Cloud Computing
Cloud Computing
Each service model has its own set of advantages and disadvantages, catering to different
needs and preferences of users depending on their requirements and technical expertise.
2.Cloud deployment models:
Sure! Let's dive into the details of cloud deployment models along with their advantages and
disadvantages:
1. **Public Cloud**:
- **Description**: Public cloud services are provided by third-party cloud service providers
over the internet. These services are shared among multiple organizations.
- **Advantages**: Cost-effective, scalable, no maintenance required, and offers a
pay-as-you-go pricing model.
- **Disadvantages**: Security concerns due to shared resources, potential lack of
customization, and dependency on the provider's infrastructure and services.
2. **Private Cloud**:
- **Description**: Private cloud services are dedicated to a single organization and can be
hosted on-premises or by a third-party provider.
- **Advantages**: Enhanced security, more control over data and resources, customization
options, and compliance with specific regulations.
- **Disadvantages**: Higher costs, maintenance requirements, limited scalability compared
to public cloud, and potential initial setup complexities.
3. **Hybrid Cloud**:
- **Description**: Hybrid cloud combines public and private cloud services, allowing data
and applications to be shared between them.
- **Advantages**: Flexibility to choose where to store data based on sensitivity, scalability
options, cost-effectiveness, and ability to leverage the benefits of both public and private
clouds.
- **Disadvantages**: Complexity in managing multiple environments, potential security
risks due to data movement between clouds, and the need for robust integration and
orchestration.
4. **Multi-Cloud**:
- **Description**: Multi-cloud involves using services from multiple cloud providers to meet
specific business needs.
- **Advantages**: Avoids vendor lock-in, increased resilience against outages, optimization
of services based on specific requirements, and potential cost savings through competitive
pricing.
- **Disadvantages**: Management challenges in coordinating multiple providers, potential
interoperability issues, complexity in data and application management across different
clouds, and increased security concerns due to multiple environments.
Each cloud deployment model offers unique benefits and challenges, and organizations
need to carefully evaluate their requirements to choose the most suitable model or a
combination of models that best align with their goals and constraints.
3.Design challenges in cloud
architecture:
Designing cloud architecture comes with several challenges that need to be addressed for a
successful implementation. Some of the key design challenges in cloud architecture include:
1. **Scalability**: One of the primary challenges is designing a system that can scale easily
to handle increasing workloads. This involves ensuring that the architecture can grow
seamlessly to accommodate more users, data, and transactions without compromising
performance.
2. **Reliability and Availability**: Maintaining high availability and reliability is crucial in cloud
architecture. Designing for redundancy, fault tolerance, and disaster recovery mechanisms is
essential to ensure continuous operation even in the face of failures.
1. **Cloud Consumer**:
- **Description**: The cloud consumer is an individual or organization that uses cloud
services provided by cloud providers. They can be end-users, developers, or IT departments
within an organization.
2. **Cloud Provider**:
- **Description**: The cloud provider is the entity that offers cloud services, such as
computing resources, storage, and applications, to cloud consumers. These providers
manage and maintain the infrastructure and services offered to consumers.
3. **Carrier**:
- **Description**: The carrier refers to the network service provider that offers connectivity
and networking services to facilitate the transfer of data between cloud consumers and
providers. Carriers ensure reliable and secure communication between different components
of the cloud architecture.
4. **Broker**:
- **Description**: A cloud broker acts as an intermediary between cloud consumers and
providers, helping consumers select the most suitable cloud services based on their
requirements. Brokers may offer services such as cloud service aggregation, integration,
customization, and management.
1. **Service Intermediation**:
- **Explanation**: Service intermediation involves adding value to cloud services by
enhancing or modifying them before they reach the cloud consumer. Intermediaries may
provide services such as data encryption, authentication, or transformation to meet specific
consumer requirements or enhance security and performance.
2. **Service Aggregation**:
- **Explanation**: Service aggregation combines multiple cloud services from different
providers into a single, unified service offering. This allows cloud consumers to access a
variety of services through a single interface, simplifying management and improving
efficiency.
3. **Service Arbitrage**:
- **Explanation**: Service arbitrage involves selecting and utilizing cloud services based on
factors such as cost, performance, and availability. Cloud brokers or consumers may engage
in service arbitrage to optimize their cloud service usage, leveraging different providers or
service models to achieve the best value for their specific needs.
5. **Auditor**:
- **Description**: The cloud auditor is responsible for assessing and ensuring compliance,
security, and performance of cloud services. They conduct audits to verify that cloud
providers adhere to industry standards, regulations, and service level agreements (SLAs).
Cons:
1. **Security Concerns**: Data security and privacy risks exist, especially with sensitive
information stored off-site.
2. **Internet Dependency**: Reliance on internet connectivity can hinder operations if there
are outages or slow connections.
3. **Limited Control**: Users have limited control over the infrastructure and services, relying
on the provider for maintenance and management.
4. **Compliance Challenges**: Meeting industry-specific regulations and compliance
requirements can be challenging in the cloud.
5. **Downtime**: Despite high availability, cloud services can experience downtime,
impacting business operations.
By understanding these pros and cons, organizations can make informed decisions on
adopting cloud computing to leverage its benefits while mitigating potential drawbacks.
Unit-2
1.Hypervisor:
In cloud computing, a hypervisor is a virtualization platform that allows multiple operating
systems to run on a host computer at the same time. The term usually refers to an
implementation using full virtualization.
A hypervisor is a software layer installed on the physical hardware, which allow splitting the
physical machine into many virtual machines. This allows multiple operating systems to be
run simultaneously on the same physical hardware.
The operating system installed on the virtual machine is called a guest OS, and is
sometimes also called an instance. The hardware the hypervisor runs on is called the host
machine.
Types of Hypervisor
TYPE-1 Hypervisor:
The hypervisor runs directly on the underlying host system. It is also known as a “Native
Hypervisor” or “Bare metal hypervisor”. It does not require any base server operating
system. It has direct access to hardware resources. Examples of Type 1 hypervisors include
VMware ESXi, Citrix XenServer, and Microsoft Hyper-V hypervisor.
TYPE-2 Hypervisor:
A Host operating system runs on the underlying host system. It is also known as ‘Hosted
Hypervisor”. Such kind of hypervisors doesn’t run directly over the underlying hardware
rather they run as an application in a Host system(physical machine). Basically, the software
is installed on an operating system. Hypervisor asks the operating system to make hardware
calls. An example of a Type 2 hypervisor includes VMware Player or Parallels Desktop.
Hosted hypervisors are often found on endpoints like PCs. The type-2 hypervisor is very
useful for engineers, and security analysts (for checking malware, or malicious source code
and newly developed applications).
Pros: Such kind of hypervisors allows quick and easy access to a guest Operating System
alongside the host machine running. These hypervisors usually come with additional useful
features for guest machines. Such tools enhance the coordination between the host machine
and the guest machine.
Cons: Here there is no direct access to the physical hardware resources so the efficiency of
these hypervisors lags in performance as compared to the type-1 hypervisors, and potential
security risks are also there an attacker can compromise the security weakness if there is
access to the host operating system so he can also access the guest operating system
2 Full Virtualization:
Hypercalls are similar to kernel system calls. They allow the guest OS to
communicate with the hypervisor.
● Full Virtualization
● Emulation Virtualization
● Para-Virtualization
Emulation Virtualization:
Cpu virtualization:
Each VM operates as if it has its own dedicated CPU, even though they are all
sharing the underlying physical hardware..
At its core, CPU virtualization is about resource allocation. It allows for the
effective distribution of computational resources, such as processing power
and memory, among various virtual machines. This technology makes it
possible to run multiple applications and processes on the same hardware,
significantly improving efficiency and reducing costs.
Memory virtualization:
Memory virtualization in cloud computing involves creating virtual instances of
physical memory resources to allocate and manage memory for multiple
virtual machines (VMs) running on a single physical server. Just like CPU
virtualization, memory virtualization uses a hypervisor to abstract and allocate
memory resources to different VMs.
This allows each VM to operate as if it has its own dedicated memory, even
though they are sharing the physical memory of the server. Memory
virtualization enhances resource utilization, scalability, and flexibility in cloud
environments by efficiently managing and optimizing memory allocation
across multiple VMs.
I/O Virtualization:
I/O Virtualization in cloud computing refers to the process of abstracting and
managing inputs and outputs between a guest system and a host system in a
cloud environment.This is possible using hypervisor that acts as an
intermediary between the VMs and the physical devices.
The hypervisor manages the I/O requests from the VMs and directs them to
the appropriate device. This process is transparent to the VMs, which operate
as if they have their own dedicated I/O devices.
The hypervisor uses techniques like device emulation, passthrough, and direct
assignment to provide VMs with access to physical I/O devices. Device
emulation involves emulating virtual devices that communicate with the
physical hardware, enabling VMs to interact with them. Passthrough allows
VMs to access the physical devices directly without going through the
hypervisor, enhancing performance for I/O-intensive workloads. Direct
assignment assigns specific physical devices to individual VMs, providing
dedicated access and optimal performance.
I/O virtualization offers several benefits that contribute to the efficiency and
effectiveness of cloud computing. One of the main advantages is the improved
resource utilization
Sure, I can explain those concepts for you: