0% found this document useful (0 votes)
17 views19 pages

CCS Ut2 QB

The document discusses video streaming applications and technologies. It covers how edge computing helps improve user experience for live and interactive video streaming by distributing load and reducing latency. Different streaming protocols like RTMP, RTSP, HLS, and MPEG-DASH are also mentioned.

Uploaded by

snehali.pandit22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views19 pages

CCS Ut2 QB

The document discusses video streaming applications and technologies. It covers how edge computing helps improve user experience for live and interactive video streaming by distributing load and reducing latency. Different streaming protocols like RTMP, RTSP, HLS, and MPEG-DASH are also mentioned.

Uploaded by

snehali.pandit22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

In apply appthat

meetings. Venture
streaming
evidence
also SHAH
software
SACHIN
ofiline for
video
looking ...A
to events
for Publications
alternative are
virtualclients
partner,
development.
and potential Tech-Neo
valid
projects, tech
APP
a a
from
as app
STREAMING become
Solutions
doctor-on-demand
mnedia
requests
App.
have
Streaming social
APP
streaming receive
VIDEO and
The
(M7-92)
streaming
Video applications,consider
often
LIVE Live video 22-23)
video
streaming
functionality.
we
is with whovideo
STUDIES
What Solutions, year
media Clients,
applications in academic
detail. expertise
social
CASE in APPdevelopment.
w.e.f
Expiain addition,
Mobile The have Syllabus
6.3
At we
GQ. (New
M
Cloud Computing and Security (MU-Sem 7-E & TC) (Cloud Computing Applications) ...Pg. No. (6-14)
We decidedto build a proof of concept of a video streaming application to ensure the ownership of the
tech expertise. We also gave a detailed deseription of the overall architecture, feature list, and
technologies we applied.
Tosay that streaming video content online has gained traction over the past decade would be a gross
understatement.
For example,consider the projections for the number of U.S. households ditching traditional cable and
satellite TV providers in the coming years. While it's true that many of these households have simply
given up their access to live TVevents, it is also the case that many of these cord-cutters have
transitioned to using live TV streaming services.
This transition is one example of a use case that highlights the need for reliability and scalability in the
realm of video streaming. With a traditional and centralized infrastructure, bottlenecks form as the
number of viewers grows.
These bottlenecks lead to increased latency resulting in degrading video quality, network lag and more.
To combat these bottlenecks, service providers can leverage edge computing practices by dispatching
source streams to edge servers positioned in various geographical locations. In doing so, the provider is
better positioned to scale for the number of users looking to stream the event, distributing viewer traffic
in a logical manner that reduces load and reduces the physical distance that must be traveled to
retrieve requested content.
Interactive video experiences
Bringing data storage and compute power closer to the user can help ensure that user interaction with
the video content they are streaming occurs with the immediacy required to make this feature effective
from the user's point of view.
Features that provide functionality for displaying the statistics of a baseball game being streamed, or
pulling the filmography of the actor that just appeared in a scene, require processing and data
that can be accomplished in a more efficient manner when the resources needed to do retrieval
so are located
closer to the interacting viewer.
G Effective and efficient content search ability and content
suggestions
Content suggestions based on the predictive analysis of user preference data could
important opportunity for edge computing in the world of video streaming. When thealso represent an
data
with this type of activity is processed at the edge via low latency compute associated
presented with content those appeals to their preferences faster than ever. functionality, the user is
This serves to increase the likelihood that the end user
discovers content that interests them with a
level of immediacy that improves overall user experience.
The same is true for searching content libraries. By utilizing
compute resources at the edge, more
powerful and intuitive search functionality can be executed with greater speed than previously possible.
IG Targeted advertising based on user preference data
Nobody truly enjoys having ad breaks scattered throughout their streaming
least) a little more appealing when the advertisement is for a experience. But isn't it (at
product or service that actually interests
you? Processing user preference data at the edge can help ensure that the
interrupt the viewing experience relate to the user in some respect. advertisements that
Additionally, utilizing compute and storage power at the edge helps to make certain that the
advertisement begins streaming quicker than ever, thereby allowing the user to get back targeted to their
desired content with as short an interruption as possible.

(New Syllabus w.e.f academicyear 22-23) (M7-92) Tech-Neo Publications ...A SACHIN SHAH Venture
are:
Different types of Streaming protocols
(1) RTMP (Real Time Messaging Protocol)
(2) RTSP (RealTime Streaming Protocol)
(3) HTTP Streaming Protocols
(4) HLS
(5) MPEG-DASH
(6) HDS
(7) Smooth Streaming
RTMP (Real Time Messaging Protocol)
Real Time Messaging Protocol (RTMP) was initially a proprietary protocol developed by Macromedia for
streaming audio, video and data over the Internet, between a Flash player and a server.
RTMP provides a bidirectional message multiplex service over a reliable stream transport, such as TCP,
intended to carry parallel streams of video, audio, and data messages, with associated timing
information, between a pair of communicating peers.
(New Syllabus w.e.f academic year 22-23) (M7-92) 9Tech-Neo Publications..A SACHIN SHAH Venture
(New S Cloud
HLS notRTSP carrying
stampthe request session
disconnecting thprotocol between
e Therequests UDP server.
entertainment The RTSP Flash constrained.
volume fromServer
Syllabus anything regardless
HTTPlocation.ofclient-server
special. justMostadvantageous Real-time like for deployment. Implemnentations
RTMP typically
isassign
theComputing
compatibility It
can network formHTTP server establishing
comnmands, order
other quality(adaptive
HLS streaming). layers ofrecommended
Streaming (connectionless Real (Real the
supports delivers Video Web (FMS). delivery
w.e.f efficiently the from types. server Web
services. is video simultaneously streaming in and
Live over
common to Time Time
academic native session begins which
conditions in
continuous theallocate
client, and Streaming sitesserver FMS of Security
interstitial Streaming over HTTP,Protocols many and such and Streaming
for server, with
Streaming is Flashmessages
HLS towith offer protocols information
comes communications
year the clientprotocol controling
protocol), as hosting is
veryy (MU-Sem
popular those resource
Pause" installedon a
large-scale to instances "Setup" play Video
is multiple Internet. by Service
22-23) not content in make streams "Record" to through expensive.
provides who and Protocol) the are
available an choosing uses Protocol is 7-E
supported i0S order of fo r and media
(M7-92) streaming end. in from pause, providedenguired
renditions It such do of start a (FVSS) flash different &
devices, HTTP
boundaries. wherewhich data an systems TC)
allows a not
requested combination RTP networked
to
reliable, as and
the identifier.
the sessions (RTSP)
to
Butmovie
today want stream,
natively caching maintain a clientor
the the appropriate tofacilitate providerthere by to
priorities
the a video conference end the
of receiver support streaming achieve to (SWE)licensed
to
data streaming between control is
users the Itcost-effective over compromise time "Play" In of are serverunderlying
infrastructure
on provides already a
same without otherprotocolsreal-time affordableis and to
Windows uninterrupted streaming
HTTP and various network server
of to which where delivery end
streaming also different
adapt data other and
B which content, "Close defined words,
a is points. anmanages
software stream (Cloud
Tech-Neo flexible means work, actually is the such control
could on temporarily functions control HTML
shared
OSare
to the over recorded mechanism, the option classes
vide0 where data media Computing
platforms. support such bit so be transport as Clients transport
accustomed framework
playback of HTTP. storing RTSP TCP of streaming from
content.
Publications rate the viewable is playback hosting
for
delivering quality. the protocol of
as transmitted by by servers.
end (connection of high Adobe, messages,
deliveryaudio of In resources
it disabled the
information server
maintaining media Applications)
the user fact,
an Licensing when
for at toBut on client FMS flash
. .A to advantage ofdesigned
The volume notably
translations. continuous
media many the and media
paying tomedia the doesthese this servers transport
SACHIN hard arewithout services.separately
Video which
large according
as client based protocol ...Pg.
best to not people will freed per that files Flash FMS Flash
forencryption. protocols disk. session/state issue for
SHAH audiences. the have over can No.
apps and be the indicates protocol),
can from Using for capacity
It possible
current at This andactually isuse affect(6-12)
Ventue highly time to other send used Video high Media
offers long to once the VCR
and the the in
It doare is a
HDS S Cloud
Streaming
Smnooth N
(New GQ
At Mobile The in theAs
functionality.
streaming
we video at
MPEG-DASH theDynamic
each devices. boonAdobeStandard.
MPEG-DASHComputing
Syllabusdevelopment, addition, 6.3 When media Video. HDS withclhent play The the the
have The Explain adaptive
Ifand Smooth Smooth will
stream differentduration, potential
somewhat (typically
fragments alternatives
client content content segment to
one not or fewer back Dynamic and
APP social
w.e.f expertise applications CASE played there over This can content Adaptive
in beon HTTP Security
fragmentStreaming Streaming
streaming
2 the stalls
seamlessly without selects is bit issuch
academic Clients, back missed regular method
is to
Solutions, media detail. STUDIES willlower seconds
being containinga
made works replace
recording go. the rates
in be Dynamic or th e as publishers,
Streaming,suggests, name
Streaming (MU-Sem
7-E&TC)
with What at HDS
year video who at
quality
doesn't the while HTTP of re-bufferingcausing next a by
applications, a worth uses of is segment played available
covering movie
22-23) we video Live is mnedia streaming
is adapt breaking existing
consider
streaming LIVE higher expected introduced recording mainly to segment
often level.meet ofthe connections. Streaming,
be stalls short
or who and
(M7-92) Video VIDEO to to back over
streaming level. video)
simple done, with aligned at the
changing a
proprietary
receive
The
doctor-on-demand Conversely, quality
these clients(which by used enables events.
is or to by interval live the couldApple DASHis
HTTP
and Streaming and we the variety
Microsoft.
but going in is re-buffering download an
social Arr have highest short
broadcast content produceHTTP
requests STREAMING
have requirements, level.
verifying live Adobe's of (DASH),
Solutions powerful on. on-demand network MPEG-DASH of
playback a
media App. include to intervals technologies
Li vstandard
e
when applications So different into
becomne It implement bit and one
that in method of
trom is events rate play a Streaming
a also
app as projects, concept an live and conditions, set
conditions Silverlight) sports time
seguence for
a a APP the each possible client, ofbit
back known
developmentpotential
Tech-Neo tech I S
streaming live for in play of like (Cloud
valid where rates, of adaptive
next has ofMedia nDVR(WOWza). event. files
and adaptive
adaptive the based Microsoft
partner, allow delivering and the back content of (HLS). asComputing
alternative
virtual arrived over nDVR playback. that i.e., that
Publications clients fragment it client small MPEG-DASH
Services provide on time
it, is can alternative that play streaming A
are within HTTP. highly is bitrate
bitrate current unified Smooth
events the automatically be are HTTP-based is Applications)
looking for small implemented. So Thus, on
.A to delivered high
downloaded made potentially
video offline quality the
extension useful. wevideo network all
SACHIN software can
streaming standard
Streaming, over is
content quality an segments
for appropriate a
streamine of record delivery available. DASH-compatible developing
file HTTP ...Pg.
SHAH evidence will that MPEG-DASH selects
meetings. The in many would
also subsequent fragments for playconditions. segments, No.
be enables the of time encoded that
Venture chunks
applv at time Flash back fromWhile hours (6-13)
that ann live MP4 for be has ISO
In a a
(6-2) and
helps embraced
experts that massive rise
storage, patient key
medicine extra to
prescriptions. for
real collaboration.
a share the
via
integrations
in data
collected amongcloud
medicalFrom are
longer
no Venture
the technologies visiting insights
interoperability
No. It
experts organizations the providing
1T
or and ways. adopt
...Pg. internet. data accelerated
produce offer is tests on-time
protocols.
collaboration SHAH
of computing
have
Generally, while
healthcare professionals,
treatment. getting
Applications) andmore data,
information. analysis improves
unwanted several to SACHIN
the companies by knowledge. records company learning
providers
healthcareEMRs, availability. cloud
solutions.offershashealthcare involvement enable
and devices. ...A
through cloud in enhancing
healthcare data distribution
securely. and
for healthcare virtual using patients'
future Publications
Computing computing
claims,
through healthcare
nmedical deliver
and
convenientmedical meaningful short, better diagnosissolutions development
Healthcare creating mobile
used cloud-based
Furthermore, enhance notes Teaching
data share industry's
like
In patient withgo and and
access
(Cloud servers Mandate, insurance individual
of in doctors'don't in
conferencing. preciseCloud
other
technologies flexible
and Tech-Neo
is amount cloud helpandfunctions
intocomputing precisely about scalability,
stakeholders,
offer.
: better patients to app way.computers
storage adopted
Data with the
professionals
remote it
When systems
recovery, more storage. to
records. tests,
Records) change and require all for healthcare long
CARE care. massive ensure more consultations shapethings education
in
sector.
Cloud Healthcarecloud enhanced information, in is accessible conveniences,
applying also labefficiently. video cloud
healthcare, primary a reaches
longer aidsInteroperability can many
Health tele-health
and data come
HEALTH patient and
include health
Medical
cloud of can
a
information. through of and allows
medical
healthcare a
store more prevention
application application of healthcare
for about Doctors information hire hasnow
more telemedicine.
their no patientssource among have
TC) FOR
Computing to
their
the These
to
data
Storing
(Electronic data and medical
appointments
in
computing
maintain
earlier
patients providing
specialists,
issues.
solutions
-uting
Education and
industry
(M7-92)
all servers secure centers that feature the classrooms
&
year. use apps treatment, :Experience check it in
7-E
COMPUTING is medical The reports, The and:Interoperability
Convenient distribute
of
(MU-Sem healthcare can
for handle cloud, patients' computing technical education 22-23)
Cloud onlineEMRand
data every : Cloud-basedvia doctorsregardless
delivery. to cloud for
SolutiontoolsTelemedicine patients : data,
Collaboration
apps
care
cloud time lacks Computing Cloud and
process store duringdoctors'
consumption
or the year
example the currentdata helps
analytical test share sources, researchers,
overcome
Security use for make or
in of to
many medical
Patient
lab
to
helps in Cloud cloud organization of thetextbooksacademic
in
computing
facilitate
healthcare expenses
to such digital due EMR cantime
system, applicatíon
CLOUD computing technology insurance
servers.
maintain
andinstitutions
solutions
with advent Affordable telemnedicine.
shift and numerous
years,
and Furthermore,to It Furthermore,
prescriptions. Implernentingand Cloud
handle, enhanced evensaves w.e.f
Computing xplain of of
cloud-based access
healthcare.
Improved Enhanced
the healthcare
healthcare healthcare to
the to Growth reducing solutions the confned Syllabus
plan amounts
cloud-based to Doctors
doctor. It your 6.1.1 Give Oyer
Cloud Cloud health
6.1 store, With time Due data. from
medical not An of to If
Cloud GQ GQ. (New
M to did 1. 2. 5.
3. 4.
rage.

Table 4.2.1 : Difference between SQL & No-SQL Data Storage.


Sr. No. SQL NoSQL
1. Relational Database Management System Non-Relational Or Distributed Database
(RDBMS) System.
2. These databases have fixed or static or They have dynamic schema.
predefined schema.
3. These databases are not suited for These databases are best suited for hierarchical
hierarchical data storage. data storage.
4. These databases are best suited for complex These databases are not so good for complex
queries. queries.
Vertically scalable. Horizontally scalable.
5.
Follows CAP (consistency, availability, partition
6. Follows ACID property. tolerance)

PostgreSQL, Oracle, Examples : MongoDB, GraphQL, HBase, Neo4j,


7. Examples : MySQL, Cassandra etc.
MS-SQL Server etc.
..Chapter Ends
a6.3.2 Edge Computing
GQ. What is Edge Computing ?
If youdo a Google search for edge computing, you will find that the specific definition varies somewhat
depending upon the context in which it is being discussed. With that said, in simplest terms, edge
computing refers to moving compute resources and data storage to geographical locations with greater
proximity to the end users making the requests.
Let'sconsider an extremely simplified scenario where an application is running on one server located in
New York City. In the instance where a user located in Australia makes a request of this application, it
makes sense that there will be some slowness due to the distance the data must travel to complete the
request.
With edge computing, the application is instead deployed to servers in multiple geographical locations
around the world, with each user's request being routed to the server location closest to them. This has
the effect of decreasing the latency associated with the request. And, by distributing traffic by
geographical region,the load on each individual server is also decreased.
Edge computing is a distributed information technology (IT) architecture in which client data is
processed at the periphery of the network, as close to the originating source as possible.
Data is the lifeblood of modern business, providing valuable business insight and supporting real-time
control over critical business processes and operations.
(New Syllabus w.e.f academic year 22-23) (M7-92) Tech-Neo Publications...A SACHIN SHAH Venture
Cloud Computingand Security (MU-Sem 7-E &TC) (Cloud Computing Applications) ...Pg. No. (6-16)
amounts of data can be routinely collected
Today's businesses are awash in an ocean of data, and huge
from remote locations and inhospitable operating
from sensors and loTdevices operating in real time
environments almost anywhere in the world.
way businesses handle computing. The traditional
But this virtual flood of data is also changing the moving
center and everyday internet isn't well suited to
computing paradigm built on a centralized data latency issues and unpredictable
Bandwidth limitations,
endlessly growing rivers of real-world data. efforts. Businesses are responding to these data
network disruptions can all conspire to impair such
challenges through the use of edge computing architecture. compute resources out of the
moves somne portion of storage and
In simplest terms, edge computing the data itself. Rather than transmitting
raw data to a
data center and closer to the source of
central is
that work is instead performed where the data
central data center for processing and analysis, factory floor, a sprawling utility or across a smart
actually generated -- whether that's a retail store, a equipment
Only the result of that computing work at the edge, such as real-time business insights,
city. for review
answers, is sent back to the main data center
maintenance predictions or other actionable
and other human interactions. at what edge
business computing. Take a comprehensive look
Thus, edge computing is reshaping IT and of the cloud, edge use cases, tradeoffs and implementation
computing is, how it works, the influence
considerations

® How does edge computing work ? produced at a


all a matter of location. In traditional enterprise computing, data is
Edge computing is the internet.
such as a user's computer. That data is moved across a WAN such as
client endpoint, application.
stored and worked upon by an enterprise
through the corporate LAN, where the data is proven and time
of that work are then conveyed back to the client endpoint. This remains a
Results
most typical business applications.
tested approach toclient-server computing for produced by those
number of devices connected to the internet and the volume of data being
But the infrastructures to
businesses, is growing far to0 quickly for traditional data center
devices and used by of enterprise-generated data will be
created outside
accommodate. Gartner predicted that by 2025, 75% situations that can often be time- or
centralized data centers. The prospect of moving so much data in subject to
of
puts incredible strain on the global internet, which itself is often
disruption-sensitive
congestion and disruption. infrastructure
central data center to the logical edge of the
So IT architects have shifted focus from the resources to the point
resources from the data center and moving those
-taking storage and computing
data is generated. The principle is straightforward: If you can't get the data closer to the data
where the rooted
concept of edge computing isn't new, and it is
center, get the data center closer to the data. The offices -- where it was
such as remote offices and branch
in decades-old ideas of remote computing -- on a
resources at the desired location rather than rely
more reliable and efficient to place computing
single central location.

G Edge computing adoption


computing technologies, 54% find
Although only 27% of respondents have already implemented edge
the idea interesting.
often reguiring little more than a partial
Edge computing puts storage and servers where the data is,
the data locally. In many cases, the
rack of gear to operate on the remote LAN to collect and process
protect the gear fromn extremes of
computing gear is deployed in shielded or hardened enclosures to
conditions.
temperature, moisture and other environmental
intelligence,
Processing often involves normalizing and analyzing the data stream to look for business
and only the results of the analysis are sent back to the principal data center.

(New Syllabus w.e.f academic year


22-23) (M7-92) Tech-Neo Publications.A SACHIN SHAH Venture
Cloud Computing and
Security
The idea of business (MU-Sem 7-E &TC) (Cloud Computing Applications)...Pg. No. (6-17)
where video intelligence can vary
surveillance of the showroom floordramatically. Sorme examples include retail environmnents
most desirable product configuration or might be combined with actual sales data to determine
Other examples
actual defects orinvolve predictive consumer demand.
treatment or failures analytics
occur. Still other that can guide equipment maintenance and repair before
electricity generation, to ensureexamples
the quality of output.
are often aligned with utilities, such as water
that equipment is functioning properly and to maintain
Computing taskS demand suitable architectures. and the
task doesn't architecture that suits one type of commpuns
necessarily fit all types of computing tasks. Edce
important architecture that supports computing has
closer to -- ideally in the same distributed computing to deploy computeemerged as a viable ae
and stora8
In general, distributed computing
physical location as -- the data source.
models are hardly new, and the concepts of remote
offices, data center colocation and cloud
But decentralization can be challenging, computing have a long and proven track recora. ofhces, Dra
easily demanding high levels of monitoring and control that are
overlooked when moving away fromn a traditional centralized computing model. Edge compuung
has become relevant because it offers an effective
with moving enormous volumes of data that todav's
solution to emerging network problems assoiated
organizations produce and consume. It's not just a
problem of amount. It's also a matter of time: applications depend on
processing and responses that are
increasingly time-sensitive.
Thinking Beyond Stream Quality with Edge Computing in the Video Space
While the importance of maintaining video quality for livestream events cannot be overstated, Id be
remiss not to speculate on the other potential manners in which the user experience can be bolstered by
positioning compute power and data storage along the edge.
a 6.3.3 FOGComputing

GO What is FOG Computing ?


Fog Computing is the term coined by Cisco that refers to
extending cloud computing to an edge of the enterprise's network.
Thus, it is also known as Edge computing or Fogging. It facilitates
he operation of computing, storage, and networking services Cloud Node
between end devices and computing data centers.
The devices comprising the fog infrastructure are known as
fog nodes.
In fog computing, all the storage capabilities, computation Fog Node 1 Fog Node 2
capabilities, data along with the applications are placed
between the cloud and the physical host.
towards the host. End device End device
All these functionalities are placed more
done almost at the place
1his makes processing faster as it is Fig. 6.3.1 :Fog Computing Architecture
where data is created.
the system and is also used to
1t 1mproves the efficiency of
ensure increased security.
History of fog computing
January 2014. This was because fog is refomoa
The term fog computing was coined by Cisco in
clouds that are close to the ground in the Sametheway roB compuing was related to the nodes which ara
somewhere in between host and the clod
Present near the nodes
(M7-92) Tech-NeoPublications.ASACHIN SHAH Venture
(New Syllabus w.e.f academic year 22-23)
(Cloud Computing Applications) ...Pg. No. (6-18)
Cloud Computing and Security (MU-Sem 7-E &TC)
to the host machine. After
It was intended to bring the computational capabilities of the system close Computing".
this gained a little popularity, IBM, in 2015, coined a similar term called Edge
S When to use fog conmputing ?
Fog Computing can be used in the following scenarios:
selected data is chosen for long
It is used when only selected data is required to send to the cloud. This
term storage and is less frequently accessed by the host.
i.e Latency should be low.
It is used when the data should be analyzed within a fraction of seconds
a large area at different
It is used whenever a large number of services need to be provided over
geographical locations.
Devices that are subjected to rigorous computations and processings must use fog computing.
Consortium.
Real-world examples where fog computing is used are in loT devices (eg. Car-to-Car
Europe), Devices with Sensors, Cameras (IIoT-Industrial Internet of Things), etc.

S Advantages of fog computing


1
This approach reduces the amount of data that needs to be sent to the cloud.
2 Since the distance to be traveled by the data is reduced, it results in saving network bandwidth.
3 Reduces the response time of the system.
4 It improves the overall security of the system as the data resides close to the host.
5. It provides better privacy as industries can perform analysis on their data locally.
B Disadvantages of fog computing
1. Congestion may occur between the host and the fog node due to increased traffic (heavy data flow).
2. Power consumption increases when another layer is placed between the host and the cloud.
3. Scheduling tasks between host and fog nodes along with fog nodes and the cloud is difficult.
4 Data management becomes tedious as along with the data stored and computed, the transmission of
data involves encryption-decryption too which in turn release data.
s Applications of fog computing
1 It can be used to monitor and analyze the patients' condition. In case of emergency, doctors can be
alerted.
2 It can be used for real-time rail monitoring as for high-speed trains we want as little latency as possible.
3. It can be used for gas and oils pipeline optimization. It generates a huge amount of data and it is
inefficient to store all data into the cloud for analysis.
...Chapter Ends
D00
AAA
digital setsFor guarded
themselves.
identify
along each biometrics
(MFA) or being
asteals cybersecurity.
systemof same Authentication Venture
text category
security. that concept for the
the Authentication
SMS SHAH
the used hacker with
information devices.
into called SACHIN
of the the theopened strengthen
system
below. This
homeowner tokens
embedded a by
Two-Factor
if inside under
fall
be. connectedIoT also example,
sent Publications...A
depth unique to or be
maintain etc. Multi-Factor code
they claim texts code could to
is in or expired, geometry, or
For passwords question
which cover have employee
when you SMS therotating that (MFA)
and to person.
will : or
apply access
to
phone Tech-Neo
will
framework that use
thorough home
assets identity changed hand
called the Authentication
challenge
we user an which another
person
also bothat
as andvoice, it's with l
which : door
to individual will
yourself methods forms
of are delivered phone; categories, syncs because or
a access the
is Accounting proof model they as
following prints, authenticatemobile
a
on 0TP
model authenticate
manage identify authentication
provide cell which locks Multi-Factor
each untilcodes
management 2FA
password; and
management or finger thesethe
active the fob two
code considered
and that steal
password
to to and as placing
idea to
Authorization, such
of key your of to the (M7-92)
world users
area
proof remain one a a onesomeone toward
to displays
access
of as as as have
the types (0TP) within static 22-23)
management other
Model.access guarded
provide suchsuchsuch than not like
on which moving
and and
certificate,
Digital for also It's
5.10
AAA
MODEL Authentication
5.10.1
a based from four passwordcredential.
Biometric
fallknowhaveare moredifficult that is passwords a year
AAA and Authentication, identitypasswords he'd know".
you
"something leverages
a must academic
youyou youauthentication".
types
detailidentity enter primarily
apart session,
access combine fob are
is
access you
Authentication One-time
Something it password,
Authentication
Something
Something key companies
in you AAA makes which w.e.f
her Next, the two
Explain
AAA
and example,areStatic
the we accessed.
for or There When which
possess
user's Using Most (2FA) Syllabus
Theidentity him area. with key.
stands 3. 4. 1. 2. 3.
GO 1 2. (New
(5-17)erODexample,
Forpersonaa text
two-factor
use to be Anyof whyrather of a escalate theamount transferred
data events events
might
investigation Venture
whichbeen
ofamount mustdetermnines L
use only violations riskswith allocation.
to now
that is attempts, +hok
No. and which continue modelhas he more. reasons they
company
infected SHAH
Security)...Pg.disclose geometry. believes
for Bagdasarian.
identity,must
but the temporarily which the to
back so
effective using option userthe Authorization devices goal avoided SACHIN
issues. mechanism management malicious
nothingmain of including
data
devices Accounting cost and
and theand Oneis login tracing to malicious
can hand device of and analysis
NIST
(NIST), best the due
cost argument information theprovided
requirements. amount be ...A
(Cloud security and Henry once
of and and
or to resources, failed
auditing
example, disgruntled
more or because the
authentication of the timne must Publications
passwords retina, is resourcesownership functions,
access data.
accidental
programs, one to forensics of
and Technology says employer when refers the
discovering kind accounts
becomes NIST methods is
is
it
billing,
privacy iris, solution compromised" and of and This that system
and For
the level.
amount job until what
somewhat Tech-Neo
of system his programs either
required model a
purposes.
technology as identity
authentication processes, Availability.
their is
there,planning, to
case near-future
of suchand resisted
good phone
texts.
prove
authorization their
devicestimnes the analysis, valuable predictshared
set the for management
biometric to The to with user. while
accessing
Standards AAA to door
different
in a have is services, their access
access authenticated all many be and and
as reduced. as not method the password. users, provided
the at
trend
capacity very might
access. the and consistent accessed attemptsgeneric
adopted such best is companies perform requirements.while
potentially
celltwo in user user's opensroot of applied serves
prove who
a
are presents the messages
by one
with A systemthat Integrity, privilegescompany access for investigations, for.
replaced of second
not
or used
and services
activity accounting,
being
TC) authentication Institutedelivered
considered
2FAcase
a the
denying is can to
requiresfunctions privilegesbe
administrator can employees
activities login accounted
however, username
on access is
necessary must and
&
7-E slowlyauthentication
be and text in
using the and he
depend Confidentiality,
to the business data incident failed (M7-92)
user's
identity
code costs
what
(MU-Sem not himself Privilege job access
withprivilege
the
areOTP,National
includes by or to their of
intercepted, limited Accounting
network, and detect IAMbe
is canparties. aandthatjustify
represented
granting and normal cybersecurity
activities 22-23)
biometric MFA
authentication password,
password theaccess rule access have admin run a
and
can
identifies by AAA of forensics in
Security data "The Authorization
believes
industry 5.10.2 through access
authorization
Least with will warranted track
individual
help effective year
unauthorizedwhich and has beyond least users
biometric
print or
stolen
finger the not
objectives; employees Accounting
5.10.3
A the the academic
security is of user can sufficient account malware the
keeping session. can
and with
2FA be of must of detection,
of to authentication
can process
authenticated
Authorization in of monitoring
user userPrinciple authorization principle in a
Computing whycombinationa2FAwith the spent trackto lavoffsbe each
associated
Biometric
However, According
messages improve thethe employees when A
the third the up to w.e.f
to That's services the security
granted an granting of
Keeping of
data the access process
time breach
during leading as order actionsSyllabus
AfterpasswhatThe have virus,The The Also,suchhave.
Cloud is case.
of In
(New
Cloud Computing and Security (MU-Sem 7-E &TC) (Cloud Security) ...Pg. No. (5-18)
Todetect fraud and other malicious activities, companies may send employees on mandatory vacations
letting the employee's replacement to perform checks and balances on the employee who could have
been hiding or covering up his actions such as log entries which could offer the company many clues
about the malicious activities of their employees.
a6.1.1 Cloud Computing for Education
GQ. Give application of Cioud Computing in education sector.
Over the years, the education industry has come a long way. Teaching and learning are no longer
confined to textbooks and classrooms and now reaches computers and mobile devices.

(New Syllabus w.e.f academic year 22-23) (M7-92) Tech-Neo Publications .A SACHIN SHAH Venture
Cloud Computing and Security (MU-Sem 7-E &TC)
(Cloud Computing Applications) ...Pg. No. (6-3)
Today, learners are always connected - whether they are on or of school grounds. At the same time, the
right technologies empower them with real-world and career-ready skills.
Technology plays a massive role in this disruptive change. Who could have ever imagined that a student
in one part of the world would be able to pursue a course in a college located thousands of miles away!
One of the technologies that drive innovation for this industry is cloud computing. Essentially, cloua
computing isa complex technology that shifts the emphases from physical resources to virtual ones.
you want to understand its impact on the education landscape,you need to know what cloud conputing
is and how it actually works.
Cloud computing refers to a setup of computingresources that can be shared anywhere, irrespective o
the location of the users. By implementing cloud computing, it becomes possible to bring teachers and
learners together on a single, unified platform.
Educational organizations such as schools, colleges, and universities need not buy, own, and maintain
their own servers and data centers. Rather, they can leverage cloud computing to avail compute power,
be sure
databases, storage, and other services when they need them. Additionally, they can always cloud
the extensive benefits of
about their resources being secure on the cloud. Let us elaborate on
computing in the field of education.
possible for
1. Strong virtual classroom environments: With cloud-based software, it becomes reduces the
concept
educational organizations to have virtual classrooms for the students. The
even reduce the expenses of onboarding
infrastructural costs to a considerable extent. They can
skilled trainers who work
regular teachers in their faculty. Rather, they can collaborate with and deliver
teachers can create
remotely and serve as cost-effective resources. At the same time,
virtual exams, saving their time
online courses to students anywhere. Students can even appear for
and expenses effectively.
2 Ease of accessibility: The potential of the cloud is
unmatched when it comes to accessibility.
anywhere. They can
Users can easily access the course content, applications, and data anytime and
The barriers of place and time no longer
enroll in courses and participate in group activities as well. sends across
exist the cloud ensures seamless delivery of content at all times. What's more, it even
content on mobile devices so that students can easily learn even while on the go.
3.
Extensive cost-savings : Another benefit of cloud computing that you cannot ignore is extensive
cost savings. Both learners and providers can experience big benefits in this context. Students need
not invest in expensive books and applications as these learning resources are available on the
cloud. Providers too can lower the management costs by simplifying processes such as enrollment
and assignment tracking. And of course, the infrastructural costs reduce too, as explained before.
The best part about cloud computing is that you pay as you go, which makes it cost-effective.
4. Secure data storage : Besides accessibility and cost savings, cloud computing also serves the
benefit of secure data storage. Organizations that deliver learning through the cloud can adopt a
VPN for ensuring data security. VPN protocols such as IKEv2 are responsible for the automatic
encryption of outgoing data and traffic. This means that the learning content can be easily
transferred to the users without compromising its integrity. At the same time, learners can protect
their privacy by using VPN for cloud-based learning applications.
5. Scalability : Scalability refers to the ability of the applications to match the growing numbers of
users. Cloud computing covers the schools, colleges, and universities on this front as well. It enables
them to scale up the learning applications and experiences quickly and easily. As a result, they can
handle an increasing number of students. Additionally, scalability also helps them to manage the
usage peaks and traffic spikes caused due to events like training registrations and assignment
submissions. Similarly, they can scale down instantly during the low activity period to prevent
wastage of resources.

New Syllabus w.e.f academic year 22-23) (M7-92) Tech-Neo Publications ..A SACHIN SHAH Venture
Cloud Computing and Security (MU-Sem 7-E & TOC) (Cloud Computing Applications) ...Pg. No. (6-4)
6. Agility and innovation : Another way learning providers can benefit from cloud computing is
through agility and innovation. It gives them the ability to experiment faster and more frequently.
Consequently, they can innovate to create better learning experiences for the students. This
becomes possible because new tools and features can be developed, tested, and deployed in the
applications to make them better than before.
7. Greater reach for the students : Cloud computing in the education industry brings the
opportunity for the students to expand their horizons. Those who are not happy with the traditional
learning systems can now explore the new concept of online education. This works wonders for
students who want to opt for remote learning or even pursue courses overseas. Working
professionals who are unable to attend conventional classes but want to upgrade their skills can
also take virtual classes.
Minimal hardware requirements : With cloud-based applications, the requirements of hardware
resources are minimal. These applications can operate seamlessly on internet browsers, both on
desktops and mobile devices. Students can manage to learn with the mobile phone that they own.
There is no need to invest in an expensive computer for taking the course. Additionally, they do not
require external storage devices because they get access to free cloud-based storage. Learning could
not get simpler than this!
surprise
The benefits of cloud computing for the education sector are immense. It does not come as a
enhance the services
that major providers in the industry are fast embracing cloud tech so that they can
students as wel. Nothing
they deliver. Simultaneously, the cloud is emerging as the best option for the
and cloud tech makes it possible.
matches the convenience of accessing learning at the fingertips
industry is experiencing
Whether it is a large university, a small school or a student, everyone in the
bigger and better in the future.
the positive impact of the cloud and things are going to get

a 6.1.2 Cloud Computing for Transportation

GQ. Explain in detail applicications of cloud computngn transportation


uat sector.
Companies that want to do well need to cover a
The transportation industry is a very capital intensive.
and forth fromn main destinations. This demands a
large geographical area and offer frequent trips back
large fleet of vehicles and meticulous planning.
is a daunting challenge in itself, as it is a major
Procuring and maintaining a large fleet of vehiclesadministrative resources. This leaves little or n0
burden on a transport company's financial and
resources for the back end operations of transportation.
present era of severe competitiveness, operational efficiency is instrumental in achieving break
In the comes into play.
even and maybe profitability. This is where the cloud
G Real-time Vehicle Tracking
specialized vehicle tracking companies had to be
Before proliferation of the cloud, the services of in real time. In most cases, these companies would
engaged to track and monitor the location of vehicles
mandate the purchase of costly hardware.
vehicles themselves, while its major chunk was
Some of this hardware would be installed over the recurring
Then, this hardware would also entail
deployed at the premise of Transport Company.
maintenance and up gradation costs.
matter stands resolved in a very easy manner.
Fast forward to the era of cloud computing and this provide real time tracking service for the fleet of
Cloud Service Providers (CSP) is more than happy to
vehicles under the Software as a Service (SaaS) model.
hardware on premise. So, not only are hardware
What this means for the transport company is zero expenses are also
procurement costs eliminated, but with no hardware to maintain, operational
curtailed.
Venture
(New Syllabus w.e.f academic year 22-23) (M7-92) Tech-Neo Publications ..A SACHIN SHAH
Cloud Compuuiy (MU-Sem 7-E &TC) (Cloud Computing Applications) ...Pg. No. (6-5)
RE-Ticketing Management
Before the cloud, the very facility of e-ticketing was either not available or
companies. Most of the e-ticketing was limited to the extent, of airlines industry.offered by a hanau
This made the task
huving tickets cumbersome and time
consuming.
To offer the online reservation and purchase of tickets.
transportation companies would have to ns
costly servers and other support hardware that was capable of handling the peak
as the holiday's season. passenger 0u
Here's the biggest catch of deploying I!T hardware on premise, vou always have to plan for the worst
case scenario, which in this case is peak demand. The outcome is that a transport
conpany
investing in hardware which will never be utilized optimally.
Now, if the same e-ticketing mechanism is sourced from the cloud. scalability of the service is in-built.
The implication would be that in times of heightened passenger demand, the CSP would allocate more
computing resources to the transport company.
Without procuring any hardware whatsoever, the transport company would handle the times o
abnormal demand seamlessly, just by paying the CSP an additional usage fee for the additional
resources consumed,
Tne passengers, who in fact are the company's customers, would be able to plan and book their
transport from the comfort of their homes. This is a win-win situation for the transport company,
passengers as well as the CSP.

B Logistical Space Planning


Transportation companies tend to add logistical movement in a bid to diversify their portfolio and
remain competitive. Planning logistics is way more complicated than passengers, which count as
somewhat a standard payload.
When it comes to moving items, a transportation company has to plan the weight, mass and physical
placement of each item very intricately. For this, a company would typically need some sort of modeling
software.
If this type of solution is deployed on premise, it would again need dedicated hardware, entailing both
procurement and maintenance costs. CSPs offer highly intelligent and capable virtual modeling
software that can be used by transport companies.
Firstly, this sort of modeling software is delivered from the hardware resources of the CSP, so no
hardware needs to be deployed on premise. Secondly, as such solutions are costly; the transport
company will pay only for what it uses.
Real Time Updates
The transport industry is susceptible to unforeseen delays such as road closures, diversions or severe
traffic jams at busy intersections. Using a cloud based tracking and messaging solution, passengers can
be updated in real time about changes in ride schedule.
Although this would not alleviate the wastage of additional time spent in the travel, it would definitely
keep the passengers engaged. This service would also help those clients who are planning to visit the
transport company to collect or deliver their parcel.
Vehicle Health Monitoring
Most vehicles in the transport industry are highly strained to meet tight schedules. This raises concerns
about yehicle health as minimal time is spared for maintenance related activities. However, this can be
detrimental topassenger safety and company repute.
To solve this issue, a transport company can install sensors at critical components of their vehicles that
constantly feed data to a cloud powered analytical tool. As soon as the value of a sensor breaches the
defined threshold, the vehicle can be scheduled for repairs.

(New Syllabus w.e.f academic year 22-23) (M7-92) Tech-Neo Publications..ASACHIN SHAH Venture
S
Cloud
historical
ericalThese data.
from
travel A
Leveraging
transport Computing

iinsights
ts
patterns
s data company AI and
tocan over andSecurity
redict ML
at be time. can
the applied (MU-Sem
leverage
Using
ostfuture
7-E
ve to
Machine
emand the &
cloud TC)
processing
enabledLearning
trends.
tes.
muscle
This
Artificial (ML)
wouldalgorithms, of
a
telligence Computing
(Cloud
CSPApplications)
enable
to
valuablestudy
a
ansport (AI) historical
insights
solutions
company data can
that ...Pg.
(6-6)No.
be of
tocanextracted
passenger
better
use

You might also like