Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore MCA643 CU-MCA-Cloud Computing

MCA643 CU-MCA-Cloud Computing

Published by kuljeet.singh, 2021-01-04 06:28:16

Description: MCA643 CU-MCA-Cloud Computing

Search

Read the Text Version

MASTER OF COMPUTER APPLICATIONS SEMESTER II CLOUD COMPUTING MCA643 1 CU IDOL SELF LEARNING MATERIAL (SLM)

CHANDIGARH UNIVERSITY Institute of Distance and Online Learning Course Development Committee Chairman Prof. (Dr.) Parag Diwan Vice Chancellor, Chandigarh University, Gharuan, Punjab Advisors Prof. (Dr.) Bharat Bhushan, Director – IGNOU Prof. (Dr.) Majulika Srivastava, Director – CIQA, IGNOU Programme Coordinators & Editing Team Master of Business Administration (MBA) Bachelor of Business Administration (BBA) Coordinator – Dr. Rupali Arora Coordinator – Dr. Simran Jewandah Master of Computer Applications (MCA) Bachelor of Computer Applications (BCA) Coordinator – Dr. Raju Kumar Coordinator – Dr. Manisha Malhotra Master of Commerce (M.Com.) Bachelor of Commerce (B.Com.) Coordinator – Dr. Aman Jindal Coordinator – Dr. Minakshi Garg Master of Arts (Psychology) Bachelor of Science (Travel &Tourism Management) Coordinator – Dr. Samerjeet Kaur Coordinator – Dr. Shikha Sharma Master of Arts (English) Bachelor of Arts (General) Coordinator – Dr. Ashita Chadha Coordinator – Ms. Neeraj Gohlan Academic and Administrative Management Prof. (Dr.) R. M. Bhagat Prof. (Dr.) S.S. Sehgal Executive Director – Sciences Registrar Prof. (Dr.) Abhishek Prof. (Dr.) Inderpreet Kaur Executive Director – Management Director – IDOL Prof. (Dr.) Manaswini Acharya Executive Director – Liberal Arts © No part of this publication should be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording and/or otherwise without the prior written permission of the authors and the publisher. SLM SPECIALLY PREPARED FOR CU IDOL STUDENTS Printed and Published by: SCHOOLGURU EDUSERVE PVT LTD B-903, Western Edge II, Western Express Highway, Borivali (E), Mumbai - 400066 Call Us: +91 22 4896 8005 Mail Us: [email protected] For: CHANDIGARH UNIVERSITY Institute of Distance and Online Learning 2 CU IDOL SELF LEARNING MATERIAL (SLM)

First Published in 2020 All rights reserved. No Part of this book may be reproduced or transmitted, in any form or by any means, without permission in writing from Chandigarh University. Any person who does any unauthorized act in relation to this book may be liable to criminal prosecution and civil claims for damages. This book is meant for educational and learning purpose. The authors of the book has/have taken all reasonable care to ensure that the contents of the book do not violate any existing copyright or other intellectual property rights of any person in any manner whatsoever. In the even the Authors has/ have been unable to track any source and if any copyright has been inadvertently infringed, please notify the publisher in writing for corrective action. 3 CU IDOL SELF LEARNING MATERIAL (SLM)

CONTENT Unit 1: Cloud Computing Fundamentals 1 .................................................................................5 Unit 2: Cloud Computing Fundamentals 2 ...............................................................................24 Unit 3: Cloud Service Management 1 ........................................................................................45 Unit 4: Cloud Service Management 2 ........................................................................................64 Unit 5: Microsoft Azure 1 ............................................................................................................82 Unit 6: Microsoft Azure 2 ............................................................................................................97 Unit 7: Resource Management ..................................................................................................117 Unit 8: Virtualization..................................................................................................................132 Unit 9: Traffic Manager .............................................................................................................162 Unit 10: Data Management ........................................................................................................174 Unit 11: Cloud Storage ...............................................................................................................191 4 CU IDOL SELF LEARNING MATERIAL (SLM)

UNIT 1: CLOUD COMPUTING FUNDAMENTALS 1 Structure 1.0. Learning Objectives 1.1. Introduction 1.2. Cloud Computing Paradigm 1.3. Cloud Computing-Definition and Concepts 1.4. History of cloud computing 1.5. Benefits 1.6. Risks Related to Cloud Computing 1.6.1 Security and Privacy 1.6.2 Lock In 1.6.3 Isolation Failure 1.6.4 Management Interface Compromise 1.6.5 Insecure or Incomplete Data Deletion 1.7. Characteristics of Cloud Computing 1.7.1 On Demand Self Service 1.7.2 Broad Network Access 1.7.3 Resource Pooling 1.7.4 Rapid Elasticity 1.7.5 Measured Service 1.8. NIST Model 1.9. Types of Cloud Computing: Public, Private, Hybrid, Community 1.10.Service Models 1.11.Summary 1.12.Key Words/Abbreviations 1.13.Learning Activity 1.14.Unit End Questions (MCQ and Descriptive) 1.15.References 1.0 LEARNING OBJECTIVES At the end of the unit learner will able to learn and have knowledge of following aspects of 5 Cloud Computing: CU IDOL SELF LEARNING MATERIAL (SLM)

 Introduction to Cloud Computing  Learning NIST Model  Introduction to Types of Cloud Computing  NIST Model 1.1 INTRODUCTION In the past decade, information technology (IT) has embarked on the cloud computing paradigm. Although cloud computing is only a different way to deliver computer resources, rather than a new technology, it has sparked a revolution in the way organizations provide information and service. Originally IT was dominated by mainframe computing. This sturdy configuration eventually gave way to the client-server model. Contemporary IT is increasingly a function of mobile technology, pervasive or ubiquitous computing, and of course, cloud computing. But this revolution, like every revolution, contains components of the past from which it evolved. Thus, to put cloud computing in the proper context, keep in mind that in the DNA of cloud computing is essentially the creation of its predecessor systems. In many ways, this momentous change is a matter of “back to the future” rather than the definitive end of the past. In the brave new world of cloud computing, there is room for innovative collaboration of cloud technology and for the proven utility of predecessor systems, such as the powerful mainframe. This veritable change in how we compute provides immense opportunit ies for IT personnel to take the reins of change and use them to their individual and institutional advantage. 1.2 CLOUD COMPUTING PARADIGM In Cloud Computing scalable resources square measure provisioned dynamically as a service over web so as to assure innumerable financial advantages to be scattered among its adopters. completely different layers square measure printed supported the sort of services provided by the Cloud. Moving from bottom to prime, bottom layer contains basic hardware resources like Memory, Storage Servers. thus, it's denoted as Infrastructure-as-a- Service (IaaS). The distinguished samples of IaaS square measure Amazon simple Storage Service (S3) and Amazon Elastic reason Cloud (EC2). The layer on top of IaaS is Platform- 6 CU IDOL SELF LEARNING MATERIAL (SLM)

as-a-Service (PaaS) that primarily supports readying and dynamic scaling of Python and Java primarily based applications. One such Associate in Nursing example of PaaS is Google App Engine. On prime of PaaS, a layer that provides its customers with the potential to use their applications mentioned as Software-as-a-Service (SaaS). SaaS supports accessing user’s applications through a browser while not the data of Hardware or package to be put in. This approach has been tested to be a universally accepted and trusty service. web and Browser square measure the 2 elements needed to access these Cloud services. IaaS applications access needs a lot of web information measure whereas browser is also ample with cheap web information measure is ample to access SaaS and PaaS applications. The word “cloud” was an expression for everything that was on the far side the information center or out on the network. There square measure many definitions of a cloud assumed by completely different classes of cloud users. it's principally represented as package as a service, wherever users will access a package application on-line, as in Salesforce.com, Google Apps and Soho. it's additionally represented as within the style of infrastructure as a service, wherever a user doesn't own infrastructure however and rents it over time on a server and accesses through a website like Amazon Elastic reason Cloud (EC2). Another style of a Cloud is Platform as a service within which bound tools square measure created obtainable to create package that runs within the host cloud. primarily a cloud is constructed over variety of the information centers, that reflects the Web’s context for loosely coupled systems (i.e. 2 systems don’t fathom every other), and provides the flexibility to own virtualized remote servers through commonplace net services to own giant computing power. Cloud paradigm additionally is a business model except technology. Through the business model, the cloud makes a brand-new style of computing wide obtainable at lower costs that might are thought-about not possible 1.3 CLOUD COMPUTING-DEFINITION AND CONCEPTS What is Cloud? The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over public and private networks, i.e., WAN, LAN or VPN. 7 CU IDOL SELF LEARNING MATERIAL (SLM)

Applications such as e-mail, web conferencing, customer relationship management (CRM) execute on cloud. What is Cloud Computing? Cloud Computing refers to manipulating, configuring, and accessing the hardware and software resources remotely. It offers online data storage, infrastructure, and application. Figure 1.1 Cloud Computing Cloud computing offers platform independency, as the software is not required to be installed locally on the PC. Hence, the Cloud Computing is making our business applications mobile and collaborative. 1.4 HISTORY OF CLOUD COMPUTING The construct of Cloud Computing came into existence within the year 1950 with implementation of mainframe computers, accessible via thin/static purchasers. Since then, cloud computing has been evolved from static purchasers to dynamic ones and from computer code to services. the subsequent diagram explains the evolution of cloud computing: 8 CU IDOL SELF LEARNING MATERIAL (SLM)

Figure 1.2 History of Cloud Computing 1.5 BENEFITS Cloud Computing has various blessings. a number of them are listed below -  One will access applications as utilities, over the web.  One will manipulate and set up the applications on-line at any time.  It doesn't need to put in a computer code to access or manipulate cloud application.  Cloud Computing offers on-line development and readying tools, programming runtime setting through PaaS model.  Cloud resources are accessible over the network during a manner that offer platform freelance access to any sort of purchasers.  Cloud Computing offers on-demand self-service. The resources are used while not interaction with cloud service supplier.  Cloud Computing is extremely value effective as a result of it operates at high potency with optimum utilization. It simply needs an online affiliation  Cloud Computing offers load equalisation that produces it additional reliable. 9 CU IDOL SELF LEARNING MATERIAL (SLM)

Figure 1.3 Benefits 1.6 RISKS RELATED TO CLOUD COMPUTING Although cloud Computing is a promising innovation with various benefits in the world of computing, it comes with risks. Some of them are discussed below: 1.6.1 Security and Privacy It is the biggest concern about cloud computing. Since data management and infrastructure management in cloud is provided by third-party, it is always a risk to handover the sensitive information to cloud service providers. Although the cloud computing vendors ensure highly secured password protected accounts, any sign of security breach may result in loss of customers and businesses. 1.6.2 Lock In It is very difficult for the customers to switch from one Cloud Service Provider (CSP) to another. It results in dependency on a particular CSP for service. 10 CU IDOL SELF LEARNING MATERIAL (SLM)

1.6.3 Isolation Failure This risk involves the failure of isolation mechanism that separates storage, memory, and routing between the different tenants. 1.6.4 Management Interface Compromise In case of public cloud provider, the customer management interfaces are accessible through the Internet. 1.6.5 Insecure or Incomplete Data Deletion It is possible that the data requested for deletion may not get deleted. It happens because either of the following reasons  Extra copies of data are stored but are not available at the time of deletion  Disk that stores data of multiple tenants is destroyed. 1.7 CHARACTERISTICS OF CLOUD COMPUTING There are four key characteristics of cloud computing. They are shown in the following diagram: 11 CU IDOL SELF LEARNING MATERIAL (SLM)

Figure 1.4 characteristics of cloud computing 1.7.1 On Demand Self Service Cloud Computing allows the users to use web services and resources on demand. One can logon to a website at any time and use them. 1.7.2 Broad Network Access Since cloud computing is completely web based, it can be accessed from anywhere and at any time. 1.7.3 Resource Pooling Cloud computing allows multiple tenants to share a pool of resources. One can share single physical instance of hardware, database and basic infrastructure. 1.7.4 Rapid Elasticity It is very easy to scale the resources vertically or horizontally at any time. Scaling of resources means the ability of resources to deal with increasing or decreasing demand. 12 CU IDOL SELF LEARNING MATERIAL (SLM)

The resources being used by customers at any given point of time are automatically monitored. 1.7.5 Measured Service In this service cloud provider controls and monitors all the aspects of cloud service. Resource optimization, billing, and capacity planning etc. depend on it. 1.8 NIST CLOUD COMPUTING Although, National Institute of Standards and Technology is attributable with having the foremost compact and correct definition of Cloud Computing, the term itself was initial coined nearly fifteen years previous once Netscape’s application was massive news. In 2011, National Institute of Standards and Technology outlined cloud computing as a model for facultative omnipresent, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) which will be chop-chop provisioned and discharged with least management effort or service supplier interaction. This short description is meant to function a method for broad comparisons of cloud services and preparation methods whereas providing a baseline for discussion on the best uses for cloud computing. NISTs definition known self-service, accessibility from desktops, laptops, and mobile phones, resources that square measure pooled among multiple users and applications, elastic resources which will be chop-chop reapportioned pro re nata, and measured service because the 5 essential characteristics of cloud computing. once these characteristics square measure combined, they produce cloud computing infrastructure that contains each a physical layer associate degreed an abstraction layer. The physical layer consists of hardware resources that support the cloud services (i.e. servers, storage and network components). The abstraction layer consists of the code deployed across the physical layer, thereby expressing the essential characteristics of the cloud per NISTs definition. 13 CU IDOL SELF LEARNING MATERIAL (SLM)

Figure 1.5 NIST Cloud Computing 1.9 TYPES OF CLOUD COMPUTING: PUBLIC, PRIVATE, HYBRID, COMMUNITY Basic Concepts There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing:  Deployment Models  Service Models Deployment Models Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can have any of the four types of access: Public, Private, Hybrid, and Community. 14 CU IDOL SELF LEARNING MATERIAL (SLM)

Figure 1.6 Deployment Models Public Cloud Although, agency is attributable with having the foremost compendious and correct definition of Cloud Computing, the term itself was 1st coined nearly fifteen years previous once Netscape’s application was huge news. In 2011, agency outlined cloud computing as a model for sanctioning omnipresent, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) which will be speedily provisioned and discharged with lowest management effort or service supplier interaction. This short description is meant to function a way for broad comparisons of cloud services and preparation methods whereas providing a baseline for discussion on the best uses for cloud computing. NISTs definition known self-service, accessibility from desktops, laptops, and mobile phones, resources that square measure pooled among multiple users and applications, elastic resources which will be speedily reapportioned PRN, and measured service because the 5 essential characteristics of cloud computing. once these characteristics square measure combined, they produce cloud computing infrastructure that contains each a physical layer associate degreed an abstraction layer. The physical layer consists of hardware resources that support the cloud services (i.e. servers, storage and network components). The abstraction layer consists of the software system deployed across the physical layer, thereby expressing the essential characteristics of the cloud per NISTs definition Private Cloud The private cloud allows systems and services to be accessible within an organization. It is more secured because of its private nature. 15 CU IDOL SELF LEARNING MATERIAL (SLM)

Private cloud computing is a deployment model that is purchased and dedicated to a single client or company in a single-tenant environment where the hardware, storage and network assume the highest levels of security. Data that is stored in the private clouds data centre cannot be accessed by anyone other than the client that owns it. This is a great solution for organizations that feel as though their data is too sensitive or valuable to put on a public, community or hybrid cloud. The private cloud also gives administrators the ability to automate their data centre thereby minimizing manual provisioning and management which is incredibly important for safe and secure day-to-day operations to flourish. Better yet, the private cloud is a great solution for firms wishing to stay PCI and HIPAA compliant as this model allows sensitive data to be delivered through a fully private cloud deployment within the network configurations that only they own. Figure 1.7 Private Cloud Community Cloud 16 CU IDOL SELF LEARNING MATERIAL (SLM)

The community cloud allows systems and services to be accessible by a group of organizations. NIST defines a community cloud deployment model as one that is used exclusively by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. This multi-tenant platform allows several companies work on the same platform if they share similar needs and concerns. Community clouds allows companies to collaborate on joint projects, applications, or research in a secure setting. This is deployment model is great for organizations that need to test-drive their high-end security products that are driven by compliance and regulatory measures. Hybrid Cloud The hybrid cloud is a mixture of public and private cloud, in which the critical activities are performed using private cloud while the non-critical activities are performed using public cloud. Hybrid cloud deployment models are a collaboration of private and public cloud models in a single environment. Hybrid clouds are comprised of parallel environments where applications can easily move between private and public clouds. Hybrid clouds are bound together by proprietary technology that enables data and application portability. Hybrid clouds offers more IT teams more flexibility, portability, and scalability than other deployment models which is the main reason why 58% of global enterprises have integrated a hybrid cloud architecture in their IT infrastructure. Companies that are constantly transitioning between managing public cloud projects and building applications of a sensitive nature on their private cloud is likely to seek out a hybrid cloud solution. 1.10 SERVICE MODELS Cloud computing is based on service models. These are categorized into three basic service models which are -  Infrastructure-as–a-Service (IaaS)  Platform-as-a-Service (PaaS) 17 CU IDOL SELF LEARNING MATERIAL (SLM)

 Software-as-a-Service (SaaS) Anything-as-a-Service (XaaS) is yet another service model, which includes Network-as-a- Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a- Service. The Infrastructure-as-a-Service (IaaS) is the most basic level of service. Each of the service models inherits the security and management mechanism from the underlying model, as shown in the following diagram: Figure 1.8 Cloud Clients Platform as a Service (PaaS): PaaS may be a preparation and development platform for applications provided as a service to developers over the online. Third party renders develop and deploy software package or applications to the tip users through net and servers. the price and complexness of development and preparation of applications is reduced to a good extent by developers by victimization this service. therefore, the developers will cut back the price of shopping for and cut back the complexness of managing the desired Infrastructure. It provides all of the services needed to create and deliver internet the online the net} services to support the entire life cycle of web applications entirely from the web. This platform consists of infrastructure software package, databases, middleware, and development tools. 18 CU IDOL SELF LEARNING MATERIAL (SLM)

Infrastructure as a Service (IaaS): may be a delivery model related to Hardware and software package as a service. Hardware like Storage, server and network beside supporting software package like software package, virtualization technology and classification system. It is an evolution of ancient hosting to permit users to produce resources on demand and while not need any long-run commitment. totally different from PaaS services, the IaaS supplier will little management of knowledge apart from to stay the info center operational. preparation and managing of the software package services should be done by the tip users even as the means they might in their own information center. Software as a service (SaaS): SaaS permits access to programs to sizable number of users all the means through browser. For a user, this could avoid wasting value on software package and servers. For Service provider’s, they solely ought to maintain one program, this could conjointly save house and price. Naturally, a SaaS supplier offers access to applications to multiple shoppers and users over net by hosting and managing the given application in their or chartered datacenters. SaaS suppliers conjointly run their applications on platforms and infrastructure provided by different cloud suppliers. 1.11 SUMMARY  Delivery of Information and Communication Technologies (ICT) services as a utility has recently received significant consideration through Cloud computing. Cloud computing technologies will provide scalable on demand pay per use services to customers through distributed data centers. Still this paradigm is its infant stage and many challenging issues have to be addressed. Accordingly, in this chapter, firstly cloud computing paradigm basics are introduced and various cloud computing services are discussed subsequently.  Today, cloud computing has quickly become a buzzword not only in the IT industry but also in other sectors, such as banking, finance, education, health, utilities, airlines, retail, real estate, and telecom. Actually, many e-commerce activities have been utilizing many cloud applications one way or the other. However, when people encounter the definition of “cloud computing,” they are often puzzled or confused because there are so many different definitions. According to the research of Luis M. Vaquero et al., there were over 22 different definitions in 2008 alone. People often ask, “What does cloud computing really mean?” The common answer is again very tactful: “It is really dependent on what you 19 CU IDOL SELF LEARNING MATERIAL (SLM)

mean.” The answer actually indicates the subjectiveness of the cloud definition and the broad spectrum of meanings for the cloud.  When people talk about the cloud-computing paradigm, they often have different purposes in mind. Thus, the term “cloud” inevitably covers so many aspects of computing. It signifies that the entire IT industry is transforming from a physical world towards a virtual world. It is not just an incremental change. It is the latest profound transformation for the IT industry. 1.12 KEY WORDS/ABBREVIATIONS  Artificial intelligence (AI): The capability of a computer system to imitate human intelligence. Using math and logic, the computer system simulates the reasoning that humans use to learn from new information and make decisions  Business analytics tools: Tools that extract data from business systems and integrate it into a repository, such as a data warehouse, where it can be analysed.  Business intelligence (BI) tools: Tools that process large amounts of unstructured data in books, journals, documents, health records, images, files, email, video and so forth, to help you discover meaningful trends and identify new business opportunities.  Cloud: A metaphor for a global network, first used in reference to the telephone network and now commonly used to represent the Internet. Learn more about the cloud.  Cloud bursting: A configuration which is set up between a private cloud and a public cloud. If 100 percent of the resource capacity in a private cloud is used, then overflow traffic is directed to the public cloud using cloud bursting.  Cloud computing: A delivery model for computing resources in which various servers, applications, data and other resources are integrated and provided as a service over the Internet. Resources are often virtualised. 1.13 LEARNING ACTIVITY 1. Make a group of four and draw a differentiation chart on various types of Cloud computing _____________________________________________________________________________ _____________________________________________________________________________ 20 CU IDOL SELF LEARNING MATERIAL (SLM)

2. Discuss the implementation factors of NIST model in the organization. _____________________________________________________________________________ _____________________________________________________________________________ 1.14 UNIT END QUESTIONS (MCQ AND DESCRIPTIVE) A. Descriptive Questions 1. Explain what is cloud computing? 2. Describe the benefits of cloud computing 3. What is a cloud? Explain. 4. State the different data types used in cloud computing. 5. Discuss different types of Cloud Computing. B. Multiple Choice Questions 1. _________ computing refers to applications and services that run on a distributed network using virtualized resources. a) Distributed b) Cloud c) Soft d) Parallel 2. ________ as a utility is a dream that dates from the beginning of the computing industry itself. a) Model b) Computing c) Software d) All of the mentioned 3. Which of the following cloud concept is related to pooling and sharing of resources? a) Polymorphism b) Abstraction c) Virtualization d) None of the mentioned 21 CU IDOL SELF LEARNING MATERIAL (SLM)

4. ________ has many of the characteristics of what is now being called cloud computing. a) Internet b) Software c) Web Service d) All of the mentioned 5. Which of the following can be identified as cloud? a) Web Applications b) Intranet c) Hadoop d) All of the mentioned Answer 1. b 2. b 3. c 4. a 5. c 1.15 REFERENCES  https://in.pcmag.com/networking-communications-software/38970/what-is-cloud- computing  Buyya Rajkumar, Vecchiola Christian, ThamaraiSelvi S. (2013). Mastering Cloud Computing. New Delhi: Tata McGraw-Hill.  Jayaswal K., Kallakuruchi J., Houde D.J., Shah D. (2014). Cloud Computing: Black Book. New Delhi: Dreamtech Press.  Buyya Rajkumar, Broberg James, Goscinski A.M., Wile (Editors). (2011). Cloud Computing: Principles and Paradigm. New Jersey: John Willy & Sons Inc.  Microsoft Documents: https://docs.microsoft.com/en-us/azure/  https://channel9.msdn.com/Azure  The NIST Definition of Cloud Computing NIST  Wang (2012). \"Enterprise cloud service architectures\". Information Technology and Management. 13 (4): 445–454. doi:10.1007/s10799-012-0139-4. S2CID 8251298.  \"What is Cloud Computing?\". Amazon Web Services. 2013-03-19. Retrieved 2013-03- 20.  Baburajan, Rajani (2011-08-24). \"The Rising Cloud Storage Market Opportunity Strengthens Vendors\". It.tmcnet.com. Retrieved 2011-12-02. 22 CU IDOL SELF LEARNING MATERIAL (SLM)

 Oestreich, Ken (2010-11-15). \"Converged Infrastructure\". CTO Forum. Thectoforum.com. Archived from the original on 2012-01-13. Retrieved 2011-12-02.  Ted Simpson, Jason Novak, Hands on Virtual Computing, 2017, ISBN 1337515744, p. 451 23 CU IDOL SELF LEARNING MATERIAL (SLM)

UNIT 2: CLOUD COMPUTING FUNDAMENTALS 2 Structure 2.0. Learning Objectives 2.1. Introduction 2.2. Layered Architecture of Cloud Computing 2.3. Cloud Service Management Layer 2.4. Datacentres Layer 2.5. Difference between Client Server Architecture and Cloud Computing 2.6. Pros of Cloud Computing 2.7. Cons of Cloud Computing 2.8. Summary 2.9. Key Words/Abbreviations 2.10.Learning Activity 2.11.Unit End Questions (MCQ and Descriptive) 2.12.References 2.0 LEARNING OBJECTIVES At the end of the unit learner, will able to learn and have knowledge of following aspects of Cloud Management and Administration:  Introduction to Layered Architecture of Cloud Computing  Difference between Cloud Computing and Client Server Architecture  Advantages and Disadvantages of Cloud Computing 2.1 INTRODUCTION The term Cloud Computing appears in Google search nearly 54 million times. But the Cloud remains to be this elusive entity to the general population. Those who fit into this category either see cloud-based computing as this near-magical technology that whisks your data into another dimension for you to summon at a moment’s notice at your beck and call (which sounds pretty wizard-like). For those who work with the technology daily and understand its capabilities, the technology is much more simplistic than others would make it seem, even though it does have some technical nuances. 24 CU IDOL SELF LEARNING MATERIAL (SLM)

These nuances can sometimes create confusion as to which category of cloud infrastructure an individual or organization should utilize to fit their data storage or migration needs. Thankfully, the National Institute of Standards and Technology (NIST) has comprehensively outlined the definition of Cloud Computing in their September 2011 publication for IT professionals to get a better understanding of each category of cloud platform. This highly technical topic that goes along with NISTs definition of cloud computing is enough to turn any mortals brain to mush, so were going to break it all down for you in an easy-to-digest format using language that even your non-technical parents can appreciate. 2.2 LAYERED ARCHITECTURE OF CLOUD COMPUTING Figure provides a High-Level Architecture of a cloud computing architecture along with the security issues at different layers. This section elaborates functionalities performed at different layers and also the security requirements at different layers. User Layer Different types of users like customers, application programmers, and administrators interact with cloud software through the user layer. This layer consists of two sub layers. Application Sub Layer: The cloud applications area unit visible through the user layer to the end- users of the cloud. Normally, the applications area unit accessed through net portals by the users and from time to time needed to pay quantity to use them. The overhead of package maintenance is finished by this sub layer and conjointly the continuing operation and support prices. what is more, it moves the computing tasks from the user terminal to servers within the Datacenters wherever the cloud applications area unit deployed. This successively minimizes the wants on the hardware needed from the user’s purpose of read, and permits them to realize higher performance. This approach supports economical process of CPU-intensive and memory-intensive workloads of the users with none immense capital investments in their native machines. 25 CU IDOL SELF LEARNING MATERIAL (SLM)

Figure 2.1 User Layer Thus, this sub layer even simplifies the work with relation to code up gradation and testing, whereas protective their belongings from the service suppliers’ purpose of read. Developers will add new options through patches simply while not distributing the top users because the cloud application is deployed at the provider’s computing infrastructure instead of at the user machines. Configuration associate degreed testing of an application square measure simpler victimization this sub layer practicality, since the readying surroundings becomes restricted within the provider’s datacenter. in terms of profits margin to the supplier, continuous flow of revenue is equipped through this sub layer, that brings a lot of profits over an amount of your time. In spite of all the {advantages the advantages} and advantages of this sub layer practicality, variety of readying problems hinder with its broad acceptance. a lot of specifically, the safety of the cloud applications square measure the 2 major challenges that has direct impact 26 CU IDOL SELF LEARNING MATERIAL (SLM)

on Service Level Agreements (SLAs). additionally, managing the provision may be an autarchy that suppliers and users of SaaS must cope with because of potential network outage and system failures. to boot, the migration of the user knowledge and integration of bequest applications to the cloud is another challenge that's additionally long for the adoption of SaaS. Programming surroundings Sub Layer: The users of this layer square measure cloud application developers chargeable for development and readying of applications on to the cloud. The cloud service suppliers support development surroundings with necessary set of outlined genus Apis. Developers move with the environments through the out their genus Apis, that accelerates the readying and support the with measurability support. Google’s App Engine is one in every of the instance systems during this class, that supports python runtime surroundings and genus Apis for to move with Google’s cloud runtime surroundings. Through this approach implementation of automatic scaling and cargo equalization becomes straightforward for the developers in developing their cloud application for a cloud programming surroundings. Through this approach integration with alternative services (e.g. email, authentication, user interface) with PaaS-provider becomes straightforward. Hence, to an oversized extent the extra effort needs to develop cloud applications may be reduced and is managed at the surroundings level. additionally, the developers possess the potential of integration the opposite services with the applications as and once necessary. This leads to creating the event of a cloud application an easy task and additionally speed up the event time. during this affiliation, Hadoop supports readying surroundings on the cloud would be thought-about as cloud programming, because the application developers square measure offered with a development surroundings that is additionally referred as Map/Reduce framework for the cloud. the method of the event of cloud applications becomes straightforward through these cloud computer code development environments. 2.3 CLOUD SERVICE MANAGEMENT LAYER This layer provides management of the applications and virtualized infrastructure for business solutions. This layer is chargeable for providing virtualized resources for services like service level management, policy management metered usage, license management, and disaster recovery. This layer supports scaling of applications through dynamic provisioning 27 CU IDOL SELF LEARNING MATERIAL (SLM)

by allocating the resources to applications on demand leads to minimizing the underutilization of resources. Key elements of Cloud Service Management layer square measure listed below. SLA Monitor: once a client initial submits the service request, the requests square measure understood by the SLA Monitor to judge QoS necessities to work out whether or not to just accept or reject the request. it's additionally accountable to watch the progress of the submitted job. If any violation of the SLA is ascertained by the SLA monitor, it's to act now for corrective action. Resource Provisioning: availableness of VMs and resource necessities square measure tracked through this mechanism. It manages the various requests coming back to the virtual servers by the creation of multiple copies of VMs. The resource victualer is self-adjusted dynamically such the process is completed as per the necessities even at peak masses. Sequencer & Scheduler: supported the data from SLA Monitor and Resource Provisioning, the sequencer arranges or prioritizes the roles supported objectives of service supplier. hardware makes effective resource allocation by having the newest standing info from the Resource Provisioning relating to resource availableness and work process. Dispatcher: The resources chosen and appointed by the hardware to the method square measure controlled by this module. It involves shift of context, shift of user, hopping to the right location within the user program to restart that program, dispatch latency (i.e. the time needed by the dispatcher to prevent and begin a process). it's additionally chargeable for the beginning of the execution of chosen service requests on to the allotted Virtual Machines. Accounting: It maintains a record of the particular resource’s usage by service requests so as to reason the ultimate value and charge the users. additionally, resource allocation selections will be improved through the employment of historical usage info. Metering: asking of the users relies on the usage of the system. Usually, asking relies on the usage of mainframe per hour or rate of knowledge transfer per hour. This mechanism additionally provides info concerning valuation policies and differing kinds of services to client. The client needs to choose the extent or quality of service by providing QoS service necessities while not the necessity to understand however cloud provides the service. 28 CU IDOL SELF LEARNING MATERIAL (SLM)

Load Balancer: This mechanism contains algorithms for mapping virtual machines onto physical machines in a very cloud computing setting, for characteristic the idle virtual machines and for migrating virtual machines to different physical nodes. Whenever a user submits associate application work into cloud system, one will produce a brand-new virtual machine. currently the mapping algorithmic rule of Load balancer can generate a virtual machine placement theme, assign necessary resources to that and deploy the virtual machine on to the known physical resource. Unmanaged and forgotten virtual machines will consume Datacenter resources and cause energy waste. Another algorithmic rule of Load balancer can establish idle virtual machines and shut them off. within the method of optimally putting the virtual machine onto the destination, we'd like to relocate the present virtual machines. For doing this operation, virtual machine migration algorithmic rule of load balancer is invoked. In outline Load Balancer can have the subsequent 3 sub modules.  Migration Manager: It triggers live migration of VMs on to physical servers depending on information provided by the VM Mapper. It turns a server ‘on’ or ‘off’.  Monitoring Service: This module collects parameters like status of application, workload, utilization of resources, power consumption etc. This service works like global information provider that provides monitoring data to support intelligent actions taken by VM mapper. The status information is utilized to arrest the sprawl of unmanaged and forgotten virtual machines.  VM Mapper: This algorithm optimally maps the incoming workloads (VMs) on to the available physical machines. It collects the information from monitoring Service time to time and makes decision on the placement of virtual machines. The VM mapper searches the optimal placement by a genetic algorithm provided in the next chapter. Policy Management: it's necessary for organizations to outline clear and unambiguous definitions of governance, policy (i.e. regulatory), security, privacy etc to create certain that SLAs aren't desecrated once applications square measure operated on the cloud. so as to affect business inside a cloud, cloud shoppers and suppliers square measure to be aligned on bonded SLAs and equivalent evaluation models. because the cloud capabilities square measure being improved (such as virtual provide chains) policy-driven interactions that 29 CU IDOL SELF LEARNING MATERIAL (SLM)

square measure absolutely abstracted have to be compelled to be supported across clouds. it's become a main challenge for the cloud suppliers in modeling and increasing policies so as to produce integrated services across distributed and heterogeneous business processes and infrastructure. Policy management has conventionally been fastened inside and across organization boundaries of enterprise IT platforms and applications. Hence, globally enlargement of companies needs applying new strategies to mix and complement the policies inside and across external method networks and worth chains. Advance Resource Reservation Monitor: this is often the mechanism to ensure QoS in accessing resources across Datacenters. By reserving resources earlier, users square measure able to complete applications that square measure vital with reference to time like parallel work flow applications that square measure Realtime in nature need variety of resources in close to future to run. The prediction of future demand and usage are often done by the supplier a lot of accurately. With this info, the supplier will maximize revenue at numerous times to by applying policy management to see evaluation. Users can able to decide earlier in resource reservation as per the wants and web expenses as these prices square measure heralded earlier. To with success arrange and manage their operations it's essential for the enterprises to possess previous information of expected prices. bonded provide of resources conjointly helps enterprises to ponder and target future enlargement a lot of accurately and with confidence. Hence, enterprises be able to rescale or scale down their resource reservations supported short, medium- term, and long-run commitments. Security Associate in Nursing Identity Management: Cloud environments should management an identity and security infrastructure so as to modify elastic provisioning and to implement security policies across the clouds. it's necessary to regulate and make sure that sensitive info is protected against SLAs, as resource provisioning is finished outside the enterprise’s legal boundaries by the cloud supplier. the problems that require to be addressed by the cloud supplier before convincing the tip users to migrate from desktop applications to cloud applications square measure safety and security of confidential information keep on the cloud. conjointly the opposite problems square measure user’s authentication and authorization, up-time or down time and performance of the applications. Finally, information backup and disaster recovery to produce reliable SLAs for his or her cloud services. Autonomic Management: every part within the cloud service design is embraced with 30 CU IDOL SELF LEARNING MATERIAL (SLM)

involuntary management capability. The involuntary managers verify task assignment to every of the out their resources, duty assignment of the tasks throughout employment execution supported the progress of the submitted requests. conjointly involuntary managers adaptively assign tasks within the employment to execution sites to fulfill given objective(s) to attenuate total execution time and optimize for QoS targets. These objectives square measure obligatory by Associate in Nursing SLA. Autonomous system which will schedule employment to run at an explicit date and time, dynamically trigger employment on sudden business events, trigger employment via an online service, monitor for employment standing info, get alerts on no-hit and unsuccessful completions, generate reports on job history, use conditional logic, give a business method read, linking disparate processes along, schedule maintenance tasks within the applications, the info, etc. Green Initiatives: inexperienced Computing refers to the follow of implementing policies and procedures that cut back the impact of computing waste on the atmosphere through the improved usage of computing resources. This movement has larger environmental concern involves each department in Associate in Nursing enterprise. inexperienced it's the driving issue for the IT trade. one explicit space of interest in inexperienced it's “Datacenter’. IT departments square measure wanting to scale back their carbon footprint of Datacenters to avoid wasting the atmosphere. Constraints on out their Computing power, cooling capability Associate in Nursing physical house in an enterprise Datacenter facility impose serious limitations on ability to deliver key services. In these circumstances, “going green” within the Datacenter isn't on the subject of social responsibility, it's a business imperative. To have an inexperienced datacenter, balanced utilization of power, cooling capability and economical infrastructure square measure the key elements. so as to determine an inexperienced information center, it's vital to know however these elements in a very Datacenter have historically been deployed and to grasp the initiatives to be taken to create the datacenter inexperienced. currently a day’s renewable energy sources like star and wind with partial or complete power square measure chosen by several of the companies. Of these, “Energy Efficiency” provides the best potential for fast come back on investment, easy implementation, and money justification. There square measure many no-hit inexperienced Datacenter initiatives to assist the enterprises to beat the energy and capability limitations, operational vulnerabilities, and constraints that limit today’s information center. 31 CU IDOL SELF LEARNING MATERIAL (SLM)

2.4 DATACENTERS LAYER Datacenters Layer is at all-time low of the cloud service design. commonly huge enterprises with vast hardware necessities in would like of subleasing Hardware as a Service (HaaS) are the users of this layer. The HaaS suppliers operate, manage and upgrade the hardware on behalf of their customers within the length of the lease or contract. This helps the is enterprises, because it relieves them from direct investment in building and managing Datacenters. meantime to maximize profits, HaaS suppliers have the cost-efficient infrastructure and technical experience to host the systems. As enterprise users have predefined business workloads, SLAs during this model are stricter because of severe performance necessities obligatory. The HaaS suppliers take place the profits from the economy of scale of building vast Datacenters infrastructures with large floor house, power, cooling prices also as operation and management experience. variety of technical challenges ought to be addressed by the HaaS suppliers in in operation and managing their services. the key challenges are potency, ease and speed of provisioning to massive scale systems. Datacenter management, scheduling, and power-consumption improvement are the opposite challenges that arise at this layer. Virtual Machines: Virtual machine is that the fine grain unit of computing resource. cloud users can have the pliability on their VMs for performance and potency as they need super- user privileged in accessing to their Virtual Machines. The users will customize the package stack of Virtual Machines. oft such services are referred as Infrastructure as a Service (IaaS). Virtualization is that the primary technology during a cloud atmosphere that supports the users with extraordinary flexibility in configuration of the settings while not distressing the physical infrastructure within the datacenters of the suppliers. The construct of IaaS has become doable through recent advances in OS Virtualization. Multiple application environments are going to be supported by every of the virtual machine that runs a distinct OS that is referred as guest OS. Virtual Machine Monitor: it's a hardware abstraction layer that acts as associate degree interface between virtual Machines and hardware. It coordinates the access of resources by all virtual machines. VMM allows organizations to hurry up the response to business dynamics through consolidation of computing resources so leads to less complexness in management of computing resources. rising the resource utilization and reducing power consumption are key challenges to the success. 32 CU IDOL SELF LEARNING MATERIAL (SLM)

The Hardware: The hardware offers basic computing resources like hardware resource, Memory resource, I/O devices and switches that kind the backbone of the cloud. 2.5 DIFFERENCE BETWEEN CLIENT SERVER ARCHITECTURE AND CLOUD COMPUTING In client/server architecture, one logs on to a server, authenticating their identification against credentials saved on the server, not on the local computer even before accessing their computer’s operating system. Whereas cloud access usually occurs without the need for manual user-provided credentials, after the user has logged on to the computer, or other devices, utilizing locally-saved credentials. Both of them provide storage of the user computer for necessary files. Some would claim that cloud storage is more transparent to the user, which is absolutely true. 33 CU IDOL SELF LEARNING MATERIAL (SLM)

Figure 2.2 Difference between Client Server Architecture and Cloud Computing 34 CU IDOL SELF LEARNING MATERIAL (SLM)

Client/server architectures square measure ordinarily deployed in organizations wherever management of the user pc and pc access, like centrally-stored user credentials, OS updates, or change user applications square measure centrally administered and directed. Cloud storage could also be a clear sub-function of a client/server design, tho' the contrary isn't true, that is, a client/server design isn't straightaway a sub-function of cloud storage, tho' we are able to presumptively expect that the latter to become the model sooner instead of later. Betting on the Cloud, nobody will extremely tell simply however secure it's, or whether or not or not access to user information is actually secure or not. The primary distinction in cloud computing and ancient networking or hosting is that the implementation, and in one word that's “virtualization.” Virtualization permits for in depth quantifiability, giving shoppers just about limitless resources. In an ancient networking setup, the server is settled in hardware and if you wish to rescale to a lot of users than this hardware will support, you'd ought to apportion more cash for upgrades and there would still be a limit. however, with cloud computing infrastructure, multiple servers square measure already in situ at the beginning, they then use virtualization to render solely the resources that a selected user wants that provides it nice quantifiability from the little wants of resources of private businesses to serious company resource wants. A Cloud supplier is in a position to scale resources while not problems and therefore the consumer can solely ought to get hold of what they use. In ancient networking, you wish to get hold of everything; the hardware, the installation, maintenance, or perhaps simply rent it for a monthly mounted worth, notwithstanding you simply would like a tiny low little bit of resource. Cloud computing is associate degree external style of information storage and software package delivery, which may create it appear less secure than native information hosting. Anyone with access to the server will read and use the keep information and applications within the cloud, where web affiliation is obtainable. selecting a cloud service supplier that's fully clear in its hosting of cloud platforms and ensures optimum security measures square measure in situ is crucial once transitioning to the cloud. With ancient IT infrastructure, you're answerable for the protection of your information, and it's easier to make sure that solely approved personnel will access keep applications and information. Physically connected to your native network, information centres are managed by 35 CU IDOL SELF LEARNING MATERIAL (SLM)

in-house IT departments on a nonstop basis, however a big quantity of your time and cash is required to make sure the proper security ways square measure enforced and information recovery systems square measure in situ In summary, cloud design is or is simply another reasonably a client/server design wherever the user is cunningly insulated from the client/server aspects of its implementation. It all depends on World Health Organization controls what cloud and that cloud that we have a tendency to square measure talking regarding. Expect that within the close to future, all client/server architectures look a lot of just like the cloud than networks of previous, however it's still just about a similar factor. Remote storage of user information that's changed regionally and accessible to the user despite that platform they use to access it. 2.6 PROS OF CLOUD COMPUTING Pros of Cloud Computing No cost on infrastructure: Cloud computing is divided into three major categories as per the services: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). In all these categories, one thing is common that you don’t need to invest in hardware or any infrastructure. In general, every organization has to spend a lot on their IT infrastructure to set up and hire a specialized team. Servers, network devices, ISP connections, storage, and software – these are the major things on which you need to invest if we talk about general IT infrastructure. Minimum management and cost: By selecting the cloud, you save cost in many ways:  Zero investment in infrastructure.  Since you don’t own the infrastructure, you spend nothing on its management or staff to manage it.  Cloud works on pay as you go model, so you spend only on resources that you need. Nothing more! 36 CU IDOL SELF LEARNING MATERIAL (SLM)

When you opt for the cloud, the management of its infrastructure is the sole responsibility of the cloud provider and not of the user. Forget about administrative or management hassles: Whenever there is a purchase or up- gradation of hardware, a lot of time is wasted looking for best vendors, inviting quotations, negotiating rates, taking approvals, generating POs and waiting for delivery and then in setting up the infrastructure. This whole process includes lots of administrative/managerial tasks that waste a lot of time. With cloud services, you just need to compare the best cloud service providers and their plans and buy from the one that matches your requirements. And this whole process doesn’t take much time and saves you a lot of efforts. Your system maintenance tasks are also eliminated in the cloud. Accessibility and pay per use: Cloud resources are easily accessible from around the globe – anytime, anywhere and from any device and you have complete access to your resources. This decides your billing also -you only pay for what you use and how much you use. It’s like your phone or electricity bill. But with other IT infrastructure, one spends the complete amount in one go and it is very an interface rare that those resources are used optimally and thus, the investment goes waste. Reliability: Your infrastructure in the cloud increases the reliability and availability of applications and services. Cloud services run on pooled and redundant infrastructure which provides you with a higher availability of IT services. Data control: Another primary advantage of the cloud is that it centralizes all the data from multiple projects and branch offices to a single location. You gain complete control over the data without visiting individual places for checking the information. Data backup & recovery: Loss of data can significantly impact your business. You might lose critical information which can cost you a huge sum of money, waste your valuable time and adversely impact your brand image. 37 CU IDOL SELF LEARNING MATERIAL (SLM)

To prevent it, you can automatically backup all the data to the cloud on a regular basis. This helps you to recover any data in case of accidental deletion, loss because of natural calamity or if the hard drive crashes. Huge cloud storage: Most cloud services provide you a free, secure and huge storage space to store all your valuable information. Although most cloud storage services like One Drive offer you a good amount of free storage, if you use it all, you can always go for buying more secure storage in the cloud. Automatic software updates: Updating a system every now and then can be a frustrating task for enterprises. The IT department needs to update the system for every individual which not only wastes time but affects productivity. But if you are using cloud-based applications, they will get automatically updated, without any involvement from the users. After discussing the benefits of cloud computing, let’s now discuss some disadvantages of cloud computing. 2.7 CONS OF CLOUD COMPUTING Cons of Cloud Computing Requires good speed internet with good bandwidth: To access your cloud services, you need to have a good internet connection always with good bandwidth to upload or download files to/from the cloud Downtime: Since the cloud requires high internet speed and good bandwidth, there is always a possibility of service outage, which can result in business downtime. Today, no business can afford revenue or business loss due to downtime or slow down from an interruption in critical business processes. Limited control of infrastructure: Since you are not the owner of the infrastructure of the cloud, hence you don’t have any control or have limited access to the cloud infra. Restricted or limited flexibility: The cloud provides a huge list of services, but consuming them comes with a lot of restrictions and limited flexibility for your applications or 38 CU IDOL SELF LEARNING MATERIAL (SLM)

developments. Also, platform dependency or ‘vendor lock-in’ can sometimes make it difficult for you to migrate from one provider to another. On-going costs: Although you save your cost of spending on whole infrastructure and its management, on the cloud, you need to keep paying for services as long as you use them. But in traditional methods, you only need to invest once. Security: Security of data is a big concern for everyone. Since the public cloud utilizes the internet, your data may become vulnerable. In the case of a public cloud, it depends on the cloud provider to take care of your data. So, before opting for cloud services, it is required that you find a provider who follows maximum compliance policies for data security. For complete security of data on the cloud, one needs to consider a somewhat costlier private cloud option or the hybrid cloud option, where generic data can be on the public cloud and business-critical data is kept on the private cloud. Vendor Lock-in: Although the cloud service providers assure you that they will allow you to switch or migrate to any other service provider whenever you want, it is a very difficult process. You will find it complex to migrate all the cloud services from one service provider to another. During migration, you might end up facing compatibility, interoperability and support issues. To avoid these issues, many customers choose not to change the vendor. Technical issues: Even if you are a tech whiz, the technical issues can occur, and everything can’t be resolved in-house. To avoid interruptions, you will need to contact your service provider for support. However, not every vendor provides 24/7 support to their clients. 2.8 SUMMARY  To conclude, there are pros and cons of cloud but cloud has become a mandatory part of every business venture. Today, one cannot think without enjoying the benefits of cloud computing. With careful precautions and efforts, the disadvantages of cloud computing can be minimized. It’s true that cloud computing has rocked the business world. The pros outweigh the cons of cloud computing. The minimized costs, easy 39 CU IDOL SELF LEARNING MATERIAL (SLM)

access, data backup, data centralization, sharing capabilities, security, free storage and quick testing speaks for itself. The argument becomes even stronger with the enhanced flexibility and dependability.  Although cloud computing has recently attracted significant momentum and attention in both academia and industry users. This is due to noticing drastic change in everyone’s perception of infrastructure availability, software delivery and development models. Representing the step by step deployment from mainframe computers to cloud computing architecture, following the transition throw personal computer, network, client / server, internet and grid computing models. This rapid change towards the cloud computing, has fuelled on this critical issue for the success of information systems, communication and information security. To words the perspective of security, a number of risks and challenges have been introduced regarding relocation to the cloud computing, deteriorating much of the effectiveness of traditional protection mechanisms. As a result, the aim of this paper is firstly to introduce some of the paradigm towards cloud computing, application, advantage and drawbacks of cloud computing and secondly to evaluate cloud security by identifying some of the challenges in the cloud computing.  Datacenters Layer is at the bottom of the cloud service architecture. Normally big enterprises with huge hardware requirements in need of subleasing Hardware as a Service (HaaS) are the users of this layer. The HaaS providers operate, manage and upgrade the hardware on behalf of their consumers in the duration of the lease or contract. This helps the is enterprises, as it relieves them from upfront investment in building and managing Datacenters. Meanwhile to maximize profits, HaaS providers have the cost-effective infrastructure and technical expertise to host the systems. As enterprise users have predefined business workloads, SLAs in this model are stricter due to severe performance requirements imposed. The HaaS providers materialize the profits from the economy of scale of building huge Datacenters infrastructures with gigantic floor space, power, cooling costs as well as operation and management expertise. A number of technical challenges need to be addressed by the HaaS providers in operating and managing their services. The major challenges are efficiency, ease and speed of provisioning to large scale systems. Datacenter management, scheduling, and power-consumption optimization are the other 40 CU IDOL SELF LEARNING MATERIAL (SLM)

challenges that arise at this layer 2.9 KEY WORDS/ABBREVIATIONS  Cloud computing types: There are three main cloud computing types, with additional ones evolving—software-as-a-service (SaaS) for web-based applications, infrastructure-as-a-service (IaaS) for Internet-based access to storage and computing power, and platform-as-a-service (PaaS) which gives developers the tools to build and host Web applications.  Cloud service provider: A company that provides a cloud-based platform, infrastructure, application or storage services, usually for a fee.  Cloud storage: A service that lets you store data by transferring it over the Internet or another network to an offsite storage system maintained by a third party.  Computer grids: Groups of networked computers that act together to perform large tasks, such as analysing huge sets of data and weather modelling.  Database sharing: A type of partitioning that lets you divide your large database into smaller databases, which can be managed faster more easily across servers. 2.10 LEARNING ACTIVITY 1. Take two organization of different architecture and differentiate them with Cloud Computing Architecture ___________________________________________________________________________ ___________________________________________________________________________ 2. How Client computing is advantageous on other server-based technology? ___________________________________________________________________________ ___________________________________________________________________________ 2.11 UNIT END QUESTIONS (MCQ AND DESCRIPTIVE) A. Descriptive Questions 1. Discuss the layered architecture of Cloud Computing 2. Compare Cloud Computing Architecture with traditional Client/Server architecture. 41 CU IDOL SELF LEARNING MATERIAL (SLM)

3. Discuss the various pros and cons of Cloud Computing 4. Give examples of few applications of Cloud Computing 5. When you develop a web application do you ever wonder about the architecture of the solution? Which architecture do you usually use? Why that one especially? What are its pros and cons and is it a good architecture for the problem your application is trying to solve? B. Multiple Choice Questions 1. Cloud computing is an abstraction based on the notion of pooling physical resources and presenting them as a ________ resource. a) real b) virtual c) cloud d) none of the mentioned 2. Which of the following is Cloud Platform by Amazon? a) Azure b) AWS c) Cloudera d) All of the mentioned 3. All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity. a) propagation b) latency c) noise d) all of the mentioned 4. Cloud computing is a _______ system and it is necessarily unidirectional in nature. a) stateless b) stateful 42 CU IDOL SELF LEARNING MATERIAL (SLM)

c) reliable d) all of the mentioned 5. The _____ is something that you can obtain under contract from your vendor. a) Post b) QoS c) SoS d) All of the mentioned Answer 1. b 2. b 3. b 4. a 5. b 2.12 REFERENCES  Buyya Rajkumar, Vecchiola Christian, ThamaraiSelvi S. (2013). Mastering Cloud Computing. New Delhi: Tata McGraw-Hill.  Jayaswal K., Kallakuruchi J., Houde D.J., Shah D. (2014). Cloud Computing: Black Book. New Delhi: Dreamtech Press.  Buyya Rajkumar, Broberg James, Goscinski A.M., Wile (Editors). (2011). Cloud Computing: Principles and Paradigm. New Jersey: John Willy & Sons Inc.  Microsoft Documents: https://docs.microsoft.com/en-us/azure/  https://channel9.msdn.com/Azure  \"Where's the Rub: Cloud Computing's Hidden Costs\". 2014-02-27. Retrieved 2014-07- 14.  \"Cloud Computing: Clash of the clouds\". The Economist. 2009-10-15. Retrieved 2009- 11-03.  \"Gartner Says Cloud Computing Will Be as Influential As E-business\". Gartner. Retrieved 2010-08-22.  Gruman, Galen (2008-04-07). \"What cloud computing really means\". InfoWorld. Retrieved 2009-06-02.  Vaughan-Nichols, Steven J. \"Microsoft developer reveals Linux is now more used on Azure than Windows Server\". ZDNet. Retrieved 2019-07-02. 43 CU IDOL SELF LEARNING MATERIAL (SLM)

 Kumar, Guddu (9 September 2019). \"A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions\" (PDF). United International Journal for Research & Technology. 1 (2): 26. Retrieved 9 September 2019.  \"Announcing Amazon Elastic Compute Cloud (Amazon EC2) – beta\". 24 August 2006. Retrieved 31 May 2014. 44 CU IDOL SELF LEARNING MATERIAL (SLM)

UNIT 3: CLOUD SERVICE MANAGEMENT 1 Structure 3.0. Learning Objectives 3.1. Introduction 3.2. Cloud – Service Level Agreement 3.3. Service Provider-Cloud Management 3.4. How to Choose a Cloud service provider? 3.5. Administration support 3.6. Technical Capabilities and Processes 3.7. Security Practices 3.8. Role of Service providers in Cloud Computing 3.9. Scalability: Scale up and Scale Down Services 3.10.Summary 3.11.Key Words/Abbreviations 3.12.Learning Activity 3.13.Unit End Questions (MCQ and Descriptive) 3.14.References 3.0 LEARNING OBJECTIVES At the end of the unit learner, will able to learn and have knowledge of Cloud –SLA and following objectives:  Cloud Service Level Agreement  How to Choose Service Provider  Role of Service Provider  Scalability 3.1 INTRODUCTION Cloud management is that the management of cloud computing product and services. Public clouds area unit managed by public cloud service suppliers, that embody the general public cloud environment’s servers, storage, networking and knowledge centre operations. 45 CU IDOL SELF LEARNING MATERIAL (SLM)

Users can also like better to manage their public cloud services with a third-party cloud management tool. Users of public cloud services will usually choose from 3 basic cloud provisioning categories: User self-provisioning: Customers purchase cloud services directly from the supplier, usually through an online kind or console interface. The client pays on a per-transaction basis. Advanced provisioning: Customers consent advance a planned quantity of resources, that area unit ready ahead of service. The client pays a flat fee or a monthly fee. Dynamic provisioning: The supplier allocates resources once the client wants them, then decommissions them once they are not any longer required. The client is charged on a pay- per-use basis. A service-level agreement (SLA) may be a commitment between a service supplier and a shopper. Specific aspects of the service – quality, availableness, responsibilities – area unit in agreement between the service supplier and therefore the service user. The most common part of associate SLA is that the services ought to be provided to the client as prearranged within the contract. As associate example, web service suppliers and Telco’s can unremarkably embody service level agreements at intervals the terms of their contracts with customers to outline the level(s) of service being sold-out in plain language terms. during this case the SLA can usually have a technical definition in mean solar time between failures (MTBF), mean solar time to repair or mean solar time to recovery (MTTR); distinguishing that party is accountable for coverage faults or paying fees; responsibility for varied knowledge rates; throughput; jitter; or similar measurable details. 3.2 CLOUD – SERVICE LEVEL AGREEMENT A cloud SLA (cloud service-level agreement) is degree agreement between a cloud service provider and a shopper that ensures a minimum level of service is maintained. It guarantees levels of responsibleness, accessibility and responsiveness to systems and applications, whereas to boot specifying United Nations agency will govern once there is a service interruption. A cloud infrastructure can span geographies, networks and systems that square measure every physical and virtual. Whereas the precise metrics of a cloud SLA can vary by service 46 CU IDOL SELF LEARNING MATERIAL (SLM)

provider, square measure the world the realm} unit as lined are uniform: volume and quality of labour -- still as preciseness and accuracy -- speed, responsiveness and efficiency. The document aims to establish sympathy of the services, prioritized areas, responsibilities, guarantees and warranties provided by the service provider. What to look for in a {very} very cloud SLA Service-level agreements became heaps of necessary as organizations move their systems, applications and data to the cloud. A cloud SLA ensures that cloud suppliers meet certain enterprise-level requirements and provide customers with a clearly printed set of deliverables. The printed level of services has to be compelled to be specific and measureable in each area. this allows the quality of service (QoS) to be benchmarked and, if stipulated by the agreement, rewarded or punished consequently. Enterprise- vs. provider-managed areas An SLA can usually use technical definitions that quantify the amount of service, like mean solar time between failures (MTBF) or mean solar time to repair (MTTR), that specifies a target or minimum price for service-level performance. A typical cipher and cloud SLA articulate precise levels of service, still because the recourse or compensation the user is entitled to ought to the supplier fail to deliver the service as delineate. Another space to contemplate fastidiously is service convenience, that specifies the most quantity of your time a browse request will take; what percentage retries are allowed; so on. The SLA ought to additionally outline compensation for users if the specifications are not met. A cloud storage service supplier sometimes offers a layer service credit set up that offers users credits supported the discrepancy between SLA specifications and therefore the actual service levels delivered. Most public cloud storage services offer details of the service levels that users will expect on their websites, and these can doubtless be a similar for all users. However, Associate in Nursing enterprise establishing a service with a non-public cloud storage supplier could also be able to talk over an additional tailor-made deal. during this case, the cloud SLA may embrace specifications for retention policies, the number of copies which will be preserved, storage locations so on 47 CU IDOL SELF LEARNING MATERIAL (SLM)

. Figure 3.1 Cloud-Service level Cloud service-level agreements is also a lot of careful to hide governance, security specifications, compliance, and performance and period of time statistics. they must address security and cryptography practices for information privacy, disaster recovery expectations, information location, further as information access and movableness. Data protection processes, like backup and disaster recovery, ought to even be self-addressed. The agreement ought to define the responsibilities of every party, the appropriate performance parameters, an outline of the applications and services lined underneath the agreement, procedures for observation service levels, and a schedule for the correction of outages. Examine the ramifications of the cloud SLA before language. As an example, 99.9% uptime, a typical stipulation, interprets to 9 hours of outage per annum. for a few mission-critical information, which will not be adequate you ought to conjointly check to envision however terms are outlined. 48 CU IDOL SELF LEARNING MATERIAL (SLM)

SLAs that scale most SLAs are negotiated to satisfy the requirements of the client at the time of language, however several businesses amendment dramatically in size over time. A solid cloud service-level agreement outlines intervals for reviewing a contract so it meets the dynamic desires of a corporation. Some vendors even integrate notification workflows that indicate once a cloud service-level agreement is on the brink of being broken therefore new negotiations is initiated supported the changes in scale. once getting into any cloud SLA negotiation, it is vital to safeguard the business by instructive uptimes. an honest SLA protects each the client and provider from incomprehensible expectations. Finally, the cloud SLA ought to embrace Associate in Nursing exit strategy that outlines the expectations of the supplier to confirm a sleek transition. 3.3 SERVICE PROVIDER-CLOUD MANAGEMENT When a business adopts a cloud resolution into their infrastructure, they have to contemplate however they’re attending to manage it. several IT groups can wrestle management responsibilities themselves, that is actually a viable choice. However, which may not be the most effective approach for your organization. you will need to contemplate a managed service supplier (MSP) to assist manage your cloud resolution. A cloud managed service supplier lifts some or all cloud management obligations from a company’s IT team. looking on the managed service supplier, they could provide full management of a cloud readying or management of specific cloud services. What square measure the advantages of cloud managed service suppliers, and why do you have to contemplate them for managing your cloud resources? A cloud service supplier could be a third-party company giving a cloud-based platform, infrastructure, application or storage services. very similar to a home-owner would get hold of a utility like electricity or gas, corporations generally ought to pay just for the quantity of cloud services they use, as business demands need. Besides the pay-per-use model, cloud service suppliers additionally offer corporations a large vary of advantages. Businesses will profit of measurability and suppleness by not being restricted to physical constraints of on-premises servers, the reliable-ness of multiple 49 CU IDOL SELF LEARNING MATERIAL (SLM)


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook