0% found this document useful (0 votes)
39 views21 pages

Ecse Unit III

Uploaded by

Sherlock337
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views21 pages

Ecse Unit III

Uploaded by

Sherlock337
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

UNIT – III

Operating systems: Functions of operating systems, types of operating systems, Device &
Resource management Database Management Systems: Data models, RDBMS, SQL, Database
Transactions, data centers, cloud services .

Types of operating system

1. Multiprocessor OS

A multiprocessor operating system is an operating system that uses multiple processors to


improve performance. This operating system is commonly found on computer systems with
more than one CPU. Multiprocessor systems improve system performance by allowing the
execution of tasks on multiple processors simultaneously. Overall reduces the time it takes to
complete specific tasks.

Advantages
∙ It
allows the system to run multiple programs simultaneously.
∙ Beneficial for tasks that need to use all of the processor’s resources, such as games, scientific
calculations, and financial simulations.

Disadvantages

∙ They require additional hardware, such as processors and memory, making a system more
expensive.

2. Multi-programming OS

The operating system which can run multiple processes on a single processor is called a
multiprogramming operating system. There are different programs that want to get executed.
So these programs are kept in the ready queue. And are assigned to the CPU one by one. If one
process gets blocked then other processes from the ready queue are assigned to the CPU. The
aim of this is optimal resource utilization and more CPU utilization. In the below figure,
different processes are there in RAM(main memory). Some processes are waiting for the CPU,
and process 2(which was previously executing) is now doing I/O operations. So CPU shifted
to execute process 1.

3. Distributed OS
A distributed operating system is an operating system that is designed to operate on a network
of computers. Distributed systems are usually used to distribute software applications and data.
Users could be at different sites. Multiple computers are connected via a single communication
channel. Every system have its own processor and memory. Resources like disk, computer,
CPU, network interface, nodes, etc are shared among different computer at different locations.
It increases data availability in the entire system.

4. Multitasking OS

Multi-tasking operating systems are designed to enable multiple applications to run


simultaneously. Multi-tasking operating systems allow multiple users to work on the same
document or application simultaneously.

For example, a user running antivirus software, searching the internet, and playing a song
simultaneously. Then the user is using a multitasking OS.

5. Time-sharing OS

A time-sharing operating system is an application that provides a shared user interface with
multiple users logged in simultaneously. It allows multiple users to access the same resources,
such as files and applications, as long as they are logged in simultaneously. This type of
operating system is most commonly used in businesses, especially those that involve a high
number of simultaneous users. Time-sharing operating systems enable users to finish their jobs
on a system at once. The time-sharing OS is the latest advancement in the computer science
world; it is being accepted worldwide, also at an increasing rate.
6. Client/server network OS
Client/server network operating systems are those networks that contain two types of nodes,
the servers, and clients. The servers host the applications or services for users while clients use
these applications. In a client/server system, both the server and client computers must have
certain software installed to connect to each other securely over a network connection.

Client-server networks are a type of computer network in which two or more computer systems
are linked through a telecommunications network. Clients are the computers that use the
network to access services provided by the server. Servers are the computers that provide the
services to the network. Client/server networks are commonly used in business and government
applications.

7. Batch OS

There are different users and each user prepares their work in a standalone device such as
punchcards in batch operating systems and sends them to a computer operator. The various
systems split and distribute similar tasks in batches to facilitate computing and faster responses.
A single operator takes similar types of jobs that share similar needs and requirements, then
groups them in various batches. Similar kinds of jobs that share similar needs and requirements.
These types of operating systems are not used nowadays.
Device & Resource management

Device Manager displays a graphical view of the hardware that is installed on your
computer. Use this tool when you want to view and manage hardware devices and their drivers.

What Is the Function of Device Management in an OS?

There are several features to this OS. The first is a GUI, or graphical UI/UX. This is what makes
it easy for almost anyone to operate a computer without any special training. Another
significant feature of the OS is device management. Device management is in charge of all the
computer system's hardware devices. It may also encompass the administration of the storage
device as well as all the computer system's input & output devices.

Device management is responsible for the following tasks: Device & component-level drivers,
as well as associated software, are installed. Using the packaged OS, business/workflow
software, and/or other hardware components, configure a device so that it functions as planned.
Putting in place security procedures and safeguards.

The state of each device, such as storage drivers, printers, and other peripheral devices, is being
monitored. Furthermore, predefined rules and decisions about which process receives the
device, when and for how long can be enforced, as well as the allocation and efficient release
of the device.

What Are the Four Main Functions Involved in Device Management?

Monitoring the state of each device, applying current policies to decide which processes will
receive a device and for how long, allocating and dealing to locating devices at the process and
job levels are the four primary responsibilities. They are:

∙ open and close device drivers


∙ communicate with device drivers
∙ control and monitor device drivers
∙ write and install device drivers

Operating System as Resource Manager


Let us understand how the operating system works as a Resource Manager.
● Now-a-days all modern computers consist of processors, memories, timers, network
interfaces, printers, and so many other devices.
● The operating system provides for an orderly and controlled allocation of the processors,
memories, and I/O devices among the various programs in the bottom-up view. ∙
Operating system allows multiple programs to be in memory and run at the same time. ∙
Resource management includes multiplexing or sharing resources in two different ways:
in time and in space.
● In time multiplexed, different programs take a chance of using CPU. First one tries to use
the resource, then the next one that is ready in the queue and so on. For example: Sharing
the printer one after another.
● In space multiplexing, Instead of the customers taking a chance, each one gets part of the
resource. For example − Main memory is divided into several running programs, so each
one can be resident at the same time.
Database Management Systems:

database is a collection of interrelated data that helps in the efficient retrieval, insertion, and
deletion of data from the database and organizes the data in the form of tables, views, schemas,
reports, etc. For Example, a university database organizes the data about students, faculty,
admin staff, etc. which helps in the efficient retrieval, insertion, and deletion of data from it.

What is DBMS?

A Database Management System (DBMS) is a software system that is designed to manage and
organize data in a structured manner. It allows users to create, modify, and query a database, as
well as manage the security and access controls for that database. DBMS provides an
environment to store and retrieve data in convenient and efficient manner.

What structures exist in a relational database?

Relational databases include the following structures:

Database

A database is a logical grouping of data. It contains a set of related table spaces and index
spaces. Typically, a database contains all the data that is associated with one application or with
a group of related applications. You could have a payroll database or an inventory database,
for example.

Table

A table is a logical structure made up of rows and columns. Rows have no fixed order, so if
you retrieve data you might need to sort the data. The order of the columns is the order specified
when the table was created by the database administrator. At the intersection of every column
and row is a specific data item called a value, or, more precisely, an atomic value. A table is
named with a high-level qualifier of the owner's user ID followed by the table name, for
example TEST.DEPT or PROD.DEPT. There are three types of tables:
A base table that is created and holds persistent data

A temporary table that stores intermediate query results

A results table that is returned when you query tables.

Figure 1. Example of a DB2 table (department table)


In this table we use:
Columns–The ordered set of columns are DEPTNO, DEPTNAME, MGRNO, and
ADMRDEPT. All the data in a given column must be of the same data type. It is also called
attribute.

Rows–Each row contains data for a single department. It is also called as tuple.

Values–At the intersection of a column and row is a value. For example, PLANNING is the
value of the DEPTNAME column in the row for department B01.

Creating an index automatically creates the index space, the data set that contains the index.
Keys

A key is one or more columns that are identified as such in the creation of a table or index, or
in the definition of referential integrity.

Primary key

A table can only have one primary key because it defines the entity. There are two
requirements for a primary key:

It must have a value, that is, it cannot be null. It must be unique, that is, it must have a unique
index defined on it.

Unique key

We already know that a primary key must be unique, but it is possible to have more than one
unique key in a table. In our EMP table example, the employee number is defined as the primary
key and is therefore unique. If we also had a social security value in our table, hopefully that
value would be unique.

Foreign key

A foreign key is a key that is specified in a referential integrity constraint to make its
existence dependent on a primary or unique key (parent key) in another table.
The example given is that of an employee's work department number relating to the primary
key defined on the department number in the DEPT table. This constraint is part of the
definition of the table.

Data Models

Data Models in DBMS


∙ Hierarchical Model.
∙ Network Model.
∙ Entity-Relationship Model.
∙ Relational Model.
∙ Object-Oriented Data Model.
∙ Object-Relational Data Model.
∙ Semi-Structured Data Model.

Data Model is the modeling of the data description, data semantics, and consistency constraints
of the data. It provides the conceptual tools for describing the design of a database at each level
of data abstraction.
Therefore, there are following four data models used for understanding the structure of the
database:

1) Relational Data Model: This type of model designs the data in the form of rows and
columns within a table. Thus, a relational model uses tables for representing data and in
between relationships. Tables are also called relations. This model was initially described by
Edgar F. Codd, in 1969. The relational data model is the widely used model which is
primarily used by commercial data processing applications.

2) Entity-Relationship Data Model: An ER model is the logical representation of data as


objects and relationships among them. These objects are known as entities, and relationship is
an association among these entities. It was widely used in database designing. A set of attributes
describe the entities. For example, student_name, student_id describes the 'student' entity. A
set of the same type of entities is known as an 'Entity set', and the set of the same type of
relationships is known as 'relationship set'.

Using symbols we can draw ER Data model.

Entity-

Attribute-

Relation-

3) Object-based Data Model: An extension of the ER model with notions of functions,


encapsulation, and object identity, as well. This model supports a rich type system that
includes structured and collection types. Here, the objects are nothing but the data carrying its
properties.

4) Semi-structured Data Model: This type of data model is different from the other three data
models (explained above). The semi-structured data model allows the data specifications at
places where the individual data items of the same type may have different attributes sets. The
Extensible Markup Language, also known as XML, is widely used for representing the semi
structured data. Although XML was initially designed for including the markup information
to the text document, it gains importance because of its application in the exchange of data.

5) Hierarchical Model
This concept uses a hierarchical tree structure to organise the data. The hierarchy begins at the
root, which contains root data, and then grows into a tree as child nodes are added to the
parent node. If you wish to learn more about the hierarchical model, click here.

6) Network Model
The main difference between this model and the hierarchical model is that any record can
have several parents in the network model. It uses a graph instead of a hierarchical tree. If you
wish to learn more about the network model, click here.

What is RDBMS (Relational Database Management System)

RDBMS stands for Relational Database Management System.

All modern database management systems like SQL, MS SQL Server, IBM DB2, ORACLE,
My-SQL, and Microsoft Access are based on RDBMS.

It is called Relational Database Management System (RDBMS) because it is based on the


relational model introduced by E.F. Codd.

How it works

Data is represented in terms of tuples (rows) in RDBMS.


A relational database is the most commonly used database. It contains several tables, and each
table has its primary key.

Due to a collection of an organized set of tables, data can be accessed easily in

RDBMS. Brief History of RDBMS

From 1970 to 1972, E.F. Codd published a paper to propose using a relational database

model. RDBMS is originally based on E.F. Codd's relational model invention.

Following are the various terminologies of RDBMS:

What is table/Relation?
Everything in a relational database is stored in the form of relations. The RDBMS database
uses tables to store data. A table is a collection of related data entries and contains rows and
columns to store data. Each table represents some real-world objects such as person, place, or
event about which information is collected. The organized collection of data into a relational
table is known as the logical view of the database.
Properties of a Relation:

o Each relation has a unique name by which it is identified in the database.


o Relation does not contain duplicate tuples.
o The tuples of a relation have no specific order.
o All attributes in a relation are atomic, i.e., each cell of a relation contains exactly one
value.

A table is the simplest example of data stored in RDBMS.

Let's see the example of the student table.


ID Name AGE COURSE
1 Ajeet 24 B.Tech

2 aryan 20 C.A

3 Mahesh 21 BCA

4 Ratan 22 MCA

5 Vimal 26 BSC

What is a row or record?

A row of a table is also called a record or tuple. It contains the specific information of each
entry in the table. It is a horizontal entity in the table. For example, The above table contains 5
records.

Properties of a row:

o No two tuples are identical to each other in all their entries.


o All tuples of the relation have the same format and the same number of entries. o The
order of the tuple is irrelevant. They are identified by their content, not by their position.

Let's see one record/row in the table.


ID Name AGE COURSE

1 Ajeet 24 B.Tech

What is a column/attribute?

A column is a vertical entity in the table which contains all information associated with a
specific field in a table. For example, "name" is a column in the above table which contains all
information about a student's name.
Properties of an Attribute:

o Every attribute of a relation must have a name.


o Null values are permitted for the attributes.
o Default values can be specified for an attribute automatically inserted if no other value
is specified for an attribute.
o Attributes that uniquely identify each tuple of a relation are the primary key.

What is data item/Cells?

The smallest unit of data in the table is the individual data item. It is stored at the intersection
of tuples and attributes.

Properties of data items:

o Data items are atomic.


o The data items for an attribute should be drawn from the same domain.
In the below example, the data item in the student table consists of Ajeet, 24 and Btech, etc.
ID Name AGE COURSE

1 Ajeet 24 B.Tech

Degree:

The total number of attributes that comprise a relation is known as the degree of the

table. For example, the student table has 4 attributes, and its degree is 4.

ID Name AGE COURSE

1 Ajeet 24 B.Tech

2 aryan 20 C.A
3 Mahesh 21 BCA

4 Ratan 22 MCA

5 Vimal 26 BSC

Cardinality:

The total number of tuples at any one time in a relation is known as the table's cardinality. The
relation whose cardinality is 0 is called an empty table.

Domain:

The domain refers to the possible values each attribute can contain. It can be specified using
standard data types such as integers, floating numbers, etc. For example, An attribute entitled
Marital_Status may be limited to married or unmarried values.

NULL Values

The NULL value of the table specifies that the field has been left blank during record creation.
It is different from the value filled with zero or a field that contains space.

SQL
SQL is a database computer language designed for the retrieval and management of data in a
relational database. SQL stands for Structured Query Language. This tutorial will give you
a quick start to SQL. It covers most of the topics required for a basic understanding of SQL and
to get a feel of how it works.

Why to Learn SQL?

SQL is Structured Query Language, which is a computer language for storing, manipulating
and retrieving data stored in a relational database.
SQL is the standard language for Relational Database System. All the Relational Database
Management Systems (RDMS) like MySQL, MS Access, Oracle, Sybase, Informix, Postgres
and SQL Server use SQL as their standard database language.
Also, they are using different dialects, such as −

∙ MS SQL Server using T-SQL,


∙ Oracle
using PL/SQL,
∙ MS Access version of SQL is called JET SQL (native format) etc.
Database Languages
● Data Definition Language
● Data Manipulation Language
● Data Control Language
● Transactional Control Language
● Data Query Language

Data Definition Language (DDL)


DDL is the short name for Data Definition Language, which deals with database schemas and
descriptions, of how the data should reside in the database.

CREATE: to create a database and its objects like (table, index, views, store procedure, function,
and triggers)
ALTER: alters the structure of the existing database
DROP: delete objects from the database
RENAME: rename an object

Data Manipulation Language (DML)


DML is the short name for Data Manipulation Language which deals with data manipulation and
includes most common SQL statements such INSERT, UPDATE, DELETE, etc., and it is used to
store, modify, retrieve, delete and update data in a database.
INSERT: insert data into a table
UPDATE: updates existing data within a table
DELETE: Delete all records from a database table

Data Control Language (DCL)


DCL is short for Data Control Language which acts as an access specifier to the database.(basically
to grant and revoke permissions to users in the database

GRANT: grant permissions to the user for running DML(SELECT, INSERT, DELETE,…)
commands on the table
REVOKE: revoke permissions to the user for running

Transactional Control Language (TCL)


TCL is short for Transactional Control Language which acts as an manager for all types of
transactional data and all transactions. Some of the command of TCL are
Roll Back: Used to cancel or Undo changes made in the database
Commit: It is used to apply or save changes in the database
Data Query Language (DQL)
Data query language(DQL) is the subset of “Data Manipulation Language”. The most common
command of DQL is the SELECT statement. SELECT statement helps us in retrieving the data from
the table without changing anything or modifying the table. DQL is very important for retrieval of
essential data from a database.

Applications of SQL
As mentioned before, SQL is one of the most widely used query language over the databases.
I'm going to list few of them here:
● Allowsusers to access data in the relational database management systems.
● Allows users to describe the data.
● Allows users to define the data in a database and manipulate that data. ∙ Allows to embed
within other languages using SQL modules, libraries & pre-compilers. ∙ Allows users to
create and drop databases and tables.
● Allows users to create view, stored procedure, functions in a database.
● Allows users to set permissions on tables, procedures and views.

Database Transactions
Transaction in Database Management Systems (DBMS) can be defined as a set of logically related
operations. It is the result of a request made by the user to access the contents of the database and
perform operations on it. It consists of various operations and has various states in its completion
journey. It also has some specific properties that must be followed to keep the database consistent.
Operations of Transaction. A user can make different types of requests to access and modify the
contents of a database. So, we have different types of operations relating to a transaction. They are
discussed as follows:

i) Read(X)
A read operation is used to read the value of X from the database and store it in a buffer in the main
memory for further actions such as displaying that value. Such an operation is performed when a
user wishes just to see any content of the database and not make any changes to it. For example,
when a user wants to check his/her account's balance, a read operation would be performed on user's
account balance from the database.

ii) Write(X)
A write operation is used to write the value to the database from the buffer in the main memory. For
a write operation to be performed, first a read operation is performed to bring its value in buffer, and
then some changes are made to it, e.g. some set of arithmetic operations are performed on it
according to the user's request, then to store the modified value back in the database, a write
operation is performed.
For example, when a user requests to withdraw some money from his account, his account balance is
fetched from the database using a read operation, then the amount to be deducted from the account is
subtracted from this value, and then the obtained value is stored back in the database using a write
operation.

iii) Commit
This operation in transactions is used to maintain integrity in the database. Due to some failure of
power, hardware, or software, etc., a transaction might get interrupted before all its operations are
completed. This may cause ambiguity in the database, i.e. it might get inconsistent before and after
the transaction.
To ensure that further operations of any other transaction are performed only after work of the
current transaction is done, a commit operation is performed to the changes made by a transaction
permanently to the database.

iv) Rollback
This operation is performed to bring the database to the last saved state when any transaction is
interrupted in between due to any power, hardware, or software failure. In simple words, it can be
said that a rollback operation does undo the operations of transactions that were performed before its
interruption to achieve a safe state of the database and avoid any kind of ambiguity or inconsistency.

A transaction is a series of operations, so various states occur in its completion journey. They are
discussed as follows:
i) Active
● It is the first stage of any transaction when it has begun to execute. The execution of the
transaction takes place in this state.
● Operations such as insertion, deletion, or updation are performed during this state.
● During this state, the data records are under manipulation and they are not saved to the
database, rather they remain somewhere in a buffer in the main memory.

ii) Partially Committed


● This state of transaction is achieved when it has completed most of the operations and is
executing its final operation.
● It can be a signal to the commit operation, as after the final operation of the transaction
completes its execution, the data has to be saved to the database through the commit
operation.
● If some kind of error occurs during this state, the transaction goes into a failed state, else it
goes into the Committed state.

iii) Commited
This state of transaction is achieved when all the transaction-related operations have been executed
successfully along with the Commit operation, i.e. data is saved into the database after the required
manipulations in this state. This marks the successful completion of a transaction.

iv) Failed
If any of the transaction-related operations cause an error during the active or partially committed
state, further execution of the transaction is stopped and it is brought into a failed state. Here, the
database recovery system makes sure that the database is in a consistent state.

v) Aborted
If the error is not resolved in the failed state, then the transaction is aborted and a rollback operation
is performed to bring database to the the last saved consistent state. When the transaction is aborted,
the database recovery module either restarts the transaction or kills it.

Properties of Transaction
As transactions deal with accessing and modifying the contents of the database, they must have some
basic properties which help maintain the consistency and integrity of the database before and after
the transaction. Transactions follow 4 properties, namely, Atomicity, Consistency, Isolation, and
Durability. Generally, these are referred to as ACID properties of transactions in DBMS. ACID is
the acronym used for transaction properties. A brief description of each property of the transaction is
as follows.
i) Atomicity
This property ensures that either all operations of a transaction are executed or it is aborted. In any
case, a transaction can never be completed partially.

ii) Consistency
This property of a transaction keeps the database consistent before and after a transaction is
completed. Execution of any transaction must ensure that after its execution, the database is either in
its prior stable state or a new stable state.

iii) Isolation
This property states that two transactions must not interfere with each other, i.e. if some data is used
by a transaction for its execution, then any other transaction can not concurrently access that data
until the first transaction has completed.

iv) Durability
This property ensures that the changes made to the database after a transaction is completely
executed, are durable. In the event of any system failures or crashes, the consistent state achieved
after the completion of a transaction remains intact.

Data Centers

At its simplest, a data center is a physical facility that organizations use to house their critical
applications and data. A data center's design is based on a network of computing and storage
resources that enable the delivery of shared applications and data. The key components of a data
center design include routers, switches, firewalls, storage systems, servers, and application-
delivery controllers.

Why are data centers important to business?


In the world of enterprise IT, data centers are designed to support business applications and
activities that include:
∙ Email and file sharing
∙ Productivity applications
∙ Customer relationship management (CRM)
∙ Enterprise resource planning (ERP) and databases
∙ Big data, artificial intelligence, and machine learning
∙ Virtual desktops, communications and collaboration services

What are the core components of a data center?


Data center design includes routers, switches, firewalls, storage systems, servers, and application
delivery controllers. Because these components store and manage business-critical data and
applications, data center security is critical in data center design. Together, they provide:
Network infrastructure. This connects servers (physical and virtualized), data center services,
storage, and external connectivity to end-user locations.
Storage infrastructure. Data is the fuel of the modern data center. Storage systems are used to
hold this valuable commodity.
Computing resources. Applications are the engines of a data center. These servers provide the
processing, memory, local storage, and network connectivity that drive applications.
How do data centers operate?
Data center services are typically deployed to protect the performance and integrity of the
core data center components.
Network security appliances. These include firewall and intrusion protection to safeguard the
data center.
Application delivery assurance. To maintain application performance, these mechanisms
provide application resiliency and availability via automatic failover and load balancing.

What is in a data center facility?


Data center components require significant infrastructure to support the center's hardware and
software. These include power subsystems, uninterruptible power supplies (UPS), ventilation,
cooling systems, fire suppression, backup generators, and connections to external networks.

What are the standards for data center infrastructure?


The most widely adopted standard for data center design and data center infrastructure is
ANSI/TIA-942. It includes standards for ANSI/TIA-942-ready certification, which ensures
compliance with one of four categories of data center tiers rated for levels of redundancy and
fault tolerance.
Tier 1: Basic site infrastructure. A Tier 1 data center offers limited protection against physical
events. It has single-capacity components and a single, nonredundant distribution path. Tier 2:
Redundant-capacity component site infrastructure. This data center offers improved
protection against physical events. It has redundant-capacity components and a single,
nonredundant distribution path.
Tier 3: Concurrently maintainable site infrastructure. This data center protects against virtually
all physical events, providing redundant-capacity components and multiple independent
distribution paths. Each component can be removed or replaced without disrupting services to
end users.
Tier 4: Fault-tolerant site infrastructure. This data center provides the highest levels of fault
tolerance and redundancy. Redundant-capacity components and multiple independent
distribution paths enable concurrent maintainability and one fault anywhere in the installation
without causing downtime.

Types of data centers


Many types of data centers and service models are available. Their classification depends on
whether they are owned by one or many organizations, how they fit (if they fit) into the
topology of other data centers, what technologies they use for computing and storage, and even
their energy efficiency. There are four main types of data centers:

Enterprise data centers


These are built, owned, and operated by companies and are optimized for their end users.
Most often they are housed on the corporate campus.
Managed services data centers
These data centers are managed by a third party (or a managed services provider) on behalf of
a company. The company leases the equipment and infrastructure instead of buying it.

Colocation data centers


In colocation ("colo") data centers, a company rents space within a data center owned by others
and located off company premises. The colocation data center hosts the infrastructure: building,
cooling, bandwidth, security, etc., while the company provides and manages the components,
including servers, storage, and firewalls.

Cloud data centers


In this off-premises form of data center, data and applications are hosted by a cloud services
provider such as Amazon Web Services (AWS), Microsoft (Azure), or IBM Cloud or other
public cloud provider.

Cloud services

Cloud services are infrastructure, platforms, or software that are hosted by third-party
providers and made available to users through the internet.

Cloud services facilitate the flow of user data from front-end clients (e.g., users’ servers, tablets,
desktops, laptops—anything on the users’ ends), through the internet, to the provider’s systems,
and back. Cloud services promote the building of cloud-native applications and the flexibility
of working in the cloud. Users can access cloud services with nothing more than a computer,
operating system, and internet connectivity.

Examples:

All infrastructure, platforms, software, or technologies that users access through the internet
without requiring additional software downloads can be considered cloud computing
services—including the following as-a-Service solutions.

Clouds are IT environments that abstract, pool, and share scalable resources across a network.
Clouds enable cloud computing, which is the act of running workloads within a cloud
environment. Clouds are a type of PaaS, because hardware and an application software
platform is provided by another party.

How do cloud services work?


Like all other IT solutions, cloud services rely on hardware and software. However, unlike
traditional hardware and software solutions, users don’t need anything other than a computer,
network connection, and operating system to access cloud services.
Cloud infrastructure
When supplying users with a cloud infrastructure, cloud services providers detach computing
capabilities from hardware components, such as separating:

∙ Processing power from central processing units (CPUs)


∙ Active memory from random access memory (RAM) chips
∙ Graphics processing from the graphics processing units (GPUs)
∙ Data storage availability from data centers or hard drives.
This abstraction is typically accomplished through virtualization and virtual machines. Once
separated, the storage, compute, and networking components are provided to users through the
internet as infrastructure—or IaaS. This kind of cloud service has led to the rise of cloud
storage, which stores big data as part of the Internet of Things (IOT). RackSpace is an example
of an IaaS provider.

Cloud platforms
Cloud service providers can also use their hardware resources to create cloud platforms, which
are online environments where users can develop code or run apps. Building a cloud platform
requires more than abstracting a computer’s capabilities from its hardware components— like
providing cloud infrastructure. Providing a cloud platform requires additional levels of
development to incorporate technologies like containerization, orchestration, application
programming interfaces (APIs), routing, security, management, and automation. User
experience design (UX) is also an important consideration in order to create a navigable online
experience.

Cloud platforms are a type of PaaS. And if the infrastructural components holding up the PaaS
are highly scalable and sharable, it might be considered a cloud. The best examples of PaaS
clouds include public clouds and managed private cloud.

You might also like