Cloud Computing

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Cloud Computing

SUBMITTED BY:
SIDHIQUL AFLAH
810421104163
The publish-subscribe (pub/sub) model

Consider a scenario of synchronous message passing.


You have two components in your system that
communicate with each other. LeLet’ss call the sender Publisher Subscriber basically known as Pub-Sub is an
and receiver. The receiver asks for a service from the asynchronous message-passing system that solves the
sender and the sender serves the request and waits for drawback above. The sender is called the publisher
an acknowledgment from the receiver. There is whereas the receiver is called the subscriber. The main
another receiver that requests a service from the advantage of pub-sub is that it decouples the
sender. The sender is blocked since it hasn’t yet subsystem which means all the components can work
received any acknowledgment from the first receiver. independently. This is very important when it comes to
The sender isn’t able to serve the second receiver writing APIs or working with databases.
which can create problems. To solve this drawback, the
Pub-Sub model was introduced.
• The publisher never sends a direct
message to the subscribers, it is
sent to a broker and then the
subscribers will get it. Sending a
message to the broker is called
publishing whereas listening to
incoming messages is called
subscribing. In simple terms, a
subscriber subscribes to a
topic(which is like a message
broker) and the publisher pushes
messages to the topic and then the
topic will push messages to the
subscribers.
Virtualization in Cloud Computing
• Virtualization is a technique how to separate a service from the underlying physical
delivery of that service. It is the process of creating a virtual version of something like
computer hardware. It was initially developed during the mainframe era. It involves using
specialized software to create a virtual or software-created version of a computing
resource rather than the actual version of the same resource. With the help of
Virtualization, multiple operating systems and applications can run on the same machine
and its same hardware at the same time, increasing the utilization and flexibility of
hardware.
• In other words, one of the main cost-effective, hardware-reducing, and energy-saving
techniques used by cloud providers is Virtualization. Virtualization allows sharing of a
single physical instance of a resource or an application among multiple customers and
organizations at one time. It does this by assigning a logical name to physical storage
and providing a pointer to that physical resource on demand. The term virtualization is
often synonymous with hardware virtualization, which plays a fundamental role in
efficiently delivering Infrastructure-as-a-Service (IaaS) solutions for cloud computing.
Moreover, virtualization technologies provide a virtual environment for not only
executing applications but also for storage, memory, and networking.

Types
Virtualization
1. Application Virtualization: Application virtualization helps a user to have remote
access to an application from a server. The server stores all personal information
and other characteristics of the application but can still run on a local workstation
through the internet. An example of this would be a user who needs to run two
different versions of the same software. Technologies that use application
virtualization are hosted applications and packaged applications.
2. Network Virtualization: The ability to run multiple virtual networks with each
having a separate control and data plan. It co-exists together on top of one
physical network. It can be managed by individual parties that are potentially
confidential to each other. Network virtualization provides a facility to create and
provision virtual networks, logical switches, routers, firewalls, load
balancers, Virtual Private Networks (VPN), and workload security within days or
even weeks.
3. Desktop Virtualization: Desktop virtualization allows the users’ OS to be remotely
stored on a server in the data center. It allows the user to access their desktop
virtually, from any location by a different machine. Users who want specific operating
systems other than Windows Server will need to have a virtual desktop. The main
benefits of desktop virtualization are user mobility, portability, and easy management
of software installation, updates, and patches.
4. Storage Virtualization: Storage virtualization is an array of servers that are
managed by a virtual storage system. The servers aren’t aware of exactly where their
data is stored and instead function more like worker bees in a hive. It makes managing
storage from multiple sources be managed and utilized as a single repository. storage
virtualization software maintains smooth operations, consistent performance, and a
continuous suite of advanced functions despite changes, breaks down, and differences
in the underlying equipment.
5. Server Virtualization: This is a kind of virtualization in which the masking of server
resources takes place. Here, the central server (physical server) is divided into multiple
different virtual servers by changing the identity number, and processors. So, each
system can operate its operating systems in an isolated manner. Where each sub-
server knows the identity of the central server. It causes an increase in performance
and reduces the operating cost by the deployment of main server resources into a
sub-server resource. It’s beneficial in virtual migration, reducing energy consumption,
reducing infrastructural costs, etc.
6. Data Virtualization: This is the kind of virtualization in which the data is collected
from various sources and managed at a single place without knowing more about the
technical information like how data is collected, stored & formatted then arranged that
data logically so that its virtual view can be accessed by its interested people and
stakeholders, and users through the various cloud services remotely. Many big giant
companies are providing their services like Oracle, IBM, At scale, Cdata, etc.

You might also like