Presentation Of Industrial training done at ISRO

Presented By: Shilpa Suman IT-B Enrol. No. :090464

Introduction to ISRO. Architecture Of Cloud Computing 8. Deployment Models 7.CONTENTS 1. Service Models 6. Similar systems And Concept Of Cloud Computing 4. Characteristics of Cloud Computing 5. Issues . 2. Introduction to Cloud Computing 3.

Madhavan Nair is currently the Chairman of Indian Space Research Organization.  ISRO’s hardware and services available commercially through Antrix Corporation.  ”The Prime Objective of ISRO is to develop space technology and its application to various national tasks.  “Vikram Sarabhai is known as the father of Indian space programme.  Its Head Quarter is in Bangalore.INTRODUCTION  ISRO is an independent Indian Governmental Organization which is established in November 1969 .  Mr. .

Contd… The various DOS centers of India are: .

Contd…  ISRO Telemetry. Tracking and Command Network (ISTRAC)  INSAT Master Control Facility (MCF)  ISRO Inertial Systems Unit (IISU)  National Remote Sensing Agency (NRSA)  Regional Remote Sensing Service Centers (RRSSC)  Physical Research Laboratory (PRL)  National Mesosphere/Stratosphere Radar Facility (NMRF) Troposphere .

.

INTRODUCTION The critical factor for the sustainability of an organization: Better resource Utilization  Innovative Solution  Higher Productivity Business solutions of various companies were costly. for cost cutting cloud computing came into existence. So. .

. e.yahoo email.. software and hardware accessing as well as the data storage services where the end user do not need to have the knowledge of physical location and configuration of the system that provides the services.g. Cloud computing refers to the computation .Contd… The “cloud “is a metaphor for the internet. Gmail etc.

.

management Grid computing: Computers are plugged in and the users pay for what they use.SIMILAR SYSTEM & CONCEPTS The concepts that revolutionized the cloud computing Clustering computing: Here computers are cluster together to form large computer Autonomic Computing: Computer Systems are capable of self. .

 Device and location independence: end user do not require to have the knowledge of service provider.  Cost: almost negligible cost . .  Security: is more due to centralization of data. virtual.CHARACTERISTICS Cloud computing exhibits the following key characteristics:  Application Programming: REST-based APIs.  Virtualization: all platforms provided to the user are completely  Multitenancy: enables sharing of resources and costs across a large pool of users .  Maintenance: of cloud computing applications is easier.

SERVICE MODELS Cloud computing providers offer their services according to three fundamental models: Iaas. . Paas & Saas.

storage space etc. IaaS Cloud is a platform through which businesses can avail equipment in the form of hardware. cloud users install operating system images on the machines as well as their application software.   Examples of IaaS include: Amazon Cloud Formation. servers. and Right Scales. Rack space Cloud. To deploy their applications.Contd…  Infrastructure as a service (IaaS):  Cloud providers offer computers– as physical or more often as virtual machines. at pay-per-use service. .

 Examples of PaaS include: Amazon Elastic Beanstalk. Engine Yard. programming language execution environment. Google App Engine. Heroku. Application developers can develop and run their software solutions on a cloud platform. cloud providers deliver a computing platform and/or solution stack typically including operating system. and Microsoft Azure. database.Contd…  Platform as a service (PaaS):  In the PaaS model. and web server. .

. Quick books Online and Salesforce. cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients.Contd…  Software as a service (SaaS):  In this model. monthly or yearly flat fee per user.com.  The pricing model for SaaS applications is typically a Examples of SaaS include: Google Apps.

cloud clients . .Contd…  Cloud client :  Users access cloud computing using networked client devices. Some of these devices . such as desktop . etc.rely on cloud computing for all or a majority of their applications so as to be essentially useless without it. . smart phones . Some legacy applications are delivered via a screen-sharing technology.   Examples are thin clients and the browser-based Chrome book.

Contd… .

DEPLOYMENT MODELS .

g.  E.  Benefits: no wastage resource and easy . IBM blue cloud. Community cloud:  Community cloud shares infrastructure between several organizations from a specific community with common concern. sun cloud etc.Contd… Public cloud:  Also known as external cloud . . inexpensive setup.

whether managed internally or by a third-party and hosted internally or externally. community or public) that remain unique entities but are bound together. offering the benefits of multiple deployment models.  Hybrid clouds lack the flexibility. Private cloud:   Private cloud is cloud infrastructure operated solely for a single organization. .Contd… Hybrid cloud: Hybrid cloud is a composition of two or more clouds (private. security and certainty of in-house applications.

ARCHITECTURE Cloud architecture. . In this there is a great contribution from diverse areas such as software. risk engineering. performance . Inter Cloud is an interconnected global “cloud of clouds” and an extension of the internet “n/w of n/w” on which it is based. Cloud engineering is an application of engineering discipline of cloud computing . the system architecture involve multiple cloud components communicating with each other. web .

a banking Trojan illegally used the popular Amazon service as a command and control channel that issued software updates and malicious instructions to PCs that were infected by the malware. In 2009. certain legal issues arise. Abuse: • • This includes password cracking and launching attacks using the purchased services . everything from trademark infringement. Privacy: • Using a cloud service provider (CSP) can complicate privacy of data because of the extent to which virtualization for cloud processing (virtual machines) and cloud storage are used to implement cloud service.Security: ISSUES • Physical control of the Private Cloud equipment is more secure than having the equipment off site and under someone else’s control. Legal: • As it can be expected with any revolutionary change in the landscape of global computing. . security concerns to the sharing of propriety data resources.

Sign up to vote on this title
UsefulNot useful