0% found this document useful (0 votes)
35 views6 pages

Characteristics of Cloud Computing

Uploaded by

Partha Sen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views6 pages

Characteristics of Cloud Computing

Uploaded by

Partha Sen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Characteristics of Cloud Computing

1. On-demand self-services: The Cloud computing services does not


require any human administrators, user themselves are able to provision,
monitor and manage computing resources as needed.
2. Broad network access: The Computing services are generally provided
over standard networks and heterogeneous devices.
3. Rapid elasticity: The Computing services should have IT resources that
are able to scale out and in quickly and on a need basis. Whenever the
user require services it is provided to him and it is scale out as soon as its
requirement gets over.
4. Resource pooling: The IT resource (e.g., networks, servers, storage,
applications, and services) present are shared across multiple
applications and occupant in an uncommitted manner. Multiple clients are
provided service from a same physical resource.

5. Measured service: The resource utilization is tracked for each


application and occupant, it will provide both the user and the resource
provider with an account of what has been used. This is done for various
reasons like monitoring billing and effective use of resource.
6. Multi-tenancy: Cloud computing providers can support multiple tenants
(users or organizations) on a single set of shared resources.
7. Virtualization: Cloud computing providers use virtualization technology to
abstract underlying hardware resources and present them as logical
resources to users.
8. Resilient computing: Cloud computing services are typically designed
with redundancy and fault tolerance in mind, which ensures high
availability and reliability.
9. Flexible pricing models: Cloud providers offer a variety of pricing
models, including pay-per-use, subscription-based, and spot pricing,
allowing users to choose the option that best suits their needs.
10. Security: Cloud providers invest heavily in security measures to
protect their users’ data and ensure the privacy of sensitive information.
11. Automation: Cloud computing services are often highly automated,
allowing users to deploy and manage resources with minimal manual
intervention.
12. Sustainability: Cloud providers are increasingly focused on
sustainable practices, such as energy-efficient data centers and the use
of renewable energy sources, to reduce their environmental impact.

A brief introduction on composability in cloud computing


Composability in Cloud Computing refers to the ability to dynamically combine and
reconfigure various cloud resources and services to meet specific application needs. In
a composable cloud environment, resources such as compute, storage, and networking
can be assembled like building blocks to create tailored solutions. This approach
enhances flexibility, scalability, and efficiency, enabling organizations to optimize their
cloud infrastructure according to changing requirements. Composability also supports
automation and orchestration, making it easier to manage complex workloads and
accelerate the deployment of new applications.

Infrastructure, Platforms

In cloud computing, Infrastructure and Platforms are two key service models that
provide different levels of abstraction and control to users:

1. Infrastructure as a Service (IaaS):

o IaaS provides virtualized computing resources over the internet, including


servers, storage, and networking.

o Users have control over the operating systems, applications, and runtime
environments while relying on the cloud provider for the underlying
hardware infrastructure.

o Examples: Amazon Web Services (AWS) EC2, Microsoft Azure, Google


Compute Engine.
2. Platform as a Service (PaaS):

o PaaS offers a higher level of abstraction by providing a platform that


includes not just infrastructure but also middleware, development tools,
and databases.

o Users can focus on developing and deploying applications without


worrying about managing the underlying infrastructure or runtime
environment.

o Examples: Google App Engine, Microsoft Azure App Services, Heroku.

These models allow organizations to choose the right level of control and convenience,
depending on their needs and expertise.

A table outlining the similarities and differences between Infrastructure as a Service


(IaaS) and Platform as a Service (PaaS):

Aspect Infrastructure as a Service Platform as a Service (PaaS)


(IaaS)

Control Full control over OS, Limited control; focus is on


applications, and application deployment and
configurations management

Abstraction Lower level of abstraction Higher level of abstraction


Level

Responsibility User manages OS, runtime, User manages only applications


applications, and data and data

Scalability Highly scalable, but user must Automatically scalable as part of


configure scaling the platform

Management User handles patching, Cloud provider manages the


updates, and maintenance underlying infrastructure

Customization Highly customizable Less customizable, more focused


on application development

Use Cases Best for scenarios needing Best for rapid application
custom infrastructure setups development and deployment

Examples AWS EC2, Google Compute Google App Engine, Microsoft


Engine, Microsoft Azure VM Azure App Services, Heroku
Virtual appliances

Virtual Appliances are pre-configured software packages, including an operating system


and applications, designed to run on virtualized environments like cloud platforms or
hypervisors. They simplify deployment by bundling everything needed to run specific
software, eliminating the need for manual setup. Virtual appliances are typically
distributed as virtual machine images and can be quickly deployed in various
environments. They are widely used for purposes like deploying firewalls, databases, or
development tools, offering ease of use, consistency, and the ability to replicate
environments across different platforms.

Communication protocols

Communication Protocols are standardized rules and conventions that govern how
data is transmitted and received across networks and between devices. They ensure
reliable and efficient data exchange by defining the structure, timing, and error-checking
methods of communication. Key aspects include:

 Data Format: Specifies how data is formatted for transmission.

 Error Handling: Defines methods for detecting and correcting errors.

 Data Compression: Techniques for reducing the size of data to improve


efficiency.

 Session Management: Rules for establishing, maintaining, and terminating


connections.

Examples include:

 HTTP/HTTPS: For web communication.

 TCP/IP: For reliable, connection-oriented communication.

 UDP: For faster, connectionless communication.

 SMTP: For email transmission.

Protocols ensure interoperability and effective communication across diverse systems


and networks.

Applications

Communication Protocols are essential for enabling seamless interaction between


devices and applications over networks. They are used in various domains, including:
1. Web Communication: HTTP (Hypertext Transfer Protocol) and its secure
version, HTTPS, are fundamental for web browsing, allowing clients and servers
to exchange web pages and data securely.

2. Email: SMTP (Simple Mail Transfer Protocol) manages the sending of emails,
while POP3 (Post Office Protocol) and IMAP (Internet Message Access Protocol)
handle email retrieval and storage.

3. File Transfer: FTP (File Transfer Protocol) and SFTP (Secure File Transfer
Protocol) facilitate the transfer of files between systems, ensuring reliable and
secure data exchange.

4. Networking: TCP (Transmission Control Protocol) provides reliable, connection-


oriented communication, while UDP (User Datagram Protocol) offers faster,
connectionless data transmission. Both are part of the TCP/IP suite, which
underpins most of the internet.

5. Voice and Video: SIP (Session Initiation Protocol) and RTP (Real-time
Transport Protocol) are used for establishing and managing voice and video calls
over IP networks, supporting applications like VoIP and video conferencing.

6. IoT: MQTT (Message Queuing Telemetry Transport) and CoAP (Constrained


Application Protocol) are lightweight protocols designed for efficient
communication in Internet of Things (IoT) environments.

These protocols ensure compatibility, reliability, and efficiency across different


applications and devices, enabling smooth and secure data exchange.

Connecting to the Cloud by Clients

Connecting to the Cloud by Clients involves establishing a secure and efficient link
between a user's device and cloud services. This process typically includes several key
steps:

1. Authentication: Clients authenticate themselves using credentials such as


usernames and passwords, multi-factor authentication (MFA), or API keys. This
ensures that only authorized users can access the cloud resources.

2. Network Connection: Clients connect to the cloud via the internet using
standard network protocols like HTTP/HTTPS. This connection may be
established through various means, including direct internet access, VPNs
(Virtual Private Networks), or dedicated leased lines for higher security and
performance.
3. API Integration: Many cloud services offer APIs (Application Programming
Interfaces) that allow clients to interact programmatically with cloud resources.
Through RESTful or SOAP APIs, clients can manage, query, and manipulate
data and services.

4. Client Applications: Users connect to cloud services using applications or web


browsers. These applications interact with cloud infrastructure to access data,
perform computations, or manage resources.

5. Data Security: Secure communication channels, such as SSL/TLS, are used to


encrypt data transmitted between clients and cloud services, protecting it from
interception and tampering.

These steps ensure that clients can securely and efficiently access cloud resources,
leveraging the scalability and flexibility of cloud computing.

You might also like