Professional Documents
Culture Documents
A SEMINAR PRESENTATION
ON
CLOUD COMPUTING
JNIT SESSION 2010 2011
CONTENTS
HISTORICAL BACKGROUND
The very first concept for the cloud computing was given by the John McCathy in 1960s. he first gave the statement for the future use of computational techniques as a public utility. With the arrival of the VPN this concept which was modernized in 1966. In year 2007 the most famous organizations such as Google ,IBM etc world wide started research program on cloud computing. Finally in 2008 the first cloud computing system was introduced
Self Healing MultiMulti-tenancy Linearly Scalable Virtualized Pay per use Device & Location Independence
ITS ARCHITECTURE
FRONT END It can be end user or client or any application (i.e. web browser etc.) which is using cloud services. It is the side at which the user of the computer or the client himself is able to access. This involves the clients network or his computer and the program or programs that he uses to access the database or the servers that contain all the data BACK END It is the network of servers with any computer program and data storage system. It is the cloud itself, which is the collection of all related information saved in the servers that the client wishes to have access to.
These two ends of cloud computing architecture are connected through a network, usually the Internet, to provide remote access to all the users of the cloud.
PUBLIC CLOUD
A service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. Examples of public clouds include Amazon Elastic Compute Cloud (EC2), IBM's Blue Cloud, Sun Cloud, Google App Engine and Windows Azure Services Platform.
PRIVATE CLOUD
Computing architecture is dedicated to the customer and is not shared with other organisations. Private clouds are built for the exclusive use of one client, providing the utmost control over data, security, and quality of service They are expensive and are considered more secure than Public Clouds. Private clouds operate inside the firewall and are built upon virtualization software such as VMware or Xen
HYBRID CLOUD
Hybrid clouds combine both public and private cloud models Like the private model, a hybrid cloud lets an organization continue to use their existing data center equipment and keep sensitive data secured on the organization's own network. like the public cloud, a hybrid model lets an organization take advantage of a cloud's almost unlimited scalability. It's a way to solve some of the trust issues of the public cloud while getting the public cloud's benefits.
COMMUNITY CLOUD
The cloud infrastructure is shared between the organizations of the same community. Like, all the government agencies in a city can share the same cloud but not the non government agencies. Examples of community cloud include Googles Gov Cloud.
SOFTWARE AS A SERVICE
It is software, available on demand and offered by a third party provider, configurable remotely via the internet.
Examples CRM Financial Planning Word processing online spreadsheet tools Commercial Services Salesforce.com emailcloud
PLATFORM AS A SERVICE
It allows customers to use the platform to develop new applications using APIs, which can be deployed and configured remotely. The platform offers development tools and configuration management. Platforms are built upon Infrastructure, which is expensive. PaaS offers the potential for general developers to build web applications without needing specialized expertise
INFRASTRUCTURE AS A SERVICE
This provides abstracted hardware, virtual machines and operating systems, which are controllable through a service API. Access to infrastructure stack: Full OS access Firewalls Routers Load balancing
PRIVACY Because of using common platform, and shared data, some security and user identification software has to be used. Service provider has to make users data secure.
AVAILABILITY & PERFORMANCE Your all data is online. If you can not reach your data, you can not work . Your service provider has to be accessible all time
UNAUTHORISED ACCESS Data's must be accessible to right people Rules regarding access to data. Encryption. PHUSICAL RISKS Data can be physically destroyedby natural disasters. Proper backup must be taken. PHYSICAL SECURITY Service provider has to be aware of their worker Data leakage must be prevent.
CONCLUSION
Its is a powerful new abstraction for large scale data processing systems which is scalable, reliable, cut costs and available. Have large self-managed server. Its particularly valuable to small and medium businesses to obtain more productivity without spending lots of money on in-house resources and technical equipment. Every model of cloud computing allows organizations to use -- and pay for services which employees actually need. With the right middleware, a cloud computing system could execute all the programs a normal computer could run from generic word processing software to customized computer programs designed for a specific company .
THANK YOU