Unit 5 Cloud Computing Overview RKS
Unit 5 Cloud Computing Overview RKS
Abstract
Resource sharing in a pure plug and play model that dramatically
simplifies infrastructure planning is the promise of „cloud computing‟.
The two key advantages of this model are ease- of-use and cost-
effectiveness. Though there remain questions on aspects such as security
and vendor lock-in, the benefits this model offers are many.
• Realities and risks of the model
• Components in the model Characteristics and Usage of the model
An Overview
Cloud Providers offer services that can be grouped into three categories.
It is often useful to define and describe the different types of cloud services
deployment methods:
Public Cloud
Public clouds are owned and operated by third parties; they deliver superior
economies of scale to customers, as the infrastructure costs are spread among a mix
of users, giving each individual client an attractive low-cost, “Pay-as-you-go”
model. All customers share the same infrastructure pool with limited
configuration, security protections, and availability variances. These are managed
and supported by the cloud provider. One of the advantages of a Public cloud is
that they may be larger than an enterprises cloud, thus providing the ability to scale
Hybrid Clouds combine both public and private cloud models. With a Hybrid
Cloud, service providers can utilize 3rd party Cloud Providers in a full or partial
manner thus increasing theflexibility of computing. The Hybrid cloud environment
is capable of providing on-demand, externally provisioned scale. The ability to
augment a private cloud with the resources of a public cloud can be used to
manage any unexpected surges in workload.
Let’s have a look into Cloud Computing and see what Cloud Computing is made of.
Cloud computing comprises of two components front end and back end. Front end
Cloud Computing Page 5 of 6
consist client part of cloud computing system. It comprise of interfaces and
applications that are required to access the Cloud Computing or Cloud
Programming platform.
Cloud computing distributes the file system that spreads over multiple hard disks
and machines. Data is never stored in one place only and in case one unit fails the
other will take over automatically. The user disk space is allocated on the distributed
file system, while another important component is algorithm for resource allocation.
Cloud computing is a strong distributed environment and it heavily depends upon
strong algorithm.
1. Reduced Cost
2. Increased Storage
3. Flexibility
Despite its growing influence, concerns regarding cloud computing still remain. In
our opinion, the benefits outweigh the drawbacks and the model is worth
exploring. Some common challenges are:
1. Data Protection
All business applications have Service level agreements that are stringently
followed. Operational teams play a key role in management of service level
3. Management Capabilities
Despite there being multiple cloud providers, the management of platform
and infrastructure is still in its infancy. Features like „Auto-scaling‟ for
example, are a crucial requirement for many enterprises. There is huge
potential to improve on the scalability and load balancing features provided
today.
The concept of Virtualization in cloud computing increases the use of virtual machines.
A virtual machine is a software computer or software program that not only works as a
physical computer but can also function as a physical machine and perform tasks such
as running applications or programs as per the user's demand.
Types of Virtualization
i. Hardware virtualization
ii. Server virtualization
iii. Storage virtualization
iv. Operating system virtualization
v. Data Virtualization
Service Provider and Service consumer are the two major roles within SOA.
Grid Computing
Utility Computing
Large organizations such as Google and Amazon established their own utility services
for computing storage and application.
The most widely used cloud computing applications are given below -
1. Art Applications
Cloud computing offers various art applications for quickly and easily design attractive
cards, booklets, and images. Some most commonly used cloud art applications are
given below:
i Moo.
ii. Vistaprint
iii. Adobe Creative Cloud
2. Business Applications
Business applications are based on cloud service providers. Today, every organization
requires the cloud business application to grow their business. It also ensures that
business applications are 24*7 available to users.
There are the following business applications of cloud computing -
i. MailChimp
MailChimp is an email publishing platform which provides various options to design,
send, and save templates for emails.
iii. Salesforce
Salesforce platform provides tools for sales, service, marketing, e-commerce, and more.
It also provides a cloud development platform.
iv. Chatter
Chatter helps us to share important information about the organization in real time.
v. Bitrix24
Bitrix24 is a collaboration platform which provides communication, management, and
social collaboration tools.
4. Education Applications
Cloud computing in the education sector becomes very popular. It offers various online
distance learning platforms and student information portals to the students. The
advantage of using cloud in the field of education is that it offers strong virtual
classroom environments, Ease of accessibility, secure data storage, scalability, greater
reach for the students, and minimal hardware requirements for the applications.
5. Entertainment Applications
Entertainment industries use a multi-cloud strategy to interact with the target audience.
Cloud computing offers various entertainment applications such as online games and
video conferencing.
6. Management Applications
Cloud computing offers various cloud management tools which help admins to manage
all types of cloud activities, such as resource deployment, data integration, and disaster
recovery. These management tools also provide administrative control over the
platforms, applications, and infrastructure.
Some important management applications are -
i. Toggl
Toggl helps users to track allocated time period for a particular project.
ii. Evernote
Evernote allows you to sync and save your recorded notes, typed notes, and other notes
in one convenient place. It is available for both free as well as a paid version.
It uses platforms like Windows, macOS, Android, iOS, Browser, and Unix.
iii. GoToMeeting
7. Social Applications
Social cloud applications allow a large number of users to connect with each other using
social networking applications such as Facebook, Twitter, Linkedln, etc.
AWS SERVICES
There are over 200 fully-featured services within the Amazon Web Services (AWS)
ecosystem. AWS Elastic Compute Cloud (EC2), Elastic Container Service (ECS),
Amazon Lambda, and AWS Simple Storage Service (Amazon S3) are some of the most
critical services you should become familiar with.
The benefits they provide may seem to overlap sometimes. But each service has unique
capabilities that you may want to use in some cases and not so much in others.
EC2
o EC2 stands for Amazon Elastic Compute Cloud.
o Amazon EC2 is a web service that provides resizable compute capacity in the
cloud.
o Amazon EC2 reduces the time required to obtain and boot new user instances to
minutes rather than in older days, if you need a server then you had to put a
purchase order, and cabling is done to get a new server which is a very time-
consuming process. Now, Amazon has provided an EC2 which is a virtual
machine in the cloud that completely changes the industry.
o You can scale the compute capacity up and down as per the computing
requirement changes.
o Amazon EC2 changes the economics of computing by allowing you to pay only
for the resources that you actually use. Rather than you previously buy physical
servers, you would look for a server that has more CPU capacity, RAM capacity
and you buy a server over 5 year term, so you have to plan for 5 years in advance.
People spend a lot of capital in such investments. EC2 allows you to pay for the
capacity that you actually use.
What is Lambda?
o Lambda is used to encapsulate Data centres, Hardware, Assembly code/Protocols,
high-level languages, operating systems, AWS APIs.
o Lambda is a compute service where you can upload your code and create the
Lambda function.
o Lambda takes care of provisioning and managing the servers used to run the
code.
o While using Lambda, you don't have to worry about scaling, patching, operating
systems, etc.
o It can be used as an event-driven compute service where AWS Lambda runs your
code in response to events. These events could be changes to data in an Amazon
S3 bucket or an Amazon DynamoDB table.
o It can be used as a compute service to run your code in response to HTTP
requests using Amazon API calls made using AWS SDKs.
What is IAM?
o IAM stands for Identity Access Management.
o IAM allows you to manage users and their level of access to the aws console.
o It is used to set users, permissions and roles. It allows you to grant access to the
different parts of the aws platform.
o AWS Identity and Access Management is a web service that enables Amazon
Web Services (AWS) customers to manage users and user permissions in AWS.
o With IAM, Organizations can centrally manage users, security credentials such as
access keys, and permissions that control which AWS resources users can access.
o Without IAM, Organizations with multiple users must either create multiple user
accounts, each with its own billing and subscriptions to AWS products or share
an account with a single security credential. Without IAM, you also don't have
control about the tasks that the users can do.
Cloud Computing Page 14 of
6
o IAM enables the organization to create multiple users, each with its own security
credentials, controlled and billed to a single aws account. IAM allows the user to
do only what they need to do as a part of the user's job.
Features of IAM
o Centralised control of your AWS account: You can control creation, rotation,
and cancellation of each user's security credentials. You can also control what
data in the aws system users can access and how they can access.
o Shared Access to your AWS account: Users can share the resources for the
collaborative projects.
o Granular permissions: It is used to set a permission that user can use a
particular service but not other services.
o Identity Federation: An Identity Federation means that we can use Facebook,
Active Directory, LinkedIn, etc with IAM. Users can log in to the AWS Console
with same username and password as we log in with the Active Directory,
Facebook, etc.
o Multifactor Authentication: An AWS provides multifactor authentication as we
need to enter the username, password, and security check code to log in to the
AWS Management Console.
o Permissions based on Organizational groups: Users can be restricted to the
AWS access based on their job duties, for example, admin, developer, etc.
o Networking controls: IAM also ensures that the users can access the AWS
resources within the organization's corporate network.
o Provide temporary access for users/devices and services where necessary: If
you are using a mobile app and storing the data in AWS account, you can do this
only when you are using temporary access.
o Integrates with many different aws services: IAM is integrated with many
different aws services.
o Supports PCI DSS Compliance: PCI DSS (Payment Card Industry Data
Security Standard) is a compliance framework. If you are taking credit card
information, then you need to pay for compliance with the framework.
What is S3?
o S3 is a safe place to store the files.
o It is Object-based storage, i.e., you can store the images, word files, pdf files, etc.
o The files which are stored in S3 can be from 0 Bytes to 5 TB.
o It has unlimited storage means that you can store the data as much you want.
o Files are stored in Bucket. A bucket is like a folder available in S3 that stores the
files.
o S3 is a universal namespace, i.e., the names must be unique globally. Bucket
contains a DNS address. Therefore, the bucket must contain a unique name to
generate a unique DNS address.
o If you create a bucket, URL look like:
o
o If you upload a file to S3 bucket, then you will receive an HTTP 200 code means
that the uploading of a file is successful.
Advantages of Amazon S3
o Create Buckets: Firstly, we create a bucket and provide a name to the bucket.
Buckets are the containers in S3 that stores the data. Buckets must have a unique
name to generate a unique DNS address.
o Storing data in buckets: Bucket can be used to store an infinite amount of data.
You can upload the files as much you want into an Amazon S3 bucket, i.e., there
is no maximum limit to store the files. Each object can contain upto 5 TB of data.
What is VPC
o VPC stands for Virtual Private Cloud.
o Amazon Virtual Private Cloud (Amazon VPC) provides a logically isolated area
of the AWS cloud where you can launch AWS resources in a virtual network that
you define.
o You have complete control over your virtual networking environment, including
a selection of your IP address range, the creation of subnets, and configuration of
route tables and network gateways.
o You can easily customize the network configuration for your Amazon Virtual
Private Cloud. For example, you can create a public-facing subnet for web
servers that can access to the internet and can also place your backend system
such as databases or application servers to a private-facing subnet.
o You can provide multiple layers of security, including security groups and
network access control lists, to help control access to Amazon EC2 instances in
each subnet.
AMS features
AWS Managed Services (AMS) offers the following features for supported AWS
services: