0% found this document useful (0 votes)
14 views42 pages

Unit 3

The document discusses cloud infrastructure, highlighting the architecture, design challenges, and various cloud service models including IaaS, PaaS, and SaaS. It outlines key challenges such as service availability, data privacy, performance bottlenecks, and the need for scalability and interoperability. Additionally, it details the roles of cloud consumers, providers, auditors, brokers, and carriers within the NIST cloud computing reference architecture.

Uploaded by

haripriyamca20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views42 pages

Unit 3

The document discusses cloud infrastructure, highlighting the architecture, design challenges, and various cloud service models including IaaS, PaaS, and SaaS. It outlines key challenges such as service availability, data privacy, performance bottlenecks, and the need for scalability and interoperability. Additionally, it details the roles of cloud consumers, providers, auditors, brokers, and carriers within the NIST cloud computing reference architecture.

Uploaded by

haripriyamca20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

UNIT III

CLOUD INFRASTRUCTURE

Cloud Architecture and Design


Cloud computing architecture is a hybrid design that combines
Service Oriented Architecture (SOA) and Event-Driven Architecture
(EDA). It refers to various components and subcomponents that work
together to create the system’s overall architecture. It offers higher
bandwidth to its clients, due to which stored data in the cloud can be
accessed from wherever they are in the world at any time. It allows
businesses to lessen or eliminate their dependency on servers, storage,
and networking infrastructure hosted on their own premises.
Architectural design challenges:
Challenge 1 : Service Availability and Data Lock-in Problem Service
Service Availability
o Depending on single service provider might result in failure.
o In case of single service providers, even if company has multiple data
located in different geographic regions, it may have common software
infrastructure and accounting systems.
Data Lock-in.
Data Lock-in is a situation in which a customer using service of a provider
cannot be moved to another service provider because technologies used by a
provider will be incompatible with other providers
This makes a customer dependent on a vendor for services and makes
customer unable to use service of another vendor.
Challenge 2: Data Privacy and Security Concerns
Cloud services are prone to attacks because they are accessed through internet.
o Storing the encrypted data in to cloud.
o Firewalls, filters.
Cloud environment attacks include
o Guest hopping
o Hijacking
o VM rootkits
Challenge 3: Unpredictable Performance and Bottlenecks
• Multiple VMs can share CPUs and main memory in cloud computing, but
I/O sharing is problematic.
• Internet applications continue to become more data-intensive (handles
huge amount of data).
• Handling huge amount of data (data intensive) is a bottleneck in cloud
environment.
• Weak Servers that does not provide data transfers properly must be
removed from cloud environment
Challenge 4: Distributed Storage and Widespread Software Bugs
• The database is always growing in cloud applications.
• There is a need to create a storage system that meets this growth.
• This demands the design of efficient distributed SANs (Storage Area
Network of Storage devices).
• Bug refers to errors in software. Debugging must be done in Data centres
o Scalability
o Data durability
o HA(High Availability)
o Data consistence
Challenge 5: Cloud Scalability, Interoperability and Standardization
Cloud Scalability
Cloud resources are scalable. Cost increases when storage and network
bandwidth scaled(increased)
Interoperability
• Open Virtualization Format (OVF) describes an open, secure, portable,
efficient, and extensible format for the packaging and distribution of VMs.
• OVF defines a transport mechanism for VM, that can be applied to different
virtualization platforms
Standardization
Cloud standardization, should have ability for virtual machine to run on
any virtual platform
Challenge 6: Software Licensing and Reputation Sharing
• Cloud providers can use both pay-for-use and bulk-use licensing schemes to
widen the business coverage.
• Cloud providers must create reputation-guarding services similar to the
“trusted e-mail” services
• Cloud providers want legal liability to remain with the customer, and vice
versa.
Technologies for Network based system
1.Multicore CPUs and Multithreading Technologies
The growth of component and network technologies over the past 30 years.
They are crucial to the development of HPC and HTC systems. In Figure
1.4, processor speed is measured in millions of instructions per
second (MIPS) and network bandwidth is measured in megabits per second
(Mbps) or gigabits per second (Gbps). The unit GE refers to 1 Gbps Ethernet
bandwidth.
Multithreading Technology
The dispatch of five independent threads of instructions to four pipelined data
paths (functional units) in each of the following five processor categories,
from left to right
2. GPU Computing to Exascale and Beyond
• A GPU is a graphics coprocessor or accelerator mounted on a computer’s
graphics card or video card.
• A GPU offloads the CPU from tedious graphics tasks in video editing
applications. The world’s first GPU, the GeForce 256, was marketed by
NVIDIA in 1999.
• These GPU chips can pro-cess a minimum of 10 million polygons per
second, and are used in nearly every computer on the market today. Some
GPU features were also integrated into certain CPUs.
• Traditional CPUs are structured with only a few cores. For example, the
Xeon X5670 CPU has six cores. However, a modern GPU chip can be built
with hundreds of processing cores.
3. Memory, Storage, and Wide-Area Networking
The growth of DRAM chip capacity from 16 KB in 1976 to 64 GB in 2011.
This shows that memory chips have experienced a 4x increase in capacity
every three years.
Memory access time did not improve much in the past. In fact, the memory
wall problem is getting worse as the processor gets faster. For hard drives,
capacity increased from 260 MB in 1981 to 250 GB in 2004.
local area network (LAN) storage area network (SAN) Network attached
storage (NAS)
4. Virtual Machines and Virtualization Middleware
Virtual Machines
• The VMM provides the VM abstraction to the guest OS. With full
virtualization, the VMM exports a VM abstraction identical to the physical
machine so that a standard OS such as Windows 2000 or Linux can run
just as it would on the physical hardware. Low-level VMM operations
• The VM is built with virtual resources managed by a guest OS to run a
specific application. Between the VMs and the host platform, one needs to
deploy a middleware layer called a virtual machine monitor (VMM).
5. Data Center Virtualization for Cloud Computing
Data Center Growth and Cost Breakdown
• A large data center may be built with thousands of servers. Smaller data
centers are typically built with hundreds of servers.
• The cost to build and maintain data center servers has increased over the
years
Low-Cost Design Philosophy
• High-end switches or routers may be too cost-prohibitive for building
data centers. Thus, using high-bandwidth networks may not fit the
economics of cloud computing.
• The software layer handles network traffic balancing, fault tolerance,
and expandability.
Convergence of Technologies
(1) Hard-ware virtualization and multi-core chips,
(2) Utility and grid computing,
(3) SOA, Web 2.0, and WS mashups, and
(4) Atomic computing and data center automation.
NIST Cloud computing Reference Architecture
The NIST cloud computing reference architecture is a generic high-level
conceptual model that is a powerful tool for discussing the requirements,
structures, and operations of cloud computing
In September 2011, The National Institute for Standard and Technology
(NIST) created Special Publication (SP) 500-292, “NIST Cloud
Computing Reference Architecture,” to establish a baseline cloud
computing architecture.
The NIST SP 500-292 breaks down into several sections that define and
explain all elements of cloud computing.
The Level 1 terms – A set of Roles that collectively comprise the cloud Reference
Model
The Level 2 terms – A set of Activities that define the model’s Architectural
Components
1. Cloud Consumer
2. Cloud Provider
3. Cloud Auditor
4. Cloud Broker
5. Cloud Carrier
Cloud Consumer is an individual or organization that acquires and uses
cloud products and services.
1. CLOUD CONSUMER
2. CLOUD PROVIDER
A cloud provider can be a person, an organization, or an entity responsible
for making a service available to cloud consumers. A cloud provider builds
the requested software/platform/ infrastructure services, manages the
technical infrastructure.
2.1 SERVICE DEPLOYMENT
A cloud infrastructure may be operated in one of the following deployment
models: public cloud, private cloud, community cloud, or hybrid cloud.
2.2 SERVICE ORCHESTRATION
Service orchestration refers to the arrangement, coordination, and management
of cloud infrastructure to provide the optimizing capabilities of cloud services.
2.3 CLOUD SERVICE MANAGEMENT
Cloud Service Management includes all of the service-related functions that are
necessary for the management and operation of those services required by or
proposed to cloud consumers
2.4 SECURITY
• “As the Federal Government moves to the cloud, it must be vigilant to
ensure the security and proper management of government information to
protect the privacy of citizens and national security”
• In July 2012, the U.S. Department of Defense released a Cloud Computing
Strategy, which stated
• “The Department has specific cloud computing challenges that require
careful adoption considerations, especially in areas of cybersecurity,
continuity of operations, information assurance (IA), and resilience.”
2.5 PRIVACY
• Cloud providers should protect the assured, proper, and consistent
collection, processing, communication, use, and disposition of personal
information (PI) and personally identifiable information (PII) in the cloud
system. PII is the information that can be used to distinguish or trace an
individual’s identity, such as name, social security number, biometric
records, etc.,
• Cloud computing provides a flexible solution for shared resources,
software, and information.
• American people, harnessing the power of digital technology and enabling
citizens and the federal workforce to securely access government digital
information, data, and services anywhere, and time
3 CLOUD AUDITOR
• A cloud auditor is a party that can conduct independent assessment of
cloud services, information system operations, performance, and the
security of a cloud computing implementation.
• A cloud auditor can evaluate the services provided by a cloud provider in
terms of security controls, privacy impact, performance, and adherence to
service level agreement parameters.
4 CLOUD BROKER
A Cloud Broker as an entity that manages the use, performance, and delivery
of cloud services, and negotiates relationships between Cloud Providers and
Cloud Consumers
Intermediation
Aggregation
Arbitrage
5 CLOUD CARRIER
A cloud carrier acts as an intermediary that provides connectivity and transport
of cloud services between cloud consumers and cloud providers
Cloud services through network access devices, such as computers, laptops,
mobile phones, mobile Internet devices (MIDs), etc.
.
Public, Private and Hybrid clouds
Cloud computing is a revolutionary technology transforming how we store,
access, and process data.
It simply refers to delivering computing resources, such as servers, storage,
databases, software, and applications, over the Internet.

 Public Cloud
 Private Cloud
 Hybrid Cloud
1. Public Cloud
Public cloud is open to all to store and access information via the Internet
using the pay-per-usage method.
Computing resources are managed and operated by the Cloud Service
Provider (CSP). The CSP looks after the supporting infrastructure and ensures
that the resources are accessible to and scalable for the users.
Characteristics of Public Cloud
• Accessibility
• Shared Infrastructure
• Scalability
• Managed by Service Providers
• Reliability and Redundancy
2. Private Cloud
Private cloud is also known as an internal cloud or corporate cloud. It is
used by organizations to build and manage their own data centers
internally or by the third party.
Characteristics of Private Cloud
• Exclusive Use
• Control and Security
• Customization and Flexibility
• Scalability and Resource Allocation
• Performance and dependability

3. Hybrid Cloud

Hybrid Cloud is a combination of the public cloud and the private cloud.
Hybrid Cloud = Public Cloud + Private Cloud
Hybrid cloud is partially secure because the services which are running on
the public cloud can be accessed by anyone, while the services which are
running on a private cloud can be accessed only by the organization's users.
Hybrid cloud setup, organizations can leverage the benefits of both public
and private clouds to create a flexible and scalable computing environment.
Characteristics of Hybrid Cloud
• Integration of Public and Private Clouds
• Flexibility and Scalability
• Enhanced Security and Control
• Cost Optimization
• Data and Application Portability
Cloud Models : IaaS, PaaS and SaaS
Cloud Service Models
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
IaaS is also known as Hardware as a Service (HaaS). It is a computing
infrastructure managed over the internet.
The main advantage of using IaaS is that it helps users to avoid the cost
and complexity of purchasing and managing the physical servers.

Characteristics of IaaS
o Resources are available as a service
o Services are highly scalable
o Dynamic and flexible
o GUI and API-based access
o Automated administrative tasks

Example: DigitalOcean, Linode, Amazon Web Services (AWS),


Microsoft Azure, Google Compute Engine (GCE), Rackspace, and
Cisco Metacloud.
Platform as a Service (PaaS)
PaaS cloud computing platform is created for the programmer to develop,
test, run, and manage the applications.

Characteristics of PaaS
o Accessible to various users via the same development application.
o Integrates with web services and databases.
o Builds on virtualization technology, so resources can easily be scaled
up or down as per the organization's need.
o Support multiple languages and frameworks.
o Provides an ability to "Auto-scale".

Example: AWS Elastic Beanstalk, Windows Azure, Heroku,


Force.com, Google App Engine, Apache Stratos, Magento Commerce
Cloud, and OpenShift.
Software as a Service (SaaS)
SaaS is also known as "on-demand software". It is a software in which
the applications are hosted by a cloud service provider.
Users can access these applications with the help of internet connection
and web browser.

Characteristics of SaaS
o Managed from a central location
o Hosted on a remote server
o Accessible over the internet
o Users are not responsible for hardware and software updates. Updates
are applied automatically.
o The services are purchased on the pay-as-per-use basis

Example: BigCommerce, Google Apps, Salesforce, Dropbox, ZenDesk,


Cisco WebEx, ZenDesk, Slack, and GoToMeeting.
Cloud storage providers
A cloud storage provider, sometimes referred to as a managed service
provider, is a company that offers organizations and individuals the ability
to place and retain data in an off-site storage system. Customers can lease
cloud storage capacity per month or on demand.
Though Box isn't highly competitive on price, it does offer dozens upon
dozens of integrations with other services and a flexible web app that can
open files using desktop software. The free version comes with a
generous 10GB of storage space.
Apple iCloud Drive

Apple iCloud is a must for iPhone and Mac users, since it backs up
photos, documents, and settings on their devices.
It's among the simplest and most reliable storage and syncing services
we've seen.
Dropbox is an established player in the online storage and syncing
space, and it continues to offer a reliable service that includes
good, if sometimes tertiary, features (such as e-signatures ).
Enabling Technologies for the Internet of Things
1. Wireless Sensor Network(WSN) :
A WSN comprises distributed devices with sensors which are used to
monitor the environmental and physical conditions. A wireless sensor
network consists of end nodes, routers and coordinators. End nodes
have several sensors attached to them where the data is passed to a
coordinator with the help of routers. The coordinator also acts as the
gateway that connects WSN to the internet.
• Weather monitoring system
• Indoor air quality monitoring system
• Soil moisture monitoring system
• Surveillance system
• Health monitoring system
2. Cloud Computing :
It provides us the means by which we can access applications as utilities
over the internet. Cloud means something which is present in remote
locations. With Cloud computing, users can access any resources from
anywhere like databases, webservers, storage, any device, and any software
over the internet.
3. Big Data Analytics :
It refers to the method of studying massive volumes of data or big data.
Collection of data whose volume, velocity or variety is simply too massive
and tough to store, control, process and examine the data using traditional
databases.
Big data is gathered from a variety of sources including social network
videos, digital images, sensors and sales transaction records.
Data cleaning
Processing
Visualization
4. Communications Protocols :
They are the backbone of IoT systems and enable network connectivity and
linking to applications. Communication protocols allow devices to exchange
data over the network. Multiple protocols often describe different aspects of a
single communication. when implemented in software they are a protocol
stack.
Data encoding
Addressing schemes
• 5. Embedded Systems :
It is a combination of hardware and software used to perform special
tasks.
• It includes microcontroller and microprocessor memory, networking
units (Ethernet Wi-Fi adapters), input output units (display keyword
etc. ) and storage devices (flash memory).
• It collects the data and sends it to the internet.
Innovative Applications of the Internet of Things.
IoT is a platform where embedded devices are connected to the Internet
to collect and exchange data. It enables machines to interact,
collaborate and learn from experiences like humans. IoT applications
equipped billions of objects with connectivity and intelligence.
1. Wearables
Wearable technology is the hallmark of IoT applications and one of the
earliest industries to deploy IoT. We have fit bits, heart rate monitors and
smartwatches these days.
2. Health care
IoT applications can transform reactive medical-based systems into active
wellness-based systems. Resources that are used in current medical
research lack important real-world information.
3. Industrial Automation
It is one of the areas where the quality of products is an essential factor
for a more significant investment return. Anyone can re-
engineer products and their packaging to provide superior performance
in cost and customer experience with IoT applications.
4. Smart Supply Chain
Customers automate the delivery and shipping with a smart supply chain.
It also provides details of real-time conditions and supply networks.

You might also like