Module 1 Notes
Module 1 Notes
Cloud Computing
[BIS613D]
Module-1
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 1
BIS613D | Cloud Computing & Security Module-1
Module-01
• Over the last 60 years, computing has evolved through multiple platforms and
environments.
• Shift from centralized computing to parallel and distributed systems.
• Modern computing relies on data-intensive and network-centric architectures.
Platform Evolution
• First Generation (1950-1970): Mainframes like IBM 360 and CDC 6400.
• Second Generation (1960-1980): Minicomputers like DEC PDP 11 and VAX.
• Third Generation (1970-1990): Personal computers with VLSI microprocessors.
• Fourth Generation (1980-2000): Portable and wireless computing devices.
• Fifth Generation (1990-present): HPC and HTC systems in clusters, grids, and cloud
computing.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 2
BIS613D | Cloud Computing & Security Module-1
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 3
BIS613D | Cloud Computing & Security Module-1
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 4
BIS613D | Cloud Computing & Security Module-1
Transparency in data access, resource allocation, job execution, and failure recovery is
essential.
Application domains:
OR
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 5
BIS613D | Cloud Computing & Security Module-1
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 6
BIS613D | Cloud Computing & Security Module-1
Communication Models:
o H2H (Human-to-Human)
o H2T (Human-to-Thing)
o T2T (Thing-to-Thing)
Development & Challenges:
o IoT is in its early stages, mainly advancing in Asia and Europe.
o Cloud computing is expected to enhance efficiency, intelligence, and scalability in IoT
interactions.
Smart Earth Vision: IoT aims to create intelligent cities, clean energy, better healthcare, and
sustainable environments.
CPS integrates computation, communication, and control (3C) into a closed intelligent
feedback system between the physical and digital worlds.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 7
BIS613D | Cloud Computing & Security Module-1
Features:
o IoT vs. CPS: IoT focuses on networked objects, while CPS focuses on VR applications in
the real world.
o CPS enhances automation, intelligence, and interactivity in physical environments.
Development:
• Modern CPUs use multicore architecture (dual, quad, six, or more cores).
• Instruction-Level Parallelism (ILP) and Thread-Level Parallelism (TLP) improve
performance.
• Processor speed evolution:
o 1 MIPS (VAX 780, 1978) → 1,800 MIPS (Intel Pentium 4, 2002) → 22,000
MIPS (Sun Niagara 2, 2008).
• Moore’s Law holds for CPU growth, but clock rates are limited (~5 GHz max) due to heat
and power constraints.
• Modern CPU technologies include:
o Superscalar architecture, dynamic branch prediction, speculative execution.
o Multithreaded CPUs (e.g., Intel i7, AMD Opteron, Sun Niagara, IBM Power 6).
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 8
BIS613D | Cloud Computing & Security Module-1
• CPUs may scale to hundreds of cores but face memory wall limitations.
• GPUs (Graphics Processing Units) are designed for massive parallelism and data- level
parallelism (DLP).
• x86-based processors dominate HPC and HTC systems.
• Trend towards heterogeneous processors combining CPU and GPU cores on a single
chip.
Multithreading Technology
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 9
BIS613D | Cloud Computing & Security Module-1
•GPUs were initially graphics accelerators, now widely used for HPC and AI.
•First GPU: NVIDIA GeForce 256 (1999).
•Modern GPUs have hundreds of cores, e.g., NVIDIA CUDA Tesla.
•GPGPU (General-Purpose GPU Computing) enables parallel processing beyond
graphics.
How GPUs Work
Example 1.1 the NVIDIA Fermi GPU Chip with 512 CUDA Cores
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 10
BIS613D | Cloud Computing & Security Module-1
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 11
BIS613D | Cloud Computing & Security Module-1
Flash memory & SSDs are revolutionizing HPC (High-Performance Computing) and HTC
(High-Throughput Computing).
SSD lifespan: 300,000–1 million write cycles per block, making them durable for years.
Storage trends:
System-Area Interconnects
Small clusters use Ethernet switches or Local Area Networks (LANs).
Types of storage networks:
o Storage Area Network (SAN) – connects servers to network storage.
o Network Attached Storage (NAS) – allows client hosts direct disk access.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 12
BIS613D | Cloud Computing & Security Module-1
Wide-Area Networking
Ethernet speed evolution:
• 10 Mbps (1979) → 1 Gbps (1999) → 40-100 Gbps (2011) → projected 1 Tbps
(2013).
• Network performance grows 2× per year, surpassing Moore’s Law for CPUs.
• High-bandwidth networking enables large-scale distributed computing.
• IDC 2010 report: InfiniBand & Ethernet will dominate HPC interconnects.
• Most data centers use Gigabit Ethernet for server clusters.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 13
BIS613D | Cloud Computing & Security Module-1
• Host VM: The VMM runs in non-privileged mode without modifying the host OS.
• Hybrid VM: VMM operates at both user and supervisor levels, requiring host OS
modifications.
• Advantages: OS independence, application portability, hardware abstraction.
VM Primitive Operations
Virtual Infrastructures
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 14
BIS613D | Cloud Computing & Security Module-1
• Cloud Architecture: Uses commodity hardware (x86 processors, low-cost storage, Gigabit
Ethernet).
• Design Priorities: Cost-efficiency over raw performance, focusing on storage and energy
savings.
Data Center Growth & Cost Breakdown
Uses commodity x86 servers and Ethernet networks instead of expensive hardware. Software
manages network traffic, fault tolerance, and scalability.
Convergence of Technologies Enabling Cloud Computing
• Data Deluge: Massive data from sensors, web, simulations, requiring advanced data
management.
• E-Science Applications: Used in biology, chemistry, physics, and social sciences.
• MapReduce & Iterative MapReduce: Enable parallel processing of big data.
• Multicore & GPU Clusters: Boost computational power for scientific research.
• Cloud Computing & Data Science Convergence: Revolutionizes computing
architecture and programming models.
System Models for Distributed and Cloud Computing
Distributed and Cloud Computing Systems
• Built over a large number of autonomous computer nodes.
• Nodes are interconnected using SANs, LANs, or WANs in a hierarchical manner.
• Clusters of clusters can be created using WANs for large-scale systems.
• These systems are highly scalable, supporting web-scale connectivity.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 15
BIS613D | Cloud Computing & Security Module-1
• Four major types: Clusters, P2P Networks, Computing Grids, and Internet Clouds.
• Involves hundreds, thousands, or even millions of participating nodes.
• Clusters: Popular in supercomputing applications.
• P2P Networks: Used in business applications but face copyright concerns.
• Grids: Underutilized due to middleware and application inefficiencies.
• Cloud Computing: Cost-effective and simple for providers and users.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 16
BIS613D | Cloud Computing & Security Module-1
• Ideal cluster design merges multiple system images into a single-system image.
• SSI makes a cluster appear as a single machine to users.
• Achieved using middleware or OS extensions.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 17
BIS613D | Cloud Computing & Security Module-1
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 18
BIS613D | Cloud Computing & Security Module-1
Computational Grids
• Similar to an electric power grid, integrates computers, software, middleware, and
users.
• Constructed across LANs, WANs, or the Internet at various scales.
• Virtual platforms for supporting virtual organizations.
• Computers used: Workstations, servers, clusters, supercomputers.
• Personal devices (PCs, laptops, PDAs) can also access grid systems.
Grid Families
Definition: Grid computing integrates distributed resources to solve large-scale computing
problems.
Types:
Computational/Data Grids: Built at a national level for large-scale computing and data
sharing.
P2P Grids: Decentralized and self-organizing without a central control.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 19
BIS613D | Cloud Computing & Security Module-1
Client-Server Model: Traditional architecture where clients connect to a central server for
computing resources.
P2P Architecture: Decentralized, with each node acting as both a client and a server.
P2P Systems
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 20
BIS613D | Cloud Computing & Security Module-1
Cloud Computing
Internet Clouds
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 21
BIS613D | Cloud Computing & Security Module-1
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 22
BIS613D | Cloud Computing & Security Module-1
SOA builds on the OSI networking model, using middleware like .NET, Apache Axis, and
Java Virtual Machine.
Higher-level environments handle entity interfaces and inter-entity communication, rebuilding
the OSI layers at the software level.
Layered Architecture for Web Services and Grids
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 23
BIS613D | Cloud Computing & Security Module-1
Entity interfaces include Web Services Description Language (WSDL), Java methods, and
CORBA IDL.
Communication systems: SOAP (Web services), RMI (Java), IIOP (CORBA).
Middleware support: WebSphere MQ, Java Message Service (JMS) for messaging, fault
tolerance, and security.
Service discovery models: JNDI (Java), UDDI, LDAP, ebXML, CORBA Trading Service.
Management services: CORBA Life Cycle, Enterprise JavaBeans, Jini lifetime model, and web
services frameworks.
Web Services vs. REST Architecture
Web Services (SOAP-based):
o Fully specifies service behavior and environment.
o Uses SOAP messages for universal distributed OS functionality.
o Implementation challenges due to complexity.
REST (Representational State Transfer):
o Focuses on simplicity and lightweight communication.
o Uses "XML over HTTP" for rapid technology environments.
o Suitable for modern web applications.
Evolution of SOA
• SOA enables integration across grids, clouds, interclouds, and IoT.
• Sensors (SS) collect raw data, which is processed through compute, storage, filter,
and discovery clouds.
• Filter clouds eliminate unnecessary data to refine information for decision- making.
• Portals (e.g., OGFCE, HUBzero) serve as access points for users.
Grid Computing:
o Uses static resources allocated in advance.
o Focuses on distributed computing with a defined structure.
Cloud Computing:
o Uses elastic resources that scale dynamically.
o Supports virtualization and autonomic computing.
Hybrid Approach:
o Grids can be built out of multiple clouds for better resource allocation.
o Models include cloud of clouds, grid of clouds, and interclouds.
o Technologies like BPEL Web Services, Pegasus, Taverna, Kepler, Trident, and Swift help
manage distributed services.
Trends Toward Distributed Operating Systems
Distributed Operating Systems (DOS)
• Distributed systems have multiple system images due to independent OS on each node.
• A distributed OS enhances resource sharing and fast communication using
message passing and RPCs.
• It improves performance, efficiency, and flexibility of distributed applications.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 25
BIS613D | Cloud Computing & Security Module-1
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 26
BIS613D | Cloud Computing & Security Module-1
Future cloud computing will allow users to switch OS and applications easily. Parallel
and Distributed Programming Models
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 27
BIS613D | Cloud Computing & Security Module-1
MapReduce
Hadoop
Globus Toolkits
• Middleware for resource allocation, security, and authentication in grid computing.
• Developed by Argonne National Lab and USC.
• IBM extended Globus for business applications.
Performance, Security and Energy Efficiency
Performance Metrics and Scalability Analysis
Distributed system performance depends on several factors, including CPU speed (MIPS), network
bandwidth (Mbps), system throughput (Tflops, TPS), job response time, and network latency.
High-performance interconnection networks require low latency and high bandwidth. Other key
metrics include OS boot time, compile time, I/O data rate, system availability, dependability, and
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 28
BIS613D | Cloud Computing & Security Module-1
security resilience.
Dimensions of Scalability
1. Size Scalability – Increasing the number of processors, memory, or I/O channels to improve
performance.
2. Software Scalability – Upgrading OS, compilers, and application software to work
efficiently in large systems.
3. Application Scalability – Adjusting problem size to match machine scalability.
4. Technology Scalability – Adapting to hardware and networking advancements while
ensuring compatibility with existing systems.
Scalability versus OS Image Count
Scalability is affected by OS image count. SMP systems have a single OS image, limiting
scalability, whereas NUMA, clusters, and cloud environments support multiple OS images,
enabling higher scalability.
Amdahl’s Law states that system speedup is limited by the sequential portion of a program.
Even with infinite processors, speedup is constrained by non-parallelizable code.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 29
BIS613D | Cloud Computing & Security Module-1
Gustafson’s Law addresses this limitation by scaling the workload along with system size, resulting in better
efficiency in large distributed systems.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 30
BIS613D | Cloud Computing & Security Module-1
mechanisms.
As system size increases, availability decreases due to higher failure probability. Grids and
clusters have better fault isolation than SMP and MPP systems, while P2P networks have the
lowest availability.
Security Challenges in Distributed Systems
Common Threats:
o Information leaks (loss of confidentiality)
o Data integrity breaches (Trojan horses, user alterations)
o Denial of Service (DoS) attacks (disrupting system operation)
o Unauthorized access (exploiting open computing resources)
Security Responsibilities in Cloud Models:
Collusive Piracy: Paid clients (colluders) share copyrighted content with unpaid clients (pirates),
affecting commercial content delivery.
Content Poisoning Scheme: Proactively detects and prevents piracy using identity-based signatures
and timestamped tokens, protecting legitimate clients while stopping colluders and pirates.
Reputation Systems: Essential in detecting and addressing piracy in P2P networks and digital
content sharing.
System Defense Technologies:
First Generation: Tools focused on preventing intrusions through access control policies,
cryptography, and tokens.
Second Generation: Tools for detecting intrusions (e.g., firewalls, IDS, reputation systems)
and triggering remedial actions.
Third Generation: Intelligent systems that respond to intrusions and adapt to security threats.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 31
BIS613D | Cloud Computing & Security Module-1
1. Energy Consumption Challenges: Systems face rising energy costs, especially in large-
scale data centers and HPC systems (e.g., Earth Simulator, Petaflop).
2. Unused Servers: Many servers in data centers are left powered on without use, leading
to significant energy waste (e.g., 4.7 million idle servers globally).
o Potential Savings: Estimated savings of $3.8 billion in energy costs and $24.7 billion
in operational costs from turning off unused servers.
Middleware Layer:
o Manages energy-efficient scheduling and task management.
o Incorporates energy-aware techniques to optimize power usage during task
scheduling.
Resource Layer:
o Manages hardware (e.g., CPU) and operating systems to optimize energy usage.
o Dynamic Power Management (DPM): Switches between idle and lower-power states.
o Dynamic Voltage-Frequency Scaling (DVFS): Controls power consumption by
adjusting voltage and frequency.
Network Layer:
o Focuses on energy-efficient network routing and protocols.
o New energy-efficient routing algorithms and models are needed for optimized
performance and reduced energy consumption.
Dr. Bhanumathi S., Professor & HOD, ISE, SJCIT, Chickballapur Page 33