Cloud Computing Unit 1 Notes
Cloud Computing Unit 1 Notes
Cloud Computing means storing and accessing the data and programs on
remote servers that are hosted on the internet instead of the computer’s hard
drive or local server.
Cloud computing is also referred to as Internet-based computing, it is a
technology where the resource is provided as a service through the Internet to
the user.
The data that is stored can be files, images, documents, or any other
storable document.
The following are some of the Operations that can be performed with Cloud
Computing
Storage, backup, and recovery of data
Delivery of software on demand
Development of new applications and services
Streaming videos and audio
Understanding How Cloud Computing Works?
Cloud computing helps users in easily accessing computing resources like
storage, and processing over internet rather than local hardwares. Here we
discussing how it works in nutshell:
Infrastructure: Cloud computing depends on remote network servers
hosted on internet for store, manage, and process the data.
On-Demand Access: Users can access cloud services and resources based
on-demand they can scale up or down the without having to invest for
physical hardware.
Types of Services: Cloud computing offers various benefits such as cost
saving, scalability, reliability and acessibility it reduces capital
expenditures, improves efficiency.
------------------------------------------------------------------------------------------
Origins of Cloud Computing
Mainframe computing in the 1950s and the internet explosion in the 1990s ca
me together to give rise to cloud computing.
Since businesses like Amazon, Google, and Salesforce started providing web-
based services in the early 2000s.
The term “cloud computing” has gained popularity. Scalability, adaptability,
and cost-effectiveness are to be facilitated by the concept’s on-demand
internet-based access to computational resources.
These days, cloud computing is pervasive, driving a wide range of services
across markets and transforming the processing, storage, and retrieval of data.
---------------------------------------------------------------------------------------------
Computing Environments
Computing environments refer to the technology infrastructure and software
platforms that are used to develop, test, deploy, and run software applications.
There are several types of computing environments, including:
1. Mainframe: A large and powerful computer system used for critical
applications and large-scale data processing.
2. Client-Server: A computing environment in which client devices access
resources and services from a central server.
3. Cloud Computing: A computing environment in which resources and
services are provided over the Internet and accessed through a web
browser or client software.
4. Mobile Computing: A computing environment in which users access
information and applications using handheld devices such as
smartphones and tablets.
5. Grid Computing: A computing environment in which resources and
services are shared across multiple computers to perform large-scale
computations.
6. Embedded Systems: A computing environment in which software is
integrated into devices and products, often with limited processing
power and memory.
Each type of computing environment has its own advantages and
disadvantages, and the choice of environment depends on the specific
requirements of the software application and the resources available.
In the world of technology where every tasks are performed with help of
computers, these computers have become one part of human life.
Computing is nothing but process of completing a task by using this
computer technology and it may involve computer hardware and/or
software.
But computing uses some form of computer system to manage, process,
and communicate information.
--------------------------------------------------------------------------------------------
Distributed Systems
Distributed System is a composition of multiple independent systems
but all of them are depicted as a single entity to the users.
The purpose of distributed systems is to share resources and also use
them effectively and efficiently.
Distributed systems possess characteristics such as scalability,
concurrency, continuous availability, heterogeneity, and independence
in failures.
But the main problem with this system was that all the systems were
required to be present at the same geographical location.
Thus to solve this problem, distributed computing led to three more
types of computing and they were-Mainframe computing, cluster
computing, and grid computing.
Cluster Computing
In 1980s, cluster computing came as an alternative to mainframe
computing. Each machine in the cluster was connected to each other by
a network with high bandwidth.
These were way cheaper than those mainframe systems.
These were equally capable of high computations.
Also, new nodes could easily be added to the cluster if it was required.
Thus, the problem of the cost was solved to some extent but the problem
related to geographical restrictions still pertained.
To solve this, the concept of grid computing was introduced.
Grid Computing
In 1990s, the concept of grid computing was introduced.
It means that different systems were placed at entirely different
geographical locations and these all were connected via the internet.
These systems belonged to different organizations and thus the grid
consisted of heterogeneous nodes.
Although it solved some problems but new problems emerged as the
distance between the nodes increased.
The main problem which was encountered was the low availability of
high bandwidth connectivity and with it other network associated issues.
Thus. cloud computing is often referred to as “Successor of grid
computing”.
Virtualization
It refers to the process of creating a virtual layer over the hardware
which allows the user to run multiple instances simultaneously on the
hardware.
It is a key technology used in cloud computing.
It is the base on which major cloud computing services such as Amazon
EC2, VMware vCloud, etc work on.
Hardware virtualization is still one of the most common types of
virtualization.
Web 2.0
Web 2.0 is the interface through which the cloud computing services
interact with the clients.
It is because of Web 2.0 that we have interactive and dynamic web
pages.
It also increases flexibility among web pages.
Popular examples of web 2.0 include Google Maps, Facebook, Twitter,
etc. Needless to say, social media is possible because of this technology
only.
It gained major popularity in 2004.
Service Orientation
A service orientation acts as a reference model for cloud computing.
It supports low-cost, flexible, and evolvable applications.
Two important concepts were introduced in this computing model.
These were Quality of Service (QoS) which also includes the SLA
(Service Level Agreement) and Software as a Service (SaaS).
Utility Computing
Utility Computing is a computing model that defines service
provisioning techniques for services such as compute services along
with other major services such as storage, infrastructure, etc. which are
provisioned on a pay-per-use basis.
Cloud Computing
Cloud Computing means storing and accessing the data and programs on
remote servers that are hosted on the internet instead of the computer’s
hard drive or local server.
Cloud computing is also referred to as Internet-based computing, it is a
technology where the resource is provided as a service through the
Internet to the user.
The data that is stored can be files, images, documents, or any other
storable document.
--------------------------------------------------------------------------------------------
2. Internet Dependency:
A dependable and fast internet connection is essential for cloud
computing.
Business operations may be delayed or interrupted if there are
connectivity problems or interruptions in the internet service that
affect access to cloud services and data.
1. Public Cloud
Public cloud is open to all to store and access information via the Internet
using the pay-per-usage method.
2. Private Cloud
Private cloud is also known as an internal cloud or corporate cloud.
It is used by organizations to build and manage their own data
centers internally or by the third party.
It can be deployed using Opensource tools such as Openstack and
Eucalyptus.
3. Hybrid Cloud
A computer system known as a hybrid cloud involves the usage of both
public and private cloud services.
Utilizing the advantages of both kinds of clouds enables organizations to
meet their own demands and wants.
4. Community Cloud
It allows systems and services to be accessible by a group of
organizations.
It is a distributed system that is created by integrating the services of
different clouds to address the specific needs of a community, industry,
or business.
The infrastructure of the community could be shared between the
organization which has shared concerns or tasks.
It is generally managed by a third party or by the combination of one or
more organizations in the community.
5. Multi-Cloud
It’s similar to the hybrid cloud deployment approach, which combines
public and private cloud resources.
Instead of merging private and public clouds, multi-cloud uses many
public clouds.
Although public cloud providers provide numerous tools to improve the
reliability of their services, mishaps still occur.
As a result, multi-cloud deployment improves the high availability of
the services even more.
Complex, Complex,
Complex,
requires a requires a
requires a
Initial Setup Easy professional professional
professional
team to team to
team to setup
setup setup
Scalability
and High High Fixed High
Flexibility
Between
Cost- Distributed
Cost- public and
Compariso Costly cost among
Effective private
n members
cloud
Data
Low High High High
Security
Data
Low High High High
Privacy
What is the Right Choice for Cloud Deployment Model?
Consider the best cloud deployment model as per our requirements.
Some factors which should be considered before choosing the best deployment
model.
Cost: Cost is an important factor for the cloud deployment model as it tells
how much amount you want to pay for these things.
Scalability: Scalability tells about the current activity status and how much
we can scale it.
Easy to use: It tells how much your resources are trained and how easily
can you manage these models.
Compliance: Compliance tells about the laws and regulations which impact
the implementation of the model.
Privacy: Privacy tells about what data you gather for the model.
Each model has some advantages and some disadvantages, and the selection of
the best is only done on the basis of your requirement. If your requirement
changes, you can switch to any other model.
Working on cloud computing
Cloud service models
The cloud service models refers to what to use in the cloud and how to use the
cloud services.
cloud computing offered in 4 different service models which each satisfy a
unique set of business requirements.
Types of Cloud Service models
The following are 4 types of Cloud Computing Service models.
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
4. Function as as Service (FaaS)
Different cloud service model users
Different users use a different sets of software tools based on their
requirement of business requirements.
-------------------------------------------------------------------------------------------
Difference Between IaaS, PaaS, SaaS And Serverless
The following are the differences between IaaS, PaaS, SaaS and Serverless:
Serverless
Aspect IaaS PaaS SaaS Computing
It is used for
It provides It provides the It provides an
fully
virtualized platform for abstracted
Infrastructure developed
computing application server
software
resources development management
applications
Limited Focuses on
High level of Minimal
Customization customization code, less on
customization customization
options infrastructure
Cloud applications
Cloud security
Cloud security refers to the cybersecurity policies, best practices, controls, and
technologies used to secure applications, data, and infrastructure in cloud
environments.
Cloud security works to provide storage and network protection against
internal and external threats, access management, data governance and
compliance, and disaster recovery.