Cloud Computing unit 1 notes
Cloud Computing unit 1 notes
To build a larger cluster with more nodes, the interconnection network can
be built with multiple levels of Gigabit Ethernet, Myrinet, or InfiniBand
switches.
Through hierarchical construction using a SAN, LAN, or WAN, one can build
scalable clusters with an increasing number of nodes.
The cluster is connected to the Internet via a virtual private network
(VPN) gateway.
All resources of a server node are managed by their own OS.
Thus, most clusters have multiple system images as a result of having many
autonomous nodes under different OS control.
SSI makes the cluster appear like a single machine to the user.
Figure 1.16 shows an example computational grid built over multiple resource
sites owned by different organizations.
2. P2P grids.
In this scenario, client machines (PCs and workstations) are connected to a central
server for compute, e-mail, file access, and database applications.
In this section, P2P systems are introduced at the physical level and overlay
networks at the logical level.
In a P2P system, every node acts as both a client and a server, providing
part of the system resources.
Peer machines are simply client computers connected to the Internet.
All client machines act autonomously to join or leave the system freely.
This implies that no master-slave relationship exists among the peers.
No central coordination or central database is needed.
In other words, no peer machine has a global view of the entire P2P
system.
The system is self-organizing with distributed control.
Figure 1.17 shows the architecture of a P2P network at two abstraction
levels.
Initially, the peers are totally unrelated.
Each peer machine joins or leaves the P2P network voluntarily.
Only the participating peers form the physical network at any time.
Unlike the cluster or grid, a P2P network does not use a dedicated
interconnection network.
The physical network is simply an adhoc network formed at various Internet
domains randomly using the TCP/IP and NAI protocols.
Thus, the physical network varies in size and topology dynamically due to the
free membership.
1.unstructured
2.structured
overlay net-works follow certain connectivity topology and rules for inserting
and removing nodes (peer IDs) from the overlay graph.
Routing mechanism are developed by structured overlays.
Based on application, P2P networks are classified into four groups, as shown in
Table 1.5.
1.Distributed sharing
2.collaborative platform
4.P2P platform
1.fault tolerance
2.failure management
3.load balancing
To resolve the traditional problems. Cloud provides three service models are
Iaas,Paas,Saas.
Internet cloud offers five deployment models are
1.private
2.public
3. community
4.hybrid
5.Multi cloud
3.reduction in cost
8.infrastructure maintenance.
Fig. 1.2 : Conceptual cloud reference model showing different actors and entities
3.Cloud Carrier :An intermediary that provides connectivity and transport of cloud
1.Cloud consumer
A cloud consumer is the most important stakeholder. The cloud service is built
to support a cloud consumer.
The consumer then verifies the service catalogue from the cloud provider and
requests an appropriate service or sets up service contracts for using the
service.
The cloud consumer is billed for the service used.
Some typical usage scenarios include :
Example 1 : Cloud consumer requests the service from the broker instead of
directly contacting the CSP. The cloud broker can then create a new service by
combining multiple services or by enhancing an existing service. Here, the actual
cloud provider is not visible to the cloud consumer. The consumer only interacts
with the broker. This is illustrated in Fig. 1.4.
2.Cloud Provider
• Security: Security, which is a critical function in cloud computing, spans all layers
in the reference architecture. Security must be enforced end-to-end. It has a wide
range from physical to application security. CSPs must take care of security.
• Privacy: Privacy in cloud must be ensured at different levels, such as user privacy,
data privacy, authorization and authentication and it must also have adequate
assurance levels. Since clouds allow resources to be shared, privacy challenges are
a big concern for consumers using clouds.
3. Cloud Auditor
The cloud auditor performs the task of independently evaluating cloud service
controls to provide an honest opinion when requested.
Cloud audits are done to validate standards conformance by reviewing the
objective evidence.
The auditor will examine services provided by the cloud provider for its
security controls, privacy, performance, and so on.
4.Cloud Broker
The cloud broker collects service requests from cloud consumers and
manages the use, performance, and delivery of cloud services.
The cloud broker will also negotiate and manage the relationship between
cloud providers and consumers.
A cloud broker may provide services that fall into one of the following
categories :
• Service intermediation : Here the cloud broker will improve some specific
• Service aggregation : The cloud broker links and integrates different services into
• Service Arbitrage : This is similar to aggregation, except for the fact that services
that are aggregated are not fixed. In service arbitrage, the broker has the liberty to
5. Cloud Carrier
The cloud carrier tries to establish connectivity and transports cloud services
between a cloud consumer and a cloud provider.
Cloud carriers offer network access for consumers, by providing
telecommunication links for accessing resources using other devices (laptops,
computers, tablets, smartphones, etc.)
Cloud carriers provide secure and dedicated high – speed links with cloud
providers and between different cloud entities.
1. Public Cloud
2. Private Cloud
3. Hybrid Cloud
4. Community Cloud
5. Multi-Cloud
1.Public Cloud:
The public cloud makes it possible for anybody to access systems and
services.
The public cloud may be less secure as it is open to everyone.
The public cloud is one in which cloud infrastructure services are provided
over the internet to the general people or major industry groups.
. For example, Google App Engine etc.
Public cloud
Infrastructure Management is not required: Using the public cloud does not
necessitate infrastructure management.
No maintenance: The maintenance work is done by the service provider (not
users).
Dynamic Scalability: To fulfill your company’s needs, on-demand resources
are accessible.
Less secure: Public cloud is less secure as resources are public so there is
no guarantee of high-level security.
Low customization: It is accessed by many public so it can’t be customized
according to personal requirements.
2.Private Cloud
The private cloud deployment model is the exact opposite of the public
cloud deployment model.
It’s a one-on-one environment for a single user(customer).
It is also called “ Internal cloud”.
Private cloud
Better Control: You are the sole owner of the property. You gain complete
command over service integration, IT operations, policies, and user behavior.
Data Security and Privacy: It’s suitable for storing corporate informatioon to
which only authorized staff have access. By segmenting resources within the
same infrastructure, improved access and security can be achieved.
Supports Legacy Systems: This approach is designed to work with legacy
systems that are unable to access the public cloud.
Customization: Unlike a public cloud deployment, a private cloud allows a
company to tailor its solution to meet its specific needs.
Less scalable: Private clouds are scaled within a certain range as there is
4.Hybrid Cloud
Community Cloud
5.Multi-Cloud
We’re talking about employing multiple cloud providers at the same time
under this paradigm, as the name implies.
It’s similar to the hybrid cloud deployment approach, which combines public
and private cloud resources.
Instead of merging private and public clouds, multi-cloud uses many public
clouds.
As a result, multi-cloud deployment improves the high availability of your
services even more.
can choose cloud regions and zones that are close to your clients.
High availability of service: It’s quite rare that two distinct clouds would
which a hacker can take advantage hence, makes the data insecure.
The three service models of cloud computing and their functions are shown in
Fig.1.10
Advantages of IaaS
Disadvantages of IaaS
Advantages of PaaS
PaaS is simple and very much convenient for the user as it can be accessed
via a web browser.
PaaS has the capabilities to efficiently manage the lifecycle.
Disadvantages of PaaS
PaaS has limited control over infrastructure as they have less control over the
environment and are not able to make some customizations.
PaaS has a high dependence on the provider.
Advantages of SaaS
Disadvantages of SaaS
SaaS solutions have limited customization, which means they have some
restrictions within the platform.
SaaS has little control over the data of the user.
SaaS are generally cloud-based, they require a stable internet connection for
proper working.
Cloud infrastructure
Scalability
Virtualization
Efficiency
Reliability
Security
Cloud management receives the user request and finds the correct resources. Cloud
calls the provisioning services which invoke the resources in the cloud. Cloud
management software needs to support both physical and virtual machines.
🞂 Cloud users are able to demand more capacity at peak demand, reduce costs,
technologies
🞂 Cloud users are able to demand more capacity at peak demand, reduce costs,
🞂 Servers are provisioned on demand to perform collective web services using data-
center resources.
🞂 Cloud demands a high degree of trust of massive amounts of data retrieved from
large data centers.
🞂 Software must detect the status of each node server joining and leaving.
🞂 Cloud computing providers such as Google and Microsoft, have built a large
number of data centers.
🞂 The location of the data center is chosen to reduce power and cooling costs.
● The services to public, private and hybrid clouds are conveyed to users through
● It is clear that the infrastructure layer is deployed first to support IaaS services.
● This infrastructure layer serves as the foundation for building the platform layer of
the cloud for supporting PaaS services.
● In turn, the platform layer is a foundation for implementing the application layer for
SaaS applications.
● The infrastructure layer is built with virtualized compute, storage and network
resources.
demanded by users.
● The platform layer is for general purpose and repeated usage of the collection of
software resources.
● This layer provides users with an environment to develop their applications, to test
● The platform should be able to assure users that they have scalability,
dependability, and security protection.
● The application layer is formed with a collection of all needed software modules for
SaaS applications.
● Service applications in this layer include daily office management work such as
● The application layer is also heavily used by enterprises in business marketing and
● From the provider’s perspective, the services at various layers demand different
● In general, SaaS demands the most work from the provider, PaaS is in the middle,
and IaaS demands the least.
● For example, Amazon EC2 provides not only virtualized CPU resources to users
but also management of these provisioned resources.
● The best example of this is the Salesforce.com CRM service in which the provider
supplies not only the hardware at the bottom layer and the software at the top layer
but also the platform and software tools for user application development and
monitoring.
○ Users or brokers acting on user’s behalf submit service requests from anywhere
○ The Pricing mechanism decides how service requests are charged. For instance,
○ The VM Monitor mechanism keeps track of the availability of VMs and their
resource entitlements.
allocated VMs.
○ The Service Request Monitor mechanism keeps track of the execution progress
of service requests.
allocation.
requirements.
● Therefore, using multiple cloud providers may provide more protection from
failures.
Another availability obstacle is distributed denial of service (DDoS) attacks.
The obvious solution is to standardize the APIs so that a SaaS developer can
deploy services and data across multiple cloud providers.
● This will rescue the loss of all data due to the failure of a single company.
● Current cloud offerings are essentially public (rather than private) networks,
exposing the system to more attacks.
● For example, the end user could encrypt data before placing it in a cloud. Many
nations have laws requiring SaaS providers to keep customer data and copyrighted
material within national boundaries.
● On the other hand, Active attacks may manipulate kernel data structures which will
● Multiple VMs can share CPUs and main memory in cloud computing, but I/O
sharing is problematic.
● Cloud users and providers have to think about the implications of placement and
traffic at every level of the system, if they want to minimize costs.
● The opportunity is to create a storage system that will not only meet this growth
but also combine it with the cloud advantage of scaling arbitrarily up and down on
demand.
● No data center will provide such a convenience. One solution may be a reliance
on using VMs in cloud computing.
● The pay as you go model applies to storage and network bandwidth; both are
counted in terms of the number of bytes used.
● AWS charges by the hour for the number of VM instances used, even if the
machine is idle.
● The opportunity here is to scale quickly up and down in response to load variation,
in order to save money, but without violating SLAs.
The user need to realize cross platform live migration between x86 Intel and
● The primary opportunity is either for open source to remain popular or simply for
commercial software companies to change their licensing structure to better fit cloud
computing.
● One can consider using both pay for use and bulk use licensing schemes to widen
the business coverage.