SlideShare a Scribd company logo
1 of 76
CLOUD COMPUTING
I
Load Balancing
• Load balancing improves network
performance by distributing traffic efficiently
so that individual servers are not
overwhelmed by sudden fluctuations in
activity.
• Server Load Balancing is a critical component
of high availability, clustering, and fault
tolerance, all of which provide the
infrastructure for reliable Internet sites and
large corporate networks.
• Load balancing is a computer networking
methodology to distribute workload across
multiple computers or a computer cluster,
network links, central processing units, disk
drives, or other resources, to achieve optimal
resource utilization, maximize throughput,
minimize response time, and avoid overload.
• Usually provided by dedicated software or
hardware.
• Multiple layers of load balancing may be used
in High-performance systems .
• Load balancers use a variety of scheduling
algorithms to determine which backend
server to send a request to.
• Simple algorithms include random choice or
round robin.
• Sophisticated load balancers may take into
account additional factors, such as a server's
reported load, recent response times,
up/down status ,number of active
connections, geographic location, capabilities,
or how much traffic it has recently been
assigned.
• An important issue when operating a load-
balanced service is how to handle information
that must be kept across the multiple requests
in a user's session.
• If this information is stored locally on one
backend server, then subsequent requests
going to different backend servers would not
be able to find it.
• This might be cached information that can be
recomputed, in which case load-balancing a
request to a different backend server just
introduces a performance issue.
• One solution to the session data issue is to
send all requests in a user session consistently
to the same backend server.
• This is known as persistence or stickiness.
• However this technique fails to provide
automatic failover: if a backend server goes
down, its per-session information becomes
inaccessible, and any sessions depending on it
are lost.
• Random assignments must be remembered by
the load balancer, which creates a burden on
storage.
• If the load balancer is replaced or fails, this
information may be lost.
• Assignments may need to be deleted after a
timeout period or during periods of high load
to avoid exceeding the space available for the
assignment table.
• The random assignment method also requires
that clients maintain some state, which can be
a problem, for example when a web browser
has disabled storage of cookies.
• Sophisticated load balancers use multiple
persistence techniques to avoid some of the
Clustering
• A computer cluster is a group of linked
computers, working together closely thus in
many respects forming a single computer.
• The components of a cluster are commonly,
but not always, connected to each other
through fast local area networks.
• Clusters are usually deployed to improve
performance and availability over that of a
single computer,
• High-availability clusters or failover clusters
are implemented primarily to improve the
availability of services that the cluster
provides.
• They use redundant nodes, which are then
used to provide service when system
components fail.
• The most common size for an HA cluster is
two nodes, which is the minimum
requirement to provide redundancy.
• HA clusters eliminate single points of failure.
• Load-balancing is when multiple computers
are linked together to share computational
workload or function as a single virtual
computer.
• Logically, from the user side, they are multiple
machines, but function as a single virtual
machine.
• Requests initiated from the user are managed
by, and distributed among, all the standalone
computers to form a cluster.
• This results in balanced computational work
among different machines, improving the
performance of the cluster systems.
• Often clusters are used primarily for
computational purposes, rather than handling
IO-oriented operations such as web service or
databases.
• For instance, a cluster might support
computational simulations of weather or
vehicle crashes.
• The primary distinction within computer
clusters is how tightly-coupled the individual
nodes are.
• For example, a single computer job may
require frequent communication among
nodes, which means that the cluster should
shares a dedicated network, is densely
located, and probably has homogenous nodes.
• This cluster design is called as Beowulf Cluster.
• The other type is where a computer job uses
one or few nodes, and needs little or no inter-
node communication.
• This type of cluster is sometimes called "Grid"
computing.
• Clustering uses server affinity to ensure that
according to applications requirements the
user interact with the same server during a
session get to the right server.
• This is most often used in applications
executing a process, for example order entry,
in which the session is used between requests
(pages) to store information that will be used
to conclude a transaction, for example a
shopping cart.
• Grid computing, the idea is very similar to
Cluster Computing however they are used for
solving large problems.
• Clusters are usually homogeneous and Grids
are heterogeneous.
• Homogeneous is where all CPU nodes have
the same Hardware configuration and OS.
• A cluster of clusters is usually a Grid.
• CPU nodes that are part of a Grid need not be
homogeneous and are usually spread across
LANs or WANs.
• Grids are a form of distributed computing.
• The “distributed” or “grid” computing, in
general, is a special type of parallel computing
that relies on complete computers (with
onboard CPUs, storage, power supplies,
network interfaces, etc.) connected to a
network (private, public or the Internet) by a
conventional network interface, such as
Ethernet.
• This is in contrast to the traditional notion of a
supercomputer, which has many processors
connected by a local high-speed computer
bus.
• CPU-scavenging, cycle-scavenging, cycle
stealing, or shared computing creates a “grid”
from the unused resources in a network .
• Typically this technique uses desktop
computer instruction cycles that would
otherwise be wasted at night, during lunch, or
even in the scattered seconds throughout the
day when the computer is waiting for user
input or slow devices.
• In practice, participating computers also
donate some supporting amount of disk
storage space, RAM, and network bandwidth,
in addition to raw CPU power.
What is CLOUD COMPUTING?
Cloud
Introduction to Cloud Computing
• The US National Institute of Standards and
Technology (NIST) defines the cloud as –
– Cloud computing is a model for enabling
ubiquitous, convenient, on-demand network
access to a shared pool of configurable computing
resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly
provisioned and released with minimal
management effort or service provider
interaction.
Introduction to Cloud Computing
• Cloud computing provides processing power,
software, data access, and storage services.
• It allows applications and services to run on a
distributed network using virtualized
resources.
• Also allows these to be accessed by common
internet protocols and networking standards.
• End-user is not required to know the physical
location and configuration of the system that
delivers the services.
Introduction to Cloud Computing
• It delivers higher efficiency, massive scalability,
and faster, easier software development.
• It’s about new programming models, new IT
infrastructure, and the enabling of new
business models.
• more efficient large-scale cloud deployments
that can provide the infrastructure for next-
generation business opportunities: social
networks, algorithmic trading, continuous risk
analysis, and so on.
Boundary of a Cloud
CLOUD COMPUTING BASICS
CLOUD Types
Cloud Types
• NIST has a set of working definitions that
separate cloud computing into two types of
models.
• Deployment model
– Based on the location of the cloud and its purpose
• Service model
– Based on the tye of service provided by the cloud.
Cloud Types
• Deployment models.
• Private cloud.
– an organization’s own cloud.
– It may be managed by the organization or a third party
– may exist on premise or off premise.
• Private clouds are a good option for companies dealing
with data protection and service-level issues.
• Private clouds are on-demand infrastructure owned
by a single customer who controls which applications
run, and where.
• They own the server, network, and disk and can decide
which users are allowed to use the infrastructure.
Private Cloud
Outsourced Private Cloud
Cloud Types
• Deployment models.
• Community cloud
– The cloud infrastructure is shared by several
organizations and supports a specific community.
– It may be managed by the organizations or a third party
– may exist on premise or off premise.
On-Site Community Cloud
Out Sourced Community Cloud
Cloud Types
• Deployment models.
• Public cloud.
– The cloud infrastructure is made available to the general
public
– May be used by large industry group
– Generally owned by an organization selling cloud services.
• Public clouds are run by third parties, and jobs from
many different customers may be mixed together on
the servers, storage systems, and other infrastructure
within the cloud.
• End users don’t know who else’s job may be running
on the same server, network, or disk as their own jobs.
Public Cloud
Cloud Types
• Deployment models.
• Hybrid cloud
– The cloud infrastructure is a composition of two or more
clouds (private, community, or public)
– bound together by standardized or proprietary technology
that enables data and application portability (e.g., cloud
bursting for load-balancing between clouds).
Cloud Types
• Service models.
• Software as a Service (SaaS).
• SaaS is at the highest layer and features a
complete application offered as a service, on-
demand, via multi-tenancy ,meaning a single
instance of the software runs on the provider’s
infrastructure and serves multiple client
organizations.
Cloud Types
• Service models.
• Software as Service (SaaS).
– The service provided to the consumer is to use the
provider’s applications running on a cloud infrastructure.
– The applications are accessible from various client devices
– Generally a thin client interface such as a Web browser is
provided.
– The consumer does not manage or control the underlying
cloud infrastructure including network, servers, operating
systems, storage, or even individual application
capabilities,
– exception of limited user-specific application configuration
settings.
Software as a Service
Scope of Control
Cloud Types
• Service models.
• Platform as Service (PaaS).
– Consumer uses cloud to deploy his applications.
– Applications can be consumer-created or acquired.
– applications created using programming languages
and tools supported by the provider.
– The consumer does not manage or control the
underlying cloud infrastructure
– Has control over the deployed applications and
possibly application hosting environment
configurations.
Platform as a Service
Scope of Control
Cloud Types
• Service models.
• Infrastructure as Service (IaaS).
– The processing, storage, networks, and other
fundamental computing resources are provided by the
cloud to the consumer.
– the consumer is able to deploy and run arbitrary
software, which can include operating systems and
applications.
– The consumer does not manage or control the
underlying cloud infrastructure but has control over
operating systems, storage, deployed applications, and
possibly limited control of select networking
components (e.g., host firewalls).
Infrastructure as a Service
Scope of Control
Essential Characteristics
• On-demand self-service.
– A consumer should receive computing
capabilities, such as server time and network
storage, as needed automatically without
requiring human interaction with each service’s
provider.
• Broad network access.
– services are available over the network and
accessed through standard mechanisms
– Support for use of heterogeneous thin or thick
client platforms (e.g., mobile phones, laptops, and
personal digital assistants (PDAs)).
Essential Characteristics
• Resource pooling.
– Support for computing resources pooling to serve
multiple consumers using a multi-tenant model
– different physical and virtual resources should be
dynamically assigned and reassigned according to
consumer demand.
– There is a sense of location independence in that
the subscriber generally has no control or
knowledge over the exact location of the provided
resources but may be able to specify location at a
higher level of abstraction (e.g., country, state, or
datacenter).
Essential Characteristics
• Rapid elasticity.
– Services or resources can be rapidly and elastically
provisioned, in some cases automatically, to
quickly scale out and rapidly released to quickly
scale in.
– To the consumer, the capabilities available for
provisioning often appear to be unlimited and can
be purchased in any quantity at any time.
Essential Characteristics
• Measured Service.
– Cloud systems automatically control and optimize
resource use by leveraging a metering capability at
some level of abstraction appropriate to the type
of service (e.g., storage, processing, bandwidth,
and active user accounts).
– Resource usage can be monitored, controlled,
and reported providing transparency for both the
provider and consumer of the utilized service.
Essential Characteristics
• Data in the cloud — More than just compute
utilities, cloud computing is increasingly about
petascale data.
• Open Storage products offer hybrid data servers
with unprecedented efficiency and
performance for the emerging data-intensive
computing applications that will become a key
part of the cloud.
Essential Characteristics
• Interoperability — While most current clouds
offer closed platforms and vendor lock-in,
developers clamor for interoperability.
• Open-source product strategy and Java™
principles are focused on providing
interoperability.
• Think of the existing cloud “islands” merging into
a new, interoperable “Intercloud” where
applications can be moved to and operate across
multiple platforms.
CLOUD CUBE MODEL
Jericho’s Cloud Cube Model
Jericho’s Cube Model
• Jericho Forum is the leading international IT security
thought-leadership association dedicated to
advancing secure business in a global open-network
environment.
• Members include top IT security officers from multi-
national Fortune 500s & entrepreneurial user
companies, major security vendors, government, &
academics.
• Working together, members drive approaches and
standards for a secure, collaborative online business
world.
Jericho’s Cube Model
• A model for evaluating and determining if and where
cloud-based computing makes sense for an
organization.
• The Jericho Forum’s so-called Cloud Cube Model
white paper , which provides best practices and
criteria for going to the cloud, as well as choosing the
appropriate service providers.
• The Jericho Forum cloud cube computing model is
designed to be an essential first tool to help business
evaluate the risk and opportunity associated with
moving into the cloud.
Jericho’s Cube Model
• The four dimensions of the cloud cube model are-
• Physical Location of the data
– Internal / External decide an organizations boundaries.
• Ownership
– Proprietary / Open decides the cost of technology
ownership, interoperability
• Security Boundary
– Perimererised / De-perimeterised decides wether
operation is inside or outside of the network firewall
• Sourcing
– Insourced / Outsourced decides if the service is provided
by the self staff or service provider.
Cloud Benefits
Benefits of Cloud Computing
• IT Efficiency — Minimize costs where
companies are converting their IT costs from
capital expenses to operating expenses
through technologies such as virtualization.
• Cloud computing begins as a way to improve
infrastructure resource deployment and
utilization, but fully exploiting this
infrastructure eventually leads to a new
application development model.
Benefits of Cloud Computing
• Business Agility — Maximize return using IT as a
competitive weapon through rapid time to
market, integrated application stacks, instant
machine image deployment, and petascale
parallel programming.
• Cloud computing is embraced as a critical way
to revolutionize time to service.
• But inevitably these services must be built on
equally innovative rapid-deployment-
infrastructure models.
Benefits of Cloud Computing
• Cloud computing enables IT organizations to
increase hardware utilization rates dramatically,
and to scale up to massive capacities in an
instant — without constantly having to invest in
new infrastructure, train new personnel, or
license new software.
• It also creates new opportunities to build a
better breed of network services, in less time,
for less money.
Benefits of Cloud Computing
• Cut the cost of running a datacenter — Cloud
computing improves infrastructure utilization
rates and streamlines resource management.
• For example, clouds allow for self-service
provisioning through APIs, bringing a higher level
of automation to the datacenter and reducing
management costs.
Benefits of Cloud Computing
• Eliminate over provisioning — Cloud computing
provides scaling on demand, which, when
combined with utility pricing, removes the need
to overprovision to meet demand.
• With cloud computing, companies can scale up
to massive capacities in an instant.
Benefits of Cloud Computing
• Accelerated cycles — The cloud computing
model provides a faster, more efficient way to
develop the new generation of applications and
services.
• Faster development and testing cycles means
businesses can accomplish in hours what used to
take days, weeks, or months.
Benefits of Cloud Computing
• Increase agility — Cloud computing
accommodates change like no other model.
• Animoto Productions, makers of a mashup tool
that creates video from images and music, used
cloud computing to scale up from 50 servers to
3,500 in just three days.
• Cloud computing can also provide a wider
selection of more lightweight and agile
development tools, simplifying and speeding up
the development process.
Benefits of Cloud Computing
• For end users, cloud computing means there are
no hardware acquisition costs, no software
licenses or upgrades to manage, no new
employees or consultants to hire, no facilities to
lease, no capital costs of any kind — and no
hidden costs.
• Just a metered, per-use rate or a fixed
subscription fee.
• Use only what you want, pay only for what you
use.
Benefits of Cloud Computing
• Lower Costs
– Usage based billing.
– Supports multi-tenancy
– Reduction in operational costs
– Minimal infrastructure Up gradation costs
– Reduced Licensing Fees
• Ease of utilization
– Browser based access
– Location independent access
• Quality of Service
– On demand from provider
Benefits of Cloud Computing
• Reliability
– The scale of cloud computing networks and their
ability to provide load balancing and failover.
• Outsourced IT management
– Cloud provider manages IT infrastructure
– Control over IT expenses
• Simplified Maintenance and Upgrade
– Centralized System
– Easy patching and upgrade
• Low Barrier to Entry
Cloud Providers
• SaaS –
– Google Apps
– Microsoft Office 365
– SalesForce.com
– SQL Azure
– Oracle on Demand
Cloud Providers
• PaaS –
– Google AppsEngine
– Microsoft Azure
– Force.com
– GoGrid CloudCenter
Cloud Providers
• IaaS –
– Amazon Elastic Compute Cloud (EC2)
– Eucalyptus
– GoGrid
– Rackspace Cloud
– Desktone
– CloudSigma
An Introduction to Cloud Computing and Lates Developments.ppt

More Related Content

Similar to An Introduction to Cloud Computing and Lates Developments.ppt

Cloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr AliCloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr AliAmr Ali
 
3 - Grid Computing.pptx
3 - Grid Computing.pptx3 - Grid Computing.pptx
3 - Grid Computing.pptxRiazSalim1
 
Cloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxCloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxatul190389
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptxNikitaOG
 
Cloud Computing - Geektalk
Cloud Computing - GeektalkCloud Computing - Geektalk
Cloud Computing - GeektalkMalisa Ncube
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 
Cloud computing and Docker
Cloud computing and DockerCloud computing and Docker
Cloud computing and DockerSrinivasVaddi4
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdfNehaam3
 
Cloud-mod1-chap1.pptx
Cloud-mod1-chap1.pptxCloud-mod1-chap1.pptx
Cloud-mod1-chap1.pptxchayashree12
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system Sarvesh Meena
 
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdfPPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdfVineet446350
 
cloud computing-Introduction
cloud computing-Introductioncloud computing-Introduction
cloud computing-IntroductionSuchithra Suriya
 

Similar to An Introduction to Cloud Computing and Lates Developments.ppt (20)

CC unit 1.pptx
CC unit 1.pptxCC unit 1.pptx
CC unit 1.pptx
 
Cloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr AliCloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr Ali
 
cluster computing
cluster computingcluster computing
cluster computing
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
3 - Grid Computing.pptx
3 - Grid Computing.pptx3 - Grid Computing.pptx
3 - Grid Computing.pptx
 
Cloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptxCloud00000000000000000000Computing1.pptx
Cloud00000000000000000000Computing1.pptx
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing - Geektalk
Cloud Computing - GeektalkCloud Computing - Geektalk
Cloud Computing - Geektalk
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
Cloud computing and Docker
Cloud computing and DockerCloud computing and Docker
Cloud computing and Docker
 
Cloud computing_Final
Cloud computing_FinalCloud computing_Final
Cloud computing_Final
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
CLUSTER COMPUTING
CLUSTER COMPUTINGCLUSTER COMPUTING
CLUSTER COMPUTING
 
Cloud-mod1-chap1.pptx
Cloud-mod1-chap1.pptxCloud-mod1-chap1.pptx
Cloud-mod1-chap1.pptx
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
 
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdfPPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
PPT_CLOUD COMPUTING_UNIT 1.pptx.pdf
 
cloud computing
cloud computingcloud computing
cloud computing
 
cloud computing-Introduction
cloud computing-Introductioncloud computing-Introduction
cloud computing-Introduction
 
cloud computin
cloud computincloud computin
cloud computin
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

An Introduction to Cloud Computing and Lates Developments.ppt

  • 2. Load Balancing • Load balancing improves network performance by distributing traffic efficiently so that individual servers are not overwhelmed by sudden fluctuations in activity. • Server Load Balancing is a critical component of high availability, clustering, and fault tolerance, all of which provide the infrastructure for reliable Internet sites and large corporate networks.
  • 3.
  • 4. • Load balancing is a computer networking methodology to distribute workload across multiple computers or a computer cluster, network links, central processing units, disk drives, or other resources, to achieve optimal resource utilization, maximize throughput, minimize response time, and avoid overload. • Usually provided by dedicated software or hardware. • Multiple layers of load balancing may be used in High-performance systems .
  • 5.
  • 6. • Load balancers use a variety of scheduling algorithms to determine which backend server to send a request to. • Simple algorithms include random choice or round robin. • Sophisticated load balancers may take into account additional factors, such as a server's reported load, recent response times, up/down status ,number of active connections, geographic location, capabilities, or how much traffic it has recently been assigned.
  • 7.
  • 8. • An important issue when operating a load- balanced service is how to handle information that must be kept across the multiple requests in a user's session. • If this information is stored locally on one backend server, then subsequent requests going to different backend servers would not be able to find it. • This might be cached information that can be recomputed, in which case load-balancing a request to a different backend server just introduces a performance issue.
  • 9. • One solution to the session data issue is to send all requests in a user session consistently to the same backend server. • This is known as persistence or stickiness. • However this technique fails to provide automatic failover: if a backend server goes down, its per-session information becomes inaccessible, and any sessions depending on it are lost. • Random assignments must be remembered by the load balancer, which creates a burden on storage.
  • 10. • If the load balancer is replaced or fails, this information may be lost. • Assignments may need to be deleted after a timeout period or during periods of high load to avoid exceeding the space available for the assignment table. • The random assignment method also requires that clients maintain some state, which can be a problem, for example when a web browser has disabled storage of cookies. • Sophisticated load balancers use multiple persistence techniques to avoid some of the
  • 11. Clustering • A computer cluster is a group of linked computers, working together closely thus in many respects forming a single computer. • The components of a cluster are commonly, but not always, connected to each other through fast local area networks. • Clusters are usually deployed to improve performance and availability over that of a single computer,
  • 12. • High-availability clusters or failover clusters are implemented primarily to improve the availability of services that the cluster provides. • They use redundant nodes, which are then used to provide service when system components fail. • The most common size for an HA cluster is two nodes, which is the minimum requirement to provide redundancy. • HA clusters eliminate single points of failure.
  • 13. • Load-balancing is when multiple computers are linked together to share computational workload or function as a single virtual computer. • Logically, from the user side, they are multiple machines, but function as a single virtual machine.
  • 14. • Requests initiated from the user are managed by, and distributed among, all the standalone computers to form a cluster. • This results in balanced computational work among different machines, improving the performance of the cluster systems.
  • 15. • Often clusters are used primarily for computational purposes, rather than handling IO-oriented operations such as web service or databases. • For instance, a cluster might support computational simulations of weather or vehicle crashes. • The primary distinction within computer clusters is how tightly-coupled the individual nodes are.
  • 16. • For example, a single computer job may require frequent communication among nodes, which means that the cluster should shares a dedicated network, is densely located, and probably has homogenous nodes. • This cluster design is called as Beowulf Cluster. • The other type is where a computer job uses one or few nodes, and needs little or no inter- node communication. • This type of cluster is sometimes called "Grid" computing.
  • 17. • Clustering uses server affinity to ensure that according to applications requirements the user interact with the same server during a session get to the right server. • This is most often used in applications executing a process, for example order entry, in which the session is used between requests (pages) to store information that will be used to conclude a transaction, for example a shopping cart.
  • 18. • Grid computing, the idea is very similar to Cluster Computing however they are used for solving large problems. • Clusters are usually homogeneous and Grids are heterogeneous. • Homogeneous is where all CPU nodes have the same Hardware configuration and OS. • A cluster of clusters is usually a Grid. • CPU nodes that are part of a Grid need not be homogeneous and are usually spread across LANs or WANs.
  • 19. • Grids are a form of distributed computing. • The “distributed” or “grid” computing, in general, is a special type of parallel computing that relies on complete computers (with onboard CPUs, storage, power supplies, network interfaces, etc.) connected to a network (private, public or the Internet) by a conventional network interface, such as Ethernet. • This is in contrast to the traditional notion of a supercomputer, which has many processors connected by a local high-speed computer bus.
  • 20. • CPU-scavenging, cycle-scavenging, cycle stealing, or shared computing creates a “grid” from the unused resources in a network . • Typically this technique uses desktop computer instruction cycles that would otherwise be wasted at night, during lunch, or even in the scattered seconds throughout the day when the computer is waiting for user input or slow devices. • In practice, participating computers also donate some supporting amount of disk storage space, RAM, and network bandwidth, in addition to raw CPU power.
  • 21. What is CLOUD COMPUTING?
  • 22. Cloud
  • 23. Introduction to Cloud Computing • The US National Institute of Standards and Technology (NIST) defines the cloud as – – Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
  • 24. Introduction to Cloud Computing • Cloud computing provides processing power, software, data access, and storage services. • It allows applications and services to run on a distributed network using virtualized resources. • Also allows these to be accessed by common internet protocols and networking standards. • End-user is not required to know the physical location and configuration of the system that delivers the services.
  • 25. Introduction to Cloud Computing • It delivers higher efficiency, massive scalability, and faster, easier software development. • It’s about new programming models, new IT infrastructure, and the enabling of new business models. • more efficient large-scale cloud deployments that can provide the infrastructure for next- generation business opportunities: social networks, algorithmic trading, continuous risk analysis, and so on.
  • 26. Boundary of a Cloud
  • 29. Cloud Types • NIST has a set of working definitions that separate cloud computing into two types of models. • Deployment model – Based on the location of the cloud and its purpose • Service model – Based on the tye of service provided by the cloud.
  • 30. Cloud Types • Deployment models. • Private cloud. – an organization’s own cloud. – It may be managed by the organization or a third party – may exist on premise or off premise. • Private clouds are a good option for companies dealing with data protection and service-level issues. • Private clouds are on-demand infrastructure owned by a single customer who controls which applications run, and where. • They own the server, network, and disk and can decide which users are allowed to use the infrastructure.
  • 33. Cloud Types • Deployment models. • Community cloud – The cloud infrastructure is shared by several organizations and supports a specific community. – It may be managed by the organizations or a third party – may exist on premise or off premise.
  • 36. Cloud Types • Deployment models. • Public cloud. – The cloud infrastructure is made available to the general public – May be used by large industry group – Generally owned by an organization selling cloud services. • Public clouds are run by third parties, and jobs from many different customers may be mixed together on the servers, storage systems, and other infrastructure within the cloud. • End users don’t know who else’s job may be running on the same server, network, or disk as their own jobs.
  • 38. Cloud Types • Deployment models. • Hybrid cloud – The cloud infrastructure is a composition of two or more clouds (private, community, or public) – bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).
  • 39. Cloud Types • Service models. • Software as a Service (SaaS). • SaaS is at the highest layer and features a complete application offered as a service, on- demand, via multi-tenancy ,meaning a single instance of the software runs on the provider’s infrastructure and serves multiple client organizations.
  • 40. Cloud Types • Service models. • Software as Service (SaaS). – The service provided to the consumer is to use the provider’s applications running on a cloud infrastructure. – The applications are accessible from various client devices – Generally a thin client interface such as a Web browser is provided. – The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, – exception of limited user-specific application configuration settings.
  • 41. Software as a Service
  • 43. Cloud Types • Service models. • Platform as Service (PaaS). – Consumer uses cloud to deploy his applications. – Applications can be consumer-created or acquired. – applications created using programming languages and tools supported by the provider. – The consumer does not manage or control the underlying cloud infrastructure – Has control over the deployed applications and possibly application hosting environment configurations.
  • 44. Platform as a Service
  • 46.
  • 47. Cloud Types • Service models. • Infrastructure as Service (IaaS). – The processing, storage, networks, and other fundamental computing resources are provided by the cloud to the consumer. – the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. – The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).
  • 50.
  • 51. Essential Characteristics • On-demand self-service. – A consumer should receive computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service’s provider. • Broad network access. – services are available over the network and accessed through standard mechanisms – Support for use of heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and personal digital assistants (PDAs)).
  • 52. Essential Characteristics • Resource pooling. – Support for computing resources pooling to serve multiple consumers using a multi-tenant model – different physical and virtual resources should be dynamically assigned and reassigned according to consumer demand. – There is a sense of location independence in that the subscriber generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter).
  • 53. Essential Characteristics • Rapid elasticity. – Services or resources can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. – To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
  • 54. Essential Characteristics • Measured Service. – Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). – Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
  • 55. Essential Characteristics • Data in the cloud — More than just compute utilities, cloud computing is increasingly about petascale data. • Open Storage products offer hybrid data servers with unprecedented efficiency and performance for the emerging data-intensive computing applications that will become a key part of the cloud.
  • 56. Essential Characteristics • Interoperability — While most current clouds offer closed platforms and vendor lock-in, developers clamor for interoperability. • Open-source product strategy and Java™ principles are focused on providing interoperability. • Think of the existing cloud “islands” merging into a new, interoperable “Intercloud” where applications can be moved to and operate across multiple platforms.
  • 59. Jericho’s Cube Model • Jericho Forum is the leading international IT security thought-leadership association dedicated to advancing secure business in a global open-network environment. • Members include top IT security officers from multi- national Fortune 500s & entrepreneurial user companies, major security vendors, government, & academics. • Working together, members drive approaches and standards for a secure, collaborative online business world.
  • 60. Jericho’s Cube Model • A model for evaluating and determining if and where cloud-based computing makes sense for an organization. • The Jericho Forum’s so-called Cloud Cube Model white paper , which provides best practices and criteria for going to the cloud, as well as choosing the appropriate service providers. • The Jericho Forum cloud cube computing model is designed to be an essential first tool to help business evaluate the risk and opportunity associated with moving into the cloud.
  • 61. Jericho’s Cube Model • The four dimensions of the cloud cube model are- • Physical Location of the data – Internal / External decide an organizations boundaries. • Ownership – Proprietary / Open decides the cost of technology ownership, interoperability • Security Boundary – Perimererised / De-perimeterised decides wether operation is inside or outside of the network firewall • Sourcing – Insourced / Outsourced decides if the service is provided by the self staff or service provider.
  • 63. Benefits of Cloud Computing • IT Efficiency — Minimize costs where companies are converting their IT costs from capital expenses to operating expenses through technologies such as virtualization. • Cloud computing begins as a way to improve infrastructure resource deployment and utilization, but fully exploiting this infrastructure eventually leads to a new application development model.
  • 64. Benefits of Cloud Computing • Business Agility — Maximize return using IT as a competitive weapon through rapid time to market, integrated application stacks, instant machine image deployment, and petascale parallel programming. • Cloud computing is embraced as a critical way to revolutionize time to service. • But inevitably these services must be built on equally innovative rapid-deployment- infrastructure models.
  • 65. Benefits of Cloud Computing • Cloud computing enables IT organizations to increase hardware utilization rates dramatically, and to scale up to massive capacities in an instant — without constantly having to invest in new infrastructure, train new personnel, or license new software. • It also creates new opportunities to build a better breed of network services, in less time, for less money.
  • 66. Benefits of Cloud Computing • Cut the cost of running a datacenter — Cloud computing improves infrastructure utilization rates and streamlines resource management. • For example, clouds allow for self-service provisioning through APIs, bringing a higher level of automation to the datacenter and reducing management costs.
  • 67. Benefits of Cloud Computing • Eliminate over provisioning — Cloud computing provides scaling on demand, which, when combined with utility pricing, removes the need to overprovision to meet demand. • With cloud computing, companies can scale up to massive capacities in an instant.
  • 68. Benefits of Cloud Computing • Accelerated cycles — The cloud computing model provides a faster, more efficient way to develop the new generation of applications and services. • Faster development and testing cycles means businesses can accomplish in hours what used to take days, weeks, or months.
  • 69. Benefits of Cloud Computing • Increase agility — Cloud computing accommodates change like no other model. • Animoto Productions, makers of a mashup tool that creates video from images and music, used cloud computing to scale up from 50 servers to 3,500 in just three days. • Cloud computing can also provide a wider selection of more lightweight and agile development tools, simplifying and speeding up the development process.
  • 70. Benefits of Cloud Computing • For end users, cloud computing means there are no hardware acquisition costs, no software licenses or upgrades to manage, no new employees or consultants to hire, no facilities to lease, no capital costs of any kind — and no hidden costs. • Just a metered, per-use rate or a fixed subscription fee. • Use only what you want, pay only for what you use.
  • 71. Benefits of Cloud Computing • Lower Costs – Usage based billing. – Supports multi-tenancy – Reduction in operational costs – Minimal infrastructure Up gradation costs – Reduced Licensing Fees • Ease of utilization – Browser based access – Location independent access • Quality of Service – On demand from provider
  • 72. Benefits of Cloud Computing • Reliability – The scale of cloud computing networks and their ability to provide load balancing and failover. • Outsourced IT management – Cloud provider manages IT infrastructure – Control over IT expenses • Simplified Maintenance and Upgrade – Centralized System – Easy patching and upgrade • Low Barrier to Entry
  • 73. Cloud Providers • SaaS – – Google Apps – Microsoft Office 365 – SalesForce.com – SQL Azure – Oracle on Demand
  • 74. Cloud Providers • PaaS – – Google AppsEngine – Microsoft Azure – Force.com – GoGrid CloudCenter
  • 75. Cloud Providers • IaaS – – Amazon Elastic Compute Cloud (EC2) – Eucalyptus – GoGrid – Rackspace Cloud – Desktone – CloudSigma