You are on page 1of 35

GROUP 4

Chapter 5: Cloud •O B E J E R O
•D A G L E
Computing Basics •J U M A O - A S
•C E N I Z A
What is Cloud Computing
Cloud computing is a technology model that allows individuals and
organizations to access and use computing resources over the
internet on a pay-as-you-go basis. Instead of owning and maintaining
physical servers and infrastructure, cloud computing enables users to
rent or lease computing power, storage, databases, and other services
from cloud service providers.
Cloud computing services are typically categorized
into three main service models:
• Platform as a Service (PaaS): PaaS provides a platform that includes
infrastructure tools and services to develop, deploy, and manage
applications. Users focus on application development, while the
underlying infrastructure is managed by the provider.
• Software as a Service (SaaS): SaaS delivers fully functional software
applications over the Internet on a subscription basis. Users can
access these applications through a web browser without the need
for installation or maintenance.
• Infrastructure as a Service (IaaS): In this model, cloud providers offer
virtualized computing resources, such as virtual machines, storage,
and networking. Users can manage and control the operating system,
applications, and data.
CLOUD
CONCEPTS
WHAT IS SOFTWARE AS A SERVICE(SaaS)?
• -It's a cloud computing model in which software applications are
hosted and provided to users over the internet on a subscription
basis. Instead of downloading and installing software on individual
computers or servers, users can access the software and its features
through a web browser.
EXAMPLE OF SAAS
IS GOOGLE

Provides SaaS applications


like Gmail (email), google
workspace (formerly G
suite, including google
docs, sheets, and slides),
and google drive (file
storage and sharing)
Platform as a Service
• Platform as a Service (PaaS) is a cloud computing
service model that provides a platform and
environment for developers to build, deploy, and
manage applications.
• PaaS offerings aim to streamline and simplify the
application development process by abstracting
many of the underlying infrastructure
management tasks, allowing developers to focus
primarily on coding and application logic.
• The consumer does not manage or control the
underlying cloud infrastructure including
network, servers, operating systems, or storage,
but has control over the deployed applications
and possible configuration settings for the
application-hosting environment.
Platform as a Service
• Common examples of PaaS providers
include Microsoft Azure App Service,
Google App Engine, AWS Elastic
Beanstalk, and Heroku.
• Developers can choose the PaaS
offering that best suits their
development needs, whether it's for
web applications, mobile apps, or
backend services, and leverage the
platform's capabilities to accelerate
development and deployment cycles
while reducing infrastructure
management overhead.
Infrastructure as a Service
• According to the NIST, infrastructure as a
service (IaaS) is defined as follows: “The
capability provided to the consumer is to
provision processing, storage, networks,
and other fundamental computing
resources where the consumer is able to
deploy and run arbitrary software, which
can include operating systems and
applications. The consumer does not
manage or control the underlying cloud
infrastructure but has control over
operating systems, storage, and deployed
applications; and possible limited control
of select networking components (e.g.,
host firewalls).”
Examples of IaaS
Cloud Deployment
Models
PRIVATE CLOUD
•A Private cloud is a type of cloud computing model in which computing
resources, including servers, storage are networking infrastructure are
dedicated solely to a single organization or entity.

•A Private cloud are built and maintained within an organization’s own data
centers or by a third-party provider exclusively for that organization.

•Private clouds are often adopted by industries like; finance, healthcare,


government, and any organizations that deals with sensitive data or has
regulatory compliance requirements that demand a high level of control
and security over their IT infrastructure.
PUBLIC CLOUD
• A public cloud is a type of cloud computing deployment model in
which cloud resources and services are owned and operated by a
third-party cloud service provider. These resources, such as servers,
storage, networking, and software, are made available to the
general public, multiple organizations, or individuals over the
internet.
EXAMPLE OF
PUBLIC CLOUD IS
GMAIL
Gmail is an example of a
public cloud service were
you use software and
storage provided over the
internet without needing
to worry about the
underlying infrastructure
Community Cloud
• The cloud infrastructure is
provisioned for exclusive use by a
specific community of consumers
from organizations that have shared
concerns (e.g., mission, security
requirements, policy, and
compliance considerations).
• It may be owned, managed, and
operated by one or more of the
organizations in the community, a
third party, or some combination of
them, and it may exist on or off
premises.
Hybrid Cloud
• A hybrid cloud is defined as follows: “The
cloud infrastructure is a composition of two
or more distinct cloud infrastructures
(private, community, or public) that remain
unique entities, but are bound together by
standardized or proprietary technology that
enables data and application portability (e.g.,
cloud bursting for load balancing between
clouds).”
• A hybrid can be any combination of public,
private, and community clouds, but under
most circumstances, it is an amalgamation of
private and public clouds. When you start
mixing in community clouds, it often becomes
more of an extension of the community cloud
rather than a hybrid cloud.
VIRTUALIZATION
Virtualization
• Cloud computing is built on virtualization; it is the foundation upon
which cloud computing stands. At the core of virtualization is the
hypervisor (the software/hardware combination that makes it
possible), and there are two methods of implementation: Type I
(known as bare metal) and Type II (known as hosted).
• Type I is independent of the operating system and boots before the
OS, whereas Type II is dependent on the operating system and
cannot boot until the OS is up and it needs the OS to stay up so that
it can operate. From a performance and scalability standpoint, Type
I is considered superior to Type II.
Virtualization
• Virtualization is a fundamental technology in cloud computing that
enables the efficient use of physical resources, such as servers and
storage devices, by creating virtual instances or representations of
these resources.
• These virtualized resources can be provisioned, managed, and
scaled as needed to meet the demands of applications and services
in the cloud.
Types of Virtualization
Bare-Metal Virtualization Hosted Virtualization
(Type 1) (Type 2)
•Type 1 virtualization, also known as bare- •Type 2 virtualization, also known as
metal virtualization, refers to a hosted virtualization, is a virtualization
virtualization architecture where a architecture in which a virtualization layer
hypervisor is installed directly on the (hypervisor) runs on top of a host
physical hardware of a computer system. operating system.
•In this architecture, there is no underlying •Unlike Type 1 virtualization, where the
host operating system between the hypervisor runs directly on the physical
hardware and the hypervisor. hardware, Type 2 virtualization relies on
•Type 1 hypervisors provide high levels of the host operating system to provide
isolation and performance and are hardware abstraction and resource
commonly used in enterprise management.
environments for server virtualization.
VIRTUAL ROUTER
•A virtual router refers to a
software-based or virtualized
networking device that performs
the functions of a physical router.

• It operates within a virtualized


environment, typically on a server
or cloud infrastructure, and routes
network traffic between different
networks or subnets.
VIRTUAL ROUTER

•Virtual routers offer flexibility,


scalability, and cost savings
compared to traditional hardware
routers.
VIRTUAL SWITCHES
•A virtual switch, also known as a
vSwitch, is a software-based
networking component used in
virtualization environments.

•It plays a crucial role in


managing network traffic within
a virtualized infrastructure, such
as a virtualized data center or a
cloud computing environment.
VIRTUAL SWITCHES
•Virtual switches are primarily used
in virtualization technologies like
VMware vSphere, Microsoft Hyper-
V, and others.

•They provide the flexibility and


agility required to adapt to
changing networking needs,
allocate resources efficiently, and
maintain network security within
virtualized infrastructures.
Virtual Firewall
• A virtual firewall (VF) is either a network firewall
service or an appliance running entirely within
the virtualized environment. Regardless of which
implementation, a VF serves the same purpose as
a physical one: packet filtering and monitoring.
The firewall can also run in a guest OS VM.
• One key to a VF is to not overlook the
contribution from Network Address
Translation (NAT). This allows an organization to
present a single address (or set of addresses) to
the Internet for all computer connections—it acts
as a proxy between the local-area network
(which can be using private IP addresses) and the
Internet. NAT effectively hides your network from
the world, making it much harder to determine
what systems exist on the other side of the
router.
VIRTUAL VERSUS PHYSICAL NIC’s
•Virtual Network Interface Controller (vNIC)
• A Virtual Network Interface Controller (vNIC) is a software-based representation of a network
interface card (NIC) within a virtualized environment, such as a virtual machine (VM) or container.
It serves as the network adapter for virtual instances and enables them to communicate with the
network, just like a physical NIC does for a physical computer.
•Physical Network Interface Controller (pNIC)
• A Physical Network Interface Card (NIC), often simply referred to as a physical NIC, is a hardware
component used in computers and servers to provide a physical connection to a network. It plays
a crucial role in facilitating network communication by allowing the computer or server to
connect to and communicate over wired or wireless networks.
•In summary, the primary purpose of a physical NIC is to provide network connectivity to physical
computers or servers, whereas virtual NICs are used in virtualized environments to enable virtual
machines and containers to connect to the network.
STORAGE-AREA
NETWORKS
SOFTWARE DEFINED NETWORKING(SDN)
• SDN stands for "Software-Defined Networking." It's an innovative
approach to networking that uses software to control and manage
network resources and services, making network infrastructure
more flexible, programmable, and adaptable to the changing needs
of applications and users.
STORAGE AREA NETWORKS (SAN)
•A Storage Area Network (SAN) is a specialized high-speed network or dedicated
network that connects and consolidates storage devices, such as disk arrays, tape
libraries, and servers, to provide a centralized and shared storage infrastructure.
SANs are designed to enhance storage management, improve data accessibility,
and increase the scalability and performance of storage resources.

•SANs use a block-level storage approach, meaning they present storage devices
as raw storage blocks (typically fixed-size chunks) rather than files or directories.

•Storage Area Networks are a crucial component in modern data centers and
enterprise environments, enabling efficient storage management, data
accessibility, and scalability while maintaining high performance and reliability.
JUMBO FRAMES
•A jumbo frame is an Ethernet frame with a
larger size than the standard Ethernet frame.
•In networking, an Ethernet frame is a packet
of data that is transmitted over a network.
These frames consist of both data and control
information and are used to carry data
between devices on the network.
•The standard Ethernet frame size, known as
the Maximum Transmission Unit (MTU), is
1500 bytes for Ethernet networks (excluding
headers). In contrast, a jumbo frame typically
refers to an Ethernet frame that exceeds this
standard size.
JUMBO FRAMES
•Common sizes for jumbo frames are 9000
bytes and 9216 bytes, although the exact size
can vary depending on the network
equipment and configuration.
•Jumbo frames are often used in specific
networking scenarios, such as storage area
networks (SANs), where high-speed data
transfer and reduced latency are crucial.
•However, it's important to carefully consider
network compatibility and configuration when
implementing jumbo frames, as they may not
be suitable for all network environments.
iSCSI
• The SCSI (Small Computer
System Interface) standard has
long been the language of
storage. iSCSI (Internet Small
Computer System Interface)
expands this through Ethernet
allowing IP to be used to send
SCSI commands.
FIBRE CHANNEL
• Fibre Channel (FC) is a high-speed networking technology primarily
used for transmitting data between data storage devices and
servers within a storage area network (SAN) or other high-
performance computing environments.
NETWORK ATTACHED STORAGE (NAS)
•Network Attached Storage (NAS) is a specialized file storage device or appliance that is
connected to a network, allowing multiple users and devices to access, share, and store
data centrally.

•NAS systems are designed for simplicity, ease of use, and efficient file sharing within a
local area network (LAN) or over the internet.

•NAS is a cost-effective and efficient solution for individuals, small businesses, and
remote offices that require centralized storage, easy file sharing, and data protection.

•It provides a balance between storage capacity, data accessibility, and data management
capabilities.

You might also like