[go: up one dir, main page]

0% found this document useful (0 votes)
2K views103 pages

Virtualization for University Students

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views103 pages

Virtualization for University Students

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 103

UNIT III

Virtualization
CHAPTER 3

University Prescrlbed Sýllabus


Introduction to Virtualization, Difference between Cloud Computing
and Virtualization Types o
Virtualization: Hardware, Software, Operating system, Server, Storage,
Methods of implementing storage
Virtualization, Network Virtualization Types, Advantages, Disadvantages, Virtualization Architecture
and
Software, Virtual Clustering, Applications of Virtualization.

3.1 Introduction to Virtualization. -2


************************************************************************************n*ssare**sssosnsnsosessness**********

Ga. Define Virtualization. State the characteristics of virtualization. ... ****************************************************************e*****


+2
3.1.1 Characteristics of Virtualization..
***************************************************************. *********** ************ -2
3.2 Difference between Cloud Computing and Virtualization. ********************a*. *************************

GQ. Compare Cloud Computing and Virtualization.. * *********" *******


* **** ***** ********* .3-3
3.3 Types of Virtualizations.....**on******************* ***** ********************************************************************* 3-4
GO. Explain different types of virtualizations. *****

3.4 Advantages and Disadvantages of Virtualization.. **************************************esssnenesn*sisorssen*ntsooenne*n***********roosO°T


GO. Explain the advantages and disadvantages of virtualization. s ***************************.*********a****************** 3-7
3.5 Virtualization Architecture.. 3-9
Ga. Explain Type-1 and Type-2 Hypervisors with neat diagram. *****************a**stenst*****d*nsa***s***s*****a*essmm*enen*****. .3-9
GQ. Explain the implementation levels of virtualization. ** 3-9
3.5.1 Bare Metal Virtualization/ TYPE-1 Hyperviso.. ********** *****"********* 3-10
3.5.2 Hosted Virtualization/ TYPE-2 Hypervisor. ***********************
3-10
3.5.3 Implementation Levels of Virtualization. ********* ********. 11
3.6 Virlualization Software.. **********************"********************************************************************************"********************************** ***3-13
GQ. Define virtualization software. Explain features of any two virtualizations sotware.. *********"""*********************** 3-13
3.6.1 Benefits of Using Virtualization Software. **********************************************"**** *************** 3-13
3.6.2 Different Virtualization Softwares. *************************"**********"******"******"*********** ******"********** ...3-13
3.7 Virtual Clustering.. ******************************************************ss * *******************"
3-155
GQ. Explain virtual clustering. Compare it with physical clustering.
*****************************************"****************.
***********
.3-15
3.7.1 Comparison of Physical Cluster and Virtual Cluster..********************************************************************************* 3-16
3.7.2 Clusters..
Benefits of Virtual ************************************************************************************************************ * 3-16
3.8 Applications of Virtualization. ******************************************************a************************************ ****** 3-17
GO. Enlist the applications of virtualization. .

*******************************************"*******""**************"***************** 3-17
3.9 Questions.
Descriptive *************************** *********************************************************************** * um .3-17
Chapter Ends.. 3-17
1 r
Cloud Computing (SPPU-SEM 7-E&TC) (Virtualization)..Page no. (3

3.1 INTRODUCTION TO VIRTUALIZATION

GQ Define Virtualization. State the characteristles yirtualization


of
In cloud computing, virtualization rofers to proparing a virtual version of a server, a desktop, a
storage device, an operating systom, or network rosources.
This approach allows a singlo physical instanco of an application or resource to be 8hared among
multiple organizntions or customers.
t does by assigning a logical name to a physical storage and providing a pointer to that physical
resource when demanded.
It helps to separate the service from its physical delivery.
AS a result of this technique, multiple operating systems and applications can be run on the same
machine and hardware at the same time.
The machine on which the virtual machine is built is called the Host Machine and the virtual machine
is known as the Guest Machine.

This virtual machine is managed by a software or firmware, which is known


as hypervisor.

Virtualization

VM

Physical Hardware
O Hypervisor
VM

Fig. 3.1.1: Virtualization

23.1.1 Characteristics of Virtualization


Following are the characteristics of virtualization:
(1) Resource Sharing Virtualization allows its users to create different computing environments on one
:

host machine, which could be a single computer or a network of servers that are all connected to each
other. This allows user limit the number of servers that are active, use less power, and manage
resources.
(2) Isolation: The self-contained VMs that come with virtualization software give guest users (a term that
includes not only people but also applications, operating systems, and devices) a separate online
environment. This separation keeps private information safe while allowing guests stay connected.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) 5Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC) (Virtuallz.atlon)..Poge no. (3-3)
(3) Availability: Virtualization soflwaro offors various
eharactoristics not available with physical servOrs
that boost uptimo, avnilability, fault toloraneo, nnd more, hneo nssinting usors in avoiding downtime
that impedes usor productivity and raisos Bocurity risks.
(4) Aggrogation: Virtualization allows multiplo dovicos to sharoa ainglo mnchine's resources, but t can
also be used to intograte multiplo dovicos into a singlo, poworful hoBt.
Aggregation nocessitates clusuer
management software, which connects n numbor
of idontienl computora or sorvers to form a unified
resource center.
(5) Relinbility: Currently, virtualizntion tochnologios provido
continuous uptime by automated load
balancing, which runs multiple sorvors on
distinct host machinos to provont disruptions. Consequently,
hardware failures are a minor inconvenionco. If downtimo is
a primo concorn, you may need to invest in
backup hardware.

3.2 DIFFERENCE BETWEEN CLOUD


COMPUTING AND VIRTUALIZATION

GQCompare Cloud Computing and Virtualization

In this section, we will discuss about the difference


between Cloud computing and Virtualization.
Sr. No. Cloud Computin8 Virtualization
1. Cloud computing is used to provide pools Virtualization is used to make various simulated
and automated resources that can be environments through a physical hardware
accessed on-demand. system.
2. Cloud computing setupistedious, | Virtualization setup is simple.
complicated.

3. Cloud computing is high scalable. Virtualization is low scalable i.e., Virtual machine
configuration limits its scalability.

4 Cloud computing is Very flexible. Virtualization is less flexible.


b. In the condition of disaster recovery, cloud In the condition of disaster recovery,
computing relies on multiple machines. virtualization relies on single peripheral device.

6 In cloud computing, the workload is In virtualization, the workload is stateful.


stateless.
. The total cost of cloud computing is higher | The total cost of virtualization is lower than cloud
than virtualization. computing.

8. Cloud computing requires many dedicated In virtualization, single dedicated hardware can
hardware. do a great job in it.

9. Cloud computing provides unlimited| Storage space depends on physical server capacity
storage space. in virtualization.

(SPPU-New Syllabus w.e.f academic year 22-23)MP7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(Virtualization)..Pago no.
Cloud Computing (SPPU:SEM 7-E&TC) (3-4)

Sr. No. Cloud Computing Virtualizntion

10. Cloud computing is of two typos Public Virtualization is of two typOs Hardware
cloud and Private cloud. virtualization nnd Application virtualization.

11. In Cloud Computing, Configuration is In Virtualization, Configuration is tomplate


image based. based.
12. In cloud computing, wo utilize the entiro
In Virtualization, the entire sorvers are on
server capacity and the entire servers nro demand.
consolidated.
13. In cloud computing, tho pricing pay as you | In Virtualization, the pricing is totally dependent
go model, and consumption is the metric on infrastructuro costs,
on which billing is done.

14 Easy to integrate existing solutions, | Easily integrate with public and private clouds,
wvith
many providers support integrations and IoT devices, and databases. If integrating with
to unify
Ais. May require a data integration legacy equipment, integration software
solution to prevent data silos. data is needed

15. Cloud computing8 deliver variable Virtualization deliver packaged resources to

resources to groups of users for a variety | specific users for a specifie purpose
of purposes

3.3 TYPES OF VIRTUALIZATIONS

GQ Explain different types of virtualizations.

In this section, we will discuss about different types of virtualizations.


1. Hardware Virtualization

It is the abstraction of computing resources from the software that uses cloud resources.
It involves embedding virtual machine software into the server's hardware components.
That software is called the hypervisor. The hypervisor manages the shared physical hardware
resources between the guest OS & the host Os.
The abstracted hardware is represented as actual hardware.
Virtualization means abstraction & hardware virtualization is achieved by abstracting the physieal

hardware part using Virtual Machine Monitor (VMM) or hypervisor.


The term hardware virtualization is used when VMM or virtual machine software or any

hypervisor gets directly installed on the hardware system.


The primary task of the hypervisor is to process monitoring, memory & hardware controlling.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Ventur
Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualzation)..Page no. (3-5)
After hardware virtualization is done,
different operating systems can be installed, and vanou
applications can run on it.
Hardware virtualization, when done for
server platforms, is also called server virtualization.
.Hardware virtualization is of threo kinds:
(i) Full Virtualization: Hore,
the hardware architecture is completely simulated. Uuest
software doesn't need any modification
to run any applications.
(ii) Emulation Virtualization : Here, the virtual
machine simulates the hardware& 13
independent. Furthermore, the guest
OS doesn't require any modification.
Gii) Para-Virtualization: Here, the hardware is not simulated; instead,
its isolated system. the guest software runs

2. Software Virtualization
Software virtualization is a technique that
allows one computer server to work with more than one
virtual system.
The primary function of software
virtualization is to develop virtual Software and make the woT
easier.
It is capable of abstracting the software
installation procedure and building virtual software
installations.
Software virtualization will build a virtual environment
and allows the user to use mnore than one
Operating System.
Software virtualization is of three kinds:
i) OS Virtualization: In OS Virtualization, more than the Operating system wants to woTk
individually to complete the task without affecting others. Thus, a particular Operating
system can perform its specified job.

u i) Application Virtualization: Application Virtualization is the second Virtualization method


where users can remotely access their applications on the central server.
It helps to run
multiple applications at the same time by building a virtual environment.
(iii) Service Virtualization: Service Virtualization is a technique to simulate the Behaviors of
components in the form of combination component-based applications.
3. Operating System Virtualization
The OS virtualization allows you to virtualize physical servers on the operating system (kerne)
layer.
The OS virtualization layer ensures isolation and security of resources between different
containers.
The virtualization layer makes each container appear as a standalone server.
Finally, the container itself houses its owm applications and workload.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) e Tech-Neo Publications_A SACHIN SHAH Venture
(Virtualizatlon).Page no. (3-6)
Cloud Computing (SPPU-SEM 7-E&TC)
elficiency.
porformance, management, and
0S virtualization is streamlined for the best

OS virtualization is of two types:


VMware Workstation
software is widely used in
System Virtualization:
Linux Operating to install any of the other
software with the help
virtualizing Linux Systems. If the users want
beginning.
to install the VMware Software at the
of Virtualization, then the user will require
Virtualization is
Windows Operating System
i) Windows Operating System Virtualization: to install any
Linux Operating System Virtualization. And if the user wishes
also the same as
software, they must install the VMware Software first.
itprtn97-
4. Server Virtualization
be running
virtualize the server that we use, that is we will
In this type of virtualization, we aim to
physical server. 1rio
multiple VM's (virtual machines) in a single
resource form this physical server will be
shared among all the virtual servers that are
Here the
being used.
ROM, and RAM, etc. and
shared majorly are CPU, Storage,
Some of the resources which are being between the base hardware and the
(a layer of software
we will be sharing them on the hypervisor
virtual machines).
and they are completely
virtual machines are isolated and independent of each other,
These
machines.
capable of running the different OS in different
server virtualization
competitive vendors that are available in the market who do this
Some of the etc.
(Citrix) and Hyper-V (Microsoft),
are vSphere (VMware), Xenserver

5. Storage Virtualization
storage that is available in various devices and
Storage virtualization basically combines/pools the
keeps it as single storage.
software and aggregates them to
Identification of the available storage is done by leveraging the
use it in a virtual system/environment.
requests. from any virtualphysical
The software actually constantly monitors the various I/0
intercepts them and sends it to the appropriate location where the combined
system, and it
storages are maintained in a virtual environment.
for any recovery or backup or
This technique of storage virtualization helps the administrator
time than the
archival of data in an effective and efficient manner by taking comparatively less
usual.

SMethods to implement storage virtualization


(a) File-based Storage Virtualization
storag
This type of virtualization is used for a specifie purpose and can apply to network-attached
(NAS) system.
(SPPU-New Syllabus wef academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH VET
Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualizatlon).... Pago no.(3-7)
Fle-based storage virtualization
in Cloud Computing utilizes server message block or
system protocols and
with its help of it breaks network ile
storage array. tho dopendency in a normal network atached
This is done between the
data boing acces8od and tho location
It also provides a benefit of tho phyøical memory
of bettor handling file
performance. migration in the background which improves the
(b) Block-based Virtual Storago
The Block based virtual storage
is more widely used than
storage system is sometimes the virtual storage system as the virtual
used for a specific purpose.
The block-based virtual
storage systom uses logical
physical memory in a storage storage such as drive partition from the
device.
It also abstracts the logical
storage such as a hard disk
drive or any solid-state memory device.
This also allows the virtualization
management software to get familiar
available device and split with the capacity of the
them into shared resources to assign.
6. Network virtualization
Here we will be using software
to decouple the virtual network
perform the functionality of a network. form the baseline and it will

After we have started using this


network virtualization then we will be using
for the sole purpose to forward the physical network
the packets and we will be doing the management
software. work using the
We basically collect the entire
network and with the help of the routing table we
real-time and they are also independent will manage it in
of each other.
One example of network virtualization
is VPN i.e., virtual private network. With
anybody can create a network for them virtually the help of this
on the internet.
If we are providing network virtualization (NV)
to one system, we will call it internal NV and
are combining them in a virtual network, we call if we
it as external NV.
3.4 ADVANTAGES AND DISADVANTAGES
OF VIRTUALIZATION
GQ Explain the advantages and disadyantages virtualization
L of

SAdvantages: Following are the advantages ofvirtualization:


1. Uses Hardware Efficiently : The majority of businesses invest a
substantial amount of money in
setting up their systems and servers, but only utilize a small portion of
that investment successfully. If
they choose virtualization, however, they can build multiple instances
on the same hardware and
maximize its value. This allows them to save money on hardware expenditures
and achieve a high
degree of efficiency.
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
(Virtuallzaton)...Pagono.(3-
Cloud Computing (SPPU.-SEM 7-EST0)

Avallnblo at all Tlmow Ono of tho bont thlnga nbout virtualizntion


1
in that it hnn ndvancod fonture
that mako virtunl inatuneon alwanyn nvailablo, 'Tho bont thing nbout thin la that tho virtunl instnnco can
to stop tho procoson that
bo moved from ono sorvor location to nnothor. It ean bo dono wlthout having
ro alrondy running and ntart thom up agaln, It alno makon suro that you don't Jono nny of your data
whilo moving. So, ovon if thero aro unplannod downtimom, your netanco will alwnyn bo online nd
running. Bocauso of this, virtunlizntion norvieo providern today olfor 99.900 poreont uptime for the nn
ronson
3. Rocovory is Easy: With virtual inatancou on romoto Borvors, duplication, backup, and rocovery ar
nlso onsior. With now tools availnblo that provido nour roul-timo data buckup and mirroring, one can be
suro of zoro datn loss at any point in timo. In caso of clowntime or u erash, thoy can simply pick up irom
tho last savod position mirrorod on anothor virtual instanco and run with it, This ensures business
continuity at all timos. Organizations can attain tho highost oflicioncy with this
4. Quiok nnd Ensy Sotup: Sotting up physienl oquipment and sorvers requiros considerable time. You
must submit a purchase ordor and await its procossing. Wait for tho products to be supplied and
installod, which can tako hours. Aftor onsuring that all connections aro corroct, you must then install
the necossary oporating systom and softwaro, which takes additional timo. Tho full procedure of
installation roquiros days or ovon wooks of waiting. In eontrast, with virtualization, you can have a
productive sotup up and running within minutos.
6. Cloud Migration is Easior: Many organizations are using old sehool methodologies oven today. They
have been doing so because they had mado a substantial invostment back in the day to ensure their IT
systems woro always up and running. With the current digital transformation wave, organizations are
looking to move to the cloud for various advantages. The challenge hore is the migration of sucha large
amount of data available on-premise. Virtualization would have made the task much easier because
most of the data would already be available on a server. Hence, migrating all of it to the cloud would be
easier.
SDisadvantages
The following are the disadvantages of virtualization:
1. High Initial Investment: As helpful virtualization is, it does have some flaws, and the high initial
investment is one of the major one. Virtualization indeed helps the business reduce operational costs.
But the initial setup cost of servers and storage is higher than a regular setup. Hence, companies
need
It is a
years before they break even and then realize savings and higher profitability with virtualization.
opt for a regular-
bad bet for companies opting for a large set up at the beginning. They could instead
desktop setup and then gradually make a move to desktop virtualization.
your data is
2. Data can be at Risk: Working on virtual instances on shared hardware resources entails
acess
hosted on a third-party resource. It can leave your data vulnerable to attacks or unauthorized
to safeguard you
This is a challenge if your service provider does not have proper security solutions
virtual instance and data. It is true, specifically in the case of storage virtualization.

(SPPU-New Syllabus w.e.facademic year 22-23)P7-129) Tech-Neo Publications..A SACHIN SHAHVentur


Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualizatlon)... Page no. (3-9)
3. Quick Scalability is a Problem :
Scaling on virtualization is
done in a Short period of a breoze, but not so much it it nas
time. In case of physical
even if it entails some initial setup, one can quickly set up new hardware and scaie
setting up complications.
With virtualization, having to ensure
requisite soTtware, security,
enough storage, and resource al ue
consumes more time availability can be a tedious task. 1
than one might expoct sinco
additional cost involved in a third-party providor is involved. Moreover, te
increased resource use is
another challenge to manage
4. Pertormance Witnesses a Dip: It is
true that virtualization allows
However, it is also a challenge the optimum use of all resources.
when you need that additional
Resources in virtualization are boost sometimes, but it is not available.
shared. The same resources that a
now shared among three single user might have consumed are
or four users. The overall
may be shared in some available resources might not be shared equally or
ratio depending upon the tasks being
so does the need for run. As the complexity of tasks increases,
performance from the system. It
complete the task. results in a substantially higher time required to
5. Unintended Server Sprawl : Unintended
server sprawl is a major cause of concern for many server
admins and users alike. Many of the
issues that service desk persons raise is of server
up a physical server consumes sprawls. Setting
time and resources, whereas a virtual server can be
of minutes. Every time, created in a matter
instead of reusing the same virtual server, users
tend to create new servers
since it allows them the chance to make a
fresh start. The server administrator who should be handling
five or six servers has to handle
over 20 virtual servers. This can cause a major complication
in the
smooth operations, and forced termination of certain
servers can also cause loss of data.
3.5 VIRTUALIZATION ARCHITECTURE

GQ Explain Type-1 and Type-2 Hypervisors with


heat diagram.
GQ Explain the implementation levels of virtualization.
---*--- -----+
Virtualization enables or allows multiple applications or operations to gain access
to the hardware
resources/software resources of the host machine.
Virtualization is a layer between the hardware and the operating system, and
it also provides access
transparency.
1
The hypervisors also known as the Virtual Machine Monitor (VMM), manages the applications and the
operating system ing eral.
There'sa path created by the VMM which allows multiple of the same operating system to run on the
host machine as well with the hypervisor managing the resources among the various operating system
hardware requirement.
The hypervisor plays a key role in Cloud hosting because it is a type of virtualization software that
divides and allocates resources among a variety of hardware devices.
Hypervisors are hardware virtualization techniques that allow multiple guest operating systems (OS) to
run on a single host.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-ESTC) (Virtualizatlon)....Pagono,
(3-1h

A hypervisor is sometimes also ealled a virtunl machine managor(VMM).


Thero aw two typos of virtualization architocturos: Baro motal virtualization and Hoes
Losted

Virtualization.

3.5.1 Bare Metal Virtuallzatlon/ TYPE-1 Hypervlsor

The hypervisor runs directly on tho undorlying host system.


It is also known as a "Native Hyporvisor" or "Baro motal hyporvisor".
It does not requiro any baso sorvor oporating aystom.
It has direct access to hardwaro resourcos.
Examples of Typo hyporvisors includo VMwaro ESXI, Citrix XonSorver, and Microsoft Hyper-V
hypervisor.

GUOst OSS
QuostOS VM
VM

Hardwaro

Fig. 3.5.1:Type 1 Hypervisor

3.5.2 Hosted Virtuallzation/ TYPE-2 Hypervisor


A Host operating system runs on the underlying host system.
It is also known as 'Hosted Hypervisor".
Such kind of hypervisors doesn't run directly over the underlying hardware rather they run as an
application in a Host system (physical machine)
Basically, the software is installed on an operating system. Hypervisor asks the operating system to
make hardware calls.
Containers, KVM, Microsoft Hyper V, VMWare Fusion, Virtual Server 2005 R2, Windows Virtual PC
and VMWare workstation 6.0 are examples of Type 2 hypervisor.

Guest OS Guest OS
VM VM

Host os

Hardware

Fig. 3.5.2: Type 2 Hypervisor

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Ventue
Cloud Computing (SPPU-SEM 7-E&TO)
(Virtualization)...Page no. (3-11)
3.5.3 Implementation Levels of Virtuallzation

Virtualization is not that easy to implement. nat


A computer runs an OS that is configured to
particular hardware. Running a different
OS on the same hardware is not exactly feasible
To tackle this, there exists a
hypervisor. What hypervisor does is,
and hardware to enable its smooth it acts as a bridge between irt ua
functioning of the instance. There are five levels of virtualizations
available that are most commonly
used in the industry. Fig. 3.5.3 below shows the five implementatIOn
levels of virtualization.

Appllcatlon Level
JVM/.NET CLA

Library Level
WINE/vCUDA

Operational System Level


Virtual Environment/ FVM

Hardware Abstraction Level


VMWare/ Virtual PC

Instruction Set Architecture Level


BIRD/Dynamo

Fig. 3.5.3: Implementation Levels of Virtualization

1. Instruction Set Architecture Level (ISA)


In ISA, virtualization works through an ISA emulation. This is helpful to run heaps of legacy code
which was originally written for different hardware configurations. ovo rioirsiçq 3 .E
These codes can be run on the virtual machine through an ISA
A binary code that might need additional layers to run can now run on an x86 machine or with
some tweaking, even on x64 machines. ISA helps make this a hardware-agnostic virtual machine.
The basic emulation, though, requires an interpreter. This interpreter interprets the source code
and converts it to a hardware readable format for processing.
2. Hardware Abstraction Level (HAL)
As the name suggests, this level helps perform virtualization at the hardware level. It uses a bare
hypervisor for its functioning.
This level helps form the virtual machine and manages the hardware through virtualization.
It enables virtualization of each hardware component such as VO devices, processors, memory, etc.
This way multiple users can use the same hardware with numerous instances of virtualization at
the same time.

(SPPU-New syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC) (Virtualization)...Page no.
(3-
IBAM had first implemented this on the IBM VM/370 back in 1960. It is more usable for cloud-bas
intrastructure. Xen hypervisors are using HAL to run Linux and other OS on x86 based machines
3. Operating System Level

At the operating system level, the virtualization model creates


an abstract layer between the
applications and the Os.
Tt islike an isolated container on the
physical server and operating system that utilizes hardware
and software. Each of these container's
functions like servers.
When the number of users is
high, and no one is willing to share hardware, this level
of
virtualization comes in handy.
Here, every user gets their own
virtual environment with dedicated virtual hardware
This way, no conflicts arise. resources.

4. Library Level

OS system calls are lengthy


and cumbersome. Due to this, applications opt for APIs from user-level
libraries.
Most of the APIs provided by systems
are rather well documented. Hence, library level
virtualization is preferred in such scenarios.
Library interfacing virtualization is made possible
by API hooks. These API hooks control the
communication link from the system to the applications.
Some tools available today, such as vCUDA and WINE,
have successfully demonstrated this
technique.
5. Application Level

Application-level virtualization comes handy when you wish


to virtualize only an application. It
does not virtualize an entire platform or environment.

On an operating system, applications work as one process.


Hence it is also known as process-level
virtualization.
It is generally useful when running virtual machines with
high-level languages, Here, the
application sits on top of the virtualization layer, which is above the application program.
The application program is, in turn, residing in the operating system.

Programs written in high-level languages and compiled for an application-level virtual machine can
run fluently here.

(SPPU-New Syilabus w.ef academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualizatlon)....Pago no. (3-13)
3.6 VIRTUALIZATION SOFTWARE

GQ.Define virtualization software, Explain


L - -**** ***** ** ***-~*
features of any two virtualizatlons
-
-**-***
software
Virtualization sottware can bo dofined **

as a kind of a computer program which


abstraction, to make it clear it helps in achieving
can bo said as it helps
end-user. in hiding or masking the physical resources irom ne

3.6.1 Benefits of Using Virtuallzatlon


Software
1. One can use multiple operating
systems
in a singlo computer.
2. One can share the components
of the single operating systom
systems located at a different hosted centrally on multiple computer
geographical location.
3. With the use of virtualization software,
one can utilize the full capacity of
helps improves the performance the computer system as this
in terms of speed and functionality.
4. Virtualization software also provides
security options that help to keep the data as
that are shared among different well as the resources
users safe. There is a feature lknown as a snapshot
where one can take a backup of a current in the virtualization
working system and restore that when the
trouble. system runs into

3.6.2 Different Virtualization Softwares


Now let's discuss the different Virtualization
Softwares which are available in the market to do
virtualization:
SolarWinds Virtualization Manager
This is kind of management software for all the virtual
machines, this software helps in tracking
the performance and fixing if there are any performance
issues such as memory and storage.
It provides complete visibility for all the virtual machines attached to the
system.
The tool has the functionality to manually fix all the performance
issues and trigger if any issues
are reported.
This tool is also useful in maintaining the cloud platforms and the check on their usage
or
performance of it.
There are triggers and automatic indications present in the tool which helps the user to monitor
everything properly.

2. VMware Fusion

This software is for Mac users where one can run Windows, Linux, Unix and any other operating
system on their Mac using this software.
VMware Fusion also supports cloud-based platforms for virtualization.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
(Virtualization)..Page no. (3.1a
Cloud Computing (SPPU-SEM 7-E&TC)
=
integration of different development toola
The VMware fusion pro version provides the facility of
with it.
demonstration for diferent software
res
This software is very simple to use and can support roal-time
and applications.
a rollback point wlhere can save the last proper working versions of
the O and can g
It also
has
back to it whenever required.
proper
The only drawback as of now for this tool is that the drag and drop functionality is not and

needs improvement.
3. Parallels Desktop
This software is also for the Mac users to use windows and another operating system.
This supports windows 10 and Mac OS High Sierra
They provide lots of different tools which are very useful for daily day to day tasks. r
The view for this software is very good and it requires no reboot while installation.
The performance for the application inside the virtual OS is also very fast and easily usable without
any lag.
4. Virtual Box

This virtual box comes from Oracle and the best part of them is its very user friendly.
This software is used in windows to run different operating systems:
At a time, it can host up to 4 operating system.
It supports drag and drops feature and the window can be minimized and resized.
5. VMware Workstation

This is the most popular and widely used virtualization software.


It supports multiple operating systems especially windows and Linux.
It's made for the developers and IT professionals who generally work on different OS.
This can be integrated with multiple applications.
This software also supports cloud applications.

6. QEMU d ei irl
This software is used for hardware virtualization.
This is also an open-source free software.
a
There is no restriction for the host OS that means this software can run in mac as well as
windows system.
But the only con in this is it's not at all user-friendly. orogeut pei

(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualization)..Page no. (3-15)
7. Windows Virtual PC
This software comes with the windows
operating system.
This is only for windows users
and it is very much user-friendly.
One can use the print option
from inside the virtual box
simultaneously. and can run multiple virtual macnines

The only drawback for this


one is that it doesn't support
any other OS apart from the windows5.
8. Microsoft Hyper V

This software comes bundled with


Microsoft windows server 2008
and later.
It provides hardware virtualization.
This software supports the
running of multiple virtual machines.
This supports cloud as well
such as Microsoft Azure.
This supports multiple versions of
the Linux operating system.
9. RedHat Virtualization
This virtualization software comes from the RedHat
family.
This software is written in java and as promised by the
RedHat software company it provides very
good performance for the application which
are running inside the virtual machine.
It's an open-source system so any user can
tweak the code and make it work for his own use andd
application.
It's free software and the installation for this is very easy.

3.7 VIRTUAL CLUSTERINGG

--------
GQ Explain virtual clustering. Compare it with physical clustering
---------*-*** * ***
Virtual cluster is a many-to-one virtualization
technology, which can form a routing system from
multiple common devices connected through a switehing network, while performing the same as a
single logical router to all external appearances.
In cloud computing, a virtual cluster is a group of virtual machines (VMs) that are deployed as a single
logical unit. They share the same virtualization software and hardware, and they appear as a single
unit to the end-user.
Virtual clusters provide the ability to scale operations easily. You can add or remove VMs to meet
changing demands, and you can move VMs to optimize the use of hardware. You can leverage a virtual
clustering solution to reduce data center costs, increase efficiency, and increase scalability.
Clusters provide the computational power through the use of parallel programming, a technique for
coordinating the use of many processors for a single problem.

(SPPU-New Syllabus we.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualization).Pagono,(3-16

A cluster of virtual sorvera will bo used to hont the norvicos to Bupport high availability and ren
utilization.
Virtunl clustors also provido floxibility in adding moro servicos in tho futuro, vith minimal code and
configuration changos. An additional standby virtual cluster is also used.
Virtual clusters worlk by onhancing tho servor utilization.
Virtual machine clusters work by protocting tho physteal machino from any hardware and software
failures. When a physical nodo fails, the virtual machino can accoss another node, with no time lag. And
thus, virtual machine clustering provides a dynamic backup process.

3.7.1 Comparison of Physical Cluster and Virtual Cluster

Table 3.7.1: Physical Cluster Vs Virtual Cluster

Sr. Physical Cluster Virtual Cluster


No.
1. A physical cluster is a group of server units A virtual cluster is a group of virtual machines
(servers or computer systems) that are deployed (VMs) deployed as a single logical unit in a
physically together in one location or multiple single data center or in multiple data centers
locations, connected with a physical network. connected with a virtual network.

2. Physical clusters are connected by network cables Virtual clusters are connected by a virtual
and are managed with a single system console. network and are managed with multiple user
consoles.

3. Physical clusters are created on different systems, Virtual clusters are created on a single system,
and they have different hardware. and they share the same virtualization
software and hardware.

3.7.2 Benefits of Virtual Clusters

Even though physical clusters are more reliable than virtual ones, VMs are more secure because they
are not linked to the hardware. Data security is an important issue for virtual elusters, and there are
several ways to secure data.
Virtual clusters are highly scalable, so you can add or remove VMs to meet changing demands, and you
can move VMs to optimize the use of hardware.
Virtual clusters are easy to manage and provide a higher level of flexibility.
Virtual clusters minimize dependencies on hardware and are more reliable during failover and failback
operat1ons.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC)
(Virtualizatlon)...Pago no. (3-172
3.8 APPLICATIONS OF VIRTUALIZATION

GQ Enlist the applications of virtualization


In this section, we will discuss few of the application
arons of virtualization.
1. Server Consolidation
Virtual machines are used to consolidate
many physical servers into fower sorvers.
Each physical server is reflected as a virtual
machine "guest". They reside on a virtual machine
host system.
This is also known as "Physical-to-Virtual" or P2V' transformation.
2 Disaster Recovery
Virtual machines can be used as "hot standby" environments
for physical production servers.
Virtual storage can be replicated and transferred to another location.
Virtualization is very useful
in planning for disaster recovery.
3. Testing and Training

Virtualization can give root access to a virtual machine.


This can be very useful such as in kernel development and operating system courses.
4. Portable Applications
Portable applications are needed when running an application from a removable drive, without
installing it on the system's main disk drive.
Virtualization can be used to store temporary fles, windows registry entries and other information
in the application's installation directory and not within the systerms permanent file system.
5. Portable Workspaces

Recent technologies have used virtualization to create portable workspaces on devices like iPods and
USB memory sticks.

3.9 DESCRIPTIVE QUESTIONS

Q.1 Define virtualization. State the characteristics of virtualization.


Q.2 Ditferentiate between cloud computing and virtualization.
Q.3 Explain ditferent architectures of virtualization. Also explain implementation levels of virtualization.
Q.4 Differentiate between hardware virtualization and software virtualization.
Q.5 Explain server virtualization and network virtualization.
Q.6 What is storage virtualization ? Explain the methods to implement storage virtualization. 20
Q.7 Write a note on: Virtual Clusters
State the advantages and disadvantages of virtualization. State the applications of
virtualization.
a. 8
virtualization softwares.
Q.9 State the features of any two
Chapter Ends

bebulb q6
UNIT IV Service Oriented
CHAPTER 4
Architecture and
Cloud Security

Unlversity Prescrlbed Syllabus


Cloud Computing Architecture (COA) Design principles, Cloud
computing Iife cycle (CCLC), Cloud
computing reference architecture, Service Oriented Architecture (SOA) characteristics
and fundamental
components.

Cloud Securlty: Cloud CIA security model (Confidentiality, Integrity and Availability), Cloud computing
security architecture, Service provider security issues, Cloud Security Issues and challenges, Security
issues in virtualization, Host Security, Data Security, Firewalls

4.1 Design Principles of Cloud Computing Architecture (COA).. 4-3


**************************************************************** *****

GQ. Explain in detail Design Principles of COA?.. ************************************************************************************* .4-3


4.2 Cloud Computing Life Cycle (CCLC).*************************************************************************snnsnsonssnsaers
*s *******.4-5
GQ. Why we need Cloud Computing Solution ?. ******"******"*********************************************************************************** .4-5
4.2.1 Life Cycle of Cloud Computing Solution.. ****************"******"************'*****************"************************************* .4-6
4.3 Service Oriented Architecture (SOA).******************* *********************"******************************************************* .4-7
GQ. What is Service Oriented Architecture ?. ***************************************"*****"*****************************************************" .4-7

4.3.1 Service Oriented Architeture (SOA). **************************************************************.*** ** * .4-7


4.3.2 Guiding Principles of SOA.**********************************************************************"*****"***********""*************"******" 4-8
4.3.3 Characteristics of SOA... ******'****************************** *****"*****""******"*********************""*********************"**************** ****410
4.4 Cloud Security .. **********************************************************"***************************************************** ..4-11
GQ. What is Cloud Security ?.. 4-11
.
**********************************************"*************************************""******""***************"*****.

GQ. Why is the CIA important ? ***.4-12


GQ. What are examples of the CIAt ?.. ************"***************"*******"*****************************"*****"******************
* ..4-12
4.4.1 Special Challenges for the CIA Triad. *****4-14

4.4.2 Best practices for Implementing the CIA Triad...


********************************************************************************* .4-14
4.5 Cloud Computing Security Architecture.. ****************""*****************"*******"*******************************"****""***************** .4-15
Architecture ?..**********************************************************************
GQ. Explain in detail Cloud Computing Security ***.4-15

4.5.1 Understanding Security of Cloud.. ***************************************************""*****"*** **************************** .4-15


Cloud Computing (SPPU-SEM 7-E&TC) (Service Oriented Architecture and Cloud SecuritA...Pae re

**************************************************
4.5.2 Key Points to CSA Model. ************

***
4.5.3 Soparate Access to Data. ************************4s***** s*********************** ***

GQ. Why is cloud security architecture important ?.. ******************


******************adg.

4.5.4 Cloud Secuity Architecture and Shared Responsibility Model.

4.6 Service Provider Security Issues..*********************************************************************************


GQ. What are the security issues in cloud service providers ?.. **********

4.7 Cloud Security Issues and Challenges. *******s** **esn***n**siaassasssnas*as*****************

GQ. What are security Issues in Cloud Computing ?.

4.7.1 Need of Cloud Computing.... +21


*******************************************"

4.7.2 Security Issues in Cloud Computing. *******************************************************************


21
4.8 Security Issues in Virtualization. *********************************************************

Ga. What are Security issues in virtualization ?..


********************************************************** 4-22
4.9 Host-Security.. ****"*****************************************************************************

GO. What is Host Security ?.. *********************************** ***** *aassas*e****** 4-23


4.10 Data Security.. ***********************************************o*****ee******************************************* 4-24
GO. What is Data Security ?.
************e*************** 4-24
4.10.1 Types of Data Security. **************************************************

4.10.2 Data Security Regulations..


-
**********"*********

4.11 Firewalls.**************************************************************** ****************** **********

Ga. What is a Firewall ?... *****************************************************************

4.11.1 Firewall: Hardware or Software. ********************************* *************


427
GQ. Why we need Firewall ?.. ******************************** *****

4.11.2 Brief History of Firewal. ************************************************************ **** 4-28


4.11.3 Functions of Firewall.. ************************************

GQ. What are the different function of firewall ?. **************** *****************************aa

4.11.4 Limitations of Firewall .. e********************************************************************************


***** .430
4.11.5 Types of Firewal.*****.* .********n******.e*****************se******************** ..**. 4S1
GQ. Enlist Different types of Firewall ?.. *************** ******** **** ** ********************** ************** 4S1
Chapter *******************************************************************. 43

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications-A SACHIN SHAH Vent
Cloud Computing (SPPU-SEM 7-E&TC)
Sorvice Orientod Architecturo and Cloud Security)... Page no. (4)

4.1 DESIGN PRINCIPLES OF


CLOUD cOMPUTING ARCHITECTURE
(COA)
GQ Explajn in detail Design Principles
-----
----~-----
Cloud Computing, whjch is one
of COA.

of the demanding technologies


new shape to every organization of the current time and which 18 giving a
by providing on domand
virtualized services.
Starting from small to medium
and medium to large, every
for storing information and organization use cloud computing services
accessing it from anywhere
and anytime only with the help of internet.
The cloud computing technology
is used by both small
in cloud and access it from anywhere and large organizations to store the informati0
at any time using the internet connection.
Cloud computing architecture
is a combination of service-oriented
architecture. architecture and event-driven

Transparency, scalability, security and


intelligent monitoring are some of the most important
constraints which every cloud infrastructure
should experience.
Current research on other important constraints
is helping cloud computing system to come up wth
new features and strategies with a great
capability of providing more advanced cloud solutions.
Cloud computing architecture is divided
into the following two parts -
Front End
Back End
Architecture of Cloud Computing9
Client Infrastructure Front End
1 bn

Intemet3

Application

Service

Runtime Cloud
Back End

Storage

infrastructure

t Fig. 4.1.1: Architecture of cloud computing

Architecture of cloud computing is the combination of both SOA (Service Oriented Architecture) and
EDA Event Driven Architecture)

(SPPU-New Syllabus we.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Compuling (SPPU-SEM 7-E&TC) (Servico Orlonted Architecture and Cloud Security)...Page no
infrastructure, management
Client infrastructure, application, service, runtime cloud, storage, ATA

security all these are the components of cloud computing architecture.

1. Frontend

Frontend of the cloud architecture refers to the client side of cloud computing systern. Means
contains all the user interfaces and applications which are used by the client to access the cl
computing services/resources. For example, use of a web browser to access the cloud platform. I
contains client-side interfaces and applications that are required to access the cloud computing
platforms.
The front end includes web servers (including Chrome, Firefox, internet explorer, etc), thin & fat
clients, tablets, and mobile devices.
Client Infrastrueture Client Infrastructure is a part of the frontend component. It contains the
applications and user interfaces which are required to access the cloud platform.
In other words, it provides a GUI (Graphical User Interface) to interact vith the cloud.

2. Backend

Backend refers to the cloud itself which is used by the service provider. It contains the resources as
well as manages the resources and provides security mechanisms.
Along with this, it includes huge storage, virtual applications, virtual machines, traffic control
mechanisms, deployment models, etc.
Application

Application in backend refers to a software or platform to which client accesses. Means it provides the
service in backend as per the client requirement.
Service

Service in backend refers to the major three types of cloud-based services like SaaS, PaaS and laaS.
Also manages which type of service the user accesses.

Runtime Cloud

Runtime cloud in backend provides the execution and Runtime platform/environment to the Virtual
machine.

Storage
Storage in backend provides flexible and scalable storage service and management of stored data.
Infrastructure
Cloud Infrastructure in backend refers to the hardware and software components of cloud like i
includes servers, storage, network devices, virtualization software etc.

(SPPU-New Sylabus wef aademic year 22-23)NP7-129) Tech-Neo Publications.A SACHIN SHAH Vent
Cloud Computing (SPPU-SEM
7-E&TC)
CIOu
Sorvlco Orlonted Architecturo and Cloud Security)... Page no. (4-5)
Management
Management în bacKend relers to
management of backend components
runtime cloud, storage, inirastructure, and like application, serVie
other security mochanisms otc.
Security
Security in backend refers to
implementation of different
secure cloud resources, sy'stems, files, security mechanisms in the backend 10r
and infrastructure to ond-users.
Internet
Internet connection acts as the medium
or a bridge between frontend and
interaction and communication between backend and establishes the
frontend and backend.
.Benefits of Cloud Computing Architecture:
Makes overall cloud computing system
simpler.
Improves data processing requirements.
Helps in providing high security.
Makes it more modularized.
Results in better disaster recovery.
Gives good user accessibility.
Reduces IT operating costs.

4.2 CLOUD COMPUTING LIFE CYCLE (CCLC)

Cloud Computing is the booming industry of the present time and will continue to grow
by many folds
in the near future.
Nowadays, it's really hard to find a safe, secure, and yet cost-effective place to store your data and
business-critical ideas. But, with the rise of cloud computing, this problem is vanishing exponentially.
Cloud provides us with a place where your data can not only be stored but can also be accessed easily
over the internet. Using Cloud Computing you can also host and manage your applications.
G Why we need cloud ComputingSolution

By using Cloud Computing Solution, we get various benefits, some of which are as follows
Improved software and hardware performance: Through cloud computing solution one can easily
make out what will be the best software and hardware specification for the better performance of the
application running on the cloud.
Flexibility and affordability: Cloud Computing provides its users with a wide variety of deployment
models and functions through which they can choose the best options for their applications. Cloud
services are much more affordable.

SPPU-New Syllabus w.e.f academic year 22-23)(P7-129)


Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Compuling (SPPU-SEM 7-E&TC) (Servlce Orlented Architecture and Cloud Security)....Pano.

Inereased uptime and availability: It is highly available and has a great uptime which haelpsin
managing more amount of traffic at a particular tim0.
Better collaboration with real-time sharing -cloud computing has great real-time Bharing

4.2.1 Life Cycle of Cloud Computing Solutlon

0 Create such a cloud platform, it talkes a long number of steps and dedicated time. Let's now look a
the steps involved or the lifecycle of cloud computing solutions.
Step 1:Define the Purpose
The first and foremost step is to define the purpose for which you want to create a cloud. For
this, you
have first to understand your business requirement
and what type of application you want to run on the
cloud. After this, you have to decide whether you want your cloud
to be public, private, or hybrid.
Step 2: Define the Hardware
Deciding what type of hardware, you will need is the most
thought after the process. One needs to be
very precise in making the decision. For
this, you will have to choose the compute service that will
provide the right support when you resize your compute
capacity to maintain your application running.
Step 3: Define
the Storage
Every applicationneeds a good amount of storage where it's data can be stored safely. For any
application storage type that should be chosen carefully for this one should choose the storage service
where they can back up and archive their data over the internet.
Step 4: Define the Network
Networking is the key that' will deliver your data to the end-users. So, the netvwork must be configured
sincerely and should be flawless so that intruders cannot break into the network. One should define the
network that securely delivers data, videos, and applications with low lateney and high transfer speed.
Step 5:Define the Security
Security is a, key aspect of any application. Set up your security service which enables services for user
authentication or limiting access to a certain set of users on your resources.
Step 6: Define the Management Process and Tools
The developer should have complete control over there resource. and to configure these you should
define some management tools which monitor your cloud environment, resourees used, and the
customer application running on i
Step 7: Testing the Process
Testing is yet another important thing in the life cycle of deploying any application. All the faults can
figure out only through the testing process involved in it. During testing, you should verify your
application using various developer tools where you build, test, and deploy your.code quickly.

(SPPU-New Syllabus w.ef academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Ventue
Cloud Computing (SPPU-SEM 7-E&TC)
Service Orionted Architecturo and Cloud Security)..Page no.
Step 8:Analytics (4
Finally, analyse auid ViSuanze data using analytics sorvico
and get results then and there only,, Once whoro you can start querying data instanuy
you deploying.
analysing is dono completo, your application
becomes reauy

Advantages

Cost Saving: It helps you to save


substantial capital costs as do0s
investments. it not noed any physical hardvare
High Speed: Cloud computing allows
you to deploy your sorvice quiclkly
Backup and restore of in fewer clicks.
data: Back up and restore of data
is easy in cloud computing.
Reliability: It is highly reliable to
use cloud computing solutions.
0Disadvantages C
Performance can vary: Its performance depends
on the speed and quality of
the internet
Downtime: Cloud Computing Solutions has a
great span of downtime.

43 SERVICE ORIENTED ARCHITECTURE


(OA
A Service-Oriented Architecture or SOA
is a design pattern which is designed to build
systems that deliver services to other applications distributed
through the protocol. It is only a concept and not limited
to any programming language or
platform.
GQ What is Service Oriented Architecture

A service is a well-defined, self-contained


function that represents a unit of functionality.
A service can exchange information from another service.
It is not dependent on the state of another
service. It uses a loosely coupled, message-based communication model to communicate
with
applications and other services.
D Service Connections
The figure given below illustrates the service-oriented architecture.
Service consumer sends a service request to the service provider, and the service provider sends the
service response to the service consumer.
The service connection is understandable to both the service consumer and service provider.

4.3.1 Service Oriented Architecture (SOA)

Service-Oriented Terminologies
Let's see some important service-oriented terminologies
Service-Oriented Architecture (SOA) is a stage in the evolution of application development and/or
integration. It defines a way to make software components reusable using the interfaces.
(SPPU-New Syllabus w.e.f academic year 22-23)P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
Cloud Security)..Pado.
(Service Orlented Archltecture and
Cloud Computlng (SPPU-SEM
7-E&TC)
available
make use of services available
.
Formally, SOA is an architectural approach in which applications
network. In this architocture, services aro provided to form
applications, through a network callo
cal
in
t
streamline theBer
the internet. It uses common communication standards to speed up and gervia
integrations in applications.
a
business function in itself. The services are published such Way
Each service in SOA is a complete in

that it makes it easy for the developo to assemble their apps using those services. Note that SOAOAa
different from microservice architecturo.
SOA allows users to combine a large number of facilities from existing services to form applications,
SOA enconmpasses a set of design principles that structure eystem development and provide means fo
integrating components into a coherent and decentralized system.
SOA-based computing packages functionalitioa into a set of intoroperable services, which can b
integrated into different software systems belonging to separate business domains.
There are two major roles within Service-oriented Architecture:

.Service provider :The service provider is the maintainer of the service and the organization that
makes available one or more services for others to use. To advertise services, the provider can
publish them in a registry, together with a service contraet that specifies the nature of the service,
how to use it, the requirements for the service, and the fees charged.
2. Service consumer The service consumer can locate the service metadata in the registry and
:
develop the required client components to bind and use the service.
Services might aggregate information and data retrieved from other services or create workflows of
services to satisfy the request of a given service consumer. This practice is known as service
orchestration.
Another important interaction pattern is service choreography, which is the coordinated interaction of
services without a single point of control.

a 4.3.2 Guiding Principles of SOA

Standardized service contract :Speciffed through one or more service description documents.
Loose coupling: Services are designed as self-contained components, maintain relationships that
minimize dependencies on other services.
Abstraction : A service is completely defined by service contracts and description documents. They
hide their logic, which is encapsulated within their implementation.
Reusability : Designed as components, services can be reused more effectively, thus reducing
development time and the associated costs.
Autonomy : Services have control over the logic they encapsulate and, from a service consumer point
view, there is no need to know about their implementation.
Discoverability: Services are defined by desceription documents that constitute supplementd
metadata through which they can be effectively discovered. Service discovery provides an effectie
means for utilizing third-party resources.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Ventue
7-E&TC
Cloud Computing (SPPU-SEM
Sorvco Orlentod Architocturo and Cloud Socurity)..Pago no. (4-59
Composnbility *
Using
services as building
plemented. Service oreliestration
imple
block8, BOphisticated and complex operations n be
and choroography provide solid support
and achieving business goals. a for compog ices

Advantages of SOA

1. Service reusability: In SOA, applications


reused to make many applications. aro mado from oxisting Hervices. Thus, services ca

2. Basy maintenance : As
services aro independent
easily without affecting other of ench other they can bo updated and moaiiea
services.
3. Platform independent: SOA allows making
a complex application by combining services picked iron
different sources, independent
of tho platform.
4. Availability: S0Afacilities are
easily available to anyone on request
5. Reliability: SOA applications are
more reliable because it is easy to debug small services rather tnan
huge codes
6. Scalability:
Services can run on different servers within
an environment, this increases scalability
Disadvantages of SOA
L. High overhead: A validation of input parameters of services is
done whenever services interact this
decreases performance as it increases load
and response time.
2. High investment: A huge initial investment
is required for SOA.
Complex service management: When services
interact, they exchange messages to tasks. the number of
messages may go in millions. It becomes a cumbersome task to
handle a large number of messages.
Practical applications of SOA: SOA is used in many ways
around us whether it is mentioned or not.
SOA infrastructure is used by many armies and air forces to deploy
situational awareness systems.
Applcatlon or Servlces Services

Service Service
Consumer Locator

Service
Broker

Service
Provider

Fig. 4.3.1 : Service oriented Architecture

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
urity)....Page
Cloud Security)..Page
(Servico Orionted Architecture and no.
no
(4-1h
Cloud Computng (SPPU-SEM 7-E&TC)
more published interfaces.
Services : The services are the logical entities defined by one or
Service provider: It is a softwaro entity that implemonts a service specification.
a provider. A Beri.
Service consumer: It can be callod as a roquestor or cliont that calls service rvice

consumer can be anothor sorvico or an end-user application.


Service locator: It is a sorvico provider that acts as a registry. It is responsible for examining servi
provider interfaces and service locations.

Service broker : It is a service providor that pass sorvice requests to one or more additional service
providers.

4.3.3 Characteristics of SOA

The services have the following characteristics:


They are loosely coupled.
They support interoperability.
They are location-transparent
They are self-contained.

Components of service-oriented architecture


The service-oriented architecture stack can be categorized into two parts functional aspects and
quality of service aspects.
Service Oriented Architecture (SOA)
Functional aspects

The functional aspect contains


Transport: It transports the service requests from the service consumer to the service provider and
service responses from the service provider to the service consumer.

Service Communication Protocol: It allows the service provider and the service consumer to
communicate with each other.
Service Description : It describes the service and data required to invoke it.
Service : It is an actual service.

Business Process: It represents the group of services called in a particular sequence associated with
the particular rules to meet the business requirements.
Service Registry: It contains the description of data which is used by service providers to publish
their services.

Quality of Service aspects

(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications.A SACHIN SHAH Veture
Cloud Computing (SPPU-SEM 7-E&TCI
sorvico Oriontod Architecturo and Cloud Secunty)..Page
nP The quality of servica aspects no.(411
contalns
Policy: It represents the set of protocols
services to consumers. accordins to which a service provider
make and pr the
Security : It represonts the sot of protocols requirod
for idontifieation and authorization.
Transaction: It provides the
surety of consistont
complete a business function, result. This means, if we use the group ot services
oithor all must complete
Management: It defines tho of or nono of the complete.
sot attributes used to
manago the services.
SFAdvantages of OA in terms of
quality
sOA has thhe following advantages
1. Easy to integrate: In a servico-oriented architecture,
provides implementation transparency. the integration is a service specification that

2 Manage Complexity : Due to service


specification, the complexities get isolated, and integration
becomes more manageable.
3. Platform Independence: The services are
platform-independent as they can communicate with other
applications through a common language.
4. Loose coupling: It facilitates to implement services without
impacting other applications or services.
5. Parallel Development: As SOA follows
layer-based architecture, provides it parallel development.
6. Available: The SOA services are easily available to any requester.
7. Reliable: As services are small in size, it is easier to test and debug them.
SOA is used to improve healthcare delivery.
Nowadays many apps are games and they use inbuilt functions to run. For example,
an app might need
GPS so it uses the inbuilt GPS functions of the device. This is SOA in mobile solutions.

4.4 CLOUD SECURITYY

Cloud CIA security model (Confidentiality, Integrity and Availability)


GQ What is Cloud Security ?
Confidentiality, integrity and availability, also known as the CLA triad, is aa model designed to guide
policies for information security within an organization.
The model is also sometimes referred to as the AIC triad (availability, integrity and confidentiality) to
avoid confusion with the Central Intelligence Agency. Although elements of the triad are three of the
most foundational and crucial cyber security needs, experts believe the CIA triad needs an upgrade to
stay effective.
In this context, confidentiality is a set of rules that limits access to information, integrity is the
assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable
access to the information by authorized people.
Confidentiality, integrity, availability

(SPPU-New Syllabus w.e.f academic year


22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(Sorvice Orientod Architecture and Cloud
Security)... Page no
Cloud Computing (SPPU-SEM 7-E&TC) e
that form the CIA triad
:

The following is a broakdown of tho three key concepts


pr
are designed to preve
Contidentinlity is roughly cquivalont to privacy. Confidentiality measures
sensitive information from unauthorized access attempts. It is common for data to be categori
Nccording to the amount and typo of damage that could be done if it fell into the wrong hands,
More or less stringent monaures can then be implemented according to those categories.
Integrity involves maintaining tho conaistoncy, accuracy and trustworthiness of data over 1ts entj
lifecyelo.

Data must not be changed in transit, and stops must be taken to ensure data cannot be altered by

unauthorized people (for oxample, in a broach of confidentiality).


Availability means information should be consistently and readily accessible for authorized partiea
This involves properly maintaining hardware and technical infrastructure and systems that hold and
display the information.
Diagram of CIA triad
The three CIA triad principles
Why is the CIA important ?

with each letter representing a foundational principle in cyber security, the importance of the CIA triad
security model speaks for itself.
Contidentiality, integrity and availability together are considered the three most important concepts
within information security.
Considering these three principles together within the, framework of the "triad" can help guide the
development of security policies for organizations. When evaluating needs and use cases for potential
new products and technologies, the triad helps organizations ask focused questions about how value is
being provided in those three key areas.
Thinking of the CIA triad's three concepts together as an interconnected system, rather than as
independent concepts, can help organizations understand the relationships between the three.

GO What are examples of the CIA t2

Here are examples of the various management practices and technologies that comprise the CIA triad
While many CIA triad cyber security strategies implement these technologies and practices, this list is by no
means exhaustive.

Confidentiality
Sometimes safeguarding data confidentiality involves special training for those privy to sensitive
documents. Training can help familiarize authorized people with risk factors and how to guard against
them.
Further aspects of training may include strong passwords and password-related best practices and
information about social engineering methods to prevent users from bending data-handling rules with
good intentions and potentially disastrous results.

Publications...A SACHIN SHAH Venture


(SPPU-New syllabus w.e.f academic year 22-23)(P7-129) LTech-Neo
Cloud Computlng
(SPPU-SEM 7-E&TO)
Sorvlco Orlontod Archltocturo and Cloud
Soculty)..Pago no. (413)

A good example usod to onsuro confidontiality is requiring an account number or rouuting


or mothods
number when banking onlino,

Data eneryption 18 another common method of onsuring confidontiality, User IDs and passwords
constitute a standard proceduro; two-factor authontication (2FA) is bocoming the norm. Other options
include Biometric verification and socurity tolkons, koy fobs or soft tokens.

In addition, users can take procautions to minimzo the numbor of placos where information appears
and the number of timcs it is netunlly transmittod to comploto a required tranaaction.
Extra measures might be talken in tho case of oxtromely sonsitivo documents, such as storing only on
air-gapped computers, disconnected storage device or, for highly sonsitive information, in hard-copy
form only.

Integrity

These measures include file permissions and user access controls. Version control may be used t
prevent eroneous changes or accidental deletion by authorized users from becoming a problem.
.In addition, organizations must put in some means to detect any changes in data that might occur as a
result of non-human-caused events such as an electromagnetie pulse (EMP) or server crash.
Data might include checksums, even cryptographic checksums, for verification of integrity. Backups or
redundancies must be available to restore the affected data to its correct state.
Furthermore, digital signmatures can be used to provide effective no repudiation measures, meaning
evidence of logins, messages sent, electronic doeument viewing and sending cannot be denied.

DAvailability
This is best ensured by rigorously maintaining all hardware, performing hardware repairs immediately
when needed and maintaining a properly functioning operating system (0S) environment that is free of
software conflicts. It's also important to keep current with all necessary system upgrades.
Providing adequate communication bandwidth and preventing the occurrence of bottlenecks are equally
important tactics. Redundancy, failover, RAID -- even high-availability clusters can mitigate serious
--

consequences when hardware issues do occur.

.Fast and adaptive disaster recovery is essential for the worst-case scenarios; that capacity relies on the
existence of a comprehensive DR plan.
Safeguards against data loss or interruptions in connections must, include unpredictable events such as
occurrences, a backup copy may be stored in a
natural disasters and fire. To prevent data loss from such
geographically isolated location, perhaps even in a fireproof, waterproof safe.
and proxy servers can guard against downtimne
Extra security equipment or software such as firewalls
malicious denial-of-service (DoS) attacks and network intrusions.
and unreachable data blocked by

(SPPU-New Syllabus w.e.facademic year


22-23)MP7-129) ATech-Neo Publications...A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC) (Sorvice Orlentad Archltecture and Cloud Security)...Page

a4.4.1 Speclal Challenges for the ClIA Trlad

Big data posos challenges to the CIA paradigm bocause of the sheer volume of information
tha
organizations neod snfeguardod, tho multiplicity of sourcos that data comes from and the variet
formats in which it oxists.
Duplhento data sets and disnstor recovory plans can multiply the already-high costs. Furthermor
because the main coneorn of big data is collecting and making some kind of useful interpretation of a
,
this information, responsiblo data ovorsight is ofton
lacking.
Whistle-blowor Edward Snowdon brought
that problem to the public forum when he reported on the
National Security Agency's collection of massivo volumes
of American citizens' personal data.
Internet of things privacy protects the information of individuals from
exposure in an Ior environment,
Almost any physical or logical entity or object
can b0 given a unique identifier and the ability to
communicate autonomously over the internet or a similar network.
The data transmitted by a given endpoint
might not cause any privacy issues on its own. However,
when even fragmented data from multiple
endpoints is gathered, collated and analysed, it can yield
sensitive information.
Lnternet of things security is also challenging because IoT consists of so many internet-enabled devices
other than computers, which often go unpatched and are often configured with default or weak
passwords.

Unless adequately protected, IoT could


be used as a separate attack vector or part of a thingghood. As
more and more products are developed with the capacity to be networked, it's important to routinely
consider security in product development.

4.4.2 Best practices for lImplementing the CIA Triad

In implementing the CIA triad, an organization should follow a general set of best practices. Some
best
practices, divided by each of the three subjects, include:

Confidentiality
1. Data should be handled based on the organization's required privacy.
2. Data should be encrypted using 2FA.
3. Keep access control lists and other file permissions up to date.
4. Integrity
5. Ensure employees are knowledgeable about compliance and regulatory requirements to minimize
human error.

6. Use backup and recovery software.


7. To ensure integrity, use version control, access control, security control, data logs and checksums.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) ATech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC)
orvico Orlontod Architocturo and Cloud Socurity)...Pago no.
Availability (4-1)
1. Use preventive measures such as
redundancy, failovor
updated. and RAID. Ensuro systoms and applications

2. Use network or server monitoring


systems.
3. Ensure a data recovery and business
continuity (BC) plan is in place in
case of data loss.
4.5 CLOUD COMPUTING
SECURITY ARCHITECTURE

GQ. Explain in detail Cloud


Computing Security Architecture

.Security in cloud computing is a


major concern.
Proxy and brokerage services
should be employed to restrict a client from
directly accessing the shared data

Data in the cloud should be stored in encrypted


form.
Security Planning
Before deploying a particular resource to
the cloud, one should need to analyze several aspects of the
resource, such as:
A select resource needs to move to the cloud and analyze its sensitivity
to risk. Consider cloud service
models such as IaaS, PaaS, and These models require the customer
to be responsible for Security at
different service levels.
Consider the cloud type, such as public, private, community, or Understand the cloud service provider's
system regarding data storage and its transfer into and out of the cloud.

The risk in cloud deployment mainly depends upon the service models and cloud types.

4.5.1 Understanding Security of Cloud


t a
Security Boundaries
The Cloud Security Alliance (CSA) stack model defines the boundaries between each service model and
shows how different functional units relate.
A particular service model defines the boundary between the service provider's responsibilities and the
customer.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) LTech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&T (Servlce Oriented Architecture and Cloud Security)..Page
y no.(4
The following diagram shows the CSA stack model:
SaaS socurily
*******-**.---------***-**** -**-********T
boundary
Prosontatlon MobllyProsontatlon Platorm

Appllcntlons

Date Motadata Conlent


********~* Paas security
*--*.**a.-*aa. boundary
Integratlon and MiddlOware
laaS socuity
boundary
Saas APls
Saas
Cote conneclvltly and delvory
Paas Paas
laas & Abstractlonn laaS

Hardwae

Faclitles

Fig. 4.5.1 :Cloud Computing Security Architecture

4.5.2 Key Polints to CSA Model

Taas is the most basic level of service, with PaaS and SaaS next two above levels of services. Moving
upwards, each service inherits the capabilities and security concerns of the model beneath.
Iaas provides the infrastructure, PaaS provides the platform development environment, and
Saas
provides the operating environment.
JaaS has the lowest integrated functionality and security level, while SaaS has the highest. This model
describes the security boundaries at which cloud service providers' responsibilities end and customers
responsibilities begin.
Any protection mechanism below the security limit must be built into the system and maintained by the
customer. Although each service model has a security mechanism, security requirements also depend on
where these services are located, private, public, hybrid, or community coud.
T Understanding data security

Since all data is transferred using the Internet, data security in the cloud is a major, concern. Here are
the key mechanisms to protect the data.
access control
audit trail1
certification
authority
The service model should include security mechanisms working in all of the above areas.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Ventures
Cloud Computing (SPPU-SEM
7-E&TC)
Sorvice Oriented Architecture and Cloud Securit)..Page no. (-1
4.5.3 Separate Access to Data

Since the data stored in the cloud can be accessed m to


from anywhere, we need to have a meCa
isolate the data and protect it from the client's
direct access.
Broker cloud storage is a way of separating storage
in the Access Cloud. In this approach, two services
are created
A broker has full access to the storage
but does not have access to the client.
o A proxy does not have access to storage but
has access to both the client and the broker.
o Working on a Brocade cloud storage access system
When the client issues a request to access data:
The client data request goes to the external service interface of the proxy.
o The proxy forwards the request to the broker.
The broker requests the data from the cloud storage system.
o The cloud storage system returns the data to the broker.
o The broker returns the data to the proxy.

Finally, the proxy sends the data to the client.


ISAll the above steps are shown in the following diagram

Client data request Clent 6. Data response

Internet

2. Apply rules restate Proxy 5. Storage data


request relay
Cloud o

Web

3. Modified data request Broker 4. Storage data reply

Cloud

Cloud Storage

Fig. 4.5.2:Steps for Cloud Storage Access

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129)


Tech-Neo Publications..A SACHIN SHAH Venture
(Sorvico Oriented Architecture and Cloud
Secunty)...Page no. (a
Cloud Computing (SPPU-SEM 7-E&TC) .-18)
EEncoding
Encryption helps to protect the data from being hacked. It protects the data being transierred and the t
data stored in the cloud.
Although eneryption hclps proteet data from unauthorized accoss, it does not prevent data loss.
GQ Why is cloud security architecture important?
-

ne ditterence between "cloud security" and "cloud security architecture" is that the former 15 built fron
problem-specific measures while the
latter is built from threats.
A dloud security architecture can
reduce or eliminate the holes in Security that point-of-solution
approaches are almost certainly about to leave.
lt does this
building down defining threats starting with the users, moving to
by the cloud
environment and service provider, and then to the applications.

secunty architectures can also reduce redundancy


threat mitigation
in security measures, which will contribute to
and increase both capital and operating costs.
ne cloud security architecture also organizes security measures, making them more consistent and
easier to implement, particularly during cloud
deployments and redeployments.
Securnty is often destroyed because it is illogical or complex, and these faws can be identified with the
proper cloud security architecture.

Elements of cloud security architecture


The best way to approach cloud security architecture is to start with a description of the goals.
The architecture has to address three things: an attack surface represented by external access
interfaces, a protected asset set that represents the information being protected, and vectors designed
to perform indirect attacks anywhere, including in the cloud and attacks the system.
The goal of the cloud security arehitecture is acomplished through a series of functional elements
These elements are often considered separately rather than part of a coordinated architectural plan. It
includes access security or access control, network security, application security, contractual Security,
and monitoring, sometimes called service security.
Finally, there is data protection, which are measures implemented at the protected-asset level.
A complete cloud security architecture addresses the goals by unifying the functional elements.

4.5.4 Cloud Security Architecture and Shared Responsibility Model

The security and security architectures for the cloud are not single-player processes.
Most enterprises will keep a large portion of their I'T workilow within their data centres, local networks,
and VPNs.
The cloud adds additional players, so the cloud security architecture should be part of a broader shared
responsibility model.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129)


Tech-Neo Publications..A SACHIN SHAH Venture
(SPPU
(SPPU-SEM 7-E&TC) no. (4
Compuing
mputing ervico Orlontod Architocturo and Cloud Socurity)... Pago
Coud
shared responsibility model is dingram and a contract form. It exists
lormany
tecture
cloud user and cach cloud providor racted
betwee and network sorvico provider they uro if
separately.
the components of a cloud application the
Each will divide into layors, with the top layer being
sibility of the eustomer and the lower layer being the responsibility of the cloud provider.
responsibili

separate funetion or component of the application is mapped to the appropriate layer depending
on who i
provides it. The contract form then describes how each party responds.

SERVICE PROVIDER SECURITY ISSUES


4.6

to the general security concerns that affect anyone who uses IT technology or connects
addition
n ad
the Internet, the community of service providers has its own set of security-related issues to deal vth
cO. What are the security issues in cloud service providers?

important security issues that service providers face is the following:


The most
disabling access o
Denial of service (DoS) and distributed denial of service (DDoS) attacks are aimed at
various Internet services for legitimate users.
for service
. Excessive traffic and resource depletion caused by infected machines can generate problems
providers.

.Attacking Border Gateway Protocol (BGP) routing and injecting faulty BGP routes for traffic redirection
is one technique that attackers are using to obtain the "interesting" traffic.

Domain Name System (DNS) information is sometimes used to redirect Internet traffic to serve the
needs of people with criminal intent.
Device compromise means breaking into vital components of the infrastructure and modifying their
configuration.
These threats are correlated with the following factors specific to service provider networks:
The size of the network. Service providers must be able to rapidly implement security
measures against
a large number of parties that may be involved in the attack, and deploy these tools and
techniques on a
large number of devices, usually network entry points.
In the enterprise world, the number of devices to take care of is typically considerably smaller than in
the service provider space. (Although some enterprises have huge networks, this
is still an exception).
Size is one of the significant differences between the service provider and enterprise security paradigm.
in the service provider
The number of possible targets of and entry points for an attack is also higher
space than it is in the enterprise world, where typically a smaller number of clearly identified assets
frequently enjoy the highest level of protection possible.
Accordingly, service providers must be able to defend multiple targets from multiple parallel attacks.
Securing the transit paths and the infrastructure carrying them and not necessarily securing the
endpoints brings its own set of challenges.

PPU-New Syllabus w.ef academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
Cloud Security)..Page
Cloud Computing (SPPU-SEM 7-E&TC) (Servico Orlented Architocturo and
applicablo in the enterprise world aro
Many of the standard urity moasuros that are no
applicable in the sorvico providor socurity paradigm.
provention systom (Ds/IPS) do.
A primary differonco is that firowalls and intrusion dotoction and ovice

cannot be applied on transit paths in sorvico provider notworks.


- one of the main function.
Service providers cannot afford to provide granular access control of
firewall for transit trafic.
traffic to detect indications of exploitation
Moreover, they cannot afford focused :monitoring of transit
attempts in the way that IDSs/IPSs usually do.
hardening endpoints, like host IPSs and
Fina
nally, the whole set of security measures available for
antivirus software, is not of much interest in the servicó provider world.
Managed security service providers (MSSPs) subset
a of service providers manage the securi
the standpoint
components of their customers' networks. MSSPs care about security primarily from
enterprises. MSSP operation is not within the scope of this white paper
Service providers are also interested in the endpoint security measures with clearly identified securit-
20nes; they use these mechanisms to secure their own back-end
systems and certain h0st-based
services, like DNS infrastructure, web servers, mail servers, and CPE devices. This
paper does not
on only thos
alseulss this aspect of securing service provider networks. Instead, this paper focuses
aspects that are specific to service providers and their backbone networks.

47 CLOUD SECURITY ISSUES AND CHALLENGES

GQWhat are secunty Issues indloud computing


Cloud Computing is a type of technology that provides remote services
on the internet to manage
is also known
access, and store data rather than storing it on Servers or local drives. This technology
files, etc.
Serverless technology. Here the data can be anything like Image, Audio, video, documents,
END USER

STORAGE
(Database)
Computer Server
Networks

Services

SERVICE PROVIDER

Fig. 4.7.1:Cloud Security Issues

(SPPU-New Syllabus w.efacademic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Ven
ting (SPPU-SEM
7-E&TC)
ud Copu Sorvice Oriontod Architocturo and Cloud Socurity)...Pago DO
CO Need of Cloud Computing
4.7.1 Ne
a
Before using
Cloud Computing, most of
Bet tho largo as
us woll
woll as Bmall IT companies use traditional methods
data in Serve comf
ov store
they Server, and thoy need a
ie. soparato Sorvor room for that.
Server Room, there should bo a
that database sorvor, mail sorvor, firowalls, routors, modems, higa
sed devices, ete. For that IT
speed
net companios have to spond
lots of money.
reduce aall
In order
to ce the problems with cost Cloud
computing come into existence and most com
shift to this technology. i
Security Issues in Cloud Computing
4.7.2
a
There. is no doubt that Cloud Computing provides various Advantagos but there are also some Becur
issuesos in cloud
computing. Below are some following Security Issues in Cloud Computing as follows.

Data Loss
Data Loss is one of the isSues faced in Cloud Computing. This is also known as Data Leakage. As we
kn0w that our
sensitive data is in the hands of Somebody else, and we don't have full control over our
atabase. So, if the security of cloud service is to break by hackers then it may be possible that hackers vwill
date
get access to our sensitive data or personal files.

Interference of Hackers and Insecure API's

As we know if we are talking about the cloud and its services it means we are talking about the
Internet. Also, we know that the easiest way to communicate with Cloud is using APL So, it is
important to protect the Interface's and APf's which are used by an external user. But also, in cloud
computing, few services are available in the public domain.

An is the vulnerable part of Cloud Computing because it may be possible that these services are
Rcceased by some third parties. So, it may be possible that with the help of these services hackers can
easily hack or harm our data.
User Account Hijacking
Account Hijacking is the most serious security issue in Cloud Computing. If somehow the Account of
User or an Organization is hijacked by Hacker. Then the hacker has full authority to perform Unauthorized
Activities.
EST
Changing Service Provider

Vendor lock In is also an important Security issue in Cloud Computing.


Many organizations will face different problems while shifting from one vendor to another. For example,
An Organization wants to shift from AWS Cloud to Google Cloud Services then they ace various
so
problem's like shifting of all data, also both cloud services have different techniques and functions,
they also face problems regarding that. Also, it may be possible that the
charges of AWS are different
from Google Cloud, ete.

Tech-Neo Publications..A SACHIN SHAH Venture


(SPPU-New Syllabus
wef academic year 22-23)P7-129)
Security)...Pagono.(4-22)
no ta
Architecturo and Cloud
Cloud Computing (SPPU-SEM 7-E&TC) (Sorvico Oriented

Lack of Skill
to use a Ieature, ete. are
working, shifting sorvico provider, need an extra feature, how
While o another So it requires a led persn
skilled
havo skilled Employee.
the main problems caused in IT npany who doesn't
to work with cloud Computing.

Denial of Service (DoS) attack


This typo of attack occurs when the system receives too much traflic.
Mostly DoS attacks occur in larngo organizations such as tho banking sector,
governmene
a great amount ol
te
money
e
When a DoS attack occurs, data is lost. So in order to recovor data, it requires
as well as time to handle it.

N 4.8 SECURITY IssUES IN VIRTUALIZATION

GQ What are Securityissues in virtualization ?

they provide an easy-to


Virtualization-based technologies have become ubiquitous in computing. While
new security issues.
mplement platform for scalable, high-availability services, they also introduce
been focused on stand.
Traditionally, discussions on security vulnerabilities in server platforms have
the discussion focuses on
alone (i.e., non-virtualized) environments. For cloud and virtualized platforms,
ne shared usage of resources and the lack of control over the infrastructure.
impact virtualization technologies can have on exploit
mitigation mechanisms of host
iowever, th
machines is often neglected.
Theretore, this survey discusses the following issues: first, the security
issues and challenges that a
environments special attention js
introduced by the migration from stand-alone solutions to virtualized
given to the Virtual Machine Monitor, since it is a core component in a
virtualized solution; second, the
security strategies for hosts:
impact (sometimes negative) that these new technologies have on existing
security mechanisms not
third, how virtualization technologies can be leveraged to provide new
used for malicious purposes.
previously available.; and, finally, how virtualization technologies can be
Virtualization, the process of allowing efficient utilization of physical computer hardware,
is the core of
many new technologies. With this comes the importance of understanding the
related security aspects
to avoid the compromise of underlying resources and services.
In this paper, we provide an overview on the two main virtualization architectures
and the different
types of virtualization approaches related to those architectures.
We also review the literature for virtuálization security requirements and security attacks.
We

highlight the latest security techniques proposed in the literature.


Due to the growth of cloud computing in the industry, we also discuss virtualization security in
the

industry. As a result, we have found that the gap between academia and industry has become very
small in this feld, and more importance should be given to elient and service provider responsibiliy
awareness.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) 9Tech-Neo Publications..A SACHIN SHAH Venture
(S
ing (SPPU-SEM 7-E&TC)
ComDuting
Sorvico Oriontod
Architocturo and Cloud Socurity)...
Cloud sibility: Post virtuaizauon,
Lack organizations
struggle to visualizo
BUrugglo to perform
ve monitoring and munagemont.
eflective visunlize their virtual aseets
thoir virtuat
i
ation of virtual assets means cstablishing
yisunting the guest and host onvironment, visibility on the virtunl layer of IT architecture
positioning the virtual
physical T asset environment etc. servers and desktops within the

Mici
rtraffic: If no due diligenco is carried out to
virtualizat undorstand
dorstand the changes network
netvi will undergo due
ation, then the trattic of physical IT
to assots and virtualized environment
get nizu
other.
The mixing
g
of trafiic results in inelfective
monitoring of virtualized
perspective. assets from both an 1 aand a
security
ic data exposures: 1n a virtualized IT environment is
machines. it an arduous task to scan data files resident
on virtual
izations are impiementing security capabilities that can
discover and classity ens
nation hosted on virtual machine thus reducing
informat
the number of data leakage scenarios.
swiftly identifying sensitive data exposures,
these security capabilities reduce the risks ot n
eompliance,
co such as reputational damage due to data leakage incidents.
Some of the other Securiuy cnallenges are insecure provisioning in which device and user-based
provisioning becomes ditficult to implement because of elevated
access given to provide flezibility in
perations and business demanding deployment of varied mobile devices to enhance productivity oI tne
oper
workforce in a virtualized environment.

HOST-SECURITY
4.9
GQ What is Host Security ?

Host security describes how your server is set up for the following tasks:
1. Preventing attacks.
2. Minimizing the impact of a successful attack on the overall system.
3. Responding to attacks when they occur.

It always helps to have software with no security holes. Good luck with that! In the real world, the best
approach for preventing attacks is to assume your sofbware has security holes. As I noted earlier in this
chapter, each service you run on a host presents a distinct attack vector into the host.
The more attack vectors, the more likely an attacker will find one with a security exploit. You must
therefore minimize the different kinds of software running on a server.
Given the assumption that your services are vulnerable, your most significant tool in preventing
attackers from exploiting a vulnerability once it becomes known is the rapid rollout of security patches.
Here's where the dynamic nature of the cloud realy alters what you can do from a security perspective.

SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
Archltooturo and Cloud
curlty)...Pago no.(4
Cloud Computing (SPPU-SEM 7-E&TO) (Sorvloo Orlontod
infruntruct
ucturo in
socurity patchos ncross an entiro tim
In a traditional data contor, rolling out
consuming and rislky.
In the cloud, rolling out a patch acrose tho infrastructuro
takos throo Bimplo steps:

1. Patch your AMI with tho now security fixoa.


2. Tost tho rosults.
3 Relaunch your virtual sorvors.

4.10 DATA SECURITY


S

GQ What is Data Security ?


way, pooplo are working in corporate
Data, a word which is now spoken overy time one or tho othor
our company data should not be leaked
throughout the day with small ecalo figures keeping in my find that
of their data being in-8ecured.
by any chance or by any external force but they haven't thought

S Why our data Is not secured?


like Facebook, WhatsApp which is not
using apps especially social media apps
We feel free while
favorable condition in terms of our personal
normal because we logins on different devices which is not a
data and also of the people linked through it.

Here is a flowchart for better understanding


Facebook Users

Users

Had their data


exposed by

Facebook

Exposed raw data


to

Cambridge
Analytics

Trump
Campalgn

Fig. 4.10.1:Flowchart of Data Security

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129)


Tech-Neo Publications..A SACHIN SHAH Ventie
(SPPU-SEM 7-E&TC)
onDulting
mputing oOrvico Orlontod Architocturo and Cloud Socurity)..Page no.
oUd asset
asset on the planet, it is very crucial as data
Data
being the to handle and secure in these days
breaching not dificult, hackers are hacking profiles and solling it, data Belling is a new way ot
earning.
urity is the most vital part for onlino workers on which there should be no compromise at
security
Data
still it happens and it will be happening as there is no way getting rid of data being stolen but it can
w

but
controlled to an extentI by many means
be

will be secured ?
How data
firewalls.
Use
systems.
.
Use encrypted
VPN.
Use
parties.
.Nevergive authorization to external
, Use strong passwords and change them often.

Pablic networks should be avoided as much as we can like WiFi on metros, airports.

. Do make trust issues while loEging in another devices.


have been taken so
. From the above we came to know how far we are from all of this which wouldn't
yours.
easy at least in terms of our owa personal data which is yours and only
making use
. There are laws being made for right to ask for the data if you think someone is having and
of it. So, it solely depends on the individuals how they take this into the account.

a 4.10.1 Types of Data Security

Access Controls
critical systems
This type of data security measures includes limiting both physical and digital access to
and data. This includes making sure all computers and devices are protected with mandatory login entry,
and that physical spaces can only be entered by authorized personnel.

Authentication
Similar to access controls, authentication refers specifically to accurately identifying users before they
have access to
data. This usually includes things Hike passwords, PIN numbers, security tokens, swipe
cards, or biometrics.

Backups and Recovery


data security means you have a plan to securely access data in the event of system failure,
Good
disaster, data corruption, or breach.
You'll need a backup data copy, stored on a separate format such as a physical disk, local network, or
cloud to recover if needed.

oFPU-New Syllabus
w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Architecture and Cioud Secunty)...Page no (4-26
(Service Oriented
Cloud Computing (SPPU-SEM 7-E&TC)

Data Erasuree
You'll want to dispose of data properly and on a regular basis.
and is more sen.
completely overwrite data on any storage device
Data erasure employs software to
data is unrecoverable and therefore won'tfal
than standard data wiping. Data erasure verifies that the
into the wrong hands.

Data Masking
pron
obscuring letters and numoers win
Dy using data masking software, information is hidden by
unauthorized party gains access to it.
characters. This effectively maslks key information even if an
receives it.
The data changes back to its original form only when an authorized user
US Data Resiliency
recover from failures.
Comprehensive data security means that your systems can endure or
events like power outages or natur
5uilding resiliency into your hardware and software means that
disasters won't compromise security.
Encryption
format via encryption keys.
A computer algorithm transforms text characters into an unreadable
Only authorized users with the proper corresponding keys can
unlock and access the information.
should- be encrYpted to some
Everything from files and a database to email communications can and
extent.

SMain Elements of Data Security


should adhere to: Confidentialit
There are three core elements to data security that all organizations
CIA Triad, functioning as a
Integrity, and Availability. These concepts are also referred to as the
each core element means in
security model and framework for top-notch data security. ere's what
exfiltration.
terms of keeping your sensitive data protected from unauthorized access and data
credentials.
Confidentiality. Ensures that data is accessed only by authorized users with the proper
to changes.
Integrity. Ensure that all data stored is reliable, accurate, and not subject unwarranted
Availability. Ensures that data is readily and safely- accessible and available for ongoing business
needs.

4.10.2 Data Security Regulations


you
Data security is a critical element to regulatory compliance, no matter what industry or sector
organization operates in.
Most if not all regulatory frameworks make data security a key aspect of compliance. Therero
nsure
you'll need to take data security seriousiy and work with an experienced compliance partner to ens
you're employing all the right measures.
entue
22-23)(P7-129)
(SPPU-New Syllabus w.e.facademic year Tech-Neo Publications.A SACHIN SHAHV
(SPPU-SEN
(SPPU-SEM 7-E&TC)
Computing
FIREWALLS ervico Orlented Architecturo
and Cloud Security)....Page no:
411
Nowada it is a big challenge to protect our sensitive
various tools and devices that data from unwan'
'anted and unauthorized sources.
There are can provide differont
security levels and help keep our privat
secure.
data
sch tool is a firewalr that prevents unauthorized
access and keeps our computers and daa sa
secure.
and
this..article, we have talked about firewalls as well as
we ne d
Infirewalls functions«of firewalls, limitations of firowalls,
othor related topics, such as hy
working of firewalls, etc.
Firewall 2
What is a
GQ
L-**
can be defined as a special type of network
.A firewall
onitors and filters incoming and outgoing
program that
security device or a software pro
moni network traffic based on a defined set of security rules. 1
as barrier between internal
acts a
a

private networks and external sources (such as the public Internet).


The primary purpose ot a tirewall is to allow non-threatening traffic
and prevent malicious or unwanted
data traffic for protecting the computer from viruses and attacks.

Afirewall is a eyber security tool that flters network traffic and helps users block malicious software
from accessing the Internet in infected computers.

Firewall

Fig. 4.11.1:Firewall Architecture

a 4.11.1 Firewall: Hardware or Software


This is one of the most problematic questions whether a firewall is a hardware or software. As stated
above, a firewall can be a network security device or a software program on a computer. This means
that the firewall comes at both levels, i.e., hardware and software, though it's best to have both.
Each format (a firewall implemented as hardware or software) has different functionality but the same
a computer network
plurpose. A hardware firewall is a physical device that attaches between and a
gateway. For example, a broadband router.
on the other hand, a software firewall is a simple program installed on a computer that works through
there are cloud-based firewalls. Thev aro
POrt numbers
and other installed software. Apart from that,
nmonly referred to as FaaS (firewall as a service).
SPPU-New
Syllabus w.e.f academic year 22-23)(P7-129)
Tech-Neo Publications..A SACHIN SHAH Venture
Security)....Page ne
Architecture and Cloud
Cloud Computing (SPPU-SEM 7-E&TO) (Service Oriented
they can be managed centrally.
advantage of using cloud-based firewalls is that
Like
A
providing perimeter Becurity.
raware firewalls, cloud-based firewalls are best known for
GQ Why we need Firewall
ca
malwaro and network-based attacks. Addiionaly, they can
are primarily used to prevent
alls
elp in blocking application-layer attacks. These firewalls
act as a gatekeeper
or a barrier, The
network. They do not allow data packets t
nonitor every attempt between our computer and another user-specified trusted source.
DG Lransterred through them unless the data is coming or going from a

and counter-attackg
irewalls are designed in such a way that they can react quickly to detect
aroughout the network. They can work with rules configured to protect the
network and pertorm quick
controller,
assessments to find any suspicious activity. In short, we can point to the firewall as a traffic
Some of the important risks ofnot having a firewall are:

Open Accesss
This means that
a computer is running without a firewall, it is giving open access to other networks.
it is accepting every kind of connection that comes through someone.
In this case, it is not possible to detect threats or attacks coming through
our network. Without a
sources.
hrewall, we make our devices vulnerable to malicious users and other unwanted

Lost or Comprised Data


anyone can
Without a firewall, we are leaving our devices accessible to everyone. This means that
access our device and have complete control over it, including the network.
benefit.
In this case, cybercriminals can easily delete our data or use our personal information for their

Network Crashes
In the absence ofa firewall, anyone could access our network and shut it down. It may lead us to
invest

our valuable time and money to get our network working again.
Therefore, it is essential to use firewalls and keep our network, computer, and datá safe and secure
from unwanted sources.

4.11.2 Brief History of Firewall

Firewalls have been the first and most reliable component of defense in network security for over 30
years. Firewalls first came into existence in the late 1980s. They were initially designed as packe
filters. These packet filters were nothing but a setup of networks between computers.
The primary function of these packet fltering firewalls was to check for packets or bytes transfered
between different computers.
Firewalls have become more advanced due to continuous development, although such packet filter
firewalls are still in use in legacy systems.
Gil Shwed from Check
As the technology emerged, Point Technologies introduced the first statefu
inspection firewall in 1993. It was named as FireWall-1.

22-23)(P7-129)
(SPPU-New Syllabus w.e.f academic year
enture
Tech-Neo Publications..A SACHIN SN
(SPPU-SEM 7-E&TC

tng
Beckin
2000, Netscre
2000 reen came up with
its
Service
Orionted Architecture
and Cloud Security)...Page no (4-29)
within enterprises because purpose-built firowall 'Appliance'.
adophon ithin of increased internet gained popularity and
It gair
enst. The turn ot the
st lower century Baw a
new
speed, less latency, ana put
"
sta
id-2010.
approach to firowall implementation a the

Next Generation Firewalls' were introduced


The by the Palo Alto Netwo
iety built functions and
ariety of built-in capabilities, such
tworks. These firewalls came up
Application and Identity-Based
Applicatio an Hybridid Cloud Support, Network Threa
Prevenntion, Control, and Scalablo Newo
Performance, cte.
ralls are still gett
etting new features
as part of continuous
when comes development. Thoy are considered the first
ine
defense it to network security. i
How does
a firewall work ?

firewall system
A all
system analyzes nebwork traffie based
on pre-defined rules. It then filters the trattic and
prerents any such traffic coming from unreliable or suspicious
ces. It only allows incoming traffic
sources.
to accept.
that is configured
nically,
Typical firewalls intercept
nebwork trafitic at a computer's entry
point, known as a port.
rewalls perform this task by allowing or blocking specific data packets (units of communication
neferred over a digital network) based on pre-defined
security rules.
eeming traffic is allowed only through trusted IP addresses,
or sources.

Public Network

Modem

Network

Firewall

Dustbin
Secure Private Local Area Network
V= Specified Traffic Allowed
X= Restricted Unknown Traffic
Fig. 4.11.2: Working of Firewall

a 4.11.3 Functions of Firewall

What are the different function of firewall

every attempt coming to gain


'Asourstated above, the firewall works as a gatekeeper. It analyzes
or non-recognized sources.
access to
Operating system and prevents traffic from unwanted

W Syllabus wef academic year 22-23(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
Security).. pa
Architecturo and Cloud
Cloud Secuny)FEge no. (a.
(Sorvico Orlentod
Cloud Compuling (SPPU-SEM 7-E&TC) computer system and other network
betweon tho
Since the firewall acts as a barrier or filtor
traflic controller.
.e, the public Internot), we can consider it as a rolling
iniormation by control r

notwork and assessinoe


ssing netwo
Therefore, a firowall's primury function is to E
securo our
and validating access by
traffic, preventing unwanted incoming notwork tralic,
traftic for malicious things such as hackors and mawa and security softwaware come with
builtin
Windows OS)
xamplo are turned on,
Generally, most operating systems (for -
those options
ensure that
tirewall support. Thorefore, it is a good idea to
t the system to be automatically
updated wh.
ghenever
settings of
Can configuro the security
available. capabilities with builtin
varioty of functions and
Firewalls have become sopowerful, and includo a
features
Network Threat Prevention
Application and Identity-Based Control
Hybrid Cloud Support
P Scalable Performance
Network Traffic Management and Control .
Access Validation
o Record and Report on Event

a 4.11.4 Limitations of Firewall


is
considered the first line of defense. But the question
Wnen it comes to network security, firewalls are The answer
these firewalls are strong enough to make our devices safe from cyber-attacks.
whether
may be "no".
Internet. However, it is important to use
The best practice is to use a firewall system when using the
stored on the computer. Because cyber
other defense systems to help protect the network and data
for protecting the home
threats are continually evolving, a firewall should not be the only consideration
network.
The importance of using firewalls as a security system is obvious; however, firewalls have some

limitations
o Firewalls cannot stop users from accesing malicious websites, making it vulnerable to intenal
threats or attacks.
o Firewalls cannot protect against the transfer of virus-infected files or software.
o Firewalls cannot prevent misuse of passwords.
Firewalls cannot protect if security rules are misconfigured.
Firewalls cannot protect against non-technical security risks, such as social engineering
Firewalle cannot stop or prevent attackers with modems from dialing in to or out of the internal
network.
Firewalls cannot secure the system which is already infected.
year 22-23)(P7-129)
(SPPU-New Syllabus w.e.f academic ech-Neo Publications...A SACHIN SHAH Venu
(SPPU-SEM7-E&TC)
outing VICO Olentod Architecturo and Cloud Security)...Page no.
is recommende to keop all Intornet-onabled dovices
refore, it updatod. This includes the latest
tems, web browsors, applications, and other Becurity irus).
software (such as an
he security v
the ocurity of wireless
routers should be anothor
practico.
Besides
protecting a router may include options such anging the router's
nan
as ropoatedly
revieui.
ewing security settings, and
password, croating a guost network for visitors.
and
Firewall
Types of
4.1.3 5
Fnlist Different
types ot Firewall

their structure and functionality,


Depending on their there are different types of firewalls.
following is a list of
some common types of firewalls
The
Proxy
Firewall
Packet-filtering firewalls
o
(SMLI) Firewall
Stateful Multi-layer nspection
(UTM) firewall
Unified threat management
oNext-generation firewall (NGFW)
(NAT) firewalls.
oNetwork address translation
Chapter Ends
UNIT V Cloud Environment
CHAPTER 5 and Application
Development
Unlverslty Preserlbed
Syllabus
d
Cloud Platforms: Google App Engine, Compute Services,
Stlorage Servicos, Communication
azon Web Servicess Architecture and core concepts, Soce
Applcatlon Lifecyclo, Cost Model, Microsoft Azure
Cloud!services
services Azure core concepts, Windows Azure Platform Applianco.

5.1
Cloud Platfoms.. ********************************************* ****s
5-2
n***** ********"
****

*********"********
**********************
What are the Cloud Plattoms Explain any 3 platforms
***** **rss

Ga. ?... *********"*****************400444isssuse re******************|


-2
5.1.1 Types of Cloud Platforms.. **********°********************************************************** 4
*****s*********************** usrons*ss*s**e********
Explain different type of cloud platfom ?..
GQ.
Top Benefits of Cloud Computing..
**********************ssseeasnns .
**.**ssssseseneeoeo**********e*******
5-4
5.1.2 5-5
** *************************sessssssnnnasssssesnnnnssoesaeense************eo**

5.2 Google App Engine. **************************************** *e *****************************s******************os***e********************** 5-5

Ga. What is Google App Engine ?.**************************************************************************** 5-5


5.2.1 Features of Google App Engine... ********************************** ********************e*********
esseesss
5-7
Enlist features of Google App Engine.."*****"**********************as*****eeno*ne**********es********************************* 7
Ga. * ....5
5.3 Compute Services. ***********************************************sssnsnssn*nsaasssas iassaasaase .ossosenanaasesoaonmamas 7 a*******

GQ. Explain Compute Services ?... *********************************************************************** ******************************


+7
Ga. What are the benefits of AWS compute services ?.. ******************************************************************************* 5-8
5.4 Storage Services. ****
******************************************************** ***********************************************
asn
5-9
5.4.1 Cloud Computing Data Storage. .5-10
******************************************************************************************************

GQ. What are Cloud Storage Services?.. ********esenn************** ********e**************************************


*n *nm
.5-10
55 Communication Services.. ******s******sssssnsssssasssnna*ansssnnssan****aaoossesaerannnnsns seeenansanen**anannasnase********************* .5-11
5.5.1 Types of Communication Service Provider.. "**********************************************"*********************************************** 5-11

5.5.2 Communication Services Functionalities.. **********************"**************************************a*****************s****** v 12


12
Ga. What are communication services ?. ********************************* *s**********************e***se****n*
***s********

5.6 Amazon Web Services Architecture and Core Concepts. ********************************************************* **** 13 4*******

GQ. What Amazon Web services


is with architecture ? .. 13

5.6.1 Key Considerations for Web Hosting AWS .. in anaaaaannne 7


.*so*nssnnnsnssnasaseseeannenasnes***nanennan

5.7 Application Lifecycle. ************************************************************************************************************************.**** 5-18


GO. Explain Cloud Computing Application Lifecycle ?... **************************************************"************************** .5-18
5.8 ..
Cost Model ***********************************************aen*a***************** *** .5-20
**************************************a*v
***********************************************************************"**********************************a**** 5-20
GQ. What is Cost Model ?..
5.9 Microsoft Azure Cloud services Azure Core Concepis.. **************************************************?************.******* ******5-22
GQ. What is Microsoft Azure Cloud Services ?.. ****************************************"**************************************** ..5-22
GQ. .... 5-23
*****s***************************************************************************************
What is Azure Cloud?
5.10 Windows Azure Platfom Appliance. ************************************"********"********************************************.*******esssse 25-24
5-24
GQ. What is Windows Azure Platform ?
*******asea*******************************"********°°******************************eesssosee*eaeeessas
asesne***snae*******a******************* 5-25
Chapter Ends.
Application
Development)... Page no(5-2)
i
Cloud Computing (SPPU-SEM 7-E&TC) (Cloud Environment
and

5.1 CLOUD PLATFORMS

and frameworks.
COnputing applications develops by leveraging platforms application.
infrastructure to customize-able ions
Various types of services are provided from the bare metal
serving specific purposes.
GQ What are the Cloud Platforms Explain any 3 platfoms ?

1. Amazon Web Services (AwS)


compute
laaS services, which ranges from virtual
O provides differènt wide-ranging clouds
storage, and networking to complete computing stacks.
Conmpute
compute on demand services, named as Elastic
A 18 well known for its storage and
Cloud (EC2) and Simple Storage Service (S3).
user which can be utilize as the
base
UZ offers customizable virtual hardware to the end large
cloud. It is likely to ch00se from a
nrastructure for deploying computing systems on the
GPU and cluster instances.
Variety of virtual hardware configurations including
for retrieving AWS services, or the web
Either the AWS console, which is a wide-ranged Web portal
is used to deploy the EC2 instances.
services API available for several programming language
instance as image, thus allowing users
EC2 also offers the capability of saving an explicit running
to create their own templates for deploying system.
on demand. S3 is well ordered into
s3 stores these templates and delivers persistent storage
grow with attributes. End
buckets which contains objects that are stored in binary form and can be
them retrieval from
users can store objects of any size, from basic file to full disk images and have
anywhere.
In addition, EC2 and S3, a wide range of services can be leveraged to build virtual computing
system including: networking support, caching system, DNS, database support, and others.
2. Google App-Engine

Google App-Engine is a. scalable runtime environment frequently dedicated to executing web


applications. These utilize benefits of the large computing infrastructure of Google to dynamically
scale as per the demand
App-Engine offers both a secure execution environment and a collection of which simplifies the
development if scalable and high-performance Web applications. These services include: in-memory
caching, scalable data store, job queues, messaging, and corn tasks.
Developers and Engineers can build and test applications on their own systems by using the
App-Engine SDK, which replicates the production runtime environment, and helps test and prohle
applications.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
(SPPU. 7-E&TC)
uting (SPPU-SEM
Gompuuing
Gioud Environment
d completio
tion of development, and Application Dovolopment)..Pago no
On Developers
can oasily move
quotas to containing tho cost their applici
blications to App-Engine, set
generatod, and
corted programming
supported mako it available to the world. Curren
languages aro Python, the
Java, and CGo.
Microsoft Azure
rosoft
Micros Azure 1s a loud operating
systom and a
platform in which u8or can
applications in the cloud. Generally,
a scalable runtime ave the
distributed applications is provided. ronment for web applications and
environ

Application in Azure are organized around


the fact of roles, which identify distribution unit
pplications and express the application's a 10
logic.

.Azure provides a Ser or additional services


that complemont applícation execution such as suppor
for storage, networking, caching, content delivery,
and others.
4
Hadoop

Apache Hadoop 1s an open source framework


that is appropriate for processing large data sets o
commodity hardware.

Hadoop is an implementation of MapReduce, an application programming model which 15


developed by Google. This model provides two fundamental
operations for data processing: map and
reduce.
Yahoo! Is the sponsor of the Apache Hadoop project, and has put considerable effort in transforming
the projeet to an enterprise-ready cloud computing platfornm for data processing.
Hadoop is an integral part of the Yahoo! Cloud infrastructure and it supports many business
processes of the corporates.
Currently, Yahoo! Manges the world's largest Hadoop eluster, which is also available to academie
institutions.

5. Force.com and Salesforce.com


Force.com is a Cloud computing platform at which user can develop social enterprise applications.
The platform is the basis of SalesForce.com a Software-as-a-Service solution for customer
relationship management.
blocks: a complete set of
Force.com allows creating applications by composing ready-to-use
From the design of the data
components supporting all the activities of an enterprise are available.
provided by Force.com as a support.
layout to the definition of business rules and user interface is
provides complete access to its functionalities,
This platform is completely hostel in the Cloud, and
through Web services technologies.
and those implemented in the hosted applications
can state the meaning of the cloud platform. But in
There are a ton of ways in which every individual
system and hardware of a server in an Internet-based
he simplest way it can be stated as the operating
It enables remote and large-scale coexistence of
software and
data center are referred to as a cloud platform.
hardware goods.
Tech-Neo Publications..A SACHIN SHAH Venture
DPPU-New Syllabus w.e.f academic year 22-23)P7-129)
Development)..Page
Cloud Computing (SPPU-SEM
7-E&TC) (Cloud
Environment and
Application
networking,
applicatione
ns,
54
storage, analytics, cent
Compute facilities, such as sorvers, databasos, to invest in data centers
do not necd o
Lgence, are rented by busincsses. As a rosult, busines8es
computing facilitios. Thoy pay for tho servicos they
actunlly
on

5.1.1 Types of Cloud Platforms

GQ Explain different type of cloud platform 7


To meet
-- --
them are suitable for all. the
sizes. None of a
lOud systems come in a range of shapes and
are avallaD
consumers, a rango of modols, forms, and services
eeds of
They are as follows: ar
services over e
Third-party providors that distributo computing cloud platfor
uDc Cloud :
trending and mostly used
* as public cloud platforms. A few good oxamples of IBy
Microsoft Azure, Alibaba and
know
Services),
rC Oogle Cloud Platform, Aws (Amazon Wob
Bluemix. Or n an on.
by a third-party service proviaer
rivate Cloud :A private cloud is normally hosted company and it is the key
dedicated to a single
Center. A private cloud platform is always
aata
difference between the public and private cloud.
by one
series of cloud computing services used prinarily
Ewe can say that a private cloud is a
corporation or organization. cloua
cloud architecture that combines both the publie and private
yDrid Cloud: The type of
programs are easily migrated from oOne
systems is termed to as a Hybrid cloud platform. Data and
flexible while still improving inirastructue
O the other. This allows the company to be more

security, and enforcement.


build them, and store
Organizations can use a cloud platform to develop cloud-native software, test and
back up, and recover data.
The major role of it is that will not only help the company to grow but
also it helps to pertorm the data
analysis with the help of different algorithms and the results can be a true
deal breaker.

Streaming video and audio, embedding information into activities, and providing applications on
demand on a global scale are all possibilities.
Simply stated, cloud computing is the distribution of computing services over the Internet ("the cloud)
in order to provide quicker innovation, more versatile resources, and economies of scale.
We usually only pay for the cloud services that we use, which helps us to cut costs, operate our

.
infrastructure more effectively; and scale as our company grows.

(SPPU-New syllabus we.f academic year 22-23 P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
na
(SPp
(SPPU-SEM 7-E&TC)
pUung oud Envronmont and Application Development)...Page no.
CdS.1.2 Top Bene of Cloud Computlng

nputing represents a significant


Cloud doparture from how
panies have traditionally seen IT
compan

owing
followi are BOven or tne most popular roasons
The why businesseB are moving to cloud compa
ervices:

Cost
rage reduces the upront costs of purchasing
storage
Cloud hardware and software, as well as the cos of
up and
and operating on-site datacenters-8orvor racks, round-the-clock
ing power and cooling, and
onals to manage the infrastructure. It quickly adds
prolessi up.
Global scale
2.
to scale elastically 1s one of the advantages of cloud
The. ability computing services. In other words,
means that we can decide the processing speed, location
simply means of the data center where data is to be storcdy
and even the bandwidth for cour process and
storage data.

3.
Performance

The most popular cloud computng services are hosted on a global network of protected datacenters that
are updated on a regular basis with the latest generation of fast and powerful computing hardware.
4. Security
providers have a comprebensive colletion of polidies, technologies, and controls to help us
Many cloud
o enhance our overal seeurity posture and protect our data, applications, and infrastructure from threats.

5. Speed

It means that the huge amount of calculation and the huge data retrieval as in download and upload
can happen just within the blink of an eye, obviously depending on the configuration.

6. Rellability

Since data can be replicated at several redundant locations on the cloud provider's network, cloud
storage makes data backup, disaster recovery, and business continuity simpler and less costly.

M5.2 GO0GLE APPENGINE

GQ What is Google App Engine

'Google App Engine is a fully managed serverless platform for developing and hosting web applications
at a scale.

Sers can choose from several popular languages, libraries, and frameworks to develop their
applications and then App Engine takes care of provisioning servers and sealing app instances based on
demand. It is a PaaS for building scalable applications.

DrPU-New Syllabus
w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Application
Pageno.
Development)...Pac
Cloud Computing (SPPU-SEM 7-E&TC) (Cloud Environment and 5
environmnent
Engine, one is a standard
Google Cloud provides 2 onvironmonts to uso App
such as Python, Go, node.js.
constrained onvironments and support for languages such as
more freedom such
Plexiblo Environment where developers have
ability to nstallrunni
install
n response timcout, and cus
dockor, longer roquest &
S Using
dopendencios/softwaro, and SSH into tho virtual machine.
1. Standard Environment
It provides users "with he
thefac,
facl
It is based on the container which runs on the Google infrastructure. unt
i load and a ing°
of data
cuSy build and deploy an application that runs under hoavy
and
,
G
upports the following languages:Python, JAVA, Node.js, Ruby,
Fentures of Standard Environment
Persistent storage with queries, sorting, and transactions.
Automatic scaling and load balancing
scope of a request.
Asynchronous task queues for performing work outside the
specific time intervals.
oneduled tasks for triggering events at regular intervals or
Integration with other Google cloud services and APIs.
2. Flexible Environment
concentrate on writing code.
App Engine Flexible Environment allows users to
with
Based on Google Compute Engine, it automatically scales
the app up and down and along
also balances the load. It allows users to customize their
runtime and the operating system of th
virtual machines using Docker files.
Features of Flexible Environment
are Compute Eng
Infrastructure Customization: App Engine flexible environment instances
virtual machines, which implies that users can take advantage
of custom ibraries, use SSH
debugging, and deploy their own Docker containers.

tIt is an open-source community.


SQL and NoSQL databas
Native feature support : Features such as microservices, authorization,
traffic splitting, logging, ete are natively supported.
Performance: Users can take advantage of a wide array of CPU and memory configurations.
Benefits of Google App Engine

The main benefits of Google App Engine are


pop
Open and familiar languages and tools: Users can build and deploy apps quickly using
languages or bring their own language runtimes and frameworks, they can also manage resources fre
the command line, debug source code, and run API back ends easily.

(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications-A SACHIN SHAH Vent
7-E&TO
(SPP
SPPU-SEM OUd Envronment and Applicatlon Dovelopment)...Pago no. (
dConDug Engine protects from security
throats using firewal capabilities, IAM rules, iand
ne
de : App
Just. TTLS
SSL/ certificates 80 that it helps uscers to writo code without any underlying
nanaged
infrastructure,
wha
what you use : t naturally scales rolying upon tho application traftic ana cpe
only for is running.
Pay sst when the code
just
resources

Eeatures of
Features Google App Engine
of Goo
5.2.1
Engine
features of Google App
-

rominent features of Google App Dngine include


Some Users can build the application
uage: Users
language: using language runtimes such as Java, Fya
Popuilar PHP or build their own runtimes.
RuDy Custo App
nexible : Custom runtimes allow users to bring any library and framework to
flexible
Open and a Docker container
supplying
by
to add your web application code to the platform while it
manages ue
anaged: It allows users
managed: w
Fully engine ensures that web apps are secure and running and enables the firewall
ensur
infrastructure.
ture. The engine
from malware and threats.
save them to
diagnostics: Google App engine uses cloud monitoring and cloud logging
erful application uses cloud
health and performance of the app and to diagnose and fix bugs quickly it
nitor the
moni
reporting.
debugger and error test,
lt easily hosts different versions of the app, and create development,
Application versioning:
environments.
staging, and production
Google App Engine helps safeguard the application by defining access rules
Application security :
custom
6.
and leverage managed SSL/TLS certificates by default on the
with an App Engine
firewall
cost.
domain without incurring any additional

COMPUTE SERVICES
5.3

--
GQ Explain

In cloud computing,
Compute Services ?

the
*

term "compute" describes concepts and objects related to software


computation.
networking, storage, and other
It is a generic term used to
reference processing power, memory,
success of any program.
resources required for the computational
graphics rendering functions
example, applications that run machine learning algorithms or 3D
For to run successfully.
require many gigs of RAM and multiple CPUs
compute resources,
RAM, and Graphic Processing Units required will be called
in this case, the CPUs,
compute-intensive applications.
nd the applications would be

Tech-Neo Publications..A SACHIN SHAH Venture


Syllabus w.e.f academic year 22-23)(P7-129)
(SPPU-
rU-New
go r
Development)...Pageno.5
Cloud Computing (SPPU-SEM (Cloud Environment
and Application
7-E&TC)

AWhat are compute servlces ?


plaiOrns, such.
Infrastructuro-a8-a-Service (laas). Compue wor
Oputo sorvices aro also known as lot users migrate rorkloads
and APls that
Oputo, supply a virtual Bervor instanco and storago
to a virtual machino.
configure their computer resource
Users have allocated computo powor and can start, stop, accoss, aand
as desired.
4 How to choose between different AWS Compute Services
requirements, lifecycle, code
ode sie
size,
Choosing the best AWS doponds on your application
infrastructure
:
demand, and computing needs. Tako a look at theso throe examples
erformance
demand instances offering a wide array
If you want to deploy a selection of on-der of different perfo
Cloud (EC2).
benefits within your AWS environment, yvou would use Amazon Elastic Compute
across a cluster of EC
you want to run Docker-enabled applications packaged as containers
instances, you could use Amazon Elastic Container Service (Amazon BCS).

resource response to event.


run your own code using only milliseconds of compute
in
O want to
driven triggers in serverless environment, you could use AWS Lambda.i
Q What are the benefits of AWS compute services

AWS Compute services offer the broadest and deepest functionality for compute. Key benefits of using
AWS Computeinclude:
) Right compute for your workloads

Amazon Ec2 (Amazon Elastic Compute Cloud) offers granular control for managing application

infrastructure with the choice of processors, storage, and networking.


Amazon Elastic Container Services (Amazon ECS) offer choice and flexibility to run containers.
(ID Built-in security
AWS offers significantly more security, compliance, and governance services, and key features than
the next largest cloud provider.
The AWS Nitro System has security built in at the chip level to continuously monitor, protect, and
verify the instance hardware.
(II) Cost optimization

With AWS compute you pay only for the instance or resource you need, for as long as you use it, without
requiring long-term contracts or complex licensing.

TV Flexibility
AWS provides multiple ways to build, deploy, and get applications to
market quickly.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129)


Tech-Neo Publications..A SACHIN SHAHVenture
(SPPU-SEM 7-E&TC)
awCopuuting (Cloud Environmont
example, azon and pplicatlon Dovelopme no.(5-9)
LightSail is
For i an Cay-L0-Us0 Bervico
uild an application or wobsite that offers you evorything you neea

To
determine which, AWS Compute servico
Touch with our toam of experts is beat suited to gro
grow your business, don't hesitate to
Get in or sign-up for
a Free AWS Accour
ount today.
STOR GE SERVICES
5.4
Storage a service that allows to
Cloud savo data on offsito
accessible by a web services API. storago ystem
syst managed by third-party
nade
mac
andis
device
Storage Aevices can be broadly classified into two categories:
Block Storage Devices
1
File Storage Devices
2
Storage Devices: The block storage devices offerraw
1. Bl storage to the clients. These raw storB
to create volumes.
are partitioned
le Storage Devices: The ile Storage Devices offer storage to clients
in the form of files, maintaining
n file system. This storage is in the form of Network Attached
Storage (NAS).

Cloud Storage Classes


Cloud storage can be broadly classified into two categories:

1 Unmanaged Cloud Storage


2. Managed Cloud Storage

1. Unmanaged Cloud Storage

Managed Cloud Storage


Unmanaged Cloud Storage
Unmanaged cloud storage means the storage is preconfigured for the customer. The customer can
neither format, nor install his own file system or change drive properties.
2. Managed Cloud Storage

Managed cloud storage offers online storage space on-demand.


The managed cloud storage system appears to the user to be a raw disk that the user can partition
and format.

Creating Cloud Storage System


cloud storage system stores multiple copies of data on multiple servers, at multiple
locations. If one
The
to location, where the object is stored.
sy'stem fails, then it is required only to change the pointer the

SPPU-New Syllabus w.e.f academic year 22-23)P7-129)


Tech-Neo Publications..A SACHIN SHAH Venture
Applontlon
Dovolopmont)..Pago no,
Cloud Computing (SPPU-SEM 7-E&TO) (Cloud Envlronmont nnd
cun HO orugo uno
ntorugo nyntomn, tho oloud providor
To ggrognto tho ntorngo naauln into eloud fotehe
cronton n
virtunlization lnyor tlnt chon ator
virtunlizntion nollwaro known an Storngo HRID, It from c
ayntom. It cnn nlso munngo datn CIEg
from diftoront atorago dovleon into n ninglo managoment
and NPS ilo ayatoma ovor tho Intornot. cloud8
virtunlizoa tho ntorago into ntorago
Tho folowing dingram alhowa how Storago GRID Applicatlon
Appllcatlon
Appllcatlon

HTTP
CIFS NFS

Bycast Storago GFRID vlrtuallzatlon layor

SATA TAPE Others


SANs SCSI SATA
Backup Slito
Maln Slto
Mg. 5.4.1: Cloud Stornge Services

5.4.1 Cloud Computing Data Storage

GQ What are Cloud Storage Servlces ?

Virtual Storage Contalners


The virtual storage containers offor high porformance cloud storago systeme.
Logical Unit Number (LUN) of dovico, files and other objects are created in virtual storage container
Following diagram shows a virtual storago containor, dofining a cloud storago domain:

Virtual Storage Contalners


Challengcs

Storing the data in cloud is not that simple task.


Apart from its flexibility and convenienco, it also has sevoral challengos faced by tho customors.
The customers must be able to:
1. Get provision for additional storago on-demand.
2. Know and restrict the physical location of the stored data.
3. Verify how data was orased.
4. Have access to a documented procoss for disposing of data storago hardware.
5. Have administrator access control over data.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Ventue
(SPPU-SEM 7-E&TC)
Computing
ing
(CloudEnvironmont
MUNICATION SERVICES and Application Dovelopment)...Page no.
oud (5-11)2
CO
5.5
mmunication Service
Comn
Provlder
What is (cSP)?
anication service
refers to the communi providers. They
CSP provido us ser
different fields ofcommunication media. Bervices in different means or 1n

Conmuni ation service providor (CSP) is actually


aunication service providor, a goneric torm
lots of category of service providers.
or is a cate
As a. companies provide different services for
mple, ISP (Internet Service Provider) different purpose
f
ror
provider
exaep) their work is to provide servico
comes in the
category of the communication servi
of internot data among
people.
net Service
(Internet Service Provider) only provides
intornet
ISP data to the people also there are many compan
world that are providing services
world
across the to the people for
better communication among peoP
among countries.
munication Service
Telecommunication Service Provider ('TSP) also comes
under communication service provider (r
oir work is to provide landine
Their connections or wireless connections,
cable operators (companies),
satellit transmissi they all are known as Communication
Service Provider.
Tadays, some mobile companies are also working as
communication service providers.

45.5.1 Types of Communication Service Provider

There are many types of service providers, all the different service providers are listed below:

1.
Telecommunication services provide : These are the service providers who are responsible for
landline or wireless connections. this type of provider is having its different branches like cable
providers,satellite transmission is included in this category of service providers. Also, mobile
companies that provide devices to users and also internet service provider (ISP) comes to TSP.

2 Entertainment service providers: These providers help in Tv transmissions like the different
niches of channels which are running on the tv or theaters comes to the category of entertainment
service provider music industries and video games industry also comes to this category.
For example: motion pictures, theaters.
3. Media/web services: These providers provide services related to the web shows, media, series, movies
on the internet over a web platform, known as media or web services.

For example : Amazon prime video services, Netflix, etc.

BAdvantages of Communication Service Provider (CSP)


. Communication Service Providers play a vital role in communication across the world.
people connect with each other.
2.They do mass production through which a large number of
3.
that today users can interact with the world.
CSP provides
now people can connect with anyone
They made people's life easier in terms of communication because
anywhere in the world.
cap was about 1.4 trillion dollars.
CSP contributes to the world economy, last year their market
Tech-Neo Publications...A SACHIN SHAH Venture
SPPU-New Syllabus
wef academic year 22-23)P7-129)
Applicatlion
Dovolopmont)...Page no. (s.
Cloud Computing (SPPU-SEM 7-E&TO) (Cloud Envlronmont and

Disadvantages of Communication Service Provider (9


1. Companies collect user data and sell it to others.
2.There can be fraud in the means of providing services.

3. The user has no control over providers.


4 Some services cost too much that cannot be afforded.

5.5.2 Communication Services Functlonalities

GQ What are communication services ?


Thnere need8 to be an
A business organization must have constant
contact with the outside world.
communication is the cornerstone of any
exchange of information and ideas. This is why effective
successful company.
suppliers, the government ete.
conpany must communicate with its employees, customers, buyers,
inexpensive.
For any communication service to be effective it must be fast and
Decome highly
in the last few decades with the rapid technological
advancements, communication has
effective now.
is the reason we have a
n tact, the advancement of the internet (with its communication capabilities)
global economy.
generally rely on,
There are two main communication services in India that businesses
of our society. They provide various
1. Postal Services: The Indian Post Office is an important part
post offce also provides
types of mail and telegraph services pan-India. But did you know that
financial services similar to banks?
Telecom Services : Telecommunication infrastructure is a very important part of country's
a
2.
infrastructure and essential to its progress. These services include cellular services,
internet

services, DTH services etc.

Transportation
Transportation is concerned with the transport of goods and raw materials. However, transportation is

not only the freight but all the auxiliary services associated with them.
The main function of transportation is to overcome the barrier of place
The goods will be made available to the end consumer no matter where they are located in the word
They will be transported from their place of production to their place of consumption.
To keep up with an expanding business, transportation services must also keep up. One main factor is
the infrastructure of the country.
Roads, railways, ports ete must be taken care of. It is both the responsibility of the industries and the
government.

(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications.A SACHIN SHA Venture
ting(SPPU-SEM 7-E&TC)
ComPUting.
Environment and Application Development)...Page no. (
Warehousing
Coud

nication Services, Transportation and Warehousing


Comm
e goods
are produce
uced they also
must be stored. There
This systematic is generally a lag time between production
ntion. and scientifie storage and maintenance of is
andcoiwarehousing good and raw materials
of goods
called
ssing isn't merely storing goods in a shed.
Warehousing
ax It is a logistics center, which provides a variety f
services. They
They are responsible tor inventory management,
which includes providing the proau tio n
ats with the right quantity of goods at the correct
depa time intervals.
tyoesof warehouses based on the ownership
Ther of them. Some of them are
Private Warehouse: Owned and operated by the compa
itself. Private warehousing requires
1.
huge capital investment but it provides the company with full
and complete control. It is ideal for
ganizations that have a huge inventory and a high
organi turnover like for example a chain retail store.
Public Warehouses: Here you use a warehousing facility in exchange for a fee. While u
2. P
nership will not be the company's it is a cost-effective method. The government will regulate
owner

euch warehousing facilities. The owner of a public warehouse is expected to take reasonably Eoou
care of the goods.

3.
Ronded Warehouse: These are warehouses for imported goods. The goods will be in storage
the facility till the importer pays his custom duty and other such taxes. So the goods are said to be
in a bond.

NE& AMAZON WEB SERVICES ARCHITECTURE AND cORE CONCEPTS


This is the basic structure of AWS EC2, where EC2 stands for Elastic Compute Cloud. EC2 allow users
to use virtual machincs of different configurations as per their requirement. It allows various
configuration options, mapping of individual server, various pricing options, etc.

We will discuss these in detail in AWS Products section.


.Following is the diagrammatic representation of the architecture.

GQ. What is Amazon Web services with architecture?


-

Amazon Web Services (AWs)


AWS consists of many cloud services that you can use in combinations tailored to your business or
organizational neds. This section introduces the major AWS services by category.
To access the services, you can use the AWS Management Console, the Command Line Interface, or
Sotware Development Kits (SDKs).
AWS Management Console Access and manage Amazon Web Services through the AW
Management Console is a simple and intuitive user interface

SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
.
Page no.
Environmont and Application Dovolopmont)... 5-14)
Cloud Computing (SPPU-sEM 7-E&TC) (Cloud
man.
Lino Intorfaco (CLD is a unified tool to anage
AWS Command Lino Intorfnco: The AWS Command you can conurol multiple Aws
to downlond and configure,
yoir AWs sorvicos.11 With just ono tool
through scripts.
servicos fhom tho command lino und automato them
simplify using AWS services in
Dovclopmont Kits (SDKs)
.

Software Developmont Kits: Softwaro langua


Intorfaco (API) tailored to your programming age
your applications with an Application Program
or plattorm.

Compute secu
(Amazon EC2) is a web service that provides
Amaron EC2 Amazon Elastic Computo
: Cloud
computing easier to
computo capacity in tho cloud. It is designed to make web-scale
esizablo
developers.
capacity with minimal
you to obtain and configure
The Amazon EC2 simplo wob servico intorface allows
computing resources and lets you run n
friction. It provides you with complete control of your
Amazon's proven computing environment.
Service (ECS) is a highly scalable, high.
Amazon EC2 Container Service: Amazon EC2 Container
containers. It allows you to easily run
performanco container management service that supports Docker
applications on a managed cluster of Amazons EC2 instances.
(ECR) is a fully-managed Docke
Amazon EC2 Container Registry: Amazon EC2 Container Registry
manage, and deploy Docker container
container registry that makes it easy for developers to store,
images.
(ECS), simplifying your development to
Amazon ECR is integrated with Amazon EC2 Container Service
production workflow

storage
object storage with a simple web
Amazon S3: Amazon Simple Storage Service (Amazon S3) is an
anywhere on the web.
service interface to store and retrieve any amount of data from
(Amazon EBS) provides persistent block
Amazon Elastie Block Store :Amazon Elastic Block Store
AWS Cloud.
storage volumes for use with Amazon EC2 instances in the
provides simple, scalable
Amazon Elastic File System : Amazon Elastic File System (Amazon EFS)
file storage for use with Amazon EC2 instances in the AWS Cloud
low-cost storage service for data
Amazon Glacier: Amazon Glacier is a secure, durable, and extremely
archiving and long-term backup

rDatabase
engine
Amazon Aurora: Amazon Aurora is a MySQL and PostgreSQL compatible relational database
combines the speed and availability of high-end commercial databases with the simplicity and cose
that
effectiveness of open source databases atr
Venture
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) LTech-Neo Publications..A SACHIN SHAH
Comouting(Sp
(SPPU-SEM
g
7-E&TC)
Cloud Envitonment
and Application Doveloprnent).Pago (5-15)
avd nRDS: Amazon Relational Database
Sorvice Amnzon
relational database in tho rate,
le cloud NDS) makes it easy to set up,

namoDB: Amazon DynamoDH


Dynai
Amazon is a fast and
thatrneed consistent, single-digit
lications that flexible NoSQL database Berv
millisccond latency
nt nny scale
Intermet

AWS Region Domain name

EC2 Elastic IP
Instance Upload to $3 bucket
System and application ogs
Storage

EBS
volume

AWS security group


F EBS volume
Upload to S3 bucket Storage

snapshot
Fig. 5.6.1: AWS Architecture

Load Balancing
Toad balancing simply means to hardware or software load over web servers, that improver's the

efficieney of the server as well as the application.


Following is the diagrammatic representation of AWS architecture with load balancing.

Hardware load balancer is a very common network appliance used in traditional web application
architectures.
. AWS provides the lastic Load Balancing service, it distributes the traffic to EC2 instances across
multiple available sources, and dynamic addition and removal of Amazon EC2 hosts from the load
balancing rotation.
Elastic Load Balancing can dynamically grow and shrink the load-balancing capacity to adjust to trafic
demands and also support sticky sessions to address more advanced routing needs.

Amazon Cloud-front

.It is responsible for content delivery, ie. used to deliver website. It may contain dynanmic, static, and
streaming content using a global network of edge locations. Requests for content at the user's end are
automatically routed to the nearest edge location, which improves the performance.
Amazon Cloud-front is optimized to work with other Amazon Web Services, like Amazon $3 and
Amazon EC2. It also works fine with any non-AWS origin server and stores the original files in a
similar manner.
In Amazon Web Services, there are no contracts or monthly commitments. We pay only for as much or
as little content as we deliver through the service.

U-New Sylabus wef academic year 22-23)(P7-129) Tech-Neo PublicationsA SACHIN SHAH Venture
Applicalion Doveopmont)... Pagono.
no (5-18
Cloud Computing (SPPU-SEM 7-E&TC) (Cloud Environment and

Elastic Load Balancer


porformancd.
t 1s used to spread the traffic to wob sorvors, wlhich improves
to BC2 instances Over
sorvice, in which traffic is distributed
AWS provides the Elastic Lond Balancing hosts irom
fro the load.
addition and romoval of Amazon EC2
multiple available zonos, and dynamic
balancing rotation.
and ahrink the load-balancng capaciy as per the tra
Blastic Load Balancing can dynamically grow
conditions.

Security Management
called security groups, which is similar to a
Amazon's Elastic Compute Cloud (EC2) provides a feature
source IP ranges that
specify the protocols, ports, and
inbound network firewall, in which we have to
are allowed to reach your EC2 instances.
groups, each of which routes the appropriate
Each EC2 instance can be assigned one or more security or P addresses whieh
configured using specific subnets
traffic to each instance. Security groups can be
limits acess to EC2 instances.

Elastic Caches
memory cache in the cloud.
Amazon Elastic Cache is a web service that manages the
role and helps to reduce the load on the
services,
In memory management, cache has a very important
frequently used information.
improves performance and scalability on the database tier by caching
the

Amazon RDS
access as that of MysQL, Oracle, or
Amazon RDS (Relational Database Service) provides a similar
Microsoft SQL Server database engine.
Amazon RDS.
The same queries, applications, and tools can be used with
manages backups as per the user's instruction. It
It automatically patches the database software and
also supports point-in-time recovery. There are no up-front investments
required, and we pay only for
the resources we use.

Hosting RDMS on EC2 Instances


choice
Amazon RDS allows users to install RDBMS
(Relational Database Management System) of your
required.
ike MySQL, Oracle, SQL Server, DB2, etc. on an EC2 instance and can manage as
. Amazon EC2 uses Amazon EBS (Elastic Block Storage) similar to network-attached storage.
data and logs running on EC2 inst es should be placed on Amazon EBS volumes, which wlu
All
available even if the database host fails.
increase
Amazon EBS volumes automatically provide redundancy within the availability zone, which
the availability of simple disks.

(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) e Tech-Neo Publications. A SACHIN SHAH


Ventur
(SPPU-SEM 7-E&TC)
onputing
ing (Cloud Environmont
and Application Dovelopm Pago no. (5-17)
Coud not
the volume is not suficiont for
Further uour aatabasos
databaso8
nods,
neoda, volume
rformanceffor our database. volumo can bo added to increase the
Amazon RDS, the sservice provider manages
ing tho storago and we
us on managing the iata.
only focus
Backun
ups
storage and
provide
provides various options for storing,
AWS cloud
ad
accossing, and backing
up web applicatíon dati ano
assets.
Amazon $3 s3 (Simple Storage Service) provides a simple
The web-services interface that can be used
retrieve any amount of data, at any time,
store and from anywhere on the web.
azon S3 stores data as objects within resources called buckets.
store as many objects as
The user can stor
enirement within the bucket, and can
perred read, write and delete objects from the bucket.
ean BEBS effective for data
Amazon EBS is that needs to be accessed as block storage
and requires persistence
Lauond life of the running instance, such
beyo the as database partitions and application logs.

Amazon EBS volumes can be maximized up to 1 TB, and these volumes can be striped for larger
volumes and increased performance.
Provisioned IOPS volumes are designed to meet the needs of database workloads that are sensitive to
storage performance and consistency.

Amazon EBS currently supports up to 1,000 1OPS per volume. We can stripe multiple volumes together
to deliver thousands of IOPS per instance to an application.

Auto Scaling
The differenco between AWS cloud architecture and the traditional hosting model is that AWS can
dynamically scale the web application fleet on demand to handle changes in traffc.

In the traditional hosting model, traffic forecasting models are generally used to provision hosts ahead
of projected traffic.
In AWS, instances can be provisioned on the fly according to a set of triggers for scaling the fleet out
and back in.

Amazon Auto Scaling can create capacity groups of servers that can grow or shrink on demand.
in AWS
A5.6.1 Key Considerations for Web Hosting
Folowing are some of the key considerations for web hosting-

No physical network devices needed


routers, and load-balancers for AWS applications no longer
AWS, network devices like firewalls, solutions.
software
e on physical devices and are replaced with 2Zeus
Mult to ensure quality software solutions. For load balancing choose
ple options are available
HAP VPN connection choose Open VPN,
OpenSwan, Vyatta.
Toxy, Nginx, Pound, ete. For establishinga
etc.
(SPPU-New Tech-Neo Publications..A SACHIN SHAH Venture
Syllabus w.ef academicyyear 22-23)(P7-129)
Dovolopmont)....Pano
nt)...Pageno.
Applilcation
Environmont and 5-18
Cloud Conputing (SPPU-SEM 7-E&TO) (Cloud

No sacurlty concerns
lhost ia lockod down.
AVS providon a moro Becurod nodol, in wlhich ovory
tho architecture, and aa 1
doslgnod for onch typo of host in larg
Aazon EC2, aoeurity groupH aro acce88 amon
onablo minimum
bo crontod to hota
Varioty of simplo andd tiorod aocurity modola ean
within your architocturo ns por roquiromont.

Avallnbllty of data conters


and provides.
onsily availablo at most of tho availability zoncs in AWS region
BC2 instancos aro
high availability and
reliability.
or doploying your application acro8s dnta contors for both

N 5.7 APPLICATION LIFECYCLE

time and will continue to grow by many ffolds


Cloud Computing is the booming industry of tho prosent
in tho nonr futuro.
cost-offective place to store your data and
Nowadays, it's roally hard to find a safo, socure, and yet
i8 vanishing exponentially,
businoss-critical idens. But, with the riso of cloud computing, this problem
but can also be accessed easih
Cloud providos us with a placo where your data can not only be stored
ovor tho intornot.

Using Cloud Computing you can also host and manage your applications.

GQ Explain Cloud Computing APplication Lifecycle.


--. -~~ ------*
By using Cloud Computing Solution, we get various benefits, some of which are as follows -

Improvod software and har vare performance : Through cloud computing solution one can easily
mako out what will bo the bost software and hardware specification for the better performance of te
application running on the cloud.
Flexibility and affordability : Cloud Computing provides its users with a wide variety of deploymet
modols and functions through which they can chooso the best options for their applications. Clovd
sorvices aro much more affordable.

Incrensed uptime and availability: It is highly available and has a great uptime which help's
managing more amount of traffic at a particular time.
Better collaboration with real-time sharing: Cloud computing has great real-time sharing.
Cloud Computing is available for every kind of users who want to deploy their applications onto
cloud service.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Ventut


Tech-Neo Publications..A SACHIN SHAH
SPPU-SEM 7-E&TC)Atr oud Environment and Application
Dovalopmont)...Pago no. (
Automat
utomatlon Roqulmamonts
Build
uawe6eueN Dofinition

aquireio
Stony

ALM
Application
Lifecycle
tew
Management
cer
pue Stories
pejewon
p ackI
Mar
ueuuebeueyN
peje/beui
te an
I
aa)wou
uJoInU) 9
JuQwdoje

d legiaytit s ban do g 5.1.1 : Application Lifecycle Management raiard griy i


Cloud Computing Solution
SLife Cycle of
To ereate
such a cloud platform, it takes a long number of steps and dedicated time. Let's now look at
the steps involved or the lifecycle of cloud computing solutions. tn
Step 1:Define the Purpose
you
The first and foremost step is to define the purpose for which you want to create a cloud. For this,
have first to understand your business requirement and what type of application
you want to run on the
cloud. After this, you have to decide whether you want your cloud to be public, private,
or hybrid.

Step 2: Define the Hardwareobi nrgs


process. One needs to be
Decicing what type of hardware, you will need is the most thought after the
very precise in making the decision. For this, you will have to choose the
compute service that will
to maintain your application running.
provide the right support when you resize your compute capacity
Step 3:Define the Storage
For any
be stored safely.
very application needs a good amount of storage where it's data can
application storage type that should be chosen carefully for this
one should choose the storage service
Where they can back up and archive their data over the internet.

Step 4:Define the Networkg oandtiza'e inaitu


to So, the nebwork must be configured
end-users.
WOTking is the key that will deliver your data the
can not break into the network. One should define the
Crely and should be flawless so that intrudersapplications with low lateney and high transfer speed.
Work that securely delivers data, videos, and
netwo.

SPPU-N
New Syllabus wef academic year 22-23)MP7-129)
Tech-Neo Publications..A SACHIN SHAH Venture
Development)...Page
Application no.20)
Cloud Computing (SPPU-SEM 7-E&TC) (Cloud Environment and

Step 6: Dofine the Security


service which
enables.
es services
security for use
iecurity is a koy aspoct of any application. Set up your
rces.
usors on your rebea
authentication or limiting accoss to a cortain sot of
Step 6: Define the Managoment Process and Tools you
resource and to contigure these should
should have completo control over there resources
n developer your cloud environment,
used, anad
the
8ome management tools which monitor
OLC
customer application running on it.
Step 7: Testing tho Process
lifo cycle of deploying any application. All the faulta can
Testing is yet another important thing in tho you should verif your
procoss involved in it. During testing,
Tigure out only through the testing your code quickly.
developer tools where you build, test, and deploy
application using various
Step 8:Analytics querying data instant
service where you can start ntly
Pinally, analyze and visualize data using analytics your application becomes read
is done complete, ady
and get results then and there only. Once analyzing
you deploying.

DAdvantages
hardwa
to save substantial capital costs as it does not need any physical re
1. Cost Saving: It helps you
investments.
your service quickly in fewer clicks.
High Speed: computing allows you to deploy
QCloud
2
cloud computing.
3. Backup and restore of data: Backup and restore of data is easy in
4. Reliability : It is highly reliable to use cloud computing solutions.

Disadvantages
internet
1. Performance can vary: Its performance depends on the speed and quality of the
2. Downtime: Cloud Computing Solutions has a great span of downtime.

3.8 COST MODEL

What is Cost Model?

Cost estimation simply means a technique that is used to find out the cost estimates.
n
The cost estimate is the financial spend that is done on the efforts to develop and test software
Software Engineering.
Cost estimation models are some mathematical algorithms or parametric equations that are used to0
97estimate the cost of a product or a project. d 1i en
d sitsb iiot

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC)
(Cloud Environmont
models
odels and Appllcation Dovoloprmont)...Pago
chniques or are availablo for on Devolopment)... no. (5-21)
Vario
ous cost estimation,
below; nlso know Cost Estimation Models
shown
5 Cost Estimatlon
Modols

Empirical Houristic
Estlmatlon Techniquo
Techniquo Analylical
Estimatlon Technique
Fig. 5.8.1:CostEstination
Model

nirical Estimation Technique


stimation is a technique or model
rical
Bop in which empirically
he data that are a required and essential
derived formulas are used 10 for
predicere uSually based on the part of the software project plannis
ning step. These
techniques are usually based data that is collected
previously from a project and also based on
some guesses,
prior experience with the development
of similar types of projects,
ts, and assumptions. It
size of the ware to estimate the effort.
uses the
this hnique, an educated guess of project parameters
is made. Hence, these models are based 0n
In com
sense. However, as there are many activities
involved in empirical estimation techniques, Ls
onte is
formalized. For example Delphi
techniq technique and Expert Judgement
technique.
Heuristic Technique
word is derived from a Greek word that means to
etie
Heu discover. eron
tie
he heuristic technique is a technique or model that is used for solving
problems, learning, or discovery
in the practical methods which are used for achieving immediate goals. These techniques are flexible
and simple for taking quick decisions through shorteuts and good enough calculations, most probably
when working with complex data. But the decisions that are made using this technique are necessary to
be optimal.

In technique, the relationship among different project parameters is expressed using mathematical
thise

equations

The popular heuristic techníque is given by Constructive Cost Model (COcOMO). This technique is also
used to increase or speed up the analysis and investment decisions.

Analytical Estimation Technique


Analytical estimation is a type of technique that is used to measure work. In this technique, firstly the
task is divided or broken down into its basic component operations or elements for analyzing.

Second, if the standard time is available from some other source, then these sources are applied to each
element or component of work.

Third, if there is no sueh time available, then the work is estimated based on the experience of the
Work.

FU-New Syllabus w.ef academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Development).
Application ge ( no.
(Cloud
Environment and
Cloud Computing (SPPU-SEM 7-E&TC) oject.Hence,
about the project
basic assumpt10ns
making cortain the
In this technique, results are derived by
analytical estimation techniquo has some scientific bas nodel.
analytical estimation nou
alstend's software scionce is based on an
AZURE CORE
CONGEFS
MICROSOFT AZURE CLOUD SERVICES
A
7
GQ What is Microsoft Azure Cloud Services
or services that wa
provides a wide variety can u

computing platform that development of solution


erosott Azure is a cloud hardware. It enables the fast tions and
without purchasing and arranging our on-premises environmes
be achievable in an
ment.
that may not
provides the resources to complete tasks us to put our ef.
network, and application services allow ffort into
AZure Services like compute,
storage,
assembly of physical infrastructure.
worrying about the
Dulding great solutions without the idea about all the Azue tke
fundamentals of Azure, which will provide us
This tutorial covers the developing solutions. After
completino
this
know to start
services that we are most likely required to
Microsoft Azure certifications..
crack job interviews or able to get different
tutorial, we can
rd aloarax re st
er urpirt
at
What is Azure
by Microsott that hosts
computing services created Jo
Microsoft Azure is a growing set of cloud
new application, and also enhances our on-premises
existing applications, streamline the development of a
deploying, and managing applications and
applications. It helps the organizations in building, testing,
services through Microsoft-managed data centers.dn ot oss iaidor ln n
lsuonrdt ncoinie5 douga Microsoft
Hgr ooz binttuotle
eMicroservices using Azure Container Service
*************************
*
Public nodes Backend nodes Storage (managed) i

Client
sQL database
Load
balancer

DocumentDB

Cluster
Load management
DevOps
balancer Storage blob
Virtual
***************. neiwot.....
Fig. 5.9.1: Microsoft Azure

enture
(SPPU-New Sylabus wef academic year 22-23)(P7-129) Tech-Neo Publications.A SACHIN SHAH
SPPU-SEM 7-E&TC)
(SPA
omputing loud Environment and Application Devoloprnent)..Pago
Services
ces
o.(
fAzure
Compute
eervices It includes the Microsoft Azure
Cloud Services, Azuro Virtual Machines, re
and Mobile Services,
bsite,and.Azure which processes the data
on the cloud with the help of prmerD
processors

s: This
rvices: This service is used to store data over
the cloud
that can be Bcaled according o u
Data.
onts. It includes Microsoft Azure Storage (Blob, Queue Table,
and Azure File services), Azure
Database, and the Redis Cache
sOL
lication services: It includes services, which help us to build and operate our application, like the
:

APActive Directory, Service Bus for connecting distributed


Azure. sing big
systems, HDInsight for proces51ng
the Azure
Scheduler, and the Azure Media Services.
data,
re services: It helps you to connect with the cloud
Networ.
Networ
and on-premises infrastructure, v
Virtual works, Azure Content Delivery
ludes
incluc Network, and the Azure Traffic Manager.
Cloud ?
What is Azure
Go

MicrosoftAzure is one of the biggest worldwide cloud computi platforms. It has the prestige and
majesty that Microsoft products deserve.

Azure,
Aaure,with a countless number of services, is really a great cloud platform that should be explored by
any developer entering the
cloud arena.

From basic mobile app hosting to full virtualized networks and AI databases, Azure has a wide breadth
of uses for development teams. It empowers organizations to meet current and future business

challenges. For many, it bridges the gaps between what is possible in science fiction to the real world,
bringing "smart" technology to businesses and software development firms.
. Microsoft Azure has so many features and use cases, that it can be difficult to fuly diseuss them in such
a small forum, such as this article. However, this will not stop us from going ahead and trying to take a
deep dive into Azure's countless technology oceans.

Azure Cloud currently includes more than 100 services, most of which mainly fall in these services
categories:

Compute Services: Cloud computing vith a special focus on Virtual Machines, Containers, and
Serverless Computing that you can scale on-demand and on a pay-as-you-go basis

Networking : Private and public networks; connect on-prime networks with Azure. VPNs and
load balance features.

Storage : Either by disks, file, Blob, or archive. Attach to VM and database. Also, expand and
shrink per needs.
oMobileApps : Create and deploy native mobile apps across Azure platforms with the help of
gnitive and AI services.

Databases : Choice ofvarious types of databases, including MysQL, MariaDB, PostgreSQL, and
COSmos DB. Developers can build a new database or migrate existing databases.

New Syllabus
w.e.f academic year 22-23)P7-129) Tech-Neo PublicationsA SACHIN SHAH Venture
Application Der
Development)..Pa no.(5-2A
Environmont and
(Cloud applications with additio
Cloud Computing (SPPU-SEM 7-E&TO) web
deploy wobsites and special
Cloud Web Hosting: Create and
you store and
nd analyze
features.
of data, Azure heips tha
amount
51g :
Data yourontorprise has a hugo
data for botter decision-making. on a managed platform
and deploy applicatiOns
Hosting and DevOps : Dovolop, run,
APP deploy disi
cluding SAP and SQL. sorvices and uOdes
d

prebuilt cognitive
: Throw
Al and Machine Learning
to monitor.
applications.
smart devices and manago them with lol Azure hubs im
0Tintegrate sensors and
assets. strate workloma
to orchestrate
connect with applications
Wo

services, and
lategration: Deploy logic apps andparadigms like Mixed Reality.
managema.
tor business. Also, try new software Alongside Azure identity ent for
Included in the Azure infrastructure and services.
Seeurity :
account management.
better control, including centralized
ARRLIANGE
WINDOWS AZURE PLATFORM
5.10
GQ. What is Windows Azure Platform
data centers and
Azure platform can also be deployed as an appliance on third-party
The Windows
physical servers of the datacenter.
constitutes the cloud infrastructure governing the
Microsoft-specifed
Appliance includes Windows Azure, SQL Azure, and
The Windows Azure Platform
configuration of network, storage, and server hardware.
The appliance is a solution that targets governments
and service providers who want to have their owm
cloud computing infrastructure.

Windows Azure

( O-
SCompute Storage
Blots, Table, Queues

Fabric controller
N

Fig. 5.10.1: Windows Azure


ding
As introduced earlier, Azure already provides a development environment that allows buila
applications for Azure in their own premises.
for
The local development environment is not intended to be production ed
middleware, but it is desIgu
developing and testing the functionalities of applications that will ure.
deployed on A
eventually be
Ventue
(SPPU-New Syllabus we.f academic year 22-23)(P7-129) SHAH
Tech-Neo Publications..A SACHIN
(SPPU-SEM 7-E&TC) (Cloud Envlronmont
Conputing
tina and Applonllon volopmant)...Pago no. (-26)
is instead
ance a full-fonturod
zdgheAzure appli,
third-party infrast
astructuro
implomontation
of Windown Azure, 1ts gonl in w ro licata
a and mako avallnblo
ure on
Aure vicon boyond the oundarias of t the
itn norvicor
Cloud.
Microsoft
appliaance addressos two major Bconarios: institutions
The government
ment agencios) and institutione that that hnvo voryry largo tomputing ne
cannot afford to tranafor
(such as thelr data outside thelr
premises.

Windows Azt re provides data confidontinlity vin idontity


and accoRn managoment, isolathon, nnd
encryption.

identity and access managomont mochaniem ndopt aorvlco mnni ngomont


The AlI (BMAP) to provide
services via the Representational Stato Transfor (1REST) protocol,
via
web which runs over B9l ana
ertificate and privato koy gonoratod
by tho customor.
Windows Azure does not grant customers with administrativo nccons to
thoir VMs. By default, customer
re is restricted to running under an account with low privilogo. By this, tho level of attack will
reduced.

nunication between Azure internal compononts aro always protocted with SSIL and vía
Communica mutual
authentication.

Toassure data confidentiality, Azure provides isolation at difforont lovela: hyporvisor, root 0S, guest
VM, and fabric controller.

Customer access infrastructure is also logically isolated from customor applications and ntorage.
.
,
Criticalinternal stored or transmitted data can be encrypted with the NET Cryptographic Service
Providers (CSPs) provided by the Azure SsDK. Azuro's storago Bubeyatom provides data deletion
a
operations for customers. If the execution of data delete operation is auccoRful, all the refereneesto
that associated data item are removed and the data will not be accossible via tho storago APIs.
Chapter Ends
O00

eroiulo 19q @qei newast S)

bobulbal 0e96 HA (
UNIT VI
Distributed
CHAPTER 6 Computing
and
Internet of Things
Universlty
Prescrlbedsyllabus

Distrib utedComputing : Need, Distributed


computing vs.
Internet Things, Innovative Cloud compurting.
onpurting,
the
Applications of Enabling Technologiess tor
the Internet of Things,
Networking. Onfine Socdal and Professina

Distnbuted Computing.
Q.. **********************************************s************s
61
6.1.1 Distributed Computing Definition... n**oiu*ocesse*************
6-2
************* ****s********************.****************************
GQ. What is Distributed Cloud ?.. ******e*********************************************************************** ***** 5-2
6.1.2 How Does Distributed Computing Work
?..******************************************************** *******
6.1.3 What Are the Advantages of Distributed Cloud **********
Computing ?.
6.1.4 Four Types of Distributed Systems. *********************
.6-3
*****************************************************

62 Ditference between Cloud Computng and Distributed 6-4


Computing..
GQ. State difference between Cloud and Distributed Computing***************** .6-5
6.2.1
?..
Cloud Computing..************************************************************************************* .6-5
6.2.2 Distributed Computing ****** 6-5
*****************t***********************************************************************************
6.2.3 Tabular Difference between Cloud Computing 6-6
and Distributed Computing....
****************************
6.3 Enabling Technologies for the Intenet of Things.
*******************************************************
GQ. What are the IOT Enabling Technologies ? ***********.

*****************************************
&-8
6.3.1 Wireless Sensor Network (WSN).
******************************************************************************
6.3.2 Cloud Computing. ****** 6-8
*************************************************************************************************************
6.3.3 Big Data ***** coe 6-9
Analytics.... ******************************************
6.3.4 Communications Protocols.************************************************
*****a************44a*a*******************.
****** .6-10
****************************************************** 6-10
6.3.5 Embedded Systems.
0.4 Innovative Applications of the Internet of 1
hings ******************************************************************************as
6-11
GQ. What are the different innovative application of loT ?..****************************************************
6.4.1
6.4.2
What is loT ?.. **********************e***********************************ssssnssssss**ssssasnanss**ssssssese***********s
Innovative Applications of loT..
. .6-11
6-13
03 Online Social * s***********************sssnsaannee
*
6-13
6-
and Professional Networking.
a.What
4********************************* ************************a*
is Online Social and Professional Networking ? ..***s************************************************************+*
-17
6.5.1 The Social Network and Cloud Computing..
.6-17
***************** *** ** ***
**

*************+t**ne -17
6.5.2 The
need for Professional Networking. ** *******""*******************************************************. mms 18
6.5.3
Where canl build my Network Online 7... ************sssssssnsses***ssassssee**sssssnasa***********
**assuuun 6-199
6.5.4
6.5.5
What are the benefits of Online Networking over Traditional Notworking ? . ***** -200
Tips for Online Professional Networking.
6-20
Chapter Ends.ssuanesssnananesaan m. 6-21
Internot.of Things)...Pag no.
Computingand (8-2
(Distributod
Cloud Computing (SPPU-SEM 7-E&TC)

6.1 DISTRIBUTED COMPUTING


servors and data
data storage
physically separated unicate, and that
multiplo collaborate, communi
A distributed aystem is a collection of components can work
worldwido. Thoso Uniied withpowertul
Bystem with
roside in difforont systems a single, D
giving anillusion of boing
Ogother to nchiove tho samo obiective,
computing capabilities. 1e BtOrag0 Bystems Can
8oftwaro
applications, and
databasCs,
A distributed computing servor,

considered distributed systems.


US Examples of Distributed Systems

The internet (World Wide Web) itself amplifiers, and other


nebworking devices appear
antennas,
Telecommunication networks with multiple
as a single system to end-users.

6.1.1 Distributed Computing Definition.

Whatis Distributed Cloud ?


GQ data centa. to
infrastructure utilizes multiple locations and
in a distributed cloud, the
public cloud distributed cloude.s are
services. With this implementation,
store and run the software applications and
more efficient and performance-driven. architecture, is made up
architecture also called distributed computing
A distributed cloud computing
of distributed systems and clouds.
Distributed Computing

What doesn't
What works

Differences among networks


Scalability
Varied response times
High availability Blind sports in app performance
Multiple archltectures

functionalities
Fig.6.1.1: Distributed Computing working

Examples of Distributed Computing


in
to store data locally
Content Delivery Networks (CDNs) utilize geographically separated regions
order to serve end-users faster.
Ridge Edge Platform

(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) e Tech-Neo Publications..A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC)
Compouth
outing
(Dlstrbutod
Coud Computing
How Does Distributed Computing andIntornetof Thingo). Paga no. (6-3)
s.1.2 Work ?
omputing
Distributed computin connects hardware
and softwaro
laboration to achie
collaboration achievo a singlo roRourcos to do many
Work in goal through thinga, including
optional resource
e access rights per the authority lovel sharing
Mana of users;
reso os. e.g., distributed computing
Keep software, open
currency that lets for further development;
Achieve concurrency multiplo machines
work on tho same
computing resource
resources procoBs;
Ensure alll
computing are scalable and
oporate faster
when multiple machines work
and handle errors in connected components
Detect and,
together
of the distributed
doesn'tfail.and stays fault-tolere network o that the network
distributed
Advanced distr systems have automated
processes and APls
to help them perform
the customizati
tion perspective, distributed better
From clouds are a boon
for businesses.
Clo service
Maasd providers can Connect on-premises systems to
can tran
transform the cloud computing stack so that
enterprises
es their entire IT infrastructure
without discarding old setups. Instead, theg
can extend existing infrastructure through comparatively fewermodifications.

The cloud service provider controls the application upgrades,


security, reliability, adherence to
etandards, governance, and disaster recovery mechanism
for the distributed infrastructure.

6.1.3 What Are the Advantages of Distributed Cloud Computing ?

According to Gartner, distributed computing systems are becoming a primary


service that all cloud
services providers offer to their clients.
Why? Because the advantages of distributed cloud computing are extraordinary. Here is a quick list:

UItimate Scalability

Al nodes or components ofthe distributed network are independent computers. Together, they form a
distributed computing cluster.
You can easily add or remove systems from the network without resource straining or downtime.
Scaling with distributed computing services providers is easy.

Improved Fault Tolerance


Distributed systems form a unified network and communicate wel. At the same time, the architecture
allows any node to enter or exit at any time..

As a result, fault-tolerant distributed systems have a higher degree of reliability.

Boosted Performance and Agility

Distributed clouds allow multiple machines to work on the same process, improving the performance of
Such systems by a factor of two or more.

oFU-New Syllabus we.f academic year 22-23)(P7-129)


Tech-Neo Publications..A SACHIN SHAH Venture
ringo)..Pago
Intormot of Thinga).
Computing ancd (8-4) no.
(Dialributod
Cloud Computing(SPPU-SEM 7-E&TC) cont-ollectivonoBs of operations
on8 can inprrve
spood and
As a rosult of this lond balaneing, procesaing
with distributed systems.
Lower Latency Borvor# near ond-u8ora
nd-users
can Boloct cloud-based and speed
As rosourees aro globally presont,
businos808

up request processing. conveníonce


convonionco of a unified
low lntoncy
with tho pukl.
computing's
Companics roap the benefit of edgo
eloud.

Helpful in Compllance Implementation infrastructn


ributed cloud infrastructure
regional compliance, distributed helna
industry compliance or geographies. This way, thev
aether there is
resources in different easily
local or country-based California.
ousinesses use Europe or CCPA in
privacy rules, such as GDPR in
comply with varying data should read on
advantages of Distributed Computing, you
you want to learn more about the
on the benefits of Distributed Computing.

6.1.4 Four Types of Distributed Systems


architectures.
umbrella of distributed systems, there are a few different
Under the
systems into four models:
Broadly, we can divide distributed cloud

Client-Server Model
directly then formats the data and renders it for
Inthis model, the client fetches data from the server
directly submit their edits back to the server.
the end-user. To modify this data, end-users can
. For example, companies like Amazon that store customer information. When'
a customer updates their
address or phone number, the client sends this to the server, where the server updates the
information

in the database.
server is
Task
O Likely Data Sink
Task server

Request Request-

Response
Response-

Interaction- Interactlon
Computin9 Computing Computing
Node Node Node Computing nodes are
data source and sinks 97
O
Interactlon-
o w2m21oise 2av0qt.00Fig. 6.1.2: Distributed Computing
Nodes n 2 ib o ba

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129)


Tech-Neo Publications.A SACHIN SHAT
SPPU-SEM 7-E&TC) (Dlstributed Computing
and Internet of Thinga). gn o. (6-5)
Model
ree-Tler
Three-z
throo-tior
modol i
modol introducos an additional tier
botween client and
server the agent tier.
Tho
middlo tior
iar holde
hol the cliont data, relensing
lo tho client from own
This the burden of managing
information.
accoss its ata through a web application,
client can typically. Through this, the client application's
Tho work is roducod and automated easily.
and
tho user's
cloud stor
storago spaco with tho ability to Btore
example, aa your files and a document editor
For
storage soluti
Bolution can mako your filo availablo anywhere
e
for you through the internet, saving you
a
Such. managing data on your local machino.
fron
Modei
Mult-Tier
busi logic to interact with various backend
terprises need siness data tíers and frontend presentation
logic sends requests to multiple enterprise network services easily. Tha's why large
This
tiers. Thi
prefer en-tier or multi-tier distributed computing model.
organizati
«
For
example, an enterprise network with n-tiers that collaborate when a user publishes a social media
post to
multiple platfor
tforms. The post itself goes from data tier to presentation tier.

Peer-to-Peer Model
server model, this model comprises peers. Each peer can act as a
client and
.Tnlike the hierarchical
elient or server, depending upon the
request it is processing. These peers share their computing power,
decision-making power, and capabilities to work better in collaboration.
collaboratively work to make decisions regarding adding, deleting, and
.For example, block chain nodes
updating data in the network.

6.2 DIFFERENCE BETWEEN CLOUD cOMPUTINGAND DISTRIBUTED COMPUTING

State diference between eioud and DIstnbuted computing

6.2.1 Cloud Computing


resources/services like server, storage, database,
Cloud computing refers to providing on demand IT
computing technique that delivers hosted
networking8, analytics, software etc. over internet. It is a
services over the internet to its users/eustomers. iyait
ra
networking resources through internet.
Cioud computing provides services such as hardware, software,
shared pool of configurable computing resources,
Ome characteristics of cloud computing are providing
Service Providers ete.
-demand service, pay per use, provisioned by the

.
Ttis classified intó 4 different types such as
1. Public Cloud 2. Private Cloud
Community Cloud 4. Hybrid Cloud
Tech-Neo Publications.A SACHIN SHAH Venture
*New Syllabus we.f academic year 22-23)(P7-129)
of Things)...
.
...Pagono.
Cloud Computing (SPPU-SEM Computing and Internot (6-6
(Distributod
7-E&TC)
6.2.2 Distributed Computing
autonomous computers
distributod and they
Distributod computing rofors to solve a problom ovor techniquo allows to
which allows multipla
computing
communicato botwoon thom overa notwork. It is a
computors to communicato and work to solve a singlo probio a 8inglo computan
computational tasks fastor than using a8 it
Dis holps to achiovo
Computing
takes a lot of timo. computo
distributinga singio a5 mong ers
of distributod computing aro thod Invocation
n characteristics Mothod for distribt
ibutod
Procoduro calls and Romoto
progress the work at samo timo, Romoto
computations.
It is classified into 3 different types such ns
1. Distributed Computing Systems
deup ab 0 ir
2. Distributed Information Systems
3. Distributed Pervasive Systems
Computing and Distributed Computing
.2.3 Tabular Difference between Cloud
Distributed computing
Sr. Cloud computing
No.
Distributed computing refers to solve a problem
1 Cloud computing refers to providing on |
over distributed autonomous computers and tha
demand IT resources/services like server,
communicate between them over a network.
storage, database, networking, analytics, |
software etc. over internet.
can be saidas
2. In simple cloud computing can be said as a In simple distributed computing
which allows to multiple
technique
computing technique that delivers hosted computing
over the internet to its
computers to communicate and work to solve a
services
users/customers. single problem.

classified into 3 different types such as


3. It is classified into 4 different types such as It is
Distributed Computing Systems, Distributed
| Public Cloud, Private Cloud, Community
Cloud and Hybrid Cloud. Information Systems and Distributed Pervasive
Systems. s2;int..

There are many benefits of cloud computing There are many benefits of distributed
computing
4
|
like cost effective, elasticity and reliable, like flexibility, reliability, improved performance
economies of Scale, access to the global etc.
market etc.

6. Distributed computing8 helps to achieve


Cloud computing provides services such as
hardware, software networking resources computational tasks more faster than using
through internet. single computer as it takes a lot of time.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC) Oistributed Computing and Intemet of Things).... Page no.
(6-7)
Computing
ting
Coud Cloud computing
Distributod computing

cloud computing is provide on The goal of distributed computing is to distribute a


The
goal of
computing services over internet on single task among multiple computers and to solve
and
model.
pay per use 1t quickly by maintain coordination between them.
characteristics
istics of cloud computing are Somo characteristics nputing are
of distributed
1Some
providing shared pool of configurable | distributing a single task among computers
resources, on-dedemand service, pay progress the work at Bame time, Remote Procedure
computi
provisioned by the Service Providers calls and Remote Method Invocation for distributed
use,
per
computations.
etc.
disadvantage of cloud computing| Some disadvantage of cloud computing includes
. Some
cludes less control especially in the case of | chances of failure of nodes, slow network may
inclh
public clouds, restrictions on available create problem in communication.
ervices may be faced and cloud security.

Cloud Computing Distributed Computing

Definition Cloud computing defines a new way of | Distributed computing contains muliple
nputing based on the network technology. software components from multiple
Cloud computing takes place over the different computers which work together
common network like internet. It usually | as a single system. Cloud computing can
comprises of a collection of integrated and be referred as a virtualization achieved
networked hardware, software and internet| from distributed computing.
infrastructure resources.
Goals Reduced Initial Investment and Resource Sharing
Proportional Costs Openness
Increased Scalability Transparency
Increased Availability Scalability
gr
Increased Reliability
ypes
Public Clouds Distributed Computing Systems

Private Clouds Distributed Information Systems

Community Clouds Distributed Pervasive Systems

Hybrid Clouds
.

SPPLU-Ne
Syllabus
wef academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Things)...p
Internet ofThings).Page no. (6-8
Computing and
(Distributod
Cloud Computing (SPPU-SEM 7-E&TC) Distributed Computing
Cloud Computing distributed amongst
A task is
nfigurablo machines for
different the
Charactoristics It provides a shared pool of computation job at the same
time
computing resource8.
modol is usod
to Tochnologies such as Remote
An on-domand notwork
Proceduro calls and Remote Mothod
provido nccess to congh.
provisioned by the Invocation are used
Tho clouds are distributed
computations.
Service Providors.
notwork access.
It provides brond of nodesthan
Higher level of failure
less control parallel machine.
Disadvantages More elasticity means a dedicated
clouds.
especially in the case of public Few of the
algorithms are not able to
services may networks.
Restrictions on available match with slow
cloud
faced, as it depends upon the computing job may
be Nature of the
provider. overhead.
present to0 much

THTN
INTERNET OF THINGS
ENABLING TECHNOLoGIES FOR THE
6.3
Aling Techn
What are the 1OT Enabling Technologi
GQ **
and to each other.
the concept of connecting devices to the internet
Internet of Things (IoT) is people, all of which
to the giant network of connected things and
First coined in 1999, the term refers
share data amongst each other.
smartphones to automobiles and
everything in between.
Today, IoT objects have come to include
IoT devices capture each day are
processed into actionable
data points that billions of
The innumerable known,
analytics. While the reciprocity between AI and IoT is relatively well
insights with the help of
enable the Internet of Things.
there are other technologies at play that
technologies are
IoT (internet of things) enabling
1. Wireless Sensor Network 2. Cloud Computing

3. Big Data Analytics 4. Communications Protocols

5. Embedded System

6.3.1 Wireless Sensor Network (WSN)

A WSN comprises distributed devices with sensors which are used to monitor the environmental anu
physical conditions.

.A wireless sensor network consists of end nodes, routers and coordinators. End nodes have several
sensors attached to them where the data is passed to a coordinator with the help of routers.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC)
ongUting
ding (Distributed Compu
sO acts as the
the gateway and Intemet of Things)..Page no.
ordinator also gateu
that connects WSN (5)
dThecoord to the internet.
Bxample:
her monitoring system

air quality monitoring system


0or

l
moisture monitor system
Surveillance system

Health monitoring sy

Cloud Computing
.3.2
dos us the means by which we can access applications
mee
provides as utilities over the internet. Cloud means
,It ething which is presenti in remote locations.
someth

With Cloud computing, users can access any resources from


. anywhere like databases, webeervers,
orage, any device and any software over the internet.
stora

Characteristics
Broad network
access 2. On demand self-services
1.

3.
Rapid scalability 4. Measured service 5. Pay-per-use
Provides different services, such as Iaas (Infrastructure as a service) Infrastructure as a service
provides online services stuch as physical machines, virtual imachines, servers, networking, storage and
data center space on a pay per use basis.
. Major IaaS providers are Google Compute Engine, Amazon Web Services and Microsoft Azure ete.
Ex: Web Hosting, Virtual Machine etc.
.Paas (Platform as a service) Provides a cloud-based environment with a very thing required to support
the cost
the cómplete life cycle of building and delivering West web based (cloud) applications without
and complexity of buying and managing underlying hardware, sofbware provisioning and hosting.

Computing plattorms such as hardware, operating systems and libraries ete. Basically, it provides a
platform to develop applications.

Ex.App Cloud, Google app engine


Saas (Software as a service) It is a way of delivering applications over the internet as a service. Instead
of installing and maintaining software, you simply access it via the internet, freeing yourself from

complex software and hardware management.


Saas Applications are sometimes called web-based software on demand software or hosted software."
aas applications run on a SaaS provider's service and they manage security availability and
performance.

Bx.: Google Docs, Gmail, office etc.

(SPPU-New
Syllabus w.e.f academic year 22-23)(P7-129)
a
Tech-Neo Publications..A SACHIN SHAH Venture
Things)....Paac
Computing and
Internetor
Cloud Computing (SPPU-SEM 7-E&TC) (Distributod

a6.3.3 Big Data Analytics

t rerers to the method of studying massivo volumes ot au


too massivo
and tough tto store, control,
simply
Collection of data whose volumo, velocity or variety is
process and examine tho data using traditional databasos igital images,,
social network videOs, digital images, sensOTa
sourcos including
a varioty of
Irom
and sales transaction records.
Several steps involved in analyzing big data:
1. Data cleaning 2. Munging
3. Processing 4. Visualization b
Examples:
o Bank transactions
tracking of vehicles
d generated by IoT systems for location and
E-commerce and in Big-Basket
Dand
fitness data generated by loT system such as a fitness
O ieaith and

6.3.4 Communications Protocols


enable network connectivity and linking to applications.
They are the backbone of IoT systems and
over the network
Communication protocols allow devices to exchange data
Multiple
a
protocols often describe different aspects of single
communication.
as a protocol suite; when implemented in
A group of protocols designed to work together is known
software they are a protocol stack.
They are used in
Data encoding
o Addressing schemes igg
6.3.5 Embedded Systems

It is a combination ofhardware and software used to perform special tasks.


It includes microcontroller and microprocessor memory, networking units (Ethernet Wi-Fi adapters),
input output units (display keyword ete.) and storage devices (flash memory).
It collects the data and sends it to the internet.
Embedded systems used in Exampies
e oenoto ot, a Uc1niicg
Digital camera
o DVD player, music player
Industrial robots
Wireless Routers etc.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129)


Tech-Neo Publications..A SACHIN SHAHVent
(SPp
(SPPU-SEM 7-E&TC)
Compling (Dlstributod Computling
Coud Theso, are dovico that and Intornot ol Thinga)..Pago no. (6-11)
Sonsors: gonorato olectronic
built signala from physical 1o'T
ve built in sonsors to sco, hoar
hnve condition
dovicos and touch tho world
informa ation into digitnl around thom, and hence, turn tne
physical data. Sonsors aro usod to gaugo
tion, proximity, prossuro and so on. variables like images, temp rature,
motior.
loT dovi
Networks:IoT dovicos aro essentinlly
networkod dovicos.
nal can be through a variety
signal
Tho mochanism for communicating he
electron of wiroless conneetions
communication FC), and 3atollito. Buch a8 WiFi, cellular, Bluetooth, near

andards: These are the


the commonly accepted
Stana prohibitionsor proscriptions for pro
process frarnework. IoT
devices fo
follow uniform technical and regulatory standards
interoperability among that ensuro network security, a
protection, different devices, and
so on.
ented Intelligence : Those are the cognitive tools that
provide the ability to describe, preic
avnloit relationships in database. Meaningful
analysis of big data charts out the way for corrective
ro
future actions through technologies such as computer vision,
natural language processing, speecn
recognition and so on.
AauCmented Behavior: This is the
carrying out of prescribed action. Augmented behavior manifests In
he form of machine-to-machine (M2M) interface and machine-to-human interface (M2H).

64 INNOVATIVE APPLICATIONS OF THE INTERNET OF THINGS

GQ What are the diferent innovative application of IoT 2


---------
The Internet of Things (OT) provides the ability to interconnect computing devices, mechanícal
machines, objects, animals or unique identifiers and people to transfer data across a network without
the need for human-to-human or human-to-computer is a system of conversation. IoT applications bring
a lot of value in our lives.

Woarabio
Home technolcoy
Music ghtlng

Smart
phones

Online
ntene
shopping thinge

Home and
applicatlon
In fiight
Servces
Persorna
Computer
(Analytics

Fig. 6.4.1: Applications loT


of

SPPU-New
Syllabus w.e.fi academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Things)....Parn
Intarnot of Pagono. (6-12)
Cormputing and
(Distributed idontifiors
ers and people's nbilit
a

internction ity to
Cloud Computing (SPPU-SEM 7-EATC) unique
doevices, or human-to-computer
The Internot of Things providen oljecta, computing
human-to-htumane or nccidents and
congestion, nci
transfor data ncros8 n network without the flic weathe,
monitorn trn
camera
A traffic camera is nn intelligent devico. The traffie.
raffic
city'a monitoring
cOnditions and can accoss it to n common entranco. informntion to the
transmita
cameras and
his gateway recoives dnta from such
system.

15.
Netwotk
gateway

City wldo
monitorin9
system

Traffic
camera Management S)ystem.
Fig. 6.4.2 : Smart Tralic
COnnected to the nationa!
mal
to repair a road that 15
has decided 1s sent to the tra.
rafñe
or example, the municipal corporation the national highway. The insight
congestion to
ghway. It may cause traffic
monitoring system information to oth
estimate their impact, and relay
situation, devices and
ne intelligent system analyzes the live instructions to drivers by Smart
highway. It generates
Cities connected to the same
radio channels.
City B

City school

City A

City C Office Building

Fig. 6.4.3:Smart Traffic Manogement System.

(SPPU-New syllabus w.e.facademic year 22-23)P7-129) Tech-Neo Publications..A SACHIN SHAHvenue


Cloud Computing (SPPU-SEM 7-E&TC)
Cloud OEM
Dielrbutod Computing and Intornot of Things).. Pago no. (6-13)
t,creates a network of self-dependent
systems that take advantage
of renl-time con
6.4.1 What is loT?
IoT is a plattorm
where embedded devices
enables machines to interact, aro connectod to the Internet to collect and exchango
collaborato and
learn from oxporiences liko humans,
IoT applications equipped
billions of objects
with connectivity and intelligonce.
The 10 most
popular Intornot of Things Appllcatlons

TSmart Home
100%
2 Wearables
63%
3Smart City
34%
Smart grid
5Industrial
28%
Internet 25%
6onnected
Car 15%
Connected
7 6%
Health ttaldn
8 Smart Retail
2%
Smart Supply
T 1 Chain
2%
3 9924 Fig. 6.4.4:Internet of Things Applications

6.4.2 Innovative Applications of loT

1. Wearables

.Wearable technology is the hallmark of loT applications and one of the earliest industries to deploy
IoT. We have fit bits, heart rate monitors and smartwatches these days.

Guardian glucose monitoring device has been developed to help people with diabetes. It detects
glucose levels in our body, uses a small electrode called the glucose sensor under the skin, and
relates it to a radiofrequency monitoring device.
2. Smart Home Applications

.The smart home is probably the first thing when we talk about the IoT application.
see the AI home automation is employed by Mark Zuckerborg.
The example we
Alan Pan's home automation system, where a string of musical notes uses in-house functions.
3. Health care
.IoT applications can transform reactive medical-based aystems into activo wellneas-bascd eystoms
rese arch lack important roal-world information. It usos
Resources that are used in current medical
volunteers for clinical trials.
controlled environments, leftover data, and

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Things)....
Pao no. (6-1
Intornot ofThings)..Pago
(Dlotributod
Computing and 14)
availabili
ability. IoT focuses
Cloud Computing (SPPU-SEM7-E&TC) precision und on
dovico's power, works.
tornet of Things improvcs tho loT-onablod care device
Hero'a how tho
systoms rathor than just toola,
g

Remote Smart
dovice
Connectlon Cloud Signal
Caro Care
Gateway
Devices Sensors
Scnsor Network
Fig. 6.4.5: liealth Care

4. Smart Cities
smart city.
Most of you have heard about the term
services.
Smart city uses technology to provide social services, promoting
stability andnd
improving transportation and
The smart city includes
giving voice to their citizens.
Delhi. Even global issues, such as an
clean
very different from
The problems faced by Mumbai are occur in varying intensit
declining quality, and increasing urban density,
drinking water, air
cities. Therefore, they affect every city. town and
Internet of Things to analyze the complex tactors of nd
Governments and engineers use the
waste control and emergencies.
each city. IoT applications help in the area
of water management,

Example of a smart city Palo Alto.


-

Fig. 6.4.6: Smart Car System

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) TeTech-Neo Publicatiations..A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC)
(Distributed
1Conpu
ting
Alto,
.San Francisco,
the firet city to acquire
s
Computing
and Intornot of
Things).Pago no (6-15)
Palo und the same 1block on the streots the traffic approach. Ho
of parking spots.I
in seurch realized that most cars
oa ction in the city. Thus, tho sensors
traf
pass Occupancy statu to the cloud of
were installed
at all
It is the primary cause of
parking areas in the«city. These
t
sensor each spot. the
lution involves
volves the use of sonsor
arrays
This that collects data
and usos it for manypurpoBes
Agrlculture

year2050,
050, the world's growing population
,By the arge population, is estimated to
agriculture needs to have reached about 10 billion. 10
feed such. marry technology
possibilities in this area. One and get the best results. TherTe
are many of them is Smart
Greenhouse.
taa techniques grow crops by environmental
Farming
parameters. However,
nduction losses, energy losses and labor
costs, making it less
manual handling results
in p effective.
reenhouse makes it easy to monitor and enables
The gre to control the climate
Implements Control
inside it.
Acton

Remote
Commands
Connection Sendors Controls
gateway and
Actuators andSWITchgear

On/off a.cic.srt

Monitor
Display
Smartphone
used as
remote control
Inside the greenhouse
Fig.64.7:Smart Agriculture System
6.
Industrial Automation

It is one of theareas where the quality of products is an essential factor for a more significant
investment return.
Aanyone can re-engineer products and their packaging to provide superior performance in cost and
customer experience with IoT applications. IoT will prove as a game-changor.
n industrial automation, IoT is used in the following areas
Product flow monitoring
oFactory digitization
Inventory management
Safety and security
SPPU-New
Syllabus
w.ef academic year (P7-129) eTech-Neo Publications..A SACHIN SHAH Venture
Pagen
Internet of Things)...
and Intemetot ng
(Distributed Computing
Cloud Computing (SPPU-SEM 7-E&TC)
Logistics and Supply Chain Optimizntion
Quality control
Packnging customization
Industrial Automation
loT Applications in
Product Ouality testing9
in various stages of
Creatos digltal manufacturing cycle
factories
Improvos Lino-of Packaging optimization
work
Monitors in near
Command In
unlis real-time through
out tho supply
Smart tracking for chaln
products in-transit
o Notifies users on
Provides cross
channel visibility
deviations in delivery
into Inventories
plans

Automation.
Fig. 6.4.8 :Smart Industrial

7. Hacked Car
WAN network.
connected car is a technology-driven car with Internet access anda
A
benefits such as in-car infotainment, advanced navigation and
The technology offers the user some
fuel eficiency.

8. Healthcare
gathers and transfers health
real-time monitoring with the help of smart devices. It
Healthcare do
levels, weight, oxygen, and ECG.
data such as blood pressure, blood sugar
mobile application in case of any emergency.
The patient can contact the doctor by the smart

9. Smart Retail
IoT applications in retail give shoppers a new
experience.
checkout system can read the tags of the
Customers do not have to stand in long queues as the help.
customer's payment app with IoT applications'
u products and deduct the total amount from the

10. Smart Supply Chain


Customers automate the delivery and shipping with a smart supply
chain. It also provides details of
real-time conditions and supply networks.

11. Smart Farming


Farmers can minimize waste and increase productivity.
The system allows the monitoring of fields with the help of sensors.
Farmers can monitor the status of the area.

(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Ventu
Cloud Computing (SPPU-SEM 7-E&TCI
(Distributed Computing and Intenot of Things)....Page no.(6-17)
Internet-connected
devices go from
6 million to billions
Business Insider Intelligonce in just one year
ostimatos 24 billion loT
300 billion in revenue devices will install and generate more una
in the future.

6.5 ONLINE SOCIAL AND


PROFESSIONAL NETWORKING

cO.
- --
What is Online Social and
- Professional Networking
?
Social networkin8, as
shown by the massive
many people. user groups, has become an everyday
part of the ves o
Some groups als0 Surpass
the population of large
Facebook, for example. nations, with more than 400 million
active users on
Social networks offer a
medium to promote
real world. For example, user contact and sharing, thus modeling
there is a multitude of relationships in ne
the Facebook credentials of integrated applications and some organizations
a user for authentication now use
networking has now expanded rather than requiring their credentials. Social
beyond contact between
friends.
Via storing heavy multimedia
content in cloud storage systems,
usability. social networks help improves
Internet
The most popular material on
social media is videos
to them. For all of their resource and images, which utilize the entire space
needs, they have the potential available
to slow down applications and serverss.
Vendors of cloud computing,
such as Salesforce and Amazon,
including Customer currently provide numerous services,

Relationship Management (CRM)


and Enterprise Resource Planning
items through cloud storage, without buying (ERP). When they deliver these
standalone software or hardware, consumers
simplicity and scalability of the system. can use the
Social networks, in addition to storing
heavy data, use cloud storage for
very easily obtain a lot of structured and data analytics. So, users can
non-structured knowledge.
The new and improved analytics that Facebook shows
for the benefit of its corporate users
case. is a typical

Backup costs and data recovery ts have been significantly reduced by cloud
storage. When data is
processed in one location, there is a high probability of losing
the data in times of catastrophe.
It
becomes next to impossible to recover missing data. With cloud computing,
however, the data is stored
on remote servers and remains available throughout the world. This allows
social networking websites
to store their users' private information that they cannot afford to misplace
under any circumstances.

3 ti.i
(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
Intornot of Things)..Pago
Cloud Computing (SPPU-SEM 7-E&Tc) (Distributod Computing and 6-18)
6.5.1 The Social Network and Cloud Computing
yoars ineiude cloud computing and
DOme or the most controvorsially dobated tochnologios in recont
social networking sites.
througn ho wo 1 DT 28 a potontinl
ne potential for tho uso of poworful on-domand computing tools
catalyst for the growth of tho world economy.
The cloud is a fact and will continue to be tho most
distinguishod tochnical advancoment, changing #
way business is conducted.
computer science
-to-peor computing. It is a field of
Social cloud computing is also referred to as peor-to
loasing ot computer resources
that generalizes cloud computing to include the sharing, bartering, and
system to owners and operators,. It
through peers who are checked by a social network or roputation
economy of cloud
extends cloud computing to include those interested in engaging in the sharing
services outside the boundaries of formal commercial data centers run by cloud providers.
n turn, this leads to more choices, higher economies of scale, while offering additional benefits for
hosting information and computing resources closer to the edge where they might be most needed.
There are many applications for cloud computing, and some of them are still being 10und, for example-

Social networks can be hosted in a cloud environment, and scalable apps can be used. Via storing heavy
multimedia content in cloud storage systems, social networks help improves Internet usability.
Vendors of cloud computing, such as Salesforce and Amazon, currently provide numerous services,
including Customer Relationship Management (CRM and Enterprise Resource Planning (ERP). When
they deliver these items through cloud storage, without buying standalone software or hardware,
consumers can use the simplicity and scalability of the system.
Cloud storage is useful in the event of a catastrophe by reducing the expense of data backup and
recovery.
Social networks and messaging applications such as Snapchat rely on anonymity and will potentially
use these tools to provide their users with a more reliable and faster service. For data analytics, social
networks use cloud computing.
"Networking" has been a business buzzword since the 1970s, and it remains a fundamental element of
the modern business world. However, what networking looks like has changed significantly since then.
These days, you don't necessarily need to get in the room with people you want to connect with. You can
build your network online instead.

6.5.2 The need for Professional Nerworkingie


The benefits of business networking remain essentially the same. For starters, it allows you to access
the expertise of others in your feld. 1f you have a business relationship with your peers, you can consult
with them about different issues and enrich your own understanding of your industry.

(SPPU-New Syllabus wef academic year 22-23(P7-129) Tech-Neo Publications..A SACHIN SHAH Ventur
Cloud Computing (SPPU:SEM 7-E&TC
ioributod Computing and Intomet of Things).. Pago no. (6-19)
Another advantage ofa strong business
notwork ia that it ompowora you to build your protile. IOu
become a well-known name in your
fiold, Bomoone who
influences others and can make a real lnpae
a in
their area of interest.
When you know and are known
by chango-makers more
ikely to hear about exciting and poworful people in your industry, you
opportunities.
You might be the first to be
informod about à new
position, or you may even be specilicauy app d
to participate a
in project.
If the benefits are the same,
what makes online networking different? Well, you can now
connections and access opportunities
on an international level without leaving your own
ainake
none
The growth of online networking

Traditional business networking has evolved since


the advent of the internet. In the early days of online
networking, industries had their
own dedicated message boards where people could ezchang*
knowledge and build relationships
with others in their field.
Now there are social networks, such
as LinkedIn, which are designed to replicate and improve upon tne
traditional in-person networking experience. These
networks were especially useful during the 2020
pandemic. Because people couldn't leave their homes,
many business events where networking would
traditionally take place moved online.
As normality gradualy returns, it's natural to wonder whether traditional networking will make a
comeback too. But will online networking continue to be a
dominant force?
a 6.5.3 Where can I build my Network Online ?

LinkedIn is the obvious choice for social media for business purposes; it was designed with networking
in mind. However, there may be other options to explore. It's also possible to
build a dedicated following
on platforms such as Instagram and Tik-Tok Creative industries have especially
flourished there.
If you want to speak about specific issues, you might consider attending online conferences. We
are
more adept at using online oonferencing sofbware than ever, so don't assume that youll just be listening
to presentations. It's also possible to take part in "fireside discussions" with smaller groups of fellow

You can build deeper relations. with a select group of people if you join an online mastermind. This
involves meeting regularly to discuss pre-arranged topics over a set period of time.
One purpose of a masterind is to problem-solve collectively. You can ask others for their perspective
on issues affecting your career. hois gru th yt t.on 0 929te un .i w

(SPPU-New syllabus w.e.f academic year 22-23)(P7-129) Tech-Neo Publications..ASACHIN SHAH Venture
Intenet s)..Page no.
ot Ihings)...Page (6.2
no. (6-20)
(Distributed Computing and
Cloud Computing (SPPU-SEM 7-E&TC) or
Traditional Networking
Networking over
0.5.4 What are the benefits of Online
sities or th pandemic, there are
boom was drivon by tho necessities
Although the recent online networking
reasons to prefer it over traditional marketing:
2. It's more convenient. same connections
conferences, you can stay at home and make he
ather than spend time traveling to too.
parts of a conference are relevant to your business goals,
LES easier to pick and choose which
97
4. It's low-cost. over
place dinner and
. conferences can be expensive. At these events, networking often takes
Events and
you network online, you
don't need to pay for this or for
drinks, which can incur additional costs. When

travel.
6. You can expand your range.
to events in your immediate area.
Online
7. With traditional networking, you're usually limited
networking allows you to build connections all around
the world. As business becomes more
international, it makes sense that networking follows suit.
8. The internet is democratizing.
For example, access to
9. During traditional networking events, a hierarchy was often easily observable.,
everyone online has equal
the most influential people in the room may have been restricted. However,
status, at least in theory.
10. It's less intimidating.
70V i
11. When you're a newcomer to your industry, the prospect of approaching seasoned professionals in person
can be daunting With online networking, you don't have to walk across the room, strike up a
conversation, and introduce yourself in the same way. The dynamies can be very different.iat

Tips for Online Professional Networking oT- bre ustazd en tsuanaeita


6.5.5
When networking online, bear the following ups mna oe pibtie tinog oniino yrin 1 gobe c
1. Be clear about your objectives.
2. What do you want to achieve with your online presence? Do you want to increase your influence, or gain
access to specific opportunities? This knowledge will help you plan your contributions. D
e
3. Be authentic but professional.

4 The only way to stand out online is to show your unique personality. However, you shouldnt Suy

5.
anything that could endanger your career. Be wary of using shock tactics to get attentioni.
Respond to other people's requests.
e

(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(SPPU-SEM 7-E&TC)
ConpUling
aa
(Distributod
Cormputlng
lationships havo to and Internot of Things)..Page
no. 21)
coud
Remember be mutually
oftor
Jea often asking for support boneficial.
you're People will
but novor be less inclined to join y
networkif offering it.
your connections,
Connect
can be helpful to those in your
way you network is by
introducing them
similari .atorests into small groups to stimulate
One le
to one another. su pr
more focuaed
wath
i boundariesa and take it slow.
conversations.
ect
desperate to add someone to your
ay be network, but desperation
Youi people'scues If oy're not responding off-putting. Be attentive
can be off
other right now, circle bnck a
to in a while. Don't haras8 anyone or
force relat
lationships too quiclly.
tryto
aline connections.
Deepen your

you've been chatting via e-mail or direct messages for a long


ou might want to suggest a
time, then you
f
12.
Toom r S Slkvpe call. An "online coffee morning"
is a great way to inforrmally
emulate an inpet
encounter.

Post about what matters to you.


13.

The hest way to build a following of like-minded people is by sharing content


14. about your topics O
interes Keep your contri
tributions relevant to your industry and
your career goals.
Chapter Ends

bsbulsnt oais norte DYa 20 (


(LabManual).Page no. (L-1
Cloud Computing (SPPU-SEM 7-E&TC)

LAB Manual
Study 1
Casestorage in private cloud.
statement: Data security
TODlem
wherein resourcos and appiication plattorms are
computing
lOud Computing is a form of distributed bas18.
and pay on utilization
distributed over the Internet through on domand companies/organizations to
centres are provided to the
a Storage is main feature that cloud data ready to use cloud technology
due to lack of
are not
preserve huge data. But still few organizations challenges, advantages and
techniques along with few security
security. Here we describe the different security issues and privacy
protection affairs
analysis of data
also disadvantages. It also provides the from-unauthorized users, managing sensitive
by preventing data access
related to cloud computing
stored.,
data, providing accuracy and consistency of data
Owner/
consumer

Token
Data Data
verifier generato
Processor
Fig. 1
It is model that
services to network through internet.
Cloud refers to the network that provides
pay-as-you-use-service. National
enables the characteristics like on demand self-service,
on-demand
defines cloud computing as a convenient,
Institute of Standards and Technology (NIST)
computing resources for storage services.
access to the cloud like public, private, hybrid and
Deployment models define purpose, applications and
community.
Platform-as-
models like Infrastructure-as-Service (TaaS),
Service models are categorized into the three
a-Service (PaaS) and Software-as-Service (SaaS).
which includes Data Storage. It is managed by a cloud
Cloud is an enormóus shared computing resource
service provider on cloud data servers built on virtualization
techniques known as utility storage.

Most of the storage clouds run on the public internet


cloud by well-known companies like Amazon,
Dropbox and Google.
A few bigger associations have discov red
esteem in running private cloud inside their own data
centres.
backed up in cloud
Cloud storage is a utility where data is remotely maintained, managed and
to collect
environment and then the data is accessible to end users over internet. It permits the client
the files through online so that the client these files from anywhere via internet.

(SPPU-New syllabus wef academic year 22-23)(P7-129) 9Tech-Neo Publications..A SACHIN SHAH Venture
Cloud Computing (SPPU-SEM 7-E&TC) (Lab Manual)..Pago no. (L-2)
Dven though there are many advantagoa of cloud storage, fow companics are still in dilemma to use the
benefits of cloud computing technologien for not having proper security.
The main objective of tho cloud storage is to store the data safely in the free space and fetch the data
whenover requested by the cliont.
Security and Privacy are tho distinguishod mothods used to
secure the information from attackers.
Third party is used as sorvice providers to grasp the
data sont by owner by, offline .mode 1n cloua
environment.
Sometimes cloud may reveal tho data by accidentally for
unauthorized purpose which strikes the
results of privacy and confidentiality. Whon there is no direct
link between clients and servers, master
server comes into picture.
Chunking operation is used for storing duplicate records to give data
backup from improvements.
Clients performs dynamic data operations to
store data as tokens in master server and the records are
filed in slave servers using token generation and
merging algorithms.
Cloud storage service often provides applications,
services to users to access the storage capacity. lt is
hosted by Storage Service Provider (SSP) [along with the
combination of Storage Servers. This SSP is
plotted on storage virtualization architecture.
SSP provides, manages the storage infrastructure to store the data of third party and is arranged as ann
online storage service provider, virtual storage
service provider or cloud storage service provider.
SSP has a facility that provides large storage
infrastructure i.e., Storage Area Network (SAN) and it is
distributed between the users/enterprises.
A SSP provides aspecific storage capacity that can be scaled depending upon user
requirements, It may
"be usedfor various purposes such as data backup, data recovery,
sharing and collaboration of various
consumer/businesses well as with other applications.
Multiple-Replica Provable. Data Possession (MR-PDP) solves the
assumption that multiple copies of
data are stored instead of single copy.
To overcome this assumption a protocol
is used called a challenge-response protocol to verify the
number of replicas ofe4the file. MR-PDP is more efficient for storing replicas
than a single replica PDP
scheme.
292lizio a7sve d 213i en

storage
Data retrieval Oze3

Trusted third
elzzna'} bi? o otii Ergments
party Encryption

Fles
Data Owner Authorised
1 users
Fig. 2

(SPPU-New Syllabus w.e.facademic year 22-23)(P7-129) Tech-Neo Publications...A SACHIN SHAH Venture
(Lab Manual). ..Pag no.(L-3)
Cloud Computing (SPPU-SEM 7-E&TC)
ed on clou
Case Study / Ubiquitous based
2 cloud.
IoT
Problem Statement: Appllcation of onablod tho attonti.
attention toward the
paradigm has supervision. f
continual atients
The introduction of porvasivo hoalthearo clinical
noodfor rogular
indepondent residing of oldorly pcoplo und tho
undorsorvod locationB nade available thr
through
Or habitants at romoto, isolatod or requirod to be made a
sorvicos aro
olectronic henltheare
OXt, advancod
network anytimo, whorovor and to anybody. pervasive and ubios:
concorns tho utilization or
onvironmont howover
881stive circumstano
technologies for delivering the above sorvices. data about a patient's to
transmission of clinical conditiong.
CSS technologies enable the roal time can detect certain
available that improvement
crCgavers, numerous portable devices
are
a user's stomach. But this and
so on from
leval, and
rate, blood pressure, breath alcohol
management througn nOD
deployment of health information attention coward
paradigm has enabled the
tom

pervasive healthcare
ntroduction The introduction of the clinical supervision of continualaual
people and the need for regular
the independent residing of elderly
underserved locations.
patients or habitants at remote, isolated or available throuoh. a
healthcare services are required to be made
ln this context, advanced electronic
network anytime, wherever and to anybody. ubiquitou
however concerns the utilization of pervasive and
A medical assistive environment
technologies for delivering the above services. circumstance t
transmission of data about a patient's
Wireless technologies enable the real time
caregivers
certain clinical conditions pulse rate, blood
Numerous portable devices are available that can detect
stomach. But this improvement and deployment
pressure, breath alcohol level, and so on from a user's
of health information management through mobile
devices introduces several challenges : data storage
and management (e.g., physical storage issues, availability and
maintenance), interoperability and
(e.g, permission control,
availability of heterogeneous resources, safety and privacy
data anonymity, etc.), unified and ubiquitous access are a few to mention.
One potential solution for addressing all aforementioned issues is the introduction of Cloud Computing
concept in digital healthcare systems.
Cloud Computing provides the facility to access shared resources and common infrastructure in a
ubiquitous and transparent manner, offering services on-demand, over the network, and performing
operations that meet changing desires.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129)


9Tech-Neo Publications...A SACHIN SHAH eenture
Cloud Computing (SPPU-SEM
no. (L-4)
7-E&TC) (LnbManual)..Pago
Diariy, Lho
advanco of mnchino or
to machino communication (M2M) pormits tho ddirect internction
porvasivo hoalthearo
sonsors with tho intornot and by oxtonslon with Cloud Computing systems. 1hi5
communication with tho
intornot has boon rocontly introducod becnuso the internet of things (lov)e
v ntroducos sovoral challongos : data storago
and munagomont (o.g., phy8ical Bor
avalability and maintonanco), d
privaey
intoroporability and availability of hotorogoncous rosource8, Baicy
e-B, pormission control,
a
mention.
data anonymity, otc.), unifiod and ubiquitous access a
dpotntial
concept
solution for addroing all aforomentioned issuos in the introduction of Cloud Computings
in digital healthcare systems.
lOud Computing provides the facility to access shared resources and common infrastructure n
gous and transparent manner, offoring services on-demand, over the network, and performing
operations that meet changing desires.
Dnariy, the advance of machine to machine communication (M2M) permits the direct interaction of
pervasive healthcare sensors with the internet and by extension with Cloud Computing systems. This
communication with the internet has been recently introduced because the internet of things' (IoT).

Case Study 3
Problem Statement: Tools for building private cloud
Having cloud storage these days have become a requirement, and we are spoilt for choice with what is
available out there to help backup our important data, e.g. Dropbox, Google Drive, Box ete. However,
they all share one major drawback.
They have limited storage space and at the end of the day, they are still a third party you have to trust
with your (sometimes sensitive) data.
Why compromise when there is an apparent solution? Thanks to a growing contingent of developers, we
can now make our own cloud storage. These solutions forgo the use of a third-party server, ensuring
that your data is for your eyes only.
We have here five tools to create your own eloud - all offer unlimited storage, and a few other features
third-party cloud storage lack.
Do note that some of them require you to be familiar with setting up your own server. As you go down
the list, the installation process will get trickier.
Set Up Local Server with AMPPs
Set Up Local Server with AMPPS
MAMP is one of the most popular application in OSX to run local server; for Windows users,
WAMP..Read more

(SPPU-New Syllabus w.ef academic year 22-23)(P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(Lab Manual)...Pago no. (L-5)
Cloud Conmputlng(SPPU.SEM
7-ESTC)
Bittorrent Sync

Biggor is Better
tun r Sync and Shar
UNLIMITEO SECURE
SYNC.
EASY AND
FREE.

Private and Secure

Fig.3

a way
to transfer largo filos anonymously but did you
Weve introduced Bittorront Sync proviously as
porsonal Cloud?
know that you can also uso it to croato your
you can sync all your files on all your
to act as a drop-0fl point s0
All you need to do is configuro a foldor
devices running Bittorrent Sync.
FrcoBSD, i0S, Android, Windows Phone,
Kindle
Bittorrent Sync supports: Windows, macOS, Linux,
Firo.

Own-Cloud
An incredibly versatile tool, own-Cloud is a free, open source application that
lets you build more than a

Dropbox replacement to dump your data.


your
Along with data storage, the app comos with a number of other featuros such as a way to manage
cnlendar, to-do lists, a documont editing tool and many more.

You can get Own-Cloud installed with the instructions found hero.

(SPPU-New Syllabus w.e.f academic year 22-23)(P7-129) LE Tech-Neo Publications...A SACHIN SHAH Venture
(Lab Marnua).Page ro
Cloud Computing (SPPU-SEM
7-E&TC) (L5

Nove es

ore Tar uuao


Phetee Rercmes4 aic Cume

Demo Code
C vta9ind
DemoCode C

Demo Code PHP Camasacos 3.4 mis


Demo Code- PyonY smints

Deno tnage-eee

Denonage-Lae Tasards May Waa Certe

Demo Image- Northen Ligts

Deno Movie OGG - Big Bu Buny Traeo

Fig. 4

OwnCloud supports: Clients available for Windows, macOS, Linux, i0S, Android. Server software
installed using web installer.

Seafile
Librares Discussion W*i Flees Members Admin

Add a dscsson.

jgkiifíng 2013-24-04
helo

Shua Ln 2023-0404
Yeah, Seackud.cet

-
Add a tepy

Fig.5

(SPPU-New Syllabus w.e.facademic year


22-23)(P7-129) Tech-Neo PublicationsA SACHIN SHAH Venture
(Lab Manual)...Pag no.(L-7)
Cloud Computing (SPPU-SEM 7-E&TC)
collaboration tool.
as syncing and online
Deanle, another open sourco solution, sells itself a filo self-hosted servers. For the Iatter,
SeaCloud.cc or sot up
plon of using its cloud sorvico,
user per year). The application featuresa rich
($26 por
YO Kinds: Open Sourco and Busingss
ana more.
online file editor, version control, multi-platform file eyncing And softwar
macOS, Linux, 10, Anarold. Server
ele Supports : Clients available for Windows,
available for Windows, Linux, Raspborry Pi.
Cozy

JJ
MES COE
*** KaNTACYS

CALENDAR

Interaa

O
UTCScast Toces

teliiani

Fig. 6

to give you a way to maintain your own data using


your own
Similar to OwnCloud, the aim of Cozy is
web apps.
Google App
you to turn your server in a kind of personal
In the developers own words, "Cozy allows
Engine."
hoping to connect many different services and
The developers encourage users to develop it further,
utilities to it.
supports: Images available on Virtualbox, Raspberry Pi, OpenVZ, Cubieboard2, Cubietruck.

22-23)(P7-129)
(SPPU-New Syllabus w.e.f academic year Tech-Neo Publications..A SACHIN SHAH Ventuie
Cloud Computing (SPPU.-SEM 7-E&TOC)
(Lab Manua)..Page no. (L8)
SparkleShare

Sparkleshare setup

Where's your project hosted7

etythng urader rg (onud


eitbocket
ree tode hosting loe Ct and Mgrtyrid
clthub
Kobre in prutibtn4en.ca
Gltorlous
Open outte infrastrutture for hosting ooen soure protcts

Addresss Remote Path:

soto4Btb.nr
Junanelproject

Fetch prior history Cancel Add

Fig. 7

Sparkle Share uses git in order to maintain all your data. This means that you will get full version
history of your files as well as the other good stuff that comes with git.
This is an excellent solution if you have documents that require going through a lot of changes. It may
not do so well with very large files though.
Sparkle Share supports: Client available for Windows, macOS, Linux. Relies on a Git server for data
storage.

Case Study 4
Problem Statement Creating an EPM Cloud Instance
An Oracle Enterprise Performance Management Cloud subscription entitles you to one instance
comprising two environments; one to host the tost version of a business process and the other to host
the production version. When you create an instance, Oracle Fusion Cloud Enterprise Performance
Management automatically creates these environments.
You require the Cloud Account Administrator role to create an EPM Cloud instance.
a
eseciet10
To create an instance there are flowing 8 steps.baor A 3no1A. bl t srati Id
wo1.o Complete a step: f ail313)93 r ublss w orr eina nid, 4
2. Click Create Instance(s) in the email that you received after activating the service and sign in.
EAccess My Services (OC). See Accessing My Services (OC).

(SPPU-New syllabus w.e.f academic year 22-23)P7-129) Tech-Neo Publications..A SACHIN SHAH Venture
(Lab Manual)....Page no. (Lc
Cloud Computing (SPPU-SEM 7-E&TC)
3. Click Create Instance.
In Creatoe Instance, click Crento in tho EPM tilo.

Dashboard

mportant NON atons

Atagd Accoat
reate tas tae

Create Instance
Active AppilcationS want to activate.
Select the Cloud Service you
tdentiyCou All Services Filter..
Featured Services

Create Create
ldentity Cloud
EPM
Subscription ld 6553913241
Subscription Id: 653848380

Fig. 8

Create Instance Screen


e4. Click Configuration.
032
5. In Data Center, select a data center close to the majority of your users.
6. In Name, enter a name for this environment using only lowercase letters and numbers.
This name forms a part of the URL to access your environments and should be easily identifñable to
users; for example, an abbreviated förm of your organization's name. See OCI (Gen 2) URLs
for

more information.
7. Click Review.
8. Click Complete to submit the request to create the environment.
This process may take a few minutes to complete after which you should receive an email from
oraclecloudadmin_ww@oracle.com titled Action Required: Your new Oracle Enterprise Performance
Management instance in Cloud Account xxxx is ready. 195 "ofl cneissyhs1a8trs an. rs
The EPM application tile is now added to the My Services (OCI). Cliek the name of the tile to view
instance and environments detalls a:
harrisoer

Manual Enis
vi Lab
9i10i

You might also like