0% found this document useful (0 votes)
19 views71 pages

(Ebook) Cloud Computing Basics by T.B. Rehman & PHD

The document provides an overview of various ebooks related to cloud computing, including titles by T.B. Rehman and Anders Lisdorf. It includes links to download these ebooks in multiple formats and outlines the contents of 'Cloud Computing Basics,' covering topics such as cloud architecture, management, and security. Additionally, it contains licensing information and disclaimers regarding the use of the content.

Uploaded by

anisormamais
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views71 pages

(Ebook) Cloud Computing Basics by T.B. Rehman & PHD

The document provides an overview of various ebooks related to cloud computing, including titles by T.B. Rehman and Anders Lisdorf. It includes links to download these ebooks in multiple formats and outlines the contents of 'Cloud Computing Basics,' covering topics such as cloud architecture, management, and security. Additionally, it contains licensing information and disclaimers regarding the use of the content.

Uploaded by

anisormamais
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 71

Download the Full Ebook and Access More Features - ebooknice.

com

(Ebook) Cloud Computing Basics by T.B. Rehman &


PhD

https://ebooknice.com/product/cloud-computing-
basics-49849326

OR CLICK HERE

DOWLOAD EBOOK

Download more ebook instantly today at https://ebooknice.com


Instant digital products (PDF, ePub, MOBI) ready for you
Download now and discover formats that fit your needs...

Start reading on any device today!

(Ebook) Cloud Computing Basics by Anders Lisdorf ISBN


9781484269206, 1484269209

https://ebooknice.com/product/cloud-computing-basics-33326848

ebooknice.com

(Ebook) The Basics of Cloud Computing: Understanding the


Fundamentals of Cloud Computing in Theory and Practice by
Derrick Rountree, Ileana Castrillo ISBN 9780124059320,
0124059325
https://ebooknice.com/product/the-basics-of-cloud-computing-
understanding-the-fundamentals-of-cloud-computing-in-theory-and-
practice-4431308
ebooknice.com

(Ebook) Cloud Computing Basics: A Non-Technical


Introduction by Anders Lisdorf ISBN 9781484269213,
1484269217
https://ebooknice.com/product/cloud-computing-basics-a-non-technical-
introduction-23654932

ebooknice.com

(Ebook) Cloud Computing Cloud Computing for Secure and


Smart Applications 2021 by Mohammad R. Khosravi, Qiang He,
Haipeng Dai ISBN 9783030991906, 3030991903
https://ebooknice.com/product/cloud-computing-cloud-computing-for-
secure-and-smart-applications-2021-43851692

ebooknice.com
(Ebook) The Complete Cloud Computing Manual by coll.

https://ebooknice.com/product/the-complete-cloud-computing-
manual-11716372

ebooknice.com

(Ebook) The Cloud Computing Journey by Divit Gupta

https://ebooknice.com/product/the-cloud-computing-journey-55077838

ebooknice.com

(Ebook) Cloud Computing – CLOUD 2018 by Min Luo, Liang-Jie


Zhang ISBN 9783319942940, 9783319942957, 3319942948,
3319942956
https://ebooknice.com/product/cloud-computing-cloud-2018-7152126

ebooknice.com

(Ebook) Cloud Computing For Beginners by - ISBN


9781912847099, 1912847094

https://ebooknice.com/product/cloud-computing-for-beginners-36080518

ebooknice.com

(Ebook) Cloud Computing, Tricks And Tips ISBN


9781912847501, 1912847507

https://ebooknice.com/product/cloud-computing-tricks-and-tips-22069104

ebooknice.com
Cloud
Computing
Basics

Cloud-Computing_CH00-FM-2pp.indd 1 23-11-2018 14:16:41


LICENSE, DISCLAIMER OF LIABILITY, AND LIMITED WARRANTY
By purchasing or using this book (the “Work”), you agree that this license grants
permission to use the contents contained herein, but does not give you the right
of ownership to any of the textual content in the book or ownership to any of the
information or products contained in it. This license does not permit uploading of the
Work onto the Internet or on a network (of any kind) without the written consent of
the Publisher. Duplication or dissemination of any text, code, simulations, images,
etc. contained herein is limited to and subject to licensing terms for the respective
products, and permission must be obtained from the Publisher or the owner of the
content, etc., in order to reproduce or network any portion of the textual material (in
any media) that is contained in the Work.
Mercury Learning and Information (“MLI” or “the Publisher”) and anyone in-
volved in the creation, writing, production, accompanying algorithms, code, or com-
puter programs (“the software”), and any accompanying Web site or software of the
Work, cannot and do not warrant the performance or results that might be obtained
by using the contents of the Work. The author, developers, and the Publisher have
used their best efforts to insure the accuracy and functionality of the textual material
and/or programs contained in this package; we, however, make no warranty of any
kind, express or implied, regarding the performance of these contents or programs.
The Work is sold “as is” without warranty (except for defective materials used in
manufacturing the book or due to faulty workmanship).
The author, developers, and the publisher of any accompanying content, and anyone
involved in the composition, production, and manufacturing of this work will not be
liable for damages of any kind arising out of the use of (or the inability to use) the
algorithms, source code, computer programs, or textual material contained in this
publication. This includes, but is not limited to, loss of revenue or profit, or other
incidental, physical, or consequential damages arising out of the use of this Work.
The sole remedy in the event of a claim of any kind is expressly limited to replace-
ment of the book and only at the discretion of the Publisher. The use of “implied
warranty” and certain “exclusions” vary from state to state, and might not apply to
the purchaser of this product.

Cloud-Computing_CH00-FM-2pp.indd 2 23-11-2018 14:16:41


Cloud
Computing
Basics

T.B. Rehman, PhD

MERCURY LEARNING AND INFORMATION


Dulles, Virginia
Boston, Massachusetts
New Delhi

Cloud-Computing_CH00-FM-2pp.indd 3 23-11-2018 14:16:44


Copyright ©2019 by Mercury Learning and Information LLC. All rights reserved.
ISBN: 978-1-68392-350-3. Reprinted and revised with permission.

Original Title and Copyright: Cloud Computing.


Copyright ©2018 by New Age International (P) Ltd. Publishers. All rights reserved.
ISBN : 978-93-86418-41-8

This publication, portions of it, or any accompanying software may not be reproduced in any way,
stored in a retrieval system of any type, or transmitted by any means, media, electronic display or
mechanical display, including, but not limited to, photocopy, recording, Internet postings, or scanning,
without prior permission in writing from the publisher.

Publisher: David Pallai


Mercury Learning and Information
22841 Quicksilver Drive
Dulles, VA 20166
[email protected]
www.merclearning.com
1-800-232-0223

T.B. Rehman. Cloud Computing Basics.


ISBN: 978-1-68392-350-3

The publisher recognizes and respects all marks used by companies, manufacturers, and developers
as a means to distinguish their products. All brand names and product names mentioned in this book
are trademarks or service marks of their respective companies. Any omission or misuse (of any kind) of
service marks or trademarks, etc. is not an attempt to infringe on the property of others.

Library of Congress Control Number: 2018913004


181920321 Printed on acid-free paper in the United States of America.

Our titles are available for adoption, license, or bulk purchase by institutions, corporations, etc. For
additional information, please contact the Customer Service Dept. at 800-232-0223(toll free).

All of our titles are available in digital format at authorcloudware.com and other digital vendors. The
sole obligation of Mercury Learning and Information to the purchaser is to replace the book, based on
defective materials or faulty workmanship, but not based on the operation or functionality of the product.

Cloud-Computing_CH00-FM-2pp.indd 4 23-11-2018 14:16:44


CONTENTS
Prefacexi

Chapter 1: Overview of the Computing Paradigm 1


1.1 Recent Trends in Distributed Computing 1
1.1.1 Peer to Peer Computing 3
1.1.2 Cluster Computing 3
1.1.3 Utility Computing 4
1.1.4 Grid Computing 5
1.1.5 Cloud Computing 6
1.1.6 Fog Computing 7
1.1.7 Jungle Computing 8
1.1.8 Comparison of Various Computing Technologies 9
1.2 Vision of Cloud Computing 10
1.3 Cloud Application 11
1.3.1 ECG Analysis on the Cloud 11
1.3.2 Protein Structure Prediction Applications in
Biology12
1.3.3 CRM 14
1.3.4 ERP 14
1.3.5 Social Networking 16
Chapter 2: Roadmap for Cloud Computing 17
2.1 Characteristics of Cloud Computing 17
2.2 Challenges of Cloud Computing 19
2.3 Cloud Adoption and Rudiments 22

Cloud-Computing_CH00-FM-2pp.indd 5 23-11-2018 14:16:44


vi • Contents

2.4 Cloud Computing Environments 25


2.5 Cloud Service Requirements 26
2.6 Cloud and Dynamic Infrastructure 27
2.7 Pros and Cons of Cloud Computing 27
Chapter 3: Cloud Virtualization Technology 31
3.1 Virtualization 32
3.1.1 Virtualization Characteristic 34
3.1.2 Virtualization Types 34
3.2 Virtualization Benefits 35
3.3 Hypervisor Management Software 36
3.3.1 Advantages of Hypervisor-based Systems 39
3.3.2 Hypervisors Classification 39
3.4 Virtualization Applications 41
3.4.1 Storage Virtualization 41
3.4.2 Network Virtualization 47
3.4.3 Desktop Virtualization 49
3.4.4 Compute Virtualization 52
3.4.5 Application Virtualization 53
3.4.6 Server Virtualization 54
Chapter 4: Cloud Computing Architecture 57
4.1 Service Oriented Computing 57
4.1.1 Service Oriented Architecture [SOA] 60
4.1.2 Service Oriented Architecture Services 61
4.1.3 Service Oriented Architecture Working 62
4.1.4 Service Oriented Architecture Benefits 65
4.2 The NIST Model 66
4.3 Cloud Reference Model 67
4.4 Cloud Deployment Models/Type of Cloud 74
4.5 Federated Cloud/ Inter Cloud 77
4.5.1 Cloud Federation Stack 78
4.6 Cloud Services 81
4.7 Cloud Solution 83

Cloud-Computing_CH00-FM-2pp.indd 6 23-11-2018 14:16:44


Contents • vii

4.8 Cloud Ecosystem 83


4.9 Cloud Business Process Management 84
4.9.1 Business Process Management (BPM)
Lifecycle85
4.10 Cloud Service Management 85
4.11 Cloud Offerings 86
4.12 Cloud Analytics 86
4.13 Testing Under Cloud 88
4.14 Introduction to Mapreduce 90
4.15 Hadoop Framework 91
4.15.1 Hadoop Architecture 92
4.15.2 Hadoop Advantages 94
4.16 Hadoop Distributed File System (HDFS) 94
4.16.1 HDFS Features 95
4.16.2 HDFS Architecture 95
4.16.3 Goals of HDFS 96
Chapter 5: Cloud Management 99
5.1 Cloud Management Platform 99
5.2 Scalability 100
5.3 Fault Tolerance 101
5.4 Resiliency 102
5.5 Provisioning 103
5.6 Asset Management 105
5.7 Cloud Governance 106
5.8 High Availability 107
5.9 Disaster Recovery 108
5.10   Multi-Tenancy 108
Chapter 6: Cloud Security 111
6.1 Cloud Computing Security Challenges 111
6.1.1 Deployment Model Challenges 111
6.1.2 Service Model Challenges 113
6.1.3 Network Challenges 115

Cloud-Computing_CH00-FM-2pp.indd 7 23-11-2018 14:16:44


viii • Contents

6.2 Cloud Information Security Fundamentals 116


6.3 Cloud Information Architecture 118
6.3.1 Information Dispersion 120
6.3.2 Information Management 120
6.3.3 Data Security Lifecycle 120
6.3.4 Information Governance 121
6.3.5 Data Security 122
6.3.6 Data Loss Prevention 122
6.3.7 Database and File Activity Monitoring 122
6.4 Cloud Security Services 123
6.5 Cloud Computing Security Architecture 124
6.5.1 Design Principles 125
6.5.2 Secure Cloud Requirements 126
6.5.3 Policy Implementation 128
6.5.4 Virtualization Security Management 129
6.6 Security Measures by Cloud Provider and Customer 134
6.6.1 Security by Cloud Providers 134
6.6.2 Security by Cloud Customers 135
6.7 Security Issues in the Cloud Deployment Models 136
6.7.1 Security Issues in Public Cloud 137
6.7.2 Security issues in Private Cloud 137
Chapter 7: Case Study 139
7.1 Market Oriented Cloud Computing (MOCC) 139
7.1.1 Market Oriented Architecture for Datacenters 141
7.2 Third Party Cloud Service 143
7.3 Google App Engine 145
7.3.1 Google Application Engine Architecture 146
7.3.2 Pros and Cons of Google App Engine 148
7.4 Microsoft Azure 149
7.4.1 Windows Azure Compute 149
7.4.2 Windows Azure Storage 151
7.4.3 Windows Azure Fabric 151
7.4.4 SQL Azure 152
7.4.5 Real World Implementation Example 153

Cloud-Computing_CH00-FM-2pp.indd 8 23-11-2018 14:16:44


Contents • ix

7.5 Amazon Web Services 154


7.6 Aneka 166
7.6.1 Aneka Architecture 167
7.7 Salesforce 168
7.8 Eucalyptus 170
7.8.1 Components of Eucalyptus 171
References175
Index179

Cloud-Computing_CH00-FM-2pp.indd 9 23-11-2018 14:16:44


Cloud-Computing_CH00-FM-2pp.indd 10 23-11-2018 14:16:44
PREFACE
This book was motivated by the desire to help students and professionals
explore and understand cloud computing. This book is designed for use as a
primary textbook for a course in cloud computing or as a resource for profes-
sionals seeking to explore the latest advances in cloud services. It also acts as
a launch pad for companies seeking to educate their IT professionals about
the potential opportunities of cloud computing.
The book highlights the recent developments in distributed computing and
it details the architecture, virtualization concepts, and security concerns of
cloud computing. It also provides a detailed understanding of the benefits
of cloud computing that can encourage enterprises to switch to the cloud.
A thorough understanding of the cloud and its business processes is required
to make the transition to the cloud. A number of books cover the various
aspects of cloud computing, but very few books incorporate such a wide vari-
ety of topics in such a structured format. In this book, each topic has been
covered in detail in terms of scope, content, and also from an examination
point of view. A number of research papers and eminent journals have been
taken as references in order to ensure high quality content and authentic
information.
Chapters 1 and 2: Provide a basic understanding of the computing paradigm
and the concept of cloud computing.
Chapter 3: Describes virtualization technology and its applications.
Chapter 4: Gives a brief introduction to cloud computing, its architecture,
and the Hadoop Distributed File System (HDFS).

Cloud-Computing_CH00-FM-2pp.indd 11 23-11-2018 14:16:45


xii • Preface

Chapter 5: Deals with cloud management concepts like scalable, fault tol-
erance, resiliency, provisioning, asset management, cloud governance, high
availability, disaster recovery, and multi-tenancy.
Chapter 6: Details cloud information security fundamentals, architecture,
and challenges.
Chapter 7: Provides case studies on various cloud providers and cloud
services.

Cloud-Computing_CH00-FM-2pp.indd 12 23-11-2018 14:16:45


CHAPTER

1
OVERVIEW OF THE
COMPUTING PARADIGM

Automatic computing has changed the way humans can solve problems
and the different ways in which problems can be solved. Computing has
changed the perception and even the world more than any other innovation
in the recent past. Still, a lot of revolution is going to happen in computing.
Understanding computing provides deep insights and generates reasoning
in our minds about our universe.
Over the last couple of years, there has been an increased interest in
reducing computing processors’ powers. This chapter aims to understand
different distributed computing technologies like peer to peer, cluster, utility,
grid, cloud, fog and jungle computing, and make comparisons between them.

1.1 RECENT TRENDS IN DISTRIBUTED COMPUTING


A method of computer processing in which different parts of a program are
executed simultaneously on two or more computers that are communicating
with each other over a network is termed distributed computing. In dis-
tributed computing, the processing requires that a program be segmented
into sections that can run simultaneously; it is also required that the division
of the program should consider different environments on which the differ-
ent sections of the program will be executing. Three significant characteris-
tics of distributed systems are concurrency of components, lack of a global
clock and independent failure of components.

Cloud-Computing_CH01-3pp.indd 1 07-11-2018 18:25:29


2 • Cloud Computing Basics

A program that runs in a distributed system is called a distributed


program, and distributed programming is the process of writing such pro-
grams. Distributed computing also refers to solving computational problems
using the distributed systems. Distributed computing is a model in which
resources of a system are shared among multiple computers to improve effi-
ciency and performance as shown in Figure 1.1.

FIGURE 1.1 Workflow of distributed systems

A distributed computing system has the following characteristics:


„„ It consists of several independent computers connected via a communi-
cation network.
„„ The message is being exchanged over the network for communication.
„„ Each computer has its own memory and clock and runs its own operat-
ing system.
„„ Remote resources are accessed through the network.
Various classes of distributed computing are shown in Figure 1.2 and will be
discussed further in the subsequent sections.

FIGURE 1.2 Taxonomy of distributed computing

Cloud-Computing_CH01-3pp.indd 2 07-11-2018 18:25:29


Overview of the Computing Paradigm • 3

1.1.1 Peer to Peer Computing


When computers moved into mainstream use, personal computers (PCs)
were connected together through LANs (Local Area Networks) to central
servers. These central servers were much more powerful than the PCs, so
any large data processing can take place on these servers. PCs have now
become much more powerful, and capable enough to handle the data pro-
cessing locally rather than on central servers. Due to this, peer-to-peer (P2P)
computing can now occur when individual computers bypass central servers
to connect and collaborate directly with each other.
A peer is a computer that behaves as a client in the client/server model.
It also contains an additional layer of software that allows it to perform server
functions. The peer computer can respond to requests from other peers by
communicating a message over the network.
P2P computing refers to a class of systems and applications that employ
distributed resources to perform a critical function in a decentralized man-
ner. The resources encompass computing power, data (storage and content),
network bandwidth, and presence
(computers, humans and other
resources) [3]. P2P computing is a
network-based computing model
for applications where comput-
ers share resources and services
via direct exchange as shown in
Figure 1.3.
Technically, P2P provides the
opportunity to make use of vast
untapped resources that go unused FIGURE 1.3 Peer to peer network
without it. These resources include
processing power for large-scale computations and enormous storage poten-
tial. The P2P mechanism can also be used to eliminate the risk of a single
point of failure. When P2P is used within the enterprise, it may be able to
replace some costly data center functions with distributed services between
­clients. Storage, for data retrieval and backup, can be placed on clients. P2P
applications build up functions such as storage, computations, messaging,
security, and file distribution through direct exchanges between peers.

1.1.2 Cluster Computing


Cluster computing consists of a collection of interconnected standalone
computers cooperatively working together as a single integrated comput-
ing resource to take advantage of the parallel processing power of those

Cloud-Computing_CH01-3pp.indd 3 07-11-2018 18:25:29


4 • Cloud Computing Basics

standalone computers. Computer clusters have each node set to carry out
the same tasks, controlled and scheduled by software. The components of
a cluster are connected to each other through fast local area networks as
shown in Figure 1.4. Clustered computer systems have proven to be effec-
tive in handling a heavy workload with large datasets. Deploying a cluster
increases performance and fault tolerance.

FIGURE 1.4 Cluster computing

Some major advantages of cluster computing are manageability, single


system image and high availability. In the cluster software is automatically
installed and configured, and the nodes of the cluster can be added and
managed easily. So, it is an open system that is very easy to deploy and cost-­
effective to acquire and manage. Cluster computing contains some disad-
vantages also. It is hard to manage cluster computing without experience.
When the size of the cluster is large, it is difficult to find out if something
fails. Its programming environment is hard to be improved when software
on some node is different from the other.
The use of clusters as a computing platform is not just limited to scien-
tific and engineering applications; there are many business applications that
benefit from the use of clusters. This technology improves the performance
of applications by using parallel computing on different machines and also
enables the shared use of distributed resources.

1.1.3 Utility Computing


Utility computing is a service provisioning model in which a service provider
makes computing resources and infrastructure management available to the

Cloud-Computing_CH01-3pp.indd 4 07-11-2018 18:25:29


Overview of the Computing Paradigm • 5

customer as per the need, and charges them for specific usage rather than
a fixed rate. It has an advantage of being low cost with no initial setup cost
to afford the computer resources. This repackaging of computing services is
the foundation of the shift to on-demand computing, software as a service,
and cloud computing models.
The customers need not to buy all the hardware, software, and licenses
to do business. Instead, the customer relies on another party to provide these
services. Utility computing is one of the most popular IT service models pri-
marily because of the flexibility and economy it provides. This model is based
on that used by conventional utilities such as telephone services, electricity,
and gas. Customers have access to
a virtually unlimited supply of com-
puting solutions over the Internet
or a virtual private network (VPN),
which can be used whenever, wher-
ever required. The back-end infra-
structure and computing resources
management and delivery are gov-
erned by the provider. Utility com-
puting solutions can include virtual
software, virtual servers, virtual
storage, backup, and many more IT
solutions. Multiplexing, multitask-
ing, and virtual multitenancy have
brought us to the utility computing
business as shown in Figure 1.5. FIGURE 1.5 Utility computing

1.1.4 Grid Computing


A scientist studying proteins logs into a computer using an entire network of
computers to analyze data. A businessman accesses his company’s network
through a Personal Digital Assistant in order to forecast the future of a par-
ticular stock. An army official accesses and coordinates computer resources
on three different military networks to formulate a battle strategy. All these
scenarios have one thing in common: they rely on a concept called grid com-
puting. At its most basic level, grid computing is a computer network in
which each computer’s resources are shared with every other computer in
the system. Processing power, memory and data storage are all community
resources that authorized consumers can tap into and leverage for specific
tasks. A grid computing system can be as simple as a collection of similar
computers running on the same operating system or as complex as Internet
worked systems comprised of every computer platform you can think of.

Cloud-Computing_CH01-3pp.indd 5 07-11-2018 18:25:29


6 • Cloud Computing Basics

Grid computing is basically a way to execute jobs across a distributed set


of processors. Grid computing offers sharing of resources over geograph-
ically distributed locations. The collaborative nature of these grids leads
to the concept of virtual organizations consisting of a dynamic set of data
and resources to solve a specific task. The architecture of grid computing
is shown in Figure 1.6. Grid computing divides a large program into sub-­
programs and assigns each sub-program to an individual processor. Each
processor now processes the sub-program and returns the end result. Even
if one processor fails, the result will not get affected because the task will
be reassigned to another processor. A variety of resources may be shared
including computers, storage devices, network, data, software, sensors, or
scientific instruments. Grid behaves like an independent entity and has
its own control and administration. Grids can further be categorized into
computational grids—these are grids that primarily focus on intensive and
complex computations and data grids—grids for management and control of
sharing of vast amounts of data.

FIGURE 1.6 Grid computing

One of the advantages of grid computing is that enterprises don’t need


to buy large servers for applications that can be split up and farmed out to
smaller commodity type servers. Secondly, it’s more efficient in the use of
resources. Grid environments are much more modular, and policies in the
grid can be managed by the grid software.

1.1.5 Cloud Computing


Cloud computing is a computing paradigm where computing is moved away
from personal computers or an individual application server to a cloud of

Cloud-Computing_CH01-3pp.indd 6 07-11-2018 18:25:29


Overview of the Computing Paradigm • 7

computers. Consumers of the cloud only need to be concerned with their


computing needs, as all the underlying details are hidden to the consumer.
Cloud computing provides a large pool of dynamically scalable and virtual
resources as a service on demand.
The services of a cloud are not limited to using web applications, but can
also be IT management services such as requesting software stack, system
or a specific web appliance. A cloud is a collection of resources that includes
storage, servers, databases, networks, software, etc. Thus, cloud computing
as shown in Figure 1.7 is the delivery of applications, infrastructure and plat-
forms as a service over the Internet. These applications are on a pay-per-use
basis and are accessible from the web browser and desktop with the cus-
tomers not worrying about the service providing system as well as where the
software and data are residing on the servers. There are a lot of reasons that
make cloud computing very popular, like it offers storage capacity beyond
the usual limit and lowers computer costs.

FIGURE 1.7 Cloud computing

1.1.6 Fog Computing


Fog computing or fogging is a distributed computing infrastructure in which
some application services are handled on a smart device, and some are han-
dled in a remote data center—on the cloud. The main objectives of fogging
are to improve computing efficiency and reduce the amount of data that
needs to be transferred to the cloud for storage, processing, and analysis.

Cloud-Computing_CH01-3pp.indd 7 07-11-2018 18:25:30


8 • Cloud Computing Basics

FIGURE 1.8 Fog computing

In a fog computing environment as shown in Figure 1.8, the major pro-


cessing takes place in a data hub on a smart mobile device or on a network in a
router or other gateway device. This distributed approach is growing in popu-
larity because of the Internet of Things (IoT) and the immense amount of data
that is generated by sensors. It is inefficient to transfer all the data to the cloud
for processing and analysis, as it requires a great deal of bandwidth and all the
communication between the sensors and the cloud can reduce efficiency.

1.1.7 Jungle Computing


Jungle computing is a combination of heterogeneous, hierarchical, and dis-
tributed computing resources. Domain experts concurrently use multiple
clusters, grids, clouds, desktop grids, independent computers, and more in
many realistic scientific research areas. Jungle computing refers to the use
of diverse, distributed and highly non-uniform high-performance computer
systems to achieve maximum performance. A collection of resources like
standalone machines, cluster systems, grids, clouds, etc. as shown in the
Figure 1.9 are termed jungle computing.

FIGURE 1.9 Jungle computing

Cloud-Computing_CH01-3pp.indd 8 07-11-2018 18:25:30


Overview of the Computing Paradigm • 9

1.1.8 Comparison of Various Computing Technologies


Various classes of distributed computing have been discussed in the previous
sub section, and each has its own special feature which makes it different
from others. In this section the comparison of utility, cluster, grid, and cloud
computing is done in Table 1.1 which helps the reader to conclude these
computing paradigms.

TABLE 1.1 Comparison table of computing classes


Feature Utility Cluster Grid Cloud
computing computing computing computing
Virtualization Some form of Half Half Essential
virtualization
Scalability Yes No Half: Nodes & Yes
Sites
Standardization Standardization Virtual interface Open grid Web services
and of backup architecture forum
interoperability policies based standards
User Centralized Centralized Decentralized Centralized or
management by third party
Size 100s 100s 1000s 100s to 1000s
Pricing Utility pricing Limited Dominated by Utility pricing
public good discounted
or privately for larger
assigned customers
Resource Distributed Centralized Distributed Centralized or
management distributed
Capability Based on service Stable and Varies but high On demand
provisioning guarantee
Control Centralized Centralized Decentralized Centralized
Ownership Single Single Multiple Single
Privacy Service level Medium level Medium level High level
Transparency Yes Yes No, low Yes, high but
optional
Applications Business model Science, Collaborative, Web application
business and scientific and and content
data centers HPC delivery
Examples Google, ARCnet, GIMPS, SET1 Amazon EC2
Amazon 2008 VAXcluster

Cloud-Computing_CH01-3pp.indd 9 07-11-2018 18:25:30


10 • Cloud Computing Basics

1.2 VISION OF CLOUD COMPUTING


The vision of cloud computing is that IT services are utilized as utilities in
an open marketplace, without any technological and legal barriers. In this
cloud marketplace, cloud service providers and consumers play a central
role. Different stakeholders adopt cloud computing for a variety of services.
The need for ubiquitous storage, computing power, on demand and pay per
use are the most common reasons to adopt cloud computing. It is especially
attractive to developers who do not have the infrastructure or cannot afford
any further expansion of their existing infrastructure. The capability for web-
based access to documents and their processing using sophisticated applica-
tions is one of the appealing factors for users.
Cloud infrastructure is very robust and is always available at any time.
Computing services need to be highly reliable, scalable and capable of sup-
porting ubiquitous access. We have seen great progress of cloud computing
in a very short time. Now let’s have a look at what may become of cloud
computing technology in the future.
„„ Cloud computing will become even more outstanding in the coming
years with rapid, continued growth of major global cloud data centers.
„„ Approximately 50% of all IT will be on the cloud within the next five to
ten years.
„„ There will be a greater use of cloud technology in emerging markets
such as in the BRIC countries (Brazil, Russia, India, and China) as they
are developing and adopting new technologies rapidly. Particularly in
Asia, there is already a trend to stay on the edge of the latest technology.
„„ Data on the cloud will be available from everywhere in standardized
formats. The security and reliability of cloud computing will continue
to evolve, ensuring that data will be even more secure with numerous
techniques employed.
„„ Cloud technology with the Internet of Things (IOT) may develop wear-
ables and bring your own device (BYOD) will become a part of our
­personal and working lives.
The future of the cloud is more than what can be thought of. However, it can
be said that ultimately the cloud is growing exponentially and will continue
to do so for some time to come.

Cloud-Computing_CH01-3pp.indd 10 07-11-2018 18:25:30


Overview of the Computing Paradigm • 11

1.3 CLOUD APPLICATION


Nowadays many organizations are taking advantage of Cloud computing in
day to day applications. Cloud helps the consumers to develop and deploy
applications without spending money on expensive computer parts, ­software,
and IT specialists. To be able to easily understand the true benefits of cloud
computing, it’s always best to see some examples of it. The following are just
a few examples of cloud applications.

1.3.1 ECG Analysis on the Cloud


The overall functionality of an ECG monitoring and analysis system involves
the following steps and also shown in Figure 1.10.

FIGURE 1.10 ECG analysis

„„ A patient is equipped with a wireless ECG sensor attached to the body


and a mobile device that is capable of communicating to the Internet.

Cloud-Computing_CH01-3pp.indd 11 07-11-2018 18:25:30


12 • Cloud Computing Basics

„„ All the patient data is collected by the wireless ECG sensor which then
forwards it to the mobile device via Bluetooth without user intervention.
„„ Client software on the mobile device transmits the data to the ECG anal-
ysis web service, which is hosted by a cloud computing-based software
stack. This communication can happen with a home wireless gateway or
directly via the mobile’s data connectivity (e.g. mobile 3G network).
„„ The analysis software carries out numerous computations on the received
data taking the reference from the existing demographic data and the
patient’s historic data. Computations concern comparison, classification
and systematic diagnosis of heartbeats, which can be time-consuming
when done for long time periods for a large number of consumers.
„„ The software then appends the latest results to the patient’s historic
record maintained in private and secure cloud-based storage so that
authenticated users can access it anytime from anywhere. Physicians
will later interpret the features extracted from the ECG waveform and
decide whether the heartbeat belongs to the normal (healthy) sinus
rhythm or to an appropriate class of arrhythmia.
„„ The diagnosis results are sent to the patient’s mobile device and/or moni-
tor, the doctor and/or emergency services at predefined intervals.
„„ The monitoring and computing processes are repeated according to
user’s preferences, which may be hourly or daily over a long period of
time.

1.3.2 Protein Structure Prediction Applications in Biology


Protein structure prediction applications often require high computing
capabilities and often operate on large datasets that cause extensive I/O
operations. Owing to these requirements, biology applications have often
made extensive use of supercomputing and cluster computing infrastruc-
ture. Similar capabilities can be leveraged on demand using cloud comput-
ing technologies in a more dynamic fashion, thus opening new opportunities
for bioinformatics applications. Protein structure prediction is a computa-
tionally intensive task that is fundamental to different types of research in
life sciences such as in the design of new drugs for the treatment of diseases.
The geometric structure of a protein cannot be directly inferred from the
sequence of genes. The structure of the protein is the result of complex
computations aimed at identifying the structure that minimizes the required
energy. This task requires the investigation of a space with a massive number
of states, consequently creating a large number of computations for each
of these states. The computational power required for protein structure

Cloud-Computing_CH01-3pp.indd 12 07-11-2018 18:25:30


Overview of the Computing Paradigm • 13

prediction can now be acquired on demand, without owning a cluster or nav-


igating the bureaucracy to get access to parallel and distributed computing
facilities. Cloud computing grants access to such capacity on a pay-per-use
basis. One project that investigates the use of cloud technologies for protein
structure prediction is Jeeva—an integrated web portal that enables scien-
tists to offload the prediction task to a computing cloud based on Aneka. The
prediction task uses machine learning techniques (support vector machines)
for determining the secondary structure of proteins. These techniques trans-
late the problem into one of pattern recognition, where a sequence has to be
classified into one of three possible classes (E, H, and C). A popular imple-
mentation based on support vector machines divides the pattern recognition
problem into three phases: initialization, classification, and a final phase.
Even though these three phases have to be executed in sequence, it is possi-
ble to take advantage of parallel execution in the classification phase where
multiple classifiers are executed concurrently. This creates the opportunity
to sensibly reduce the computational time of the prediction. The prediction
algorithm is then translated into a task graph that is submitted to Aneka as
shown in Figure 1.11.

FIGURE 1.11 Architecture of JEEVA portal

Once the task is completed, the middleware makes the results available
for visualization through the portal. The advantage of using cloud technol-
ogies (i.e., Aneka as scalable cloud middleware) versus conventional grid
infrastructures is the capability to leverage a scalable computing infrastruc-
ture that can be grown and shrunk on demand.

Cloud-Computing_CH01-3pp.indd 13 07-11-2018 18:25:30


14 • Cloud Computing Basics

1.3.3 CRM
The distinctive traits of cloud computing are its efforts at providing
­value-added trustee services, maximizing flexible integration of computing
resources, and advancing cost-saving IT services. To provide value-added
trustee services, the cloud should be capable of identifying the customer
relationship communities and answering for users’ innovation strategies. To
maximize flexible integration of computing resources, the clouds should be
in both human computing resources and electronic computing resources.
Many computing tasks are usually more suitable for humans to process than
for electronic computing machines. Integrating the human computing abil-
ity or crowd computing ability into the cloud can enhance its processing
capabilities with the help of vast human brains dispersed on the Internet.
This means that the cloud should be competent enough to track cus-
tomer information and understand the ways its users interact. Social CRM
plays an important role in supporting a value-added trustee service and
exploiting human computing resources in cloud computing. CRM involves
attracting new profitable customers and forming tighter bonds with existing
ones. Since online social communities and conversations carry heavy con-
sequences for companies, social CRM integrates social networks into the
traditional CRM capabilities. Information gained through social CRM ini-
tiatives can support the development of marketing strategies by developing
the organization’s knowledge in areas such as identifying a customer rela-
tionship community, improving customer retention, and improving product
offerings by better understanding customer needs. Customer relationship
(CR) network as a kind of social network uses a vertex for a customer and
a link for the relationship between two vertexes. Many online cloud com-
puting services rely on virtual communities that spontaneously emerge and
continuously evolve. So, clarifying the explicit boundaries of these commu-
nities is quite essential to ensure service qualification. Communities with
overlapping features or prominent vertexes are typically irregular commu-
nities. The traditional community identification algorithms cannot identify
these irregular topologies. Customer Relationship plays a very important
role network in CRM. With an uneven shape, these communities usually
play a prominent role in finding prominent customers who are usually
ignored in social CRM.

1.3.4 ERP
Cloud computing is a service that offers reliable IT infrastructure and soft-
ware services off the user premises, thereby saving the cost of hardware,

Cloud-Computing_CH01-3pp.indd 14 07-11-2018 18:25:30


Overview of the Computing Paradigm • 15

software, power, and labor. Cloud computing enables organizations to


reduce their total cost of ownership (TCO) of IT infrastructure. It is a new
paradigm shift that includes computing resource services, soft applications
of distributed systems, and data storage. The term enterprise resource plan-
ning (ERP) dates back to 1990 when Gartner used it for the first time. ERP
is a cross-functional information system which is considered as a process-­
oriented and legacy system, as it integrates management of information
across the entire enterprise and serves the information needs of the entire
enterprise. The ERP system is the backbone of information systems in an
enterprise or financial and government institution and is referred to as the set
of activities that managers use to run the important parts of an ­organization
such as purchasing, human resources, accounting, productions, and sales.
The ERP system can be deployed in three forms; on-premises, hosted,
and on the cloud. Cloud computing has influenced a new way of thinking
about ERP software deployments. Companies have the option to purchase
an ERP license or purchase a cloud-hosted solution. When companies
acquire a license, they own the software and have the rights to deploy it on
their own data centers (on-premises) or outsource operations to an external
provider (hosting). When enterprises purchase software as a service (SaaS)
solutions, they rent a complete turnkey package that includes software and
the entire delivery mechanism. There are many obstacles involved in cloud
hosted ERP such as security risks, that the CSP might declare bankruptcy or
might fail to deliver according to service level agreement (SLA).
A company might require an information system that will allow them
to perform accounts payable, accounts receivable, inventory management,
supplier logistics, sales order processing, e-commerce, and customer rela-
tionship management (CRM) activities. By making use of cloud hosted infra-
structure, the component relevant to their business may be brought to them
on a pay-and-go basis without the need to purchase an entire ERP, finance,
or CRM suites and the hardware to host such enterprise applications.
If a company is short of spare IT infrastructure, servers, OS licenses,
and database licenses, the cost of hiring an expert should also be considered
because it can be too high. In addition, even if companies justify the cost,
it is probably not worth the hassle of developing internal expertise or taking
on the responsibility of providing (24×7) operations. Other factors that are
important while choosing an ERP deployment scenario are company size,
compliance with law and potential security risks.
Cloud hosted ERP presents an opportunity to transform how an organi-
zation and its people work if properly deployed and built around the people,
not the other way round.

Cloud-Computing_CH01-3pp.indd 15 07-11-2018 18:25:30


16 • Cloud Computing Basics

1.3.5 Social Networking


Opinions on where social networking fits with cloud computing vary widely.
Most of the people who work in enterprises, IT or not, leverage some sort
of social networking system, and most look at it at least once a day during
work hours. To figure out the opportunities or risks involved with social net-
working, enterprises must first define the reasons that people leverage social
networking:
„„ To communicate, both passively and actively, in an ongoing manner and
through various media with people in whom they are interested—usually
with friends and family, but in some cases the activity is all work related.
„„ To learn more about areas of interest, for example SOA, Web 2.0, and
enterprise architecture.
„„ To leverage social networking within the context of the SOA using cloud
computing architecture, such as allowing core enterprise systems, on-
premises or cloud-based, to exchange information; for instance, social
networking can be used to view a customer’s Facebook friends list to find
new leads, and thus new business opportunities, by integrating Facebook
with your sales force management system.
However, there are risks involved in online social networking. People can
lose their jobs because of a posting on a social networking site that puts their
company at risk. People can be publically embarrassed by posting pictures,
videos, or other information they thought would be private. In addition,
there are many cases of criminal activity using social networking as a mech-
anism to commit a crime.
Social networking, in one form or another, is always going to be around.
So companies involved in enterprise IT, including cloud computing, might as
well accept it and learn to govern it through education, policies, and perhaps
some technology.

Cloud-Computing_CH01-3pp.indd 16 07-11-2018 18:25:30


CHAPTER

2
ROADMAP FOR CLOUD
COMPUTING

Cloud computing is a model for enabling convenient, on-demand network


access to a shared pool of configurable computing resources, such as serv-
ers, networks, data storage, services, and applications, that can be rapidly
provisioned and released with minimal management effort or service pro-
vider interaction. With advances in technology, the cost of application host-
ing, computation and data storage and delivery has reduced significantly.
Cloud computing enables delivery of computing services over the Internet.
It enables businesses and individuals to use hardware and software that
are managed by third parties at remote locations. Cloud computing allows
access to computer resources and information from anywhere, anytime via
the Internet.
Cloud users do not need to have knowledge or expertise on the t­ echnology
infrastructure. The main attributes of the cloud are:
„„ Enhanced user experience
„„ Elastic scaling
„„ Automated provisioning
„„ Highly virtualized

2.1 CHARACTERISTICS OF CLOUD COMPUTING


The characteristics of cloud computing include on-demand self-service,
broad network access, resource pooling, rapid elasticity, and measured
­service as shown in Figure 2.1.

Cloud-Computing_CH02-3pp.indd 17 07-11-2018 18:25:15


18 • Cloud Computing Basics

FIGURE 2.1 Cloud characteristic

On-demand Self-service
A consumer can get access to computing capabilities such as storage and
server time as required, without any human interaction with a cloud service
provider. Cloud service providers providing on-demand self-services include
Google, Microsoft, Amazon Web Services (AWS), IBM, and Salesforce.com.

Broad Network Access


This means that the hosted application should be reachable to any network
device (laptop, desktop, smartphone, tablet device, etc.). Cloud capabilities
are available over the network and accessed through standard mechanisms
that promote use by heterogeneous thin or thick clients. The consumers
just need to have an in-built web browser to connect to the cloud service
provider. It gives an advantage to users who have less powerful devices. This
mobility is particularly attractive for businesses, as during business hours or
on off time the user can be up to date.

Resource Pooling
The cloud enables users to enter and use data within business management
software hosted on the cloud at the same time, from any location and at
any time. The computing resources are pooled to serve multiple consum-
ers using a multitenant model, with different physical and virtual resources
dynamically assigned and reassigned according to consumer demand. The
user is usually unaware of the exact location of cloud provider resources.

Measured Service
This is the straightforward idea that the consumers only pay for the
resources they consume. The cloud provider can measure the storage levels,

Cloud-Computing_CH02-3pp.indd 18 07-11-2018 18:25:15


Roadmap for Cloud Computing • 19

processing, and bandwidth used and the consumers are billed appropriately.
The resources that are being used can be monitored and controlled from
both the consumer’s side and cloud provider’s side, resulting in transparency.
Cloud computing services use a metering capability which helps to control
and optimize resource use. This implies that just like an electricity bill, the
IT services are also charged according to use—pay per use. The bill amount
varies with the usage of IT services by the consumers; the more they utilize,
the higher the bill amount.

Rapid Elasticity
The cloud is flexible and scalable. Consumers can quickly and easily add
or remove software features and other resources to suit their immediate
business needs. Cloud services can be rapidly and elastically provisioned
automatically.

2.2 CHALLENGES OF CLOUD COMPUTING


Although cloud computing can be seen as a new phenomenon which is set
to revolutionize the way we use the Internet, one must be very careful in
understanding the security risks and challenges posed in utilizing cloud com-
puting. In this section, some of the challenges related to cloud computing
are discussed.
„„ Service level agreements (SLAs)
„„ Cloud data management
„„ Security
„„ Interoperability
„„ Energy resource management
„„ Multitenancy
„„ Server consolidation
„„ Reliability and availability of services
„„ Common cloud standards

Service Level Agreements (SLA)


It is necessary for consumers to get proper and promised service delivery
guarantees from providers. This is achieved by having SLAs between con-
sumers and providers. The cloud is administrated by service level agreements
that allow several instances of one application to be replicated on multiple
servers if the need arises. Depending on the priority scheme, the cloud may
minimize or shut down a lower level application. A big challenge for cloud

Cloud-Computing_CH02-3pp.indd 19 07-11-2018 18:25:15


20 • Cloud Computing Basics

customers is to evaluate SLAs of cloud vendors. Most vendors create SLAs


to make a defensive shield against legal action while offering minimal assur-
ances to customers. So, there are some important issues such as data protec-
tion, outages and price structures that need to be taken into account by the
consumer before signing a contract with a provider. In addition, different
cloud services like infrastructure, platform, and software will need to define
different SLA Meta specifications. Advanced SLA mechanisms need to con-
stantly incorporate user feedback and customization features into the SLA
evaluation framework.

Cloud Data Management


The data stored on the cloud can be very large, unstructured or semi-­
structured. So, cloud data management is an important research topic in
cloud computing. Since service providers typically do not have access to the
physical security system of data centers, they must rely on the ­infrastructure
provider to achieve full data security. Even for a virtual private cloud the
­service provider can only specify the security setting remotely, without
knowing whether it is fully implemented.
The infrastructure provider should achieve objectives like confidenti-
ality and auditability. Confidentiality for providing secure data access and
transfer is achieved by cryptographic protocols. Auditability is for authenti-
cating whether the security setting of applications has been tampered with
or not. It can be achieved using remote attestation techniques.

Security
Security issues hinder the acceptance of cloud computing. The security
issues such as botnet, data loss and phishing are a serious threat to an orga-
nization’s data and applications.

Interoperability
This is the ability of two or more systems to work together in order to
exchange information and use that exchanged information. Many public
cloud networks are not designed to interact with each other and are con-
figured as closed systems. This lack of integration between networks makes
it difficult for organizations to combine their IT systems on the cloud and
realize productivity gains and cost savings. To overcome this challenge,
industry standards must be developed to help cloud service providers design
interoperable platforms and enable data portability. Organizations need to

Cloud-Computing_CH02-3pp.indd 20 07-11-2018 18:25:15


Roadmap for Cloud Computing • 21

automatically provision services, manage Virtual Machine instances and work


with both cloud-based and enterprise-based applications using a single tool-
set that can function across existing programs and multiple cloud providers.

Energy Resource Management


Significant saving in the energy of a cloud data center without sacrificing
SLA’s is an excellent economic incentive for data center operators, and
would also make a significant contribution to greater environmental sustain-
ability. Around 53% of the total operational expenditure of data centers is
used for powering and cooling. The goal is not only to cut down energy cost
in data centers, but also to meet government regulations and environmen-
tal standards. Designing energy-efficient data centers has recently received
major attention. It can be achieved by using energy efficient hardware archi-
tecture that enables slowing down CPU speeds and turning off partial hard-
ware components. Energy aware job scheduling and server consolidation
are two other ways to reduce power consumption; even turning off unused
machines adds up in reducing the power. A key challenge in all the above
methods is to achieve a good trade-off between energy savings and applica-
tion performance.

Multitenancy
When multiple customers access the same hardware, application servers, and
databases, the response time and performance for other customers may be
affected. For application-layer multitenancy specifically, resources are shared
at each infrastructure layer and have valid security and performance concerns.

Server Consolidation
Server consolidation is an effective approach to maximizing resource uti-
lization while minimizing energy consumption in a cloud computing envi-
ronment. Live VM migration technology is often used to consolidate virtual
machines residing on multiple underutilized servers on to a single server so
that the remaining servers can be set to an energy-saving state.

Reliability and Availability of Services


The challenge of reliability comes into the picture when a cloud provider deliv-
ers on-demand software as a service (SaaS). The software needs to have a reli-
ability quality factor so that users can access it under any network conditions,

Cloud-Computing_CH02-3pp.indd 21 07-11-2018 18:25:15


22 • Cloud Computing Basics

such as during slow network connections. One of the cases ­identified due to
the unreliability of on-demand software is Apple’s MobileMe cloud service,
which stores and synchronizes data across multiple devices. It begins when
many users are not able to access mail and synchronize data correctly. To avoid
such problems, providers are turning to technologies such as Google Gears,
Adobe AIR, and Curl that allow cloud-based applications to run locally; some
even allow them to run in the absence of a network connection.

Common Cloud Standards


Initial standardization attempts like Open cloud computing interface, Open
virtualization format, Open Stack or CDMI (all of which make explicit ref-
erences to cloud computing) are also proving attractive. Generally there are
large gaps in standardization, and there is great potential for development.
There is a confusing abundance of standards—some of them similar, some of
them underdeveloped—and their degree of market relevance is sometimes
unclear. There is a need for a holistic approach and a coordinated definition of
the aims in the field of cloud standardization. Few standards are listed below:
„„ Open Virtualization Format (OVF): This establishes a transport
mechanism for moving virtual machines from one hosted platform to
another.
„„ P2301: This is a guide for cloud portability and interoperability profiles
(CPIP).
„„ P2302: This is a Standard for Intercloud Interoperability and Federation
(SIIF).
„„ Open cloud computing interface (OCCI): This aims is to develop an
API for cloud management tasks. API’s enable interfacing between IaaS
cloud implementation.

2.3 CLOUD ADOPTION AND RUDIMENTS


Cloud means the environment of the cloud where the cloud services are
being operated. Cloud adoption is convenient for low priority business appli-
cations as shown in Figure 2.2. These applications must have low availability
requirements and short lifespans. Cloud adoption is useful when the recov-
ery management and backup recovery based implementation are required.
It is convenient for the applications that are modular and loosely coupled.
Whereas cloud adoption is not convenient for data sensitive application, core
business and goal critical application as shown by Figure 2.3.

Cloud-Computing_CH02-3pp.indd 22 07-11-2018 18:25:15


Roadmap for Cloud Computing • 23

FIGURE 2.2 Cloud usage as per the project nature

FIGURE 2.3 Cloud adoption

There are different reasons for adopting the cloud—a few reasons are
described below:
„„ Dynamic allocation, scaling and movement of applications
„„ Pay per use
„„ No long-term commitments
„„ Operating system and application architecture independent
„„ No hardware or software installation required
The sectors that can benefit from this adoption are IT and technology,
­education, manufacturing and business and professional services.
„„ IT and technology: With cloud adoption, IT and technology companies
can provide a greater level of service to support a more complex IT
infrastructure.
„„ Education: Geographical location is no longer a barrier to acquiring
education. Cloud services can not only enhance the knowledge sharing
but also foster team collaborations.

Cloud-Computing_CH02-3pp.indd 23 07-11-2018 18:25:15


24 • Cloud Computing Basics

„„ Manufacturing: Cloud computing helps manufacturing companies in


avoiding technical as well as business issues that would otherwise have
taken place in their own data centers.
„„ Business and professional services: Adoption of cloud services ena-
bles business and professional services to be virtually present at every
location in the world by employing its three major components; namely
software as a service (SaaS), platform as a service (PaaS), and infrastruc-
ture as a service (IaaS).
The prominent features of cloud computing include:
„„ Resource aggregation and integration
„„ Application services
„„ Self-service portal
„„ Allocation engine
„„ Reporting and accounting
„„ Dynamic workload management
„„ Resource automation
„„ Metering of resources

Resource Aggregation and Integration


The inventory information about machines and software templates from
multiple locations is retrieved and aggregated into a central logical view of
all resources in the infrastructure.

Application Services
The application instances represent the agreement between service provider
and the consumer to use services on an on-demand basis. It is guaranteed
that at a given point of time the services or the resources will be surely avail-
able for consumers, once the reservation of the resources has been made.

Self-service Portal
Self-service portal is a facility provided by the cloud to consumers. It sup-
ports the account owners signing up and using the purchased capacity. Users
can request a machine or an entire multi-machine environment as well as
monitor and control it using a web-based self-service portal.

Allocation Engine
Dynamic resource management provides automated allocation and realloca-
tion of resources. Dynamic resource management is a key component of any
cloud solution that maximizes efficiency.

Cloud-Computing_CH02-3pp.indd 24 07-11-2018 18:25:15


Roadmap for Cloud Computing • 25

Resource and Accounting


All the accounting information is recorded in a database of a customer as per
his resource and the cloud usage. The data is available centrally to create the
usage reports of the customers.

Dynamic Workload Management


Cloud virtual machines are enabled with automated software that controls
the workflow requests. The virtual machines are enabled with a lifecycle that
increases the effective utilization of resources.

Resource Automation
Cloud ensures that the resources are automatically and effectively utilized as
and when they are required by the consumers.

Metering of Resources
With the help of the metering of resources on any cloud, user organizations
can bring transparency to the business and environment for the manage-
ment to view the usage of resources.

2.4 CLOUD COMPUTING ENVIRONMENTS


The creation of cloud computing environments encompasses both the devel-
opment of applications and systems that take advantage of cloud computing
solutions.

Application Development
Applications that use cloud computing benefit from its capability of dynam-
ically scaling on demand. One class of applications that takes the biggest
advantage of these features is a web application. With Web 2.0, the web has
become a platform for developing complex and rich application including
enterprise applications that leverage the Internet as the preferred chan-
nel for service delivery and user interaction. These are the applications
that involve variable workload, dynamic size of infrastructure and service
deployment.
Another class of applications that can potentially gain considerable
advantage by using cloud computing is represented by resource-intensive
applications. These can be either data-intensive or computation-intensive
applications. A considerable amount of resources are required for
complete execution of these applications in a reasonable time frame. It is

Cloud-Computing_CH02-3pp.indd 25 07-11-2018 18:25:15


26 • Cloud Computing Basics

worth noticing that a large number of resources are not needed constantly
or for a long duration.

Infrastructure and System Development


Distributed computing, virtualization, service orientation and Web 2.0 from
the core technologies enabling the provisioning of cloud service from any-
where on the globe. Developing applications and systems that leverage the
cloud requires knowledge across all these technologies.
The dynamic nature of cloud systems, where new nodes and services
are provisioned on demand, constitutes a major challenge for engineers and
developers. IaaS, PaaS, and SaaS make use of such opportunities with wis-
dom and effectiveness. These can be either completely transparent to devel-
opers or subject to fine control. Integration of cloud resources with existing
system deployment is another challenge.
Web 2.0 technologies constitute the interface through which cloud
computing services are delivered, managed, and provisioned. Despite the
absence of unique standards for accessing the resources serviced by differ-
ent cloud providers, the commonality of this technology facilitates the learn-
ing curve and simplifies the integration of cloud computing into the existing
system. Developers need to be aware of the limitations of the virtualiza-
tion technology and the implications of the volatility of some components of
their system.

2.5 CLOUD SERVICE REQUIREMENTS


Cloud services are utilized with a view of getting the following powerful
advantages:
„„ Service management systems embedded with cloud services to provide
visibility, control, and automation across IT and business services.
„„ Services targeted at certain infrastructure workloads to help accelerate
standardization of services, supporting significant productivity gains, and
rapid client payback on their investment.
Infrastructure strategy and planning services for cloud computing
should be designed to help companies plan their infrastructure workloads
via appropriate cloud delivery models. Cloud leaders can help clients iden-
tify the right mix of public, private, and hybrid cloud models for infrastruc-
ture workloads.

Cloud-Computing_CH02-3pp.indd 26 07-11-2018 18:25:15


Roadmap for Cloud Computing • 27

2.6 CLOUD AND DYNAMIC INFRASTRUCTURE


Through cloud computing, clients can access standardized IT resources to
deploy new applications, services, or computing resources rapidly without
reengineering their entire infrastructure. The dynamic infrastructure of the
cloud is based on an architecture that combines the following parameters.

Service Management
The cloud provides visibility, control, and automation across all the business
and IT assets to deliver higher value services.

Asset Management
The cloud maximizes the value of the critical business and IT assets over
their lifecycle with industry tailored asset management solutions.

Virtualization and Consolidation


The cloud reduces operating costs, improves responsiveness, and utilizes
resources efficiently.

Information Infrastructure
The cloud helps businesses achieve information compliance (regulation),
availability, retention, and security objectives.

Security
The cloud provides end-to-end industry-customized governance, risk man-
agement, and compliance for businesses.

Resilience
The cloud ensures the continuity of business and IT operations while rapidly
adapting, and responding to risks and opportunities.

2.7 PROS AND CONS OF CLOUD COMPUTING


The major advantages of cloud computing are described below.
i. Cost Efficient
Cloud computing is probably the most cost effective way to use, maintain,
and upgrade applications. Traditional desktop software costs a lot. Adding

Cloud-Computing_CH02-3pp.indd 27 07-11-2018 18:25:15


28 • Cloud Computing Basics

up the licensing fees for multiple users in a company can prove to be very
expensive. The cloud, on the other hand, is available at much cheaper rates
and can significantly lower the company’s IT expenses (pay-as-you-go and
other scalable options).
ii. Unlimited Storage
Storing information on the cloud provides an almost unlimited storage
capacity.
iii. Backup and Recovery
Since all the data is stored on the cloud, backing it up and restoring it is rela-
tively easier than storing the data on a physical device. The entire process of
backup and recovery becomes much simpler than other traditional methods.
iv. Automatic Software Integration
Software integration is usually something that occurs automatically on the
cloud. This means that cloud users don’t have to make additional efforts to
customize and integrate their applications.
v. Easy Access to Information
Once users register on the cloud, they can access their information from
anywhere via an Internet connection. This convenient feature lets users
overcome time zone and geographic location issues.
vi. Quick Deployment
Cloud computing gives the advantage of quick deployment. The entire sys-
tem can be fully functional in a matter of a few minutes. Of course, the
amount of time taken depends on the kind of technology that is needed for
the business.
vii. Scalability
Cloud computing makes it easier for an organization to scale their services
according to the demand of clients. The consumer business can scale up
or scale down the operation and storage needs quickly to suit the situation,
allowing flexibility as the needs change. Rather than purchasing and install-
ing expensive upgrades, the cloud service provider can handle this for the
consumer. Using the cloud, the consumer frees up their time so that they can
get on with running their business.
Cloud computing also has its disadvantages. Businesses, especially
smaller ones, need to be aware of these aspects before using the services
provided on the cloud. The major disadvantages of cloud computing are
detailed below.

Cloud-Computing_CH02-3pp.indd 28 07-11-2018 18:25:15


Roadmap for Cloud Computing • 29

i. Technical Issues
Though it is true that information and data on the cloud can be accessed
any time and from anywhere, there might be instances when the system can
have some serious malfunctions. Businesses should be aware of the fact that
this technology is always prone to outages and other technical issues. Even
the best cloud service providers face these issues, in spite of ensuring high
standards of maintenance.
ii. Security on the Cloud
Security of data is the other major issue of cloud computing technology.
Before adopting this technology, users should be aware of the risks of surren-
dering their confidential data to third-party cloud service providers. Users
need to be sure that they choose the most reliable service provider who will
ensure the security of their data. Storing information on the cloud can make
companies vulnerable to external hack attacks and threats. Therefore, there
is always the lurking possibility of theft of sensitive data.
iii. Vendor Lock-In
Organizations may find it difficult to migrate their services from one vendor
to another. Hosting and integrating current cloud applications on another
platform may come up with issues like interoperability and support systems.
Although cloud service providers promise that the cloud will be flexible to
use and integrate, switching cloud services has not yet completely evolved.
iv. Possible Downtime
Cloud computing makes the customer business dependent on the reliability
of their Internet connection. If the Internet connection is offline, the cus-
tomer won’t be able to access any of their applications, servers, or data from
the cloud.
v. Limited Control
The service provider is responsible for managing and monitoring the cloud
infrastructure, so customers have minimal control over it. The customer can
only control and manage the data, applications, and services operated on
top of the cloud. The key administrative tasks such as server shell access,
­updating and firmware management may not be passed to the customer or
end user.

Cloud-Computing_CH02-3pp.indd 29 07-11-2018 18:25:16


Cloud-Computing_CH02-3pp.indd 30 07-11-2018 18:25:16
CHAPTER

3
CLOUD VIRTUALIZATION
TECHNOLOGY

In the traditional server, system administrators often talk about servers in


their entirety which includes the hardware, the operating system, the storage
and the applications. Servers are often referred to by their function, i.e., the
SQL server, the DNS server, the file server, etc. If the file server becomes
overloaded or the server becomes exhausted, then the system administrators
must add in a new server.
System administrators can implement clusters of servers to ensure
round the clock availability with high fault tolerance. However even clusters
have limits on their scalability, and not all applications work in a clustered
environment. So, in order to avoid these failures and to make a fault tolerant
system, the virtualization concept was used. Virtualization allows multiple
virtual machines on one physical machine with heterogeneous operating sys-
tems to run in isolation. Whereas with no virtualization there can be only
single operating with its application on, it will be applicable as shown in
Figure 3.1. Virtualization helps businesses in increasing flexibility, availabil-
ity, scalability, resource utilization, and security.
A few factors that highlight how virtualization can help businesses are
listed below:
a. Economical: The number of physical servers can be reduced with the
virtualization technology, resulting in the lowering of ongoing procure-
ment, maintenance, and operational costs.
b. Dynamic nature: Virtualization provides a flexible foundation to
provide capacity on demand for an organization. New servers can be
deployed quickly providing services in minutes.

Cloud-Computing_CH03-3pp.indd 31 07-11-2018 18:25:46


32 • Cloud Computing Basics

FIGURE 3.1 Traditional vs virtual system

c. Ease in disaster recovery: More efficient and cost-effective disas-


ter recovery solutions can be realized with virtualization technologies.
Within minutes the servers and online businesses can be brought to an
alternative site.
d. Business readiness assessment: Virtualization introduces a shared
computing model to enterprises, as it is easy to understand the infra-
structure requirement in virtualized environment and there is no need
to implement it physically.

3.1 VIRTUALIZATION
Virtualization refers to technologies that are designed to provide a layer
of abstraction between layers of hardware and software that decouples
the physical hardware from the operating system. Virtualization helps
with ­simplified interaction between these two layers, delivering greater IT
resource utilization, and flexibility.
A virtual machine monitor example is shown in Figure 3.2 where the cus-
tomer management environment runs on top of Operating System 1 (OS1)
and the testing environment runs on top of Operating System 2 (OS2). Both
the operating systems run on top of the virtual machine monitor (VMM).
The virtualizations of all the resources (e.g., processors, memory, secondary
storage, and networks) are being carried by VMM and it also allocates them
to the various virtual machines that run on top of the VMM.

Cloud-Computing_CH03-3pp.indd 32 07-11-2018 18:25:46


Other documents randomly have
different content
CHAPTER XV.
MARKETING HONEY.

No subject merits more attention by the apiarist than that of


marketing honey. There is no question but that the supply is going to
continually increase, hence, to sustain the price we must stimulate
the demand, and by doing this we shall not only supply the people
with a food element which is necessary to health, but we shall also
supersede in part the commercial syrups, which are so adulterated
as not only to be crowded with filth the most revolting, but are often
even teeming with poison. (Report of Michigan Board of Health for
1874, pp. 75-79.) To bring, then, to our neighbor's table the pure,
wholesome, delicious nectar, right from the hive, is philanthropy,
whether he realizes it or not.
Nor is it difficult to stimulate the demand. I have given special
attention to this topic for the last few years, and am free to say, that
not a tithe of the honey is consumed in our country that might and
should be.

HOW TO INVIGORATE THE MARKETS.


First. See that no honey goes to market from your apiary that is
not in the most inviting form possible. Grade all the honey
thoroughly, and expect prices to correspond with the grade. See that
every package and vessel is not only attractive, but so arranged as
not to make the dealer any trouble or cause him any vexation. One
leaky can or crate may do great injury.
Second. See that every grocer in your vicinity has honey
constantly on hand. Do all you can to build up a home market. The
advice to sell to only one or two dealers is wrong and pernicious.
Whether we are to buy or sell, we shall find almost always that it will
be most satisfactory to deal with men whom we know, and who are
close at hand. Only when you outgrow your home market should you
ship to distant places. This course will limit the supply in the large
cities, and thus raise the prices in the great marts, whose prices fix
those in the country. Be sure to keep honey constantly in the
markets.
Third. Insist that each grocer makes the honey very conspicuous.
If necessary, supply large, fine labels, with your own name almost as
prominent as is that of the article.
Fourth. Deliver the honey in small lots, so that it will be sure to be
kept in inviting form, and, if possible, attend to the delivery yourself,
that you may know that all is done "decently and in order."
Fifth. Instruct your grocers that they may make the honey show to
the best effect, and thus captivate the purchaser through the sight
alone.
Sixth. Call local conventions, that all in the community may know
and practice the best methods, so that the markets may not be
demoralized by poor, unsalable honey.
Of course, the method of preparation will depend largely, and
vary greatly, upon the style of honey to be sold, so we will consider
these kinds separately.

EXTRACTED HONEY.
As before intimated, extracted honey has all the flavor, and is in
every way equal, if not superior—comb itself is innutritious, and very
indigestible—to comb-honey. When people once know its excellence
—know that it is not "strained"—let us, as apiarists, strive in every
way to kill that word—then the demand for this article will be vastly
increased, to the advantage both of the consumer and the apiarist.
Explain to each grocer what we mean by the word extracted, and
ask him to spread wide the name and character of the honey. Leave
cups of the honey with the editors and men of influence, and get
them to discuss its origin and merits. I speak from experience, when
I say that in these ways the reputation and demand for extracted
honey can be increased to a surprising degree, and with astonishing
rapidity.

HOW TO TEMPT THE CONSUMER.


First. Have it chiefly in small cups—jelly cups are best. Many
persons will pay twenty-five cents for an article, when if it cost fifty
cents they would not think of purchasing.
Second. Only put it in such vessels as jelly cups or glass fruit
jars, etc., that will be useful in every household when the honey is
gone, that the buyer may feel that the vessel is clear gain.
Third. Explain to the grocer that if kept above the temperature of
70° or 80° F., it will not granulate, that granulation is a pledge of
purity and superiority, and show him how easy it is to reduce the
crystals, and ask him to explain this to his customers. If necessary,
liquify some of the granulated honey in his presence.
Lastly. If you do not deliver the honey yourself, be sure that the
vessels will not leak in transit. It is best, in case jelly cups are used,
that they be filled at the grocery. And don't forget the large label,
which gives the kind of honey, grade, and producer's name.

COMB-HONEY.
This, from its wondrous beauty, especially when light-colored and
immaculate, will always be a coveted article for the table, and will
ever, with proper care, bring the highest price paid for honey. So it
will always be best to work for this, even though we may not be able
to procure it in such ample profusion as we may the extracted. He
who has all kinds, will be able to satisfy every demand, and will most
surely meet with success.

RULES TO BE OBSERVED.
This, too, should be chiefly in small sections (Fig, 50), for, as
before stated, such are the packages that surely sell. Sections from
four to six inches square will just fill a plate nicely, and look very
tempting to the proud house-wife, especially if some epicurean
friends are to be entertained.
The sections should surely be in place at the dawn of the white
clover season, so that the apiarist may secure the most of this
irresistible nectar, chaste as if capped by the very snow itself. They
should be taken away as soon as capped, as delay makes them
highways of travel for the bees, which always mar their beauty.
When removed, if demanded, glass the sections, but before this,
we should place them in hives one upon another, or special boxes
made tight, with a close cover, in which to store either brood-frames
in winter or sections at any season, and sulphur them. This is quickly
and easily done by use of the smoker. Get the fire in the smoker well
to burning, add the sulphur, then place this in the top hive, or top of
the special box. The sulphurous fumes will descend and deal out
death to all moth larvæ. This should always be done before shipping
the honey, if we regard our reputations as precious. It is well to do
this immediately upon removal, and also two weeks after, so as to
destroy the moth larvæ not hatched when the sections are removed.
If separators have been used, these sections are in good
condition to be glassed, and are also in nice shape to ship even
without glass, as they may stand side by side and not mar the comb.

Fig. 71.

The shipping-crate (Fig, 71) should be strong, neat and cheap,


with handles as seen in Fig, 71—such handles are also convenient
in the ends of the hives, and can be cut in an instant by having the
circular-saw set to wabble. With handles the crate is more
convenient, and is more sure to be set on its bottom. The crate
should also be glassed, as the sight of the comb will say: "Handle
with care."
Mr. Heddon also makes a larger crate (Fig, 72), which is neat and
cheap. Muth's crate is like Heddon's, only smaller.
It is well, too, to wrap the sections in paper, as thus breakage of
one will not mean general ruin. However, this would be unnecessary
in case the sections were of veneer and glassed, as before
described.

Fig. 72.

In groceries, where the apiarist keeps honey for sale, it will pay
him to furnish his own boxes. These should be made of white-wood,
very neat, and glassed in front to show the honey, and the cover so
fixed that unglassed sections—and these, probably, will soon
become the most popular—cannot be punched or fingered. Be sure,
too, that the label, with kind of honey, grade, and name of apiarist,
be so plain that "he who runs may read."
Comb-honey that is to be kept in the cool weather of autumn, or
the cold of winter, must be kept in warm rooms, or the comb will
break from the section when handled. By keeping it quite warm for
some days previous to shipment, it may be sent to market even in
winter, but must be handled very carefully, and must make a quick
transit.
Above all, let "taste and neatness" ever be your motto.
CHAPTER XVI.
HONEY PLANTS.

As bees do not make honey, but only gather it, and as honey is
mainly derived from certain flowers, it of course follows that the
apiarist's success will depend largely upon the abundance of honey-
secreting plants in the vicinity of his apiary. True it is that certain bark
and plant lice secrete a kind of liquid sweet—honey of doubtful
reputation—which, in the dearth of anything better, the bees seem
glad to appropriate. I have thus seen the bees thick about a large
bark-louse which attacks the tulip tree, and thus often destroys one
of our best honey trees. This is an undescribed species of the genus
Lecanium. I have also seen them thick about three species of plant
lice. One, the Pemphigus imbricator, Fitch, works on the beech tree.
Its abdomen is thickly covered with long wool, and it makes a
comical show as it wags this up and down upon the least
disturbance. The leaves of trees attacked by this louse, as also
those beneath the trees, are fairly gummed with a sweetish
substance. I have found that the bees avoid this substance, except
at times of extreme drouth and long protracted absence of honeyed
bloom. It was the source of no inconsiderable stores during the
terribly parched autumn of Chicago's great disaster. (See Appendix,
page 286).
Another species of Pemphigus gives rise to certain solitary plum-
like galls, which appear on the upper surface of the red elm. These
galls are hollow, with a thin skin, and within the hollows are the lice,
which secrete an abundant sweet that often attracts the bees to a
feast of fat things, as the gall is torn apart, or cracks open, so that
the sweet exudes. This sweet is anything but disagreeable, and may
not be unwholesome to the bees.
Another aphis, of a black hue, works on the branches of our
willows, which they often entirely cover, and thus greatly damage
another tree valuable for both honey and pollen. Were it not that they
seldom are so numerous two years in succession, they would
certainly banish from among us one of our most ornamental and
valuable honey-producing trees. These are fairly thronged in
September and October, and not unfrequently in spring and summer
if the lice are abundant, by bees, wasps, ants, and various two-
winged flies, all eager to lap, up the oozing sweets. This louse is
doubtless the Lachnus dentatus, of Le Baron, and the Aphis salicti,
of Harris.
Bees also get, in some regions, a sort of honey-dew, which
enables them to add to their stores with surprising rapidity. I
remember one morning while riding on horse-back along the
Sacramento river, in California, I broke off a willow twig beside the
road when, to my surprise, I found it was fairly decked with drops of
honey. Upon further examination I found the willow foliage was
abundantly sprinkled by these delicious drops. These shrubs were
undisturbed by insects, nor were they under trees. Here then was a
real case of honey-dew, which must have been distilled through the
night by the leaves. I never saw any such phenomenon in Michigan,
yet others have. Dr. A. H. Atkins, an accurate and conscientious
observer, has noted this honey-dew more than once here in Central
Michigan.
Bees also get some honey from oozing sap, some of
questionable repute from about cider mills, some from grapes and
other fruit which have been crushed, or eaten and torn by wasps and
other insects. That bees ever tear the grapes is a question of which I
have failed to receive any personal proof, though for years I have
been carefully seeking it. I have lived among the vineyards of
California, and have often watched bees about vines in Michigan, but
never saw bees tear open the grapes. I have laid crushed grapes in
the apiary, when the bees were not gathering, and were ravenous for
stores, which, when covered with sipping bees, were replaced with
sound grape-clusters, which in no instance were mutilated. I have
thus been led to doubt if bees ever attack sound grapes, though
quick to improve the opportunities which the oriole's beak and the
stronger jaws of wasps offer them. Still, Prof. Riley feels sure that
bees are sometimes thus guilty, and Mr. Bidwell tells me he has
frequently seen bees rend sound grapes, which they did with their
feet. Yet, if this is the case, it is certainly of rare occurrence, and is
more than compensated by the great aid which the bees afford the
fruit-grower in the great work of cross-fertilization, which is
imperatively necessary to his success, as has been so well shown
by Dr. Asa Gray and Mr. Chas. Darwin. It is true that cross-
fertilization of the flowers, which can only be accomplished by
insects, and early in the season by the honey-bee, is often, if not
always, necessary to a full yield of fruit and vegetables. I am
informed by Prof W. W. Tracy, that the gardeners in the vicinity of
Boston keep bees that they may perform this duty. Even then, if Mr.
Bidwell and Prof. Riley are right, and the bee does, rarely—for surely
this is very rare, if ever—destroy grapes, still they are, beyond any
possible question, invaluable aids to the pomologist.
But the principal source of honey is still from the flowers.

WHAT ARE THE VALUABLE HONEY PLANTS?


In the northeastern part of our country the chief reliance for May
is the fruit-blossoms, willows, and sugar maples. In June white clover
yields largely of the most attractive honey, both as to appearance
and flavor. In July the incomparable basswood makes both bees and
apiarist jubilant. In August buckwheat offers a tribute, which we
welcome, though it be dark and pungent in flavor, while with us in
Michigan, August and September give us a profusion of bloom which
yields to no other in the richness of its capacity to secrete honey, and
is not cut-off till the autumn frosts—usually about September 15.
Thousands of acres of golden rod, boneset, asters, and other
autumn flowers of our new northern counties, as yet have blushed
unseen, with fragrance wasted. This unoccupied territory,
unsurpassed in its capability for fruit production, covered with grand
forests of maple and basswood, and spread with the richest of
autumn bloom, offers opportunities to the practical apiarist rarely
equaled except in the Pacific States, and not even there, when other
privileges are considered. In these localities, two or three hundred
pounds to the colony is no surprise to the apiarist, while even four or
five hundred are not isolated cases.
In the following table will be found a list of valuable honey-plants.
Those in the first column are annual, biennial or perennial; the
annual being enclosed in a parenthesis thus: (); the biennial
enclosed in brackets thus: []; while those in the second column are
shrubs or trees; the names of shrubs being enclosed in a
parenthesis. The date of commencement of bloom is, of course, not
invariable. The one appended, in case of plants which grow in our
State, is about average for Central Michigan. Those plants whose
names appear in small capitals yield very superior honey. Those with
(a) are useful for other purposes than honey secretion. All but those
with a * are native or very common in Michigan. Those written in the
plural refer to more than one species. Those followed by a † are very
numerous in species. Of course I have not named all, as that would
include some hundreds which have been observed at the college,
taking nearly all of the two great orders Compositæ and Rosaceæ. I
have only aimed to give the most important, omitting many foreign
plants of notoriety, as I have had no personal knowledge of them:

DATE. Annuals or Perennials.


April Dandelion.
April and May Strawberry. (a)
May and June *White Sage, California
May and June *Sumac, California.
May and June *Coffee Berry, California
June to July White Clover. (a)
June to July Alsike Clover. (a)
June to July *[Sweet Clover.]
June to July *Horehound. [Weed.]
June to July Ox-eyed Daisy—Bad
June to July Bush Honeysuckle.
June to August *Sage.
June to August Motherwort.
June to frost *(Borage.)
June to frost *(Cotton.) (a)
June to frost Silk or Milk Weeds.
June to frost (Mustard)†
June to frost *(Rape.) (a)
June to frost St. John's Wort.
June to frost (Mignonette.) (a)
July (Corn.) (a)
July *(Teasel.) (a)
July to August *Catnip. (a)
July to August Asparagus. (a)
July to August *(Rocky M't. Bee Plant)
July to frost Boneset.
July to frost Bergamot.
July to frost Figwort.
August (Buckwheat.) (a)
August (Snap-dragon.)
August to frost (Golden Rod.)†
August to frost Asters.†
August to frost Marsh Sun-Flowers.
August to frost Tick-Seed.
August to frost Beggar-Ticks.
August to frost Spanish Needles.

DATE. Shrubs or Trees.


March and Ap'l Red or Soft Maple.(a)
March and Ap'l Poplar or Aspen.
March and Ap'l Silver Maple.
March and Ap'l *Judas Tree.
May (Shad-bush.)
May (Alder.)
May Maples-Sugar Maple (a)
May Crab Apple.
May (Hawthorns.)
Fruit Trees—Apple,
May. { Plum, Cherry, Pear, etc. (a)
May Currant and Gooseberry. (a)
May *(Wistaria Vine-South)
May (Chinese Wistaria Vine—South.)
May and June (Barberry.)
May and June (Grape-vine.) (a)
May and June Tulip-tree.
May and June (Sumac.)
June Wild-Plum.
June (Black Raspberry.) (a)
June Locusts.
June (Red Raspberry.) (a)
June (Blackberry.)
June to July *Sour-wood—South.
July (Button Bush.)
July Basswood. (a)
July (Virginia Creeper.) (a)
July to August *Pepper-tree, Cal'a.
July to Sept *(St. John's Worts.)
August (Late Sumac.)
August to Sept. *Red Gum, California.

DESCRIPTION WITH PRACTICAL REMARKS.

As this subject of bee pasturage is of such prime importance, and


as the interest in the subject is so great and wide-spread, I feel that
details with illustrations will be more than warranted.
Fig. 75.—Maple.

We have abundant experience to show that forty or fifty colonies


of bees, take the seasons as they average, are all that a single place
will sustain to the greatest advantage. Then, how significant the fact,
that when the season is the best, full three times that number of
colonies will find ample resources to keep all employed. So this
subject of artificial pasturage becomes one well worthy close study
and observation. The subject, too, is a very important one in
reference to the location of the apiary.
It is well to remember in this connection, that two or three miles
should be regarded as the limit of profitable gathering. That is,
apiaries of from fifty to one hundred or more colonies, should not be
nearer than four or five miles of each other.
Fig. 74.-Willow.

APRIL PLANTS.

As we have already seen, the apiarist does not secure the best
results, even in the early spring, except the bees are encouraged by
the increase of their stores of pollen and honey; hence, in case we
do not practice stimulative feeding—and many will not—it becomes
very desirable to have some early bloom. Happily, in all sections of
the United States our desires are not in vain.
Early in spring there are many scattering wild flowers, as the
blood-root (Sanguinaria canadensis), liver-leaf (Hepatica acutiloba),
and various others of the crowfoot family, as also many species of
cress, which belong to the mustard family, etc., all of which are
valuable and important.
The maples (Fig, 73), which are all valuable honey plants, also
contribute to the early stores. Especially valuable are the silver
maples (Acer dasycarpum), and the red or soft maples (Acer
rubrum), as they bloom so very early, long before the leaves appear.
The bees work on these, here in Michigan, the first week of April,
and often in March. They are also magnificent shade trees,
especially those that have the weeping habit. Their early bloom is
very pleasing, their summer form and foliage beautiful, while their
flaming tints in autumn are indescribable. The foreign maples,
sycamore, Acer pseudo-platanus, and Norway, Acer platanoides, are
also very beautiful. Whether superior to ours as honey plants, I am
unable to say.
The willows, too (Fig, 74), rival the maples in the early period of
bloom. Some are very early, blossoming in March, while others, like
the white willow (Salix alba) (Fig, 74), bloom in May. The flowers on
one tree or bush of the willow are all pistillate, that is, have pistils,
but no stamens, while on others they are all staminate, having no
pistils. On the former, they can gather only honey, on the latter only
pollen. That the willow furnishes both honey and pollen is attested by
the fact that I saw both kinds of trees, the pistillate and the
staminate, thronged with bees the past season. The willow, too, from
its elegant form and silvery foliage, is one of our finest shade trees.

Fig. 15.—
Judas Tree

In the south of Michigan, and thence southward to Kentucky, and


even beyond, the Judas tree, or red-bud, Cercis canadensis (Fig,
75), is not only worthy of cultivation as a honey plant, but is also very
attractive, and well deserving of attention for its ornamental qualities
alone. This blooms from March to May, according to the latitude.
The poplars—not the tulip—also bloom in April, and are freely
visited by the bees. The wood is immaculate, and i& used for
toothpicks. Why not use it for honey-boxes?

Fig. 76.—American Wistaria.

MAY PLANTS.

In May we have the grand sugar maple, Acer saccharinum (Fig,


73), incomparable for beauty, also all our various fruit trees, peach,
cherry, plum, apple, etc., in fact all the Rosaceæ family. Our beautiful
American Wistaria, Wistaria frutescens (Fig, 76), the very
ornamental climber, or the still more lovely Chinese Wistaria,
Wistaria sinensis (Fig, 77), which has longer racemes than the
native, and often blossoms twice in the season. These are the
woody twiners for the apiarist. The barberry, too, Berberis vulgaris
(Fig, 78), comes after fruit blossoms, and is thronged with bees in
search of nectar in spring, as with children in winter, in quest of the
beautiful scarlet berries, so pleasingly tart.
Fig. 77.—Chinese
Wistaria.

Fig. 78.—
Barberry.

In California, the sumac, the coffee berry, and the famous white
sage (Fig, 79), keep the bees full of activity.
Fig. 79.—White Sage.

JUNE PLANTS.
Fig. 80.—White or
Dutch Clover.
With June comes the incomparable white or Dutch clover,
Trifolium repens (Fig, 80), whose chaste and modest bloom
betokens the beautiful, luscious, and unrivalled sweets which are
hidden in its corolla tube. Also its sister, Alsike or Swedish, Trifolium
hybrida (Fig, 81), which seems to resemble both the white and red
clover. It is a stronger grower than the white, and has a whitish
blossom tinged with pink. This forms excellent pasture and hay for
cattle, sheep, etc., and may well be sown by the apiarist. It will often
pay apiarists to furnish neighbor farmers with seed as an inducement
to grow this par excellent honey plant. Like white clover, it blooms all
through June into July. Both of these should be sown early in spring
with timothy, five or six pounds of seed to the acre, in the same
manner that red clover seed is sown.
Fig. 81.—Alsike Clover.
Fig. 82.—Melilot
Clover.

Fig. 83.—Borage.

Sweet clover, yellow and white, Melilotus officinalis (Fig, 82), and
Melilotus alba, are well named. They bloom from the middle of June
to the middle of July. Their perfume scents the air for long distances,
and the hum of bees that throng their flowers is like music to the
apiarist's ear. The honey, too, is just exquisite. These clovers are
biennial, not blooming the first season, and dying after they bloom
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebooknice.com

You might also like