Data Science
Data Science
Unit -1
Book Name
• Cloud Computing: Concept, Technology & Architecture by
Thomas Erl.
• The Basic of cloud computing by Derrick Rountree
• Cloud Computing for by Dummies-Judith Hurwitz
• Cloud Computing by Dr.US Pandey and Dr. Kavita Choudhary
• Cloud Computing by shailendra singh and Sunil Kumar
Cloud Computing
• Cloud Computing refers to the server that are accessed over
the internet (present at remote location)
• Public cloud is owned at a lower cost than the private and hybrid
cloud.
• Public cloud is maintained by the cloud service provider, so do
not need to worry about the maintenance.
• Public cloud is easier to integrate. Hence it offers a better
flexibility approach to consumers.
• Public cloud is location independent because its services are
delivered through the internet.
• Public cloud is highly scalable as per the requirement of
computing resources.
• It is accessible by the general public, so there is no limit to the
number of users.
Disadvantages of Public Cloud
• Public Cloud is less secure because resources
are shared publicly.
• Performance depends upon the high-speed
internet network link to the cloud provider.
• The Client has no control of data.
Private Cloud
• Private cloud is also known as an internal cloud or corporate cloud. It is
used by organizations to build and manage their own data center internally
or by the third party. It can be deployed using Open source tools such as
Open stack and Eucalyptus.
• Based on the location and management, National Institute of Standards and
Technology (NIST) divide private cloud into the following two parts-
• On-premise private cloud
• Outsourced private cloud
• Security
• Reliability
• Scalability
• Durability
• Virtualization
• Compatibility
Disadvantages
• Installation
• Cost
• Physical Size
• Maintenance
• Environmental Restrictions
Cluster Computing
• Cluster computing refers to several computers
on one network, acting as a single entity, often
performing different tasks but in the same
geographical location.
Example – Weather forecasting systems,
Google search engine, Earthquake simulation,
Petroleum reservoir simulation.
Advantages
• Faster processing speed for overall high
performance
• Ensure computing power is always readily
available an economic choice thanks to its
scalable nature.
Disadvantages
• Require more physical Space as more
computer operates in a single location.
• Uses more power when compared to a single
server.
Grid Computing
• Grid Computing refers to a group of
computers that work together as part of one
system ,connected by a central network doing
similar tasks but sometimes geographically
separate.
Example- Scientific research, Organization,
Genetic research, cancer research, Financial
analysis, motion picture animation,
Advantages
• Finish large project in a shorter amount of time
• Grid computing is modular that means if one
computer fail, the other components of a
system can continue to operate
• If you have idle server or computer is your
system a grid computing setup them to
work ,by providing them to share of a project.
Disadvantages
• Grid computing technology is still new.
Therefore software and best practices are not
fully understood.
• You may need to run big shared memory ,
multiprocessing tasks for application that
required more memory.
• Security on these system can be questionable.
That is because the controls on member nodes
are not strictly enforced.
Utility Computing
• Utility computing is a demand based system
therefore, computing resources are provide to
an end user on an as needed basis.
Advantages
• An organization does not to purchase full software suits to
license or even hardware.
themselves they only need to pay for services that they actually
need.
• when you employ a utility computing mode the contracted
company is responsible for maintaining the software, and
hardware that they have created out to you
• Can help organization standardize the service offering across
department.
Disadvantages
• It is utility computing company goes into
financial trouble. They can abruptly close
meaning you will be without vital services that
you may have already paid for
• Utility computing companies can sometimes be
attractive targets for cyber criminals since they
may also stores the data of their many clients. An
attack on this type of company can produce more
than a attack on a single organization alone.
Cloud Computing
• In Simple term, Cloud Computing provides
data storage ,resources and power to an end
user. It is on demand and often does not
require direct management. The management
of the system is take care of by the cloud
provides themselves.
Advantages
• A backup can save your organization plenty of
hassle in the event case of a cyber attack.
• Unlike Physical infrastructure the cloud is less
Susceptible to downtime rest with enterprise
level security.
• Reduce costs by only paying for the storage
and other service that you require.
Disadvantages
• The cloud run on internet connection that means if
your internet goes out so to does the functional
operation of your cloud system.
• You do not have full control, infrastructure is likely
located in a data centre which can be located far
from your workshop even in another country check
local government regulations on offshore data
storage
• Check on your provider’s security track records to
get a better idea on their history of data safety.
Trends in Cloud Computing
Continue………………
• The Growth of Serverless Computing
Serverless computing is a cloud approach in which the customer doesn’t have to deal
with infrastructure administration and server provisioning. Instead, the cloud service
providers manage the supporting infrastructure and distribute computing power
following the demand
• Even More Adoptions for AI and ML
All machine learning and AI platforms need a lot of processing power and data
bandwidth, and the cloud is the most cost-effective approach to get these resources.
AI and ML technologies complement each other.
Cloud computing plays a vital role in creating two emerging AI technologies.
• Creative Algorithms: These software tools use machine learning to produce
everything from artificial data to works of art. These algorithms can also use to train
different AI systems.
• Language Modeling: Programs that understand human languages more accurately
are a technology that is expected to change how companies communicate with their
customers.
Continue…………………..
• Deploying to the Edge
Edge computing is a new method of processing data that doesn’t conduct
activities inside a data center. Instead, processing and storing data occurs on
specialized hardware at or close to the network’s edge.
Every edge server has different storage capabilities, networking, and
computing, allowing it to perform the following tasks:
• Security
• Network switching and routing
• Load balancing
• Kubernetes and Blockchain
Kubernetes is a technology that offers a tamper-proof digital ledger that can
record data without depending on a centralized authority. Blockchain
technology is a game-changer but has scaling issues, particularly massive
data management and storage.
Continue……………………..
• More Focus on Cloud Security
The main barriers to cloud adoption continue
to be issues about compliance, privacy, and
integration problems. In response, cloud
service providers are providing enhanced
cloud security trends feature.
Cloud computing vs.Traditional computing
Unit -2
Cloud service model and virtualization
Types of Cloud Computing
• Belongs to Microsoft
• Type 1 Bare Metal
• Good for Small-Medium Businesses
• Good for running windows
• 4 commercial editions
• Free edition available (with no GUI and no virtualization
rights)
• Live Migration
• Storage Migration
• Dynamic memory
• Extensible virtual switch
VMware Workstation/Fusion/Player
• Type 2 Hypervisor
• It can run only single Virtual Machine
• Not allow to create VMs
• Licensing plans
• Good for running multiple different operating systems
or versions of one OS on one desktop
• Good for labs and demonstration objectives
• Good for sandbox environments and snapshots
• Good Option for running Windows and Linux on Macs
Oracle VM Virtual Box
• Type 2 Hypervisor
• Mature and Stable
• Belongs to Oracle Corporation
• Similar to VMware vSphere and Microsoft Hyper-V
• Alternative of expensive server and desktop virtualization
• Open-source hypervisor
• Suitable for Small-Medium Business & Enterprises
• Live migration
• Multiple host resource pools
• Automated workflows
KVM
• Open Source
• Belongs to Red Hat, Inc.
• Mature hypervisor
• Contains the features of Type 1 & Type 2
• Suitable for Personal & Small medium solutions
• Based on Linux
• Numerous guest operating systems work with KVM (BSD, Solaris,
Windows, Haiku, ReactOS, Plan 9, and the AROS Research)
• KVM is used in products such as Redhat Enterprise Virtualization
(RHEV)
• Live migration
• Storage migration
• Configuration snapshots
Generation of Web
What is Web 1.0
• Web 1.0 refers to the first stage of the World Wide Web evolution.
Earlier, there were only a few content creators in Web 1.0 with a
huge majority of users who are consumers of content. Personal web
pages were common, consisting mainly of static pages hosted on
ISP-run web servers, or free web hosting services.
• In Web 1.0 advertisements on websites while surfing the internet are
banned. Also, in Web 1.0, Ofoto is an online digital photography
website, on which users could store, share, view, and print digital
pictures. Web 1.0 is a content delivery network (CDN) that enables
the showcase of the piece of information on the websites. It can be
used as a personal website. It costs the user as per pages viewed. It
has directories that enable users to retrieve a particular piece of
information. The era of Web 1.0 was roughly from 1991 to 2004.
Design and Features
• 2004 When the word Web 2.0 become famous due to the First Web 2.0
conference (later known as the Web 2.0 summit) held by Tim O’Reilly and
Dale Dougherty, the term was coined by Darcy DiNucci in 1999. Web 2.0
refers to worldwide websites which highlight user-generated content,
usability, and interoperability for end users. Web 2.0 is also called the
participative social web. It does not refer to a modification to any technical
specification, but to modify the way Web pages are designed and used. The
transition is beneficial but it does not seem that when the changes occur.
Interaction and collaboration with each other are allowed by Web 2.0 in a
social media dialogue as the creator of user-generated content in a virtual
community. Web 2.0 is an enhanced version of Web 1.0.
• Web browser technologies are used in Web 2.0 development and it
includes AJAX and JavaScript frameworks. Recently, AJAX
and JavaScript frameworks have become very popular means of creating
web 2.0 sites.
Features and Usage
Features of the Web 2.0
• Free sorting of information, permits users to retrieve and classify the information collectively.
• Dynamic content that is responsive to user input.
• Information flows between the site owner and site users using evaluation & online
commenting.
• Developed APIs to allow self-usage, such as by a software application.
• Web access leads to concerns different, from the traditional Internet user base to a wider
variety of users.
Usage of Web 2.0
• The social Web contains several online tools and platforms where people share their
perspectives, opinions, thoughts, and experiences. Web 2.0 applications tend to interact much
more with the end user. As such, the end-user is not only a user of the application but also a
participant in these 8 tools mentioned below:
• Podcasting
• Blogging
• Tagging
• Curating with RSS
• Social bookmarking
• Social networking
• Social media
• Web content voting
What is Web 3.0
• It refers to the evolution of web utilization and interaction which includes
altering the Web into a database, with the integration of DLT (Distributed
Ledger Technology blockchain is an example) and that data can help to make
Smart Contracts based on the needs of the individual. It enables the up-gradation
of the backend of the web, after a long time of focusing on the frontend (Web
2.0 has mainly been about AJAX, tagging, and other front-end user-experience
innovation). Web 3.0 is a term that is used to describe many evolutions of web
usage and interaction among several paths. In this, data isn’t owned but instead
shared but still is, where services show different views for the same web / the
same data.
• The Semantic Web (3.0) promises to establish “the world’s information” in a
more reasonable way than Google can ever attain with its existing engine
schema. This is particularly true from the perspective of machine conception as
opposed to human understanding. The Semantic Web necessitates the use of a
declarative ontological language like OWL to produce domain-specific
ontologies that machines can use to reason about information and make new
conclusions, not simply match keywords.
Features of the Web 3.0
• Semantic Web: The succeeding evolution of the Web involves the Semantic
Web. The semantic web improves web technologies in demand to create,
share and connect content through search and analysis based on the capability
to comprehend the meaning of words, rather than on keywords or numbers.
• Artificial Intelligence: Combining this capability with natural language
processing, in Web 3.0, computers can distinguish information like humans to
provide faster and more relevant results. They become more intelligent to
fulfill the requirements of users.
• 3D Graphics: The three-dimensional design is being used widely in websites
and services in Web 3.0. Museum guides, computer games, e-commerce,
geospatial contexts, etc. are all examples that use 3D graphics.
• Connectivity: With Web 3.0, information is more connected thanks to
semantic metadata. As a result, the user experience evolves to another level
of connectivity that leverages all the available information.
• Ubiquity: Content is accessible by multiple applications, every device is
connected to the web, and the services can be used everywhere.