Visvesvaraya Technological University Belgaum: A Seminar Report On Cloud Computing
Visvesvaraya Technological University Belgaum: A Seminar Report On Cloud Computing
BELGAUM
A seminar report on
CLOUD COMPUTING
Submitted by
Priyanka R. Nayak
2SD06CS069
8th semester
CERTIFICATE
Certified that the seminar work entitled “CLOUD COMPUTING” is a bonafide work presented by
Priyanka R. Nayak bearing USN 2SD06CS069 in a partial fulfillment for the award of degree of
Bachelor of Engineering in Computer Science Engineering of the Vishveshwaraiah Technological
University, Belgaum during the year 2009-10. The seminar report has been approved as it satisfies
the academic requirements with respect to seminar work presented for the Bachelor of
Engineering Degree.
1 Introduction 4
2 Concepts 5
2.1 Cyber infrastructure
2.2 Service-Oriented Architecture
3 Cloud Architecture 7
3.1 Cloud Types
4 Component 9
4.1 Virtualization
4.2 Users
5 Working 10
7 Conclusion
12
8 References 13
Though many cloud computing architectures and deployments are powered by grids, based on
autonomic characteristics and consumed on the basis of utilities billing, the concept of a cloud is
fairly distinct and complementary to the concepts of grid, SaaS, Utility Computing etc. In theory,
cloud computing promises availability of all required hardware, software, platform, applications,
infrastructure and storage with an ownership of just an internet connection.
people can access the information that they need from any device with an Internet connection—
including mobile and handheld phones—rather than being chained to the desktop. It also means
lower costs, since there is no need to install software or hardware.‖
Cloud computing used to posting and sharing photos on orkut, instant messaging with friends
maintaining and upgrading business technology
Today, almost any business or major activity uses, or relies in some form, on IT and IT services.
These services need to be enabling and appliance-like, and there must be an economy of- scale
for the total-cost-of-ownership to be better than it would be without cyber infrastructure.
Technology needs to improve end-user productivity and reduce Technology-driven overhead
This closely resembles the Unix philosophy of having multiple programs doing one thing well
and working together over universal interfaces. Complexity is controlled and the resulting
systems are more manageable than their monolithic counterparts.
Cloud architecture extends to the client, where web browsers and/or software applications access
cloud applications. Cloud storage architecture is loosely coupled, where metadata operations are
centralized enabling the data nodes to scale into the hundreds, each independently delivering data
to applications or users
Hybrid cloud:
Hybrid clouds combine both public and private cloud models. This is most often seen with the
use of storage clouds to support Web 2.0 applications.
Private cloud:
Private clouds are built for the exclusive use of one client, providing the utmost
control over data, security, and quality of service (Figure 4). The company owns the
infrastructure and has control over how applications are deployed on it. Private clouds can be
built and managed by a company’s own IT organization or by a cloud provider
.
Cloud computing products and services can be classified into 4 major categories:
They are
1. Application as service ( AaaS)
2. Platform as a Service (PaaS)
3. Infrastructure as a service (IaaS)
4. Software as a Service (SaaS)
1. Application as s service (AaaS): These are the first kind of cloud computing services that
came into being. Under this, a service is made available to an end-user. The end-user is asked to
create an account with the service provider and start using the application. One of first famous
application was web-based email service by hotmail started in 1996. Scores of such services are
available now on the web.
2. Platform as a Service (PaaS): Cloud vendors are companies that offer cloud computing
services and products. One of the services that they provide is called PaaS. Under this a
computing platform such as operating system is provided to a customer or end user on a monthly
rental basis. Some of the major cloud computing vendor are Amazon, Microsoft, Google etc
3. Infrastructure as a service: The cloud computing vendors offer infrastructure as a service. One
may avail hardware services such as processors, memory, networks etc on agreed basis for
specific duration and price.
4. Software as a service (SaaS): Software package such as CRM or CAD/CAM can be accessed
under cloud computing scheme. Here a customer upon registration is allowed to use software
accessible through net and use it for his or his business process. The related data and work may
be stored on local machines or with the service providers. SaaS services may be available on
rental basis or on per use basis.
The key to a SOA framework that supports workflows is componentization of its services, an
ability to support a range of couplings among workflow building blocks, fault-tolerance in its
data- and process-aware service-based delivery, and an ability to audit processes, data and
results, i.e., collect and use provenance information. Component-based approach is characterized
by reusability (elements can be re-used in other workflows), substitutability (alternative
implementations are easy to insert, very precisely specified interfaces are available, run-time
component replacement mechanisms exist, there is ability to verify and validate
substitutions, etc), extensibility and scalability (ability to readily extend system component pool
and to scale it, increase capabilities of individual components, have an extensible and scalable
architecture that can automatically discover new functionalities and resources,
etc),customizability (ability to customize generic features to the needs of a particular scientific
domain and problem), and composability (easy construction of more complex functional
solutions using basic components, reasoning about such compositions, etc.). There are other
characteristics that also are very important. Those include reliability and availability of the
components and services, the cost of the services, security, total cost of ownership, economy of
scale, and so on.In the context of cloud computing we distinguish many categories of
components. From differentiated and undifferentiated hardware, to general-purpose and
specialized software and applications, to real and virtual ―images‖, to environments, to no-root
Differentiated resources, to workflow-based environments and collections of services, and soon.
4.1 Virtualization
Virtualization is another very useful concept. It allows abstraction and isolation of lower-level
functionalities and underlying hardware. This enables portability of higher-level functions and
sharing and/or aggregation of the physical resources. The virtualization concept has been around
in some form since 1960s (e.g., in IBM mainframe systems). Since then, the concept has matured
considerably and it has been applied to all aspects of computing – memory, storage, processors,
software, networks, as well as services that IT offers. It is the combination of the growing needs
and the recent advances in the IT architectures and solutions that is now
bringing the virtualization to the true commodity level. Virtualization, through its economy of
scale, and its ability to offer very advanced and complex IT services at a reasonable cost, is
poised to become, along with wireless and highly distributed and pervasive computing devices,
such as sensors and personal cell-based access devices, the driving technology behind the next
waive in IT growth .Not surprisingly there are dozens of virtualization products, and a number of
small and large companies that make them. Some examples in the operating systems and
software applications space are VMware1, Xen - an open source Linux-based product developed
4.2 Users
The most important Cloud entity, and the principal quality driver and constraining influence is,
of course, the user. The value of a solutions depends very much on the view it has of its end-
user requirements and user categories.
There four broad sets of nonexclusive user categories:
System or Cyber infrastructure (CI) developers, developers (authors) of different component
services and underlying applications, technology and domain personnel that integrates basic
services into composite services and their orchestrations (workflows) and delivers those to end-
users, and finally users of simple and composite services. User categories also include domain
specific groups, and indirect users such as stakeholders, policy makers, and so on. Functional and
usability requirements derive, in most part, directly from the user profiles.
Demerits:
Stored data might not be secure: With cloud computing, all our data is stored on the cloud. The
unauthorized users gain access to our confidential data.
Dependent on internet connection:Internet connectivity isn’t completely stable and reliable.
It’s not platform agnostic:Most clouds force participants to rely on a single platform or host only
one type of product.
Can be slow:Even on a fast connection,web based application scan sometimes be slower than
accessing a similar software program on our desktop PC
Magazines:
Websites:
www.ibm.com/developerworks/websphere/zones/hipods/library.html\
http://communication.howstuffworks.com/cloud-computing2.html
www.thbs.com
http://www.wikipedia.org/