0 ratings0% found this document useful (0 votes) 126 views82 pagesCloud Computing Notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
UNIT -1
INTRODUCTION
© Cloud Computing is the delivery of computing services such as servers, storage,
databases, networking, software, analytics, intelligence, and more, over the Cloud
(Internet),
Cloud Computing provides an alternative to the on-premises datacentre. With an on-
premises datacentre, we have to manage everything, such as purchasing and installing
hardware, virtualization, installing the operating system, and any other required
applications, setting up the network, configuring the firewall, and setting up storage for
data. After doing all the set-up, we become responsible for maintaining it through its
entire lifecycle.
* But if we choose Cloud Computing, a cloud vendor is responsible for the hardware
purchase and maintenance. They also provide a wide variety of software and platform
as a service, We can take any required services on rent. The cloud computing services
will be charged based on usage
* Cloud computing refers to the delivery of computing resources- including servers,
storage, database, networking, software, analytics, and intelligence- over the internet
(“the cloud”) to offer faster innovation, flexible resources, and economies of scale.© Cloud computing services can be used by individuals or organizations to store, proce
and manage data, as well as run applications and websites
| Servers,
Laptops Application A
Desktops
y collaboration = C
‘commutation
Platform
a © =
Object Identity, Runtime, oo Database
Storage Infrasturcture
ou
= oe
Block Storage
Phones Cloud computing Tablets
+ The cloud environment provides an easily accessible online portal that makes handy for
the user to manage the compute, storage, network, and application resources.
* On-Demand Self-Service
Cloud computing allows on-demand self-services. Services include storage, networking,
analysis, etc. Users can select and use single or multiple services depending on their needs.
Users become more accountable for their intake, which improves their ability to make wise
decisions. Users can make use of resources following their needs and specifications. They are
charged at the end of the billing cycle based on how much they use the services provided by
the cloud service providers.
© Broad Network Access
The cloud is accessible to any device from any location because of widespread network
access. A cloud provider must offer its clients numerous network access options. Otherwise,
a few systems would be available for using the cloud service.
Broad network access contains configuration for secure remote access, paying special
attention to mobile cloud computing, regulating the data that broad access network providers
have collected, enforcing role-based access control, etc. As a result, cloud computing removes
obstacles and borders because it operates across numerous regions.
* Scalability or Rapid Elasticity
A system's capacity to manage an increasing volume of work by adding resources is known
as scalability. Cloud services must quickly develop to keep up with the ongoing expansion ofbusinesses. One of the most flexible aspects of cloud computing is scalability. In addition to
having the potential to increase the number of servers or infrastructure in response to demand,
it also offers a significant number of features that satisfy the needs of its clients
Scalability further improves cloud computing’s cost-effectiveness and suitability for business
use. It can be dialed back when demand is low and exponentially expanded when demand is
high. When demand declines, services revert to how they were before. It is comparable to
when a restaurant can accept more people during peak hours, but it is a cloud. This requires a
lot of planning, money, and resources, but cloud service providers handle every element.
« Resource Pooling
Resource pooling is one of the core components of cloud computing. A cloud service provider
can provide each client with different services based on their demands by employing resource
pooling to divide resources across many clients.
Resource pooling is a multi-client approach for location independence, network infrastructure
pooling, storage systems, etc. The process of real-time resource assignment does not affect
the client's experience. This is often used in wireless technologies like a radio transmission.
« Measured Service
Cloud systems automatically manage and manage resource utilization by using a metering
capability. The consumption of resources is tracked for each application and tenant; it will
give both the user and the resource supplier an account of what has been utilized. Monitoring,
regulating, and reporting resource utilization allows for transparency for the service provider
and the service user.
The metering capability is built into some level of service abstraction, which enables
transparency between the customer and the service provider. Each user must be billed
according to how much of the service they use, and the cloud provider must be able to measure
this usage.
« Security
Users of cloud computing are particularly concerned about data security. Cloud service
providers store users’ encrypted data and offer additional security features like user
authentication and protection against breaches and other threats.
User authentication entails identifying and verifying a user's authorization. Access is denied
to the user if they do not have permission. Data servers are physically protected. These servers
are usually kept in a secure, isolated location to prevent unauthorized access or disruption.
« Automation
Automation in cloud computing refers to a cloud service's ability to be installed, configured,
and maintained automatically. In other words, it is the process of maximizing technology and
minimizing the amount of manual labor necessary. However, it is not simple to automate the
cloud ecosystem. It requires the deployment of significant storage, servers, and virtual
machines. After successful deployment, these resources need to be maintained.
« Budget Friendly
Businesses can reduce their IT expenses by utilizing this aspect of the cloud. In cloud
computing, the client is responsible for paying the administration for any space they use.
There are no additional fees or hidden costs to be paid.The payment structure is crucial since it reduces expenses. Due to the extra functionality,
cloud computing choices have a wide range of pricing. The payment option is simple and
helps consumers save time when making frequent payments.
* Flexibility
Cloud computing users can access data or services with internet-enabled devices like
smartphones and laptops. You can instantly access anything you want in the cloud with just a
click, making working with data and sharing it simple.
Many businesses prefer to store their work on cloud systems because it facilitates
collaboration and saves money and resources. Its expansion is also being sped up by the
number of features analytic tools offer.
© Resilience
Resilience in cloud computing refers to a service's capacity to quickly recover from any
disruption. The speed at which a cloud’s servers, databases, and network system restart and
recover from damage or harm is a measure of its resilience.
Cloud computing offers vital services because it guarantees constant server uptime. This
enables service recovery in the event of a disruption, and the cloud service provider plans to
enhance disaster management by maintaining backup cloud nodes.
‘As we know, cloud computing technology is used by both small and large organizations
to store the information in cloud and access it from anywhere at anytime using the internet
connection. Cloud computing architecture is a combination of service-oriented
architecture and event-driven architecture. Cloud computing architecture is divided into
the following two parts —© Front end
« Back end
The below diagram shows the architecture of cloud computing -
Architecture of Cloud Computing
internet
Application
Runtime Cloud Back End
=
2
e
=
Sart
Front End
The front end is used by the client. It contains client-side interfaces and applications that are
required to access the cloud computing platforms. The front end includes web servers
(including Chrome, Firefox, intemet explorer, ctc.), thin & fat clients, tablets, and mobile
devices.
Back End
‘The back end is used by the service provider. It manages all the resources that are required to
provide cloud computing services. It includes a huge amount of data storage, security
mechanism, virtual machines, deploying models, servers, traffic control mechanisms, etc.
There are the following components of cloud computing architecture -
1, Client Infrastructure: Client Infrastructure is a Front end component. It provides GUI
(Graphical User Interface) to interact with the cloud.
2. Application : The application may be any software or platform that a client wants to access.3. Service: A Cloud Services manages that which type of service you access according to the
client’s requirement.
4. Runtime Cloud: Runtime Cloud provides the execution and runtime environment to the
virtual machines.
5. Storage: Storage is one of the most important components of cloud computing. It provides
a huge amount of storage capacity in the cloud to store and manage data.
6. Infrastructure: It provides services on the host level, application level, and network
level. Cloud infrastructure includes hardware and sofiware components such as servers,
storage, network devices, virtualization software, and other storage resources that are needed
to support the cloud computing model.
7. Management: Management is used to manage components such as application, service,
runtime cloud, storage, infrastructure, and other security issues in the backend and establish
coordination between them.
8. Security: Security is an in-built back end component of cloud computing. It implements a
security mechanism in the back end.
9. Internet: The Internet is medium through which front end and back end can interact and
communicate with each other.
FRONTEND
Cen?
‘Application
Cloud Runtime BACKEND
M
a
n
a
g
e
m
e
n
tCloud computing offers the following three type of services:
i. Software as a Service (SaaS) — It is also known as cloud application services. Mostly,
SaaS applications run directly through the web browser means we do not require to download
and install these applications. Some important example of SaaS is given below -
Example: Google Apps, Salesforce Dropbox, Slack, HubSpot, Cisco WebEx.
ii, Platform as a Service (PaaS) — It is also known as cloud platform services. It is quite
similar to SaaS, but the difference is that PaaS provides a platform for software creation, but
using SaaS, we can access software over the internet without the need of any platform,
Example: Windows Azure, Force.com, Magento Commerce Cloud, OpenShift.
Infrastructure as a Service (IaaS) — It is also known as cloud infrastructure services. It
is responsible for managing applications data, middleware, and runtime environments.
Example: Amazon Web Services (AWS) EC2, Google Compute Engine (GCE), Cisco
Metapod.
It works as your virtual computing environment with a choice of deployment model depending
on how much data you want to store and who has access to the Infrastructure.
Different Types Of Cloud Computing Deployment Models
Most cloud hubs have tens of thousands of servers and storage devices to enable fast loading.
It is often possible to choose a geographic area to put the data "closer" to users. Thus,
deployment models for cloud computing are categorized based on their location. To know
which model would best fit the requirements of your organization, let us first learn about the
various types.
* Public Cloud
The name says it all. It is accessible to the public. Public deployment models in the cloud are
perfect for organizations with growing and fluctuating demands. It also makes a great choice
for companies with low-security concerns. Thus, you pay a cloud service provider for
networking services, compute virtualization & storage available on the public internet. It is
also a great delivery model for the teams with development and testing. Its configuration and
deployment are quick and easy, making it an ideal choice for test environments.Public Cloud
COMPANY A PUBLIC USERS COMPANY B COMPANY C
) |
Pasay esa
oe NO I aS
esas)
OPTIONAL
SUBSCRIBER BASED
ere yell aoe PERIMETER
Eyes)
APPLICATION
‘SERVERS.
‘SERVERS HARDWARE ‘SERVICES
sewer" | aaene || mem | ree
STORAGE
SERVICES
Benefits of Public Cloud
Minimal Investment - As a pay-per-use service, there is no large upfront cost and is
ideal for businesses who need quick access to resources
o No Hardware Setup - The cloud service providers fully fund the entire Infrastructure
o No Infrastructure Management - This does not require an in-house team to utilize the
public cloud.
Limitations of Public Cloud
© Data Security and Privacy Concerns - Since it is accessible to all, it does not fully protect
against cyber-attacks and could lead to vulnerabilities.
o Reliability Issues - Since the same server network is open to a wide range of users, it
can lead to malfunction and outages
Service/License Limitation - While there are many resources you can exchange with
tenants, there is a usage cap.
Private Cloud
Now that you understand what the public cloud could offer you, of course, you are keen to
know what a private cloud can do. Companies that look for cost efficiency and greater control
over data & resources will find the private cloud a more suitable choice.
It means that it will be integrated with your data centre and managed by your IT team.
Alternatively, you can also choose to host it externally. The private cloud offers bigger
opportunities that help meet specific organizations’ requirements when it comes tocustomization. It’s also a wise choice for mission-critical processes that may have frequently
changing requirements.
Private Cloud
PERIMETER
DATABASE LEGACY SYSTEMS HARDWARE APPLICATIONS
OWNER'S
DATACENTER
[BLOCKED ACCESS
Benefits of Private Cloud
Data Privacy - It is ideal for storing corporate data where only authorized personnel gets
access
© Security - Segmentation of resources within the same Infrastructure can help with better
access and higher levels of security.
© Supports Legacy Systems - This model supports legacy systems that cannot access the
public cloud.
Limitations of Private Cloud
o Higher Cost - With the benefits you get, the investment will also be larger than the
public cloud. Here, you will pay for software, hardware, and resources for staff and
training.
© Fixed Scalability - The hardware you choose will accordingly help you scale in a certain
direction
o High Maintenance - Since it is managed in-house, the maintenance costs also increase.
« Community Cloud
The community cloud operates in a way that is similar to the public cloud. There's just one
difference - it allows access to only a specific set of users who share common objectives and
use cases. This type of deployment model of cloud computing is managed and hosted internally
or by a third-party vendor. However, you can also choose a combination of all three.Community Cloud
HARDWARE STORED ON, es |
PREMISES. AT A PEER COMPUTERS THAT
COMPANY, OR AT A MANAGE ACCESS
THIRD PARTY PROVIDER
VERIFIED USER ASKING TO
ACCESS SHARED:
CLOUD RESOURCES
shared are
) orGanization @ 2usres y ORGANIZATION 2¢ ae ) ORGANIZATION 3(
Benefits of Community Cloud
o Smaller Investment - A community cloud is much cheaper than the private & public
cloud and provides great performance
© Setup Benefits - The protocols and configuration of a community cloud must align with
industry standards, allowing customers to work much more efficiently.
Limitations of Community Cloud
© Shared Resources - Due to restricted bandwidth and storage capacity, community
resources often pose challenges.
© Not as Popular - Since this is a recently introduced model, it is not that popular or
available across industries,
+ Hybrid Cloud
As the name suggests, a hybrid cloud is a combination of two or more cloud architectures.
While each model in the hybrid cloud functions differently, it is all part of the same
architecture. Further, as part of this deployment of the cloud computing model, the internal or
external providers can offer resources.
Let's understand the hybrid model better. A company with critical data will prefer storing on
a private cloud, while less sensitive data can be stored on a public cloud. The hybrid cloud is
also frequently used for ‘cloud bursting’, It means, supposes an organization runs an application
on-premises, but due to heavy load, it can burst into the public cloud.Hybrid Cloud
Access Control Traditional Systems,
(Non-Cloud)
All Users
Benefits of Hybrid Cloud
© Cost-Effectiveness - The overall cost of a hybrid solution decreases since it majorly uses
the public cloud to store data.
© Security - Since data is properly segmented, the chances of data theft from attackers are
significantly reduced.
o Flexibility - With higher levels of flexibility, businesses can create custom solutions that
fit their exact requirements
Limitations of Hybrid Cloud
Complexity - It is complex setting up a hybrid cloud since it needs to integrate two or
more cloud architectures
Specific Use Case - This model makes more sense for organizations that have multiple
use cases or need to separate critical and sensitive data,
There are the following three types of cloud service models -
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)Infrastructure as a Service (IaaS)
laaS is also known as Hardware as a Service (HaaS). It is a computing infrastructure
managed over the internet. The main advantage of using IaaS is that it helps users to avoid the
cost and complexity of purchasing and managing the physical servers.
Characteristics of IaaS
There are the following characteristics of IaaS -
© Resources are available as a service
© Services are highly scalable
Dynamic and flexible
e GUI and API-based access
Automated administrative tasks
Example: DigitalOcean, Linode, Amazon Web Services (AWS), Microsoft Azure, Google
Compute Engine (GCE), Rackspace, and Cisco Metacloud.
Platform as a Service (PaaS)
PaaS cloud computing platform is created for the programmer to develop, test, run, and
manage the applications.
Characteristics of PaaS
There are the following characteristics of PaaS -
© Accessible to various users via the same development application.o Integrates with web services and databases.
o Builds on virtualization technology, so resources can easily be scaled up or down as per
the organization's need.
© Support multiple languages and frameworks.
© Provides an ability to "Auto-scale".
Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine,
Apache Stratos, Magento Commerce Cloud, and OpenShift.
Software as a Service (SaaS)
SaaS is also known as "on-demand software". It is a software in which the applications are
hosted by a cloud service provider. Users can access these applications with the help of internet
connection and web browser.
Characteristics of SaaS
There are the following characteristics of SaaS -
o Managed from a central location
o Hosted on a remote server
© Accessible over the internet
© Users are not responsible for hardware and software updates. Updates are applied
automatically.
© The services are purchased on the pay-as-per-use basis
Example: BigCommerce, Google Apps, Salesforce, Dropbox, ZenDesk, Cisco WebEx,
ZenDesk, Slack, and GoToMeeting.
Cloud service providers provide various applications in the field of art, business, data storage
and backup services, education, entertainment, management, social networking, etc.
The most widely used cloud computing applications are given below -rad
Cloud Data Storage and Backup
Computing fete
Application Encremment
WEEE ets
rere)
1. Art Applications
Cloud computing offers various art applications for quickly and easily design attractive
cards, booklets, and images. Some most commonly used cloud art applications are given
below:
2. Business Applications
Business applications are based on cloud service providers. Today, every organization requires
the cloud business application to grow their business. It also ensures that business applications
are 24*7 available to users.
3, Data Storage and Backup Applications
Cloud computing allows us to store information (data, files, images, audios, and videos) on
the cloud and access this information using an internet connection. As the cloud provider is
responsible for providing security, so they offer various backup recovery application for
retrieving the lost data.
4, Education Applications
Cloud computing in the education sector becomes very popular. It offers various online
distance learning platforms and student information portals to the students. The advantage
of using cloud in the field of education is that it offers strong virtual classroom environments,
Ease of accessibility, secure data storage, scalability, greater reach for the students, and
minimal hardware requirements for the applications.
5. Entertainment ApplicationsEntertainment industries use a multi-cloud strategy to interact with the target audience.
Cloud computing offers various entertainment applications such as online games and video
conferencing.
6. Management Applications
Cloud computing offers various cloud management tools which help admins to manage all
types of cloud activities, such as resource deployment, data integration, and disaster recovery.
‘These management tools also provide administrative control over the platforms, applications,
and infrastructure.
7. Social Applications
Social cloud applications allow a large number of users to connect with each other using social
networking applications such as Facebook, Twitter, LinkedIn, etc.
Excellent
Accessibility
1) Back-up and restore data
Once the data is stored in the cloud, it is easier to get back-up and restore that data using the
cloud.
2) Improved collaboration
Cloud applications improve collaboration by allowing groups of people to quickly and easily
share information in the cloud via shared storage.
lity
3) Excellent accessiCloud allows us to quickly and easily access store information anywhere, anytime in the whole
world, using an intemet connection. An internet cloud infrastructure increases organization
productivity and efficiency by ensuring that our data is always accessible.
4) Low maintenance cost
Cloud computing reduces both hardware and software maintenance costs for organizations.
5) Mobility
Cloud computing allows us to easily access all cloud data via mobile.
6) iServices in the pay-per-use model
Cloud computing offers Application Programming Interfaces (APIs) to the users for access
services on the cloud and pays the charges as per the usage of servic:
7) Unlimited storage capacity
Cloud offers us a huge amount of storing capacity for storing our important data such as
documents, images, audio, video, etc. in one place.
8) Data security
Data security is one of the biggest advantages of cloud computing. Cloud offers many
advanced features related to security and ensures that data is securely stored and handled.
A list of the disadvantage of cloud computing is given below -
1) Internet Connectivity
As you know, in cloud computing, every data (image, audio, video, ete.) is stored on the cloud,
and we access these data through the cloud by using the internet connection. If you do not have
good internet connectivity, you cannot access these data. However, we have no any other way
to access data from the cloud.
2) Vendor lock-in
Vendor lock-in is the biggest disadvantage of cloud computing. Organizations may face
problems when transferring their services from one vendor to another. As different vendors
provide different platforms, that can cause difficulty moving from one cloud to another.
3) Limited Control
As we know, cloud infrastructure is completely owned, managed, and monitored by the service
provider, so the cloud users have less control over the function and execution of services within
a cloud infrastructure,4) Security
Although cloud service providers implement the best security standards to store important
information. But, before adopting cloud technology, you should be aware that you will be
sending all your organization's sensitive information to a third party, ie., a cloud computing
service provider. While sending the data on the cloud, there may be a chance that your
organization's information is hacked by Hackers.
The use of a widely dispersed system strategy to accomplish a common objective is
called grid computing.
A computational grid can be conceived as a decentralized network of interrelated files
and non-interactive activities.
Grid computing differs from traditional powerful computational platforms like cluster
computing in that each unit is dedicated to a certain function or activity.
Grid computers are also more diverse and spatially scattered than cluster machines and
are not physically connected.
However, a particular grid might be allocated to a unified platform, and grids are
frequently utilized for various purposes.
General-purpose grid network application packages are frequently used to create grids.
The size of the grid might be extremely enormous.
Grids are decentralized network computing in which a "super virtual computer" is made
up of several loosely coupled devices that work together to accomplish massive
operations.
Distributed or grid computing is a sort of parallel processing that uses entire devices
(with onboard CPUs, storage, power supply, network connectivity, and so on) linked to
a network connection (private or public) via a traditional network connection,
like Ethernet, for specific applications.
This contrasts with the typical quantum computer concept, consisting of several cores
linked by an elevated universal serial bus on a local level
This technique has been used in corporate entities for these applications ranging from
drug development, market analysis, seismic activity, and backend data management in
the assistance of e-commerce and online services.
It has been implemented to computationally demanding research, numerical, and
educational difficulties via volunteer computer technology
"A limited grid can also be referred to as intra-nodes collaboration, while a bigger,
broader grid can be referred to as inter-nodes cooperatiCloud Computing
Cloud computing uses a client-server architecture to deliver computing resources such as
servers, storage, databases, and software over the cloud (Internet) with pay-as-you-go pricing.
Cloud computing becomes a very popular option for organizations by providing various
advantages, including cost-saving, increased productivity, efficiency, performance, data back-
ups, disaster recovery, and security
Cloud
Computing
Grid Computing
Grid computing is also called as “distributed computing." It links multiple computing
resources (PC's, workstations, servers, and storage elements) together and provides a
mechanism to access them.
The main advantages of grid computing are that it increases user productivity by providing
transparent access to resources, and work can be completed more quickly.Grid
Computing
Let's understand the difference between cloud computing and grid computing.
Cloud Computing
Cloud Computing follows _ client-server
computing architecture.
Scalability is high.
Cloud Computing is more flexible than grid
computing.
Cloud operates as a centralized management
system.
In cloud computing, cloud servers are owned by
infrastructure providers.
Cloud computing uses services like Iaas, PaaS,
and SaaS.
Cloud Computing is Service-oriented.
It is accessible through standard web protocols.
Grid Computing
Grid computing follows a distributed computing
architecture.
Scalability is normal.
Grid Computing is less flexible than cloud
computing.
Grid operates as a decentralized management
system.
In Grid computing, grids are owned and
managed by the organization.
Grid computing uses systems like distributed
computing, distributed information, and
distributed pervasive.
Grid Computing is Application-oriented.
It is accessible through grid middleware.UNIT -2
CLOUD ARCHITECTURE, SERVICE AND APPLICATION
* Composability
* Infrastructure
* Platforms
* Virtual Appliances
* Communication Protocols
+ Applications
Visualization/API <> Software as a Service
Security Compute Services Platform as a Service
Network | | Servers Storage ee
oo Ss 2 as a Service
“o S €@
Cloud Computing Stack
« A composable component must be:
© Modular: It is a self-contained and independent unit that is cooperative, reusable, and
replaceable.
© Stateless: A transaction is executed without regard to other transactions or requests.
© The essence of a service-oriented design is that services are constructed from a set of
modules using standard communications and service interfaces.© An example ofa set of widely used standards describes the services themselves in terms
of the Web Services Description Language (WSDL), data exchange between services
using some form of XML, and the communications between the services using the
SOAP protocol.
© Most large Infrastructure as a Service (Jaa$) providers rely on virtual machine
technology to deliver servers that can run applications.
* Virtual servers described in terms of a machine image or instance have characteristics
that often can be described in terms of real servers delivering a certain number of
microprocessor (CPU) cycles, memory access, and network bandwidth to customers.
© Virtual machines are containers that are assigned specific resources. The software that
runs in the virtual machines is what defines the utility of the cloud computing system
(tetera Ui)
and delivery
* Platform in the cloud is a software layer that is used to create higher levels of service.
o Salesforce.com's Force.com Platform
o Windows Azure Platform
© Google Apps and the Google AppEngineA virtual appliance is software that installs as middleware onto a virtual
machine.
* Virtual appliances are software installed on virtual servers—application modules that
are meant to run a particular machine instance or image type.
+ A virtual appliance is a platform instance. Therefore, virtual appliances occupy the
middle of the cloud computing stacks/w installed on Vservers
Connecting to the Cloud
« A web browser
* A proprietary application
Annicaione _ ;+——+fEmbedded]( ative }[_wen
viral [Bata [Metadata] Content }+—} + (Stractured [Unstructured]
appliance
Cloud computing communication protocols are standardized methods for exchanging data
and information between the various components of a cloud computing system. Some of the
most commonly used protocols in cloud computing include:
« HTTP (Hypertext Transfer Protocol): used for web applications and data transfer.© HTTPS (
transfer.
[P Secure): an encrypted version of HTTP, used for secure data
« XML-RPC and SOAP: used for remote procedure calls and for exchanging
structured data in web services.
« SMTP (Simple Mail Transfer Protocol): used for email communication.
© FTP (File Transfer Protocol): used for transferring files between a client and a
server.
« Remote Desktop Protocol (RDP): used for remote desktop connections.
* Telnet: used for remote access and management of network devices.
* SSH (Secure Shell): used for secure remote login and other secure network services.
© These protocols are essential for the communication and coordination of cloud
computing services, and help ensure that data is transmitted and processed efficiently
and securely.
Iaas is also known as Hardware as a Service (Haa8). It is one of the layers of the cloud
computing platform.
¢ It allows customers to outsource their IT infrastructures such as servers, networking,
processing, storage, virtual machines, and other resoure
Customers access these resources on the Internet using a pay-as-per use model.
In traditional hosting services, IT infrastructure was rented out for a specific period of
time, with pre-determined hardware configuration.
© The client paid for the configuration and time, regardless of the actual use. With the
help of the IaaS cloud computing platform layer, clients can dynamically scale the
configuration to meet changing requirements and are billed only for the services actually
used,
IaaS cloud computing platform layer eliminates the need for every organization to
maintain the IT infrastructure.
« IaaS is offered in three models: public, private, and hybrid cloud.
© The private cloud implies that the infrastructure resides at the customer-premise.
«In the case of public cloud, it is located at the cloud computing platform vendor's data
center, and the hybrid cloud is a combination of the two in which the customer selects
the best of both public cloud or private cloud.
aS provider provides the following services -
1. Compute: Computing as a Service includes virtual central processing units and virtual
main memory for the Vms that is provisioned to the end- users.
2. Storage: IaaS provider provides back-end storage for storing files.3. Network: Network as a Service (NaaS) provides networking components such as
routers, switches, and bridges for the Vms.
4. Load balancers: It provides load balancing capability at the infrastructure layer.
C4
laaS
Infrastructure as a service
@ S
—
There are the following advantages of IaaS computing layer -
1. Shared infrastructure: IaaS allows multiple users to share the same physical infrastructure.
2. Web access to the resources: Iaas allows IT users to access resources over the internet.
3. Pay-as-per-use model: IaaS providers provide services based on the pay-as-per-use basis.
The users are required to pay for what they have used.
4. Focus on the core business: IaaS providers focus on the organization's core business rather
than on IT infrastructure.
5. On-demand scalability: On-demand scalability is one of the biggest advantages of IaaS.
Using IaaS, users do not worry about to upgrade software and troubleshoot the issues related
to hardware components.
1. Security: Security is one of the biggest issues in IaaS. Most of the IaaS providers are not
able to provide 100% security.
2. Maintenance & Upgrade: Although TaaS service providers maintain the software, but they
do not upgrade the software for some organizations.3. Interoperability issues: It is difficult to migrate VM from one IaaS provider to the other,
so the customers might face problem related to vendor lock-i
* SaaS is also known as "On-Demand Software". It is a software distribution model in
which services are hosted by a cloud service provider.
* These services are available to end-users over the internet so, the end-users do not need
to install any software on their devices to access these services.
There are the following services provided by SaaS providers -
Business Services - SaaS Provider provides various business services to start-up the business.
The SaaS business services include ERP (Enterprise Resource Planning), CRM (Customer
Relationship Management), billing, and sales.
Document Management - SaaS document management is a software application offered by
a third party (SaaS providers) to create, manage, and track electronic documents.
Example: Slack, Samepage, Box, and Zoho Forms.
Social Networks - As we all know, social networking sites are used by the general public, so
social networking service providers use SaaS for their convenience and handle the general
public's information.
Mail Services - To handle the unpredictable number of users and load on e-mail services,
many e-mail providers offering their services using SaaS.
_[G@} Motiies
Database
PCs
OT
Jeet Codes© Platform as a Service (PaaS) provides a runtime environment. It allows programmers to
easily create, test, run, and deploy web applications.
You can purchase these applications from a cloud service provider on a pay-as-per use
basis and access them using the Internet connection. In PaaS, back end scalability is
managed by the cloud service provider, so end- users do not need to worry about
managing the infrastructure.
© PaaS includes infrastructure (servers, storage, and networking) and platform
(middleware, development tools, database management systems, business intelligence,
and more) to support the web application life cycle.
Example: Google App Engine, Force.com, Joyent, Azure.
PaaS providers provide the Programming languages, Application frameworks, Databases, and
Other tools:
1. Programming languages: PaaS providers provide various programming languages for the
developers to develop the applications. Some popular programming languages provided by
PaaS providers are Java, PHP, Ruby, Perl, and Go.
2. Application frameworks: PaaS providers provide application frameworks to casily
understand the application development. Some popular application frameworks provided by
PaaS providers are Node.js, Drupal, Joomla, WordPress, Spring, Play, Rack, and Zend.
3. Databases: PaaS providers provide various databases such as ClearDB, PostgreSQL,
MongoDB, and Redis to communicate with the applications
4, Other tools: PaaS providers provide various other tools that are required to develop, test,
and deploy the applications.
Scripting
4
/ Platform asa Service |
‘Security ‘Software© Identity-as-a-Service (IDaaS) refers to the identity and access management (IAM)
services provided by the cloud service provider on a subscription basis.
© This store information as a digital entity and is used for electronic transactions. Some
of the significant core functions of IDaa$ are:
1. Data Stores
2. Policy Engine
3. Query Engine
© IDaa$ is a category in which user identity is hosted on the cloud, which helps to
ensure that authorized users can only get access and block cyber criminals and
unauthorized access to sensitive data,
What is Identity?
* An identity is a characteristic and attributes that makes something recognized
uniquely. Objects may have the same attributes, but their unique identities are
different. This unique identity is assigned with the help of unique identification.
Authentication
Server1. Single sign-on (SSO): Single sign-on (SSO) allows users to log in once at the
network parameter and access all the SaaS applications. SSO provides a single
authentication server and manages access to multiple systems. The user logins to
the authentication server using his username and password, and the authentication
server generates the user’s ticket and sends it back to the user. After the user sends
the ticket to the intranet server, the intranet server passes that ticket to the
authentication server. The authentication server returns the user's security
credentials to the intranet server.
Intranet
Server
3. Ticket
4. Ticket
1. Usemame and password
6. Security
Credentials
2 Ticket
Authentication
Server
2. Multi-factor authentication (MFA): Multi-factor authentication (MFA) uses
multiple authentication methods to verify the user's identity. For example, users may
be asked to enter the USB device into their system to log in, along with a password.
MFA provides more security than the classic username and password method.
3. Identity Management: Identity providers (IdP) create, store, manage and maintain
the digital identity information, which is used to provide authentication access to the
application within a distributed network or federation.1. Reduce : Provides multiple security methods of accessing the application.
2. Cost Effective: IDaaS is cost-effective and quickly set up by the service provider.
It makes things less complicated and frees the IT staff from core business initiatives.
3. Improve User Experience: It helps users from password fatigue and allows users
to access the application consistently help of a single set of credentials.
4. Easily Setup: [Daas is easy to set up and configure at a lower price
© Compliance as a Service (CaaS) is a cloud service, service level agreement (SLA) that
specified how a managed service provider (MSP) will help an organization meet its
regulatory compliance mandates.
© Compliance support services in the cloud are often used by large organizations that
operate in highly-regulated industries such as healthcare, banking and finance. The
goal of Compliance as a Service is to reduce an organization’s compliance burden by
outsourcing compliance management tasks to a third-party that has the resources
required to meet regulatory requirements in a more cost-effective manner.
* CaaS providers typically supply their customers with access to software and support
materials that have been designed to be compliant with specific regulations. This is
because compliance concerns manifest themselves in different ways, depending on the
organization's line of business and location. For example:
In healthcare, the Health Insurance Portability and Accountability Act (HIPAA)
requires network administrators to create logical boundaries between protected and
unprotected workflows.
In finance, the Sarbanes-Oxley Act (SOX) requires specific encryption levels for
different data types.
In retail, PCI-DSS requires people and programming to have a business
justification for accessing cardholder data.
+ In Europe, the EU Data Protection Act requires European customer data to be
stored on servers located in Europe.Broad On-Demand
(eee)
Essential
Characteristics
Resource Pooling
Senco) Deco) Tiesutie em 8 Service
Models
Service (SaaS) Service (PaaS) ante Ey
> ‘rubtio.. ) wen P vivo) Ln ae
Compliance MSPs are responsible for maintaining and updating their cloud services
over time.
If there are changes to financial regulations, the provider will be responsible for
adjusting services accordingly, as per the customer's SLA.
This help alone means that Compliance as a Service can save a large enterprise
millions of dollars over the years by reducing administrative overhead.
Compliance as a service is not without its downsides because ultimately, cloud service
users share risk with the provider. When a company fails to meet compliance
standards, there can be severe legal and financial penalties.
In the event of a financial penalty being levied because of something the cloud
provider has done (or failed to do), the cloud customer will be fined (not the cloud
provider).
Ifa company decides to use Compliance as a Service, it must perform due diligence to
find the right service, While many CaaS providers offer compliance services for major
regulations,.UNIT -3
CLOUD INFRASTRUCTURE AND VISUALIZATION
* Hardware in cloud computing refers to the physical components of the cloud
infrastructure, including servers, storage devices, and network equipment that are used
to deliver cloud services.
* Infrastructure in cloud computing refers to the combination of hardware, virtualization
technology, and software that forms the backbone of cloud services.
* It provides the foundation for delivering and managing cloud-based services, such as
storage, computing, and networking resources, over the internet.
© This infrastructure is managed and maintained by the cloud service provider, allowing
customers to access and use cloud resources on-demand, without having to invest in and
maintain their own physical infrastructure.
Clients in cloud virtualization refer to the end-user devices or systems that connect to and
access cloud-based resources and services,
Security in cloud virtualization refers to the measures taken to protect cloud-based data,
systems, and networks from unauthorized access, theft, and other security threats.
The network in cloud virtualization refers to the communication infrastructure that enables
different components of the cloud environment to communicate and exchange data with each
&
=
Services in cloud virtualization refer to the various applications and services that are hosted
and delivered over the internet, on a subscription or pay-per-use basis, to users and
organizations.
In general, hardware and infrastructure in cloud virtualization refers to the physical
components, such as servers, storage, and networking equipment, that support the delivery of
cloud-based services. These hardware and infrastructure components are abstracted andvirtualized to create a highly scalable and flexible environment for hosting cloud-based
services,
Cloud Infrastructure
Infrastructure components necessary to cloud services
NiTader-liPz-lale)a)
Virtualization technology is used for the following purposes:
1. Server consolidation:
Virtualization technology enables multiple virtual servers to run on a single physical
server, which helps to reduce the number of physical servers required and improve resource
utilization.
XN
Improved scalability:
Virtualization enables the creation of virtual resources, such as virtual machines
and storage, that can be easily added or removed as needed to accommodate changing
demands.
we
. Disaster recovery and business continuit
Virtualization technology enables the creation of virtual replicas of physical
systems, which can be used for disaster recovery and business continuity purposes.
4. Improved security:
Virtualization technology provides isolation between virtual systems, which helps
to prevent the spread of malware and other security threats.5, Development and testing:
Virtualization technology enables developers and testers to create virtual
environments for testing and development purposes, which can be easily reset and
reused as needed.
6. Cloud computin;
Virtualization technology is the foundation for many cloud computing
platforms, which cnable organizations and individuals to access computing resources
and services over the internet.
Improved
scalability
Server
consolidation
Disaster recovery
and business
continuity
Virtualization
technology
Cloud
computing
Improved
security
Development
and testing
Load balancing and virtualization are two important concepts in cloud computing.
Load balancing:
© Load balancing is a technique used to distribute workloads evenly across multiple
resources, such as servers or network links, in order to improve performance,
reliability, and availability.
* In cloud computing, load balancing is used to distribute incoming traffic to multiple
virtual machines or containers, ensuring that no single resource is overburdened and
that all resources are used effectively.Virtualization:
Virtualization is the abstraction of physical resources, such as servers, storage, and
networking, into multiple virtual instances that can run on a single physical server.
In cloud computing, virtualization is used to create a highly scalable and flexible
environment for hosting cloud-based services.
By using virtualization, cloud providers can quickly and easily allocate resources to
meet changing demands, while also providing users with the ability to access a wide
range of computing resources and services on-demand.
Load balancing and virtualization work together in cloud computing to improve the
performance, reliability, and scalability of cloud-based services.
Load balancing helps to ensure that resources are used effectively, while virtualization
enables the creation of virtual resources that can be easily added or removed as needed
to accommodate changing demands.
Resource Distribu
1.
Virtualization and Cloud Computing technology ensure end-users develop a unique
computing environment.
It is achieved through the creation of one host machine.
Through this host machine, the end-user can restrict the number of active users.Resource Allotment
1. The resource allotment is made simple with virtualization technology, the process is as
simple as clicking a few buttons.
2. Users can get their whole infrastructure ready within hours, and they can customize it
later without any hassle.
Resource Isolation
1, Resource isolation is one of the important characteristics of virtualization in the cloud.
2. This enables applications to run in an environment that is completely dedicated to them,
Load Balancing
1. The load balancer as the name suggest handles the request load of a server.
2. The virtualization platforms make sure that the incoming requests are distributed to the
appropriate servers
Portability
1. The virtualization resources are portable, meaning they can be copied and moved from
‘one system to another, and the same functionality can be expected.
2. This allows the users to create and reuse the configuration instead of repeating it.
Accessibility of server resources:
1. Virtualization delivers several unique features that ensure no need for physical servers.
2. Such features ensure a boost to uptime, and there is less fault tolerance and availability
of resources.
Reduced Cost
1. Virtualization in the cloud provides an easy-to-use platform, which enables the users to
get resources with few clicks
2. And Users have to pay for what they use.
Security
1. Security has been the one of the most beneficial thing happened after adopting
virtualization.
2. The security measures include Firewall to defend against cyber and virus threats, End-
to-End encryption, Data Backups, and more.
Easy Setup1, Virtualization in cloud makes sure that the platform is easy to use for the users who are
setting up their infrastructure.
2. In addition to that cloud providers make sure to provide an easy solution to migrate
resources from one service to another.
Flexible Data Transfer
1. The data can be transferred to virtual servers anytime and also be retrieved due to this
users or cloud providers need not to waste time in finding out hard drives to discover
data.
2. With the implementation of virtualization, it has become easy to allocate the required
data and transfer them to the appropriate authorities.
Remove System Failure Risk
1. While performing any function, it often happens that the system might malfunction in
critical timing.
2. This system failure can be protected with virtualization
© Data Privacy Issue
1. Along with all the benefits of the cloud and virtualization, one of the important
disadvantages is privacy
2. Because even though virtualization in the cloud would help users to create any number
of virtual resources
e Learning Curve
1. Mastering virtualization technology in cloud has a bit difficult learning curve and can
take some time and experience.
1) Hardware Virtualisation
© When the virtual machine software or virtual machine manager (VMM) is directly
installed on the hardware system is known as hardware virtualization.
* The main job of hypervisor is to control and monitoring the processor, memory and
other hardware resources.
© After virtualization of hardware system, we can install different operating system on it
and run different applications on those OS.
2) Application Virtualisation
* This can be defined as the type of Virtualization that enables the end-user of an
application to have remote acces© This is achieved through a server.
* This is achieved through a server.
© The server is accessible through the internet, and it runs on a local workstation.
© With Application virtualization, an end-user can run two different versions of the same
software or the same application.
3) Network Virtualisation
«This kind of virtualization can execute many virtual networks, and each has a separate
control and data plan.
© It co-occurs on the top of a physical network, and it can be run by parties who are not
aware of one another.
© Network virtualization creates virtual networks, and it also maintains a provision of
virtual networks.
© Through network virtualization, logical switches, firewalls, routers, load balancers, and
workload security management systems can be created.
4) Operating System Virtualisation
© When the virtual machine software or virtual machine manager (VMM) is installed on
the Host operating system instead of directly on the hardware system is known as
operating system virtualization.
5) Desktop Visualisation
© This can be defined as the type of Virtualization that enables the operating system of
end-users to be remotely stored on a server or data center.
* It enables the users to access their desktops remotely and do so by sitting in any
geographical location.
They can also use different machines to virtually access their desktops.
© With desktop virtualization, an end-user can work on more than one operating systems
basis the business need of that individual.
* If the individual wants to work on an operating system other than the Window
Operating System, he can use desktop virtualization,
6) Storage Virtualisation
This type of Virtualization provides virtual storage systems that facilitate storage
management.
© It facilitates the management of storage effectively and through multiple sources.
* Storage virtualizations ensure consistent performance and smooth performance.
* Italso offers continuous updates and patches on advanced functions.
* Italso helps cope with the changes that come up in the underlying storage equipment.
7) Server Virtualisation
¢ This kind of Virtualization ensures masking of serversThe main or the intended server is divided into many virtual servers
Such servers keep changing their identity numbers and processors to facilitate the
masking process.
This ensures that each server can run its own operating systems in complete isolation.
Virtualization
Storage
Virtualization
.
Load balancing is the method that allows you to have a proper balance of the amount of
work being done on different pieces of device or hardware equipment.
“Cloud load balancing is defined as the method of splitting workloads and computing
properties in a cloud computing.”
It enables enterprise to manage workload demands or application demands by
distributing resources among numerous(aumber of) computers, networks or servers.
Typically, what happens is that the load of the devices is balanced between different
servers or between the CPU and hard drives in a single cloud server.
Load balancing was introduced for various reasons. One of them is to improve the speed
and performance of each single device, and the other is to protect individual devices
from hitting their limits by reducing their performance.
Traffic on the Internet is growing rapidly, accounting for almost 100% of the current
traffic annually.* Therefore, the workload on the servers is increasing so rapidly, leading to overloading
of the servers.
WEE SERVERS
GROUP L
blog
Load Balancer WEE SERVERS
GROUP
1
WEE SERVERS
GROUPS,
> SS —
Forums,
There are two primary solutions to overcome the problem of overloading on the server
1, First is a single-server solution in which the server is upgraded to a higher-performance
server. However, the new server may also be overloaded soon, demanding another
upgrade. Moreover, the upgrading process is arduous and expensive.
2. The second is a multiple-server solution in which a scalable service system on a cluster
of servers is built, That's why it is more cost-effective and more scalable to build a server
cluster system for network services.
Load balancing solutions can be categorized into two types —
1, Software-based load balancers: Software-based load balancers run on standard
hardware (desktop, PCs) and standard operating systems.
2. Hardware-based load balancer: Hardware-based load balancers are dedicated boxes
which include Application Specific Integrated Circuits (ASICs) adapted for a particular
use.
* Direct Routing Request Despatch Technique: This method of request dispatch is
similar to that implemented in IBM's NetDispatcher. A real server and load balancer
share a virtual IP address.* Dispatcher-Based Load Balancing Cluster: A dispatcher performs smart load
balancing using server availability, workload, capacity and other user-defined
parameters to regulate where TCP/IP requests are sent.
Linux Virtual Load Balancer: This is an open-source enhanced load balancing
solution used to build highly scalable and highly available network services such as
HTTP, POP3, FTP, SMTP, media and caching, and Voice over Internet Protocol (VoIP)
is done. It is a simple and powerful product designed for load balancing and fail-over.
1) STATIC ALGORITHM
* Static algorithms are built for systems with very little variation in load.
«© The entire traffic is divided equally between the servers in the static algorithm.
«This algorithm requires in-depth knowledge of server resources for better performance
of the processor, which is determined at the beginning of the implementation.
* However, the decision of load shifting does not depend on the current state of the system
© One of the major drawbacks of static load balancing algorithm is that load balancing
tasks work only afer they have been created.
2) DYNAMIC ALGORITHM
© The dynamic algorithm first finds the lightest server in the entire network and gives it
priority for load balancing.
* This requires real-time communication with the network which can help increase the
system's traffic
* Here, the current state of the system is used to control the load.
* The characteristic of dynamic algorithms is to make load transfer decisions in the
current system state.
3). ROUND ROBIN ALGORITHM
* As the name suggests, round robin load balancing algorithm uses round-robin method
to assign jobs
.
First, it randomly selects the first node and assigns tasks to other nodes in a round-robin
manner.
« This
* Processors assign each process circularly without defining any priority
4) WEIGHTED ROUND ROBIN ALGORITHM
ne of the easiest methods of load balancing.
* Weighted Round Robin Load Balancing Algorithms have been developed to enhance
the most challenging issues of Round Robin Algorithms.«In this algorithm, there are a specified set of weights and functions, which are distributed
according to the weight values.
© Processors that have a higher capacity are given a higher value. Therefore, the highest
loaded servers will get more tasks.
© Processors that have a higher capacity are given a higher value. Therefore, the highest
loaded servers will get more tasks.
5) OPPORTUNISTIC LOAD BALANCING ALGORITHM
* The opportunistic load balancing algorithm allows each node to be busy.
« It never considers the current workload of each system.
« Regardless of the current workload on each node, OLB distributes all unfinished tasks
to these nodes.
Load balancing al gorithms
Dynamic load
balancing algorithm
[9]
Static load balancing
algorithm [8]
oe NY
Ant
i OLB || Moai \in-nia|) 8 Hog be
30) 46 colony |} foraging
BH] [39] [6] [18] 9 i
Throttled | Carton
algorithm || algorithm
[64] (62)
* A hypervisor, also known as a virtual machine monitor or VMM. The hypervisor is a
piece of software that allows us to build and run virtual machines which are abbreviated
as VMs.
* Ahypervisor allows a single host computer to support multiple virtual machines (VMs)
by sharing resources including memory and processing.+ Hypervisors allow the use of more of a system's available resources and provide greater
IT versatility because the guest VMs are independent of the host hardware which is one
of the major benefits of the Hypervisor.
+ In other words, this implies that they can be quickly switched between servers. Since a
hypervisor with the help of its special feature, it allows several virtual machines to
operate on a single physical server. So, it helps us to reduce:
o The Energy uses
o The Maintenance requirements of the server.
a “x
Hardware Hypervisor
a
Sy
Oe
+ There are two types of hypervisors: "Type 1" (also known as "bare metal") and "Type
2" (also known as "hosted")
+ A type I hypervisor functions as a light operating system that operates directly on the
host's hardware, while a type 2 hypervisor functions as a software layer on top of an
operating system, similar to other computer programs.
+ Since they are isolated from the attack-prone operating system, bare-metal hypervisors
are extremely stable.
+ Furthermore, they are usually faster and more powerful than hosted hypervisors..
+ For these purposes, the majority of enterprise businesses opt for bare-metal hypervisors
for their data center computing requirements.
+ While hosted hypervisors run inside the OS, they can be topped with additional (and
different) operating systems.
+ The hosted hypervisors have longer latency than bare-metal hypervisors which is a very
major disadvantage of the it+ This is due to the fact that contact between the hardware and the hypervisor must go
through the OS's extra layer.
+ The native or bare metal hypervisor, the Type 1 hypervisor is known by both names.
+ Itreplaces the host operating system, and the hypervisor schedules VM services directly
to the hardware.
+ The type | hypervisor is very much commonly used in the enterprise data center or other
server-based environments.
+ It includes KVM, Microsoft Hyper-V, and VMware vSphere. If we are running the
updated version of the hypervisor then we must have already got the KVM integrated
into the Linux kernel in 2007.
+ It is also known as a hosted hypervisor, The type 2 hypervisor is a software layer or
framework that runs on a traditional operating system.
+ It operates by separating the guest and host operating systems. The host operating
system schedules VM services, which are then executed on the hardware.
+ Individual users who wish to operate multiple operating systems on a personal computer
should use a form 2 hypervisor.
+ This type of hypervisor also includes the virtual machines with it.
+ Hardware acceleration technology improves the processing speed of both bare-metal
and hosted hypervisors, allowing them to build and handle virtual resources more
quickly.
+ Ona single physical computer, all types of hypervisors will operate multiple virtual
servers for multiple tenants. Different businesses rent data space on various virtual
servers from public cloud service providers, One server can host multiple virtual servers,
each of which is running different workloads for different businesses.
app || app | | APP
APP || App | | APP
Hypervisor
Hypervisor Operating System
Hardware Hardware
Typel Hypervisor Type2 HypervisorWhat is a cloud hypervisor?
Hypervisors are a key component of the technology that enables cloud computing since they
are a software layer that allows one host device to support several virtual machines at the same
time.
Hypervisors allow IT to retain control over a cloud environment's infrastructure, processes,
and sensitive data while making cloud-based applications accessible to users in a virtual
environment.
Increased emphasis on creative applications is being driven by digital transformation and
increasing consumer expectations. As a result, many businesses are transferring their virtual
computers to the cloud.
Having to rewrite any existing application for the cloud, on the other hand, will eat up valuable
IT resources and create infrastructure silos.
‘A hypervisor also helps in the rapid migration of applications to the cloud as being a part of a
virtualization platform.
As a result, businesses will take advantage of the cloud's many advantages, such as lower
hardware costs, improved accessibility, and increased scalability, for a quicker return on
investment.
Using a hypervisor to host several virtual machines has many advantages:
+ Speed: The hypervisors allow virtual machines to be built instantly unlike bare-metal
servers. This makes provisioning resources for complex workloads much simpler.
+ Efficiency: Hypervisors that run multiple virtual machines on the resources of a single
physical machine often allow for more effective use of a single physical server.
+ Flexi
the program no longer relies on particular hardware devices or drivers, bare-metal
: Since the hypervisor distinguishes the OS from the underlying hardware,
hypervisors enable operating systems and their related applications to operate on a
variety of hardware types.
+ Portability: Multiple operating systems can run on the same physical server thanks to
hypervisors (host machine). The hypervisor's virtual machines are portable because they
are separate from the physical computer.
As an application requires more computing power, virtualization software allows it to access
additional machines without interruption.Containers and hypervisors also help systems run faster and more efficiently. But they both do
these things in very different manner that is why are different form each other.
The Hyperviso!
© Using virtual machines, an operating system can operate independently from the
underlying hardware.
o Make virtual computing, storage, and memory services available to all.
Containers:
© There is no specific need of the O.S for the program to run, the container makes it sure.
o They only need a container engine to run on any platform or on any operating system.
Are incredibly versatile since an application has everything it requires to operate within
a container,
Containers and hypervisors have various functions. Containers, unlike virtual machines,
contain only an app and its associated services.
Since they are lighter and more compact than virtual machines, they are often used for rapid
and versatile application creation and movement.
A virtual machine (VM) creates a separate world from the rest of the device, so whatever runs
inside it won't mess with everything else on the host hardware.
Since virtual machines are isolated, even though one is compromised, the rest of the system
should be unaffected.
However, if the hypervisor is compromised, it may trigger issues with all of the VMs that it
handles, putting the data in each one at risk.
Depending on the type of hypervisor, security protocols and specifications can differ.
+ Incloud computing, portability refers to the ability of an application to run cons
across different cloud environments or on-premise.
+ Some common applications that are frequently ported to cloud environments include:
tentlyWeb applications: including content management systems, e-commerce platforms, and
customer relationship management (CRM) systems
Enterprise applications: such as human resources management systems (HRMS),
enterprise resource planning (ERP) systems, and supply chain management (SCM)
systems.
Database applications: including relational databases, NoSQL databases, and cloud-
native databases.
Big data and analytics applications: including data warehousing, business
intelligence, and data analytics tools.
Artificial intelligence and machine learning applications: including image
recognition, natural language processing (NLP), and predictive analytics.
Porting applications to the cloud can help organizations increase scalability, reliability,
and accessibility while reducing costs.
When porting an application to the cloud, it's important to consider the architecture and
design of the application, as well as the cloud provider's security and compliance
requirements.
Porting an application to the cloud involves migrating the application and its associated
data, testing the application in the new environment, and making any necessary
adjustments,
There are several approaches to porting an application to the cloud, including lift-and-
shift, refactoring, and re-architecting. The approach that is best for a given application
will depend on factors such as the application's current architecture and the desired
outcome.
Porting an application to the cloud can also provide an opportunity to modernize and
enhance the application, adding new features and capabilities that can improve the user
experience and increase business value.
When porting an application to the cloud, it's important to consider the security of the
application and the data it handles, as well as the compliance requirements of the
organization and its customers.
Cloud providers typically offer a range of security and compliance services, but it's
important to understand how these services work and to ensure that they meet the
organization's specific needs.Porting an application to the cloud can be a complex and time-consuming process, but
it can provide many benefits to organizations, including increased agility, improved
reliability, and reduced costs.
®
Cloud Provider 2
imran
Cloud Provider 1
Portability (Migration)
Cloud capacity refers to the ability of a cloud computing system to handle the workload
demand and provide reliable and secure computing resources, such as computing power,
storage, and network bandwidth.
Baseline in cloud capacity planning refers to the minimum acceptable performance and
resource utilization level that must be maintained to meet the needs of the applications
and services running in the cloud.
Metrics are the measurement tools used to monitor and evaluate the performance and
resource utilization of the cloud against the established baseline.
Cloud capacity is the measure of a cloud computing system's ability to handle the
workload demand and provide computing resources, such as processing power, storage,
and network bandwidth. It is crucial for ensuring the reliability, performance, and
security of cloud-based applications and services.
Baseline in cloud capacity planning refers to a set of minimum standards for
performance and resource utilization that must be met in order to ensure the proper
functioning of the cloud system. This baseline is established based on factors such as
the expected workload demand, the required resources, and the desired level of
performance and reliability.Metrics, on the other hand, are the tools used to monitor and evaluate the cloud system's
performance and resource utilization against the established baseline. Some specific
metrics that are commonly used in cloud capacity planning include:
CPU utilization: measures the percentage of processing power being used by the cloud
system.
Memory utilization: measures the percentage of memory resources being used.
Network bandwidth utilization: measures the amount of data being transmitted over
the network in a given time period.
Storage utilization: measures the amount of storage space being used.
Latency: measures the time taken for a request to be processed and a response to be
received.
Availability: measures the percentage of time that the cloud system is available and
accessible to users.
These metrics provide valuable insights into the current and future capacity needs of the
cloud system, helping organizations to make informed decisions about resource
allocation and capacity planning.
Managed Seli-service
Operations Provisioning
Fastc Resource Managomont
‘Capacity Third-party ‘utoration
monet
viiity cmneee Virtualised
Pricing ResouressUNIT — 4
EXPLORING CLOUD SERVICES
* SaaS is also known as "On-Demand Software". It is a software distribution model in
which services are hosted by a cloud service provider.
‘These services are available to end-users over the internet so, the end-users do not need
to install any software on their devices to access these services.
There are the following services provided by SaaS providers -
Business Services - SaaS Provider provides various business services to start-up the business.
The SaaS business services include ERP (Enterprise Resource Planning), CRM (Customer
Relationship Management), billing, and sales.
Document Management - SaaS document management is a software application offered by
a third party (SaaS providers) to create, manage, and track electronic documents.
Example: Slack, Samepage, Box, and Zoho Forms.
Social Networks - As we all know, social networking sites are used by the general public, so
social networking service providers use SaaS for their convenience and handle the general
public's information
Mail Servi - To handle the unpredictable number of users and load on e-mail services,
many e-mail providers offering their services using SaaS.
App Server
Database
:1) SaaS is easy to buy: SaaS pricing is based on a monthly fee or annual fee subscription, so
it allows organizations to access business functionality at a low cost, which is less than licensed
applications. Unlike traditional software, which is sold as a licensed based with an up-front
cost (and often an optional ongoing support fee), SaaS providers are generally pricing the
applications using a subscription fee, most commonly a monthly or annually fee.
2. One to Many: SaaS services are offered as a one-to-many model means a single instance
of the application is shared by multiple users.
3. Less hardware required for SaaS: The software is hosted remotely, so organizations do
not need to invest in additional hardware.
4, Low maintenance required for SaaS: Software as a service removes the need for
installation, set-up, and daily maintenance for the organizations. The initial set-up cost for
SaaS is typically less than the enterprise software. SaaS vendors are pricing their applications
based on some usage parameters, such as a number of users using the application. So SaaS
does easy to monitor and automatic updates.
5. Multidevice support: SaaS services can be accessed from any device such as desktops,
laptops, tablets, phones, and thin clients.
6. API Integr:
standard APIs.
1) Security: data is stored in the cloud, so security may be an issue for some users. However,
cloud computing is not more secure than in-house deployment.
ion: SaaS services easily integrate with other software or services through
2) Latency issue: Since data and applications are stored in the cloud at a variable distance
from the end-user, there is a possibility that there may be greater latency when interacting with
the application compared to local deployment. Therefore, the SaaS model is not suitable for
applications whose demand response time is in milliseconds.
3) Total Dependency on Internet: Without an internet connection, most SaaS applications
are not usable,
4) Switching between SaaS vendors is difficult: Switching SaaS vendors involves the
difficult and slow task of transferring the very large data files over the internet and then
converting and importing them into another SaaS also.
Virtualization has been a hot topic for the past few years. Some of the advantages that
virtualization can offer the enterprises include:+ Enhanced System Security: Virtualization has the ability to trace requests and
route hackers to other locations, if a request scems unsuitable. It thus provides
enhanced security by keeping business information safe from potential harm
+ Better System Reliability: In virtualization, the /O resources can be isolated
providing better security and reliability.
+ Disaster Recovery: Virtualization provides a better, faster and more secure disaster
recovery to enterprises, by transferring information to another server in the same
instance that the original server might be crashing, thus preventing information loss.
+ Space, Server Consolidation and Scalability: Virtualization accommodates the
ever changing requirements of an enterprise with regard to its workload and space.
The physical space as well as server usage can be consolidated in a virtual machine,
thus saving energy usage, operating costs and server expenses.
+ Endless Memory and Accessibility: Enterprise business can take advantage of the
limitless memory to store vital information in an accessible and secure place. Like
SaaS, virtualization is accessible from any location and device having an Intemet
connection.
We are moving slowly but steadily to a world where computing resources and applications
will be virtual, from Testing as a Services (TaaS) to Software as a Service (SaaS),
organizations will be formed around virtual network access. Both virtualization and SaaS are
interconnected in a way that after your data and server is virtualized, it is integrated to a
cloud service, Together with virtualization, SaaS definitely proves to be a powerful
combination for enterprises.
Examples of SaaS
Popular examples of SaaS include:
Google Workspace (formerly GSuite)
Dropbox
Salesforce
Cisco WebEx
SAP Concur
GoToMeeting© Platform as a Service (PaaS) provides a runtime environment. It allows programmers to
easily create, test, run, and deploy web applications.
You can purchase these applications from a cloud service provider on a pay-as-per use
basis and access them using the Internet connection. In PaaS, back end scalability is
managed by the cloud service provider, so end- users do not need to worry about
managing the infrastructure.
* PaaS includes infrastructure (servers, storage, and networking) and_ platform
(middleware, development tools, database management systems, business intelligence,
and more) to support the web application life cycle.
Example: Google App Engine, Force.com, Joyent, Azure.
PaaS providers provide the Programming languages, Application frameworks, Databases, and
Other tools:
1, Programming languages: PaaS providers provide various programming languages for the
developers to develop the applications. Some popular programming languages provided by
PaaS providers are Java, PHP, Ruby, Perl, and Go.
2. Application frameworks: PaaS providers provide application frameworks to casily
understand the application development. Some popular application frameworks provided by
PaaS providers are Node.js, Drupal, Joomla, WordPress, Spring, Play, Rack, and Zend.
3. Databases: PaaS providers provide various databases such as ClearDB, PostgreSQL,
MongoDB, and Redis to communicate with the applications
4, Other tools: PaaS providers provide various other tools that are required to develop, test,
and deploy the applications.
‘Scripting ©
{ Platform asa Service |
SSeS erty,
\
NetworkThere are the following advantages of PaaS -
1) Simplified Development
PaaS allows developers to focus on development and innovation without worrying about
infrastructure management.
2) Lower risk
No need for up-front investment in hardware and software. Developers only need a PC and an
internet connection to start building applications.
3) Prebuilt business functionality
Some PaaS vendors also provide already defined business functionality so that users can avoid
building everything from very scratch and hence can directly start the projects only.
4) Instant community
PaaS vendors frequently provide online communities where the developer can get the ideas to
share experiences and seek advice from others.
5) Scalability
Applications deployed can scale from one to thousands of users without any changes to the
applications.
1) Vendor lock-in
One has to write the applications according to the platform provided by the PaaS. vendor, so
the migration of an application to another PaaS vendor would be a problem.
2) Data Privacy
Corporate data, whether it can be critical or not, will be private, so if it is not located within
the walls of the company, there can be a risk in terms of privacy of data.
3) Integration with the rest of the systems applications
It may happen that some applications are local, and some are in the cloud. So there will be
chances of increased complexity when we want to use data which in the cloud with the local
data.+ Collaboration among development teams
+ Design and development of applications
+ Testing and deployment of appli
+ Integration of web services
+ Database integration
+ Information Security
PaaS framework applications:
+ Development framework. PaaS provides a framework that developers can build upon
to develop or customize cloud-based applications. Similar to the way you create an
Excel macro, PaaS lets developers create applications using built-in software
components. Cloud features such as scalability, high-availability, and multi-tenant
capability are included, reducing the amount of coding that developers must do.
+ Analytics or business intelligence. Tools provided as a service with PaaS allow
organizations to analyse and mine their data, finding insights and patterns and predicting
outcomes to improve forecasting, product design decisions, investment returns, and
other business decisions.
+ Additional services. PaaS providers may offer other services that enhance applications,
such as workflow, directory, security, and scheduling.
+ Drupal is a free and open-sou0rce Content Management System (CMS) that allows
organizing, managing, and publishing your content.
+ Itis built on PHP-based environments.
+ This is carried out under GNU, i.e., General Public License, which means everyone can
download and share it with others.
+ Drupal is used on million sites such as WhiteHouse.gov, World Economic Forum,
Stanford University, Examiner.com, and many more.
&. DrupalThe Content Management System (CMS) is a software that stores all the data of your content
(such as text, photos, music, documents, etc.) and is made available on your website. In
addition, a CMS helps in editing, publishing, and modifying the content of the website.
Simplified
Content
Management
Complete:
“control
+ Drupal CMS is more flexible if you develop a website with a content management
system than any other CMS. Drupal is mighty and can be used for building large,
d template and allows non-technical users to add and edit the content
without any HTML or Web design knowledge.
+ Furthermore, Drupal CMS makes it easy to interact with other sites or technologies as
Drupal can handle complex forms and workflows.
+ Itis available with more than 16000 modules which can be addressed with Drupal core
and add-on modules.
+ Drupal makes it easy to create and manage your site.
+ Drupal translates anything in the system with built-in user interfaces
+ Drupal connects your website to other sites and services using feeds, search engine
connection capabilities, ete.Drupal is an open-source software hence requires no licensing costs.
+ Drupal designs a highly flexible and creative website with adequate display quality, thus
increasing visitors.
+ Drupal can publish your content on social media such as Twitter, Facebook, and other
social mediums.
+ Drupal provides more customizable themes, including several base themes to design
your themes for developing web applications.
+ Drupal manages the content on informational sites, social media sites, member sites,
intranets, and web applications.
@ Features of Drupal
(seanyea4 uojsuayxg)
S@imeo4 UO-PRY
(soumeas psepuers)
'32um)e94 9109
Drupal isa flexible CMS that allows handling content types, including video, text, blog,
menu handling, real-time statistics, etc.
Drupal provides several templates for developing web applications. There is no need to.
start from scratch if you are building simple or complicated web applications.
© Drupal is easy to manage or create a blog or website. It helps to organize, structure, find
and reuse content.© Drupal provides some interesting themes and templates which give your website an
attractive look.
Drupal has over 7000 plug-ins to boost your website. Since Drupal is open-source, you
can create your plug-ins.
+ Drupal is not a user-friendly interface. It requires advanced knowledge and few basic
things about the platform to install and modify.
+ Drupal is a new content management system. Therefore, it is not compatible with other
software.
+ Performance is low compared to other CMS. The website built using Drupal will
generate big server loads and never open with a slow internet connection.
Modules
Contributed modules offer such additional or alternate features as image galleries, cus!
content types and content listings, WYSIWYG editors, private messaging, third-party
integration tools, integrating with BPM portals, and more. As of December 2019, the Drupal
website lists more than 44,000 free modules.
Some of the most commonly used contributed modules include:
o Content Construction Kit (CCK): allows site administrators to create content types
by extending the database schema dynamically. "Content-type" describes the kind of
information. Content types include but are not limited to events, invitations, reviews,
articles, and products. The CCK Fields API is in Drupal core in Drupal 7.
Views: facilitates the retrieval and presentation of content to site visitors through a
database abstraction system. Basic views functionality has been added to core in Drupal
8.
Panels: drag and drop layout manager that allows site administrators to design their site
visually.
o Rules: conditionally executed actions based on recurring events.
© Features: enables the capture and management of features (entities, views, fields,
configuration, etc.) into custom modules.
o Context: allows the definition of sections of the site where Drupal features can be
conditionally activated
o Media: makes photo uploading and media management easier
© Services: provides an API for Drupal.
© Organic Groups Mailing List+ Long jump in cloud computing refers to the process of transferring data directly from
one cloud service provider to another without storing it on the local system.
+ This allows organizations to move their workloads and applications to a different cloud
provider without experiencing any downtime, thus enabling a seamless transition
between service providers.
+ Long jump is a cost-effective and efficient way to move large amounts of data, as it
reduces the time and effort required to transfer data and reduces the risk of data loss.
+ In cloud computing, long jump is an alternative to traditional data migration methods,
such as bulk data transfer or data replication.
+ With long jump, data is directly transferred from the source cloud service provider to
the destination provider, bypassing the local system.
+ This approach helps to minimize the risk of data loss and speeds up the migration
process, as data does not need to be transferred to local storage and then re-uploaded to
the new cloud provider.
+ Long jump is often used by organizations that are looking to switch cloud service
providers, or when they need to move large amounts of data to a new provider in a short
period of time.
+ This approach is also beneficial for organizations that have strict data privacy
requirements, as it minimizes the amount of time that data is stored on local systems,
reducing the risk of data breaches.
+ Long jump is an effective way to transfer data between cloud service providers and can
help organizations to move their workloads and applications to a new provider with
minimal disruption and reduced risk of data loss.
Fe
LONGJUMPBenefits of Long Jump in Cloud Computing:
Speed: Long jump enables fast data migration, reducing the time and effort required to
move large amounts of data between cloud service providers.
Efficient: Long jump eliminates the need for local storage, reducing the amount of time
and effort required to transfer data, and minimizing the risk of data loss.
Data privacy: Long jump minimizes the amount of time that data is stored on local
systems, reducing the risk of data breaches and ensuring the privacy of sensitive
information.
Cost-effective: Long jump eliminates the need for additional hardware or software to
store and transfer data, making it a cost-effective solution for organizations looking to
move large amounts of data between cloud service providers.
Complexity: Long jump requires a high level of technical expertise and specialized
software to execute, making it a complex solution that may not be suitable for
organizations with limited IT resources.
Compatibility: Long jump may not be compatible with all cloud service providers,
requiring organizations to modify their data migration plans accordingly.
Network Bandwidth: Long jump can consume a large amount of network bandwidth,
impacting network performance and slowing down other applications and services that
rely on the same network.
Provider Dependence: Long jump may make organizations dependent on the cloud
service providers involved, limiting their ability to switch providers in the future.
In conclusion, while long jump offers several benefits, it also has some limitations that
organizations must consider when planning their cloud data migration strategy. It's important
to carefully weigh the benefits and limitations before choosing a data migration method to
ensure a smooth transition between cloud service providers.
Data center migration: Organizations can use long jump to move their data centres to
anew cloud service provider without any downtime or loss of data.
Cloud service provider switch: Long jump can be used to switch from one cloud
service provider to another, allowing organizations to take advantage of new features,
better pricing, or improved security.
Backup and disaster recovery: Long jump can be used to transfer backup data from
one cloud provider to another, providing organizations with an additional layer of
protection against data loss.