SlideShare a Scribd company logo
1 of 31
CLOUD RESOURCE
MANAGEMENT
By-
Naquee Rizwan (16JE001866)
Sayyed Nasir Yusuf (16JE002402)
Year- 2nd
Semester- 3rd
Under The Guidance of-
Dr. Dharavath Ramesh
HIGH LEVEL ARCHITECTURE APPROACH
 Business Goals- Quality, Stakeholder Satisfaction, Flexibility, Market
Share, Compliance, TCO (Total cost of
organization).
 Quality Attributes- Availability, Elasticity, Performance, Security,
Acceptability, Maintainability, Usability.
 Architectural Tactics- Stateless Design, Loose Coupling, Caching,
Partitioning, Multi-Tenancy, Asynchronous
Communication, Claim Based Authentication,
Divide and Conquer, Firewall Traversal, Strong
Encryption, Reliable Messaging, Scale-out
Architecture.
We can broadly divide the cloud architecture into two parts whose each of the
ends are connected through a network, usually via Internet.
• Front End- It refers to the client part of cloud computing system. It consists of
interfaces and applications that are required to access the cloud computing
platforms. Example- Web Browser.
• Back End- Back End refers to the cloud itself. It consists of all the resources
required to provide cloud computing services. It comprises of huge data storage,
virtual machines, security mechanism, services, deployment models, servers, etc.
a. It is the responsibility of the back end to provide built-in security
mechanism, traffic control and protocols.
b. The server employs certain protocols, known as middleware, helps the
connected devices to communicate with each other.
 Vertical Scale Up- Add more resources to a single computation unit and move a
workload to a computation unit with more resources.
 Horizontal Scale Up- Splitting workload across multiple computation units.
Adding additional computing units having them worked
in concerts.
 Common examples- Software as a service, Platform as a service, Infrastructure
as a service.
 Other examples- Business as a service, Storage as a service, Security as a
service, Database as service, Monitoring/management as a
service, Identity as a service, Backup as a service, Desktop as a
service.
IaaS provides access to fundamental resources such as physical machines, virtual
machines, virtual storage, etc. Apart from these resources, the IaaS also offers:
• Virtual machine disk storage
• Virtual local area network (VLANs)
• Load balancers
• IP addresses
• Software bundles
All of the above resources are made available to end user via server virtualization.
Moreover, these resources are accessed by the customers as if they own them.
PaaS offers the runtime environment for applications. It also offers development &
deployment tools, required to develop applications. PaaS has a feature of point-
and-click tools that enables non-developers to create web applications. Google's
App Engine, Force.com are examples of PaaS offering vendors. Developer may log
on to these websites and use the built-in API to create web-based applications.
• Stand-alone Development Environments
The Stand-alone PaaS Works As An Independent Entity For A Specific Function. It Does Not
Include Licensing, Technical Dependencies On Specific SaaS Applications.
• Application Delivery-only Environments
The Application Delivery PaaS Includes On-demand Scaling And Application Security.
• Open Platform As A Service
Open PaaS Offers An Open Source Software That Helps A PaaS Provider To Run Applications.
• Add-on Development Facilities
The Add-on PaaS Allows To Customize The Existing SaaS Platform.
Software as a Service (SaaS) model allows to provide software application as a
service to the end users. It refers to a software that is deployed on a hosted service
and is accessible via Internet. SaaS provides us Application Programming Interface
(API), which allows the developer to develop a customized application. There are
several SaaS applications, some of them are listed below:
• Billing and Invoicing System
• Customer Relationship Management (CRM) applications
Virtualization is a technique, which allows to share single physical instance of an
application or resource among multiple organizations or tenants (customers). It
does so by assigning a logical name to a physical resource and providing a pointer
to that physical resource when demanded.
Creating a virtual machine over existing operating system and hardware is
referred as Hardware Virtualization. Virtual Machines provide an environment
that is logically separated from the underlying hardware. The machine on which
the virtual machine is created is known as host machine and virtual machine is
referred as a guest machine. This virtual machine is managed by a software or
firmware, which is known as hypervisor.
TYPES OF HYPERVISOR
1. Type 1 hypervisor runs on bare system. Examples-
Oracle VM, Sun xVM Server, VirtualLogic VLX.
2. Type 2 hypervisor is a software interface that emulates the devices
with which a system normally interacts. Examples-
Containers, KVM, Microsoft Hyper V, VMWare Fusion.
IAAS component stack comprises of hardware, operating system, middleware and
application layers. Operating system layer is split into two layers:
 Lower layer is occupied by the VMM (Hypervisor)
 Higher layer is occupied by an OS running within a VM called a guest OS.
Cloud Resource Management
Cloud Resource Management
Cloud Resource Management
Cloud Resource Management
Cloud Resource Management
Cloud Resource Management
Cloud Resource Management
Cloud Resource Management
Cloud Resource Management
Cloud Resource Management
Cloud Resource Management
Cloud Resource Management

More Related Content

What's hot

NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Private Cloud Architecture
Private Cloud ArchitecturePrivate Cloud Architecture
Private Cloud ArchitectureDerek Keats
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
Virtual machines and their architecture
Virtual machines and their architectureVirtual machines and their architecture
Virtual machines and their architectureMrinmoy Dalal
 
Distributed design alternatives
Distributed design alternativesDistributed design alternatives
Distributed design alternativesPooja Dixit
 
Google File System
Google File SystemGoogle File System
Google File Systemguest2cb4689
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed systemishapadhy
 
Clustering: Large Databases in data mining
Clustering: Large Databases in data miningClustering: Large Databases in data mining
Clustering: Large Databases in data miningZHAO Sam
 
Unit 3 object analysis-classification
Unit 3 object analysis-classificationUnit 3 object analysis-classification
Unit 3 object analysis-classificationgopal10scs185
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxNayanrai14
 
Online analytical processing
Online analytical processingOnline analytical processing
Online analytical processingSamraiz Tejani
 
CS9222 Advanced Operating System
CS9222 Advanced Operating SystemCS9222 Advanced Operating System
CS9222 Advanced Operating SystemKathirvel Ayyaswamy
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed systemSunita Sahu
 
Publish subscribe model overview
Publish subscribe model overviewPublish subscribe model overview
Publish subscribe model overviewIshraq Al Fataftah
 
5.1 mining data streams
5.1 mining data streams5.1 mining data streams
5.1 mining data streamsKrish_ver2
 
Analysis modeling & scenario based modeling
Analysis modeling &  scenario based modeling Analysis modeling &  scenario based modeling
Analysis modeling & scenario based modeling Benazir Fathima
 

What's hot (20)

NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Private Cloud Architecture
Private Cloud ArchitecturePrivate Cloud Architecture
Private Cloud Architecture
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
 
Virtual machines and their architecture
Virtual machines and their architectureVirtual machines and their architecture
Virtual machines and their architecture
 
Distributed design alternatives
Distributed design alternativesDistributed design alternatives
Distributed design alternatives
 
Google File System
Google File SystemGoogle File System
Google File System
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
 
Clustering: Large Databases in data mining
Clustering: Large Databases in data miningClustering: Large Databases in data mining
Clustering: Large Databases in data mining
 
Unit 3 object analysis-classification
Unit 3 object analysis-classificationUnit 3 object analysis-classification
Unit 3 object analysis-classification
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptx
 
Online analytical processing
Online analytical processingOnline analytical processing
Online analytical processing
 
CS9222 Advanced Operating System
CS9222 Advanced Operating SystemCS9222 Advanced Operating System
CS9222 Advanced Operating System
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
Publish subscribe model overview
Publish subscribe model overviewPublish subscribe model overview
Publish subscribe model overview
 
5.1 mining data streams
5.1 mining data streams5.1 mining data streams
5.1 mining data streams
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Analysis modeling & scenario based modeling
Analysis modeling &  scenario based modeling Analysis modeling &  scenario based modeling
Analysis modeling & scenario based modeling
 

Similar to Cloud Resource Management

introductiontocloudcomputing-150109043607-conversion-gate02.pdf
introductiontocloudcomputing-150109043607-conversion-gate02.pdfintroductiontocloudcomputing-150109043607-conversion-gate02.pdf
introductiontocloudcomputing-150109043607-conversion-gate02.pdfmohaaalsa
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingVipin Batra
 
describing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiformdescribing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiformCuneiform Consulting Pvt Ltd.
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
 
Cloud Computing MODULE-2 to understand the cloud computing concepts.ppt
Cloud Computing  MODULE-2 to understand the cloud computing concepts.pptCloud Computing  MODULE-2 to understand the cloud computing concepts.ppt
Cloud Computing MODULE-2 to understand the cloud computing concepts.pptmithunrocky72
 
A Breif On Cloud computing
A Breif On Cloud computingA Breif On Cloud computing
A Breif On Cloud computingRaja Raman
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computingBIJIT GHOSH
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session aleyeldean
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1Studying
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1Studying
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET Journal
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 

Similar to Cloud Resource Management (20)

introductiontocloudcomputing-150109043607-conversion-gate02.pdf
introductiontocloudcomputing-150109043607-conversion-gate02.pdfintroductiontocloudcomputing-150109043607-conversion-gate02.pdf
introductiontocloudcomputing-150109043607-conversion-gate02.pdf
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
describing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiformdescribing-the-significant-use-of-cloud-computing-service-models-cuneiform
describing-the-significant-use-of-cloud-computing-service-models-cuneiform
 
Quiz 1 cloud computing
Quiz 1 cloud computing Quiz 1 cloud computing
Quiz 1 cloud computing
 
UNIT III - ppt.pptx
UNIT III - ppt.pptxUNIT III - ppt.pptx
UNIT III - ppt.pptx
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
CC.pptx
CC.pptxCC.pptx
CC.pptx
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Cloud Computing MODULE-2 to understand the cloud computing concepts.ppt
Cloud Computing  MODULE-2 to understand the cloud computing concepts.pptCloud Computing  MODULE-2 to understand the cloud computing concepts.ppt
Cloud Computing MODULE-2 to understand the cloud computing concepts.ppt
 
A Breif On Cloud computing
A Breif On Cloud computingA Breif On Cloud computing
A Breif On Cloud computing
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computing
 
CC.pptx
CC.pptxCC.pptx
CC.pptx
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
 
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
IRJET- A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 

Recently uploaded

Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxUnduhUnggah1
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSINGmarianagonzalez07
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfchwongval
 

Recently uploaded (20)

Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docx
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdf
 

Cloud Resource Management

  • 1. CLOUD RESOURCE MANAGEMENT By- Naquee Rizwan (16JE001866) Sayyed Nasir Yusuf (16JE002402) Year- 2nd Semester- 3rd Under The Guidance of- Dr. Dharavath Ramesh
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. HIGH LEVEL ARCHITECTURE APPROACH  Business Goals- Quality, Stakeholder Satisfaction, Flexibility, Market Share, Compliance, TCO (Total cost of organization).  Quality Attributes- Availability, Elasticity, Performance, Security, Acceptability, Maintainability, Usability.  Architectural Tactics- Stateless Design, Loose Coupling, Caching, Partitioning, Multi-Tenancy, Asynchronous Communication, Claim Based Authentication, Divide and Conquer, Firewall Traversal, Strong Encryption, Reliable Messaging, Scale-out Architecture.
  • 8. We can broadly divide the cloud architecture into two parts whose each of the ends are connected through a network, usually via Internet. • Front End- It refers to the client part of cloud computing system. It consists of interfaces and applications that are required to access the cloud computing platforms. Example- Web Browser. • Back End- Back End refers to the cloud itself. It consists of all the resources required to provide cloud computing services. It comprises of huge data storage, virtual machines, security mechanism, services, deployment models, servers, etc. a. It is the responsibility of the back end to provide built-in security mechanism, traffic control and protocols. b. The server employs certain protocols, known as middleware, helps the connected devices to communicate with each other.
  • 9.
  • 10.
  • 11.  Vertical Scale Up- Add more resources to a single computation unit and move a workload to a computation unit with more resources.  Horizontal Scale Up- Splitting workload across multiple computation units. Adding additional computing units having them worked in concerts.
  • 12.  Common examples- Software as a service, Platform as a service, Infrastructure as a service.  Other examples- Business as a service, Storage as a service, Security as a service, Database as service, Monitoring/management as a service, Identity as a service, Backup as a service, Desktop as a service.
  • 13. IaaS provides access to fundamental resources such as physical machines, virtual machines, virtual storage, etc. Apart from these resources, the IaaS also offers: • Virtual machine disk storage • Virtual local area network (VLANs) • Load balancers • IP addresses • Software bundles All of the above resources are made available to end user via server virtualization. Moreover, these resources are accessed by the customers as if they own them.
  • 14. PaaS offers the runtime environment for applications. It also offers development & deployment tools, required to develop applications. PaaS has a feature of point- and-click tools that enables non-developers to create web applications. Google's App Engine, Force.com are examples of PaaS offering vendors. Developer may log on to these websites and use the built-in API to create web-based applications.
  • 15. • Stand-alone Development Environments The Stand-alone PaaS Works As An Independent Entity For A Specific Function. It Does Not Include Licensing, Technical Dependencies On Specific SaaS Applications. • Application Delivery-only Environments The Application Delivery PaaS Includes On-demand Scaling And Application Security. • Open Platform As A Service Open PaaS Offers An Open Source Software That Helps A PaaS Provider To Run Applications. • Add-on Development Facilities The Add-on PaaS Allows To Customize The Existing SaaS Platform.
  • 16. Software as a Service (SaaS) model allows to provide software application as a service to the end users. It refers to a software that is deployed on a hosted service and is accessible via Internet. SaaS provides us Application Programming Interface (API), which allows the developer to develop a customized application. There are several SaaS applications, some of them are listed below: • Billing and Invoicing System • Customer Relationship Management (CRM) applications
  • 17. Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers). It does so by assigning a logical name to a physical resource and providing a pointer to that physical resource when demanded.
  • 18. Creating a virtual machine over existing operating system and hardware is referred as Hardware Virtualization. Virtual Machines provide an environment that is logically separated from the underlying hardware. The machine on which the virtual machine is created is known as host machine and virtual machine is referred as a guest machine. This virtual machine is managed by a software or firmware, which is known as hypervisor. TYPES OF HYPERVISOR 1. Type 1 hypervisor runs on bare system. Examples- Oracle VM, Sun xVM Server, VirtualLogic VLX. 2. Type 2 hypervisor is a software interface that emulates the devices with which a system normally interacts. Examples- Containers, KVM, Microsoft Hyper V, VMWare Fusion.
  • 19. IAAS component stack comprises of hardware, operating system, middleware and application layers. Operating system layer is split into two layers:  Lower layer is occupied by the VMM (Hypervisor)  Higher layer is occupied by an OS running within a VM called a guest OS.