0% found this document useful (0 votes)
29 views35 pages

Cloud Computing UNIT I, II

Uploaded by

aravind75024
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views35 pages

Cloud Computing UNIT I, II

Uploaded by

aravind75024
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

MUTHAYAMMAL COLLEGE OF ARTS AND SCIENCE (AUTONOMOUS)

DEPARTMENT OF COMPUTER APPLICATION

Staff Name: V.ARBUTHARAJ Class: III CS A

Paper Name: CLOUD COMPUTING Unit: I Paper Code: 21M5UCSE04

INTRODUCTION:
 The term cloud refers to a network or the internet. It is a technology that uses remote servers on
the internet to store, manage, and access data online rather than local drives.
 The data can be anything such as files, images, documents, audio, video, and more.

CLOUD COMPUTING BASICS

HISTORY OF CLOUD COMPUTING:

1
 Cloud computing comprises of various phases, which include grid and utility computing, application
service providers (ASP) and Software as a Service (SaaS).
 Though the concept of delivering computing resources through a universal network was started in the
1960s, intergalactic computer network _x0000_t75
was introduced
... by J.C.R. Licklider.
 His dream was for everyone on the earth to be connected with anyone and be able to access programs
and data at any location from any place.
 In 1960, the famous scientist John McCarthy predicts that the computation being available as pubic
service.
 The first cloud computing to have arrived in the 1999, which pioneered the idea of delivering enterprise
applications through a simple website.
 The concepts behind the cloud computing are not new, whereas all these concepts are really It was in the
late 1990s that companies such as Sun Microsystems decided to introduce the concept called ‘the
network is the computer’.

CHARACTERISTICS OF CLOUD COMPUTING:


 Server is the most important element in cloud computing. It plays a vital role since it is the brain behind
the entire processing environment.
 In cloud computing, server environment need not be a high-end hardware.

2
FOLLOWING ARE THE FIVE CHARACTERISTICS OF CLOUD COMPUTING:

1.On-demand self-services

2.Broad network access

3.Rapid elasticity
_x0000_t75 ...
4.Resource pooling

5.Measured service

1. On-demand self-services: The Cloud computing services does not require any human
administrators, user themselves are able to provision, monitor and manage computing resources
as needed.

On-demand self service ,mean that a customer can request and receive access to a service offering
without an administrator or some part of support staff having to full fil the request manually.

2. Broad network access: The Computing services are generally provided over standard networks
and heterogeneous devices.

The service can be accessed from any location (using any type of device). Eg: anywhere access
at anytime.

3. Rapid elasticity: The Computing services should have IT resources that are able to scale out and
in quickly and on as needed basis.

Whenever the user require services it is provided to him and it is scale out as soon as its
requirement gets over.
3
4. Resource pooling: The IT resource (e.g., networks, servers, storage, applications, and services)
present are shared across multiple applications and occupant in an uncommitted manner.

Multiple clients are provided service from a same physical resource.

5. Measured service: The resource utilization is tracked for each application and occupant it will
provide both the user and the resource provider with an account of what has been used.

This is done for various reasons like monitoring billing and effective use of resource.

MOVE TO CLOUD COMPUTING

o Pros and cons of cloud computing


o Nature of the cloud
Pros and cons of cloud computing:

 Cloud computing can enable constant flow of information between service providers and the end
users. Other remote systems would struggle with such a task because they are based on database that is
largely outdated.
 which information can be accessed gives confidence to the employees of the outsourcing organization,
so that they can continue with their usual routine despite the introduction of cloud computing.
 Microsoft is putting its old office software and file...sharing application, SharePoint, on the cloud
_x0000_t75
alongside developer tools in its Azure platform, which give sold customers the comfort of having their
own stacks.
 Advantages of Cloud Computing in IT Field
 The Fixed Cost Advantage
 Keeping Data Safe
 The Possible Disadvantages of Cloud Computing
 Advantages of Cloud Computing
 Disadvantages of Cloud Computing

Advantages of Cloud Computing in IT Field:


 The interconnectivity of computer servers is the main advantages of cloud computing. This
characteristic can allow an organization to carry out a variety of tasks in different locations.
 cloud computing can facilitate proper management of information technology resources within the
organization.
 This advantage is also crucial to the multitasking demands that are part of modern business.
 This advantage is also crucial to the multitasking demands thatare part of modern business.
 In order to deal with a competitive market, there is an increase in the diversification of the activities
that different companies undertake.
 The second characteristic of the cloud computing innovation is that it allows outsourcingof a key
function of the company’s work portfolio.
 Just like the call centres that have decidedto relocate to cheaper environments, implementing a cloud
computing project can significantly reduce your IT budget.

4
Advantages of cloud computing diagram

Cloud Computing, as it supports/provides the following benefits:


● Online storage
● Accessible in different platforms
● Using online resources
● Online collaboration and
● Easy outsourcing processes
cloud computing is expected to bring in a higherlevel of automation than the ordinary
systems of communication between the various sections of an organization.

KEY ELEMENTS OF CLOUD COMPUTING DIAGRAM:

_x0000_t75 ...

 The company to which you outsource, the functionality must be able to deliver a seamless service via the
Internet or else you have to review the contract.
 If they do not have the capacity to do this effectively, you might bring forward a suggestion for sharing
costs and profits.
 Make sure that at the very beginning of the relationship, these issues are tested and clarified.

The Fixed Cost Advantage:


 Software provided online is upgraded and maintained by the provider, so that small business owner do
not have to purchase the newest version of software program or download fi xes and patches.
 Computer Systems Virtual Machines Pricing VM Monitor Dispatcher Service Monitor Service Request
Examiner and Controller Users Resources Allocator Accounting .
 No need to buy a program, but entering into a monthly or annual contract is also attractive, as is the
reality that several applications are offered for free.
 Though the issue of security cuts both ways, which has been contradictory with the results.

Keeping Data Safe:

5
 It is possible for anonymous computer hackers to gain access to the business information in the cloud. A
discontented former employee known to the company may be able to guess passwords or answer your
security questions and get into the accounts to do harm or worse.
 There have been a couple of such high-profi led incidents revealed in recent times, somewhere online
services and secure data went offl ine for some period of time, during which their customers’ accounts
were inaccessible.
 The key to using cloud hosting safely is finding a conscientious provider that provides back-up programs
so your online data can also be stored domestically.

The Possible Disadvantages of Cloud Computing:


 The main trouble with cloud computing are interrelated to the loss of control to another party.
 This can lead to management problems and inconsistency within the information technology
departments.
 Anyone can put up new systems for dealing with this divergence and will have to construct their
communication systems as the basis as there is another company involved in their business.
 cloud computing will have so many teething problems that it might take years before you settle into an
conformity with your supplier, where by conflicts can be determined before they spiral down.
 Industries that transact sensitive data will be anxious about security when it comes to cloud computing.
The fact that the server is situated in a remote area means, that you have to entrust the security
arrangements to somebody else.
 Now imagine, that functions of a passport office have to be located in a foreign country. Suppose war
breaks out between the two countries.
 The connectivity between the servers will _x0000_t75 ... These are some of the serious challenges to cloud
be stopped.
computing.

Advantages of Cloud Computing

Cost reduction: Cloud computing lessens paperwork, enterprise deal charges and minimizes the
financial Endeavour in hardware. Moving your enterprise to ‘the cloud’ in addition lessens the want
for an employee.

Scalability: Cloud computing services sanction enterprises to only compensate for what they uselike
electrical power and water. As the business grows, user can put up by adding more server space.

Levels the playing field: Sharing IT resources with other companies reduces the cost of licensing
software and retail servers.

Easier collaboration: Cloud computing services allow to access any time from any computer, itis
easy to work together with employees in remote locations.

Affordable: With cloud computing, it is possible to reduce operational costs and investment
expenditures on hardware, software licenses and implementation services.
Scalable and flexible: Cloud computing can sanction to maximize supplies for better competenceand
lessen unused capacity. It can also scale up or downward to meet the varying demands of the
business.

6
Efficiency: Cloud computing renders the gain of divided hardware, automated and
recognizabletechnologies. The employees have the right to use the database fromeverywhere by
using anyPC, mobile device or browser. It also reduces overall energy usage and physical presence.

Disadvantages of Cloud Computing:

Security concerns: The main concern with cloud computing is having your data easily reachedvia
the web. Although security is stretched and is getting even more advanced as technology providers
perfect the framework, it is still an anxiety.

Risk of losing internet connection: If there is no Internet connection, the database accessing isvery
difficult.

Limited resources for customizations: One can require in-depth customizations and integrationwith
his current systems for his daily business functions. Cloud computing may not be accommodating to
his needs.

Availability: If it happens, the cloud service goes down unexpectedly, leaving you without important
information for hours or more? Then how is it possible to get reliability in retrieval of data isyet
another challenge.

Data mobility and ownership: In cloud environment, it is possible get back the data safely even
when the cloud service is stopped. How can you be assured
_x0000_t75 ... that the service provider will wipe out
your data once you have cancelled the service?

Privacy: How much data the cloud service companies are collecting and how are they using the
information?

NATURE OF THE CLOUD:


 Cloud computing curves the economics of IT business onto its head. Delivery of information
technology services (including infrastructure, platform and applications) from the cloud has both
capital expense advantages and operation disbursement advantages.

Cloud computing provides enterprises with two-fold solutions:


1. Organizational perspective:
 The cloud give services for client and enterprise needs in a simplified way, brought ahead of scale and
high worth of service that drives the capability for expansion and innovation.

2. User’s perspective:
 It enables computing services in a simpler, more responsive model without complete knowledge of the
underlying technology.
 It is an effective service acquisition and delivery model for IT resources if properly implemented
within an all-inclusive technology strategy.
 Cloud computing can help to improve overall business performance while controlling the costs of
distributing IT resources to the organization.

TECHNOLOGIES IN CLOUD COMPUTING:


7
 Now-a-days, the news about cloud computing is that the cost of the hardware is very high.
 International Data Corporation has predicted that the revenue is estimated to grow from$582 million,
which was in 2009, to about $718 million in 2014.Cloud computing is based on the advance
distributed technologies.

Other Cloud-related Technologies:


 Grid computing
 Utility computing
 Autonomic computing

Grid computing: It defined as an extension of distributed and parallel computing in which a super
and virtual computer consists of a number of networked and loosely coupled computers that act
together to perform enormous tasks.

Utility computing: When the resources used in computing process are packaged as a metered service
similar to electricity a traditional public utility.

Autonomic computing: It defines that systems are capable of self-management.

TYPES OF CLOUD:

 Public and Private Cloud


 Cloud Infrastructure _x0000_t75 ...
 Cloud Application Architecture

PUBLIC AND PRIVATE CLOUD:

8
 The operations of a business are carried outline one place and the functions in some remote place; it is
possible with the help of technology, that is cloud computing. Cloud computing has an advantage for
the businesses to increase their IT functionality without adding extra infrastructure or software.

Types of Cloud Computing:

Cloud computing can be classified into four types based on the location of the cloud:
1. Public cloud: This computing infrastructure is hosted at the vendor’s workplace. The end
user cannot view the infrastructure. The computing infrastructure is shared between companies.

2. Private cloud: Here the computing infrastructure is dedicated to the customer and Is not
shared with any other companies. They are costly and highly secure than public clouds.
Private clouds may be hosted externally as well as in their own premise hosted clouds.

3. Hybrid cloud: Organizations can submit less valued applications in public cloud and high
valued applications in the private cloud. The combination is known as hybrid cloud. Cloud bursting is
used to define a system where the organization uses its own infrastructure for normal usage and cloud
is used for peak times.

4. Community cloud: The cloud infrastructure is shared between the companies of the same
community. For example, all the government organizations in a city can share the same cloud but not
the non-governmental organizations.
_x0000_t75 ...
Six different types of cloud computing and their offering to businesses are listed as follows:
1. WWW-based cloud computing service is a type of cloud service that exploits certain web
service functionalities, rather than deploying applications. For example, it can use Google Maps API.
2. Software as a service is an idea, where an application can be used by multiple tenants,
using the browser. For example, SaaS solutions are used in sales, ERP and HR.
3. Platform as a service is a variant of SaaS, one can run their own applications but by
executing on the cloud provider’s infrastructure.
4. Utility cloud computing services offer virtual storage and server options, where the
companies can access it on demand. This allows easy creation of virtual data centre.
5. Managed services are the oldest cloud computing solutions. In this, a cloud computing
provider utilizes an application than the end customers. Examples are using anti-spam services and
application monitoring.
6. Service commerce is a mix of SaaS and managed services. It provides a hub of services,
where the end user interacts. Examples are tracking expenses, virtual assistant services and travel
bookings.

Public Cloud:
 A public cloud is based on the standard cloud computing model, where the service provider makes the
resources such as storage and applications available to the public over the WWW.
 These services may be free or on a pay-per-usage model. The advantages of using a public cloud
computing service are as follows:

● Inexpensive and easy to setup


● Scalability
● No resources are wasted
9
Examples are IBM’s Blue Cloud, Amazon Elastic Compute Cloud (EC2), App Engine, Sun Cloud
and Windows Azure Services Platform.
Private Cloud (Internal Cloud or Corporate Cloud):
 Private cloud is a proprietary computing model that provides services to users who are behind a
firewall.
 Advances in distributed computing and virtualization allowed administrators of network and data
centers to provide effective services that meets the needs of their ‘end users’ within the organization.

Difference between Public Cloud and Private Cloud:


 Cloud computing and storage are not new topics. Cloud is one of the most recognized terms in the
industry.
 As a service, it was offered, which earned recognition with Web 2.0. With the evolution of the
technology to the level today, cloud computing is offered as public and private cloud services.
 We can distinguish between public and private cloud, and also customers can understand the
difference based on various factors such as a pattern of usability, security and performance, which is
insignificant with the costs.

Public versus Private Cloud


 It is easy to distinguish between a private and the public cloud. The first difference will be the
deployment location.
 Cloud can be offered as a service over the WWW is a public cloud, where as a private cloud sits
inside the firewall.
_x0000_t75 ...
 The location of deployment is the main factor of distinction between the two.Public cloud is charged
on a monthly basis. Customers pay for the usage based on data size (GB) and for the bandwidth
transfer fees.
 It is based on demand storage scalability and customers need not buy a storage hardware. Private
cloud is deployed in the customer location, providing all necessary hardwares and operating systems.
 The hard disk storage is shared only within the organization and is controlled entirely by the
enterprise.
 Because of scalability, customers can add servers to the existing architecture. Furthermore, this
architecture is fully managed by the customers.

Factors for Public versus Private Cloud


Some other factors include:
● Duration of data storage
● Access patterns and locations
● Security and data isolation
● Confidentiality and destruction of data
● SLAs (Service Level Agreements)
● In-house technical crew

10
CLOUD INFRASTRUCTURE:

Cloud Computing Infrastructure:


 Cloud computing infrastructure functions like an electricity grid. When you need light in a room, you
_x0000_t75
turn the switch on, the signal travels through ...
the electricity grid, then power is transmitted to your
switch and you have light.
 A cloud computing infrastructure works similarly. Whenever you need resources such as information
on software, they are stored in a network called a cloud.
 You can find it in your cloud computing infrastructure and pull it up. If someone else is in need of the
same information, then he or she can access it from that computer itself.
 Information is stored in the cloud computing infrastructure instead of on the computer.
 Any business that requires multiple computers could benefit from a cloud computing infrastructure.
Any business, ranging from online sports betting to major corporations with operation saround the
world, can personalize a cloud computing infrastructure to meet their specific needs.
 It eliminates the need for individual employees to backup data regularly, because the network
administrator would be responsible for backing up data on the cloud computing infrastructure.
 It also allows each employee to access the same information, which makes operations run much more
efficiently in an office environment.

CLOUD APPLICATION ARCHITECTURE:

 Designing an application and running it as a virtual application in a cloud computing environment is


different from designing it for on-premise deployment.
 An application ought to be designed keeping in mind easy scalability, tolerate failures and incorporate
management systems by successfuldeployment within the cloud.

Scale:The potential offered by cloud computing is nearly unlimited in scalability. For this purpose,
some application design guidelines are discussed as follows:

11
Start simple: Avoid complex design, optimizations for simplicity and performance enhancements.
It is a good idea to start with easiest application and checks the scalability of the cloud.

Split application functions and couple loosely: Separate systems should be utilized for different
parts of program functionality and bypass the synchronous attachments between them.
Deployment cluster: Rather than a single system to serve all users, consider forming multiple
clusters, each processing a subtask of an application. This is often called as ‘sharing’.
The advantages of cloud computing in terms of scalability are as follows:

● Inexpensive testing
● Reduced risk
● Ability to segment the customer base
● Auto-scaling based on the application load

Fail:Sometimes and at some point, an application will fail. Some follow-ups should be considered
while designing on-premise or SaaS application such as ‘doomsday’ scenarios.

Get back up quickly: The launching of new application clusters in order to recover data quickly
must be automated.

Data considerations: When an application fails, data persistence and system cannot be ascertained.
It is advisable to move all data to persistent_x0000_t75
storage and...confirm it is replicated and distributed to
ensure data preservation. The system state is restored and used for the recovery process, and thus
the system can be restarted from the point of failure.

Manage:The management of making the deploying cloud applications as virtual appliances is very
easy.The software which is needed for the entire lifecycle in the cloud should be brought by the
appliances.Managements workload is reduced because of deploying applications in cloud. It should
be developed in a systematic and consistent manner.

The advantages of designing the application in the cloud include the following:

● Cost reduction
● Reduced overheads
● Eliminates application sprawl
● Reduces the chance for errors

WORKING OF CLOUD COMPUTING:


TRENDS IN COMPUTING
 IT Maturity Analysis compares the technologies based on two parameters the current investment rate
and the current adoption rate.
 This assessment provides the success rate of the technology and its deployment and also the
organizations, that will find this technology beneficial.
 Thus, these factors provide insight into how developed a technology is related to other technologies and
how rapidly it will expand in the market.

12
 The X-axis labelled ‘percentage with technology in place’ represents the rate of adoption. The vertical
axis is labelled ‘percentage currently investing’ represents the rate of investment. In this analysis, the
terms ‘low’ and ‘high’ are relative to the technologies that are being developed.
 Represents a chart with different parameters such as low, moderate and high rate of investment; and low,
moderate and high rate of adoption. Each technology falls in any one of the nine parameters.
 High rate of investment/adoption: ERP, business intelligence systems, CRM systems and enterprise
collaboration falls under this sector.
 Moderate rate of investment/high rate of adoption: Systems like human resource management systems
(HRMS) fall in this sector.
 High rate of investment/moderate rate of adoption: When there is an increase in investment than the
adoption, it results in growth of technology. Windows 7 falls in this sector.
 Moderate rate of investment/moderate rate of adoption: Technologies such as legacy system renewal,
SaaS and unifi ed communication fall in this category. These technologies will grow in a slow and
steady pace.
 High rate of investment/low rate of adoption: Mobile applications falls in this sector, which has high
rate of investment, but adoption rate is minimal.
 Low rate of investment/moderate rate of adoption: Supply chain management falls in this sector.
 Low rate of investment/low rate of adoption: Technologies like virtualization (desktop),tablet,
IaaS, environmental management solutions and PaaS fall in this sector.
 When a technology has more capability, but adoption rate is low, then organizations will not be
interested in adopting them. Cloud computing technology changed its focus from industry to real-world
problems. _x0000_t75 ...
 The major trends that emerged in cloud computing technology are Small, medium business and micro-
business Supply chains management, media and digital content, and legacy systems On-the-fl y access
Hybrid cloud model Growth in stack-as-a-service

TECHNOLOGY TRENDS TO WATCH

 Virtualization
 Data Growth
 Energy and Green IT
 Complex Resource Tracking
 Consumerization and Social Software

SERVICE MODELS:
 cloud service models such as software, platform and infrastructure. Service models are types of services
that are required by customers.
 Models are based on the kind of operation and requirement of the business. A cloud service can be
replaced with any one of the following as ‘Desktop, data, platform, IT, infrastructure, testing,
computing, security, software, testing, storage, hardware, database, etc

 SaaS (Software as a Service)


 PaaS (Platform as a Service)
 IaaS (Infrastructure as a Service)

13
_x0000_t75 ...

SaaS:
 Provider of SaaS has full administrative rights for its application and responsible for activities such as
deployment, maintenance and update. This type is suitable for customers, who want less management
hassles and worries regarding installation of application, software and its updation.

PaaS:
 PaaS is service, where application/software can be build, tested and deployed as a single unit. PaaS is
useful for application builders, developers, deployers and testers.

IaaS:
 When the customer requires an end-to-end infrastructure such as computer resources, storages
and network, he/she can opt for IaaS. The usage fee is billed at CPU hour, size (GB) of data
accessed or stored/hour, bandwidth consumed, etc. Figure 4.5 depicts the IaaS component stack
and scope of control.

CLOUD SERVICE MODELS :


Depicts the levels of service provided by each service model.
Service models are categorized into fi ve types:
1. Business as a service
2. Software as a service

14
3. Platform as a service
4. Infrastructure as a service
5. Management as a service

CLOUD DEPLOYMENT MODEL:


 The cloud is a simplified representation of the convoluted, internet-worked systems and attachments
that form the Internet.
 Private and public clouds are defined based on their relationship and as a subset of the Internet, and
also it is referred as internal or external clouds.
 The differentiation is based on the relationship of the cloud with the enterprise.
 Cloud Service Models Comparison” BaaS SaaS PaaS IaaS MaaS “Services Application Platform
Infrastructure Management.

*********** UNIT I COMPLETED **************

_x0000_t75 ...

15
UNIT - II

CLOUD COMPUTING ARCHITECTURE:


 Cloud computing technology is used by both small and large organizations to store the information in
cloud and access it from anywhere at anytime using the internet connection.
 Cloud computing architecture is a combination of service-oriented architecture and event-driven
architecture.

_x0000_t75 ...

Cloud computing architecture is divided into the following two parts:

 Front End
 Back End
Front End

 The front end is used by the client. It contains client-side interfaces and applications that are
required to access the cloud computing platforms.

 The front end includes web servers (including Chrome, Firefox, internet explorer, etc.), thin &
fat clients, tablets, and mobile devices.

16
Back End

 The back end is used by the service provider. It manages all the resources that are required to
provide cloud computing services.

 It includes a huge amount of data storage, security mechanism, virtual machines, deploying
models, servers, traffic control mechanisms, etc.

Cloud Computing Reference Model

 The cloud computing reference model (CC-RM) facilitates the process of modelling cloud
architecture and planning the deployment activities.

 It also establishes a foundation for modeling cloud and its architecture, from which an IT
organization can plan, architect, model and deploy to address business and technical challenges.
Cloud is not a problem-solving architecture, it is a collection of services, which can be used to
solve problems. _x0000_t75 ...

 The cloud reference model consists of the following four elements/models:


1. Cloud enablement model: This model describes the various layers of cloud and its
advantages for business operations. This model comprises of various cloud computing
technologies and solutions for the consumers.

2. Cloud deployment model: The cloud deployment model (CDM) describes the various cloud
models such as private, public, hybrid and community clouds.

3.Cloud governance and operations model: The cloud governance and operations model
defines the requirements for cloud computing such as governance, privacy, security
operations,management, support and monitoring.

4. Cloud ecosystem model: The cloud ecosystem takes cares of development and sustenance.It
consists of cloud providers, consumers, intermediaries and networks.

The cloud computing reference model has four sub-models, they are as follows:

 1. Cloud virtualization tier: Cloud virtualization tier focuses on the tools that provide
hardware and infrastructure virtualization, computing, storage, network and security
virtualization.

 2. Cloud operating system tier: Cloud operating system tier focuses on the technologies that
enable virtualization of resources as cloud-enabled capabilities. Cloud OS tier provides
17
provisioning, billing and metering, load balancing, resource management, monitoring and
management, workfl ow and orchestration of cloud-enabled resources.

 3. Cloud platform tier: It focuses on enabling the PaaS oriented services and includes SOAand
Web services concepts.

 4. Cloud business tier: Cloud business tier focuses on the various range of business
capabilitiesand business solutions, that are designed and provisioned to consumers as services
via the cloud.

Points to Consider

Factors to be considered while designing cloud-based architectures are highlighted as follows:


● Cost: Clearly understand the pricing details for various cloud models.
●Complexity: Analyse the complexity before customizing the cloud solution and check
therequirements thoroughly before deployment.
● Speed: Check the speed for cloud model. Speed in terms of advanced CPU architecture,high
memory, lowest latency and network infrastructure.
● Cloud portability: Check the portability. This allows the consumer to move from one vendor
to another without making much changes in the architecture.
● Security: Check for the security measurements provided by the vendor.

Example Reference Diagram _x0000_t75 ...

 Single Cloud Site Architectures

 Redundant 3-tier Architecture

 Multi-datacenter Architecture

18
_x0000_t75 ...
CLOUD COMPUTING TECHNOLOGY:

CLOUD LIFECYCLE MODEL

Phases of CDLC
 The different activities and feedback of CDLC in achieving the desired cloud.
 In this lifecycle model, feedback is used in which a phase gives the necessary information to
the preferred upper phase. Among these phases, the second, fourth, fi fth and sixth phase give
response to the first phase.

Requirement and Analysis


 Requirement and analysis method is used to evaluate and understand the requirements of an end
user.
 This is done by taking up the signifi cant complaints from the user, network solution, management and
customers of the present system.
 Once these complaints are thoroughly studied, atentative cloud computing solution is arrived, which
minimizes the deficiencies and meets one’s requirements. Solution such as computing cost, scalability,
organizational agility and benefi ts can be assessed through this phase.
 Cloud computing results such as privacy, security, maturity of the organization, risk involvement,
reliability, performance and portability are different aspects to be considered before adoption.

Architect
 The structural behaviour of the cloud architecture gives solution to the cloud system which

19
comprises of on-premise resource, cloud resources, cloud services, cloud middleware, software
components, data server location and externally visible properties of data server location.

Implementation and Integration


 Third phase of CDLC is the actual formation and enablement of the private, public, community,
hybrid, inter and hosted cloud solutions to a computing problem.

Implementation:
 Events such as privacy, protection, regular, legality, mentality, inter-machine
message and privacy theory are addressed within the implementation phase. Two components
 of cloud computing are implemented in this phase. The implementation of file system is the first case.
 The file system is the key component of the system to support massive data storage and management.
The implementation of map-reduce system is the second case. This also performs the task of
integrating the different cloud solutions in one cloud environment.
 This phase deploys different resources, services and applications to the cloud. This phase also gives
training to the end user so that he/she can accept the new network solution easily.

Integration:
 Integration is intermediate between the source and target systems for extracting
data, mediating and publishing it.
 In the present economy, businesses and enterprises are shifting to cloud technology due to the low
costs, scalability and independent IT constrained resources.
_x0000_t75 ...
 Large organizations integrate into cloud environment with their available systems.

Five possibilities and recommendations for integrating into cloud effectively are as follows:
1. Plan and set realistic goals
2. Learn from other’s experience
3. Require IT specialist team
4. Address security concerns
5. Maximize connectivity options
Quality Assurance and Verification
 In this phase, cloud auditing is done to ensure the quality of the cloud network. It also confirms the
performance, reliability, availability, elasticity and safety of cloud network at the service level.

Deploy, Testing and Improvement


 Different platform service providers drastically reduce the deployment cost of the application by pre-
building and pre-configuring a stack of application infrastructure in this phase.

Monitor, Migrate and Audit


 This phase is marked by periodically monitoring the cloud environment and measuring the
performance of the system.
 The extra cost and worth that a client incurs moving to cloud from the traditional SOA method and
furthermore integration with the existing methods are considered in this phase.

Cloud Management Lifecycle


20
 The manages the lifecycle such as planning, setting up, building, testing and deploying,
monitoring, managing, metering, charging and optimizating.

Cloud Management Lifecycle

_x0000_t75 ...
● Planning: Enterprise manager helps in creating a cloud set-up with brand new hardware,
new software and even a new data centre.
● Set-up: Enterprise manag er adop ts the IaaS, PaaS and DBaaS model clouds and the various
services offered by these models.
● Building: Packing and publishing of applications are done with the help of the available
cloud computing services.
● Testing and deploying: After building an application, it has to be tested. The testing portfolio
available in enterprise manager does this job. The resultant changes due to the testing are
stored in the database. Testing also estimates the load capacity after deployment.
● Monitoring and managing: It monitors the settings, standards, policies and organizes for
better management.
● Metering, charging and optimization: Usage of resources such as CPU, storage (GB) and
memory are to be metered and charged accordingly.

CLOUD MODELLING AND DESIGN


Cloud Ecosystem Model
 A Cloud Ecosystem refers to the interconnected network of cloud computing services,
solutions, technologies, and providers that collectively enable the delivery, management, and
consumption of cloud resources and services.
 It encompasses the entire cloud computing landscape, including infrastructure, platform,
software, and other related components.

21
 Cloud ecosystems are designed to support various use cases, meet diverse business needs, and
foster innovation within the cloud computing environment.
 Benefits of Cloud Ecosystem
 Scalability: Cloud services can be very flexible in that they can be rapidly increased or
decreased in response to the amount of current demand which means a business sure does not
have to invest mostly into infrastructure and physical hardware.
 Cost Efficiency: Cloud services work on the philosophy of provision of services according to use
hence only charging consumers according to the amount of services consumed. These prevent
the need for excessive initial investments in plants and equipment and also lower running
expenses.
 Flexibility and Accessibility: Cloud services are location-independent, allowing for work from
other places that may be near or far from the office. Such flexibility means that businesses can
diversify and extend their operations to target customers in different world regions.
 Innovation and Speed: Cloud services allow for the quick and agile creation and delivery of
applications, specifically aiding businesses in delivering new applications to customers at a
quicker pace.
 Reliability and Security: Cloud providers dedicate a lot of resources to policies and backups to
guarantee availability and prevent loss of data or hacking insurgence. This helps individual
business entities to have a clean bill of health financially which in turn makes them direct all
their energies to matters which affect their business directly.
 Elasticity: The cloud services are capable of...dynamically controlling resources hence providing
_x0000_t75
customers with the best possible experience when demand of given resources is high most
frequently.
 Integration and Collaboration: When it comes to integration, cloud services provide a high
level of integration potential where businesses can integrate the cloud services with other
systems and services. This promotes teamwork and allows for efficiency because it allows for a
smooth transition between the various platforms and apps.

Cloud Governance
 Cloud governance covers finance, operations, security, compliance, data management, application
performance, asset management, and configurations.
 Activities performed as part of implementing cloud governance rules, policies, and processes include
defining, continuously monitoring, and auditing them. This ensures that resources are optimally
allocated, coordinated, and controlled.
Examples of cloud governance rules include:
 Defining roles and responsibilities
 Determining alert escalation procedures
 Enforcing network policies
 Ensuring compliance with industry regulations
 Establishing and monitoring service level agreements (SLAs)
 Implementing disaster recovery policies
 Managing data lifecycles
22
 Enabling access control requirements
 Setting data classification schemes
 Specifying allowances for cloud services

Virtualization:
It is a technique, which allows sharing single physical instance of an application or resource
among multiple organizations or tenants (customers). It does this by assigning a logical name to a
physical resource and providing a pointer to that physical resource when demanded.

_x0000_t75 ...

The Multitenant architecture offers virtual isolation among the multiple tenants. Hence, the
organizations can use and customize their application as though they each have their instances running.
Service-Oriented Architecture (SOA)
 Service-Oriented Architecture helps to use applications as a service for other
applications regardless the type of vendor, product or technology.
 herefore, it is possible to exchange the data between applications of different vendors
without additional programming or making changes to services.
Grid Computing:
 It refers to distributed computing, in which a group of computers from multiple
locations are connected with each other to achieve a common objective.
 These computer resources are heterogeneous and geographically dispersed.
 Grid Computing breaks complex task into smaller pieces, which are distributed to CPUs
that reside within the grid.
Utility Computing:
 Utility computing is based on Pay-per-Use model. It offers computational resources on
demand as a metered service.
23
 Cloud computing, grid computing, and managed IT services are based on the concept of
utility computing.
Cloud architecture:
 Cloud architecture refers to how various cloud technology components, such as hardware,
virtual resources, software capabilities, and virtual network systems interact and connect to
create cloud computing environments.
 It acts as a blueprint that defines the best way to strategically combine resources to build a
cloud environment for a specific business need.
 Cloud computing is a type of computing environment.Where IT business outsource their
needs.Include software application service to outsside vendors.
Cloud architecture component:
 A frontend platform
 A Backend platform
 A Cloud-based delivery model
 A Network (internet, intranet, or intercloud)
In cloud computing, frontend platforms contain the client infrastructure—user interfaces, client-
side applications, and the client device or network that enables users to interact with and access cloud
computing services. _x0000_t75 ...
For example, you can open the web browser on your mobile phone and edit a Google Doc. All
three of these things describe frontend cloud architecture components. On the other hand, the back end
refers to the cloud architecture components that make up the cloud itself, including computing
resources, storage, security mechanisms, management, and more.

Below is a list of the main backend components:


Application: The backend software or application the client is accessing from the front end to
coordinate or fulfill client requests and requirements.

Service: The service is the heart of cloud architecture, taking care of all the tasks being run on a
cloud computing system. It manages which resources you can access, including storage, application
development environments, and web applications.

Runtime cloud: Runtime cloud provides the environment where services are run, acting as an
operating system that handles the execution of service tasks and management. Runtimes use
virtualization technology to create hypervisors that represent all your services, including apps, servers,
storage, and networking.

Storage: The storage component in the back end is where data to operate applications is stored.
While cloud storage options vary by provider, most cloud service providers offer flexible scalable
storage services that are designed to store and manage vast amounts of data in the cloud. Storage may
include hard drives, solid-state drives, or persistent disks in server bays.

24
Infrastructure: Infrastructure is probably the most commonly known component of cloud
architecture. In fact, you might have thought that cloud infrastructure is cloud architecture.

However, cloud infrastructure comprises all the major hardware components that power cloud
services, including the CPU, graphics processing unit (GPU), network devices, and other hardware
components needed for systems to run smoothly.

Infrastructure also refers to all the software needed to run and manage everything. Cloud
architecture, on the other hand, is the plan that dictates how cloud resources and infrastructure are
organized.

Management: Cloud service models require that resources be managed in real time according
to user requirements. It is essential to use management software, also known as middleware, to
coordinate communication between the backend and frontend cloud architecture components and
allocate resources for specific tasks.

Beyond middleware, management software will also include capabilities for usage
monitoring, data integration, application deployment, and disaster recovery.

Security: As more organizations continue to adopt cloud computing, implementing cloud


security features and tools is critical to securing data, applications, and platforms.

It’s essential to plan and design data security and network security to provide visibility, prevent
data loss and downtime, and ensure redundancy. This may
_x0000_t75 ... include regular backups, debugging, and
virtual frewalls.
Cloud modeling and design:
Cloud computing is a means to reduce cost and complexity of the IT, and helps to optimize the
workload in hand. Cloud computing uses the infrastructure designed especially to work on the vast
computing services with limited resource.
These benefits will,
 Improve government services and citizens’ access.
 Transform businesses.
 Provide new innovations to consumers.
 Create energy savings.
Key Principles of Cloud Computing
 Three key principles of cloud computing are abstraction, automation and elasticity.

Abstraction
 IT providers are in need of standardizing their IT operations, so optimizing their operation will
be made easy. Cloud computing gives some basic but well-defined services.
 Managing the software services is passed onto the developer or user. A well-defined abstraction
layer acts a as grease between clouds and developers or users, which helps to work efficiently
and independent of each other.

The three abstraction layers in clouds are:


 Application as a Service (AaaS)
 Platform as a Service (PaaS)

25
 Infrastructure as a Service (IaaS)

Automation
 The developers or users have complete control over their resources, this is said to be automation
in the cloud. There is no human interaction, even from a developer’s or user’s side. In this
environment,
 when the user needs more servers, the load balancer intimates the cloud as to the extra numbers
be provided. There is no need to wait for unpacking, connect your machine and install, all will
be done automatically.
 This automatic process reduces cost and complexity, and it puts the developer or user in control.
Now the user can reduce his time to market for the next rollout because, he can do it himself, no
intervention of professionals needed or waiting period.
Elasticity
 In the early years, people had expensive servers and waited for long time to use the full capacity
of their server. This is a highly inefficient model as most of the time the server was
underutilized.
 In the dot-com era, people started scaling horizontally, which allowed them to add capacity
according to their needs.
 Using elasticity, people can easily scale up and down according to their daily usage.

Examples of Cloud Environment:

IBM Power Systems is in an ideal example for cloud environments. Workload optimization:
_x0000_t75 ...
The core capability of cloud computing is optimizing of workload.
This allows the users to make the most of their IT resources while increasing the overall
flexibility.
 Limitless virtualization
 Automated management
 Solutions of all kinds

Limitless virtualization:
With PowerVM (available in IBM Power Systems), users can virtualize resources such as
processor, memory and I/O.

Automated management:
Utilizing IBM Systems Director Enterprise for Power Systems, user can manage their physical
and virtual servers in an automated fashion. This helps to reduce total cost of owner (TCO) and
management costs.
Solutions of all kinds:
Irrespective of the shape, the IBM Power Systems gives solution for the size or composition of
the cloud.
Few offerings done by IBM Power Systems are:
– IBM CloudBurst
– IBM WebSphere CloudBurst Appliance
– IBM Smart Business Development and Test Cloud
Virtualization:

26
Foundation:

 Definition of virtualization
 Adopting virtualization
 Types virtualization
 Virtualization architecture and software

DEFINITION OF VIRTUALIZATION:
Virtualization is a methodology for dividing the computer resources to more than one execution
environment by applying more concepts like partitioning, time-sharing, machine simulation and
emulation.’
Virtualization can be expressed as a brand new trend in IT, which includes autonomic
computing and utility computing. This new trend helps the IT environment to manage itself and
every available resource is seen as a utility, where a client pays per use.
A virtual infrastructure consists of the following components:
hyper visors,
virtual infrastructure services and
automated solutions tooptimize IT process.
We can exploit this new trend to increase the number of logicaloperating systems in a single
host, which in turn reduces the hardware acquisition and maintenance cost for an organization.

Following are some reasons for using virtualization:


_x0000_t75 ...
● Virtual machines (VM) consolidate the workloads of under-utilized servers. Because of this
one can save on hardware, environmental costs and management.
● To run legacy applications, VM is used.
● VM provides a secured and sandbox for running an untrusted application.
● VM helps in building secured computing platform.
● VM provides an illusion of hardware.
● VM simulates networks of independent computers.
● VM supports to run distinct OS with different versions.
● VMs are uses for performance monitoring. Operating systems can be checked without
disturbing the productivity.
● VM provides fault and error containment.
● VM tools are good for research and academic experiments.
● VM can encapsulate the entire state of a system by saving, examining, modifying and reloading.
● VM enables to share memory in multiprocessor architecture.
● VM makes the job easier for the administrative staff in migration, backup and recovery.

ADOPTING VIRTUALIZATION:
Virtualization is a perfect solution for small to medium-scale enterprises. It does not suit high
performance applications and should be avoided. It may be possible to add overheads, complexityand
reduce the performance.
In virtualization, the IT industry has a high CPU utilization number indicating optimum usage
of hardware; and based on this number one should not come to the conclusion about the application
usage.

27
TYPES OF VIRTUALIZATION:
 Server virtualization
 Network Virtualization
 Storage virtualization
 Desktop virtualization
 Application virtualization
 Management virtualization

Virtualization is a very powerful tool that drives signifi cant benefits for cost, agility and the
environment. Today virtualization is applied in many places—server virtualization, client/
desktop/application virtualization, storage virtualization and service/application infrastructure
virtualization.

_x0000_t75 ...

Server virtualization:
It is a kind of virtualization, used for masking of server resources, which
includes number of physical servers, processors and operating systems.
The intention of using this method is to spare the complicated server resources and hence
increasing thesharing, utilization and maintaining the capacity of servers.

Network Virtualization:
It is a method where network resources are combine based on available
bandwidth. Each channel is assigned to a particular server.
By adopting this method ofvirtualization, a true complexity of network is hidden and managed
like partitioning thehard drive. Because of network virtualization, lower TCO, higher return of
investment,security and dynamic computing are obtained.

Storage virtualization:
It is a type of virtualization, where a pool of physical storage from
28
different network of storage devices appears as a single storage device. Usually this
kind of virtualization is adopted in SAN (storage area networks).
Storage virtualizationis advantageous in disaster recovery, business continuity, lower TCO,
higher return ofinvestment, dynamic computing, security, testing and development.

Desktop virtualization:
It supports various computing such as utility and dynamism, testing,
development and security.

Application virtualization:
It allows server consolidation, application and desktop deployment, and business continuity.
Apart from this, recovery when disaster, lower TCO withhigher ROI, dynamic computing, testing and
development are possible.

Management virtualization
It allows variety of features which are as follows: server consolidation, centralized policy-based
management, business continuity and disaster recovery, lowerTCO with higher ROI, utility and
dynamic computing, testing and development and security.
SERVER VIRTUALIZATION
Server Virtualization is the process of dividing a physical server into several virtual servers,
called virtual private servers. Each virtual private server can run independently.
The concept of Server Virtualization widely used in the IT infrastructure to minimizes the costs
_x0000_t75 ...
by increasing the utilization of existing resources.
Types of Server Virtualization
1. Hypervisor
 In the Server Virtualization, Hypervisor plays an important role. It is a layer between
the operating system (OS) and hardware. There are two types of hypervisors.
 Type 1 hypervisor ( also known as bare metal or native hypervisors)
 Type 2 hypervisor ( also known as hosted or Embedded hypervisors)

2.Full Virtualization
 Full Virtualization uses a hypervisor to directly communicate with the CPU and physical server.
It provides the best isolation and security mechanism to the virtual machines.
 The biggest disadvantage of using hypervisor in full virtualization is that a hypervisor has its
own processing needs, so it can slow down the application and server performance.
 VMWare ESX server is the best example of full virtualization.

3. Para Virtualization
 Para Virtualization is quite similar to the Full Virtualization. The advantage of using this
virtualization is that it is easier to use, Enhanced performance, and does not require
emulation overhead. Xen primarily and UML use the Para Virtualization.
 The difference between full and pare virtualization is that, in para virtualization hypervisor
does not need too much processing power to manage the OS.

4. Operating System Virtualization

29
 Operating system virtualization is also called as system-lever virtualization. It is a server
virtualization technology that divides one operating system into multiple isolated user-space
called virtual environments.
 The biggest advantage of using server visualization is that it reduces the use of physical space,
so it will save money.

5.Hardware Assisted Virtualization


 Hardware Assisted Virtualization was presented by AMD and Intel. It is also known
as Hardware virtualization, AMD virtualization, and Intel virtualization. It is designed to
increase the performance of the processor.
 The advantage of using Hardware Assisted Virtualization is that it requires less hypervisor
overhead.

6. Kernel-Level Virtualization
 Kernel-level virtualization is one of the most important types of server virtualization. It is
an open-source virtualization which uses the Linux kernel as a hypervisor. The advantage of
using kernel virtualization is that it does not require any special administrative software and
has very less overhead.
 User Mode Linux (UML) and Kernel-based virtual machine are some examples of kernel
virtualization.

_x0000_t75 ...

Network Virtualization
 Network virtualization as such, is an entirely new way of networking compared to a traditional
way of networking, introducing new methods that are more efficient, scalable, and flexible in
the deployment of network resources.
 In this article, we will discuss types of network virtualization, the benefits of network
virtualization, and more.

30
Functions of Network Virtualization
Network virtualization is done through the abstraction of networking resources from the underlying physical
infrastructure and the creation of a virtual layer that runs autonomously. Here are key points on how network
virtualization functions:
 Abstraction: Network virtualization decouples the physical devices, such as switches, routers, and firewalls,
into software-defined entities, referred to as virtual network devices.
 Hypervisor or Controller: The hypervisor or a network controller is central to this. It handles the network
virtualization and manages the virtualized network, including the creation, configuration, and monitoring of
virtual network components.
 Virtual Switching: Virtual switches are used to control the network traffic within the virtualized network.
They are software-controlled and provide communication between virtual machines and other virtualized
resources.
 Isolation: Virtual networks uses isolation mechanisms to create a network, each virtual network operating
separately. Thus, it ensures privacy and improves security.
 Overlay Networks: Overlay networks are frequently employed with a view to building logical connections
on top of the physical infrastructure. This is achieved by encapsulating and tunneling the data from virtual
devices, thus, a virtual network is created on top of the physical one.
Storage Virtualization
 Storage virtualization is functional RAID levels and controllers are made desirable, which is an
important component of storage servers.
 Applications and operating systems on the device can directly access the discs for writing. Local
storage is configured by the controllers in RAID groups, and the operating system sees the
storage based on the configuration.
_x0000_t75
 The controller, however, is in charge ...
of figuring out how to write or retrieve the data that the
operating system requests because the storage is abstracted.

Types of Storage Virtualization


Below are some types of Storage Virtualization.
 Kernel-level virtualization: In hardware virtualization, a different version of the Linux
kernel functions. One host may execute several servers thanks to the kernel level.
 Hypervisor Virtualization: Installed between the operating system and the hardware is a
section known as a hypervisor. It enables the effective operation of several operating systems.
 Hardware-assisted Virtualization: Hardware-assisted virtualization is similar to complete para-
virtualization, however, it needs hardware maintenance.
 Para-virtualization: The foundation of para-virtualization is a hypervisor, which handles
software emulation and trapping.
OS Virtualization
 With the help of OS virtualization nothing is pre-installed or permanently loaded on the local
device and no-hard disk is needed.
 Everything runs from the network using a kind of virtual disk. This virtual disk is actually a disk
image file stored on a remote server, SAN (Storage Area Network) or NAS (Non-volatile
Attached Storage).
 The client will be connected by the network to this virtual disk and will boot with the Operating
System installed on the virtual disk.

31
VIRTUALIZATION ARCHITECTURE AND SOFTWARE:
_x0000_t75 ...
The Virtualization Architecture MultiNet Protocol Driver (MPD) is used to implement
virtualization of wireless adapter and placed as an intermediate layer between MAC and IP.
The explains how MPD can be used to share a wireless network adaptor and its MAC. MPD sits
in between IP layer and physical layer (MAC). When an application wants to use more than one
network than using TCP/IP, the path is sent to MPD, which is responsible for switching and allocating
the network and appropriate MAC address.
MPD exposes the wireless LAN media adapter as always active. IP stack checks the adapters,
whether they are active always, even though only one is connected at a given time. Switching and
buffering of packets across networks is done by MPD.

32
GRID, CLOUD AND VIRTUALIZATION:
 Virtualization in grid
 Virtualization in cloud
 Virtualization and cloud security

Virtualization is a core technique for many applications in the computing systems. In the
mainframe days itself, virtualization concept was used, but only in the recent years it has come
under lime light.
Adopting virtualization makes us real grid computing with more flexible in applications and the
resources usage.

VIRTUALIZATION IN GRID:
Grid Computing:
The main focal point in grid computing lies in secure resource sharing in accessing
computers,software and data in a dynamic atmosphere. Sharing of those resources has to be fine-tuned
andhandled in a highly controlled manner.
Moreover, Faster projected the following three points to describe a grid more in detail:
1. Nontrivial qualities of service delivery
2. Habit of using standards in all places
3. Resources coordination _x0000_t75 ...
Grid Computing and Virtualization:
Virtualization is not a solution for enterprises to manage their resources although it
providesricher capabilities in managing and moving the OS in different hardware. It helps to run
multiple workloads in a single machine with clear distinction between them. Virtualization can do
suspending, resuming and migrating images in run-time.
Like grid, virtualization is also a trend. Instead of having more hardwares to meet peakdemands,
organizations can use virtualization approaches to get better utilization out of the
existing hardwares which are not fully utilized. Also virtualization is possibly becoming a
mainstreamapproach in managing network resources.
Using Virtualization in Grid Computing:
Virtualization integration and grid computing can be encouraged at various levels.
Grid Computing Level:
The gLite Middleware has strong dependencies to Scientific Linux as operating system
which is used by the LHC (Large Hadron Collider) Computing Grid High Energy Physics Virtual
Organizations (VO). Making gLite to work with other operating systems is not a easy task.
Resource providers can support the VOs with minimal effort by encapsulating the
GridMiddleware into a virtual appliance. The only requirement is support of a virtualization platform
like XEN or VMware. Grid Middlewares can be packaged as virtual appliances similarto the gLite
Middleware. Then resource providers no longer want to consign to a designatedgrid middleware, but
can setup middlewares on demand.
User-based dynamic deployment of themiddleware services is the most preferable approach.
This makes the resource providers’ interference in the deployment of process and he no longer has to
deal with software administrationand application requirements.

33
VIRTUALIZATION IN CLOUD
Virtualization is a tool for system administrators, which has many technical uses than a cloud.
Virtualization allows IT organizations to perform multiple operations using a single physical
hardware. Multiple OS instances running on single device is cost-effective than multiple servers for
each task.
Cloud computing is accessed through the WWW and takes advantage of virtualization.
Cloud computing can also be used without virtualization. Cloud computing and virtualization will
modernize IT organizations. By combining them,companies can run their applications without the need
of running updates and backups, as theyall will be done by the provider.
Virtualization and cloud computing can go hand in hand. Virtualizing everything started a year
ago when processing power, software and servers are virtualized. Now-a-days virtualization means
cloud computing. Cloud computing refers to IT organizations using remote servers for storing data and
accessing information from anywhere. This is done in three ways—public cloud, private cloud and
hybrid cloud

Hyper cloud where dynamic sharing and self-service application provisioning are done. Cloud
foundations where cloud environments, deployments ways, load balancing are done.

VIRTUALIZATION AND CLOUD COMPUTING:

o Anatomy of Cloud Infrastructure


o Virtual Infrastructures _x0000_t75 ...
o CPU Virtualization
o Network and Storage Virtualization

Anatomy of cloud Infrastructure:


Cloud computing is changing itself to meet the demands of customers in terms of software
andhardware. These changes have benefitted developments in web-based applications and
facilitateddecisions-making in business.
Thomas J. Watson of IBM has said ‘there may be a demand for five in world market for
computers.’ IBM designed computers for 20 companies, expecting to get orders only from five
companies. Surprisingly, IBM got order for 18 companies for the IBM 701 system.
Operationsin terms of hardware and data are the main players and they are not cost effective.
Cloud’son-demand infrastructure will make it cheaper and efficient.

Cloud Stack:
Infrastructure stack for delivering web applications by the providers of cloud computing. The
managed cloud stack consisting of two parts:
First part consists of cache,dynamic code and attached storage and logic for the dynamic code;
Second part consists of stable and efficient OS, security features and business logic written
using some programming language.
Cloud computing environment separates the computing environment away from the
developersand helps them focus on improving their application.Every cloud platform includes a virtual
machine language and a gateway for web services.Language functions are closely linked with parent
OS and their native libraries are taken away.
34
Virtual Infrastructures
In the present scenario, the Internet provides services such as research, mining, e-mail and
maps.In the near future, it will converge communication and computation as a single service.
Hence the Internet cannot be considered as a huge shared and unreliable communication
enabling data exchanges between users.
Instead, it will become a pool of interconnected resourcesthat can be shared.Grid’5000, an
experimental facility, gathers clusters and gives access to nearly 5,000 CPUsdistributed over remote
sites and inter-connected by super fast networks.Virtualization abstracts services and physical
resources. It simplifi es the job of managingthe resources and offers a great fl exibility in resource
usage.
The vitrual machine,
● Provides an environment where non-trusted applications can be run
● Adopts isolation techniques
● Allows dynamic deployment of application (portability)
● Applied optimization in OS
● Manages as a single service

CPU VIRTUALIZATION:

Virtualizing a CPU is an easy job. For virtualizing a CPU, the following points are to adhered:
● Privileged instructions runs only in privileged...mode.
_x0000_t75
● Control sensitive instructions that tend to change memory mappings, communicating with
other devices.
● Behavior-sensitive instructions that tend to change resource confi guration.

By adopting CPU virtualization, two separate CPUs resemble a single CPU, i.e., two systems
running in a single system. By adopting this concept, user can run two OS in a singlesystem. The most
important part of the computer is the central processing unit(CPU). The main objective of CPU
virtualization is to make a CPU function similar to that of two separate CPUs.
CPU virtualization allows the users to run different operating systems simultaneously. For
example, Apple Mac can be virtualized to run Windows as well.CPU virtualization is not multitasking
or multi-threading. Multitasking is concept of running multiple applications at a time. Multi-threading
is where more than one CPUs can run applications in a way that carries out two actions at the same
time.

UNIT II COMPLETED

35

You might also like