UNIT III - Cloud Computing-1
UNIT III - Cloud Computing-1
UNIT III - Cloud Computing-1
Explain the various Layered Cloud Architectural Development design for effective cloud
computing environment. (13)Nov/Dec 2020
"pay-per-use model for enabling available, convenient and on-demand network access to a
shared pool of configurable computing resources (e.g., networks, servers, storage,
applications and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction."
Architecture
1. Architecture consists of 3 tiers
a. Cloud Deployment Model
b. Cloud Service Model
c. Essential Characteristics of Cloud Computing .
Essential Characteristics 1
On-demand self-service.
A consumer can unilaterally provision computing capabilities such as server time and network
storage as needed automatically, without requiring human interaction with a service provider.
Essential Characteristics 2
Broad network access.
Capabilities are available over the network and accessed through standard mechanisms that
promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and
PDAs) as well as other traditional or cloudbased software services.
Essential Characteristics 3
Resource pooling.
The� provider’s� computing� resources� are� pooled� to� serve� multiple� consumers using a multi-
tenant model, with different physical and virtual resources dynamically assigned and
reassigned according to consumer demand.
Essential Characteristics 4
Rapid elasticity.
Capabilities can be rapidly and elastically provisioned - in some cases automatically - to quickly
scale out; and rapidly released to quickly scale in.
To the consumer, the capabilities available for provisioning often appear to be unlimited and
can be purchased in any quantity at any time.
Essential Characteristics 5
Measured service.
Cloud systems automatically control and optimize resource usage by leveraging a metering
capability at some level of abstraction appropriate to thetype of service.
Resource usage can be monitored, controlled, and reported - providing transparency for
both the provider and consumer of the service.
Cloud Consumer
The cloud consumer is the principal stakeholder for the cloud computing service.
A cloud consumer represents a person or organization that maintains a business
relationship with, and uses the service from a cloud provider.
The cloud consumer may be billed for the service provisioned, and needs to arrange
payments accordingly.
Example Services Available to a Cloud Consumer
The consumers of SaaS can be organizations that provide their members with
accessto software applications, end users or software application administrators.
SaaS consumers can be billed based on the number of end users, the time of use,
thenetwork bandwidth consumed, the amount of data stored or duration of stored
data.
Cloud consumers of PaaScan employ the tools and execution resources provided
by cloud providers to develop, test, deploy and manage the applications.
PaaS consumers can be application developers or application testers who run and
test applications in cloud-based environments,.
PaaS consumers can be billed according to, processing, database storage and
network resources consumed.
Consumers of IaaS have access to virtual computers, network-accessible storage
& network infrastructure components.
The consumers of IaaS can be system developers, system administrators and IT
managers.
IaaS consumers are billed according to the amount or duration of the resources
consumed, such as CPU hours used by virtual computers, volume and duration of
datastored.
Cloud Provider
A cloud provider is a person, an organization;
It is the entity responsible for making a service available to interested parties.
A Cloud Provider acquires and manages the computing infrastructure required
forproviding the services.
Runs the cloud software that provides the services.
Makes arrangement to deliver the cloud services to the Cloud Consumers through
networkaccess.
Public Cloud
Private Cloud
Hybrid Cloud
Community Cloud
Public cloud
Private Cloud
Cloud services are used by a single organization, which are not exposed to the public
Services are always maintained on a private network and the hardware and
softwareare dedicated only to single organization
Private cloud is physically located at
Organization’s premises [On-site private clouds] (or)
Outsourced(Given) to a third party[Outsource private Clouds]
It may be managed either by
Cloud Consumer organization (or)
By a third party
Private clouds are used by
government agencies
financial institutions
Mid size to large-size organisations.
On-site private clouds
Hybrid Cloud
Built with both public and private clouds
It is a heterogeneous cloud resulting from a private and public clouds.
Private cloud are used for
sensitive applications are kept inside the organization’s network
business-critical operations like financial reporting
Public Cloud are used when
Other services are kept outside the organization’s�network
high-volume of data
Lower-security needs such as web-based email(gmail,yahoomail etc)
The resources or services are temporarily leased for the time required and
then released. This practice is also known as cloud bursting.
Fig: Hybrid Cloud
Advantage
It is scalable
Offers better security
Flexible-Additional resources are availed in public cloud when needed
Cost-effectiveness—we have to pay for extra resources only when needed.
Control - Organisation can maintain a private infrastructure for sensitive application
Disadvantage
Infrastructure Dependency
Possibility of security breach(violate) through public cloud
IaaS providers
Amazon Elastic Compute Cloud (EC2)
◦ Each instance provides 1-20 processors, upto 16 GB RAM, 1.69TB storage
RackSpace Hosting
◦ Each instance provides 4 core CPU, upto 8 GB RAM, 480 GB storage
Joyent Cloud
◦ Each instance provides 8 CPUs, upto 32 GB RAM, 48 GB storage
Go Grid
◦ Each instance provides 1-6 processors, upto 15 GB RAM, 1.69TB storage
Summarize the benefits and drawbacks of using “Platform as a Service”(2) Nov/Dec 2020
PaaS provides all of the facilities required to support the complete life cycle of building,
delivering and deploying web applications and services entirely from the Internet.
Typically applications must be developed with a particular platform in mind
• Multi tenant environments
• Highly scalable multi tier architecture
1. The capability provided to the consumer is to deploy onto the
cloud infrastructure consumer created or acquired applications
created using programming languages and tools supported by
the provider.
2. The consumer does not manage or control the underlying cloud
infrastructure including network, servers, operating systems, or
storage.
Have control over the deployed applications and possibly application hosting
environment configurations.
Characteristics of PaaS
Runtime framework: Executes end-user code according to the policies set by the user
andthe provider.
Abstraction: PaaS helps to deploy(install) and manage applications on the cloud.
Automation: Automates the process of deploying applications to the
infrastructure,additional resources are provided when needed.
Cloud services: helps the developers to simplify the creation and delivery
cloudapplications.
PaaS providers
Google App Engine
◦ Python, Java, Eclipse
Microsoft Azure
◦ .Net, Visual Studio
Sales Force
◦ Apex, Web wizard
TIBCO,
VMware,
Zoho
Cloud Computing – Services
Software as a Service - SaaS
Platform as a Service - PaaS
Infrastructure as a Service - IaaS
Category Description Product Type Vendors
and
Products
PaaS-I Execution platform is Middleware + Force.com,
provided along with Long jump
hardware resources Infrastructure
(infrastructure)
PaaS -II Execution platform is Middleware + Google App
provided with additional Infrastructure, Engine
components Middleware
Data Lock-in
It is a situation in which a customer using service of a provider cannot be moved to
anotherservice provider because technologies used by a provider will be incompatible
with other providers.
This makes a customer dependent on a vendor for services and makes customer
unable touse service of another vendor.
Solution:
Have standardization (in technologies) among service providers so that
customers caneasily move from a service provider to another.
8. CLOUD STORAGE
Outline the key challenges associated in the process of storing images in cloud (2)
Nov/Dec 2021
Demonstrate the architectural design of compute and storage clouds. (2) Nov/Dec 2020
Storing your data on the storage of a cloud service provider rather than on a local
system.Data stored on the cloud are accessed through Internet.
Cloud Service Provider provides Storage as a Service
Storage as a Service
Third-party provider rents space on their storage to cloud users.
Customers move to cloud storage when they lack in budget for having their own storage.
Storage service providers takes the responsibility of taking current backup,
replication,and disaster recovery needs.
Small and medium-sized businesses can make use of Cloud Storage
Storage is rented from the provider using a
cost-per-gigabyte-stored (or)
cost-per-data-transferred
The�end�user�doesn’t�have�to�pay�for�infrastructure�(resources),�they�have�to�pay�
only forhow much they transfer and save on�the�provider’s storage.
Providers
Google Docs allows users to upload documents, spreadsheets, and
presentations toGoogle’s data servers.
Those files can then be edited using a Google application.
Web email providers like Gmail, Hotmail, and Yahoo! Mail, store email messages
ontheir own servers.
Users can access their email from computers and other devices connected to the Internet.
Flicker and Picasa host millions of digital photographs, Users can create their own
onlinephoto albums.
YouTube hosts millions of user-uploaded video files.
Hostmonster and GoDaddy store files and data for many client web sites.
Facebook and MySpace are social networking sites and allow members to post
picturesand other content. That content is stored�on�the�company’s servers.
MediaMax and Strongspace offer storage space for any kind of digital data.
i. Data Security
1. To secure data, most systems use a combination of techniques:
Encryption
Authentication
Authorization
Encryption
Algorithms are used to encode information. To decode the information keys are required.
Authentication processes
This requires a user to create a name and password.
Authorization practices
The client lists the people who are authorized to access information stored on the
cloudsystem.
If information stored on the cloud, the head of the IT department might have complete
andfree access to everything.
Reliability
Service Providers gives reliability for data through redundancy (maintaining
multiplecopies of data).
Reputation is important to cloud storage providers. If there is a perception that the
provider isunreliable, they�won’t�have many clients.
Advantages
Cloud storage providers balance server loads.
Move data among various datacenters, ensuring that information is stored close
andthereby available quickly to where it is used.
It allows to protect the data in case there’s�a disaster.
Some products are agent-based and the application automatically
transfersinformation to the cloud via FTP
Cautions
Don’t commit everything to the cloud, but use it for a few, noncritical purposes.
Large enterprises might have difficulty with vendors like Google or Amazon.
Forced to rewrite solutions for their applications.
Lack of portability.
Theft (Disadvantage)
User data could be stolen or viewed by those who are not authorized to see it.
Whenever user data is let out of their own datacenter, risk trouble occurs
from asecurity point of view.
If user store data on the cloud, make sure user encrypts data and secures data
transitwith technologies like SSL.
Design Requirements
Amazon built S3 to fulfill the following design requirements:
• Scalable Amazon S3 can scale in terms of storage, request rate, and users to support
anunlimited number of web-scale applications.
Reliable Store data durably, with 99.99 percent availability. Amazon says it does
notallow any downtime.
Design Principles
Amazon used the following principles of distributed system design to meet Amazon S3
requirements:
• Decentralization It uses fully decentralized techniques to remove scaling bottlenecks
and single points of failure.
• Autonomy The system is designed such that individual components can make decisions
based on local information.
• Local responsibility Each individual component is responsible for achieving its
consistency; this is never the burden of its peers.
• Controlled concurrency Operations are designed such that no or limited concurrency
control is required.
• Failure toleration The system considers the failure of components to be a normal
mode of operation and continues operation with no or minimal interruption.
• Controlled parallelism Abstractions used in the system are of such granularity that
parallelism can be used to improve performance and robustness of recovery or the
introduction of new nodes.
• Small, well-understood building blocks Do not try to provide a single service that
does everything for everyone, but instead build small components that can be used as
building blocks for other services.
• Symmetry Nodes in the system are identical in terms of functionality, and require no
or minimal node-specific configuration to function.
• Simplicity The system should be made as simple as possible, but no simpler.
How S3 Works
Amazon keeps its lips pretty tight about how S3 works, but according to Amazon,
S3’sdesign aims to provide scalability, high availability, and low latency at commodity
costs. S3stores arbitrary objects at up to 5GB in size, and each is accompanied by
up to 2KB ofmetadata. Objects are organized by buckets. Each bucket is owned by an
AWS account and the buckets are identified by a unique, user-assigned key.
Buckets and objects are created, listed, and retrieved using either a REST-style or
SOAP interface.
Objects can also be retrieved using the HTTP GET interface or via BitTorrent. An
access control list restricts who can access the data in each bucket. Bucket names and
keys are formulated so that they can be accessed using HTTP. Requests are authorized
using an access control list associated with each bucket and object, for instance:
http://s3.amazonaws.com/examplebucket/examplekey
http://examplebucket.s3.amazonaws.com/examplekey
The Amazon AWS Authentication tools allow the bucket owner to create an
authenticatedURL with a set amount of time that the URL will be valid.