Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
9 views

Module 2 - Note

Notes
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Module 2 - Note

Notes
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Programme Name and Semester: B.

Tech in Computer Science and Engineering(AI-ML) & 5th


Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25

Study Material
(Cloud Computing & PEC-CSD501C)

Table of Contents

Cloud Computing Architecture


Cloud Reference Model
Types of Clouds
Cloud Interoperability & Standards
Scalability and Fault Tolerance

Cloud Solutions: Cloud Ecosystem, Cloud Business Process Management, Cloud Service Management.
Cloud Offerings: Cloud Analytics, Testing Under Control, Virtual Desktop Infrastructure.

Prepared by Department of CSE Faculty

1
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25

Cloud Computing Architecture


An organization's structure and constituent parts are referred to as its cloud computing architecture. Service
Models: The architecture of cloud computing encompasses various service models, including Software as a Service
(SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Whereas PaaS offers a platform for
developers to create, launch, and maintain applications, SaaS distributes software applications via the internet.
IaaS offers virtualized computing resources via the internet. Deployment Models: Public, private, hybrid, and
multi-cloud deployment models are among the models included in cloud architectures. Anybody can access public
cloud services via the internet, private clouds are only used by a single organization, hybrid clouds combine
elements of the public and private clouds, and multi-clouding entails utilizing services from several cloud
providers. Components: Essential elements of cloud architecture include things like servers, storage, networking,
databases, and virtualization technologies. These components work together to enable the delivery of cloud
services, allowing users to access resources and applications remotely over the internet.

Cloud Reference Model


Cloud Computing reference model is divided into 3 major service models:

1. Software as a Service (SaaS)


2. Platform as a Service (PaaS)
3. Infrastructure as a Service (IaaS)
The below diagram explains the cloud computing reference model:

Prepared by Department of CSE Faculty

2
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25

Cloud Computing Reference Model Overview

IaaS, PaaS, and SaaS are the three most prevalent cloud delivery models, and together they have been
widely adopted and formalized. A cloud delivery service model is a specific, preconfigured combination of
IT resources made available by a cloud service provider. But the functionality and degree of
administrative control each of these three delivery types offer cloud users varies.

These abstraction layers can also be considered a tiered architecture, where services from one layer can
be combined with services from another, for example, SaaS can supply infrastructure to create services
from a higher layer. Let us have a look at the layers of cloud computing reference model.

1. SaaS

Software as a Service (SaaS) is a form of application delivery that relieves users of the burden of
software maintenance while making development and testing easier for service providers.

The cloud delivery model's top layer is where applications are located. End customers get access to the
services this tier offers via web portals. Because online software services provide the same functionality
Prepared by Department of CSE Faculty

3
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25

as locally installed computer programs, consumers (users) are rapidly switching from them. Today, ILMS
and other application software can be accessed via the web as a service.

In terms of data access, collaboration, editing, storage, and document sharing, SaaS is unquestionably a
crucial service. Email service in a web browser is the most well-known and widely used example of
SaaS, but SaaS applications are becoming more cooperative and advanced.

Features of SaaS are as follows:

• The cloud consumer has full control over all the cloud services.
• The provider has full control over software applications-based services.
• The cloud provider has partial control over the implementation of cloud services.
• The consumer has limited control over the implementation of these cloud services.
2. PaaS

Platform as a Service is a strategy that offers a high level of abstraction to make a cloud readily
programmable in addition to infrastructure-oriented clouds that offer basic compute and storage
capabilities (PaaS). Developers can construct and deploy apps on a cloud platform without necessarily
needing to know how many processors or how much memory their applications would use. A PaaS
offering that provides a scalable environment for creating and hosting web applications is Google App
Engine, for instance.

Features of PaaS layer are as follows:

• The cloud provider has entire rights or control over the provision of cloud services to consumers.
• The cloud consumer has selective control based on the resources they need or have opted for on
the application server, database, or middleware.
• Consumers get environments in which they can develop their applications or databases. These
environments are usually very visual and very easy to use.
• Provides options for scalability and security of the user’s resources.
• Services to create workflows and websites.
• Services to connect users’ cloud platforms to other external platforms.
3. IaaS

Infrastructure as a Service (IaaS) offers storage and computer resources that developers and IT
organizations use to deliver custom/business solutions. IaaS delivers computer hardware (servers,
networking technology, storage, and data center space) as a service. It may also include the delivery of
OS and virtualization technology to manage the resources. Here, the more important point is that IaaS
customers rent computing resources instead of buying and installing them in their data centers. The
service is typically

paid for on a usage basis. The service may include dynamic scaling so that if the customers need more
resources than expected, they can get them immediately.

The control of the IaaS layer is as follows:

Prepared by Department of CSE Faculty

4
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25
• The consumer has full/partial control over the infrastructure of the cloud, servers, and databases.
• The consumer has control over the Virtual Machines' implementation and maintenance.
• The consumer has a choice of already installed VM machines with pre-installed Operating
systems.
• The cloud provider has full control over the data centers and the other hardware involved in
them.
• It has the ability to scale resources based on the usage of users.
• It can also copy data worldwide so that data can be accessed from anywhere in the world as
soon as possible.

Types of Clouds
Public cloud: Public clouds deliver resources, such as compute, storage, network, develop-and-deploy
environments, and applications over the internet. They are owned and run by third-party cloud service
providers like Google Cloud.

Private cloud:Private clouds are built, run, and used by a single organization, typically located on-
premises. They provide greater control, customization, and data security but come with similar costs and
resource limitations associated with traditional IT environments.

Hybrid cloud:Environments that mix at least one private computing environment (traditional IT
infrastructure or private cloud, including edge) with one or more public clouds are called hybrid clouds.
They allow you to leverage the resources and services from different computing environments and
choose which is the most optimal for the workloads.

Cloud Interoperability & Standards

Cloud interoperability and standards are crucial aspects of cloud computing that facilitate seamless
integration and interaction between different cloud services and platforms. Interoperability ensures that
applications and data can move freely across different cloud environments, while standards provide a
common framework for compatibility. Here are key considerations in cloud interoperability and standards:

• Open Standards:
• Open APIs (Application Programming Interfaces): Adopting open APIs enables
interoperability between different cloud services, allowing applications to communicate
and share data across platforms.
• Open Cloud Computing Interface (OCCI): A standardized API for cloud resource
management that enhances interoperability in IaaS (Infrastructure as a Service)
environments.
• Cloud Standards Organizations:
• Cloud Standards Customer Council (CSCC): Develops best practices and standards
for cloud computing with a focus on the needs of cloud customers.
• National Institute of Standards and Technology (NIST): Provides guidelines and
definitions for cloud computing to promote consistency and interoperability.

Prepared by Department of CSE Faculty

5
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25
• Cloud Data Portability:
• Cloud Data Management Interface (CDMI): A standard for data storage and data
management in the cloud, promoting data portability across different cloud platforms.
• Data Interoperability Standards: Ensure that data can be easily moved and exchanged
between different cloud providers and services.
• Security Standards:
• Security Assertion Markup Language (SAML): A standard for exchanging
authentication and authorization data, promoting single sign-on and secure access across
cloud services.
• Cloud Security Alliance (CSA): Develops best practices and frameworks for security in
cloud computing.
• Service Level Agreements (SLAs):
• Standardized SLA Templates: Using standardized SLA templates helps in defining and
measuring service levels consistently across different cloud providers, enhancing
transparency and accountability.
• Containerization and Orchestration:
• Kubernetes: An open-source container orchestration platform that promotes
portability of applications across different cloud environments.
• Open Container Initiative (OCI): Develops standards for container formats and runtime,
ensuring compatibility across containerization platforms.
• Intercloud Standards:
• Cloud Service Measurement Index (CSMI): A standard for measuring and comparing
cloud services, promoting transparency and ease of comparison.
• Federated Identity Management: Standards that enable users to access resources
seamlessly across multiple clouds without the need for separate authentication.
• Legal and Compliance Standards:
• ISO/IEC 27001: An international standard for information security management systems
that is relevant for cloud service providers.
• GDPR (General Data Protection Regulation): Ensures that cloud services comply with
data protection and privacy regulations.
• Industry-Specific Standards:
• Health Insurance Portability and Accountability Act (HIPAA): Specifies the security
and privacy requirements for healthcare data in the cloud.
• Payment Card Industry Data Security Standard (PCI DSS): Ensures secure handling
of credit card information in the cloud.
• Ecosystem Collaboration:
• Cloud Standards Coordination (CSC): Promotes collaboration and coordination among
various standards development organizations to avoid fragmentation.

Scalability and Fault Tolerance


Cloud Scalability
In cloud computing, cloud scalability refers to the ability to increase or reduce IT resources as required to
meet evolving demands. One of the hallmarks of the cloud and the key factor of its burgeoning popularity
with companies is scalability.

Using existing cloud computing technology, data storage space, processing power and networking can
all be escalated. Better still, scaling, usually with little or no interruption or downtime, can be achieved
rapidly and easily. Third-party cloud providers now have the entire infrastructure in place; in the past, the

Prepared by Department of CSE Faculty

6
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25

process could take weeks or months to scale with on-site physical infrastructure and entail enormous
costs.

Cloud Fault Tolerance


In cloud computing, fault tolerance is conceptually the same as in private or hosted environments. In
other words, it means the infrastructure's ability to continue to provide service/services to underlying
applications even when one or more component fails. To continue to work through failure or repair, we do
not need to configure certain facilities for our infrastructure to use.

2.1 Objectives of Fault Tolerance in Cloud Computing


The fault-tolerant system uses backup components that take the place of failed components
automatically, ensuring no service loss. They include:

• Hardware systems
Hardware systems can be backed up using identical or equivalent systems. For instance, using
an identical server running in parallel, with all operations mirrored to the backup server, a server
can be made fault-tolerant.
• Software systems
Software systems can be backed up using software instances. For example, it is possible to
continuously replicate a database with customer information on another machine and operations
can be mechanically redirected to another database in case a primary database goes down.
• Power sources
Power sources use alternative sources using fault-tolerant. In many instances, organizations
have power generators that can be used in case the electricity fails.
Similarly, using redundancy, any system or component that is a single point of failure can be
made fault-tolerant.
• Security Breach Occurrences
Owing to security failures, there are many explanations about why fault tolerance exists. The
server's hacking adversely affects the server and results in a leak of data. Ransomware,
phishing, virus attack, etc. are other explanations for the need for fault tolerance in the form of
security violations.

Cloud Ecosystem
A complex web of interconnected services, parts, and parties involved in cloud computing is referred to
as a cloud ecosystem. Diverse Elements: The elements that make up a cloud ecosystem are users,
apps, data storage, networking infrastructure, cloud service providers, and development tools. Together,
these parts enable the online delivery of cloud services. Interconnected Services: Platform as a Service
(PaaS), Software as a Service (SaaS), Infrastructure as a Service (IaaS), and other services are all part
of cloud ecosystems. Because of their interconnection, users can access and use data, apps, and
computing resources without requiring a large on-premises infrastructure. Collaborative Environment:
Service providers, developers, and users can work together in cloud ecosystems. Users can access data
and apps from any location, and developers can produce and distribute.

Prepared by Department of CSE Faculty

7
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25

Cloud Business Process Management(BPM)


Utilizing cloud computing technologies to automate, optimize, and streamline internal business
processes is known as cloud business process management, or BPM. It integrates cloud service
accessibility, scalability, and flexibility with business process management concepts. This is an
illustration of Cloud BPM: Process Modeling and Design: Using BPM tools, businesses define tasks,
workflows, and decision points in their processes. Cloud-based BPM platforms provide process modeling
collaboration tools and user-friendly interfaces. Process Automation: Cloud-based tools and services are
used to automate designed processes. Repetitive tasks can be automated with cloud BPM, which
minimizes errors and manual intervention.Cloud Infrastructure: Cloud infrastructure is used to host
process engines and BPM software. The processing power, storage, and network resources required for
BPM applications to function effectively are provided by cloud platforms. Collaboration and Accessibility:
Cloud BPM solutions can be accessed from any location with an internet connection. Teams can work
together in real-time, which facilitates the improvement and modification of processes. Avlability: Cloud
BPM systems have the ability to adjust resource levels in response to demand. Organizations don't need
to worry about infrastructure constraints in order to handle varying workloads.

Cloud Service Management


The process of supervising and managing cloud services, apps, and resources in a cloud computing
environment is known as cloud service management. It entails managing, keeping an eye on, optimizing,
and providing support for cloud-based services to make sure they adhere to strict performance, security,
and compliance guidelines. Cloud service management involves a range of duties and obligations, such
as: Organizing the deployment and setup of cloud resources and services in accordance with user needs
is known as service provisioning. Resource Monitoring: To guarantee effective use and spot possible
problems, cloud resources, performance indicators, and user activity are continuously
monitored.Security and Compliance: Enforcing adherence to industry standards and regulations while
safeguarding data through the implementation of compliance policies and security measures.
Performance optimization is the process of evaluating and improving the performance of cloud services
in order to reduce downtime or latency and improve user experience. Cost management is keeping an
eye on and managing cloud-related costs, making the most use of available resources, and
guaranteeing cost-effectiveness. In order to reduce downtime and data loss, incident management
involves responding to and resolving events such as service interruptions or security breaches. User
support is the process of responding to questions, concerns, and service requests made by consumers
of cloud services.

Cloud Offerings
For users and businesses alike, cloud computing provides a multitude of services and resources. The
following are a few typical cloud computing offerings: IaaS, or infrastructure as a service: Virtualized
computer resources are made available via the internet by IaaS. Pay-as-you-go options are available for
users to rent networking components, storage, and virtual machines. While the cloud provider maintains
control over the underlying infrastructure, users with IaaS retain control over their operating system,
apps, and network configuration. Platform as a Service (PaaS): PaaS offers a platform allowing
developers to build, deploy, and manage applications without dealing with the complexity of underlying

Prepared by Department of CSE Faculty

8
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25

infrastructure. It provides a framework and environment to develop, test, and run applications. PaaS
offerings often include development tools, database management systems, and application hosting
platforms. Software as a Service (SaaS): SaaS delivers software applications over the internet on a
subscription basis. Users can access these applications through a web browser without the need for
installation or maintenance. Common examples of SaaS applications include email services (e.g.,
Gmail), office productivity suites (e.g., Microsoft 365), and customer relationship management (CRM)
software (e.g., Salesforce). Users can access SaaS applications from any device with an internet
connection.

Cloud Analytics
The term "cloud analytics" describes the processing and analysis of data using cloud computing services
and technologies. It entails analyzing data kept on cloud platforms in order to extract insightful
information, make decisions based on facts, and streamline operations. Scalability and Flexibility: Cloud
analytics makes use of the cloud computing infrastructures' scalability and flexibility. Large amounts of
data can be stored by businesses in the cloud, and because cloud platforms are scalable, they can
easily increase or decrease their computing resources in response to changing analytical requirements.
Real-time Data Analysis: Businesses can analyze data in real-time thanks to cloud analytics.
Organizations can process and analyze data in real-time and make quick decisions based on current
information by utilizing cloud-based tools and technologies. Advanced Analytics and Machine Learning:
Cloud analytics platforms come equipped with machine learning and advanced analytical tools.
Businesses can extract significant patterns and trends from their cloud-stored data by using advanced
algorithms and predictive models. These insights support companies in identifying opportunities,
streamlining processes, and improving client interactions.

Testing Under Control


Software testing in a controlled cloud environment is referred to as "Testing Under Control." It
guarantees accurate and dependable application testing.The ability to conduct controlled testing
environments and scenarios within cloud-based systems is commonly referred to as "testing under
control" in the context of cloud computing. Cloud computing platforms facilitate the creation of isolated
testing environments for users. Because these environments are managed and kept apart from the
production environment, testing operations like security, performance, and software testing are
guaranteed not to have an impact on live systems or data. Scalability and Management of Resources:
Cloud platforms offer the ability to scale testing resources up or down in accordance with testing
specifications. In cloud computing, testing under control refers to the ease with which businesses can
assign and remove computing resources, like virtual machines and storage, as needed. Centralized
Administration and Monitoring: Testing procedures can be managed and observed centrally thanks to
cloud computing. Using cloud-based management interfaces, testing teams can supervise and regulate
a range of testing tasks from a distance.

Virtual Desktop Infrastructure(VDI)


A desktop operating system is hosted on a centralized server in a data center by Virtual Desktop
Infrastructure (VDI), a virtualization technology. These desktops are accessible to users remotely.
Centralized Desktop Virtualization: In a server or data center, desktop computer resources are
centralized through VDI. These desktop environments are hosted by VDI as virtual machines on strong

Prepared by Department of CSE Faculty

9
Programme Name and Semester: B.Tech in Computer Science and Engineering(AI-ML) & 5th
Semester Course Name (Course Code): Cloud Computing & PEC-CSM501C
Class: BCSE5F
Academic Session: 2024 - 25

servers, as opposed to operating an operating system and apps locally on a physical computer or
device. Users can use thin clients, desktop computers, laptops, or even mobile devices to access their
virtual desktops remotely. Adaptable User Interface: VDI provides an adaptable user interface. The
virtual desktop of each user can be customized to meet their unique needs and specifications. Based on
user profiles, IT administrators can install apps, assign resources, and change configurations. Improved
Data and Security protection: Data protection and security are improved by VDI. Sensitive data is safe
even in the event that an end-user device is misplaced or stolen because all data and apps are
processed and stored inside of a single data center. Furthermore, VDI enables effective disaster
recovery and backup processes, guaranteeing the security of vital business data.

Difference between Public and Private Cloud


Ownership and Accessibility: Public Cloud: Resources are shared online by numerous users and
organizations, and public cloud services are owned and run by outside providers. Anyone can use these
services on a pay-per-use basis. Public clouds are very scalable and appropriate for general-purpose
computing needs. Private Cloud: Dedicated to a single company, private cloud infrastructure can be
hosted in-house or by an outside vendor. For companies with particular security, compliance, or
performance needs, private clouds provide greater control, privacy, and security. Control and
Customization: Public Cloud: Because public cloud services are designed to be widely used, they don't
provide many options for customization. Although users have less influence over the underlying
infrastructure, they still gain from the provider's expertise in managing and maintaining the
services.Private Cloud: Private clouds offer a great deal of control and personalization. Businesses can
customize the cloud environment to fit their own needs, putting special application settings, network
configurations, and security measures in place. Safety and Adherence: Public Cloud: Although public
clouds are well-protected, issues with data privacy and compliance still persist, particularly for delicate
sectors like finance and healthcare. While service providers follow industry norms, clients are
responsible for making sure their data is managed legally. Private Cloud: Private clouds provide
improved compliance and security features. Organizations can apply particular measures to comply with
regulatory standards and maintain total control over security policies. Businesses handling sensitive data
must have this level of control because strict compilance requirements.

Prepared by Department of CSE Faculty

10

You might also like