0% found this document useful (0 votes)
159 views

Unit 2 Cloud Computing

The document discusses three cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It describes the characteristics and examples of each. The document also covers multi-core technology and its advantages for cloud computing.

Uploaded by

yuvarajy275
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
159 views

Unit 2 Cloud Computing

The document discusses three cloud service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It describes the characteristics and examples of each. The document also covers multi-core technology and its advantages for cloud computing.

Uploaded by

yuvarajy275
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

CLOUD COMPUTING

UNIT-2
Cloud Service Models

There are the following three types of cloud service models -

1. Infrastructure as a Service (IaaS)


2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)

Infrastructure as a Service (IaaS)

IaaS is also known as Hardware as a Service (HaaS). It is a computing infrastructure


managed over the internet. The main advantage of using IaaS is that it helps users to
avoid the cost and complexity of purchasing and managing the physical servers.

Characteristics of IaaS

There are the following characteristics of IaaS -

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

o Resources are available as a service


o Services are highly scalable
o Dynamic and flexible
o GUI and API-based access
o Automated administrative tasks

Example: DigitalOcean, Linode, Amazon Web Services (AWS), Microsoft Azure,


Google Compute Engine (GCE), Rackspace, and Cisco Metacloud.

Platform as a Service (PaaS)

PaaS cloud computing platform is created for the programmer to develop, test, run,
and manage the applications.

Characteristics of PaaS

There are the following characteristics of PaaS -

o Accessible to various users via the same development application.


o Integrates with web services and databases.
o Builds on virtualization technology, so resources can easily be scaled up or
down as per the organization's need.
o Support multiple languages and frameworks.
o Provides an ability to "Auto-scale".

Example: AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App
Engine, Apache Stratos, Magento Commerce Cloud, and OpenShift.

Software as a Service (SaaS)

SaaS is also known as "on-demand software". It is a software in which the


applications are hosted by a cloud service provider. Users can access these
applications with the help of internet connection and web browser.

Characteristics of SaaS

There are the following characteristics of SaaS -

o Managed from a central location

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

o Hosted on a remote server


o Accessible over the internet
o Users are not responsible for hardware and software updates. Updates are
applied automatically.
o The services are purchased on the pay-as-per-use basis

Example: BigCommerce, Google Apps, Salesforce, Dropbox, ZenDesk, Cisco WebEx,


ZenDesk, Slack, and GoToMeeting.

Difference between IaaS, PaaS, and SaaS

The below table shows the difference between IaaS, PaaS, and SaaS -

IaaS Paas SaaS

It provides a virtual data It provides virtual platforms It provides web software


center to store information and tools to create, test, and and apps to complete
and create platforms for deploy apps. business tasks.
app development, testing,
and deployment.

It provides access to It provides runtime It provides software as a


resources such as virtual environments and service to the end-users.
machines, virtual storage, deployment tools for
etc. applications.

It is used by network It is used by developers. It is used by end users.


architects.

IaaS provides only PaaS provides SaaS provides


Infrastructure. Infrastructure+Platform. Infrastructure+Platform
+Software.

Service Oriented Architecture (SOA)

A Service-Oriented Architecture or SOA is a design pattern which is designed to build


distributed systems that deliver services to other applications through the protocol.
It is only a concept and not limited to any programming language or platform.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

What is Service?

A service is a well-defined, self-contained function that represents a unit of


functionality. A service can exchange information from another service. It is not
dependent on the state of another service. It uses a loosely coupled, message-based
communication model to communicate with applications and other services.

Service Connections

The figure given below illustrates the service-oriented architecture. Service


consumer sends a service request to the service provider, and the service provider
sends the service response to the service consumer. The service connection is
understandable to both the service consumer and service provider.

Service-Oriented Terminologies

Let's see some important service-oriented terminologies:

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

o Services - The services are the logical entities defined by one or more
published interfaces.
o Service provider - It is a software entity that implements a service
specification.
o Service consumer - It can be called as a requestor or client that calls a service
provider. A service consumer can be another service or an end-user
application.
o Service locator - It is a service provider that acts as a registry. It is responsible
for examining service provider interfaces and service locations.
o Service broker - It is a service provider that pass service requests to one or
more additional service providers.

Characteristics of SOA

The services have the following characteristics:

o They are loosely coupled.


o They support interoperability.
o They are location-transparent
o They are self-contained.

Components of service-oriented architecture

The service-oriented architecture stack can be categorized into two parts - functional
aspects and quality of service aspects.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

Functional aspects

The functional aspect contains:

o Transport - It transports the service requests from the service consumer to the
service provider and service responses from the service provider to the service
consumer.
o Service Communication Protocol - It allows the service provider and the
service consumer to communicate with each other.
o Service Description - It describes the service and data required to invoke it.
o Service - It is an actual service.
o Business Process - It represents the group of services called in a particular
sequence associated with the particular rules to meet the business
requirements.
o Service Registry - It contains the description of data which is used by service
providers to publish their services.

Quality of Service aspects

The quality of service aspects contains:

o Policy - It represents the set of protocols according to which a service provider


make and provide the services to consumers.
o Security - It represents the set of protocols required for identification and
authorization.
o Transaction - It provides the surety of consistent result. This means, if we use
the group of services to complete a business function, either all must complete
or none of the complete.
o Management - It defines the set of attributes used to manage the services.

Advantages of SOA

SOA has the following advantages:

o Easy to integrate - In a service-oriented architecture, the integration is a


service specification that provides implementation transparency.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

o Manage Complexity - Due to service specification, the complexities get isolated,


and integration becomes more manageable.
o Platform Independence - The services are platform-independent as they can
communicate with other applications through a common language.
o Loose coupling - It facilitates to implement services without impacting other
applications or services.
o Parallel Development - As SOA follows layer-based architecture, it provides
parallel development.
o Available - The SOA services are easily available to any requester.
o Reliable - As services are small in size, it is easier to test and debug them.

MULTICORE TECHNOLOGY:
A set of servers with multicore processors can allow the cloud to
create and scale up more VM instances on demand.

Architecture of Multicore Processor

A multi-core processor's design enables the communication between all available


cores, and they divide and assign all processing duties appropriately. The processed
data from each core is transmitted back to the computer's main board (Motherboard)
via a single common gateway once all of the processing operations have been finished.
This method beats a single-core CPU in terms of total performance.

Advantages of Multi-Core Processor

Multicore processors have a number of advantages (pros), including:

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

Performance

A multi-core CPU, by nature, can do more work as compared to a single-core


processor. The spacing between the cores of an integrated circuit allows for faster
clock rates. As a result, the signals do not need to travel a large distance to reach their
target and are also persistent. When compared to using a separate processor, the
speeds are far quicker.

Reliability

In multi-core CPUs, the software is always assigned to different cores. When one piece
of software fails, the others remain unaffected. Whenever a defect arises, it affects
only one core. As a result, multi-core CPUs are better able to resist faults.

Disadvantages of Multi-Core Processors

We will go through some of the limitations (drawbacks) of a multi-core processor,


including:

Application Speed

Despite the fact that a multi-core CPU is designed for multitasking, its performance
is insufficient. It has a tendency to bounce from one core to the next each time when
an application is processing. As a result, the cache fills up, increasing its speed.

Jitter

More interference develops as the number of cores in a multi-core CPU increase,


resulting in excessive jitters. As a result, your operating system's program
performance may suffer, and frequent failures may occur. Only by using appropriate
synchronization and a microkernel will the user be able to deal with jitter.

Analysis

When you are doing two or more things at once, you will need to employ additional
memory models. In a multi-core machine, this makes analysis tough. Time
limitations, in particular, are difficult to determine and may be inaccurate.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

Cloud Computing Data Storage


Cloud Storage is a service that allows to save data on offsite storage system
managed by third-party and is made accessible by a web services API.

Storage Devices

Storage devices can be broadly classified into two categories:

 Block Storage Devices


 File Storage Devices

Block Storage Devices

The block storage devices offer raw storage to the clients. These raw storage are
partitioned to create volumes.

File Storage Devices

The file Storage Devices offer storage to clients in the form of files, maintaining its
own file system. This storage is in the form of Network Attached Storage (NAS).

Cloud Storage Classes

Cloud storage can be broadly classified into two categories:

 Unmanaged Cloud Storage


 Managed Cloud Storage

Unmanaged Cloud Storage

Unmanaged cloud storage means the storage is preconfigured for the customer. The
customer can neither format, nor install his own file system or change drive
properties.

Managed Cloud Storage

Managed cloud storage offers online storage space on-demand. The managed cloud
storage system appears to the user to be a raw disk that the user can partition and
format.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

Creating Cloud Storage System

The cloud storage system stores multiple copies of data on multiple servers, at
multiple locations. If one system fails, then it is required only to change the pointer
to the location, where the object is stored.

To aggregate the storage assets into cloud storage systems, the cloud provider can
use storage virtualization software known as Storage GRID. It creates a
virtualization layer that fetches storage from different storage devices into a single
management system. It can also manage data from CIFS and NFS file systems over
the Internet. The following diagram shows how Storage GRID virtualizes the storage
into storage clouds:

Virtual Storage Containers

The virtual storage containers offer high performance cloud storage


systems. Logical Unit Number (LUN) of device, files and other objects are created
in virtual storage containers. Following diagram shows a virtual storage container,
defining a cloud storage domain:

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

Networking technologies:

 Network: A network is a collection of computers and devices that are connected


together to enable communication and data exchange.
 Nodes: Nodes are devices that are connected to a network. These can include
computers, Servers, Printers, Routers, Switches, and other devices.
 Protocol: A protocol is a set of rules and standards that govern how data is
transmitted over a network. Examples of protocols include TCP/IP, HTTP,
and FTP.
 Topology: Network topology refers to the physical and logical arrangement of
nodes on a network. The common network topologies include bus, star, ring,
mesh, and tree.
 Service Provider Networks: These types of Networks give permission to take
Network Capacity and Functionality on lease from the Provider. Service Provider
Networks include Wireless Communications, Data Carriers, etc.
 IP Address: An IP address is a unique numerical identifier that is assigned to
every device on a network. IP addresses are used to identify devices and enable
communication between them.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

 DNS: The Domain Name System (DNS) is a protocol that is used to translate
human-readable domain names (such as www.google.com) into IP addresses
that computers can understand.
 Firewall: A firewall is a security device that is used to monitor and control
incoming and outgoing network traffic. Firewalls are used to protect networks
from unauthorized access and other security threats.

Types of Enterprise Computer Networks

LAN: A Local Area Network (LAN) is a network that covers a small area, such as
an office or a home. LANs are typically used to connect computers and other
devices within a building or a campus.
WAN: A Wide Area Network (WAN) is a network that covers a large geographic
area, such as a city, country, or even the entire world. WANs are used to connect
LANs together and are typically used for long-distance communication.
Cloud Networks: Cloud Networks can be visualized with a Wide Area Network
(WAN) as they can be hosted on public or private cloud service providers and
cloud networks are available if there is a demand. Cloud Networks consist of
Virtual Routers, Firewalls, etc.

WEB 2.0
Web 2.0 is more of a change in thinking rather than a truly updated version of
the World Wide Web, there are a few key web technologies that introduced this
massive shift in the way users viewed and interacted with web pages. Here are just a
few examples of this technology and its improved compatibility:

 JavaScript
 Adobe Flash
 Microsoft Silverlight
 RSS
 Eclipse
 Ajax

How Does Web 2.0 Work?

Another way to think of this reshaping of the World Wide Web is called the
“read/write” web. Since this reframing of the internet, web users have been able to
communicate in real-time with servers, edit web pages, post comments, and
communicate with other users. Here are just a few categories to help you
understand this major shift in the way the web is used.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

Social Web

Thanks to hypertext transfer protocol (HTTP) and other innovations, Web 2.0 acts
as a social web. Users can add comments, like pages, submit reviews, and create
social media accounts for increased levels of interaction. All of this user-generated
content dramatically increases opportunities for communication across all users.

Web 3.0

 Web 3.0 is a prediction of the future of the web. It is also called Web3.
 Web 3.0 focuses on increased compatibility, decentralized implementation of
user-generated content, and tokenization which relies on blockchain
technology. The result is a web that isn’t static or reliant on Big Tech
corporations.
 The exact programming and applications of Web 3.0 aren’t fully realized. This
means that the definition and use of this technology are still changing and
evolving.

Artificial Intelligence

Artificial Intelligence (AI) is another important technology in the implementation of


Web 3.0. Thanks to AI’s ability to comb over data and use natural language
processing, Web 3.0 promises to be a semantic web. This increased functionality
could allow you to interact with websites using natural language, not keywords.

The Software Process Model

A software process model is a specified definition of a software process, which is


presented from a particular perspective. Models, by their nature, are a simplification,
so a software process model is an abstraction of the actual process, which is being
described. Process models may contain activities, which are part of the software
process, software product, and the roles of people involved in software engineering.
Some examples of the types of software process models that may be produced are:

1. A workflow model: This shows the series of activities in the process along
with their inputs, outputs and dependencies. The activities in this model
perform human actions.
2. 2. A dataflow or activity model: This represents the process as a set of
activities, each of which carries out some data transformations. It shows how
the input to the process, such as a specification is converted to an output such
as a design. The activities here may be at a lower level than activities in a

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

workflow model. They may perform transformations carried out by people or


by computers.
3. 3. A role/action model: This means the roles of the people involved in the
software process and the activities for which they are responsible.

There are several various general models or paradigms of software development:

1. The waterfall approach: This takes the above activities and produces them as
separate process phases such as requirements specification, software design,
implementation, testing, and so on. After each stage is defined, it is "signed off"
and development goes onto the following stage.
2. Evolutionary development: This method interleaves the activities of
specification, development, and validation. An initial system is rapidly
developed from a very abstract specification.
3. Formal transformation: This method is based on producing a formal
mathematical system specification and transforming this specification, using
mathematical methods to a program. These transformations are 'correctness
preserving.' This means that you can be sure that the developed programs
meet its specification.
4. System assembly from reusable components: This method assumes the
parts of the system already exist. The system development process target on
integrating these parts rather than developing them from scratch.

Software Crisis

1. Size: Software is becoming more expensive and more complex with the
growing complexity and expectation out of software. For example, the code in
the consumer product is doubling every couple of years.
2. Quality: Many software products have poor quality, i.e., the software products
defects after putting into use due to ineffective testing technique. For example,
Software testing typically finds 25 errors per 1000 lines of code.
3. Cost: Software development is costly i.e. in terms of time taken to develop and
the money involved. For example, Development of the FAA's Advanced
Automation System cost over $700 per lines of code.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

4. Delayed Delivery: Serious schedule overruns are common. Very often the
software takes longer than the estimated time to develop, which in turn leads
to cost shooting up. For example, one in four large-scale development projects
is never completed.

Program vs. Software

Software is more than programs. Any program is a subset of software, and it becomes
software only if documentation & operating procedures manuals are prepared.

There are three components of the software as shown in fig:

1. Program: Program is a combination of source code & object code.

2. Documentation: Documentation consists of different types of manuals. Examples


of documentation manuals are: Data Flow Diagram, Flow Charts, ER diagrams, etc.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

3. Operating Procedures: Operating Procedures consist of instructions to set up and


use the software system and instructions on how react to the system failure. Example
of operating system procedures manuals is: installation guide, Beginner's guide,
reference guide, system administration guide, etc.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

Agile Software Development Life Cycle (SDLC)

Software development life cycle (SDLC) is a phenomenon


to design, develop and, test high-quality software. The primary aim of SDLC is to
produce high-quality software that fulfills the customer requirement within times
and cost estimates.

Agile Software Development Life Cycle (SDLC) is the combination of both iterative
and incremental process models. It focuses on process adaptability and customer
satisfaction by rapid delivery of working software product. Agile SDLC breaks down
the product into small incremental builds. These builds are provided into iterations.

In the agile SDLC development process, the customer is able to see the result and
understand whether he/she is satisfied with it or not. This is one of the advantages of
the agile SDLC model. One of its disadvantages is the absence of defined requirements
so, it is difficult to estimate the resources and development cost.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

Each iteration of agile SDLC consists of cross-functional teams working on


various phase:

1. Requirement gathering and analysis


2. Design the requirements
3. Construction/ iteration
4. Deployment
5. Testing
6. Feedback

Requirements gathering and analysis

In this phase, you must define the requirements. You should explain business
opportunities and plan the time and effort needed to build the project. Based on this
information, you can evaluate technical and economic feasibility.

Design the requirements

When you have identified the project, work with stakeholders to define requirements.
You can use the user flow diagram or the high-level UML diagram to show the work
of new features and show how it will apply to your existing system.

Construction/ Iteration

When the team defines the requirements, the work begins. The designers and
developers start working on their project. The aims of designers and developers
deploy the working product within the estimated time. The product will go into
various stages of improvement, so it includes simple, minimal functionality.

Deployment

In this phase, the team issues a product for the user's work environment.

Testing

In this phase, the Quality Assurance team examine the product's performance and
look for the bug.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

Feedback

After releasing of the product, the last step is to feedback it. In this step, the team
receives feedback about the product and works through the feedback.

Agile SDLC Process Flow

1. Concept: Project are imagined and prioritized.


2. Inception: Team members are created, funding is put in place, and basic
environments and requirements are discussed.
3. Iteration/Constriction: The software development team works to deliver
working software. It is based on requirement and feedback.
4. Release: Perform quality assurance (QA) testing, provides internal and
external training, documentation development, and final version of iteration
into the product.
5. Production: It is ongoing support of the software.

Advantages of Agile SDLC

1. Project is divided into short and transparent iterations.


2. It has a flexible change process.
3. It minimizes the risk of software development.
4. Quick release of the first product version.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

5. The correctness of functional requirement is implemented into the


development process.
6. Customer can see the result and understand whether he/she is satisfied with
it or not.

Disadvantages of Agile SDLC

1. The development team should be highly professional and client-oriented.


2. New requirement may be a conflict with the existing architecture.
3. With further correction and change, there may be chances that the project will
cross the expected time.
4. There may be difficult to estimate the final coast of the project due to constant
iteration.
5. A defined requirement is absent.

Pervasive Computing

Pervasive Computing is also called as Ubiquitous computing, and it is the new


trend toward embedding everyday objects with microprocessors so that they can
communicate information. It refers to the presence of computers in common
objects found all around us so that people are unaware of their presence. All these
devices communicate with each other over wireless networks without the
interaction of the user.
Pervasive computing is a combination of three technologies, namely:
1. Micro electronic technology:
This technology gives small powerful device and display with low energy
consumption.
2. Digital communication technology:
This technology provides higher bandwidth, higher data transfer rate at lower
costs and with world wide roaming.
3. The Internet standardization:
This standardization is done through various standardization bodies and
industry to give the framework for combining all components into an
interoperable system with security, service and billing systems.

Applications:
There are a rising number of pervasive devices available in the market nowadays.
The areas of application of these devices include:

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

 Retail
 Airlines booking and check-in
 Sales force automation
 Healthcare
 Tracking
 Car information System
 Email access via WAP (Wireless Application Protocol) and voice.

Application environments
An environment is a user-defined collection of resources that hosts an application.

An environment is the application's mechanism for bringing together components


with the agent that deploys them. Environments are typically modeled on some
stage of the software project lifecycle, such as development, QA, or production.

Environment properties can be created with the environment's Properties pane


(Applications > selected application > Environments > selected
environment > Properties).

A value that is set on a component environment property overrides an environment


property that has the same name.

Referenced: ${p:environment/propertyName}.

 Creating environments
Before you can run a deployment, you must define at least one application
environment that associates components with an agent on the target host.
 Creating environments from WebSphere Application Server cells
You can import information about a WebSphere® Application Server cell into
resources and then use those resources in an environment.
 Creating environment gates
To create an environment gate, specify the conditions that must be met
before component versions can be deployed to the environment.

Virtualization in Cloud Computing


Virtualization is the "creation of a virtual (rather than actual) version of something,
such as a server, a desktop, a storage device, an operating system or network
resources".

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

In other words, Virtualization is a technique, which allows to share a single physical


instance of a resource or an application among multiple customers and organizations.
It does by assigning a logical name to a physical storage and providing a pointer to
that physical resource when demanded.

What is the concept behind the Virtualization?

Creation of a virtual machine over existing operating system and hardware is known
as Hardware Virtualization. A Virtual machine provides an environment that is
logically separated from the underlying hardware.

The machine on which the virtual machine is going to create is known as Host
Machine and that virtual machine is referred as a Guest Machine

Types of Virtualization:

1. Hardware Virtualization.
2. Operating system Virtualization.
3. Server Virtualization.
4. Storage Virtualization.

1) Hardware Virtualization:

When the virtual machine software or virtual machine manager (VMM) is directly
installed on the hardware system is known as hardware virtualization.

The main job of hypervisor is to control and monitoring the processor, memory and
other hardware resources.

After virtualization of hardware system we can install different operating system on


it and run different applications on those OS.

Usage:

Hardware virtualization is mainly done for the server platforms, because controlling
virtual machines is much easier than controlling a physical server.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

2) Operating System Virtualization:

When the virtual machine software or virtual machine manager (VMM) is installed on
the Host operating system instead of directly on the hardware system is known as
operating system virtualization.

Usage:

Operating System Virtualization is mainly used for testing the applications on


different platforms of OS.

3) Server Virtualization:

When the virtual machine software or virtual machine manager (VMM) is directly
installed on the Server system is known as server virtualization.

Usage:

Server virtualization is done because a single physical server can be divided into
multiple servers on the demand basis and for balancing the load.

4) Storage Virtualization:

Storage virtualization is the process of grouping the physical storage from multiple
network storage devices so that it looks like a single storage device.

Storage virtualization is also implemented by using software applications.

Usage:

Storage virtualization is mainly done for back-up and recovery purposes.

How does virtualization work in cloud computing?

Virtualization plays a very important role in the cloud computing technology,


normally in the cloud computing, users share the data present in the clouds like
application etc, but actually with the help of virtualization users shares the
Infrastructure.

The main usage of Virtualization Technology is to provide the applications with


the standard versions to their cloud users, suppose if the next version of that
application is released, then cloud provider has to provide the latest version to their
cloud users and practically it is possible because it is more expensive.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245


CLOUD COMPUTING

To overcome this problem we use basically virtualization technology, By using


virtualization, all severs and the software application which are required by other
cloud providers are maintained by the third party people, and the cloud providers has
to pay the money on monthly or annual basis.

KARAN ARTS AND SCIENCE COLLEGE (CO-ED)-245

You might also like