0% found this document useful (0 votes)
50 views23 pages

CC Chapter-1 Material

This document discusses cloud computing, including its essentials, components, and need. Cloud computing utilizes centralized servers and the internet to allow users to access applications and data from any device. It provides efficient computing through consolidated bandwidth, storage, and processing. The main benefits are robust data management without needing personal storage, easy access to data and applications from anywhere, reduced costs, and rapid scalability. It allows sharing of software, data, and resources over the network efficiently.

Uploaded by

Samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views23 pages

CC Chapter-1 Material

This document discusses cloud computing, including its essentials, components, and need. Cloud computing utilizes centralized servers and the internet to allow users to access applications and data from any device. It provides efficient computing through consolidated bandwidth, storage, and processing. The main benefits are robust data management without needing personal storage, easy access to data and applications from anywhere, reduced costs, and rapid scalability. It allows sharing of software, data, and resources over the network efficiently.

Uploaded by

Samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

CLOUD COMPUTING UNIT.

1.1 INTRODUCTION
Cloud computing is a technology which utilizes the Internet and central isolated
servers in order to sustain applications and data. Users can access applications and data
at any workstation through the Internet. This technology permits much more proficient
computing by consolidating bandwidth, processing, and storage memory. Cloud offers
robust memory administration, thus there is no necessity to sustain memory on a personal
system. It alters the means by which the Internet and computer are used.

1.2 ESSENTIALS OF CLOUD COMPUTING


Cloud computing is a type of computing that provides an off-premise computing facility
like storing data on virtual resources using the Internet. The main component behind cloud
computing is the data center. The data center refers to an on-premise hardware facility that
is used for many purposes, for example, storing data on the local network.
The term ‘cloud’ is defined by NIST [10] as follows:
“Cloud computing is a model for enabling ubiquitous, convenient, on-demand network
access to a shared pool of configurable computing resources (e.g., networks, servers,
storage, applications, and services
that can be rapidly provisioned and released with minimal management effort or service
provider inter- action. This cloud model is composed of five essential characteristics, three
service models, and four deployment models.”
Cloud computing offers services instead of a product, whereby shared software,
information, and resources are supplied to computers and other tools efficiently over a
network. Cloud users should not need to identify the site and other particulars such as
infrastructure, but cloud computing offers software applications, computation, storage
resources, and data access and data administration facility.
End users access cloud-based applications via diverse interfaces such as a light-weight
desktop, a web browser, or different mobile applications, whereas applications such as data
and business software are saved on servers at an isolated site. Cloud application suppliers
attempt to provide enhanced functioning and service than that provided if software
programs were deployed locally on the end-user or on detached computers.
Cloud computing performs tasks at a faster rate to meet the demands of users. It permits
the data center to allow enterprises to acquire applications and work on data quickly and
needs only simple administration and less upholding. Many unpredictable and uncertain
company orders of IT resources, such as networking and servers, are effortlessly met with
the cloud computing technology. The basic structure of cloud computing is shown in Fig.
1.1. As given in the figure, facilities and services are offered by cloud providers in a cloud
computing environment and different users from various locations and devices can request
for specific services that are offered.

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

As cloud computing is a recent technology, different people have different views about it.
Cloud computing meets the overall software and hardware demand of an organization, user,
or company.

It reduces the total investment in hardware and software charges of a corporation. Some of
the benefits of cloud computing are given here:
1. It improves parallelism and allocation of resources for fast accessing
2. One may acquire software services, networked storage space, computer resources,
and various other services at a single place
3. An additional company hosts a set of applications, get software renewals (with no
charge), and so on
4. It improves monetary burden such as operational expenses, renewing charge, and
capital expenses
Hotmail, Gmail, Yahoo email, etc., are all simple illustrations of cloud computing. The email
administration software and server are on the cloud and are completelycontrolled by the cloud
service suppliers, Google and Yahoo, among many others. The customer may usemodernized
software and have the advantages of cloud computing. Cloud computing is an array of net-
work, hardware, storage, interfaces, and services which facilitate the various services. We can
also say that the term ‘cloud’ is a set of hardware, network, storage, services, and interfaces
that facilitate the service.
In cloud architecture, there are generally five main components of cloud infrastructure.
• Front-end interface for users for simple access and for using cloud resources
• Management for handling networking resources
• Storage for virtual machine
• Constant storage tool that may be organized within working virtual machines
• Monitoring tools for initiating virtual machines on the cloud
There are two types of a cloud environment:
1. The end user who has no idea about cloud complexity
2. The cloud service provider who has the liability of controlling the complete cloud
environment and offer services to the consumer. One of the jobs of the supplier is safety,
and it assures the consumers the degree to which their data is protected. The cloud
service supplier is also accountable for IT resources, uploading, and other services
offered to the user. Various services and resources are provided to users by the cloud
provider, as suggested and managed by the cloud administrator, in the cloud
environment, as shown in Fig. 1.2.

Cloud computing gives users the option of accessing information from any place at any

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

point of time. To access the conventional computer system, you should be in a similar
physical position as your data

storage tool. The cloud eradicates this barrier. Suppliers of clouds offer you the obligatory
software and hardware for operating your company or home applications.
It is required to pay for storage space, hardware, and software for a business or
corporation if they are using cloud resources provided by cloud providers. Small
corporations as well may save their information on the cloud, which will lessen the price
of buying hardware and memory tools. They only need to purchase a specific volume of
storage space, as per the requirement.
You require an Internet connection to access the cloud. The benefit of this is that you
can access that record from anywhere, by any tool that can access the Internet. Workers at
distinct sites can access similar data on the cloud and any tool may be used (e.g., a laptop,
desktop, mobile phone, or tablet). Cloud computing involves a cloud consumer, cloud
provider, cloud auditor, cloud broker, and cloud carrier, as shown in Table 1.1.

Cloud consumer An individual person or organization that sustains a business relationship


with cloud providers and avails the services offered by the provider
Cloud provider An individual person or organization who offers a service and is liable for
the services of cloud computing to the parties that demand it
Cloud auditor A party that conducts evaluation of cloud services, such as performance,
operation on various systems, and security, among others
Cloud broker The management between cloud providers and cloud consumers, like
presentation and delivery of various services
Cloud carrier The mediator responsible for connectivity and transport of cloud services
from service providers to cloud consumers

1.3 NEED OF CLOUD COMPUTING

Cloud computing offers services to users for storing software and files distantly, instead
of on a server or a hard drive at their workplace. Every corporation must possess its own
personal cloud that may be adapted according to the users’ demands.
Through the Internet, employees may access information from home, on the way, from a
customer’s office, or from a smartphone such as an iPhone or a BlackBerry. Employees
may also jointly work on documents and files, even when they are not physically all together.
Everyone can work mutually even if they are physically far from each other. Concurrently,
documents can be seen and proofread even though they are in remote areas.
Cloud computing may be extremely fast and simple to operate. Since downloading and
deploying of software needs time, clouds maintain everything up to date. Cloud computing
is cheaper as well. There is no requirement of purchasing and deploying costly software as
it is already deployed online and you operate it from there. Cloud computing provides
agility and it may be easily and swiftly scaled up and down as per the requirement.
One of the chief benefits of using cloud computing for various corporations is that it
provides nearly infinite storage, in contrast to a server, and takes into consideration the
limits of a hard drive as it is online. There is no requirement to pay for enormous disk space
and devices.
There are many challenges associated with a conventional infrastructure are

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

Software licensing and support For every application and data center, licensing is
needed. However, in cloud computing, for allocated data centers, only a single license is
needed for the application.
Scalability Conventional infrastructure cannot extend easily at a particular instance of
time, and scal- ability requires variation with time. It has to regularly improve in order to
face the challenges.
Accountability The application in conventional infrastructure never has vital liability and
power.
Modifiability When alteration is needed, the application constantly needs and sustains extra
charge.
Physical security It is tough to uphold security, and therefore, security is still a serious
issues related to cloud computing.
Cost-effective management To make the application significantly accessible, the
replication of data is required from time to time, which is very cost effective for a
organization.

Cloud computing is a new trend in computing due to its many benefits that are

1. Reduced Costs
2. Scalability : More information can be saved, when compared to personal computer
systemsby companies. Some of the important advantages of scalability are
• One of the biggest advantages of cloud computing is that a business pays only
for the services it avails. In a conventional infrastructure and technology,
businesses should invest in advanced storage tools and servers which normally
occurs at fixed prices. Cloud computing is exclusively scalable and flexible,
functioning on the basis of usefulness and permitting businesses to pay as per work
and the resources they use.
• Since cloud computing is based on virtualized technology, RAM space, storage,
etc., are simple and swift to use and append. The requirements of a business can
be accomplished in hours rather than days.
• In a cloud environment, scalability is a benefit. With the expansion of the business,
further resources are included already to support the progress of the business. In
association with SaaS, businesses have to pay according to their demand, that is, pay
more for more demand and less for less demand.

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

3. Remote Access : Through cloud computing, it becomes very easy to synchronize data
access between international offices. Once data is virtually stored, it can be shared
effortlessly between offices that are far from each other through isolated access. The
advantages of isolated access are that any tool can be used, any time and at any place. Users
would have access to their software, attributing the newest information and data on any
venture. Users can do the following:
• Access project reports and data, alter orders, etc.
• Sense the ‘always on’ benefit of being capable of giving up one zone and
carry on even on yoursmart cell phone.
• Expand your trade and support your cell phone sales strength as everybody
has 24 × 7 access tothe cloud any time, from any mobile tool or desktop.

The advantages of cloud computing and web-based business cooperation


applications all emphasize on the advantages of isolated access.
Isolated access functions in three fundamental methods. The first is the
streaming of data from one machine to another; this occurs when a person online
listens to a radio station or watches a movie. The second one is when web applications
exhibit an interface which permits the web user to interact with an application such as
an online store or a search engine. The third one is when files are made comprehensible
on an isolated desktop computer through desktop sharing and isolated control software,
and are cloned to the PC of the end user to be controlled and cloned back to the initial
site

4. Disaster Relief : Natural calamities such as earthquakes, floods, internal troubles, and
wars might result not only in the loss of data of e-governance applications but also in
unavailability of services. In a different geographical locality, multiple set-ups along
with total backup and retrieval explanations should survive. Disaster recovery control
measures should be put in place and exercised from time to time. Data and applications
should be surplus and must be accessible at short notice to switch from one data center
to another. Cloud virtualization techniques permit restoration and backup. As compared
to a conventional data center, it provides flawless migration of applications.
5. Ease of Implementation
Cloud computing has many benefits over other conventional ways of hosting and
networking. These benefits are particularly noticeable for small ventures which
require the strength of business services, but the finances are unavailable for
purchasing computers, paying workers, and executing the technology.
For those who do not have the knowledge of modern technology, executing cloud
computing services might tend to be a little inconvenient on home networks. However,
this can be accomplished easily with an Internet connection and a cloud computing
host. With this benefit, it becomes easy for small-scale company owners to set up
services even if they are unaware of the execution of modern technology.
With the help of these benefits, anybody can get started on cloud computing.
The benefits are particularly useful for small enterprises; nevertheless big
corporations may also benefit from cloud computing. Cloud applications do not need
to be upgraded, fixed, or downloaded. It is easy to learn and use applications and
several of these are accessible at a cost-free trial, to check if it suits some small
enterprises or not. For small enterprises, various cloud-based software and

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

applications are offered, which are beneficial for smooth running of businesses.

6. Skilled Vendors : Cloud computing business models need suppliers to appoint, teach,
and maintain highly talented workers to maintain the quality of service. Cloud computing
suppliers maintain a professional’s requirements at their end.
7. Response Time : Cloud computing achieves an improved response, compared to other
types of computing. The response time, is faster when compared to normal hardware and
server. At present, cloud computing is growing in a totally new manner, as businesses
of every range and form are getting used to this recent technology. Cloud computing is
used for data storage services and software applications which are sent in real time over
networks, generally, the Internet. These services principally comprise everything you
may perform on a PC— data storage, email, and productivity and conversion
applications. The advantages of cloud computing can comprise improved cooperation,
cheaper rates, and better mobility. Cloud computing has significantly lower costs than
the equivalent user licences and desktop software. The subscription services provide the
best features and priority consumer support although they are paid as per usage.
Possessing such kind of productivity applications and storage ‘in the cloud’ facilitates
access to your files anywhere and anytime. It makes it easier to work on projects
regardless of locality and time zones. Industrial cloud service suppliers must have very
strong data backup systems. Through cloud computing, it is improbable that your data will
be lost since service suppliers will usually have data retrieval systems in place.
Nevertheless, accessibility is a more common drawback. Round-the-clock access is one
of the assurances of cloud computing, but the truth is that it is not possible every time.
Even chief suppliers own services that can go offline owing to system maintenance or
failures from time to time. You would require steady Internet access at your end so as to
ascertain your access to the existing services.
8. Easy to Customize : Customization may be possible for easy access of resources to
some degree, as per our need. Physical servers or virtual servers may be customized to
distinct schemes via a control panel. Other than these, there are various other benefits
of cloud hosting over isolated hosting:
• Pre-configured operating system—A variety of famous Linux
allocations (Debian, Red Hat, Ubuntu, Arch, Fedora Enterprise
Linux, and several editions of Windows-based servers)
• Committed IP addresses for cloud servers
• Conversion amid servers in the similar cloud, free of conversion
expenses and at high speed
• Allocation or replication over many remote sites
9. Virtual Provisioning
A novel technology used in storage is the fact that storage space is allocated on
demand to various devices on the virtual storage network. There is a virtualized
environment for controlling, monitoring, and maintaining a physical disk storage that is
connected with virtual machines.
Thin provisioning is another term used for virtual provisioning. Virtual provisioning
is mainly used in a virtual environment, whereas thin provisioning is generally used in a
physical computing environment. Virtual provisioning does not ensure the assigning of a
higher storage capacity to VMs. It offers physical storage to each unit of virtual memory,
based on the demands of the user.
10. Fully automated storage tiering (FAST) : FAST mechanically shifts active data to

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

storage tiers with high- performance computing and stationary data to different storage
spaces at low cost. It is useful to increase the performance of the applications, compared
to other traditional technologies like Serial Advanced Technology Attachment
(SATA). It is difficult to do the same optimization in data storage with a manual system.
By continuously monitoring FAST, one can easily identify active or inactive data. On
the basis of set principles, the administrator can control and manage systems
automatically. It is an optimized method that does not add any extra expenditure and
burden on the system.
1.4 HISTORY OF CLOUD COMPUTING
Cloud computing is an Internet-based service that has evolved after going through a number
of phases, for example, grid and utility computing, SaaS, etc.
In 1999, Salesforce.com came into the market. This was a pioneer of cloud computing.
After that, Amazon Web Services was launched in 2002, which provided customized cloud-
based services including storage, computation, etc., to the cloud users. Another big invention
in cloud computing was in 2009, as Web 2.0 and Google services, through Google Apps.
The following sections show the historical evolution of computing.
1.4.1 Client-Server Technology
Client-Server is the technology behind cloud computing. Client-Server technology is shown
in Fig. 1.4. In this, multiple computers perform collectively to augment computing power.
The server is the prime regulator wherein software applications and data are kept for
access. If a user requires to operate a program or access precise data, he/she needs to connect
to the server, to get suitable access and to perform various operations whilst renting the data
or program from the server.
The client may request to be associated to the server, to which the server replies
appropriately. This is known as dumb terminal as it does not have high processing power,
storage space, or memory. The client is simply a tool which is associated with the user for
facilitation.

Cl

Server

Fig. 1.4 Client-Server technology


The user needs to obtain consent until and unless it does not get approval to access the
processor. Due to inadequate processing power, IT employees neither acquire instant access
nor can two users access similar data concurrently in client–server technology

Advantages of Client–Server Networks

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

Centralized control There is a centralized power used in the client-server model. Servers assist
in control- ling the complete system. Access acceptance of distinct users and resource
allotment is made by servers.
Administration managed File administration turns out to be trouble-free since every file
is saved at a single place.
Replication for backup Since complete data is saved on the server, it is easy to create a
back-up of it. During the time of recovering the missing data, it performs a vital role.
Easy updating possible Variations may be made simply by mere advancement of the server.
Remote service Access of distant server is possible to accomplish the needs of consumers
and support distinct network.
Secure and safe For any computing, safety is a vital feature. Safety convention and access
privileges may be termed at the time of association of server.
Disadvantages of Client–Server Networks
1. If the server is unable to tackle countless requests from the consumers, it might lead
to congestion with data getting missed.
2. In case you are downloading a file from the server and if, because of some fault, it
gets discarded, download too discontinues.
3. Administration and deployment is extremely costly for such computing.
4. Expert IT populaces are forever required for maintaining servers and other
technological particulars of the network. It needs unique guidance for the upholding
of server.
1.4.2 Peer-to-Peer Approach
Peer-to-Peer (P2P) is a decentralized approach and it encompasses no principal server. It is
a design in which every computer has equal responsibilities and facilities.
In client–server technology, the consumer is the entire time strike server for diverse
requests. In conventional design of a client server, one or more computers are devoted to
serving the others. In a P2P setting, there is no master (boss) and slave. P2P facilitates
straight swap of services and resources. No one lingers on for others to react since all are
masters (boss) and there is no need for a principal server as any of the computers may
perform in that capability, when called on to do so. This kind of network is not simple to
manage.
Disadvantages of Peer-to-Peer Networks
1. It is not easy to administer this type of network.
2. Safety matters are forever on this network and it cannot be tackled appropriately.
3. Backup or data revival is not simple. Every computer must have its personal imitation
system.
1.4.3 Distributed Computing
To amplify the throughput and for the utmost exploitation of the computing power of a
system in a network, we may utilize distributed computing. A system is not completely
busy all the time; several systems remain idle many times, so if the idle time of various
systems is integrated and used for compu- tation, which functions for the highest
consumption, it is known as distributed computing. Distributed computing utilizes those
idle resources that are not utilized for some reason or the other. Figure 1.5 shows distributed
computing.

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

Disadvantages of Distributed Computing


There are several problems regarding transfer and allocation of IT resources. They are as
follows:
1. Growing computing power at every data center
2. Growing storage facility
3. Under-consumption of the resources in various scattered data centers
4. Rise in maintenance expenses of data centers

1.4.4 Evolution of Cloud Computing from Grid Computing


Grid computing utilizes a network or group of computers for making computing resources
like super computers and performs large or complex operations and tasks over it. It is not
necessary to have a network of computers at one geographical location. Unused computing
powers of many computers are used to perform complex scientific problems using grid
computing.
When computers are united mutually for an application, they may be tightly coupled or
loosely coupled. Tightly coupled systems via a system bus or some further speedy short-
space network normally share memory and other system resources, along with the
processors. A geographic discrete system is utilized in grid computing. Associates of grid
computing communicate via networks; it does not matter where the computers are placed.
Grid applications are frequently intended to acquire the benefits of unused CPU cycles
accessible on every computer component. Grid computing is distinct from cloud
computing. It uses the resources of various computers in a network to perform.
Grid computing is attractive for several reasons:
1. Computer resources are not appropriately utilized; as a result, it is profitable to employ
a known sum of computer resources.
2. It accomplishes the need of high computing power.
3. The resources of various computers can be shared with an understanding, not
requiring a single computer to have to organize it further.
Grid computing is accountable for cloud commencement up to a certain extent. There is a
system of parent and child procedures in grids or any distributed computing system. For a
specific assignment, an initial evaluation, to ascertain if it can be broken into assignments
of a smaller range, is conducted. If it is feasible, distributed computing performs similar
tasks and transfers the pieces of job into an addi- tional computer for completion of the
assignment.
It is also beneficial for appropriate consumption of resources which remain unused.
Figure 1.6 shows the typical forms of cluster grids where servers are connected with each

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

other in an organization

Nodes
Communication Virtual
network server

Physical server

Virtual
server
Grid with large
computation power

Fig. 1.6 Typical forms of cluster grids

network; there is one administrator to control the servers and so, services are accessed by
the clients on the network.
There are numerous reasons as to why you could decide to perform an application on a grid
instead of a high performance computing (HPC). Additional savings or money, and data
accessibility—both kinds of resolution need enormous sums of computing strength.

Evolution of cloud computing from grid computing is shown in Table 1.2.


Table 1.2 Evolution of cloud computing from grid computing

Grid computing Utility computing Software as a Cloud computing


Service
Big crisis could be Provided computing Beneficial in usage An Internet based
resolved with resources as metered based payments to computing offering
equivalent services (disburses as applications. services such as IaaS,
computing per usage) PaaS, and SaaS.

Grid technology supports application-oriented inter domain business, so the purpose of grid
security infrastructure is to protect shared resources from unintended users and also support
fundamental feature of security like authentication and authorization. Authentication means
that the entity has to prove that it is really what it claims to be and authorization means
access permission of shared resources under different conditions given to different users.
Authentication Infrastructure
The generally used authentication infrastructure is public key infrastructure, which is
based on pub- lic key cryptography. A third-party mediator is involved for this
authentication process, that issues certificate to users as grid identity that allows users to
use shared resource in the grid infrastructure. Another user authentication is done through
Kerberos. Session key is issued to the users by the authentication servers for accessing

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

resources in the grid. Security key means special token issued to the users.
A different method, Athens, is also used, which maintains separate user account for each
resource they want to access and users’ accounts are managed centrally by an account server.
One level authentication technique is used, which is based on user name and password.
Authorization Infrastructure
Akeni authorization infrastructure method issues users’ certificate to access a shared
resource under different condition. A trusted entity is defined to gain access of shared
resource. Use condition on resource is also defined for every stake holder, for keeping data
safe and unreached from each other. Another method is privilege and role management, in
which for accessing resource, users have to present role- based certificate that defines user
role and attribute. One of the important methods is virtual organization membership service
that maintains all information about users centrally through a virtual organization
administrator. Certificate needs to be present for accessing a shared resource, and only after
checking the validity of certificate users are allowed to access resources.
Other method of access control of user identity is grid map files. A distinguished list is
prepared for shared resources used by particular user accounts and the list is shared on each
resource. Generally, user mechanisms of security in grid computing are authentication and
authorization and these are termed as hard security, whereas other method, trust
management based system, is called as soft security.
Trust between two parties is a bidirectional relationship, which decides extent up to
which one party depends or relies on the other. Trust management consists of a trustor and
a trustee. Mutual trust relationship is of the following types:
1. Provision trust—It describes a user’s trust on a service provider or service.
2. Access trust—It describes service provider trust in the user access on provided
resource.
3. Identity trust—It describes trust on identity claimed by the user.
4. Delegation trust—It describes trust on someone which acts and makes decision on
behalf of some other.
Goal of trust model is to support decision making for various interactions. Trust values are
calculated for prediction of future possibilities. Depending upon application trust value, trust
model is of three types:
1. Fuzzy logic model
2. Probability theory model
3. Mathematical method model
Fuzzy logic uses linguistic terms for calculating trust value that explains its believe on the
other entity. In probability-based model, trust is calculated on the basis of previous
experience that determines future actions. In mathematical method, calculated index value
determines the level of belief on the other entity.
1.4.5 Autonomic Computing
This is a system that supports computing to perform and work without any outer control or
intervention. The phrase is on the basis of the autonomic nervous system of the human
body that manages heart functioning, breathing, and many other functions. The aim of
autonomic computing is to have the computer carry out versatile and critical functions
without any interference by a user. Each task may be programmed, with orders given
according to necessity, and evading user interference as per the need.
1.4.6 Platform Virtualization
Virtualization is a base for clouds, irrespective of whether you are heading towards

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

constructing a mini- cloud in a prevailing data center or want to place your applications on
a complete cloud.
A virtual picture offers an undefined number of hardware resources for strengthening the
accessibility and functioning of an application; the choice on which resources to virtualize
is normally handled down to a query of the resources previously being utilized on a variety
of accessible servers. Each user acquires a service according to the requisites in
virtualization.
The unused time of a server is involved in waiting for output or input, or is devoted to an
assignment, working for lesser consumption of CPU and rotating its computational power
for new assignment to be completed. Virtualization is a proficiency which conceals
physical resources and emerges as virtual resources for users. Organizations have to carry
out many steps in order to accept cloud computing. In a conventional data center, resources
are devoted for every business application or entities. IBMS/360-67 supports up to four
processors. It, in fact, supports dynamic address translation (DAT) to perform with
competent paging.
Virtualization makes physical resources look like virtual resources in front of users.
Virtualization is founded on the perception of a virtual machine working on a physical
computing platform. Virtualization is managed by a Virtual Machine Monitor (VMM),
called a hypervisor. An open-source hypervisor, Xen, is broadly utilized for cloud
computing.
1.4.7 Service Oriented Architecture—SOA
A software allocation and installation module are that in which applications are offered to
consumers as a service. The applications may work on the computing systems of users or the
web servers of suppliers. A variety of software is easily accessible on the cloud and
instantaneously accessed by several users.
An array of services can communicate with one another. Cloud computing is Internet-based
computing, where mutual information, software, and resources are offered to consumers on-
need, for example, a public utility.
In cloud computing, service level agreements (SLAs) are mandatory to manage the usage of
resources. In the negotiation process, a joint decision is made between the parties, service
provider, and service consumer in the context of cloud computing. Quality of service (QoS) is the
ability to offer various priorities to dependents based on applications and consumers, and
guarantees a certain level of performance. QoS norms are rich and are extremely dependent on
the application
The general service arrangement is as follows:
1. Loss—Chance that a flow’s data is missing
2. Delay—Time it acquires a package’s flow in order to find it from source to target
3. Bandwidth—Greatest speed at which the source may transmit data
Service condition in the cloud relies on the SLAs which represent a contract made between
the customer and the service provided as well as non-functional necessities of the service,
in particular, QoS. SLA considers its responsibility, service charge, and fine in case of
violations of the agreement.
1.4.8 Utility Computing
Utility computing disburses resources as a metered service when required. The aim is to
utilize services resourcefully and efficiently, which lessens related expenses as well.
Utility computing is the procedure of offering computing services via an on-demand,
pay-per-use invoicing system. It is a computing enterprise module where the supplier

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

possesses, works, and controls the computing resources and infrastructure, and is accessed
by subscribers as and when needed on a metered and leasing basis. Utility computing is one
among the most famous IT services’ modules, basically due to the economy and elasticity
offered by it. This module is based on the one used by traditional utilities such as gas,
electricity, and telephonic services. The customer has access to a

virtually infinite delivery of computing resolutions over the virtual private network or the
Internet that may be sourced; supply is managed by the service providers. Utility computing
may offer virtual software, virtual storage, virtual servers, and other IT resolutions. Managed
IT services, grid computing, and cloud computing are based on the idea of utility computing.
Like other kinds of on-demand computing, for example, grid computing, the utility module
looks to raise the effective use of resources or/and reduce related prices.
1.4.9 Web 2.0
Web 2.0 represents a change in technology in the world of the World Wide Web. It is
usually designed to increase data security and customization of application as per the
requirement with improved functionality.
Web-based service hosting, main social networking, sharing videos, etc., are important
provisions provided by Web 2.0. In Web 2.0, the world wide web (WWW) puts stress to
generate content by the user, and easy access and other operations on the content.
The important features of Web 2.0 are as follows:
1. Easy to access
2. User interaction and participation
3. Rich customization features
4. Easy communication through video chatting, instant messaging facilities, etc.
5. User-friendly writing tools and applications
6. Data management and analysis
7. Multimedia supporting tools
8. Web application and hosting
1.4.10 Parallel Computing
Parallel computing supports a type of computation which is helpful for carrying out
computation of a program simultaneously. It is based on the principle that a single large
problem is divided into small parts and parallelly runs different parts on different machines.
Distributed or grid computing is also a special type of parallel computing in which
computers are connected on a network. Geographically dispersed computer resources are
used for a common purpose. Different parts of the same problem run in parallel for faster
and easy processing. It is cost effective to run a program on a super computer. Grid
infrastructure supports different parts of the same problem to be run on multiple machines
at the same time. This is also helpful in removing complications related with many
instances of the same program sharing memory and space at the same time.
Parallel computing simultaneously uses various computing resources for solving a
computational problem:
1. Discrete parts of a broken problem can be solved in parallel
2. Further, every part is broken down into a series of instructions
3. Different processors are used to execute the instructions in parallel
4. Coordination method works behind parallel computing
Parallel computing supports applications that require processing of a large problem in a
sophisticated way. Some of the examples are:
• Big data problem
• Data mining

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

•Search engines
•Medical diagnosis
•Virtual reality
•Multimedia
1.5 BUSINESS AND INFORMATION TECHNOLOGY PERSPECTIVE
Cloud computing technology is valuable to both end users and developers. Cloud
computing offers the developer an augmented quantity of storage and added strength. It is
simple for them to operate the application. It is a creative method for accessing
information, and for processing and evaluating data. It unites resources and people from
any place. Users are no more constrained by physical restrictions.
Cloud computing proposes various advantages to the user. An individual using a web-based
application is not physically compelled to one PC, network, or location. Users can record and
applications can be accessed from anywhere, at any time.
Cloud service providers propose a number of advantages over and above those provided
by remote hosting:
1. Accessibility of data all over
2. Physical servers or virtual servers
3. Servers’ interaction within similar clouds
4. Allocation or imitation of resources at numerous physical regions
5. Strength offered by different cloud storage capacities
Other services provided by cloud computing are discussed in the following sections.
1.5.1 Electronic Faxing
Secure faxes are transmitted to specific telephone number and are directed to an e-mail
address as PDF attachments. Outgoing messages are transmitted through e-mail and
conveyed to fax machines all around the world.
1.5.2 Voice on Clouds
Cloud-founded Google Voice can deal with calls, in case the call is made by an user on a
published phone number. The call can be acknowledged from any telephone number
associated to Google voice.
1.5.3 Commerce on Clouds
Businesses can be tackled via clouds, for example, the sale and purchase of items. A few
books are accessible for sale as downloadable e-books on websites. The numerous sites
interrelate flawlessly. Online buying, screening of items, and entire transactions may be
handled effortlessly.
1.5.4 Distributed Hosting on Clouds
Godaddy.com is faultlessly hosted and provides services in this context. You might have
utilized Rack space, Amazon, and many other websites for availing services.
1.5.5 Accounting and Online Banking
The online banking system offers convenient banking, encompassing numerous
characteristics such as amount transfer and balance enquiry, among others. You might have
applied on CapitalOne bank instead of QuickBooks; or NetSuite Small Business or other
new excellent cloud-based alternatives. Consecutively, the web-based, bill-paying
application of banks is dealt by a different cloud-based dealer which interfaces with the
cloud-based Automated Clearing House (ACH) system for delivering and disbursing dues.
1.6 NEWS ON CLOUDS

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

Some of the news available on the cloud are as follows:


1. A mobile phone can be used to access services related to news.
2. Google Apps or Gmail is capable of seeking information via e-mail, rapidly from any
tool. We can talk and work with partners or consumers without any language barrier.
3. Distribution and editing of data with trouble-free collaboration using Google items
Docs and Sites. TripIt is a private travel that assists in arranging tours. Data is gathered
from consumers and colleagues by using Google types. There is joint work on a
general venture.
4. Through Force.com, you may construct a scalable business application on the cloud
platform. Both Google’s cloud and salesforce.com computing platforms are employed
to generate business and web applications.
5. Using online patterns for presentations, spreadsheets, and records
6. Functioning steady, safe, and quick Web apps
7. Easily and firmly distributing video in apps through Youtube for Google apps
1.7 BENEFITS OF CLOUD COMPUTING
Cloud computing technology offers various benefits to both cloud service consumers and cloud
service providers. The main advantage of cloud computing systems and technologies is
increased economical return due to reduced maintenance costs related to infrastructure and IT
software. Capital costs are costs associated with assets that need to be paid in advance to start the
business
cloud computing technol- ogy transforms IT infrastructure and software into utilities. Cloud
computing offers the following benefits:
Pay as per use On demand access to pay-as-you-go computing resources on a short-term
basis and ability to release these computing resources when they are no longer needed.
Reduced investment and proportional costs The product wholesaler purchases goods in
bulk at a low price. Public cloud providers base their business model on the mass acquisition
of IT resources that are then made available to cloud consumers via attractive prices. This
opens the door for organizations to gain access to powerful infrastructure without having
to purchase it themselves.
The investment in cloud-based IT resources is in the reduction or outright elimination
of up-front IT investments, namely hardware and software purchases, and ownership costs.
The cloud measures operational expenditures (directly related to business performance) to
replace anticipated capital expenditures. This is also referred to as proportional costs. The
same rationale applies to operating systems, middleware or platform software, and
application software.
Accessibility from anywhere Resources can be accessed from anywhere, irrespective of
location and device. This feature facilitates business continuity around the clock.
Increased scalability The business load can be handled with scalability of the respective
resources without much effort, time, and cost.
Increased availability and reliability Resources provided as services are available all
the time. Even if there is a failure in any of the components of a service, the provider
immediately identifies, isolates, and replaces the failed components without any
performance degradations.
Dynamic provisioning It is the perception of having unlimited computing resources that
are available on demand, thereby reducing the need to prepare for provisioning.

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

1.8 LIMITATIONS OF CLOUD COMPUTING


Cloud computing is broadly acknowledged as a revolutionary IT concept and along with
customized assistance may suit the requirements of varied consumers, scaling from
big ventures and small- beginners to end-users
Currently, companies mainly just contract applications which comprise less confidential
data. The ones which become ready to move to the cloud still insist on third-party risk
appraisal or enquire with cloud suppliers on the following:
1. By whom the applications and data will be accessed and how will that be scrutinized?
2. What security methods are used for storage and transmission of data?
3. How data and applications from diverse consumers are reserved separately?
4. Where will the data be stored in terms of geographical sites? Will the selection of the site
influence us?
5. Can these details and channels be specified in a service-level contract?
Each of these consumer worries are the chief obstacles to the implementation and
development of cloud computing. Some of the limitations of cloud computing are discussed
next.
1.8.1 Availability of Services
Consumer administration interfaces of public clouds are only possible through the Internet.
As services are a primary concern of consumers, they sometimes need to discard all the data
from the cloud environ- ment provided to them, while sometimes they may want to recover
all the data. There is an augmented risk of disaster in this when compared to conventional
services, as there are more ways to access the application or information over cloud
computing.
1.8.2 Data Lock-in
SaaS permits the services to be interoperable on every cloud. However, shifting of data and
applications from one platform to another is a challenge to the cloud provider for a big
organization handling high volumes of data. Google is the single cloud supplier to attain a
more typical environment and they also have a scheme, known as Data Liberation Front, to
support user shifting applications and data in and out of their platform.
1.8.3 Data Segregation
It is not simple to isolate cloud users from each other. A straight effect of the multitenant
control mode, where virtual machines of distinct consumers are co-located on a single
server or data on single hard disks, is the main concern related to privacy. This set of risks
comprises matters regarding the break- down of mechanisms to separate memory or storage
among distinct users.
Amazon EC2 service measured this as a real threat and rectified this attack by effectively
overcoming the following:
1. Finding out where a particular virtual machine command is positioned in the cloud
infrastructure
2. To determine whether two instances are resident in a similar physical machine
3. The secrecy of the data should be guaranteed, whether or not it is in transit. It should be
required to offer a closed box implementation environment where the secrecy and
reliability of the data must be confirmed by its possessor.
4. In a majority of circumstances, data should be encrypted at a certain time when it is
within the cloud. Several procedures are unfeasible to perform with encoded data, and

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

moreover performing computation with the encoded data must utilize more computing
resources.
5. The user encodes the data earlier to upload it to the cloud. When specific data is needed,
the token creator is used by the user to produce a token as well as decryption key. The
token is transmitted to the cloud, the chosen encoded file(s) are downloaded, and after
that these files are confirmed locally and decrypted using the key. Sharing is facilitated
by transmitting the decryption key and token to the other user with whom you wish to
cooperate.
1.8.4 Privilege Neglect
Companies sometimes take advantage of the liberty given to them. They disclose sensitive
data of their company to others for some benefits. The threat of a malicious insider with
access to confidential data is a concern for any outsourced computation model. Miscreants
might affect and harm the consumer’s fame and brand or openly harm the consumer.
Mistreatment of opportunity not only spoils brand name, but may also place protected data
in the hand of competitive attackers. It must be observed that similar kinds of attacks may
be taken out by in-house workers in a conventional infrastructure too.
1.8.5 Scaling Resources
A web application designer who hosts its service on a cloud can view how the reply time gradually
increases when usage of the application rises since the cloud does not scale up resources rapidly
enough. The capa- bility of scaling resources up and down to meet workload is one of the chief
benefits of cloud computing. Resource pooling through multitenancy is also an important element
that is managed by the cloud provider. Separate storage devices are provided to every client on
the cloud network, called a single tenant; and in a multi-tenant environment, a single storage
device is shared by more than one cloud user as shown in Fig. 1.8. In the figure, there are
two consumers 1 and 2, who are sharing a single shared storage for storing data, so there is
the risk of interchanging or

1.8.6 Data Location


The geographical site of the data also counts as a challenge. Being aware of the geographical
site of data is essential to protect it, since there could be significant differences amid rigid
strategies in various coun- tries. The route followed by the data is also important. It may be
difficult for an application operator to install applications at the smallest ‘distance’ from the
users.
At present, there are cloud suppliers who leave the alternative of the data center site
to the user. For example, Amazon proposes one site in Europe and two in other countries.
It is expected that other
suppliers will follow Amazon’s region option proposal as the site of data is a rising and
significant requirement of promising consumers.
1.8.6 Deletion of Data
Public cloud users might need their data to be removed, that is, totally erased from the cloud.
Sometimes, one company migrates its data to another cloud provider. In that case, they
want complete deletion of the data or complete migration of data; if this is not done, the
benefit of the data might be used by the malicious user later. Various security agencies have
been advised to use cipher text form of data for high security.

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

1.8.7 Recovery and Backup


For safety purpose, keeping the data of a consumer safe at different locations, for easy
recovery and backup, if there is any failure, is a big challenge. A proposal of data backup
must be proposed to cloud suppliers in of the event of a disaster. This can be achieved by the
replication of data diagonally on vari- ous sites and the proposal should be referred in the
service level contract.
1.8.8 Offline Clouds
For several users who require an application to be accessible the whole time through,
becoming entirely dependent on the Internet could prove to be highly risky or unfeasible.
This generates greater trouble in case the user is shuffling and there is a change in the
connection quality. Thus in several cases, trusting the Internet service supplier is not an
alternative. At present, a web browser is a widely used software application and all
applications can be easily accessed through the interactive web browser. Locally, it is not
necessary to maintain a hard disk with a strong processor because customized services are
available on the cloud.
Google launched Gears, a free-of-cost add-on for the browser, which allows data to be
saved locally in a complete searchable database while surfing the Internet. Gears resolved
the ‘offline problem’ permitting web applications to resume their working while offline and
subsequently coordinating when the link was accessible again. The latest edition of the
HTML protocol tackles the offline matters with a pair of constituents—database and
AppCache.
1. Canavas—Offers an influential and clear-cut meaning to depict arbitrary graphics on
a web page using Javascript
2. Video—Aims to assemble a simple video on a web page as it is to establish images
nowadays
3. Web workers—A novel method to take on gear jobs which should hold up the web
browser
1.8.9 Unpredictable Performance
The cloud-end consumer would not even know the number of physical machines on which their
application was functioning. The single source of information which the user has regarding
these servers is the hardware specification offered by the cloud supplier for every kind of
service. Further, these metrics do not have a similar significance in the cloud server as they had
in a conventional server, since in the cloud server, some users can share I/O resources and
compute on a specified case of a physical processor. A similar performance at similar
financial levels has been expected by the user, but this might not be simply accurate, since the
performance depends on several aspects and the end user has no control over many of them.
1.9 HOW TO DEVELOP CLOUD INFRASTRUCTURE
Infrastructure should meet the following vital features for assisting users to access data
proficiently and efficiently at any occasion
Accessibility It is the major responsibility of every central origin that data is accessible, on
order, to users.
Functioning Optimal service and functioning should be offered by the data center.
Supple High-priority business needs may be under the control of the prevailing
infrastructure, without any disruption of accessibility and with the least charge and least
variation.

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

Safety Data must be protected from illegal and malevolent users.


Manageability Corporations try to reduce IT expenses on the data center and increase the
consump- tion of prevailing resources.
In today’s competitive world, a corporation should be flexible and capable of reacting
quickly, and this should be achieved with the least investments in costs. Cloud computing
is a completely automatic request accomplishment procedure which is dedicated to
flexibility, quicker access, and cost savings.
For the development of cloud infrastructure, the following are needed:
1. Understanding the prevailing conventional data center
2. Computing resources that will be virtualized
3. Installing service administration devices
An infrastructure must accomplish the necessary uniqueness to support cloud services. It
may be assem- bled by using a shared group of computing resources such as network,
storage, and compute so as to accomplish cloud services. The infrastructure must be flexible
for meeting the numerous demands of its customers. It also permits them to provision
resources on order over a network. Cloud services facilitate optimization by managing and
scrutinizing resource usage and by preservation of energy.
Along with the virtualization feature in cloud computing, it is possible to offer flexible
physical infrastructure to cloud users. Largely, virtualizations offer us the ability to give
continuous services to consumers. Cloud infrastructure may be built in several stages:
1. The first starts with thoroughly recognizing the prevailing physical infrastructure with
its procedures and constituents.
2. The next step is to concentrate on accumulating the prevailing infrastructure resources
by using virtualization technologies. Therefore, the accessible resource allows
centralized administration of resources and permits quicker resource provisioning.
3. Then comes the step to install service administration devices, which allow
mechanization of procedures and administration to reduce human interference.
Service administration devices comprise purposeful services as well as those that
permit utilization-based metering so that customers have to pay for just what is utilized
by them. Through service administration, on-order provisioning of IT resources turns
out to be livelier and permits IT to be sent as a service.
Core Components of Traditional Data Centers
A conventional data center is the prevailing infrastructure which processes data using IT
resources. The core components of a traditional data center are as follows:
Application Program employed to carry out numerous computing functions. It may be an
operating system, DBMS, and many more.
DBMS It is an administration system which offers the ability to save or get data from
rationally pre- pared tables.
Compute Resources which work numerous applications using various elements
Storage This is used to save data for often use
Network It is the ability to communicate among systems. It assists us to share data and
resources. All the core elements of a traditional data center work together, to complete a
task.

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

1.10 VENDORS OF CLOUD COMPUTING


With the migration of various organizations to the cloud-based technology, there are many
vendors who have come into existence with incredible facilities, that not only easily offer
customization as per user requirements but also have distinct features. Some of them are
explained here:
1. Amazon Web Services—IaaS
The cloud computing corporation of Amazon.com—Amazon Web Service (AWS)—offers
Infrastructure as a Service (IaaS) on the cloud for associations needing computing storage,
power, and further services.
Elastic Compute Cloud Elastic Compute Cloud (EC2) is a web service which permits
resizable com- puting ability on the cloud. The consumers may generate virtual machines
(VMs), that is, server cases known as Amazon Machine Image (AMI), on which the
consumer may put in any software of his/her preference. A pay-by-the hour system is
followed.
Simple Storage Service (S3) S3 offers a web service interface which may be used to
regain and store an infinite quantity of data, from any place, at any time, via the Internet.
Amazon SimpleDB is integrated for providing AWS services such as Amazon S3 and
EC2, which provide the infrastructure for creating various web applications.
2. Google—SaaS, PaaS
Google App Engine is Google’s Platform as a Service (Paas) that provides hosting and
produces web applications on the Google Infrastructure. Presently, Java and Python are the
supported programming languages. Up to a specific level, the resource-used App Engine is
without any charge. Payment is charged for further bandwidth, CPU cycles, and storage
needed by the application. Software as a Service (SaaS) provides business agreements and
email. It is similar to conventional office suits, comprising Sites, Talk, Docs, Calendar, and
Gmail.
In fact, the Google cloud is something which will entirely alter how people access data
they look for. The Google Cloud is powered by thousands, possibly millions of unique
services and servers which accommodate a surprising quantity of information. These are
situated at various sites on the globe and maintain many clones of the information which
are available on the Internet. Relevant information of the users is replicated on various
servers.
Basically, Google Cloud is a ‘reference’ to the information which has been stored and
made clear by Google. Services of cloud computing may be used from any site to access
information which has been saved by Google. Services are provided by Search Docs,
Google Maps, etc.

3. Microsoft Azure Service Platform—PaaS


Azure Service Platform is the proposal of Microsoft PaaS, an operating system known as
Windows Azure, which performs as a runtime for the application and offers a set of services
such as SQL Services, Live Services, and NET Services.
Windows Azure is a Microsoft Cloud computing platform used to develop, launch, and
control applications via a universal network of Microsoft-controlled data centers. Windows
Azure permits applications to be developed using various distinct languages,
frameworks, or devices and makes it potential for designers to amalgamate communal

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

cloud applications within their accessible IT environment. Windows Azure offers both
IaaS and PaaS services and is categorized as the ‘public cloud’ in cloud computing policy of
Microsoft, with its SaaS offering, Microsoft Online Services.
The following new characteristics were released by Windows Azure:
• Websites permit designers to develop sites using PHP, Node.js, or
ASP.NET and may be installed using TFS, FTP, etc.
• Virtual machines permit designers to drift infrastructure and
applications without altering the existing code and may operate
both Linux virtual machines and the Windows Server.
• Cloud services is a platform of Microsoft as a Service environment
which is used to generate scalable services and applications.
Supports automated installations and multi-tier states.
• Data management, an SQL database once recognized as SQL
Azure Database, performs to gen- erate, scale, and expand
applications into the cloud by using Microsoft SQL Server
techniques. It amalgamates with System Center and Active
Directory.
• Media service is a PaaS-based service that may be used for content
security, encoding, analytics and/or streaming.
The Windows Azure platform, which became available in the market in 2010, offers an
API devel- oped on XML, REST, and HTTP, which facilitates a designer to interrelate
with the services offered by Windows Azure. Microsoft also offers a consumer-side
operated class library which summarizes and customizes interrelating services as per
user requirement. It also amalgamates with Eclipse, GIT, and Microsoft Visual Studio as
it may be used as the integrated development environment (IDE) to build and print Azure-
hosted applications.
4. Rackspace—Cloud Hosting
Rackspace is the service head in Cloud Computing and an initiator of OpenStack, an open
source cloud platform. The San Antonio-based vendor, which operates around more than
thousand enterprises, offers dedicated support to its consumers, athwart a variety of IT
services, comprising cloud computing and managed hosting. Their exclusive consumer
service policy has benefited them in getting the faith of their customers. Rackspace has been
identified by Bloomberg Business Week as a ‘Top Hundred Functioning Technology
Corporations’ and was highlighted in the list of Fortune. The corporation was also placed in
the Leaders for Cloud Infrastructure under Service and Web Hosting.
5. Salesforce.com—SaaS, PaaS
Salesforce is a supplier of SaaS-based goods, along with having a PaaS offering,
Force.com. It is a universal venture software corporation with headquarters in San
Francisco, United States, California. Salesforce is best identified for its consumer
relationship management (CRM). It was in graded position in Fortune’s 100 Best
Corporations.

1.11 ELASTIC COMPUTING


Elastic computing is offered by cloud computing where computing resources may be scaled
up and down by the cloud service supplier. Elastic computing is the capability of a cloud
service supplier to provision flexible computing strength when and where required. The
elasticity of such resources may be in terms of bandwidth, storage, processing power, etc.

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

Cloud computing pertains to provisioning on-demand computing


resources at the click of a mouse. The quantity of resources that may be sourced via cloud
computing integrates nearly all the aspects of computing from basic processing power to
enormous storage space.
On a small scale, it can be done manually but for huge deployments, there is automatic
scaling. For instance, a better supplier of online videos might set up a system so that the
number of web servers online are scaled all through peak performance hours.
In cloud computing, elasticity is described as the level to which a system is capable
of adapting to workload variation by offering and taking back resources the autonomic
way; at every point in time the accessible resources meet the present need. It is a vital
feature, which distinguishes it from earlier computing paradigms, like grid computing. This
dynamic difference, so as to meet an unreliable workload, is known as elastic computing.

1.12 SOCIAL NETWORKING


The Internet-based social media programs are used to build connections with family, friends,
classmates, clients, and customers. Social networking may be done for business purposes,

social purposes, or both. The programs show the connections among people and ease the

ability of new links. Examples of social networking include LinkedIn, Facebook, etc. A
social networking website is an online podium which permits customers to build a public

profile and interact with other users on the website. Generally, social networking websites
have a new record of people with whom they share a link and then permit the people in the
record to verify or reject the link. After the establishment, the new customers may explore
the networks of their links for making further links. Social networking sites have various
rules for setting links, but they frequently permit customers to examine the links of a
confirmed link and even advise further links on the basis of an established network of a
person. Some social networking websites like LinkedIn are used for creating professional
links, whereas sites such as Facebook are on both sides of the line (i.e., professional and
private). There are also networks that are created for a particular customer base, like
political or cultural groups within a specified region or even dealers in economic markets.

1.13 ENTERPRISE CLOUD COMPUTING


Enterprise cloud computing is the process of using cloud computing for saving cost and for
business innovation by getting extraordinary speed and agility, and improved collaboration
among customers and business partners. Enterprise cloud computing is important because:
1. Cost of accessing data can be reduced to a great extent by linking it directly with the
usage. Customers are charged on a pay-per-use basis.
2. Start-ups can test out new business ideas risk-free and at low cost, due to enormous
scalability. Since there is no upfront capital expense involved, in case a new project
takes off, it can be scaled up instantly, and vice versa.
3. Enterprise cloud computing allows a company to create a shared workspace in order to

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC


CLOUD COMPUTING UNIT.1

collaborate with its trading partners and work together as a ‘virtual enterprise network’.
In this way, they can share the information and communication resources, without
actually owning it all. This also helps in lowering costs.
As shown in Fig. 1.9, an enterprise with n numbers of hosts can connect through
cloud services and different types of services supported by cloud network such as database,
servers, and various applications.

Dr S V N SREENIVASU, PROFESSOR DEPT. OF CSE, NEC

You might also like