0% found this document useful (0 votes)
27 views32 pages

CC 1

The document provides an overview of cloud computing, detailing its architecture, deployment models, and service models, including IaaS, PaaS, and SaaS. It discusses the infrastructure and design challenges of cloud systems, as well as the roles of cloud consumers, providers, brokers, and carriers. Additionally, it highlights the benefits of cloud computing, such as cost reduction and improved resource management, while addressing potential challenges like security and management complexities.

Uploaded by

deephikaa20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views32 pages

CC 1

The document provides an overview of cloud computing, detailing its architecture, deployment models, and service models, including IaaS, PaaS, and SaaS. It discusses the infrastructure and design challenges of cloud systems, as well as the roles of cloud consumers, providers, brokers, and carriers. Additionally, it highlights the benefits of cloud computing, such as cost reduction and improved resource management, while addressing potential challenges like security and management complexities.

Uploaded by

deephikaa20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 32

CCS335 -CLOUD COMPUTING

UNIT - 1
UNIT I CLOUD ARCHITECTURE MODELS AND INFRASTRUCTURE

 Cloud Architecture: System Models for Distributed and Cloud Computing – NIST Cloud Computing
Reference Architecture – Cloud deployment models – Cloud service models; Cloud Infrastructure:
Architectural Design of Compute and Storage Clouds – Design Challenges

What is Cloud Computing?


 Cloud is a parallel and distributed computing system consisting of a collection of inter-connected and
virtualized computers that are dynamically provisioned and presented as one or more unified
computing resources based on service-level agreements (SLA) established through negotiation
between the service provider and consumers (Buyya).
 The term cloud refers to a network or the internet. It is a technology that uses remote servers on the
internet to store, manage, and access data online rather than local drives. The data can be anything
such as files, images, documents, audio, video, and more.
 There are the following operations that we can do using cloud computing:
1. Developing new applications and services
2. Storage, back up, and recovery of data
3. Hosting blogs and websites
4. Delivery of software on demand
5. Analysis of data
6. Streaming videos and audios

Cloud Architecture: System Models for Distributed and Cloud Computing:

 Distributed and cloud computing systems are built over a large number of autonomous computer
nodes. These node machines are interconnected by SANs, LANs, or WANs in a hierarchical man-
ner.
 With today’s networking technology, a few LAN switches can easily connect hundreds of machines
as a working cluster..
 massive systems are classified into four groups: clusters, P2P networks, computing grids,
and Internet clouds over huge data centers..
 These machines work collectively, cooperatively, or collaboratively at various levels.
1. Cluster Architecture
the architecture of a typical server cluster built around a low-latency, high-bandwidth interconnection
network. This network can be as simple as a SAN (e.g., Myrinet) or a LAN (e.g., Ethernet).
The cluster is connected to the Internet via a virtual private network (VPN) gateway. The gateway IP
address locates the cluster. The system image of a computer is decided by the way the OS manages the
shared cluster resources. Most clusters have loosely coupled node computers. All resources of a server node
are managed by their own OS..
1.2 Single-System Image
ideal cluster should merge multiple system images into a single-system image (SSI).. SSI makes the cluster
appear like a single machine to the user. A cluster with multiple system images is nothing but a collection of
inde-pendent computers.
1.3 Hardware, Software, and Middleware Support
Most clusters run under the Linux OS. The computer nodes are interconnected by a high-bandwidth
network (such as Gigabit Ethernet, Myrinet, InfiniBand, etc.).
2. Grid Computing Infrastructures
The grid refer distributed dataset a natural growth path from Internet to web and grid computing services.
Internet services such as the Telnet command enables a local computer to connect to a remote
computer. A web service such as HTTP enables remote access of remote web pages. simultaneously.
2.1 Computational Grids
The grid is often con-structed across LAN, WAN, or Internet backbone networks at a regional,
national, or global scale.
The computers used in a grid are pri-marily workstations, servers, clusters, and supercomputers.
Personal computers, laptops, and PDAs can be used as access devices to a grid system.
Figure 1.16 shows an example computational grid built over multiple resource sites owned by different
organizations. The resource sites offer complementary computing resources, including workstations, large
servers, a mesh of processors, and Linux clusters to satisfy a chain of computational needs.
The grid is built across various IP broadband networks including LANs and WANs already used by
enterprises or organizations over the Internet.
Grid technology demands new distributed computing models, software/middleware support, network
protocols, and hardware infrastructures. National grid projects are followed by industrial grid plat-form
development by IBM, Microsoft, Sun, HP, Dell, Cisco, EMC, Platform Computing, and others. New grid
service providers (GSPs) and new grid applications have emerged rapidly, similar to the growth of Internet
and web services in the past two decades, grid systems are classified in essentially two
categories: computational or data grids and P2P grids. Computing or data grids are built primarily at the
national level.

3. Peer-to-Peer Network Families

An example of a well-established distributed system is the client-server architecture. In this sce-nario, client machines
(PCs and workstations) are connected to a central server for compute, e-mail, file access, and database applications.
The P2P architecture offers a distributed model of networked systems. First, a P2P network is client-oriented instead
of server-oriented.

3.1 P2P Systems


In a P2P system, every node acts as both a client and a server, Initially, the peers are totally unrelated. Each
peer machine joins or leaves the P2P network voluntarily. Only the participating peers form the physical
network at any time. Unlike the cluster or grid, a P2P network does not use a dedicated interconnection
network.
3.2 Overlay Networks
Data items or files are distributed in the participating peers. Based on communication or file-sharing needs,
the peer IDs form an overlay network at the logical level. This overlay is a virtual network
There are two types of overlay networks: unstructured and structured. An unstructured
overlay network is characterized by a random graph. There is no fixed route to send messages or files among
the nodes. thus resulting in heavy network traffic and nondeterministic search results.
Structured overlay net-works follow certain connectivity topology and rules for inserting and removing
nodes (peer IDs) from the overlay graph. Routing mechanisms are developed to take advantage of the
structured overlays.
3.3 P2P Computing Challenges

P2P computing faces three types of heterogeneity problems in hardware, software, and network requirements. There
are too many hardware models and architectures to select from; incompatibility exists between software and the OS;
and different network connections and protocols

P2P performance is affected by routing efficiency and self-organization by participating peers. Fault
tolerance, failure management, and load balancing are other important issues in using overlay networks.
Lack of trust among peers poses another problem. Peers are strangers to one another. Security, privacy, and
copyright violations are major worries by those in the industry in terms of applying P2P technology in
business applications . In a P2P network, all clients provide resources including computing power, storage
space, and I/O bandwidth. The distributed nature of P2P net-works also increases robustness, because
limited peer failures do not form a single point of failure.
By replicating data in multiple peers, one can easily lose data in failed nodes. On the other hand,
disadvantages of P2P networks do exist. Because the system is not centralized, managing it is difficult. In
addition, the system lacks security. Anyone can log on to the system and cause damage or abuse. Further, all
client computers connected to a P2P network cannot be considered reliable or virus-free.
4. Cloud Computing over the Internet
Cloud computing has been defined differently by many users and designers. For example, IBM, a major
player in cloud computing, has defined it as follows: “A cloud is a pool of virtualized computer
resources. The cloud supports redundant, self-recovering, highly scalable programming models that allow
workloads to recover from many unavoidable hardware/software failures. Finally, the cloud system should
be able to monitor resource use in real time to enable rebalancing of allocations when needed.
4.1 Internet Clouds
Cloud computing applies a virtualized platform with elastic resources on demand by provisioning hardware, software,
and data sets dynamically (see Figure 1.18). The idea is to move desktop computing to a service-oriented platform
using server clusters and huge databases at data centers. Cloud computing leverages its low cost and simplicity to
benefit both users and providers. Machine virtualization has enabled such cost-effectiveness. Cloud computing intends
to satisfy many user

applications simultaneously. The cloud ecosystem must be designed to be secure, trustworthy, and
dependable. Some computer users think of the cloud as a centralized resource pool. Others consider the
cloud to be a server cluster which practices distributed computing over all the servers used.
4.2 The Cloud Landscape
• Infrastructure as a Service (IaaS) This model puts together infrastructures demanded by users—namely
servers, storage, networks, and the data center fabric. The user can deploy and run on multiple VMs running
guest OSes on specific applications. The user does not manage or control the underlying cloud
infrastructure, but can specify when to request and release the needed resources.
• Platform as a Service (PaaS) This model enables the user to deploy user-built applications onto a
virtualized cloud platform. PaaS includes middleware, databases, development tools, and some runtime
support such as Web 2.0 and Java. The platform includes both hardware and software integrated with
specific programming interfaces. The provider supplies the API and software tools (e.g., Java, Python, Web
2.0, .NET). The user is freed from managing the cloud infrastructure.
• Software as a Service (SaaS) This refers to browser-initiated application software over thousands of paid
cloud customers. The SaaS model applies to business processes, industry applications, consumer
relationship management (CRM), enterprise resources planning (ERP), human resources (HR), and
collaborative applications. On the customer side, there is no upfront investment in servers or software
licensing. On the provider side, costs are rather low, compared with conventional hosting of user
applications.
The following list highlights eight reasons to adapt the cloud for upgraded Internet applications and web services:

1. Desired location in areas with protected space and higher energy efficiency

2. Sharing of peak-load capacity among a large pool of users, improving overall utilization

3. Separation of infrastructure maintenance duties from domain-specific application development

4. Significant reduction in cloud computing cost, compared with traditional computing paradigms

5. Cloud computing programming and application development

6. Service and data discovery and content/service distribution

7. Privacy, security, copyright, and reliability issues

8. Service agreements, business models, and pricing policies

NIST Cloud Computing Reference Architecture:


NIST (National Institute of Standards and Technology Background) The goal is to accelerate the federal government’s
adoption of secure and effective cloud computing to reduce costs and improve services.
Example Usage Scenario 1:
🞂 A cloud consumer may request service from a cloud broker instead of contacting a cloud provider
directly.
🞂 The cloud broker may create a new service by combining multiple services or by enhancing an existing
service. Usage Scenario- Cloud Brokers
🞂 In this example, the actual cloud providers are invisible to the cloud consumer.
🞂 The cloud consumer interacts directly with the cloud broker.

Example Usage Scenario 2


🞂 Cloud carriers provide the connectivity and transport of cloud services from cloud providers to cloud
consumers.
🞂 A cloud provider participates in and arranges for two unique service level agreements (SLAs), one with a
cloud carrier (e.g. SLA2) and one with a cloud consumer (e.g. SLA1).
Usage Scenario for Cloud Carriers
 A cloud provider arranges service level agreements (SLAs) with a cloud carrier.
 Request dedicated and encrypted connections to ensure the cloud services.

Example Usage Scenario 3


• For a cloud service, a cloud auditor conducts independent assessments of the operation and security of the
cloud service implementation.
• The audit may involve interactions with both the Cloud Consumer and the Cloud Provider.
Cloud Consumer

🞂 The cloud consumer is the principal stakeholder for the cloud computing service.

🞂 A cloud consumer represents a person or organization that maintains a business relationship with, and uses the
service from a cloud provider. The cloud consumer may be billed for the service provisioned, and needs to arrange
payments accordingly.

Example Services Available to a Cloud Consumer

The consumers of SaaS can be organizations that provide their members with access to software
applications, end users or software application administrators.
SaaS consumers can be billed based on the number of end users, the time of use, the network bandwidth
consumed, the amount of data stored or duration of stored data.
Cloud consumers of PaaScan employ the tools and execution resources provided by cloud providers to
develop, test, deploy and manage the applications.
PaaS consumers can be application developers or application testers who run and test applications in cloud-
based environments,.
PaaS consumers can be billed according to, processing, database storage and network resources consumed.
Consumers of IaaS have access to virtual computers, network-accessible storage & network infrastructure
components.
The consumers of IaaS can be system developers, system administrators and IT managers.
IaaS consumers are billed according to the amount or duration of the resources consumed, such as CPU
hours used by virtual computers, volume and duration of data stored.
Cloud Provider
🞂 A cloud provider is a person, an organization;
🞂 It is the entity responsible for making a service available to interested parties.
🞂 A Cloud Provider acquires and manages the computing infrastructure required for providing the services.
🞂 Runs the cloud software that provides the services.
Makes arrangement to deliver the cloud services to the Cloud Consumers through network access.
Cloud Provider - Major Activities

Cloud Auditor
🞂 A cloud auditor is a party that can perform an independent examination of cloud service controls.
🞂 Audits are performed to verify conformance to standards through review of objective evidence.
🞂 A cloud auditor can evaluate the services provided by a cloud provider in terms of security controls,
privacy impact, performance, etc.
Cloud Broker
🞂 Integration of cloud services can be too complex for cloud consumers to manage.
🞂 A cloud consumer may request cloud services from a cloud broker, instead of contacting a cloud provider
directly.
🞂 A cloud broker is an entity that manages the use, performance and delivery of cloud services. Negotiates
relationships between cloud providers and cloud consumers.
Services of cloud broker
Service Intermediation:
🞂 A cloud broker enhances a given service by improving some specific capability and providing value-
added services to cloud consumers.
Service Aggregation:
🞂 A cloud broker combines and integrates multiple services into one or more new services.
🞂 The broker provides data integration and ensures the secure data movement between the cloud consumer
and multiple cloud providers.
Services of cloud broker
Service Arbitrage:
🞂 Service arbitrage is similar to service aggregation except that the services being aggregated are not fixed.
🞂 Service arbitrage means a broker has the flexibility to choose services from multiple agencies. Eg: The
cloud broker can use a credit-scoring service to measure and select an agency with the best score.
Cloud Carrier
🞂 A cloud carrier acts as an intermediary that provides connectivity and transport of cloud services between
cloud consumers and cloud providers.
🞂 Cloud carriers provide access to consumers through network.
🞂 The distribution of cloud services is normally provided by network and telecommunication carriers or a
transport agent
🞂 A transport agent refers to a business organization that provides physical transport of storage media such
as high-capacity hard drives and other access devices.
Scope of Control between Provider and Consumer
The Cloud Provider and Cloud Consumer share the control of resources in a cloud system
The application layer includes software applications targeted at end users or programs.
The applications are used by SaaS consumers, or installed/managed/maintained by PaaS consumers, IaaS
consumers and SaaS providers.
🞂 The middleware layer provides software building blocks (e.g., libraries, database, and Java virtual
machine) for developing application software in the cloud.
🞂 Used by PaaS consumers, installed/ managed/ maintained by IaaS consumers or PaaS providers, and
hidden from SaaS consumers.
🞂 The OS layer includes operating system and drivers, and is hidden from SaaS consumers and PaaS
consumers.
🞂 An IaaS cloud allows one or multiple guest OS to run virtualized on a single physical host.
The IaaS consumers should assume full responsibility for the guest OS, while the IaaS provider controls the
host OS,

Cloud deployment models


 Public Cloud
 Private Cloud
 Hybrid Cloud
 Community Cloud

Public cloud
🞂 A public cloud is one in which the cloud infrastructure and computing resources are made available to the general
public over a public network.

🞂 A public cloud is meant to serve a multitude(huge number) of users, not a single customer.

🞂 A fundamental characteristic of public clouds is multitenancy.

🞂 Multitenancy allows multiple users to work in a software environment at the same time, each with their own
resources.

🞂 Built over the Internet (i.e., service provider offers resources, applications storage to the customers over the
internet) and can be accessed by any user.

🞂 Owned by service providers and are accessible through a subscription.

🞂 Best Option for small enterprises, which are able to start their businesses without large up-front(initial) investment.

🞂 By renting the services, customers were able to dynamically upsize or downsize their IT according to the demands
of their business.

🞂 Services are offered on a price-per-use basis.

🞂 Promotes standardization, preserve capital investment

🞂 Public clouds have geographically dispersed datacenters to share the load of users and better serve them according
to their locations
🞂 Provider is in control of the infrastructure

Examples:

o Amazon EC2 is a public cloud that provides Infrastructure as a Service

o Google AppEngine is a public cloud that provides Platform as a Service

o SalesForce.com is a public cloud that provides software as a service.

Advantage

🞂 Offers unlimited scalability – on demand resources are available to meet your business needs.

🞂 Lower costs—no need to purchase hardware or software and you pay only for the service you use.

🞂 No maintenance - Service provider provides the maintenance.

🞂 Offers reliability: Vast number of resources are available so failure of a system will not interrupt service.

🞂 Services like SaaS, PaaS, IaaS are easily available on Public Cloud platform as it can be accessed from anywhere
through any Internet enabled devices.

🞂 Location independent – the services can be accessed from any location

Disadvantage

🞂 No control over privacy or security

🞂 Cannot be used for use of sensitive applications(Government and Military agencies

will not consider Public cloud)

🞂 Lacks complete flexibility(since dependent on provider)

🞂 No stringent (strict) protocols regarding data management

Private Cloud
🞂 Cloud services are used by a single organization, which are not exposed to the public

🞂 Services are always maintained on a private network and the hardware and software are dedicated only to single
organization

🞂 Private cloud is physically located at

 Organization’s premises [On-site private clouds] (or)

 Outsourced(Given) to a third party[Outsource private Clouds]

🞂 It may be managed either by

🞂 Cloud Consumer organization (or)

 By a third party

🞂 Private clouds are used by

 government agencies

 financial institutions

 Mid size to large-size organisations.

🞂 On-site private clouds


Out-sourced Private Cloud

🞂 Supposed to deliver more efficient and convenient cloud

🞂 Offers higher efficiency, resiliency(to recover quickly), security, and privacy

🞂 Customer information protection: In-house security is easier to maintain and relyon.

 Follows its own(private organization) standard procedures and

operations(where as in public cloud standard procedures and operations of

service providers are followed )

Advantage

🞂 Offers greater Security and Privacy

🞂 Organization has control over resources

🞂 Highly reliable
🞂 Saves money by virtualizing the resources

Disadvantage

🞂 Expensive when compared to public cloud

🞂 Requires IT Expertise to maintain resources.

Hybrid Cloud
🞂 Built with both public and private clouds

🞂 It is a heterogeneous cloud resulting from a private and public clouds.

🞂 Private cloud are used for

 sensitive applications are kept inside the organization’s network

 business-critical operations like financial reporting

🞂 Public Cloud are used when

 Other services are kept outside the organization’s network

 high-volume of data

 Lower-security needs such as web-based email(gmail,yahoomail etc)

🞂 The resources or services are temporarily leased for the time required and then released. This practice is also known
as cloud bursting.
Advantage

🞂 It is scalable

🞂 Offers better security

🞂 Flexible-Additional resources are availed in public cloud when needed

🞂 Cost-effectiveness—we have to pay for extra resources only when needed.

🞂 Control - Organisation can maintain a private infrastructure for sensitive application

Disadvantage

🞂 Infrastructure Dependency

🞂 Possibility of security breach(violate) through public cloud

Factors Public Cloud Private Cloud Hybrid Cloud

Resources are It is a combination of public and


Resources are shared with a
Resources shared among private clouds. based on the
single organization
multiple customers requirement.

Data of multiple
Data of a single Data is stored in the public cloud,
organizations is
Tenancy organization is stored in a and provide security in the public
stored in the public
clouds the public cloud cloud.
cloud

It can include a mix of public


cloud pay-as-you-go pricing, and
Have a variety of pricing private cloud fixed pricing. It has
Pay Model Pay what you used
models other pricing models such as
consumption-based, subscription-
based, etc.

Third-party service
Operated by Specific organization Can be a combination of both
provider

It has scalability and flexibility by


Scalability It has more
It has predictability and allowing organizations to use a
and scalability and
consistency combination of public and private
Flexibility flexibility,
cloud services.

Can be more expensive, but it can


also be less expensive , depending
Expensive less expensive More expensive
on the specific needs and
requirements of the organization.

The general public Restricted to a specific


Availability Can be a combination of both.
(over the internet) organization
Community Cloud:
The community cloud is the extension of private cloud and this kind of model is sharing cloud infrastructure among
multiple organizations in the same community or area. Organizations, businesses, financial institutions and banks etc.
are examples of this category. The infrastructure is provided for exclusive usage by a group of users from companies
with similar computing requirements in a community cloud environment. The following represents the community
cloud.

The Community cloud model has the following benefits:

 Cost-effective: Community cloud is cost-effective since its infrastructure cost is shared among number of
enterprises or communities.

 Security: The community cloud is more secure compared to public cloud

 Shared resources: Infrastructure and other resources shared with multiple organizations.

 Data sharing and collaboration: It is excellent for both data sharing and collaboration.

 Setup Benefits: Customers may be able to work more efficiently as a consequence of these shared resources.

 Smaller investment: Investment on infrastructure is shared among organizations in the community.

Cloud Service Models


🞂 Software as a Service (SaaS)

🞂 Platform as a Service (PaaS)

🞂 Infrastructure as a Service (IaaS)


These models are offered based on various SLAs between providers and users SLA of cloud computing covers

o service availability

o performance

 data protection

o Security

Software as a Service(SaaS)( Complete software offering on the cloud)


🞂 SaaS is a licensed software offering on the cloud and pay per use

🞂 SaaS is a software delivery methodology that provides licensed multi-tenant access to software and its functions
remotely as a Web-based service. Usually billed based on usage

◦ Usually multi tenant environment

◦ Highly scalable architecture

🞂 Customers do not invest on software application programs.

🞂 The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure.

🞂 The applications are accessible from various client devices through a thin client interface such as a web browser
(e.g., web-based email).

🞂 The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating
systems, storage, data or even individual application capabilities, with the possible exception of limited user specific
application configuration settings.

🞂 On the customer side, there is no upfront investment in servers or software licensing.

🞂 It is a “one-to-many” software delivery model, whereby an application is shared across multiple users

🞂 Characteristic of Application Service Provider(ASP)

o Product sold to customer is application access.

o Application is centrally managed by Service Provider.


o Service delivered is one-to-many customers

o Services are delivered on the contract

E.g. Gmail and docs, Microsoft SharePoint, and the CRM software(Customer

Relationship management)

🞂 SaaS providers

🞂 Google’s Gmail, Docs, Talk etc

🞂 Microsoft’s Hotmail, Sharepoint

🞂 SalesForce,

🞂 Yahoo

🞂 Facebook

Infrastructure as a Service (IaaS) ( Hardware offerings on the cloud)


IaaS is the delivery of technology infrastructure (mostly hardware) as an on demand, scalable service .

◦ Usually billed based on usage

◦ Usually multi tenant virtualized environment

◦ Can be coupled with Managed Services for OS and application support

◦ User can choose his OS, storage, deployed app, networking components

◦ The capability provided to the consumer is to provision processing, storage, networks, and other fundamental
computing resources.

◦ Consumer is able to deploy and run arbitrary software, which may include operating systems and applications.

◦ The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems,
storage and deployed applications.

🞂 IaaS/HaaS solutions bring all the benefits of hardware virtualization: workload partitioning, application isolation,
sandboxing, and hardware tuning
IaaS providers

🞂 Amazon Elastic Compute Cloud (EC2)

◦ Each instance provides 1-20 processors, upto 16 GB RAM, 1.69TB storage

🞂 RackSpace Hosting

◦ Each instance provides 4 core CPU, upto 8 GB RAM, 480 GB storage

🞂 Joyent Cloud

◦ Each instance provides 8 CPUs, upto 32 GB RAM, 48 GB storage

🞂 Go Grid

◦ Each instance provides 1-6 processors, upto 15 GB RAM, 1.69TB storage

Platform as a Service (PaaS) ( Development platform)


🞂 PaaS provides all of the facilities required to support the complete life cycle of building, delivering and deploying
web applications and services entirely from the Internet.

🞂 Typically applications must be developed with a particular platform in mind

• Multi tenant environments

• Highly scalable multi tier architecture

🞂 The capability provided to the consumer is to deploy onto the cloud infrastructure consumer created or acquired
applications created using programming languages and tools supported by the provider.

🞂 The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating
systems, or storage.
The user is freed from managing the cloud infrastructure

o Execution environment and hardware resources (infrastructure) (or)

o software is installed on the user premises

PaaS: Service Provider provides Execution environment and hardware resources(infrastructure)

Characteristics of PaaS

Runtime framework: Executes end-user code according to the policies set by the user and the provider.

Abstraction: PaaS helps to deploy(install) and manage applications on the cloud.

Automation: Automates the process of deploying applications to the infrastructure, additional resources are provided
when needed.

Cloud services: helps the developers to simplify the creation and delivery cloud applications.

PaaS providers

🞂 Google App Engine

◦ Python, Java, Eclipse

🞂 Microsoft Azure

◦ .Net, Visual Studio

🞂 Sales Force

◦ Apex, Web wizard


🞂 TIBCO,

🞂 VMware,

🞂 Zoho

Cloud Computing – Services


 Software as a Service - SaaS

 Platform as a Service - PaaS

 Infrastructure as a Service - IaaS

Basis Of IAAS PAAS SAAS

Infrastructure as a
Platform as a service. Software as a service.
Stands for service.

IAAS is used by network PAAS is used by SAAS is used by the end


Uses architects. developers. user.

PAAS gives access to run


IAAS gives access to the
time environment to
resources like virtual SAAS gives access to the
deployment and
machines and virtual end user.
development tools for
storage.
Access application.

It is a cloud computing
It is a service model that It is a service model in
model that delivers tools
provides virtualized cloud computing that hosts
that are used for the
computing resources software to make it
development of
over the internet. available to clients.
Model applications.

There is no requirement
Some knowledge is
It requires technical about technicalities
required for the basic
Technical knowledge. company handles
setup.
understanding. everything.

It is popular among It is popular among


It is popular among
developers who focus on consumers and companies,
developers and
the development of apps such as file sharing, email,
researchers.
Popularity and scripts. and networking.

It has about a 27 % rise in


It has around a 12% It has around 32%
the cloud computing
increment. increment.
Percentage rise model.

Used by the skilled Used by mid-level


Used among the users of
developer to develop developers to build
entertainment.
Usage unique applications. applications.
Basis Of IAAS PAAS SAAS

Amazon Web Services, Facebook, and Google MS Office web, Facebook


Cloud services. sun, vCloud Express. search engine. and Google Apps.

Enterprise AWS virtual private


Microsoft Azure. IBM cloud analysis.
services. cloud.

Outsourced
Salesforce Force.com, Gigaspaces. AWS, Terremark
cloud services.

Operating System,
Runtime, Middleware, Data of the application Nothing
User Controls and Application data

It is highly scalable to suit It is highly scalable to suit


It is highly scalable and
the different businesses the small, mid and
flexible.
Others according to resources. enterprise level business

Architectural Design Challenges


Challenge 1 : Service Availability and Data Lock-in Problem

Service Availability

Service Availability in Cloud might be affected because of Single Point Failure Distributed Denial of Service Single
Point Failure

o Depending on single service provider might result in failure.

o In case of single service providers, even if company has multiple data centres

located in different geographic regions, it may have common software infrastructure and accounting systems.

Solution:

o Multiple cloud providers may provide more protection from failures and they provide High

Availability(HA)

o Multiple cloud Providers will rescue the loss of all data.

Distributed Denial of service (DDoS) attacks.

o Cyber criminals, attack target websites and online services and makes services unavailable to users.

o DDoS tries to overwhelm (disturb) the services unavailable to user by having more traffic

than the server or network can accommodate.It

Solution:

o Some SaaS providers provide the opportunity to defend against DDoS attacks by using quick scale-ups. Customers
cannot easily extract their data and programs from one site to run on another.
Data Lock-in

is a situation in which a customer using service of a provider cannot be moved to another service provider because
technologies used by a provider will be incompatible with other providers. This makes a customer dependent on a
vendor for services and makes customer unable to use service of another vendor.

Solution:

o Have standardization (in technologies) among service providers so that customers can easily move from a service
provider to another.

Challenge 2: Data Privacy and Security Concerns

Cloud services are prone to attacks because they are accessed through internet. Security is given by

o Storing the encrypted data in to cloud.

o Firewalls, filters.

Cloud environment attacks include

o Guest hopping

o Hijacking

o VM rootkits.

Guest Hopping: Virtual machine hyper jumping (VM jumping) is an attack method that exploits(make use of)
hypervisor’s weakness that allows a virtual machine (VM) to be accessed from another.

Hijacking: Hijacking is a type of network security attack in which the attacker takes control of a communication

VM Rootkit: is a collection of malicious (harmful) computer software, designed to enable access to a computer that is
not otherwise allowed.

Challenge 3: Unpredictable Performance and Bottlenecks

Multiple VMs can share CPUs and main memory in cloud computing, but I/O sharing is problematic.

Internet applications continue to become more data-intensive (handles huge amount of data). Handling huge amount
of data (data intensive) is a bottleneck in cloud environment. Weak Servers that does not provide data transfers
properly must be removed from cloud environment

Challenge 4: Distributed Storage and Widespread Software Bugs

The database is always growing in cloud applications. There is a need to create a storage system that meets this
growth. This demands the design of efficient distributed SANs (Storage Area Network of Storagedevices). Data
centres must meet

o Scalability

o Data durability

o HA(High Availability)

o Data consistence

Bug refers to errors in software.Debugging must be done in data centres.

Challenge 5: Cloud Scalability, Interoperability and Standardization

Cloud Scalability
Cloud resources are scalable. Cost increases when storage and network bandwidth scaled(increased)

Interoperability

Open Virtualization Format (OVF) describes an open, secure, portable, efficient, and extensible format for the
packaging and distribution of VMs. OVF defines a transport mechanism for VM, that can be applied to different
virtualization platforms

Standardization

Cloud standardization, should have ability for virtual machine to run on any virtual platform.

Challenge 6: Software Licensing and Reputation Sharing

Cloud providers can use both pay-for-use and bulk-use licensing schemes to widen the business coverage. Cloud
providers must create reputation-guarding services similar to the “trusted e-mail” services Cloud providers want legal
liability to remain with the customer, and vice versa.

Architectural Design of Compute and Storage Clouds


Architectural Design of Compute
Four major design goals of a cloud computing platform
 Scalability
 Virtualization
 Efficiency
 Reliability
Cloud Computing Architecture :
The cloud architecture is divided into 2 parts i.e.
1. Frontend
2. Backend
The below figure represents an internal architectural view of cloud computing .
Front End

The front end is used by the client. It contains client-side interfaces and applications that are required to
access the cloud computing platforms. The front end includes web servers (including Chrome, Firefox,
internet explorer, etc.), thin & fat clients, tablets, and mobile devices.

Back End

The back end is used by the service provider. It manages all the resources that are required to provide cloud
computing services. It includes a huge amount of data storage, security mechanism, virtual machines,
deploying models, servers, traffic control mechanisms, etc.

There are the following components of cloud computing architecture -

1. Client Infrastructure

Client Infrastructure is a Front end component. It provides GUI (Graphical User Interface) to interact with
the cloud.

2. Application

The application may be any software or platform that a client wants to access.

3. Service

A Cloud Services manages that which type of service you access according to the client’s requirement.

Cloud computing offers the following three type of services:


i. Software as a Service (SaaS) – It is also known as cloud application services. Mostly, SaaS applications
run directly through the web browser means we do not require to download and install these applications.
Some important example of SaaS is given below –

Example: Google Apps, Salesforce Dropbox, Slack, Hubspot, Cisco WebEx.

ii. Platform as a Service (PaaS) – It is also known as cloud platform services. It is quite similar to SaaS,
but the difference is that PaaS provides a platform for software creation, but using SaaS, we can access
software over the internet without the need of any platform.

Example: Windows Azure, Force.com, Magento Commerce Cloud, OpenShift.

iii. Infrastructure as a Service (IaaS) – It is also known as cloud infrastructure services. It is responsible
for managing applications data, middleware, and runtime environments.

Example: Amazon Web Services (AWS) EC2, Google Compute Engine (GCE), Cisco Metapod.

4. Runtime Cloud

Runtime Cloud provides the execution and runtime environment to the virtual machines.

5. Storage

It provides a huge amount of storage capacity in the cloud to store and manage data.

6.Infrastructure
It provides services on the host level, application level, and network level. Cloud infrastructure includes
hardware and software components such as servers, storage, network devices, virtualization software, and
other storage resources that are needed to support the cloud computing model.

7. Management

Management is used to manage components such as application, service, runtime cloud, storage,
infrastructure, and other security issues in the backend and establish coordination between them.

8. Security

Security is an in-built back end component of cloud computing. It implements a security mechanism in the
back end.

9. Internet

The Internet is medium through which front end and back end can interact and communicate with each
other.

Market – oriented Architecture:

 The SLA Resource Allocator act as the interface between the data center/cloud service provider and external
users.
 When a service request is first submitted the service request examiner interprets the submitted request
for Qos Requirements before determining whether to accept or Reject the Request
Cloud Storage
 Storing your data on the storage of a cloud service provider rather than on a local system.
 Data stored on the cloud are accessed through Internet.
 Cloud Service Provider provides Storage as a Service

Storage as a Service

🞂 Third-party provider rents space on their storage to cloud users.

🞂 Customers move to cloud storage when they lack in budget for having their own storage.

🞂 Storage service providers takes the responsibility of taking current backup, replication,and disaster recovery needs.

🞂 Small and medium-sized businesses can make use of Cloud Storage

🞂 Storage is rented from the provider using a

o cost-per-gigabyte-stored (or)

o cost-per-data-transferred

🞂 The end user doesn’t have to pay for infrastructure (resources), they have to pay only for

how much they transfer and save on the provider’s storage.

Providers

🞂 Google Docs allows users to upload documents, spreadsheets, and presentations to

Google’s data servers.

🞂 Those files can then be edited using a Google application.

🞂 Web email providers like Gmail, Hotmail, and Yahoo! Mail, store email messages on

their own servers.

🞂 Users can access their email from computers and other devices connected to the Internet.

🞂 Flicker and Picasa host millions of digital photographs, Users can create their own online

photo albums.

🞂 YouTube hosts millions of user-uploaded video files.


🞂 Hostmonster and GoDaddy store files and data for many client web sites.

🞂 Facebook and MySpace are social networking sites and allow members to post pictures

and other content. That content is stored on the company’s servers.

🞂 MediaMax and Strongspace offer storage space for any kind of digital data.

Data Security

🞂 To secure data, most systems use a combination of techniques:

o Encryption

o Authentication

o Authorization

Encryption

o Algorithms are used to encode information. To decode the information keys are required.

Authentication processes

o This requires a user to create a name and password.

Authorization practices

o The client lists the people who are authorized to access information stored on the cloud system.

If information stored on the cloud, the head of the IT department might have complete and

free access to everything.

Reliability

🞂 Service Providers gives reliability for data through redundancy (maintaining multiple

copies of data).

Reputation is important to cloud storage providers. If there is a perception that the provider is

unreliable, they won’t have many clients.

Advantages

🞂 Cloud storage providers balance server loads.

🞂 Move data among various datacenters, ensuring that information is stored close and

thereby available quickly to where it is used.

🞂 It allows to protect the data in case there’s a disaster.

🞂 Some products are agent-based and the application automatically transfers

information to the cloud via FTP

Theft (Disadvantage)

🞂 User data could be stolen or viewed by those who are not authorized to see it.

🞂 Whenever user data is let out of their own datacenter, risk trouble occurs from a

security point of view.


🞂 If user store data on the cloud, make sure user encrypts data and secures data transit

with technologies like SSL.

You might also like