Project Report - Format
Project Report - Format
A
                                          Industrial/Field Project Report
submitted
in partial fulfilment
Master of Technology
Supervisor Submitted By
LIET-Alwar
Jan 2022
Created with
PDFBear.com
                                            Candidate’s Declaration
           I hereby declare that the Industrial/Field Project, which is being intern in the field, entitled “Cloud
           Computing ” in partial fulfilment for the award of Degree of “Master of Technology” in Department
           of Computer Science & Engineering with Specialization in Computer Science Engineering , and
           submitted to the Department        of Computer Science & Engineering, Laxmi Devi Institute of
           Engineering & Technology, Alwar, Bikaner Technical University is a record of my own Learning and
           internship carried under the Guidance of Dr. Pratap Singh Patwal , HOD(CSE) : Laxmi Devi institute
           of Engineering & Technology, Alwar.
           I have not submitted the matter presented in this field work report anywhere for the award of any
           other Degree.
           Counter Signed by
           Guide Name: DR. Pratap Singh Patwal
           Designation: HOD
           Department: Computer Science & Engineering Department
           Laxmi Devi Institute of Engineering & Technology, Alwar
Created with
PDFBear.com
               CERTIFICATE
II
Created with
PDFBear.com
               DOMAIN CERTIFICATE
III
Created with
PDFBear.com
                                                     ABSTRACT
           Cloud computing is the latest of computing paradigms. It promises to change the way people use
           computing resources. Using Internet as the backbone, cloud computing asserts that it is possible to
           provide computing as a “utility” to end users “as and when needed” basis. Cloud computing has a
           potential to serve users of all kinds: individual users, institutions, industry at large. This report
           covers issues such nature and scope of cloud computing, its applications, business rationale etc.
           Cloud computing is a business model that harnesses the web as the ultimate business platform.
           Cloud computing is impregnated with immense potential for array of practical applications. Cloud
           computing intends to make the Internet the ultimate home of all computing resources- storage,
           computations, applications and allow end user (both individuals and business) to avail these
           resources in quantities of her choice, location of their preferences, for duration of their liking.
                                                                                                            In
           other world web become the provision store for all your computing needs. A business model built
           on this paradigm offers these resources as services either on pay per use basis or rental basis. The
           model is expected make computing needs available via web on retail basis and is called cloud
           computing. Cloud computing intends to make the Internet the ultimate home of all computing
           resources- storage, computations, applications and allow end user to available them in quantities of
           her choice, location of their preferences, for duration of their liking. In other world web become the
           provision store for all your computing needs.
IV
Created with
PDFBear.com
                                                                     Table Contents
               1. Introduction ........................................................................................................................... 1
                    1.1 Cloud Computing Architecture: ........................................................................................ 2
                    1.2 Hosting a cloud: ................................................................................................................ 2
                    1.3 Benefits of Cloud Hosting: ................................................................................................ 3
               5. Hypervisor ............................................................................................................................ 11
                    5.1 Types of Hypervisors – .................................................................................................... 12
                    5.2 Choosing the right hypervisor: ....................................................................................... 12
                    5.3 HYPERVISOR REFERENCE MODEL: .................................................................................. 13
Created with
PDFBear.com
                    10.1 Role of Cloud Computing in Financial Market – ............................................................. 21
                    10.2 Features of Cloud Computing Services: ......................................................................... 21
                    10.3 The key Benefits of Cloud Computing are:..................................................................... 21
Conclusion ............................................................................................................................... 24
VI
Created with
PDFBear.com
                                                                  List of Figures
VII
Created with
PDFBear.com
                                                    1. Introduction
           Cloud computing is a recently developing paradigm of distributed computing. Though it is not a
           new idea that emerged just recently. In 1969 L. Kleinrock anticipated, “As of now, computer
           networks are still in their infancy. But as they grow up and become more sophisticated, we
           will probably see the spread of ’computer utilities’ which, like present electric and telephone
           utilities, will service individual homes and offices across the country.” His vision was the true
           indication of today’s utility-based computing paradigm. One of the giant steps towards this
           world was taken in mid 1990s when grid computing was first coined to allow consumers to
           obtain computing power on demand. The origin of cloud computing can be seen as an
           evolution of grid computing technologies. The term Cloud computing was given prominence
           first by Google’s CEO Eric Schmidt in late 2006 (mayb e he coined the term) [6]. So, the
           birth of cloud computing is very recent phenomena although its root belongs to some old ideas
           with new business, technical and social perspectives. From the Archi- textural point of view
           cloud is naturally built on an existing grid-based architecture and uses the grid services and
           adds some technologies like virtualization and some business models.
                                                                                     In brief cloud is essentially a
           bunch of commodity computers networked to- gather in same or different geographical locations,
           operating together to serve several customers with different need and workload on demand
           basis with the help of virtualization. Cloud services are provided to the cloud users as utility ser-
           vices like water, electricity, telephone using pay-as-you-use business model. These utility services
           are generally described as XaaS (X as a Service) where X can be Software or Platform or
           Infrastructure etc. Cloud users use these services provided by the cloud providers and build
           their applications in the internet and thus deliver them to their end users. So, the cloud users
           don’t have to worry about installing, maintaining hardware and software needed. And they also
           can afford these services as they must pay as much, they use. So, the cloud users can reduce their
           expenditure and effort in the field of IT using cloud services instead of establishing IT infrastructure
           themselves. Cloud is essentially provided by large, distributed data centers. These data centers
           are often organized as grid and the cloud is built on top of the grid services. Cloud users are
           provided with virtual images of the physical machines in the data centers. This virtualization is
           one of the key concepts of cloud computing as it essentially builds the abstraction over the
           physical system. Many cloud applications are gaining popularity day by day for their availability,
           reliability, scalability, and utility model. These applications made distributed computing easy
           as the critic aspects are handled by the cloud provider itself. Cloud computing is growing now-
           a-days in the interest of technical and business organizations, but this can also be beneficial for
           solving social issues.
                                  In the recent time E-Governance is being implemented in developing
           countries to improveefficiency and effectiveness of governance. This approach can be improved
           much by using cloud computing instead of traditional ICT. In India, economy is agriculture
           based and most of the citizens live in rural areas. The standard of living, agricultural
           productivity etc. can be enhanced by utilizing cloud computing in a proper way. Both
           applications of cloud computing have the is technological as well as social challenges to
           overcome in this report we would try to clarify some of the ideas – Why is cloud computing a
           buzzword today? i.e., what are the benefits the provider and the users get using cloud? Though
           its idea has come long back in 1990 but what situation made it indispensable today? How is
           cloud built? What differentiates it from similarterms like grid computing and utility computing?
Created with
PDFBear.com
                   Though cloud computing now-a-days talks about business enterprises not the non-
           profit organizations; how can this new paradigm be used in the services like e-governance and
           in social development issues of rural India? In Simplest terms, cloud computing means storing
           and accessing the data and programs on remote servers that are hosted on internet instead of
           computer’s hard drive or local server. Cloud computing is also referred as Internet based
           computing.
                  •   Infrastructure
                  •   Platform
                  •   Application
           At the bottom is the foundation, the infrastructure where the people start and begin to build.
           This is the layer where the cloud hosting lives.
           Now, let’s have a look at hosting say you have a company and a website, and the website has
           a lot of communications that are exchanged between members. You start with a few members
           talking with each other and then gradually the numbers of members increase. As the time passes,
           as the number of members increases, there would be more traffic on the network and your
                                                               2
Created with
PDFBear.com
           server will get slow down. This would cause a problem. A few years ago, the websites are put
           in the server somewhere, in this way you must run around or buy and set number of
           servers. It costs a lot of money and takes lot of time. You pay for these servers when you
           are using and as well as when you are not using. This is called hosting. This problem is
           overcome by cloud hosting. With Cloud Computing, you have access to computing power
           when you needed. Now, your website is put in the cloud server as you put it on dedicated
           server. People start visiting your website and if you suddenly need more computing power, you
           will scale up according to the need.
Created with
PDFBear.com
               •   Software as a service (Saas)
               •   Platform as a service (PaaS)
               •   Infrastructure as a service (IaaS)
               •   Anything as a service (XaaS)
           These are sometimes called the cloud computing stack because they are built on top of one
           another. Knowing what they are and how they are different, makes it easier to accomplish your
           goals.
               Advantages of SaaS:
                   •   Cost-Effective: Pay only for what you use.
                   •   Reduced time: Users can run most SaaS apps directly from their web browser without
                       needing to download and install any software. This reduces the time spent in installation
                       and configuration and can reduce the issues that can get in the way of the software
                       deployment.
                   •   Accessibility: We can Access app data from anywhere.
                   •   Automatic updates: Rather than purchasing new software, customers rely on a SaaS
                       provider to automatically perform the updates.
                   •   Scalability: It allows the users to access the services and features on-demand. The
                       various companies providing Software as a service are Cloud9 Analytics, Salesforce
Cloud Switch, Microsoft Office 365, Eloqua, drobox, and Cloud Tran.
               b) Platform as a Service: PaaS is a category of cloud computing that provides a platform and
                   environment to allow developers to build applications and services over the internet. PaaS
                   services are hosted in the cloud and accessed by users simply via their web browser. A PaaS
                   provider hosts the hardware and software on its own infrastructure. As a result, PaaS frees
                   users from having to install in-house hardware and software to develop or run a new
                   application. Thus, the development and deployment of the application take
                   place independent of the hardware. The consumer does not manage or control the
                   underlying cloud infrastructure including network, servers, operating systems, or storage,
                   but has control over the deployed applications and possibly configuration settings for the
                   application-hosting environment.
                                                             4
Created with
PDFBear.com
               Advantages of PaaS:
                  •   Simple and convenient for users: It provides much of the infrastructure and other IT
                      services, which users can access anywhere via a web browser.
                  •   Cost-Effective: It charges for the services provided on a per-use basis thus eliminating
                      the expenses one may have for on-premises hardware and software.
                  •   Efficiently managing the lifecycle: It is designed to support the complete web
                      application lifecycle: building, testing, deploying, managing, and updating.
                  •   Efficiency: It allows for higher-level programming with reduced complexity thus, the
                      overall development of the application can be more effective.
           The various companies providing Platform as a service are Amazon Web services, Salesforce,
           Windows Azure, Google App Engine, cloud Bess and IBM smart cloud.
               Advantages of IaaS:
                  •   Cost-Effective: Eliminates capital expense and reduces ongoing cost and IaaS customers
                      pay on a per-user basis, typically by the hour, week, or month.
                  •   Website hosting: Running websites using IaaS can be less expensive than traditional
                      web hosting.
                  •   Security: The IaaS Cloud Provider may provide better security than your existing
                      software.
                  •   Maintenance: There is no need to manage the underlying data centre or the
                      introduction of new releases of the development or underlying software. This is all
                      handled by the IaaS Cloud Provider.
           The various companies providing Infrastructure as a service are Amazon web services, blue stack,
           IBM, Open stack, Rack space, and VMware.
               d) Anything as a Service: Most of the cloud service providers nowadays offer anything
                  as a service that is a compilation of all the above services including some additional
                  services.
Advantages of XaaS:
Created with
PDFBear.com
                  • As this is a combined service, so it has all the advantages of every type of cloud service.
                                                3. Types of Cloud
           Cloud computing is Internet-based computing in which a shared pool of resources is available over
           broad network access, these resources can be provisioned or released with minimum management
           efforts and service provider interaction.
Created with
PDFBear.com
                 b) Private cloud: Private clouds are distributed systems that work on private infrastructure
                    and provide the users with dynamic provisioning of computing resources. Instead of a pay-
                    as-you-go model in private clouds, there could be other schemes that manage the usage of
                    the cloud and proportionally billing of the different departments or sections of an
                    enterprise.
                    • Customer information protection: In the private cloud security concerns are less since
                        customer data and other sensitive information do not flow out of private infrastructure.
Created with
PDFBear.com
                                                   Fig 3.3 Hybrid Cloud
               d) Community cloud: Community clouds are distributed systems created by integrating the
                  services of different clouds to address the specific needs of an industry, a community, or a
                  business sector. In the community cloud, the infrastructure is shared between organizations
                  that have shared concerns or tasks. The cloud may be managed by an organization or a third
                  party.
Created with
PDFBear.com
           3.2 Sectors that use community clouds are:
               ✓ Media industry: Media companies are looking for quick, simple, low-cost ways for
                  increasing the efficiency of content generation. Most media productions involve an
                  extended ecosystem of partners. In particular, the creation of digital content is the outcome
                  of a collaborative process that includes the movement of large data, massive compute-
                  intensive rendering tasks, and complex workflow executions.
               ✓ Healthcare industry: In the healthcare industry community clouds are used to share
                  information and knowledge on the global level with sensitive data in the private
                  infrastructure.
               ✓ Energy and core industry: In these sectors, the community cloud is used to cluster a set of
                  solution which collectively addresses management, deployment, and orchestration of
                  services and operations.
Created with
PDFBear.com
           The machine on which the virtual machine is going to be built is known as Host Machine and that
           virtual machine is referred as a Guest Machine.
b) Network Virtualization: The ability to run multiple virtual networks with each has a
10
Created with
PDFBear.com
                  separate control and data plan. It co-exists together on top of one physical network. It can
                  be managed by individual parties that potentially confidential to each other. Network
                  virtualization provides a facility to create and provision virtual networks—logical switches,
                  routers, firewalls, load balancer, Virtual Private Network (VPN), and workload security
                  within days or even in weeks.
               f) Data virtualization: This is the kind of virtualization in which the data is collected from
                  various sources and managed that at a single place without knowing more about the
                  technical information like how data is collected, stored & formatted then arranged that data
                  logically so that its virtual view can be accessed by its interested people and stakeholders,
                  and users through the various cloud services remotely. Many big giant companies are
                  providing their services like Oracle, IBM, At scale, Cdata, etc.
                                                    5. Hypervisor
           A hypervisor is a form of virtualization software used in Cloud hosting to divide and allocate the
           resources on various pieces of hardware. The program which provides partitioning, isolation or
           abstraction is called virtualization hypervisor. The hypervisor is a hardware virtualization
           technique that allows multiple guest operating OS to run on a single host system at the same
           time. A hypervisor is sometimes also called a virtual machine manager.
11
Created with
PDFBear.com
           5.1 Types of Hypervisors –
               a) TYPE-1 Hypervisor:
                  The hypervisor runs directly on the underlying host system. It is also known as “Native
                  Hypervisor” or “Bare metal hypervisor”. It does not require any base server operating
                  system. It has direct access to hardware resources. Examples of Type 1 hypervisors include
                  VMware       ESXi,     Citrix   XenServer    and     Microsoft    Hyper-V     hypervisor.
                     • Pros: Such kind of hypervisors are very efficient because they have direct access to
                         the physical hardware resources (like Cpu, Memory, Network, Physical storage).
                         This causes the empowerment the security because there is nothing any kind of
                         the third-party resource so that attacker couldn’t compromise with anything.
                     • Cons: One problem with Type-1 hypervisor is that they usually need a dedicated
                         separate machine to perform its operation and to instruct different VMs and
                         control the host hardware resources.
               b) TYPE-2 Hypervisor:
                  A Host operating system runs on the underlying host system. It is also known as ‘Hosted
                  Hypervisor”. Such kind of hypervisors doesn’t run directly over the underlying hardware
                  rather they run as an application in a Host system (physical machine). Basically, software
                  installed on an operating system.
Created with
PDFBear.com
               a) Understand your needs: The company and its applications are the reason for the data
                  centre (and your job). Besides your company’s needs, you (and your co-workers in IT) also
                  have your own needs. Needs for a virtualization hypervisor are:
                  a. Flexibility
                  b. Scalability
                  c. Usability
                  d. Availability
                  e. Reliability
                  f. Efficiency
                  g. Reliable support
               b) The cost of a hypervisor: For many buyers, the toughest part of choosing a hypervisor is
                  striking the right balance between cost and functionality. While several entry-level
                  solutions are free, or practically free, the prices at the opposite end of the market can be
                  staggering. Licensing frameworks also vary, so it’s important to be aware of exactly what
                  you’re getting for your money.
               c) Virtual machine performance: Virtual systems should meet or exceed the performance
                  of their physical counterparts, at least in relation to the applications within each server.
                  Everything beyond meeting this benchmark is profit.
               d) Ecosystem: It’s tempting to overlook the role of a hypervisor’s ecosystem – that is, the
                  availability of documentation, support, training, third-party developers, and consultancies,
                  and so on – in determining whether a solution is cost-effective in the long term.
               e) Test for yourself: You can gain basic experience from your existing desktop or laptop.
                  You can run both VMware vSphere and Microsoft Hyper-V in either VMware Workstation
                  or VMware Fusion to create a nice virtual learning and testing environment.
               a) DISPATCHER:
                  The dispatcher behaves like entry point of the monitor and reroutes the instruction of
               b) ALLOCATOR:
                  The allocator is responsible for deciding the system resources to be provided to the virtual
                  machine instance. It means whenever virtual machine tries to execute an instruction that
                  results in changing the machine resources associated with the virtual machine, the
                  allocator is invoked by the dispatcher.
               c) INTERPRETER:
                  The interpreter module consists of interpreter routines. changing the machine resources
                  associated with the virtual machine, the allocator is invoked by the dispatcher. These are
                  executed, whenever virtual machine executes a privileged instruction.
                                                           13
Created with
PDFBear.com
                                6. Characteristics of Cloud Computing
           There are basically 5 essential characteristics of Cloud Computing.
                  a) On-demand self-services: The Cloud computing services does not require any
                      human administrators, user themselves are able to provision, monitor and manage
                      computing resources as needed.
                  b) Broad network access: The Computing services are generally provided over standard
                      networks and heterogeneous devices. it is provided to him, and it is scale out as soon
                      as its requirement gets over.
                  c) Rapid elasticity: The Computing services should have IT resources that are able to
                      scale out and in quickly and on as needed basis. Whenever the user requires services,
                      it is provided to him, and it is scale out as soon as its requirement gets over.
                  d) Resource pooling: The IT resource (e.g., networks, servers, storage, applications, and
                      services) present are shared across multiple applications and occupant in an
                      uncommitted manner. it is provided to him, and it is scale out as soon as its
                      requirement gets over. Multiple clients are provided service from a same physical
                      resource.
                  e) Measured service: The resource utilization is tracked for each application and
                      occupant; it will provide both the user and the resource provider with an account of
                      what has been used. This is done for various reasons like monitoring billing and
                      effective use of resource.
14
Created with
PDFBear.com
               •   Simple Storage Service: S3 can be thought as a globally available distributed
                   hash table with high-level access control. Data is stored in name/value pairs.
                   Names are like UNIX file names and the value can be object having size up-to 5
                   GB with up-to 4K of metadata for each object. All objects in Amazon’s S3
                   must fit into the global namespace. This namespace consists of a “bucket name”
                   and an “object name”. Bucket names are like usernames in traditional email
                   account and provided by Amazon on first come first serve basis. An AWS
                   (Amazon Web Services) account can have maximum of 100 buckets. Data to S3
                   can be sent by SOAP based API or with raw HTTP “PUT” com- mands. Data
                   can be retrieved using SOAP HTTP or BitTorrent. While using BitTorrent the S3
                   system operates as both tracker and the initial seeder. There are also some tools
                   available which enables the users to view S3 as a remote file system. Upload
                   download rate from and to S3 is not that much exiting. One developer from
                   Germany reported experiencing 10-100 KBps. This rate can go up-to 1-2 MBps on
                   the higher side depending on the time of the day. Although the speed is not that
                   much fascinating it is good enough for delivering web objects and for backup
                   purposes although for doing computation it is not suitable. Amazon S3 has a
                   very impressive support for privacy, integrity, and short-term availability. Long
                   term availability is unknown as this depends on the internal commitment of
                   Amazon data centres. Data privacy can be obtained by encrypting the data to be
                   stored. But this encryption is to be done by the user before storing the data in
                   S3. One can use SSL with HTTPS to connect to S3 for more security, but this
                   usage of SSL increases upload/download time also. Data integrity can be
                   achieved by checking end to end MD5 checking. When an object is stored into
                   S3 then it returns MD5 of that object. One can easily check it with previously
                   computed hash value to guarantee data integrity. Short term availability
                   depends upon the Amazon’s connectivity and load on its server at that instant.
                   Once the data is in the S3 then it is Amazon’s responsibility to take care of its
                   availability. They claim that the data is backed up on multiple hard drives in
                   multiple data centres but doesn’t guarantee this by any Service Level
                   Agreement. Every AWS account has an Access Key ID, and a Secret Key the ID
                   is of 20 characters and the Key is a 41-character string. When signing HMAC is
                   first computed for the sign request parameters using that Key. And in the
                   Amazon server that HMAC is again computed and compared with the value
                   previously computed in the client side. These requests also include timestamp to
                   prevent replay attacks.
               •   Elastic Compute Cloud: As the name implies EC2 rents cloud of computers to
                   the users with flexibility of choosing the configuration of the virtual machine-like
                   RAM size, local disk size, processor speeds etc. Machines that deliver EC2
                   services are virtual machines running on top of XEN platform. Users can store a
                   disk image inside S3 and create a virtual machine in EC2 using tools provided by
                   Amazon. This virtual machine can be easily instantiated using a java program
                   and can also be monitored. As EC2 is based on XEN it supports any Linux
                                                    15
Created with
PDFBear.com
                           distribution as well as other OSs. Amazon does not promise about reliability of
                           the EC2 computers. Any machine can crash at any moment, and they are not
                           backed up. Although these machines generally don’t crash according to the
                           experience of the users, but it is safe to use S3 to store information which is
                           more reliable and replicated service. EC2 security model is like that of S3. The
                           only difference is that the commands are signed with an X 509 private key.
                           But this key is downloaded from AWS account, so the security depends
                           fundamentally on theAWS username and password.
               b)   Google App-Engine
                    Google App-Engine is a platform for developing and deploying web applications in
                    Google’s architecture. This provides Platform as a Service to the cloud users. In 2008
                    Google App-Engine was first released as beta version. Languages supported by Google
                    App-Engine are python, java, and any extension of JVM languages. App- Engine requires
                    developers to use only languages which are supported by it, and this is also applied with
                    APIs and frameworks. Now Google App-Engine allows storing
                    and retrieving data from a Bigtable non-relational database. App Engine applications
                    are expected to be request-reply based. Google App- engine provides automatic scalability,
                    persistent data storage service. Data store features a query engine and transaction
                    capabilities. These applications are easy to scale as traffic and data storage need to
                    grow so the cloud user doesn’t have to worry about the spikes in the traffic or data.
                    These applications are generally suitable for social networking start-ups, event-based
                    websites catering to seasonal events or institutions (schools, colleges, universities,
                    government agencies) etc.
               c)   Windows Azure
                    Windows Azure is an intermediate in the spectrum of flexibility vs programmer
                    convenience. These systems use .NET libraries to facilitate language independent
                    managed environment. This service falls under the category of Platform as a Ser- vice.
                    Though it is actually in between complete application framework like Google App-
                    Engine and hardware virtual machines like EC2. Azure applications run on machines in
                    Microsoft data centres. By using this service customers can use it to run applications and
                    store data on internet accessible machines owned by Microsoft. windows Azure platform
                    provides three fundamental components - compute com- ponent, storage component
                    and fabric component.
                       • The Fabric: All Windows Azure application and all the data stored in Azure Storage
                           live are physically happen inside some of the data centers handled by Microsoft. In
                           the data center’s the set of machines dedicated to Azure are organized into a fabric.
                           These machines are managed by fabric controller. These are replicated in five to
                           seven machines. These controllers are aware of every Windows Azure application
                           running in that fabric and owns all the resources like computers, switches, load
                           balancers etc. Controllers monitors, decides which resources to allocate to new
16
Created with
PDFBear.com
                   applications looking at the configuration file with the application. They also monitor
                   the running applications
               •   The Compute Service: The primary goal of this platform is to support many
                   simultaneous users. (Microsoft also said that they would use Azure to build their
                   SaaS applications which motivated many potential users.) To allow applications to
                   scale out Microsoft uses multiple instances of that applications on virtual machines
                   provided by Hypervisor. Developers use Windows Azure portal through Web
                   browser and use Windows live ID to sign in into his/her hosting account or storage
                   account or both.
               – Web role instance: As the name implies this type of instance can accept HTTP
                 or HTTPS requests. For this facility Microsoft uses IIS (Internet Information
                 Services) as a web server inside the VM provided. Developers can build applications
                 using ASP.NET, Windows Communication Foundation (WCF) or any other .NET
                 technology or native codes also like C++. PHP or java-based technologies also
                 supported in Azure.
               – Worker role instance: This type of instances is very similar to that of Web role
                 instances. But unlike the Web role instances these don’t have IIS configured. They
                 can be configured to run executable of users’ right. Worker role instance is more
                 likely to function like a background job. Web role instances can be used to accept
                 request from the users and then they can be processed by Worker role instances
                 in a later point of time. For a compute intensive work many Worker role instances
                 can run in parallel.
17
Created with
PDFBear.com
                      – The Storage Service: Applications running in Azure uses storage of different types:
                                o Blobs: This is used for storing binary data in a simple hierarchy. Blobs
                                  can have associated metadata with them. A user account can have
                                  oneor more containers and these containers have one or more
                                o Storage tables: Blobs provide mechanisms for unstructured data but
                                  for more structured purposes tables are more suitable. These tables
                                  are nothing like tables in a traditional database. They are stored in a
                                  group of entities. These tables can be accessed by using ADO.NET Data
                                  Services. SQL is not preferable for scale out issues.
                                o Queue: This is not a structure like tables or blobs to store data, but
                                  these queues are used to store messages about tasks to be performed by
                                  Worker role instance. These tasks are written by Web role instances on
                                  receiving request from clients. A Worker role instance waiting on that
                                  queue can read the message and perform the task it specifies.
                   All data in the Windows Azure storage is replicated three times for providing fault
                   tolerance. Azure also keeps backups in geographically distributed data centers.
                   Windows Azure storage can be accessed by any Windows Azure ap- plication as well
                   as any application hosted at another cloud platform. All the blobs, tables, queues are
                   named using URIs and can be accessed by HTTP methods calls. Some applications
                   have inherent need for relational databases. This is provided in the form of SQL Azure.
                   This is built on Microsoft SQL Server. This data can be accessed via ADO.NET or by
                   other Windows data access interfaces.
                a) Privacy: The user data can be accessed by the host company with or without permission.
                   The service provider may access the data that is on the cloud at any point in time. They
                   could accidentally or deliberately alter or even delete information.
                b) Compliance: There are many regulations in places related to data and hosting. To comply
                   with regulations (Federal Information Security Management Act, Health Insurance
                   Portability and Accountability Act, etc.) the user may have to adopt deployment modes
                   that are expensive.
                c) Security: Cloud-based services involve third-party for storage and security. Can one
                   assume that a cloud-based company will protect and secure one’s data if one is using their
                   services at a very low or for free? They may share users’ information with others. Security
                   presents a real threat to the cloud.
18
Created with
PDFBear.com
               d) Sustainability: This issue refers to minimizing the effect of cloud computing on the
                 environment. Citing the server’s effects on the environmental effects of cloud computing,
                 in areas where climate favours natural cooling and renewable electricity is readily
                 available, the countries with favourable conditions, such as Finland, Sweden, and
                 Switzerland are trying to attract cloud computing data centres. But other than nature’s
                 favours, would these countries have enough technical infrastructure to sustain the high-
                 end clouds?
               e) Abuse: While providing cloud services, it should be ascertained that the client is not
                 purchasing the services of cloud computing for a nefarious purpose. In 2009, a banking
                 Trojan illegally used the popular Amazon service as a command-and-control channel that
                 issued software updates and malicious instructions to PCs that were infected by the
                 malware So the hosting companies and the servers should have proper measures to
                 address these issues.
               f) Higher Cost: If you want to use cloud services uninterruptedly then you need to have a
                 powerful network with higher bandwidth than ordinary internet networks, and if your
                 organization is broad and large so ordinary cloud service subscription won’t suit your
                 organization. Otherwise, you might face hassle in utilizing an ordinary cloud service while
                 working on complex projects and applications. This is a major problem before small
                 organizations, that restricts them from diving into cloud technology for their business.
               g) Recovery of lost data in contingency: Before subscribing any cloud service provider
                 goes through all norms and documentations and check whether their services match your
                 requirements and sufficient well-maintained resource infrastructure with proper
                 upkeeping. Once you subscribed to the service you almost hand over your data into the
                 hands of a third party. If you can choose proper cloud service, then in the future you don’t
                 need to worry about the recovery of lost data in any contingency.
               i) Lack of resources/skilled expertise: One of the major issues that companies and
                 maintaining a cloud is a herculin task because a cloud architecture contains a large
                 resources infrastructure and other challenges and risks as well, user satisfaction, etc
                 enterprises are going through today is the lack of resources and skilled employees. Every
                 second organization is seeming interested or has already been moved to cloud services.
                 That’s why the workload in the cloud is increasing so the cloud service hosting companies
                 need continuous rapid advancement. Due to these factors, organizations are having a
                 tough time keeping up to date with the tools. As new tools and technologies are emerging
                 every day so more skilled/trained employees need to grow. These challenges can only be
                 minimized through additional training of IT and development staff.
Created with
PDFBear.com
           9.1 Provisioning and Configuration Module:
           It is the lowest level of cloud and typically resides on bare hardware (as a firmware) or on the top
           of the hypervisor layer. Its function is to abstract the underlying hardware and provide a standard
           mechanism to spawn instance of virtual machine on demand. It also handles the post-
           configuration of the operating systems and applications residing on the VM.
           9.4 Orchestration:
           Orchestration is a central to cloud operations. Orchestration converts requests from the service
           management layer and the monitoring, chargeback modules to appropriate action item which are
           then submitted to provisioning and configuration module for final closure. Orchestration updates
           the CMDB in the process.
20
Created with
PDFBear.com
           to make clear decisions upon their approach of handling day to day fiscal problems and to adapt
           the cloud computing services on the go. In this digital age of computers and networks, one of the
           major discoveries in information technology is Cloud computing. Cloud Computing is a wireless
           shared stream of resources networked to offer wide range of services. The services include storage,
           servers, software development platform and all the web hosting service in a “virtual” environment.
           It is the data manipulation and services offered over internet in pay-as-you-go model, which means
           you do pay only for what you use. No advance payment or post payment.
                  •   Platform as a service (PaaS): A platform cloud that helps developers build, host and
                      scale applications through datacentres and host web applications on the same systems.
                  •   Business Process as a Service (BPaaS): An Online business process services for HR,
                      benefits administration and outsourcing of various tasks.
                  •   Data as a Service (DaaS): A public data service that makes large datasets easy to
                      explore, visualize and communicate for trading and investment purposes.
                             1. Public Cloud: It is open to all around the web. The cloud provider manages
                                 and owns everything from operations and facilities to manipulate resources.
3. Hybrid cloud: A hybrid cloud is a mix of multiple public and private clouds.
21
Created with
PDFBear.com
                  •   Cloud leverages the power and performance of the service by accessing the remote
                      resources.
                  •   And if your computer breakdown doesn’t worry all your data are in cloud.
                  •   There by ensuring data security and compliance.
                  •   The accuracy and speed of software implementation is greatly achieved.
                  •   The growth prospects are maintained in time to market business strategy.
                  •   Complexity is much lowered with the help of middleware as a service.
           Cloud computing services accelerates the business in Financial Market by, Cost Reduction,
           Optimizing Resources, and Improving the Market Activities. In much simpler terms internet of
           things collects big data with various devices and store it in cloud and the same being accessed and
           controlled in cloud.
           Economical background of cloud is more useful for developers in the following ways:
                  •   Pay as you go model offered by cloud providers.
                  •   Scalable and Simple.
                  a) Tired Pricing: Cloud Services are offered in the various tiers. Each tier offers fix service
                      agreements at specific cost. Amazon EC2 uses this kind of pricing.
22
Created with
PDFBear.com
                  b) Per-unit Pricing: The model is based upon the unit specific service concept. Data
                     transfer and memory allocation includes in this model for specific units. Go Grid uses
                     this kind of pricing in terms of RAM/hour.
                  c) Subscription based Pricing: In this model users are paying periodic subscription fee
                     for the usage of software.
So, these models give more flexible solutions about cloud economy.
23
Created with
PDFBear.com
                                                     Conclusion
           There are many more players in the on-demand market that many reports acknowledge. These
           range from basic infrastructure offerings (IaaS), through platform support (PaaS) to full applications
           (SaaS). The long-term cost of ownership may at first not seem to add up but take into consideration
           other factors such as reduced risk and added value and for many organisations on-demand services
           make a lot of sense. Cloud computing is changing the way IT departments buy IT. Businesses have a
           range of paths to the cloud, including infrastructure, platforms and applications that are available
           from cloud providers as online services. Many people may be confused by the range of offerings
           and the terminology used to describe them and will be unsure of the risk and benefits. This gallery,
           written for Computer Weekly, by Bob Tarzey of Quocirca aims to provide further insight.
24
Created with
PDFBear.com