0% found this document useful (0 votes)
33 views20 pages

Cloud - Computing-Unit 2 - New

The document outlines the architecture of cloud computing, detailing its service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid, community). It explains how cloud computing differs from traditional client/server models, emphasizing the role of networks, protocols, and virtualization in delivering scalable and flexible services. Additionally, it discusses the operational mechanics of cloud systems, including the front-end and back-end components, and highlights the importance of network infrastructure in supporting cloud services.

Uploaded by

Shikha Kamra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views20 pages

Cloud - Computing-Unit 2 - New

The document outlines the architecture of cloud computing, detailing its service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid, community). It explains how cloud computing differs from traditional client/server models, emphasizing the role of networks, protocols, and virtualization in delivering scalable and flexible services. Additionally, it discusses the operational mechanics of cloud systems, including the front-end and back-end components, and highlights the importance of network infrastructure in supporting cloud services.

Uploaded by

Shikha Kamra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst.

Professor, IT
UNIT-II
CLOUD COMPUTING ARCHITECTURE

Syllabus Unit-II
Cloud Computing Architecture: Cloud computing stack, Comparison with traditional computing
architecture (client/server), Services provided at various levels, How Cloud Computing Works,
Role of Networks in Cloud computing, protocols used, Role of Web services, Service
Models (XaaS) - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a
Service (SaaS), Deployment Models- Public cloud, Private cloud, Hybrid cloud, Community cloud.
Netflix Cloud Architecture and Open Source.

Cloud computing stack

Cloud computing, often described as a stack, has a broad range of services built on top of one
another under the name cloud. The generally accepted definition of cloud computing comes from
the National Institute of Standards and Technology (NIST). The NIST definition runs to several
hundred words but begins as follows: `Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly provisioned and released
with minimal management effort or service provider interaction’.

This means that end users can use parts of bulk resources and that these resources can be acquired
quickly and easily. NIST also describes several characteristics as essential for a service to be
considered cloud:

On-demand self-service: End users can sign up and receive services without the long delays that
have characterized traditional IT.

Broad network access: Users can access the services by using standard platforms (such as desktop,
laptop, and mobile).

Resource pooling: Resources are pooled across multiple customers.

Rapid elasticity: Capability can scale to cope with demand peaks.

Measured service: Billing is metered and delivered as a utility service.

23
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
• SaaS applications are designed for end-users, delivered over the web.
• PaaS is the set of tools and services designed to make coding and deploying those applications
quick and efficient.
• IaaS is the hardware and software that powers it all – servers, storage, networks, and
operating systems.

Comparison with traditional computing architecture (client/server)

The client–server model is a distributed application structure that partitions tasks or workloads
between the providers of a resource or service, called servers, and service requesters, called clients.
Often clients and servers communicate over a computer network on separate hardware, but both
client and server may reside in the same system. A server host runs one or more server programs
which share their resources with clients. A client does not share any of its resources, but requests a
server's content or service function. Clients therefore initiate communication sessions with servers
which await incoming requests. Examples of computer applications that use the client–server model
are Email, network printing, and the World Wide Web.

Cloud computing are then offered as the following service model, think about these as a X as a
service (XaaS)

• Software as a service (SaaS) - The capability provided to the consumer is to use the
provider’s applications running on a cloud infrastructure. The applications are accessible
from various client devices through either a thin client interface, such as a web browser

24
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
• Platform as a Service (PaaS) - The capability provided to the consumer is to deploy onto the
cloud infrastructure consumer-created or acquired applications created using programming
languages, libraries, services, and tools supported by the provider
• Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision
processing, storage, networks, and other fundamental computing resources where the
consumer is able to deploy and run arbitrary software

Services provided at various levels in cloud computing

Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a
shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with minimal management effort or service
provider interaction.

Although cloud computing has evolved over the time it has been majorly divided into three broad
service categories: Infrastructure as a Service (IAAS), Platform as a Service (PAAS) and Software as
a Service (SAAS) which are broadly discussed below:

Infrastructure as a Service (IAAS)


Infrastructure as a Service (IAAS) is a form of cloud computing that provides virtualized computing
resources over the internet. In an IAAS model, a third party provider hosts hardware, software,
servers, storage and other infrastructure components on the behalf of its users. IAAS providers also
host users’ applications and handle tasks including system maintenance backup and resiliency
planning. IAAS platforms offer highly scalable resources that can be adjusted on-demand which
makes it a well-suited for workloads that are temporary, experimental or change unexpectedly.

25
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
IAAS- Network:

There are two major network services offered by public cloud service providers: load balancing and
DNS (domain name systems). Load balancing provides a single point of access to multiple servers
that run behind it. A load balancer is a network device that distributes network traffic among servers
using specific load balancing algorithms. DNS is a hierarchical naming system for computers, or any
other gaming devices that use IP addressing for network identification – a DNS system associates
domain names with IP addresses.

Platform as a Service (PAAS)


Platform as a Service (PAAS) is a cloud computing model that delivers applications over the
internet. In a PAAS model, a cloud provider delivers hardware and software tolls, usually those
needed for application development, to its users as a service. A PAAS provider hosts the hardware
and software on its own infrastructure. As a result, PAAS frees users from having to install in-
house hardware and software to develop or run a new application.

PAAS doesn’t replace a business' entire infrastructure but instead, a business relies on PAAS
providers for key services, such as Java development or application hosting. A PAAS provider,
however, supports all the underlying computing and software; users only need to log in and start
using the platform-usually through a Web browser interface. PAAS providers then charge for that
access on a per-user basis or on monthly basis.

Some of the main characteristics of PAAS are:

• Scalability and auto-provisioning of the underlying infrastructure.


• Security and redundancy.
• Build and deployment tools for rapid application management and deployment.
• Integration with other infrastructure components such as web services, databases, and
LDAP.
• Multi-tenancy, platform service that can be used by many concurrent users.
• Logging, reporting, and code instrumentation.
• Management interfaces and/or API.

Software as a Service (SAAS)


Software as a Service (SAAS) is a software distribution model in which applications are hosted by a
vendor or service provider and made available to customers over a network, typically the Internet.
SAAS has become an increasingly prevalent delivery model as underlying technologies that support
Web services and service-oriented architecture (SOA) mature and new development approaches,
such as Ajax, become popular. SAAS is closely related to the ASP (Application service provider)

26
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
and on-demand computing software delivery models. IDC identifies two slightly different delivery
models for SAAS namely the hosted application model and the software development model.

Some of the core benefits of using SAAS model are:

• Easier administration.
• Automatic updates and patch management.
• Compatibility: all users will have the same version of software.
• Easier collaboration, for the same reason.

• Global accessibility.
Some of the other service categories which are more commonly classified as anything as a
Service (XAAS) are:

Storage as a Service (SAAS)


Storage as a Service is a business model in which a large company rents space in their storage
infrastructure to a smaller company or individual. The economy of scale in the service provider's
infrastructure theoretically allows them to provide storage much more cost-effectively than most
individuals or corporations can provide their own storage when the total cost of ownership is
considered.

Communications as a Service (CAAS)

Communications as a Service (CAAS) can include voice over IP (VoIP or Internet telephony),
instant messaging (IM), collaboration and video conference applications using fixed and mobile
devices. The CAAS vendor is responsible for all hardware and software management and offers
guaranteed Quality of Service (QoS). CAAS allows businesses to selectively deploy
communications devices and modes on a pay-as-you-go, as-needed basis.

Network as a Service (NAAS)

NAAS is a new cloud computing model in which the clients have access to additional computing
resources collocated with switches and routers. NAAS can include flexible and extended Virtual
Private Network (VPN), bandwidth on demand, custom routing, multicast protocols, security
firewall, intrusion detection and prevention, Wide Area Network (WAN), content monitoring and
filtering, and antivirus.
Monitoring as a Service (MAAS)

Monitoring-as-a-service (MAAS) is a framework that facilitates the deployment of monitoring


functionalities for various other services and applications within the cloud. The most common

27
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
application for MAAS is online state monitoring, which continuously tracks certain states of
applications, networks, systems, instances or any element that may be deployable within the cloud.
MAAS makes it easier for users to deploy state monitoring at different levels of Cloud services.

How Cloud Computing Works

To understand the workings of a cloud computing system, it is easier to divide it into two sections:
the front end and the back end. They are connected to each other through a network, usually the
Internet.

The front end is the side of the computer user or client. The back end is ‘the cloud’ section of the
system.

The front end consists of the client’s computer or computer network. Also the application essential
to access the cloud computing system. It is not necessary that all cloud computing systems have the
same user interface.

On the back end of the cloud technology system, there are various computers, servers and data
storage systems that make up the cloud. A cloud computing system could potentially include any
computer program, from data processing to video games. Generally, each application will have its
own dedicated server.

Let's say you're an executive at a large corporation. Your particular responsibilities include making
sure that all of your employees have the right hardware and software they need to do their jobs.
Buying computers for everyone isn't enough -- you also have to purchase software or software
licenses to give employees the tools they require. Whenever you have a new hire, you have to buy
more software or make sure your current software license allows another user. It's so stressful that
you find it difficult to go to sleep on your huge pile of money every night.

28
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT

Soon, there may be an alternative for executives like you. Instead of installing a suite of software
for each computer, you'd only have to load one application. That application would allow workers
to log into a Web-based service which hosts all the programs the user would need for his or her job.
Remote machines owned by another company would run everything from e-mail to word
processing to complex data analysis programs. It's called cloud computing, and it could change the
entire computer industry.

Role of Networks in Cloud Computing

Emerging capabilities of network have enabled cloud to successfully provide on-demand services
which can unilaterally provision computing capabilities such as servers, network, OS and storage.
Further, it allows resource pooling where multiple users through multiple tenant model (multiple
customer utilizing the same facility) can access different physical and virtual resources.
Additionally, virtualization permits applications, compute and network resources to reside
anywhere, which are then accessed through the network, thus allowing these resources to be
flexible and scalable. Cloud computing also has the capability to measure the services being offered
through the usage of charge back or metering where it can control and optimize resource usage.

The network plays a key role in the delivery of cloud-based services as it provides a means to
connect every IT system and has the ability to provision and scale these resources to meet
application and end-user requirements. It also is one of strategic element used for management
of security objectives in the cloud as it:

• Enables infrastructure enhancements by supporting server consolidation, virtualized


environment, automated infrastructure and support application mobility.
• Addresses access requirements emerging from thin clients or organization mobility
requirements which may extend to any device at any time from any place.
• Offers application analytics by clustering requirements and enabling remote usage or
community services
• Supports varied traffic patterns through location independent endpoints while ensuring
automated provisioning and orchestration.

Virtualization and cloud computing have changed the way that the network needs to behave and
interact with the other systems in the data-center. For example, Unlike a physical workload, which
is tied to a particular server, a virtual workload can exist anywhere on any server. This change
requires the network to touch each and every component from the edge of the server
up to the individual virtual machines. Virtual machines have the potential to move

29
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
within and between data-centers. This movement can break the traditional model of how data-center
networks are built, so it is important to think about how modifications to the
network need to be implemented. As the number of virtual machines increases
the network needs a strategic approach where instead of connecting servers together, it needs to
connect with virtual machines. Technology has made it possible to connect virtualized network
elements such as virtual network interface cards or virtual switches, permitting a new logical
network topology between virtual machines and the hypervisors. As the computational density and
the number of virtual machines per physical server increase in the cloud environment, it impacts the
amount and varied traffic volumes. The network needs to be robust, flexible, automated to support
virtualization, cloud computing, and a diverse end-point ecosystem. Additionally, storage and LAN
convergence in the cloud will drive the need for more predictable, high performance network
architectures
To meet these new requirements, a strong connection needs to exist between the server and the
network. This is when a network and a server starts to become a fabric by allowing storage
networks to seamlessly extend into the Ethernet resulting in a single network with a flexibility to
deploy both protocols between server and storage. The fabric based infrastructure, not only has the
capability to reconfigure all system components – server, network, storage, and specialty engines
but also has the flexibility to provide resources within the fabric to workloads as needed, thus being
capable enough to manage systems holistically. The Fabric allows integrated, model-based
management to simplify and speed deployment of virtualized environments, bringing the network
directly to server and virtual machines for increased performance, security, and manageability.
Further, integrated network services provide high-speed connectivity and high availability, increase
application performance, and reduce security risks in multitenant environments. Additionally, the
fiber architecture allows storage networks to seamlessly extend into the Ethernet resulting in a
single network with a flexibility to deploy both protocols between server and storage. A fabric
provides transparency so that virtual machines are visible on both the server and the network, with
capabilities to help ensure that security policies follow the virtual machine thus empowering
organization to move on the cloud.

Protocols used in Cloud Computing

Protocols: set of rules that allow two electronics item to connect and exchange information to one
another. Used for storage, communication, for encryption, decryption, networking, security, user-
login management etc.

30
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
Gossip Protocol: It is a communication protocol. Also referred as an epidemic protocol used to
repairing a data. The dissemination protocol used to spread information basically it work by using
flooding agent in n/w. It is used for failure detection, monitoring and messaging.

Connection-less n/w protocol (CLNP): It works on layer-3 protocol OSI model. Mechanism of
fragmentation (data unit identification, length of data and offset address). Exactly same like IP but
basic difference is that CNLP address. Size is 20 bytes as compared to IP (4 byte).
State Routing Protocol (SRP): A router communicates with each other; routing protocol is used to
choose the path to route the information.
Routing information Protocol (RIP) is used to know the information about path/routing.
Internet Group Management Protocol (IGMP): It is a Communication protocol used to multicast
the data to the nodes in a network via router. It can be used for streaming video, gaming over cloud.
It operates on n/w layer just like other management protocol like ICMP. Example is Watching
online video over cloud.
Secure Shell protocol (SSHP): Cryptographic n/w protocol allow remote login securely over
internet. Advantage is remote login with encryption & access information. Two versions are SSH-1
& SSH-2.
Coverage Enhanced Ethernet Protocol (CEE): N/w traffic & packet loss issues are solved.
Packet will be loss when new packets are comes via switch so data will loss so it is solution over it.
Advantages – handle packet traffic on data-link layer, lower cost, for storing the packets.
Extensible Messaging & Presence Protocol (XMPP): Used for publish subscriber system, video
& file transfer in cloud. It is developed by jabber open source community in 1999 & its freeware
protocol. In December 2011 Microsoft released an XMPP interface for messenger service.
Advanced Message Queuing Protocol (AMQP): Message/information is routed in a manner over
cloud. Wireless protocol provide description format of data send on n/w. It provides guarantees of
message delivery & work on application layer. It is used in cloud but now-a-days used in Red hat,
Microsoft, Apache etc.
Enhanced Interior Gateway Routing Protocol (EIGRP): It is Replaced IGRP in 1993 because
IGRP didn’t support of IP classes of IP4 but it supports. Features of this protocols are – support load
balancing on parallel linked site.
Media Transfer Protocol (MTP): It transfers the media files, audio files, metadata to & from the
portable device over a cloud. Actually PTP used to transfer the media files. It is used for
downloading photographs from cloud. MTP is a part of windows media player from windows NT.
MTP is used in Microsoft series.
Role of Web services

31
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
A web service is a unit of managed code that can be remotely invoked using HTTP. That is, it can be
activated using HTTP requests. Web services allow you to expose the functionality of your existing
code over the network. Once it is exposed on the network, other applications can use the
functionality of your program.

Web Services are illustrated in this section: SOAP, REST, and JSON.
SOAP

SOAP was originally part of the specification that included the Web Services Description Language
(WSDL) and Universal Description, Discovery, and Integration (UDDI). It is used now without
WSDL and UDDI. Instead of the discovery process described in the History of the Web Services
Specification section below, SOAP messages are hard-coded or generated without the use of a
repository.

Representation State Transfer (REST)


Representation State Transfer (REST) appeals to developers because it has a simpler style that
makes it easier to use than SOAP. It also less verbose so that less volume is sent when
communicating. The interaction is illustrated in the figure below.

JavaScript Object Notation (JSON)

While both SOAP and REST use XML for interchange, JavaScript Object Notation (JSON) uses a
subset of JavaScript.

When to Use SOAP, REST, JSON or Other Options

There really is no "best" option for Web Services. Generally, you will use whatever your service
provider supports. If you use multiple service providers, it is easily possible that you will be using
all three Web Services specifications: SOAP, REST, and JSON.

History of the Web Services Specification

Web Services Description Language (WSDL); Universal Description and Discovery (UDDI); and
SOAP formed the original Web Services specification. This section provides a history.

Web Services Description Language (WSDL)


The Web Services Description Language (WSDL) forms the basis for the original Web Services
specification. The following figure illustrates the use of WSDL. At the left is a service provider. At
the right is a service consumer. The steps involved in providing and consuming a service are:

32
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
1. A service provider describes its service using WSDL. This definition is published to a repository of
services. The repository could use Universal Description, Discovery, and Integration (UDDI). Other
forms of directories could also be used.
2. A service consumer issues one or more queries to the repository to locate a service and determine
how to communicate with that service.
3. Part of the WSDL provided by the service provider is passed to the service consumer. This tells the
service consumer what the requests and responses are for the service provider.
4. The service consumer uses the WSDL to send a request to the service provider. 5. The service
provider provides the expected response to the service consumer.

Universal Description, Discovery, and Integration (UDDI)

The repository shown in the above figure could be a UDDI registry. The UDDI registry was
intended to eventually serve as a means of "discovering" Web Services described using WSDL. The
idea is that the UDDI registry can be searched in various ways to obtain contact information and the
Web Services available for various organizations. The UDDI registry is a way to keep up-to-date on
the Web Services your organization currently uses. It can be used at design time and with
governance.

SOAP

All the messages shown in the above figure are sent using SOAP. (SOAP at one time stood for
Simple Object Access Protocol. Now, the letters in the acronym have no particular meaning.) SOAP
essentially provides the envelope for sending the Web Services messages. SOAP generally uses
HTTP, but other means of connection may be used. HTTP is the familiar connection we all use for
the Internet. In fact, it is the pervasiveness of HTTP connections that will help drive the adoption of
Web Services.

Service Models (XaaS)

IaaS

Infrastructure-as-a-Service provides access to fundamental resources such as physical machines,


virtual machines, virtual storage, etc. Apart from these resources, the IaaS also offers:
• Virtual machine disk storage
• Virtual local area network (VLANs)
• Load balancers

33
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
• IP addresses  Software bundles
All of the above resources are made available to end user via server virtualization. Moreover,
these resources are accessed by the customers as if they own them.

Benefits
IaaS allows the cloud provider to freely locate the infrastructure over the Internet in a cost-effective
manner. Some of the key benefits of IaaS are listed below:

• Full control of the computing resources through administrative access to VMs.


• Flexible and efficient renting of computer hardware.  Portability, interoperability with
legacy applications.

Characteristics Here are the characteristics of


IaaS service model:
• Virtual machines with pre-installed software.

• Virtual machines with pre-installed operating systems such as Windows, Linux, and Solaris.
• On-demand availability of resources.
• Allows to store copies of particular data at different locations.
• The computing resources can be easily scaled up and down.
PaaS

Platform-as-a-Service offers the runtime environment for applications. It also offers development
and deployment tools required to develop applications. PaaS has a feature of point-and-click tools
that enables non-developers to create web applications.

App Engine of Google and Force.com are examples of PaaS offering vendors. Developer may log
on to these websites and use the built-in API to create web-based applications.

34
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT

But the disadvantage of using PaaS is that, the developer locks-in with a particular vendor. For
example, an application written in Python against API of Google, and using App Engine of Google
is likely to work only in that environment.

The following diagram shows how PaaS offers an API and development tools to the developers and
how it helps the end user to access business applications.

Benefits Following are the benefits of


PaaS model:

Lower administrative overhead

Customer need not bother about the administration because it is the responsibility of cloud provider.

Lower total cost of ownership Customer need not purchase expensive hardware,
servers, power, and data storage.

Scalable solutions It is very easy to scale the resources up or down automatically,


based on their demand.

More current system software


It is the responsibility of the cloud provider to maintain software versions and patch installations.

Characteristics

Here are the characteristics of PaaS service model:


• PaaS offers browser based development environment. It allows the developer to create

database and edit the application code either via Application Programming Interface or
point-and-click tools.
• PaaS provides built-in security, scalability, and web service interfaces.
• PaaS provides built-in tools for defining workflow, approval processes, and business rules.
• It is easy to integrate PaaS with other applications on the same platform.
• PaaS also provides web services interfaces that allow us to connect the applications outside
the platform.

PaaS Types
Based on the functions, PaaS can be classified into four types as shown in the following diagram:

1. Stand-alone development environments

The stand-alone PaaS works as an independent entity for a specific function. It does not include
licensing or technical dependencies on specific SaaS applications.

35
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT

2. Application delivery-only environments


The application delivery PaaS includes on-demand scaling
and application security.

3. Open platform as a service


Open PaaS offers an open source software that helps a PaaS provider to run applications.

4. Add-on development facilities


The add-on PaaS allows customizing the existing SaaS platform.
SaaS

Software-as–a-Service (SaaS) model allows to provide software application as a service to the end
users. It refers to a software that is deployed on a host service and is accessible via Internet. There
are several SaaS applications listed below:

• Billing and invoicing system


• Customer Relationship Management (CRM) applications
• Help desk applications
• Human Resource (HR) solutions
Some of the SaaS applications are not customizable such as Microsoft Office Suite. But SaaS
provides us Application Programming Interface (API), which allows the developer to develop a
customized application.

Characteristics
• SaaS makes the software available over the Internet.

• The software applications are maintained by the vendor.


• The license to the software may be subscription based or usage based. And it is billed on
recurring basis.
• SaaS applications are cost-effective since they do not require any maintenance at end user
side.
• They are available on demand.
• They can be scaled up or down on demand.  They are automatically upgraded and updated.

Benefits
Using SaaS has proved to be beneficial in terms of scalability, efficiency and performance. Some of
the benefits are listed below:

• Modest software tools


• Efficient use of software licenses
• Centralized management and data

36
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
• Platform responsibilities managed by provider
• Multitenant solutions

Deployment Models

1. Public Cloud

Public Cloud allows systems and services to be easily accessible to general public. The IT giants
such as Google, Amazon and Microsoft offer cloud services via Internet. The Public Cloud Model
is shown in the diagram below.

Benefits
There are many benefits of deploying cloud as public cloud model. The following diagram shows
some of those benefits:

• Cost Effective: - Since public cloud shares same resources with large number of customers it
turns out inexpensive.
• Reliability: - The public cloud employs large number of resources from different locations. If
any of the resources fails, public cloud can employ another one.
• Flexibility: - The public cloud can smoothly integrate with private cloud, which gives
customers a flexible approach.
• Location Independence: - Public cloud services are delivered through Internet, ensuring
location independence.
• Utility Style Costing: - Public cloud is also based on pay-per-use model and resources are
accessible whenever customer needs them.
• High Scalability: - Cloud resources are made available on demand from a pool of resources,

37
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
i.e., they can be scaled up or down according the requirement.

Disadvantages
Here are some disadvantages of public cloud model:

• Low Security: - In public cloud model, data is hosted off-site and resources are shared
publicly, therefore does not ensure higher level of security.
• Less Customizable: - It is comparatively less customizable than private cloud.
2. Private Cloud

Private Cloud allows systems and services to be accessible within an organization. The Private
Cloud is operated only within a single organization. However, it may be managed internally by the
organization itself or by third-party. The private cloud model is shown in the diagram below.

Benefits
There are many benefits of deploying cloud as private cloud model. The following diagram shows
some of those benefits:

• High Security and Privacy: - Private cloud operations are not available to general public and
resources are shared from distinct pool of resources. Therefore, it ensures high security and
privacy.
• More Control: - The private cloud has more control on its resources and hardware than public
cloud because it is accessed only within an organization.
• Cost and Energy Efficiency: - The private cloud resources are not as cost effective as
resources in public clouds but they offer more efficiency than public cloud resources.

Disadvantages

38
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
Here are the disadvantages of using private cloud model:

• Restricted Area of Operation: - The private cloud is only accessible locally and is very
difficult to deploy globally.
• High Priced: - Purchasing new hardware in order to fulfil the demand is a costly transaction.
• Limited Scalability: - The private cloud can be scaled only within capacity of internal hosted
resources.

3. Hybrid Cloud

Hybrid Cloud is a mixture of public and private cloud. Non-critical activities are performed using
public cloud while the critical activities are performed using private cloud. The Hybrid Cloud
Model is shown in the diagram below.

Benefits
There are many benefits of deploying cloud as hybrid cloud model. The following diagram shows
some of those benefits:

• Scalability: - It offers features of both, the public cloud scalability and the private cloud
scalability.
• Flexibility: - It offers secure resources and scalable public resources.
• Cost Efficiency: - Public clouds are more cost effective than private ones. Therefore, hybrid
clouds can be cost saving.  Security: - The private cloud in hybrid cloud ensures
higher degree of security.

Disadvantages

39
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
• Networking Issues: - Networking becomes complex due to presence of private and public
cloud.
• Security Compliance: - It is necessary to ensure that cloud services are compliant with
security policies of the organization.
• Infrastructure Dependency: - The hybrid cloud model is dependent on internal IT
infrastructure; therefore it is necessary to ensure redundancy across data centres.

4. Community Cloud

Community Cloud allows system and services to be accessible by group of organizations. It shares
the infrastructure between several organizations from a specific community. It may be managed
internally by organizations or by the third-party. The Community Cloud Model is shown in the
diagram below.

Benefits
There are many benefits of deploying cloud as community cloud model.

• Cost Effective: - Community cloud offers same advantages as that of private cloud at low cost.
• Sharing Among Organizations: - Community cloud provides an infrastructure to share cloud
resources and capabilities among several organizations.
• Security: - The community cloud is comparatively more secure than the public cloud but less
secured than the private cloud.

Issues
• Since all data is located at one place, one must be careful in storing data in community cloud
because it might be accessible to others.

40
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
• It is also challenging to allocate responsibilities of governance, security and cost among
organizations.

Netflix Cloud Architecture and Open Source

Netflix is committed to open source. Netflix both leverages and provides open source technology
focused on providing the leading Internet television network. Our technology focuses on providing
immersive experiences across all internet-connected screens. Netflix's deployment technology
allows for continuous build and integration into our worldwide deployments serving members in
over 50 countries. Our focus on reliability defined the bar for cloud based elastic deployments with
several layers of failover. Netflix also provides the technology to operate services responsibly with
operational insight, peak performance, and security. We provide technologies for data (persistent &
semi-persistent) that serve the real-time load to our 62 million members, as well as power the big
data analytics that allow us to make informed decisions on how to improve our service. If you want
to learn more, jump into any of the functional areas below to learn more.

About Netflix

• 109M+ members
• 2000+ employees (1400 tech)
• 80+ countries
• More than 100M hours watch per day
• More than ⅓ NA internet download traffic
• 500+ Micro-services
• 100,000+ VM’s
• 3 regions across the world

Why does Netflix open source?

41
Cloud Computing (PE-IT-A404A) Sem-8th Sandeep Kumar, Asst. Professor, IT
Improve Engineering

• Great feedback from wider community


• Collaborate through open code

Recruit new and retain engineering talent

• Hard problems are openly worked on

Industry Alignment

• Content and cloud technologies

A truly global service

• Replicate data across regions


• Be able to redirect traffic from region to region
• Be able to migrate regional traffic to other regions
• Have automated control across regions Flux Demo

Dynamic, Web Scale & Simpler Security

Security Monkey

● Monitors security policies, tracks changes, alerts on situations

Scumblr

● Searches internet for security “nuggets” (credentials, hacking discussions)

Sketchy

● A safe way to collect text and screenshots from websites

Sleepy Puppy

● Delayed cross site scripting propagation testing framework

Lemur

● x.509 certificate orchestration framework

Stethoscope

● Automated security monitoring and alert for employees

42

You might also like