Experiment No.1
Experiment No.1
Experiment No.1
1
Aim:- Study of different models of Cloud Computing.
Theory:-
So, read on as we cover the various cloud computing deployment and service
models. It is along with their customization flexibility, control, and data management
within the organization. Further, it involves the pooling of specialized human and
technical resources to effectively manage existing systems and applications as it
helps in meeting the requirements of organizations and users.
Different Types Of Cloud Computing Deployment Models
Most cloud hubs have tens of thousands of servers and storage devices to enable
fast loading. It is often possible to choose a geographic area to put the data “closer”
to users. Thus, deployment models of cloud computing are categorized based on
their location. To know which deployment model would best fit the requirements of
your organization, let us first learn about the types of cloud deployment models.
Private Cloud
It is a cloud-based infrastructure used by stand-alone organizations. It offers greater
control over security. The data is backed up by a firewall and internally, and can be
hosted internally or externally. Private clouds are perfect for organizations that have
high-security requirements, high management demands, and availability
requirements.
Public Cloud
This type of cloud services is provided on a network for public use. Customers have
no control over the location of the infrastructure. It is based on a shared cost model
for all the users, or in the form of a licensing policy such as pay per user. Public
deployment models in the cloud are perfect for organizations with growing and
fluctuating demands. It is also popular among businesses of all sizes for their web
applications, webmail, and storage of non-sensitive data.
Community Cloud
It is a mutually shared model between organizations that belong to a particular
community such as banks, government organizations, or commercial enterprises.
Community members generally share similar issues of privacy, performance, and
security. This type of deployment model of cloud computing is managed and hosted
internally or by a third-party vendor.
Hybrid Cloud
This model incorporates the best of both private and public clouds, but each can
remain as separate entities. Further, as part of this deployment of cloud computing
model, the internal, or external providers can provide resources. A hybrid cloud is
ideal for scalability, flexibility, and security. A perfect example of this scenario would
be that of an organization who uses the private cloud to secure their data and
interacts with its customers using the public cloud.
3 Service Models Of Cloud Computing
Cloud computing makes it possible to render several services, which can be defined
according to the roles, service providers and the user companies. Cloud computing
models and services are broadly classified as below:
Time and cost savings: more installation and maintenance of IT hardware in-
house,
Better flexibility: On-demand hardware resources that can be tailored to your
needs,
Remote access and resource management.
For-Who?
This cloud computing service model is ideal for large accounts, enterprises or
organizations capable of building and managing their own IT platforms. However,
they want the flexibility to amend their infrastructure according to their needs.
The Benefits
Mastering the installation and development of software applications
Time saving and flexibility for development projects: no need to manage the
implementation of the platform, instant production.
Data security: You control the distribution, protection, and backup of your
business data.
For-Who?
It is ideal for companies wanting to maintain control over their business applications.
However, they wish to get rid of constraints to manage the hardware infrastructure
and software environment.
3) SAAS: Releasing The User Experience Of Management Constraints
Software as a Service (SaaS) is provided over the internet and requires no prior
installation. These services can be availed from any part of the world at a minimal
per month fee.
The Advantages
You are entirely free from the infrastructure management and aligning
software environment: no installation or software maintenance.
You benefit from automatic updates with the guarantee that all users have the
same software version.
It enables easy and quicker testing of new software solutions.
For-Who?
SAAS model accounts for 60% of sales of cloud solutions. Hence, it is applicable
and preferred by most companies.
An effective strategy can be designed depending on the needs of the institutions
using the above mentioned cloud deployment models. Many organizations start with
a service model, such as SaaS, or a public deployment model. They gradually scale
it as per changes in requirements. Further, it is possible to use multiple deployment
models to support one or more service models.
Creation of a virtual machine over existing operating system and hardware is known
as Hardware Virtualization. A Virtual machine provides an environment that is
logically separated from the underlying hardware.
The machine on which the virtual machine is going to create is known as Host
Machine and that virtual machine is referred as a Guest Machine
Types of Virtualization:
1. Hardware Virtualization.
2. Operating system Virtualization.
3. Server Virtualization.
4. Storage Virtualization.
1) Hardware Virtualization:
When the virtual machine software or virtual machine manager (VMM) is directly
installed on the hardware system is known as hardware virtualization.
The main job of hypervisor is to control and monitoring the processor, memory and
other hardware resources.
Hardware virtualization is mainly done for the server platforms, because controlling
virtual machines is much easier than controlling a physical server.
When the virtual machine software or virtual machine manager (VMM) is installed on
the Host operating system instead of directly on the hardware system is known as
operating system virtualization.
Usage:
3) Server Virtualization:
When the virtual machine software or virtual machine manager (VMM) is directly
installed on the Server system is known as server virtualization.
Usage:
Server virtualization is done because a single physical server can be divided into
multiple servers on the demand basis and for balancing the load.
4) Storage Virtualization:
Storage virtualization is the process of grouping the physical storage from multiple
network storage devices so that it looks like a single storage device.
Usage:
Once the data is stored in the cloud, it is easier to get back-up and restore that data
using the cloud.
2) Improved collaboration
3) Excellent accessibility
Cloud allows us to quickly and easily access store information anywhere, anytime in
the whole world, using an internet connection. An internet cloud infrastructure
increases organization productivity and efficiency by ensuring that our data is always
accessible.
Cloud computing reduces both hardware and software maintenance costs for
organizations.
5) Mobility
Cloud computing allows us to easily access all cloud data via mobile.
Cloud computing offers Application Programming Interfaces (APIs) to the users for
access services on the cloud and pays the charges as per the usage of service.
Cloud offers us a huge amount of storing capacity for storing our important data such
as documents, images, audio, video, etc. in one place.
8) Data security
Data security is one of the biggest advantages of cloud computing. Cloud offers
many advanced features related to security and ensures that data is securely stored
and handled.
1) Internet Connectivity
As you know, in cloud computing, every data (image, audio, video, etc.) is stored on
the cloud, and we access these data through the cloud by using the internet
connection. If you do not have good internet connectivity, you cannot access these
data. However, we have no any other way to access data from the cloud.
2) Vendor lock-in
3) Limited Control
Although cloud service providers implement the best security standards to store
important information. But, before adopting cloud technology, you should be aware
that you will be sending all your organization's sensitive information to a third party,
i.e., a cloud computing service provider. While sending the data on the cloud, there
may be a chance that your organization's information is hacked by Hackers.
Conclusion:-
Thus we studied cloud computing and its different models and service models also
study virtualization that is Mainly means, running multiple operating systems on a
single machine but sharing all the hardware resources. And it helps us to provide the
pool of IT resources so that we can share these IT resources in order get benefits in
the business.