Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
18 views

Module 4-1

Good

Uploaded by

priyasunu3
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Module 4-1

Good

Uploaded by

priyasunu3
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Module 4

Models of Cloud Computing – Cloud Service Models – SaaS – PaaS – IaaS – Cloud
Deployment Models – Public, Private, Community and Hybrid Clouds – Cloud Storage

Cloud Data Centre – Cloud Data Centre Core Elements (Application, DBMS, Compute,
Storage and Network) – Storage Network Technologies – Cloud Backup – Cloud and
Disaster Recovery – Replication Technologies – Computing on Demand.
_____________________________________________________

Cloud Service Models


The cloud applications are built on three layers namely infrastructure, platform,software

Based on this there are 3 cloud computing models

 Iaas
 Paas
 Saas

Software as a Service
 Applications are hosted by a cloud vendor(supplier)
 This is available to the customers through the Internet
 The software is accessed at the customer’s location
 One machine can serve many cloud users simultaneously(multitenant)

Eg: Google Apps, Netflix, Gmail, Googlr Docs

Applications of SaaS

Complaint resolution system


Employee management system
Attendance management System

Importance of SaaS

 SaaS is one to many software delivery model


 Expenses is Nil
 Only a web browser is needed for accessing the service
 Very much scalable
 Applications are centrally managed.
 Data of every consumer is saved and protected
 Service level improvement
 Pay as you go pricing
 Rapid implementation

SaaS providers

NetSuite
Intuit
Financial Force.com
Coupa Software
AT &T

Platform as a Service

 Platform in computer software means Hardware architecture, OS, runtime libraries,


 All together it is the stage on which computer programs can be run
 PaaS gives all facilities needed for building and delivering a web application
 Cloud suppliers provide database, OS, web server and programming language.
 The application designers can build their application without purchasing the
software and hardware.

Eg: Google App Engine, Microsoft azure Mendix, Engine Yard


Importance of PaaS

 Cloud provides different platforms


 Multiple OS support
 Platform for accessing database
 Act as middleware

Uniqueness in PaaS

Application expansion: cloud user can customize the application as per requirement
Simplicity of use: user friendly . Drag and drop Integrated development environments
(IDE) are available.
Accessibility: an alternative platform is always available anywhere anytime
Scalability: the infrastructure can manage different application loads
Safety: only log on activities are provided
Comprehensiveness: application developed can be incorporated with other applications
Portability: applications can be shifted from one PaaS to another
Porting devices: for easy migration from on premise platform to online platform
Proper documentation: there is a properly documented API to document user
verification, recovery, savings of file etc.
Infrastructure as a service (IaaS)
 It is the delivery of computer infra structure as a service
 Cloud supplier provides computers as physical or virtual machines
 Virtual machines are operated by hypervisor (Xen, Vmware)
 Other IaaS resources are
 Image sin Virtual machine image history, blocks of storage, software collections,
firewalls, IP addresses, VLANs
 Cloud user deploy OS images on their application software and machine
 Cloud supplier prepare bill based on usage only.

Eg: Rackspace cloud, Amazon cloud formation, Google Compute Engine

IaaS providers

Amazon
Rackspace
Gogrid
Symetriq

Paas is dedicated to application developer.


Saas is for end user.
Iaas provides applications and middleware support to application developer.
Iaas is platform free.

It is an amalgamation of software and hardware resources.


Iaas software(hypervisor) runs independent of hardware. It keeps record of hardware
resource usage and distributes resources based on demand. This is called resource
pooling
Cloud Deployment Models

Private cloud:

 Cloud infrastructure is provided exclusively for a single organization with multiple


consumers.
 Owned , operated and managed by the organization or third party or combination
 It may exist on /off premises

Community cloud

 Cloud infrastructure is provided for exclusive use by specific community of


consumers within an organization( with similar mission, policy, security
requirements, )
 Owned managed and operated by one or more organizations in the community
 It may exist on /off premises

Public cloud

 This is for open use by general public


 May be owned, managed, operated by business academic or government
organization or a combination of them.
 It exists on the premises of the cloud provider

Hybrid cloud

 Composition of 2 or more distinct cloud infrastructure (private, community, or


public)
Public cloud

 Users have many options to opt for any service provider


 It may cost a lesser amount
 Private information of the cloud user is protected.
 The physical infrastructure is possessed by cloud service supplier
 The cloud consumers share the infra structure and pay for what they use.
 Different clients access collection of services provided by the cloud supplier

Eg: Google, Amazon Elastic Compute Cloud (EC3), Microsoft

Private cloud

 Private cloud services gives the control of cloud infra structure to the user
 Infrastructure access is permitted to members of organization
 Private cloud is hosted in the data centre of the company and services are offered to
users within the company
 Higher cost compared to public cloud
 A private cloud is possessed by the consumer, but constructed and deployed by a
third party
 Physical servers may be positioned at the location of the consumer
 Private clouds are owned by big organizations
 Safety is stricter in private cloud than in public cloud. Because the infrastructure is
owned by the organization and the organization has control over the applications
installed.

Eg: Vmware, Microsoft, Eucalyptus with Ubuntu Server

Virtual private cloud: a consumer is allotted private cloud inside public cloud’s
physical infrastructure

Community cloud
Limited and consumed by means of a group or cluster who are engaged in a general task.
The members of the society get access to the information on the cloud. Community cloud
falls between public and private cloud. Cost is higher than public cloud.
Eg: Google Gov Cloud, NASA Nebula cloud

Hybrid Cloud

 Hybrid cloud is a combination of two or more clouds, private, public and community
clouds
 Cloud users are supplied with information on the public cloud and the cloud supplier
has to maintain the company significant services.
 Hybrid cloud enables to migrate and manage workloads between these various cloud
environments
 organizations choose to adopt hybrid cloud platforms to reduce costs, minimize risk,
and extend their existing capabilities to support digital transformation.
 Cloud bursting is a configuration method that uses cloud computing resources
whenever on-premises infrastructure reaches peak capacity. When organizations run
out of computing resources in their internal data center, they burst the extra
workload to external third-party cloud services.

 Many organizations want to continue using their existing on-premises computing


infrastructure and also get the benefits of the public cloud.
 They can deploy a cloud-bursting hybrid cloud architecture to access public cloud
resources when they have no more on-premises compute capacity.

Advantages of cloud-bursting techniques


 Use local resources efficiently
 Reduce further investment in on-premises infrastructure costs
 Enjoy the scale and flexibility that public clouds bring
 Avoid service interruption to business-critical applications due to sudden workload
spikes

Cloud storage
 Cloud storage is a service model where in data is maintained, controlled, and backed
up distantly and made accessible to users over the Internet.
 It is a network of online storage hosted by third parties(cloud storage providers)
 Companies who need to host data, take storage space on rental basis
 Cloud storage is accessed through web based user interface or API

3 major cloud storage models

Public cloud storage(Amazon Simple Storage Service(S3)-multi occupant storage

Private cloud storage – dedicated storage restricted behind firewall of a corporation.


Suitable for users who need more customization and power on data.

Hybrid cloud storage- amalgamation of public and private cloud storage.


Storage Network Technologies
Cloud computing offers virtualization to provide services to more than one user at a
time.Communication is important between storage and virtualization devices.

Just-in-time information for business users.It is the information ought to be accessible to


users at the time they require it.
Cloud need a Resilient and flexible storage architecture .
Cloud uses Fibre channel storage area network (FC SAN) .
This is a high-pace, devoted network of systems and shared storage tools.
FC SAN employs small computer system interface (SCSI) protocol for transferring data
between storage tools and compute systems.

The following are the components of a Fibre Channel SAN:

 Node ports

 Cables Connectors

 Interconnecting devices

 Storage arrays

 SAN management software

The fibre channel fabric is a rational space wherein every joint converses with each other
via a switch or manifold unified FC switches.

Compute systems communicate with storage tools via specific vents known as ports.
Ports are the fundamental construction blocks of an FC network. In the network, ports
may be of different kinds as follows:

N_port - It is also called the node port. It is a compute system port host bus adaptor
(HBA) or a storage range port which is associated to a switch within a switched fibre.

E port - It is an FC port which develops the association between two FC switches. This
port is called the expansion port. The E port on an FC switch unites to the E port of other
FC switches in the network

F_port- It is a port on a switch which unites an N port. It is also defined as a fabric port.
G_port - It is a standard port which may function as an F port or an E port and decides
its functionality mechanically all through initialization.

World wide name and channel address are the two kinds of addresses which are used for
communication in an FC SAN situation.

Replication Technique
The procedure of generating an accurate/similar replica of data is known as replication.
The accurate copy of data that is generated is known as replica. Such replicas may be
used for revival in the occurrence of data loss.

The main aim of replication is to allow users to have the chosen data at the correct place,
in a condition suitable to the needs of revival.

This permits reviving industry functions by using the replicas.

1. Offering an alternating source for backup to enhance the effect on construction


2. Offering a source for rapid revival
3. Facilitating judgment support actions, like reporting
4. Mounting and analysing projected modification to an application or an operating
situation
5. Reviving an application from the copy in the occurrence of a malfunction in the source
level

Key Factors to Consider with Replicas

Replicas may be continuous replica or point-in-time (PIT).

Continuous replica: The data on the replica is matched with the manufacture data
during the entire period.

Point In Time: The data on the replica is a copied picture of the manufacture at a certain
timestamp.

Local replication is the procedure of replicating data inside a similar data center.

Local replication technologies may be categorized on the basis of the site where the
replication is carried out.

Compute-based : Replication is carried out using the resources of the CPU of the
computer system through software which is working on the compute system.

Compute-based regional replication may be more classified as file system snapshot and
logical volume management (LVM)- mirroring.

Storage array-based: Replication is carried out on the storage range by using the
resources of the CPU of the range via the operating environment of range.
Storage group-based regional replication may be classified follows:

 Pointer-based virtual replication


 Pointer-based complete degree replication
 Complete degree mirroring

Remote replication is the procedure of generating replicas of data to be kept in isolated


places for safety.

Remote replicas assist corporations to improve the threats associated with regionally
determined disaster.

The infrastructure where the replica is saved at the isolated location is called target. Data
has to be shifted from the source location to the target location over several networks.

The two fundamental manners of remote replications are a follows-synchronous and


asynchronous replication.

For improvement of threats recognized in two-site replication, three-site replication is


employed.

In a three-site replication, data from the source location is replicated to two remote
locations.

Replication might be synchronous or asynchronous.

Cloud backup
Backup is a replica of the manufactured data, generated and maintained for the only
intention of improving corrupted or deleted data.

Corporations require backup data at a cheaper price with the least number of resources.

Corporations should guarantee that true data is in the correct place at the correct time.

Backup technologies need a guarantee successful execution of the revival and backup
solution.

Backups are carried out for three key reasons-documentation, operational restores, and
disaster recovery.

The backup replicas are used for reinstating data at an alternate location when the
primary location is harmed because of a catastrophe.

Operational backup is a backup of data at a point in time and is used to reinstate data in
the occurrence of data loss or rational corruptions which can happen during routine
procedures.
Documentation is a general prerequisite used to protect contract report, email, and other
e work goods for rigid approval.

Full backup is a backup of the total data on the manufactured amounts at point in time
and is generated by replication of the data on the manufacture amounts to a secondary
storage tool. This is much quicker, but takes longer to reinstate.

Cumulative backup imitates data has been distorted since the last full backup. This
technique takes more time than incremental back up but is quicker to reinstate.

Synthetic full backup is another kind of backup which is employed in executions where
the construction amount resources cannot be entirely set aside for a backup procedure for
expanded phases.

A backup system uses client server design - backup server and multiple backup
consumers.

The backup server controls the backup function sustains the backup list that restrains
information regarding the backup metadata and backup procedure. The backup server
relies on the backup consumers for collecting the data to be backed up. The consumers
may be native to the server or may occupy an additional server, apparently to back data
perceptible to that server.

The backup metadata has been obtained by the backup server from the backup
consumers to out its actions. The metadata is saved either locally inside the backup
server or outwardly in a range. The storage joint is accountable for writing data to the
backup tool. Characteristically, the storage joint is incorporated through the backup
server and both are hosted on a similar physical platform. The storage node is directly
connected to a backup device.

Disaster recovery
The Backup Server commences the back up procedure for distinct customers according
to the back up program organized for them.The backup server synchronizes the backup
procedure with all the constituents in a backup arrangement. The backup server sustains
the information regarding the backup consumers to be dealt with and the storage joints to
be employed in a backup function. The backup server recovers the backup-concerned
information from the backup list and, on the basis of this information initiates a suitable
storage joint to put in the backup media into the backup tools.

Concurrently, it initiates the backup consumers to transmit their metadata to the backup
server to back up the data to a suitable storage joint. On getting this demand, the backup
consumer transmits trailing information to the backup server. The backup server
inscribes this metadata on its backup list.

The backup consumer transmits the data to the storage joint, and the storage joint
inscribes the data the storage tool. The storage joint transmits trailing information to the
backup server as well in order maintain it updated regarding the media being employed
in the backup procedure. A reinstate procedue is manually commenced by the backup
consumer. Upon getting a restore demand, the user unlock the reinstate application in
order to analyse the consumer's record which has been backed up. Whils choosing the
consumer for which a reinstate demand has been made, the user also requires recognizing
the consumer who will obtain the reinstated data. Data may be reinstated on a similar
consumer or another consumer, given the appropriate consents, and then the user chooses
the data which is to be reinstated.

The reinstated application should communicate with the backup server as well. The
backup server recognizes the backup media needed for the reinstate and informs the
storage joint to put in the backup media. Then, the data is interpreted and transmitted to
the consumer which has been recognized to obtain the reinstated data.

Tape drives, a low-priced alternative, is used for backup.

Data Centre Core elements


 Key component of cloud computing is virtualization
 Virtualization provides customized environment to different users
 It is sold on demand
 It is elastic
 Services is fully managed by the provider

The important cloud elements are

 Clients (mobile, thin or thick)


 Data centre (collection of ervers, IT, non IT requirements)
 Distributed Servers geographically distributed)
 storage

The principal components of a cloud data center (CDC) comprise:

Application: it is a computer program. It uses a DBMS to store , retrieve data


DBMS: it gives a systematic way to store and retrieve data in tables
Compute: it is a physical computing machine which controls applications, DBMS, and
OS
Storage : a tool to save data constantly. Storage requirement depends upon total data to
be saved and the time period for which the data is to be stored.
Network: it is a connecting path which allows communication among compute systems
and customers and among storage and compute systems

Application

Interface between host and user, or among multiple hosts.


Business applications have three layered design
application user interface- Front end layer
Application itself – middle layer
Database- back end layer
Data saved on server
Server replies to requests from user
Application transmits the requests to OS to carryout read write operations in the storage
media
R/W functions allow communication between front end and back end layer

Database Management Systems

A DBMS saves data in tables in an organized method


DBMS handles requests from application program, for data
It arranges incoming data in a customized way
Examples: SQL server, ORACLE, MySQL

Compute:

It consists of physical components (hardware devices) that communicate with one


another using software and protocols
Three main constituents
 Memory
 CPU
 Input Output tools
Also logical components ( softwares and protocols)

Types of communication
Between user and compute system (by I/O tools)
Between storage and compute system (by host bus adapter or host regulator )

Compute systems can be


 Separate servers / blade servers
A blade server, (a high-density server) is a compact device containing a computer used to
manage and distribute data in a collection of computers and systems. Its acts between
computers, programs, applications and systems.
Server grouping assembles two or more servers and make them to work collectively
It offers high accessibility and load balancing

 Plain laptops
 Processor
Storage

Data generated by companies or individuals should be saved so that it is effortlessly


available when required. Tools intended for saving data are known as storage tools or
merely storage. The sort of storage used differs on the basis of the kind of data and the
point at which it is generated and used. Tools like memory in a digital camera or cell
phone, CDROMs, DVDs, and disk drives in private computers illustrations of storage
tools. A storage tool utilizes optic, solid, or magnetic medium. DVD/CD utilizes optical
media, whereas diskettes, tapes, and disks use magnetic medium for storage.

Network

Protocol used for communication-


TCP/IP (for WAN , MAN)
Ethernet (LAN)
Every system has a NIC (Network interface card ) and MAC address
Routers and switches for interconnection
Compute storage communication is made possible through
Host bus adaptor (HBA)
Converged bus adaptor (CAN)

You might also like