The document provides an overview of cloud computing, including its key concepts and components. It discusses the different deployment models (public, private, hybrid, community clouds), service models (IaaS, PaaS, SaaS), characteristics, benefits, history and evolution. Communication protocols used in cloud computing like HTTP, HTTPS and various RPC implementations are also mentioned. The role of open standards in cloud architecture including virtualization, SOA, open-source software and web services is assessed.
This slides will provide viewers a complete understanding of all the different virtualization techniques.
The main reference for the presentation is taken from Mastering cloud computing By Rajkumar Buyya.
Cloud computing provides on-demand access to shared computing resources like applications and storage over the internet. It works based on deployment models (public, private, hybrid, community clouds) and service models (Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)). IaaS provides basic computing and storage resources, PaaS provides platforms for building applications, and SaaS provides ready-to-use software applications delivered over the internet. The main advantages of cloud computing include lower costs, improved performance, unlimited storage, and device independence while disadvantages include reliance on internet and potential security and control issues.
Federated Cloud Computing - The OpenNebula Experience v1.0sIgnacio M. Llorente
The talk mostly focuses on private cloud computing to support Science and High Performance Computing environments, the different architectures to federate cloud infrastructures, the existing challenges for cloud interoperability, and the OpenNebula's vision for the future of existing Grid infrastructures.
Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers)..
Virtualization is a proved technology that makes it possible to run multiple operating system and applications on the same server at same time.
Virtualization is the process of creating a logical(virtual) version of a server operating system, a storage device, or network services.
The technology that work behind virtualization is known as a virtual machine monitor(VM), or virtual manager which separates compute environments from the actual physical infrastructure.
- Virtualization allows multiple operating systems to run concurrently on a single physical machine by presenting each virtual operating system with a virtual hardware environment. A hypervisor manages access to the physical hardware resources and isolates the virtual machines.
- Cloud computing extends virtualization by allowing virtual servers and other resources to be dynamically provisioned on demand from large shared computing infrastructure. This improves flexibility and allows users to pay only for resources that are consumed.
- The hypervisor software manages the virtual machines and allocates physical resources to each one while isolating them from each other. Example hypervisors include VMware, Xen, and KVM. Virtualization improves hardware utilization and makes infrastructure more flexible and cost-effective.
Cloud computing has several key characteristics that provide benefits to both consumers and providers of cloud services. These characteristics include on-demand access to resources, no upfront commitments, simplified scalability, efficient allocation of resources, and energy efficiency. The essential characteristics of cloud computing that define its nature include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured services.
Provides a simple and unambiguous taxonomy of three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and Hybrid cloud)
Virtualization allows multiple operating systems and applications to run on the same hardware at the same time by simulating virtual hardware. There are two main types of virtualization architectures: hosted, where a hypervisor runs on a conventional operating system; and bare-metal, where the hypervisor runs directly on the hardware. Virtualization can be applied to desktops, servers, networks, storage and applications. It provides benefits such as reduced costs, simplified management, and the ability to run multiple systems on one physical machine.
This slides will provide viewers a complete understanding of all the different virtualization techniques.
The main reference for the presentation is taken from Mastering cloud computing By Rajkumar Buyya.
Cloud computing provides on-demand access to shared computing resources like applications and storage over the internet. It works based on deployment models (public, private, hybrid, community clouds) and service models (Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)). IaaS provides basic computing and storage resources, PaaS provides platforms for building applications, and SaaS provides ready-to-use software applications delivered over the internet. The main advantages of cloud computing include lower costs, improved performance, unlimited storage, and device independence while disadvantages include reliance on internet and potential security and control issues.
Federated Cloud Computing - The OpenNebula Experience v1.0sIgnacio M. Llorente
The talk mostly focuses on private cloud computing to support Science and High Performance Computing environments, the different architectures to federate cloud infrastructures, the existing challenges for cloud interoperability, and the OpenNebula's vision for the future of existing Grid infrastructures.
Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers)..
Virtualization is a proved technology that makes it possible to run multiple operating system and applications on the same server at same time.
Virtualization is the process of creating a logical(virtual) version of a server operating system, a storage device, or network services.
The technology that work behind virtualization is known as a virtual machine monitor(VM), or virtual manager which separates compute environments from the actual physical infrastructure.
- Virtualization allows multiple operating systems to run concurrently on a single physical machine by presenting each virtual operating system with a virtual hardware environment. A hypervisor manages access to the physical hardware resources and isolates the virtual machines.
- Cloud computing extends virtualization by allowing virtual servers and other resources to be dynamically provisioned on demand from large shared computing infrastructure. This improves flexibility and allows users to pay only for resources that are consumed.
- The hypervisor software manages the virtual machines and allocates physical resources to each one while isolating them from each other. Example hypervisors include VMware, Xen, and KVM. Virtualization improves hardware utilization and makes infrastructure more flexible and cost-effective.
Cloud computing has several key characteristics that provide benefits to both consumers and providers of cloud services. These characteristics include on-demand access to resources, no upfront commitments, simplified scalability, efficient allocation of resources, and energy efficiency. The essential characteristics of cloud computing that define its nature include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured services.
Provides a simple and unambiguous taxonomy of three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and Hybrid cloud)
Virtualization allows multiple operating systems and applications to run on the same hardware at the same time by simulating virtual hardware. There are two main types of virtualization architectures: hosted, where a hypervisor runs on a conventional operating system; and bare-metal, where the hypervisor runs directly on the hardware. Virtualization can be applied to desktops, servers, networks, storage and applications. It provides benefits such as reduced costs, simplified management, and the ability to run multiple systems on one physical machine.
The document discusses different types of virtualization including hardware, network, storage, memory, software, data, and desktop virtualization. Hardware virtualization includes full, para, and partial virtualization. Network virtualization includes internal and external virtualization. Storage virtualization includes block and file virtualization. Memory virtualization enhances performance through shared, distributed, or networked memory that acts as an extension of main memory. Software virtualization allows guest operating systems to run virtually. Data virtualization manipulates data without technical details. Desktop virtualization provides remote access to work from any location for flexibility and data security.
This document discusses different aspects of virtualization including CPU, memory, I/O devices, and multi-core processors. It describes how CPU virtualization works by classifying instructions as privileged, control-sensitive, or behavior-sensitive and having a virtual machine monitor mediate access. Memory virtualization uses two-stage address mapping between virtual and physical memory. I/O virtualization manages routing requests between virtual and physical devices using emulation, para-virtualization, or direct access. Virtualizing multi-core processors introduces challenges for programming models, scheduling, and managing heterogeneous resources.
Virtualization allows multiple operating systems and applications to run on a single hardware device by dividing the resources virtually. It provides isolation, encapsulation, and interposition. There are two types of hypervisors - Type 1 runs directly on hardware and Type 2 runs on an operating system. Virtualization can be applied to servers, desktops, applications, networks, and storage to improve utilization, security, and manageability.
Implementation levels of virtualizationGokulnath S
Virtualization allows multiple virtual machines to run on the same physical machine. It improves resource sharing and utilization. Traditional computers run a single operating system tailored to the hardware, while virtualization allows different guest operating systems to run independently on the same hardware. Virtualization software creates an abstraction layer at different levels - instruction set architecture, hardware, operating system, library, and application levels. Virtual machines at the operating system level have low startup costs and can easily synchronize with the environment, but all virtual machines must use the same or similar guest operating system.
Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive.In computer networking, cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet.
This document discusses cloud computing and provides details on:
1) The types of cloud environments including public, private, hybrid, and community clouds and the advantages and disadvantages of each.
2) The key characteristics of cloud computing including on-demand self-service, broad network access, dynamic resource pooling, efficient infrastructure, and measured service provision.
3) The advantages of cloud computing such as reduced hardware costs, unlimited storage and reliability, and flexibility and mobility.
The document discusses cloud resource management and cloud computing architecture. It covers the following key points in 3 sentences:
Cloud architecture can be broadly divided into the front end, which consists of interfaces and applications for accessing cloud platforms, and the back end, which comprises resources for providing cloud services like storage, virtual machines, and security mechanisms. Common cloud service models include infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Virtualization techniques allow for the sharing of physical resources among multiple organizations by assigning logical names to physical resources and providing pointers to access them.
The document is a question bank for the cloud computing course CS8791. It contains 26 multiple choice or short answer questions related to key concepts in cloud computing including definitions of cloud computing, characteristics of clouds, deployment models, service models, elasticity, horizontal and vertical scaling, live migration techniques, and dynamic resource provisioning.
The document discusses service level agreement (SLA) management in cloud computing. It describes the five phases of SLA management: feasibility, on-boarding, pre-production, production, and termination. In the feasibility phase, technical, infrastructure, and financial feasibility of hosting an application on a cloud platform are assessed. In the on-boarding phase, the application is moved to the hosting platform and its performance is analyzed. The pre-production phase involves hosting the application in a test environment to validate the SLA. In production, the application goes live under the agreed SLA. Finally, termination occurs when hosting is ended and customer data is transferred or removed.
The document discusses different cloud deployment models including private cloud, public cloud, and hybrid cloud. Private cloud is owned and operated solely by a single organization, public cloud is owned by third-party providers and accessible to the general public, and hybrid cloud combines both private and public clouds. Each deployment model offers different benefits related to cost, control, security, and flexibility that organizations can leverage to meet their unique needs.
Virtual versions of servers, applications, networks and storage can be created through virtualization. Its main types include operating system virtualization (VMs), hardware virtualization, application-server virtualization, storage virtualization, network virtualization, administrative virtualization and application virtualization.
Infrastructure as a Service ( IaaS) is one of the three fundamental services in cloud computing. IaaS provides access to basic computing resources such as hardware- processor, storage , network cards and more
This document provides an overview of CloudSim, an open-source simulation toolkit for modeling and simulating cloud computing environments and applications. It discusses CloudSim's architecture, features, and applications. CloudSim provides a framework for modeling data centers, cloud resources, virtual machines, and cloud services to simulate cloud computing infrastructure and platforms. It has been used by researchers around the world for applications like evaluating resource allocation algorithms, energy-efficient management of data centers, and optimization of cloud computing environments and workflows.
Cluster computing involves linking multiple computers together to act as a single system. There are three main types of computer clusters: high availability clusters which maintain redundant backup nodes for reliability, load balancing clusters which distribute workloads efficiently across nodes, and high-performance clusters which exploit parallel processing across nodes. Clusters offer benefits like increased processing power, cost efficiency, expandability, and high availability.
Virtualization allows multiple operating systems to run simultaneously on a single computer by transforming hardware into software. It works by installing a virtualization layer, either using a bare-metal hypervisor that does not require an operating system or a hosted hypervisor that runs as an application on an operating system. Each operating system runs within an isolated virtual machine, which appears like a separate computer to users but shares the physical resources of the host computer. Different types of virtualization include full, para, and OS-level virtualization. Virtualization enables server consolidation and transformation of physical servers for multiple applications.
This document discusses thread scheduling in operating systems. It defines threads as the basic unit of CPU utilization and describes different types of threads like user-level and kernel-level threads. It explains that thread scheduling is needed to exploit parallelism in multiprocessor systems. Common approaches to thread scheduling include load sharing, dedicated processor assignment, and dynamic scheduling. It provides examples of thread scheduling in Solaris, Linux, and Windows XP operating systems.
Virtualization allows multiple operating systems to run simultaneously on a single physical server using a hypervisor. This reduces costs by improving hardware utilization, lowering maintenance needs, and providing continuous server uptime. There are two main hypervisor types: native hypervisors have direct access to server hardware while hosted hypervisors run within an operating system. Virtualization offers advantages like zero downtime maintenance, dynamic resource allocation, and automated backups.
Client/server computing involves separating tasks between client and server machines. The client makes requests that are processed by the server, which returns results to the client. Key elements are the client, server, and network connecting them. Major focus is on the software handling tasks like the user interface, application logic, and data management between client and server. Different types of servers specialize in files, data, computing tasks, databases, and communication between networks.
Cloud load balancing distributes workloads and network traffic across computing resources in a cloud environment to improve performance and availability. It routes incoming traffic to multiple servers or other resources while balancing the load. Load balancing in the cloud is typically software-based and offers benefits like scalability, reliability, reduced costs, and flexibility compared to traditional hardware-based load balancing. Common cloud providers like AWS, Google Cloud, and Microsoft Azure offer multiple load balancing options that vary based on needs and network layers.
Unit-I Introduction to Cloud Computing.pptxgarkhot123
Cloud computing involves delivering computing resources such as servers, storage, databases, networking, software, analytics and more over the internet ("the cloud"). Key aspects include on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service. Major cloud computing service providers include Amazon Web Services, Microsoft Azure and Google Cloud. Cloud computing offers advantages like reduced costs, increased collaboration and flexibility.
Cloud Computing and Virtualization Overview by Amr AliAmr Ali
Cloud computing allows dynamically scalable resources to be provided as services via a shared network from remote locations. It provides computing power, infrastructure, applications and business processes as services whenever needed. While it offers benefits like elasticity and cost savings, obstacles to cloud adoption include security, vendor lock-in, network bottlenecks and ensuring fast scalability. A survey of over 50 CIOs found that production cloud use is still limited, with concerns over security and lack of control preventing more aggressive adoption, though respondents expect the majority of infrastructure to be in the cloud within the next few years.
The document discusses different types of virtualization including hardware, network, storage, memory, software, data, and desktop virtualization. Hardware virtualization includes full, para, and partial virtualization. Network virtualization includes internal and external virtualization. Storage virtualization includes block and file virtualization. Memory virtualization enhances performance through shared, distributed, or networked memory that acts as an extension of main memory. Software virtualization allows guest operating systems to run virtually. Data virtualization manipulates data without technical details. Desktop virtualization provides remote access to work from any location for flexibility and data security.
This document discusses different aspects of virtualization including CPU, memory, I/O devices, and multi-core processors. It describes how CPU virtualization works by classifying instructions as privileged, control-sensitive, or behavior-sensitive and having a virtual machine monitor mediate access. Memory virtualization uses two-stage address mapping between virtual and physical memory. I/O virtualization manages routing requests between virtual and physical devices using emulation, para-virtualization, or direct access. Virtualizing multi-core processors introduces challenges for programming models, scheduling, and managing heterogeneous resources.
Virtualization allows multiple operating systems and applications to run on a single hardware device by dividing the resources virtually. It provides isolation, encapsulation, and interposition. There are two types of hypervisors - Type 1 runs directly on hardware and Type 2 runs on an operating system. Virtualization can be applied to servers, desktops, applications, networks, and storage to improve utilization, security, and manageability.
Implementation levels of virtualizationGokulnath S
Virtualization allows multiple virtual machines to run on the same physical machine. It improves resource sharing and utilization. Traditional computers run a single operating system tailored to the hardware, while virtualization allows different guest operating systems to run independently on the same hardware. Virtualization software creates an abstraction layer at different levels - instruction set architecture, hardware, operating system, library, and application levels. Virtual machines at the operating system level have low startup costs and can easily synchronize with the environment, but all virtual machines must use the same or similar guest operating system.
Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive.In computer networking, cloud computing is a phrase used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet.
This document discusses cloud computing and provides details on:
1) The types of cloud environments including public, private, hybrid, and community clouds and the advantages and disadvantages of each.
2) The key characteristics of cloud computing including on-demand self-service, broad network access, dynamic resource pooling, efficient infrastructure, and measured service provision.
3) The advantages of cloud computing such as reduced hardware costs, unlimited storage and reliability, and flexibility and mobility.
The document discusses cloud resource management and cloud computing architecture. It covers the following key points in 3 sentences:
Cloud architecture can be broadly divided into the front end, which consists of interfaces and applications for accessing cloud platforms, and the back end, which comprises resources for providing cloud services like storage, virtual machines, and security mechanisms. Common cloud service models include infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Virtualization techniques allow for the sharing of physical resources among multiple organizations by assigning logical names to physical resources and providing pointers to access them.
The document is a question bank for the cloud computing course CS8791. It contains 26 multiple choice or short answer questions related to key concepts in cloud computing including definitions of cloud computing, characteristics of clouds, deployment models, service models, elasticity, horizontal and vertical scaling, live migration techniques, and dynamic resource provisioning.
The document discusses service level agreement (SLA) management in cloud computing. It describes the five phases of SLA management: feasibility, on-boarding, pre-production, production, and termination. In the feasibility phase, technical, infrastructure, and financial feasibility of hosting an application on a cloud platform are assessed. In the on-boarding phase, the application is moved to the hosting platform and its performance is analyzed. The pre-production phase involves hosting the application in a test environment to validate the SLA. In production, the application goes live under the agreed SLA. Finally, termination occurs when hosting is ended and customer data is transferred or removed.
The document discusses different cloud deployment models including private cloud, public cloud, and hybrid cloud. Private cloud is owned and operated solely by a single organization, public cloud is owned by third-party providers and accessible to the general public, and hybrid cloud combines both private and public clouds. Each deployment model offers different benefits related to cost, control, security, and flexibility that organizations can leverage to meet their unique needs.
Virtual versions of servers, applications, networks and storage can be created through virtualization. Its main types include operating system virtualization (VMs), hardware virtualization, application-server virtualization, storage virtualization, network virtualization, administrative virtualization and application virtualization.
Infrastructure as a Service ( IaaS) is one of the three fundamental services in cloud computing. IaaS provides access to basic computing resources such as hardware- processor, storage , network cards and more
This document provides an overview of CloudSim, an open-source simulation toolkit for modeling and simulating cloud computing environments and applications. It discusses CloudSim's architecture, features, and applications. CloudSim provides a framework for modeling data centers, cloud resources, virtual machines, and cloud services to simulate cloud computing infrastructure and platforms. It has been used by researchers around the world for applications like evaluating resource allocation algorithms, energy-efficient management of data centers, and optimization of cloud computing environments and workflows.
Cluster computing involves linking multiple computers together to act as a single system. There are three main types of computer clusters: high availability clusters which maintain redundant backup nodes for reliability, load balancing clusters which distribute workloads efficiently across nodes, and high-performance clusters which exploit parallel processing across nodes. Clusters offer benefits like increased processing power, cost efficiency, expandability, and high availability.
Virtualization allows multiple operating systems to run simultaneously on a single computer by transforming hardware into software. It works by installing a virtualization layer, either using a bare-metal hypervisor that does not require an operating system or a hosted hypervisor that runs as an application on an operating system. Each operating system runs within an isolated virtual machine, which appears like a separate computer to users but shares the physical resources of the host computer. Different types of virtualization include full, para, and OS-level virtualization. Virtualization enables server consolidation and transformation of physical servers for multiple applications.
This document discusses thread scheduling in operating systems. It defines threads as the basic unit of CPU utilization and describes different types of threads like user-level and kernel-level threads. It explains that thread scheduling is needed to exploit parallelism in multiprocessor systems. Common approaches to thread scheduling include load sharing, dedicated processor assignment, and dynamic scheduling. It provides examples of thread scheduling in Solaris, Linux, and Windows XP operating systems.
Virtualization allows multiple operating systems to run simultaneously on a single physical server using a hypervisor. This reduces costs by improving hardware utilization, lowering maintenance needs, and providing continuous server uptime. There are two main hypervisor types: native hypervisors have direct access to server hardware while hosted hypervisors run within an operating system. Virtualization offers advantages like zero downtime maintenance, dynamic resource allocation, and automated backups.
Client/server computing involves separating tasks between client and server machines. The client makes requests that are processed by the server, which returns results to the client. Key elements are the client, server, and network connecting them. Major focus is on the software handling tasks like the user interface, application logic, and data management between client and server. Different types of servers specialize in files, data, computing tasks, databases, and communication between networks.
Cloud load balancing distributes workloads and network traffic across computing resources in a cloud environment to improve performance and availability. It routes incoming traffic to multiple servers or other resources while balancing the load. Load balancing in the cloud is typically software-based and offers benefits like scalability, reliability, reduced costs, and flexibility compared to traditional hardware-based load balancing. Common cloud providers like AWS, Google Cloud, and Microsoft Azure offer multiple load balancing options that vary based on needs and network layers.
Unit-I Introduction to Cloud Computing.pptxgarkhot123
Cloud computing involves delivering computing resources such as servers, storage, databases, networking, software, analytics and more over the internet ("the cloud"). Key aspects include on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service. Major cloud computing service providers include Amazon Web Services, Microsoft Azure and Google Cloud. Cloud computing offers advantages like reduced costs, increased collaboration and flexibility.
Cloud Computing and Virtualization Overview by Amr AliAmr Ali
Cloud computing allows dynamically scalable resources to be provided as services via a shared network from remote locations. It provides computing power, infrastructure, applications and business processes as services whenever needed. While it offers benefits like elasticity and cost savings, obstacles to cloud adoption include security, vendor lock-in, network bottlenecks and ensuring fast scalability. A survey of over 50 CIOs found that production cloud use is still limited, with concerns over security and lack of control preventing more aggressive adoption, though respondents expect the majority of infrastructure to be in the cloud within the next few years.
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services over the internet. It allows users to access resources without needing to manage physical infrastructure. Resources in the cloud are pooled and allocated dynamically based on demand. Cloud computing delivers scalability, resilience, homogeneity and low costs through virtualization, broad network access, and rapid elasticity of resources.
Cloud computing allows users to access computing resources like servers, storage, databases, networking, software, analytics and more over the internet. It provides on-demand access to shared pools of configurable resources that can be rapidly provisioned with minimal management effort. Key developments that led to cloud computing include mainframes that leveraged multiple processing units, computer clusters that worked together like a single system, and grids that connected distributed computer resources to achieve a common goal.
This document provides an overview of the course "Cloud Computing" including details about the textbook, instructor, units, and topics covered. The first unit introduces cloud computing concepts such as the history, definitions, characteristics, benefits, and computing platforms/technologies including Amazon Web Services, Google AppEngine, and Microsoft Azure. It also discusses principles of parallel and distributed computing including eras of computing, differences between parallel and distributed models, and hardware architectures.
This document discusses cloud and grid computing. It begins by defining cloud and grid computing and comparing their similarities and differences. Cloud computing focuses on servicing multiple users through virtualization at several levels, while grid computing focuses on coordinating shared resources to solve large problems. Both utilize on-demand access to pooled computing resources over a network. The document then provides examples of current grid implementations in the Netherlands, Europe, and for scientific research. It also discusses some of the largest cloud companies and considerations around privacy and security in the cloud.
Cloud and grid computing by Leen Blom, CentricCentric
This document discusses cloud and grid computing. It begins by defining cloud and grid computing and comparing their similarities and differences. Cloud computing focuses on servicing multiple users through virtualization at several levels, while grid computing focuses on coordinating shared resources to solve large problems. Both concepts utilize on-demand self-service, broad network access, resource pooling, and measured service. The document then provides examples of current grid implementations and major cloud service providers. It concludes by discussing privacy and security considerations for private versus public clouds.
Introduction of Cloud Computing & Historical Background
Cloud Service Models & Cloud Deployment Models
Benefits of Cloud Computing
Risks and Challenges
Future Trends in Cloud Computing
Edge Computing, Serverless Computing, AI & Machine Learning in Cloud, Security and
Compliance
Needs and Obstacles for Cloud Deployment
Conclusion
Cloud computing is a model that enables network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. It involves delivering hosted services like servers, storage, databases, networking, analytics and software over the internet. Key characteristics include on-demand self-service, broad network access, resource pooling, rapid elasticity, and being measured as a utility.
This document discusses cloud computing, including its service models (SaaS, PaaS, IaaS), deployment models (private, public, hybrid, community cloud), architecture, and issues. Cloud computing refers to services and applications delivered over the internet that do not require special software. It has characteristics like on-demand self-service, centralized resources, and pay-per-use billing. The main service models are software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). The deployment models include private clouds for individual organizations, public clouds with shared infrastructure, and hybrid clouds combining both. Issues involve security, ownership, reliability and legal concerns.
Cloud computing Review over various scheduling algorithmsIJEEE
Cloud computing has taken an importantposition in the field of research as well as in thegovernment organisations. Cloud computing uses virtualnetwork technology to provide computer resources tothe end users as well as to the customer’s. Due tocomplex computing environment the use of high logicsand task scheduler algorithms are increase which resultsin costly operation of cloud network. Researchers areattempting to build such kind of job scheduling algorithms that are compatible and applicable in cloud computing environment.In this paper, we review research work which is recently proposed by researchers on the base of energy saving scheduling techniques. We also studying various scheduling algorithms and issues related to them in cloud computing.
Cloud computing is a model that provides on-demand access to shared computing resources via the internet. It consists of three main components: clients, the datacenter, and distributed servers. Clients can be thin or thick and access resources through a simple interface. The datacenter houses computer systems and components. Distributed servers host resources like CPU, memory, storage, and networking that are provided to clients on-demand in a self-service model. There are different types of clouds including public, private, hybrid, as well as different service models like SaaS, PaaS, and IaaS.
Cloud computing provides on-demand access to shared computing resources via the internet on a pay-per-use basis. It offers several benefits including simplified customer acquisition, elastic demand that scales with usage, and utility pricing where customers only pay for what they use. However, security, lack of standardization, and unclear legal responsibilities if a provider fails present challenges. Cloud computing impacts businesses by challenging traditional IT practices and acting as either a disruptive innovation or additional outsourcing option.
Cloud computing refers to delivering computing services over the Internet. It allows users to access on-demand resources like storage, processing power, and software applications without maintaining physical infrastructure. Key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Cloud services can be deployed via public, private, hybrid, or community models. Common service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services that can be provisioned quickly with minimal management effort. It offers advantages like flexibility, reduced costs, increased collaboration and mobility. Key components of cloud computing include clients that access resources, distributed servers that host applications and data, and data centers that connect it all. Resources are pooled and accessed over the internet, providing scalability, measured service and broad network access.
This document provides an overview of distributed computing paradigms such as cloud computing, jungle computing, and fog computing. It defines distributed computing as utilizing multiple autonomous computers located across different areas to solve large problems. Cloud computing is described as internet-based computing using shared online resources and data storage. Jungle computing combines distributed systems for high performance, while fog computing extends cloud computing to network edges for low latency applications. The document discusses characteristics, architectures, advantages and disadvantages of these paradigms.
This document provides an overview of key concepts in cloud computing, including definitions of cloud computing, its needs and benefits, deployment models, service models, and essential characteristics. It discusses distributed, parallel, and cluster computing approaches. The summary also outlines requirements for cloud services and applications, and defines key entities in the cloud ecosystem.
The document provides details about a cloud computing course being taught by Mr. Saurabh Gupta. It begins with an introduction to cloud computing and the traditional approach of running IT applications. It then discusses key concepts like distributed computing, client-server computing, parallel computing, and utility computing that led to the development of cloud computing. The rest of the document discusses cloud characteristics, service providers, advantages, and differences between concepts like elasticity vs scalability.
The document provides an introduction and overview of the Python programming language. It discusses that Python is an interpreted, object-oriented, high-level programming language that is easy to learn and read. It also covers Python features such as portability, extensive standard libraries, and support for functional, structured, and object-oriented programming. The document then discusses Python data types including numbers, strings, and various Python syntax elements before concluding with the history and evolution of the Python language through various versions.
Moodle is a virtual learning environment (VLE) that facilitates online learning beyond physical classrooms. It is open source software that allows teachers to create and deliver online courses, providing resources, assignments, messaging, grades, feedback and other tools. For students, Moodle provides forums, chat, glossaries, online resources, and a grade report to aid their learning experience beyond traditional class times and locations.
The document discusses the need to evolve the current information system at Shree Manibhai Virani and Smt. Navalben Virani Science College due to increasing environmental changes and competition as well as issues with the current system such as not efficiently meeting user needs, taking excessive time to correct errors, outputs not meeting decision making skills, and increasing customer and vendor complaints.
This document discusses the basics of web development including the client-server model, scripting languages, and how requests and responses work. It explains that the web allows for collaboration and sharing of information. When a user requests a page, the server finds and sends the page which is then displayed in the browser along with any scripts. Scripting languages like PHP and JavaScript are used to integrate and communicate between programming languages and client-side scripts run in the browser while server-side scripts change content before it is sent.
The document discusses Microsoft Visio, a diagramming software program. It provides information on Visio's history and editions. The standard and professional editions share the same interface but the professional edition has additional templates and functionality. The document also discusses how to open a Visio drawing and the types of data flow diagrams that can be created, including physical and logical diagrams. It describes the common symbols used in data flow diagrams such as sources, sinks, processes, data stores, and data flow lines.
This document discusses speech recognition systems and their components. It explains that speech recognition systems involve breaking speech into small sound segments called monophones. They also use grammar and vocabulary files which are compiled into dictionary and finite automata files for execution. The document discusses speaker-dependent, speaker-independent, and speaker-adaptive systems. It also describes isolated word, connected word, and continuous speech recognition. Finally, it provides a high-level overview of the speech to text conversion process.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
Cloud computing
1. Cloud
Computing
Ms.Ripal Ranpara
Assistant Professor,
Department of Computer Science & Information Technology
Shree M.N. Virani Science College Rajkot
Shree Manibhai Virani and
Smt. Navalben Virani Science
College, Rajkot
(Autonomous)
Affiliated to Saurashtra
University, Rajkot
04/03/17 1
Module:1.1
Overview of Computing Paradigm
2. What is Computing
• The process of utilizing computer technology to complete a task.
Computing may involve computer hardware and/or software, but must
involve some form of a computer system.
• Computing includes
• designing,
• developing and
• building hardware and software systems;
• processing,
• structuring, and managing various kinds of information;
• doing scientific research on and with computers;
• entertainment media.
3. Grid computing
• Grid computing involves connecting geographically remote
computers into a single network to create a virtual
supercomputer by combining the computational power of all
computers on grid.
4. • "the Grid"links together computing resources (PCs,
workstations, servers, storage elements) and provides the
mechanism needed to access them.
• By implementing our proposed Intranet Grid it is very easy to
download multiple files very fast
• No need to worry about the security as we are authenticating
each and every step taking place in our Grid
• In particular user to access the database. Further
implementations could be carried out in the nearest future
Grid computing
5. WHY GRID COMPUTING?
40%Mainframes are idle
90%Unix servers are idle
95%PC servers are idle
0-15%Mainframes are idle in peak-hour
70%PC servers are idle in peak-hour
6. • Cluster computing is a form of computing in which a group of
computers are linked together so they can act like a single entity.
• It is the technique of linking two or more computers into a
network(Usually through a local area network)in order to take
advantage of the parallel processing power of those computers.
Cluster Computing
7. Cluster Application
• Google Search Engine
• Earthquake Simulation Software
• Image Rendering
• Weather Forecasting
Application Benefits
• High processing power
• Cost Efficient
• High Availability
• Fault Tolerance
8.
9. Distributed Computing
• It’s the solution to the problem
where your RAM is too small and
your data are too big and/or too
CPU-intensive to be processed on a
single machine.
• It split a big task into smaller tasks
and execute them on multiple
machines
10. Advantages Of Distributed
Computing System
• Inherently Distributed applications:
several applications are inherently distributed in nature and require distributed
computing system for their realization
• Information Sharing among Distributed Users:
In a distributed computing system, information generated by one of the users can
be easily and efficiently shared by the users working at other nodes of the
system .The use of distributed computing systems by a group of users to work
cooperatively is known as computer-supported cooperative working (CSCW), or
groupware .
• Resource Sharing:
Information is not the only thing that can be shared in a distributed computing
system. Sharing of software resources such as software libraries and databases as
well as hardware resources such as printers, hard disks, and plotters can also be
done in a very effective way among all the computers and the users of a single
distributed computing system.
11. Utility Computing
• Utility computing is a service provisioning model in which a service
provider makes computing resources and infrastructure management
available to the customer as needed, and charges them for specific usage
rather than a flat rate.
• Like other types of on-demand computing (such as grid computing), the
utility model seeks to maximize the efficient use of resources and/or
minimize associated costs.
15. Evolution of Cloud Computing
• Solving large
problems with
parallel computing
• Network-based
subscriptions to
applications• Offering computing
resources as a
metered service
• Anytime, anywhere
access to virtualized
IT resources
delivered
dynamically as a
service.
Software as a Service
Utility Computing
Cloud Computing
Grid Computing
Abstraction –> Simplification -> Capability Aggregation
16. Business Drivers for Cloud
Business growth
• Business growth is one of the top benefits organisations realise as a result of cloud adoption,
with 52% of enterprises reporting increased growth since going cloud (2015 Cloud Enterprise
Report).
2. Efficiency
• Efficiency is an extremely common cloud driver, with 71% of organisations worldwide
ranking it a top area they hope to approve through cloud technology (2015 Cloud Enterprise
Report).
3. Experience
• Next among the business drivers is improving the quality of the customer experience, which
45% of enterprises worldwide rank as a top cloud driver (although that number jumps to 61%
looking at only organisations in the UK and Australia).
4. Assurance
• Finally, there is assurance, which is the idea that data will be more secure in the cloud and
the user will attain better uptime because its solutions are maintained by providers that have
built their businesses around these competencies.
21. Cloud
Computing
Ms.Ripal Ranpara
Assistant Professor,
Department of Computer Science & Information Technology
Shree M.N. Virani Science College Rajkot
Shree Manibhai Virani and
Smt. Navalben Virani Science
College, Rajkot
(Autonomous)
Affiliated to Saurashtra
University, Rajkot
04/03/17 21
Module:1.2
Introduction to Cloud Computing
22. Cloud Computing
• Cloud computing refers to applications and services that run on a
distributed network using virtualized resources and accessed by
common Internet protocols and networking standards.
• Cloud computing takes the technology, services, and applications that
are similar to those on the Internet and turns them into a self-service
utility. The use of the word “cloud” makes reference to the two
essential concepts:
23. Cloud Computing
• Abstraction: Cloud computing abstracts the details of system
implementation from users and developers. Applications run on
physical systems that aren't specified, data is stored in locations that
are unknown, administration of systems is outsourced to others, and
access by users is ubiquitous.
• Virtualization: Cloud computing virtualizes systems by pooling and
sharing resources. Systems and storage can be provisioned as needed
from a centralized infrastructure, costs are assessed on a metered
basis, multi-tenancy is enabled, and resources are scalable with
agility.
26. Basic ConceptsBasic Concepts
There are certain services and models working behind the
scene making the cloud computing feasible and accessible to
end users. Following are the working models for cloud
computing:
1. Deployment Models1. Deployment Models
2. Service Models2. Service Models
27. Deployment ModelsDeployment Models
Deployment models define the
type of access to the cloud, i.e.,
how the cloud is located? Cloud
can have any of the four types of
access:
•Public,
•Private,
•Hybrid and
•Community.
29. 04/03/17 29
PUBLIC CLOUDPUBLIC CLOUD : The Public Cloud allows systems and services to
be easily accessible to the general public. Public cloud may be less
secure because of its openness, e.g., e-mail.
PRIVATE CLOUDPRIVATE CLOUD : The Private Cloud allows systems and services
to be accessible within an organization. It offers increased security
because of its private nature.
PUBLIC CLOUD & PRIVATE CLOUDPUBLIC CLOUD & PRIVATE CLOUD :
30. 04/03/17 30
COMMUNITY CLOUDCOMMUNITY CLOUD : The Community Cloud allows systems and
services to be accessible by group of organizations.
HYBRID CLOUDHYBRID CLOUD : The Hybrid Cloud is mixture of public and private
cloud. However, the critical activities are performed using private cloud
while the non-critical activities are performed using public cloud.
COMMUNITY CLOUD & HYBRID CLOUDCOMMUNITY CLOUD & HYBRID CLOUD
31.
32. The NIST model
• The United States government is a major consumer of computer services and,
therefore, one of the major users of cloud computing networks.
• The NIST model originally did not require a cloud to use virtualization to pool
resources, nor did it absolutely require that a cloud support multi-tenancy in the
earliest definitions of cloud computing.Multi-tenancy is the sharing of resources
among two or more clients
04/03/17 32
43. Characteristics of Cloud Computing
• Have access to low cost power
• Leverage renewable power source
• Be near abundant water
• Be sited where high-speed network backbone connections
can be made
• Keep land costs modest and occupation unobtrusive Obtain
tax breaks
• Optimize the overall system latency
04/03/17 43
44. Benefits of cloud computing
• On-demand self-service
• Broad network access
• Resource pooling
• Rapid elasticity
• Measured service
• Lower costs
• Ease of utilization
• Quality of Service
• Reliability
04/03/17 44
• Outsourced IT
management
• Simplified maintenance
and upgrade
• Low Barrier to Entry
47. Communication Protocols
• Cloud computing arises from services available over the Internet
communicating using the standard Internet protocol suite underpinned
by the HTTP and HTTPS transfer protocols.
• In order to engage in inter process communication (IPC) processes,
many client/server protocols have been applied to distributed
networking over the years. Various forms of RPC (Remote Procedure
Call) implementations (including DCOM, Java RMI, and CORBA)
04/03/17 47
48. Assessing the Role of Open
Standards
• The cloud computing industry is
working with these architectural
standards:
• Platform virtualization of
resources
• Service-oriented architecture
•Deployment of open-source
software
•Standardized Web services
•Autonomic systems
•Grid computing
•Web-application frameworks
•These standards help to enable different business models that cloud computing
vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications,
and utility computing.
•These businesses require open standards so that data is both portable and universally
accessible.
49.
50. Infrastructure as a Service (IaaS)
• Infrastructure as a Service (IaaS) is a
way of delivering Cloud Computing
infrastructure – servers, storage, network
and operating systems – as an on-
demand service. Rather than purchasing
servers, software, datacenter space or
network equipment, clients instead buy
those resources as a fully outsourced
service on demand Iaas provides the
following
● Servers- compute, machines
● Storage
● Network
● Operating system
04/03/17 50
52. Introduction to virtualization
• Virtualization is a technology to run multiple same or
different operating systems which is completely
isolated from each other.
• Ex: Run both Windows and Linux on the same
machine
04/03/17 52
53. Run multiple virtual computers on one physical box.
• Desktop
• Server
• Data Center
• Cloud
04/03/17 53
54. How it is different from dual
boot?
• Both OSes run simultaneously
04/03/17 54
55. Types of Virtualization
• Server Virtualization
• Desktop Virtualization
• Application Virtualization
• Memory
• Storage
• Data
• Network
04/03/17 55
56. What is Hypervisor
• Hypervisor is a software layer sits between Hardware
and OSes which will interact with hardware and
resources and provide an interface to share the
available resources to Virtual containers
04/03/17 56
58. virtual machine (VM)
• A virtual machine (VM) is an operating system (OS) or
application environment that is installed on software, which
imitates dedicated hardware. The end user has the same
experience on a virtual machine as they would have on
dedicated hardware.
• Specialized software, called a hypervisor, emulates the
PC client or server's CPU, memory, hard disk, network and
other hardware resources completely, enabling virtual
machines to share the resources.
04/03/17 58
59. Storage as a service
• Online file storage centers or cloud storage
providers allow you to safely upload your
files to the Internet.
iCloud is a service provided by Apple
• 5GB storage space is free of cost
• Once the iCloud is used you can share your
stored data on any of your different Apple
devices
• Aceess to all files, music, calendar, email
• Only iOS 5 has iCloud installed04/03/17 59
62. Business Benefits
• With cloud storage, there's no need for CDs, external hard drives, or
localized servers
• Data is quickly and automatically updated in the cloud and available
for your retrieval whenever you need it
• With no need for physical, on-site storage space, you can have a
smaller workspace, less equipment to buy, and fewer IT employees to
maintain your equipment and manage your data
• IT staff's can spend more time to focusing on other important tasks to
help your business growth.
04/03/17 62
63. Eucalyptus Open-Source Private
Cloud
• Eucalyptus is a Linux-based open-source software architecture that
implements efficiency-enhancing private and hybrid clouds within
an enterprise’s existing IT infrastructure.
Eucalyptus is an acronym for “Elastic Utility Computing
Architecture for Linking Your Programs to Useful Systems.”
A Eucalyptus private cloud is deployed across an enterprise’s “on
premise” data center infrastructure and is accessed by users over
enterprise intranet. Thus, sensitive data remains entirely secure from
external intrusion behind the enterprise firewall.
04/03/17 63
65. Infrastructure Security - The
Network Level
• There are four significant risk factors in this use case:
• 1.Ensuring the confidentiality and integrity of organization's data-
in-transit to and from a public cloud provider;
• 2. Ensuring proper access control (authentication, authorization, and
auditing) to whatever resources are used at the public cloud
provider;
• 3. Ensuring the availability of the Internet-facing resources in a
public cloud that are being used by an organization, or have been
assigned to an organization by public cloud providers;
• 4.Replacing the established model of network zones and tiers with
domains.
04/03/17 65
66. Infrastructure Security - The
Host Level
• The host security responsibilities in SaaS and PaaS
services are transferred to the provider of cloud
services. IaaS customers are primarily responsible for
securing the hosts provisioned in the cloud
(virtualization software security, customer guest OS
or virtual server security).
04/03/17 66
67. Infrastructure Security - The
Application Level
• The level is responsible for managing
• Application-level security threats;
• End user security;
• SaaS application security;
• PaaS application security;
• Customer-deployed application security
• IaaS application security
• Public cloud security limitations
04/03/17 67
69. Understanding Cloud Security
• Your risks in any cloud deployment are dependent upon the particular
cloud service model chosen and the type of cloud on which you
deploy your applications.
• In order to evaluate your risks, you need to perform the following
analysis:
• 1. Determine which resources (data, services, or applications) you are
planning to move to the cloud.
• 2. Determine the sensitivity of the resource to risk.
• 3. Determine the risk associated with the particular cloud type for a
resource.
04/03/17 69
72. Securing Data and Data piracy
Securing data sent to, received from, and stored in the cloud is the
single largest security concern that most organizations should have
with cloud computing.
As with any WAN traffic, you must assume that any data can be
intercepted and modified. That's why, as a matter of course, traffic to a
cloud service provider and stored off-premises is encrypted.
•These are the key mechanisms for protecting data mechanisms:
Access control
Auditing
Authentication
Authorization
04/03/17 72
80. Control and jurisdictional issues
On premise
App
VM
Server
Storage
Network
On premise
(hosted)
App
VM
Server
Storage
Network
IaaS
App
VM
Server
Storage
Network
PaaS
App
Services
Server
Storage
Network
SaaS
App
Services
Server
Storage
Network
Organization
has control
Organization shares
control with vendor
Vendor
has control
Image reproduced from Cloud security and privacy, 2009, Mather et al.
81. CLOUD COMPUTING SECURITY
AND PRIVACY ISSUES
• There are numerous security issues for cloud computing as it
encompasses many technologies including
• networks,
• databases,
• operating systems,
• virtualization,
• resource scheduling,
• transaction management,
• load balancing,
• concurrency control and memory management.
04/03/17 81
82. Access management & Access
Control
• there are six specific areas of the cloud computing environment
where equipment and software require substantial security attention
These six areas are:
• (1) security of data at rest,
• (2) security of data in transit,
• (3) authentication of users/applications/ processes,
• (4) robust separation between data belonging to different customers,
• (5)cloud legal and regulatory issues, and (6) incident response.
04/03/17 82
95. CLOUD CONTRACTING
MODELS
• Licensing Agreements Versus Services Agreements
– Summary of Terms of a License Agreement
– Summary of Terms o
– Value of Using a Service Agreement in Cloud Arrangement s
a Service Agreement.
• On-Line Agreements Versus Standard Contracts
• The Importance of Privacy Policies Terms and Conditions
• Risk Allocation and Limitations of Liability
04/03/17 95
98. Cloud and SOA
• SOA is an approach to architecture that is intended to
promote flexibility and scalability.
• SOA is defined by what a service is. Services are defined by
the following characteristics
• ● Explicit, implementation-independent interfaces
• ● Loosely bound
• ● Invoked through communication protocol
• ● encapsulate reusable business functions
04/03/17 98
99. SOAARCHITECTURE
• Cloud Infrastructure has many service
components.
• Services can be divided into four domains
• Application Services
• Information Services
• Common IT services
• Infrastructure Services
04/03/17 99
100. Cloud and SOA-SOA Life Cycle
• SOA lifecycle resembles “traditional” application lifecycle, but
introduces new terminology.
• SOA in terms of life cycle requires a start in the SOA model Phase by
gathering business requirement and designing their business
processes.
• Once they have been optimized the business processes, they
implement it by combining new and existing services.
• These assets are then deployed into a secure and integrated
environment for integrating people , processes and information
04/03/17
100
101. SOA based Cloud Infrastructure
Steps
• Enterprises that intend to harness cloud
computing must consider the following steps
• ● Analysis and Strategy
• ● Planning
• ● Implementation
• ● Value-driven(Feedback)
04/03/17 101
103. Cloud Computing
Internet-based computing, where different services(servers,
storage and applications) are delivered to an organization's
computers and devices through the Internet.
104. How Cloud Computing
Works ??
Clouds use a network layer to connect users’ end point
devices, like computers or smart phones, to resources that
are centralized in a data centre.
Users access the data centre via a company network or the
internet or both. Clouds can also be accessed from any
location, allowing mobile workers to access their business
systems on demand.
105.
106. Cloud Management
Management of cloud computing products and
services.
Software and technologies designed for operating
and monitoring applications, data and services
residing in the cloud.
109. Cloud Computing Deployment
Models
Public (Services provided to general public)
Private (for single organization or any third
party,maintenace cost is high)
Hybrid (mix of public and private cloud
services,gives businesses greater flexibility and
more data depolyment options)
110. Benefits of Cloud
Management
Global management
Remote office and distributed storage management
Information Access for disaster recovery
Cost reduction
Real time reporting
Easy Upgrades
Encrypted information
Compliance management
Ease of implementation
111. What is Virtualization?
• Multiple OSes on a single machine
– Giving an illusion that each OS is running on real HW
– Virtual Machine Monitor (VMM)
• Another layer of kernel to virtualize multiple OSes
• Also called “hypervisor”
–An OS as a supervisor is no more HW-dictator!
111/30
113. Why Virtualization? (2/6)
• Flexible VM relocation
– “Live VM migration”
• Flexible VM relocation with near-zero downtime
– Flexible load balancing
VMVM
VMVM
VMVM
CPU
CPU
CPU
CPU
113/30
114. Why Virtualization? (3/6)
• Flexible VM relocation
– “Live VM migration”
• Flexible VM relocation with near-zero downtime
– High availability
VMVM
SW or HW maintenance
(upgrade or fix)
114/30
115. Why Virtualization? (6/6)
• Other benefits
– Strong security monitoring
• Security monitoring outside OSes
– Ease of deployment
• Virtual appliance
– A bundle of OS and applications
– Flexible testing and debugging
• Building distributed environments on a single
machine
• Kernel development and debugging
• VM-based recording and replaying
115/30
116. Virtualization & Cloud Computing
• Virtualized data centers
Virtualization 1.x: Near term
Virtualization 2.0: Emerging
Virtualization 3.0: Future
Virtualization 3.0
The fully virtualized datacenter
for cloud services
2013+
Virtualization 1.x
Virtualization 2.0
2009
출처 : IDC 2010 report
116/30
117. IBM – Cloud Transformation
Bluemix is a cloud platform as a service (PaaS)
developed by IBM for building, running, and
managing apps and services.
SoftLayer, an IBM Company, provides cloud
infrastructure as a service from a growing number of
data centers and network points of presence around
the world
118. Case Study
Need:
A company wanted to help diabetes
patients more easily by sharing
accurate, up-to-date medical
information with physicians .
119. Solution
Working with IBM,the company created
a mobile app, supported by IBM
Bluemix and
SoftLayer technologies, that captures
and aggregates data directly from other
medical devices and health tools.
120. Benefit
The virtualized IBM architecture cuts ongoing
operational costs by 30 percent with a flexible
platform, while physicians and diabetics have
clearer insight into patient health, encouraging
better care options.
Grid computing - combination of computer resources from multiple administrative domains applied to a common task
Utility computing focus is on the business model on which providing the computing services are based. , as a metered service similar to a traditional public utility (such as electricity, water, natural gas, or telephone network). Utility computing merely means "Pay and Use", with regards to computing power.
Cloud computing is a broader concept than utility computing and relates to the underlying architecture in which the services are designed
Saas - relates to software applications which are not purchased and hosted locally but licensed from an organization which also hosts the software. The applications are then accessed over the Web.
Many sectors including healthcare, government, finance, retail and automobile use the cloud for file sharing, web, mobile, HPC, CRM, ERP, data storage, analytics etc.
Lot of sensitive information stored, processed and transferred on the cloud
Educational records, IRB
IP, Health
Finance
Government
Games, Entertainment etc.
Why would customers save money?
What is speed to adoption? Low upfront investment, startup can grow as required
Why is licensing easier?
Who is responsible for data loss or other issues in the cloud?
Organizational control decreases from private to public, and IaaS to SaaS
Liability depends on SLA and contract
Organization has accountability irrespective of control and liability
In a virtual machine environment, multiple operating systems can run on a single piece of hardware
A hypervisor, also called Virtual Machine Monitor (VMM), is computer software/hardware platform virtualization software that allows multiple operating systems to run on a host computer concurrently