You are on page 1of 24

Presentation Of Industrial training done at ISRO

Presented By: Shilpa Suman IT-B Enrol. No. :090464

CONTENTS
1. Introduction to ISRO. 2. Introduction to Cloud Computing 3. Similar systems And Concept Of Cloud Computing 4. Characteristics of Cloud Computing 5. Service Models 6. Deployment Models 7. Architecture Of Cloud Computing 8. Issues

INTRODUCTION
ISRO is an independent Indian Governmental

Organization which is established in November 1969 . The Prime Objective of ISRO is to develop space technology and its application to various national tasks. Vikram Sarabhai is known as the father of Indian space programme. Mr.Madhavan Nair is currently the Chairman of Indian Space Research Organization. Its Head Quarter is in Bangalore. ISROs hardware and services available commercially through Antrix Corporation.

Contd
The various DOS centers of India are:

Contd
ISRO Telemetry, Tracking and Command Network

(ISTRAC)

INSAT Master Control Facility (MCF)


ISRO Inertial Systems Unit (IISU) National Remote Sensing Agency (NRSA) Regional Remote Sensing Service Centers (RRSSC) Physical Research Laboratory (PRL) National

Mesosphere/Stratosphere Radar Facility (NMRF)

Troposphere

INTRODUCTION
The critical factor for the sustainability of an organization: Better resource Utilization Innovative Solution Higher Productivity

Business solutions of various companies were costly. So, for cost cutting cloud computing came into existence.

Contd
The cloud is a metaphor for the internet.

Cloud computing refers to the computation , software and hardware accessing as well as the data storage services where the end user do not need to have the knowledge of physical location and configuration of the system that provides the services.
e.g.- yahoo email, Gmail etc.

SIMILAR SYSTEM & CONCEPTS


The concepts that revolutionized the cloud computing Clustering computing: Here computers are cluster together to form large computer Autonomic Computing: Computer Systems are capable of self- management Grid computing: Computers are plugged in and the users pay for what they use.

CHARACTERISTICS
Cloud computing exhibits the following key characteristics:
Application Programming: REST-based APIs. Cost: almost negligible cost . Device and location independence: end user do not require to

have the knowledge of service provider. virtual.

Virtualization: all platforms provided to the user are completely Multitenancy: enables sharing of resources and costs across a

large pool of users .

Security: is more due to centralization of data.

Maintenance: of cloud computing applications is easier.

SERVICE MODELS
Cloud computing providers offer their services according to three fundamental models: Iaas, Paas & Saas.

Contd
Infrastructure as a service (IaaS):

Cloud providers offer computers as physical or more often as virtual machines. To deploy their applications, cloud users install operating system images on the machines as well as their application software. IaaS Cloud is a platform through which businesses can avail equipment in the form of hardware, servers, storage space etc. at pay-per-use service.

Examples of IaaS include: Amazon Cloud Formation, Rack space Cloud, and Right Scales.

Contd
Platform as a service (PaaS):

In the PaaS model, cloud providers deliver a computing platform and/or solution stack typically including operating system, programming language execution environment, database, and web server.
Application developers can develop and run their software solutions on a cloud platform.

Examples of PaaS include: Amazon Elastic Beanstalk, Heroku, Engine Yard, Google App Engine, and Microsoft Azure.

Contd
Software as a service (SaaS): In this model, cloud providers install and operate application

software in the cloud and cloud users access the software from cloud clients. monthly or yearly flat fee per user.

The pricing model for SaaS applications is typically a

Examples of SaaS include: Google Apps, Quick books Online and Salesforce.com.

Contd
Cloud client :

Users access cloud computing using networked client devices, such as desktop , smart phones , etc. . Some of these devices - cloud clients - rely on cloud computing for all or a majority of their applications so as to be essentially useless without it. Some legacy applications are delivered via a screen-sharing technology.

Examples are thin clients and the browser-based Chrome book.

Contd

DEPLOYMENT MODELS

Contd
Public cloud: Also known as external cloud . Benefits: no wastage resource and easy , inexpensive setup.
E.g. IBM blue cloud, sun cloud etc.

Community cloud: Community cloud shares infrastructure between several organizations from a specific community with common concern.

Contd
Hybrid cloud:

Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. Hybrid clouds lack the flexibility, security and certainty of in-house applications. Private cloud:

Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally.

ARCHITECTURE

Cloud architecture, the system architecture involve multiple cloud components communicating with each other. Inter Cloud is an interconnected global cloud of clouds and an extension of the internet n/w of n/w on which it is based. Cloud engineering is an application of engineering discipline of cloud computing . In this there is a great contribution from diverse areas such as software, web , performance , risk engineering.

Security:

ISSUES

Physical control of the Private Cloud equipment is more secure than

having the equipment off site and under someone elses control.

Legal:

As it can be expected with any revolutionary change in the landscape of

global computing, certain legal issues arise; everything from trademark infringement, security concerns to the sharing of propriety data resources.

Privacy:

Using a cloud service provider (CSP) can complicate privacy of data

because of the extent to which virtualization for cloud processing (virtual machines) and cloud storage are used to implement cloud service.

Abuse:

This includes password cracking and launching attacks using the purchased services . In 2009, a banking Trojan illegally used the popular Amazon service as a command and control channel that issued software updates and malicious instructions to PCs that were infected by the malware.

You might also like