CCT Notes
CCT Notes
Distributed systems are undergoing a period of significant change and this can be traced
back to a number of influential trends:
➢ the emergence of pervasive networking technology;
➢ the emergence of ubiquitous computing coupled with the desire to support user mobility
in distributed systems;
➢ the increasing demand for multimedia services.
➢ the view of distributed systems as a utility.
Internet
The modern Internet is a vast interconnected collection of computer networks of many
different types, with the range of types increasing all the time and now including, for example,
a wide range of wireless communication technologies such as WiFi, WiMAX, Bluetooth and
third-generation mobile phone networks. The net result is that networking has become a
pervasive resource and devices can be connected (if desired) at any time and in any place.
The Internet is also a very large distributed system. It enables users, wherever they are,
to make use of services such as the World Wide Web, email and file transfer. (Indeed, the Web
is sometimes incorrectly equated with the Internet.) The set of services is open-ended – it can
be extended by the addition of server computers and new types of service. The figure shows a
collection of intranets – subnetworks operated by companies and other organizations and
typically protected by firewalls. The role of a firewall is to protect an intranet by preventing
unauthorized messages from leaving or entering. A firewall is implemented by filtering
incoming and outgoing messages. Filtering might be done by source or destination, or a firewall
might allow only those messages related to email and web access to pass into or out of the
intranet that it protects. Internet Service Providers (ISPs) are companies that provide broadband
links and other types of connection to individual users and small organizations, enabling them
to access services anywhere in the Internet as well as providing local services such as email
and web hosting. The intranets are linked together by backbones. A backbone is a network link
with a high transmission capacity, employing satellite connections, fibre optic cables and other
high-bandwidth circuits
Intranet
➢ A portion of the Internet that is separately administered and has a boundary that can
be configured to enforce local security policies
➢ Composed of several LANs linked by backbone connections
➢ Be connected to the Internet via a router
Main issues in the design of components for the use in intranet
➢ File services
➢ Firewall
➢ The cost of software installation and support
➢ Laptop computers.
➢ Handheld devices, including mobile phones, smart phones, GPS-enabled devices, pagers,
personal digital assistants (PDAs), video cameras and digital cameras.
➢ Wearable devices, such as smart watches with functionality similar to a PDA.
➢ Devices embedded in appliances such as washing machines, hi-fi systems, cars and
refrigerators.
The portability of many of these devices, together with their ability to connect conveniently
to networks in different places, makes mobile computing possible. Mobile computing is the
performance of computing tasks while the user is on the move, or visiting places other than
their usual environment. In mobile computing, users who are away from their ‘home’ intranet
(the intranet at work, or their residence) are still provided with access to resources via the
devices they carry with them. They can continue to access the Internet; they can continue to
access resources in their home intranet; and there is increasing provision for users to utilize
resources such as printers or even sales points that are conveniently nearby as they move
around. The latter is also known as location-aware or context-aware computing. Mobility
introduces a number of challenges for distributed systems, including the need to deal with
variable connectivity and indeed disconnection, and the need to maintain operation in the face
of device mobility.
12. a) Discuss in detail about cloud computing architecture and its components with
neat diagram.
As we know, cloud computing technology is used by both small and large organizations
to store the information in cloud and access it from anywhere at anytime using the internet
connection.
➢ Front End
➢ Back End
Front End
The front end is used by the client. It contains client-side interfaces and applications
that are required to access the cloud computing platforms. The front end includes web servers
(including Chrome, Firefox, internet explorer, etc.), thin & fat clients, tablets, and mobile
devices.
Back End
The back end is used by the service provider. It manages all the resources that are
required to provide cloud computing services. It includes a huge amount of data storage,
security mechanism, virtual machines, deploying models, servers, traffic control mechanisms,
etc.
1. Client Infrastructure
Client Infrastructure is a Front end component. It provides GUI (Graphical User
Interface) to interact with the cloud.
2. Application
The application may be any software or platform that a client wants to access.
3. Service
A Cloud Services manages that which type of service you access according to the
client’s requirement.
i. Software as a Service (SaaS) – It is also known as cloud application services. Mostly, SaaS
applications run directly through the web browser means we do not require to download and
install these applications. Some important example of SaaS is given below –
ii. Platform as a Service (PaaS) – It is also known as cloud platform services. It is quite
similar to SaaS, but the difference is that PaaS provides a platform for software creation, but
using SaaS, we can access software over the internet without the need of any platform.
Example: Amazon Web Services (AWS) EC2, Google Compute Engine (GCE), Cisco
Metapod.
4. Runtime Cloud
Runtime Cloud provides the execution and runtime environment to the virtual
machines.
5. Storage
6. Infrastructure
It provides services on the host level, application level, and network level. Cloud
infrastructure includes hardware and software components such as servers, storage, network
devices, virtualization software, and other storage resources that are needed to support the
cloud computing model.
7. Management
Management is used to manage components such as application, service, runtime cloud,
storage, infrastructure, and other security issues in the backend and establish coordination
between them.
8. Security
9. Internet
The Internet is medium through which front end and back end can interact and
communicate with each other.
Advantages of IaaS:
➢ Cost-Effective: Eliminates capital expense and reduces ongoing cost and IaaS
customers pay on a per-user basis, typically by the hour, week, or month.
➢ Website hosting: Running websites using IaaS can be less expensive than
traditional web hosting.
➢ Security: The IaaS Cloud Provider may provide better security than your existing
software.
➢ Maintenance: There is no need to manage the underlying data center or the
introduction of new releases of the development or underlying software. This is all
handled by the IaaS Cloud Provider.
Example: DigitalOcean, Linode, Amazon Web Services (AWS), Microsoft Azure, Google
Compute Engine (GCE), Rackspace, and Cisco Metacloud.
PaaS cloud computing platform is created for the programmer to develop, test, run, and manage
the applications.
Characteristics of PaaS
Advantages of PaaS:
➢ Simple and convenient for users: It provides much of the infrastructure and other
IT services, which users can access anywhere via a web browser.
➢ Cost-Effective: It charges for the services provided on a per-use basis thus
eliminating the expenses one may have for on-premises hardware and software.
➢ Efficiently managing the lifecycle: It is designed to support the complete web
application lifecycle: building, testing, deploying, managing, and updating.
➢ Efficiency: It allows for higher-level programming with reduced complexity thus,
the overall development of the application can be more effective.
Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine,
Apache Stratos, Magento Commerce Cloud, and OpenShift.
SaaS is also known as "on-demand software". It is a software in which the applications are
hosted by a cloud service provider. Users can access these applications with the help of
internet connection and web browser.
Characteristics of SaaS
Advantages of SaaS
➢ Cost-Effective: Pay only for what you use.
➢ Reduced time: Users can run most SaaS apps directly from their web browser
without needing to download and install any software. This reduces the time spent
in installation and configuration and can reduce the issues that can get in the way of
the software deployment.
➢ Accessibility: We can Access app data from anywhere.
➢ Automatic updates: Rather than purchasing new software, customers rely on a
SaaS provider to automatically perform the updates.
➢ Scalability: It allows the users to access the services and features on-demand.
What is Service?
Service Connections
The figure given below illustrates the service-oriented architecture. Service consumer
sends a service request to the service provider, and the service provider sends the service
response to the service consumer. The service connection is understandable to both the service
consumer and service provider.
Service-Oriented Terminologies
Characteristics of SOA
The service-oriented architecture stack can be categorized into two parts - functional aspects
and quality of service aspects.
Functional aspects
➢ Transport - It transports the service requests from the service consumer to the service
provider and service responses from the service provider to the service consumer.
➢ Service Communication Protocol - It allows the service provider and the service
consumer to communicate with each other.
➢ Service Description - It describes the service and data required to invoke it.
➢ Service - It is an actual service.
➢ Business Process - It represents the group of services called in a particular sequence
associated with the particular rules to meet the business requirements.
➢ Service Registry - It contains the description of data which is used by service providers
to publish their services.
➢ Policy - It represents the set of protocols according to which a service provider make
and provide the services to consumers.
➢ Security - It represents the set of protocols required for identification and authorization.
➢ Transaction - It provides the surety of consistent result. This means, if we use the group
of services to complete a business function, either all must complete or none of the
complete.
➢ Management - It defines the set of attributes used to manage the services.
Advantages of SOA
13. b) Briefly discuss about cloud service provider and its applications.
Features of AWS
AWS provides various powerful features for building scalable, cost-effective, enterprise
applications. Some important features of AWS is given below-
➢ AWS is scalable because it has an ability to scale the computing resources up or down
according to the organization's demand.
➢ AWS is cost-effective as it works on a pay-as-you-go pricing model.
➢ It provides various flexible storage options.
➢ It offers various security services such as infrastructure security, data encryption,
monitoring & logging, identity & access control, penetration testing, and DDoS attacks.
➢ It can efficiently manage and secure Windows workloads.
Microsoft Azure
IBM Cloud is an open-source, faster, and more reliable platform. It is built with a suite
of advanced data and AI tools. It offers various services such as Infrastructure as a
service, Software as a service, and platform as a service. You can access its services like
compute power, cloud data & Analytics, cloud use cases, and storage networking using internet
connection.
Feature of IBM Cloud
➢ IBM cloud improves operational efficiency.
➢ Its speed and agility improve the customer's satisfaction.
➢ It offers Infrastructure as a Service (IaaS), Platform as a Service (PaaS), as well as
Software as a Service (SaaS)
➢ It offers various cloud communications services to our IT environment.
VMware Cloud
VMware cloud is a Software-Defined Data Center (SSDC) unified platform for the
Hybrid Cloud. It allows cloud providers to build agile, flexible, efficient, and robust cloud
services.
Features of VMware
➢ VMware cloud works on the pay-as-per-use model and monthly subscription
➢ It provides better customer satisfaction by protecting the user's data.
➢ It can easily create a new VMware Software-Defined Data Center (SDDC) cluster on
AWS cloud by utilizing a RESTful API.
➢ It provides flexible storage options. We can manage our application storage on a per-
application basis.
➢ It provides a dedicated high-performance network for managing the application traffic
and also supports multicast networking.
➢ It eliminates the time and cost complexity.
Oracle cloud
Red Hat
Red Hat virtualization is an open standard and desktop virtualization platform produced
by Red Hat. It is very popular for the Linux environment to provide various infrastructure
solutions for virtualized servers as well as technical workstations. Most of the small and
medium-sized organizations use Red Hat to run their organizations smoothly. It offers higher
density, better performance, agility, and security to the resources. It also improves the
organization's economy by providing cheaper and easier management capabilities.
Features of Rad Hat
➢ Red Hat provides secure, certified, and updated container images via the Red Hat
Container catalog.
➢ Red Hat cloud includes OpenShift, which is an app development platform that allows
developers to access, modernize, and deploy apps
➢ It supports up to 16 virtual machines, each having up to 256GB of RAM.
➢ It offers better reliability, availability, and serviceability.
➢ It provides flexible storage capabilities, including very large SAN-based storage, better
management of memory allocations, high availability of LVMs, and support for
particularly roll-back.
➢ In the Desktop environment, it includes features like New on-screen keyboard,
GNOME software, which allows us to install applications, update application, as well
as extended device support.
DigitalOcean
DigitalOcean is the unique cloud provider that offers computing services to the
organization. It was founded in 2011 by Moisey Uretsky and Ben. It is one of the best cloud
provider that allows us to manage and deploy web applications.
Features of DigitalOcean
➢ It uses the KVM hypervisor to allocate physical resources to the virtual servers.
➢ It provides high-quality performance.
➢ It offers a digital community platform that helps to answer queries and holding
feedbacks.
➢ It allows developers to use cloud servers to quickly create new virtual machines for
their projects.
➢ It offers one-click apps for droplets. These apps include MySQL, Docker, MongoDB,
Wordpress, PhpMyAdmin, LAMP stack, Ghost, and Machine Learning.
Rackspace
Rackspace offers cloud computing services such as hosting web applications, Cloud
Backup, Cloud Block Storage, Databases, and Cloud Servers. The main aim to designing
Rackspace is to easily manage private and public cloud deployments. Its data centers operating
in the USA, UK, Hong Kong, and Australia.
Features of Rackspace
➢ Rackspace provides various tools that help organizations to collaborate and
communicate more efficiently.
➢ We can access files that are stored on the Rackspace cloud drive, anywhere, anytime
using any device.
➢ It offers 6 globally data centers.
➢ It can manage both virtual servers and dedicated physical servers on the same network.
➢ It provides better performance at a lower cost.
Alibaba Cloud
Alibaba Cloud is used to develop data management and highly scalable cloud
computing services. It offers various services, including Elastic Computing, Storage,
Networking, Security, Database Services, Application Services, Media Services, Cloud
Communication, and Internet of Things.
Features of Alibaba Cloud
➢ Alibaba cloud offers a suite of global cloud computing services for both international
customers and Alibaba Group's e-commerce ecosystem.
➢ Its services are available on a pay-as-per-use basis.
➢ It globally deals with its 14 data centers.
➢ It offers scalable and reliable data storage.
Federated Cloud
The architecture of Federated Cloud:
1. In the federated cloud, the users can interact with the architecture either centrally
or in a decentralized manner. In centralized interaction, the user interacts with a
broker to mediate between them and the organization. Decentralized interaction
permits the user to interact directly with the clouds in the federation.
2. Federated cloud can be practiced with various niches like commercial and non-
commercial.
3. The visibility of a federated cloud assists the user to interpret the organization of
several clouds in the federated environment.
4. Federated cloud can be monitored in two ways. MaaS (Monitoring as a Service)
provides information that aids in tracking contracted services to the user. Global
monitoring aids in maintaining the federated cloud.
5. The providers who participate in the federation publish their offers to a central
entity. The user interacts with this central entity to verify the prices and propose
an offer.
6. The marketing objects like infrastructure, software, and platform have to pass
through federation when consumed in the federated cloud.
1. In cloud federation, it is common to have more than one provider for processing
the incoming demands. In such cases, there must be a scheme needed to distribute
the incoming demands equally among the cloud service providers.
2. The increasing requests in cloud federation have resulted in more heterogeneous
infrastructure, making interoperability an area of concern. It becomes a challenge
for cloud users to select relevant cloud service providers and therefore, it ties them
to a particular cloud service provider.
3. A federated cloud means constructing a seamless cloud environment that can
interact with people, different devices, several application interfaces, and other
entities.
The technologies that aid the cloud federation and cloud services are:
1. OpenNebula
It is a cloud computing platform for managing heterogeneous distributed data center
infrastructures. It can use the resources of its interoperability, leveraging existing information
technology assets, protecting the deals, and adding the application programming interface
(API).
2. Aneka coordinator
The Aneka coordinator is a proposition of the Aneka services and Aneka peer
components (network architectures) which give the cloud ability and performance to interact
with other cloud services.
3. Eucalyptus
Eucalyptus defines the pooling computational, storage, and network resources that
can be measured scaled up or down as application workloads change in the utilization of the
software. It is an open-source framework that performs the storage, network, and many other
computational resources to access the cloud environment.
The Internet of Things (IoT) provides the ability to interconnect computing devices,
mechanical machines, objects, animals or unique identifiers and people to transfer data across
a network without the need for human-to-human or human-to-computer is a system of
conversation. IoT applications bring a lot of value in our lives. The Internet of Things provides
objects, computing devices, or unique identifiers and people's ability to transfer data across
a network without the human-to-human or human-to-computer interaction.
This gateway receives data from such cameras and transmits information to the
city's traffic monitoring system.
For example, the municipal corporation has decided to repair a road that is connected to the
national highway. It may cause traffic congestion to the national highway. The insight is sent
to the traffic monitoring system.
The intelligent system analyzes the situation, estimate their impact, and relay information to
other cities connected to the same highway. It generates live instructions to drivers by smart
devices and radio channels.
What is IoT?
Wearable technology is the hallmark of IoT applications and one of the earliest industries to
deploy IoT. We have fit bits, heart rate monitors and smartwatches these days.
Guardian glucose monitoring device has been developed to help people with diabetes. It detects
glucose levels in our body, uses a small electrode called the glucose sensor under the skin, and
relates it to a radiofrequency monitoring device.
The smart home is probably the first thing when we talk about the IoT application. The example
we see the AI home automation is employed by Mark Zuckerberg. Alan Pan's home
automation system, where a string of musical notes uses in-house functions.
3. Health care
IoT applications can transform reactive medical-based systems into active wellness-based
systems. Resources that are used in current medical research lack important real-world
information. It uses controlled environments, leftover data, and volunteers for clinical trials.
The Internet of Things improves the device's power, precision and availability. IoT focuses
on building systems rather than just tools. Here's how the IoT-enabled care device works.
4. Smart Cities
Most of you have heard about the term smart city. Smart city uses technology to provide
services. The smart city includes improving transportation and social services, promoting
stability and giving voice to their citizens.
5. Agriculture
By the year 2050, the world's growing population is estimated to have reached about 10 billion.
To feed such a large population, agriculture needs to marry technology and get the best results.
There are many possibilities in this area. One of them is Smart Greenhouse.
The greenhouse makes it easy to monitor and enables to control the climate inside it.
6. Industrial Automation
It is one of the areas where the quality of products is an essential factor for a more significant
investment return. Anyone can re-engineer products and their packaging to provide superior
performance in cost and customer experience with IoT applications. IoT will prove as a
game-changer. In industrial automation, IoT is used in the following areas:
7. Hacked Car
A connected car is a technology-driven car with Internet access and a WAN network. The
technology offers the user some benefits such as in-car infotainment, advanced navigation and
fuel efficiency.
8. Healthcare
Healthcare do real-time monitoring with the help of smart devices. It gathers and transfers
health data such as blood pressure, blood sugar levels, weight, oxygen, and ECG. The patient
can contact the doctor by the smart mobile application in case of any emergency.
9. Smart Retail
IoT applications in retail give shoppers a new experience. Customers do not have to stand in
long queues as the checkout system can read the tags of the products and deduct the total
amount from the customer's payment app with IoT applications' help.
Customers automate the delivery and shipping with a smart supply chain. It also provides
details of real-time conditions and supply networks.
Farmers can minimize waste and increase productivity. The system allows the monitoring of
fields with the help of sensors. Farmers can monitor the status of the area.
Internet-connected devices go from 5 million to billions in just one year. Business Insider
Intelligence estimates 24 billion IoT devices will install and generate more than 300 billion in
revenue in the future.
16. a) Briefly discuss about the cloud deployment models with suitable example.
In cloud computing, we have access to a shared pool of computer resources (servers,
storage, programs, and so on) in the cloud. You simply need to request additional resources
when you require them. Getting resources up and running quickly is a breeze thanks to the
clouds. It is possible to release resources that are no longer necessary. This method allows
you to just pay for what you use. Your cloud provider is in charge of all upkeep.
What is a Cloud Deployment Model?
Cloud Deployment Model functions as a virtual computing environment with a
deployment architecture that varies depending on the amount of data you want to store and
who has access to the infrastructure.
Types of Cloud Computing Deployment Models
The cloud deployment model identifies the specific type of cloud environment based
on ownership, scale, and access, as well as the cloud’s nature and purpose. The location of
the servers you’re utilizing and who controls them are defined by a cloud deployment model.
It specifies how your cloud infrastructure will look, what you can change, and whether you
will be given services or will have to create everything yourself. Relationships between the
infrastructure and your users are also defined by cloud deployment types. Different types of
cloud computing deployment models are described below.
➢ Public Cloud
➢ Private Cloud
➢ Hybrid Cloud
➢ Community Cloud
Public Cloud
The public cloud makes it possible for anybody to access systems and services. The
public cloud may be less secure as it is open to everyone. The public cloud is one in which
cloud infrastructure services are provided over the internet to the general people or major
industry groups. The infrastructure in this cloud model is owned by the entity that delivers
the cloud services, not by the consumer. It is a type of cloud hosting that allows customers
and users to easily access systems and services. This form of cloud computing is an excellent
example of cloud hosting, in which service providers supply services to a variety of
customers. In this arrangement, storage backup and retrieval services are given for free, as a
subscription, or on a per-user basis. For example, Google App Engine etc.
Public Cloud
Private Cloud
Platform as a Service (PaaS) is a type of cloud computing that helps developers to build
applications and services over the Internet by providing them with a platform.
PaaS helps in maintaining control over their business applications.
Advantages of PaaS
➢ PaaS is simple and very much convenient for the user as it can be accessed via a web
browser.
➢ PaaS has the capabilities to efficiently manage the lifecycle.
Disadvantages of PaaS
➢ PaaS has limited control over infrastructure as they have less control over the
environment and are not able to make some customizations.
➢ PaaS has a high dependence on the provider.
Software as a Service (SaaS) is a type of cloud computing model that is the work of
delivering services and applications over the Internet. The SaaS applications are called Web-
Based Software or Hosted Software.
SaaS has around 60 percent of cloud solutions and due to this, it is mostly preferred by
companies.
Advantages of SaaS
➢ SaaS can access app data from anywhere on the Internet.
➢ SaaS provides easy access to features and services.
Disadvantages of SaaS
➢ SaaS solutions have limited customization, which means they have some restrictions
within the platform.
➢ SaaS has little control over the data of the user.
➢ SaaS are generally cloud-based, they require a stable internet connection for proper
working.
Creation of a virtual machine over existing operating system and hardware is known as
Hardware Virtualization. A Virtual machine provides an environment that is logically
separated from the underlying hardware.
The machine on which the virtual machine is going to create is known as Host
Machine and that virtual machine is referred as a Guest Machine
Types of Virtualization:
1. Hardware Virtualization.
2. Operating system Virtualization.
3. Server Virtualization.
4. Storage Virtualization.
1) Hardware Virtualization:
When the virtual machine software or virtual machine manager (VMM) is directly installed on
the hardware system is known as hardware virtualization.
The main job of hypervisor is to control and monitoring the processor, memory and other
hardware resources.
After virtualization of hardware system we can install different operating system on it and run
different applications on those OS.
Usage:
Hardware virtualization is mainly done for the server platforms, because controlling virtual
machines is much easier than controlling a physical server.
When the virtual machine software or virtual machine manager (VMM) is installed on the Host
operating system instead of directly on the hardware system is known as operating system
virtualization.
Usage:
Operating System Virtualization is mainly used for testing the applications on different
platforms of OS.
3) Server Virtualization:
When the virtual machine software or virtual machine manager (VMM) is directly installed on
the Server system is known as server virtualization.
Usage:
Server virtualization is done because a single physical server can be divided into multiple
servers on the demand basis and for balancing the load.
4) Storage Virtualization:
Storage virtualization is the process of grouping the physical storage from multiple network
storage devices so that it looks like a single storage device.
Usage: