SlideShare a Scribd company logo
1 of 59
Done By,
RAJARAMAN G
3rd year [B.Tech]
 Introduction
 History on Cloud
 Cloud Design
 Types Of Cloud Service
 SaaS
 Virtualization
 PaaS
 IaaS
 CaaS
 IDaaS
 Comparison Of SaaS, PaaS, IaaS
 The Pros and Cons Of Cloud
 The Future Of Cloud
 Cloud computing defines taking services and moving
them outside an organizations firewall on shared
systems.
 Is a metaphor for the Internet.
 Refer to Internet based development and services.
 Cloud computing is a model for enabling convenient,
on-demand network access to a shared pool of
configurable computing resources
 Access your data anytime and anywhere.
 When we think of cloud computing, we come across the
thought when it was invented.
 It was a gradual evolution that started in the 1950s with
mainframe computing.
 After some time, around 1970, the concept of virtual machines
(VMs) was created.
 In the 1990s, telecommunications companies started offering
virtualized private network connections.
 In 21st century cloud computing came into existence.
o Grid computing: Solving large problems with
parallel computing.
o Utility computing: Offering computing resources as a
metered service.
o SaaS: Network-based subscriptions to applications.
o Cloud computing: Anytime, anywhere access to IT
resources delivered dynamically as a service
 The cloud follows some basic characteristics:
RESOURCE SCALING
ELASTICITY LESS COST
HIGH SECURITY
VIRTUALIZATIONHOMOGENITY
HIGH SPEED
RECOVERY
BROAD ACCESS OF
NETWORK
 The four dimensions of the Cloud Cube Model are shown in Figure 1.2 and
listed here:
 • Physical location of the data: Internal (I) / External (E) determines your
organization's boundaries.
 • Ownership: Measure of not only the technology ownership, but of
interoperability, ease of data transfer, and degree of vendor application
lock-in.
 • Security boundary: Perimeterised /De-perimiterised is a measure of
whether the operation is inside or outside the security boundary or network
firewall.
 • Sourcing: In sourced or Outsourced means whether the service is
provided by the customer or the service provider.
 People are risk averse and loss averse.
 People value what they own more than what they are given.
 People favor things that are free.
 People discount future risk and favor instant gratification.
 People value what they own more than what they are given.
Measuring cloud computing costs
The cost of a cloud computing deployment is roughly estimated to be
 CostCLOUD = Σ(UnitCostCLOUD x (Revenue – CostCLOUD))
Clients can connect to a cloud service in a number of different ways.
These are the two most common means:
• A Web browser
• A proprietary application
There are three basic methods for securely connecting over a
connection:
• Use a secure protocol to transfer data such as SSL , FTPS or connect
using a secure shell such as SSH to connect a client to the cloud.
• Create a virtual connection using a virtual private network (VPN),
or with a remote data transfer protocol such as Microsoft RDP or
Citrix ICA, where the data is protected by a tunneling mechanism.
• Encrypt the data so that even if the data is intercepted or sniffed, the
data will not be meaningful.
o If any cloud-computing system resource is difficult to plan for,
it is network capacity. The three aspects of N/W capacity:
o Network traffic to and from the network interface at the
server, be it a physical or virtual interface or server
o Network traffic from the cloud to the network interface
o Network traffic from the cloud through your ISP to your local
network interface.
To measure network traffic at a server's network interface, you
need to employ is known as a network monitor, which is a
form of packet analyzer. Microsoft includes a utility called the
Microsoft Network Monitor as part of its server utilities.
 The 3 types of service are:
 SaaS: Provides Applications.
 PaaS: Deploy Customer Created Applications.
 IaaS: Rent Processing , N/W Resources.
Software as a
Service(SaaS)
Platform as a
Service(PaaS)
Infracture as a
Service(IaaS)
 Here I compare SaaS arch with marketing
strategies:
 The emergence of SaaS as an effective software-delivery
mechanism creates an opportunity to change their focus from
deploying and supporting applications to managing the
services that those applications provide.
 SaaS as a concept is often associated with the application
service providers (ASPs) of the 1990s
 A typical SaaS application is offered either directly by the
vendor or by an intermediary party called an aggregator,
which bundles SaaS offerings from different vendors and
offers them as part of a unified application platform.
 Managing the Risks of Software Acquisition
 SaaS applications don't require the deployment of a large
infrastructure at the client's location, which eliminates or
drastically reduces the upfront commitment of resources.
 Managing IT Focus
 Testing and installing patches, managing upgrades,
monitoring performance, ensuring high availability, and so
forth—is handled by the provider.
 The 4 levels of SaaS given below:
 1st Level: Ad-Hoc/Custom – One Instance per
customer
 2nd Level: Configurable per customer
 3rd Level: configurable & Multi-Tenant-Efficient
 4th Level: Scalable, Configurable & Multi-Tenant-
Efficient
 SaaS applications are distinguished by their conceptual
locations on three different continua.
 Licensing: On-premise applications typically are licensed in
perpetuity, with a single up-front cost for each user or owned
outright. SaaS applications often are licensed with a usage-
based transaction model, in which the customer is only billed
for the number of service transactions used. In between is the
familiar time-based subscription model, in which the customer
pays a flat fee per seat for a particular time period and is
allowed unlimited use of the service during that period.
 Location: SaaS applications are installed at the SaaS hoster's
location, while on-premise applications are, of course,
installed within your own IT environment. In between is the
appliance model, in which the vendor supplies a
hardware/software component as a "black box" that is installed
at your location, instead of the others.
 Management: Traditionally, the IT department is responsible
for providing IT service to users, which means being familiar
with network, server, and application platforms, providing
support and troubleshooting and resolving IT security,
reliability, performance, and availability problems.
 The model of SaaS continua is shown below :
 Political considerations: Decision can be short-circuited by
resistance within an organization, if people insist that certain
functionality remain internal, under the control of IT.
 Technical considerations: SaaS applications typically provide some
flexibility for customer configuration, but this approach has its limitations.
If an important application requires specialized technical knowledge to
operate and support, or requires customization that a SaaS vendor cannot
offer, it might not be possible to pursue a SaaS solution for the application.
 Financial considerations: Consider the total cost of ownership (TCO) of a
SaaS application, compared to that of an equivalent on-premise
application.
 Legal considerations: Some industries are subject to regulatory law in
different parts of the world, which imposes various reporting and
recordkeeping requirements that your potential SaaS solution candidates
cannot satisfy. Consider the regulatory environments in all the different
jurisdictions in which your organization operates and how they affect your
application needs.
 Interface with the infrastructure via the APIs.
 Flexibility and elasticity
 Pay as much as used and needed
 Transparent to users and applications
 Built on clusters of PC servers
 CPU, storage, server capacity, load balancing, and databases
 Cloud computing layers additional technologies such as self-
service provisioning onto virtualization.
 The VM role for Windows Azure is similar to other server
roles. VMs on Windows Azure run a version of the Windows
Server OS. The difference with the VM role is that you can
create, and customize the server to meet your needs.
 The end user has the same experience on a virtual machine as
they would have on dedicated hardware.
 Virtual machines do not require specialized hypervisor-
specific hardware.
 Reduce the data centre footprint.
 Easier to create new machines, backup machines, etc…
 Faster server provisioning.
 Increase uptime.
 Extend the life of older applications.
 Help move things to the cloud.
 Easy migration of virtual machines.
 Debug problems.
 Software that manipulates hardware, while cloud refers to a
service that results from that manipulation.
 It is a foundational element of cloud computing and helps
deliver on the value of cloud computing.
 A private cloud, in its own virtualized environment, gives
users the best.
 It Maximize resources, IT budget integration , Multiple
systems.
 This makes servers, workstations, storage and other systems
independent of the physical hardware layer.
 Cloud is used most because:
 Agility improves with users,
 Cost reductions
 Security,performace and productivity.
 Multitenancy enables sharing of resources and costs across a
large pool of users.
 Reliability improves with the use of multiple redundant sites.
 Control of data, and service parameters.
 Amazon- Amazon always excelled at delivering computing
capacity at a large scale to its own employees and to
consumers.
 Enomaly- Software that integrates enterprise data centers with
commercial cloud computing offerings.
 Google- Google Apps was the company's attempt to branch
out beyond the consumer search market and become a player
in the enterprise.
 Microsoft- Microsoft made its name by developing the
operating system for home and work computers. But with all
forms of applications moving to the Web-hosted model.
 Cloud storage is a model of data storage where the digital data
is stored in logical pools.
 Based on highly virtualized infrastructure and is like
broader cloud computing in terms of accessible interfaces.
 This typically refers to a hosted object storage service, but the
term has broadened to include other types of data storage that
are now available as a service, like block storage.
 It has loads of different distributed resources.
 It reduces the fault occurs during the process.
 Durability is great.
 Allows Word and Excel documents to be edited directly from
your browser.
 Provides users with immediate access to a broad range of
resources.
 Storage availability and data protection is intrinsic to object.
 Amazon Elastic Compute Cloud (EC2):
◦ Elastic, marshal 1 to 100+ PCs via WS,Fairly cheap!
 Powered by Xen – a Virtual Machine:
◦ Different from Vm’ware and VPC as uses “para-
virtualization” where the guest OS is modified to use hyper-
calls
◦ Hardware contributions by Intel and AMD (AMD-V).
◦ Supports “Live Migration” of a virtual machine between
hosts.
 Linux, Windows, OpenSolaris
 Management Console/AP
 Infrastructure as a service (IaaS) is a type of cloud computing
in which a third-party provider hosts virtualized computing
resources over the Internet.
 This offer highly scalable resources that can be adjusted on-
demand.
 IaaS customers pay on a per-use basis, typically by the hour,
week or month. Some providers also charge customers based
on the amount of virtual machine space they use.
 Leading IaaS providers include Amazon Web Services (AWS),
Windows Azure, Google Compute Engine, Rackspace Open
Cloud, and IBM Smart Cloud Enterprise.
 The structure of Info as a service is given below:
 Scalability
 No single point of failure
 Physical security of data centre locations
 Reduces TCO (Total Cost of Ownership)
 Flexible offering
 Location independence
• On-demand self-service: A consumer can unilaterally
provision computing capabilities, such as compute time, n/w
connectivity and storage, as needed automatically without
requiring human interaction.
• Broad network access
• Resource pooling: Examples of computing resources include
storage, processing (compute), memory, network bandwidth,
and virtual machines.
 Rapid elasticity: To the consumer, the capabilities available
for provisioning often appear to be unlimited and can be
purchased in any quantity at any time.

 Private cloud: The cloud infrastructure is operated solely for an
organization. It may be managed by the organization or a third party and
may exist on premise or off premise.
 Community cloud: The cloud infrastructure is shared by several
organizations and supports a specific community that has shared concerns
(e.g., mission, security requirements, policy). It may be managed by the
organizations or a third party and may exist on premise or off premise.
 Public cloud: The cloud infrastructure is made available to the general
public or a large industry group and is owned by an organization selling
cloud services.
 Hybrid cloud: The cloud infrastructure is a composition of two or more
clouds that remain unique entities but are bound together by standardized
or proprietary technology that enables data and application portability.
 Pros:
 High degree of control over facilities.
 Guaranteed capacity and easier expansion planning.
 Potential for greater power efficiency through specialization.
 Easier security management with a single-tenant facility.
 Cons:
 Limited geographic expansion abilities.
 More limited connectivity options.
 Tendency to run lower-tier facilities.
 Distracting to the core business.
 Very capital intensive.
 The ultimate goal of a PaaS is to make it easier for you to run
your website or web application no matter how much traffic it
gets.
 A platform as a service should handle scaling seamlessly for
you so you can just focus on your website and the code
running it.
 As a programmer, you leverage pre-existing code rather than
starting from scratch and writing everything.
 The most well-known software platforms for desktop software
are Windows and Mac OS.
• A platform may even provide a way to accomplish things that
would otherwise not be possible at all.
• Additional features such as email distribution lists, contact
form handler and other tools that make it easier to run a
website are part of almost every hosting service.
• Web platforms today provide a significant level of automation,
control, and tools.
• Hosting layer is analogous to desktop computer hardware and
the platform layer is analogous to a desktop operating system.
 There is always a conflict between the developers and
the System Engineers.
 Developers are keen on getting their environments up
without waiting.
 System Engineers care about performance and
stability.
 Creates a peaceful environment for both parties.
 PaaS is a category of cloud computing services that provides
a platform allowing customers to develop, run and
manage Web applications without the complexity of building
and maintaining the infrastructure.
 Public PaaS: Derived from software as a service(SaaS), and is
situated in cloud computing between SaaS and infrastructure
as a service (IaaS).
 Mobile PaaS: Initiated in 2012, mobile PaaS (mPaaS) provides
development capabilities for mobile app designers and
developers.
Public PaaS providers and private PaaS vendors include:
 Active State
 AWS Elastic Beanstalk
 Cloud Foundry
 Engine Yard
 Google App Engine
 Microsoft Azure Web Sites
 Oracle
 Pivotal Software
 Red Hat
 Wave Maker
Pros:
 Automatic Updates.
 Decreased Costs.
 Teams Can Collaborate From A far.
 Assured Compatibility.
Cons:
 Limited Scalability.
 Lock-In.
 The establishment and proof of an identity is a central network
function.
 An identity is a set of characteristics or traits that make something
recognizable or known.
 To establish your identity on a network, you might be asked to
provide a name and password, which is called a single-factor
authentication method.
 Identity protection is one of the more expensive and complex areas
of network computing.
 Identity as a Service provides an easy mechanism for integrating
identity services into individual applications with minimal
development effort, by allowing the identification logic and storage
of an identity's attributes to be maintained externally.
 Compliance as a Service (CaaS) appears in discussions, few
examples of this kind of service exist as a general product for
a cloud computing architecture.
 A Compliance as a Service application would need to serve as
a trusted third party, because this is a man-in-the-middle type
of service.
 CaaS may need to be architected as its own layer of a SOA
architecture in order to be trusted.
 A CaaS would need to be able to manage cloud relationships,
understand security policies and procedures, know how to
handle information and privacy, be aware of geography,
provide an response and allow for the system to be queried.
 Limit flexibility and innovation.
 Issues relating to policy and access.
 Enables services to be used without any
understanding of their infrastructure.
 Performance and Bandwidth Cost.
 Interoperability and Portability.
 Reduced time for implementation.
 Disaster recovery.
PROS:
 Improved performance.
 Reduced costs.
 Almost Unlimited Storage.
 Backup and Recovery.
CONS:
 Requires a constant Internet connection.
 Features might be limited.
 Very Slow.
 Grid Computing was the last research-led centralised
approach.
 More application availability on the cloud.
 More hybrid cloud adoption.
 Increased development for the cloud.
 The research findings provide some surprising and
useful insights into what current and potential users
see as the most important benefits of cloud
technologies.

More Related Content

What's hot

CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESTushar Dhoot
 
Case Study of SURE! Unified Communications
Case Study of SURE! Unified CommunicationsCase Study of SURE! Unified Communications
Case Study of SURE! Unified CommunicationsSURE!
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.Minor33
 
Greg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
Greg Dixon - 2011 ScanSource POS & Barcoding Partner ConferenceGreg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
Greg Dixon - 2011 ScanSource POS & Barcoding Partner ConferenceScanSource, Inc.
 
Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingACMBangalore
 
Cloud Computing - A Primer
Cloud Computing - A PrimerCloud Computing - A Primer
Cloud Computing - A Primerbrownmestizo
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!imogokate
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingnjeanphi
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
2.evaluating cloud platforms
2.evaluating cloud platforms2.evaluating cloud platforms
2.evaluating cloud platformsDrRajapraveenkN
 
Cloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleCloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleAlan Quayle
 
Cloud Computing - Challenges and Opportunities - Jens Nimis
Cloud Computing - Challenges and Opportunities  -  Jens NimisCloud Computing - Challenges and Opportunities  -  Jens Nimis
Cloud Computing - Challenges and Opportunities - Jens NimisJensNimis
 
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
Cloud computing charecteristics and types   altanai bisht , 2nd year,  part iiiCloud computing charecteristics and types   altanai bisht , 2nd year,  part iii
Cloud computing charecteristics and types altanai bisht , 2nd year, part iiiALTANAI BISHT
 

What's hot (20)

CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
 
Case Study of SURE! Unified Communications
Case Study of SURE! Unified CommunicationsCase Study of SURE! Unified Communications
Case Study of SURE! Unified Communications
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Greg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
Greg Dixon - 2011 ScanSource POS & Barcoding Partner ConferenceGreg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
Greg Dixon - 2011 ScanSource POS & Barcoding Partner Conference
 
Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputing
 
Cloud Computing - A Primer
Cloud Computing - A PrimerCloud Computing - A Primer
Cloud Computing - A Primer
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Microsoft Cloud Computing E-Book
Microsoft Cloud Computing E-BookMicrosoft Cloud Computing E-Book
Microsoft Cloud Computing E-Book
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
 
Sla in cloud
Sla in cloudSla in cloud
Sla in cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
2.evaluating cloud platforms
2.evaluating cloud platforms2.evaluating cloud platforms
2.evaluating cloud platforms
 
Cloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop SampleCloud Computing 101 Workshop Sample
Cloud Computing 101 Workshop Sample
 
Cloud Computing - Challenges and Opportunities - Jens Nimis
Cloud Computing - Challenges and Opportunities  -  Jens NimisCloud Computing - Challenges and Opportunities  -  Jens Nimis
Cloud Computing - Challenges and Opportunities - Jens Nimis
 
CA NOTES ON EMERGING TECHNOLOGIES
CA NOTES ON EMERGING TECHNOLOGIESCA NOTES ON EMERGING TECHNOLOGIES
CA NOTES ON EMERGING TECHNOLOGIES
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
Cloud computing charecteristics and types   altanai bisht , 2nd year,  part iiiCloud computing charecteristics and types   altanai bisht , 2nd year,  part iii
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 

Similar to A Breif On Cloud computing

Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingsuraj bhandari
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Cloud Computing & Control Auditing
Cloud Computing & Control AuditingCloud Computing & Control Auditing
Cloud Computing & Control AuditingNavin Malhotra
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networksjayapal385
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingvishnu varunan
 
Introduction on Cloud Computing
Introduction on Cloud Computing Introduction on Cloud Computing
Introduction on Cloud Computing Sanjiv Pradhan
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1ADEOLA ADISA
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised PresentationMayank Aggarwal
 

Similar to A Breif On Cloud computing (20)

Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Cloud Computing & Control Auditing
Cloud Computing & Control AuditingCloud Computing & Control Auditing
Cloud Computing & Control Auditing
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
cloud computing
cloud computing cloud computing
cloud computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Unit 1
Unit 1Unit 1
Unit 1
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Introduction on Cloud Computing
Introduction on Cloud Computing Introduction on Cloud Computing
Introduction on Cloud Computing
 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
 
Cloud computing stack
Cloud computing stackCloud computing stack
Cloud computing stack
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
CC.pptx
CC.pptxCC.pptx
CC.pptx
 
Introducing cloud computing complete
Introducing cloud computing completeIntroducing cloud computing complete
Introducing cloud computing complete
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
Cloud Computing : Revised Presentation
Cloud Computing : Revised PresentationCloud Computing : Revised Presentation
Cloud Computing : Revised Presentation
 
Cloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile NetworkCloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile Network
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

A Breif On Cloud computing

  • 1. Done By, RAJARAMAN G 3rd year [B.Tech]
  • 2.  Introduction  History on Cloud  Cloud Design  Types Of Cloud Service  SaaS  Virtualization  PaaS  IaaS  CaaS  IDaaS  Comparison Of SaaS, PaaS, IaaS  The Pros and Cons Of Cloud  The Future Of Cloud
  • 3.  Cloud computing defines taking services and moving them outside an organizations firewall on shared systems.  Is a metaphor for the Internet.  Refer to Internet based development and services.  Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources  Access your data anytime and anywhere.
  • 4.  When we think of cloud computing, we come across the thought when it was invented.  It was a gradual evolution that started in the 1950s with mainframe computing.  After some time, around 1970, the concept of virtual machines (VMs) was created.  In the 1990s, telecommunications companies started offering virtualized private network connections.  In 21st century cloud computing came into existence.
  • 5. o Grid computing: Solving large problems with parallel computing. o Utility computing: Offering computing resources as a metered service. o SaaS: Network-based subscriptions to applications. o Cloud computing: Anytime, anywhere access to IT resources delivered dynamically as a service
  • 6.
  • 7.  The cloud follows some basic characteristics: RESOURCE SCALING ELASTICITY LESS COST HIGH SECURITY VIRTUALIZATIONHOMOGENITY HIGH SPEED RECOVERY BROAD ACCESS OF NETWORK
  • 8.  The four dimensions of the Cloud Cube Model are shown in Figure 1.2 and listed here:  • Physical location of the data: Internal (I) / External (E) determines your organization's boundaries.  • Ownership: Measure of not only the technology ownership, but of interoperability, ease of data transfer, and degree of vendor application lock-in.  • Security boundary: Perimeterised /De-perimiterised is a measure of whether the operation is inside or outside the security boundary or network firewall.  • Sourcing: In sourced or Outsourced means whether the service is provided by the customer or the service provider.
  • 9.
  • 10.  People are risk averse and loss averse.  People value what they own more than what they are given.  People favor things that are free.  People discount future risk and favor instant gratification.  People value what they own more than what they are given. Measuring cloud computing costs The cost of a cloud computing deployment is roughly estimated to be  CostCLOUD = Σ(UnitCostCLOUD x (Revenue – CostCLOUD))
  • 11. Clients can connect to a cloud service in a number of different ways. These are the two most common means: • A Web browser • A proprietary application There are three basic methods for securely connecting over a connection: • Use a secure protocol to transfer data such as SSL , FTPS or connect using a secure shell such as SSH to connect a client to the cloud. • Create a virtual connection using a virtual private network (VPN), or with a remote data transfer protocol such as Microsoft RDP or Citrix ICA, where the data is protected by a tunneling mechanism. • Encrypt the data so that even if the data is intercepted or sniffed, the data will not be meaningful.
  • 12. o If any cloud-computing system resource is difficult to plan for, it is network capacity. The three aspects of N/W capacity: o Network traffic to and from the network interface at the server, be it a physical or virtual interface or server o Network traffic from the cloud to the network interface o Network traffic from the cloud through your ISP to your local network interface. To measure network traffic at a server's network interface, you need to employ is known as a network monitor, which is a form of packet analyzer. Microsoft includes a utility called the Microsoft Network Monitor as part of its server utilities.
  • 13.  The 3 types of service are:  SaaS: Provides Applications.  PaaS: Deploy Customer Created Applications.  IaaS: Rent Processing , N/W Resources. Software as a Service(SaaS) Platform as a Service(PaaS) Infracture as a Service(IaaS)
  • 14.
  • 15.  Here I compare SaaS arch with marketing strategies:
  • 16.  The emergence of SaaS as an effective software-delivery mechanism creates an opportunity to change their focus from deploying and supporting applications to managing the services that those applications provide.  SaaS as a concept is often associated with the application service providers (ASPs) of the 1990s  A typical SaaS application is offered either directly by the vendor or by an intermediary party called an aggregator, which bundles SaaS offerings from different vendors and offers them as part of a unified application platform.
  • 17.  Managing the Risks of Software Acquisition  SaaS applications don't require the deployment of a large infrastructure at the client's location, which eliminates or drastically reduces the upfront commitment of resources.  Managing IT Focus  Testing and installing patches, managing upgrades, monitoring performance, ensuring high availability, and so forth—is handled by the provider.
  • 18.  The 4 levels of SaaS given below:  1st Level: Ad-Hoc/Custom – One Instance per customer  2nd Level: Configurable per customer  3rd Level: configurable & Multi-Tenant-Efficient  4th Level: Scalable, Configurable & Multi-Tenant- Efficient
  • 19.  SaaS applications are distinguished by their conceptual locations on three different continua.  Licensing: On-premise applications typically are licensed in perpetuity, with a single up-front cost for each user or owned outright. SaaS applications often are licensed with a usage- based transaction model, in which the customer is only billed for the number of service transactions used. In between is the familiar time-based subscription model, in which the customer pays a flat fee per seat for a particular time period and is allowed unlimited use of the service during that period.
  • 20.  Location: SaaS applications are installed at the SaaS hoster's location, while on-premise applications are, of course, installed within your own IT environment. In between is the appliance model, in which the vendor supplies a hardware/software component as a "black box" that is installed at your location, instead of the others.  Management: Traditionally, the IT department is responsible for providing IT service to users, which means being familiar with network, server, and application platforms, providing support and troubleshooting and resolving IT security, reliability, performance, and availability problems.
  • 21.  The model of SaaS continua is shown below :
  • 22.  Political considerations: Decision can be short-circuited by resistance within an organization, if people insist that certain functionality remain internal, under the control of IT.
  • 23.  Technical considerations: SaaS applications typically provide some flexibility for customer configuration, but this approach has its limitations. If an important application requires specialized technical knowledge to operate and support, or requires customization that a SaaS vendor cannot offer, it might not be possible to pursue a SaaS solution for the application.  Financial considerations: Consider the total cost of ownership (TCO) of a SaaS application, compared to that of an equivalent on-premise application.  Legal considerations: Some industries are subject to regulatory law in different parts of the world, which imposes various reporting and recordkeeping requirements that your potential SaaS solution candidates cannot satisfy. Consider the regulatory environments in all the different jurisdictions in which your organization operates and how they affect your application needs.
  • 24.  Interface with the infrastructure via the APIs.  Flexibility and elasticity  Pay as much as used and needed  Transparent to users and applications  Built on clusters of PC servers  CPU, storage, server capacity, load balancing, and databases
  • 25.  Cloud computing layers additional technologies such as self- service provisioning onto virtualization.  The VM role for Windows Azure is similar to other server roles. VMs on Windows Azure run a version of the Windows Server OS. The difference with the VM role is that you can create, and customize the server to meet your needs.  The end user has the same experience on a virtual machine as they would have on dedicated hardware.  Virtual machines do not require specialized hypervisor- specific hardware.
  • 26.
  • 27.  Reduce the data centre footprint.  Easier to create new machines, backup machines, etc…  Faster server provisioning.  Increase uptime.  Extend the life of older applications.  Help move things to the cloud.  Easy migration of virtual machines.  Debug problems.
  • 28.  Software that manipulates hardware, while cloud refers to a service that results from that manipulation.  It is a foundational element of cloud computing and helps deliver on the value of cloud computing.  A private cloud, in its own virtualized environment, gives users the best.  It Maximize resources, IT budget integration , Multiple systems.  This makes servers, workstations, storage and other systems independent of the physical hardware layer.
  • 29.  Cloud is used most because:  Agility improves with users,  Cost reductions  Security,performace and productivity.  Multitenancy enables sharing of resources and costs across a large pool of users.  Reliability improves with the use of multiple redundant sites.  Control of data, and service parameters.
  • 30.
  • 31.  Amazon- Amazon always excelled at delivering computing capacity at a large scale to its own employees and to consumers.  Enomaly- Software that integrates enterprise data centers with commercial cloud computing offerings.  Google- Google Apps was the company's attempt to branch out beyond the consumer search market and become a player in the enterprise.  Microsoft- Microsoft made its name by developing the operating system for home and work computers. But with all forms of applications moving to the Web-hosted model.
  • 32.
  • 33.
  • 34.  Cloud storage is a model of data storage where the digital data is stored in logical pools.  Based on highly virtualized infrastructure and is like broader cloud computing in terms of accessible interfaces.  This typically refers to a hosted object storage service, but the term has broadened to include other types of data storage that are now available as a service, like block storage.
  • 35.  It has loads of different distributed resources.  It reduces the fault occurs during the process.  Durability is great.  Allows Word and Excel documents to be edited directly from your browser.  Provides users with immediate access to a broad range of resources.  Storage availability and data protection is intrinsic to object.
  • 36.  Amazon Elastic Compute Cloud (EC2): ◦ Elastic, marshal 1 to 100+ PCs via WS,Fairly cheap!  Powered by Xen – a Virtual Machine: ◦ Different from Vm’ware and VPC as uses “para- virtualization” where the guest OS is modified to use hyper- calls ◦ Hardware contributions by Intel and AMD (AMD-V). ◦ Supports “Live Migration” of a virtual machine between hosts.  Linux, Windows, OpenSolaris  Management Console/AP
  • 37.  Infrastructure as a service (IaaS) is a type of cloud computing in which a third-party provider hosts virtualized computing resources over the Internet.  This offer highly scalable resources that can be adjusted on- demand.  IaaS customers pay on a per-use basis, typically by the hour, week or month. Some providers also charge customers based on the amount of virtual machine space they use.  Leading IaaS providers include Amazon Web Services (AWS), Windows Azure, Google Compute Engine, Rackspace Open Cloud, and IBM Smart Cloud Enterprise.
  • 38.  The structure of Info as a service is given below:
  • 39.
  • 40.  Scalability  No single point of failure  Physical security of data centre locations  Reduces TCO (Total Cost of Ownership)  Flexible offering  Location independence
  • 41. • On-demand self-service: A consumer can unilaterally provision computing capabilities, such as compute time, n/w connectivity and storage, as needed automatically without requiring human interaction. • Broad network access • Resource pooling: Examples of computing resources include storage, processing (compute), memory, network bandwidth, and virtual machines.  Rapid elasticity: To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. 
  • 42.  Private cloud: The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.  Community cloud: The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy). It may be managed by the organizations or a third party and may exist on premise or off premise.  Public cloud: The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.  Hybrid cloud: The cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
  • 43.  Pros:  High degree of control over facilities.  Guaranteed capacity and easier expansion planning.  Potential for greater power efficiency through specialization.  Easier security management with a single-tenant facility.  Cons:  Limited geographic expansion abilities.  More limited connectivity options.  Tendency to run lower-tier facilities.  Distracting to the core business.  Very capital intensive.
  • 44.  The ultimate goal of a PaaS is to make it easier for you to run your website or web application no matter how much traffic it gets.  A platform as a service should handle scaling seamlessly for you so you can just focus on your website and the code running it.  As a programmer, you leverage pre-existing code rather than starting from scratch and writing everything.  The most well-known software platforms for desktop software are Windows and Mac OS.
  • 45.
  • 46.
  • 47. • A platform may even provide a way to accomplish things that would otherwise not be possible at all. • Additional features such as email distribution lists, contact form handler and other tools that make it easier to run a website are part of almost every hosting service. • Web platforms today provide a significant level of automation, control, and tools. • Hosting layer is analogous to desktop computer hardware and the platform layer is analogous to a desktop operating system.
  • 48.  There is always a conflict between the developers and the System Engineers.  Developers are keen on getting their environments up without waiting.  System Engineers care about performance and stability.  Creates a peaceful environment for both parties.
  • 49.
  • 50.  PaaS is a category of cloud computing services that provides a platform allowing customers to develop, run and manage Web applications without the complexity of building and maintaining the infrastructure.  Public PaaS: Derived from software as a service(SaaS), and is situated in cloud computing between SaaS and infrastructure as a service (IaaS).  Mobile PaaS: Initiated in 2012, mobile PaaS (mPaaS) provides development capabilities for mobile app designers and developers.
  • 51. Public PaaS providers and private PaaS vendors include:  Active State  AWS Elastic Beanstalk  Cloud Foundry  Engine Yard  Google App Engine  Microsoft Azure Web Sites  Oracle  Pivotal Software  Red Hat  Wave Maker
  • 52. Pros:  Automatic Updates.  Decreased Costs.  Teams Can Collaborate From A far.  Assured Compatibility. Cons:  Limited Scalability.  Lock-In.
  • 53.  The establishment and proof of an identity is a central network function.  An identity is a set of characteristics or traits that make something recognizable or known.  To establish your identity on a network, you might be asked to provide a name and password, which is called a single-factor authentication method.  Identity protection is one of the more expensive and complex areas of network computing.  Identity as a Service provides an easy mechanism for integrating identity services into individual applications with minimal development effort, by allowing the identification logic and storage of an identity's attributes to be maintained externally.
  • 54.  Compliance as a Service (CaaS) appears in discussions, few examples of this kind of service exist as a general product for a cloud computing architecture.  A Compliance as a Service application would need to serve as a trusted third party, because this is a man-in-the-middle type of service.  CaaS may need to be architected as its own layer of a SOA architecture in order to be trusted.  A CaaS would need to be able to manage cloud relationships, understand security policies and procedures, know how to handle information and privacy, be aware of geography, provide an response and allow for the system to be queried.
  • 55.
  • 56.
  • 57.  Limit flexibility and innovation.  Issues relating to policy and access.  Enables services to be used without any understanding of their infrastructure.  Performance and Bandwidth Cost.  Interoperability and Portability.  Reduced time for implementation.  Disaster recovery.
  • 58. PROS:  Improved performance.  Reduced costs.  Almost Unlimited Storage.  Backup and Recovery. CONS:  Requires a constant Internet connection.  Features might be limited.  Very Slow.
  • 59.  Grid Computing was the last research-led centralised approach.  More application availability on the cloud.  More hybrid cloud adoption.  Increased development for the cloud.  The research findings provide some surprising and useful insights into what current and potential users see as the most important benefits of cloud technologies.