Enable multiple users (tenants) to access the same
application simultaneously
• Multitenant applications ensure that tenants do
not have access to data and configuration
information that is not their own
Introduction to the Internet and Web.pptxhishamousl
The document provides an introduction to the Internet and the World Wide Web. It defines the Internet as a global network of interconnected computer networks, and notes that no single entity controls it. It describes how the World Wide Web uses common protocols to allow computers to share text, graphics, and multimedia over the Internet. It also defines key concepts like URLs, domains, IP addresses, browsers, servers, and the client-server model.
It provides additional features like spell checking, grammar checking,
translation etc.
Networking: It handles all the networking tasks like establishing connection with
server, sending and receiving HTTP requests and responses.
UI Backend: It provides platform specific implementation for user interface.
Data Storage: It stores cookies, cache, bookmarks, history etc.
Plug-ins: It provides support for additional features like Flash, PDF, media players
etc.
JavaScript Interpreter: It interprets and executes the JavaScript code embedded in
web pages.
Browser Security: It provides security features like sandboxing, same-origin policy,
digital signatures etc.
Browser Extensibility: It allows third party extensions to add
The document provides an overview of basic internet and web concepts, including:
1) It describes the evolution of the Internet from ARPANET in 1969 to becoming commercially available in 1991 and the development of the World Wide Web in the 1990s.
2) It explains the importance of web standards set by the W3C to ensure compatibility across browsers and devices.
3) It defines key internet technologies like HTTP, IP addressing, domains, and the client-server model that underlies web browsing.
This document discusses computer networks and their key components. It defines a computer network as a collection of computers that communicate with one another over transmission lines. The main types are local area networks (LANs), wide area networks (WANs), and the Internet. LANs connect computers within a small physical area like a home or office, while WANs connect computers across multiple locations using communication networks from vendors. Other topics covered include network interface cards, Internet service providers, WiMax technology, firewalls for security, and virtual private networks which use encryption to securely connect remote locations.
This document summarizes key topics in telecommunications, networking, and wireless technology. It discusses the convergence of telephone and computer networks, the growth of broadband access, and components of simple and corporate computer networks. It also outlines important networking technologies like client/server computing, packet switching, TCP/IP, and different types of networks and transmission media. Finally, it discusses wireless technologies including Wi-Fi, Bluetooth, WiMax, RFID, wireless sensor networks, and trends in web technologies.
IT2255 Web Essentials - Unit I Website Basicspkaviya
Internet Overview – Fundamental computer network concepts – Web Protocols – URL – Domain Name – Web Browsers and Web Servers – Working principle of a Website – Creating a Website – Client-side and server-side scripting.
This document provides an overview of computer networks and the internet. It defines what a computer network is and describes different types of networks including LANs, MANs, and WANs. It also discusses internet connections like DSL and wireless, and internet applications such as email, the world wide web, file transfer protocol, and e-commerce. The document is divided into chapters covering topics like network requirements, the internet, and how information is transmitted over the internet.
This document provides an overview of edge computing. It discusses how edge computing addresses limitations of cloud computing by processing data closer to where it is generated, at the network edge, to reduce latency. This is achieved through technologies like cloudlets, which are small data centers located at the edge that cache and process data locally before transmitting to the cloud. The document outlines benefits of edge computing like improved performance, scalability, and privacy. It also introduces EdgeX and AWS Lambda@Edge as examples of edge computing platforms and frameworks.
CCS335 - Cloud architecture model and infrastructureNiviV4
The document provides information on different cloud computing models and infrastructure. It discusses cluster computing, grid computing, peer-to-peer computing, and internet clouds. It defines key characteristics of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It also describes the three main service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Finally, it covers the different deployment models for cloud computing including public cloud, private cloud, hybrid cloud, and community cloud.
This document provides an overview of computer networks and the internet. It defines key network terms like network, internet protocols, and network architecture models like client-server and peer-to-peer. It also discusses common network devices, internet concepts, and how the world wide web works using protocols like HTTP and URLs. The document concludes with sections on internet etiquette and email operations and etiquette.
A computer network connects two or more computers to allow people to share files, peripherals, and communication. It requires at least two devices with network interface cards, a connection medium like cables, and network software. Networks can be local area networks within a building, metropolitan area networks within a city, or wide area networks combining multiple local networks over long distances using services like the internet. The internet itself is a worldwide system of interconnected computer networks that allows for communication services globally.
This document provides an introduction to IoT including definitions, characteristics, physical and logical designs, protocols, and deployment templates. It defines IoT as a global network of physical objects embedded with sensors and connectivity to exchange data over the internet. Key characteristics include being dynamic, self-configuring, using interoperable communication protocols, and having unique identities and integration into information networks. IoT devices can exchange or collect data to perform local or cloud-based processing. The document also outlines common IoT communication models, layers, and levels of deployment from single to multiple interconnected devices with local and cloud-based components.
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATIVenkatRaoJ
This document provides an introduction to IoT including definitions, characteristics, physical and logical designs, protocols, and deployment templates. It describes IoT as a global network of physical objects embedded with sensors and connectivity. Key aspects include devices having unique identities, sensing/actuation capabilities, and ability to exchange data over the internet. Common IoT communication models like request-response, publish-subscribe, and push-pull are also outlined. The document concludes by describing six levels of IoT systems of increasing complexity from single device to multiple coordinated devices with cloud-based analytics and applications.
Connect - Using SDN to drive the development of Network Aware Services. Prof ...Walton Institute
The document discusses applying SDN to manage communications networks. It notes that new generation networks will require independent virtual service networks that interact with heterogeneous infrastructure networks. SDN can provide programmable network substrates to allow services to configure resources and routing. Key research areas include wireless virtualization, service-aware networks, and applying SDN and virtualization to emerging areas like the Internet of Things.
chapter-4-networking hjgjjgj did hfhhfhjAmitDeshai
This document provides an overview of networking concepts including client-server computing, networking basics, ports, sockets, TCP, UDP, proxy servers, internet addressing, and Java networking APIs. Some key points:
- A client-server model involves a client machine making requests to a server machine that provides a shared resource. Common server types include web, print, file, and compute servers.
- Network communication uses TCP or UDP protocols over IP addresses and port numbers to direct data between applications on different devices.
- Sockets provide an endpoint for inter-process communication and are identified by an IP address and port number combination.
- Java supports networking through classes like InetAddress, ServerSocket, Socket,
The document discusses web technology and client-server computing. It provides an overview of the history and development of the World Wide Web from its creation by Tim Berners-Lee in 1989. It describes common web protocols like HTTP, TCP/IP, FTP, and SMTP. It also discusses strategies for web development projects and how to connect devices to the internet. Finally, it outlines the basic roles and interactions in a client-server computing model.
The document defines key network infrastructure concepts including the Internet, intranets, extranets, virtual private networks, and security devices. The Internet connects worldwide computer networks using TCP/IP and contains resources like the World Wide Web and email. An intranet is a private network within an organization, while an extranet extends access to partners. A VPN uses encryption to create a secure "tunnel" between devices on different networks. Firewalls, proxies, and other security devices help protect networks from threats and control access.
The document defines key network infrastructure concepts such as the Internet, intranets, extranets, virtual private networks, and security devices. It explains that the Internet connects computer networks globally using TCP/IP, while an intranet is a private network internal to an organization. An extranet extends an intranet to external partners. Virtual private networks use encryption tunnels to provide secure connections across public networks. Various firewall types and perimeter security devices like proxies help protect networks from outside threats.
This document provides an introduction to computer networks. It discusses what a computer network is and some of the main reasons for networking computers, including sharing information and resources. It describes the different types of networks, including local area networks (LANs) and wide area networks (WANs). It also covers topics such as transmission media, network operating systems, the Internet, and how computer networks function at a basic level.
This document provides an overview of computer networks and the Internet. It defines a computer network as a collection of connected computing devices that share resources. The main advantages are sharing devices and files, communication capabilities, and centralized data backup. Challenges include high setup costs and risk of viruses or hacking. It describes common network models like client-server, and different types of networks by transmission range. The Internet is defined as a global network of networks using TCP/IP that links billions of devices worldwide. Key components that enable the Internet include backbone networks, ISPs, packet switching, and TCP and IP protocols.
The document provides an overview of topics covered in the Microsoft Technology Associate 98-366: Networking Fundamentals exam preparation course. It discusses network fundamentals including local area networking, network topologies, IP addressing, and common network devices. The course materials cover topics such as Ethernet, wireless networks, IP addressing, network infrastructure, and network security.
This document provides an overview of a computer network course, including its outcomes, chapters, and key concepts. The first chapter covers fundamentals of computer networks, including definitions of networks and computer networks, and the need for and applications of computer networks. It also discusses advantages of computer networks and classifications based on geographical area and transmission technology. Network computing models like peer-to-peer, client-server, and distributed systems are defined along with their characteristics. The roles and functions of network operating systems are outlined.
This document provides an overview of edge computing. It discusses how edge computing addresses limitations of cloud computing by processing data closer to where it is generated, at the network edge, to reduce latency. This is achieved through technologies like cloudlets, which are small data centers located at the edge that cache and process data locally before transmitting to the cloud. The document outlines benefits of edge computing like improved performance, scalability, and privacy. It also introduces EdgeX and AWS Lambda@Edge as examples of edge computing platforms and frameworks.
CCS335 - Cloud architecture model and infrastructureNiviV4
The document provides information on different cloud computing models and infrastructure. It discusses cluster computing, grid computing, peer-to-peer computing, and internet clouds. It defines key characteristics of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It also describes the three main service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Finally, it covers the different deployment models for cloud computing including public cloud, private cloud, hybrid cloud, and community cloud.
This document provides an overview of computer networks and the internet. It defines key network terms like network, internet protocols, and network architecture models like client-server and peer-to-peer. It also discusses common network devices, internet concepts, and how the world wide web works using protocols like HTTP and URLs. The document concludes with sections on internet etiquette and email operations and etiquette.
A computer network connects two or more computers to allow people to share files, peripherals, and communication. It requires at least two devices with network interface cards, a connection medium like cables, and network software. Networks can be local area networks within a building, metropolitan area networks within a city, or wide area networks combining multiple local networks over long distances using services like the internet. The internet itself is a worldwide system of interconnected computer networks that allows for communication services globally.
This document provides an introduction to IoT including definitions, characteristics, physical and logical designs, protocols, and deployment templates. It defines IoT as a global network of physical objects embedded with sensors and connectivity to exchange data over the internet. Key characteristics include being dynamic, self-configuring, using interoperable communication protocols, and having unique identities and integration into information networks. IoT devices can exchange or collect data to perform local or cloud-based processing. The document also outlines common IoT communication models, layers, and levels of deployment from single to multiple interconnected devices with local and cloud-based components.
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATIVenkatRaoJ
This document provides an introduction to IoT including definitions, characteristics, physical and logical designs, protocols, and deployment templates. It describes IoT as a global network of physical objects embedded with sensors and connectivity. Key aspects include devices having unique identities, sensing/actuation capabilities, and ability to exchange data over the internet. Common IoT communication models like request-response, publish-subscribe, and push-pull are also outlined. The document concludes by describing six levels of IoT systems of increasing complexity from single device to multiple coordinated devices with cloud-based analytics and applications.
Connect - Using SDN to drive the development of Network Aware Services. Prof ...Walton Institute
The document discusses applying SDN to manage communications networks. It notes that new generation networks will require independent virtual service networks that interact with heterogeneous infrastructure networks. SDN can provide programmable network substrates to allow services to configure resources and routing. Key research areas include wireless virtualization, service-aware networks, and applying SDN and virtualization to emerging areas like the Internet of Things.
chapter-4-networking hjgjjgj did hfhhfhjAmitDeshai
This document provides an overview of networking concepts including client-server computing, networking basics, ports, sockets, TCP, UDP, proxy servers, internet addressing, and Java networking APIs. Some key points:
- A client-server model involves a client machine making requests to a server machine that provides a shared resource. Common server types include web, print, file, and compute servers.
- Network communication uses TCP or UDP protocols over IP addresses and port numbers to direct data between applications on different devices.
- Sockets provide an endpoint for inter-process communication and are identified by an IP address and port number combination.
- Java supports networking through classes like InetAddress, ServerSocket, Socket,
The document discusses web technology and client-server computing. It provides an overview of the history and development of the World Wide Web from its creation by Tim Berners-Lee in 1989. It describes common web protocols like HTTP, TCP/IP, FTP, and SMTP. It also discusses strategies for web development projects and how to connect devices to the internet. Finally, it outlines the basic roles and interactions in a client-server computing model.
The document defines key network infrastructure concepts including the Internet, intranets, extranets, virtual private networks, and security devices. The Internet connects worldwide computer networks using TCP/IP and contains resources like the World Wide Web and email. An intranet is a private network within an organization, while an extranet extends access to partners. A VPN uses encryption to create a secure "tunnel" between devices on different networks. Firewalls, proxies, and other security devices help protect networks from threats and control access.
The document defines key network infrastructure concepts such as the Internet, intranets, extranets, virtual private networks, and security devices. It explains that the Internet connects computer networks globally using TCP/IP, while an intranet is a private network internal to an organization. An extranet extends an intranet to external partners. Virtual private networks use encryption tunnels to provide secure connections across public networks. Various firewall types and perimeter security devices like proxies help protect networks from outside threats.
This document provides an introduction to computer networks. It discusses what a computer network is and some of the main reasons for networking computers, including sharing information and resources. It describes the different types of networks, including local area networks (LANs) and wide area networks (WANs). It also covers topics such as transmission media, network operating systems, the Internet, and how computer networks function at a basic level.
This document provides an overview of computer networks and the Internet. It defines a computer network as a collection of connected computing devices that share resources. The main advantages are sharing devices and files, communication capabilities, and centralized data backup. Challenges include high setup costs and risk of viruses or hacking. It describes common network models like client-server, and different types of networks by transmission range. The Internet is defined as a global network of networks using TCP/IP that links billions of devices worldwide. Key components that enable the Internet include backbone networks, ISPs, packet switching, and TCP and IP protocols.
The document provides an overview of topics covered in the Microsoft Technology Associate 98-366: Networking Fundamentals exam preparation course. It discusses network fundamentals including local area networking, network topologies, IP addressing, and common network devices. The course materials cover topics such as Ethernet, wireless networks, IP addressing, network infrastructure, and network security.
This document provides an overview of a computer network course, including its outcomes, chapters, and key concepts. The first chapter covers fundamentals of computer networks, including definitions of networks and computer networks, and the need for and applications of computer networks. It also discusses advantages of computer networks and classifications based on geographical area and transmission technology. Network computing models like peer-to-peer, client-server, and distributed systems are defined along with their characteristics. The roles and functions of network operating systems are outlined.
module4 cloud provider and consumer perspRadhika R
Controlling scalability features such as usage quotas, active instance thresholds, and the configuration and deployment of the automated scaling listener and load balancer mechanisms.
containers-in-cloud.pptx introduction partRadhika R
Many SaaS offerings are provided free of charge, although these cloud services often come with data collecting sub-programs that harvest usage data for the benefit of the cloud provider (what benefits?).
containerization1. introduction to containRadhika R
SaaS-based cloud services are almost always accompanied by refined and generic APIs, they are usually designed to be incorporated as part of larger distributed solutions.
moThese platforms hide the complexity and details of the underlying infrastru...Radhika R
These platforms hide the complexity and details of the underlying infrastructure from users and applications by providing very simple graphical interface or API (Applications Programming Interface).
Cloud Computing is a general term used to describe a new class of network bas...Radhika R
Cloud Computing is a general term used to describe a new class of network based computing that takes place over the Internet,
basically a step on from Utility Computing
a collection/group of integrated and networked hardware, software and Internet infrastructure (called a platform).
Using the Internet for communication and transport provides hardware, software and networking services to clients
DTGO -a public organization that specializes in IT infrastructure and technology
services for public sector organization.
• DTGOV has virtualized its network infrastructure to produce a logical network
layout favoring network segmentation and isolation.
• Figure 7.4 depicts the logical network perimeter implemented at each DTGOV data
center. A logical network layout is established through a set of logical network
perimeters using various firewalls and virtual networks.
The cloud consumer’s on-premise environment and a cloud provider’s
cloud-based environment, connected through VPN and protect
communications. Figure 7.3
Virtualization technology and virtualizationRadhika R
Logical Network Perimeter
• Isolation of a network environment from the rest of a communications
network
• Establishes a virtual network boundary Figure 7.1
that can encompass and isolate a group of related cloud-based IT
resources
• This mechanism can be implemented to: – isolate IT resources in a cloud from non-authorized users – isolate IT resources in a cloud from non-users – isolate IT resources in a cloud from cloud consumers – control the bandwidth that is available to isolated IT resources
Introduction to cloud delivery models of paasRadhika R
Cloud computing relies on internet.
• Web technology is generally used as both the
implementation medium and the managUniform resource locator (URL)
Commonly informally referred to as a web address
a reference to a web resource that specifies its location
on a computer network and a mechanism for retrieving
it
Example: http://www.example.com/index.html
• Hypertext transfer protocol (HTTP)
Primary communication protocol used to exchange
content
• Markup languages (HTML, XML)
16
Express Web‐centric data and metadata
Virtualization Technology Hardware Independence Server ConsolidationRadhika R
Virtualization is the process of converting a physical IT resource into a virtual IT
resource.
Most types of IT resources can be virtualized, including:
Servers
Storage
Network
Power
A number of characteristics define cloud data, applications services and infr...Radhika R
Remotely hosted: Services or data are hosted on remote infrastructure.
Ubiquitous: Services or data are available from anywhere.
Commodified: The result is a utility computing model similar to traditional that of traditional utilities, like gas and electricity - you pay for what you would want!
Cloud computing is an umbrella term used to refer to Internet based developme...Radhika R
A number of characteristics define cloud data, applications services and infrastructure:
Remotely hosted: Services or data are hosted on remote infrastructure.
Ubiquitous: Services or data are available from anywhere.
Commodified: The result is a utility computing model similar to traditional that of traditional utilities, like gas and electricity - you pay for what you would want!
We introduce the Gaussian process (GP) modeling module developed within the UQLab software framework. The novel design of the GP-module aims at providing seamless integration of GP modeling into any uncertainty quantification workflow, as well as a standalone surrogate modeling tool. We first briefly present the key mathematical tools on the basis of GP modeling (a.k.a. Kriging), as well as the associated theoretical and computational framework. We then provide an extensive overview of the available features of the software and demonstrate its flexibility and user-friendliness. Finally, we showcase the usage and the performance of the software on several applications borrowed from different fields of engineering. These include a basic surrogate of a well-known analytical benchmark function; a hierarchical Kriging example applied to wind turbine aero-servo-elastic simulations and a more complex geotechnical example that requires a non-stationary, user-defined correlation function. The GP-module, like the rest of the scientific code that is shipped with UQLab, is open source (BSD license).
This paper proposes a shoulder inverse kinematics (IK) technique. Shoulder complex is comprised of the sternum, clavicle, ribs, scapula, humerus, and four joints.
International Journal of Distributed and Parallel systems (IJDPS)samueljackson3773
The growth of Internet and other web technologies requires the development of new
algorithms and architectures for parallel and distributed computing. International journal of
Distributed and parallel systems is a bimonthly open access peer-reviewed journal aims to
publish high quality scientific papers arising from original research and development from
the international community in the areas of parallel and distributed systems. IJDPS serves
as a platform for engineers and researchers to present new ideas and system technology,
with an interactive and friendly, but strongly professional atmosphere.
Raish Khanji GTU 8th sem Internship Report.pdfRaishKhanji
This report details the practical experiences gained during an internship at Indo German Tool
Room, Ahmedabad. The internship provided hands-on training in various manufacturing technologies, encompassing both conventional and advanced techniques. Significant emphasis was placed on machining processes, including operation and fundamental
understanding of lathe and milling machines. Furthermore, the internship incorporated
modern welding technology, notably through the application of an Augmented Reality (AR)
simulator, offering a safe and effective environment for skill development. Exposure to
industrial automation was achieved through practical exercises in Programmable Logic Controllers (PLCs) using Siemens TIA software and direct operation of industrial robots
utilizing teach pendants. The principles and practical aspects of Computer Numerical Control
(CNC) technology were also explored. Complementing these manufacturing processes, the
internship included extensive application of SolidWorks software for design and modeling tasks. This comprehensive practical training has provided a foundational understanding of
key aspects of modern manufacturing and design, enhancing the technical proficiency and readiness for future engineering endeavors.
The role of the lexical analyzer
Specification of tokens
Finite state machines
From a regular expressions to an NFA
Convert NFA to DFA
Transforming grammars and regular expressions
Transforming automata to grammars
Language for specifying lexical analyzers
ELectronics Boards & Product Testing_Shiju.pdfShiju Jacob
This presentation provides a high level insight about DFT analysis and test coverage calculation, finalizing test strategy, and types of tests at different levels of the product.
The Fluke 925 is a vane anemometer, a handheld device designed to measure wind speed, air flow (volume), and temperature. It features a separate sensor and display unit, allowing greater flexibility and ease of use in tight or hard-to-reach spaces. The Fluke 925 is particularly suitable for HVAC (heating, ventilation, and air conditioning) maintenance in both residential and commercial buildings, offering a durable and cost-effective solution for routine airflow diagnostics.
Fluid mechanics is the branch of physics concerned with the mechanics of fluids (liquids, gases, and plasmas) and the forces on them. Originally applied to water (hydromechanics), it found applications in a wide range of disciplines, including mechanical, aerospace, civil, chemical, and biomedical engineering, as well as geophysics, oceanography, meteorology, astrophysics, and biology.
It can be divided into fluid statics, the study of various fluids at rest, and fluid dynamics.
Fluid statics, also known as hydrostatics, is the study of fluids at rest, specifically when there's no relative motion between fluid particles. It focuses on the conditions under which fluids are in stable equilibrium and doesn't involve fluid motion.
Fluid kinematics is the branch of fluid mechanics that focuses on describing and analyzing the motion of fluids, such as liquids and gases, without considering the forces that cause the motion. It deals with the geometrical and temporal aspects of fluid flow, including velocity and acceleration. Fluid dynamics, on the other hand, considers the forces acting on the fluid.
Fluid dynamics is the study of the effect of forces on fluid motion. It is a branch of continuum mechanics, a subject which models matter without using the information that it is made out of atoms; that is, it models matter from a macroscopic viewpoint rather than from microscopic.
Fluid mechanics, especially fluid dynamics, is an active field of research, typically mathematically complex. Many problems are partly or wholly unsolved and are best addressed by numerical methods, typically using computers. A modern discipline, called computational fluid dynamics (CFD), is devoted to this approach. Particle image velocimetry, an experimental method for visualizing and analyzing fluid flow, also takes advantage of the highly visual nature of fluid flow.
Fundamentally, every fluid mechanical system is assumed to obey the basic laws :
Conservation of mass
Conservation of energy
Conservation of momentum
The continuum assumption
For example, the assumption that mass is conserved means that for any fixed control volume (for example, a spherical volume)—enclosed by a control surface—the rate of change of the mass contained in that volume is equal to the rate at which mass is passing through the surface from outside to inside, minus the rate at which mass is passing from inside to outside. This can be expressed as an equation in integral form over the control volume.
The continuum assumption is an idealization of continuum mechanics under which fluids can be treated as continuous, even though, on a microscopic scale, they are composed of molecules. Under the continuum assumption, macroscopic (observed/measurable) properties such as density, pressure, temperature, and bulk velocity are taken to be well-defined at "infinitesimal" volume elements—small in comparison to the characteristic length scale of the system, but large in comparison to molecular length scale
In tube drawing process, a tube is pulled out through a die and a plug to reduce its diameter and thickness as per the requirement. Dimensional accuracy of cold drawn tubes plays a vital role in the further quality of end products and controlling rejection in manufacturing processes of these end products. Springback phenomenon is the elastic strain recovery after removal of forming loads, causes geometrical inaccuracies in drawn tubes. Further, this leads to difficulty in achieving close dimensional tolerances. In the present work springback of EN 8 D tube material is studied for various cold drawing parameters. The process parameters in this work include die semi-angle, land width and drawing speed. The experimentation is done using Taguchi’s L36 orthogonal array, and then optimization is done in data analysis software Minitab 17. The results of ANOVA shows that 15 degrees die semi-angle,5 mm land width and 6 m/min drawing speed yields least springback. Furthermore, optimization algorithms named Particle Swarm Optimization (PSO), Simulated Annealing (SA) and Genetic Algorithm (GA) are applied which shows that 15 degrees die semi-angle, 10 mm land width and 8 m/min drawing speed results in minimal springback with almost 10.5 % improvement. Finally, the results of experimentation are validated with Finite Element Analysis technique using ANSYS.
2. Enabling technologies
1. Broadband networks and internet architecture
2. Data center technology
3. Virtualization technology
4. Web technology
5. Multitenant technology
2
3. 1. Broadband networks & Internet architecture
• All clouds must be connected to a network
• Internet’s largest backbone networks, established
and deployed by ISPs, are interconnected by core
routers
ISP: internet service provider
3
5. Two fundamental components
• Connectionless packet switching
End‐to‐end (sender‐receiver pair) data flows are divided
into packets of a limited size
Packets are processed through network switches and
routers, then queued and forwarded from one
intermediary node to the next
• Router‐based interconnectivity
A router is a device that is connected to multiple
networks through which it forwards packets
Each packet is individually processed
Use multiple alternative network routes
5
8. 2. Data Center Technology
• A data center is a facility used to house computer
systems and associated components, such as
telecommunications and storage systems
Virtualization
Standardization and Modularity
Automation
Remote Operation and Management
8
12. 3. Virtualization technology
• Virtualization is a process of converting a physical IT
resource into a virtual IT resource
Server
Virtual server ↔ virtual machine
Storage
Network
Power
12
13. Creating a new virtual server
• Allocation of physical IT resources
• Installation of an operating system, i.e., guest
operating system
13
15. 4. Web technology
• Cloud computing relies on internet.
• Web technology is generally used as both the
implementation medium and the management
interface for cloud services
15
16. Basic web technology
• Uniform resource locator (URL)
Commonly informally referred to as a web address
a reference to a web resource that specifies its location
on a computer network and a mechanism for retrieving
it
Example: http://www.example.com/index.html
• Hypertext transfer protocol (HTTP)
Primary communication protocol used to exchange
content
• Markup languages (HTML, XML)
Express Web‐centric data and metadata
16
18. 5. Multitenant technology
• Enable multiple users (tenants) to access the same
application simultaneously
• Multitenant applications ensure that tenants do
not have access to data and configuration
information that is not their own
18