0% found this document useful (0 votes)
84 views

Ccs Module 123 Mu Cloud Computing Sem 7

Uploaded by

Testuser
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
84 views

Ccs Module 123 Mu Cloud Computing Sem 7

Uploaded by

Testuser
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 100
Introduction to Cloud Computing troduction to cloud computing, need for cloud computing and its components, cloud & other lar configurations, cloud types: NIST and Cloud Cube Model, characteristics of cloud 1g, deployment models, service models, advantages and disadvantages of Cloud ting. earning Topics : Study the recent trends in cloud computing architectures and related inologies, Introduction to Cloud Computing... Need for Cloud Computing. Components of Cloud Computing .. Cloud and Other Similar Configurations Characteristics of Cloud Computing... GQ. Explain the characteristics of cloud computing Cloud Types... UQ. Explain the NIST cloud model. 117 UQ. — Write a note on : Cloud Cube Model. UQ. Draw and explain NIST & Cube model of cloud computing. DUE... (Inteoelietion te (mu-seM 8-17) NIST Model Cloud Cubs Model Computing Deployment Models... 7 13 Cloud Cloud Computing Service Models «1... poring the Cloud Computing Staok... Define Cloud Computing as por NIST. Explain the oloud cornigativ ‘if a) Software as a Service (Saas). 1.8.2 Platformasa Service (PaaS) «... Infrastructure as a Service (laa). an 1.8.3 tiidh rth thcvallniaslgesciscailslaaail 4.9 Advantages of Cloud Computing... List and explain the advantages and disadvantagas of cloud computing. LIUGECE. 1.10 Disadvantages of Cloud Computing..... ua. J aia GQ. _ List the disadvantages of cloud COMPUTING, sss: ssser 4.11. Applications of Cloud Computing .... GQ. _ List the applications of cloud COMPULING. ..ssvssesecenseeeeen | 4.42 Self-Learning Topic : Study Recent Trends In Cloud Architectures and Related Technologies ... 1.13 Descriptive Questions... © Chapter Ends d computing refers to the distribution of computer services such as servers, age, databases, networking, software, analytics, intelligence, and other services fia the Internet, ° ations, configuring the network, configuring the firewall, and configuring data After we complete all of the setup, we are responsible for maintaining it g its full existence, ever, if}we chose Cloud Computing, a cloud vendor will be in charge of the Cloud Computing Fig. 1.1.1 : Diversity of Cloud Computing Tablets wurees that can be stored and retrieved in the cloud include browser-based ware applications (such as TikTok or Netflix), third-party data storage for photos other digital media (such as iCloud or Dropbox), and third-party servers used to upport the computing infrastructure of a business, research, or personal project. Yilabus w.e. academic year 22-23) (8-138) Tech-Neo Publications ‘use of cloud computing, companies and oo idespread Prior to the Wid rivand maintain the software and hardware tha ‘ysors had to purchase an‘ utilize. . esses and individuals now have access to a multitude of on-demang resources as internet-accessed services, thanks to the expanding avajjayy,, UN based apps, storage, services, and devices. 'Y of, + The transition from on-premise software and hardware to networked distributed resources eliminates the need for cloud customers to inyas 8 cash, or knowledge necessary to purchase and manage these computing & themselves. + This unparalleled availability of computing resources has spawned a of loud-based enterprises, altered IT procedures across industri, many routine computer-assisted behaviors. ™MOn 4, t they q + Busin dig NeW gen eS, and * Individuals may now collaborate with colleagues via video meeti, collaborative platforms, access on-demand entertainment 2 information, speak with household appliances, hail a cab aa . 2 with i , rent a vacation room in someone's home thanks to the cloud, Mbile de JH 1.2_ HISTORY OF CLOUD COMPUTING » and the possibility of a network of com and programs from anywhere in the w Tn the 1970s, IBM launch. 7 its System/370 a VM, an operating system that allowed admini z mainframe computers to run several vi ne machines (VMs),” on a single physical node, virtual systems, or “virtual Despite the fact that those res : ‘ources were shared, each VM ran uni i Systems or guest operating systems with their own RAM, CPU, and herd dines driver, and it was a major motivator for some of the most significant changes in > fo . 4 ation providers that had previously only provided single BS ‘ lata connections began. to offer virtualized private network connections, which provided the same service quali i s Sa ervice quality as dedicated services at a lower | Rather of constructing physical infrastructure to enable additional users to have their | own connections, telecommunications providers offered consumers shared access to " the same physical infrastructure. This modification enabled telecommunications Providers to transfer traffic as needed, resulting in improved network balance and “more control over bandwidth utilization, or Meanwhile, virtualization for PC-based systems was ramping up. As the Internet became more widely available, the natural next step was to bring virtualization online. Ifyou were looking to acquire servers 10 or 20 years ago, you'd know that the costs of physical hardware, while not as high as mainframes in the 1950s, were still rather high. As more individuals indicated a desire to be online, the expenses had to fall from "the stratosphere into reality. "One way this occurred was through virtualization. Using the same sorts of features "given by the VM OS in the 1950s, servers were virtualized into shared hosting environments, virtual private servers, and virtual dedicated servers. ‘Practice, how did this look? Assume your business requires 13 physical systems to websites and applications. With virtualization, you may divide those 15 J systems among two physical nodes. Obviously, this type of environment fafrastrocture expenses and reduces the quantity of physical hardware ait your company’s requirements. demic year 22-23) (M8-138) Tech-Neo Publications ization hard cost of server As th oe ers. Hoeven 3 ufficient to SUPPLY the nect il inst rent from the assumption thal es server aro ey the are Oe belief that “these servers are inexpensive, a them out Jt of this transformation, the most i ” As a resul combine them. “cloud computing” ‘emerged online. aia ware fell, more customers could they van into a different type ary resources. Afford ty of ing «& The Cloud is Born ; ‘would portray the full environment's resources as though « = Asystem 3 " 1 : fi 1 single physical node by ‘acing ted ening w bietret rm hepervsor across several physical nodes, re i i xd names like “utility ogy ‘be such environment, engineers use wi + ra aonpatng” ecnuse the total of the cloments appeared t be somite resources that could then be segmented as needed (like he companies did in the 1990s). oa + It was simple to add resources to the “cloud” in these cloud computing ¢ A add another server to the rack and configure it to become part ae ee Many ambitious firms opted to break apart the larger envi ees and hypervisors improved on reliably sharing and providing resources, . ey sought to make the benefits of the cloud available to consumers who did n abundance of physical servers to construct their own cloud en might purchase “cloud computing instances” (also juesting resources from a bigger pool of aches t vers were already online, “powering up” a new instance or # no time. ‘ 2 of the environment is significantly easier since there is less over e cloud computing environment when a new instance is ( use it is handled by the clouds software). puting, on the other hand, did not become a ord until the first decade of the twenty-first century. Cl Fo. Compute (BC2) and Simple Storage Service ($3 An od Platform in 2008, Ali ore ADT in 2010, Be eo eae Cloud in 20 during this decade, S Wes academic Year 22-23) (Mg-138) SS IMU-SEM 8, Services enableg . e IT infras a ent organizations : © cloud-based ependent resources, : _ developers and small developer teams tg and also rovided tools. for this time, cloud-basoa applicati “reate and deploy apps, aS) — which we'll go © ions, also known as Softw: i over in more detail in the Cloud Delivery Models wae © popular, ike on premise so} PCs, SaaS im, nand from a m ware, which use . TS must physically 4 — Proves application ayaa lity vais ly — and maintain on Lumber of devices, allowing users to access them on es and Dec ed applications, such ag Google's productivity apps (Gmail, = the eee (® eloud-based version af the : ©), ville a by the same companies that launched cloud infrastructure : others, 88 Adobe Creative Cloud, were launched as cloud-based based apps are now popular with enterprises "and their market share is likely to expand, ndividual users alike businesses have an advantage jor cloud providers and get ev about the cloud is that even when it comes to the cloud. They can work with ery service perk they need. But one of the great small and medium-sized operations can benefit mputing is so important because it offers flexibility, enance, easy access and a higher level of security. exibility : With cloud computing, managing resources is easier than ever. m ae for the resources you are using each month, and nothing more. Co rage and cloud VPS providers offer flexible packages, where you can easily ad decrease the amount of storage and bandwidth you are paying to use. Recovery : Recovering data from damaged physical servers and hard can be fairly problematic. If the physical device is badly damaged, recovery data recovery, little to no &! = Publications wef academic year 22-23) (M8-138) Tech-Neo eaves can result iN businogse re. hese uote backed up. With g i wt 8 oy sib loug ae wot nv data is stored on the clog «py cat aan, Bat nen orca wae ol i ‘ Z jesus 7° nol in oul le jf they have a problem with one we juny : “nl he P ven "ar data is safe as a copy ig” thejy , "vy . ei i ions, Your ‘ Pre ane prysieal cations y have the infrastructure resent stv, massive Soll vusinsses 7 backup systems. But with cloug a ‘oy pation Seat? me gervieo at an affordable price,“ SOmpys %t com ney can BEET ing a traditional server soty jntenance ‘ Ve ce of the entire system. Not only gy. "Panic, mois constantly need pemerig? they stop Workin ator, bot Fa mputing solution eliminates bee for any td be ont Ac i emuted by companies that use ql ea’ There is #0 O51 py the provider. That removes a massive headache 4 everything monthly expenditure is limited to what mt y documents, backend files, software, an (oy Basy Access: zee youd computing. Its effortless for em hy ite is much easier i: %, Ployees ty website is ile te entire eompany #8 connected through its cloug interta re es i roe «deve to acseas the network ang ed security protocols. ‘ - eased Security ; With cloud computing, everything you are - © es ison the coud. Even if laptop is lost or damaged, the company me is aossible through another device. And since alll your documents save oot cloud, there is no concern about losing important documents because they wey saved on a now lost or damaged laptop hard drive. Since information is 10 loge "contained on your physical hard drives or servers, it also becomes a lot harder to steal. With a comprehensive encryption and login security ayia data is much safer with cloud computing. % @) OF CLOUD COMPUTING hitecture is a combination of components required fora Ce) Cloud computing architecture consists of several ont tom, a backend platform or servers, a network or Inter Astivery service, Ge mPrises two com, of the cli Applications th, orm. Whil ib ponents, the front end, and the ye e ‘ eat part of a cloud computing system: ting st are required to access the Cloud OPO ag the back end refers to the cloud itself it OP geet serie for cloud computing services. It consists of virtual machines, , data storage, security mechanisms, otc. It is under the provider's control. .4.1 shows the architecture of cloud computing. ee: Giiont Infrastructure, Front End "These are the following components of cloud computing architecture : “(@ Client Infrastructure : Client Infrastructure is a Front end component. It provides GUI (Graphical User Interface) to interact with the cloud. (2) Application : The application may be any software or platform that a client wants to access. (8) Service : A Cloud Services manages that which type of service you access according to the client's requirement. Cloud computing offers three types of services namely, Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). () Runtime Cloud : Runtime Cloud provides the execution and runtime environment to the virtual machines. (6) Storage : Storage is one of the most important components of oud computing. It provides a huge amount of storage capacity in the cloud to store and manage data. Infrastructure : It provides services on the host Jevel, application level, and Tevel, Cloud infrastructure inelodes hardware and software components servers, storage, network devices, virtualization software, and other ‘resources that are needed to support the cloud computing model. vement : Management is used to manage components such as application, infrastructure, and other security issues in the uef academic year 22-23) (M8-138) a Tech-Neo Publications & Sovvices (MU-SEM 5) Cloud Computin (8) Security : implements a 8° infrastructure for the net : The Interne (9) Inter at interact and communica! jn Security is an i arity: mechanism ‘end-user 1.5 CLOUD AND ulti-tenant imy are several m t a ions with cl We compare these configurat ud Computing VS Traditional Com Cloud Computing “refers to delivery of different services ns data and programs through on different servers. Ti takes place on third-party servers that jis hosted by third-party hosting companies. It is ability to access data anywhere at any time by user. puilt backend component Of eloyg 1 for secure Cloud systems, mora Te outta filey” , 1. is the medi to with each other. OTHER SIMILAR plomentations that are similar to ely ‘oud computing in this section, puting um through which frontend ang leg “ % CONFIGURATIONS ud are. Tit refers to delivery of different local server. Services 9, Tt takes place on physical hard website servers. Grives ang User can access data onl ly on é which data is stored. system in Tt is more cost effective as compared to tradition computing as operation and maintenance of server is shared among several parties that in turn reduce cost of public services. It is less cost effective as compared to dou computing because one has to hy expensive equipment’s to operate and maintain server. It is more user-friendly as com ‘a pared to Eaties| computing because user can ve access to data anytime anywh using internet. 7~— Tis less user-friendly as compared to dol computing because data cannot be acces anywhere and if user has to access datait another system, then he need to save itit external storage medium. - Tt requires fast, reli I reliable and stable internet connection to access information anywhere at any time. It does not require any internet © to access data or information. cloud computing. (New Syllabus Wes academic Year 22-23) (Mg. -138) ting & Services (MU-SEM 8-IT) Cloud Computing provides scalability and elasticity e can increase or decrease storage ity, server resources, etc., according ess needs. service is served by provider's team. is offered ‘as an on-demand (SaaS) that can be accessed subscription service. every omputing vs Distributed Computing (Introduction to Cloud Conputieg) Tt does not provide any scalability and elasticity. Tt requires own team to mv Monitor systema that will need # Int of tame and efforts. Software is purchased individ Page co O46 ay aid user and rerprives tw be apd | periodically. Cloud Computing Distributed Computing Cloud computing is the provision of on-demand IT resources and services over the internet, including servers, storage, databases, networking, analytics, and software. is Distributed computing the process of solving @ prot numerous independent o7 that communicate with one another over a network. Cloud computing can be defined as a computing technique that allows users or customers to access hosted services via the internet. Distributed computing, to pat @ simply, is a method of con that enables multiple computers to communicate and cooperate to solve a single problem. It is divided into 4 categories, including Public, Private, Community, and Hybrid Clouds. Distributed Computing Systems, Distributed Information Systems, and Distributed Pervasive Systems are the three categories into which it is divided. Cloud computing has many advantages, including accessibility to the global market, economies of scale, cost-effectiveness, elasticity, and reliability. The advantages of distributed computing are numerous, including improved performance, flexibility, and dependability. Cloud computing makes the hardware, software, and ; networking resources available | computer, distributed computing over the internet. makes them possible more quickly. Because computational tasks take a long time to complete on a single wef academic year 22-23) (MB-138) ic} Tech-Neo Publications Providing on-demand com ins seryactrit computing. Distributing a single tas, number of computers with, 4° of quickly solving it by n coordination between taown as distributed compre Distributing a single task , ~ computers to advance = simultaneously, using procedure calls and remote jnvocation for distributed = 4) computations are some characteristics of distributed computing. ‘The possibility of node failure ang Drawbacks Less control, public clouds, Timitations, an are some computing. particularly with potential service ‘and cloud security ‘drawbacks of cloud communication issues brought og by a slow network are some drawbacks of distributed computing. | Computing Vs Grid Computing Cloud ‘Sr. 169] en Cloud Computing — Cloud Computing is based on the Client- Server Architecture. Grid Computing is based Distributed Computing Architecture. (2) It is a centralized management system. While Grid Computing is + decentralized management system. (3) Cloud Computing is flexible compared to Grid Computing. Grid Computing is less _flesbe compared to Cloud Computing. (4) | ‘The users pay for what they use (Pay-as- you-go Model) usage. (5) [Cloud Computing is more highly | Grid Computing is less scalable ti |__| scalable than Grid Computing. Cloud Computing. 6) a © a user ean acess Cloud Computing | The user ean access Grid om st Tala a protocols. with grid middleware. nae ae ave tee the resources are|In Grid Computing e Cloud service provider. feation § of thet organization is the owner (Ne ew Syllabus w.e academic year 22-23) (M8-138) ping & Serfices (MU-SEM 2-7) (Introduction to Cioud Computing)....Page no_(1-13) |JaaS, PaaS, and SeaS are the three | Distributed Computing, Distributed Cloud Computing Services. information, and distributed pervasive are the systems used in Grid Computing. While Cloud Computing is Service-| While Grid Computing is Application- Oriented Oriented Jn Cloud, Computing users do not have | In Grid Computing, the users do not to vet up anything have to set up anything. Cloud Computing involves dealing with | Grid Computing offers a shared pool of chronic issues with different amounts of | computing resources. computer resources. In Cloud Computing, more than one| Grid Computing is a group of computer works and coordinates with | interconnected networks and resources each other and resolves problems | which can process massive processing together. tasks. omputing Vs Fog Computing Vs Edge Computing Cloud Computing | Fog Computing | Edge Computing cy Highest Medium Lowest lity High, easy to scale Scalable within | Hard to scale network Far from the edge Network close to | At the edge the edge nalysis | Less time-sensitive data | Real-time, decides | Real-time, instant processing, permanent | to process locally or | decision making storage send to the cloud ting High Limited Limited perability | High High Low llabus w.e. academic year 22-23) (MB-138) Tech-Neo Publications sony of computor rosourens such 08 gto ~ Shou eomputine 5S the seatiiies and more to clionts through {h applications, etn gs croud Service Providers or CSP), service providers Users may now acces! co, rather any pla for the cl and enbance infrastructure of Cloud Computing : oud services you utilize, you may rq efficiency. The following are + expenses “characteristics (2) On-Demand Self'Sorvico —~ (8) Scalability and Rapid Hust (6) Measured and Reporting Seg (8) Automation pay oy (7) Security (9) Resiliency and Availability (10) Large Network Access (11) Work from Any Location (12) Multi-Tenancy (18) Flexibility (14) Service Excellence (15) Comfortable Payment Structure > (1) Resources Pooling One of the most important aspects of cloud computing is resource pool pooling means that a cloud service provider may share resources clients, providing them with a unique set of services based on their needs. * It is a multi-client technique that may be used for data storage, procs bandwidth provisioning. The administration method of real-time reso ree £ does not interfere with the client's experience. > @) On-Demand Self-Service aa md and necessary component of cloud computing. It allows ally check the server's availability, capabilities, and network stor. ‘This is co, 8 care feature of Cloud Computing, and a customer may als? | puting capabilities based on his demands, » @) Easy Maintenance , * Tis an essential co servers gain eo™PONeRE of cloud computing, It enables the cient to + capabilities, and network storage capacity on 2 con” at (NeW Syllabu SWeef academic year 22-23) (MB8-138) ability and Rapid Elasticity id scalability and Elasticity is a significant feature and benefit of cloud computing. cloud feature enables the cost-effective operation of workloads that demand a e number of servers but only for a short period of time, ny clients have similar workloads, which may be performed very cost-effectively to Cloud Computing's quick scalability, Economical is cloud feature aids enterprises in lowering their IT spend. The customer must pay administration for the space they have utilized in Cloud Computing. © are no hidden fees or additional charges to pay. The administration is cost- ive, and some space is frequently provided for free. Measured and Reporting Service rrting services are one of many cloud features that make it the greatest choice for asinesses, Measuring and reporting services benefit both cloud providers and their ers. t allows both the supplier and the customer to track and report on which services ere utilized and for what reason. This aids in billing monitoring and maintaining ptimal resource utilization. Security One of the finest aspects of cloud computing is data securi oud services make a duplicate of the data that is saved. If one server loses the data, the copied version from the other server is recovered, This capability is useful when several people are working on a single file in real time and he file becomes corrupted. ) Automation ity. To prevent data loss, tomation is a necessary feature of cloud computing, Automation in loud computing fers to the capacity of cloud computing to automatically deploy, configure, and anage a cloud service. B layman's words, it is the practice of maximizing technology while minimizing manual efforts. However, achieving automation in icult, necessitates the setup and deployment of virtual machines, nunts of storage. Following successful imy ngoing maintenance. the cloud environment is more servers, and massive plementation, these resources will require Syllabus w.e academic year 22-23) (MB-138) Tech-Neo Publications > (9) Resiliency and Availability ote ai "i In cloud computing, resiienc? refers any disruption loud is determined by how quickly its servers, datay The resilience of @ serie om ay 8 te rr da , ture restart network infrastructure 7" aud computing is ita availability, feature © Another oe esod remotely, there are no geographical services limitations to using (0)Large Network In cloud computing, terruption. measured by the speed with which its servers, ditabasoy, recover from any form of destruction or damag of cloud computing is ita availability, er critical aspect hical boundaries or limitations to accessing cloud resources service's capacity (0 awitly cloud resources. Access resilience refers to a servi co's ability to recover quic (11) Work from Any Location One of the most important aspects of cloud computing is remote working. | users to work remotely or from anywhere on the earth. } Mobile devices such as laptops and smartphones will be allowed to data. It also guarantees that every user has a rapid connection, Employees other area can communicate and do their duties. that wot remotely or reside in an > (12) Multi-Tenancy + Multi-tenaney is one of the finest aspects of cloud computing. A software d permits a single program instance to serve many user groups is kno tenancy. + Tt denotes that several cloud provider clients share the same compute separate and secure. > (3) Flexibility * As the competitio e in grow: willhave ta changeset frm i sae Tae Ga utilize com (New Sy bus wef academic year 22. (8-138) al 22-23) ) (Introduction to Cloud Computing)....Page no. (1-17) When users host their data on the cloud, they have more freedom. Scaling does not nood a server restart and may be performed at any time. Users can also choose from a number of payment options. This means that firms will not have to waste money on resources they don't require. 4) Hervice Excellence Cloud computing guarantees that consumers receive the best possible service. Bervive Level Agreements must provide benefits such as continuous availability and comprehensive resources, performance, and bandwidth. Any compromise in these ‘ices will result in client loss and a drop in popularity. }) Comfortable Payment Structure garment structure is crucial since it assists in cost-cutting. Cloud computing Ws fluctuate in prrice due to the extra capability. jwers find the payment option straightforward to use, and it helps them to save time uy 29 javed on the architecture, deployment types, usage and applications, the cloud ire is further classified into multiple types as follows : 7.1 NIST Model the National Institute of Standards and Technology (NIST) definition of cloud puting, “Cloud computing is a model for enabling ubiquitous, convenient, on- wand network access to a shared pool of configurable computing resources that can rapidly provisioned and released with minimal management effort or service jider interactive?” : Reference Model of cloud computing is depicted in Fig. 1.7.1 below. The NIST fnition liste five essential characteristics of cloud computing: on-demand self- fee, broad network access, resource pooling, rapid elasticity or expansion, and ured service. lists three “service models” (software, platform and infrastructure), and four Joyment, models” (private, community, public and hybrid) that together categorize to deliver cloud services. wes acadernic year 22-23) (MB-138) fech-Neo Publications Fig, 17.1 : NIST Cloud Reference Model acteristics demand self-service : consumers can unilaterally ilities as needed automatically without requiring bum ice provider. network access : Capabilities are available over the n ‘through standard mechanisms that promote use by heterogeneous platforms. (8) Resources pooling : The provider's computing resources are pooled ti consumers using a multi-tenant model, with different physical and dynamically assigned and reassigned according to consumer demand. @ Rapid elasticity : In response to demand, capabilities can be elas and released to scale rapidly outward and inward. (5) Measured service : Cloud by leveraging a metering ¢, ‘Appropriate to the type of sey systems automatically control and opti ‘apability (pay as per use) at some le vice, W722 Cloud Cube Model Cloud Cube Model, desi dloud network desi fone fred and developed by Jericho forum helps Perimetetized /Perne® © dimensional factor: Internal/Externsl, Pr {Pevimeterized, and Insourced/Outsourced. ; puting & Services (MU-SEM 8-17) (introduction to Cloud Computin go no. (1-19) Fig, 1.7.2 : Jericho Forum Cloud Cube Model ame Four-Dimensional, the working is also categorized into four parts viz : al Location of Data : The location of data may be internally or externally to ganization which ultimately defines the organization's boundary. nership : Ownership may be proprietary or open. It is a measure of not only mology ownership but also its interoperability, use of data, ease of data-transfer degree of vendor application lock-in. ity Range : It is peremeterised or de-peremeterised. It measures whether the ations are performed inside or outside the security boundary, firewall, ete. ng : It is In-soureing or out-sourcing; which defines whether the customer or ice provider provides the service. Cloud Computing Deployment Models ad technology offers several advantages to consumers; these advantages should be ed based on the demands of the users. cloud deployment model outlines the nature and purpose of the cloud and reflects pecific type of cloud environment based on ownership, size, and access. t businesses use cloud infrastructure to save capital investment and control ational costs. rate clouds (2) Public Cloud ommunity Cloud (4) Hybrid Cloud is w.ef academic year 22-23) (M8-138) al Tech-Neo Publications bya aii ; data is oe that have g x security. ar for ent your Jouds are let For cous oan cide. Pri itty n inside or se availability managemen! licensing . t model for all users, or | faa enterprises Cost . 2 " er. Pabig oa deployment Strategies are id, *2d ring demands, * Whe ateg Pptlar ary Mose data g ine app i izes for onlin izati all sizeg ‘ong. oTRAnizations of storage, ae PUBLIC CLOUD Fig. 1.7.5 : Public Cloud (8) Community Cloud This is a model that is shared by companies that belong to a certain community, such as banks, government organizations, or commercial firms. “Members of the community usually have similar concerns about privacy, performance, and security. This cloud computing deployment methodology is maintained and hosted internally or by a third-party provider. Fig. 1.7.6 : Community Cloud Hybrid Cloud ‘This approach combines the benefits of both private and public clouds, yet each may operate independently. Furthermore, as part of this cloud computing deployment paradigm, internal or external suppliers might contribute resources. * Scalability, flexibility, and security are all advantages of a hybrid cloud. * A wonderful illustration of this scenario would be a company that utilizes the private cloud to safeguard its data and the public cloud to engage with its clients. (New Syllabus w.e.f academic year 22-23) (M8-138) Tech-Neo Publications 177 Hybrid Cloud Fig private, and Hybrid ai Public Private 2p, [oarrstre_—_| Expensive Exper lot ———] Depends 08 the | Most Secure | Secure [eon cloud provider aa “Highly scalable Limited Highly [Seasblity the right an," a [ies Highest ae Mee ——T attenant, Shared | On-premise, | Biixea Seam esmie® | servers Private Servers oe Cloud Provider Organization | Organizatie Bamps ‘ws, GOP, Azure, | VMware, HE, | Rackapec, rs IBM, Oracle Dell, Openstack | Cisco, IBM L 3 1.7.4 Cloud Computing Service Models Cload resources are provided in a variety of different service delivery msl! , zr eastomers different levels of support and flexibility. (2) Software as a Service (Saas) * Ts Spshiliy provided to the consumer is to use the provider’ maning on a cloud infrastructure, = thong gt nS wa . "demic year 22.23) (8-138) (Re) ec ne — = & Services (MU-SEM, The applications aro accessible from various eliont de interface such as a Web browsor (o.g., ‘es through a thin client Web-based email), or a program interface. ¢ = The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating aystems, storage, or even individual application capabilities, with tho possible exception of Kmited user-specific application configuration settings, (®) Platform as a Service (Paas) * The capability provided to the consumer is to deploy onto the cloud infrastructure consumer created or -acquired applications ereated using programming languages and tools supported by the provider. + The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over ~ the deployed applications and possibly application hosting environment = configurations. (©) Infrastructure as a Service (Iaas) ‘The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications, + The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications; and possibly limited control of select networking components (eg., host, firewalls) (e.g., host, firewalls). EXPLORING THE CLOUD COMPUTING STACK * Cloud computing, often described as a stack, has a broad range of services built on top of one another under the name cloud. The accepted definition of cloud computing comes from the National Institute of Standards and Technology (NIST). * The NIST definition runs to several hundred words but begins as follows : “Cloud computing’ is-a model for enabling ubiquitous, convenient, on- demand network access to a shared pool of configurable computing resources (eg., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service Provider interaction”. bus w.e f academic year 22-23) (M8-138) i) Tech-Neo Publications a stack that is formed by jy, ti services Cloud Computing & a serib d_ computin, ery, loud camping eB oie built et clouds firming wet layers Bing ey cake. Tee vai seve ability of the stack will dotermn® oe ‘ oat 7 ‘The network Ain wae ‘i vailabibty- types of clow stack components a juiar with we pon inthe cloud world. ty, + Lets i Fig. 1g.iand Software asa Services GY o @ | | pattorm compute Services as a Services ‘seourty Infrastructure =) (ome | as a Services Fig. 18.17 + Cloud Computing Stack 1 soteware as a Service (5238) thet is made available as @ service through the Internet is known ta fee ‘ ted on-demand access to & SaaS app by a provider, cite, qchecription or pay peruse. ; ; ax be offered at no charge when there is an opportunity to generate rey qreans ether than the user, such as from advertisement. is now widely used in most organizations, so it's critical that tech aes wed asers oomprehend what itis and when it's appropriate. & Characteristics of S2aS teal fillowing are some salient features of SaaS : te commercial software over the web ) Access ( Centralized management of the software @ DeSvering software via a “one to many” model a: exempt from managing software updates and fixes [tech neo POM aS ‘Computing & Services (MU-SEM 8-17) Introduction to Oloud Computing)... When to use SaaS Particularly SaaS and js P hat mk ts — computing aro expanding technology delivery techniques, - ona e cloud must decide which applications to convert to Basti, tions that are i a excellent candidates for an initial transition to Basi include the @ Suell is - so of a standard offoring whore the solution is bavically uaa ren ea Beeausé this core tochnology is necensary for conducting musiness but doesn't provide a competitive advantage, rivals frequently utilize: the ‘same email program, Apnletons like email newsletter campaign software are examples of shove where there is a lot of interaction between the company and the outside world. applications that require a lot of connectivity to the web or mobile devices, euch mobile sales management software program for team collaboration on a particular project. () Software whose demand rapidly increases after a month, such tax or billing software. The first SaaS product made available to the commercial community was the Salesforce Customer Relationship Management (CRM) platform. CRM, one of the firet players, continues to be the most well-liked SaaS app category, although email, financial management, customer service, and cost management have also grown in popularity. Reasons not to use SaaS SaaS is a useful tool, but there are times when it's not the greatest method for ‘ing software. following are some situations in which SaaS might not be suitable : ‘Applications that require quick real-time data processing ‘Applications that are prohibited from hosting data externally by law or otber regulations. 1.8.2 Platform as a Service (PaaS) latform as a service (PaaS) brings the benefits to the software development world that SaaS brought for applications. PaaS is defined as a computing platform that enables the quick and easy creation of ‘eb applications without the necessity of buying and maintaining the software and tructure underneath it. ‘academic year 22-23) (M8-138) fal Tech-Neo Publications ese £ the exception tha; to S205, “it Seals jelvered over the web rau a nS Cloud Computing & Services © PaaS is comparable development of software © delivered over the web. s © Characteristics of PaaS us a8 PaaS traits: v ‘The following are sme fundamental i eth + All the different services required oe dao © ADP dey, Juding those 1 ‘jevelop, test, deploy, host, ang oo ¢ environment. sare "4 ~ provided, ind same integrated d Tools for building web test, and deploy various phe same developme! evelopment - user interfaces (UIs) that jos. it may be bb unt app by numerous ifs Ma, , + The use of t architecture. «Software that bas been deployed has built-in scalability, inclyg; failover. ing Ioag + Using shared standards, integration with databases and web se, ee « Support for cooperation among development teams, Pro TVices, . communication features are sometimes included in PaaS sy; She manag Ms to help tee 4 teams collaborate. subscriptions and billing. ‘Tools for managing Infrastructure as a service (IaaS) and platform as a service (P, many aspects, but JaaS differs from PaaS in that it aia Value-addeg 2 such as © A collaborative software development envi vironm : management independent of the app's data ome ‘at Briortices ya Heroku® makes use of the Ruby on Rails® programming | OF instance, the p A om ; 0° A pete that enables the development of apps using cent, sind ia fore pei used to construct appe usin te tae est demonstrated by Salesfore sing this kind e.com's Force.com P; othe -com PaaS, whic whieh ema apps that integrate with the Salesforce.com CRM. 5 When to use PaaS When several dev elopers are i 7 stakeholders must i involved in a develo} 4 ist “ pment proj interact with the development praca canis sol fal for a is extremely he people who already have a data source and wasl!t# Pao is incredibly help it to build applications When develo ’ pers want ea t to automate testing and deployment services, PatS ## W Syllabus wef 12. academic year 22. -23) (M8-138) cy i Tech-Neo Pubial? id a 1-27) Cloud Computing & Services (MU-SEM 8-IT) __(Introductlon to Cloud Computing)....Pago n. Because PaaS makes the challenges associated with rapid software development and iteration easier, agile software development is growing in popularity. & When Not to use PaaS + PaaS is very alluring because of its value-creating capabilities, which include the ability to automate operations, use preset components and building blocks, and deploy automatically to production. PaaS, however, might not be the best option in the following circumstances : (2) When it comes to hosting, the app must be extremely portable. (2) The development process would be impacted by proprietary languages or methods. = (3) A proprietary language would make it difficult to switch providers afterwards. (4) Customizing the underlying hardware and software is necessary for optimal application performance, ‘ + Faster app development is possible with a PaaS development environment. In some cases, the cost of developing the software would have been too high without PaaS. ‘% 1.8.3 Infrastructure as a Service (IaaS) * Servers, storage, networks, and operating systems are all provided via infrastructure as a service (laa), which is an on-demand service. Clients purchase those resources as a fully outsourced on-demand service rather than buying servers, software, data center space, or networking hardware, TaaS is available as either public, private, or a hybrid of the two infrastructure types. Public cloud is an infrastructure made up of shared resources that is set up over the Internet on a self-service basis. A private. network-based architecture called a “private cloud” imitates some cloud computing features including virtualization. A hybrid cloud is offered by some hosting companies. Traditional dedicated hosting is combined with public, private, or both types of cloud networks in this cloud. © Characteristics of IaaS JaaS has the following primary characteristics : (1) Resources distributed as a service lows for dynamic scaling as a variable cost, utility pricing model lows for multiple users on a single piece of hardware Fe} Tech-Neo Publications labus w.e.f academic year 22-23) (M8-138) (MU-SEM 8-IT) (Introduction to Cloug Lo, cloud Computing & Services 0 use IaaS following situations are particularly suitable for cloyg ;, = mel ignificant spikes and trou, ty, (1) Any time there are significant sp: hs of deman, re a rg izations without the capital to invest j ; (2) For new organizations ‘ ; . in harg ig (3) When the organization is growing rapidly, ang...) “ay 3) 6a when t . lt problematic. aa z (4) When there is pressure on the organization to limit capita, i diture. it, to operating expen | - ¥ “ee iness, trial, or temporary infrast, (5) For a specific line of busin Phe 1 when not to use 1aaS tages when scalability and quick prop; though IaaS has advant ges when scala : os the oiiehe isa situation in which its limitations might be Problems ig t Regulatory compliance makes the offshoring or outsourcing ot : i at processing difficult. DW 1.9 ADVANTAGES OF CLOUD COMPUTING ere are some of the advantages of cloud computing : (1) Cost: It lowers the enormous capital expenditures of purchasing pear ay id Sahay lity : Resources may be accessible in minutes, Usually wit (8) Scalability : We ean raise or reduce the number of resources reoure ia company needs, () Productivity : We put in less operational work when we use cloud computing Te 4s no need for patching, and there is no need to maintain hardware and sotvan 4 result, the IT team may be more productive and focused on meeting buss objectives, () Reliability : Data beckup and recovery are less expensive and faster fr ane continuity, (©) Security : Many cloud companies provide a comprehensive set of rules, techutlé# and controls that improv data security, Wew New Sylabus wef academic Year 22-23) (Ivg.13a) [el rech-neo rubio®* (7) Maintain compliance : Understanding and ensuring compliance with data regulations can be difficult and time-consuming. Companies may be safe in their compliance and save valuable time by utilizing a cloud storage service provider that works in accordance with latest standards. (8) Avoids unforeseen downtime : Outages in data centers may cost businesses a lot of money. A corporation might lose $5,600 for every minute of unexpected downtime That implies that an hour of unexpected downtime may cost a business $300,000, not to mention the impact on consumers and the company's reputation. 4 ci }0_ DISADVANTAGES OF CLOUD COMPUTING ‘Here are few of the disadvantages of cloud computing @) Control is limited : Because cloud infrastructure is held by service providers, businesses must determine how much control they want over their service. Typically, the provider does not own or manage the data or applications, but the infrastructure is owned and controlled by the provider. Lock-in of vendors : Another downside of cloud computing is the likelihood of issues when switching providers with different platforms. Data may be susceptible during a vendor migration, thus a competent service provider must be able to move data in a safe and secure manner. Backup and restoration times are slow : Backups and restorations may take longer in the cloud than on-premises servers. Dependency on the internet : The fact that cloud computing is entirely reliant on the internet is both a benefit and a problem. Nothing on the cloud can be accessed if the internet is unavailable. However, because most organizations rely on the internet for the majority of their operations and tools, cloud computing is no different than the existing online platforms that they employ. Use of the internet : Another internet element influencing cloud computing is the fact that massive cloud backups might slow down internet speed. This implies that massive backups may have an impact on internet performance during working hours. ‘This is especially true for small enterprises that may not have access to high-speed internet. A reputable service provider can offer remedies to this issue. yllabus w.e.f academic year 22-23) (M8-138) jech-Neo Publications Sen = = ju Compal = iONS OF CLOUD COMPUTING PPL ae I the application areas Felony a @) Backup; tin ind Ry Testing ang » "y™ t some ction discusses about Data Storage Gy Online Data So" (3) Big Dota Analy (5) Antivirus Programs (7) Cloud Computing 6) E-commeres amg : PPlicag: Education 2 eign ine Data Storage > (1) Online Dat Cloud computing provides for the storage and access of data wha + Clow 1 ‘adi, and videos in the cloud. be -— day and age of big data, storing massive amounts of Pn ; + In this day ¢ amounts of space and rising expenses, tet necessitates increasing : g i This is where coud storage comes in, where businesses may stor, oi from multiple devices. i ‘The given interface is simple to use, convenient, and has the siradgg speed, scalability, and integrated security. 7 (2) Backup and Recovery * Cloud service providers provide secure storage and backup for data ang Tesoure the coud, ‘ * Data backup is a complex challenge in a typical corn frequently irreversibly lost in the event of a disaster. * However, with cloud computing, the event of a disaster, > (3) Big Data Analysis puting system, and dete data may be easily restored with minimal damp: One of the most important a; licatic ' icati ing is its i "I seal data processing, plications of cloud computing is its involvement ino The unusual i i mange be Volume of big data makes it impossible to store using typicel# equine ignite ra Businesses may now store and analyze massive ¥ 4) Testing gn S*** Bsights because tothe clouds limitless storage ope" “ng and Development loud comp Nuting ing oF de APPS off eo) evelopment “the most convenient method for product tilt NeW Sy Met academic yeas Nee SHisbus ee He vear > as of eloug ‘ “ 0 @) Backs " 7 storage P ang w one Bt Si A Testing any Reearare (3) Big Data Analy 6) (5) Antivirus Programs (7) Cloud Computing in B ‘Vel E-commerce Appi iducation Nation > (1) Online Data Storage 4d computing provides for the storage and access of data Cloud com} loud. Such . ideos in the cloud. io, and videos int ; 7 audio, day and age of big data, storing massive amounts of corporg iy, e In a increasing amounts of space and rising expenses, te tan, neces P g «This is where cloud storage comes 1, where businesses may store a from multiple devices wang The given interface is simple to use, convenient, and has the avant ity, 6 speed, scalability, and integrated security, * ay (2) Backup and Recovery + Cloud service providers provide secure storage and backup for data ee the cloud, : Data backup is a complex challenge in a typical frequently irreversibly lost in the event of a disaster, However, with cloud computing, the event ofa disaster, » (3) Big Data Analysis One of i icati ofthe most important applications of cloud Computing is its involvement in up Seale data Processing, Computing system, and day; data may be easily restored with minimal damage The una ienaganent cee lime of big date makes it impossible to store using typical A ‘lutions, Businesses May now store and analyze massive da! i cause to the cloud's limitless storage cap? Computiy ing # elopmen,, © “PPS OM the most i oduct tests _ Convenient method for Pp the application areas of coy om, ea (2) Backup ang Tatty be (4) Testing and Daya % (6) E-commerce Apmi i ‘ ating (5) Antivi id Computing, rage > (1) Online Date Sto ides for the storage and access of data such ae fy ting prov fila, + Cloud oi nthe cll ; . ; My, audio, am cage big data, storing imiaskive amounts of Corporate dat « Inthis day nee ng amounts of space and rising expenses, eg tates in : . ne sdoud storage comes in, where businesses may store ang 4 This is where cou ' fo ie dv convenient, and has the ad ven interface is simple to wee, advantages el sas ated security. 7 speed, senlbility, and integr (@) Backup and Recovery Clad ese providers provide seeure storage and backup for data and res, the cloud. + Data backup is a complex challenge in a typical computing system, and deta frequently irreversibly lost in the event of a disaster. + However, wth cloud computing, data may be easily restored with minimal damp’: the event ofa disaster, > (3) Big Data Analysis * Greet the mos important applications of cloud computing is its involvement inp Scale data processing, The usually huge volume of big anagem nt solutions, Busin ir » Busines: Acquire significant by i data makes it impossible to store using typi es may now store and analyze massive de! ess insights beeause to the cloud’s limitless storage co" ‘velopment Cloud com uting ay gil “eremen, TF OMe the most convenient method for product test MSs elgg | loud _ (2) Backup a Comp, ams ‘Antivirus Prog ing ata Storage a a the storage and access of data Such ag in the cloud. , les, my 2 toring massive amounts of sy and age of BE data, si - corpo, essit torage comes in, where businesses may store ang a mig nec his is where cloud st from multiple devices. ce is simple to use, d integrated security. The given interfac convenient, and has the advanta, speed, scalability, 2 (2) Backup and Recovery srvice providers provide secure storage and backup for data and Tesoune 8 oti Cloud set the cloud. + Data backup is a complex challenge in a typical computing system, and day frequently irreversibly lost in the event of a disaster. 4 However, with cloud computing, data may be easily restored with minimal damagi: the event of a disaster. > (8) Big Data Analysis + 0 icati ne of the most important applications of cloud computing is its involvement in ug seale data processing, The um 4: cng volume ofbig data makes it impossible to store using typical dtd acquire significant hen Businesses may now store and analyze massive dsl? > 4) Testin siness insights because to the cloud's limitless storage cm" and Development Cloud compu ting apps of ing development, ffer the most convenient method for product testing id Come Computing & Services (MU-SEM B-IT) __(Introduction to Cloud Computi =M8-IT)_ ° mputing In traditional ay » Cloud Computing) :..Page no. (1-31) pproaches, such an envi L es cinstallnty , environment would be time- lation of IT resources and infrastructare, and labor intensive, exwiyieue * sive, Businesses, on the oth s er hand, b from i which they may utilize for eat eal fs oe and adaptable cloud services, BP Antivirus Progr , testing, and deployment. | Cloud Computing bri i : re cee brings cloud antiviral software, which is kept on the cloud and a fixes viruses and malware in an organization's system. yeviously, enterprises had to't 7 ; eS had to install antivirus software on their systems to detect (6) E-commerce Application Cloud-based ecommerce softwai ; re allows usel i r i Bncopng eproruiion users and e-businesses to respond swiftly to It provides a fresh strategy for corporate executives to get things done in the shortest amount of time. They employ cloud environments to manage customer data, product data, and other operational systems. > (7) Cloud Computing in Education E-learning, online distance learning programs, and student information portals are some of the major advances brought about by cloud ‘computing applications in the education sector. '¢ Students, teachers, and access data and inform: and researchers can connect to the cloud of their establishment ation in this new learning environment, which provides an appealing atmosphere for learning, teaching, and experimenting. SELF-LEARNING TOPIG: STUDY RECENT TRENDS IN cLouD ARCHITECTURES AND RELATED TECHNOLOGIES tion of cloud computing has ‘ch trends, including artificial intelligence (aD, and hybrid working. to see it becoming an enabler of even ted reality (VR/AR), the metaverse, ed to invest in buying and ese intensive computing ce," running AZ “The ongoing mass ado) been a key driver of many of the most transformative te the internet of things (IoT), and remote Going forward, we can expect including virtual and augmen! even quantum computing. “Cloud computing makes this possible by removing the ne « the expensive infrastructure required for these pplications. Instead, cloud service providers make it available "as-a-serv n their own servers and data centers. more technologies, cloud gaming, and el Tech-Neo Publications llabus wef academic year 22-23) (M8-138) jatlon to Cloud G noutt Cloud Computing & Servicas (MU-SEM 8.11) aie wvold the Lily of yj Ray g aon " , , + ealso means compan ean A it tke avant of ta ONG highly specialised worklore ’ / ° rah technologies. alee continuing to levernms cloud go, eu My \ . W : comp vow as woll R8 AEiVO offig We can expect to see ¢ a nologies 4 hemactie clonciog , ty ts access now and innovative (2 gown of so he trends yay tye pre's 8 NAt og, iy operations and processes hay , most impact, d security and resilience mt jo (1) Increased investment In cl yud panies and js hugo opportunities, efficiencios ty 3 an organizations to a new ra cn et MBE Of gy, Ne o Migrating to the clo but also exposes cO™ . threats, the growing pile of legislation around how busings, +9 Ontop tty a Means that the risk of fines or (even worse) ima i, 30 ; nat apending on ever secunity and building resins aging 3 . sree impact of « pandemic on global business yi ~. Cloud Computing & Services (MU-SEM 8.1T) No. Cloud Computing Cloud computing requires dedicated hardware, a In virtualization. singie dedicated hardware can do a great job in it. Cloud computing provides unlimited storage space. Storage space depends on physical server capacity in virtualization. 10. Cloud computing is of two types = Public doud and Private cloud. ‘Virtualization is of twa types: Baxtbraxe virtualization and Application virtualization. 11. In Cloud Computing, Configuration i image based. oo“ In Virtualization, Configuration is template based. 12. In cloud computing, we utilize the entire server capacity and the entire servers are consolidated. In Virtualization, the entire servers == on-demand. 13. In cloud computing, the pricing pay as you go model, and consumption is the metric on which billing is done. In Virtualization, the pricing i= weailr dependent on infrastrucmure casts. 14. Easy to integrate with existing solutions, many providers support integrations and APIs. May require a data integration solution to prevent data silos. Easily integrate with public and 2 clouds, oT devices, and darabases. integrating with legacy equipmenn. integration software ta unify dam needed 15. Cloud computing deliver variable resources to groups of users for a variety of purposes Virtualization deliver packaged resources to specific users for 2 speeidic purpose EE Dy 2.3 TYPES OF VIRTUALIZATIONS ~ > (1) Hardware Virtualization omputing resources from the software 6 1UQ. Write short note u ees In this section, we w' (Q) Hardware Virtualization (3) Operating System Virtualization (8) Storage Virtualization (2) @ (6) It is the abstraction of ¢ resources. discuss about different types of virtuslizations. Software Virtualization Server Virtualization Network virtualization that uses cluud fel_ Merve n ‘ \ rhe hypervisor Mang, M vigor: The coe host os, thy mh Tt involves the vers os | hardware, component ale eet thet ated as actu ‘int fi a ete este ware virtualizat; That so or sn & i Virtual Machin hy ete tee part Mt iy e abs met par < aie Ml je yoed when VMM o virtyqy ee, "y ing ** sation is US hardware system, MN, - eatin on the in My, i jnst@l ris to process monitoring, emery \ 80 iret in yer ihe y ta jfferent operating » ons ie done, different operating eystg,., \ CAH by ‘ is conti alization © i i ‘ 18 alyy ay done for server platforms, inds: jon is of three kin ; ion se ve, the hardware architecture ig beige 't eed any modification to run any epalcn a 0 i 2 ware seis : Here, the virtual machine silat Gi) Emulation Lm Furthermore, the guest OS doesn't require on m ssi +r the harware snot silage " iiyPara-Vistualization * < al runs its isolated system. 3 lization >@) St een is a technique that allows one computer evi ¢ ee one virtual system, atk f ‘The primary function of software virtualization is to develop Virtual Softwar, make the work easier. It's capable of abstracting software installations, Software virtualization will more than one Operating Software virtualizati virtualize Ow rrualizati. @ Full Guest 50 Server ty Woy the software installation Procedure and building, I build a virtual enviro System, on is of three kinds : 4) Og Virtualization +In OS WANE to work individually to Parcult Operatin ment and allows the usr Virtualization, more than the Operating complete the task without affecting others © M can perf Perform its Specified "Sf wy adore 1912223) (a.13 (Virtualization) (ii) Application Vi irtuali i Spallation mee : Application Virtualization is the second Fentral server. It hepe to a a a remotely across thelr applications op the (rua) eawhrontient. wultiple applications at the same time hy building (iii) Service Virtualizati wation i Betvios Vieiball Pshaviors of com ee Virtualization is a technique to simulate the Foplications, in the form of combination component-based > (3) Operating System Virtualization + The OS virtualizati lization allows you to virtualize physical servers on the operating » (4) Server Virtualization system (kernel) layer. The OS virtualization 1 isolati isin layer ensures isolation and security of resoure ‘The virtualization layer makes each container appear as a standalone server, "Finally, the container itself houses its own applications and workload. Os ‘virtualization is streamlined for the best performance, management, and efficiency. , 8 virtualization is of two types: (i) Linux Operating System Virtualization widely used in virtualizing Linux Systems. If other software with the help of Virtualization, the VMware Software at the beginning. : Windows Operating System (ii) Windows Operating System Virtualization : Virtualization is also the same as Linux Operating System Virtualization. And if the user wishes to install any software, they must install the VMware Software first. es between : VMware Workstation software is ‘the users want to install any of the then the user will require to install ize the server that we use, that is we ) in a single physical server. pe of virtualization, we aim 10 virtuali 4 among all the virtual iple V's (virtual machines) Hore the resource form this physical server will be share vrroes which are being shared majorly are servers that are being used. Some of the reso r CPU, Storage, ROM, ‘and RAM, ete. and we will be sharing them on the hypervisor (@ layer of software between the base hardware and the virtual machines). ‘These virtual machines 7° jsolated and independent of each other, completely eapable of running the different OS in different machines. / ‘Some of the competitive vendors that are available in the market who do pe virtualization are vSphere (VMware), Xenserver (Citrix) and ‘Hyper-V (Microso! ), ete. In this ty) will be running multi and they are ce Tech-Neo Publications =f academic yea 22-23) (M8-138) «pools the storage that j cloud compu ines/po? is atio™ abi viru von ¥ 4) storage con AE TE ig done by leverag; storage vit tual as ‘ we i tem/environment, + Stora i i ays dovicos am of the " oar monitors the various y, tion se i ‘ly Tdentifica mm to stanly them and Sends ; TR aUe4 tained in avituay The ail ed satan lps te administra, i ie ig iralan effective and efficiene site oO a backup al ation parative” rorage virtual = tt ization virtuali if specilic purpose zion ised 2 peeiie Purpose ang oi, sue Nas) S300 od, , wade storage (N sstuslization in Cloud Computing Utilizes oe File-based ane a system protocols and with ity . ep ar block or net help of ; ey mal network attached storage array, it bet ina no! dependency i se don between the data being accessed and the location ‘This is ory a a. provides a benefit of better handling file Dieration ig oe, q which improves the performance. Many, ods to imple™ je-based S ‘{h) Block-based Virtual Storage * The Blok based virtual storage is more widely used than the vittog system as the virtual storage system is Sometimes useq fora SPecific py s ‘The block-based virtual storage system uses logical Storage Such as g. partition from the physical memory in a storage device, It also abstracts the logical storage such as a hy ard disk rive or ANY sols i flare t r | ‘till pe : 0 decouple the y = tionality of, irtual network, Mee Sidisyer Ne academe 282223) tn ase Will be Us} fom the network form the bas Cloud Computing & Services (MU-SEM 8-IT) (Virtualization)....Page no, (2-9) After we have started using this network virtualization then we will be using the physical network for the sole purpose to forward the packets and we will be doing the management work using the software, We Uasically collect the entire network and with the help of the routing table we will manage it in real-time and they are also independent of each other. One example of network virtualization is VPN ie., virtual private network. With the help of this anybody can create a network for them virtually on the internet, Ifwe mrs providing network virtualization (NV) to one system, we will call it internal NV and if we are combining them in a virtual network, we call it as external NV. Do 2.4 PROS AND CONS OF VIRTUALIZATION _ > (New Syllabus w.ef academic year 22-23) (M8-138) (D) Uses Hardware Efficiently (2) Available at all Times (3) Recovery is Easy (4) Quick and Easy Setup (5) Cloud Migration is Easier (1) Uses Hardware Efficiently ‘The majority of businesses invest a substantial amount of money in setting up their systems and servers, but only utilize a small portion of that investment successfully. If they choose virtualization, however, they can build multiple instances on the same hardware and maximize its value, This allows them to save money on hardware expenditures and achieve a high degree of efficiency. (2) Available at all Times One of the best things about virtualization is that it has advanced features that make virtual instances always available ‘The best thing about this is that the virtual instance can be moved from one server location to another. It can be done without having to stop the processes that are already running and start them up again. It also makes sure that you don't lose any of your data while moving. So, even if there are unplanned downtimes, your instance will always be online and running. Because of this, virtualization service providers today offer 99.999 percent uptime for the same reason. Tech-Neo Publications usin aD, Cloud Computing & § 4, duplication, ba and jo near rey tre, time gg oY y point in time, WM > (a) Recovery I - or vid © With virtual inst that PY easier, With new tool ss " a osu al any . mirroring, one can be are of " wn ik at, - "s «Incase of downtime oF & au? earn with il ws mirrored en another ¥ tue! ‘iy a all times. Organizations can fixe 7 © This ensures busines® continu! i . ; ' efficiency with this. “ sical 0" ; pysical (00 its + Sotting uP Ss lee ich can take hours. wh are correct, you must then ingt, i} yj takes additional time, All the tag processing, Wait for the prodyatt™™ Yoy SES to hg gt 6 ensuring that all connections, ing aystem and sonwarey which ¢ istallation requires days or even weeks of wat full procedure of 1! conan have a productive setup up and runnj ; can maning within Tiny Sy swith virtualization, yOu 5) Cloud Migration is Easier % Pateny organizations are using old school methodologies even today, doing so because they had made & substantial investment back in hy 7 their [T systems were always up and running, day . With the curent digital transformation wave, organizations are lool; the cloud for various advantages. an + The challenge here is the migration of such a large amount rad ie ailable premise. Virtualization would have made the task much easie: b data would already be available on a server. Hens ii i i ice, migrati: would be easier. io ease mst « Il of it to thea = cons The following are the disadvantages of virtualization : (1) High Initial Investment 7 Quick Scalability is Problem ‘5) Unintended Server Sprawl (2) Data can be at Risk (4) Performance Witnesses a Dip PD Ginn, (D) High Initial Investment As helpful virtuatioat ne ofthe may , it does hay, e ° Some flaws, and the high initial invest™™” Cloud Computing & Services (MU-SEM 8-IT) a > (Virtualization)....Page na. (2-77) Virtualization indeed helps the business reduce operational costs. But the imal setup cost of servers and storage is higher than a regular setup. Hence, companies need years before they break even and them realize savings and higher profitability with virtualization. It is a bad bet for companies opting for a large set up at the beginning. They could instead opt for a regular desktop setup and then gradually make a move to desktop virtualization. (2) Data can be at Risk Working on virtual instances on shared hardware resources entails your data is hosted on a third-party resource. It can leave your data vulnerable to attacks or unauthorized access. This is 2 challenge if your service provider does not have proper security solutions to safeguard your virtual instance and data. Itis true, specifically in the case of storage virtualization. (8) Quick Scalability is a Problem Scaling on virtualization is a breeze, but not so much if it has to be done in a short period of time. In case of physical setup, one can quickly set up new hardware and scale, even if it entails some initial setting up complications. With virtualization, having to ensure all the requisite software, security, enough storage, and resource availability can be a tedious task. It consumes more time than one might expect since a third-party provider is involved. ‘Mareaver, the additional cost involved in increased resource use is another challenge to manage. (4) Performance Witnesses a Dip It is true that virtualization allows the optimum use of all resources. However, it is also challenge when you need that additional boost sometimes, but it is not available. Resources in virtualization are shared. ‘The same resources that a single user might have consumed are now shared among three or four users. ‘The overall available resources might not be shared equally or may be shared in some ratio depending upon the tasks being run. As the complexity of tasks increases, so does the need for performance from the system. It results in a substantially higher time required to complete the task. () Unintended Server Sprawl Unintended server sprawl is a major cause of concern for many server admins and users alike. (iew Syllabus wef academic year 22-23) (M8-138) Tech-Neo Publications Gloua Computing & Services M sme and? ons raise is of Server g person Prawn, oak person” ohereas a vis . M gourees. WHE tual nerves Seg NY “an 5, ik, physical server cons , virtual ever; i; % ima matter of NWO Ce ee strech atart, Tt Rd yy © Eve ote EE ee five or “sy servers since it allows yyoutd be ban servers aS to time, inste Low who 8 The server administrator so sn operations, over 20 virtual servers: et se smooth oP ana = : saint ta. / + This can cause 8 ma” Cg Joss of bd “< certain servers can a! eed “a vs allows jceualization enables oF Fico resource e500 ees of the host machine, Bain ey: d th i y Virtualization is a layer between the hardware and the operating System, - .. i ss transparency. , a a a also known a5 the Vara! Machine Monitor (VNap, , 8 applications and the operating system in gener 7 | rors a path created by the VMM which allows multiple of the sau, system to run on the host machine as well with the hypervisor a eanes among the various operating system hardware requirement, , The hypervisor plays a key role in Cloud hosting because it is a type of vi software that divides and allocates resources among a variety of hardware tea Fai 5 vi Hypervisors are hardware virtualization techniques that allow multi te operating systems (0S) to run on a single host. Pl A hypervisor is sometimes also called a virtual machine manager (VMay, There are two types of virtualization architectures: Bare metal virtualizat: Tosted Virtualization. 4 5.1 Bare Metal Virtualization/ TYPE-1 Hypervisor te hypervisor runs directly S also known as a “Nai 9¢8 not require any b on the underlying host system. tive Hypervisor” or “Bare metal hypervisor”. ase server operating system. bus wef academic year 22-23) (M8-138) ® — mi + Ithas direct access to hardware resources, « Examples of Type 1 hypervisors inclide VMware ESXi, Citrix XenServer, and Microsoft Hyper-V hypervisor. vii Fig. 2.5.1 : Type 1 Hypervisor %® 2.5.2 Hosted Vircualization/ TYPE-2 Hypervisor + AHost operating system runs on the underlying host system. * It is also known as ‘Hosted Hypervisor”. «Such kind of hypervisors doesn’t run directly over the underlying hardware rather they run as an application in a Host system (physical machine). + Basically, the software is installed on an operating system. Hypervisor asks the operating system to make hardware calls. * Containers, KVM, Microsoft Hyper V, VMWare Fusion, Virtual Server 2005 R2, Windows Virtual PC and VMWare workstation 6.0 are examples of Type 2 hypervisor. Fig. 2.5.2: Type 2 Hypervisor % 2.5.3 Implementation Levels of Virtualization « Virtualization is not that easy to implement. A computer runs an OS that is configured to that particular hardware. Running a different OS on the same hardware is not exactly feasible. (New Syllabus w.e.f academic year 22-23) (M8-138) Tech-Neo Publications pervisor. What hyperyigg, hype’ doe, ye exists * ye to enable its smooth Function’ init ee and marie zations available that arg al ¢ yirtuali f vir ols of inst gp the fs " ‘warner Gperational System Level Virtual Environment / Fv (faraware Abstraction Level VMWare / Virtual PC. (instruction Set Architecture Level Hig.253: Implementation Levels of Virtuaizaign (1) Instruction Set Architecture Level (ISA) In ISA, virtualization works through an ISA emulation, This ji "pi of lap cole ‘ich ‘wie originally writ S helgy ten for ¢ mi configurations, ifferent ky « These codes can be run on the virtual machine through an ISA. * A binary code that might need additional layers to TUN can now run qe machine or with some tweaking, even on x64 machines, TSA helps mek: hardware-agnostic virtual machine, * The basie emulation, though, requires a the source code and converts it to a hard Hardware Abstraction Level (HAL) in interpreter. Thig interpreter itz: ‘ware readable format for procs ‘ the name Suggests, this level helps perform =e evel, Te uses g bare hypervig ‘or for its functioning. ( «Neo! 23) (8-138) [el Tech-l Cloud Computing & r } ne 0 (MU-SEM 8-IT) (Virtualization)....Page no. (2-15) ‘This level helps form the virt ware throu A hrough irtual machine and manages the hardw: el It enables virtualizati ion of each hardware compone i processors, memory, ete. ee ‘This way multi his way multiple users can use the same hardware with numerous instances of virtualization at the same time. IBM had first implemented this on the IBM VM/370 back in 1960. It is more usable for cloud-based infrastructure, Xen hypervisors are using HAL to run Linux and other OS on x86 based machines. (3) Operating System Level (4) Library Level (5) Application Level At the operating system level, the virtualization model creates an abstract layer between the applications and the OS. It is like an isolated container on the physical server and operating system that utilizes hardware and software. Each of these container's functions like servers. When the number of users is high, and no one is willing to share hardware, this level of virtualization comes in handy. Here, every user gets their own virtual environment with dedicated virtual hardware resources. This way, no conflicts arise, OS system calls are lengthy and cumbersome. Due to this, applications opt for APIs from user-level libraries. Most of the APIs provided by systems are rather well documen evel virtualization is preferred in such scenarios. Library interfacing virtualization is made possible by API hooks. These API hooks control the communication link from the system to the applications. Some tools available today, such as vCUDA and WINE, have successfully demonstrated this technique. ted. Hence, library when you wish to virtualize only an platform or environment. On an s also known as virtualization comes handy es not virtualize an entire applications work as one process. Hence it is Application-level application. It do operating system, process-level virtualization. ‘useful when running virtual machines with hi p of the virtualization layer, It is generally igh-level languages. Here, the application sits on to which is above the application program. a Tech-Neo Publications (New Syllabus wef academic year 22-23) (M8-138) io pli aye ah gut 1 writ! nr o vad camping i virtualization m the virt dis pid Hardware wal machingy fh aiding i ag af wo ss ives 19 implement server yi n w eualization technics aK 6, tion Dry, 0 ser : ] patton ee sue wi en vi yware eal section yo isos mn / ) ; is \ () Fall views" ist tenigues the hypervisor compete . inthe fll ve | " a B jetine this technique is that it allows a | The eit advan | ; + pied 8 : | : ws ae eve 08 is completely unaware thay tg vit “4 vit jain ws combination of direct execution and bin \ ‘a aes, ulvitutl sion of non-sensitive CPU instruetiong yr, ig allows dire ed te instructions a6 translated 00 ly. ha y To improve performances the hypervisor maintains a cache - tranlted instructions ‘ al ’ ‘yMiwre’s ESM server uses this technique to achieve server virtua); i ) Paravitualization ae ‘This technique is not as portable as full virtualizatioy ‘ i ee i ‘ion, as it requires + In partition, the hypervisor doesn’t simulate Insen,t provides hypercalls, ee ‘hous 08 weshypercall to execute sensitive CPU instructi ons, However, it provides better “ perform, Bers ance because the guest OS is aware thu! a are similar to kerne) nate withthe hypervisor: system calls, They allow the rl 1 The opens ouree Xen proj Project uses the Paravirtualization technique. New Sabus Swe, 4 academic Year 22.23) 23) (M8-138) Fl a7 Se? Sat on Mi “ Cloud Computing & niet jor all the virtual mach; Winds Vir" 4 eT there are any perp’ > @) Solar Wi a gsi Perfor thie f ce 8 te oe ey ually Bx all the Performanc. the, ‘t tg ty | vs Hi a u ort the cloud platforms aa a, aay the * oft gications present in th, netic indica © tool yy) " + These sig My, nite © 2 one ean run Windows pain shere yMivare gers where 08 sh re ip fr ip Mac using this software, ‘int, Un, This soe yate OP ; ting 5¥* tack joud-based platforms for virty, Aliza & a a ; Sl en provides the facility of intege + Te with it. me ot | development 0° very simple to use and can support real-time a 7 + Mis ean opis Pont | ie pnt were can save the IBSEPTOPEE Working ‘ e ast weer aT / “Sion | + Theenyaravback 0 of 2 for this tea is that the drag and arop fang, peer a ncedsimeroverent nat ) (9) Parallels Desktop | | «This software is also for the Mac users to use windows and another anes rniscupprs windows 10 and Mac OS High Sierra ting «They provide ts of diferent tools which are very useful for daily day today | «Theva fortis oftware is very good and it requires no reboot while ins faa + ‘The performance for the application insi i i wale thn any lag, ” ee ee OS ial woes fat ad y > () Virtual Box } This 5 E “a bn comes from Oracle and the best part of them is its very user Phen 7 is used in windows to run different operating systems. tt it can host up to 4 operating system. , ystem. Peers drag and drops feature and the window can be minimized andre (ew ya yl “Swe academic year 29.93) ‘ (Ma.13m .

You might also like