SlideShare a Scribd company logo
Electronics paper 2
Wireless Communication and Internet of
Things
-Mrs. Vandana Pagar,
Assistant Professor,
Dept. of Electronics,
MIT ACSC Alandi
Cloud Topologies
Types of Cloud:
➢Public Cloud
➢Private Cloud
➢Hybrid Cloud
Cloud Topologies:
1.Public Cloud
 Third party own and manages the infrastructure
 User pay only for consumed resources.
Features of public cloud
i. High Scalability
ii. Pay as you use
iii. Cost effective
iv. Easy deployment
v. Reliable
vi. Continuous Uptime
vii. Zero Maintenance
Cloud Topologies:
2.Private Cloud
 Types of Private Cloud
1. Dedicated private Cloud:
➢ Hardware is placed at data center.
➢ Managed and owned by the user
➢ Used for large organizations
1. Managed private Cloud:
➢ Hardware managed by third Party
➢ Installed at external location
Cloud Topologies:
1.Private Cloud
Features of Private Cloud:
➢ Most secure
➢ Good performance
➢ High reliability
➢ Less Risky
➢ Efficient
Cloud Topologies:
3.Hybrid Cloud
 It is a combination of public and private clouds
 It combines control and security of private
cloud and cost saving advantages of public
cloud.
 It uses public cloud for non critical information
and private for sensitive data.
Cloud Topologies:
3.Hybrid Cloud
 Features of Hybrid Cloud
 High Scalability
 Very Secure
 Improved Cost
 High Reliability
 Easy transition
Cloud Access
Cloud based service can be utilized and consumed in
different ways:
 Services models in the cloud
1. Infrastructure as a service(IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (Saas)
Cloud Access
Infrastructure as a service(IaaS)
Infrastructure as a service(IaaS)
 Outsourcing of infrastructure such
as storage, networking,load
balancers and virtualization.
 User is responsible to maintain,
update the OS
,install required applications.
 POOLING of storage and
computing resources allow with
easy and quick scaling.
 e,.g. Amazon EC2 and S3, Google
Platform as a Service:
 Along with infrastructure also issue on demand environment to
develop test and run and collaborate with components such as web
services, database management system and software development
kits.
 Security, load balncers , network topology and infrastructure are
managed by the cloud provider.
 Advantage: User need not to manage operating system, running
updates or updating the hardware.It is handled by cloud provider.
 e,.g. AWS, Elastic, Beanstalk, Heroku, Google app engine
Software as Service:
 Fully functional web based application
softwares.
 Saas providers is responsible to supervise
everything which includes firewall,load
balncers and infrastructure.
 Runtime environment land OS loke Java
and .NET, business applications and even
mails are handled by provider
 Advantage: It does not need much
investment
Cloud-topology.pdf

More Related Content

What's hot

Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
Jacob Zvirikuzhe
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
Akhila Param
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shiv Ram Choudhury
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Jagriti Rai
 
Cloud computing
Cloud computingCloud computing
Cloud computing
pgayatrinaidu
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualization
mazin Salih
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
Divyesh Shah
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
Saiteja Kaparthi
 
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxFlooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
AbyThomas54
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
M2M Alliance e.V.
 
Unit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and securityUnit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and security
MonishaNehkal
 
Cloud sim
Cloud simCloud sim
Cloud sim
Khyati Rajput
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
Paas
PaasPaas
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
Pallavi Agarwal
 
Virtualization Approach: Theory and Application
Virtualization Approach: Theory and ApplicationVirtualization Approach: Theory and Application
Virtualization Approach: Theory and Application
Universitas Pembangunan Panca Budi
 
Platform as a Service (PaaS)
Platform as a Service (PaaS)Platform as a Service (PaaS)
Platform as a Service (PaaS)
Halil Burak Cetinkaya
 
Integrate microsoft azure storage with backup solutions
Integrate microsoft azure storage with backup solutionsIntegrate microsoft azure storage with backup solutions
Integrate microsoft azure storage with backup solutions
Ingram Micro
 

What's hot (20)

Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualization
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxFlooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
Unit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and securityUnit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and security
 
Cloud sim
Cloud simCloud sim
Cloud sim
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Paas
PaasPaas
Paas
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
Virtualization Approach: Theory and Application
Virtualization Approach: Theory and ApplicationVirtualization Approach: Theory and Application
Virtualization Approach: Theory and Application
 
Platform as a Service (PaaS)
Platform as a Service (PaaS)Platform as a Service (PaaS)
Platform as a Service (PaaS)
 
Integrate microsoft azure storage with backup solutions
Integrate microsoft azure storage with backup solutionsIntegrate microsoft azure storage with backup solutions
Integrate microsoft azure storage with backup solutions
 

Similar to Cloud-topology.pdf

Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
riyasil2
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
Rishabh Agarwal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
prasanth82
 
cloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxcloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptx
GauravPandey43518
 
Cloud computing and its application in libraries
Cloud computing and its application in librariesCloud computing and its application in libraries
Cloud computing and its application in libraries
Nabi Hasan
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Waseem Ahmed
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
Oshin Kandpal
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
Shalini Toluchuri
 
Cloud
CloudCloud
Cloud computing
Cloud computingCloud computing
Cloud computing
Aditya Dwivedi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Nibi Maouriyan
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
seleshkumar Prajapati
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
ssuser84183f
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Monika Kumari
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
Sitamarhi Institute of Technology
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Chandan Kumar Satapathy
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
Prabhat gangwar
 
Microsoft azure kt
Microsoft azure ktMicrosoft azure kt
Microsoft azure kt
Kosuru Ajay Naidu
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
kongara
 
Cloud Networking
Cloud NetworkingCloud Networking
Cloud Networking
Venkatesh Sekar
 

Similar to Cloud-topology.pdf (20)

Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
cloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxcloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptx
 
Cloud computing and its application in libraries
Cloud computing and its application in librariesCloud computing and its application in libraries
Cloud computing and its application in libraries
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Presentation on Cloud Computing
Presentation on Cloud ComputingPresentation on Cloud Computing
Presentation on Cloud Computing
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Cloud
CloudCloud
Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Microsoft azure kt
Microsoft azure ktMicrosoft azure kt
Microsoft azure kt
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Cloud Networking
Cloud NetworkingCloud Networking
Cloud Networking
 

More from VandanaPagar1

DDUV.pdf
DDUV.pdfDDUV.pdf
DDUV.pdf
VandanaPagar1
 
Verilog operators.pptx
Verilog  operators.pptxVerilog  operators.pptx
Verilog operators.pptx
VandanaPagar1
 
Networking Technologies in IOT.pdf
Networking Technologies in IOT.pdfNetworking Technologies in IOT.pdf
Networking Technologies in IOT.pdf
VandanaPagar1
 
IoT_application.pptx
IoT_application.pptxIoT_application.pptx
IoT_application.pptx
VandanaPagar1
 
Logic Synthesis
Logic SynthesisLogic Synthesis
Logic Synthesis
VandanaPagar1
 
VHDL- gate level modelling
VHDL- gate level modellingVHDL- gate level modelling
VHDL- gate level modelling
VandanaPagar1
 
Digital Electronics- Number systems & codes
Digital Electronics- Number systems & codes Digital Electronics- Number systems & codes
Digital Electronics- Number systems & codes
VandanaPagar1
 
VHDL- data types
VHDL- data typesVHDL- data types
VHDL- data types
VandanaPagar1
 
Vhdl introduction
Vhdl introductionVhdl introduction
Vhdl introduction
VandanaPagar1
 

More from VandanaPagar1 (9)

DDUV.pdf
DDUV.pdfDDUV.pdf
DDUV.pdf
 
Verilog operators.pptx
Verilog  operators.pptxVerilog  operators.pptx
Verilog operators.pptx
 
Networking Technologies in IOT.pdf
Networking Technologies in IOT.pdfNetworking Technologies in IOT.pdf
Networking Technologies in IOT.pdf
 
IoT_application.pptx
IoT_application.pptxIoT_application.pptx
IoT_application.pptx
 
Logic Synthesis
Logic SynthesisLogic Synthesis
Logic Synthesis
 
VHDL- gate level modelling
VHDL- gate level modellingVHDL- gate level modelling
VHDL- gate level modelling
 
Digital Electronics- Number systems & codes
Digital Electronics- Number systems & codes Digital Electronics- Number systems & codes
Digital Electronics- Number systems & codes
 
VHDL- data types
VHDL- data typesVHDL- data types
VHDL- data types
 
Vhdl introduction
Vhdl introductionVhdl introduction
Vhdl introduction
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Cloud-topology.pdf

  • 1. Electronics paper 2 Wireless Communication and Internet of Things -Mrs. Vandana Pagar, Assistant Professor, Dept. of Electronics, MIT ACSC Alandi
  • 2. Cloud Topologies Types of Cloud: ➢Public Cloud ➢Private Cloud ➢Hybrid Cloud
  • 3. Cloud Topologies: 1.Public Cloud  Third party own and manages the infrastructure  User pay only for consumed resources. Features of public cloud i. High Scalability ii. Pay as you use iii. Cost effective iv. Easy deployment v. Reliable vi. Continuous Uptime vii. Zero Maintenance
  • 4. Cloud Topologies: 2.Private Cloud  Types of Private Cloud 1. Dedicated private Cloud: ➢ Hardware is placed at data center. ➢ Managed and owned by the user ➢ Used for large organizations 1. Managed private Cloud: ➢ Hardware managed by third Party ➢ Installed at external location
  • 5. Cloud Topologies: 1.Private Cloud Features of Private Cloud: ➢ Most secure ➢ Good performance ➢ High reliability ➢ Less Risky ➢ Efficient
  • 6. Cloud Topologies: 3.Hybrid Cloud  It is a combination of public and private clouds  It combines control and security of private cloud and cost saving advantages of public cloud.  It uses public cloud for non critical information and private for sensitive data.
  • 7. Cloud Topologies: 3.Hybrid Cloud  Features of Hybrid Cloud  High Scalability  Very Secure  Improved Cost  High Reliability  Easy transition
  • 8. Cloud Access Cloud based service can be utilized and consumed in different ways:  Services models in the cloud 1. Infrastructure as a service(IaaS) 2. Platform as a Service (PaaS) 3. Software as a Service (Saas)
  • 10. Infrastructure as a service(IaaS)
  • 11. Infrastructure as a service(IaaS)  Outsourcing of infrastructure such as storage, networking,load balancers and virtualization.  User is responsible to maintain, update the OS ,install required applications.  POOLING of storage and computing resources allow with easy and quick scaling.  e,.g. Amazon EC2 and S3, Google
  • 12. Platform as a Service:  Along with infrastructure also issue on demand environment to develop test and run and collaborate with components such as web services, database management system and software development kits.  Security, load balncers , network topology and infrastructure are managed by the cloud provider.  Advantage: User need not to manage operating system, running updates or updating the hardware.It is handled by cloud provider.  e,.g. AWS, Elastic, Beanstalk, Heroku, Google app engine
  • 13. Software as Service:  Fully functional web based application softwares.  Saas providers is responsible to supervise everything which includes firewall,load balncers and infrastructure.  Runtime environment land OS loke Java and .NET, business applications and even mails are handled by provider  Advantage: It does not need much investment