0 ratings0% found this document useful (0 votes) 155 views100 pagesCcs Module 123 Mu Cloud Computing Sem 7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Introduction to
Cloud Computing
troduction to cloud computing, need for cloud computing and its components, cloud & other
lar configurations, cloud types: NIST and Cloud Cube Model, characteristics of cloud
1g, deployment models, service models, advantages and disadvantages of Cloud
ting.
earning Topics : Study the recent trends in cloud computing architectures and related
inologies,
Introduction to Cloud Computing...
Need for Cloud Computing.
Components of Cloud Computing ..
Cloud and Other Similar Configurations
Characteristics of Cloud Computing...
GQ. Explain the characteristics of cloud computing
Cloud Types...
UQ. Explain the NIST cloud model. 117
UQ. — Write a note on : Cloud Cube Model.
UQ. Draw and explain NIST & Cube model of cloud computing. DUE...(Inteoelietion te
(mu-seM 8-17)
NIST Model
Cloud Cubs Model
Computing Deployment Models...
7 13 Cloud
Cloud Computing Service Models «1...
poring the Cloud Computing Staok...
Define Cloud Computing as por NIST. Explain the oloud cornigativ ‘if
a)
Software as a Service (Saas).
1.8.2 Platformasa Service (PaaS) «...
Infrastructure as a Service (laa). an
1.8.3
tiidh rth thcvallniaslgesciscailslaaail
4.9 Advantages of Cloud Computing...
List and explain the advantages and disadvantagas of cloud
computing. LIUGECE.
1.10 Disadvantages of Cloud Computing.....
ua.
J aia
GQ. _ List the disadvantages of cloud COMPUTING, sss: ssser
4.11. Applications of Cloud Computing ....
GQ. _ List the applications of cloud COMPULING. ..ssvssesecenseeeeen |
4.42 Self-Learning Topic : Study Recent Trends In Cloud Architectures and Related
Technologies ...
1.13 Descriptive Questions...
© Chapter Endsd computing refers to the distribution of computer services such as servers,
age, databases, networking, software, analytics, intelligence, and other services
fia the Internet, °
ations, configuring the network, configuring the firewall, and configuring data
After we complete all of the setup, we are responsible for maintaining it
g its full existence,
ever, if}we chose Cloud Computing, a cloud vendor will be in charge of the
Cloud Computing
Fig. 1.1.1 : Diversity of Cloud Computing
Tablets
wurees that can be stored and retrieved in the cloud include browser-based
ware applications (such as TikTok or Netflix), third-party data storage for photos
other digital media (such as iCloud or Dropbox), and third-party servers used to
upport the computing infrastructure of a business, research, or personal project.
Yilabus w.e. academic year 22-23) (8-138) Tech-Neo Publications‘use of cloud computing, companies and oo
idespread
Prior to the Wid rivand maintain the software and hardware tha
‘ysors had to purchase an‘
utilize. .
esses and individuals now have access to a multitude of on-demang
resources as internet-accessed services, thanks to the expanding avajjayy,, UN
based apps, storage, services, and devices. 'Y of,
+ The transition from on-premise software and hardware to networked
distributed resources eliminates the need for cloud customers to inyas 8
cash, or knowledge necessary to purchase and manage these computing &
themselves.
+ This unparalleled availability of computing resources has spawned a
of loud-based enterprises, altered IT procedures across industri,
many routine computer-assisted behaviors.
™MOn 4,
t they q
+ Busin
dig
NeW gen
eS, and
* Individuals may now collaborate with colleagues via video meeti,
collaborative platforms, access on-demand entertainment 2
information, speak with household appliances, hail a cab aa
. 2 with i ,
rent a vacation room in someone's home thanks to the cloud, Mbile de
JH 1.2_ HISTORY OF CLOUD COMPUTING» and the possibility of a network of com
and programs from anywhere in the w
Tn the 1970s, IBM launch. 7
its System/370 a VM, an operating system that allowed admini
z mainframe computers to run several vi ne
machines (VMs),” on a single physical node, virtual systems, or “virtual
Despite the fact that those res
: ‘ources were shared, each VM ran uni i
Systems or guest operating systems with their own RAM, CPU, and herd dines
driver, and it was a major motivator for some of the most significant changes in
> fo
.
4 ation providers that had previously only provided single
BS ‘ lata connections began. to offer virtualized private network
connections, which provided the same service quali i s
Sa ervice quality as dedicated services at a lower
| Rather of constructing physical infrastructure to enable additional users to have their
| own connections, telecommunications providers offered consumers shared access to
" the same physical infrastructure. This modification enabled telecommunications
Providers to transfer traffic as needed, resulting in improved network balance and
“more control over bandwidth utilization,
or Meanwhile, virtualization for PC-based systems was ramping up. As the Internet
became more widely available, the natural next step was to bring virtualization
online.
Ifyou were looking to acquire servers 10 or 20 years ago, you'd know that the costs of
physical hardware, while not as high as mainframes in the 1950s, were still rather
high. As more individuals indicated a desire to be online, the expenses had to fall from
"the stratosphere into reality.
"One way this occurred was through virtualization. Using the same sorts of features
"given by the VM OS in the 1950s, servers were virtualized into shared hosting
environments, virtual private servers, and virtual dedicated servers.
‘Practice, how did this look? Assume your business requires 13 physical systems to
websites and applications. With virtualization, you may divide those 15
J systems among two physical nodes. Obviously, this type of environment
fafrastrocture expenses and reduces the quantity of physical hardware
ait your company’s requirements.
demic year 22-23) (M8-138) Tech-Neo Publicationsization
hard
cost of server
As th oe ers. Hoeven
3 ufficient to SUPPLY the nect il
inst rent from the assumption thal es server aro ey
the are Oe belief that “these servers are inexpensive, a
them out Jt of this transformation, the most
i ” As a resul
combine them.
“cloud computing” ‘emerged online.
aia ware fell, more customers could
they van into a different type
ary resources.
Afford ty
of ing
«& The Cloud is Born ;
‘would portray the full environment's resources as though
« = Asystem 3 " 1 : fi 1
single physical node by ‘acing ted ening w bietret rm
hepervsor across several physical nodes, re
i i xd names like “utility ogy
‘be such environment, engineers use wi
+ ra aonpatng” ecnuse the total of the cloments appeared t be
somite resources that could then be segmented as needed (like he
companies did in the 1990s). oa
+ It was simple to add resources to the “cloud” in these cloud computing ¢ A
add another server to the rack and configure it to become part ae ee
Many ambitious firms opted to break apart the larger envi ees
and hypervisors improved on reliably sharing and providing resources, .
ey sought to make the benefits of the cloud available to consumers who did
n abundance of physical servers to construct their own cloud en
might purchase “cloud computing instances” (also
juesting resources from a bigger pool of aches t
vers were already online, “powering up” a new instance or #
no time. ‘ 2
of the environment is significantly easier since there is less over
e cloud computing environment when a new instance is (
use it is handled by the clouds software).
puting, on the other hand, did not become a
ord until the first decade of the twenty-first century. Cl
Fo. Compute (BC2) and Simple Storage Service ($3
An od Platform in 2008, Ali ore
ADT in 2010, Be eo eae Cloud in 20
during this decade,
S Wes academic Year 22-23) (Mg-138)SS IMU-SEM 8,
Services enableg .
e IT infras a ent organizations :
© cloud-based
ependent resources, :
_ developers and small developer teams tg and also rovided tools. for
this time, cloud-basoa applicati “reate and deploy apps,
aS) — which we'll go © ions, also
known as Softw: i
over in more detail in the Cloud Delivery Models wae
© popular,
ike on premise so}
PCs, SaaS im,
nand from a m
ware, which use
. TS must physically 4 —
Proves application ayaa lity vais ly — and maintain on
Lumber of devices, allowing users to access them on
es and Dec ed applications, such ag Google's productivity apps (Gmail,
= the eee (® eloud-based version af the :
©), ville a by the same companies that launched cloud infrastructure
: others, 88 Adobe Creative Cloud, were launched as cloud-based
based apps are now popular with enterprises
"and their market share is likely to expand,
ndividual users alike
businesses have an advantage
jor cloud providers and get ev
about the cloud is that even
when it comes to the cloud. They can work with
ery service perk they need. But one of the great
small and medium-sized operations can benefit
mputing is so important because it offers flexibility,
enance, easy access and a higher level of security.
exibility : With cloud computing, managing resources is easier than ever.
m ae for the resources you are using each month, and nothing more. Co
rage and cloud VPS providers offer flexible packages, where you can easily ad
decrease the amount of storage and bandwidth you are paying to use.
Recovery : Recovering data from damaged physical servers and hard
can be fairly problematic. If the physical device is badly damaged, recovery
data recovery, little to no
&! =
Publications
wef academic year 22-23) (M8-138) Tech-Neoeaves can result iN businogse
re. hese uote backed up. With g
i wt
8 oy
sib loug ae
wot nv data is stored on the clog «py
cat aan, Bat nen orca wae
ol i ‘ Z
jesus 7° nol in oul le jf they have a problem with one we juny : “nl
he P ven "ar data is safe as a copy ig” thejy , "vy
. ei
i ions, Your ‘ Pre
ane prysieal cations y have the infrastructure resent stv,
massive Soll vusinsses 7 backup systems. But with cloug a ‘oy
pation Seat? me gervieo at an affordable price,“ SOmpys %t
com ney can BEET ing a traditional server soty
jntenance ‘ Ve ce of the entire system. Not only gy. "Panic,
mois constantly need pemerig? they stop Workin
ator, bot Fa mputing solution eliminates bee for any td be
ont Ac i emuted by companies that use ql ea’
There is #0 O51 py the provider. That removes a massive headache 4
everything monthly expenditure is limited to what mt
y
documents, backend files, software, an
(oy Basy Access: zee youd computing. Its effortless for em hy
ite is much easier i: %, Ployees ty
website is ile te entire eompany #8 connected through its cloug interta
re es i roe «deve to acseas the network ang ed
security protocols. ‘ -
eased Security ; With cloud computing, everything you are -
© es ison the coud. Even if laptop is lost or damaged, the company me
is aossible through another device. And since alll your documents save oot
cloud, there is no concern about losing important documents because they wey
saved on a now lost or damaged laptop hard drive. Since information is 10 loge
"contained on your physical hard drives or servers, it also becomes a lot harder
to steal. With a comprehensive encryption and login security ayia
data is much safer with cloud computing.
%
@)
OF CLOUD COMPUTING
hitecture is a combination of components required fora Ce)
Cloud computing architecture consists of several ont
tom, a backend platform or servers, a network or Inter
Astivery service,
Ge mPrises two com,
of the cli
Applications th,
orm. Whil
ib
ponents, the front end, and the ye e ‘
eat part of a cloud computing system: ting
st are required to access the Cloud OPO ag
the back end refers to the cloud itself it OPgeet serie for cloud computing services. It consists of virtual machines,
, data storage, security mechanisms, otc. It is under the provider's control.
.4.1 shows the architecture of cloud computing.
ee: Giiont Infrastructure, Front End
"These are the following components of cloud computing architecture :
“(@ Client Infrastructure : Client Infrastructure is a Front end component. It
provides GUI (Graphical User Interface) to interact with the cloud.
(2) Application : The application may be any software or platform that a client
wants to access.
(8) Service : A Cloud Services manages that which type of service you access
according to the client's requirement. Cloud computing offers three types of
services namely, Software as a Service (SaaS), Platform as a Service (PaaS) and
Infrastructure as a Service (IaaS).
() Runtime Cloud : Runtime Cloud provides the execution and runtime
environment to the virtual machines.
(6) Storage : Storage is one of the most important components of oud computing. It
provides a huge amount of storage capacity in the cloud to store and manage
data.
Infrastructure : It provides services on the host Jevel, application level, and
Tevel, Cloud infrastructure inelodes hardware and software components
servers, storage, network devices, virtualization software, and other
‘resources that are needed to support the cloud computing model.
vement : Management is used to manage components such as application,
infrastructure, and other security issues in the
uef academic year 22-23) (M8-138) a Tech-Neo Publications& Sovvices (MU-SEM 5)
Cloud Computin
(8) Security :
implements a 8°
infrastructure for the
net : The Interne
(9) Inter at
interact and communica!
jn
Security is an i
arity: mechanism
‘end-user
1.5 CLOUD AND
ulti-tenant imy
are several m t
a ions with cl
We compare these configurat
ud Computing VS Traditional Com
Cloud Computing
“refers to delivery of different services
ns data and programs through
on different servers.
Ti takes place on third-party servers that
jis hosted by third-party hosting
companies.
It is ability to access data anywhere at
any time by user.
puilt backend component Of eloyg
1 for secure Cloud systems, mora
Te
outta filey”
,
1. is the medi
to with each other.
OTHER SIMILAR
plomentations that are similar to ely
‘oud computing in this section,
puting
um through which frontend ang
leg
“
%
CONFIGURATIONS
ud are.
Tit refers to delivery of different
local server.
Services 9,
Tt takes place on physical hard
website servers. Grives ang
User can access data onl
ly on é
which data is stored. system in
Tt is more cost effective as compared to
tradition computing as operation and
maintenance of server is shared among
several parties that in turn reduce cost of
public services.
It is less cost effective as compared to dou
computing because one has to hy
expensive equipment’s to operate and
maintain server.
It is more user-friendly as com
‘a pared to
Eaties| computing because user can
ve access to data anytime anywh
using internet. 7~—
Tis less user-friendly as compared to dol
computing because data cannot be acces
anywhere and if user has to access datait
another system, then he need to save itit
external storage medium. -
Tt requires fast, reli
I reliable and stable
internet connection to access information
anywhere at any time.
It does not require any internet ©
to access data or information.
cloud computing.
(New Syllabus
Wes academic
Year 22-23) (Mg.
-138)ting & Services (MU-SEM 8-IT)
Cloud Computing
provides scalability and elasticity
e can increase or decrease storage
ity, server resources, etc., according
ess needs.
service is served by provider's
team.
is offered ‘as an on-demand
(SaaS) that can be accessed
subscription service.
every
omputing vs Distributed Computing
(Introduction to Cloud Conputieg)
Tt does not provide any scalability and
elasticity.
Tt requires own team to mv
Monitor systema that will need # Int of tame
and efforts.
Software is purchased individ
Page co O46
ay aid
user and rerprives tw be apd
| periodically.
Cloud Computing
Distributed Computing
Cloud computing is the
provision of on-demand IT
resources and services over the
internet, including servers,
storage, databases, networking,
analytics, and software.
is
Distributed computing the
process of solving @ prot
numerous independent o7
that communicate with one another
over a network.
Cloud computing can be
defined as a computing
technique that allows users or
customers to access hosted
services via the internet.
Distributed computing, to pat @
simply, is a method of con
that enables multiple computers to
communicate and cooperate to solve
a single problem.
It is divided into 4 categories,
including Public, Private,
Community, and Hybrid
Clouds.
Distributed Computing Systems,
Distributed Information Systems,
and Distributed Pervasive Systems
are the three categories into which
it is divided.
Cloud computing has many
advantages, including
accessibility to the global
market, economies of scale,
cost-effectiveness, elasticity,
and reliability.
The advantages of distributed
computing are numerous, including
improved performance, flexibility,
and dependability.
Cloud computing makes the
hardware, software, and ;
networking resources available | computer, distributed computing
over the internet. makes them possible more quickly.
Because computational tasks take a
long time to complete on a single
wef academic year 22-23) (MB-138)
ic} Tech-Neo PublicationsProviding on-demand
com ins
seryactrit
computing.
Distributing a single tas,
number of computers with, 4°
of quickly solving it by n
coordination between
taown as distributed compre
Distributing a single task , ~
computers to advance =
simultaneously, using
procedure calls and remote
jnvocation for distributed = 4)
computations are some
characteristics of distributed
computing.
‘The possibility of node failure ang
Drawbacks
Less control,
public clouds,
Timitations, an
are some
computing.
particularly with
potential service
‘and cloud security
‘drawbacks of cloud
communication issues brought og
by a slow network are some
drawbacks of distributed
computing.
|
Computing Vs Grid Computing
Cloud
‘Sr.
169]
en
Cloud Computing —
Cloud Computing is based on the Client-
Server Architecture.
Grid Computing is based
Distributed Computing Architecture.
(2)
It is a centralized management system.
While Grid Computing is +
decentralized management system.
(3)
Cloud Computing is flexible compared to
Grid Computing.
Grid Computing is less _flesbe
compared to Cloud Computing.
(4) | ‘The users pay for what they use (Pay-as-
you-go Model) usage.
(5) [Cloud Computing is more highly | Grid Computing is less scalable ti
|__| scalable than Grid Computing. Cloud Computing.
6) a
© a user ean acess Cloud Computing | The user ean access Grid om
st
Tala a protocols. with grid middleware. nae
ae ave tee the resources are|In Grid Computing
e Cloud service provider. feation § of thet
organization is the owner
(Ne
ew Syllabus w.e academic year 22-23) (M8-138)ping & Serfices (MU-SEM 2-7) (Introduction to Cioud Computing)....Page no_(1-13)
|JaaS, PaaS, and SeaS are the three | Distributed Computing, Distributed
Cloud Computing Services. information, and distributed pervasive
are the systems used in Grid
Computing.
While Cloud Computing is Service-| While Grid Computing is Application-
Oriented Oriented
Jn Cloud, Computing users do not have | In Grid Computing, the users do not
to vet up anything have to set up anything.
Cloud Computing involves dealing with | Grid Computing offers a shared pool of
chronic issues with different amounts of | computing resources.
computer resources.
In Cloud Computing, more than one| Grid Computing is a group of
computer works and coordinates with | interconnected networks and resources
each other and resolves problems | which can process massive processing
together. tasks.
omputing Vs Fog Computing Vs Edge Computing
Cloud Computing | Fog Computing | Edge Computing
cy Highest Medium Lowest
lity High, easy to scale Scalable within | Hard to scale
network
Far from the edge Network close to | At the edge
the edge
nalysis | Less time-sensitive data | Real-time, decides | Real-time, instant
processing, permanent | to process locally or | decision making
storage send to the cloud
ting High Limited Limited
perability | High High Low
llabus w.e. academic year 22-23) (MB-138) Tech-Neo Publicationssony of computor rosourens such 08 gto
~ Shou eomputine 5S the seatiiies and more to clionts through {h
applications, etn gs croud Service Providers or CSP),
service providers
Users may now acces!
co, rather
any pla for the cl
and enbance infrastructure
of Cloud Computing :
oud services you utilize, you may rq
efficiency. The following are
+ expenses
“characteristics
(2) On-Demand Self'Sorvico —~
(8) Scalability and Rapid Hust
(6) Measured and Reporting Seg
(8) Automation pay oy
(7) Security
(9) Resiliency and Availability (10) Large Network Access
(11) Work from Any Location (12) Multi-Tenancy
(18) Flexibility (14) Service Excellence
(15) Comfortable Payment Structure
> (1) Resources Pooling
One of the most important aspects of cloud computing is resource pool
pooling means that a cloud service provider may share resources
clients, providing them with a unique set of services based on their needs.
* It is a multi-client technique that may be used for data storage, procs
bandwidth provisioning. The administration method of real-time reso ree £
does not interfere with the client's experience.
> @) On-Demand Self-Service
aa md and necessary component of cloud computing. It allows
ally check the server's availability, capabilities, and network stor.
‘This is
co, 8 care feature of Cloud Computing, and a customer may als? |
puting capabilities based on his demands,
» @) Easy Maintenance ,
* Tis an essential co
servers gain eo™PONeRE of cloud computing, It enables the cient to
+ capabilities, and network storage capacity on 2 con” at
(NeW Syllabu
SWeef academic year 22-23) (MB8-138)ability and Rapid Elasticity
id scalability and Elasticity is a significant feature and benefit of cloud computing.
cloud feature enables the cost-effective operation of workloads that demand a
e number of servers but only for a short period of time,
ny clients have similar workloads, which may be performed very cost-effectively
to Cloud Computing's quick scalability,
Economical
is cloud feature aids enterprises in lowering their IT spend. The customer must pay
administration for the space they have utilized in Cloud Computing.
© are no hidden fees or additional charges to pay. The administration is cost-
ive, and some space is frequently provided for free.
Measured and Reporting Service
rrting services are one of many cloud features that make it the greatest choice for
asinesses, Measuring and reporting services benefit both cloud providers and their
ers.
t allows both the supplier and the customer to track and report on which services
ere utilized and for what reason. This aids in billing monitoring and maintaining
ptimal resource utilization.
Security
One of the finest aspects of cloud computing is data securi
oud services make a duplicate of the data that is saved.
If one server loses the data, the copied version from the other server is recovered, This
capability is useful when several people are working on a single file in real time and
he file becomes corrupted.
) Automation
ity. To prevent data loss,
tomation is a necessary feature of cloud computing, Automation in loud computing
fers to the capacity of cloud computing to automatically deploy, configure, and
anage a cloud service.
B layman's words, it is the practice of maximizing technology while minimizing
manual efforts. However, achieving automation in
icult,
necessitates the setup and deployment of virtual machines,
nunts of storage. Following successful imy
ngoing maintenance.
the cloud environment is more
servers, and massive
plementation, these resources will require
Syllabus w.e academic year 22-23) (MB-138)
Tech-Neo Publications> (9) Resiliency and Availability ote
ai "i
In cloud computing, resiienc? refers
any disruption loud is determined by how quickly its servers, datay
The resilience of @ serie om ay 8 te rr da
, ture restart
network infrastructure 7" aud computing is ita availability,
feature
© Another oe esod remotely, there are no geographical
services
limitations to using
(0)Large Network
In cloud computing,
terruption.
measured by the speed with which its servers, ditabasoy,
recover from any form of destruction or damag
of cloud computing is ita availability,
er critical aspect
hical boundaries or limitations to accessing cloud resources
service's capacity (0 awitly
cloud resources.
Access
resilience refers to a servi
co's ability to recover quic
(11) Work from Any Location
One of the most important aspects of cloud computing is remote working. |
users to work remotely or from anywhere on the earth.
} Mobile devices such as laptops and smartphones will be allowed to
data.
It also guarantees that every user has a rapid connection, Employees
other area can communicate and do their duties.
that wot
remotely or reside in an
> (12) Multi-Tenancy
+ Multi-tenaney is one of the finest aspects of cloud computing. A software d
permits a single program instance to serve many user groups is kno
tenancy.
+ Tt denotes that several cloud provider clients share the same compute
separate and secure.
> (3) Flexibility
* As the competitio
e in grow:
willhave ta changeset frm i sae Tae Ga utilize com
(New Sy bus wef academic year 22. (8-138)
al 22-23)
)(Introduction to Cloud Computing)....Page no. (1-17)
When users host their data on the cloud, they have more freedom. Scaling does not
nood a server restart and may be performed at any time.
Users can also choose from a number of payment options. This means that firms will
not have to waste money on resources they don't require.
4) Hervice Excellence
Cloud computing guarantees that consumers receive the best possible service.
Bervive Level Agreements must provide benefits such as continuous availability and
comprehensive resources, performance, and bandwidth. Any compromise in these
‘ices will result in client loss and a drop in popularity.
}) Comfortable Payment Structure
garment structure is crucial since it assists in cost-cutting. Cloud computing
Ws fluctuate in prrice due to the extra capability.
jwers find the payment option straightforward to use, and it helps them to save time
uy 29
javed on the architecture, deployment types, usage and applications, the cloud
ire is further classified into multiple types as follows :
7.1 NIST Model
the National Institute of Standards and Technology (NIST) definition of cloud
puting, “Cloud computing is a model for enabling ubiquitous, convenient, on-
wand network access to a shared pool of configurable computing resources that can
rapidly provisioned and released with minimal management effort or service
jider interactive?” :
Reference Model of cloud computing is depicted in Fig. 1.7.1 below. The NIST
fnition liste five essential characteristics of cloud computing: on-demand self-
fee, broad network access, resource pooling, rapid elasticity or expansion, and
ured service.
lists three “service models” (software, platform and infrastructure), and four
Joyment, models” (private, community, public and hybrid) that together categorize
to deliver cloud services.
wes acadernic year 22-23) (MB-138) fech-Neo PublicationsFig, 17.1 : NIST Cloud Reference Model
acteristics
demand self-service : consumers can unilaterally
ilities as needed automatically without requiring bum
ice provider.
network access : Capabilities are available over the n
‘through standard mechanisms that promote use by heterogeneous
platforms.
(8) Resources pooling : The provider's computing resources are pooled ti
consumers using a multi-tenant model, with different physical and
dynamically assigned and reassigned according to consumer demand.
@ Rapid elasticity : In response to demand, capabilities can be elas
and released to scale rapidly outward and inward.
(5) Measured service : Cloud
by leveraging a metering ¢,
‘Appropriate to the type of sey
systems automatically control and opti
‘apability (pay as per use) at some le
vice,
W722 Cloud Cube Model
Cloud Cube
Model, desi
dloud network desi
fone fred and developed by Jericho forum helps
Perimetetized /Perne® © dimensional factor: Internal/Externsl, Pr
{Pevimeterized, and Insourced/Outsourced. ;puting & Services (MU-SEM 8-17)
(introduction to Cloud Computin
go no. (1-19)
Fig, 1.7.2 : Jericho Forum Cloud Cube Model
ame Four-Dimensional, the working is also categorized into four parts viz :
al Location of Data : The location of data may be internally or externally to
ganization which ultimately defines the organization's boundary.
nership : Ownership may be proprietary or open. It is a measure of not only
mology ownership but also its interoperability, use of data, ease of data-transfer
degree of vendor application lock-in.
ity Range : It is peremeterised or de-peremeterised. It measures whether the
ations are performed inside or outside the security boundary, firewall, ete.
ng : It is In-soureing or out-sourcing; which defines whether the customer or
ice provider provides the service.
Cloud Computing Deployment Models
ad technology offers several advantages to consumers; these advantages should be
ed based on the demands of the users.
cloud deployment model outlines the nature and purpose of the cloud and reflects
pecific type of cloud environment based on ownership, size, and access.
t businesses use cloud infrastructure to save capital investment and control
ational costs.
rate clouds
(2) Public Cloud
ommunity Cloud (4) Hybrid Cloud
is w.ef academic year 22-23) (M8-138) al Tech-Neo Publicationsbya aii ;
data is oe that have g
x security. ar for ent
your Jouds are
let For cous
oan cide. Pri itty n
inside or se availability
managemen!
licensing .
t model for all users, or | faa enterprises
Cost . 2 "
er. Pabig oa deployment Strategies are id,
*2d ring demands,
* Whe ateg Pptlar ary
Mose data g
ine app i
izes for onlin
izati all sizeg
‘ong. oTRAnizations of
storage,
aePUBLIC
CLOUD
Fig. 1.7.5 : Public Cloud
(8) Community Cloud
This is a model that is shared by companies that belong to a certain community, such
as banks, government organizations, or commercial firms.
“Members of the community usually have similar concerns about privacy, performance,
and security. This cloud computing deployment methodology is maintained and
hosted internally or by a third-party provider.
Fig. 1.7.6 : Community Cloud
Hybrid Cloud
‘This approach combines the benefits of both private and public clouds, yet each may
operate independently.
Furthermore, as part of this cloud computing deployment paradigm, internal or
external suppliers might contribute resources.
* Scalability, flexibility, and security are all advantages of a hybrid cloud.
* A wonderful illustration of this scenario would be a company that utilizes the private
cloud to safeguard its data and the public cloud to engage with its clients.
(New Syllabus w.e.f academic year 22-23) (M8-138) Tech-Neo Publications177 Hybrid Cloud
Fig
private, and Hybrid ai
Public Private 2p,
[oarrstre_—_| Expensive Exper
lot ———] Depends 08 the | Most Secure | Secure
[eon cloud provider
aa “Highly scalable Limited Highly
[Seasblity the right an,"
a
[ies Highest ae
Mee ——T attenant, Shared | On-premise, | Biixea
Seam esmie® | servers Private Servers
oe Cloud Provider Organization | Organizatie
Bamps ‘ws, GOP, Azure, | VMware, HE, | Rackapec, rs
IBM, Oracle Dell, Openstack | Cisco, IBM
L
3 1.7.4 Cloud Computing Service Models
Cload resources are provided in a variety of different service delivery msl! ,
zr eastomers different levels of support and flexibility.
(2) Software as a Service (Saas)
* Ts Spshiliy provided to the consumer is to use the provider’
maning on a cloud infrastructure, =
thong gt
nS wa .
"demic year 22.23) (8-138) (Re) ec ne
— =& Services (MU-SEM,
The applications aro accessible from various eliont de
interface such as a Web browsor (o.g.,
‘es through a thin client
Web-based email), or a program interface.
¢ = The consumer does not manage or control the underlying cloud infrastructure
including network, servers, operating aystems, storage, or even individual
application capabilities, with tho possible exception of Kmited user-specific
application configuration settings,
(®) Platform as a Service (Paas)
* The capability provided to the consumer is to deploy onto the cloud infrastructure
consumer created or -acquired applications ereated using programming languages
and tools supported by the provider.
+ The consumer does not manage or control the underlying cloud infrastructure
including network, servers, operating systems, or storage, but has control over
~ the deployed applications and possibly application hosting environment
= configurations.
(©) Infrastructure as a Service (Iaas)
‘The capability provided to the consumer is to provision processing, storage,
networks, and other fundamental computing resources where the consumer is
able to deploy and run arbitrary software, which can include operating systems
and applications,
+ The consumer does not manage or control the underlying cloud infrastructure but
has control over operating systems, storage, deployed applications; and possibly
limited control of select networking components (eg., host, firewalls) (e.g., host,
firewalls).
EXPLORING THE CLOUD COMPUTING STACK
* Cloud computing, often described as a stack, has a broad range of services built on top
of one another under the name cloud. The accepted definition of cloud computing
comes from the National Institute of Standards and Technology (NIST).
* The NIST definition runs to several hundred words but begins as follows :
“Cloud computing’ is-a model for enabling ubiquitous, convenient, on-
demand network access to a shared pool of configurable computing resources
(eg., networks, servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal management effort or service
Provider interaction”.
bus w.e f academic year 22-23) (M8-138) i) Tech-Neo Publicationsa stack that is formed by jy,
ti services
Cloud Computing & a
serib d_ computin, ery,
loud camping eB oie built et clouds firming wet
layers Bing ey
cake. Tee vai seve ability of the stack will dotermn® oe ‘
oat 7 ‘The network Ain wae ‘i
vailabibty- types of clow stack components
a juiar with we pon inthe cloud world. ty,
+ Lets i
Fig. 1g.iand Software
asa Services
GY o @ | | pattorm
compute Services as a Services
‘seourty
Infrastructure
=) (ome |
as a Services
Fig. 18.17 + Cloud Computing Stack
1 soteware as a Service (5238)
thet is made available as @ service through the Internet is known ta fee
‘ ted on-demand access to & SaaS app by a provider, cite,
qchecription or pay peruse. ; ;
ax be offered at no charge when there is an opportunity to generate rey
qreans ether than the user, such as from advertisement.
is now widely used in most organizations, so it's critical that tech
aes wed asers oomprehend what itis and when it's appropriate.
& Characteristics of S2aS
teal fillowing are some salient features of SaaS :
te commercial software over the web
) Access
( Centralized management of the software
@ DeSvering software via a “one to many” model
a: exempt from managing software updates and fixes
[tech neo POMaS
‘Computing & Services (MU-SEM 8-17) Introduction to Oloud Computing)...
When to use SaaS
Particularly SaaS and js
P hat mk ts — computing aro expanding technology delivery techniques,
- ona e cloud must decide which applications to convert to Basti,
tions that are i
a excellent candidates for an initial transition to Basi include the
@ Suell is - so of a standard offoring whore the solution is bavically
uaa ren ea Beeausé this core tochnology is necensary for conducting
musiness but doesn't provide a competitive advantage, rivals frequently utilize: the
‘same email program,
Apnletons like email newsletter campaign software are examples of shove
where there is a lot of interaction between the company and the outside world.
applications that require a lot of connectivity to the web or mobile devices, euch
mobile sales management software program for team collaboration on a
particular project.
() Software whose demand rapidly increases after a month, such tax or billing
software.
The first SaaS product made available to the commercial community was the
Salesforce Customer Relationship Management (CRM) platform. CRM, one of the firet
players, continues to be the most well-liked SaaS app category, although email,
financial management, customer service, and cost management have also grown in
popularity.
Reasons not to use SaaS
SaaS is a useful tool, but there are times when it's not the greatest method for
‘ing software.
following are some situations in which SaaS might not be suitable :
‘Applications that require quick real-time data processing
‘Applications that are prohibited from hosting data externally by law or otber
regulations.
1.8.2 Platform as a Service (PaaS)
latform as a service (PaaS) brings the benefits to the software development world
that SaaS brought for applications.
PaaS is defined as a computing platform that enables the quick and easy creation of
‘eb applications without the necessity of buying and maintaining the software and
tructure underneath it.
‘academic year 22-23) (M8-138) fal Tech-Neo Publicationsese £
the exception tha;
to S205, “it
Seals jelvered over the web rau a nS
Cloud Computing & Services
© PaaS is comparable
development of software ©
delivered over the web. s
© Characteristics of PaaS us a8
PaaS traits: v
‘The following are sme fundamental i eth
+ All the different services required oe dao © ADP dey,
Juding those 1 ‘jevelop, test, deploy, host, ang oo
¢ environment. sare
"4
~
provided, ind
same integrated d
Tools for building web
test, and deploy various
phe same developme!
evelopment -
user interfaces (UIs) that
jos. it may be
bb
unt app by numerous
ifs
Ma,
,
+ The use of t
architecture.
«Software that bas been deployed has built-in scalability, inclyg;
failover. ing Ioag
+ Using shared standards, integration with databases and web se, ee
« Support for cooperation among development teams, Pro TVices, .
communication features are sometimes included in PaaS sy; She manag
Ms to help tee 4
teams collaborate.
subscriptions and billing.
‘Tools for managing
Infrastructure as a service (IaaS) and platform as a service (P,
many aspects, but JaaS differs from PaaS in that it aia
Value-addeg
2
such as
© A collaborative software development envi
vironm :
management independent of the app's data ome ‘at Briortices ya
Heroku® makes use of the Ruby on Rails® programming | OF instance, the p
A om ;
0° A pete that enables the development of apps using cent,
sind ia fore pei used to construct appe usin te tae
est demonstrated by Salesfore sing this kind
e.com's Force.com P; othe
-com PaaS, whic
whieh ema
apps that integrate with the Salesforce.com CRM.
5 When to use PaaS
When several dev
elopers are i 7
stakeholders must i involved in a develo} 4
ist “ pment proj
interact with the development praca canis sol
fal for a is extremely he
people who already have a data source and wasl!t#
Pao is incredibly help
it to build applications
When develo ’
pers want
ea t to automate testing and deployment services, PatS ##
W Syllabus wef
12. academic year 22.
-23) (M8-138) cy
i
Tech-Neo Pubial?
id
a1-27)
Cloud Computing & Services (MU-SEM 8-IT) __(Introductlon to Cloud Computing)....Pago n.
Because PaaS makes the challenges associated with rapid software development and
iteration easier, agile software development is growing in popularity.
& When Not to use PaaS
+ PaaS is very alluring because of its value-creating capabilities, which include the
ability to automate operations, use preset components and building blocks, and deploy
automatically to production. PaaS, however, might not be the best option in the
following circumstances :
(2) When it comes to hosting, the app must be extremely portable.
(2) The development process would be impacted by proprietary languages or
methods. =
(3) A proprietary language would make it difficult to switch providers afterwards.
(4) Customizing the underlying hardware and software is necessary for optimal
application performance, ‘
+ Faster app development is possible with a PaaS development environment. In some
cases, the cost of developing the software would have been too high without PaaS.
‘% 1.8.3 Infrastructure as a Service (IaaS)
* Servers, storage, networks, and operating systems are all provided via infrastructure
as a service (laa), which is an on-demand service. Clients purchase those resources
as a fully outsourced on-demand service rather than buying servers, software, data
center space, or networking hardware,
TaaS is available as either public, private, or a hybrid of the two infrastructure types.
Public cloud is an infrastructure made up of shared resources that is set up over the
Internet on a self-service basis.
A private. network-based architecture called a “private cloud” imitates some cloud
computing features including virtualization.
A hybrid cloud is offered by some hosting companies. Traditional dedicated hosting is
combined with public, private, or both types of cloud networks in this cloud.
© Characteristics of IaaS
JaaS has the following primary characteristics :
(1) Resources distributed as a service
lows for dynamic scaling
as a variable cost, utility pricing model
lows for multiple users on a single piece of hardware
Fe} Tech-Neo Publications
labus w.e.f academic year 22-23) (M8-138)(MU-SEM 8-IT)
(Introduction to
Cloug
Lo,
cloud Computing & Services
0 use IaaS
following situations are particularly suitable for cloyg ;, =
mel ignificant spikes and trou, ty,
(1) Any time there are significant sp: hs of deman, re
a rg
izations without the capital to invest j ;
(2) For new organizations ‘ ; . in harg ig
(3) When the organization is growing rapidly, ang...) “ay
3)
6a when t
. lt
problematic. aa z
(4) When there is pressure on the organization to limit capita,
i diture. it,
to operating expen | - ¥
“ee iness, trial, or temporary infrast,
(5) For a specific line of busin Phe
1 when not to use 1aaS
tages when scalability and quick prop;
though IaaS has advant ges when scala : os
the oiiehe isa situation in which its limitations might be Problems ig t
Regulatory compliance makes the offshoring or outsourcing ot :
i at
processing difficult.
DW 1.9 ADVANTAGES OF CLOUD COMPUTING
ere are some of the advantages of cloud computing :
(1) Cost: It lowers the enormous capital expenditures of purchasing pear ay
id Sahay
lity : Resources may be accessible in minutes, Usually wit
(8) Scalability : We ean raise or reduce the number of resources reoure ia
company needs,
() Productivity : We put in less operational work when we use cloud computing Te
4s no need for patching, and there is no need to maintain hardware and sotvan 4
result, the IT team may be more productive and focused on meeting buss
objectives,
() Reliability : Data beckup and recovery are less expensive and faster fr ane
continuity,
(©) Security : Many cloud companies provide a comprehensive set of rules, techutlé#
and controls that improv
data security,
Wew
New Sylabus wef academic Year 22-23) (Ivg.13a) [el rech-neo rubio®*(7) Maintain compliance : Understanding and ensuring compliance with data
regulations can be difficult and time-consuming. Companies may be safe in their
compliance and save valuable time by utilizing a cloud storage service provider that
works in accordance with latest standards.
(8) Avoids unforeseen downtime : Outages in data centers may cost businesses a lot of
money. A corporation might lose $5,600 for every minute of unexpected downtime
That implies that an hour of unexpected downtime may cost a business $300,000, not
to mention the impact on consumers and the company's reputation.
4 ci }0_ DISADVANTAGES OF CLOUD COMPUTING
‘Here are few of the disadvantages of cloud computing
@) Control is limited : Because cloud infrastructure is held by service providers,
businesses must determine how much control they want over their service. Typically,
the provider does not own or manage the data or applications, but the infrastructure
is owned and controlled by the provider.
Lock-in of vendors : Another downside of cloud computing is the likelihood of issues
when switching providers with different platforms. Data may be susceptible during a
vendor migration, thus a competent service provider must be able to move data in a
safe and secure manner.
Backup and restoration times are slow : Backups and restorations may take
longer in the cloud than on-premises servers.
Dependency on the internet : The fact that cloud computing is entirely reliant on
the internet is both a benefit and a problem. Nothing on the cloud can be accessed if
the internet is unavailable. However, because most organizations rely on the internet
for the majority of their operations and tools, cloud computing is no different than the
existing online platforms that they employ.
Use of the internet : Another internet element influencing cloud computing is the
fact that massive cloud backups might slow down internet speed. This implies that
massive backups may have an impact on internet performance during working hours.
‘This is especially true for small enterprises that may not have access to high-speed
internet. A reputable service provider can offer remedies to this issue.
yllabus w.e.f academic year 22-23) (M8-138) jech-Neo PublicationsSen = =
ju Compal = iONS OF CLOUD COMPUTING
PPL
ae I
the application areas Felony a
@) Backup; tin
ind Ry
Testing ang » "y™
t some
ction discusses about
Data Storage
Gy Online Data So"
(3) Big Dota Analy
(5) Antivirus Programs
(7) Cloud Computing
6) E-commeres amg
: PPlicag:
Education 2 eign
ine Data Storage
> (1) Online Dat
Cloud computing provides for the storage and access of data wha
+ Clow 1
‘adi, and videos in the cloud. be
-— day and age of big data, storing massive amounts of Pn ;
+ In this day ¢ amounts of space and rising expenses, tet
necessitates increasing : g i
This is where coud storage comes in, where businesses may stor, oi
from multiple devices. i
‘The given interface is simple to use, convenient, and has the siradgg
speed, scalability, and integrated security. 7
(2) Backup and Recovery
* Cloud service providers provide secure storage and backup for data ang Tesoure
the coud, ‘
* Data backup is a complex challenge in a typical corn
frequently irreversibly lost in the event of a disaster.
* However, with cloud computing,
the event of a disaster,
> (3) Big Data Analysis
puting system, and dete
data may be easily restored with minimal damp:
One of the most important a; licatic '
icati ing is its i "I
seal data processing, plications of cloud computing is its involvement ino
The unusual i i
mange be Volume of big data makes it impossible to store using typicel#
equine ignite ra Businesses may now store and analyze massive
¥ 4) Testing gn S*** Bsights because tothe clouds limitless storage ope"
“ng and Development
loud comp
Nuting ing oF
de APPS off eo)
evelopment “the most convenient method for product tilt
NeW Sy Met academic yeas
Nee SHisbus ee
He vear >as of eloug ‘ “
0
@) Backs "
7 storage P ang
w one Bt Si A Testing any Reearare
(3) Big Data Analy 6)
(5) Antivirus Programs
(7) Cloud Computing in B
‘Vel
E-commerce Appi
iducation Nation
> (1) Online Data Storage
4d computing provides for the storage and access of data
Cloud com}
loud. Such
. ideos in the cloud.
io, and videos int ; 7
audio, day and age of big data, storing massive amounts of corporg iy,
e In a increasing amounts of space and rising expenses, te tan,
neces P g
«This is where cloud storage comes 1, where businesses may store a
from multiple devices wang
The given interface is simple to use, convenient, and has the avant
ity, 6
speed, scalability, and integrated security, * ay
(2) Backup and Recovery
+ Cloud service providers provide secure storage and backup for data ee
the cloud, :
Data backup is a complex challenge in a typical
frequently irreversibly lost in the event of a disaster,
However, with cloud computing,
the event ofa disaster,
» (3) Big Data Analysis
One of i icati
ofthe most important applications of cloud Computing is its involvement in up
Seale data Processing,
Computing system, and day;
data may be easily restored with minimal damage
The una
ienaganent cee lime of big date makes it impossible to store using typical
A ‘lutions, Businesses May now store and analyze massive da!
i
cause to the cloud's limitless storage cap?
Computiy ing #
elopmen,, © “PPS OM the most i oduct tests
_ Convenient method for Ppthe application areas of coy
om, ea
(2) Backup ang Tatty be
(4) Testing and Daya %
(6) E-commerce Apmi
i
‘ ating
(5) Antivi
id Computing,
rage
> (1) Online Date Sto ides for the storage and access of data such ae fy
ting prov fila,
+ Cloud oi nthe cll ; . ; My,
audio, am cage big data, storing imiaskive amounts of Corporate dat
« Inthis day nee ng amounts of space and rising expenses, eg
tates in : .
ne sdoud storage comes in, where businesses may store ang 4
This is where cou '
fo ie dv convenient, and has the ad
ven interface is simple to wee, advantages
el sas ated security. 7
speed, senlbility, and integr
(@) Backup and Recovery
Clad ese providers provide seeure storage and backup for data and res,
the cloud.
+ Data backup is a complex challenge in a typical computing system, and deta
frequently irreversibly lost in the event of a disaster.
+ However, wth cloud computing, data may be easily restored with minimal damp’:
the event ofa disaster,
> (3) Big Data Analysis
* Greet the mos important applications of cloud computing is its involvement inp
Scale data processing,
The usually huge volume of big
anagem
nt solutions, Busin
ir » Busines:
Acquire significant by i
data makes it impossible to store using typi
es may now store and analyze massive de!
ess insights beeause to the cloud’s limitless storage co"
‘velopment
Cloud com
uting ay gil
“eremen, TF OMe the most convenient method for product test
MSs elgg |loud _
(2) Backup a Comp,
ams
‘Antivirus Prog
ing
ata Storage a
a
the storage and access of data Such ag
in the cloud. , les, my
2 toring massive amounts of
sy and age of BE data, si - corpo,
essit torage comes in, where businesses may store ang
a
mig
nec
his is where cloud st
from multiple devices.
ce is simple to use,
d integrated security.
The given interfac convenient, and has the advanta,
speed, scalability, 2
(2) Backup and Recovery
srvice providers provide secure storage and backup for data
and Tesoune
8 oti
Cloud set
the cloud.
+ Data backup is a complex challenge in a typical computing system, and day
frequently irreversibly lost in the event of a disaster. 4
However, with cloud computing, data may be easily restored with minimal damagi:
the event of a disaster.
> (8) Big Data Analysis
+ 0 icati
ne of the most important applications of cloud computing is its involvement in ug
seale data processing,
The um 4:
cng volume ofbig data makes it impossible to store using typical dtd
acquire significant hen Businesses may now store and analyze massive dsl?
> 4) Testin siness insights because to the cloud's limitless storage cm"
and Development
Cloud compu
ting apps of ing
development, ffer the most convenient method for product testingid Come
Computing & Services (MU-SEM B-IT) __(Introduction to Cloud Computi
=M8-IT)_ ° mputing
In traditional ay » Cloud Computing) :..Page no. (1-31)
pproaches, such an envi L
es cinstallnty , environment would be time-
lation of IT resources and infrastructare, and labor intensive, exwiyieue
* sive,
Businesses, on the oth
s er hand, b from
i which they may utilize for eat eal fs oe and adaptable cloud services,
BP Antivirus Progr , testing, and deployment.
| Cloud Computing bri i :
re cee brings cloud antiviral software, which is kept on the cloud and
a fixes viruses and malware in an organization's system.
yeviously, enterprises had to't 7 ;
eS had to install antivirus software on their systems to detect
(6) E-commerce Application
Cloud-based ecommerce softwai ;
re allows usel i r i
Bncopng eproruiion users and e-businesses to respond swiftly to
It provides a fresh strategy for corporate executives to get things done in the shortest
amount of time. They employ cloud environments to manage customer data, product
data, and other operational systems.
> (7) Cloud Computing in Education
E-learning, online distance learning programs, and student information portals are
some of the major advances brought about by cloud ‘computing applications in the
education sector.
'¢ Students, teachers,
and access data and inform:
and researchers can connect to the cloud of their establishment
ation in this new learning environment, which provides an
appealing atmosphere for learning, teaching, and experimenting.
SELF-LEARNING TOPIG: STUDY RECENT TRENDS IN cLouD
ARCHITECTURES AND RELATED TECHNOLOGIES
tion of cloud computing has
‘ch trends, including artificial intelligence (aD,
and hybrid working.
to see it becoming an enabler of even
ted reality (VR/AR), the metaverse,
ed to invest in buying and
ese intensive computing
ce," running
AZ
“The ongoing mass ado) been a key driver of many of the
most transformative te the internet of
things (IoT), and remote
Going forward, we can expect
including virtual and augmen!
even quantum computing.
“Cloud computing makes this possible by removing the ne
« the expensive infrastructure required for these
pplications. Instead, cloud service providers make it available "as-a-serv
n their own servers and data centers.
more technologies,
cloud gaming, and
el Tech-Neo Publications
llabus wef academic year 22-23) (M8-138)jatlon to Cloud G
noutt
Cloud Computing & Servicas (MU-SEM 8.11)
aie wvold the Lily of yj Ray
g aon "
, ,
+ ealso means compan ean A it tke avant of ta ONG
highly specialised worklore ’ / ° rah
technologies. alee continuing to levernms cloud go, eu My \
. W : comp vow as woll R8 AEiVO offig
We can expect to see ¢ a nologies 4 hemactie clonciog , ty ts
access now and innovative (2 gown of so he trends yay tye
pre's 8 NAt og, iy
operations and processes hay
,
most impact, d security and resilience
mt
jo
(1) Increased investment In cl
yud
panies and
js hugo opportunities, efficiencios ty
3 an
organizations to a new ra cn
et MBE Of gy,
Ne
o Migrating to the clo
but also exposes cO™ .
threats, the growing pile of legislation around how busings,
+9 Ontop tty a Means that the risk of fines or (even worse) ima i,
30
; nat apending on ever secunity and building resins aging
3 . sree impact of « pandemic on global business yi ~.Cloud Computing & Services (MU-SEM 8.1T)
No.
Cloud Computing
Cloud computing requires
dedicated hardware, a
In virtualization.
singie dedicated
hardware can do a great job in it.
Cloud computing provides unlimited
storage space.
Storage space depends on physical server
capacity in virtualization.
10.
Cloud computing is of two types =
Public doud and Private cloud.
‘Virtualization is of twa types: Baxtbraxe
virtualization and Application
virtualization.
11.
In Cloud Computing, Configuration i
image based. oo“
In Virtualization, Configuration is
template based.
12.
In cloud computing, we utilize the
entire server capacity and the entire
servers are consolidated.
In Virtualization, the entire servers ==
on-demand.
13.
In cloud computing, the pricing pay as
you go model, and consumption is the
metric on which billing is done.
In Virtualization, the pricing i= weailr
dependent on infrastrucmure casts.
14.
Easy to integrate with existing
solutions, many providers support
integrations and APIs. May require a
data integration solution to prevent
data silos.
Easily integrate with public and 2
clouds, oT devices, and darabases.
integrating with legacy equipmenn.
integration software ta unify dam
needed
15.
Cloud computing deliver variable
resources to groups of users for a
variety of purposes
Virtualization deliver packaged
resources to specific users for 2 speeidic
purpose
EE
Dy 2.3 TYPES OF VIRTUALIZATIONS
~
> (1) Hardware Virtualization
omputing resources from the software
6
1UQ. Write short note
u ees
In this section, we w'
(Q) Hardware Virtualization
(3) Operating System Virtualization
(8) Storage Virtualization
(2)
@
(6)
It is the abstraction of ¢
resources.
discuss about different types of virtuslizations.
Software Virtualization
Server Virtualization
Network virtualization
that uses cluud
fel_Merve
n
‘ \
rhe hypervisor Mang, M
vigor: The coe host os, thy mh
Tt involves the vers os | hardware,
component ale eet thet ated as actu ‘int fi
a ete este ware virtualizat;
That so or sn & i Virtual Machin hy
ete tee part Mt iy
e abs met par <
aie Ml je yoed when VMM o virtyqy ee, "y
ing ** sation is US hardware system, MN,
- eatin on the in My,
i jnst@l ris to process monitoring, emery \
80
iret in
yer ihe
y ta
jfferent operating »
ons ie done, different operating eystg,.,
\
CAH by
‘ is
conti alization © i
i
‘
18 alyy ay
done for server platforms,
inds:
jon is of three kin ;
ion se ve, the hardware architecture ig beige
't eed any modification to run any epalcn a
0 i 2
ware seis : Here, the virtual machine silat
Gi) Emulation Lm Furthermore, the guest OS doesn't require on m
ssi +r the harware snot silage "
iiyPara-Vistualization * <
al runs its isolated system.
3
lization
>@) St een is a technique that allows one computer
evi
¢ ee one virtual system, atk f
‘The primary function of software virtualization is to develop Virtual Softwar,
make the work easier.
It's capable of abstracting
software installations,
Software virtualization will
more than one Operating
Software virtualizati
virtualize
Ow rrualizati.
@ Full
Guest 50
Server ty Woy
the software installation Procedure and building,
I build a virtual enviro
System,
on is of three kinds :
4) Og Virtualization +In OS
WANE to work individually to
Parcult Operatin
ment and allows the usr
Virtualization, more than the Operating
complete the task without affecting others ©
M can perf
Perform its Specified
"Sf wy adore
1912223) (a.13(Virtualization)
(ii) Application Vi
irtuali i
Spallation mee : Application Virtualization is the second
Fentral server. It hepe to a a a remotely across thelr applications op the
(rua) eawhrontient. wultiple applications at the same time hy building
(iii) Service Virtualizati
wation i Betvios Vieiball
Pshaviors of com ee Virtualization is a technique to simulate the
Foplications, in the form of combination component-based
> (3) Operating System Virtualization
+ The OS virtualizati
lization allows you to virtualize physical servers on the operating
» (4) Server Virtualization
system (kernel) layer.
The OS virtualization 1 isolati
isin layer ensures isolation and security of resoure
‘The virtualization layer makes each container appear as a standalone server,
"Finally, the container itself houses its own applications and workload.
Os ‘virtualization is streamlined for the best performance, management, and
efficiency. ,
8 virtualization is of two types:
(i) Linux Operating System Virtualization
widely used in virtualizing Linux Systems. If
other software with the help of Virtualization,
the VMware Software at the beginning.
: Windows Operating System
(ii) Windows Operating System Virtualization :
Virtualization is also the same as Linux Operating System Virtualization. And if
the user wishes to install any software, they must install the VMware Software
first.
es between
: VMware Workstation software is
‘the users want to install any of the
then the user will require to install
ize the server that we use, that is we
) in a single physical server.
pe of virtualization, we aim 10 virtuali
4 among all the virtual
iple V's (virtual machines)
Hore the resource form this physical server will be share
vrroes which are being shared majorly are
servers that are being used. Some of the reso r
CPU, Storage, ROM, ‘and RAM, ete. and we will be sharing them on the hypervisor (@
layer of software between the base hardware and the virtual machines).
‘These virtual machines 7° jsolated and independent of each other,
completely eapable of running the different OS in different machines. /
‘Some of the competitive vendors that are available in the market who do pe
virtualization are vSphere (VMware), Xenserver (Citrix) and ‘Hyper-V (Microso! ), ete.
In this ty)
will be running multi
and they are
ce Tech-Neo Publications
=f academic yea 22-23) (M8-138)«pools the storage that j
cloud compu ines/po? is
atio™ abi
viru von
¥ 4) storage con AE TE ig done by leverag;
storage vit tual as ‘ we i tem/environment,
+ Stora i i ays
dovicos am of the " oar monitors the various y,
tion se i ‘ly
Tdentifica mm to
stanly them and Sends ; TR aUe4
tained in avituay
The ail ed satan lps te administra,
i ie ig iralan effective and efficiene
site oO a
backup
al ation
parative” rorage virtual
= tt
ization
virtuali if
specilic purpose
zion ised 2 peeiie Purpose ang oi,
sue Nas) S300 od, ,
wade storage (N sstuslization in Cloud Computing Utilizes oe
File-based ane a system protocols and with ity . ep
ar
block or net
help of ; ey
mal network attached storage array, it bet
ina no!
dependency i
se don between the data being accessed and the location
‘This is
ory a
a. provides a benefit of better handling file Dieration ig oe,
q
which improves the performance.
Many,
ods to imple™
je-based S
‘{h) Block-based Virtual Storage
* The Blok based virtual storage is more widely used than the vittog
system as the virtual storage system is Sometimes useq fora SPecific py s
‘The block-based virtual storage system uses logical Storage Such as g.
partition from the physical memory in a storage device,
It also abstracts the logical storage such as a hy
ard disk rive or ANY sols
i flare t r |
‘till pe : 0 decouple the y
= tionality of, irtual
network,
Mee Sidisyer
Ne academe
282223) tn ase
Will be Us}
fom the network form the basCloud Computing & Services (MU-SEM 8-IT) (Virtualization)....Page no, (2-9)
After we have started using this network virtualization then we will be using the
physical network for the sole purpose to forward the packets and we will be doing the
management work using the software,
We Uasically collect the entire network and with the help of the routing table we will
manage it in real-time and they are also independent of each other.
One example of network virtualization is VPN ie., virtual private network. With the
help of this anybody can create a network for them virtually on the internet,
Ifwe mrs providing network virtualization (NV) to one system, we will call it internal
NV and if we are combining them in a virtual network, we call it as external NV.
Do 2.4 PROS AND CONS OF VIRTUALIZATION _
>
(New Syllabus w.ef academic year 22-23) (M8-138)
(D) Uses Hardware Efficiently (2) Available at all Times
(3) Recovery is Easy (4) Quick and Easy Setup
(5) Cloud Migration is Easier
(1) Uses Hardware Efficiently
‘The majority of businesses invest a substantial amount of money in setting up their
systems and servers, but only utilize a small portion of that investment successfully.
If they choose virtualization, however, they can build multiple instances on the same
hardware and maximize its value, This allows them to save money on hardware
expenditures and achieve a high degree of efficiency.
(2) Available at all Times
One of the best things about virtualization is that it has advanced features that make
virtual instances always available
‘The best thing about this is that the virtual instance can be moved from one server
location to another. It can be done without having to stop the processes that are
already running and start them up again.
It also makes sure that you don't lose any of your data while moving. So, even if there
are unplanned downtimes, your instance will always be online and running.
Because of this, virtualization service providers today offer 99.999 percent uptime for
the same reason.
Tech-Neo Publicationsusin aD,
Cloud Computing & §
4, duplication, ba
and
jo near rey tre,
time gg oY
y point in time, WM
> (a) Recovery I -
or
vid
© With virtual inst that PY
easier, With new tool ss " a osu al any .
mirroring, one can be are of " wn ik at, - "s
«Incase of downtime oF & au? earn with il ws
mirrored en another ¥ tue! ‘iy a all times. Organizations can fixe 7
© This ensures busines® continu! i . ; '
efficiency with this. “
sical 0" ;
pysical (00 its
+ Sotting uP Ss
lee ich can take hours. wh
are correct, you must then ingt, i}
yj takes additional time, All the tag
processing, Wait for the prodyatt™™ Yoy
SES to hg gt
6
ensuring that all connections,
ing aystem and sonwarey which ¢
istallation requires days or even weeks of wat
full procedure of 1! conan
have a productive setup up and runnj ;
can maning within
Tiny
Sy
swith virtualization, yOu
5) Cloud Migration is Easier %
Pateny organizations are using old school methodologies even today,
doing so because they had made & substantial investment back in hy 7
their [T systems were always up and running, day .
With the curent digital transformation wave, organizations are lool;
the cloud for various advantages. an
+ The challenge here is the migration of such a large amount rad ie
ailable
premise. Virtualization would have made the task much easie: b
data would already be available on a server. Hens ii i
i ice, migrati:
would be easier. io
ease mst «
Il of it to thea
= cons
The following are the disadvantages of virtualization :
(1) High Initial Investment
7 Quick Scalability is Problem
‘5) Unintended Server Sprawl
(2) Data can be at Risk
(4) Performance Witnesses a Dip
PD Ginn,
(D) High Initial Investment
As helpful virtuatioat
ne ofthe may , it does hay,
e
° Some flaws, and the high initial invest™™”Cloud Computing & Services (MU-SEM 8-IT)
a
>
(Virtualization)....Page na. (2-77)
Virtualization indeed helps the business reduce operational costs. But the imal
setup cost of servers and storage is higher than a regular setup.
Hence, companies need years before they break even and them realize savings and
higher profitability with virtualization.
It is a bad bet for companies opting for a large set up at the beginning. They could
instead opt for a regular desktop setup and then gradually make a move to desktop
virtualization.
(2) Data can be at Risk
Working on virtual instances on shared hardware resources entails your data is
hosted on a third-party resource.
It can leave your data vulnerable to attacks or unauthorized access. This is 2
challenge if your service provider does not have proper security solutions to safeguard
your virtual instance and data.
Itis true, specifically in the case of storage virtualization.
(8) Quick Scalability is a Problem
Scaling on virtualization is a breeze, but not so much if it has to be done in a short
period of time. In case of physical setup, one can quickly set up new hardware and
scale, even if it entails some initial setting up complications.
With virtualization, having to ensure all the requisite software, security, enough
storage, and resource availability can be a tedious task.
It consumes more time than one might expect since a third-party provider is involved.
‘Mareaver, the additional cost involved in increased resource use is another challenge
to manage.
(4) Performance Witnesses a Dip
It is true that virtualization allows the optimum use of all resources. However, it is
also challenge when you need that additional boost sometimes, but it is not
available. Resources in virtualization are shared.
‘The same resources that a single user might have consumed are now shared among
three or four users.
‘The overall available resources might not be shared equally or may be shared in some
ratio depending upon the tasks being run. As the complexity of tasks increases, so
does the need for performance from the system.
It results in a substantially higher time required to complete the task.
() Unintended Server Sprawl
Unintended server sprawl is a major cause of concern for many server admins and
users alike.
(iew Syllabus wef academic year 22-23) (M8-138) Tech-Neo PublicationsGloua Computing & Services M
sme and?
ons raise is of Server g
person Prawn,
oak person” ohereas a vis .
M gourees. WHE tual nerves Seg NY
“an 5, ik,
physical server cons , virtual ever; i; %
ima matter of NWO Ce ee strech atart, Tt Rd yy
© Eve ote EE ee five or “sy
servers since it allows yyoutd be ban servers aS
to
time, inste
Low
who 8
The server administrator
so sn operations,
over 20 virtual servers: et se smooth oP ana = :
saint ta. /
+ This can cause 8 ma” Cg Joss of bd “<
certain servers can a! eed
“a vs
allows
jceualization enables oF
Fico resource e500
ees of the host machine, Bain ey:
d th i y
Virtualization is a layer between the hardware and the operating System,
- ..
i ss transparency. , a
a a also known a5 the Vara! Machine Monitor (VNap, , 8
applications and the operating system in gener 7
| rors a path created by the VMM which allows multiple of the sau,
system to run on the host machine as well with the hypervisor
a eanes among the various operating system hardware requirement, ,
The hypervisor plays a key role in Cloud hosting because it is a type of vi
software that divides and allocates resources among a variety of hardware tea
Fai 5 vi
Hypervisors are hardware virtualization techniques that allow multi te
operating systems (0S) to run on a single host. Pl
A hypervisor is sometimes also called a virtual machine manager (VMay,
There are two types of virtualization architectures: Bare metal virtualizat:
Tosted Virtualization. 4
5.1 Bare Metal Virtualization/ TYPE-1 Hypervisor
te hypervisor runs directly
S also known as a “Nai
9¢8 not require any b
on the underlying host system.
tive Hypervisor” or “Bare metal hypervisor”.
ase server operating system.
bus wef academic
year 22-23) (M8-138) ® — mi+ Ithas direct access to hardware resources,
« Examples of Type 1 hypervisors inclide VMware ESXi, Citrix XenServer, and
Microsoft Hyper-V hypervisor.
vii
Fig. 2.5.1 : Type 1 Hypervisor
%® 2.5.2 Hosted Vircualization/ TYPE-2 Hypervisor
+ AHost operating system runs on the underlying host system.
* It is also known as ‘Hosted Hypervisor”.
«Such kind of hypervisors doesn’t run directly over the underlying hardware rather
they run as an application in a Host system (physical machine).
+ Basically, the software is installed on an operating system. Hypervisor asks the
operating system to make hardware calls.
* Containers, KVM, Microsoft Hyper V, VMWare Fusion, Virtual Server 2005 R2,
Windows Virtual PC and VMWare workstation 6.0 are examples of Type 2 hypervisor.
Fig. 2.5.2: Type 2 Hypervisor
% 2.5.3 Implementation Levels of Virtualization
« Virtualization is not that easy to implement. A computer runs an OS that is
configured to that particular hardware. Running a different OS on the same hardware
is not exactly feasible.
(New Syllabus w.e.f academic year 22-23) (M8-138) Tech-Neo Publicationspervisor. What hyperyigg,
hype’
doe,
ye exists * ye to enable its smooth Function’ init
ee and marie zations available that arg
al ¢ yirtuali
f vir
ols of
inst gp the fs
" ‘warner
Gperational System Level
Virtual Environment / Fv
(faraware Abstraction Level
VMWare / Virtual PC.
(instruction Set Architecture Level
Hig.253: Implementation Levels of Virtuaizaign
(1) Instruction Set Architecture Level (ISA)
In ISA, virtualization works through an ISA emulation, This ji
"pi of lap cole ‘ich ‘wie originally writ
S helgy
ten for ¢ mi
configurations,
ifferent ky
« These codes can be run on the virtual machine through an ISA.
* A binary code that might need additional layers to TUN can now run qe
machine or with some tweaking, even on x64 machines, TSA helps mek:
hardware-agnostic virtual machine,
* The basie emulation, though, requires a
the source code and converts it to a hard
Hardware Abstraction Level (HAL)
in interpreter. Thig interpreter itz:
‘ware readable format for procs
‘ the name Suggests, this level helps perform =e
evel, Te uses g bare hypervig
‘or for its functioning.
(
«Neo!
23) (8-138) [el Tech-lCloud Computing & r
} ne 0 (MU-SEM 8-IT) (Virtualization)....Page no. (2-15)
‘This level helps form the virt ware throu
A hrough
irtual machine and manages the hardw: el
It enables virtualizati
ion of each hardware compone i
processors, memory, ete. ee
‘This way multi
his way multiple users can use the same hardware with numerous instances of
virtualization at the same time.
IBM had first implemented this on the IBM VM/370 back in 1960. It is more
usable for cloud-based infrastructure, Xen hypervisors are using HAL to run
Linux and other OS on x86 based machines.
(3) Operating System Level
(4) Library Level
(5) Application Level
At the operating system level, the virtualization model creates an abstract layer
between the applications and the OS.
It is like an isolated container on the physical server and operating system that
utilizes hardware and software. Each of these container's functions like servers.
When the number of users is high, and no one is willing to share hardware, this
level of virtualization comes in handy.
Here, every user gets their own virtual environment with dedicated virtual
hardware resources. This way, no conflicts arise,
OS system calls are lengthy and cumbersome. Due to this, applications opt for
APIs from user-level libraries.
Most of the APIs provided by systems are rather well documen
evel virtualization is preferred in such scenarios.
Library interfacing virtualization is made possible by API hooks. These API hooks
control the communication link from the system to the applications.
Some tools available today, such as vCUDA and WINE, have successfully
demonstrated this technique.
ted. Hence, library
when you wish to virtualize only an
platform or environment. On an
s also known as
virtualization comes handy
es not virtualize an entire
applications work as one process. Hence it is
Application-level
application. It do
operating system,
process-level virtualization.
‘useful when running virtual machines with hi
p of the virtualization layer,
It is generally igh-level languages.
Here, the application sits on to which is above the
application program.
a Tech-Neo Publications
(New Syllabus wef academic year 22-23) (M8-138)io
pli
aye ah gut
1 writ! nr o
vad camping i virtualization
m the virt dis
pid Hardware wal machingy fh
aiding i
ag af wo ss ives 19 implement server yi n
w eualization technics aK
6, tion
Dry,
0
ser : ]
patton ee sue wi en vi
yware eal
section yo isos mn / )
; is \
() Fall views" ist tenigues the hypervisor compete
. inthe fll ve | " a
B jetine this technique is that it allows a |
The eit advan | ;
+ pied 8 : |
: ws ae eve 08 is completely unaware thay tg
vit “4
vit jain ws combination of direct execution and bin \
‘a aes,
ulvitutl sion of non-sensitive CPU instruetiong yr,
ig allows dire ed te
instructions a6 translated 00 ly. ha y
To improve performances the hypervisor maintains a cache -
tranlted instructions ‘ al
’ ‘yMiwre’s ESM server uses this technique to achieve server virtua); i
) Paravitualization ae
‘This technique is not as portable as full virtualizatioy
‘ i
ee i ‘ion, as it requires
+ In partition, the hypervisor doesn’t simulate
Insen,t provides hypercalls, ee
‘hous 08 weshypercall to execute sensitive CPU instructi
ons,
However, it provides better
“ perform,
Bers ance because the guest OS is aware thu!
a are similar to kerne)
nate withthe hypervisor:
system calls, They allow the rl
1
The opens
ouree Xen proj
Project uses the Paravirtualization technique.
New Sabus
Swe, 4 academic Year 22.23)
23) (M8-138)
Fl a7Se?
Sat on Mi “
Cloud Computing & niet jor all the virtual mach;
Winds Vir" 4 eT there are any perp’
> @) Solar Wi a gsi Perfor thie
f ce 8 te
oe ey
ually Bx all the Performanc. the, ‘t
tg ty |
vs
Hi a u
ort the cloud platforms aa a, aay
the
*
oft gications present in th,
netic indica © tool yy)
"
+ These sig My,
nite
© 2 one ean run Windows
pain shere
yMivare gers where 08 sh
re ip fr ip Mac using this software, ‘int, Un,
This soe yate OP ;
ting 5¥* tack joud-based platforms for virty, Aliza &
a a
; Sl en provides the facility of intege
+ Te with it. me ot |
development 0° very simple to use and can support real-time a 7
+ Mis ean opis Pont |
ie pnt were can save the IBSEPTOPEE Working ‘
e ast weer aT / “Sion |
+ Theenyaravback 0 of 2 for this tea is that the drag and arop fang,
peer a ncedsimeroverent nat
) (9) Parallels Desktop |
|
«This software is also for the Mac users to use windows and another anes
rniscupprs windows 10 and Mac OS High Sierra ting
«They provide ts of diferent tools which are very useful for daily day today |
«Theva fortis oftware is very good and it requires no reboot while ins faa
+ ‘The performance for the application insi i i
wale thn any lag, ” ee ee OS ial woes fat ad y
> () Virtual Box }
This 5
E “a bn comes from Oracle and the best part of them is its very user
Phen 7 is used in windows to run different operating systems.
tt it can host up to 4 operating system.
, ystem.
Peers drag and drops feature and the window can be minimized andre
(ew ya
yl “Swe academic year 29.93) ‘
(Ma.13m .