SlideShare a Scribd company logo
1 of 68
CCS335 – CLOUD COMPUTING
1. CLOUD ARCHITECTURE MODELS AND INFRASTRUCTURE
SYSTEM MODELS FOR DISTRIBUTED AND CLOUD
COMPUTING
Distributed and Cloud computing systems :
o Built over a large number of autonomous computer nodes.
o Interconnected by SANs, LANs, or WANs in a hierarchical manner.
o LAN switches - connect hundreds of machines as a working cluster.
o WAN - connect many local clusters to form a very large cluster of clusters.
• A massive system with millions of computers connected to edge networks can be
build in this way.
• Massive systems are considered highly scalable, and can reach web-scale
connectivity - physically or logically.
SYSTEM MODELS FOR DISTRIBUTED AND CLOUD COMPUTING
• Clusters of Cooperative Computers
• Peer-to-Peer Networks
• Grid Computing
• Cloud Computing over the Internet
Cluster Computing
• Clustering means that multiple servers are grouped together to achieve the same
service.
• The cluster is connected to the internet via a virtual private network (VPN)
gateway. The gateway IP address locate the cluster.
• A cluster computing consists of interconnected stand-alone computers which
work cooperatively as a single integrated computing resource.
• In the past, clustered computer systems have demonstrated impressive results in
handling heavy workloads with large data sets.
Cluster Architecture
• The architecture of a typical server cluster built around a low-latency, high bandwidth interconnection network. This
network can be as simple as a SAN (e.g., Myrinet) or a LAN (e.g., Ethernet).
• To build a larger cluster with more nodes, the interconnection network can be built with multiple levels of Gigabit
Ethernet, or InfiniBand switches.
• Through hierarchical construction using a SAN, LAN, or WAN, one can build scalable clusters with an increasing
number of nodes. The cluster is connected to the Internet via a virtual private network (VPN) gateway.
• The gateway IP address locates the cluster. The system image of a computer is decided by the way the OS manages
the shared cluster resources.
• Most clusters have loosely coupled node computers. All resources of a server node are managed by their own OS. Thus,
most clusters have multiple system images as a result of having many autonomous nodes under different OS control.
Cluster Computing
Single System Image (SSI):
• An ideal cluster should merge multiple system images into a single-
system image.
• A cluster operating system or some middleware is required to
support SSI at various levels, including the sharing of CPUs,
memory, and I/O across all cluster nodes.
• SSI illusion created by software or hardware that presents a
collection of resources as one integrated, powerful resource.
• SSI makes the cluster appear like a single machine to the user.
• A cluster with multiple system images is nothing but a collection of
independent computers.
Cluster Computing
Hardware, Software, and Middleware Support:
• Hardware:
o PCs, workstations, servers, or
o SMP
• Software:
o Special communication software such as PVM or MPI
o Network interface card in each computer node
o Most clusters run under the Linux OS.
o The computer nodes are interconnected by a high-bandwidth network (such as
Gigabit Ethernet, Myrinet, InfiniBand, etc.).
• Middleware:
o Special cluster middleware supports are needed to create SSI.
Advantages of Cluster Computing
1.High Performance
2.Easy to manage
3.Scalable
4.Expandability
5.Availability
6.Flexibility
7.Cost-effectiveness
8.Distributed applications
Disadvantages of Cluster Computing
1.High cost.
2.The problem is finding the fault.
3.More space is needed.
4.The increased infrastructure is needed.
5.In distributed systems, it is challenging to provide adequate security because
both the nodes and the connections must be protected.
Applications of Cluster Computing
1.In many web applications functionalities such as Security, Search Engines,
Database servers, web servers, proxy, and email.
2.It is flexible to allocate work as small data tasks for processing.
3.Assist and help to solve complex computational problems.
4.Cluster computing can be used in weather modeling.
5.Earthquake, Nuclear, Simulation, and tornado forecast.
Grid Computing
• Grid Computing is a subset of distributed computing.
• In grid computing, the subgroup consists of distributed systems, which are often
set up as a network of computer systems, each system can belong to a different
administrative domain and can differ greatly in terms of hardware, software, and
implementation network technology.
• The different department has different computer with different OS to make the
control node present which helps different computer with different OS to
communicate with each other and transfer messages to work.
Grid Computing
Grid Computing Infrastructures
• An infrastructure that couples computers, software/middleware, special instruments, and people and sensors together.
• Constructed across LAN, WAN, or Internet backbone networks at a regional, national, or global scale.
• Mainly uses workstations, servers, clusters, and supercomputers.
• Personal computers, laptops, and PDAs can be used as access devices to a grid system.
• Enterprises or organizations present grids as integrated computing resources
• Computational grid built over multiple resource sites owned by different organizations.
• The resource sites offer complementary computing resources, including workstations, large servers, a mesh of processors, and
Linux clusters to satisfy a chain of computational needs.
• The grid is built across various IP broadband networks including LANs and WANs already used by enterprises or organizations over
the Internet.
• Industrial grid platform development by IBM, Microsoft, Sun, HP, Dell, Cisco
Advantages of Grid Computing
1.Can solve bigger and more complex problems in a shorter time frame.
Easier collaboration with other organizations and better use of existing
equipment.
2.Existing hardware is used to the fullest.
3.Collaboration with organizations made easier
Disadvantages of Grid Computing
1.Grid software and standards continue to evolve.
2.Getting started learning curve.
3.Non-interactive job submission.
4.You may need a fast connection between computer resources.
5.Licensing on many servers can be prohibitive for some applications.
Peer To Peer Network (P2P)
• Peer to Peer network is group of computers each of which acts as a node for
sharing files within the group.
• It allows people to share the files with each other without the need of centralized
server.
• The P2P architecture offers a distributed model of networked systems.
• A P2P network is client-oriented instead of server-oriented.
• P2P systems are introduced at the physical level and overlay networks at the
logical levels
Peer To Peer Computing (P2P)
• P2P Systems:
• Every node acts as both a client and a server, providing part of the system
resources.
• Peer machines client computers connected to the Internet.
• All client machines act autonomously to join or leave the system freely.
• No master-slave relationship exists among the peers.
• No central coordination or central database is needed.
• No peer machine has a global view of the entire P2P system.
• The system is self-organizing with distributed control.
Peer To Peer Computing (P2P)
• Physical Network:
• The participating peers form the physical network at any time.
• Unlike the cluster or grid, a P2P network does not use a dedicated
interconnection network.
• The physical network is simply an ad hoc network formed at various Internet
domains randomly using the TCP/IP and NAI protocols
Peer To Peer Computing (P2P)
• Overlay Network
• Based on communication or file-sharing needs, the peer IDs form an overlay network at the logical level.
• This overlay is a virtual network formed by mapping each physical machine with its ID, logically, through a
virtual mapping .
• When a new peer joins the system, its peer ID is added as a node in the overlay network and is removed
from the overlay network automatically when it leaves.
• Therefore, it is the P2P overlay network that characterizes the logical connectivity among the peers.
• Two types of overlay networks:
o unstructured and structured
• An unstructured overlay network is characterized by a random graph.
• There is no fixed route to send messages or files among the nodes.
• Often, flooding is applied to send a query to all nodes in an unstructured overlay, thus resulting in heavy
network traffic and nondeterministic search results.
• Structured overlay networks follow certain connectivity topology and rules for inserting and removing
nodes (peer IDs) from the overlay graph
Cloud Computing Over Internet
• Definition of Cloud Computing by IBM:
• A cloud is a pool of virtualized computer resources. A cloud can host a variety of different
workloads, including batch-style backend jobs and interactive and user- facing applications
• i.e. a cloud allows workloads to be deployed and scaled out quickly through rapid
provisioning of virtual or physical machines.
• The cloud supports redundant, self-recovering, highly scalable programming models that
allow workloads to recover from many unavoidable hardware/software failures.
• Finally, the cloud system should be able to monitor resource use in real time to enable
rebalancing of allocations when needed.
NIST CLOUD REFERENCE ARCHITECTURE
• Cloud Computing Definition
• Cloud refers to server that are accessed over the internet
• It is the on-demand availability of computer system resources especially data storage and
computing power without direct active management by the user.
• A model of computation and data storage based on “pay as you go” access to “unlimited” remote data
center capabilities.
• A cloud infrastructure provides a framework to manage scalable, reliable, on-demand access to applications.
NIST Cloud Definition
• The National Institute of Standards and Technology (NIST) defines
cloud computing as a
CLOUD REFERENCE ARCHITECTURE
The NIST cloud computing reference architecture defines five major
actors:
• cloud consumer
• cloud provider
• cloud carrier
• cloud auditor
• cloud broker
Each actor is an entity (a person or an organization) that participates in a
transaction or process and/or performs tasks in cloud computing.
Cloud Reference Model
Actors in Cloud Computing
Interaction Between Actors
Example Usage Scenario 1
• A cloud consumer may request service from a cloud broker instead of
contacting a cloud provider directly.
• The cloud broker may create a new service by combining multiple
services or by enhancing an existing service.
• In this example, the actual cloud providers are invisible to the cloud
consumer and the cloud consumer interacts directly with the cloud
broker.
Example Usage Scenario 2
• Cloud carriers provide the connectivity and transport of cloud services
from cloud providers to cloud consumers.
• A cloud provider participates in and arranges for two unique service level
agreements (SLAs), one with a cloud carrier (e.g. SLA2) and one with a
cloud consumer (e.g. SLA1).
• A cloud provider arranges service level agreements (SLAs) with a cloud
carrier and may request dedicated and encrypted connections to ensure
the cloud services are consumed at a consistent level according to the
contractual obligations with the cloud consumers.
• In this case, the provider may specify its requirements on capability,
flexibility and functionality in SLA2 in order to provide essential
requirements in SLA1.
Example Usage Scenario 2
Example Usage Scenario 3:
• For a cloud service, a cloud auditor conducts independent
assessments of the operation and security of the cloud service
implementation. The audit may involve interactions with both the
Cloud Consumer and the Cloud Provider.
Cloud Consumer
• The cloud consumer is the principal stakeholder for the cloud
computing service.
• A cloud consumer represents a person or organization that maintains
a business relationship with, and uses the service from a cloud
provider.
• Cloud consumers need SLAs to specify the technical performance
requirements fulfilled by a cloud provider.
• SLAs can cover terms regarding the quality of service, security,
remedies for performance failures.
Example Services Available to a Cloud Consumer
Cloud Services in Cloud Consumer
• The consumers of SaaS can be organizations that provide their
members with access to software applications, end users who directly
use software applications, or software application administrators who
configure applications for end users.
• Cloud consumers of PaaS can employ the tools and execution
resources provided by cloud providers to develop, test, deploy and
manage the applications hosted in a cloud environment.
• Consumers of IaaS have access to virtual computers, network-
accessible storage, network infrastructure components, and other
fundamental computing resources on which they can deploy and run
arbitrary software.
Cloud Provider
• A cloud provider is a person, an organization; it is the entity
responsible for making a service available to interested parties.
• A Cloud Provider acquires and manages the computing infrastructure
required for providing the services, runs the cloud software that
provides the services, and makes arrangement to deliver the cloud
services to the Cloud Consumers through network access
5 Major Activities of Cloud Provider
Cloud Service on Cloud Provider
• For Software as a Service, the cloud provider deploys, configures, maintains and
updates the operation of the software applications on a cloud infrastructure so
that the services are provisioned at the expected service levels to cloud
consumers.
• The provider of SaaS assumes most of the responsibilities in managing and
controlling the applications and the infrastructure, while the cloud consumers
have limited administrative control of the applications.
• For PaaS, the Cloud Provider manages the computing infrastructure for the
platform and runs the cloud software that provides the components of the
platform, such as runtime software execution stack, databases, and other
middleware components.
• For IaaS, the Cloud Provider acquires the physical computing resources
underlying the service, including the servers, networks, storage and hosting
infrastructure
Cloud Auditor
• A cloud auditor is a party that can perform an independent
examination of cloud service controls with the intent to express an
opinion thereon.
• A cloud auditor can evaluate the services provided by a cloud
provider in terms of security controls, privacy impact, performance,
etc.
Cloud Broker
• As cloud computing evolves, the integration of cloud services can be
too complex for cloud consumers to manage.
• A cloud consumer may request cloud services from a cloud broker,
instead of contacting a cloud provider directly.
• A cloud broker is an entity that manages the use, performance and
delivery of cloud services and negotiates relationships between cloud
providers and cloud consumers.
Categories of Cloud Broker
• A cloud broker can provide services in three categories
• Service Intermediation: A cloud broker enhances a given service by improving some
specific capability and providing value-added services to cloud consumers. The
improvement can be managing access to cloud services, identity management,
performance reporting, enhanced security, etc.
• Service Aggregation: A cloud broker combines and integrates multiple services into
one or more new services. The broker provides data integration and ensures the
secure data movement between the cloud consumer and multiple cloud providers.
• Service Arbitrage: Service arbitrage is similar to service aggregation except that the
services being aggregated are not fixed. Service arbitrage means a broker has the
flexibility to choose services from multiple agencies. The cloud broker, for example,
can use a credit-scoring service to measure and select an agency with the best score.
Cloud Carrier
• A cloud carrier acts as an intermediary that provides connectivity and
transport of cloud services between cloud consumers and cloud
providers. Cloud carriers provide access to consumers through
network, telecommunication and other access devices.
• For example, cloud consumers can obtain cloud services through
network access devices, such as computers, laptops, mobile phones,
mobile Internet devices (MIDs), etc.
Scope of Control between Provider and Consumer
• The Cloud Provider and Cloud Consumer share the control of
resources in a cloud system.
• Different service models affect an organization’s control over the
computational resources and thus what can be done in a cloud
system
Scope of Control between Provider and
Consumer
Scope of Control between Provider and
Consumer
• The application layer includes software applications targeted at end users or
programs. The applications are used by SaaS consumers, or installed/managed/
maintained by PaaS consumers, IaaS consumers, and SaaS providers.
• The middleware layer provides software building blocks (e.g., libraries, database,
and Java virtual machine) for developing application software in the cloud. The
middleware is used by PaaS consumers, installed/managed/maintained by IaaS
consumers or PaaS providers, and hidden from SaaS consumers.
• The OS layer includes operating system and drivers, and is hidden from SaaS
consumers and PaaS consumers. An IaaS cloud allows one or multiple guest OS‟s
to run virtualized on a single physical host. Generally, consumers have broad
freedom to choose which OS to be hosted among all the OS‟s that could be
supported by the cloud provider. The IaaS consumers should assume full
responsibility for the guest OS‟s, while the IaaS provider controls the host OS.
Architecture
• Architecture consists of 3 tiers
◦ Cloud Deployment Model
◦ Cloud Service Model
◦ Essential Characteristics of Cloud Computing .
Cloud Computing Architecture
Essential Characteristics 1
• On-demand self-service.
◦ A consumer can unilaterally provision computing capabilities such as server
time and network storage as needed automatically, without requiring human
interaction with a service provider
Essential Characteristics 2
• Broad network access.
◦ Capabilities are available over the network and accessed through standard
mechanisms that promote use by heterogeneous thin or thick client platforms
(e.g., mobile phones, laptops, and PDAs) as well as other traditional or cloud-
based software services.
Essential Characteristics 3
• Resource pooling.
◦ The provider’s computing resources are pooled to serve multiple consumers
using a multi-tenant model, with different physical and virtual resources
dynamically assigned and reassigned according to consumer demand.
Essential Characteristics 4
• Rapid elasticity.
◦ Capabilities can be rapidly and elastically provisioned - in some cases
automatically - to quickly scale out; and rapidly released to quickly scale in.
◦ To the consumer, the capabilities available for provisioning often appear to be
unlimited and can be purchased in any quantity at any time.
Essential Characteristics 5
• Measured service.
o Cloud systems automatically control and optimize resource usage by
leveraging a metering capability at some level of abstraction appropriate to
the type of service.
oResource usage can be monitored, controlled, and reported - providing
transparency for both the provider and consumer of the service.
Cloud Service Models
 Cloud Software as a Service (SaaS)
 Cloud Platform as a Service (PaaS)
 Cloud Infrastructure as a Service (IaaS)
Cloud Service Model Architecture
Software as a Service (SaaS)
• Required network is provided.
• Customers do not invest on software application programs
• The applications are accessible from various client devices through a thin client interface
such as a web browser (e.g., web-based email).
• The consumer does not manage or control the underlying cloud infrastructure including
network, servers, operating systems, storage, data or even individual application
capabilities, with the possible exception of limited user specific application configuration
settings.
• Usually multi tenant environment
• Highly scalable architecture
SaaS providers
 Google’s Gmail, Docs, Google Drive
 Youtube , Netflix, Prime video
 Microsoft’s Hotmail, Sharepoint
 SalesForce
 Yahoo, Facebook
Infrastructure as a Service (IaaS)
• Application, Operating System & network is provided.
• IaaS is the delivery of technology infrastructure (mostly hardware) as an on demand, scalable service
• Usually billed based on usage
• Usually, multi-tenant virtualized environment
• Can be coupled with Managed Services for OS and application support
• User can choose his OS, storage, deployed app, networking components
• Consumer is able to deploy and run arbitrary software, which may include operating systems and
applications.
• The consumer does not manage or control the underlying cloud infrastructure but has control over
operating systems, storage, deployed applications, and possibly limited control of select networking
components (e.g., host firewalls).
IaaS providers
 Amazon Elastic Compute Cloud (EC2) - Each instance provides 1-20 processors, upto 16 GB RAM,
1.69TB storage
 RackSpace Hosting - Each instance provides 4 core CPU, upto 8 GB RAM, 480 GB storage
 Joyent Cloud-◦ Each instance provides 8 CPUs, upto 32 GB RAM, 48 GB storage
 Go Grid - Each instance provides 1-6 processors, upto 15 GB RAM, 1.69TB storage
Platform as a Service (PaaS)
• Application & network is provided
• PaaS provides all of the facilities required to support the complete life cycle of building, delivering and
deploying web applications and services entirely from the Internet.
• applications must be developed with a particular platform in mind
• Multi-tenant environments
• Highly scalable multi-tier architecture
• The capability provided to the consumer is to deploy onto the cloud infrastructure consumer created
or acquired applications created using programming languages and tools supported by the provider.
• The consumer does not manage or control the underlying cloud infrastructure including network,
servers, operating systems, or storage, but has control over the deployed applications and possibly
application hosting environment configurations.
PaaS providers
 Google App Engine - Python, Java, Eclipse
 Microsoft Azure - .Net, Visual Studio
 Sales Force - Apex, Web wizard
 VMware
Cloud Deployment Model
• It works as your virtual computing environment with a choice of deployment
model depending on how much data you want to store and who has access to the
Infrastructure
Types of Deployment Model
 Public Cloud
 Private Cloud
 Hybrid Cloud
 Community Cloud
Public Cloud
• The Public Cloud allows systems and services to be easily accessible to the general public. Public cloud may
be less secure because of its openness, e.g., e-mail, Microsoft Azure, AWS, Google Cloud etc.
• Benefits of Public Cloud
o Minimal Investment - As a pay-per-use service, there is no large upfront cost and is ideal for businesses who need quick
access to resources
o No Hardware Setup - The cloud service providers fully fund the entire Infrastructure
o No Infrastructure Management - This does not require an in-house team to utilize the public cloud.
• Limitations of Public Cloud
o Data Security and Privacy Concerns - Since it is accessible to all, it does not fully protect against cyber-attacks and could
lead to vulnerabilities.
o Service/License Limitation - While there are many resources you can exchange with tenants, there is a usage cap.
Public Cloud
Private Cloud
• The Private Cloud allows systems and services to be accessible within an organization. It offers increased security because of its
private nature
• Benefits of Private Cloud
o Data Privacy - It is ideal for storing corporate data where only authorized personnel gets access
o Security - Segmentation of resources within the same Infrastructure can help with better access and higher levels of security.
o Supports Legacy Systems - This model supports legacy systems that cannot access the public cloud.
• Limitations of Private Cloud
o Higher Cost - With the benefits you get, the investment will also be larger than the public cloud. Here, you will pay for software,
hardware, and resources for staff and training.
o Fixed Scalability - The hardware you choose will accordingly help you scale in a certain direction
o High Maintenance - Since it is managed in-house, the maintenance costs also increase.
Community Cloud
• The Community Cloud allows systems and services to be accessible by group of organizations.
• Benefits of Community Cloud
o Smaller Investment - A community cloud is much cheaper than the private & public cloud and
provides great performance
o Setup Benefits - The protocols and configuration of a community cloud must align with industry
standards, allowing customers to work much more efficiently.
• Limitations of Community Cloud
o Shared Resources - Due to restricted bandwidth and storage capacity, community resources
often pose challenges.
• Not as Popular - Since this is a recently introduced model, it is not that popular or available across
industries
Community Cloud
Hybrid Cloud
• The Hybrid Cloud is mixture of public and private cloud. However, the critical activities are performed using private
cloud while the non- critical activities are performed using public cloud.
• Benefits of Hybrid Cloud
o Cost-Effectiveness - The overall cost of a hybrid solution decreases since it majorly uses the public cloud to store
data.
o Security - Since data is properly segmented, the chances of data theft from attackers are significantly reduced.
o Flexibility - With higher levels of flexibility, businesses can create custom solutions that fit their exact
requirements
• Limitations of Hybrid Cloud
 Complexity - It is complex setting up a hybrid cloud since it needs to integrate two or more cloud architectures
 Specific Use Case - This model makes more sense for organizations that have multiple use cases or need to
separate critical and sensitive data
Hybrid Cloud
THANK YOU

More Related Content

What's hot

Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud ComputingPooja Sharma
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systemsvampugani
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud ComputingJithin Parakka
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource ManagementNASIRSAYYED4
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesAbdelkhalik Mosa
 
Cloud computing information management
Cloud computing   information managementCloud computing   information management
Cloud computing information managementHallmark B-school
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualizationGokulnath S
 
Cloud computing notes
Cloud computing notesCloud computing notes
Cloud computing notesSrinivasa Rao
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology Ravindra Dastikop
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperabilitygaurav jain
 

What's hot (20)

Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Unit 4
Unit 4Unit 4
Unit 4
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud Computing
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
Cloud computing information management
Cloud computing   information managementCloud computing   information management
Cloud computing information management
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
 
Cloud Computing & Distributed Computing
Cloud Computing & Distributed ComputingCloud Computing & Distributed Computing
Cloud Computing & Distributed Computing
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
Cloud computing notes
Cloud computing notesCloud computing notes
Cloud computing notes
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 
Cloud interoperability
Cloud interoperabilityCloud interoperability
Cloud interoperability
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 

Similar to CCS335 – CLOUD COMPUTING.pptx

CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureNiviV4
 
An Introduction to Cloud Computing and Lates Developments.ppt
An Introduction to Cloud Computing and Lates Developments.pptAn Introduction to Cloud Computing and Lates Developments.ppt
An Introduction to Cloud Computing and Lates Developments.pptHarshalUbale2
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Materialpkaviya
 
01Introduction to Cloud Computing .pptx
01Introduction to Cloud Computing  .pptx01Introduction to Cloud Computing  .pptx
01Introduction to Cloud Computing .pptxssuser586772
 
introduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfintroduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfsnehan789
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdfNehaam3
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfkhan593595
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfkhan593595
 
Cluster Technique used in Advanced Computer Architecture.pptx
Cluster Technique used in Advanced Computer Architecture.pptxCluster Technique used in Advanced Computer Architecture.pptx
Cluster Technique used in Advanced Computer Architecture.pptxtiwarirajan1
 
Cloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxCloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxatul190389
 

Similar to CCS335 – CLOUD COMPUTING.pptx (20)

CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
 
CCUnit1.pdf
CCUnit1.pdfCCUnit1.pdf
CCUnit1.pdf
 
Types of computing
Types of computingTypes of computing
Types of computing
 
An Introduction to Cloud Computing and Lates Developments.ppt
An Introduction to Cloud Computing and Lates Developments.pptAn Introduction to Cloud Computing and Lates Developments.ppt
An Introduction to Cloud Computing and Lates Developments.ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
OIT552 Cloud Computing Material
OIT552 Cloud Computing MaterialOIT552 Cloud Computing Material
OIT552 Cloud Computing Material
 
01Introduction to Cloud Computing .pptx
01Introduction to Cloud Computing  .pptx01Introduction to Cloud Computing  .pptx
01Introduction to Cloud Computing .pptx
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
introduction to cloud computing for college.pdf
introduction to cloud computing for college.pdfintroduction to cloud computing for college.pdf
introduction to cloud computing for college.pdf
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
cloudcomputing.pptx
cloudcomputing.pptxcloudcomputing.pptx
cloudcomputing.pptx
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
cluster computing
cluster computingcluster computing
cluster computing
 
Dbms
DbmsDbms
Dbms
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Cloud computing_Final
Cloud computing_FinalCloud computing_Final
Cloud computing_Final
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cluster Technique used in Advanced Computer Architecture.pptx
Cluster Technique used in Advanced Computer Architecture.pptxCluster Technique used in Advanced Computer Architecture.pptx
Cluster Technique used in Advanced Computer Architecture.pptx
 
Cloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxCloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptx
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 

CCS335 – CLOUD COMPUTING.pptx

  • 1. CCS335 – CLOUD COMPUTING 1. CLOUD ARCHITECTURE MODELS AND INFRASTRUCTURE
  • 2. SYSTEM MODELS FOR DISTRIBUTED AND CLOUD COMPUTING Distributed and Cloud computing systems : o Built over a large number of autonomous computer nodes. o Interconnected by SANs, LANs, or WANs in a hierarchical manner. o LAN switches - connect hundreds of machines as a working cluster. o WAN - connect many local clusters to form a very large cluster of clusters. • A massive system with millions of computers connected to edge networks can be build in this way. • Massive systems are considered highly scalable, and can reach web-scale connectivity - physically or logically.
  • 3. SYSTEM MODELS FOR DISTRIBUTED AND CLOUD COMPUTING • Clusters of Cooperative Computers • Peer-to-Peer Networks • Grid Computing • Cloud Computing over the Internet
  • 4. Cluster Computing • Clustering means that multiple servers are grouped together to achieve the same service. • The cluster is connected to the internet via a virtual private network (VPN) gateway. The gateway IP address locate the cluster. • A cluster computing consists of interconnected stand-alone computers which work cooperatively as a single integrated computing resource. • In the past, clustered computer systems have demonstrated impressive results in handling heavy workloads with large data sets.
  • 5. Cluster Architecture • The architecture of a typical server cluster built around a low-latency, high bandwidth interconnection network. This network can be as simple as a SAN (e.g., Myrinet) or a LAN (e.g., Ethernet). • To build a larger cluster with more nodes, the interconnection network can be built with multiple levels of Gigabit Ethernet, or InfiniBand switches. • Through hierarchical construction using a SAN, LAN, or WAN, one can build scalable clusters with an increasing number of nodes. The cluster is connected to the Internet via a virtual private network (VPN) gateway. • The gateway IP address locates the cluster. The system image of a computer is decided by the way the OS manages the shared cluster resources. • Most clusters have loosely coupled node computers. All resources of a server node are managed by their own OS. Thus, most clusters have multiple system images as a result of having many autonomous nodes under different OS control.
  • 6. Cluster Computing Single System Image (SSI): • An ideal cluster should merge multiple system images into a single- system image. • A cluster operating system or some middleware is required to support SSI at various levels, including the sharing of CPUs, memory, and I/O across all cluster nodes. • SSI illusion created by software or hardware that presents a collection of resources as one integrated, powerful resource. • SSI makes the cluster appear like a single machine to the user. • A cluster with multiple system images is nothing but a collection of independent computers.
  • 7. Cluster Computing Hardware, Software, and Middleware Support: • Hardware: o PCs, workstations, servers, or o SMP • Software: o Special communication software such as PVM or MPI o Network interface card in each computer node o Most clusters run under the Linux OS. o The computer nodes are interconnected by a high-bandwidth network (such as Gigabit Ethernet, Myrinet, InfiniBand, etc.). • Middleware: o Special cluster middleware supports are needed to create SSI.
  • 8. Advantages of Cluster Computing 1.High Performance 2.Easy to manage 3.Scalable 4.Expandability 5.Availability 6.Flexibility 7.Cost-effectiveness 8.Distributed applications
  • 9. Disadvantages of Cluster Computing 1.High cost. 2.The problem is finding the fault. 3.More space is needed. 4.The increased infrastructure is needed. 5.In distributed systems, it is challenging to provide adequate security because both the nodes and the connections must be protected.
  • 10. Applications of Cluster Computing 1.In many web applications functionalities such as Security, Search Engines, Database servers, web servers, proxy, and email. 2.It is flexible to allocate work as small data tasks for processing. 3.Assist and help to solve complex computational problems. 4.Cluster computing can be used in weather modeling. 5.Earthquake, Nuclear, Simulation, and tornado forecast.
  • 11. Grid Computing • Grid Computing is a subset of distributed computing. • In grid computing, the subgroup consists of distributed systems, which are often set up as a network of computer systems, each system can belong to a different administrative domain and can differ greatly in terms of hardware, software, and implementation network technology. • The different department has different computer with different OS to make the control node present which helps different computer with different OS to communicate with each other and transfer messages to work.
  • 13. Grid Computing Infrastructures • An infrastructure that couples computers, software/middleware, special instruments, and people and sensors together. • Constructed across LAN, WAN, or Internet backbone networks at a regional, national, or global scale. • Mainly uses workstations, servers, clusters, and supercomputers. • Personal computers, laptops, and PDAs can be used as access devices to a grid system. • Enterprises or organizations present grids as integrated computing resources • Computational grid built over multiple resource sites owned by different organizations. • The resource sites offer complementary computing resources, including workstations, large servers, a mesh of processors, and Linux clusters to satisfy a chain of computational needs. • The grid is built across various IP broadband networks including LANs and WANs already used by enterprises or organizations over the Internet. • Industrial grid platform development by IBM, Microsoft, Sun, HP, Dell, Cisco
  • 14. Advantages of Grid Computing 1.Can solve bigger and more complex problems in a shorter time frame. Easier collaboration with other organizations and better use of existing equipment. 2.Existing hardware is used to the fullest. 3.Collaboration with organizations made easier
  • 15. Disadvantages of Grid Computing 1.Grid software and standards continue to evolve. 2.Getting started learning curve. 3.Non-interactive job submission. 4.You may need a fast connection between computer resources. 5.Licensing on many servers can be prohibitive for some applications.
  • 16. Peer To Peer Network (P2P) • Peer to Peer network is group of computers each of which acts as a node for sharing files within the group. • It allows people to share the files with each other without the need of centralized server. • The P2P architecture offers a distributed model of networked systems. • A P2P network is client-oriented instead of server-oriented. • P2P systems are introduced at the physical level and overlay networks at the logical levels
  • 17. Peer To Peer Computing (P2P) • P2P Systems: • Every node acts as both a client and a server, providing part of the system resources. • Peer machines client computers connected to the Internet. • All client machines act autonomously to join or leave the system freely. • No master-slave relationship exists among the peers. • No central coordination or central database is needed. • No peer machine has a global view of the entire P2P system. • The system is self-organizing with distributed control.
  • 18. Peer To Peer Computing (P2P) • Physical Network: • The participating peers form the physical network at any time. • Unlike the cluster or grid, a P2P network does not use a dedicated interconnection network. • The physical network is simply an ad hoc network formed at various Internet domains randomly using the TCP/IP and NAI protocols
  • 19. Peer To Peer Computing (P2P) • Overlay Network • Based on communication or file-sharing needs, the peer IDs form an overlay network at the logical level. • This overlay is a virtual network formed by mapping each physical machine with its ID, logically, through a virtual mapping . • When a new peer joins the system, its peer ID is added as a node in the overlay network and is removed from the overlay network automatically when it leaves. • Therefore, it is the P2P overlay network that characterizes the logical connectivity among the peers. • Two types of overlay networks: o unstructured and structured • An unstructured overlay network is characterized by a random graph. • There is no fixed route to send messages or files among the nodes. • Often, flooding is applied to send a query to all nodes in an unstructured overlay, thus resulting in heavy network traffic and nondeterministic search results. • Structured overlay networks follow certain connectivity topology and rules for inserting and removing nodes (peer IDs) from the overlay graph
  • 20. Cloud Computing Over Internet • Definition of Cloud Computing by IBM: • A cloud is a pool of virtualized computer resources. A cloud can host a variety of different workloads, including batch-style backend jobs and interactive and user- facing applications • i.e. a cloud allows workloads to be deployed and scaled out quickly through rapid provisioning of virtual or physical machines. • The cloud supports redundant, self-recovering, highly scalable programming models that allow workloads to recover from many unavoidable hardware/software failures. • Finally, the cloud system should be able to monitor resource use in real time to enable rebalancing of allocations when needed.
  • 21. NIST CLOUD REFERENCE ARCHITECTURE • Cloud Computing Definition • Cloud refers to server that are accessed over the internet • It is the on-demand availability of computer system resources especially data storage and computing power without direct active management by the user. • A model of computation and data storage based on “pay as you go” access to “unlimited” remote data center capabilities. • A cloud infrastructure provides a framework to manage scalable, reliable, on-demand access to applications.
  • 22. NIST Cloud Definition • The National Institute of Standards and Technology (NIST) defines cloud computing as a
  • 23. CLOUD REFERENCE ARCHITECTURE The NIST cloud computing reference architecture defines five major actors: • cloud consumer • cloud provider • cloud carrier • cloud auditor • cloud broker Each actor is an entity (a person or an organization) that participates in a transaction or process and/or performs tasks in cloud computing.
  • 25. Actors in Cloud Computing
  • 27. Example Usage Scenario 1 • A cloud consumer may request service from a cloud broker instead of contacting a cloud provider directly. • The cloud broker may create a new service by combining multiple services or by enhancing an existing service. • In this example, the actual cloud providers are invisible to the cloud consumer and the cloud consumer interacts directly with the cloud broker.
  • 28. Example Usage Scenario 2 • Cloud carriers provide the connectivity and transport of cloud services from cloud providers to cloud consumers. • A cloud provider participates in and arranges for two unique service level agreements (SLAs), one with a cloud carrier (e.g. SLA2) and one with a cloud consumer (e.g. SLA1). • A cloud provider arranges service level agreements (SLAs) with a cloud carrier and may request dedicated and encrypted connections to ensure the cloud services are consumed at a consistent level according to the contractual obligations with the cloud consumers. • In this case, the provider may specify its requirements on capability, flexibility and functionality in SLA2 in order to provide essential requirements in SLA1.
  • 30. Example Usage Scenario 3: • For a cloud service, a cloud auditor conducts independent assessments of the operation and security of the cloud service implementation. The audit may involve interactions with both the Cloud Consumer and the Cloud Provider.
  • 31. Cloud Consumer • The cloud consumer is the principal stakeholder for the cloud computing service. • A cloud consumer represents a person or organization that maintains a business relationship with, and uses the service from a cloud provider. • Cloud consumers need SLAs to specify the technical performance requirements fulfilled by a cloud provider. • SLAs can cover terms regarding the quality of service, security, remedies for performance failures.
  • 32. Example Services Available to a Cloud Consumer
  • 33. Cloud Services in Cloud Consumer • The consumers of SaaS can be organizations that provide their members with access to software applications, end users who directly use software applications, or software application administrators who configure applications for end users. • Cloud consumers of PaaS can employ the tools and execution resources provided by cloud providers to develop, test, deploy and manage the applications hosted in a cloud environment. • Consumers of IaaS have access to virtual computers, network- accessible storage, network infrastructure components, and other fundamental computing resources on which they can deploy and run arbitrary software.
  • 34. Cloud Provider • A cloud provider is a person, an organization; it is the entity responsible for making a service available to interested parties. • A Cloud Provider acquires and manages the computing infrastructure required for providing the services, runs the cloud software that provides the services, and makes arrangement to deliver the cloud services to the Cloud Consumers through network access
  • 35. 5 Major Activities of Cloud Provider
  • 36. Cloud Service on Cloud Provider • For Software as a Service, the cloud provider deploys, configures, maintains and updates the operation of the software applications on a cloud infrastructure so that the services are provisioned at the expected service levels to cloud consumers. • The provider of SaaS assumes most of the responsibilities in managing and controlling the applications and the infrastructure, while the cloud consumers have limited administrative control of the applications. • For PaaS, the Cloud Provider manages the computing infrastructure for the platform and runs the cloud software that provides the components of the platform, such as runtime software execution stack, databases, and other middleware components. • For IaaS, the Cloud Provider acquires the physical computing resources underlying the service, including the servers, networks, storage and hosting infrastructure
  • 37. Cloud Auditor • A cloud auditor is a party that can perform an independent examination of cloud service controls with the intent to express an opinion thereon. • A cloud auditor can evaluate the services provided by a cloud provider in terms of security controls, privacy impact, performance, etc.
  • 38. Cloud Broker • As cloud computing evolves, the integration of cloud services can be too complex for cloud consumers to manage. • A cloud consumer may request cloud services from a cloud broker, instead of contacting a cloud provider directly. • A cloud broker is an entity that manages the use, performance and delivery of cloud services and negotiates relationships between cloud providers and cloud consumers.
  • 39. Categories of Cloud Broker • A cloud broker can provide services in three categories • Service Intermediation: A cloud broker enhances a given service by improving some specific capability and providing value-added services to cloud consumers. The improvement can be managing access to cloud services, identity management, performance reporting, enhanced security, etc. • Service Aggregation: A cloud broker combines and integrates multiple services into one or more new services. The broker provides data integration and ensures the secure data movement between the cloud consumer and multiple cloud providers. • Service Arbitrage: Service arbitrage is similar to service aggregation except that the services being aggregated are not fixed. Service arbitrage means a broker has the flexibility to choose services from multiple agencies. The cloud broker, for example, can use a credit-scoring service to measure and select an agency with the best score.
  • 40. Cloud Carrier • A cloud carrier acts as an intermediary that provides connectivity and transport of cloud services between cloud consumers and cloud providers. Cloud carriers provide access to consumers through network, telecommunication and other access devices. • For example, cloud consumers can obtain cloud services through network access devices, such as computers, laptops, mobile phones, mobile Internet devices (MIDs), etc.
  • 41. Scope of Control between Provider and Consumer • The Cloud Provider and Cloud Consumer share the control of resources in a cloud system. • Different service models affect an organization’s control over the computational resources and thus what can be done in a cloud system
  • 42. Scope of Control between Provider and Consumer
  • 43. Scope of Control between Provider and Consumer • The application layer includes software applications targeted at end users or programs. The applications are used by SaaS consumers, or installed/managed/ maintained by PaaS consumers, IaaS consumers, and SaaS providers. • The middleware layer provides software building blocks (e.g., libraries, database, and Java virtual machine) for developing application software in the cloud. The middleware is used by PaaS consumers, installed/managed/maintained by IaaS consumers or PaaS providers, and hidden from SaaS consumers. • The OS layer includes operating system and drivers, and is hidden from SaaS consumers and PaaS consumers. An IaaS cloud allows one or multiple guest OS‟s to run virtualized on a single physical host. Generally, consumers have broad freedom to choose which OS to be hosted among all the OS‟s that could be supported by the cloud provider. The IaaS consumers should assume full responsibility for the guest OS‟s, while the IaaS provider controls the host OS.
  • 44. Architecture • Architecture consists of 3 tiers ◦ Cloud Deployment Model ◦ Cloud Service Model ◦ Essential Characteristics of Cloud Computing .
  • 46. Essential Characteristics 1 • On-demand self-service. ◦ A consumer can unilaterally provision computing capabilities such as server time and network storage as needed automatically, without requiring human interaction with a service provider
  • 47. Essential Characteristics 2 • Broad network access. ◦ Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs) as well as other traditional or cloud- based software services.
  • 48. Essential Characteristics 3 • Resource pooling. ◦ The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand.
  • 49. Essential Characteristics 4 • Rapid elasticity. ◦ Capabilities can be rapidly and elastically provisioned - in some cases automatically - to quickly scale out; and rapidly released to quickly scale in. ◦ To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
  • 50. Essential Characteristics 5 • Measured service. o Cloud systems automatically control and optimize resource usage by leveraging a metering capability at some level of abstraction appropriate to the type of service. oResource usage can be monitored, controlled, and reported - providing transparency for both the provider and consumer of the service.
  • 51. Cloud Service Models  Cloud Software as a Service (SaaS)  Cloud Platform as a Service (PaaS)  Cloud Infrastructure as a Service (IaaS)
  • 52. Cloud Service Model Architecture
  • 53. Software as a Service (SaaS) • Required network is provided. • Customers do not invest on software application programs • The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). • The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, data or even individual application capabilities, with the possible exception of limited user specific application configuration settings. • Usually multi tenant environment • Highly scalable architecture
  • 54. SaaS providers  Google’s Gmail, Docs, Google Drive  Youtube , Netflix, Prime video  Microsoft’s Hotmail, Sharepoint  SalesForce  Yahoo, Facebook
  • 55. Infrastructure as a Service (IaaS) • Application, Operating System & network is provided. • IaaS is the delivery of technology infrastructure (mostly hardware) as an on demand, scalable service • Usually billed based on usage • Usually, multi-tenant virtualized environment • Can be coupled with Managed Services for OS and application support • User can choose his OS, storage, deployed app, networking components • Consumer is able to deploy and run arbitrary software, which may include operating systems and applications. • The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).
  • 56. IaaS providers  Amazon Elastic Compute Cloud (EC2) - Each instance provides 1-20 processors, upto 16 GB RAM, 1.69TB storage  RackSpace Hosting - Each instance provides 4 core CPU, upto 8 GB RAM, 480 GB storage  Joyent Cloud-◦ Each instance provides 8 CPUs, upto 32 GB RAM, 48 GB storage  Go Grid - Each instance provides 1-6 processors, upto 15 GB RAM, 1.69TB storage
  • 57. Platform as a Service (PaaS) • Application & network is provided • PaaS provides all of the facilities required to support the complete life cycle of building, delivering and deploying web applications and services entirely from the Internet. • applications must be developed with a particular platform in mind • Multi-tenant environments • Highly scalable multi-tier architecture • The capability provided to the consumer is to deploy onto the cloud infrastructure consumer created or acquired applications created using programming languages and tools supported by the provider. • The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.
  • 58. PaaS providers  Google App Engine - Python, Java, Eclipse  Microsoft Azure - .Net, Visual Studio  Sales Force - Apex, Web wizard  VMware
  • 59. Cloud Deployment Model • It works as your virtual computing environment with a choice of deployment model depending on how much data you want to store and who has access to the Infrastructure
  • 60. Types of Deployment Model  Public Cloud  Private Cloud  Hybrid Cloud  Community Cloud
  • 61. Public Cloud • The Public Cloud allows systems and services to be easily accessible to the general public. Public cloud may be less secure because of its openness, e.g., e-mail, Microsoft Azure, AWS, Google Cloud etc. • Benefits of Public Cloud o Minimal Investment - As a pay-per-use service, there is no large upfront cost and is ideal for businesses who need quick access to resources o No Hardware Setup - The cloud service providers fully fund the entire Infrastructure o No Infrastructure Management - This does not require an in-house team to utilize the public cloud. • Limitations of Public Cloud o Data Security and Privacy Concerns - Since it is accessible to all, it does not fully protect against cyber-attacks and could lead to vulnerabilities. o Service/License Limitation - While there are many resources you can exchange with tenants, there is a usage cap.
  • 63. Private Cloud • The Private Cloud allows systems and services to be accessible within an organization. It offers increased security because of its private nature • Benefits of Private Cloud o Data Privacy - It is ideal for storing corporate data where only authorized personnel gets access o Security - Segmentation of resources within the same Infrastructure can help with better access and higher levels of security. o Supports Legacy Systems - This model supports legacy systems that cannot access the public cloud. • Limitations of Private Cloud o Higher Cost - With the benefits you get, the investment will also be larger than the public cloud. Here, you will pay for software, hardware, and resources for staff and training. o Fixed Scalability - The hardware you choose will accordingly help you scale in a certain direction o High Maintenance - Since it is managed in-house, the maintenance costs also increase.
  • 64. Community Cloud • The Community Cloud allows systems and services to be accessible by group of organizations. • Benefits of Community Cloud o Smaller Investment - A community cloud is much cheaper than the private & public cloud and provides great performance o Setup Benefits - The protocols and configuration of a community cloud must align with industry standards, allowing customers to work much more efficiently. • Limitations of Community Cloud o Shared Resources - Due to restricted bandwidth and storage capacity, community resources often pose challenges. • Not as Popular - Since this is a recently introduced model, it is not that popular or available across industries
  • 66. Hybrid Cloud • The Hybrid Cloud is mixture of public and private cloud. However, the critical activities are performed using private cloud while the non- critical activities are performed using public cloud. • Benefits of Hybrid Cloud o Cost-Effectiveness - The overall cost of a hybrid solution decreases since it majorly uses the public cloud to store data. o Security - Since data is properly segmented, the chances of data theft from attackers are significantly reduced. o Flexibility - With higher levels of flexibility, businesses can create custom solutions that fit their exact requirements • Limitations of Hybrid Cloud  Complexity - It is complex setting up a hybrid cloud since it needs to integrate two or more cloud architectures  Specific Use Case - This model makes more sense for organizations that have multiple use cases or need to separate critical and sensitive data