(Ebook) Cloud Computing Basics by T.B. Rehman & PHD
(Ebook) Cloud Computing Basics by T.B. Rehman & PHD
com
https://ebooknice.com/product/cloud-computing-
basics-49849326
OR CLICK HERE
DOWLOAD EBOOK
https://ebooknice.com/product/cloud-computing-basics-33326848
ebooknice.com
ebooknice.com
ebooknice.com
(Ebook) The Complete Cloud Computing Manual by coll.
https://ebooknice.com/product/the-complete-cloud-computing-
manual-11716372
ebooknice.com
https://ebooknice.com/product/the-cloud-computing-journey-55077838
ebooknice.com
ebooknice.com
https://ebooknice.com/product/cloud-computing-for-beginners-36080518
ebooknice.com
https://ebooknice.com/product/cloud-computing-tricks-and-tips-22069104
ebooknice.com
Cloud
Computing
Basics
This publication, portions of it, or any accompanying software may not be reproduced in any way,
stored in a retrieval system of any type, or transmitted by any means, media, electronic display or
mechanical display, including, but not limited to, photocopy, recording, Internet postings, or scanning,
without prior permission in writing from the publisher.
The publisher recognizes and respects all marks used by companies, manufacturers, and developers
as a means to distinguish their products. All brand names and product names mentioned in this book
are trademarks or service marks of their respective companies. Any omission or misuse (of any kind) of
service marks or trademarks, etc. is not an attempt to infringe on the property of others.
Our titles are available for adoption, license, or bulk purchase by institutions, corporations, etc. For
additional information, please contact the Customer Service Dept. at 800-232-0223(toll free).
All of our titles are available in digital format at authorcloudware.com and other digital vendors. The
sole obligation of Mercury Learning and Information to the purchaser is to replace the book, based on
defective materials or faulty workmanship, but not based on the operation or functionality of the product.
Chapter 5: Deals with cloud management concepts like scalable, fault tol-
erance, resiliency, provisioning, asset management, cloud governance, high
availability, disaster recovery, and multi-tenancy.
Chapter 6: Details cloud information security fundamentals, architecture,
and challenges.
Chapter 7: Provides case studies on various cloud providers and cloud
services.
1
OVERVIEW OF THE
COMPUTING PARADIGM
Automatic computing has changed the way humans can solve problems
and the different ways in which problems can be solved. Computing has
changed the perception and even the world more than any other innovation
in the recent past. Still, a lot of revolution is going to happen in computing.
Understanding computing provides deep insights and generates reasoning
in our minds about our universe.
Over the last couple of years, there has been an increased interest in
reducing computing processors’ powers. This chapter aims to understand
different distributed computing technologies like peer to peer, cluster, utility,
grid, cloud, fog and jungle computing, and make comparisons between them.
standalone computers. Computer clusters have each node set to carry out
the same tasks, controlled and scheduled by software. The components of
a cluster are connected to each other through fast local area networks as
shown in Figure 1.4. Clustered computer systems have proven to be effec-
tive in handling a heavy workload with large datasets. Deploying a cluster
increases performance and fault tolerance.
customer as per the need, and charges them for specific usage rather than
a fixed rate. It has an advantage of being low cost with no initial setup cost
to afford the computer resources. This repackaging of computing services is
the foundation of the shift to on-demand computing, software as a service,
and cloud computing models.
The customers need not to buy all the hardware, software, and licenses
to do business. Instead, the customer relies on another party to provide these
services. Utility computing is one of the most popular IT service models pri-
marily because of the flexibility and economy it provides. This model is based
on that used by conventional utilities such as telephone services, electricity,
and gas. Customers have access to
a virtually unlimited supply of com-
puting solutions over the Internet
or a virtual private network (VPN),
which can be used whenever, wher-
ever required. The back-end infra-
structure and computing resources
management and delivery are gov-
erned by the provider. Utility com-
puting solutions can include virtual
software, virtual servers, virtual
storage, backup, and many more IT
solutions. Multiplexing, multitask-
ing, and virtual multitenancy have
brought us to the utility computing
business as shown in Figure 1.5. FIGURE 1.5 Utility computing
All the patient data is collected by the wireless ECG sensor which then
forwards it to the mobile device via Bluetooth without user intervention.
Client software on the mobile device transmits the data to the ECG anal-
ysis web service, which is hosted by a cloud computing-based software
stack. This communication can happen with a home wireless gateway or
directly via the mobile’s data connectivity (e.g. mobile 3G network).
The analysis software carries out numerous computations on the received
data taking the reference from the existing demographic data and the
patient’s historic data. Computations concern comparison, classification
and systematic diagnosis of heartbeats, which can be time-consuming
when done for long time periods for a large number of consumers.
The software then appends the latest results to the patient’s historic
record maintained in private and secure cloud-based storage so that
authenticated users can access it anytime from anywhere. Physicians
will later interpret the features extracted from the ECG waveform and
decide whether the heartbeat belongs to the normal (healthy) sinus
rhythm or to an appropriate class of arrhythmia.
The diagnosis results are sent to the patient’s mobile device and/or moni-
tor, the doctor and/or emergency services at predefined intervals.
The monitoring and computing processes are repeated according to
user’s preferences, which may be hourly or daily over a long period of
time.
Once the task is completed, the middleware makes the results available
for visualization through the portal. The advantage of using cloud technol-
ogies (i.e., Aneka as scalable cloud middleware) versus conventional grid
infrastructures is the capability to leverage a scalable computing infrastruc-
ture that can be grown and shrunk on demand.
1.3.3 CRM
The distinctive traits of cloud computing are its efforts at providing
value-added trustee services, maximizing flexible integration of computing
resources, and advancing cost-saving IT services. To provide value-added
trustee services, the cloud should be capable of identifying the customer
relationship communities and answering for users’ innovation strategies. To
maximize flexible integration of computing resources, the clouds should be
in both human computing resources and electronic computing resources.
Many computing tasks are usually more suitable for humans to process than
for electronic computing machines. Integrating the human computing abil-
ity or crowd computing ability into the cloud can enhance its processing
capabilities with the help of vast human brains dispersed on the Internet.
This means that the cloud should be competent enough to track cus-
tomer information and understand the ways its users interact. Social CRM
plays an important role in supporting a value-added trustee service and
exploiting human computing resources in cloud computing. CRM involves
attracting new profitable customers and forming tighter bonds with existing
ones. Since online social communities and conversations carry heavy con-
sequences for companies, social CRM integrates social networks into the
traditional CRM capabilities. Information gained through social CRM ini-
tiatives can support the development of marketing strategies by developing
the organization’s knowledge in areas such as identifying a customer rela-
tionship community, improving customer retention, and improving product
offerings by better understanding customer needs. Customer relationship
(CR) network as a kind of social network uses a vertex for a customer and
a link for the relationship between two vertexes. Many online cloud com-
puting services rely on virtual communities that spontaneously emerge and
continuously evolve. So, clarifying the explicit boundaries of these commu-
nities is quite essential to ensure service qualification. Communities with
overlapping features or prominent vertexes are typically irregular commu-
nities. The traditional community identification algorithms cannot identify
these irregular topologies. Customer Relationship plays a very important
role network in CRM. With an uneven shape, these communities usually
play a prominent role in finding prominent customers who are usually
ignored in social CRM.
1.3.4 ERP
Cloud computing is a service that offers reliable IT infrastructure and soft-
ware services off the user premises, thereby saving the cost of hardware,
2
ROADMAP FOR CLOUD
COMPUTING
On-demand Self-service
A consumer can get access to computing capabilities such as storage and
server time as required, without any human interaction with a cloud service
provider. Cloud service providers providing on-demand self-services include
Google, Microsoft, Amazon Web Services (AWS), IBM, and Salesforce.com.
Resource Pooling
The cloud enables users to enter and use data within business management
software hosted on the cloud at the same time, from any location and at
any time. The computing resources are pooled to serve multiple consum-
ers using a multitenant model, with different physical and virtual resources
dynamically assigned and reassigned according to consumer demand. The
user is usually unaware of the exact location of cloud provider resources.
Measured Service
This is the straightforward idea that the consumers only pay for the
resources they consume. The cloud provider can measure the storage levels,
processing, and bandwidth used and the consumers are billed appropriately.
The resources that are being used can be monitored and controlled from
both the consumer’s side and cloud provider’s side, resulting in transparency.
Cloud computing services use a metering capability which helps to control
and optimize resource use. This implies that just like an electricity bill, the
IT services are also charged according to use—pay per use. The bill amount
varies with the usage of IT services by the consumers; the more they utilize,
the higher the bill amount.
Rapid Elasticity
The cloud is flexible and scalable. Consumers can quickly and easily add
or remove software features and other resources to suit their immediate
business needs. Cloud services can be rapidly and elastically provisioned
automatically.
Security
Security issues hinder the acceptance of cloud computing. The security
issues such as botnet, data loss and phishing are a serious threat to an orga-
nization’s data and applications.
Interoperability
This is the ability of two or more systems to work together in order to
exchange information and use that exchanged information. Many public
cloud networks are not designed to interact with each other and are con-
figured as closed systems. This lack of integration between networks makes
it difficult for organizations to combine their IT systems on the cloud and
realize productivity gains and cost savings. To overcome this challenge,
industry standards must be developed to help cloud service providers design
interoperable platforms and enable data portability. Organizations need to
Multitenancy
When multiple customers access the same hardware, application servers, and
databases, the response time and performance for other customers may be
affected. For application-layer multitenancy specifically, resources are shared
at each infrastructure layer and have valid security and performance concerns.
Server Consolidation
Server consolidation is an effective approach to maximizing resource uti-
lization while minimizing energy consumption in a cloud computing envi-
ronment. Live VM migration technology is often used to consolidate virtual
machines residing on multiple underutilized servers on to a single server so
that the remaining servers can be set to an energy-saving state.
such as during slow network connections. One of the cases identified due to
the unreliability of on-demand software is Apple’s MobileMe cloud service,
which stores and synchronizes data across multiple devices. It begins when
many users are not able to access mail and synchronize data correctly. To avoid
such problems, providers are turning to technologies such as Google Gears,
Adobe AIR, and Curl that allow cloud-based applications to run locally; some
even allow them to run in the absence of a network connection.
There are different reasons for adopting the cloud—a few reasons are
described below:
Dynamic allocation, scaling and movement of applications
Pay per use
No long-term commitments
Operating system and application architecture independent
No hardware or software installation required
The sectors that can benefit from this adoption are IT and technology,
education, manufacturing and business and professional services.
IT and technology: With cloud adoption, IT and technology companies
can provide a greater level of service to support a more complex IT
infrastructure.
Education: Geographical location is no longer a barrier to acquiring
education. Cloud services can not only enhance the knowledge sharing
but also foster team collaborations.
Application Services
The application instances represent the agreement between service provider
and the consumer to use services on an on-demand basis. It is guaranteed
that at a given point of time the services or the resources will be surely avail-
able for consumers, once the reservation of the resources has been made.
Self-service Portal
Self-service portal is a facility provided by the cloud to consumers. It sup-
ports the account owners signing up and using the purchased capacity. Users
can request a machine or an entire multi-machine environment as well as
monitor and control it using a web-based self-service portal.
Allocation Engine
Dynamic resource management provides automated allocation and realloca-
tion of resources. Dynamic resource management is a key component of any
cloud solution that maximizes efficiency.
Resource Automation
Cloud ensures that the resources are automatically and effectively utilized as
and when they are required by the consumers.
Metering of Resources
With the help of the metering of resources on any cloud, user organizations
can bring transparency to the business and environment for the manage-
ment to view the usage of resources.
Application Development
Applications that use cloud computing benefit from its capability of dynam-
ically scaling on demand. One class of applications that takes the biggest
advantage of these features is a web application. With Web 2.0, the web has
become a platform for developing complex and rich application including
enterprise applications that leverage the Internet as the preferred chan-
nel for service delivery and user interaction. These are the applications
that involve variable workload, dynamic size of infrastructure and service
deployment.
Another class of applications that can potentially gain considerable
advantage by using cloud computing is represented by resource-intensive
applications. These can be either data-intensive or computation-intensive
applications. A considerable amount of resources are required for
complete execution of these applications in a reasonable time frame. It is
worth noticing that a large number of resources are not needed constantly
or for a long duration.
Service Management
The cloud provides visibility, control, and automation across all the business
and IT assets to deliver higher value services.
Asset Management
The cloud maximizes the value of the critical business and IT assets over
their lifecycle with industry tailored asset management solutions.
Information Infrastructure
The cloud helps businesses achieve information compliance (regulation),
availability, retention, and security objectives.
Security
The cloud provides end-to-end industry-customized governance, risk man-
agement, and compliance for businesses.
Resilience
The cloud ensures the continuity of business and IT operations while rapidly
adapting, and responding to risks and opportunities.
up the licensing fees for multiple users in a company can prove to be very
expensive. The cloud, on the other hand, is available at much cheaper rates
and can significantly lower the company’s IT expenses (pay-as-you-go and
other scalable options).
ii. Unlimited Storage
Storing information on the cloud provides an almost unlimited storage
capacity.
iii. Backup and Recovery
Since all the data is stored on the cloud, backing it up and restoring it is rela-
tively easier than storing the data on a physical device. The entire process of
backup and recovery becomes much simpler than other traditional methods.
iv. Automatic Software Integration
Software integration is usually something that occurs automatically on the
cloud. This means that cloud users don’t have to make additional efforts to
customize and integrate their applications.
v. Easy Access to Information
Once users register on the cloud, they can access their information from
anywhere via an Internet connection. This convenient feature lets users
overcome time zone and geographic location issues.
vi. Quick Deployment
Cloud computing gives the advantage of quick deployment. The entire sys-
tem can be fully functional in a matter of a few minutes. Of course, the
amount of time taken depends on the kind of technology that is needed for
the business.
vii. Scalability
Cloud computing makes it easier for an organization to scale their services
according to the demand of clients. The consumer business can scale up
or scale down the operation and storage needs quickly to suit the situation,
allowing flexibility as the needs change. Rather than purchasing and install-
ing expensive upgrades, the cloud service provider can handle this for the
consumer. Using the cloud, the consumer frees up their time so that they can
get on with running their business.
Cloud computing also has its disadvantages. Businesses, especially
smaller ones, need to be aware of these aspects before using the services
provided on the cloud. The major disadvantages of cloud computing are
detailed below.
i. Technical Issues
Though it is true that information and data on the cloud can be accessed
any time and from anywhere, there might be instances when the system can
have some serious malfunctions. Businesses should be aware of the fact that
this technology is always prone to outages and other technical issues. Even
the best cloud service providers face these issues, in spite of ensuring high
standards of maintenance.
ii. Security on the Cloud
Security of data is the other major issue of cloud computing technology.
Before adopting this technology, users should be aware of the risks of surren-
dering their confidential data to third-party cloud service providers. Users
need to be sure that they choose the most reliable service provider who will
ensure the security of their data. Storing information on the cloud can make
companies vulnerable to external hack attacks and threats. Therefore, there
is always the lurking possibility of theft of sensitive data.
iii. Vendor Lock-In
Organizations may find it difficult to migrate their services from one vendor
to another. Hosting and integrating current cloud applications on another
platform may come up with issues like interoperability and support systems.
Although cloud service providers promise that the cloud will be flexible to
use and integrate, switching cloud services has not yet completely evolved.
iv. Possible Downtime
Cloud computing makes the customer business dependent on the reliability
of their Internet connection. If the Internet connection is offline, the cus-
tomer won’t be able to access any of their applications, servers, or data from
the cloud.
v. Limited Control
The service provider is responsible for managing and monitoring the cloud
infrastructure, so customers have minimal control over it. The customer can
only control and manage the data, applications, and services operated on
top of the cloud. The key administrative tasks such as server shell access,
updating and firmware management may not be passed to the customer or
end user.
3
CLOUD VIRTUALIZATION
TECHNOLOGY
3.1 VIRTUALIZATION
Virtualization refers to technologies that are designed to provide a layer
of abstraction between layers of hardware and software that decouples
the physical hardware from the operating system. Virtualization helps
with simplified interaction between these two layers, delivering greater IT
resource utilization, and flexibility.
A virtual machine monitor example is shown in Figure 3.2 where the cus-
tomer management environment runs on top of Operating System 1 (OS1)
and the testing environment runs on top of Operating System 2 (OS2). Both
the operating systems run on top of the virtual machine monitor (VMM).
The virtualizations of all the resources (e.g., processors, memory, secondary
storage, and networks) are being carried by VMM and it also allocates them
to the various virtual machines that run on top of the VMM.
EXTRACTED HONEY.
As before intimated, extracted honey has all the flavor, and is in
every way equal, if not superior—comb itself is innutritious, and very
indigestible—to comb-honey. When people once know its excellence
—know that it is not "strained"—let us, as apiarists, strive in every
way to kill that word—then the demand for this article will be vastly
increased, to the advantage both of the consumer and the apiarist.
Explain to each grocer what we mean by the word extracted, and
ask him to spread wide the name and character of the honey. Leave
cups of the honey with the editors and men of influence, and get
them to discuss its origin and merits. I speak from experience, when
I say that in these ways the reputation and demand for extracted
honey can be increased to a surprising degree, and with astonishing
rapidity.
COMB-HONEY.
This, from its wondrous beauty, especially when light-colored and
immaculate, will always be a coveted article for the table, and will
ever, with proper care, bring the highest price paid for honey. So it
will always be best to work for this, even though we may not be able
to procure it in such ample profusion as we may the extracted. He
who has all kinds, will be able to satisfy every demand, and will most
surely meet with success.
RULES TO BE OBSERVED.
This, too, should be chiefly in small sections (Fig, 50), for, as
before stated, such are the packages that surely sell. Sections from
four to six inches square will just fill a plate nicely, and look very
tempting to the proud house-wife, especially if some epicurean
friends are to be entertained.
The sections should surely be in place at the dawn of the white
clover season, so that the apiarist may secure the most of this
irresistible nectar, chaste as if capped by the very snow itself. They
should be taken away as soon as capped, as delay makes them
highways of travel for the bees, which always mar their beauty.
When removed, if demanded, glass the sections, but before this,
we should place them in hives one upon another, or special boxes
made tight, with a close cover, in which to store either brood-frames
in winter or sections at any season, and sulphur them. This is quickly
and easily done by use of the smoker. Get the fire in the smoker well
to burning, add the sulphur, then place this in the top hive, or top of
the special box. The sulphurous fumes will descend and deal out
death to all moth larvæ. This should always be done before shipping
the honey, if we regard our reputations as precious. It is well to do
this immediately upon removal, and also two weeks after, so as to
destroy the moth larvæ not hatched when the sections are removed.
If separators have been used, these sections are in good
condition to be glassed, and are also in nice shape to ship even
without glass, as they may stand side by side and not mar the comb.
Fig. 71.
Fig. 72.
In groceries, where the apiarist keeps honey for sale, it will pay
him to furnish his own boxes. These should be made of white-wood,
very neat, and glassed in front to show the honey, and the cover so
fixed that unglassed sections—and these, probably, will soon
become the most popular—cannot be punched or fingered. Be sure,
too, that the label, with kind of honey, grade, and name of apiarist,
be so plain that "he who runs may read."
Comb-honey that is to be kept in the cool weather of autumn, or
the cold of winter, must be kept in warm rooms, or the comb will
break from the section when handled. By keeping it quite warm for
some days previous to shipment, it may be sent to market even in
winter, but must be handled very carefully, and must make a quick
transit.
Above all, let "taste and neatness" ever be your motto.
CHAPTER XVI.
HONEY PLANTS.
As bees do not make honey, but only gather it, and as honey is
mainly derived from certain flowers, it of course follows that the
apiarist's success will depend largely upon the abundance of honey-
secreting plants in the vicinity of his apiary. True it is that certain bark
and plant lice secrete a kind of liquid sweet—honey of doubtful
reputation—which, in the dearth of anything better, the bees seem
glad to appropriate. I have thus seen the bees thick about a large
bark-louse which attacks the tulip tree, and thus often destroys one
of our best honey trees. This is an undescribed species of the genus
Lecanium. I have also seen them thick about three species of plant
lice. One, the Pemphigus imbricator, Fitch, works on the beech tree.
Its abdomen is thickly covered with long wool, and it makes a
comical show as it wags this up and down upon the least
disturbance. The leaves of trees attacked by this louse, as also
those beneath the trees, are fairly gummed with a sweetish
substance. I have found that the bees avoid this substance, except
at times of extreme drouth and long protracted absence of honeyed
bloom. It was the source of no inconsiderable stores during the
terribly parched autumn of Chicago's great disaster. (See Appendix,
page 286).
Another species of Pemphigus gives rise to certain solitary plum-
like galls, which appear on the upper surface of the red elm. These
galls are hollow, with a thin skin, and within the hollows are the lice,
which secrete an abundant sweet that often attracts the bees to a
feast of fat things, as the gall is torn apart, or cracks open, so that
the sweet exudes. This sweet is anything but disagreeable, and may
not be unwholesome to the bees.
Another aphis, of a black hue, works on the branches of our
willows, which they often entirely cover, and thus greatly damage
another tree valuable for both honey and pollen. Were it not that they
seldom are so numerous two years in succession, they would
certainly banish from among us one of our most ornamental and
valuable honey-producing trees. These are fairly thronged in
September and October, and not unfrequently in spring and summer
if the lice are abundant, by bees, wasps, ants, and various two-
winged flies, all eager to lap, up the oozing sweets. This louse is
doubtless the Lachnus dentatus, of Le Baron, and the Aphis salicti,
of Harris.
Bees also get, in some regions, a sort of honey-dew, which
enables them to add to their stores with surprising rapidity. I
remember one morning while riding on horse-back along the
Sacramento river, in California, I broke off a willow twig beside the
road when, to my surprise, I found it was fairly decked with drops of
honey. Upon further examination I found the willow foliage was
abundantly sprinkled by these delicious drops. These shrubs were
undisturbed by insects, nor were they under trees. Here then was a
real case of honey-dew, which must have been distilled through the
night by the leaves. I never saw any such phenomenon in Michigan,
yet others have. Dr. A. H. Atkins, an accurate and conscientious
observer, has noted this honey-dew more than once here in Central
Michigan.
Bees also get some honey from oozing sap, some of
questionable repute from about cider mills, some from grapes and
other fruit which have been crushed, or eaten and torn by wasps and
other insects. That bees ever tear the grapes is a question of which I
have failed to receive any personal proof, though for years I have
been carefully seeking it. I have lived among the vineyards of
California, and have often watched bees about vines in Michigan, but
never saw bees tear open the grapes. I have laid crushed grapes in
the apiary, when the bees were not gathering, and were ravenous for
stores, which, when covered with sipping bees, were replaced with
sound grape-clusters, which in no instance were mutilated. I have
thus been led to doubt if bees ever attack sound grapes, though
quick to improve the opportunities which the oriole's beak and the
stronger jaws of wasps offer them. Still, Prof. Riley feels sure that
bees are sometimes thus guilty, and Mr. Bidwell tells me he has
frequently seen bees rend sound grapes, which they did with their
feet. Yet, if this is the case, it is certainly of rare occurrence, and is
more than compensated by the great aid which the bees afford the
fruit-grower in the great work of cross-fertilization, which is
imperatively necessary to his success, as has been so well shown
by Dr. Asa Gray and Mr. Chas. Darwin. It is true that cross-
fertilization of the flowers, which can only be accomplished by
insects, and early in the season by the honey-bee, is often, if not
always, necessary to a full yield of fruit and vegetables. I am
informed by Prof W. W. Tracy, that the gardeners in the vicinity of
Boston keep bees that they may perform this duty. Even then, if Mr.
Bidwell and Prof. Riley are right, and the bee does, rarely—for surely
this is very rare, if ever—destroy grapes, still they are, beyond any
possible question, invaluable aids to the pomologist.
But the principal source of honey is still from the flowers.
APRIL PLANTS.
As we have already seen, the apiarist does not secure the best
results, even in the early spring, except the bees are encouraged by
the increase of their stores of pollen and honey; hence, in case we
do not practice stimulative feeding—and many will not—it becomes
very desirable to have some early bloom. Happily, in all sections of
the United States our desires are not in vain.
Early in spring there are many scattering wild flowers, as the
blood-root (Sanguinaria canadensis), liver-leaf (Hepatica acutiloba),
and various others of the crowfoot family, as also many species of
cress, which belong to the mustard family, etc., all of which are
valuable and important.
The maples (Fig, 73), which are all valuable honey plants, also
contribute to the early stores. Especially valuable are the silver
maples (Acer dasycarpum), and the red or soft maples (Acer
rubrum), as they bloom so very early, long before the leaves appear.
The bees work on these, here in Michigan, the first week of April,
and often in March. They are also magnificent shade trees,
especially those that have the weeping habit. Their early bloom is
very pleasing, their summer form and foliage beautiful, while their
flaming tints in autumn are indescribable. The foreign maples,
sycamore, Acer pseudo-platanus, and Norway, Acer platanoides, are
also very beautiful. Whether superior to ours as honey plants, I am
unable to say.
The willows, too (Fig, 74), rival the maples in the early period of
bloom. Some are very early, blossoming in March, while others, like
the white willow (Salix alba) (Fig, 74), bloom in May. The flowers on
one tree or bush of the willow are all pistillate, that is, have pistils,
but no stamens, while on others they are all staminate, having no
pistils. On the former, they can gather only honey, on the latter only
pollen. That the willow furnishes both honey and pollen is attested by
the fact that I saw both kinds of trees, the pistillate and the
staminate, thronged with bees the past season. The willow, too, from
its elegant form and silvery foliage, is one of our finest shade trees.
Fig. 15.—
Judas Tree
MAY PLANTS.
Fig. 78.—
Barberry.
In California, the sumac, the coffee berry, and the famous white
sage (Fig, 79), keep the bees full of activity.
Fig. 79.—White Sage.
JUNE PLANTS.
Fig. 80.—White or
Dutch Clover.
With June comes the incomparable white or Dutch clover,
Trifolium repens (Fig, 80), whose chaste and modest bloom
betokens the beautiful, luscious, and unrivalled sweets which are
hidden in its corolla tube. Also its sister, Alsike or Swedish, Trifolium
hybrida (Fig, 81), which seems to resemble both the white and red
clover. It is a stronger grower than the white, and has a whitish
blossom tinged with pink. This forms excellent pasture and hay for
cattle, sheep, etc., and may well be sown by the apiarist. It will often
pay apiarists to furnish neighbor farmers with seed as an inducement
to grow this par excellent honey plant. Like white clover, it blooms all
through June into July. Both of these should be sown early in spring
with timothy, five or six pounds of seed to the acre, in the same
manner that red clover seed is sown.
Fig. 81.—Alsike Clover.
Fig. 82.—Melilot
Clover.
Fig. 83.—Borage.
Sweet clover, yellow and white, Melilotus officinalis (Fig, 82), and
Melilotus alba, are well named. They bloom from the middle of June
to the middle of July. Their perfume scents the air for long distances,
and the hum of bees that throng their flowers is like music to the
apiarist's ear. The honey, too, is just exquisite. These clovers are
biennial, not blooming the first season, and dying after they bloom
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebooknice.com