What is Cloud Computing
virtualization
Cloud Networking
Cloud networking (and Cloud based networking) is a term describing the access of networking resources from a centralized third-party provider using Wide Area Networking (WAN) or Internet-based access technologies.
Cloud networking is related the concept of cloud computing, in which centralized computing resources are shared for customers or clients. In cloud networking, the network can be shared as well as the computing resources. It has spurred a trend of pushing more network management functions into the cloud, so that fewer customer devices are needed to manage the network.
This presentation will help you all a lot.
because this is not from a particular text book or a reference guide it is a collection of several web sites.
Virtualization security for the cloud computing technologyDeep Ranjan Deb
Virtualization reduces the number of physical servers, reducing the energy required to power and cool them and save time. It's also much faster to deploy a virtual machine than it is to deploy a new physical server. It also reduces desktop management headaches.
VIRTUALIZATION: Basics of Virtualization, Types of Virtualizations, Implementation Levels of Virtualization, Virtualization Structures, Tools and Mechanisms, Virtualization of CPU, Memory, I/O Devices, Virtual Clusters and Resource management, Virtualization for Data-center Automation, Introduction to MapReduce, GFS, HDFS, Hadoop, Framework.)
This presentation will help you all a lot.
because this is not from a particular text book or a reference guide it is a collection of several web sites.
Virtualization security for the cloud computing technologyDeep Ranjan Deb
Virtualization reduces the number of physical servers, reducing the energy required to power and cool them and save time. It's also much faster to deploy a virtual machine than it is to deploy a new physical server. It also reduces desktop management headaches.
VIRTUALIZATION: Basics of Virtualization, Types of Virtualizations, Implementation Levels of Virtualization, Virtualization Structures, Tools and Mechanisms, Virtualization of CPU, Memory, I/O Devices, Virtual Clusters and Resource management, Virtualization for Data-center Automation, Introduction to MapReduce, GFS, HDFS, Hadoop, Framework.)
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
This PPT contains Following Topics-
1.what is virtualization?
2.Examples of virtualization.
3.Techniques of virtualization.
4.Types of virtualization.
5.What is Hipervisor.
6.Types of Hypervisor with Diagrams.
Some set of examples are there like Virtual Box with demo image.
This presentation analyzes the SaaS Business Model. It also gives examples of SaaS providers/vendors, and companies that used these services and how they benefited.
In conclusion, I analyze the implications of SaaS and see how it can help improve business IT strategy through cost savings, increased productivity, improved collaboration, and maintaining your competitive advantage.
One can Study the key concept of Virtualization, its types, why Virtualization and what are the use cases and Benefits of Virtualization and example of Virtualization.
Microsoft Azure is an ever-expanding set of cloud services to help your organization meet your business challenges. It’s the freedom to build, manage, and deploy applications on a massive, global network using your favorite tools and frameworks.
Productive
Reduce time to market, by delivering features faster with over 100 end-to-end services.
Hybrid
Develop and deploy where you want, with the only consistent hybrid cloud on the market. Extend Azure on-premises with Azure Stack.
Intelligent
Create intelligent apps using powerful data and artificial intelligence services.
Trusted
Join startups, governments, and 90 percent of Fortune 500 businesses who run on the Microsoft Cloud today.
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to CloudAleksandar Francuz
The following presentation is a strategic view on digital transformation initiatives, underpinned with examples in several industries and how IBM Cloud can support enterprises on their journey to Cloud.
A quick look at how the term Cloud originated, What is Cloud Computing? Cloud Infrastaructure, Cloud: Platforms, Benefits, Challenges and Opptrunities of Cloud
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
Cloud Computing is a new trending field these days and is an Internet-based service. It is based on the concept of virtualization.
http://www.techsparks.co.in
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
This PPT contains Following Topics-
1.what is virtualization?
2.Examples of virtualization.
3.Techniques of virtualization.
4.Types of virtualization.
5.What is Hipervisor.
6.Types of Hypervisor with Diagrams.
Some set of examples are there like Virtual Box with demo image.
This presentation analyzes the SaaS Business Model. It also gives examples of SaaS providers/vendors, and companies that used these services and how they benefited.
In conclusion, I analyze the implications of SaaS and see how it can help improve business IT strategy through cost savings, increased productivity, improved collaboration, and maintaining your competitive advantage.
One can Study the key concept of Virtualization, its types, why Virtualization and what are the use cases and Benefits of Virtualization and example of Virtualization.
Microsoft Azure is an ever-expanding set of cloud services to help your organization meet your business challenges. It’s the freedom to build, manage, and deploy applications on a massive, global network using your favorite tools and frameworks.
Productive
Reduce time to market, by delivering features faster with over 100 end-to-end services.
Hybrid
Develop and deploy where you want, with the only consistent hybrid cloud on the market. Extend Azure on-premises with Azure Stack.
Intelligent
Create intelligent apps using powerful data and artificial intelligence services.
Trusted
Join startups, governments, and 90 percent of Fortune 500 businesses who run on the Microsoft Cloud today.
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to CloudAleksandar Francuz
The following presentation is a strategic view on digital transformation initiatives, underpinned with examples in several industries and how IBM Cloud can support enterprises on their journey to Cloud.
A quick look at how the term Cloud originated, What is Cloud Computing? Cloud Infrastaructure, Cloud: Platforms, Benefits, Challenges and Opptrunities of Cloud
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
Cloud Computing is a new trending field these days and is an Internet-based service. It is based on the concept of virtualization.
http://www.techsparks.co.in
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfpreetajain
Q.1) The Hardware Layer-
The hardware layer is sometimes referred to as the server layer. It represents the physical
hardware that provides actual resources that make up the cloud. Since, by definition, cloud
computing users do not specify the hardware used to provide services, this is the least important
layer of the cloud. Often, hardware resources are inexpensive and are not fault tolerant.
Redundancy is achieved simply by utilizing multiple hardware platforms while fault tolerance is
provided at other layers so that any hardware failure is not noticed by the users.
The Virtualization Layer-
Often referred to as the infrastructure layer, the virtualization layer is the result of various
operating systems being installed as virtual machines. Much of the scalability and flexibility of
the cloud computing model is derived by the inherent ability of virtual machines to be created
and deleted at will.
Infrastructure as a Service (IaaS)-
The infrastructure layer builds on the virtualization layer by offering the virtual machines as a
service to users. Instead of purchasing servers or even hosted services, IaaS customers can create
and remove virtual machines and network them together at will. Clients are billed for
infrastructure services based on what resources are consumed. This eliminates the need to
procure and operate physical servers, data storage systems, or networking resources.
Platform as a Service (PaaS)-
The platform layer rests on the infrastructure layer’s virtual machines. At this layer customers do
not manage their virtual machines, they merely create applications within an existing API or
programing language. There is no need to manage an operating system, let alone the underlying
hardware and virtualization layers. Clients merely create their own programs which are hosted by
the platform services they are paying for.
Software as a Service (SaaS)-
Services at the software level consist of complete applications that do not require development.
Such applications can be email, customer relationship management, and other office productivity
applications. Enterprise services can be billed monthly or by usage, while software as service
offered directly to consumers, such as email, is often provided for free.
The Client Layer-
While this layer is not a cloud computing service, it is an essential part of the model. The client
layer acts as the user interface to which cloud computing services are delivered. Client layer
hardware can include personal computers, web browsers, mobile devices, and even telephones.
Q.2)
PaaS is designed for companies who have either an application or a set of applications and wants
to deploy those applications over the cloud. In this situation, a PaaS provider with computer
programming compatibility is the best solution. This gives you the following opportunities:
Q.3)
Answered in above question.
Q.4)
Public Cloud
With the public cloud, the infrastructure and services through which you process or store
inform.
Cloud Computing for college presenation project.Mahesh Tibrewal
This presentation I've made on Cloud computing can be used by students for their college projects. I've tried to make this as colourful and attractive as possible without losing the relevance with the topic.
Cloud Computing? What is it and its future trends?ziaurrehman4484
About Cloud Computing. How it works? What are its uses, its types? What services it provides and what are its future trends. It was a presentation made by Zia-ur-Rehman, who is a student at National University of Sciences and Technology, Islamabad, Pakistan. It was his research work on the same topic.
Cloud computing means using multiple server computers via a digital network, as though they were one computer.
We can say , it is a new computing paradigm, involving data and/or computation outsourcing.
it has many issues like security issues, privacy issues, data issues, energy issues, bandwidth issues, cloud interoperability.
there are solutions like scaling of resources, distribute servers etc.
CA NOTES ON EMERGING TECHNOLOGIES
FREE AFFIDAVITS AND NOTICES FORMATS
FREE AGREEMENTS AND CONTRACTS FORMATS
FREE LLB LAW NOTES
FREE CA ICWA NOTES
FREE LLB LAW FIRST SEM NOTES
FREE LLB LAW SECOND SEM NOTES
FREE LLB LAW THIRD SEM NOTES
FREE LLB LAW FOURTH SEM NOTES
FREE LLB LAW FIFTH SEM NOTES
FREE LLB LAW SIXTH SEM NOTES
FREE CA ICWA FOUNDATION NOTES
FREE CA ICWA INTERMEDIATE NOTES
FREE CA ICWA FINAL NOTES
KANOON KE RAKHWALE INDIA
HIRE LAWYER ONLINE
LAW FIRMS IN DELHI
CA FIRM DELHI
VISIT : https://www.kanoonkerakhwale.com/
VISIT : https://hirelawyeronline.com/
transfer learning is the process of training a model on a large-scale dataset and then using that pretrained model to conduct learning for another downstream task (i.e., target task)
Transfer learning was popularized in the field of computer vision thanks to the Imagenet Dataset
transfer learning is the process of training a model on a large-scale dataset and then using that pretrained model to conduct learning for another downstream task (i.e., target task)
Transfer learning was popularized in the field of computer vision thanks to the Imagenet Dataset
Zenoss
• Zenoss is an open source platform released under the GNU General Public License (GPL) version 2.
• It provides an easy-to-use Web UI to monitor performance, events, configuration, and inventory.
• Zenoss is one of the best for unified monitoring since it is cloud agnostic and is open source.
• Zenoss provides powerful plug-ins named Zenpacks, which support monitoring on hypervisors (ESX, KVM, Xen and HyperV), private cloud platforms (CloudStack, OpenStack and vCloud/vSphere), and public cloud (AWS).
In daily effort associated with husbandry watery is that the beneficial task. Method of watering needs 2 necessary aspects to be considered: once and the way a lot have to water, so as to exchange manual activities and creating work easier, the project builds Associate in IOT device that may initiate the watering of the plant system mechanically whenever the wet content within the pot drops below a threshold price, which can facilitate the plants to succeed in their fullest potential furthermore as protective water, victimization. This technique can guarantee quality husbandry with conservation of water. All these notifications are going to be created out there to the user through mobile application
The agreement has two parts:
Service Agreement
Service Level Agreement (SLA)
A Service Level Agreement (SLA) is the service contract component between a service provider and customer. A SLA provides specific and measurable aspects related to service offerings. For example, SLAs are often included in signed agreements between Internet service providers (ISP) and customers.
The following promises are made to consumer by the provides:
Availability:
Usually 99.5% to 100% availability is assured.
The assurance is for a time intervals of a billing cycle e.g., 15 minute, 1 hour, 1 Year etc. for which the service status will be “up” for sure.
But this has to be clarified that for example time period of assurance is 15 minutes and even if the service is “down” for 14 minutes, then it legally means that the service was not “down” for the whole interval.
Typically, several failures in subsystems are required to completely “down” a service for the whole period of billing.
The provider may adjust the availability promises on case to case basis.
Remedies for Failure to Perform:
In case of violation of the promise of availability (during a time period) by the provider, the customer will be compensated in terms of service credit for future use of Cloud service.
A refund is usually not given.
Consumer is responsible to monitor the availability of service and claim for compensation.
Remedies for Failure to Data Preservation:
The following situations result in termination of Cloud IT resources usage for a consumer:
Voluntarily by consumer
The providers usually take no responsibility for preserving the data in later case. While in former case, the preservation is done for few days.
Terminated by the provider for violating the provider’s rule of service and/or for non-payment.
Legal Care of Consumer Information:
The provider assures for not disclosing/viewing/using/sharing the consumer’s data except in case of legal requirement.
On the other hand the provider retains the right of monitoring the consumer data as well as may demand a copy of consumer’s software for monitoring assistance.
Q2. Draw Cloud Hosting Data center Design and Explain
Key terms:
CRAC: Computer Room Air Conditioning
Hot aisle
Cold aisle
Server cabinets (Racks)
Hollow floor
Perforated tiles
Cloud hosting data center has a layered architecture for the Internet access.
The servers are physically connected to layer 2 switches. There is a top of rack (TOR) in each rack. One server is connected to only one TOR switch.
The TORs are connected to aggregate switches (AGS).
Data centers consume huge amounts of electricity. As much as a small town in USA.
A large data center can host hundreds of thousands physical servers.
Ventilator:
ICU ventilator is an equipment which is designed to provide the breath for a patient who is physically unable to breathe or he is breathing insufficiently.
Environment of Use:
•ICU/NICU/ITC •Recovery Rooms
Sources:
•Air (Turbine/ Compressor Operated) •Oxygen
Technology Being Used:
•Mechanical Ventilation •HFO Ventilation
Figure 2. ICU Ventilator
Figure 2. ICU Ventilator
Modes of Ventilation:
In pressure and volume controlled ventilation below mentioned are the basic modes.
•Continuous Mandatory Ventilation (CMV) •Assist Control Ventilation (AC)
•Synchronized Intermittent Mandatory Ventilation (SIMV) •Mandatory Minute Volume
An essential part of our approach to designing Interactive system is that it should put people first it should be human centered.
A Pact analysis is useful for both analysis and design activities understanding the current situation, situation, seeing where possible improvements can be made and envisioning future situations.
The Pact Framework consist in four parts
1) People
Interaction designers begin with the different among the users and their interactions.
• Physical Differences
Physical characteristics, e.g. height and weight
Five sense, i.e. sight, hearing, touch smell and taste.
Find a handheld device (e.g., a PDA, mobile phone) and examine how it has been designed, paying particular attention to how the user is meant to interact with it.
(a) From your first impressions, write down what first comes to mind as to what is good or bad about the way the device works. Then list (i) its functionality and (ii) the range of tasks a typical user would want to do using it. Is the functionality greater, equal, or less than what the user wants to do?
(b) Based on your study, compile your own set of usability and user experience goals that you think will be useful in evaluating the device. Decide which are the most important ones and why.
(c) Translate the core usability and user experience goals you have selected into two or three questions. Then use these questions to assess your device (sample questions: what mechanisms have been used to ensure safety? Is it fun to use, etc.).
(d) Evaluate the device using User Centered Design Prncipal’s design principles.
(e) Discuss possible improvements that can be made to the interface to improve its usability based on your evaluation.
You have just marked a piece of work in which the student has obviously plagiarised
material from printed and electronic information. The student did not show you any
drafts of the essay although the class was asked to present drafts. You have not had
a chance to discuss the work with him at any stage.
1. What might alert you to the suspicion of plagiarism?
2. What might have led the student to plagiarise?
3. What steps could you take to discourage students from plagiarising?
4. What reflections do you have on this case that might develop your
professional practice?
objected oriented project
#include <iostream>
#include <fstream>
using namespace std;
int k,kk;
//***************************************************************
// CLASS TEAM
//****************************************************************
class Team
{ protected:
SQL injection is a code injection technique that might destroy your database.
SQL injection is one of the most common web hacking techniques.
SQL injection is the placement of malicious code in SQL statements, via web page input.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
1. What is Cloud Computing
In the simplest terms, cloud computing means storing and accessing data and
programs over the Internet instead of your computer's hard drive. The cloud is just a
metaphor for the Internet
Benefits of Cloud Computing
Increased scalability:
• The cloud can dynamically and instantly provide the computing
resources.
• This provision can be on demand or as per user configuration.
• Similarly these IT resources can be released automatically or
manually with the decrease in processing demand.
• This dynamic scalability avoids the over-provisioning and under-
provisioning and the associated disadvantages.
Availability:
• The availability of IT resources sometimes can be referred to profit
and customer retention.
• If an IT resource becomes unavailable (such as a database dealing
with clients’ orders) then this may result in customer dissatisfaction
and loss of business.
Reliability:
• The reliability of IT resources is very important for continual
business data processing and response time.
• The failure of any IT resource can be cause the collapse the IT
system. For example failure of the Ethernet switch may crash a
distributed application.
• The modular structure and resource redundancyin cloud increases
the availability and reliability.
• Cloud, on the other hand provides a guaranteed level of availability
and reliability through a legal agreement called service level
agreement (SLA) between the cloud provider and cloud user.
• The recoverytime after failure is the added penalty. It is the time
when the system remains unavailable.
• The modular structure and resource redundancyin cloud increases
the availability and reliability. It also improves the recoverytime.
Virtualization
• Virtualization: It is a technology used to enhance the utilization of
computing resources.
2. • A single hardware machine is multiplexed among multiple virtual
machines (VMs).
• A software based virtual machine monitor/manager (VMM) or
hypervisor is a program that manages the hardware resources for
the VMs and also keeps each VM from disrupting other VMs.
Virtualization implementation levels:
1. Instruction Set Architecture (ISA) level:Executing legacy code over new machines
using ISA emulator tool such as an interpreter which translate one instruction of source
code into corresponding instruction of the target machine.
2. Hardware Abstraction level:
The hardware components (CPU, RAM, Disk, NIC) of a physical system are virtualized
and shared among virtual machines using Virtual Machine Monitor (VMM) tool or
hypervisor which performs as abstraction layer.
4. Library support level:
The API calls for hardware acceleration such as vCUDAstubs for graphic processing
units (GPUs) are available at VM level.
5. Application level:
An application acts as a VM through wrapping of application in an abstraction layer
which isolates it from OS and other applications. Another type is using virtualization
layer as programming environment e.g; Java Virtual Machine (JVM).
Hypervisor transforms the physical hardware into virtual hardware.
VM Architectures
There are three classes of VM architectures.
1. Hypervisor Architecture
2. Full-virtualization Architecture
3. Para-virtualization Architecture
4. Hypervisor Architecture
It is the hardware level virtualization. Also called the bare-metal virtualization
The hypervisor sits between the hardware and the VMs and manages the VMs.
Example: Xen, VMware
Full Virtualization:
The guest operating system (OS) or the VM’s OS does not know that it is installed on a
VM.
The Virtualization layer manages the hardware acceleration. For example VMware
3. The virtualization layer can be installed on hardware or on host’s OS.
Some of the instructions of a gust VM are directly run on hardware to enhance the
performance.
Para-virtualization Architecture:
The guest OS is modified to comply with virtualization layer. All calls for hardware
acceleration are handled by virtualization layer.
For example: KVM
Security law
Cloud provider:
The organization that provides the IT resources.
Responsible for providing IT resources as per SLA.
Cloud consumer:
The organization or individual who has contracted with cloud provider to lease/rent the
cloud IT-resources through user interface and/or through software API calls.
Cloud Resource Administrator: This role is responsible for administering the cloud resources
(including cloud services).
Cloud Auditor: Provides an unbiased assessment of trust building features of the cloud. These
include the security, privacy impact and performance of the cloud. The cloud consumer may rely
upon the cloud audit report for choosing a cloud.
Cloud Broker: A party that provides mediation services to cloud providers (seller) and cloud
consumers (buyer) for the purchasing of cloud services.
Organizational boundary: This is a boundary of ownership ad governance of IT assets of an
organization. Similarly, the cloud has its organizational boundary.
Trust boundary: When an organization takes the role of cloud consumer, then it has to extend
its trust boundary to include the cloud resources.
A trust boundary represents a border around trusted IT-resources.
4. Cloud Networking
Cloud networking (and Cloud based networking) is a term describing the access of networking
resources from a centralized third-party provider using Wide Area Networking (WAN) or
Internet-based access technologies.
Cloud networking is related the concept of cloud computing, in which centralized computing
resources are shared for customers or clients. In cloud networking, the network can be shared
as well as the computing resources. It has spurred a trend of pushing more network
management functions into the cloud, so that fewer customer devices are needed to manage
the network.
LAN Cloud
Cloud networking is a form of Software Defined Networking (SDN) technology, in which
groups of networking switches and access devices can deploy over the wide area as shared,
virtual resources. Other terms that describe this shift include Software-Defined WAN (SD-WAN)
and Cloud WAN.
Cloud WAN
Cloud networking (and Cloud based networking) is a term describing the access
of networking resources from a centralized third-party provider using Wide
Area Networking (WAN) or Internet-based access technologies. ... In cloud networking,
the network can be shared as well as the computing resources.
Private cloud?
The cloud infrastructure is provisioned for exclusive use by a single organization comprising
multiple consumers (e.g., business units).
It may be owned, managed, and operated by the organization, a third party, or some
combination of them, and it may exist on or off premises.
The private cloud can be physically located at your organisation’s on-site datacenter but in a
private cloud, the services and infrastructure are always maintained on a private network and the
hardware and software are dedicatedsolely to your organisation.
More flexibility , High scalability , Improved security
Community cloud:
5. The cloud infrastructure is provisioned for exclusive use by a specific community of consumers
from organizations that have shared concerns (e.g., mission, security requirements, policy, and
compliance considerations).
It may be owned, managed, and operated by one or more of the organizations in the
community, a third party, or some combination of them, and it may exist on or off premises.
Public cloud:
The cloud infrastructure is provisioned for open use by the general public.
It may be owned, managed, and operated by a business, academic, or government organization,
or some combination of them.
It exists on the premises of the cloud provider
In a public cloud, you share the same hardware, storage and network devices with other
organisations or cloud “tenants.” You access services and manage your account using a web
browser.
Lower costs , No maintenance , Near-unlimited scalability , High reliability
Hybrid cloud:
The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private,
community, or public).
Cloud computing
In the simplest terms, cloud computing means storing and accessing data and programs over
the Internet instead of your computer's hard drive. The cloud is just a metaphor for the
Internet. ... When you store data on or run programs from the hard drive, that's called local
storage and computing
Cloud computing is the the use of various services, such as software development platforms,
servers, storage and software, over the internet, often referred to as the "cloud."
CLOUD SERVICE MODELS
Software as a Service (SaaS):
The capability provided to the consumer is to use the provider’s applications running on a cloud
infrastructure. A cloud infrastructure is the collection of hardware and software that enables the
five essential characteristics of cloud computing.
The first cloud computing type is infrastructure-as-a-service (IaaS), which is used for
Internet-based access to storage and computing power. The most basic category of
cloud computing types, IaaS lets you rent IT infrastructure - servers and virtual
machines, storage, networks and operating systems - from a cloud provider on a pay-
as-you-go basis.
6. Platform as a Service (PaaS):
The capability provided to the consumer is to deploy onto the cloud infrastructure
consumer-created or acquired applications created using programming languages,
libraries, services, and tools supported by the provider.
The second cloud computing type is platform-as-a-service (PaaS) which gives
developers the tools to build and host web applications. PaaS is designed to give users
access to the components they require to quickly develop and operate web or mobile
applications over the Internet, without worrying about setting up or managing the
underlying infrastructure of servers, storage, networks and databases.
Infrastructure as a Service (IaaS):
The capability provided to the consumer is to provision processing, storage, networks,
and other fundamental computing resources where the consumer is able to deploy and
run arbitrary software, which can include operating systems and applications.
The consumer does not manage or control the underlying cloud infrastructure but has
control over operating systems, storage, and deployed applications; and possibly limited
control of selected networking components (e.g., host firewalls).
The third cloud computing type is software-as-a-service (SaaS) which is used for web-
based applications. SaaS is a method for delivering software applications over the
Internet where cloud providers host and manage the software applications making it
easier to have the same application on all of your devices at once by accessing it in the
cloud.
The special publication includes the five essential characteristics of cloud
computing:
1. On-demand self-service:A consumer can unilaterally provision computing capabilities,
such as server time and network storage, as needed automatically without requiring
human interaction with each service provider.
2. Broad network access: Capabilities are available over the network and accessed
through standard mechanisms that promote use by heterogeneous thin or thick client
platforms (e.g., mobile phones, tablets, laptops and workstations).
3. Resource pooling: The provider's computing resources are pooled to serve
multiple consumers using a multi-tenant model, with different physical and virtual
resources dynamically assigned and reassigned according to consumer demand. There
7. is a sense of location independence in that the customer generally has no control or
knowledge over the exact location of the provided resources but may be able to specify
location at a higher level of abstraction (e.g., country, state or datacenter). Examples of
resources include storage, processing, memory and network bandwidth.
4. Rapid elasticity: Capabilities can be elastically provisioned and released, in some
cases automatically, to scale rapidly outward and inward commensurate with demand.
To the consumer, the capabilities available for provisioning often appear to be unlimited
and can be appropriated in any quantity at any time.
5. Measured service:Cloud systems automatically control and optimize resource use
by leveraging a metering capability at some level of abstraction appropriate to the type of
service (e.g., storage, processing, bandwidth and active user accounts). Resource
usage can be monitored, controlled and reported, providing transparency for the provider
and consumer.
What are Cloud Service Providers?
Cloud service providers (CSP) are companies that offer network services, infrastructure,
or business applications in the cloud. The cloud services are hosted in a data center
that can be accessed by companies or individuals using network connectivity.
The large benefit of using a cloud service provider comes in efficiency and economies
of scale. Rather than individuals and companies building their own infrastructure to
support internal services and applications, the services can be purchased from the
CSP, which provide the services to many customers from a shared infrastructure.
There are several different forms of services that can be used “in the cloud” by CSPs,
including software, often referred to as Software as a Service (SaaS), a computing
platform for developing or hosting applications, known as Platform as a Service (PaaS);
or an entire networking or computing infrastructure, known as Infrastructure as a
Service (IaaS). The divisions, however, are not always clear-cut, as many providers
may offer multiple flavors of cloud services, include traditional web or application
hosting providers. For example, you might go to a cloud provider, such as Rackspace,
who started as a web hosting company and buy either PAAS or IAAS services. Many
cloud providers are focusing on specific verticals, such as hosting healthcare
applications in a secure IAAS environment.
Customer Focus: Cost, Reliability and Security
Advantages and disadvantages of Software as a Service (SaaS)
Software as a Service, also known as SaaS or on-demand software, is a way of delivering software
applications to the end-user over the internet. SaaS can provide great advantages for most businesses, primarily
in costs and flexibility. However, disadvantages of SaaS (such as lack of control) are considerable and should
not be ignored.
Benefits of SaaS
8.
1. Cost – reduced for customer due to savings on human capital, physical
space, electricity, and support when SaaS is provided through a multi-tenant
distribution model.
2. Maintenance – easier because applications do not need to be installed on
each user’s computer and the vendor can deploy patches and updates
throughout the environment at a faster rate.
3. Access –faster because there is no installation or implementation process so
getting up and running can be quick. The software is essentially already
installed and running.
4. Device and location independence – improved because users can access
systems using a web browser regardless of their location or device.
5. Data analytics – less hassle because SaaS permits collection of anonymzed
metadata and metering, which can improve service and provide important
insights about the customer base.
6. Continuity – with the enhancement of cloud technology, redundancy
provides businesses with a continuity that is not easily accomplished.
7. Scalability SaaS providers generally offer many subscription options and flexibility
to change subscriptions as and when needed, eg when your business grows, or
more users need to access the service
8. Increase stability, reliability and supportability. With IaaS there is no need to
maintain and upgrade software and hardware or troubleshoot equipment
problems. With the appropriate agreement in place, the service provider assures
that your infrastructure is reliable and meets SLAs.
9. Better security. With the appropriate service agreement, a cloud service provider
can provide security for your applications and data that may be better than what
you can attain in-house.
Disadvantages of SaaS
Loss of control. In-house software applications give business owners a high
degree of control. When you use a hosted solution, you turn much of that control
over to a third party provider. If you aren't comfortable relying on someone else to
manage critical business applications, an ASP platform may not be right for you.
Limited applications. SaaS is gaining in popularity. However, there are still
many software applications that don't offer a hosted platform. You may find it
necessary to still host certain applications on site, especially if your company
relies on multiple software solutions.
9. Connectivity requirements. Since SaaS software is web-hosted, you can't use
these applications without an Internet connection. If your Internet service goes
down or if mobile workers are in an Internet dead zone, you won't have access to
your software or data.
Variable functions & features. In many cases, hosted applications are limited in
function. It's not uncommon for a hosted solution to lack some functions or
features that are standard in its client/server counterpart. You will need to
evaluate each application on a case-by-case basis to make sure your SaaS
solution offers the features you need to do business.
Slower speeds. In general, SaaS applications run at slightly slower speeds than
client/server applications. Although their speed is still pretty good, you'll need to
be prepared for the possibility of a less-than-instant computing environment.
Working of end user
In information technology, the term end user is used to distinguish the person
for whom a hardware or software product is designed from the developers,
installers, and servicers of the product. The "end" part of the term probably
derives from the fact that most information technologies involve a chain of
interconnected product components at the end of which is the "user."
Frequently, complex products require the involvement of other-than-end users
such as installers, administrators, and system operators. The term end
user thus distinguishes the user for which the product is designed from other
users who are making the product possible for the end user. Often, the
term user would suffice.
Types of EUC
End-user computing encompasses a wide variety of user-facing resources, including:
desktop and notebook computers;
desktop operating systems and applications;
smartphones, tablets, wearables and other mobile devices;
mobile, web and cloud applications; and
10. virtual desktops and applications.
What is Hypervisor and what types of hypervisors
A hypervisor is a process that separates a computer’s operating system and
applications from the underlying physical hardware. Usually done as software although
embedded hypervisors can be created for things like mobile devices.
The hypervisor drives the concept of virtualization by allowing the physical host machine
to operate multiple virtual machines as guests to help maximize the effective use of
computing resources such as memory, network bandwidth and CPU cycles.
Type 1 hypervisor: hypervisors run directly on the system hardware – A “bare metal” embedded
hypervisor,
Type 1 hypervisors, sometimes called “native” or “bare metal” hypervisors, run directly on the
host’s hardware to control the hardware and manage the guest VMs. Modern hypervisors
include Xen, Oracle VM Server for SPARC, Oracle VM Server for x86, Microsoft Hyper-V and
VMware’s ESX/ESXi.
2. Microsoft Hyper-V
The Microsoft hypervisor, Hyper-V doesn’t offer many of the advanced features that VMware’s
products provide.
However, with XenServer and vSphere, Hyper-V is one of the top 3 Type-1 hypervisors.
3. Citrix XenServer
It began as an open source project.
The core hypervisor technology is free, but like VMware’s free ESXi, it has almost no advanced
features.
4. Oracle VM
The Oracle hypervisor is based on the open source Xen.
However, if you need hypervisor support and product updates, it will cost you.
Oracle VM lacks many of the advanced features found in other bare-metal virtualization
hypervisors.
Type 2 hypervisor:
hypervisors run on a host operating system that provides virtualization services, such as I/O
device support and memory management.
1. VMware Workstation/Fusion/Player
VMware Player is a free virtualization hypervisor.
11. VMware Workstation has three major use cases:
for running multiple different operating systems or versions of one OS on one desktop,
for developers that need sandbox environments and snapshots, or
for labs and demonstration purposes.
2. VMware Server
VMware Server is a free, hosted virtualization hypervisor that’s very similar to the VMware
Workstation.
VMware has halted development on Server since 2009
3. Microsoft Virtual PC
This is the latest Microsoft’s version of this hypervisor technology, Windows Virtual PC and runs
only on Windows 7 and supports only Windows operating systems running on it.
4. Oracle VM VirtualBox
VirtualBox hypervisor technology provides reasonable performance and features if you want to
virtualize on a budget. Despite being a free, hosted product with a very small footprint,
VirtualBox shares many features with VMware vSphere and Microsoft Hyper-V.
5. Red Hat Enterprise Virtualization
Red Hat’s Kernel-based Virtual Machine (KVM) has qualities of both a hosted and a bare-metal
virtualization hypervisor. It can turn the Linux kernel itself into a hypervisor so the VMs have
direct access to the physical hardware.
KVM :This is a virtualization infrastructure for the Linux kernel. It supports native virtualization
on processors with hardware virtualization extensions.
why should one prefer public cloud over private cloud
Cloud Computing is an integral part of businesses today. Private Cloud and Public
Cloud are two popular categories of this transformative network-computing model. For a
growing organization, it becomes imperative to learn the difference between the public
cloud and private cloud.
However, there is no doubt in the fact that this comparison is essential for all IT and
business heads and because of the increasing cloud dependency.
Features &
Benefits
Private Cloud Public Cloud
12. Access and
Storage
1. Restricted access to one
organization at a time
2. Offers a dedicated storage
infrastructure, which is not
accessible to others.
1. Access is available to multiple
organizations at once.
2. Data gets stored on a shared
infrastructure.
Location Of The
Data Center
Allows the organization to decide
and choose – an on-premise data
center or dedicated location on the
service provider’s infrastructure.
Location of the data center varies by
the public cloud provider’s
infrastructure site.
Investment
Requires additional investment in
the company’s hardware
components, like physical servers to
leverage private cloud services
efficiently.
Eliminates the need to invest in any
additional hardware or software
components.
Upgrades And
Management
A dedicated administrator is
required to manage the upgrades
and installations. Further, this
makes it easy to integrate their on-
premise or on-cloud applications.
The service provider performs the
management and rolls out of
updates without the company’s
intervention.
Security
Superior security mechanism. It is
with the option to implement higher
levels of authentication and security
for the cloud environment.
Offers a standard security protocol
that remains unaltered, and cannot
be enhanced or customized for
different business models.
Customization
Allow companies to customize their
cloud infrastructure according to
their business-specific needs and
Offers a standard operating
procedure for organizations
Costs
1. Expensive as it involves
additional cost investment to set up
on-premise data centers or hire
dedicated administrators.
2. It is also a pre-requisite while
opting for services
Less expensive as there are no
additional costs
Scalability
1. Offers incremental space and
infrastructural abilities.
2. Though, Private Cloud is more
responsive and offers customized
scalability
Offers additional space and
infrastructure abilities
13. Main feature of cloud computing services
1. Infrastructure
2. Software
3. Platform
4. Services
Community cloud
1. For a group and community
2. For multiple sites of organization
3. Where user want secure connectivity
Hybrid Cloud
1 Combination of two cloud
2 Depends of customer needs and demand