0% found this document useful (0 votes)
4 views

Cloud Computing unit 1 24-25notes

Cloud computing utilizes a network of remote servers for data storage and management, offering benefits such as cost efficiency, scalability, and accessibility. It encompasses various service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid), while also presenting challenges like internet dependency and security concerns. The document outlines a seven-step cloud migration process, trends in cloud computing, and the components of cloud architecture, including major actors like cloud consumers, providers, carriers, auditors, and brokers.

Uploaded by

shreyatemp2702
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Cloud Computing unit 1 24-25notes

Cloud computing utilizes a network of remote servers for data storage and management, offering benefits such as cost efficiency, scalability, and accessibility. It encompasses various service models (IaaS, PaaS, SaaS) and deployment models (public, private, hybrid), while also presenting challenges like internet dependency and security concerns. The document outlines a seven-step cloud migration process, trends in cloud computing, and the components of cloud architecture, including major actors like cloud consumers, providers, carriers, auditors, and brokers.

Uploaded by

shreyatemp2702
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Cloud Computing

Cloud, in the context of cloud computing, refers to a network of remote servers hosted on the
internet to store, manage, and process data, rather than relying on a local server or personal computer.

The "cloud" is essentially a metaphor for the internet, representing the shift from local to online
computing.

Importance of Cloud Computing

Cost Efficiency - Reduces capital expenses; pay-as-you-go model.

Scalability and Flexibility - Adjust resources based on demand.

Accessibility - Access resources from anywhere, enabling remote work.

Business Continuity - Ensures data availability and disaster recovery.

Speed and Agility - Quick deployment of applications and services.

Enhanced Collaboration - Real-time teamwork and shared tools.

Security and Compliance - Advanced security features and compliance adherence.

Environmentally Friendly - Reduces energy consumption and carbon footprint.

Innovation Enablement - Access to AI, ML, and big data technologies.

Support for Digital Transformation - Foundation for IoT, blockchain, and more.

Characteristics of Cloud Computing

On-Demand Self-Service - Resources can be provisioned automatically.

Broad Network Access - Accessible from anywhere via the internet.

Resource Pooling - Shared resources serve multiple users dynamically.

Rapid Elasticity - Scalable resources based on demand.

Measured Service - Pay-as-you-go model with resource usage monitoring.

Multi-Tenancy - Multiple users share the same infrastructure securely.

High Availability - Reliable and continuous service.


Security - Advanced encryption, access controls, and compliance features.

Cost Efficiency - Reduces infrastructure and operational costs.

Flexibility - Supports various workloads and environments.

Disadvantages of Cloud Computing

Internet Dependency - Requires a stable connection.

Security Concerns - Risks of data breaches and unauthorized access.

Limited Control - Less control over infrastructure managed by providers.

Downtime - Potential service outages from providers.

Cost Management - Uncontrolled usage can lead to higher costs.

Compliance Issues - Adhering to data laws across regions.

Migrating into the Cloud

What is Cloud Migration?


Cloud migration is the process of moving data, applications, and other business elements from
on-premises infrastructure (like local servers) to a cloud environment. This can also involve moving
from one cloud environment to another.

​ Benefits of Cloud Migration


1.​ Cost Efficiency: Reduces the need for physical hardware and maintenance costs.
2.​ Scalability: Easily adjust resources based on business needs.
3.​ Improved Performance: Access to advanced technologies and faster processing power.
4.​ Flexibility: Work from anywhere with internet access.

Seven-step model of migration into a Cloud

Step 1: Choose the right cloud provider ( Assessment step)


The first step in migrating your model to the cloud is to choose a cloud provider that aligns with your
needs, budget, and model requirement. consider the factors such as compliance, privacy, and security.
Step 2: Prepare your data ( Isolation step)
Before migrating to your cloud, you need to prepare your data. for that ensure your data is clean and
well organized, and in a format that is compatible with your chosen cloud provider.
Step 3: Choose your cloud storage ( Mapping step)​
Once your data is prepared, you need to choose your cloud storage. This is where your data is stored
in the cloud. there are many cloud storage services such as GCP Cloud Storage, AWS S3, or Azure
Blob Storage.
Step 4: Set up your cloud computing resources and deploy your model ( Re- architect step) ​
If you want to run a model in the cloud, you will need to set up your cloud computing resources. This
includes selecting the appropriate instance type and setting up a virtual machine(VM) or container for
your model. After setting up your computing resource, it is time to deploy your model to the cloud.
This includes packaging your model into a container or virtual machine image and deploying it to
your cloud computing resource. and while deploying it may be possible that some functionality gets
lost so due to this some parts of the application need to be re-architect.
Step-5: Augmentation step
It is the most important step for our business for which we migrate to the cloud in this step by taking
leverage of the internal features of cloud computing service we augment our enterprise.
Step 6: Test your Model
Once your model is deployed, we need to test it to ensure that it is working or not. That involves
running test data through your model and comparing the results with your expected output.
Step 7: Monitor and maintain your Model
After the model is deployed and tested, it is important to monitor and maintain it. That includes
monitoring the performance, updating the model as needed, and need to ensure your data stays
up-to-date. Migrating your machine learning model to the cloud can be a complex process, but above
7 steps, you can help ensure a smooth and successful migration, ensuring that your model is scalable
and accessible.
Trends in Cloud Computing

​ Increased Adoption of Multi-Cloud Strategies


•​ What It Is: Many organizations are using services from multiple cloud providers instead of
relying on just one.
•​ Why It Matters: This approach helps avoid vendor lock-in, enhances flexibility, and allows
businesses to choose the best services from different providers.

​ Growth of Hybrid Cloud Solutions


•​ What It Is: Hybrid cloud combines public and private clouds, allowing data and applications to
be shared between them.
•​ Why It Matters: It offers the benefits of both environments, such as enhanced security for
sensitive data (private cloud) and scalability (public cloud).
•​ Serverless Computing
•​ What It Is: A cloud computing model where the cloud provider manages the infrastructure,
allowing developers to focus on writing code without worrying about servers.
•​ Why It Matters: It simplifies application development and reduces costs since users only pay for
the compute time they use.

​ Artificial Intelligence and Machine Learning Integration


•​ What It Is: Cloud services are increasingly incorporating AI and machine learning tools.
•​ Why It Matters: This enables businesses to analyze data more effectively, automate processes,
and gain insights that drive decision-making.
Cloud Computing Architecture
As we know, cloud computing technology is used by both small and large organizations to store the
information in cloud and access it from anywhere at anytime using the internet connection.

Cloud computing architecture is a combination of service-oriented architecture and event-driven architecture.

Cloud computing architecture is divided into the following two parts -

○​ Front End
○​ Back End

The below diagram shows the architecture of cloud computing -


Front End
The front end is used by the client. It contains client-side interfaces and applications that are required to
access the cloud computing platforms. The front end includes web servers (including Chrome, Firefox,
internet explorer, etc.), thin & fat clients, tablets, and mobile devices.

Back End
The back end is used by the service provider. It manages all the resources that are required to provide cloud
computing services. It includes a huge amount of data storage, security mechanism, virtual machines,
deploying models, servers, traffic control mechanisms, etc.

Components of Cloud Computing Architecture


There are the following components of cloud computing architecture -

1. Client Infrastructure

Client Infrastructure is a Front end component. It provides GUI (Graphical User Interface) to interact with
the cloud.

2. Application
The application may be any software or platform that a client wants to access.

3. Service

A Cloud Services manages that which type of service you access according to the client’s requirement.

Cloud computing offers the following three type of services:

i. Software as a Service (SaaS) – It is also known as cloud application services. Mostly, SaaS applications run
directly through the web browser means we do not require to download and install these applications. Some
important example of SaaS is given below –

Example: Google Apps, Salesforce Dropbox, Slack, Hubspot, Cisco WebEx.

ii. Platform as a Service (PaaS) – It is also known as cloud platform services. It is quite similar to SaaS, but
the difference is that PaaS provides a platform for software creation, but using SaaS, we can access software
over the internet without the need of any platform.

Example: Windows Azure, Force.com, Magento Commerce Cloud, OpenShift.

iii. Infrastructure as a Service (IaaS) – It is also known as cloud infrastructure services. It is responsible for
managing applications data, middleware, and runtime environments.

Example: Amazon Web Services (AWS) EC2, Google Compute Engine (GCE), Cisco Metapod.

4. Runtime Cloud

Runtime Cloud provides the execution and runtime environment to the virtual machines.

5. Storage

Storage is one of the most important components of cloud computing. It provides a huge amount of storage
capacity in the cloud to store and manage data.

6. Infrastructure

It provides services on the host level, application level, and network level. Cloud infrastructure includes
hardware and software components such as servers, storage, network devices, virtualization software, and
other storage resources that are needed to support the cloud computing model.

7. Management

Management is used to manage components such as application, service, runtime cloud, storage,
infrastructure, and other security issues in the backend and establish coordination between them.

8. Security

Security is an in-built back end component of cloud computing. It implements a security mechanism in the
back end.
9. Internet

The Internet is medium through which front end and back end can interact and communicate with each other.

Cloud Computing Reference Model


The Cloud Computing Reference Model (CCRM) is a conceptual framework that provides a structured
approach to understanding the various components and relationships within cloud computing environments.
It is a blueprint for architects, developers, and stakeholders to conceptualize, design, and implement
cloud-based solutions.

At its core, the CCRM defines the essential elements of cloud computing, including service models,
deployment models, architectural components, interfaces, security measures, management practices, and
interoperability standards. By delineating these components, the CCRM offers a comprehensive view of how
cloud computing systems are organized and operate. While only a few universally accepted CCRMs exist,
several organizations and standards bodies have proposed their versions.

The NIST Cloud Computing Reference Architecture is one of this domain's most widely recognized
reference models. It provides a detailed framework for understanding cloud computing systems, including
infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS), and deployment
models such as public, private, hybrid, and community clouds. Overall, the Cloud Computing Reference
Model serves as a guiding framework for navigating the complexities of cloud computing and facilitating the
development and deployment of cloud-based solutions.

●​ Service Models: Infrastructure as a Service (IaaS) provides virtualized computing resources over the
Internet, such as virtual machines and storage. Platform as a Service (PaaS) allows developers to
build, deploy, and manage applications without managing underlying infrastructure. Software as a
Service (SaaS) delivers applications over the internet on a subscription basis, reducing user
maintenance overhead.
●​ Deployment Models: Public Cloud offers resources from a third-party provider accessible over the
Internet. Private Cloud provides dedicated infrastructure for a single organization, offering more
control and security. A hybrid Cloud integrates public and private cloud resources, allowing data and
applications to move seamlessly. Community Cloud serves multiple organizations with shared
concerns, enhancing collaboration while maintaining specific requirements.
●​ Functional Components: Computing includes virtual machines or containers for processing and
executing applications. Storage encompasses scalable object or block storage solutions for data
management. Networking provides virtualized networks and connectivity between resources. Security
includes measures like firewalls and encryption to protect data and applications. Management ensures
efficient resource allocation, monitoring, and administration. Orchestration automates deployment,
scaling, and management processes for improved operational efficiency.
●​ Interactions and Interfaces: APIs (Application Programming Interfaces) define how components
communicate, enabling seamless integration and data exchange between cloud services. Protocols
like HTTP TCP/IP govern communication protocols for reliable data transmission. Data formats
standardize how information is structured and exchanged across different systems and services. These
interactions and interfaces facilitate interoperability, automation, and scalability within complex cloud
architectures, ensuring efficient communication and collaboration across diverse cloud environments.

Fig above presents an overview of the NIST cloud computing reference architecture, which identifies the
major actors, their activities and functions in cloud computing. The diagram depicts a generic high-level
architecture and is intended to facilitate the understanding of the requirements, uses, characteristics and
standards of cloud computing.

Major Actors of Cloud Computing Reference Model


There are five major actors in NIST cloud computing reference architecture. They are:

●​ Cloud Consumer
●​ Cloud Provider
●​ Cloud Carrier
●​ Cloud Auditor
●​ Cloud Broker

The image below will explain the cloud computing reference model in a neat diagram.

Each actor is an entity that participates in the process and/or completes duties in cloud computing. This entity
could be a person or an organization.

1. Cloud Consumer
The end user that the cloud computing service is designed to support is the cloud consumer. An individual or
corporation with a working relationship with a cloud provider and utilizing its services is referred to as a
cloud consumer. A cloud customer peruses a cloud provider's service catalog, makes the proper service
request, enters into a service agreement with the cloud provider, and then utilizes the service. The cloud
customer may be charged for the service provided, in which case payment arrangements must be made. They
need to have a cloud Service Level Agreement (SLA).

2. Cloud Provider
Any individual, group, or other entity in charge of making a service accessible to cloud users is a cloud
provider. A cloud provider creates the requested software, platforms, and infrastructure services, manages the
technical infrastructure needed to supply the services, provisions the services at agreed-upon service levels,
and safeguards the services' security and privacy.

Through service interfaces and virtual network interfaces that aid in resource abstraction, the cloud provider
implements the cloud software to make computing resources accessible to cloud consumers who use the
infrastructure as a service.

3. Cloud Carrier
A cloud carrier serves as an intermediary between cloud providers and customers, facilitating connectivity
and transport of cloud services. Customers can access the cloud through the network, telecommunication,
and other access equipment provided by cloud carriers. Customers of cloud services, for instance, can get
them through network access devices, including laptops, mobile phones, PCs, and mobile Internet devices
(MIDs), among others. Network and telecommunication carriers typically handle the distribution of cloud
services, while a transport agent is a company that arranges for the physical delivery of storage devices like
high-capacity hard drives.

Remember that a cloud provider will establish service level agreements (SLAs) with a cloud carrier to
provide services at a level consistent with the SLAs offered to cloud consumers. The cloud provider may also
demand that the cloud carrier provide dedicated and encrypted connections between cloud consumers and
cloud providers.

4. Cloud Auditor
An unbiased evaluation of cloud services, information system operations, performance, and the security of a
cloud computing implementation can be done by a cloud auditor. A cloud auditor can assess a cloud
provider's services in terms of performance, service level agreement compliance, privacy implications, and
security controls.

The management, operational, and technical precautions or countermeasures used inside an organizational
information system to ensure the privacy, availability, and integrity of the system and its data are known as
security controls.

To do a security audit, a cloud auditor can evaluate the information system's security controls to see how well
they are being implemented, functioning as intended, and achieving the required results in relation to the
system's security needs. Verifying compliance with law and security policy should be part of the security
audit.

5. Cloud Broker
An organization called a "Cloud Broker" controls how cloud services are used, performed, and delivered and
negotiates contracts between cloud providers and cloud users. The integration of cloud services could
become too difficult for cloud consumers to handle as cloud computing develops. Instead of contacting a
cloud provider directly in certain circumstances, a cloud consumer may request cloud services through a
cloud broker. A single point of access for controlling numerous cloud services is offered by cloud brokers.
The capacity to offer a single consistent interface to numerous different providers, whether the interface is for
commercial or technical objectives, separates a cloud broker from a cloud service provider. Cloud Brokers
provide services in three categories:

●​ Intermediation: By enhancing a certain feature and offering cloud consumers value-added services, a
cloud broker improves a given service. The enhancement may take the shape of identity management,
performance reporting, improved security, etc.
●​ Aggregation: Several services are combined and integrated into one or more new services by a cloud
broker. The broker offers data and service integration, guarantees secure data transfer between the
cloud consumer and various cloud providers, and provides these services.
●​ Arbitrage: Like service aggregation, service arbitrage differs in that the services being integrated or
aggregated are not fixed. Service arbitrage refers to the freedom a Broker has to select services from
various service Providers.

Examples of Cloud Computing Reference Model Apart From NIST

●​ IBM Architecture
●​ Oracle Architecture
●​ HP Architecture
●​ Cisco Reference Architecture

CSA Cloud Reference Model


The CSA Cloud Reference Model provides a standardized framework for cloud security, addressing critical
components to ensure strong protection in cloud environments.

The model includes guidelines for secure design and deployment across infrastructure, platform, and
application layers, forming the Cloud Architectural Framework. Governance, Risk, and Compliance (GRC)
policies and controls help manage cloud security risks and ensure regulatory compliance. Cloud Security
Controls cover data protection, identity management, and incident response, while Data Security and Privacy
techniques like encryption and data masking safeguard sensitive information. Application Security involves
secure coding practices and vulnerability assessments to protect cloud-based applications. Operational
Security includes monitoring, incident management, and disaster recovery planning, ensuring continuous
protection and quick recovery from incidents.

The OCCI Cloud Reference Model


The OCCI Cloud Reference Model provides a framework for managing cloud services, ensuring
interoperability and standardization across diverse environments. Key components include a standardized
Cloud Service Interface for provisioning, monitoring, and managing cloud services, and Resource
Management for efficient allocation, monitoring, and utilization of cloud resources like compute, storage,
and network. Service Management focuses on the lifecycle management of cloud services, ensuring
consistency and efficiency. The model also includes guidelines for Security and Compliance, promoting
robust security measures and regulatory adherence.
Deployment Models
These models describe how cloud services are deployed and who has access to them. Standard deployment
models include Public Cloud, Private Cloud, Hybrid Cloud, and Community Cloud, each with ownership,
control, and resource-sharing characteristics.

Each deployment model has its advantages and considerations, and organisations may choose to adopt one or
a combination of models based on security requirements, compliance considerations, performance needs,
budget constraints, and strategic objectives. Ultimately, the goal is to select the deployment model that best
aligns with the organisation's goals and requirements while maximising the benefits of cloud computing.

On-Premises Deployment
In this model, software applications are installed and run on computers and servers located within the
premises of an organisation. The organisation is responsible for managing and maintaining all aspects of the
infrastructure, including hardware, software, security, and backups.

Software applications are installed and run on servers within the organisation's premises. The organisation
manages all aspects of the infrastructure, including hardware, software, security, and backups.

Cloud Deployment
Cloud deployment involves hosting software applications and services on remote servers maintained by
third-party cloud service providers such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud
Platform. Users access these applications and services over the Internet. Cloud deployment offers scalability,
flexibility, and cost-effectiveness, as organisations can pay only for the resources they use.

Software applications and services are hosted on remote servers maintained by third-party cloud service
providers. Users access these resources over the internet. Cloud deployment offers scalability, flexibility, and
cost-effectiveness as organisations pay only for the resources they use.

Hybrid Deployment
Hybrid deployment combines elements of both on-premises and cloud deployment models. Organisations
may choose to host some applications and services on-premises while utilising cloud services for others. This
approach allows organisations to leverage the benefits of both deployment models, such as maintaining
sensitive data on-premises while taking advantage of cloud scalability for other workloads.

Software applications and services are hosted on remote servers maintained by third-party cloud service
providers. Users access these resources over the internet. Cloud deployment offers scalability, flexibility, and
cost-effectiveness as organisations pay only for the resources they use.

Private Cloud Deployment
The cloud infrastructure is dedicated solely to a single organisation in a private cloud deployment. It may be
hosted on-premises or by a third-party service provider, but the infrastructure is not shared with other
organisations. Private clouds offer greater control, customisation, and security than public cloud
deployments.

The cloud infrastructure is dedicated solely to a single organisation. It can be hosted on-premises or by a
third-party provider but not shared with other organisations. Private clouds offer greater control,
customisation, and security than public cloud deployments.

Public Cloud Deployment


In a public cloud deployment, the cloud infrastructure is shared among multiple organisations. Users access
services and resources from a pool of shared resources provided by the cloud service provider. Public cloud
deployments offer scalability, accessibility, and cost-effectiveness but may raise data security and privacy
concerns.

Cloud infrastructure is shared among multiple organisations. Users access services and resources from a pool
of shared resources provided by the cloud service provider. Public cloud deployments offer scalability,
accessibility, and cost-effectiveness but may raise data security and privacy concerns.

Community Cloud Deployment


Community cloud deployment involves sharing cloud infrastructure among several organisations with joint
concerns, such as regulatory compliance or industry-specific requirements. It offers benefits similar to
private clouds but allows for shared resources among a select group of organisations.

Cloud infrastructure is shared among several organisations with joint concerns, such as regulatory
compliance or industry-specific requirements. It offers benefits similar to private clouds but allows for shared
resources among a select group of organisations.

Multi-Cloud Deployment
Multi-cloud deployment involves using services from multiple cloud providers to meet specific business
needs. Organisations may choose this approach to avoid vendor lock-in, mitigate risk, or take advantage of
specialised services offered by different providers. Organisations use services from multiple cloud providers
to meet specific business needs.

This approach helps avoid vendor lock-in, mitigate risk, or take advantage of specialised services offered by
different providers. These deployment models provide organisations with options to choose the most suitable
infrastructure and delivery method based on their specific requirements, budget, and technical capabilities.
Functional Components


Functional components are essential for effectively managing and utilising cloud resources in cloud
computing. Computing includes virtual machines or containers for processing and executing applications.
Storage encompasses scalable object or block storage solutions for data management.

Networking provides virtualised networks and connectivity between resources. Security includes measures
like firewalls and encryption to protect data and applications. Management ensures efficient resource
allocation, monitoring, and administration. Orchestration automates deployment, scaling, and management
processes for improved operational efficiency.

Computing component
Computing in cloud computing refers to the fundamental capability of provisioning and managing virtual
machines (VMs) or containers to execute applications. Virtual Machines (VMs) emulate physical computers
and support various operating systems (OS).

They are versatile, allowing applications with diverse OS requirements to run within isolated environments.
On the other hand, containers encapsulate applications and their dependencies into portable units, ensuring
consistency across different com

Storage component
Storage solutions in cloud computing offer scalable options for storing and managing data. Object storage
systems store data as objects, each comprising the data itself, metadata (descriptive attributes), and a unique
identifier.

This approach is highly scalable and ideal for unstructured data like media files and backups. Block storage,
in contrast, manages data in fixed-sized blocks and is commonly used for structured data such as databases
and VM disks. It provides high performance and is typically directly attached to VM instances for persistent
storage needs.

Networking component
Networking components in cloud computing facilitate the establishment and management of virtualized
networks that interconnect cloud resources. Virtual Private Clouds (VPCs) offer isolated virtual networks
dedicated to specific users or groups, ensuring security and control over network configurations.

Subnets segment the IP address space within a VPC, enabling further granularity and security. Routing tables
dictate how traffic flows between subnets and external networks, optimizing network efficiency and security.

Security component
Security measures in cloud computing protect data, applications, and infrastructure from unauthorized access
and cyber threats. Firewalls regulate incoming and outgoing network traffic based on predefined security
rules, guarding against unauthorized access and network-based attacks.

Encryption transforms data into a secure format using algorithms, ensuring only authorized parties can
decrypt and access the original data with appropriate keys. Access controls enforce restrictions on resource
access based on authentication credentials, roles, and permissions, adhering to the principle of least privilege
to mitigate security risks.

Management component
Management in cloud computing encompasses tools and processes for efficiently administering cloud
resources throughout their lifecycle. Resource provisioning automates the allocation and deployment of
cloud resources based on demand and workload requirements, ensuring scalability and cost-efficiency.
Performance monitoring continuously tracks resource usage, application performance, and service
availability to detect issues and optimize resource utilization.

Usage optimization analyzes consumption patterns to minimize costs and improve efficiency by dynamically
scaling resources based on workload fluctuations. Compliance management ensures adherence to regulatory
requirements and SLAs, maintaining data protection and service availability standards.

Orchestration component
Orchestration automates and coordinates the deployment, scaling, and management of cloud resources and
applications. It facilitates automated deployment of resources, reducing manual intervention and minimizing
errors in provisioning and configuration tasks. Scaling capabilities dynamically adjust resource capacity
based on workload changes, optimizing performance and cost-effectiveness.

Management processes streamline complex workflows across different cloud components, ensuring
consistency and reliability in operations. Tools like Kubernetes and Terraform are commonly used for
orchestration, enabling efficient management of containerized applications and infrastructure as code (IaC)
practices. puting environments. Containers are lightweight and facilitate efficient deployment and scaling of
applications, sharing the host OS kernel for resource efficiency.

Interactions and Interfaces
Interactions and Interfaces in cloud computing enable seamless communication and collaboration across
diverse environments.APIs (Application Programming Interfaces) define how components communicate,
enabling seamless integration and data exchange between cloud services. Protocols like HTTP TCP/IP
govern communication protocols for reliable data transmission.

Data formats standardise how information is structured and exchanged across different systems and services.
These interactions and interfaces facilitate interoperability, automation, and scalability within complex cloud
architectures, ensuring efficient communication and collaboration across diverse cloud environments.

APIs (Application Programming Interfaces)


Define how different components within cloud services communicate and interact. APIs standardise
communication protocols, allowing for integration and data exchange between applications and services.PIs
define how different components within cloud services communicate and interact.

They standardize communication protocols, enabling seamless integration and data exchange between
applications and services by specifying how software components should interact programmatically.

Protocols (e.g., HTTP, TCP/IP)


Govern the rules and standards for transmitting data over networks. HTTP is used for web communication,
while TCP/IP ensures reliable transmission of data packets across the internet. These protocols ensure data
integrity and reliability in cloud environments.Protocols such as HTTP govern the rules for web
communication, while TCP/IP ensures reliable data transmission across the internet.

These protocols establish standardized methods for data exchange, ensuring data integrity, and enabling
effective communication between devices and systems in cloud environments.

Data Formats
Standardize how information is structured and exchanged across various systems and services. Standard data
formats like JSON (JavaScript Object Notation) or XML (eXtensible Markup Language) define how data is
formatted and interpreted, facilitating interoperability between different applications and platforms.

Data formats like JSON and XML standardize how information is structured and exchanged between
systems and services. They define rules for encoding data, facilitating interoperability and enabling different
applications and platforms to interpret and process data consistently and accurately.

You might also like