Professional Documents
Culture Documents
A
SEMINAR
ON
CLOUD COMPUTING
Submitted in partial fulfilment of the requirement for the award of degree
of
Master of Technology
In
Computer Science & Engineering
By
Shivangi Sharma
(150530705007)
1
r
DECLARATION
I hereby declare that the seminar entitled CLOUD COMPUTING submitted for the award
of degree of Master of Technology in Computer Science and Engineering from J.B
Institute of Technology, Dehradun embodies results of original work and studies carried out
by me and the contents of the seminar do not form the basis for the award of any other degree
to me or to anybody else from this or any other University/Institute.
Shivangi Sharma
M.Tech(CSE).
Enrolment No: 150530705007
J.B Institute of Technology, Dehradun
2
r
ACKNOWLEDGMENT
I would like to take this opportunity to express my deep sense of gratitude to all who helped
me directly or indirectly during this seminar.
First of all I would like to express my deepest gratitude to my thesis supervisor Mr. Diwaker
Mourya and his enormous help and advice and for providing inspiration which cannot be
expressed with words. I would not have accomplished this seminar without his patient care,
understanding and encouragement. His advice, encouragement and critics are source of
innovative ideas, inspiration and causes behind the successful completion of this seminar
work. The confidence shown on me by his was the biggest source of inspiration for me.
I would like to express my deep gratitude to him on behalf of the head of department
computer science and engineering department of Jb Institute of Technology, for providing
access to the good integration of intellectual properties, technical support and facilities.
3
r
TABLE OF CONTENT
DECLRARATION...............................................................................................2
ACKNOWLEDGMENT.....................................................................................3
LIST OF FIGURE................................................................................................6
CHAPTER 3: BENEFITS..............................................................................16-17
CHAPTER 4: RISK........................................................................................18-19
CHAPTER 5: CHARACTERISTICS......................................................20-22
CHAPTER 9: CHALLENGES.................................................................35-36
4
r
10.1 VIRTUALIZATION...........................................................................38
REFERENCES.....................................................................................................41
5
r
LIST OF FIGURE
Fig 7: Architecture.........................................................................................24
6
r
CHAPTER 1
INTRODUCTION TO CLOUD
COMPUTING
7
r
CHAPTER 1
The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is
something, which is present at remote location. Cloud can provide services over network, i.e.,
on public networks or on private networks, i.e., WAN, LAN or VPN. Applications such as e-
mail, web conferencing, customer relationship management (CRM),all run in cloud.[1]
Cloud Computing refers to manipulating, configuring, and accessing the applications online.
It offers online data storage, infrastructure and application.[1]
Internet has been a driving force towards the various technologies that have been developed.
Arguably, one of the most discussed among all of these is Cloud Computing. Over the last
few years, cloud computing paradigm has witnessed an enormous shift towards its adoption
and it has become a trend in the information technology space as it promises significant cost
reductions and new business potential to its users and providers [3].
8
r
i) Reduce hardware and maintenance cost,
iii) Flexibility and highly automated processes wherein the customer need not worry about
mundane concerns like software up-gradation [4,5].
Cloud Computing is an emerging trend to deploy and maintain software and is being adopted
by the industry such as Google, IBM, Microsoft, and Amazon. Several prototype applications
and platforms, such as the IBM Blue Cloudinfrastructure, the Google App Engine, the
Amazon Cloud, and the Elastic Computing Platform [6]. Cloud Computing is perceived as
the next progression that will impact organizational businesses and how they manage their IT
infrastructures. The technology and architecture that cloud service and deployment models
offer are a key area of research.
Cloud Computing is a general term for anything that involves delivering hosted services over
the Internet. Instead of a static system architecture, Cloud Computing supports the ability to
dynamically scale up and quickly scale down, offering cloud consumers high reliability,
quick response times, and the flexibility to handle traffic fluctuations and demand [9].
Virtualization technology allows cloud vendors to convert one server into many virtual
machines, thereby eliminating client-server computing with single-purpose systems [10].
Benefits of Cloud computing are enormous. The most important one is that the customers
dont need to buy the resource from a third party vendor, instead they can use the resource
and pay for it as a service thus helping the customer to save time and money. Cloud is not
only for Multinational companies but its also being used by small and medium enterprises
[11]
9
r
CHAPTER2
CLOUD COMPUTING BUILDING
BLOCKS
10
r
CHAPTER2
There are two basic building blocks, which can be consider in Cloud Computing to making
the cloud computing feasible and accessible to end users. Which are follows:-
In the cloud deployment model, networking, platform, storage, and software infrastructure
are provided as services that scale up or down depending on the demand as depicted. The
Cloud Computing model has four main deployment models which are [2]:
a. PUBLIC CLOUD
The Public Cloud allows systems and services to be easily accessible to the general public.
Public cloud may be less secure because of its openness, e.g., e-mail.[1]
Public cloud describes cloud computing in the traditional mainstream sense, whereby
resources are dynamically provisioned on a fine-grained, self-service basis over the Internet,
via web applications/web services, from an off-site third-party provider who shares resources
and bills on a fine-grained utility computing basis. It is typically based on a pay-per-use
model, similar to a prepaid electricity metering system which is flexible enough to cater for
spikes in demand for cloud optimization [2,12]. Examples of a public cloud include
Microsoft Azure, Google App Engine .
11
r
b. PRIVATE CLOUD
The Private Cloud allows systems and services to be accessible within an organization. It
offers increased security because of its private nature [1]. In the private cloud, scalable
resources and virtual applications provided by the cloud vendor are pooled together and
available for cloud users to share and use. It differs from the public cloud in that all the cloud
resources and applications are managed by the organization itself, similar to Intranet
functionality. Utilization on the private cloud can be much more secure than that of the public
cloud because of its specified internal exposure. Only the organization and designated
stakeholders may have access to operate on a specific Private cloud [2,13]. One of the best
examples of a private cloud is Eucalyptus Systems.
c. COMMUNITY CLOUD
The Community Cloud allows systems and services to be accessible by group of
organizations. [1] Infrastructure shared by several organizations for a shared cause and may
be managed by them or a third party service provider and rarely offered cloud model. These
clouds are normally based on an agreement between related business organizations such as
banking or educational organizations. A cloud environment operating according to this model
may exist locally or remotely. An example of a Community Cloud includes Facebook [2].
d. HYBRID CLOUD
The Hybrid Cloud is mixture of public and private cloud. However, the critical activities are
performed using private cloud while the non-critical activities are performed using public
cloud.[1]
Hybrid cloud is a private cloud linked to one or more external cloud services, centrally
managed, provisioned as a single unit, and circumscribed by a secure network [2,14]. It
provides virtual IT solutions through a mix of both public and private clouds. Hybrid Cloud
provides more secure control of the data and applications and allows various parties to access
information over the Internet. It also has an open architecture that allows interfaces with other
management systems. Hybrid cloud can describe configuration combining a local device,
such as a Plug computer with cloud services. It can also describe configurations combining
virtual and physical, collocated assets -for example, a mostly virtualized environment that
requires physical servers, routers, or other hardware such as a network appliance acting as a
firewall or spam filter. An example of a Hybrid Cloud includes Amazon Web Services
(AWS) [2].
12
r
13
r
Infrastructure as a service (IaaS) refers to the sharing of hardware resources for executing
services using Virtualization technology. Its main objective is to make resources such as
servers, network and storage more readily accessible by applications and operating systems.
Thus, it offers basic infrastructure on-demand services and using Application Programming
Interface (API) for interactions with hosts, switches, and routers, and the capability of adding
new equipment in a simple and transparent manner. In general, the user does not manage the
underlying hardware in the cloud infrastructure, but he controls the operating systems,
storage and deployed applications. The service provider owns the equipment and is
responsible for housing, running and maintaining it. The client typically pays on a per-use
basis. Examples of IaaS include Amazon Elastic Cloud Computing (EC2), Amazon S3,
GoGrid [2].
PaaS is the delivery of a computing platform and solution stack as a service without software
downloads or installation for developers, IT managers or end-users. It provides an
infrastructure with a high level of integration in order to implement and test cloud
applications. The user does not manage the infrastructure (including network, servers,
14
r
operating systems and storage), but he controls deployed applications and, possibly, their
configurations. Examples of PaaS includes: Force.com, Google App Engine and Microsoft
Azure [2].
Software As A Service(SAAS):-
SaaS model allows to use software applications as a service to end users [1].SaaS can be
described as a process by which Application Service Provider (ASP) provide different
software applications over the Internet. This makes the customer to get rid of installing and
operating the application on own computer and also eliminates the tremendous load of
software maintenance; continuing operation, safeguarding and support [2,15]. SaaS vendor
advertently takes responsibility for deploying and managing the IT infrastructure (servers,
operating system software, databases, data centre space, network access, power and cooling,
etc) and processes (infrastructure patches/upgrades, application patches/upgrades, backups,
etc.) required to run and manage the full solution. SaaS features a complete application
offered as a service on demand. In SaaS, there is the Divided Cloud and Convergence
coherence mechanism whereby every data item has either the Read Lock or Write
Lock [2,16]. Two types of servers are used by SaaS: the Main Consistence Server (MCS)
and Domain Consistence Server (DCS). Cache coherence is achieved by the Cloud
Computing: Overview & Current Research Challenges. Cooperation between MCS and DCS
[2,17]. In SaaS, if the MCS is damaged, or compromised, the control over the cloud
environment is lost. Hence securing the MCS is of great importance. Examples of SaaS
includes: Salesforce.com, Google Apps [2].
15
r
CHAPTER 3
BENIFITS
16
r
CHAPTER 3
BENIFITS
Cloud Computing has numerous advantages. Some of them are listed below:
5. Cloud resources are available over the network in a manner that provides platform
independent access to any type of clients.
6. Cloud Computing offers on-demand self-service. The resources can be used without
interaction with cloud service provider.
17
r
CHAPTER 4
RISK
18
r
CHAPTER 4
RISK
Although Cloud Computing is a great innovation in the world of computing, there also exist
downsides of cloud computing. Some of them are discussed below:
LOCK-IN
It is very difficult for the customers to switch from one Cloud Service Provider (CSP) to
another. It results in dependency on a particular CSP for service.
ISOLATION FAILURE
This risk involves the failure of isolation mechanism that separates storage, memory, routing
between the different tenants.
19
r
CHAPTER 5
CHARACTERISTICS
20
r
CHAPTER 5
CHARACTERISTICS
There are four key characteristics of cloud computing. They are shown in the following
diagram:
ON DEMAND SELF-SERVICE
Cloud Computing allows the users to use web services and resources on demand. One can
logon to a website at any time and use them.
21
r
RESOURCE POOLING
Cloud Computing allows multiple tenants to share a pool of resources. One can share single
physical instance of hardware, database and basic infrastructure.
RAPID ELASTICITY
It is very easy to scale up or down the resources at any time. Resources used by the customers
or currently assigned to customers are automatically monitored and resources. It make it
possible
MEASURED SERVICE
Service Models & Deployment Models are described in above section.
22
r
CHAPTER 6
CLOUD COMPUTING
ARCHITECTURE
23
r
CHAPTER 6
CLOUD COMPUTING-ARCHITECTURE
The Cloud Computing architecture comprises of many cloud components, each of them are
loosely coupled. We can broadly divide the cloud architecture into two parts:
Front End
Back End
Fig 7: Architecture
Each of the ends are connected through a network, usually via Internet. The following
diagram shows the graphical view of cloud computing architecture:
24
r
IMPORTANT POINTS
1. It is the responsibility of the back end to provide built-in security mechanism, traffic
control and protocols.
2. The server employs certain protocols, known as middleware, helps the connected
devices to communicate with each other.
25
r
CHAPTER 7
CLOUD COMPUTING
INFRASTUCTURE
26
r
CHAPTER 7
a. HYPERVISOR
Hypervisor is a firmware or low-level program that acts as a Virtual Machine
Manager. It allows to share the single physical instance of cloud resources between
several tenants.
b. MANAGEMENT SOFTWARE
Management Software helps to maintain and configure the infrastructure.
c. DEPLOYMENT SOFTWARE
Deployment software helps to deploy and integrate the application on the cloud.
27
r
d. NETWORK
Network is the key component of cloud infrastructure. It allows to connect cloud
services over the Internet. It is also possible to deliver network as a utility over the
Internet, i.e., the consumer can customize the network route and protocol.
e. SERVER
Server helps to compute the resource sharing and offer other services such as resource
allocation and deallocation, monitoring resources, security, etc.
f. STORAGE
Cloud uses distributed file system for storage purpose. If one of the storage resource
fails, then it can be extracted from another one which makes cloud computing more
reliable.
28
r
Fundamental constraints that cloud infrastructure should implement are shown in the
following diagram:
1. TRANSPARENCY
Since virtualization is the key to share resources in cloud environment. But it is not possible
to satisfy the demand with single resource or server. Therefore, there must be transparency in
resources, load balancing and application, so that we can scale them on demand.
2. SCALABILITY
Scaling up an application delivery solution is not that easy as scaling up an application
because it involves configuration overhead or even re-architecting the network. So,
application delivery solution is need to be scalable which will require the virtual
infrastructure such that resource can be provisioned and de-provisioned easily.
3. INTELLIGENT MONITORING
To achieve transparency and scalability, application solution delivery will need to be capable
of intelligent monitoring.
29
r
4. SECURITY
The mega data centre in the cloud should be securely architected. Also the control node, a
entry point in mega data centre also needs to be secure.
30
r
CHAPTER 8
CLOUD COMPUTING DATA
STORAGE
31
r
CHAPTER 8
Cloud Storage is a service that allows to save data on offsite storage system managed by
third-party and is made accessible by a web services API.
33
r
Virtual Storage Containers
Virtual storage containers offer high performance cloud storage systems. Logical Unit
Number (LNU)of device, files and other objects are created in virtual storage containers.
Following diagram shows a virtual storage container, defining a cloud storage domain:
34
r
CHAPTER 9
CHALLENGES
35
r
CHAPTER 9
CHALLENGES
Storing the data in cloud is not that simple task. Apart from its flexibility and convenience, it
also has several challenges faced by the consumers. The consumers require ability to:
4. Have access to a documented process for surely disposing of data storage hardware.
36
r
CHAPTER 10
CLOUD COMPUTING
TECHNOLOGY
37
r
CHAPTER 10
1. Virtualization
3. Grid Computing
4. Utility Computing
10.1 Virtualization
Virtualization is a technique, which allows to share single physical instance of an application
or resource among multiple organizations or tenants (customers). It does so by assigning a
logical name to a physical resource and providing a pointer to that physical resource when
demanded.
The Multitenant architecture offers virtual isolation among the multiple tenants and therefore
the organizations can use and customize the application as though they each have its own
instance running.
38
r
10.2 Service-Oriented Architecture (SOA)
Service-Oriented Architecture helps to use applications as a service for other applications
regardless the type of vendor, product or technology. Therefore, it is possible to exchange of
data between applications of different vendors without additional programming or making
changes to services. cloud_computing-service_oriented_architecture
39
r
40
r
REFERENCES
[1] S. M. Metev and V. P. Veiko, Laser Assisted Microtechnology, 2nd ed., R. M.
Osgood, Jr., Ed. Berlin, Germany: Springer-Verlag, 1998.
[2] J. Breckling, Ed., The Analysis of Directional Time Series: Applications to Wind
Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer, 1989, vol.
61.
[3] S. Zhang, C. Zhu, J. K. O. Sin, and P. K. T. Mok, A novel ultrathin elevated channel
low-temperature poly-Si TFT, TMU Electron Device Lett., vol. 20, pp. 569571, Nov. 1999.
[4] M. Wegmuller, J. P. von der Weid, P. Oberson, and N. Gisin, High resolution fiber
distributed measurements with coherent OFDR, in Proc. ECOC00, 2000, paper 11.3.4, p.
109.
[10] A. Karnik, Performance of TCP congestion control with rate feedback: TCP/ABR
and rate adaptive TCP/IP, M. Eng. thesis, Indian Institute of Science, Bangalore, India, Jan.
1999.
[11] J. Padhye, V. Firoiu, and D. Towsley, A stochastic model of TCP Reno congestion
avoidance and control, Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02,
1999.
[12] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specification, TMU Std. 802.11, 1997.
41