SlideShare a Scribd company logo
1 of 13
Download to read offline
Personal Computer Application
BAT/IT/2016/F/0015
Virtual Computing / Virtual Machine
One instance of an Operating System along with one or more applications running in an
isolated partition within the computer. It enables different Operating System to run in the
same computer at the same time.
Virtual computing or Virtual machine (VM) are also widely used to run multiple instances of
the same Operating System, each running the same set or a different set of applications.
The separate VM instances prevent applications from interfering with each other. If one app
crashes, it does not affect the programs in the other VM. This approach differs from a dual
– boot or multi – boot environment, in which the user has to choose only one OS at startup.
All virtual machines in the same computer run simultaneously.
VMs are like Machines within the Machine
Each virtual machine functions as if it owned the entire computer. The Operating System in
each VM partition are called “guest Operating System,” and they communicate with the
hardware via the Virtual Machine Monitor (VMM) control program. The VMM “Virtualizes”
the hardware for each VM.
History
VM the first virtualized OS for IBM (International Business Machine) mainframes. VM runs
multiple IBM OS of any type, each with their own applications. Originally developed by a
separate research arm of the company, VM later became mainstream in the 1970s. In 2000,
IBM introduced z/ VM for the 64-bit z/ architecture.
Virtual Machine – Control Program and
Conversational Monitor System
VM – Control Program (VM-CP) is the “hypervisor” that provides the virtual machine
functionality. Conversational Monitor System (CMS) is a compact guest OS that is widely
used with VM to provide interaction for one user. Each user communicates with CMS in a
separate virtual machine in the computer.
Non-Virtual Versus Virtual
This shows three applications running in a regular computer versus a virtualized computer.
In the VM example, the guest operating systems may be the same or different.
Paravirtualization and Hardware
Guest operating systems can run in a virtual machine with or without modification. If changes
are made to the OS to recognize the VMM, it is said to be "paravirtualized." For example,
Linux and various Unix versions have been paravirtualized to run in the Xen VM
environment. However, if the CPU hardware supports virtualization, Xen can run guest
operating systems unmodified. In 2004 and 2006, Intel and AMD added virtualization to their
CPUs, which traps the calls to the x86 hardware, making it easier to develop VMMs that run
ordinary non-paravirtualized guest operating systems (see hardware virtualization).
Advantages of Virtualization
1 - Consolidation
Multiple operating systems can run in the same server, eliminating the need to dedicate a
single machine to one application. Old and new applications can run simultaneously with
their respective operating systems in multicore servers with many threads of execution,
saving space and power consumption in the datacenter. New versions of an OS and new
applications can be deployed without purchasing new hardware.
2 - Stability and Security
Conflicts can arise between supposedly stable applications, and troubleshooting can be
daunting. As a result, cautious system administrators often host each type of application in
a separate server even if the server is grossly underutilized. Multiple virtual machines
running bread and butter applications are kept safely separated from each other. In addition,
since each VM is isolated from the rest, a security breach in one does not affect the others.
The fault tolerance and security brought about by the isolation of each virtual machine is a
major benefit of virtualization.
3 - Development Flexibility
A virtualized computer can host numerous versions of an operating system, allowing
developers to test their programs in different OS environments on the same machine. In
addition, with each application running in its own virtual partition, crashing in one virtual
machine will not bring down the system.
4 - Migration and Cloning
Virtual machines, each with their own OS and applications, function like self-contained
packages that are said to be "decoupled from the hardware." It is relatively easy to move a
VM from one server to another to balance the workload, to migrate to faster hardware, as
well as to recover from hardware failure. VMs can be quickly cloned and deployed.
5 - Desktop Virtualization
An increasing trend is to store a user's desktop (OS and applications) in a separate virtual
machine in the server and use the PC or a dedicated terminal as a "thin client" to the server.
Each user is isolated from all other users due to the virtual machine technology, and the
maintenance of the applications is shifted from each user's desktop to the datacenter (see
thin client). See virtual machine monitor, virtualization, application virtualization and OS
virtualization.
What is Cloud?
Cloud computing provides us a means by which can access the applications as utilities, over
the internet it allows us to create, configure, and customize applications online.
The term Cloud refers to a Network or Internet. In other works, we can say that Cloud is
something, which is present at remote location. Cloud can provide services over network,
ex… on public or on private networks, ex… WAN, LAN or VPN.
Applications such as e – mail, web conferencing, customer relationship management (CRM),
all run in cloud.
What is Cloud Computing?
Cloud Computing refers to manipulating, configuring, and accessing the applications online.
It offers online data storage, infrastructure and application.
We need not to install a piece of software on our local PC and this is how the cloud computing
overcomes platform dependency issues. Hence, the Cloud Computing is making our
business application mobile and collaborative.
Basic Concepts
There are certain services and models working behind the scene making the cloud
computing feasible and accessible to end users. Following are the working models for cloud
computing:
i. Deployment Models
ii. Service Models
Deployment models
Deployment models define the type of access to the cloud, ex… how the cloud is located?
Cloud can have any of the four type of access: Public, Private, Hybrid and Community.
Public Cloud
The public cloud allows systems and services to be easily accessible to the general public.
Public cloud may be less secure because of its openness, ex… e – mail.
Private Cloud
The private cloud allows systems and services to be accessible within an organization. It
offers increased security because of its private nature.
Community Cloud
The community cloud allows systems and services to be accessible by group of
organizations.
Hybrid Cloud
The hybrid Cloud is mixture of public and private cloud. However, the critical activities are
performed using private cloud while the non – critical activities are performed using public
cloud.
Service models
Service models are the reference models on which the Cloud Computing is based. These
can be categorized into three basic service models as listed below:
1. Infrastructure As A Service (LAAS)
2. Platform As A Service (PAAS)
3. Software As A Service (SAAS)
There are many other service models all of which can take the form like XaaS, i.e., anything
as a Service. This can be Network as a Service, Business as a Service, Identity as a Service,
Database as a Service or Strategy as a Service. The Infrastructure as a Service (IAAS) is
the most basic level of service. Each of the service models make use of the underlying
service model, i.e., each inherits the security and management mechanism from the
underlying model, as shown in the following diagram:
Infrastructure AS A Service (IAAS)
IaaS provides access to fundamental resources such as physical machines, virtual
machines, virtual storage, etc.
Platform AS A Service (PAAS)
PaaS provides the runtime environment for applications, development & deployment tools,
etc.
Software AS A Service (SAAS)
SaaS model allows to use software applications as a service to end users.
History
The concept of Cloud Computing came into existence in 1950 with implementation of
mainframe computers, accessible via thin/static clients. Since then, cloud computing has
been evolved from static clients to dynamic ones from software to services. The following
diagram explains the evolution of cloud computing:
Benefits
Cloud Computing has numerous advantages. Some of them are listed below:
 One can access applications as utilities, over the Internet.
 Manipulate and configure the application online at any time.
 It does not require to install a specific piece of software to access or manipulate
cloud application.
 Cloud Computing offers online development and deployment tools, programming
runtime environment through Platform as a Service model.
 Cloud resources are available over the network in a manner that provides platform
independent access to any type of clients.
 Cloud Computing offers on-demand self-service. The resources can be used
without interaction with cloud service provider.
 Cloud Computing is highly cost effective because it operates at higher efficiencies
with greater utilization. It just requires an Internet connection.
 Cloud Computing offers load balancing that makes it more reliable.
Risks
Although Cloud Computing is a great innovation in the world of computing, there also exist
downsides of cloud computing. Some of them are discussed below:
SECURITY & PRIVACY
It is the biggest concern about cloud computing. Since data management and infrastructure
management in cloud is provided by third-party, it is always a risk to handover the sensitive
information to such providers. Although the cloud computing vendors ensure more secure
password protected accounts, any sign of security breach would result in loss of clients and
businesses.
Lock-IN
It is very difficult for the customers to switch from one Cloud Service Provider (CSP) to
another. It results in dependency on a particular CSP for service.
Isolation Failure
This risk involves the failure of isolation mechanism that separates storage, memory, routing
between the different tenants.
Management Interface Compromise
In case of public cloud provider, the customer management interfaces are accessible
through the Internet.
Insecure Or Incomplete Data Deletion
It is possible that the data requested for deletion may not get deleted. It happens either
because extra copies of data are stored but are not available or disk destroyed also stores
data from other tenants.
Characteristics
There are four key characteristics of cloud computing. They are shown in the following
diagram:
On Demand Self-Service
Cloud Computing allows the users to use web services and resources on demand. One can
logon to a website at any time and use them.
Broad Network Access
Since Cloud Computing is completely web based, it can be accessed from anywhere and at
any time.
Resource Pooling
Cloud Computing allows multiple tenants to share a pool of resources. One can share single
physical instance of hardware, database and basic infrastructure.
Rapid Elasticity
It is very easy to scale up or down the resources at any time. Resources used by the
customers or currently assigned to customers are automatically monitored and resources. It
make it possible
Measured Service
Service Models & Deployment Models are described in above section.
References
Web sites
Wikipedia
Tutorialpoint
Computer Desktop Encyclopedia
GCFLearning
Books & Magazines
Teachers Guide – Information and communication Technology (Grade – 12, 13)
Magazine – Computer Today
Magazine – TC Time
Computer study for you
Cloud computing

More Related Content

What's hot

IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud EnvironmentDr. Sunil Kr. Pandey
 
Cloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALSCloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALSKANNANKR12
 
Fundamentals of cloud Computing
Fundamentals of cloud ComputingFundamentals of cloud Computing
Fundamentals of cloud Computingnik_053
 
Windows Azure Datasheet
Windows Azure DatasheetWindows Azure Datasheet
Windows Azure DatasheetWindows Azure
 
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...FindWhitePapers
 
The cloud transforms
The cloud transformsThe cloud transforms
The cloud transformsEric Rubin
 
IBM’s System Director VMControl: Advanced Multi-Platform Virtualization Manag...
IBM’s System Director VMControl: Advanced Multi-Platform Virtualization Manag...IBM’s System Director VMControl: Advanced Multi-Platform Virtualization Manag...
IBM’s System Director VMControl: Advanced Multi-Platform Virtualization Manag...IBM India Smarter Computing
 
A Multi-tenant Architecture for Business Process Executions
A Multi-tenant Architecture for Business Process ExecutionsA Multi-tenant Architecture for Business Process Executions
A Multi-tenant Architecture for Business Process ExecutionsSrinath Perera
 
Microsoft Windows Azure - Cloud Services Platform Datasheet
Microsoft Windows Azure - Cloud Services Platform DatasheetMicrosoft Windows Azure - Cloud Services Platform Datasheet
Microsoft Windows Azure - Cloud Services Platform DatasheetMicrosoft Private Cloud
 
Cloud Computing Services Intro
Cloud Computing Services IntroCloud Computing Services Intro
Cloud Computing Services IntroDj Das
 
Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Tyrone Systems
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformsPrabhat gangwar
 
Cloud Computing for Beginners
Cloud Computing for BeginnersCloud Computing for Beginners
Cloud Computing for BeginnersJainul Musani
 
Cloud computing notes unit II
Cloud computing notes unit II Cloud computing notes unit II
Cloud computing notes unit II NANDINI SHARMA
 
Whitepaper: Choose the cloud platform that beats the competition - Citrix Clo...
Whitepaper: Choose the cloud platform that beats the competition - Citrix Clo...Whitepaper: Choose the cloud platform that beats the competition - Citrix Clo...
Whitepaper: Choose the cloud platform that beats the competition - Citrix Clo...Citrix
 

What's hot (20)

IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 
Cloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALSCloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALS
 
Fundamentals of cloud Computing
Fundamentals of cloud ComputingFundamentals of cloud Computing
Fundamentals of cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Windows Azure Datasheet
Windows Azure DatasheetWindows Azure Datasheet
Windows Azure Datasheet
 
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
 
The cloud transforms
The cloud transformsThe cloud transforms
The cloud transforms
 
IBM’s System Director VMControl: Advanced Multi-Platform Virtualization Manag...
IBM’s System Director VMControl: Advanced Multi-Platform Virtualization Manag...IBM’s System Director VMControl: Advanced Multi-Platform Virtualization Manag...
IBM’s System Director VMControl: Advanced Multi-Platform Virtualization Manag...
 
cloud computing
cloud computingcloud computing
cloud computing
 
CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
 
A Multi-tenant Architecture for Business Process Executions
A Multi-tenant Architecture for Business Process ExecutionsA Multi-tenant Architecture for Business Process Executions
A Multi-tenant Architecture for Business Process Executions
 
Microsoft Windows Azure - Cloud Services Platform Datasheet
Microsoft Windows Azure - Cloud Services Platform DatasheetMicrosoft Windows Azure - Cloud Services Platform Datasheet
Microsoft Windows Azure - Cloud Services Platform Datasheet
 
Cloud Computing Services Intro
Cloud Computing Services IntroCloud Computing Services Intro
Cloud Computing Services Intro
 
Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Cloud Computing and Its Service Models
Cloud Computing and Its Service Models
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud Computing for Beginners
Cloud Computing for BeginnersCloud Computing for Beginners
Cloud Computing for Beginners
 
Cloud computing notes unit II
Cloud computing notes unit II Cloud computing notes unit II
Cloud computing notes unit II
 
Whitepaper: Choose the cloud platform that beats the competition - Citrix Clo...
Whitepaper: Choose the cloud platform that beats the competition - Citrix Clo...Whitepaper: Choose the cloud platform that beats the competition - Citrix Clo...
Whitepaper: Choose the cloud platform that beats the competition - Citrix Clo...
 

Similar to Cloud computing

International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxvrickens
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxZarwashgulrez
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulizationAJIT NEGI
 
Cloud computing
Cloud computingCloud computing
Cloud computingSyam Lal
 
What is Application & Server Virtualisation
What is Application & Server VirtualisationWhat is Application & Server Virtualisation
What is Application & Server VirtualisationDAYWATCHER.COM
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsSiddharth Coontoor
 
Cloud computing by Bharat Bodage
Cloud computing by Bharat BodageCloud computing by Bharat Bodage
Cloud computing by Bharat BodageBharat Bodage
 
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptxpresentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptxSimmyNayak
 
CC_10900220021_PRADEEP KUMAR.pptx
CC_10900220021_PRADEEP KUMAR.pptxCC_10900220021_PRADEEP KUMAR.pptx
CC_10900220021_PRADEEP KUMAR.pptxpk3172517
 

Similar to Cloud computing (20)

International Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docxInternational Conference on Advances in Computing, Communicati.docx
International Conference on Advances in Computing, Communicati.docx
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Presentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing TechnologiesPresentation on Top Cloud Computing Technologies
Presentation on Top Cloud Computing Technologies
 
virtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptxvirtual-machine-ppt 18030 cloud computing.pptx
virtual-machine-ppt 18030 cloud computing.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud notes 1
Cloud notes 1Cloud notes 1
Cloud notes 1
 
What is Application & Server Virtualisation
What is Application & Server VirtualisationWhat is Application & Server Virtualisation
What is Application & Server Virtualisation
 
Application virtualization
Application virtualizationApplication virtualization
Application virtualization
 
Venkatesh
VenkateshVenkatesh
Venkatesh
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Cloud Computing Neccesity
Cloud Computing  NeccesityCloud Computing  Neccesity
Cloud Computing Neccesity
 
Cloudcpmuting journal
Cloudcpmuting journalCloudcpmuting journal
Cloudcpmuting journal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing by Bharat Bodage
Cloud computing by Bharat BodageCloud computing by Bharat Bodage
Cloud computing by Bharat Bodage
 
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptxpresentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
 
CC_10900220021_PRADEEP KUMAR.pptx
CC_10900220021_PRADEEP KUMAR.pptxCC_10900220021_PRADEEP KUMAR.pptx
CC_10900220021_PRADEEP KUMAR.pptx
 

More from Niva tharan

EB - Making presentation Step By step
EB - Making presentation Step By stepEB - Making presentation Step By step
EB - Making presentation Step By stepNiva tharan
 
Zoom basic Setup | Module
Zoom basic Setup | ModuleZoom basic Setup | Module
Zoom basic Setup | ModuleNiva tharan
 
Word, excel, and power point tutorial in Tamil
Word, excel, and power point tutorial in TamilWord, excel, and power point tutorial in Tamil
Word, excel, and power point tutorial in TamilNiva tharan
 
Motive the students to handle the mouse effectively | Action research proposal
Motive the students to handle the mouse effectively | Action research proposalMotive the students to handle the mouse effectively | Action research proposal
Motive the students to handle the mouse effectively | Action research proposalNiva tharan
 
Motivate the students to handle the mouse effectively | Action Research | Pre...
Motivate the students to handle the mouse effectively | Action Research | Pre...Motivate the students to handle the mouse effectively | Action Research | Pre...
Motivate the students to handle the mouse effectively | Action Research | Pre...Niva tharan
 
Health care workshop | Individual project report
Health care workshop | Individual project reportHealth care workshop | Individual project report
Health care workshop | Individual project reportNiva tharan
 
Health care workshop | Individual project proposal
Health care workshop | Individual project proposalHealth care workshop | Individual project proposal
Health care workshop | Individual project proposalNiva tharan
 
Leadership program | Project Report
Leadership program | Project Report Leadership program | Project Report
Leadership program | Project Report Niva tharan
 
Leadership Program | Project Proposal
Leadership Program | Project ProposalLeadership Program | Project Proposal
Leadership Program | Project ProposalNiva tharan
 
Shutdown computer Tricks
Shutdown computer TricksShutdown computer Tricks
Shutdown computer TricksNiva tharan
 
Flow chart and pseudo code
Flow chart and pseudo code Flow chart and pseudo code
Flow chart and pseudo code Niva tharan
 
Power poinrt view+animation+transision
Power poinrt view+animation+transisionPower poinrt view+animation+transision
Power poinrt view+animation+transisionNiva tharan
 

More from Niva tharan (14)

EB - Making presentation Step By step
EB - Making presentation Step By stepEB - Making presentation Step By step
EB - Making presentation Step By step
 
Zoom basic Setup | Module
Zoom basic Setup | ModuleZoom basic Setup | Module
Zoom basic Setup | Module
 
Word, excel, and power point tutorial in Tamil
Word, excel, and power point tutorial in TamilWord, excel, and power point tutorial in Tamil
Word, excel, and power point tutorial in Tamil
 
Motive the students to handle the mouse effectively | Action research proposal
Motive the students to handle the mouse effectively | Action research proposalMotive the students to handle the mouse effectively | Action research proposal
Motive the students to handle the mouse effectively | Action research proposal
 
Motivate the students to handle the mouse effectively | Action Research | Pre...
Motivate the students to handle the mouse effectively | Action Research | Pre...Motivate the students to handle the mouse effectively | Action Research | Pre...
Motivate the students to handle the mouse effectively | Action Research | Pre...
 
Health care workshop | Individual project report
Health care workshop | Individual project reportHealth care workshop | Individual project report
Health care workshop | Individual project report
 
Health care workshop | Individual project proposal
Health care workshop | Individual project proposalHealth care workshop | Individual project proposal
Health care workshop | Individual project proposal
 
Leadership program | Project Report
Leadership program | Project Report Leadership program | Project Report
Leadership program | Project Report
 
Leadership Program | Project Proposal
Leadership Program | Project ProposalLeadership Program | Project Proposal
Leadership Program | Project Proposal
 
Shutdown computer Tricks
Shutdown computer TricksShutdown computer Tricks
Shutdown computer Tricks
 
LAN Proposal
LAN Proposal LAN Proposal
LAN Proposal
 
Flow chart and pseudo code
Flow chart and pseudo code Flow chart and pseudo code
Flow chart and pseudo code
 
Iot
IotIot
Iot
 
Power poinrt view+animation+transision
Power poinrt view+animation+transisionPower poinrt view+animation+transision
Power poinrt view+animation+transision
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Cloud computing

  • 2.
  • 3. Virtual Computing / Virtual Machine One instance of an Operating System along with one or more applications running in an isolated partition within the computer. It enables different Operating System to run in the same computer at the same time. Virtual computing or Virtual machine (VM) are also widely used to run multiple instances of the same Operating System, each running the same set or a different set of applications. The separate VM instances prevent applications from interfering with each other. If one app crashes, it does not affect the programs in the other VM. This approach differs from a dual – boot or multi – boot environment, in which the user has to choose only one OS at startup. All virtual machines in the same computer run simultaneously. VMs are like Machines within the Machine Each virtual machine functions as if it owned the entire computer. The Operating System in each VM partition are called “guest Operating System,” and they communicate with the hardware via the Virtual Machine Monitor (VMM) control program. The VMM “Virtualizes” the hardware for each VM. History VM the first virtualized OS for IBM (International Business Machine) mainframes. VM runs multiple IBM OS of any type, each with their own applications. Originally developed by a separate research arm of the company, VM later became mainstream in the 1970s. In 2000, IBM introduced z/ VM for the 64-bit z/ architecture. Virtual Machine – Control Program and Conversational Monitor System VM – Control Program (VM-CP) is the “hypervisor” that provides the virtual machine functionality. Conversational Monitor System (CMS) is a compact guest OS that is widely used with VM to provide interaction for one user. Each user communicates with CMS in a separate virtual machine in the computer.
  • 4. Non-Virtual Versus Virtual This shows three applications running in a regular computer versus a virtualized computer. In the VM example, the guest operating systems may be the same or different. Paravirtualization and Hardware Guest operating systems can run in a virtual machine with or without modification. If changes are made to the OS to recognize the VMM, it is said to be "paravirtualized." For example, Linux and various Unix versions have been paravirtualized to run in the Xen VM environment. However, if the CPU hardware supports virtualization, Xen can run guest operating systems unmodified. In 2004 and 2006, Intel and AMD added virtualization to their CPUs, which traps the calls to the x86 hardware, making it easier to develop VMMs that run ordinary non-paravirtualized guest operating systems (see hardware virtualization). Advantages of Virtualization 1 - Consolidation Multiple operating systems can run in the same server, eliminating the need to dedicate a single machine to one application. Old and new applications can run simultaneously with their respective operating systems in multicore servers with many threads of execution, saving space and power consumption in the datacenter. New versions of an OS and new applications can be deployed without purchasing new hardware. 2 - Stability and Security Conflicts can arise between supposedly stable applications, and troubleshooting can be daunting. As a result, cautious system administrators often host each type of application in
  • 5. a separate server even if the server is grossly underutilized. Multiple virtual machines running bread and butter applications are kept safely separated from each other. In addition, since each VM is isolated from the rest, a security breach in one does not affect the others. The fault tolerance and security brought about by the isolation of each virtual machine is a major benefit of virtualization. 3 - Development Flexibility A virtualized computer can host numerous versions of an operating system, allowing developers to test their programs in different OS environments on the same machine. In addition, with each application running in its own virtual partition, crashing in one virtual machine will not bring down the system. 4 - Migration and Cloning Virtual machines, each with their own OS and applications, function like self-contained packages that are said to be "decoupled from the hardware." It is relatively easy to move a VM from one server to another to balance the workload, to migrate to faster hardware, as well as to recover from hardware failure. VMs can be quickly cloned and deployed. 5 - Desktop Virtualization An increasing trend is to store a user's desktop (OS and applications) in a separate virtual machine in the server and use the PC or a dedicated terminal as a "thin client" to the server. Each user is isolated from all other users due to the virtual machine technology, and the maintenance of the applications is shifted from each user's desktop to the datacenter (see thin client). See virtual machine monitor, virtualization, application virtualization and OS virtualization.
  • 6. What is Cloud? Cloud computing provides us a means by which can access the applications as utilities, over the internet it allows us to create, configure, and customize applications online. The term Cloud refers to a Network or Internet. In other works, we can say that Cloud is something, which is present at remote location. Cloud can provide services over network, ex… on public or on private networks, ex… WAN, LAN or VPN. Applications such as e – mail, web conferencing, customer relationship management (CRM), all run in cloud. What is Cloud Computing? Cloud Computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application. We need not to install a piece of software on our local PC and this is how the cloud computing overcomes platform dependency issues. Hence, the Cloud Computing is making our business application mobile and collaborative.
  • 7. Basic Concepts There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing: i. Deployment Models ii. Service Models Deployment models Deployment models define the type of access to the cloud, ex… how the cloud is located? Cloud can have any of the four type of access: Public, Private, Hybrid and Community. Public Cloud The public cloud allows systems and services to be easily accessible to the general public. Public cloud may be less secure because of its openness, ex… e – mail. Private Cloud The private cloud allows systems and services to be accessible within an organization. It offers increased security because of its private nature. Community Cloud The community cloud allows systems and services to be accessible by group of organizations. Hybrid Cloud The hybrid Cloud is mixture of public and private cloud. However, the critical activities are performed using private cloud while the non – critical activities are performed using public cloud.
  • 8. Service models Service models are the reference models on which the Cloud Computing is based. These can be categorized into three basic service models as listed below: 1. Infrastructure As A Service (LAAS) 2. Platform As A Service (PAAS) 3. Software As A Service (SAAS) There are many other service models all of which can take the form like XaaS, i.e., anything as a Service. This can be Network as a Service, Business as a Service, Identity as a Service, Database as a Service or Strategy as a Service. The Infrastructure as a Service (IAAS) is the most basic level of service. Each of the service models make use of the underlying service model, i.e., each inherits the security and management mechanism from the underlying model, as shown in the following diagram: Infrastructure AS A Service (IAAS) IaaS provides access to fundamental resources such as physical machines, virtual machines, virtual storage, etc. Platform AS A Service (PAAS) PaaS provides the runtime environment for applications, development & deployment tools, etc. Software AS A Service (SAAS) SaaS model allows to use software applications as a service to end users.
  • 9. History The concept of Cloud Computing came into existence in 1950 with implementation of mainframe computers, accessible via thin/static clients. Since then, cloud computing has been evolved from static clients to dynamic ones from software to services. The following diagram explains the evolution of cloud computing: Benefits Cloud Computing has numerous advantages. Some of them are listed below:  One can access applications as utilities, over the Internet.  Manipulate and configure the application online at any time.  It does not require to install a specific piece of software to access or manipulate cloud application.  Cloud Computing offers online development and deployment tools, programming runtime environment through Platform as a Service model.  Cloud resources are available over the network in a manner that provides platform independent access to any type of clients.  Cloud Computing offers on-demand self-service. The resources can be used without interaction with cloud service provider.  Cloud Computing is highly cost effective because it operates at higher efficiencies with greater utilization. It just requires an Internet connection.  Cloud Computing offers load balancing that makes it more reliable.
  • 10. Risks Although Cloud Computing is a great innovation in the world of computing, there also exist downsides of cloud computing. Some of them are discussed below: SECURITY & PRIVACY It is the biggest concern about cloud computing. Since data management and infrastructure management in cloud is provided by third-party, it is always a risk to handover the sensitive information to such providers. Although the cloud computing vendors ensure more secure password protected accounts, any sign of security breach would result in loss of clients and businesses. Lock-IN It is very difficult for the customers to switch from one Cloud Service Provider (CSP) to another. It results in dependency on a particular CSP for service. Isolation Failure This risk involves the failure of isolation mechanism that separates storage, memory, routing between the different tenants. Management Interface Compromise In case of public cloud provider, the customer management interfaces are accessible through the Internet. Insecure Or Incomplete Data Deletion It is possible that the data requested for deletion may not get deleted. It happens either because extra copies of data are stored but are not available or disk destroyed also stores data from other tenants.
  • 11. Characteristics There are four key characteristics of cloud computing. They are shown in the following diagram: On Demand Self-Service Cloud Computing allows the users to use web services and resources on demand. One can logon to a website at any time and use them. Broad Network Access Since Cloud Computing is completely web based, it can be accessed from anywhere and at any time. Resource Pooling Cloud Computing allows multiple tenants to share a pool of resources. One can share single physical instance of hardware, database and basic infrastructure. Rapid Elasticity It is very easy to scale up or down the resources at any time. Resources used by the customers or currently assigned to customers are automatically monitored and resources. It make it possible Measured Service Service Models & Deployment Models are described in above section.
  • 12. References Web sites Wikipedia Tutorialpoint Computer Desktop Encyclopedia GCFLearning Books & Magazines Teachers Guide – Information and communication Technology (Grade – 12, 13) Magazine – Computer Today Magazine – TC Time Computer study for you