Fog and Cloud Computing
Fog and Cloud Computing
2M
UNIT 3
1. WHAT IS COMMUNITY CLOUD
A Community Cloud is a cloud computing model where multiple organizations with similar
requirements share the same infrastructure. It can be managed by one or more organizations or a
third-party provider. This model allows organizations to share resources, costs, and services, while still
maintaining a higher level of privacy and control than public cloud services.
Examples
Advantage
Disadvantage
Features:
Features:
Examples:
Key Purpose: Efficient use of hardware by running multiple isolated environments (OSes) on one
system.
A System Virtual Machine is a full virtualization environment that emulates a complete physical
computer. It allows an OS and applications to run just like they would on actual hardware.
Examples:
Key Feature: It replicates a full hardware system for the guest OS, offering complete isolation from the
host OS.
A Process Virtual Machine is a type of virtual machine designed to run a single program or process
independently of the underlying operating system and hardware.
Features:
➢ It starts when the process starts and ends when the process ends.
➢ Provides a platform-independent environment for executing a single application.
➢ Mainly used for program execution, portability, and isolation.
5. WHAT IS VM MONITOR
A Virtual Machine Monitor (VMM) or Hypervisor is a piece of software, firmware, or hardware that
produces and controls virtual machines (VMs).
VMM is executed on a host machine and supports multiple guest operating systems running on one
physical machine.
Resource Allocation:
It offers isolation among VMs, which makes the system more secure and stable.
Use Case:
Widely used in cloud computing, data centres, and software test environments.
UNIT 4
1. HOW ENERGY IS EFFICIENT IN DATA CENTERS
Contemporary data centres seek to minimize energy use while ensuring performance and reliability.
Energy efficiency is attained through:
Virtualization
This minimizes the requirement for multiple physical servers by executing numerous virtual machines
on a single server, decreasing power and cooling needs.
Energy-Efficient Hardware
Most data centres are powered with renewable sources such as solar and wind to cut down on carbon
footprint.
Data Breaches
Insecure APIs
APIs are generally used to access cloud services, and if not securely configured, they can be
compromised.
Data Loss
Irreversible loss of data through malicious attacks, software flaws, or human mistakes without backup.
Data Storage
Data is stored in distributed cloud storage systems, usually in multiple data centres.
Data is backed up regularly to ensure data security and recover data after failure or disaster.
Cloud facilitates easy access and sharing of data from any device, at any time.
4. WHAT IS CLOUD SIMULATOR AND FUNDAMENTAL CLOUD SECURITY
What is a Cloud Simulator?
A Cloud Simulator is an application that simulates cloud computing environments to be used for
research, testing, or teaching without actually using cloud infrastructure.
Features:
Applications:
Cloud Security is the collection of policies, technologies, and controls that are employed to safeguard
data, applications, and infrastructure in cloud environments.
Elements:
Encryption
Employing encryption to render stored data unreadable unless the appropriate keys are available.
Access Control
Avoids data loss via constant backups and supports fast recovery on failure.
Scales down to local servers, data canters, and cloud storage platforms.
12M
UNIT 3
1.
A. EXPLAIN THE DEPLOYMENT MODELS-PUBLIC CLOUD, PRIVATE CLOUD AND HYBRID
CLOUD
PUBLIC CLOUD
➢ A public cloud is a publicly accessible cloud environment owned by a third-party cloud
provider.
➢ The IT resources on public clouds are usually provisioned via cloud delivery models.
➢ The cloud provider is responsible for the creation and on-going maintenance of the public
cloud and its IT resources.
➢ Available to everyone and anyone can go and sign up for the service.
➢ Economies of Scale due to Size.
➢ Some public cloud concerns
– Ownership
– Control
– Regulatory compliance
– Data/Application security
– Liability for SLA breaches
PRIVATE CLOUD
HYBRID CLOUD
➢ A hybrid cloud is a cloud environment comprised of two or more different cloud deployment
models. Best of Both World
➢ Workload is deployed mostly on private cloud
➢ Resources can be used from public cloud when there is a surge in peak load (Cloud Burst)
B. WHAT IS HYPERVISOR
The hypervisor monitor provides the most control, flexibility and performance, because it is not
subject to limitations of a host OS. The hypervisor relies on its own software drivers for the hardware;
however, they may limit portability to another platform. Examples of this method are VMware ESX
and IBM's mainframe z/VM.
Types of Hypervisors:
Type 2 (Hosted):
Hardware
Micro Hypervisor
A very small, minimal hypervisor layer that sits directly on the hardware. It's responsible for basic
resource management and virtualization.
Service VM
A special virtual machine that runs the "Service OS". This OS handles device drivers and other system-
level services.
VMs
These run "Guest OS" and applications. Each VM is isolated from the others.
2. EXPLAIN VIRTUALISATION, TYPES AND NEED FOR VIRTUALISATION WITH EXAMPLE
Virtualization allows multiple operating system instances to run concurrently on a single computer; it
is a means of separating hardware from a single operating system.
Left side: A traditional setup where an application runs directly on an operating system, which in turn
interacts with the physical hardware.
Right side: A virtualized setup. Here, the same hardware is managed by a VMware Virtualization Layer.
This layer allows multiple virtual machines to run concurrently. Each VM has its own operating system
and applications, isolated from each other, but sharing the underlying hardware resources.
Before Virtualization:
After Virtualization:
Types of Virtualization
Hardware: Virtualizes physical hardware resources.
This includes:
What it does:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Software Virtualization
Software virtualization is similar to that of virtualization except that it is capable to abstract the
software installation procedure and create virtual software installation. Many applications & their
distributions became typical tasks for IT firms and departments. The mechanism for installing an
application differs.
Advantages:
Disadvantages:
Server Virtualization
In this process, the server resources are kept hidden from the user. This partitioning of physical server
into several virtual environments; result in the dedication of one server to perform a single application
or task. This technique is mainly used in web-servers which reduces the cost of web-hosting services.
Instead of having separate system for each web-server, multiple virtual servers can run on the same
system/computer.
Advantages:
Disadvantages:
KVM (Kernel-based Virtual Machine) is a Linux kernel module that enables a Linux system to function
as a hypervisor. It makes it possible for users to run several, isolated virtual environments (VMs) on a
single physical machine.
Features:
Full Virtualization
➢ Supports execution of unmodified guest OS (Linux, Windows, etc.) with full virtual hardware
access.
Open Source
➢ Free to use and supported by large community as well as enterprise (Red Hat).
➢ Initially designed for x86 but now supports architectures such as IBM S/390, Intel IA-64, ARM.
Tool Support
➢ Usually paired with tools such as QEMU for hardware emulation and libvirt for management.
Advantages:
Disadvantages:
➢ Implemented as a kernel module, allowing Linux to become a hypervisor simply by loading it.
➢ Device appears in /dev/kvm. Allows control by ioctl() system calls to create new VMs, assign
memory, etc.
➢ Hardware emulation or platform virtualization controlled by QEMU-k
5. Security Capabilities
6. Components Overview
8. Use Cases
A data centre is a physical building that companies use to house and maintain computers, networking
equipment, and data. It's essential for hosting applications, storing data, and maintaining services.
Single-site:
➢ Centralized infrastructure.
➢ Simpler to manage with a single location.
➢ Appropriate for small to mid-size businesses.
➢ Lower operational and staffing expenses.
➢ Limited fault tolerance — single point of failure.
Multi-site:
➢ Selected due to location (natural disaster susceptibility, power accessibility, political climate).
➢ Must be able to accommodate equipment size, airflow, as well as employees' safety.
➢ Comprises badge access, video surveillance, and fire suppression (non-water systems).
➢ Constructed to securely accommodate equipment and prevent unauthorized access.
➢ DCIM (Data centre Infrastructure Management) software facilitates remote monitoring and
control.
➢ Virtualization enables servers, storage, and networks to be pooled and made more efficient.
Why It Matters
➢ Cloud and data centres are highly dependent on modern businesses for:
➢ Quick, dependable services
➢ Optimized resource use
➢ Security and recovery from disasters
➢ Scalability and adaptability
Features:
Sensor-Cloud is an emerging cloud computing paradigm that employs the physical sensors to collect
its data and forward all the sensor data to a cloud computing environment. Sensor-Cloud processes
the sensor data effectively, which is utilized for various monitoring applications
Architecture
1. Data Analysis
2. Scalability
4. Visualization
6. Dynamic Access
7. Multitenancy
8. Automation
9. Flexibility
➢ Definition: Can easily change and utilize different apps and services when needed.
➢ Example: Changing between different data visualization tools.
➢ Advantage: Quickly adjusts to evolving user requirements.
➢ Disadvantage: Overload of choices leads to confusion.
10. Resource Agility
➢ Definition: Real-time data processing and user feedback via the cloud.
➢ Example: Instant alerts from motion detectors in security systems.
➢ Benefit: Facilitates quick, well-informed decisions.
➢ Drawback: Delays are possible if network connectivity is low.
Data Encryption
In this method, easy-to-use mobile applications are created, which are driven by and hosted by the
cloud computing technology. The 'mobile cloud' strategy provides the opportunity to the apps.
Developers to construct applications specifically made for mobile-users, which may be utilized without
being tied up with the operating system of the device or the ability of the device to save data. In this
case, the data-processing and data storing tasks are accomplished outside the mobile devices.
MCC's capability of making the device execute cloud-web-applications on unlike other native
applications makes MCC unique from the notion of 'Mobile Computing'. Here the clients remotely
access store applications and its related data whenever over the Internet through subscribing the
cloud services. While the majority of devices already use a combination of web-based and native
applications, the direction that things are currently moving appears to be toward services and
convenience that are provided by a mobile cloud.
Researchers are making genuine efforts towards developing a powerful and symbiotic platform,
named the 'Third Platform,' that would unite the mobile and the cloud. Professionals envision this
platform to further revolutionize the rising of MCC that has provided its users a superior method to
store and access their data as well as newer data synchronization methods, improved reliability and
better performance. All these beneficial aspects have inspired a lot of people to consider MCC for their
smart-phones.
KEY ENABLERS BEHIND THE GROWTH AND SUCCESS OF MOBILE CLOUD COMPUTING
Cloud data management is the process of storing, organizing, securing, and analyzing data in the
cloud. As companies move away from conventional data warehouses to cloud systems, proper
management is critical to derive value while maintaining security and efficiency.
Why It Matters
Memory management in the cloud refers to how computing resources (RAM and virtual memory)
are allocated, scaled, and optimized across different workloads and users. It is handled by cloud
service providers automatically or via user configuration.