Unit-1: Availability
Unit-1: Availability
The cloud computing revaluation is hiding full gear. It is feared by CIO’s small to
medium size companies. Cloud strategies are being implemented at unbelievable rates.
Cost saving is not only the reason businesses or emphasizing the cloud.
Availability:-
Less maintenance:-
Expert service:-
High
availability Less
development
Environment
time
Shared a at friendly
resource
development High
Pay as you
go modern
Benefitstime productivity
Easy to
Increased
manage
mobility
Less (or) no Dynamic
CAPEX scaling
s
Evaluation and history of cloud computing?
Client/ server computing:-In the earlier days of computing that is from 1980 are so everything
operated on the client/server model. All the software applications, all the data and all the control
resided on huge mainframe computers are otherwise known as servers.
application
computer n/ws
Storage(database)
servers
Grid computing Utility computing
The server part is the system also created a huge bottle like. All
communication between computers had to go through the server
first. However, in efficient that might be.
The obvious need to connect one computer to another without first
hiding the server let to the development of peer to peer.
Peer to peer computing defines the network architecture. In which
each computer has equivalent capabilities and responsibilities.
Peer to peer was an equalizing concept in the peer to peer
environment every computer is a client and server. There are no
masters and sleeves.
Peer to peer was also a decentralizing concept. In which control is
decentralizing with all computers functioning as equals. Content is
also dispose among the various peer computers.
Perhaps the most notable implementation of peer to peer
computing is the internet. The various ARPA net sides and there
were not many of them where connected together not as clients
and servers but as sequence.
One of the important subs tics of the peer to peer model is that of
distributed computing. Where ideal PC’s are across the network or
across the internet were taped to provide computing for large
processor intensive projects. It is a simple concept is about cycle
sharing between multiple computers.
When a computer is enlisted for distributed computing project
software is installed a machine to run various processing during dose
period when the PC’s typically.
Distributer computing dates back to 1970s. When multiple
computers when network together.
A more practical application is distributed computing operated in
1988. When researches at the DEC (digital equipment
corporation)system research centre development software that
distributed the work to factor large number of on workstation with in
their laboratory.
By 1990 a group of about 100 users utilizing the software had
faceted a 100 digit number.
By 1995 this same effect had been expanded to the web to factor a
130 digit number.
CAPAX VS OPEX
SLA
Infinite
Technology
Automatic usage monitoring hosting
Jobs/Tasks
7 step models
Integration and Interoperability
Migrating is an application to the cloud computing it is not an easy task. It is important strictly
adhere to the 7 step model to ensure that the process is robust and error free.
1. Infinites:-
It denotes computer, storage, and bandwidth.
2. Automatic usage:-
Which monitors the usage and read direct
them.
3. Job tasks:-
Virtualized and transparently movable.
4. Integration and interoperability:-
It supports for hybrid operations.
5. Transparency:-
It denotes are IT features.
OPTMIZ ISOLAT
E E
TEST
MAP
RE-
AUGMEN
ARCHITECT
T
Assess:-
Isolate:-
Map:-
Re-architect:-
Argument:-
Test:-
Optimize:-
Virtualization:-
VM VM VM
OS OS OS
app app app
pp
HYPERVISOR
HARD WARE
1. Virtualization can be applied very broadly to just about everything you can imagine
including memory networks, storage, hardware, operating system, and applications.
2. Virtualization has 3 characteristics that make it ideal for cloud computing.
I. Partitioning:-
In virtualization we can use partitioning to support many applications and
operating systems in physical systems.
II. Isolation:-
Because each virtual machine is isolation each machine is
protected from crashes and viruses in the other machines.
What makes virtualization so important for the cloud is that it
decoupled the software from the hardware.
III. Encapsulation:-
It can protect each application so that it does not interfere with other
applications. Using encapsulation a virtual machine can be represented and even stored
as a single file making it easy to identify and present to other applications.
Some examples:-
Virtual memory:-
Disks have a lot more space VAN memory. PICs
can use virtual memory to barrow extra memory from the hard
disk. Although, virtual disks are slower than real memory. It
managed drive the substation surprisingly well.
Software:-
There is virtualization software
available that can emulate an entire computer.
Which means one computer can perform as
though it were actually 20 computers.
Using this kind of software you might be able
to moves from a data’s centre with 1000 of
servers to one that support as few as the
couple of 100.
Types of virtualization:-
Infrastructure software
Desktop virtualization:-
Software virtualization:-
It has 2 categories
Infrastructure virtualization:-
It has 2 categories
1. Network virtualization
2. Storage virtualization
1. Network virtualization:-
Integrate network hardware resources with software resources to
provide users with virtualization technology of virtual network connection. It can be
dividing in to V-LAN and VPN.
2. Storage virtualization:-
Server virtualization:-
VM:-
A Complete Computer System with full functions of hardware system through software
simulation and runs in an absolutely isolated environment.
VM-WARE:-
It offers VM-ware server a free entry level hosted virtualization product for
Linux and windows servers.
Virtualization and VM-ware has become main stream in the post year and
many customers have display thousands of VM-ware server environments
across their enterprise.
VM-ware server makes it easy and compiling for companies new to
virtualization to take the first step to word enterprise wide virtual
infrastructure.
Features of VM-ware:-
VM-ware support the successor to VM-ware GSX server enable users to quickly
profession new server capacity by partitioning a physical server in to multiple virtual machines
bringing the powerful benefits of virtualization to every server.
Infrastructure:-
*It is the feature of VM-ware virtual centre enables companies to get started
with server consolidation in a step by step tutorial fashion.
Product:-
1. VM-ware ESX3I:-
*It is provide single server partitioning is deliver embedded as VM-
ware is system or as the standalone purchase for hard drive insulation.
2. VM-ware infrastructure 3 foundation:-
LIMITATIONS:-
For web hosting cloud computing is to that they is a term come across to many benefits of cloud
computing. There are some limitations and weakness of cloud computing. They are:-
vi)Integration:-Integrating internal applications with those on cloud can be complex and it some
cases not biable.
vii) Generic:-Public cloud offers in are very generic on offer multitenency service which all
organization not be comfortable with implementing in cloud is more complex to implement and
are bride. Some on the internal resources if the organization is not large enough.
UNIT-II
CLOUD ARCHITECTURE
Client
Interface Layer
Your Application
Application Layer
(Manage the Cloud Infrastructure)
Database Layer
Controller
Infrastructure As A Service:
The IAAS is delivery modal that provided infrastructure centric resources like
storage servers, networks and desktop, to be accessed by the cloud customer through services
base interface with internet measured cost for the utilize resources.
The virtualized resources of the IAAS is not free configured on the cloud customer
can get they are resource on demand which is dynamically provision with the shad cool of
configured virtual infrastructure resources as shown in the figure.
The cloud user can rest for the require infrastructure resources and can deploy and run its own
application on the receive virtual computing resource from the cloud providing IAAS it consist
of following service.
SAAS-Storage As A Service
CAAS-Compute As A Service
NAAS-Network As A Service
DAAS-Desktop As A Service
COAAS-Communication As A Service
There are various company providing IAAS
*Amazon Ec2 for computing
*Amazon S3 for storage
*Go-Grid
*Flexi scale
*Aneka
*Rack space
*Joint cloud
*IBM Blue for computing
*Nirvanix for cloud storage
*Mosso for Network
Platform As A Service:
When the cloud users need to develop their own application and their want to execute that
application in the third party cloud service provide platform then they can go for using PAAS.
When the cloud customers are not able to by the original license software package
platform along with their complier they are use pass and they can rent an application platform.
The PAAS has they are operating system and application library packages and users need
only to deployed and run their application without involving in the management control.
The third party cloud provides will
take care of the application packages
software along hardware and software
resources.
The cloud customer will develop
application on the virtualized cloud
platform with required platform
programming software package supported
by the cloud provide and they deploy and
run the application on the third cloud
platform and the user don’t need to
manage the application and it software
package and the application testing will
also be carried out but the cloud platform.
The PAAS provide service
oriented architecture to the cloud users
and improve the application productivity
the cloud users need not maintain the
space application, development and
testing environment platform.
The PAAS reduces, the cost of
initial software licensing, package their by reducing the operation cost of the reducing the
operation cost of the cloud customer.
Software As A Service:
When the cloud user are not able to by the software they can go for using SAAS cloud
provider and they can rent the software for the required period .
The single virtual software application package is serviced to multiple customers and
application management is control by the cloud provided.
The cloud users need not want to install any packages or servers for using the software
provided by the cloud service provider and the users are only charged for the time they have
used by the application based on the service level agreement.
Companies Providing SAAS:
Google docs for Microsoft word document.
Microsoft share point for PowerPoint design software application.
Sales force for CRM software application.
Google calendar for calendar application zoho planner for creating do list application.
Google spreadsheet’s for web based Excel sheet workbook application.
Remember the milk for spreadsheet application.
TATA list for Excel application.
My events for managing holiday card for list application.
High raised for managing the holiday card for list applications.
Base camp for project management applications.
The SAAS make the cloud customers to save then amount spending buying cost
development and maintenance of the software along with license and infrastructure cost.
Cloud Deployment
Model:
Virtualized cloud platform are on their top of distributed data center.
Cloud managers’ large number of virtualized resources and its rapidly professional
by contifigurable fool of resources which are dynamically provided to cloud customer.
Cloud computing deliver large number of services to cloud users threw dynamic
resources professioning.
It also provides high threw put computing where the virtualized data center
the cloud provide cloud service to the cloud users at any time threw internet and avoids high
data transfer there by providing affective resource utilization flexibility, scalability and
availability.
On demand
professioning of
hardware and software
done threw virtualized
data center platform
cloud computing is the
emerging technology.
That provide
application hardware
and software database
and other resources are
provide as a service to
cloud users over the
internet.
Cloud consist of a
virtualization,
virtualized hardware,
software, network,
service, storage and other resources are compine to a form a virtualized data center and deliver
that computing as a service demand over the internet.
The Various Cloud Deployment Modal:
1. Public Cloud
2. Private Cloud
3. Hybrid Cloud
4. Community Cloud
Public Cloud:
Public cloud is the provision of dynamically scalable
Virtual resources over the internet.
Public cloud is accessible threw internet by any time has paid for the receiving service.
Public cloud is build in owned by third party service provides. On the services are
provided to the customer in worldwide
Some services of public cloud are providing a free service for free of cost to the customer.
All the service management activities like managing Security
Deployment, Packup, Reliabilability, Reallocation, Abstract, and Durability. and Isolation are
taken care by the third party service provides of public cloud.
The public cloud provide all the
services like Intrastructure,Software and
Application as service to the customer
and the companies providing public
cloud service are,
*Google
* Amazon
*Rock Space
*Go Grid
*Microsoft and VMware
Private Cloud:
It is developed by the organization for their personal use and is not access by the public
customer.
It can be deploy by the administrator of the organization by their unused resource of the
network. The access of the private cloud is restricted for their client and employee and its
overview.
The private cloud is process on side servers and it also supports on demand access provisioning
and dynamic resource provisioning.
The Security of the private cloud is more effective with high availability the usage of private
cloud is having high privacy and it s own by the organization and the private cloud is accessed
by authorized user with their internet facility.
Hybrid Cloud:
The Hybrid cloud is combination of public and private cloud. In general business
organization resides the business real time critical services and information under their
private cloud control and non critical business application are outsource to the public
cloud which makes hybrid cloud intracture as shown in the figure
The organization which deals with both sensitive and non sensitive data can go for
build in hybrid cloud platform infrastructure.
The sensitive information of the organization can be kept inside the private cloud
infrastructure.
The non sensitive information of the organization can be outsourcing to the public
cloud infrastructure.
The hybrid cloud uses both public and private cloud contain use assay by
servicing both critical and non by critical business services in parallel.
The security maintenance and control of the private cloud is taken care by the
organization and the outsource business service are taken care and controlled by the
taken care and controlled by the third party service provides.
Community Cloud:
It is created and controlled by the group of organization who have shared same
internet and they are all having same security policies.
The users of the community can access the network and share their resources outline threw
interest access the community cloud is same as that of public cloud but the access to the
community cloud is restrict the only belonging to the community.
The community cloud cannot be access by the unauthorized user who has not
registered to the community group of organization.
The community cloud is jointly owned and administrator by the community group is by third
party cloud service provider with restricted access only by the registered community.
Advantage of Cloud Computing:
1. Less expensive system for user
2. Number software instating
3. Low infrastructure cost
4. Low software cost
5. High performance
6. Less maintenance cost
7. Readymade software updates
8. High computing power
9. Unlimited storage
10. High data safety
11. High compatibility between operating system
12. Compatitaility document for word
13. Universal access to files
14. Group collaboration
15. Latest version application
16. User centric
17. High intelligent
UNIT-3
FEDERATION IN CLOUD:
FEDERATION:
The combination of disparate things.so that they can act as one.As in federate states data or
identy managment and making sure and all the right rools applied.
CLOUD FEDERATION:
2) The federation of cloud resources is facilliated through network gate ways that connect
public or externel clouds like private or internel clouds owned by a single entity and/or
community clouds owned by several co-oberating entities.
1) The federation of cloud resources allows client to optimize enterprise IT service delivery.
2) The federation of cloud resources allows a client to choose.The best cloud service
providers in terms of flexibility cost and availability of services to neat a particular business or
technological need within their organization.
3) Federation across different cloud resources pools allows applications to run in the most
appropriate infrastructure environments.
4) The federation of cloud resources allows an enterprise to distribute workload around the
globe and move data between desparate networks and implement inuvative security models for
user acess to cloud resources.
1) One weekness that exist in the federation of cloud resources is the difficulty in progarring
connectivity between a client and a given externel cloud provider as they each possess their own
unique network adressing scheme.
2) To resolve this issue cloud providers must grant clients the permission to specify an
adressing scheme for each server the cloud provider has externel to the internet.
3) This provides customers to with the ability to the access cloud services without the need
for reconfiguration when using resources from different service providers.
4) Cloud federation can also be implemented behind a firewall which providing clients with
the menu of cloud services provided by one or more trusted entities.
ability for to xmpp servers in different domains to excahange xml stanzas.According to the
XEP-0238 xmpp protocol flows for inter domain federation.There are four basic types of
federation:
1)Permissive
2)Verified
3)Encrpted
4)Trusted
Permissive Federation:
1) It occurs when
the server accepts a
connection from a
peer network servers
without verifying its
identy using DNS
look as are certificate
checking.
2) The lack of
verification are
authentication may
let to domain
schooling that is the
unauthorized use of
third party domain name in an e-mail messaage in order to pertent to be someone else.
with the relafese of the jaberd 1.2 servers which included support for the server dialware
protocol premissive federation mirt is device on the xmpp network.
Verified Federation:
1) This type of federation occurs from a peer has been verified it users information obtain
we are DNS and by means of domain specificas exchange before hand.
2) The connection is not encrypted and the use of identity verification effectively prevence
domains pooling make this works.
3) Fedreation requires proper DNS setup and that is still subjective DNS voisoning attacks.
4) Verified federation has been the default service policy on the open XMPP since the
release of the open source jaberd 1.2 server.
Encrypted Federation:
1) In this mode a server accepts a connection from a peer if an only if the peer supports
TLS(Transport Layer Security)as define for XMPP in RFS(Request For Comments)3920.
2) The peer must prevent a digital certificate the certificate may be selfsine but this prevence
using mutal authendication.If this is the case both parties procede to weekely verify identity
using server dial pair.
3) XEP0220 define the server dialup protocol which is used between XMPP servers to
provide identity verification servers dial pair uses the DNS of the basis for verifying identity the
basic approaach is that when a receiving server receives a server to server connection request
from an orginatting server although server dialpair does not provide strong authendication are
trusted federation and although it is subjective DNS voisoning attacks this results in an
encrypted connection with we identity verification.
Trusted Federation:
1) Hear a server accepts a connection from a peer under only the stipulation that the peer
supports TLS and the peer can present a digital certificate issued by a root certification
authority(CA) that is trusted by the authendicating server.
2) The list of trusted root CAAS may be detemine by one or more factors such as the
os,xmpp server or local service policy.
3) In trusted federation use of digital certificates results not only in channel encryption but
also in strong authendication.
4) The use of trusted domain certificate prevense DNS voisoning effectively attacks but
makes federation more difficult since such certificates have treditionally not being easy to
uptain.
Privacy in cloud:
2) The challenge in data privacy is to share data while protecting persinally Identifiaaple
Information(PII).The fields of data security and information security design and utilize
software,hardware and human resources to adress this issue.
3) PII as used in information security refers to information that can be used to uniqly
identifying single individual.
4) Privacy is used to business issue focussed an ensuring that personal data is protected
from unauthorized and inappropriate collection use and discloser ultimatting preventing the
trust lost of customer trust.
And Inaapropriate fraudcilent activity such as identify theft e-mail spaming and
phishning many countries have enappted loss to product individuals right to have their privacy
respected such as (PIPEDA)Personals Information Protection and Electronic Documents
Act.Which is result of the Poniment the Nimon,Insultute,Trustees of 2008.Which is now
changed as ziber world.
The Swis Federal Data Protect Act(SFDPA)Which was developed by swis federal data
protectional audience.
In United States individual right to privacy is also protected in business sector regularly
requirements such as HIPPA(Health Insurance Portability and accountability Act)
GLA(Grammelur Link)biley act and the FCC sit CPNI(Customer Property Network
Information) rools.
5) Contact Information.
6) Forms of Identification.
7) Demographic Information.
8) It occupational Information.
Any information store locally on a computer can be store in a cloud including e-mail word
processing documents,spreadsheets,videos,health records,tax or other financial information
business plans,power point presentation,accounting,information advertising compigns
sales,numbers,appoinment calenders address,books and mode.The location of information in the
cloud may have significant effects on the privacy and confidality prottection to information and
on the privacy obligations of those who process or store the information legal uncertanisites
make a difficult to assess the states of information in the cloud as well as the privacy and
confidentality prottections available to the users.
The Federal Trade Commision(FTC) is educatting consumers and businesses about the
importance of personal information privacy include the security of personal information under
the FTC act the commission guards against and unfarmous and deseption by enforcing
companies about how they collect use and secure consumers personal information.
1) Collection
2)Notice
3)Choice and cinsent
4)Use
5)Security
6)Access
7)Retention
8)Dispose
There has been a good deal of public discussion of the technical architecture of cloudcomputing
and the business models that good support it.That is
1) Responses to the privacy and confidently risks of cloud computing include better policy
and practices.
2) The cloud computing industry established cloud standards that would health users to
analyze the difference between cloud providers and practises to assets the risks that user face.
3) Users should pay more attention to the consequences of using a cloud provider and
espesially to the providers terms are services for those risks not addressable soling through
policies and practises changes in laws may be needed.
1) Clouds service providers are leveraging virtualization technologies combined with self
service capabilities for computing resources we are internet.In this service provider
environments virtual machines from multiple organizations have to be co-locatted on the same
physical server in order to maximize the efficiencies of virtualization.
2) Cloud service providers must learn from MSP(Managed Service Provider)model and
ensure that the customers applications and data are secure.If they hope you return their customer
base and competitiveness.More important this discussions focussed on why and how these
resources should be protected in SAAS,PAAS,IAAS
3) SAAS is model of software deployment in which an application is licensed for use as the
service provider to customers on demand.
4) PAAS is an outgrowth of the SAAS application delivery model with the PAAS model all
of the facility required to support the complete life cycle of building and delivering web
applications and services are available to developers.IT managers and endusers entirely from the
internet without software doenloads are initializtion.
The PAAS is also known as cloud where because it offers including work flow facilities
so are application,design,application development the string,deployment and hosting as well as
applications, services such as team collabration web service
integration,security,scalability,storage persistence state managment application
versioning,application instrumentation and developer community facilitiation.
PAAS:
ITAAS:
It is being proposed to take to bring the service model right to your IT infrastructure.Many
organizations are in the process of transforming their IT departments in to self sastaining cost
center operations.The transformation can take several years to be completed.Many large IT
organizaions have adapted the ITIL(Information Technology Infrastructure Library)
XAAS:
(Anything As A Service)
SAAS:
Cloud computing models of the futures will likely combined the use of SAAS utility computing
and web2.0 collabration technologies to leverage the internet to satisfies the customers needs.
The technology analyst and consentic form list 7 security issues one should discuss with the
cloud computing vendor.
Inquare about who has specialized access to data and about the hiering and management of such
administrators.
2)Regulartry Compilence:
Make sure that the vendor is willing to under go externel audits and or securrity certifications.
3)Data Location:
Does the provider allow for any control over the location of data.
4)Data Segregation:
Make sure that the encryption is available at all stages and that is encryption schemes where
design and tested by experinced professional.
5)Recovery:
Find out what will happen to data in the case of a disaster do they of a complete restoration.
6)Investigate Support:
Does the vendor have the ability to investigate any in appropriate are illegal activity.
What will happen to data if the companies goes out of business how will data be return and it
what format.
The base line security practises for the SAAS environment as currently formulatted as
following.
phase 1:-Investigation
Define Project Process and goals document then in the program security policy.
Phase 2:-Analysis:
Analysis existing security policies and programs analyse current threads and controls
examine legal issues and perform risk analyses.
Develop the security blue print plant insident responds to disaster and determine the
feasibility of continuing and are outsourcing the project.
Phase 5:-Implementation
By are develope security solution and the end of these phase present a tested package to
managment for approval.
Phase 6:-Maintenance
Constantly monitor , test , modify , update and repair to respond changing threads
In the secure software DLC application coders return in a consistence manner that can
easily audited and enhanced.
Core application services are provided in a common structured and repeatable manner and
frame work models are throughly tested for security issues before implementation and
continuosly retested for conformance through the software regrettion test cycle.
XMPP:
Xtensionable Messaging and presents Protocol. It is an XML based protocol used for real
Xtensionable instant messaging and presents information.
The technology is also enables collabration across many different presents.System such as
Ms office , communicatin server IBM AOL-AIM ,
Goole and yahoo.These are has through to support features voice-over-Ip and file transfer
signalling.
XMPP based serever and software is deployed on goole server across the internet.
The XMPP specification have been published as RFC 3920 and RFC 3921.Because a client
users http(Hyper textTransfer protocol). Most firewalls allows users to fetch and host messages
without network.
Anega:
2)It is designed to support rapid development and deployment of parallel and distributted
application or private or public clouds.
3)It can be deploy on a public cloud such as AMAZON EC2 accessable the internet to the
subscriber or a private cloud constitued by a set of notes with restricted assets.
4)Anega altness a work load distribution for accelariting application in both linux and
microsoft.net frame works.
Advantages:
5)Built top of the microsoft .net frame work with support for linux environments through
mono.
Anega offerings:
1) It offers three types of capabilities which are essential for building assaratting and
managing the clouds and their buildings applications.They are anega includes a which compains
API and tools to enable users to rapidly develop applications.
2)Anega also allows uses to built different run time environments such as enterprise or
private cloud by harnessing compute resources in network are enterprise data centers Amazon
Ec2 and hybrid clouds by company enterprise private cloud managed by anega from other
enetrprise cloud Amazon Ec2 built and manage using XEN server.
Accelaration:
Managing:
Management tools and capabilities supported by anega which include a GUI and API to
setup monitor , manage and maintain remove from global anega compute clouds.
Anega also has and accounts mechanism and managers priorities and scalability based on
SLA/QOS which enables dynamic professioning anega architecture.
ANEKA ARCHITECTURE:
i)This environment is built by aggregating together physical and virtual nodes host the aneka
containers.
ii)The interaction with hosting platform is mediated through the PQL(Platform Abstraction
Layer) Which hides in miss implementation all the heterogeneity of the different os.
i) Fabric Service
Fabric service:
It implemented the operation of the infrastructure of the cloud.These services include HIA and
fail over for involved readability node membership and directory resource professing
performence monitoring and hardware professing.
FOUNDATION SERVICE:
Foundation services constitude the core functionality of the aneka middle ware may provide a
basic set of capabilities that enhance application execution in the cloud.These services provide
added value to the infrastructure and/or of use to system administrators and developers within
this categories. we can list storage management resource reservation , reporting, accounting
building, services monitoring and licency.
APPLICATION SERVICES:
Application services deal directly with the execution of applications and/or in charge of
providing the appropriate run time environment for each application model.
The leverage foundation an fabric services for several tasks of application execution such as
elastic scalability data transfer and performance monitoring ,accounting and building at this
level aneka expresses its true potential in supporting different application models and
Cloud storage means the storage of data online in the cloud. Where in a
combines data is stored in and accessible from multiple distributed and connected
resources that comprise a cloud.
videos
Music
V
Share
----------
---------
Document
Cloud storage s
Pictures
Contacts
files
Cloud storage means the storage of data online in the cloud. Where in a combines
data is stored in and accessible from multiple distributed and connected resources
that comprise a cloud.
Storage devices:-
They are:-
Black Storage Devices offers raw storage to the clients. This raw storage is
partition to create volumes.
Advantages:-
1. There are many benefits to using cloud storage most
notable is file accessibility file storage in the cloud can
be access at any time from any place so long as you
have internet access.
2. Another benefit is that cloud storage provides
organization with off-side i.e.) remote backups of data.
Which reduces is cost associated with disaster
recovery.
Disadvantages:-
*Amazon simple storage service if provide the simple web services. Interface
that can be used stored and retrieve any amount of data at any time from any ware
on the web.
*S3 provides the object oriented storage service for user. User
can access their object through soap (simple object access protocol).
*Through the key value programming inter face user can write,
read and delete object containing from 1, 2, 5 of data.
Rest Interface
Soap Interface
Key feature of S3:-
*First 1GB per month input or output in free and then dollar of
$0.8 to dollar of $0.15 per GB for transfers outside and S3 regent.
Map reduces:-
Control flow
Map and
Reduce
In this framework the “value” part of the data” key, value” is the actual data and
the “key” part is only used by the map reduce to controller to control the data
flow.
Formal Definition:-
The map reduce software framework provides and
abstraction layer with the data flow and flow f control to users and hides the
implementation of all data flow stapes such as data partitioning, mapping,
synchronization, communication and scheduling. Therefore, the user over rides
the map and reduce functions first and then invokes the provided map reduce
function from the library to start the flow of data.
1. Data partitioning
2. Computation partitioning
3. Determine the master and workers
4. Reading the input data / data distribution
5. Map function.
6. Compiler function.
7. Partitioning function.
8. Synchronization.
9. Communication.
10.Sorting and grouping.
11.Reduce function.
Explain Hadoop?
HDFS:-
HDFS Architecture:-
HDFS Features:-
Block replication:-
Replica placement:-
HDFS Operation:-
The control flow of HDFS operation such as write and read can
properly highlight roles of the name node and data nodes. In the managing
operations in this section the control flow of the main operations of HDFS on files
in further describe to main interaction between the user name node and data node.
Reading a file:-
After the file block is streamed from the respective data node to
the user the establish connection is terminated and the same process is repeated
for all blocks of the requested file until the hole file is streamed to the user.
If the file does not exist. The name node notices the user and
allows starting writing data to the files by calling the writing function.
Various cloud computing platforms are available today. They are Sales
force. Com. This is the force. Com development platform this provides a simple
user interface and lets users log in built an app and push it in the cloud.
1. Appistry:-
2. Platform:-
This platform is very useful to create scalable and service oriented application.
3. App scale:-
The App scale is open source platform for Google app engines app.
4. ATNT:-
5. Engine yard:-
6. Anomaly:-
The Anomaly provides service is the IAAS platform.
7. Flexi scale:-
The Flexi scale offers a cloud computing platform that allows flexible,
scalable and automated cloud infrastructure.
8. G Cloud 3:-
9. GIZMOX:-
The GIZMOX visual web GUI platform is best suited for developing new
web applications and modernized the legacy of wave on Asp.net, d html etc.,
10. Go Grid:-
The Go Grid platform allows the users to deployed web and data base cloud
services.
11. Google:-
The Google’s app engine lets the users built, run and maintain. There
applications on Google’s infrastructure.
13. Microsoft:-
Unit- 5
Data centre or virtual to form virtual data centre as cloud provider to the user of
web their as follows:-
*Eucalyptus
*Open nebula
*Nimbus
*V-Sphere
With above mention first three are free open source software which as virtualized
data centre owning large number of services.
Eucalyptus:-
Open source software that provides IAAS cloud. The main feature of
software is supporting virtual network and its management does not support
virtual storage.
Instant manager
Group manager
Cloud manager
External
Eucalyptus cloud
User name
Password Management
platform
Sign in sign
up
CLC
Virtualized
network
walrus
CC
SC
NC
Virtualized
compute
Virtualized storage
Instant manager:-Instant manager takes care of execution controlling and
termination of the virtual machine.
Cloud manager:- Cloud manager is the entire control handler of the cloud
which managers the virtual resources and decision making.
Ex
Drivers
te
Virtualization Network Storage
rn
al
XEN Fixed NFS
IPS cl
KVM SCP
Range o
VM-
of IPS ………… u
ware
d
.E
c2
.E
Local-infrastructure
la O
st p
ic e
h n
u N
External
bs e
cloud
b
ul
The software available in open Nebula separately performs dynamic resources
a
professioning and advance resource preservation.
The public cloud interface of open Nebula is Amazon EC2
host machines.
Nimbus:-Nimbus is also an open source pre software package used for providing
virtual networks with Amazon EC2 public cloud interface with EC2 window
clients.
Service node
VMM
NODE
CloudVMM NODE Control
HTTP NIMBUS SSH
CIBXEN/KVM
client
Vm
DHCP Server
Service
Cloud node VMM
NODECon
client HTTP SSH trol
CIBXEN/K
VM
NIMBUS
DHCP Server
The virtual machine monitor of Nimbus is XEN and KVM the cluster are
virtualized with the deployment of virtual machine.
Data security
Virtual storage management and
Dynamic resource management
It has highly supports available, reliability, security, and scalability and fall
tolerance.
It produces 2 services:-
1. Availability
2. Security and
3. Scalability
The features of availability service are V-motion, storage motion,
availability, fall tolerance and data backup recovery.
The security package software of V-Sphere is V-shield and VM-safe
The scalability feature of V-Sphere are
o Dynamic resource scheduling.
o Resource professioning.
o Resource management.
o Resource pooling.
o Resource backup.
Infrastructure V-Sphere services:-
The 3 component package of infrastructure V-Sphere
services are as follows:-
1. V-Compute
2. V-Storage
3. V-Network
The VM-ware virtualization libraries like EXS, EXSI and DRS support V-
Compute.
The V-Storage is provided by thin professioning libraries of VM-ware.
The switching and networking functions are provided
by V-Network.