You are on page 1of 4

CSL605 Cloud Computing Lab Sem VI

EXPERIMENT 1

Title Study importance of cloud computing and various types of deployment and
service models.

Pre requisite Computer Networks

Mapping with CO CSL605.1

Objective Understand deployment models, service models, and advantages of cloud


computing.

Outcome To discuss basics of cloud computing with the help of deployment and service
models

Instructions 1. Soft copy submission for Activity 1


2. Hard copy submission for Activity 2 (Hand written)

Deliverables Activity 1:
1. To understand the origin of cloud computing
The concept of cloud computing has evolved over time, and its
origins can be traced back to the 1960s. The roots of cloud
computing can be found in the development of utility computing
and time-sharing systems.

1. 1960s - Utility Computing:The idea of utility computing, where


computing resources could be provided as a service, is often
considered a precursor to cloud computing. In the 1960s,
organizations began exploring the possibility of offering computing
resources on a metered basis, similar to other utilities like
electricity.

2. 1970s - Time-Sharing Systems: During the 1970s, time-sharing


systems became popular. These systems allowed multiple users to
access a computer simultaneously, sharing its resources. This laid
the foundation for the idea of shared computing resources and
remote access.

3. 1990s - Telecommunications Companies: In the 1990s,


telecommunication companies started offering virtual private
network (VPN) services, which allowed companies to securely
connect to their internal networks over the internet. This marked a
step toward network-based computing services.
4. 2000s - Emergence of the Term "Cloud Computing": The term
"cloud computing" gained prominence in the mid-2000s. Amazon
Web Services (AWS) played a crucial role in popularizing cloud
computing by introducing Amazon Elastic Compute Cloud (EC2)
in 2006. This allowed users to rent virtual servers on-demand over
the internet.

5. 2000s - Proliferation of Cloud Services: Following AWS, other


major tech companies, such as Google and Microsoft, also entered
the cloud computing space. They started offering a variety of
services, including infrastructure as a service (IaaS), platform as a
service (PaaS), and software as a service (SaaS).

Since the mid-2000s, cloud computing has continued to evolve


rapidly, becoming a fundamental part of the IT landscape. It has
transformed the way organizations manage and utilize computing
resources, providing scalability, flexibility, and cost efficiency.

2. NIST model, characteristics of cloud


On-demand self-service. A consumer can unilaterally provision
computing capabilities, such as server time and network storage, as
needed automatically without requiring human interaction with
each service provider. Broad network access. Capabilities are
available over the network and accessed through standard
mechanisms that promote use by heterogeneous thin or thick client
platforms (e.g., mobile phones, tablets, laptops, and workstations).
Resource pooling. The provider’s computing resources are pooled
to serve multiple consumers using a multi-tenant model, with
different physical and virtual resources dynamically assigned and
reassigned according to consumer demand. There is a sense of
location independence in that the customer generally has no control
or knowledge over the exact location of the provided resources but
may be able to specify location at a higher level of abstraction (e.g.,
country, state, or datacenter). Examples of resources include
storage, processing, memory, and network bandwidth. Rapid
elasticity. Capabilities can be elastically provisioned and released,
in some cases automatically, to scale rapidly outward and inward
commensurate with demand. To the consumer, the capabilities
available for provisioning often appear to be unlimited and can be
appropriated in any quantity at any time. Measured service. Cloud
systems automatically control and optimize resource use by
leveraging a metering capability1 at some level of abstraction
appropriate to the type of service (e.g., storage, processing,
bandwidth, and active user accounts). Resource usage can be
monitored, controlled, and reported, providing transparency for
both the provider and consumer of the utilized service
3. Different deployment models
Private cloud. The cloud infrastructure is provisioned for exclusive
use by a single organization comprising multiple consumers (e.g.,
business units). It may be owned, managed, and operated by the
organization, a third party, or some combination of them, and it
may exist on or off premises. Community cloud. The cloud
infrastructure is provisioned for exclusive use by a specific
community of consumers from organizations that have shared
concerns (e.g., mission, security requirements, policy, and
compliance considerations). It may be owned, managed, and
operated by one or more of the organizations in the community, a
third party, or some combination of them, and it may exist on or off
premises. Public cloud. The cloud infrastructure is provisioned for
open use by the general public. It may be owned, managed, and
operated by a business, academic, or government organization, or
some combination of them. It exists on the premises of the cloud
provider. Hybrid cloud. The cloud infrastructure is a composition of
two or more distinct cloud infrastructures (private, community, or
public) that remain unique entities, but are bound together by
standardized or proprietary technology that enables data and
application portability (e.g., cloud bursting for load balancing
between clouds).
4. Service models
Software as a Service (SaaS). The capability provided to the
consumer is to use the provider’s applications running on a cloud
infrastructure2 . The applications are accessible from various client
devices through either a thin client interface, such as a web browser
(e.g., web-based email), or a program interface. The consumer does
not manage or control the underlying cloud infrastructure including
network, servers, operating systems, storage, or even individual
application capabilities, with the possible exception of limited
userspecific application configuration settings. Platform as a
Service (PaaS). The capability provided to the consumer is to
deploy onto the cloud infrastructure consumer-created or acquired
applications created using programminglanguages, libraries,
services, and tools supported by the provider.3 The consumer does
not manage or control the underlying cloud infrastructure including
network, servers, operating systems, or storage, but has control
over the deployed applications and possibly configuration settings
for the application-hosting environment. Infrastructure as a Service
(IaaS). The capability provided to the consumer is to provision
processing, storage, networks, and other fundamental computing
resources where the consumer is able to deploy and run arbitrary
software, which can include operating systems and applications.
The consumer does not manage or control the underlying cloud
infrastructure but has control over operating systems, storage, and
deployed applications; and possibly limited control of select
networking components (e.g., host firewalls).
5. Cloud cube model
Cloud Cube Model, designed and developed by Jericho forum.
Which helps to categorize the cloud network based on the four-
dimensional factor: Internal/External, Proprietary/Open, De-
Perimeterized/Perimeterized, and Insourced/Outsourced. Cloud
Cube model, helps to categorize the cloud network based on the
four-dimensional factor. Their main focus is to protect and secure
the cloud network. This cloud cube model helps to select cloud
formation for secure collaboration.
This model helps IT managers, organizations, and business leaders
by providing the secure and protected network.
Security is an important concern for cloud customers and most of
the cloud providers understand it. The customer should also keep in
mind, the selected cloud formation meets the regulatory and
location requirements. One of the major factors in the cloud cube
model is encryption and key management, which provides the
confidentiality and integrity of the model. Strong encryption
provides the data (lost or stolen). This model helps to select cloud
formation for security Corporation.

Moreover, it benefits its managers and business tycoons by


providing a secure and safe environment. The main aim of
designing cloud cube model is to let the users know that the
traditional notion of network rangers and its boundary with network
firewall is no longer applicable in cloud computing.

Activity 2:
Find one real-time problem or requirement and provide its non-cloud
based solution and cloud-based solution.
Sample Solution:
 Requirement: Office PC or laptop computers are a few years old.
But the software is old and needs replacing.
 Non-cloud-based solution: Upgrade computers and install new
improved desktop software.
 Cloud based solution: Choose SaaS and run it in a web browser on
existing computer hardware. (Detailed reasoning)
Conclusion the evolution of cloud computing can be traced from the utility and time-
sharing systems of the 1960s to the widespread adoption of cloud services in
the 2000s. The NIST model outlines key characteristics such as on-demand
self-service, broad network access, resource pooling, rapid elasticity, and
measured service. Different deployment models include private, community,
public, and hybrid clouds, each catering to specific needs. Service models,
represented by SaaS, PaaS, and IaaS, offer varying levels of control and
management to consumers. The Cloud Cube Model, developed by the Jericho
Forum, categorizes cloud networks based on dimensions like internal/external,
proprietary/open, de-perimeterized/perimeterized, and insourced/outsourced,
providing a framework for secure collaboration and aiding in the selection of a
suitable cloud formation. This model emphasizes the importance of
encryption, key management, and meeting regulatory requirements for
ensuring the security and integrity of cloud environments. Overall, the cloud
computing landscape continues to evolve, offering scalable, flexible, and
secure solutions for organizations across various industries.
References

You might also like