Bangladesh University of Professionals (BUP) : Requirements To Transfer Information Technology To A Service
Bangladesh University of Professionals (BUP) : Requirements To Transfer Information Technology To A Service
Bangladesh University of Professionals (BUP) : Requirements To Transfer Information Technology To A Service
Assignment on
REQUIREMENTS TO TRANSFER
INFORMATION TECHNOLOGY TO A SERVICE.
Submitted to:
Dr. Khondokar Habibur Kabir
Lecturer
Department of ICT
Bangladesh University of Professionals (BUP)
Prepared by:
Md Tofazzal Hossain Rasel
Roll No: 1904011
4th Batch, Session: 2018-2019
1. Connectivity:
Connectivity is the ability of a computer, program, device, or system to connect with one or more
others. Network connectivity describes the extensive process of connecting various parts of a
network to one another, for example, through the use of routers, switches and gateways, and how
that process works. Connectivity as a service (CaaS) provides simple, cost effective network
connectivity for the highest quality data transmission, without the need to pay premiums or manage
multiple relationships with multiple service providers.
2. Interactivity:
Interactivity is the involvement of users in technology, the exchange of with computers and the
degree to which this happens. In computers, interactivity is the dialog that occurs between a human
being or possibly another living creature and a computer program.
3. Reliability:
Reliability is the quality of being able to be trusted or believed because of working or behaving
well. It refers to the ability of a computer-related hardware or software component to consistently
perform according to its specifications. High Availability (HA) and reliability in cloud computing
services are some of the hot challenges. The probability that a system is operational in a time interva l
without any failures is represented as the system reliability.
4. Performance:
The accomplishment of a given task measured against pre-set known standards of accuracy,
completeness, cost, and speed. It is the measure How well a person, machine, etc. does a piece of
work or an activity seamlessly. Cloud computing is an area where performance is ultimate ly
important. It is important to have good performance for the core processes of moving data from a
client's operations to a vendor's cloud environment, and vice versa.
5. Pay-as-you-go:
A system of paying for something as expenses are incurred rather than in advance, and therefore not
allowing for debts to build up. It is the system in which a person or organization pays for the costs
of something when they occur rather than before or afterwards. Pay-as-you-go cloud computing
(PAYG cloud computing) is a payment method for cloud computing that charges based on usage.
The practice is similar to that of utility bills, using only resources that are needed. One major benefit
of the pay-as-you-go method is that there are no wasted resources, since users only pay for services
procured, rather than provisioning for a certain amount of resources that may or may not be used.
6. Programmability:
Programmability is the ability of a computer or a machine to accept instructions to do a range of
tasks, rather than just one easily. The capability within hardware and software to change, to accept
a new set of instructions that alter its behaviour. Programmability generally refers to program logic
(business rules), but it also refers to designing the user interface which includes the choices of
menus, buttons and dialogs.
8. Efficiency:
The state or quality of being efficient, or able to accomplish something with the least waste of time
and effort; competency in performance. Cloud computing is a new approach to IT infrastructure and
a logical step on a path to more efficient use of computing resources. Business enterprises can
transform their business models and gain a competitive edge through early adoption of cloud
computing technologies.
1. Internet:
The Internet (portmanteau of interconnected network) is the global system of interconnec ted
computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a
network of networks that consists of private, public, academic, business, and government networks
of local to global scope, linked by a broad array of electronic, wireless, and optical networking
technologies. The Internet carries a vast range of information resources and services, such as the
inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail,
telephony, and file sharing. It is a means of connecting a computer to any other computer anywhere
in the world via dedicated routers and servers. When two computers are connected over the Internet,
they can send and receive all kinds of information such as text, graphics, voice, video, and computer
programs.
Fig: Internet
The Internet began in 1969 as a research project funded by the Department of Defence with a goal
of creating a means of communication beside telephone lines. The first network was called
ARPANET (Advanced Research Project Agency Network). The focus was on communicating in the
event part of the network was disabled. This early network was the precursor to the Internet. It was
limited in function but launched the idea of a different method of communication.
2. Web 2.0:
Web 2.0 is the name used to the describe the second generation of the world wide web, where it
moved static HTML pages to a more interactive and dynamic web experience. Web 2.0 is focused
on the ability for people to collaborate and share information online via social media, blogging and
Web-based communities. Web 2.0 signalled a change in which the world wide web became an
interactive experience between users and Web publishers, rather than the one-way conversation that
had previously existed. It also represents a more populist version of the Web, where new tools made
it possible for nearly anyone to contribute, regardless of their technical knowledge.
Over time Web 2.0 has been used more as a marketing term than a computer-science-based ter.
Familiar examples of Web 2.0 sites and tools include wikis and blogs (PB works and WordPress),
social networking sites (Facebook and Twitter), image and video hosting sites (Flicker and
YouTube), and applications to generate Web content for education, business, and social purposes
(Wikipedia, Weebly and Instagram).
3. Fault-Tolerance:
Fault tolerance is a major concern to guarantee availability and reliability of critical services as well
as application execution. This is the property that enables a system to continue operating properly
in the event of the failure of (or one or more faults within) some of its components. Hardware fault
tolerance is the ability of a component or subsystem to continue to be able to undertake the required
safety instrumented function in the presence of one or more dangerous faults in hardware.
In order to minimize failure impact on the system and application execution, failures should be
anticipated and pro-actively handled. Fault tolerance techniques are used to predict these failure and
take an appropriate action before failures actually occur. The importance of implementing a Fault
Tolerance System is about service continuity or maintaining functionality in the event of system
failure though operating speed might be affected. Fault Tolerance System is highly needed in most
enterprise organization especially for life-critical systems to continue providing service.
Existence of Fault Tolerance in Cloud Computing:
• System Failure: This may be either software or hardware issue. The software failure results
in system crash or hanging situation that may be due to stack overflow or other reasons. Any
improper maintenance of the physical hardware machines will result in hardware system
failure.
• Security Breach Occurrences: There are several reasons why fault tolerance occurs due to
security failures. The hacking of the server negatively impacts the server and results in data
breach. Other reasons for the necessity of fault tolerance in the form of security breaches
include ransomware, phishing, virus attack etc.
In distributed computing, each processor owns a separate memory and the information is exchanged
by passing messages between the processors. Distributed applications (distributed apps) are
applications or software that runs on multiple computers within a network at the same time and can
be stored on servers or with cloud computing.
5. Utility Computing:
Utility computing is a model in which computing resources are provided to the customer based on
specific demand. The service provider charges exactly for the services provided, instead of a flat
rate. The foundational concept is that users or businesses pay the providers of utility computing for
the amenities used – such as computing capabilities, storage space and applications services. The
customer is thus, absolved from the responsibility of maintenance and management of the hardware.
Consequently, the financial layout is minimal for the organization.
The term utility refers to utility services such as electricity, telephone, water and gas that are
provided by a utility company. For most clients, the biggest advantage of utility computing is
convenience. The client doesn't have to buy all the hardware, software and licenses needed to do
business. Instead, the client relies on another party to provide these services. Utility computing helps
eliminate data redundancy, as huge volumes of data are distributed across multiple servers or
backend systems. The client however, can access the data anytime and from anywhere.
6. Programming Model:
Cloud computing integrates vast computing and/or storage resources together, which provides
services on demand via networks. Developers request resources on demand and pay for it by hours.
Developers can also increase or decrease resources according to their demand. Cloud computing
provides convenience for application development and run. Meanwhile, it brings new challenges for
cloud computing programming models. Research on cloud computing programming models has
made some progress, such as Google’s MapReduce [1] and Microsoft’s Dryad [2]. However, there
are still some issues to be further studied. Firstly, the current cloud computing programming models
mainly focus on processing mass data. Computation intensive and I/O intensive applicatio n
programming on cloud computing have been a new topic. Secondly, when one programming a cloud
application, it’s very important for the programmer to rely on a simple yet realistic cost model.
BSPCloud is a programming model for cloud computing, and its goal is to provide a programming
model whose performance can be predicted.
7. Storage Technologies:
Cloud computing is actually one kind of distributed computing, the aim of which is to make the
ultra-large-scale computing ability integrate with the storage resources through the internet, and to
provide the computing ability and storage resources to the users as reliable services by their needs.
However, cloud storage of high performance is the basic condition for cloud computing service .
almost all of the services based on cloud computing need the high-performance cloud storage to
satisfy the data processing needs. So, the cloud storage has become a research hotspot in the
information storage field.
The cloud storage platform infrastructure includes 4 layers. From bottom to top the layers are:
• Data storage layer
• Data management layer
• Application interface layer and
• User
8. Virtualization Technologies:
Virtualization is the creation of virtual servers, infrastructures, devices and computing resources. A
great example of how it works in your daily life is the separation of your hard drive into different
parts. While you may have only one hard drive, your system sees it as two, three or more different
and separate segments. The cloud often includes virtualization products as a part of their service
package. The difference is that a true cloud provides the self-service feature, elasticity, automated
management, scalability and pay-as-you-go service that is not inherent to the technology.