Testing and deployment of appli + Integration of web services + Database integration + Information Security PaaS framework applications: + Development framework. PaaS provides a framework that developers can build upon to develop or customize cloud-based applications. Similar to the way you create an Excel macro, PaaS lets developers create applications using built-in software components. Cloud features such as scalability, high-availability, and multi-tenant capability are included, reducing the amount of coding that developers must do. + Analytics or business intelligence. Tools provided as a service with PaaS allow organizations to analyse and mine their data, finding insights and patterns and predicting outcomes to improve forecasting, product design decisions, investment returns, and other business decisions. + Additional services. PaaS providers may offer other services that enhance applications, such as workflow, directory, security, and scheduling. + Drupal is a free and open-sou0rce Content Management System (CMS) that allows organizing, managing, and publishing your content. + Itis built on PHP-based environments. + This is carried out under GNU, i.e., General Public License, which means everyone can download and share it with others. + Drupal is used on million sites such as WhiteHouse.gov, World Economic Forum, Stanford University, Examiner.com, and many more. &. Drupal The Content Management System (CMS) is a software that stores all the data of your content (such as text, photos, music, documents, etc.) and is made available on your website. In addition, a CMS helps in editing, publishing, and modifying the content of the website. Simplified Content Management Complete: “control + Drupal CMS is more flexible if you develop a website with a content management system than any other CMS. Drupal is mighty and can be used for building large, d template and allows non-technical users to add and edit the content without any HTML or Web design knowledge. + Furthermore, Drupal CMS makes it easy to interact with other sites or technologies as Drupal can handle complex forms and workflows. + Itis available with more than 16000 modules which can be addressed with Drupal core and add-on modules. + Drupal makes it easy to create and manage your site. + Drupal translates anything in the system with built-in user interfaces + Drupal connects your website to other sites and services using feeds, search engine connection capabilities, ete. Drupal is an open-source software hence requires no licensing costs. + Drupal designs a highly flexible and creative website with adequate display quality, thus increasing visitors. + Drupal can publish your content on social media such as Twitter, Facebook, and other social mediums. + Drupal provides more customizable themes, including several base themes to design your themes for developing web applications. + Drupal manages the content on informational sites, social media sites, member sites, intranets, and web applications. @ Features of Drupal (seanyea4 uojsuayxg) S@imeo4 UO-PRY (soumeas psepuers) '32um)e94 9109 Drupal isa flexible CMS that allows handling content types, including video, text, blog, menu handling, real-time statistics, etc. Drupal provides several templates for developing web applications. There is no need to. start from scratch if you are building simple or complicated web applications. © Drupal is easy to manage or create a blog or website. It helps to organize, structure, find and reuse content. © Drupal provides some interesting themes and templates which give your website an attractive look. Drupal has over 7000 plug-ins to boost your website. Since Drupal is open-source, you can create your plug-ins. + Drupal is not a user-friendly interface. It requires advanced knowledge and few basic things about the platform to install and modify. + Drupal is a new content management system. Therefore, it is not compatible with other software. + Performance is low compared to other CMS. The website built using Drupal will generate big server loads and never open with a slow internet connection. Modules Contributed modules offer such additional or alternate features as image galleries, cus! content types and content listings, WYSIWYG editors, private messaging, third-party integration tools, integrating with BPM portals, and more. As of December 2019, the Drupal website lists more than 44,000 free modules. Some of the most commonly used contributed modules include: o Content Construction Kit (CCK): allows site administrators to create content types by extending the database schema dynamically. "Content-type" describes the kind of information. Content types include but are not limited to events, invitations, reviews, articles, and products. The CCK Fields API is in Drupal core in Drupal 7. Views: facilitates the retrieval and presentation of content to site visitors through a database abstraction system. Basic views functionality has been added to core in Drupal 8. Panels: drag and drop layout manager that allows site administrators to design their site visually. o Rules: conditionally executed actions based on recurring events. © Features: enables the capture and management of features (entities, views, fields, configuration, etc.) into custom modules. o Context: allows the definition of sections of the site where Drupal features can be conditionally activated o Media: makes photo uploading and media management easier © Services: provides an API for Drupal. © Organic Groups Mailing List + Long jump in cloud computing refers to the process of transferring data directly from one cloud service provider to another without storing it on the local system. + This allows organizations to move their workloads and applications to a different cloud provider without experiencing any downtime, thus enabling a seamless transition between service providers. + Long jump is a cost-effective and efficient way to move large amounts of data, as it reduces the time and effort required to transfer data and reduces the risk of data loss. + In cloud computing, long jump is an alternative to traditional data migration methods, such as bulk data transfer or data replication. + With long jump, data is directly transferred from the source cloud service provider to the destination provider, bypassing the local system. + This approach helps to minimize the risk of data loss and speeds up the migration process, as data does not need to be transferred to local storage and then re-uploaded to the new cloud provider. + Long jump is often used by organizations that are looking to switch cloud service providers, or when they need to move large amounts of data to a new provider in a short period of time. + This approach is also beneficial for organizations that have strict data privacy requirements, as it minimizes the amount of time that data is stored on local systems, reducing the risk of data breaches. + Long jump is an effective way to transfer data between cloud service providers and can help organizations to move their workloads and applications to a new provider with minimal disruption and reduced risk of data loss. Fe LONGJUMP Benefits of Long Jump in Cloud Computing: Speed: Long jump enables fast data migration, reducing the time and effort required to move large amounts of data between cloud service providers. Efficient: Long jump eliminates the need for local storage, reducing the amount of time and effort required to transfer data, and minimizing the risk of data loss. Data privacy: Long jump minimizes the amount of time that data is stored on local systems, reducing the risk of data breaches and ensuring the privacy of sensitive information. Cost-effective: Long jump eliminates the need for additional hardware or software to store and transfer data, making it a cost-effective solution for organizations looking to move large amounts of data between cloud service providers. Complexity: Long jump requires a high level of technical expertise and specialized software to execute, making it a complex solution that may not be suitable for organizations with limited IT resources. Compatibility: Long jump may not be compatible with all cloud service providers, requiring organizations to modify their data migration plans accordingly. Network Bandwidth: Long jump can consume a large amount of network bandwidth, impacting network performance and slowing down other applications and services that rely on the same network. Provider Dependence: Long jump may make organizations dependent on the cloud service providers involved, limiting their ability to switch providers in the future. In conclusion, while long jump offers several benefits, it also has some limitations that organizations must consider when planning their cloud data migration strategy. It's important to carefully weigh the benefits and limitations before choosing a data migration method to ensure a smooth transition between cloud service providers. Data center migration: Organizations can use long jump to move their data centres to anew cloud service provider without any downtime or loss of data. Cloud service provider switch: Long jump can be used to switch from one cloud service provider to another, allowing organizations to take advantage of new features, better pricing, or improved security. Backup and disaster recovery: Long jump can be used to transfer backup data from one cloud provider to another, providing organizations with an additional layer of protection against data loss.

You might also like